hooks.c (c0d4f464caeb075e3bb9063a64cd63c093ac03ad) hooks.c (4298555df5e5cb956549de5b01e4c77b1e4bc00a)
1/*
2 * NSA Security-Enhanced Linux (SELinux) security module
3 *
4 * This file contains the SELinux hook function implementations.
5 *
6 * Authors: Stephen Smalley, <sds@tycho.nsa.gov>
7 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>

--- 3956 unchanged lines hidden (view full) ---

3965}
3966
3967static int selinux_task_getioprio(struct task_struct *p)
3968{
3969 return avc_has_perm(current_sid(), task_sid(p), SECCLASS_PROCESS,
3970 PROCESS__GETSCHED, NULL);
3971}
3972
1/*
2 * NSA Security-Enhanced Linux (SELinux) security module
3 *
4 * This file contains the SELinux hook function implementations.
5 *
6 * Authors: Stephen Smalley, <sds@tycho.nsa.gov>
7 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>

--- 3956 unchanged lines hidden (view full) ---

3965}
3966
3967static int selinux_task_getioprio(struct task_struct *p)
3968{
3969 return avc_has_perm(current_sid(), task_sid(p), SECCLASS_PROCESS,
3970 PROCESS__GETSCHED, NULL);
3971}
3972
3973int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred,
3974 unsigned int flags)
3973static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred,
3974 unsigned int flags)
3975{
3976 u32 av = 0;
3977
3978 if (!flags)
3979 return 0;
3980 if (flags & LSM_PRLIMIT_WRITE)
3981 av |= PROCESS__SETRLIMIT;
3982 if (flags & LSM_PRLIMIT_READ)

--- 2674 unchanged lines hidden ---
3975{
3976 u32 av = 0;
3977
3978 if (!flags)
3979 return 0;
3980 if (flags & LSM_PRLIMIT_WRITE)
3981 av |= PROCESS__SETRLIMIT;
3982 if (flags & LSM_PRLIMIT_READ)

--- 2674 unchanged lines hidden ---