72 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			72 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * SELinux services exported to the rest of the kernel.
 | 
						|
 *
 | 
						|
 * Author: James Morris <jmorris@redhat.com>
 | 
						|
 *
 | 
						|
 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
 | 
						|
 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
 | 
						|
 * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
 | 
						|
 *
 | 
						|
 * This program is free software; you can redistribute it and/or modify
 | 
						|
 * it under the terms of the GNU General Public License version 2,
 | 
						|
 * as published by the Free Software Foundation.
 | 
						|
 */
 | 
						|
#include <linux/types.h>
 | 
						|
#include <linux/kernel.h>
 | 
						|
#include <linux/module.h>
 | 
						|
#include <linux/selinux.h>
 | 
						|
#include <linux/fs.h>
 | 
						|
#include <linux/ipc.h>
 | 
						|
#include <asm/atomic.h>
 | 
						|
 | 
						|
#include "security.h"
 | 
						|
#include "objsec.h"
 | 
						|
 | 
						|
/* SECMARK reference count */
 | 
						|
extern atomic_t selinux_secmark_refcount;
 | 
						|
 | 
						|
int selinux_string_to_sid(char *str, u32 *sid)
 | 
						|
{
 | 
						|
	if (selinux_enabled)
 | 
						|
		return security_context_to_sid(str, strlen(str), sid);
 | 
						|
	else {
 | 
						|
		*sid = 0;
 | 
						|
		return 0;
 | 
						|
	}
 | 
						|
}
 | 
						|
EXPORT_SYMBOL_GPL(selinux_string_to_sid);
 | 
						|
 | 
						|
int selinux_secmark_relabel_packet_permission(u32 sid)
 | 
						|
{
 | 
						|
	if (selinux_enabled) {
 | 
						|
		const struct task_security_struct *__tsec;
 | 
						|
		u32 tsid;
 | 
						|
 | 
						|
		__tsec = current_security();
 | 
						|
		tsid = __tsec->sid;
 | 
						|
 | 
						|
		return avc_has_perm(tsid, sid, SECCLASS_PACKET,
 | 
						|
				    PACKET__RELABELTO, NULL);
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
 | 
						|
 | 
						|
void selinux_secmark_refcount_inc(void)
 | 
						|
{
 | 
						|
	atomic_inc(&selinux_secmark_refcount);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
 | 
						|
 | 
						|
void selinux_secmark_refcount_dec(void)
 | 
						|
{
 | 
						|
	atomic_dec(&selinux_secmark_refcount);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);
 | 
						|
 | 
						|
bool selinux_is_enabled(void)
 | 
						|
{
 | 
						|
	return selinux_enabled;
 | 
						|
}
 | 
						|
EXPORT_SYMBOL_GPL(selinux_is_enabled);
 |