hooks.c (c0d4f464caeb075e3bb9063a64cd63c093ac03ad) | hooks.c (4298555df5e5cb956549de5b01e4c77b1e4bc00a) |
---|---|
1/* 2 * NSA Security-Enhanced Linux (SELinux) security module 3 * 4 * This file contains the SELinux hook function implementations. 5 * 6 * Authors: Stephen Smalley, <sds@tycho.nsa.gov> 7 * Chris Vance, <cvance@nai.com> 8 * Wayne Salamon, <wsalamon@nai.com> --- 3956 unchanged lines hidden (view full) --- 3965} 3966 3967static int selinux_task_getioprio(struct task_struct *p) 3968{ 3969 return avc_has_perm(current_sid(), task_sid(p), SECCLASS_PROCESS, 3970 PROCESS__GETSCHED, NULL); 3971} 3972 | 1/* 2 * NSA Security-Enhanced Linux (SELinux) security module 3 * 4 * This file contains the SELinux hook function implementations. 5 * 6 * Authors: Stephen Smalley, <sds@tycho.nsa.gov> 7 * Chris Vance, <cvance@nai.com> 8 * Wayne Salamon, <wsalamon@nai.com> --- 3956 unchanged lines hidden (view full) --- 3965} 3966 3967static int selinux_task_getioprio(struct task_struct *p) 3968{ 3969 return avc_has_perm(current_sid(), task_sid(p), SECCLASS_PROCESS, 3970 PROCESS__GETSCHED, NULL); 3971} 3972 |
3973int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, 3974 unsigned int flags) | 3973static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, 3974 unsigned int flags) |
3975{ 3976 u32 av = 0; 3977 3978 if (!flags) 3979 return 0; 3980 if (flags & LSM_PRLIMIT_WRITE) 3981 av |= PROCESS__SETRLIMIT; 3982 if (flags & LSM_PRLIMIT_READ) --- 2674 unchanged lines hidden --- | 3975{ 3976 u32 av = 0; 3977 3978 if (!flags) 3979 return 0; 3980 if (flags & LSM_PRLIMIT_WRITE) 3981 av |= PROCESS__SETRLIMIT; 3982 if (flags & LSM_PRLIMIT_READ) --- 2674 unchanged lines hidden --- |