From: Andy Adamson <andros@xxxxxxxxxx> RPCSEC_GSS Version 3 label assertions require the client thread sid in string context form, and so needs this interface or one like it. Signed-off-by: Andy Adamson <andros@xxxxxxxxxx> --- include/linux/selinux.h | 7 +++++++ security/selinux/hooks.c | 10 ++++++++++ 2 files changed, 17 insertions(+) diff --git a/include/linux/selinux.h b/include/linux/selinux.h index 44f4596..e82a4ba 100644 --- a/include/linux/selinux.h +++ b/include/linux/selinux.h @@ -24,12 +24,19 @@ * selinux_is_enabled - is SELinux enabled? */ bool selinux_is_enabled(void); +int security_current_sid_to_context(char **scontext, u32 *scontext_len); #else static inline bool selinux_is_enabled(void) { return false; } + +static inline int +security_current_sid_to_context(char **scontext, u32 *scontext_len) +{ + return -EINVAL; +} #endif /* CONFIG_SECURITY_SELINUX */ #endif /* _LINUX_SELINUX_H */ diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 819fd68..ba6974b 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -6516,3 +6516,13 @@ int selinux_disable(void) return 0; } #endif + +int security_current_sid_to_context(char **scontext, u32 *scontext_len) +{ + const struct task_security_struct *ts = current_security(); + + if (!selinux_enabled) + return -EINVAL; + return security_sid_to_context(ts->sid, scontext, scontext_len); +} +EXPORT_SYMBOL_GPL(security_current_sid_to_context); -- 1.8.3.1 -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html