Commit | Line | Data |
---|---|---|
376bd9cb DG |
1 | /* |
2 | * SELinux services exported to the rest of the kernel. | |
3 | * | |
4 | * Author: James Morris <jmorris@redhat.com> | |
5 | * | |
6 | * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> | |
7 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> | |
e7c34970 | 8 | * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> |
376bd9cb DG |
9 | * |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License version 2, | |
12 | * as published by the Free Software Foundation. | |
13 | */ | |
14 | #ifndef _LINUX_SELINUX_H | |
15 | #define _LINUX_SELINUX_H | |
16 | ||
17 | struct selinux_audit_rule; | |
18 | struct audit_context; | |
1b50eed9 | 19 | struct inode; |
9c7aa6aa | 20 | struct kern_ipc_perm; |
376bd9cb DG |
21 | |
22 | #ifdef CONFIG_SECURITY_SELINUX | |
23 | ||
24 | /** | |
25 | * selinux_audit_rule_init - alloc/init an selinux audit rule structure. | |
26 | * @field: the field this rule refers to | |
27 | * @op: the operater the rule uses | |
28 | * @rulestr: the text "target" of the rule | |
29 | * @rule: pointer to the new rule structure returned via this | |
30 | * | |
31 | * Returns 0 if successful, -errno if not. On success, the rule structure | |
32 | * will be allocated internally. The caller must free this structure with | |
33 | * selinux_audit_rule_free() after use. | |
34 | */ | |
35 | int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, | |
36 | struct selinux_audit_rule **rule); | |
37 | ||
38 | /** | |
39 | * selinux_audit_rule_free - free an selinux audit rule structure. | |
40 | * @rule: pointer to the audit rule to be freed | |
41 | * | |
42 | * This will free all memory associated with the given rule. | |
43 | * If @rule is NULL, no operation is performed. | |
44 | */ | |
45 | void selinux_audit_rule_free(struct selinux_audit_rule *rule); | |
46 | ||
47 | /** | |
48 | * selinux_audit_rule_match - determine if a context ID matches a rule. | |
9a2f44f0 | 49 | * @sid: the context ID to check |
376bd9cb DG |
50 | * @field: the field this rule refers to |
51 | * @op: the operater the rule uses | |
52 | * @rule: pointer to the audit rule to check against | |
53 | * @actx: the audit context (can be NULL) associated with the check | |
54 | * | |
55 | * Returns 1 if the context id matches the rule, 0 if it does not, and | |
56 | * -errno on failure. | |
57 | */ | |
9a2f44f0 | 58 | int selinux_audit_rule_match(u32 sid, u32 field, u32 op, |
376bd9cb DG |
59 | struct selinux_audit_rule *rule, |
60 | struct audit_context *actx); | |
61 | ||
62 | /** | |
63 | * selinux_audit_set_callback - set the callback for policy reloads. | |
64 | * @callback: the function to call when the policy is reloaded | |
65 | * | |
66 | * This sets the function callback function that will update the rules | |
67 | * upon policy reloads. This callback should rebuild all existing rules | |
68 | * using selinux_audit_rule_init(). | |
69 | */ | |
70 | void selinux_audit_set_callback(int (*callback)(void)); | |
71 | ||
1b50eed9 | 72 | /** |
1a70cd40 SS |
73 | * selinux_sid_to_string - map a security context ID to a string |
74 | * @sid: security context ID to be converted. | |
1b50eed9 SG |
75 | * @ctx: address of context string to be returned |
76 | * @ctxlen: length of returned context string. | |
77 | * | |
78 | * Returns 0 if successful, -errno if not. On success, the context | |
79 | * string will be allocated internally, and the caller must call | |
80 | * kfree() on it after use. | |
81 | */ | |
1a70cd40 | 82 | int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen); |
1b50eed9 SG |
83 | |
84 | /** | |
85 | * selinux_get_inode_sid - get the inode's security context ID | |
