| Darrel Goeddel | 376bd9c | 2006-02-24 15:44:05 -0600 | [diff] [blame] | 1 | /* | 
 | 2 |  * SELinux services exported to the rest of the kernel. | 
 | 3 |  * | 
 | 4 |  * Author: James Morris <jmorris@redhat.com> | 
 | 5 |  * | 
 | 6 |  * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> | 
 | 7 |  * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> | 
| Steve Grubb | e7c3497 | 2006-04-03 09:08:13 -0400 | [diff] [blame] | 8 |  * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> | 
| Darrel Goeddel | 376bd9c | 2006-02-24 15:44:05 -0600 | [diff] [blame] | 9 |  * | 
 | 10 |  * This program is free software; you can redistribute it and/or modify | 
 | 11 |  * it under the terms of the GNU General Public License version 2, | 
 | 12 |  * as published by the Free Software Foundation. | 
 | 13 |  */ | 
 | 14 | #ifndef _LINUX_SELINUX_H | 
 | 15 | #define _LINUX_SELINUX_H | 
 | 16 |  | 
 | 17 | struct selinux_audit_rule; | 
 | 18 | struct audit_context; | 
| Steve Grubb | 1b50eed | 2006-04-03 14:06:13 -0400 | [diff] [blame] | 19 | struct inode; | 
| Steve Grubb | 9c7aa6a | 2006-03-31 15:22:49 -0500 | [diff] [blame] | 20 | struct kern_ipc_perm; | 
| Darrel Goeddel | 376bd9c | 2006-02-24 15:44:05 -0600 | [diff] [blame] | 21 |  | 
 | 22 | #ifdef CONFIG_SECURITY_SELINUX | 
 | 23 |  | 
 | 24 | /** | 
 | 25 |  *	selinux_audit_rule_init - alloc/init an selinux audit rule structure. | 
 | 26 |  *	@field: the field this rule refers to | 
 | 27 |  *	@op: the operater the rule uses | 
 | 28 |  *	@rulestr: the text "target" of the rule | 
 | 29 |  *	@rule: pointer to the new rule structure returned via this | 
 | 30 |  * | 
 | 31 |  *	Returns 0 if successful, -errno if not.  On success, the rule structure | 
 | 32 |  *	will be allocated internally.  The caller must free this structure with | 
 | 33 |  *	selinux_audit_rule_free() after use. | 
 | 34 |  */ | 
 | 35 | int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, | 
 | 36 |                             struct selinux_audit_rule **rule); | 
 | 37 |  | 
 | 38 | /** | 
 | 39 |  *	selinux_audit_rule_free - free an selinux audit rule structure. | 
 | 40 |  *	@rule: pointer to the audit rule to be freed | 
 | 41 |  * | 
 | 42 |  *	This will free all memory associated with the given rule. | 
 | 43 |  *	If @rule is NULL, no operation is performed. | 
 | 44 |  */ | 
 | 45 | void selinux_audit_rule_free(struct selinux_audit_rule *rule); | 
 | 46 |  | 
 | 47 | /** | 
 | 48 |  *	selinux_audit_rule_match - determine if a context ID matches a rule. | 
 | 49 |  *	@ctxid: the context ID to check | 
 | 50 |  *	@field: the field this rule refers to | 
 | 51 |  *	@op: the operater the rule uses | 
 | 52 |  *	@rule: pointer to the audit rule to check against | 
 | 53 |  *	@actx: the audit context (can be NULL) associated with the check | 
 | 54 |  * | 
 | 55 |  *	Returns 1 if the context id matches the rule, 0 if it does not, and | 
 | 56 |  *	-errno on failure. | 
 | 57 |  */ | 
 | 58 | int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | 
 | 59 |                              struct selinux_audit_rule *rule, | 
 | 60 |                              struct audit_context *actx); | 
 | 61 |  | 
 | 62 | /** | 
 | 63 |  *	selinux_audit_set_callback - set the callback for policy reloads. | 
