11da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/*
21da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Security server interface.
31da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds *
41da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Author : Stephen Smalley, <sds@epoch.ncsc.mil>
51da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds *
61da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds */
71da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
81da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#ifndef _SELINUX_SECURITY_H_
91da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define _SELINUX_SECURITY_H_
101da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
114bb9398300a3a2c691e5c0ad6b9cfa78775e767eGideon Israel Dsouza#include <linux/compiler.h>
12652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris#include <linux/dcache.h>
1375834fc3b6fcff00327f5d2a18760c1e8e0179c5Eric Paris#include <linux/magic.h>
142606fd1fa5710205b23ee859563502aa18362447Eric Paris#include <linux/types.h>
151da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#include "flask.h"
161da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
171da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_NULL			0x00000000 /* unspecified SID */
181da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_WILD			0xffffffff /* wildcard SID */
191da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECCLASS_NULL			0x0000 /* no class */
201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
211da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Identify specific policy version changes */
221da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BASE		15
231da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BOOL		16
241da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_IPV6		17
251da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_NLCLASS	18
261da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_VALIDATETRANS	19
271da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MLS		19
28782ebb992ec20b5afdd5786ee8c2f1b58b631f24Stephen Smalley#define POLICYDB_VERSION_AVTAB		20
29f3f8771420737004da55159c2f2dc0b6f483a4efDarrel Goeddel#define POLICYDB_VERSION_RANGETRANS	21
303bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_VERSION_POLCAP		22
3164dbf07474d011540ca479a2e87fe998f570d6e3Eric Paris#define POLICYDB_VERSION_PERMISSIVE	23
32d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define POLICYDB_VERSION_BOUNDARY	24
33652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris#define POLICYDB_VERSION_FILENAME_TRANS	25
348023976cf4627d9f1d82ad468ec40e32eb87d211Harry Ciao#define POLICYDB_VERSION_ROLETRANS	26
35aa893269de6277b44be88e25dcd5331c934c29c4Eric Paris#define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS	27
36eed7795d0a2c9b2e934afc088e903fa2c17b7958Eric Paris#define POLICYDB_VERSION_DEFAULT_TYPE	28
37a660bec1d84ad19a39e380af129e207b3b8f609eRichard Haines#define POLICYDB_VERSION_CONSTRAINT_NAMES	29
38ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define POLICYDB_VERSION_IOCTL_OPERATIONS	30
391da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
401da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Range of policy versions we understand*/
411da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MIN   POLICYDB_VERSION_BASE
42016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
43016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#define POLICYDB_VERSION_MAX	CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
44016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#else
45ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define POLICYDB_VERSION_MAX	POLICYDB_VERSION_IOCTL_OPERATIONS
46016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#endif
471da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
480d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Mask for just the mount related flags */
490d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley#define SE_MNTMASK	0x0f
500d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Super block security struct flags for mount options */
51cfca0303da0e2c3f570cb5cfc7c373828e6c13a2Eric Paris/* BE CAREFUL, these need to be the low order bits for selinux_get_mnt_opts */
52e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define CONTEXT_MNT	0x01
53e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define FSCONTEXT_MNT	0x02
54e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define ROOTCONTEXT_MNT	0x04
55e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define DEFCONTEXT_MNT	0x08
56cfca0303da0e2c3f570cb5cfc7c373828e6c13a2Eric Paris#define SBLABEL_MNT	0x10
570d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Non-mount related flags */
58cfca0303da0e2c3f570cb5cfc7c373828e6c13a2Eric Paris#define SE_SBINITIALIZED	0x0100
59cfca0303da0e2c3f570cb5cfc7c373828e6c13a2Eric Paris#define SE_SBPROC		0x0200
600374990a32aee718d74431a108559ae67fa217f5Stephen Smalley#define SE_SBGENFS		0x0400
61e0007529893c1c064be90bd21422ca0da4a0198eEric Paris
62832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define CONTEXT_STR	"context="
63832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define FSCONTEXT_STR	"fscontext="
64832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define ROOTCONTEXT_STR	"rootcontext="
65832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define DEFCONTEXT_STR	"defcontext="
6611689d47f0957121920c9ec646eb5d838755853aDavid P. Quigley#define LABELSUPP_STR "seclabel"
67832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris
685778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestruct netlbl_lsm_secattr;
