forked from luck/tmp_suning_uos_patched
d621d35e57
This patch introduces a mechanism for checking when labeled IPsec or SECMARK are in use by keeping introducing a configuration reference counter for each subsystem. In the case of labeled IPsec, whenever a labeled SA or SPD entry is created the labeled IPsec/XFRM reference count is increased and when the entry is removed it is decreased. In the case of SECMARK, when a SECMARK target is created the reference count is increased and later decreased when the target is removed. These reference counters allow SELinux to quickly determine if either of these subsystems are enabled. NetLabel already has a similar mechanism which provides the netlbl_enabled() function. This patch also renames the selinux_relabel_packet_permission() function to selinux_secmark_relabel_packet_permission() as the original name and description were misleading in that they referenced a single packet label which is not the case. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: James Morris <jmorris@namei.org>
104 lines
2.3 KiB
C
104 lines
2.3 KiB
C
/*
|
|
* SELinux services exported to the rest of the kernel.
|
|
*
|
|
* Author: James Morris <jmorris@redhat.com>
|
|
*
|
|
* Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
|
|
* Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
|
|
* Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2,
|
|
* as published by the Free Software Foundation.
|
|
*/
|
|
#include <linux/types.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/module.h>
|
|
#include <linux/selinux.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/ipc.h>
|
|
#include <asm/atomic.h>
|
|
|
|
#include "security.h"
|
|
#include "objsec.h"
|
|
|
|
/* SECMARK reference count */
|
|
extern atomic_t selinux_secmark_refcount;
|
|
|
|
int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
|
|
{
|
|
if (selinux_enabled)
|
|
return security_sid_to_context(sid, ctx, ctxlen);
|
|
else {
|
|
*ctx = NULL;
|
|
*ctxlen = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
|
|
{
|
|
if (selinux_enabled) {
|
|
struct inode_security_struct *isec = inode->i_security;
|
|
*sid = isec->sid;
|
|
return;
|
|
}
|
|
*sid = 0;
|
|
}
|
|
|
|
void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
|
|
{
|
|
if (selinux_enabled) {
|
|
struct ipc_security_struct *isec = ipcp->security;
|
|
*sid = isec->sid;
|
|
return;
|
|
}
|
|
*sid = 0;
|
|
}
|
|
|
|
void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
|
|
{
|
|
if (selinux_enabled) {
|
|
struct task_security_struct *tsec = tsk->security;
|
|
*sid = tsec->sid;
|
|
return;
|
|
}
|
|
*sid = 0;
|
|
}
|
|
|
|
int selinux_string_to_sid(char *str, u32 *sid)
|
|
{
|
|
if (selinux_enabled)
|
|
return security_context_to_sid(str, strlen(str), sid);
|
|
else {
|
|
*sid = 0;
|
|
return 0;
|
|
}
|
|
}
|
|
EXPORT_SYMBOL_GPL(selinux_string_to_sid);
|
|
|
|
int selinux_secmark_relabel_packet_permission(u32 sid)
|
|
{
|
|
if (selinux_enabled) {
|
|
struct task_security_struct *tsec = current->security;
|
|
|
|
return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
|
|
PACKET__RELABELTO, NULL);
|
|
}
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission);
|
|
|
|
void selinux_secmark_refcount_inc(void)
|
|
{
|
|
atomic_inc(&selinux_secmark_refcount);
|
|
}
|
|
EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc);
|
|
|
|
void selinux_secmark_refcount_dec(void)
|
|
{
|
|
atomic_dec(&selinux_secmark_refcount);
|
|
}
|
|
EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec);
|