security.h 11.5 KB
Newer Older
1
/* SPDX-License-Identifier: GPL-2.0 */
L
Linus Torvalds 已提交
2 3 4
/*
 * Security server interface.
 *
5
 * Author : Stephen Smalley, <sds@tycho.nsa.gov>
L
Linus Torvalds 已提交
6 7 8 9 10 11
 *
 */

#ifndef _SELINUX_SECURITY_H_
#define _SELINUX_SECURITY_H_

12
#include <linux/compiler.h>
13
#include <linux/dcache.h>
14
#include <linux/magic.h>
15
#include <linux/types.h>
16 17
#include <linux/refcount.h>
#include <linux/workqueue.h>
L
Linus Torvalds 已提交
18 19 20 21 22 23 24 25 26 27 28 29 30
#include "flask.h"

#define SECSID_NULL			0x00000000 /* unspecified SID */
#define SECSID_WILD			0xffffffff /* wildcard SID */
#define SECCLASS_NULL			0x0000 /* no class */

/* Identify specific policy version changes */
#define POLICYDB_VERSION_BASE		15
#define POLICYDB_VERSION_BOOL		16
#define POLICYDB_VERSION_IPV6		17
#define POLICYDB_VERSION_NLCLASS	18
#define POLICYDB_VERSION_VALIDATETRANS	19
#define POLICYDB_VERSION_MLS		19
31
#define POLICYDB_VERSION_AVTAB		20
32
#define POLICYDB_VERSION_RANGETRANS	21
33
#define POLICYDB_VERSION_POLCAP		22
E
Eric Paris 已提交
34
#define POLICYDB_VERSION_PERMISSIVE	23
35
#define POLICYDB_VERSION_BOUNDARY	24
36
#define POLICYDB_VERSION_FILENAME_TRANS	25
37
#define POLICYDB_VERSION_ROLETRANS	26
38
#define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS	27
39
#define POLICYDB_VERSION_DEFAULT_TYPE	28
40
#define POLICYDB_VERSION_CONSTRAINT_NAMES	29
41
#define POLICYDB_VERSION_XPERMS_IOCTL	30
42
#define POLICYDB_VERSION_INFINIBAND		31
L
Linus Torvalds 已提交
43 44 45

/* Range of policy versions we understand*/
#define POLICYDB_VERSION_MIN   POLICYDB_VERSION_BASE
46
#define POLICYDB_VERSION_MAX   POLICYDB_VERSION_INFINIBAND
L
Linus Torvalds 已提交
47

48 49 50
/* Mask for just the mount related flags */
#define SE_MNTMASK	0x0f
/* Super block security struct flags for mount options */
51
/* BE CAREFUL, these need to be the low order bits for selinux_get_mnt_opts */
52 53 54 55
#define CONTEXT_MNT	0x01
#define FSCONTEXT_MNT	0x02
#define ROOTCONTEXT_MNT	0x04
#define DEFCONTEXT_MNT	0x08
56
#define SBLABEL_MNT	0x10
57
/* Non-mount related flags */
58 59
#define SE_SBINITIALIZED	0x0100
#define SE_SBPROC		0x0200
60
#define SE_SBGENFS		0x0400
61

62 63 64 65
#define CONTEXT_STR	"context="
#define FSCONTEXT_STR	"fscontext="
#define ROOTCONTEXT_STR	"rootcontext="
#define DEFCONTEXT_STR	"defcontext="
66
#define LABELSUPP_STR "seclabel"
67

68
struct netlbl_lsm_secattr;
69

L
Linus Torvalds 已提交
70 71
extern int selinux_enabled;

72 73 74
/* Policy capabilities */
enum {
	POLICYDB_CAPABILITY_NETPEER,
E
Eric Paris 已提交
75
	POLICYDB_CAPABILITY_OPENPERM,
76
	POLICYDB_CAPABILITY_EXTSOCKCLASS,
77
	POLICYDB_CAPABILITY_ALWAYSNETWORK,
78
	POLICYDB_CAPABILITY_CGROUPSECLABEL,
79
	POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION,
80 81 82 83
	__POLICYDB_CAPABILITY_MAX
};
#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)

