exports.c 2.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. /*
  2. * SELinux services exported to the rest of the kernel.
  3. *
  4. * Author: James Morris <jmorris@redhat.com>
  5. *
  6. * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
  8. * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2,
  12. * as published by the Free Software Foundation.
  13. */
  14. #include <linux/types.h>
  15. #include <linux/kernel.h>
  16. #include <linux/module.h>
  17. #include <linux/selinux.h>
  18. #include <linux/fs.h>
  19. #include <linux/ipc.h>
  20. #include "security.h"
  21. #include "objsec.h"
  22. void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid)
  23. {
  24. struct task_security_struct *tsec = tsk->security;
  25. if (selinux_enabled)
  26. *ctxid = tsec->sid;
  27. else
  28. *ctxid = 0;
  29. }
  30. int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen)
  31. {
  32. if (selinux_enabled)
  33. return security_sid_to_context(ctxid, ctx, ctxlen);
  34. else {
  35. *ctx = NULL;
  36. *ctxlen = 0;
  37. }
  38. return 0;
  39. }
  40. void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
  41. {
  42. if (selinux_enabled) {
  43. struct inode_security_struct *isec = inode->i_security;
  44. *sid = isec->sid;
  45. return;
  46. }
  47. *sid = 0;
  48. }
  49. void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
  50. {
  51. if (selinux_enabled) {
  52. struct ipc_security_struct *isec = ipcp->security;
  53. *sid = isec->sid;
  54. return;
  55. }
  56. *sid = 0;
  57. }
  58. void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
  59. {
  60. if (selinux_enabled) {
  61. struct task_security_struct *tsec = tsk->security;
  62. *sid = tsec->sid;
  63. return;
  64. }
  65. *sid = 0;
  66. }
  67. int selinux_string_to_sid(char *str, u32 *sid)
  68. {
  69. if (selinux_enabled)
  70. return security_context_to_sid(str, strlen(str), sid);
  71. else {
  72. *sid = 0;
  73. return 0;
  74. }
  75. }
  76. EXPORT_SYMBOL_GPL(selinux_string_to_sid);
  77. int selinux_relabel_packet_permission(u32 sid)
  78. {
  79. if (selinux_enabled) {
  80. struct task_security_struct *tsec = current->security;
  81. return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
  82. PACKET__RELABELTO, NULL);
  83. }
  84. return 0;
  85. }
  86. EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);