blob: 91c5395dd20c2aa9d34c93bcfe856c66e5978c0f [file] [log] [blame]
Thomas Gleixnerd2912cb2019-06-04 10:11:33 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * NSA Security-Enhanced Linux (SELinux) security module
4 *
5 * This file contains the SELinux security data structures for kernel objects.
6 *
Stephen Smalley7efbb602017-08-17 13:32:36 -04007 * Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
Eric Parisa936b792008-04-22 17:46:10 -04008 * Chris Vance, <cvance@nai.com>
9 * Wayne Salamon, <wsalamon@nai.com>
10 * James Morris <jmorris@redhat.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 *
12 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
13 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
Daniel Jurgens3a976fa2017-05-19 15:48:56 +030014 * Copyright (C) 2016 Mellanox Technologies
Linus Torvalds1da177e2005-04-16 15:20:36 -070015 */
16#ifndef _SELINUX_OBJSEC_H_
17#define _SELINUX_OBJSEC_H_
18
19#include <linux/list.h>
20#include <linux/sched.h>
21#include <linux/fs.h>
22#include <linux/binfmts.h>
23#include <linux/in.h>
Paul Moore9f2ad662006-11-17 17:38:53 -050024#include <linux/spinlock.h>
Casey Schauflerbbd36622018-11-12 09:30:56 -080025#include <linux/lsm_hooks.h>
Casey Schaufler7c653822018-09-21 17:19:45 -070026#include <linux/msg.h>
Paul Moorecbe0d6e2014-09-10 17:09:57 -040027#include <net/net_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include "flask.h"
29#include "avc.h"
30
31struct task_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040032 u32 osid; /* SID prior to last execve */
33 u32 sid; /* current SID */
34 u32 exec_sid; /* exec SID */
35 u32 create_sid; /* fscreate SID */
36 u32 keycreate_sid; /* keycreate SID */
37 u32 sockcreate_sid; /* fscreate SID */
Linus Torvalds1da177e2005-04-16 15:20:36 -070038};
39
Stephen Smalleybe0554c2017-01-09 10:07:31 -050040/*
41 * get the subjective security ID of the current task
42 */
43static inline u32 current_sid(void)
44{
45 const struct task_security_struct *tsec = current_security();
46
47 return tsec->sid;
48}
49
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050050enum label_initialized {
Paul Moore4b57d6b2016-03-28 15:16:53 -040051 LABEL_INVALID, /* invalid or not initialized */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010052 LABEL_INITIALIZED, /* initialized */
53 LABEL_PENDING
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050054};
55
Linus Torvalds1da177e2005-04-16 15:20:36 -070056struct inode_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040057 struct inode *inode; /* back pointer to inode object */
Casey Schauflerafb1cbe32018-09-21 17:19:29 -070058 struct list_head list; /* list of inode_security_struct */
Eric Parisa936b792008-04-22 17:46:10 -040059 u32 task_sid; /* SID of creating task */
60 u32 sid; /* SID of this object */
61 u16 sclass; /* security class of this object */
62 unsigned char initialized; /* initialization flag */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010063 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064};
65
66struct file_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040067 u32 sid; /* SID of open file description */
68 u32 fown_sid; /* SID of file owner (for SIGIO) */
69 u32 isid; /* SID of inode at the time of file open */
70 u32 pseqno; /* Policy seqno at the time of file open */
Linus Torvalds1da177e2005-04-16 15:20:36 -070071};
72
73struct superblock_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040074 struct super_block *sb; /* back pointer to sb object */
Eric Parisc312feb2006-07-10 04:43:53 -070075 u32 sid; /* SID of file system superblock */
Linus Torvalds1da177e2005-04-16 15:20:36 -070076 u32 def_sid; /* default SID for labeling */
Eric Parisc312feb2006-07-10 04:43:53 -070077 u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
Eric Parisf936c6e2012-10-10 10:38:47 -040078 unsigned short behavior; /* labeling behavior */
Eric Pariscfca0302012-10-09 16:20:08 -040079 unsigned short flags; /* which mount options were specified */
Eric Parisbc7e9822006-09-25 23:32:02 -070080 struct mutex lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 struct list_head isec_head;
82 spinlock_t isec_lock;
83};
84
85struct msg_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040086 u32 sid; /* SID of message */
Linus Torvalds1da177e2005-04-16 15:20:36 -070087};
88
89struct ipc_security_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070090 u16 sclass; /* security class of this object */
