blob: 562fad58c56b7bb9b4b717bc2e8220b44a4652d4 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * NSA Security-Enhanced Linux (SELinux) security module
3 *
4 * This file contains the SELinux security data structures for kernel objects.
5 *
Stephen Smalley7efbb602017-08-17 13:32:36 -04006 * Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
Eric Parisa936b792008-04-22 17:46:10 -04007 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>
9 * James Morris <jmorris@redhat.com>
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 *
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
Daniel Jurgens3a976fa2017-05-19 15:48:56 +030013 * Copyright (C) 2016 Mellanox Technologies
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License version 2,
Eric Parisa936b792008-04-22 17:46:10 -040017 * as published by the Free Software Foundation.
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 */
19#ifndef _SELINUX_OBJSEC_H_
20#define _SELINUX_OBJSEC_H_
21
22#include <linux/list.h>
23#include <linux/sched.h>
24#include <linux/fs.h>
25#include <linux/binfmts.h>
26#include <linux/in.h>
Paul Moore9f2ad662006-11-17 17:38:53 -050027#include <linux/spinlock.h>
Casey Schauflerbbd36622018-11-12 09:30:56 -080028#include <linux/lsm_hooks.h>
Paul Moorecbe0d6e2014-09-10 17:09:57 -040029#include <net/net_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include "flask.h"
31#include "avc.h"
32
33struct task_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040034 u32 osid; /* SID prior to last execve */
35 u32 sid; /* current SID */
36 u32 exec_sid; /* exec SID */
37 u32 create_sid; /* fscreate SID */
38 u32 keycreate_sid; /* keycreate SID */
39 u32 sockcreate_sid; /* fscreate SID */
Linus Torvalds1da177e2005-04-16 15:20:36 -070040};
41
Stephen Smalleybe0554c2017-01-09 10:07:31 -050042/*
43 * get the subjective security ID of the current task
44 */
45static inline u32 current_sid(void)
46{
47 const struct task_security_struct *tsec = current_security();
48
49 return tsec->sid;
50}
51
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050052enum label_initialized {
Paul Moore4b57d6b2016-03-28 15:16:53 -040053 LABEL_INVALID, /* invalid or not initialized */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010054 LABEL_INITIALIZED, /* initialized */
55 LABEL_PENDING
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050056};
57
Linus Torvalds1da177e2005-04-16 15:20:36 -070058struct inode_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040059 struct inode *inode; /* back pointer to inode object */
Casey Schauflerafb1cbe32018-09-21 17:19:29 -070060 struct list_head list; /* list of inode_security_struct */
Eric Parisa936b792008-04-22 17:46:10 -040061 u32 task_sid; /* SID of creating task */
62 u32 sid; /* SID of this object */
63 u16 sclass; /* security class of this object */
64 unsigned char initialized; /* initialization flag */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010065 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070066};
67
68struct file_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040069 u32 sid; /* SID of open file description */
70 u32 fown_sid; /* SID of file owner (for SIGIO) */
71 u32 isid; /* SID of inode at the time of file open */
72 u32 pseqno; /* Policy seqno at the time of file open */
Linus Torvalds1da177e2005-04-16 15:20:36 -070073};
74
75struct superblock_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040076 struct super_block *sb; /* back pointer to sb object */
Eric Parisc312feb2006-07-10 04:43:53 -070077 u32 sid; /* SID of file system superblock */
Linus Torvalds1da177e2005-04-16 15:20:36 -070078 u32 def_sid; /* default SID for labeling */
Eric Parisc312feb2006-07-10 04:43:53 -070079 u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
Eric Parisf936c6e2012-10-10 10:38:47 -040080 unsigned short behavior; /* labeling behavior */
Eric Pariscfca0302012-10-09 16:20:08 -040081 unsigned short flags; /* which mount options were specified */
Eric Parisbc7e9822006-09-25 23:32:02 -070082 struct mutex lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070083 struct list_head isec_head;
84 spinlock_t isec_lock;
85};
86
