diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2010-10-21 15:41:19 -0400 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2010-10-21 15:41:19 -0400 |
| commit | a8fe1500986c32b46b36118aa250f6badca11bfc (patch) | |
| tree | d5517e16e633fa0c54248f27b5921e8ac4e4a459 /security/selinux/exports.c | |
| parent | 94ebd235c493f43681f609b0e02733337053e8f0 (diff) | |
| parent | f0d3d9894e43fc68d47948e2c6f03e32da88b799 (diff) | |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6: (26 commits)
selinux: include vmalloc.h for vmalloc_user
secmark: fix config problem when CONFIG_NF_CONNTRACK_SECMARK is not set
selinux: implement mmap on /selinux/policy
SELinux: allow userspace to read policy back out of the kernel
SELinux: drop useless (and incorrect) AVTAB_MAX_SIZE
SELinux: deterministic ordering of range transition rules
kernel: roundup should only reference arguments once
kernel: rounddown helper function
secmark: export secctx, drop secmark in procfs
conntrack: export lsm context rather than internal secid via netlink
security: secid_to_secctx returns len when data is NULL
secmark: make secmark object handling generic
secmark: do not return early if there was no error
AppArmor: Ensure the size of the copy is < the buffer allocated to hold it
TOMOYO: Print URL information before panic().
security: remove unused parameter from security_task_setscheduler()
tpm: change 'tpm_suspend_pcr' to be module parameter
selinux: fix up style problem on /selinux/status
selinux: change to new flag variable
selinux: really fix dependency causing parallel compile failure.
...
Diffstat (limited to 'security/selinux/exports.c')
| -rw-r--r-- | security/selinux/exports.c | 49 |
1 files changed, 0 insertions, 49 deletions
diff --git a/security/selinux/exports.c b/security/selinux/exports.c index c0a454aee1e0..90664385dead 100644 --- a/security/selinux/exports.c +++ b/security/selinux/exports.c | |||
| @@ -11,58 +11,9 @@ | |||
| 11 | * it under the terms of the GNU General Public License version 2, | 11 | * it under the terms of the GNU General Public License version 2, |
| 12 | * as published by the Free Software Foundation. | 12 | * as published by the Free Software Foundation. |
| 13 | */ | 13 | */ |
| 14 | #include <linux/types.h> | ||
| 15 | #include <linux/kernel.h> | ||
| 16 | #include <linux/module.h> | 14 | #include <linux/module.h> |
| 17 | #include <linux/selinux.h> | ||
| 18 | #include <linux/fs.h> | ||
| 19 | #include <linux/ipc.h> | ||
| 20 | #include <asm/atomic.h> | ||
| 21 | 15 | ||
| 22 | #include "security.h" | 16 | #include "security.h" |
| 23 | #include "objsec.h" | ||
| 24 | |||
| 25 | /* SECMARK reference count */ | ||
| 26 | extern atomic_t selinux_secmark_refcount; | ||
| 27 | |||
| 28 | int selinux_string_to_sid(char *str, u32 *sid) | ||
| 29 | { | ||
| 30 | if (selinux_enabled) | ||
| 31 | return security_context_to_sid(str, strlen(str), sid); | ||
| 32 | else { | ||
| 33 | *sid = 0; | ||
| 34 | return 0; | ||
| 35 | } | ||
| 36 | } | ||
| 37 | EXPORT_SYMBOL_GPL(selinux_string_to_sid); | ||
| 38 | |||
| 39 | int selinux_secmark_relabel_packet_permission(u32 sid) | ||
| 40 | { | ||
| 41 | if (selinux_enabled) { | ||
| 42 | const struct task_security_struct *__tsec; | ||
| 43 | u32 tsid; | ||
| 44 | |||
| 45 | __tsec = current_security(); | ||
| 46 | tsid = __tsec->sid; | ||
| 47 | |||
| 48 | return avc_has_perm(tsid, sid, SECCLASS_PACKET, | ||
| 49 | PACKET__RELABELTO, NULL); | ||
| 50 | } | ||
| 51 | return 0; | ||
| 52 | } | ||
| 53 | EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission); | ||
| 54 | |||
| 55 | void selinux_secmark_refcount_inc(void) | ||
| 56 | { | ||
| 57 | atomic_inc(&selinux_secmark_refcount); | ||
| 58 | } | ||
| 59 | EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc); | ||
| 60 | |||
| 61 | void selinux_secmark_refcount_dec(void) | ||
| 62 | { | ||
| 63 | atomic_dec(&selinux_secmark_refcount); | ||
| 64 | } | ||
| 65 | EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec); | ||
| 66 | 17 | ||
| 67 | bool selinux_is_enabled(void) | 18 | bool selinux_is_enabled(void) |
| 68 | { | 19 | { |
