diff options
| -rw-r--r-- | include/linux/selinux.h | 32 | ||||
| -rw-r--r-- | security/selinux/exports.c | 22 | 
2 files changed, 54 insertions, 0 deletions
diff --git a/include/linux/selinux.h b/include/linux/selinux.h index 4047bcde448..aad4e390d6a 100644 --- a/include/linux/selinux.h +++ b/include/linux/selinux.h @@ -118,6 +118,27 @@ void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid);   */  void selinux_get_task_sid(struct task_struct *tsk, u32 *sid); +/** + *     selinux_string_to_sid - map a security context string to a security ID + *     @str: the security context string to be mapped + *     @sid: ID value returned via this. + * + *     Returns 0 if successful, with the SID stored in sid.  A value + *     of zero for sid indicates no SID could be determined (but no error + *     occurred). + */ +int selinux_string_to_sid(char *str, u32 *sid); + +/** + *     selinux_relabel_packet_permission - check permission to relabel a packet + *     @sid: ID value to be applied to network packet (via SECMARK, most likely) + * + *     Returns 0 if the current task is allowed to label packets with the + *     supplied security ID.  Note that it is implicit that the packet is always + *     being relabeled from the default unlabled value, and that the access + *     control decision is made in the AVC. + */ +int selinux_relabel_packet_permission(u32 sid);  #else @@ -172,6 +193,17 @@ static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)  	*sid = 0;  } +static inline int selinux_string_to_sid(const char *str, u32 *sid) +{ +       *sid = 0; +       return 0; +} + +static inline int selinux_relabel_packet_permission(u32 sid) +{ +	return 0; +} +  #endif	/* CONFIG_SECURITY_SELINUX */  #endif /* _LINUX_SELINUX_H */ diff --git a/security/selinux/exports.c b/security/selinux/exports.c index ae4c73eb308..9d7737db5e5 100644 --- a/security/selinux/exports.c +++ b/security/selinux/exports.c @@ -72,3 +72,25 @@ void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)  	*sid = 0;  } +int selinux_string_to_sid(char *str, u32 *sid) +{ +	if (selinux_enabled) +		return security_context_to_sid(str, strlen(str), sid); +	else { +		*sid = 0; +		return 0; +	} +} +EXPORT_SYMBOL_GPL(selinux_string_to_sid); + +int selinux_relabel_packet_permission(u32 sid) +{ +	if (selinux_enabled) { +		struct task_security_struct *tsec = current->security; + +		return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET, +				    PACKET__RELABELTO, NULL); +	} +	return 0; +} +EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);  |