objsec.h 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. /* SPDX-License-Identifier: GPL-2.0-only */
  2. /*
  3. * NSA Security-Enhanced Linux (SELinux) security module
  4. *
  5. * This file contains the SELinux security data structures for kernel objects.
  6. *
  7. * Author(s): Stephen Smalley, <[email protected]>
  8. * Chris Vance, <[email protected]>
  9. * Wayne Salamon, <[email protected]>
  10. * James Morris <[email protected]>
  11. *
  12. * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
  13. * Copyright (C) 2003 Red Hat, Inc., James Morris <[email protected]>
  14. * Copyright (C) 2016 Mellanox Technologies
  15. */
  16. #ifndef _SELINUX_OBJSEC_H_
  17. #define _SELINUX_OBJSEC_H_
  18. #include <linux/list.h>
  19. #include <linux/sched.h>
  20. #include <linux/fs.h>
  21. #include <linux/binfmts.h>
  22. #include <linux/in.h>
  23. #include <linux/spinlock.h>
  24. #include <linux/lsm_hooks.h>
  25. #include <linux/msg.h>
  26. #include <net/net_namespace.h>
  27. #include "flask.h"
  28. #include "avc.h"
  29. struct task_security_struct {
  30. u32 osid; /* SID prior to last execve */
  31. u32 sid; /* current SID */
  32. u32 exec_sid; /* exec SID */
  33. u32 create_sid; /* fscreate SID */
  34. u32 keycreate_sid; /* keycreate SID */
  35. u32 sockcreate_sid; /* fscreate SID */
  36. #ifdef CONFIG_KDP_CRED
  37. void *bp_cred;
  38. #endif
  39. } __randomize_layout;
  40. enum label_initialized {
  41. LABEL_INVALID, /* invalid or not initialized */
  42. LABEL_INITIALIZED, /* initialized */
  43. LABEL_PENDING
  44. };
  45. struct inode_security_struct {
  46. struct inode *inode; /* back pointer to inode object */
  47. struct list_head list; /* list of inode_security_struct */
  48. u32 task_sid; /* SID of creating task */
  49. u32 sid; /* SID of this object */
  50. u16 sclass; /* security class of this object */
  51. unsigned char initialized; /* initialization flag */
  52. spinlock_t lock;
  53. };
  54. struct file_security_struct {
  55. u32 sid; /* SID of open file description */
  56. u32 fown_sid; /* SID of file owner (for SIGIO) */
  57. u32 isid; /* SID of inode at the time of file open */
  58. u32 pseqno; /* Policy seqno at the time of file open */
  59. };
  60. struct superblock_security_struct {
  61. u32 sid; /* SID of file system superblock */
  62. u32 def_sid; /* default SID for labeling */
  63. u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
  64. unsigned short behavior; /* labeling behavior */
  65. unsigned short flags; /* which mount options were specified */
  66. struct mutex lock;
  67. struct list_head isec_head;
  68. spinlock_t isec_lock;
  69. };
  70. struct msg_security_struct {
  71. u32 sid; /* SID of message */
  72. };
  73. struct ipc_security_struct {
  74. u16 sclass; /* security class of this object */
  75. u32 sid; /* SID of IPC resource */
  76. };
  77. struct netif_security_struct {
  78. struct net *ns; /* network namespace */
  79. int ifindex; /* device index */
  80. u32 sid; /* SID for this interface */
  81. };
  82. struct netnode_security_struct {
  83. union {
  84. __be32 ipv4; /* IPv4 node address */
  85. struct in6_addr ipv6; /* IPv6 node address */
  86. } addr;
  87. u32 sid; /* SID for this node */
  88. u16 family; /* address family */
  89. };
  90. struct netport_security_struct {
  91. u32 sid; /* SID for this node */
  92. u16 port; /* port number */
  93. u8 protocol; /* transport protocol */
  94. };
  95. struct sk_security_struct {
  96. #ifdef CONFIG_NETLABEL
  97. enum { /* NetLabel state */
  98. NLBL_UNSET = 0,
  99. NLBL_REQUIRE,
  100. NLBL_LABELED,
  101. NLBL_REQSKB,
  102. NLBL_CONNLABELED,
  103. } nlbl_state;
  104. struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
  105. #endif
  106. u32 sid; /* SID of this object */
  107. u32 peer_sid; /* SID of peer */
  108. u16 sclass; /* sock security class */
  109. enum { /* SCTP association state */
  110. SCTP_ASSOC_UNSET = 0,
  111. SCTP_ASSOC_SET,
  112. } sctp_assoc_state;
  113. };
  114. struct tun_security_struct {
  115. u32 sid; /* SID for the tun device sockets */
  116. };
  117. struct key_security_struct {
  118. u32 sid; /* SID of key */
  119. };
  120. struct ib_security_struct {
  121. u32 sid; /* SID of the queue pair or MAD agent */
  122. };
  123. struct pkey_security_struct {
  124. u64 subnet_prefix; /* Port subnet prefix */
  125. u16 pkey; /* PKey number */
  126. u32 sid; /* SID of pkey */
  127. };
  128. struct bpf_security_struct {
  129. u32 sid; /* SID of bpf obj creator */
  130. };
  131. struct perf_event_security_struct {
  132. u32 sid; /* SID of perf_event obj creator */
  133. };
  134. extern struct lsm_blob_sizes selinux_blob_sizes;
  135. static inline struct task_security_struct *selinux_cred(const struct cred *cred)
  136. {
  137. return cred->security + selinux_blob_sizes.lbs_cred;
  138. }
  139. static inline struct file_security_struct *selinux_file(const struct file *file)
  140. {
  141. return file->f_security + selinux_blob_sizes.lbs_file;
  142. }
  143. static inline struct inode_security_struct *selinux_inode(
  144. const struct inode *inode)
  145. {
  146. if (unlikely(!inode->i_security))
  147. return NULL;
  148. return inode->i_security + selinux_blob_sizes.lbs_inode;
  149. }
  150. static inline struct msg_security_struct *selinux_msg_msg(
  151. const struct msg_msg *msg_msg)
  152. {
  153. return msg_msg->security + selinux_blob_sizes.lbs_msg_msg;
  154. }
  155. static inline struct ipc_security_struct *selinux_ipc(
  156. const struct kern_ipc_perm *ipc)
  157. {
  158. return ipc->security + selinux_blob_sizes.lbs_ipc;
  159. }
  160. /*
  161. * get the subjective security ID of the current task
  162. */
  163. static inline u32 current_sid(void)
  164. {
  165. const struct task_security_struct *tsec = selinux_cred(current_cred());
  166. return tsec->sid;
  167. }
  168. static inline struct superblock_security_struct *selinux_superblock(
  169. const struct super_block *superblock)
  170. {
  171. return superblock->s_security + selinux_blob_sizes.lbs_superblock;
  172. }
  173. #endif /* _SELINUX_OBJSEC_H_ */