| /* |
| * SELinux services exported to the rest of the kernel. |
| * |
| * Author: James Morris <jmorris@redhat.com> |
| * |
| * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> |
| * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> |
| * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License version 2, |
| * as published by the Free Software Foundation. |
| */ |
| #include <linux/types.h> |
| #include <linux/kernel.h> |
| #include <linux/module.h> |
| #include <linux/selinux.h> |
| #include <linux/fs.h> |
| #include <linux/ipc.h> |
| |
| #include "security.h" |
| #include "objsec.h" |
| |
| void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid) |
| { |
| struct task_security_struct *tsec = tsk->security; |
| if (selinux_enabled) |
| *ctxid = tsec->sid; |
| else |
| *ctxid = 0; |
| } |
| |
| int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) |
| { |
| if (selinux_enabled) |
| return security_sid_to_context(ctxid, ctx, ctxlen); |
| else { |
| *ctx = NULL; |
| *ctxlen = 0; |
| } |
| |
| return 0; |
| } |
| |
| void selinux_get_inode_sid(const struct inode *inode, u32 *sid) |
| { |
| if (selinux_enabled) { |
| struct inode_security_struct *isec = inode->i_security; |
| *sid = isec->sid; |
| return; |
| } |
| *sid = 0; |
| } |
| |
| void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) |
| { |
| if (selinux_enabled) { |
| struct ipc_security_struct *isec = ipcp->security; |
| *sid = isec->sid; |
| return; |
| } |
| *sid = 0; |
| } |
| |
| void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) |
| { |
| if (selinux_enabled) { |
| struct task_security_struct *tsec = tsk->security; |
| *sid = tsec->sid; |
| return; |
| } |
| *sid = 0; |
| } |
| |
| int selinux_string_to_sid(char *str, u32 *sid) |
| { |
| if (selinux_enabled) |
| return security_context_to_sid(str, strlen(str), sid); |
| else { |
| *sid = 0; |
| return 0; |
| } |
| } |
| EXPORT_SYMBOL_GPL(selinux_string_to_sid); |
| |
| int selinux_relabel_packet_permission(u32 sid) |
| { |
| if (selinux_enabled) { |
| struct task_security_struct *tsec = current->security; |
| |
| return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET, |
| PACKET__RELABELTO, NULL); |
| } |
| return 0; |
| } |
| EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission); |