84
extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
85

86 87 88 89 90 91 92 93 94 95
/*
 * type_datum properties
 * available at the kernel policy version >= POLICYDB_VERSION_BOUNDARY
 */
#define TYPEDATUM_PROPERTY_PRIMARY	0x0001
#define TYPEDATUM_PROPERTY_ATTRIBUTE	0x0002

/* limitation of boundary depth  */
#define POLICYDB_BOUNDS_MAXDEPTH	4

S
Stephen Smalley 已提交
96
struct selinux_avc;
97 98 99 100 101 102 103 104 105 106
struct selinux_ss;

struct selinux_state {
	bool disabled;
#ifdef CONFIG_SECURITY_SELINUX_DEVELOP
	bool enforcing;
#endif
	bool checkreqprot;
	bool initialized;
	bool policycap[__POLICYDB_CAPABILITY_MAX];
S
Stephen Smalley 已提交
107
	struct selinux_avc *avc;
108 109 110 111
	struct selinux_ss *ss;
};

void selinux_ss_init(struct selinux_ss **ss);
S
Stephen Smalley 已提交
112
void selinux_avc_init(struct selinux_avc **avc);
113 114 115 116

extern struct selinux_state selinux_state;

#ifdef CONFIG_SECURITY_SELINUX_DEVELOP
117
static inline bool enforcing_enabled(struct selinux_state *state)
118 119 120 121
{
	return state->enforcing;
}

122
static inline void enforcing_set(struct selinux_state *state, bool value)
123 124 125 126
{
	state->enforcing = value;
}
#else
127
static inline bool enforcing_enabled(struct selinux_state *state)
128 129 130 131
{
	return true;
}

132
static inline void enforcing_set(struct selinux_state *state, bool value)
133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149
{
}
#endif

static inline bool selinux_policycap_netpeer(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_NETPEER];
}

static inline bool selinux_policycap_openperm(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_OPENPERM];
}
150

151 152 153 154 155 156
static inline bool selinux_policycap_extsockclass(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS];
}
L
Linus Torvalds 已提交
157

158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187
static inline bool selinux_policycap_alwaysnetwork(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK];
}

static inline bool selinux_policycap_cgroupseclabel(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL];
}

static inline bool selinux_policycap_nnp_nosuid_transition(void)
{
	struct selinux_state *state = &selinux_state;

	return state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION];
}

int security_mls_enabled(struct selinux_state *state);
int security_load_policy(struct selinux_state *state,
			 void *data, size_t len);
int security_read_policy(struct selinux_state *state,
			 void **data, size_t *len);
size_t security_policydb_len(struct selinux_state *state);

int security_policycap_supported(struct selinux_state *state,
				 unsigned int req_cap);
188

189
#define SEL_VEC_MAX 32
L
Linus Torvalds 已提交
190 191 192 193 194
struct av_decision {
	u32 allowed;
	u32 auditallow;
	u32 auditdeny;
	u32 seqno;
195
	u32 flags;
L
Linus Torvalds 已提交
196 197
};

198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220
#define XPERMS_ALLOWED 1
#define XPERMS_AUDITALLOW 2
#define XPERMS_DONTAUDIT 4

#define security_xperm_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f))
#define security_xperm_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f)))
struct extended_perms_data {
	u32 p[8];
};

struct extended_perms_decision {
	u8 used;
	u8 driver;
	struct extended_perms_data *allowed;
	struct extended_perms_data *auditallow;
	struct extended_perms_data *dontaudit;
};

struct extended_perms {
	u16 len;	/* length associated decision chain */
	struct extended_perms_data drivers; /* flag drivers that are used */
};

221 222
/* definitions of av_decision.flags */
#define AVD_FLAGS_PERMISSIVE	0x0001
E
Eric Paris 已提交
223

