diff options
author | Harry Ciao <qingtao.cao@windriver.com> | 2011-03-02 00:46:08 -0500 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2011-03-03 15:19:43 -0500 |
commit | 4bc6c2d5d8386800fde23a8e78cd4f04a0ade0ad (patch) | |
tree | 9ed72f305050b876d846b44ccf13f63fcbab1ff4 /scripts/selinux | |
parent | 0b24dcb7f2f7a0ce9b762eef0362c21c88f47b32 (diff) |
SELinux: Auto-generate security_is_socket_class
The security_is_socket_class() is auto-generated by genheaders based
on classmap.h to reduce maintenance effort when a new class is defined
in SELinux kernel. The name for any socket class should be suffixed by
"socket" and doesn't contain more than one substr of "socket".
Signed-off-by: Harry Ciao <qingtao.cao@windriver.com>
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Diffstat (limited to 'scripts/selinux')
-rw-r--r-- | scripts/selinux/genheaders/genheaders.c | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/scripts/selinux/genheaders/genheaders.c b/scripts/selinux/genheaders/genheaders.c index 58a12c278706..539855ff31f9 100644 --- a/scripts/selinux/genheaders/genheaders.c +++ b/scripts/selinux/genheaders/genheaders.c | |||
@@ -43,6 +43,8 @@ int main(int argc, char *argv[]) | |||
43 | int i, j, k; | 43 | int i, j, k; |
44 | int isids_len; | 44 | int isids_len; |
45 | FILE *fout; | 45 | FILE *fout; |
46 | const char *needle = "SOCKET"; | ||
47 | char *substr; | ||
46 | 48 | ||
47 | progname = argv[0]; | 49 | progname = argv[0]; |
48 | 50 | ||
@@ -88,6 +90,24 @@ int main(int argc, char *argv[]) | |||
88 | fprintf(fout, "%2d\n", i); | 90 | fprintf(fout, "%2d\n", i); |
89 | } | 91 | } |
90 | fprintf(fout, "\n#define SECINITSID_NUM %d\n", i-1); | 92 | fprintf(fout, "\n#define SECINITSID_NUM %d\n", i-1); |
93 | fprintf(fout, "\nstatic inline bool security_is_socket_class(u16 kern_tclass)\n"); | ||
94 | fprintf(fout, "{\n"); | ||
95 | fprintf(fout, "\tbool sock = false;\n\n"); | ||
96 | fprintf(fout, "\tswitch (kern_tclass) {\n"); | ||
97 | for (i = 0; secclass_map[i].name; i++) { | ||
98 | struct security_class_mapping *map = &secclass_map[i]; | ||
99 | substr = strstr(map->name, needle); | ||
100 | if (substr && strcmp(substr, needle) == 0) | ||
101 | fprintf(fout, "\tcase SECCLASS_%s:\n", map->name); | ||
102 | } | ||
103 | fprintf(fout, "\t\tsock = true;\n"); | ||
104 | fprintf(fout, "\t\tbreak;\n"); | ||
105 | fprintf(fout, "\tdefault:\n"); | ||
106 | fprintf(fout, "\t\tbreak;\n"); | ||
107 | fprintf(fout, "\t}\n\n"); | ||
108 | fprintf(fout, "\treturn sock;\n"); | ||
109 | fprintf(fout, "}\n"); | ||
110 | |||
91 | fprintf(fout, "\n#endif\n"); | 111 | fprintf(fout, "\n#endif\n"); |
92 | fclose(fout); | 112 | fclose(fout); |
93 | 113 | ||