 6b89a74be0
			
		
	
	
	6b89a74be0
	
	
	
		
			
			Remove the following exported SELinux interfaces: selinux_get_inode_sid(inode, sid) selinux_get_ipc_sid(ipcp, sid) selinux_get_task_sid(tsk, sid) selinux_sid_to_string(sid, ctx, len) They can be substitued with the following generic equivalents respectively: new LSM hook, inode_getsecid(inode, secid) new LSM hook, ipc_getsecid*(ipcp, secid) LSM hook, task_getsecid(tsk, secid) LSM hook, sid_to_secctx(sid, ctx, len) Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Ahmed S. Darwish <darwish.07@gmail.com> Acked-by: James Morris <jmorris@namei.org> Reviewed-by: Paul Moore <paul.moore@hp.com>
		
			
				
	
	
		
			61 lines
		
	
	
	
		
			1.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			61 lines
		
	
	
	
		
			1.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * SELinux services exported to the rest of the kernel.
 | |
|  *
 | |
|  * Author: James Morris <jmorris@redhat.com>
 | |
|  *
 | |
|  * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
 | |
|  * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
 | |
|  * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or modify
 | |
|  * it under the terms of the GNU General Public License version 2,
 | |
|  * as published by the Free Software Foundation.
 | |
|  */
 | |
| #include <linux/types.h>
 | |
| #include <linux/kernel.h>
 | |
| #include <linux/module.h>
 | |
| #include <linux/selinux.h>
 | |
| #include <linux/fs.h>
 | |
| #include <linux/ipc.h>
 | |
| #include <asm/atomic.h>
 | |
| 
 | |
| #include "security.h"
 | |
| #include "objsec.h"
 | |
| 
 | |
| /* SECMARK reference count */
 | |
| extern atomic_t selinux_secmark_refcount;
 | |
| 
 | |
| int selinux_string_to_sid(char *str, u32 *sid)
 | |
| {
 | |
| 	if (selinux_enabled)
 | |
| 		return security_context_to_sid(str, strlen(str), sid);
 | |
| 	else {
 | |
| 		*sid = 0;
 | |
| 		return 0;
 | |
| 	}
 | |
| }
 | |
| EXPORT_SYMBOL_GPL(selinux_string_to_sid);
 | |
| 
 | |
| int selinux_secmark_relabel_packet_permission(u32 sid)
 | |
| {
 | |
| 	if (selinux_enabled) {
 | |
| 		struct task_security_struct *tsec = current->security;
 | |
| 
 | |
| 		return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
 | |
| 				    PACKET__RELABELTO, NULL);
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
 | |
| 
 | |
| void selinux_secmark_refcount_inc(void)
 | |
| {
 | |
| 	atomic_inc(&selinux_secmark_refcount);
 | |
| }
 | |
| EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
 | |
| 
 | |
| void selinux_secmark_refcount_dec(void)
 | |
| {
 | |
| 	atomic_dec(&selinux_secmark_refcount);
 | |
| }
 | |
| EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);
 |