blob: 96374dbf4acec4faac578409e686e041515340de [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * NSA Security-Enhanced Linux (SELinux) security module
3 *
4 * This file contains the SELinux security data structures for kernel objects.
5 *
Stephen Smalley7efbb602017-08-17 13:32:36 -04006 * Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
Eric Parisa936b792008-04-22 17:46:10 -04007 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>
9 * James Morris <jmorris@redhat.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 *
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
Daniel Jurgens3a976fa2017-05-19 15:48:56 +030013 * Copyright (C) 2016 Mellanox Technologies
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License version 2,
Eric Parisa936b792008-04-22 17:46:10 -040017 * as published by the Free Software Foundation.
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 */
19#ifndef _SELINUX_OBJSEC_H_
20#define _SELINUX_OBJSEC_H_
21
22#include <linux/list.h>
23#include <linux/sched.h>
24#include <linux/fs.h>
25#include <linux/binfmts.h>
26#include <linux/in.h>
Paul Moore9f2ad662006-11-17 17:38:53 -050027#include <linux/spinlock.h>
Casey Schauflerbbd36622018-11-12 09:30:56 -080028#include <linux/lsm_hooks.h>
Paul Moorecbe0d6e2014-09-10 17:09:57 -040029#include <net/net_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include "flask.h"
31#include "avc.h"
32
33struct task_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040034 u32 osid; /* SID prior to last execve */
35 u32 sid; /* current SID */
36 u32 exec_sid; /* exec SID */
37 u32 create_sid; /* fscreate SID */
38 u32 keycreate_sid; /* keycreate SID */
39 u32 sockcreate_sid; /* fscreate SID */
Linus Torvalds1da177e2005-04-16 15:20:36 -070040};
41
Stephen Smalleybe0554c2017-01-09 10:07:31 -050042/*
43 * get the subjective security ID of the current task
44 */
45static inline u32 current_sid(void)
46{
47 const struct task_security_struct *tsec = current_security();
48
49 return tsec->sid;
50}
51
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050052enum label_initialized {
Paul Moore4b57d6b2016-03-28 15:16:53 -040053 LABEL_INVALID, /* invalid or not initialized */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010054 LABEL_INITIALIZED, /* initialized */
55 LABEL_PENDING
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050056};
57
Linus Torvalds1da177e2005-04-16 15:20:36 -070058struct inode_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040059 struct inode *inode; /* back pointer to inode object */
Steven Rostedt3dc91d42014-01-09 21:46:34 -050060 union {
61 struct list_head list; /* list of inode_security_struct */
62 struct rcu_head rcu; /* for freeing the inode_security_struct */
63 };
Eric Parisa936b792008-04-22 17:46:10 -040064 u32 task_sid; /* SID of creating task */
65 u32 sid; /* SID of this object */
66 u16 sclass; /* security class of this object */
67 unsigned char initialized; /* initialization flag */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010068 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070069};
70
71struct file_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040072 u32 sid; /* SID of open file description */
73 u32 fown_sid; /* SID of file owner (for SIGIO) */
74 u32 isid; /* SID of inode at the time of file open */
75 u32 pseqno; /* Policy seqno at the time of file open */
Linus Torvalds1da177e2005-04-16 15:20:36 -070076};
77
78struct superblock_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040079 struct super_block *sb; /* back pointer to sb object */
Eric Parisc312feb2006-07-10 04:43:53 -070080 u32 sid; /* SID of file system superblock */
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 u32 def_sid; /* default SID for labeling */
Eric Parisc312feb2006-07-10 04:43:53 -070082 u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
Eric Parisf936c6e2012-10-10 10:38:47 -040083 unsigned short behavior; /* labeling behavior */
Eric Pariscfca0302012-10-09 16:20:08 -040084 unsigned short flags; /* which mount options were specified */