69bb22f58087fdf8b617803c9b65bc86c6d26b5115James Morris
701da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsextern int selinux_enabled;
711da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
723bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore/* Policy capabilities */
733bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreenum {
743bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore	POLICYDB_CAPABILITY_NETPEER,
75b0c636b99997c8594da6a46e166ce4fcf6956fdaEric Paris	POLICYDB_CAPABILITY_OPENPERM,
762be4d74f2fd45460d70d4fe65cc1972ef45bf849Chris PeBenito	POLICYDB_CAPABILITY_REDHAT1,
772be4d74f2fd45460d70d4fe65cc1972ef45bf849Chris PeBenito	POLICYDB_CAPABILITY_ALWAYSNETWORK,
783bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore	__POLICYDB_CAPABILITY_MAX
793bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore};
803bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
813bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
823bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreextern int selinux_policycap_netpeer;
83b0c636b99997c8594da6a46e166ce4fcf6956fdaEric Parisextern int selinux_policycap_openperm;
842be4d74f2fd45460d70d4fe65cc1972ef45bf849Chris PeBenitoextern int selinux_policycap_alwaysnetwork;
853bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
86d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei/*
87d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei * type_datum properties
88d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei * available at the kernel policy version >= POLICYDB_VERSION_BOUNDARY
89d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei */
90d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define TYPEDATUM_PROPERTY_PRIMARY	0x0001
91d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define TYPEDATUM_PROPERTY_ATTRIBUTE	0x0002
92d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei
93d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei/* limitation of boundary depth  */
94d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define POLICYDB_BOUNDS_MAXDEPTH	4
95d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei
960719aaf5ead7555b7b7a4a080ebf2826a871384eGuido Trentalanciaint security_mls_enabled(void);
970719aaf5ead7555b7b7a4a080ebf2826a871384eGuido Trentalancia
98b19d8eae99dae42bb747954fdbb2cd456922eb5fEric Parisint security_load_policy(void *data, size_t len);
996b697323a78bed254ee372f71b1a6a2901bb4b7aEric Parisint security_read_policy(void **data, size_t *len);
100cee74f47a6baba0ac457e87687fdcf0abd599f0aEric Parissize_t security_policydb_len(void);
1011da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1023bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreint security_policycap_supported(unsigned int req_cap);
1033bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
104e47c8fc582a2c9f3cba059e543c4a056cd6bf8c4Christopher J. PeBenito#define SEL_VEC_MAX 32
1051da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsstruct av_decision {
1061da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 allowed;
1071da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 auditallow;
1081da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 auditdeny;
1091da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 seqno;
1108a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei	u32 flags;
1111da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds};
1121da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
113ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define security_operation_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f))
114ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define security_operation_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f)))
115ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep
116ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoepstruct operation_perm {
117ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	u32 perms[8];
118ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep};
119ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep
120ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoepstruct operation_decision {
121ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	u8 type;
122ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	u8 specified;
123ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	struct operation_perm *allowed;
124ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	struct operation_perm *auditallow;
125ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	struct operation_perm *dontaudit;
126ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep};
127ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep
128ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define OPERATION_ALLOWED 1
129ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define OPERATION_AUDITALLOW 2
130ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define OPERATION_DONTAUDIT 4
131ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep#define OPERATION_ALL (OPERATION_ALLOWED | OPERATION_AUDITALLOW |\
132ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep			OPERATION_DONTAUDIT)
133ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoepstruct operation {
134ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	u16 len;	/* length of operation decision chain */
135ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep	u32 type[8];	/* 256 types */
136ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep};
137ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep
1388a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei/* definitions of av_decision.flags */
1398a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei#define AVD_FLAGS_PERMISSIVE	0x0001
14064dbf07474d011540ca479a2e87fe998f570d6e3Eric Paris
14119439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalleyvoid security_compute_av(u32 ssid, u32 tsid,
142ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep			 u16 tclass, struct av_decision *avd,
143ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep			 struct operation *ops);
144ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep
145ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoepvoid security_compute_operation(u32 ssid, u32 tsid, u16 tclass,
146ba733f9857b966459316d0cd33b8da2e22f62d7dJeff Vander Stoep			 u8 type, struct operation_decision *od);
147c6d3aaa4e35c71a32a86ececacd4eea7ecfc316cStephen Smalley
14819439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalleyvoid security_compute_av_user(u32 ssid, u32 tsid,
14919439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalley			     u16 tclass, struct av_decision *avd);
1501da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
151652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Parisint security_transition_sid(u32 ssid, u32 tsid, u16 tclass,
152652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris			    const struct qstr *qstr, u32 *out_sid);
153c6d3aaa4e35c71a32a86ececacd4eea7ecfc316cStephen Smalley
154f50a3ec961f90e38c0311411179d5dfee1412192Kohei Kaigaiint security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass,
155f50a3ec961f90e38c0311411179d5dfee1412192Kohei Kaigai				 const char *objname, u32 *out_sid);
1561da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1571da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_member_sid(u32 ssid, u32 tsid,
1581da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 *out_sid);
1591da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1601da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_change_sid(u32 ssid, u32 tsid,
1611da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 *out_sid);
1621da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1631da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_sid_to_context(u32 sid, char **scontext,
1641da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *scontext_len);
1651da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
16612b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalleyint security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
16712b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley
1688f0cfa52a1d4ffacd8e7de906d19662f5da58d58David Howellsint security_context_to_sid(const char *scontext, u32 scontext_len,
16952a4c6404f91f2d2c5592ee6365a8418c4565f53Nikolay Aleksandrov			    u32 *out_sid, gfp_t gfp);
1701da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1717bf570dc8dcf76df2a9f583bef2da96d4289ed0dDavid Howellsint security_context_to_sid_default(const char *scontext, u32 scontext_len,
172869ab5147e1eead890245cfd4f652ba282b6ac26Stephen Smalley				    u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
173f5c1d5b2aaf9a98f15a6dcdfbba1f494d0aaae52James Morris
17412b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalleyint security_context_to_sid_force(const char *scontext, u32 scontext_len,
17512b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley				  u32 *sid);
17612b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley
1771da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_get_user_sids(u32 callsid, char *username,
1781da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds			   u32 **sids, u32 *nel);
1791da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1803e11217263d0521e212cb8a017fbc2a1514db78fPaul Mooreint security_port_sid(u8 protocol, u16 port, u32 *out_sid);
1811da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
182e8bfdb9d0dfc1231a6a71e849dfbd4447acdfff6Paul Mooreint security_netif_sid(char *name, u32 *if_sid);
1831da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1841da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_node_sid(u16 domain, void *addr, u32 addrlen,
1851da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *out_sid);
1861da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1871da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
188b19d8eae99dae42bb747954fdbb2cd456922eb5fEric Paris				 u16 tclass);
1891da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
190d9250dea3f89fe808a525f08888016b495240ed4KaiGai Koheiint security_bounded_transition(u32 oldsid, u32 newsid);
191d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei
19208554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkiralaint security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
19308554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkirala
194220deb966ea51e0dedb6a187c0763120809f3e64Paul Mooreint security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type,
195220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore				 u32 xfrm_sid,
196220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore				 u32 *peer_sid);
197220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore
19855fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_classes(char ***classes, int *nclasses);
19955fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_permissions(char *class, char ***perms, int *nperms);
2003f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_reject_unknown(void);
2013f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_allow_unknown(void);
20255fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenito
2031da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_XATTR		1 /* use xattr */
2041da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TRANS		2 /* use transition SIDs, e.g. devpts/tmpfs */
2051da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TASK		3 /* use task SIDs, e.g. pipefs/sockfs */
2061da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_GENFS		4 /* use the genfs support */
2071da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_NONE		5 /* no labeling support */
2081da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_MNTPOINT	6 /* use mountpoint labeling */
209eb9ae686507bc5a5ca78e6b3fbe629cd5cc67864David Quigley#define SECURITY_FS_USE_NATIVE		7 /* use native label support */
210eb9ae686507bc5a5ca78e6b3fbe629cd5cc67864David Quigley#define SECURITY_FS_USE_MAX		7 /* Highest SECURITY_FS_USE_XXX */
2111da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
212a64c54cf0811b8032fdab8c9d52576f0370837faEric Parisint security_fs_use(struct super_block *sb);
2131da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
2141da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_genfs_sid(const char *fstype, char *name, u16 sclass,
2151da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *sid);
2161da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
2175778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#ifdef CONFIG_NETLABEL
2185778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
2195778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore				   u32 *sid);
2205778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
2215778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_sid_to_secattr(u32 sid,
2225778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore				   struct netlbl_lsm_secattr *secattr);
2235778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#else
2245778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_secattr_to_sid(
2255778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					    struct netlbl_lsm_secattr *secattr,
2265778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					    u32 *sid)
2275778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{
2285778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore	return -EIDRM;
2295778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore}
2305778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
2315778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_sid_to_secattr(u32 sid,
2325778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					   struct netlbl_lsm_secattr *secattr)
2335778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{
2345778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore	return -ENOENT;
2355778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore}
2365778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#endif /* CONFIG_NETLABEL */
2375778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
238f0ee2e467ffa68c3122128b704c1540ee294b748James Carterconst char *security_get_initial_sid_context(u32 sid);
239f0ee2e467ffa68c3122128b704c1540ee294b748James Carter
240119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei/*
241119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei * status notifier using mmap interface
242119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei */
243119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern struct page *selinux_kernel_status_page(void);
244119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei
245119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei#define SELINUX_KERNEL_STATUS_VERSION	1
24636f7f28416c97dbb725154930066d115b4447e17KaiGai Koheistruct selinux_kernel_status {
247119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	u32	version;	/* version number of thie structure */
248119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	u32	sequence;	/* sequence number of seqlock logic */
249119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	u32	enforcing;	/* current setting of enforcing mode */
250119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	u32	policyload;	/* times of policy reloaded */
251119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	u32	deny_unknown;	/* current setting of deny_unknown */
252119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	/*
253119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	 * The version > 0 supports above members.
254119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei	 */
2554bb9398300a3a2c691e5c0ad6b9cfa78775e767eGideon Israel Dsouza} __packed;
256119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei
257119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern void selinux_status_update_setenforce(int enforcing);
258119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern void selinux_status_update_policyload(int seqno);
259cc59a582d6081b296e481b8bc9676b5c2faad818James Morrisextern void selinux_complete_init(void);
26058982b74832917405a483a22beede729e3175376James Morrisextern int selinux_disable(void);
261ad3fa08c4ff84ed87649d72e8497735c85561a3dJames Morrisextern void exit_sel_fs(void);
262765927b2d508712d320c8934db963bbe14c3fcecAl Viroextern struct path selinux_null;
263ad3fa08c4ff84ed87649d72e8497735c85561a3dJames Morrisextern struct vfsmount *selinuxfs_mount;
2646a3fbe81179c85eb53054a0f4c8423ffec0276a7James Morrisextern void selnl_notify_setenforce(int val);
2656a3fbe81179c85eb53054a0f4c8423ffec0276a7James Morrisextern void selnl_notify_policyload(u32 seqno);
2666a3fbe81179c85eb53054a0f4c8423ffec0276a7James Morrisextern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
267119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei
2681da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#endif /* _SELINUX_SECURITY_H_ */
2691da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
270