224 225
void security_compute_av(struct selinux_state *state,
			 u32 ssid, u32 tsid,
226 227 228
			 u16 tclass, struct av_decision *avd,
			 struct extended_perms *xperms);

229 230 231 232
void security_compute_xperms_decision(struct selinux_state *state,
				      u32 ssid, u32 tsid, u16 tclass,
				      u8 driver,
				      struct extended_perms_decision *xpermd);
233

234 235 236
void security_compute_av_user(struct selinux_state *state,
			      u32 ssid, u32 tsid,
			      u16 tclass, struct av_decision *avd);
L
Linus Torvalds 已提交
237

238 239
int security_transition_sid(struct selinux_state *state,
			    u32 ssid, u32 tsid, u16 tclass,
240
			    const struct qstr *qstr, u32 *out_sid);
241

242 243
int security_transition_sid_user(struct selinux_state *state,
				 u32 ssid, u32 tsid, u16 tclass,
244
				 const char *objname, u32 *out_sid);
L
Linus Torvalds 已提交
245

246 247
int security_member_sid(struct selinux_state *state, u32 ssid, u32 tsid,
			u16 tclass, u32 *out_sid);
L
Linus Torvalds 已提交
248

249 250
int security_change_sid(struct selinux_state *state, u32 ssid, u32 tsid,
			u16 tclass, u32 *out_sid);
L
Linus Torvalds 已提交
251

252 253
int security_sid_to_context(struct selinux_state *state, u32 sid,
			    char **scontext, u32 *scontext_len);
L
Linus Torvalds 已提交
254

255 256
int security_sid_to_context_force(struct selinux_state *state,
				  u32 sid, char **scontext, u32 *scontext_len);
257

258 259
int security_context_to_sid(struct selinux_state *state,
			    const char *scontext, u32 scontext_len,
260
			    u32 *out_sid, gfp_t gfp);
L
Linus Torvalds 已提交
261

262 263
int security_context_str_to_sid(struct selinux_state *state,
				const char *scontext, u32 *out_sid, gfp_t gfp);
264

265 266
int security_context_to_sid_default(struct selinux_state *state,
				    const char *scontext, u32 scontext_len,
267
				    u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
268

269 270
int security_context_to_sid_force(struct selinux_state *state,
				  const char *scontext, u32 scontext_len,
271 272
				  u32 *sid);

273 274
int security_get_user_sids(struct selinux_state *state,
			   u32 callsid, char *username,
L
Linus Torvalds 已提交
275 276
			   u32 **sids, u32 *nel);

277 278
int security_port_sid(struct selinux_state *state,
		      u8 protocol, u16 port, u32 *out_sid);
L
Linus Torvalds 已提交
279

280 281
int security_ib_pkey_sid(struct selinux_state *state,
			 u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
282

283 284
int security_ib_endport_sid(struct selinux_state *state,
			    const char *dev_name, u8 port_num, u32 *out_sid);
285

286 287
int security_netif_sid(struct selinux_state *state,
		       char *name, u32 *if_sid);
L
Linus Torvalds 已提交
288

289 290 291
int security_node_sid(struct selinux_state *state,
		      u16 domain, void *addr, u32 addrlen,
		      u32 *out_sid);
L
Linus Torvalds 已提交
292

293 294
int security_validate_transition(struct selinux_state *state,
				 u32 oldsid, u32 newsid, u32 tasksid,
295
				 u16 tclass);
L
Linus Torvalds 已提交
296

297 298
int security_validate_transition_user(struct selinux_state *state,
				      u32 oldsid, u32 newsid, u32 tasksid,
299 300
				      u16 tclass);

301 302
int security_bounded_transition(struct selinux_state *state,
				u32 oldsid, u32 newsid);
303

304 305
int security_sid_mls_copy(struct selinux_state *state,
			  u32 sid, u32 mls_sid, u32 *new_sid);
306

307 308
int security_net_peersid_resolve(struct selinux_state *state,
				 u32 nlbl_sid, u32 nlbl_type,
309 310 311
				 u32 xfrm_sid,
				 u32 *peer_sid);

