security.h revision f50a3ec961f90e38c0311411179d5dfee1412192
11da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* 21da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Security server interface. 31da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * 41da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * Author : Stephen Smalley, <sds@epoch.ncsc.mil> 51da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds * 61da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds */ 71da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 81da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#ifndef _SELINUX_SECURITY_H_ 91da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define _SELINUX_SECURITY_H_ 101da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 11652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris#include <linux/dcache.h> 1275834fc3b6fcff00327f5d2a18760c1e8e0179c5Eric Paris#include <linux/magic.h> 132606fd1fa5710205b23ee859563502aa18362447Eric Paris#include <linux/types.h> 141da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#include "flask.h" 151da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 161da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_NULL 0x00000000 /* unspecified SID */ 171da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECSID_WILD 0xffffffff /* wildcard SID */ 181da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECCLASS_NULL 0x0000 /* no class */ 191da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Identify specific policy version changes */ 211da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BASE 15 221da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_BOOL 16 231da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_IPV6 17 241da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_NLCLASS 18 251da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_VALIDATETRANS 19 261da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MLS 19 27782ebb992ec20b5afdd5786ee8c2f1b58b631f24Stephen Smalley#define POLICYDB_VERSION_AVTAB 20 28f3f8771420737004da55159c2f2dc0b6f483a4efDarrel Goeddel#define POLICYDB_VERSION_RANGETRANS 21 293bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_VERSION_POLCAP 22 3064dbf07474d011540ca479a2e87fe998f570d6e3Eric Paris#define POLICYDB_VERSION_PERMISSIVE 23 31d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define POLICYDB_VERSION_BOUNDARY 24 32652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris#define POLICYDB_VERSION_FILENAME_TRANS 25 338023976cf4627d9f1d82ad468ec40e32eb87d211Harry Ciao#define POLICYDB_VERSION_ROLETRANS 26 341da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 351da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds/* Range of policy versions we understand*/ 361da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE 37016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX 38016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE 39016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#else 408023976cf4627d9f1d82ad468ec40e32eb87d211Harry Ciao#define POLICYDB_VERSION_MAX POLICYDB_VERSION_ROLETRANS 41016b9bdb81d9c9c7800e4e224ade38d8b37669d3Stephen Smalley#endif 421da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 430d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Mask for just the mount related flags */ 440d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley#define SE_MNTMASK 0x0f 450d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Super block security struct flags for mount options */ 46e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define CONTEXT_MNT 0x01 47e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define FSCONTEXT_MNT 0x02 48e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define ROOTCONTEXT_MNT 0x04 49e0007529893c1c064be90bd21422ca0da4a0198eEric Paris#define DEFCONTEXT_MNT 0x08 500d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley/* Non-mount related flags */ 510d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley#define SE_SBINITIALIZED 0x10 520d90a7ec48c704025307b129413bc62451b20ab3David P. Quigley#define SE_SBPROC 0x20 5311689d47f0957121920c9ec646eb5d838755853aDavid P. Quigley#define SE_SBLABELSUPP 0x40 54e0007529893c1c064be90bd21422ca0da4a0198eEric Paris 55832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define CONTEXT_STR "context=" 56832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define FSCONTEXT_STR "fscontext=" 57832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define ROOTCONTEXT_STR "rootcontext=" 58832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris#define DEFCONTEXT_STR "defcontext=" 5911689d47f0957121920c9ec646eb5d838755853aDavid P. Quigley#define LABELSUPP_STR "seclabel" 60832cbd9aa1293cba57d06571f5fc8f0917c672afEric Paris 615778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestruct netlbl_lsm_secattr; 62bb22f58087fdf8b617803c9b65bc86c6d26b5115James Morris 631da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsextern int selinux_enabled; 641da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 653bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore/* Policy capabilities */ 663bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreenum { 673bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore POLICYDB_CAPABILITY_NETPEER, 68b0c636b99997c8594da6a46e166ce4fcf6956fdaEric Paris POLICYDB_CAPABILITY_OPENPERM, 693bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore __POLICYDB_CAPABILITY_MAX 703bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore}; 713bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1) 723bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore 733bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreextern int selinux_policycap_netpeer; 74b0c636b99997c8594da6a46e166ce4fcf6956fdaEric Parisextern int selinux_policycap_openperm; 753bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore 76d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei/* 77d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei * type_datum properties 