 | 64 |  *	@callback: the function to call when the policy is reloaded | 
 | 65 |  * | 
 | 66 |  *	This sets the function callback function that will update the rules | 
 | 67 |  *	upon policy reloads.  This callback should rebuild all existing rules | 
 | 68 |  *	using selinux_audit_rule_init(). | 
 | 69 |  */ | 
 | 70 | void selinux_audit_set_callback(int (*callback)(void)); | 
 | 71 |  | 
 | 72 | /** | 
 | 73 |  *	selinux_task_ctxid - determine a context ID for a process. | 
 | 74 |  *	@tsk: the task object | 
 | 75 |  *	@ctxid: ID value returned via this | 
 | 76 |  * | 
 | 77 |  *	On return, ctxid will contain an ID for the context.  This value | 
 | 78 |  *	should only be used opaquely. | 
 | 79 |  */ | 
 | 80 | void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid); | 
 | 81 |  | 
| Steve Grubb | 1b50eed | 2006-04-03 14:06:13 -0400 | [diff] [blame] | 82 | /** | 
 | 83 |  *     selinux_ctxid_to_string - map a security context ID to a string | 
 | 84 |  *     @ctxid: security context ID to be converted. | 
 | 85 |  *     @ctx: address of context string to be returned | 
 | 86 |  *     @ctxlen: length of returned context string. | 
 | 87 |  * | 
 | 88 |  *     Returns 0 if successful, -errno if not.  On success, the context | 
 | 89 |  *     string will be allocated internally, and the caller must call | 
 | 90 |  *     kfree() on it after use. | 
 | 91 |  */ | 
 | 92 | int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen); | 
 | 93 |  | 
 | 94 | /** | 
 | 95 |  *     selinux_get_inode_sid - get the inode's security context ID | 
 | 96 |  *     @inode: inode structure to get the sid from. | 
 | 97 |  *     @sid: pointer to security context ID to be filled in. | 
 | 98 |  * | 
 | 99 |  *     Returns nothing | 
 | 100 |  */ | 
 | 101 | void selinux_get_inode_sid(const struct inode *inode, u32 *sid); | 
 | 102 |  | 
| Steve Grubb | 9c7aa6a | 2006-03-31 15:22:49 -0500 | [diff] [blame] | 103 | /** | 
 | 104 |  *     selinux_get_ipc_sid - get the ipc security context ID | 
 | 105 |  *     @ipcp: ipc structure to get the sid from. | 
 | 106 |  *     @sid: pointer to security context ID to be filled in. | 
 | 107 |  * | 
 | 108 |  *     Returns nothing | 
 | 109 |  */ | 
 | 110 | void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid); | 
 | 111 |  | 
| Steve Grubb | e7c3497 | 2006-04-03 09:08:13 -0400 | [diff] [blame] | 112 | /** | 
 | 113 |  *     selinux_get_task_sid - return the SID of task | 
 | 114 |  *     @tsk: the task whose SID will be returned | 
 | 115 |  *     @sid: pointer to security context ID to be filled in. | 
 | 116 |  * | 
 | 117 |  *     Returns nothing | 
 | 118 |  */ | 
 | 119 | void selinux_get_task_sid(struct task_struct *tsk, u32 *sid); | 
 | 120 |  | 
| James Morris | c749b29 | 2006-06-09 00:28:25 -0700 | [diff] [blame] | 121 | /** | 
 | 122 |  *     selinux_string_to_sid - map a security context string to a security ID | 
 | 123 |  *     @str: the security context string to be mapped | 
 | 124 |  *     @sid: ID value returned via this. | 
 | 125 |  * | 
 | 126 |  *     Returns 0 if successful, with the SID stored in sid.  A value | 
 | 127 |  *     of zero for sid indicates no SID could be determined (but no error | 
 | 128 |  *     occurred). | 
 | 129 |  */ | 
 | 130 | int selinux_string_to_sid(char *str, u32 *sid); | 