Eric Parisa936b792008-04-22 17:46:10 -040091 u32 sid; /* SID of IPC resource */
Linus Torvalds1da177e2005-04-16 15:20:36 -070092};
93
Linus Torvalds1da177e2005-04-16 15:20:36 -070094struct netif_security_struct {
Paul Moorecbe0d6e2014-09-10 17:09:57 -040095 struct net *ns; /* network namespace */
Paul Mooree8bfdb92008-01-29 08:38:08 -050096 int ifindex; /* device index */
97 u32 sid; /* SID for this interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -070098};
99
Paul Moore224dfbd2008-01-29 08:38:13 -0500100struct netnode_security_struct {
101 union {
102 __be32 ipv4; /* IPv4 node address */
103 struct in6_addr ipv6; /* IPv6 node address */
104 } addr;
105 u32 sid; /* SID for this node */
106 u16 family; /* address family */
107};
108
Paul Moore3e112172008-04-10 10:48:14 -0400109struct netport_security_struct {
110 u32 sid; /* SID for this node */
111 u16 port; /* port number */
112 u8 protocol; /* transport protocol */
113};
114
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115struct sk_security_struct {
Paul Moore220deb92008-01-29 08:38:23 -0500116#ifdef CONFIG_NETLABEL
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700117 enum { /* NetLabel state */
118 NLBL_UNSET = 0,
119 NLBL_REQUIRE,
120 NLBL_LABELED,
Paul Moore948bf852008-10-10 10:16:32 -0400121 NLBL_REQSKB,
Paul Moore014ab192008-10-10 10:16:33 -0400122 NLBL_CONNLABELED,
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700123 } nlbl_state;
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400124 struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700125#endif
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400126 u32 sid; /* SID of this object */
127 u32 peer_sid; /* SID of peer */
128 u16 sclass; /* sock security class */
Richard Hainesd4529302018-02-13 20:57:18 +0000129 enum { /* SCTP association state */
130 SCTP_ASSOC_UNSET = 0,
131 SCTP_ASSOC_SET,
132 } sctp_assoc_state;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133};
134
Paul Moore5dbbaf22013-01-14 07:12:19 +0000135struct tun_security_struct {
136 u32 sid; /* SID for the tun device sockets */
137};
138
Michael LeMayd7200242006-06-22 14:47:17 -0700139struct key_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -0400140 u32 sid; /* SID of key */
Michael LeMayd7200242006-06-22 14:47:17 -0700141};
142
Daniel Jurgens3a976fa2017-05-19 15:48:56 +0300143struct ib_security_struct {
144 u32 sid; /* SID of the queue pair or MAD agent */
145};
146
Daniel Jurgens409dcf32017-05-19 15:48:59 +0300147struct pkey_security_struct {
148 u64 subnet_prefix; /* Port subnet prefix */
149 u16 pkey; /* PKey number */
150 u32 sid; /* SID of pkey */
151};
152
Chenbo Fengec27c352017-10-18 13:00:25 -0700153struct bpf_security_struct {
154 u32 sid; /*SID of bpf obj creater*/
155};
156
Casey Schauflerbbd36622018-11-12 09:30:56 -0800157extern struct lsm_blob_sizes selinux_blob_sizes;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700158static inline struct task_security_struct *selinux_cred(const struct cred *cred)
159{
Casey Schauflerbbd36622018-11-12 09:30:56 -0800160 return cred->security + selinux_blob_sizes.lbs_cred;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700161}
162
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700163static inline struct file_security_struct *selinux_file(const struct file *file)
164{
Casey Schaufler33bf60c2018-11-12 12:02:49 -0800165 return file->f_security + selinux_blob_sizes.lbs_file;
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700166}
167
Casey Schaufler80788c22018-09-21 17:19:11 -0700168static inline struct inode_security_struct *selinux_inode(
169 const struct inode *inode)
170{
Casey Schauflerafb1cbe32018-09-21 17:19:29 -0700171 if (unlikely(!inode->i_security))
172 return NULL;
173 return inode->i_security + selinux_blob_sizes.lbs_inode;
Casey Schaufler80788c22018-09-21 17:19:11 -0700174}
175
Casey Schaufler7c653822018-09-21 17:19:45 -0700176static inline struct msg_security_struct *selinux_msg_msg(
177 const struct msg_msg *msg_msg)
178{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800179 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg;
Casey Schaufler7c653822018-09-21 17:19:45 -0700180}
181
182static inline struct ipc_security_struct *selinux_ipc(
183 const struct kern_ipc_perm *ipc)
184{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800185 return ipc->security + selinux_blob_sizes.lbs_ipc;
Casey Schaufler7c653822018-09-21 17:19:45 -0700186}
187
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188#endif /* _SELINUX_OBJSEC_H_ */