xref: /linux/security/selinux/include/objsec.h (revision bc7e982b84aceef0a040c88ff659eb5c83818f72)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *  NSA Security-Enhanced Linux (SELinux) security module
31da177e4SLinus Torvalds  *
41da177e4SLinus Torvalds  *  This file contains the SELinux security data structures for kernel objects.
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *  Author(s):  Stephen Smalley, <sds@epoch.ncsc.mil>
71da177e4SLinus Torvalds  *              Chris Vance, <cvance@nai.com>
81da177e4SLinus Torvalds  *              Wayne Salamon, <wsalamon@nai.com>
91da177e4SLinus Torvalds  *              James Morris <jmorris@redhat.com>
101da177e4SLinus Torvalds  *
111da177e4SLinus Torvalds  *  Copyright (C) 2001,2002 Networks Associates Technology, Inc.
121da177e4SLinus Torvalds  *  Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
131da177e4SLinus Torvalds  *
141da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
151da177e4SLinus Torvalds  *	it under the terms of the GNU General Public License version 2,
161da177e4SLinus Torvalds  *      as published by the Free Software Foundation.
171da177e4SLinus Torvalds  */
181da177e4SLinus Torvalds #ifndef _SELINUX_OBJSEC_H_
191da177e4SLinus Torvalds #define _SELINUX_OBJSEC_H_
201da177e4SLinus Torvalds 
211da177e4SLinus Torvalds #include <linux/list.h>
221da177e4SLinus Torvalds #include <linux/sched.h>
231da177e4SLinus Torvalds #include <linux/fs.h>
241da177e4SLinus Torvalds #include <linux/binfmts.h>
251da177e4SLinus Torvalds #include <linux/in.h>
261da177e4SLinus Torvalds #include "flask.h"
271da177e4SLinus Torvalds #include "avc.h"
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds struct task_security_struct {
301da177e4SLinus Torvalds 	struct task_struct *task;      /* back pointer to task object */
311da177e4SLinus Torvalds 	u32 osid;            /* SID prior to last execve */
321da177e4SLinus Torvalds 	u32 sid;             /* current SID */
331da177e4SLinus Torvalds 	u32 exec_sid;        /* exec SID */
341da177e4SLinus Torvalds 	u32 create_sid;      /* fscreate SID */
354eb582cfSMichael LeMay 	u32 keycreate_sid;   /* keycreate SID */
3642c3e03eSEric Paris 	u32 sockcreate_sid;  /* fscreate SID */
371da177e4SLinus Torvalds 	u32 ptrace_sid;      /* SID of ptrace parent */
381da177e4SLinus Torvalds };
391da177e4SLinus Torvalds 
401da177e4SLinus Torvalds struct inode_security_struct {
411da177e4SLinus Torvalds         struct inode *inode;           /* back pointer to inode object */
421da177e4SLinus Torvalds 	struct list_head list;         /* list of inode_security_struct */
431da177e4SLinus Torvalds 	u32 task_sid;        /* SID of creating task */
441da177e4SLinus Torvalds 	u32 sid;             /* SID of this object */
451da177e4SLinus Torvalds 	u16 sclass;       /* security class of this object */
461da177e4SLinus Torvalds 	unsigned char initialized;     /* initialization flag */
4723970741SEric Paris 	struct mutex lock;
481da177e4SLinus Torvalds 	unsigned char inherit;         /* inherit SID from parent entry */
491da177e4SLinus Torvalds };
501da177e4SLinus Torvalds 
511da177e4SLinus Torvalds struct file_security_struct {
521da177e4SLinus Torvalds 	struct file *file;              /* back pointer to file object */
531da177e4SLinus Torvalds 	u32 sid;              /* SID of open file description */
541da177e4SLinus Torvalds 	u32 fown_sid;         /* SID of file owner (for SIGIO) */
551da177e4SLinus Torvalds };
561da177e4SLinus Torvalds 
571da177e4SLinus Torvalds struct superblock_security_struct {
