Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 | /* * SELinux services exported to the rest of the kernel. * * Author: James Morris <jmorris@redhat.com> * * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2, * as published by the Free Software Foundation. */ #ifndef _LINUX_SELINUX_H #define _LINUX_SELINUX_H struct selinux_audit_rule; struct audit_context; struct inode; struct kern_ipc_perm; #ifdef CONFIG_SECURITY_SELINUX /** * selinux_audit_rule_init - alloc/init an selinux audit rule structure. * @field: the field this rule refers to * @op: the operater the rule uses * @rulestr: the text "target" of the rule * @rule: pointer to the new rule structure returned via this * * Returns 0 if successful, -errno if not. On success, the rule structure * will be allocated internally. The caller must free this structure with * selinux_audit_rule_free() after use. */ int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, struct selinux_audit_rule **rule); /** * selinux_audit_rule_free - free an selinux audit rule structure. * @rule: pointer to the audit rule to be freed * * This will free all memory associated with the given rule. * If @rule is NULL, no operation is performed. */ void selinux_audit_rule_free(struct selinux_audit_rule *rule); /** * selinux_audit_rule_match - determine if a context ID matches a rule. * @ctxid: the context ID to check * @field: the field this rule refers to * @op: the operater the rule uses * @rule: pointer to the audit rule to check against * @actx: the audit context (can be NULL) associated with the check * * Returns 1 if the context id matches the rule, 0 if it does not, and * -errno on failure. */ int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, struct selinux_audit_rule *rule, struct audit_context *actx); /** * selinux_audit_set_callback - set the callback for policy reloads. * @callback: the function to call when the policy is reloaded * * This sets the function callback function that will update the rules * upon policy reloads. This callback should rebuild all existing rules * using selinux_audit_rule_init(). */ void selinux_audit_set_callback(int (*callback)(void)); /** * selinux_task_ctxid - determine a context ID for a process. * @tsk: the task object * @ctxid: ID value returned via this * * On return, ctxid will contain an ID for the context. This value * should only be used opaquely. */ void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid); /** * selinux_ctxid_to_string - map a security context ID to a string * @ctxid: security context ID to be converted. * @ctx: address of context string to be returned * @ctxlen: length of returned context string. * * Returns 0 if successful, -errno if not. On success, the context * string will be allocated internally, and the caller must call * kfree() on it after use. */ int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen); /** * selinux_get_inode_sid - get the inode's security context ID * @inode: inode structure to get the sid from. * @sid: pointer to security context ID to be filled in. * * Returns nothing */ void selinux_get_inode_sid(const struct inode *inode, u32 *sid); /** * selinux_get_ipc_sid - get the ipc security context ID * @ipcp: ipc structure to get the sid from. * @sid: pointer to security context ID to be filled in. * * Returns nothing */ void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid); /** * selinux_get_task_sid - return the SID of task * @tsk: the task whose SID will be returned * @sid: pointer to security context ID to be filled in. * * Returns nothing */ void selinux_get_task_sid(struct task_struct *tsk, u32 *sid); /** * selinux_string_to_sid - map a security context string to a security ID * @str: the security context string to be mapped * @sid: ID value returned via this. * * Returns 0 if successful, with the SID stored in sid. A value * of zero for sid indicates no SID could be determined (but no error * occurred). */ int selinux_string_to_sid(char *str, u32 *sid); /** * selinux_relabel_packet_permission - check permission to relabel a packet * @sid: ID value to be applied to network packet (via SECMARK, most likely) * * Returns 0 if the current task is allowed to label packets with the * supplied security ID. Note that it is implicit that the packet is always * being relabeled from the default unlabled value, and that the access * control decision is made in the AVC. */ int selinux_relabel_packet_permission(u32 sid); #else static inline int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, struct selinux_audit_rule **rule) { return -ENOTSUPP; } static inline void selinux_audit_rule_free(struct selinux_audit_rule *rule) { return; } static inline int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, struct selinux_audit_rule *rule, struct audit_context *actx) { return 0; } static inline void selinux_audit_set_callback(int (*callback)(void)) { return; } static inline void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid) { *ctxid = 0; } static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) { *ctx = NULL; *ctxlen = 0; return 0; } static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid) { *sid = 0; } static inline void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) { *sid = 0; } static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) { *sid = 0; } static inline int selinux_string_to_sid(const char *str, u32 *sid) { *sid = 0; return 0; } static inline int selinux_relabel_packet_permission(u32 sid) { return 0; } #endif /* CONFIG_SECURITY_SELINUX */ #endif /* _LINUX_SELINUX_H */ |