blob: 330b7b6d44e0af0406840770bf5d4f2030ad4752 [file] [log] [blame]
Thomas Gleixnerd2912cb2019-06-04 10:11:33 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * NSA Security-Enhanced Linux (SELinux) security module
4 *
5 * This file contains the SELinux security data structures for kernel objects.
6 *
Stephen Smalley7efbb602017-08-17 13:32:36 -04007 * Author(s): Stephen Smalley, <[email protected]>
Eric Parisa936b792008-04-22 17:46:10 -04008 * Chris Vance, <[email protected]>
9 * Wayne Salamon, <[email protected]>
10 * James Morris <[email protected]>
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 *
12 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
13 * Copyright (C) 2003 Red Hat, Inc., James Morris <[email protected]>
Daniel Jurgens3a976fa2017-05-19 15:48:56 +030014 * Copyright (C) 2016 Mellanox Technologies
Linus Torvalds1da177e2005-04-16 15:20:36 -070015 */
16#ifndef _SELINUX_OBJSEC_H_
17#define _SELINUX_OBJSEC_H_
18
19#include <linux/list.h>
20#include <linux/sched.h>
21#include <linux/fs.h>
22#include <linux/binfmts.h>
23#include <linux/in.h>
Paul Moore9f2ad662006-11-17 17:38:53 -050024#include <linux/spinlock.h>
Casey Schauflerbbd36622018-11-12 09:30:56 -080025#include <linux/lsm_hooks.h>
Casey Schaufler7c653822018-09-21 17:19:45 -070026#include <linux/msg.h>
Paul Moorecbe0d6e2014-09-10 17:09:57 -040027#include <net/net_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include "flask.h"
29#include "avc.h"
30
31struct task_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040032 u32 osid; /* SID prior to last execve */
33 u32 sid; /* current SID */
34 u32 exec_sid; /* exec SID */
35 u32 create_sid; /* fscreate SID */
36 u32 keycreate_sid; /* keycreate SID */
37 u32 sockcreate_sid; /* fscreate SID */
Stephen Smalley5c108d42019-12-13 15:28:38 -050038} __randomize_layout;
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050040enum label_initialized {
Paul Moore4b57d6b2016-03-28 15:16:53 -040041 LABEL_INVALID, /* invalid or not initialized */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010042 LABEL_INITIALIZED, /* initialized */
43 LABEL_PENDING
Andreas Gruenbacher6f3be9f2015-12-24 11:09:40 -050044};
45
Linus Torvalds1da177e2005-04-16 15:20:36 -070046struct inode_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040047 struct inode *inode; /* back pointer to inode object */
Casey Schauflerafb1cbe32018-09-21 17:19:29 -070048 struct list_head list; /* list of inode_security_struct */
Eric Parisa936b792008-04-22 17:46:10 -040049 u32 task_sid; /* SID of creating task */
50 u32 sid; /* SID of this object */
51 u16 sclass; /* security class of this object */
52 unsigned char initialized; /* initialization flag */
Andreas Gruenbacher9287aed2016-11-15 11:06:40 +010053 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070054};
55
56struct file_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040057 u32 sid; /* SID of open file description */
58 u32 fown_sid; /* SID of file owner (for SIGIO) */
59 u32 isid; /* SID of inode at the time of file open */
60 u32 pseqno; /* Policy seqno at the time of file open */
Linus Torvalds1da177e2005-04-16 15:20:36 -070061};
62
63struct superblock_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040064 struct super_block *sb; /* back pointer to sb object */
Eric Parisc312feb2006-07-10 04:43:53 -070065 u32 sid; /* SID of file system superblock */
Linus Torvalds1da177e2005-04-16 15:20:36 -070066 u32 def_sid; /* default SID for labeling */
Eric Parisc312feb2006-07-10 04:43:53 -070067 u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */
Eric Parisf936c6e2012-10-10 10:38:47 -040068 unsigned short behavior; /* labeling behavior */
Eric Pariscfca0302012-10-09 16:20:08 -040069 unsigned short flags; /* which mount options were specified */
Eric Parisbc7e9822006-09-25 23:32:02 -070070 struct mutex lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070071 struct list_head isec_head;
72 spinlock_t isec_lock;
73};
74
75struct msg_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -040076 u32 sid; /* SID of message */
Linus Torvalds1da177e2005-04-16 15:20:36 -070077};
78
79struct ipc_security_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070080 u16 sclass; /* security class of this object */
Eric Parisa936b792008-04-22 17:46:10 -040081 u32 sid; /* SID of IPC resource */
Linus Torvalds1da177e2005-04-16 15:20:36 -070082};
83
Linus Torvalds1da177e2005-04-16 15:20:36 -070084struct netif_security_struct {
Paul Moorecbe0d6e2014-09-10 17:09:57 -040085 struct net *ns; /* network namespace */
Paul Mooree8bfdb92008-01-29 08:38:08 -050086 int ifindex; /* device index */
