|
@@ -16,7 +16,6 @@
|
|
|
|
|
|
struct selinux_audit_rule;
|
|
struct selinux_audit_rule;
|
|
struct audit_context;
|
|
struct audit_context;
|
|
-struct inode;
|
|
|
|
struct kern_ipc_perm;
|
|
struct kern_ipc_perm;
|
|
|
|
|
|
#ifdef CONFIG_SECURITY_SELINUX
|
|
#ifdef CONFIG_SECURITY_SELINUX
|
|
@@ -69,45 +68,6 @@ int selinux_audit_rule_match(u32 sid, u32 field, u32 op,
|
|
*/
|
|
*/
|
|
void selinux_audit_set_callback(int (*callback)(void));
|
|
void selinux_audit_set_callback(int (*callback)(void));
|
|
|
|
|
|
-/**
|
|
|
|
- * selinux_sid_to_string - map a security context ID to a string
|
|
|
|
- * @sid: security context ID to be converted.
|
|
|
|
- * @ctx: address of context string to be returned
|
|
|
|
- * @ctxlen: length of returned context string.
|
|
|
|
- *
|
|
|
|
- * Returns 0 if successful, -errno if not. On success, the context
|
|
|
|
- * string will be allocated internally, and the caller must call
|
|
|
|
- * kfree() on it after use.
|
|
|
|
- */
|
|
|
|
-int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen);
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * selinux_get_inode_sid - get the inode's security context ID
|
|
|
|
- * @inode: inode structure to get the sid from.
|
|
|
|
- * @sid: pointer to security context ID to be filled in.
|
|
|
|
- *
|
|
|
|
- * Returns nothing
|
|
|
|
- */
|
|
|
|
-void selinux_get_inode_sid(const struct inode *inode, u32 *sid);
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * selinux_get_ipc_sid - get the ipc security context ID
|
|
|
|
- * @ipcp: ipc structure to get the sid from.
|
|
|
|
- * @sid: pointer to security context ID to be filled in.
|
|
|
|
- *
|
|
|
|
- * Returns nothing
|
|
|
|
- */
|
|
|
|
-void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid);
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * selinux_get_task_sid - return the SID of task
|
|
|
|
- * @tsk: the task whose SID will be returned
|
|
|
|
- * @sid: pointer to security context ID to be filled in.
|
|
|
|
- *
|
|
|
|
- * Returns nothing
|
|
|
|
- */
|
|
|
|
-void selinux_get_task_sid(struct task_struct *tsk, u32 *sid);
|
|
|
|
-
|
|
|
|
/**
|
|
/**
|
|
* selinux_string_to_sid - map a security context string to a security ID
|
|
* selinux_string_to_sid - map a security context string to a security ID
|
|
* @str: the security context string to be mapped
|
|
* @str: the security context string to be mapped
|
|
@@ -175,28 +135,6 @@ static inline void selinux_audit_set_callback(int (*callback)(void))
|
|
return;
|
|
return;
|
|
}
|
|
}
|
|
|
|
|
|
-static inline int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
|
|
|
|
-{
|
|
|
|
- *ctx = NULL;
|
|
|
|
- *ctxlen = 0;
|
|
|
|
- return 0;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
|
|
|
|
-{
|
|
|
|
- *sid = 0;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-static inline void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
|
|
|
|
-{
|
|
|
|
- *sid = 0;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
|
|
|
|
-{
|
|
|
|
- *sid = 0;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
static inline int selinux_string_to_sid(const char *str, u32 *sid)
|
|
static inline int selinux_string_to_sid(const char *str, u32 *sid)
|
|
{
|
|
{
|
|
*sid = 0;
|
|
*sid = 0;
|