2 * SELinux services exported to the rest of the kernel.
4 * Author: James Morris <jmorris@redhat.com>
6 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2,
11 * as published by the Free Software Foundation.
13 #ifndef _LINUX_SELINUX_H
14 #define _LINUX_SELINUX_H
16 struct selinux_audit_rule;
20 #ifdef CONFIG_SECURITY_SELINUX
23 * selinux_audit_rule_init - alloc/init an selinux audit rule structure.
24 * @field: the field this rule refers to
25 * @op: the operater the rule uses
26 * @rulestr: the text "target" of the rule
27 * @rule: pointer to the new rule structure returned via this
29 * Returns 0 if successful, -errno if not. On success, the rule structure
30 * will be allocated internally. The caller must free this structure with
31 * selinux_audit_rule_free() after use.
33 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr,
34 struct selinux_audit_rule **rule);
37 * selinux_audit_rule_free - free an selinux audit rule structure.
38 * @rule: pointer to the audit rule to be freed
40 * This will free all memory associated with the given rule.
41 * If @rule is NULL, no operation is performed.
43 void selinux_audit_rule_free(struct selinux_audit_rule *rule);
46 * selinux_audit_rule_match - determine if a context ID matches a rule.
47 * @ctxid: the context ID to check
48 * @field: the field this rule refers to
49 * @op: the operater the rule uses
50 * @rule: pointer to the audit rule to check against
51 * @actx: the audit context (can be NULL) associated with the check
53 * Returns 1 if the context id matches the rule, 0 if it does not, and
56 int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op,
57 struct selinux_audit_rule *rule,
58 struct audit_context *actx);
61 * selinux_audit_set_callback - set the callback for policy reloads.
62 * @callback: the function to call when the policy is reloaded
64 * This sets the function callback function that will update the rules
65 * upon policy reloads. This callback should rebuild all existing rules
66 * using selinux_audit_rule_init().
68 void selinux_audit_set_callback(int (*callback)(void));
71 * selinux_task_ctxid - determine a context ID for a process.
72 * @tsk: the task object
73 * @ctxid: ID value returned via this
75 * On return, ctxid will contain an ID for the context. This value
76 * should only be used opaquely.
78 void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid);
81 * selinux_ctxid_to_string - map a security context ID to a string
82 * @ctxid: security context ID to be converted.
83 * @ctx: address of context string to be returned
84 * @ctxlen: length of returned context string.
86 * Returns 0 if successful, -errno if not. On success, the context
87 * string will be allocated internally, and the caller must call
88 * kfree() on it after use.
90 int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen);
93 * selinux_get_inode_sid - get the inode's security context ID
94 * @inode: inode structure to get the sid from.
95 * @sid: pointer to security context ID to be filled in.
99 void selinux_get_inode_sid(const struct inode *inode, u32 *sid);
103 static inline int selinux_audit_rule_init(u32 field, u32 op,
105 struct selinux_audit_rule **rule)
110 static inline void selinux_audit_rule_free(struct selinux_audit_rule *rule)
115 static inline int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op,
116 struct selinux_audit_rule *rule,
117 struct audit_context *actx)
122 static inline void selinux_audit_set_callback(int (*callback)(void))
127 static inline void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid)
132 static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen)
139 static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
144 #endif /* CONFIG_SECURITY_SELINUX */
146 #endif /* _LINUX_SELINUX_H */