security.h revision 3bb56b25dbe0a4b44bd2ebceab6736d068e85068
11da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/*
21da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Security server interface.
31da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds *
41da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Author : Stephen Smalley, <sds@epoch.ncsc.mil>
51da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds *
61da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds */
71da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
81da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#ifndef _SELINUX_SECURITY_H_
91da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define _SELINUX_SECURITY_H_
101da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
111da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#include "flask.h"
121da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
131da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_NULL			0x00000000 /* unspecified SID */
141da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_WILD			0xffffffff /* wildcard SID */
151da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECCLASS_NULL			0x0000 /* no class */
161da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
171da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SELINUX_MAGIC 0xf97cff8c
181da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
191da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Identify specific policy version changes */
201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BASE		15
211da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BOOL		16
221da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_IPV6		17
231da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_NLCLASS	18
241da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_VALIDATETRANS	19
251da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MLS		19
26782ebb992ec20b5afdd5786ee8c2f1b58b631f24Stephen Smalley#define POLICYDB_VERSION_AVTAB		20
27f3f8771420737004da55159c2f2dc0b6f483a4efDarrel Goeddel#define POLICYDB_VERSION_RANGETRANS	21
283bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_VERSION_POLCAP		22
291da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
301da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Range of policy versions we understand*/
311da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MIN   POLICYDB_VERSION_BASE
32016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
33016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#define POLICYDB_VERSION_MAX	CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
34016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#else
353bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_VERSION_MAX	POLICYDB_VERSION_POLCAP
36016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#endif
371da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
385778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestruct netlbl_lsm_secattr;
39bb22f58087fdf8b617803c9b65bc86c6d26b5115James Morris
401da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsextern int selinux_enabled;
411da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsextern int selinux_mls_enabled;
421da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
433bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore/* Policy capabilities */
443bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreenum {
453bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore	POLICYDB_CAPABILITY_NETPEER,
463bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore	__POLICYDB_CAPABILITY_MAX
473bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore};
483bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
493bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
503bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreextern int selinux_policycap_netpeer;
513bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
521da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_load_policy(void * data, size_t len);
531da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
543bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreint security_policycap_supported(unsigned int req_cap);
553bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore
56e47c8fc582a2c9f3cba059e543c4a056cd6bf8c4Christopher J. PeBenito#define SEL_VEC_MAX 32
571da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsstruct av_decision {
581da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 allowed;
591da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 decided;
601da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 auditallow;
611da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 auditdeny;
621da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 seqno;
631da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds};
641da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
651da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_compute_av(u32 ssid, u32 tsid,
661da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 requested,
671da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	struct av_decision *avd);
681da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
691da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_transition_sid(u32 ssid, u32 tsid,
701da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 *out_sid);
711da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
721da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_member_sid(u32 ssid, u32 tsid,
731da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 *out_sid);
741da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
751da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_change_sid(u32 ssid, u32 tsid,
761da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u16 tclass, u32 *out_sid);
771da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
781da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_sid_to_context(u32 sid, char **scontext,
791da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *scontext_len);
801da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
811da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_context_to_sid(char *scontext, u32 scontext_len,
821da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *out_sid);
831da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
84f5c1d5b2aaf9a98f15a6dcdfbba1f494d0aaae52James Morrisint security_context_to_sid_default(char *scontext, u32 scontext_len, u32 *out_sid, u32 def_sid);
85f5c1d5b2aaf9a98f15a6dcdfbba1f494d0aaae52James Morris
861da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_get_user_sids(u32 callsid, char *username,
871da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds			   u32 **sids, u32 *nel);
881da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
891da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_port_sid(u16 domain, u16 type, u8 protocol, u16 port,
901da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *out_sid);
911da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
92e8bfdb9d0dfc1231a6a71e849dfbd4447acdfff6Paul Mooreint security_netif_sid(char *name, u32 *if_sid);
931da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
941da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_node_sid(u16 domain, void *addr, u32 addrlen,
951da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *out_sid);
961da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
971da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
981da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds                                 u16 tclass);
991da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
10008554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkiralaint security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
10108554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkirala
10255fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_classes(char ***classes, int *nclasses);
10355fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_permissions(char *class, char ***perms, int *nperms);
1043f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_reject_unknown(void);
1053f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_allow_unknown(void);
1063bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreint security_get_policycaps(int *len, int **values);
10755fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenito
1081da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_XATTR		1 /* use xattr */
1091da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TRANS		2 /* use transition SIDs, e.g. devpts/tmpfs */
1101da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TASK		3 /* use task SIDs, e.g. pipefs/sockfs */
1111da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_GENFS		4 /* use the genfs support */
1121da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_NONE		5 /* no labeling support */
1131da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_MNTPOINT	6 /* use mountpoint labeling */
1141da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1151da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_fs_use(const char *fstype, unsigned int *behavior,
1161da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *sid);
1171da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1181da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_genfs_sid(const char *fstype, char *name, u16 sclass,
1191da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds	u32 *sid);
1201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
1215778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#ifdef CONFIG_NETLABEL
1225778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
1235778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore				   u32 base_sid,
1245778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore				   u32 *sid);
1255778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
1265778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_sid_to_secattr(u32 sid,
1275778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore				   struct netlbl_lsm_secattr *secattr);
1285778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#else
1295778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_secattr_to_sid(
1305778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					    struct netlbl_lsm_secattr *secattr,
1315778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					    u32 base_sid,
1325778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					    u32 *sid)
1335778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{
1345778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore	return -EIDRM;
1355778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore}
1365778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
1375778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_sid_to_secattr(u32 sid,
1385778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore					   struct netlbl_lsm_secattr *secattr)
1395778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{
1405778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore	return -ENOENT;
1415778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore}
1425778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#endif /* CONFIG_NETLABEL */
1435778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore
144f0ee2e467ffa68c3122128b704c1540ee294b748James Carterconst char *security_get_initial_sid_context(u32 sid);
145f0ee2e467ffa68c3122128b704c1540ee294b748James Carter
1461da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#endif /* _SELINUX_SECURITY_H_ */
1471da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds
148