87 u32 sid; /* SID for this interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -070088};
89
Paul Moore224dfbd2008-01-29 08:38:13 -050090struct netnode_security_struct {
91 union {
92 __be32 ipv4; /* IPv4 node address */
93 struct in6_addr ipv6; /* IPv6 node address */
94 } addr;
95 u32 sid; /* SID for this node */
96 u16 family; /* address family */
97};
98
Paul Moore3e1121722008-04-10 10:48:14 -040099struct netport_security_struct {
100 u32 sid; /* SID for this node */
101 u16 port; /* port number */
102 u8 protocol; /* transport protocol */
103};
104
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105struct sk_security_struct {
Paul Moore220deb92008-01-29 08:38:23 -0500106#ifdef CONFIG_NETLABEL
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700107 enum { /* NetLabel state */
108 NLBL_UNSET = 0,
109 NLBL_REQUIRE,
110 NLBL_LABELED,
Paul Moore948bf852008-10-10 10:16:32 -0400111 NLBL_REQSKB,
Paul Moore014ab192008-10-10 10:16:33 -0400112 NLBL_CONNLABELED,
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700113 } nlbl_state;
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400114 struct netlbl_lsm_secattr *nlbl_secattr; /* NetLabel sec attributes */
Venkat Yekkirala7420ed22006-08-04 23:17:57 -0700115#endif
Paul Moore6c5b3fc2008-10-10 10:16:33 -0400116 u32 sid; /* SID of this object */
117 u32 peer_sid; /* SID of peer */
118 u16 sclass; /* sock security class */
Richard Hainesd452930f2018-02-13 20:57:18 +0000119 enum { /* SCTP association state */
120 SCTP_ASSOC_UNSET = 0,
121 SCTP_ASSOC_SET,
122 } sctp_assoc_state;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123};
124
Paul Moore5dbbaf22013-01-14 07:12:19 +0000125struct tun_security_struct {
126 u32 sid; /* SID for the tun device sockets */
127};
128
Michael LeMayd7200242006-06-22 14:47:17 -0700129struct key_security_struct {
Eric Parisa936b792008-04-22 17:46:10 -0400130 u32 sid; /* SID of key */
Michael LeMayd7200242006-06-22 14:47:17 -0700131};
132
Daniel Jurgens3a976fa2017-05-19 15:48:56 +0300133struct ib_security_struct {
134 u32 sid; /* SID of the queue pair or MAD agent */
135};
136
Daniel Jurgens409dcf32017-05-19 15:48:59 +0300137struct pkey_security_struct {
138 u64 subnet_prefix; /* Port subnet prefix */
139 u16 pkey; /* PKey number */
140 u32 sid; /* SID of pkey */
141};
142
Chenbo Fengec27c352017-10-18 13:00:25 -0700143struct bpf_security_struct {
Joel Fernandes (Google)da97e182019-10-14 13:03:08 -0400144 u32 sid; /* SID of bpf obj creator */
145};
146
147struct perf_event_security_struct {
148 u32 sid; /* SID of perf_event obj creator */
Chenbo Fengec27c352017-10-18 13:00:25 -0700149};
150
Casey Schauflerbbd36622018-11-12 09:30:56 -0800151extern struct lsm_blob_sizes selinux_blob_sizes;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700152static inline struct task_security_struct *selinux_cred(const struct cred *cred)
153{
Casey Schauflerbbd36622018-11-12 09:30:56 -0800154 return cred->security + selinux_blob_sizes.lbs_cred;
Casey Schaufler0c6cfa62018-09-21 17:17:16 -0700155}
156
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700157static inline struct file_security_struct *selinux_file(const struct file *file)
158{
Casey Schaufler33bf60c2018-11-12 12:02:49 -0800159 return file->f_security + selinux_blob_sizes.lbs_file;
Casey Schauflerbb6c6b02018-09-21 17:22:32 -0700160}
161
Casey Schaufler80788c22018-09-21 17:19:11 -0700162static inline struct inode_security_struct *selinux_inode(
163 const struct inode *inode)
164{
Casey Schauflerafb1cbe32018-09-21 17:19:29 -0700165 if (unlikely(!inode->i_security))
166 return NULL;
167 return inode->i_security + selinux_blob_sizes.lbs_inode;
Casey Schaufler80788c22018-09-21 17:19:11 -0700168}
169
Casey Schaufler7c653822018-09-21 17:19:45 -0700170static inline struct msg_security_struct *selinux_msg_msg(
171 const struct msg_msg *msg_msg)
172{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800173 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg;
Casey Schaufler7c653822018-09-21 17:19:45 -0700174}
175
176static inline struct ipc_security_struct *selinux_ipc(
177 const struct kern_ipc_perm *ipc)
178{
Casey Schauflerecd5f822018-11-20 11:55:02 -0800179 return ipc->security + selinux_blob_sizes.lbs_ipc;
Casey Schaufler7c653822018-09-21 17:19:45 -0700180}
181
Stephen Smalley169ce0c2019-09-04 10:32:48 -0400182/*
183 * get the subjective security ID of the current task
184 */
185static inline u32 current_sid(void)
186{
187 const struct task_security_struct *tsec = selinux_cred(current_cred());
188
189 return tsec->sid;
190}
191
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192#endif /* _SELINUX_OBJSEC_H_ */