exports.c 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. /*
  2. * SELinux services exported to the rest of the kernel.
  3. *
  4. * Author: James Morris <jmorris@redhat.com>
  5. *
  6. * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
  8. * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2,
  12. * as published by the Free Software Foundation.
  13. */
  14. #include <linux/types.h>
  15. #include <linux/kernel.h>
  16. #include <linux/module.h>
  17. #include <linux/selinux.h>
  18. #include <linux/fs.h>
  19. #include <linux/ipc.h>
  20. #include <asm/atomic.h>
  21. #include "security.h"
  22. #include "objsec.h"
  23. /* SECMARK reference count */
  24. extern atomic_t selinux_secmark_refcount;
  25. int selinux_string_to_sid(char *str, u32 *sid)
  26. {
  27. if (selinux_enabled)
  28. return security_context_to_sid(str, strlen(str), sid);
  29. else {
  30. *sid = 0;
  31. return 0;
  32. }
  33. }
  34. EXPORT_SYMBOL_GPL(selinux_string_to_sid);
  35. int selinux_secmark_relabel_packet_permission(u32 sid)
  36. {
  37. if (selinux_enabled) {
  38. const struct task_security_struct *__tsec;
  39. u32 tsid;
  40. __tsec = current_security();
  41. tsid = __tsec->sid;
  42. return avc_has_perm(tsid, sid, SECCLASS_PACKET,
  43. PACKET__RELABELTO, NULL);
  44. }
  45. return 0;
  46. }
  47. EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
  48. void selinux_secmark_refcount_inc(void)
  49. {
  50. atomic_inc(&selinux_secmark_refcount);
  51. }
  52. EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
  53. void selinux_secmark_refcount_dec(void)
  54. {
  55. atomic_dec(&selinux_secmark_refcount);
  56. }
  57. EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);