Eric Parisbc7e9822006-09-25 23:32:02 -070085 struct mutex lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070086 struct list_head isec_head;
87 spinlock_t isec_lock;
88};
89
90struct msg_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040091 u32 sid; /* SID of message */
Linus Torvalds1da177e2005-04-16 15:20:36 -070092};
93
94struct ipc_security_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070095 u16 sclass; /* security class of this object */
Eric Parisa936b792008-04-22 17:46:10 -040096 u32 sid; /* SID of IPC resource */
Linus Torvalds1da177e2005-04-16 15:20:36 -070097};
98
Linus Torvalds1da177e2005-04-16 15:20:36 -070099struct netif_security_struct {
Paul Moorecbe0d6e2014-09-10 17:09:57 -0400100 struct net *ns; /* network namespace */
Paul Mooree8bfdb92008-01-29 08:38:08 -0500101 int ifindex; /* device index */
102 u32 sid; /* SID for this interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103};
104
Paul Moore224dfbd2008-01-29 08:38:13 -0500105struct netnode_security_struct {
106 union {
107 __be32 ipv4; /* IPv4 node address */
108 struct in6_addr ipv6; /* IPv6 node address */
109 } addr;
110 u32 sid; /* SID for this node */
111 u16 family; /* address family */
112};
113
Paul Moore3e112172008-04-10 10:48:14 -0400114struct netport_security_struct {
115 u32 sid; /* SID for this node */
116 u16 port; /* port number */
117 u8 protocol; /* transport protocol */
118};
119
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120struct sk_security_struct {
Paul Moore220deb92008-01-29 08:38:23 -0500121#ifdef CONFIG_NETLABEL
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700122 enum { /* NetLabel state */
123 NLBL_UNSET = 0,
124 NLBL_REQUIRE,
125 NLBL_LABELED,
Paul Moore948bf852008-10-10 10:16:32 -0400126 NLBL_REQSKB,
Paul Moore014ab192008-10-10 10:16:33 -0400127 NLBL_CONNLABELED,
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700128 } nlbl_state;
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400129 struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700130#endif
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400131 u32 sid; /* SID of this object */
132 u32 peer_sid; /* SID of peer */
133 u16 sclass; /* sock security class */
Richard Hainesd4529302018-02-13 20:57:18 +0000134 enum { /* SCTP association state */
135 SCTP_ASSOC_UNSET = 0,
136 SCTP_ASSOC_SET,
137 } sctp_assoc_state;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138};
139
Paul Moore5dbbaf22013-01-14 07:12:19 +0000140struct tun_security_struct {
141 u32 sid; /* SID for the tun device sockets */
142};
143
Michael LeMayd7200242006-06-22 14:47:17 -0700144struct key_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -0400145 u32 sid; /* SID of key */
Michael LeMayd7200242006-06-22 14:47:17 -0700146};
147
Daniel Jurgens3a976fa2017-05-19 15:48:56 +0300148struct ib_security_struct {
149 u32 sid; /* SID of the queue pair or MAD agent */
150};
151
Daniel Jurgens409dcf32017-05-19 15:48:59 +0300152struct pkey_security_struct {
153 u64 subnet_prefix; /* Port subnet prefix */
154 u16 pkey; /* PKey number */
155 u32 sid; /* SID of pkey */
156};
157
Chenbo Fengec27c352017-10-18 13:00:25 -0700158struct bpf_security_struct {
159 u32 sid; /*SID of bpf obj creater*/
160};
161
Casey Schauflerbbd36622018-11-12 09:30:56 -0800162extern struct lsm_blob_sizes selinux_blob_sizes;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700163static inline struct task_security_struct *selinux_cred(const struct cred *cred)
164{
Casey Schauflerbbd36622018-11-12 09:30:56 -0800165 return cred->security + selinux_blob_sizes.lbs_cred;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700166}
167
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700168static inline struct file_security_struct *selinux_file(const struct file *file)
169{
Casey Schaufler33bf60c2018-11-12 12:02:49 -0800170 return file->f_security + selinux_blob_sizes.lbs_file;
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700171}
172
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173#endif /* _SELINUX_OBJSEC_H_ */