78d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei * available at the kernel policy version >= POLICYDB_VERSION_BOUNDARY 79d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei */ 80d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define TYPEDATUM_PROPERTY_PRIMARY 0x0001 81d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define TYPEDATUM_PROPERTY_ATTRIBUTE 0x0002 82d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei 83d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei/* limitation of boundary depth */ 84d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei#define POLICYDB_BOUNDS_MAXDEPTH 4 85d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei 860719aaf5ead7555b7b7a4a080ebf2826a871384eGuido Trentalanciaint security_mls_enabled(void); 870719aaf5ead7555b7b7a4a080ebf2826a871384eGuido Trentalancia 88b19d8eae99dae42bb747954fdbb2cd456922eb5fEric Parisint security_load_policy(void *data, size_t len); 89cee74f47a6baba0ac457e87687fdcf0abd599f0aEric Parisint security_read_policy(void **data, ssize_t *len); 90cee74f47a6baba0ac457e87687fdcf0abd599f0aEric Parissize_t security_policydb_len(void); 911da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 923bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Mooreint security_policycap_supported(unsigned int req_cap); 933bb56b25dbe0a4b44bd2ebceab6736d068e85068Paul Moore 94e47c8fc582a2c9f3cba059e543c4a056cd6bf8c4Christopher J. PeBenito#define SEL_VEC_MAX 32 951da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsstruct av_decision { 961da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 allowed; 971da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 auditallow; 981da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 auditdeny; 991da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 seqno; 1008a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei u32 flags; 1011da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds}; 1021da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1038a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei/* definitions of av_decision.flags */ 1048a6f83afd0c5355db6d11394a798e94950306239KaiGai Kohei#define AVD_FLAGS_PERMISSIVE 0x0001 10564dbf07474d011540ca479a2e87fe998f570d6e3Eric Paris 10619439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalleyvoid security_compute_av(u32 ssid, u32 tsid, 10719439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalley u16 tclass, struct av_decision *avd); 108c6d3aaa4e35c71a32a86ececacd4eea7ecfc316cStephen Smalley 10919439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalleyvoid security_compute_av_user(u32 ssid, u32 tsid, 11019439d05b88dafc4e55d9ffce84ccc27cf8b2bccStephen Smalley u16 tclass, struct av_decision *avd); 1111da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 112652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Parisint security_transition_sid(u32 ssid, u32 tsid, u16 tclass, 113652bb9b0d6ce007f37c098947b2cc0c45efa3f66Eric Paris const struct qstr *qstr, u32 *out_sid); 114c6d3aaa4e35c71a32a86ececacd4eea7ecfc316cStephen Smalley 115f50a3ec961f90e38c0311411179d5dfee1412192Kohei Kaigaiint security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, 116f50a3ec961f90e38c0311411179d5dfee1412192Kohei Kaigai const char *objname, u32 *out_sid); 1171da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1181da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_member_sid(u32 ssid, u32 tsid, 1191da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u16 tclass, u32 *out_sid); 1201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1211da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_change_sid(u32 ssid, u32 tsid, 1221da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u16 tclass, u32 *out_sid); 1231da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1241da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_sid_to_context(u32 sid, char **scontext, 1251da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 *scontext_len); 1261da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 12712b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalleyint security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len); 12812b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley 1298f0cfa52a1d4ffacd8e7de906d19662f5da58d58David Howellsint security_context_to_sid(const char *scontext, u32 scontext_len, 1301da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 *out_sid); 1311da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1327bf570dc8dcf76df2a9f583bef2da96d4289ed0dDavid Howellsint security_context_to_sid_default(const char *scontext, u32 scontext_len, 133869ab5147e1eead890245cfd4f652ba282b6ac26Stephen Smalley u32 *out_sid, u32 def_sid, gfp_t gfp_flags); 134f5c1d5b2aaf9a98f15a6dcdfbba1f494d0aaae52James Morris 13512b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalleyint security_context_to_sid_force(const char *scontext, u32 scontext_len, 13612b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley u32 *sid); 13712b29f34558b9b45a2c6eabd4f3c6be939a3980fStephen Smalley 1381da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_get_user_sids(u32 callsid, char *username, 1391da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 **sids, u32 *nel); 1401da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1413e11217263d0521e212cb8a017fbc2a1514db78fPaul Mooreint security_port_sid(u8 protocol, u16 port, u32 *out_sid); 1421da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 143e8bfdb9d0dfc1231a6a71e849dfbd4447acdfff6Paul Mooreint security_netif_sid(char *name, u32 *if_sid); 1441da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1451da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_node_sid(u16 domain, void *addr, u32 addrlen, 1461da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 *out_sid); 1471da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1481da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, 149b19d8eae99dae42bb747954fdbb2cd456922eb5fEric Paris u16 tclass); 1501da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 