exports.c 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. /*
  2. * SELinux services exported to the rest of the kernel.
  3. *
  4. * Author: James Morris <jmorris@redhat.com>
  5. *
  6. * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
  8. * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2,
  12. * as published by the Free Software Foundation.
  13. */
  14. #include <linux/types.h>
  15. #include <linux/kernel.h>
  16. #include <linux/module.h>
  17. #include <linux/selinux.h>
  18. #include <linux/fs.h>
  19. #include <linux/ipc.h>
  20. #include <asm/atomic.h>
  21. #include "security.h"
  22. #include "objsec.h"
  23. /* SECMARK reference count */
  24. extern atomic_t selinux_secmark_refcount;
  25. int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
  26. {
  27. if (selinux_enabled)
  28. return security_sid_to_context(sid, ctx, ctxlen);
  29. else {
  30. *ctx = NULL;
  31. *ctxlen = 0;
  32. }
  33. return 0;
  34. }
  35. void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
  36. {
  37. if (selinux_enabled) {
  38. struct inode_security_struct *isec = inode->i_security;
  39. *sid = isec->sid;
  40. return;
  41. }
  42. *sid = 0;
  43. }
  44. void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
  45. {
  46. if (selinux_enabled) {
  47. struct ipc_security_struct *isec = ipcp->security;
  48. *sid = isec->sid;
  49. return;
  50. }
  51. *sid = 0;
  52. }
  53. void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
  54. {
  55. if (selinux_enabled) {
  56. struct task_security_struct *tsec = tsk->security;
  57. *sid = tsec->sid;
  58. return;
  59. }
  60. *sid = 0;
  61. }
  62. int selinux_string_to_sid(char *str, u32 *sid)
  63. {
  64. if (selinux_enabled)
  65. return security_context_to_sid(str, strlen(str), sid);
  66. else {
  67. *sid = 0;
  68. return 0;
  69. }
  70. }
  71. EXPORT_SYMBOL_GPL(selinux_string_to_sid);
  72. int selinux_secmark_relabel_packet_permission(u32 sid)
  73. {
  74. if (selinux_enabled) {
  75. struct task_security_struct *tsec = current->security;
  76. return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
  77. PACKET__RELABELTO, NULL);
  78. }
  79. return 0;
  80. }
  81. EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
  82. void selinux_secmark_refcount_inc(void)
  83. {
  84. atomic_inc(&selinux_secmark_refcount);
  85. }
  86. EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
  87. void selinux_secmark_refcount_dec(void)
  88. {
  89. atomic_dec(&selinux_secmark_refcount);
  90. }
  91. EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);