security: add a secctx_to_secid() hook
Add a secctx_to_secid() LSM hook to go along with the existing secid_to_secctx() LSM hook. This patch also includes the SELinux implementation for this hook. Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
parent
c43e259cc7
commit
63cb344923
|
@ -1202,6 +1202,10 @@ struct request_sock;
|
||||||
* Convert secid to security context.
|
* Convert secid to security context.
|
||||||
* @secid contains the security ID.
|
* @secid contains the security ID.
|
||||||
* @secdata contains the pointer that stores the converted security context.
|
* @secdata contains the pointer that stores the converted security context.
|
||||||
|
* @secctx_to_secid:
|
||||||
|
* Convert security context to secid.
|
||||||
|
* @secid contains the pointer to the generated security ID.
|
||||||
|
* @secdata contains the security context.
|
||||||
*
|
*
|
||||||
* @release_secctx:
|
* @release_secctx:
|
||||||
* Release the security context.
|
* Release the security context.
|
||||||
|
@ -1396,6 +1400,7 @@ struct security_operations {
|
||||||
int (*getprocattr)(struct task_struct *p, char *name, char **value);
|
int (*getprocattr)(struct task_struct *p, char *name, char **value);
|
||||||
int (*setprocattr)(struct task_struct *p, char *name, void *value, size_t size);
|
int (*setprocattr)(struct task_struct *p, char *name, void *value, size_t size);
|
||||||
int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
|
int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
|
||||||
|
int (*secctx_to_secid)(char *secdata, u32 seclen, u32 *secid);
|
||||||
void (*release_secctx)(char *secdata, u32 seclen);
|
void (*release_secctx)(char *secdata, u32 seclen);
|
||||||
|
|
||||||
#ifdef CONFIG_SECURITY_NETWORK
|
#ifdef CONFIG_SECURITY_NETWORK
|
||||||
|
@ -1634,6 +1639,7 @@ int security_setprocattr(struct task_struct *p, char *name, void *value, size_t
|
||||||
int security_netlink_send(struct sock *sk, struct sk_buff *skb);
|
int security_netlink_send(struct sock *sk, struct sk_buff *skb);
|
||||||
int security_netlink_recv(struct sk_buff *skb, int cap);
|
int security_netlink_recv(struct sk_buff *skb, int cap);
|
||||||
int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
|
int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
|
||||||
|
int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid);
|
||||||
void security_release_secctx(char *secdata, u32 seclen);
|
void security_release_secctx(char *secdata, u32 seclen);
|
||||||
|
|
||||||
#else /* CONFIG_SECURITY */
|
#else /* CONFIG_SECURITY */
|
||||||
|
@ -2308,6 +2314,13 @@ static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *secle
|
||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline int security_secctx_to_secid(char *secdata,
|
||||||
|
u32 seclen,
|
||||||
|
u32 *secid)
|
||||||
|
{
|
||||||
|
return -EOPNOTSUPP;
|
||||||
|
}
|
||||||
|
|
||||||
static inline void security_release_secctx(char *secdata, u32 seclen)
|
static inline void security_release_secctx(char *secdata, u32 seclen)
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
|
|
@ -946,6 +946,11 @@ static int dummy_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
|
||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int dummy_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
|
||||||
|
{
|
||||||
|
return -EOPNOTSUPP;
|
||||||
|
}
|
||||||
|
|
||||||
static void dummy_release_secctx(char *secdata, u32 seclen)
|
static void dummy_release_secctx(char *secdata, u32 seclen)
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
@ -1106,6 +1111,7 @@ void security_fixup_ops (struct security_operations *ops)
|
||||||
set_to_dummy_if_null(ops, getprocattr);
|
set_to_dummy_if_null(ops, getprocattr);
|
||||||
set_to_dummy_if_null(ops, setprocattr);
|
set_to_dummy_if_null(ops, setprocattr);
|
||||||
set_to_dummy_if_null(ops, secid_to_secctx);
|
set_to_dummy_if_null(ops, secid_to_secctx);
|
||||||
|
set_to_dummy_if_null(ops, secctx_to_secid);
|
||||||
set_to_dummy_if_null(ops, release_secctx);
|
set_to_dummy_if_null(ops, release_secctx);
|
||||||
#ifdef CONFIG_SECURITY_NETWORK
|
#ifdef CONFIG_SECURITY_NETWORK
|
||||||
set_to_dummy_if_null(ops, unix_stream_connect);
|
set_to_dummy_if_null(ops, unix_stream_connect);
|
||||||
|
|
|
@ -831,6 +831,12 @@ int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
|
||||||
}
|
}
|
||||||
EXPORT_SYMBOL(security_secid_to_secctx);
|
EXPORT_SYMBOL(security_secid_to_secctx);
|
||||||
|
|
||||||
|
int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
|
||||||
|
{
|
||||||
|
return security_ops->secctx_to_secid(secdata, seclen, secid);
|
||||||
|
}
|
||||||
|
EXPORT_SYMBOL(security_secctx_to_secid);
|
||||||
|
|
||||||
void security_release_secctx(char *secdata, u32 seclen)
|
void security_release_secctx(char *secdata, u32 seclen)
|
||||||
{
|
{
|
||||||
return security_ops->release_secctx(secdata, seclen);
|
return security_ops->release_secctx(secdata, seclen);
|
||||||
|
|
|
@ -4947,6 +4947,11 @@ static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
|
||||||
return security_sid_to_context(secid, secdata, seclen);
|
return security_sid_to_context(secid, secdata, seclen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int selinux_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
|
||||||
|
{
|
||||||
|
return security_context_to_sid(secdata, seclen, secid);
|
||||||
|
}
|
||||||
|
|
||||||
static void selinux_release_secctx(char *secdata, u32 seclen)
|
static void selinux_release_secctx(char *secdata, u32 seclen)
|
||||||
{
|
{
|
||||||
kfree(secdata);
|
kfree(secdata);
|
||||||
|
@ -5138,6 +5143,7 @@ static struct security_operations selinux_ops = {
|
||||||
.setprocattr = selinux_setprocattr,
|
.setprocattr = selinux_setprocattr,
|
||||||
|
|
||||||
.secid_to_secctx = selinux_secid_to_secctx,
|
.secid_to_secctx = selinux_secid_to_secctx,
|
||||||
|
.secctx_to_secid = selinux_secctx_to_secid,
|
||||||
.release_secctx = selinux_release_secctx,
|
.release_secctx = selinux_release_secctx,
|
||||||
|
|
||||||
.unix_stream_connect = selinux_socket_unix_stream_connect,
|
.unix_stream_connect = selinux_socket_unix_stream_connect,
|
||||||
|
|
Loading…
Reference in New Issue