 | 131 |  | 
 | 132 | /** | 
 | 133 |  *     selinux_relabel_packet_permission - check permission to relabel a packet | 
 | 134 |  *     @sid: ID value to be applied to network packet (via SECMARK, most likely) | 
 | 135 |  * | 
 | 136 |  *     Returns 0 if the current task is allowed to label packets with the | 
 | 137 |  *     supplied security ID.  Note that it is implicit that the packet is always | 
 | 138 |  *     being relabeled from the default unlabled value, and that the access | 
 | 139 |  *     control decision is made in the AVC. | 
 | 140 |  */ | 
 | 141 | int selinux_relabel_packet_permission(u32 sid); | 
| Steve Grubb | e7c3497 | 2006-04-03 09:08:13 -0400 | [diff] [blame] | 142 |  | 
| Darrel Goeddel | 376bd9c | 2006-02-24 15:44:05 -0600 | [diff] [blame] | 143 | #else | 
 | 144 |  | 
 | 145 | static inline int selinux_audit_rule_init(u32 field, u32 op, | 
 | 146 |                                           char *rulestr, | 
 | 147 |                                           struct selinux_audit_rule **rule) | 
 | 148 | { | 
 | 149 | 	return -ENOTSUPP; | 
 | 150 | } | 
 | 151 |  | 
 | 152 | static inline void selinux_audit_rule_free(struct selinux_audit_rule *rule) | 
 | 153 | { | 
 | 154 | 	return; | 
 | 155 | } | 
 | 156 |  | 
 | 157 | static inline int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | 
 | 158 |                                            struct selinux_audit_rule *rule, | 
 | 159 |                                            struct audit_context *actx) | 
 | 160 | { | 
 | 161 | 	return 0; | 
 | 162 | } | 
 | 163 |  | 
 | 164 | static inline void selinux_audit_set_callback(int (*callback)(void)) | 
 | 165 | { | 
 | 166 | 	return; | 
 | 167 | } | 
 | 168 |  | 
 | 169 | static inline void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid) | 
 | 170 | { | 
 | 171 | 	*ctxid = 0; | 
 | 172 | } | 
 | 173 |  | 
| Steve Grubb | 1b50eed | 2006-04-03 14:06:13 -0400 | [diff] [blame] | 174 | static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) | 
 | 175 | { | 
 | 176 |        *ctx = NULL; | 
 | 177 |        *ctxlen = 0; | 
 | 178 |        return 0; | 
 | 179 | } | 
 | 180 |  | 
 | 181 | static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid) | 
 | 182 | { | 
 | 183 | 	*sid = 0; | 
 | 184 | } | 
 | 185 |  | 
| Steve Grubb | 9c7aa6a | 2006-03-31 15:22:49 -0500 | [diff] [blame] | 186 | static inline void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) | 
 | 187 | { | 
 | 188 | 	*sid = 0; | 
 | 189 | } | 
 | 190 |  | 
| Steve Grubb | e7c3497 | 2006-04-03 09:08:13 -0400 | [diff] [blame] | 191 | static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) | 
 | 192 | { | 
 | 193 | 	*sid = 0; | 
 | 194 | } | 
 | 195 |  | 
| James Morris | c749b29 | 2006-06-09 00:28:25 -0700 | [diff] [blame] | 196 | static inline int selinux_string_to_sid(const char *str, u32 *sid) | 
 | 197 | { | 
 | 198 |        *sid = 0; | 
 | 199 |        return 0; | 
 | 200 | } | 
 | 201 |  | 
 | 202 | static inline int selinux_relabel_packet_permission(u32 sid) | 
 | 203 | { | 
 | 204 | 	return 0; | 
 | 205 | } | 
 | 206 |  | 
| Darrel Goeddel | 376bd9c | 2006-02-24 15:44:05 -0600 | [diff] [blame] | 207 | #endif	/* CONFIG_SECURITY_SELINUX */ | 
 | 208 |  | 
 | 209 | #endif /* _LINUX_SELINUX_H */ |