Skip to content

Commit 63cb344

Browse files
dhowellsJames Morris
authored andcommitted
security: add a secctx_to_secid() hook
Add a secctx_to_secid() LSM hook to go along with the existing secid_to_secctx() LSM hook. This patch also includes the SELinux implementation for this hook. Signed-off-by: Paul Moore <[email protected]> Acked-by: Stephen Smalley <[email protected]> Signed-off-by: James Morris <[email protected]>
1 parent c43e259 commit 63cb344

File tree

4 files changed

+31
-0
lines changed

4 files changed

+31
-0
lines changed

include/linux/security.h

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1202,6 +1202,10 @@ struct request_sock;
12021202
* Convert secid to security context.
12031203
* @secid contains the security ID.
12041204
* @secdata contains the pointer that stores the converted security context.
1205+
* @secctx_to_secid:
1206+
* Convert security context to secid.
1207+
* @secid contains the pointer to the generated security ID.
1208+
* @secdata contains the security context.
12051209
*
12061210
* @release_secctx:
12071211
* Release the security context.
@@ -1396,6 +1400,7 @@ struct security_operations {
13961400
int (*getprocattr)(struct task_struct *p, char *name, char **value);
13971401
int (*setprocattr)(struct task_struct *p, char *name, void *value, size_t size);
13981402
int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
1403+
int (*secctx_to_secid)(char *secdata, u32 seclen, u32 *secid);
13991404
void (*release_secctx)(char *secdata, u32 seclen);
14001405

14011406
#ifdef CONFIG_SECURITY_NETWORK
@@ -1634,6 +1639,7 @@ int security_setprocattr(struct task_struct *p, char *name, void *value, size_t
16341639
int security_netlink_send(struct sock *sk, struct sk_buff *skb);
16351640
int security_netlink_recv(struct sk_buff *skb, int cap);
16361641
int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
1642+
int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid);
16371643
void security_release_secctx(char *secdata, u32 seclen);
16381644

16391645
#else /* CONFIG_SECURITY */
@@ -2308,6 +2314,13 @@ static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *secle
23082314
return -EOPNOTSUPP;
23092315
}
23102316

2317+
static inline int security_secctx_to_secid(char *secdata,
2318+
u32 seclen,
2319+
u32 *secid)
2320+
{
2321+
return -EOPNOTSUPP;
2322+
}
2323+
23112324
static inline void security_release_secctx(char *secdata, u32 seclen)
23122325
{
23132326
}

security/dummy.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -946,6 +946,11 @@ static int dummy_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
946946
return -EOPNOTSUPP;
947947
}
948948

949+
static int dummy_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
950+
{
951+
return -EOPNOTSUPP;
952+
}
953+
949954
static void dummy_release_secctx(char *secdata, u32 seclen)
950955
{
951956
}
@@ -1106,6 +1111,7 @@ void security_fixup_ops (struct security_operations *ops)
11061111
set_to_dummy_if_null(ops, getprocattr);
11071112
set_to_dummy_if_null(ops, setprocattr);
11081113
set_to_dummy_if_null(ops, secid_to_secctx);
1114+
set_to_dummy_if_null(ops, secctx_to_secid);
11091115
set_to_dummy_if_null(ops, release_secctx);
11101116
#ifdef CONFIG_SECURITY_NETWORK
11111117
set_to_dummy_if_null(ops, unix_stream_connect);

security/security.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -831,6 +831,12 @@ int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
831831
}
832832
EXPORT_SYMBOL(security_secid_to_secctx);
833833

834+
int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
835+
{
836+
return security_ops->secctx_to_secid(secdata, seclen, secid);
837+
}
838+
EXPORT_SYMBOL(security_secctx_to_secid);
839+
834840
void security_release_secctx(char *secdata, u32 seclen)
835841
{
836842
return security_ops->release_secctx(secdata, seclen);

security/selinux/hooks.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4947,6 +4947,11 @@ static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
49474947
return security_sid_to_context(secid, secdata, seclen);
49484948
}
49494949

4950+
static int selinux_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
4951+
{
4952+
return security_context_to_sid(secdata, seclen, secid);
4953+
}
4954+
49504955
static void selinux_release_secctx(char *secdata, u32 seclen)
49514956
{
49524957
kfree(secdata);
@@ -5138,6 +5143,7 @@ static struct security_operations selinux_ops = {
51385143
.setprocattr = selinux_setprocattr,
51395144

51405145
.secid_to_secctx = selinux_secid_to_secctx,
5146+
.secctx_to_secid = selinux_secctx_to_secid,
51415147
.release_secctx = selinux_release_secctx,
51425148

51435149
.unix_stream_connect = selinux_socket_unix_stream_connect,

0 commit comments

Comments
 (0)