151d9250dea3f89fe808a525f08888016b495240ed4KaiGai Koheiint security_bounded_transition(u32 oldsid, u32 newsid); 152d9250dea3f89fe808a525f08888016b495240ed4KaiGai Kohei 15308554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkiralaint security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid); 15408554d6b33e60aa8ee40bbef94505941c0eefef2Venkat Yekkirala 155220deb966ea51e0dedb6a187c0763120809f3e64Paul Mooreint security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, 156220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore u32 xfrm_sid, 157220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore u32 *peer_sid); 158220deb966ea51e0dedb6a187c0763120809f3e64Paul Moore 15955fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_classes(char ***classes, int *nclasses); 16055fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenitoint security_get_permissions(char *class, char ***perms, int *nperms); 1613f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_reject_unknown(void); 1623f12070e27b4a213d62607d2bff139793089a77dEric Parisint security_get_allow_unknown(void); 16355fcf09b3fe4325c9395ebbb0322a547a157ebc7Christopher J. PeBenito 1641da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_XATTR 1 /* use xattr */ 1651da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TRANS 2 /* use transition SIDs, e.g. devpts/tmpfs */ 1661da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_TASK 3 /* use task SIDs, e.g. pipefs/sockfs */ 1671da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_GENFS 4 /* use the genfs support */ 1681da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_NONE 5 /* no labeling support */ 1691da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */ 1701da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1711da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_fs_use(const char *fstype, unsigned int *behavior, 172089be43e403a78cd6889cde2fba164fefe9dfd89James Morris u32 *sid); 1731da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1741da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvaldsint security_genfs_sid(const char *fstype, char *name, u16 sclass, 1751da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds u32 *sid); 1761da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 1775778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#ifdef CONFIG_NETLABEL 1785778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, 1795778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore u32 *sid); 1805778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore 1815778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Mooreint security_netlbl_sid_to_secattr(u32 sid, 1825778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore struct netlbl_lsm_secattr *secattr); 1835778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#else 1845778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_secattr_to_sid( 1855778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore struct netlbl_lsm_secattr *secattr, 1865778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore u32 *sid) 1875778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{ 1885778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore return -EIDRM; 1895778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore} 1905778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore 1915778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moorestatic inline int security_netlbl_sid_to_secattr(u32 sid, 1925778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore struct netlbl_lsm_secattr *secattr) 1935778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore{ 1945778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore return -ENOENT; 1955778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore} 1965778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore#endif /* CONFIG_NETLABEL */ 1975778eabd9cdbf16ea3e40248c452b4fd25554d11Paul Moore 198f0ee2e467ffa68c3122128b704c1540ee294b748James Carterconst char *security_get_initial_sid_context(u32 sid); 199f0ee2e467ffa68c3122128b704c1540ee294b748James Carter 200119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei/* 201119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei * status notifier using mmap interface 202119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei */ 203119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern struct page *selinux_kernel_status_page(void); 204119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei 205119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei#define SELINUX_KERNEL_STATUS_VERSION 1 20636f7f28416c97dbb725154930066d115b4447e17KaiGai Koheistruct selinux_kernel_status { 207119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei u32 version; /* version number of thie structure */ 208119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei u32 sequence; /* sequence number of seqlock logic */ 209119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei u32 enforcing; /* current setting of enforcing mode */ 210119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei u32 policyload; /* times of policy reloaded */ 211119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei u32 deny_unknown; /* current setting of deny_unknown */ 212119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei /* 213119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei * The version > 0 supports above members. 214119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei */ 215119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei} __attribute__((packed)); 216119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei 217119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern void selinux_status_update_setenforce(int enforcing); 218119041672592d1890d89dd8f194bd0919d801dc8KaiGai Koheiextern void selinux_status_update_policyload(int seqno); 219119041672592d1890d89dd8f194bd0919d801dc8KaiGai Kohei 2201da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds#endif /* _SELINUX_SECURITY_H_ */ 2211da177e4c3f41524e886b7f1b8a0c1fc7321cacLinus Torvalds 222