581da177e4SLinus Torvalds 	struct super_block *sb;         /* back pointer to sb object */
591da177e4SLinus Torvalds 	struct list_head list;          /* list of superblock_security_struct */
60c312feb2SEric Paris 	u32 sid;			/* SID of file system superblock */
611da177e4SLinus Torvalds 	u32 def_sid;			/* default SID for labeling */
62c312feb2SEric Paris 	u32 mntpoint_sid;		/* SECURITY_FS_USE_MNTPOINT context for files */
631da177e4SLinus Torvalds 	unsigned int behavior;          /* labeling behavior */
641da177e4SLinus Torvalds 	unsigned char initialized;      /* initialization flag */
651da177e4SLinus Torvalds 	unsigned char proc;             /* proc fs */
66*bc7e982bSEric Paris 	struct mutex lock;
671da177e4SLinus Torvalds 	struct list_head isec_head;
681da177e4SLinus Torvalds 	spinlock_t isec_lock;
691da177e4SLinus Torvalds };
701da177e4SLinus Torvalds 
711da177e4SLinus Torvalds struct msg_security_struct {
721da177e4SLinus Torvalds 	struct msg_msg *msg;		/* back pointer */
731da177e4SLinus Torvalds 	u32 sid;              /* SID of message */
741da177e4SLinus Torvalds };
751da177e4SLinus Torvalds 
761da177e4SLinus Torvalds struct ipc_security_struct {
771da177e4SLinus Torvalds 	struct kern_ipc_perm *ipc_perm; /* back pointer */
781da177e4SLinus Torvalds 	u16 sclass;	/* security class of this object */
791da177e4SLinus Torvalds 	u32 sid;              /* SID of IPC resource */
801da177e4SLinus Torvalds };
811da177e4SLinus Torvalds 
821da177e4SLinus Torvalds struct bprm_security_struct {
831da177e4SLinus Torvalds 	struct linux_binprm *bprm;     /* back pointer to bprm object */
841da177e4SLinus Torvalds 	u32 sid;                       /* SID for transformed process */
851da177e4SLinus Torvalds 	unsigned char set;
861da177e4SLinus Torvalds 
871da177e4SLinus Torvalds 	/*
881da177e4SLinus Torvalds 	 * unsafe is used to share failure information from bprm_apply_creds()
891da177e4SLinus Torvalds 	 * to bprm_post_apply_creds().
901da177e4SLinus Torvalds 	 */
911da177e4SLinus Torvalds 	char unsafe;
921da177e4SLinus Torvalds };
931da177e4SLinus Torvalds 
941da177e4SLinus Torvalds struct netif_security_struct {
951da177e4SLinus Torvalds 	struct net_device *dev;		/* back pointer */
961da177e4SLinus Torvalds 	u32 if_sid;			/* SID for this interface */
971da177e4SLinus Torvalds 	u32 msg_sid;			/* default SID for messages received on this interface */
981da177e4SLinus Torvalds };
991da177e4SLinus Torvalds 
1001da177e4SLinus Torvalds struct sk_security_struct {
1011da177e4SLinus Torvalds 	struct sock *sk;		/* back pointer to sk object */
102892c141eSVenkat Yekkirala 	u32 sid;			/* SID of this object */
1031da177e4SLinus Torvalds 	u32 peer_sid;			/* SID of peer */
1047420ed23SVenkat Yekkirala #ifdef CONFIG_NETLABEL
1057420ed23SVenkat Yekkirala 	u16 sclass;			/* sock security class */
1067420ed23SVenkat Yekkirala 	enum {				/* NetLabel state */
1077420ed23SVenkat Yekkirala 		NLBL_UNSET = 0,
1087420ed23SVenkat Yekkirala 		NLBL_REQUIRE,
1097420ed23SVenkat Yekkirala 		NLBL_LABELED,
1107420ed23SVenkat Yekkirala 	} nlbl_state;
1117420ed23SVenkat Yekkirala #endif
1121da177e4SLinus Torvalds };
1131da177e4SLinus Torvalds 
114d720024eSMichael LeMay struct key_security_struct {
115d720024eSMichael LeMay 	struct key *obj; /* back pointer */
116d720024eSMichael LeMay 	u32 sid;         /* SID of key */
117d720024eSMichael LeMay };
118d720024eSMichael LeMay 
1191da177e4SLinus Torvalds extern unsigned int selinux_checkreqprot;
1201da177e4SLinus Torvalds 
1211da177e4SLinus Torvalds #endif /* _SELINUX_OBJSEC_H_ */
122