blob: c0a454aee1e03cb0e3825a2c5f965c941636c4d9 [file] [log] [blame]
Darrel Goeddel376bd9c2006-02-24 15:44:05 -06001/*
2 * SELinux services exported to the rest of the kernel.
3 *
4 * Author: James Morris <jmorris@redhat.com>
5 *
6 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
Steve Grubbe7c34972006-04-03 09:08:13 -04008 * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
Darrel Goeddel376bd9c2006-02-24 15:44:05 -06009 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2,
12 * as published by the Free Software Foundation.
13 */
14#include <linux/types.h>
15#include <linux/kernel.h>
16#include <linux/module.h>
17#include <linux/selinux.h>
Steve Grubb1b50eed2006-04-03 14:06:13 -040018#include <linux/fs.h>
Steve Grubb9c7aa6a2006-03-31 15:22:49 -050019#include <linux/ipc.h>
Paul Moored621d352008-01-29 08:43:36 -050020#include <asm/atomic.h>
Darrel Goeddel376bd9c2006-02-24 15:44:05 -060021
22#include "security.h"
23#include "objsec.h"
24
Paul Moored621d352008-01-29 08:43:36 -050025/* SECMARK reference count */
26extern atomic_t selinux_secmark_refcount;
27
James Morrisc749b292006-06-09 00:28:25 -070028int selinux_string_to_sid(char *str, u32 *sid)
29{
30 if (selinux_enabled)
31 return security_context_to_sid(str, strlen(str), sid);
32 else {
33 *sid = 0;
34 return 0;
35 }
36}
37EXPORT_SYMBOL_GPL(selinux_string_to_sid);
38
Paul Moored621d352008-01-29 08:43:36 -050039int selinux_secmark_relabel_packet_permission(u32 sid)
James Morrisc749b292006-06-09 00:28:25 -070040{
41 if (selinux_enabled) {
David Howells86a264a2008-11-14 10:39:18 +110042 const struct task_security_struct *__tsec;
43 u32 tsid;
James Morrisc749b292006-06-09 00:28:25 -070044
David Howells86a264a2008-11-14 10:39:18 +110045 __tsec = current_security();
46 tsid = __tsec->sid;
47
48 return avc_has_perm(tsid, sid, SECCLASS_PACKET,
James Morrisc749b292006-06-09 00:28:25 -070049 PACKET__RELABELTO, NULL);
50 }
51 return 0;
52}
Paul Moored621d352008-01-29 08:43:36 -050053EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
54
55void selinux_secmark_refcount_inc(void)
56{
57 atomic_inc(&selinux_secmark_refcount);
58}
59EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
60
61void selinux_secmark_refcount_dec(void)
62{
63 atomic_dec(&selinux_secmark_refcount);
64}
65EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);
Eric Parised868a52009-09-12 22:54:10 -040066
67bool selinux_is_enabled(void)
68{
69 return selinux_enabled;
70}
71EXPORT_SYMBOL_GPL(selinux_is_enabled);