mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-07-22 23:04:43 +00:00
[SECMARK]: Add SELinux exports
Add and export new functions to the in-kernel SELinux API in support of the new secmark-based packet controls. Signed-off-by: James Morris <jmorris@namei.org> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
29a395eac4
commit
c749b29fae
2 changed files with 54 additions and 0 deletions
|
@ -118,6 +118,27 @@ void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid);
|
||||||
*/
|
*/
|
||||||
void selinux_get_task_sid(struct task_struct *tsk, u32 *sid);
|
void selinux_get_task_sid(struct task_struct *tsk, u32 *sid);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* selinux_string_to_sid - map a security context string to a security ID
|
||||||
|
* @str: the security context string to be mapped
|
||||||
|
* @sid: ID value returned via this.
|
||||||
|
*
|
||||||
|
* Returns 0 if successful, with the SID stored in sid. A value
|
||||||
|
* of zero for sid indicates no SID could be determined (but no error
|
||||||
|
* occurred).
|
||||||
|
*/
|
||||||
|
int selinux_string_to_sid(char *str, u32 *sid);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* selinux_relabel_packet_permission - check permission to relabel a packet
|
||||||
|
* @sid: ID value to be applied to network packet (via SECMARK, most likely)
|
||||||
|
*
|
||||||
|
* Returns 0 if the current task is allowed to label packets with the
|
||||||
|
* supplied security ID. Note that it is implicit that the packet is always
|
||||||
|
* being relabeled from the default unlabled value, and that the access
|
||||||
|
* control decision is made in the AVC.
|
||||||
|
*/
|
||||||
|
int selinux_relabel_packet_permission(u32 sid);
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
|
@ -172,6 +193,17 @@ static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
|
||||||
*sid = 0;
|
*sid = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline int selinux_string_to_sid(const char *str, u32 *sid)
|
||||||
|
{
|
||||||
|
*sid = 0;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline int selinux_relabel_packet_permission(u32 sid)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
#endif /* CONFIG_SECURITY_SELINUX */
|
#endif /* CONFIG_SECURITY_SELINUX */
|
||||||
|
|
||||||
#endif /* _LINUX_SELINUX_H */
|
#endif /* _LINUX_SELINUX_H */
|
||||||
|
|
|
@ -72,3 +72,25 @@ void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
|
||||||
*sid = 0;
|
*sid = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int selinux_string_to_sid(char *str, u32 *sid)
|
||||||
|
{
|
||||||
|
if (selinux_enabled)
|
||||||
|
return security_context_to_sid(str, strlen(str), sid);
|
||||||
|
else {
|
||||||
|
*sid = 0;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(selinux_string_to_sid);
|
||||||
|
|
||||||
|
int selinux_relabel_packet_permission(u32 sid)
|
||||||
|
{
|
||||||
|
if (selinux_enabled) {
|
||||||
|
struct task_security_struct *tsec = current->security;
|
||||||
|
|
||||||
|
return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
|
||||||
|
PACKET__RELABELTO, NULL);
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue