blob: 231262d8eac9189e8dec1576f9a25264d8633567 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * NSA Security-Enhanced Linux (SELinux) security module
3 *
4 * This file contains the SELinux security data structures for kernel objects.
5 *
Stephen Smalley7efbb602017-08-17 13:32:36 -04006 * Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
Eric Parisa936b792008-04-22 17:46:10 -04007 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>
9 * James Morris <jmorris@redhat.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 *
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
Daniel Jurgens3a976fa2017-05-19 15:48:56 +030013 * Copyright (C) 2016 Mellanox Technologies
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License version 2,
Eric Parisa936b792008-04-22 17:46:10 -040017 * as published by the Free Software Foundation.
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 */
19#ifndef _SELINUX_OBJSEC_H_
20#define _SELINUX_OBJSEC_H_
21
22#include <linux/list.h>
23#include <linux/sched.h>
24#include <linux/fs.h>
25#include <linux/binfmts.h>
26#include <linux/in.h>
Paul Moore9f2ad662006-11-17 17:38:53 -050027#include <linux/spinlock.h>
Casey Schauflerbbd36622018-11-12 09:30:56 -080028#include <linux/lsm_hooks.h>
Casey Schaufler7c653822018-09-21 17:19:45 -070029#include <linux/msg.h>
Paul Moorecbe0d6e2014-09-10 17:09:57 -040030#include <net/net_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070031#include "flask.h"
32#include "avc.h"
33
34struct task_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040035 u32 osid; /* SID prior to last execve */
36 u32 sid; /* current SID */
37 u32 exec_sid; /* exec SID */
38 u32 create_sid; /* fscreate SID */
39 u32 keycreate_sid; /* keycreate SID */
40 u32 sockcreate_sid; /* fscreate SID */
Linus Torvalds1da177e2005-04-16 15:20:36 -070041};
42
Stephen Smalleybe0554c2017-01-09 10:07:31 -050043/*
44 * get the subjective security ID of the current task
45 */
46static inline u32 current_sid(void)
47{
48 const struct task_security_struct *tsec = current_security();
49
50 return tsec->sid;
51}
52
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050053enum label_initialized {
Paul Moore4b57d6b2016-03-28 15:16:53 -040054 LABEL_INVALID, /* invalid or not initialized */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010055 LABEL_INITIALIZED, /* initialized */
56 LABEL_PENDING
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050057};
58
Linus Torvalds1da177e2005-04-16 15:20:36 -070059struct inode_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040060 struct inode *inode; /* back pointer to inode object */
Casey Schauflerafb1cbe32018-09-21 17:19:29 -070061 struct list_head list; /* list of inode_security_struct */
Eric Parisa936b792008-04-22 17:46:10 -040062 u32 task_sid; /* SID of creating task */
63 u32 sid; /* SID of this object */
64 u16 sclass; /* security class of this object */
65 unsigned char initialized; /* initialization flag */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010066 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070067};
68
69struct file_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040070 u32 sid; /* SID of open file description */
71 u32 fown_sid; /* SID of file owner (for SIGIO) */
72 u32 isid; /* SID of inode at the time of file open */
73 u32 pseqno; /* Policy seqno at the time of file open */
Linus Torvalds1da177e2005-04-16 15:20:36 -070074};
75
76struct superblock_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040077 struct super_block *sb; /* back pointer to sb object */
Eric Parisc312feb2006-07-10 04:43:53 -070078 u32 sid; /* SID of file system superblock */
Linus Torvalds1da177e2005-04-16 15:20:36 -070079 u32 def_sid; /* default SID for labeling */
Eric Parisc312feb2006-07-10 04:43:53 -070080 u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
Eric Parisf936c6e2012-10-10 10:38:47 -040081 unsigned short behavior; /* labeling behavior */
Eric Pariscfca0302012-10-09 16:20:08 -040082 unsigned short flags; /* which mount options were specified */
Eric Parisbc7e9822006-09-25 23:32:02 -070083 struct mutex lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070084 struct list_head isec_head;
85 spinlock_t isec_lock;
86};
87
88struct msg_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040089 u32 sid; /* SID of message */
Linus Torvalds1da177e2005-04-16 15:20:36 -070090};
91
92struct ipc_security_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070093 u16 sclass; /* security class of this object */
Eric Parisa936b792008-04-22 17:46:10 -040094 u32 sid; /* SID of IPC resource */
Linus Torvalds1da177e2005-04-16 15:20:36 -070095};
96
Linus Torvalds1da177e2005-04-16 15:20:36 -070097struct netif_security_struct {
Paul Moorecbe0d6e2014-09-10 17:09:57 -040098 struct net *ns; /* network namespace */
Paul Mooree8bfdb92008-01-29 08:38:08 -050099 int ifindex; /* device index */
100 u32 sid; /* SID for this interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101};
102
Paul Moore224dfbd2008-01-29 08:38:13 -0500103struct netnode_security_struct {
104 union {
105 __be32 ipv4; /* IPv4 node address */
106 struct in6_addr ipv6; /* IPv6 node address */
107 } addr;
108 u32 sid; /* SID for this node */
109 u16 family; /* address family */
110};
111
Paul Moore3e112172008-04-10 10:48:14 -0400112struct netport_security_struct {
113 u32 sid; /* SID for this node */
114 u16 port; /* port number */
115 u8 protocol; /* transport protocol */
116};
117
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118struct sk_security_struct {
Paul Moore220deb92008-01-29 08:38:23 -0500119#ifdef CONFIG_NETLABEL
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700120 enum { /* NetLabel state */
121 NLBL_UNSET = 0,
122 NLBL_REQUIRE,
123 NLBL_LABELED,
Paul Moore948bf852008-10-10 10:16:32 -0400124 NLBL_REQSKB,
Paul Moore014ab192008-10-10 10:16:33 -0400125 NLBL_CONNLABELED,
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700126 } nlbl_state;
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400127 struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700128#endif
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400129 u32 sid; /* SID of this object */
130 u32 peer_sid; /* SID of peer */
131 u16 sclass; /* sock security class */
Richard Hainesd4529302018-02-13 20:57:18 +0000132 enum { /* SCTP association state */
133 SCTP_ASSOC_UNSET = 0,
134 SCTP_ASSOC_SET,
135 } sctp_assoc_state;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136};
137
Paul Moore5dbbaf22013-01-14 07:12:19 +0000138struct tun_security_struct {
139 u32 sid; /* SID for the tun device sockets */
140};
141
Michael LeMayd7200242006-06-22 14:47:17 -0700142struct key_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -0400143 u32 sid; /* SID of key */
Michael LeMayd7200242006-06-22 14:47:17 -0700144};
145
Daniel Jurgens3a976fa2017-05-19 15:48:56 +0300146struct ib_security_struct {
147 u32 sid; /* SID of the queue pair or MAD agent */
148};
149
Daniel Jurgens409dcf32017-05-19 15:48:59 +0300150struct pkey_security_struct {
151 u64 subnet_prefix; /* Port subnet prefix */
152 u16 pkey; /* PKey number */
153 u32 sid; /* SID of pkey */
154};
155
Chenbo Fengec27c352017-10-18 13:00:25 -0700156struct bpf_security_struct {
157 u32 sid; /*SID of bpf obj creater*/
158};
159
Casey Schauflerbbd36622018-11-12 09:30:56 -0800160extern struct lsm_blob_sizes selinux_blob_sizes;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700161static inline struct task_security_struct *selinux_cred(const struct cred *cred)
162{
Casey Schauflerbbd36622018-11-12 09:30:56 -0800163 return cred->security + selinux_blob_sizes.lbs_cred;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700164}
165
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700166static inline struct file_security_struct *selinux_file(const struct file *file)
167{
Casey Schaufler33bf60c2018-11-12 12:02:49 -0800168 return file->f_security + selinux_blob_sizes.lbs_file;
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700169}
170
Casey Schaufler80788c22018-09-21 17:19:11 -0700171static inline struct inode_security_struct *selinux_inode(
172 const struct inode *inode)
173{
Casey Schauflerafb1cbe32018-09-21 17:19:29 -0700174 if (unlikely(!inode->i_security))
175 return NULL;
176 return inode->i_security + selinux_blob_sizes.lbs_inode;
Casey Schaufler80788c22018-09-21 17:19:11 -0700177}
178
Casey Schaufler7c653822018-09-21 17:19:45 -0700179static inline struct msg_security_struct *selinux_msg_msg(
180 const struct msg_msg *msg_msg)
181{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800182 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg;
Casey Schaufler7c653822018-09-21 17:19:45 -0700183}
184
185static inline struct ipc_security_struct *selinux_ipc(
186 const struct kern_ipc_perm *ipc)
187{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800188 return ipc->security + selinux_blob_sizes.lbs_ipc;
Casey Schaufler7c653822018-09-21 17:19:45 -0700189}
190
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191#endif /* _SELINUX_OBJSEC_H_ */