objsec.h 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. /*
  2. * NSA Security-Enhanced Linux (SELinux) security module
  3. *
  4. * This file contains the SELinux security data structures for kernel objects.
  5. *
  6. * Author(s): Stephen Smalley, <sds@epoch.ncsc.mil>
  7. * Chris Vance, <cvance@nai.com>
  8. * Wayne Salamon, <wsalamon@nai.com>
  9. * James Morris <jmorris@redhat.com>
  10. *
  11. * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
  12. * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
  13. *
  14. * This program is free software; you can redistribute it and/or modify
  15. * it under the terms of the GNU General Public License version 2,
  16. * as published by the Free Software Foundation.
  17. */
  18. #ifndef _SELINUX_OBJSEC_H_
  19. #define _SELINUX_OBJSEC_H_
  20. #include <linux/list.h>
  21. #include <linux/sched.h>
  22. #include <linux/fs.h>
  23. #include <linux/binfmts.h>
  24. #include <linux/in.h>
  25. #include <linux/spinlock.h>
  26. #include <net/net_namespace.h>
  27. #include "flask.h"
  28. #include "avc.h"
  29. struct task_security_struct {
  30. u32 osid; /* SID prior to last execve */
  31. u32 sid; /* current SID */
  32. u32 exec_sid; /* exec SID */
  33. u32 create_sid; /* fscreate SID */
  34. u32 keycreate_sid; /* keycreate SID */
  35. u32 sockcreate_sid; /* fscreate SID */
  36. };
  37. /*
  38. * get the subjective security ID of the current task
  39. */
  40. static inline u32 current_sid(void)
  41. {
  42. const struct task_security_struct *tsec = current_security();
  43. return tsec->sid;
  44. }
  45. enum label_initialized {
  46. LABEL_INVALID, /* invalid or not initialized */
  47. LABEL_INITIALIZED, /* initialized */
  48. LABEL_PENDING
  49. };
  50. struct inode_security_struct {
  51. struct inode *inode; /* back pointer to inode object */
  52. union {
  53. struct list_head list; /* list of inode_security_struct */
  54. struct rcu_head rcu; /* for freeing the inode_security_struct */
  55. };
  56. u32 task_sid; /* SID of creating task */
  57. u32 sid; /* SID of this object */
  58. u16 sclass; /* security class of this object */
  59. unsigned char initialized; /* initialization flag */
  60. spinlock_t lock;
  61. };
  62. struct file_security_struct {
  63. u32 sid; /* SID of open file description */
  64. u32 fown_sid; /* SID of file owner (for SIGIO) */
  65. u32 isid; /* SID of inode at the time of file open */
  66. u32 pseqno; /* Policy seqno at the time of file open */
  67. };
  68. struct superblock_security_struct {
  69. struct super_block *sb; /* back pointer to sb object */
  70. u32 sid; /* SID of file system superblock */
  71. u32 def_sid; /* default SID for labeling */
  72. u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
  73. unsigned short behavior; /* labeling behavior */
  74. unsigned short flags; /* which mount options were specified */
  75. struct mutex lock;
  76. struct list_head isec_head;
  77. spinlock_t isec_lock;
  78. };
  79. struct msg_security_struct {
  80. u32 sid; /* SID of message */
  81. };
  82. struct ipc_security_struct {
  83. u16 sclass; /* security class of this object */
  84. u32 sid; /* SID of IPC resource */
  85. };
  86. struct netif_security_struct {
  87. struct net *ns; /* network namespace */
  88. int ifindex; /* device index */
  89. u32 sid; /* SID for this interface */
  90. };
  91. struct netnode_security_struct {
  92. union {
  93. __be32 ipv4; /* IPv4 node address */
  94. struct in6_addr ipv6; /* IPv6 node address */
  95. } addr;
  96. u32 sid; /* SID for this node */
  97. u16 family; /* address family */
  98. };
  99. struct netport_security_struct {
  100. u32 sid; /* SID for this node */
  101. u16 port; /* port number */
  102. u8 protocol; /* transport protocol */
  103. };
  104. struct sk_security_struct {
  105. #ifdef CONFIG_NETLABEL
  106. enum { /* NetLabel state */
  107. NLBL_UNSET = 0,
  108. NLBL_REQUIRE,
  109. NLBL_LABELED,
  110. NLBL_REQSKB,
  111. NLBL_CONNLABELED,
  112. } nlbl_state;
  113. struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
  114. #endif
  115. u32 sid; /* SID of this object */
  116. u32 peer_sid; /* SID of peer */
  117. u16 sclass; /* sock security class */
  118. };
  119. struct tun_security_struct {
  120. u32 sid; /* SID for the tun device sockets */
  121. };
  122. struct key_security_struct {
  123. u32 sid; /* SID of key */
  124. };
  125. extern unsigned int selinux_checkreqprot;
  126. #endif /* _SELINUX_OBJSEC_H_ */