/* * SELinux services exported to the rest of the kernel. * * Author: James Morris <jmorris@redhat.com> * * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2, * as published by the Free Software Foundation. */ #include <linux/types.h> #include <linux/kernel.h> #include <linux/module.h> #include <linux/selinux.h> #include <linux/fs.h> #include <linux/ipc.h> #include "security.h" #include "objsec.h" void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid) { struct task_security_struct *tsec = tsk->security; if (selinux_enabled) *ctxid = tsec->sid; else *ctxid = 0; } int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) { if (selinux_enabled) return security_sid_to_context(ctxid, ctx, ctxlen); else { *ctx = NULL; *ctxlen = 0; } return 0; } void selinux_get_inode_sid(const struct inode *inode, u32 *sid) { if (selinux_enabled) { struct inode_security_struct *isec = inode->i_security; *sid = isec->sid; return; } *sid = 0; } void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) { if (selinux_enabled) { struct ipc_security_struct *isec = ipcp->security; *sid = isec->sid; return; } *sid = 0; } void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) { if (selinux_enabled) { struct task_security_struct *tsec = tsk->security; *sid = tsec->sid; return; } *sid = 0; } int selinux_string_to_sid(char *str, u32 *sid) { if (selinux_enabled) return security_context_to_sid(str, strlen(str), sid); else { *sid = 0; return 0; } } EXPORT_SYMBOL_GPL(selinux_string_to_sid); int selinux_relabel_packet_permission(u32 sid) { if (selinux_enabled) { struct task_security_struct *tsec = current->security; return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET, PACKET__RELABELTO, NULL); } return 0; } EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);