312 313 314 315 316 317
int security_get_classes(struct selinux_state *state,
			 char ***classes, int *nclasses);
int security_get_permissions(struct selinux_state *state,
			     char *class, char ***perms, int *nperms);
int security_get_reject_unknown(struct selinux_state *state);
int security_get_allow_unknown(struct selinux_state *state);
318

L
Linus Torvalds 已提交
319 320 321 322 323 324
#define SECURITY_FS_USE_XATTR		1 /* use xattr */
#define SECURITY_FS_USE_TRANS		2 /* use transition SIDs, e.g. devpts/tmpfs */
#define SECURITY_FS_USE_TASK		3 /* use task SIDs, e.g. pipefs/sockfs */
#define SECURITY_FS_USE_GENFS		4 /* use the genfs support */
#define SECURITY_FS_USE_NONE		5 /* no labeling support */
#define SECURITY_FS_USE_MNTPOINT	6 /* use mountpoint labeling */
325 326
#define SECURITY_FS_USE_NATIVE		7 /* use native label support */
#define SECURITY_FS_USE_MAX		7 /* Highest SECURITY_FS_USE_XXX */
L
Linus Torvalds 已提交
327

328
int security_fs_use(struct selinux_state *state, struct super_block *sb);
L
Linus Torvalds 已提交
329

330 331 332
int security_genfs_sid(struct selinux_state *state,
		       const char *fstype, char *name, u16 sclass,
		       u32 *sid);
L
Linus Torvalds 已提交
333

334
#ifdef CONFIG_NETLABEL
335 336
int security_netlbl_secattr_to_sid(struct selinux_state *state,
				   struct netlbl_lsm_secattr *secattr,
337 338
				   u32 *sid);

339 340
int security_netlbl_sid_to_secattr(struct selinux_state *state,
				   u32 sid,
341 342
				   struct netlbl_lsm_secattr *secattr);
#else
343
static inline int security_netlbl_secattr_to_sid(struct selinux_state *state,
344 345 346 347 348 349
					    struct netlbl_lsm_secattr *secattr,
					    u32 *sid)
{
	return -EIDRM;
}

350 351 352
static inline int security_netlbl_sid_to_secattr(struct selinux_state *state,
					 u32 sid,
					 struct netlbl_lsm_secattr *secattr)
353 354 355 356 357
{
	return -ENOENT;
}
#endif /* CONFIG_NETLABEL */

358 359
const char *security_get_initial_sid_context(u32 sid);

360 361 362
/*
 * status notifier using mmap interface
 */
363
extern struct page *selinux_kernel_status_page(struct selinux_state *state);
364 365

#define SELINUX_KERNEL_STATUS_VERSION	1
366
struct selinux_kernel_status {
367 368 369 370 371 372 373 374
	u32	version;	/* version number of thie structure */
	u32	sequence;	/* sequence number of seqlock logic */
	u32	enforcing;	/* current setting of enforcing mode */
	u32	policyload;	/* times of policy reloaded */
	u32	deny_unknown;	/* current setting of deny_unknown */
	/*
	 * The version > 0 supports above members.
	 */
375
} __packed;
376

377 378 379 380
extern void selinux_status_update_setenforce(struct selinux_state *state,
					     int enforcing);
extern void selinux_status_update_policyload(struct selinux_state *state,
					     int seqno);
381
extern void selinux_complete_init(void);
382
extern int selinux_disable(struct selinux_state *state);
383
extern void exit_sel_fs(void);
384
extern struct path selinux_null;
385
extern struct vfsmount *selinuxfs_mount;
386 387 388
extern void selnl_notify_setenforce(int val);
extern void selnl_notify_policyload(u32 seqno);
extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
389

390 391 392
extern void avtab_cache_init(void);
extern void ebitmap_cache_init(void);
extern void hashtab_cache_init(void);
L
Linus Torvalds 已提交
393

394
#endif /* _SELINUX_SECURITY_H_ */