86 | * @inode: inode structure to get the sid from. | |
87 | * @sid: pointer to security context ID to be filled in. | |
88 | * | |
89 | * Returns nothing | |
90 | */ | |
91 | void selinux_get_inode_sid(const struct inode *inode, u32 *sid); | |
92 | ||
9c7aa6aa SG |
93 | /** |
94 | * selinux_get_ipc_sid - get the ipc security context ID | |
95 | * @ipcp: ipc structure to get the sid from. | |
96 | * @sid: pointer to security context ID to be filled in. | |
97 | * | |
98 | * Returns nothing | |
99 | */ | |
100 | void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid); | |
101 | ||
e7c34970 SG |
102 | /** |
103 | * selinux_get_task_sid - return the SID of task | |
104 | * @tsk: the task whose SID will be returned | |
105 | * @sid: pointer to security context ID to be filled in. | |
106 | * | |
107 | * Returns nothing | |
108 | */ | |
109 | void selinux_get_task_sid(struct task_struct *tsk, u32 *sid); | |
110 | ||
c749b29f JM |
111 | /** |
112 | * selinux_string_to_sid - map a security context string to a security ID | |
113 | * @str: the security context string to be mapped | |
114 | * @sid: ID value returned via this. | |
115 | * | |
116 | * Returns 0 if successful, with the SID stored in sid. A value | |
117 | * of zero for sid indicates no SID could be determined (but no error | |
118 | * occurred). | |
119 | */ | |
120 | int selinux_string_to_sid(char *str, u32 *sid); | |
121 | ||
122 | /** | |
123 | * selinux_relabel_packet_permission - check permission to relabel a packet | |
124 | * @sid: ID value to be applied to network packet (via SECMARK, most likely) | |
125 | * | |
126 | * Returns 0 if the current task is allowed to label packets with the | |
127 | * supplied security ID. Note that it is implicit that the packet is always | |
128 | * being relabeled from the default unlabled value, and that the access | |
129 | * control decision is made in the AVC. | |
130 | */ | |
131 | int selinux_relabel_packet_permission(u32 sid); | |
e7c34970 | 132 | |
376bd9cb DG |
133 | #else |
134 | ||
135 | static inline int selinux_audit_rule_init(u32 field, u32 op, | |
136 | char *rulestr, | |
137 | struct selinux_audit_rule **rule) | |
138 | { | |
139 | return -ENOTSUPP; | |
140 | } | |
141 | ||
142 | static inline void selinux_audit_rule_free(struct selinux_audit_rule *rule) | |
143 | { | |
144 | return; | |
145 | } | |
146 | ||
9a2f44f0 | 147 | static inline int selinux_audit_rule_match(u32 sid, u32 field, u32 op, |
376bd9cb DG |
148 | struct selinux_audit_rule *rule, |
149 | struct audit_context *actx) | |
150 | { | |
151 | return 0; | |
152 | } | |
153 | ||
154 | static inline void selinux_audit_set_callback(int (*callback)(void)) | |
155 | { | |
156 | return; | |
157 | } | |
158 | ||
1a70cd40 | 159 | static inline int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen) |
1b50eed9 SG |
160 | { |
161 | *ctx = NULL; | |
162 | *ctxlen = 0; | |
163 | return 0; | |
164 | } | |
165 | ||
166 | static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid) | |
167 | { | |
168 | *sid = 0; | |
169 | } | |
170 | ||
9c7aa6aa SG |
171 | static inline void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) |
172 | { | |
173 | *sid = 0; | |
174 | } | |
175 | ||
e7c34970 SG |
176 | static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) |
177 | { | |
178 | *sid = 0; | |
179 | } | |
180 | ||
c749b29f JM |
181 | static inline int selinux_string_to_sid(const char *str, u32 *sid) |
182 | { | |
183 | *sid = 0; | |
184 | return 0; | |
185 | } | |
186 | ||
187 | static inline int selinux_relabel_packet_permission(u32 sid) | |
188 | { | |
189 | return 0; | |
190 | } | |
191 | ||
376bd9cb DG |
192 | #endif /* CONFIG_SECURITY_SELINUX */ |
193 | ||
194 | #endif /* _LINUX_SELINUX_H */ |