[IPSEC]: Remove nhoff from xfrm_input
[deliverable/linux.git] / security / selinux / exports.c
CommitLineData
376bd9cb
DG
1/*
2 * SELinux services exported to the rest of the kernel.
3 *
4 * Author: James Morris <jmorris@redhat.com>
5 *
6 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
e7c34970 8 * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
376bd9cb
DG
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2,
12 * as published by the Free Software Foundation.
13 */
14#include <linux/types.h>
15#include <linux/kernel.h>
16#include <linux/module.h>
17#include <linux/selinux.h>
1b50eed9 18#include <linux/fs.h>
9c7aa6aa 19#include <linux/ipc.h>
376bd9cb
DG
20
21#include "security.h"
22#include "objsec.h"
23
1a70cd40 24int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
1b50eed9
SG
25{
26 if (selinux_enabled)
1a70cd40 27 return security_sid_to_context(sid, ctx, ctxlen);
1b50eed9
SG
28 else {
29 *ctx = NULL;
30 *ctxlen = 0;
31 }
32
33 return 0;
34}
35
36void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
37{
38 if (selinux_enabled) {
39 struct inode_security_struct *isec = inode->i_security;
40 *sid = isec->sid;
41 return;
42 }
43 *sid = 0;
44}
45
9c7aa6aa
SG
46void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
47{
48 if (selinux_enabled) {
49 struct ipc_security_struct *isec = ipcp->security;
50 *sid = isec->sid;
51 return;
52 }
53 *sid = 0;
54}
55
e7c34970
SG
56void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
57{
58 if (selinux_enabled) {
59 struct task_security_struct *tsec = tsk->security;
60 *sid = tsec->sid;
61 return;
62 }
63 *sid = 0;
64}
65
c749b29f
JM
66int selinux_string_to_sid(char *str, u32 *sid)
67{
68 if (selinux_enabled)
69 return security_context_to_sid(str, strlen(str), sid);
70 else {
71 *sid = 0;
72 return 0;
73 }
74}
75EXPORT_SYMBOL_GPL(selinux_string_to_sid);
76
77int selinux_relabel_packet_permission(u32 sid)
78{
79 if (selinux_enabled) {
80 struct task_security_struct *tsec = current->security;
81
82 return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
83 PACKET__RELABELTO, NULL);
84 }
85 return 0;
86}
87EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);
This page took 0.17012 seconds and 5 git commands to generate.