87struct msg_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040088 u32 sid; /* SID of message */
Linus Torvalds1da177e2005-04-16 15:20:36 -070089};
90
91struct ipc_security_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070092 u16 sclass; /* security class of this object */
Eric Parisa936b792008-04-22 17:46:10 -040093 u32 sid; /* SID of IPC resource */
Linus Torvalds1da177e2005-04-16 15:20:36 -070094};
95
Linus Torvalds1da177e2005-04-16 15:20:36 -070096struct netif_security_struct {
Paul Moorecbe0d6e2014-09-10 17:09:57 -040097 struct net *ns; /* network namespace */
Paul Mooree8bfdb92008-01-29 08:38:08 -050098 int ifindex; /* device index */
99 u32 sid; /* SID for this interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700100};
101
Paul Moore224dfbd2008-01-29 08:38:13 -0500102struct netnode_security_struct {
103 union {
104 __be32 ipv4; /* IPv4 node address */
105 struct in6_addr ipv6; /* IPv6 node address */
106 } addr;
107 u32 sid; /* SID for this node */
108 u16 family; /* address family */
109};
110
Paul Moore3e1121722008-04-10 10:48:14 -0400111struct netport_security_struct {
112 u32 sid; /* SID for this node */
113 u16 port; /* port number */
114 u8 protocol; /* transport protocol */
115};
116
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117struct sk_security_struct {
Paul Moore220deb92008-01-29 08:38:23 -0500118#ifdef CONFIG_NETLABEL
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700119 enum { /* NetLabel state */
120 NLBL_UNSET = 0,
121 NLBL_REQUIRE,
122 NLBL_LABELED,
Paul Moore948bf852008-10-10 10:16:32 -0400123 NLBL_REQSKB,
Paul Moore014ab192008-10-10 10:16:33 -0400124 NLBL_CONNLABELED,
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700125 } nlbl_state;
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400126 struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700127#endif
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400128 u32 sid; /* SID of this object */
129 u32 peer_sid; /* SID of peer */
130 u16 sclass; /* sock security class */
Richard Hainesd4529302018-02-13 20:57:18 +0000131 enum { /* SCTP association state */
132 SCTP_ASSOC_UNSET = 0,
133 SCTP_ASSOC_SET,
134 } sctp_assoc_state;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135};
136
Paul Moore5dbbaf22013-01-14 07:12:19 +0000137struct tun_security_struct {
138 u32 sid; /* SID for the tun device sockets */
139};
140
Michael LeMayd7200242006-06-22 14:47:17 -0700141struct key_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -0400142 u32 sid; /* SID of key */
Michael LeMayd7200242006-06-22 14:47:17 -0700143};
144
Daniel Jurgens3a976fa2017-05-19 15:48:56 +0300145struct ib_security_struct {
146 u32 sid; /* SID of the queue pair or MAD agent */
147};
148
Daniel Jurgens409dcf32017-05-19 15:48:59 +0300149struct pkey_security_struct {
150 u64 subnet_prefix; /* Port subnet prefix */
151 u16 pkey; /* PKey number */
152 u32 sid; /* SID of pkey */
153};
154
Chenbo Fengec27c352017-10-18 13:00:25 -0700155struct bpf_security_struct {
156 u32 sid; /*SID of bpf obj creater*/
157};
158
Casey Schauflerbbd36622018-11-12 09:30:56 -0800159extern struct lsm_blob_sizes selinux_blob_sizes;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700160static inline struct task_security_struct *selinux_cred(const struct cred *cred)
161{
Casey Schauflerbbd36622018-11-12 09:30:56 -0800162 return cred->security + selinux_blob_sizes.lbs_cred;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700163}
164
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700165static inline struct file_security_struct *selinux_file(const struct file *file)
166{
Casey Schaufler33bf60c2018-11-12 12:02:49 -0800167 return file->f_security + selinux_blob_sizes.lbs_file;
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700168}
169
Casey Schaufler80788c22018-09-21 17:19:11 -0700170static inline struct inode_security_struct *selinux_inode(
171 const struct inode *inode)
172{
Casey Schauflerafb1cbe32018-09-21 17:19:29 -0700173 if (unlikely(!inode->i_security))
174 return NULL;
175 return inode->i_security + selinux_blob_sizes.lbs_inode;
Casey Schaufler80788c22018-09-21 17:19:11 -0700176}
177
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178#endif /* _SELINUX_OBJSEC_H_ */