diff options
Diffstat (limited to 'security/selinux/include/objsec.h')
-rw-r--r-- | security/selinux/include/objsec.h | 112 |
1 files changed, 112 insertions, 0 deletions
diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h new file mode 100644 index 000000000000..887937c8134a --- /dev/null +++ b/security/selinux/include/objsec.h | |||
@@ -0,0 +1,112 @@ | |||
1 | /* | ||
2 | * NSA Security-Enhanced Linux (SELinux) security module | ||
3 | * | ||
4 | * This file contains the SELinux security data structures for kernel objects. | ||
5 | * | ||
6 | * Author(s): Stephen Smalley, <sds@epoch.ncsc.mil> | ||
7 | * Chris Vance, <cvance@nai.com> | ||
8 | * Wayne Salamon, <wsalamon@nai.com> | ||
9 | * James Morris <jmorris@redhat.com> | ||
10 | * | ||
11 | * Copyright (C) 2001,2002 Networks Associates Technology, Inc. | ||
12 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> | ||
13 | * | ||
14 | * This program is free software; you can redistribute it and/or modify | ||
15 | * it under the terms of the GNU General Public License version 2, | ||
16 | * as published by the Free Software Foundation. | ||
17 | */ | ||
18 | #ifndef _SELINUX_OBJSEC_H_ | ||
19 | #define _SELINUX_OBJSEC_H_ | ||
20 | |||
21 | #include <linux/list.h> | ||
22 | #include <linux/sched.h> | ||
23 | #include <linux/fs.h> | ||
24 | #include <linux/binfmts.h> | ||
25 | #include <linux/in.h> | ||
26 | #include "flask.h" | ||
27 | #include "avc.h" | ||
28 | |||
29 | struct task_security_struct { | ||
30 | unsigned long magic; /* magic number for this module */ | ||
31 | struct task_struct *task; /* back pointer to task object */ | ||
32 | u32 osid; /* SID prior to last execve */ | ||
33 | u32 sid; /* current SID */ | ||
34 | u32 exec_sid; /* exec SID */ | ||
35 | u32 create_sid; /* fscreate SID */ | ||
36 | u32 ptrace_sid; /* SID of ptrace parent */ | ||
37 | }; | ||
38 | |||
39 | struct inode_security_struct { | ||
40 | unsigned long magic; /* magic number for this module */ | ||
41 | struct inode *inode; /* back pointer to inode object */ | ||
42 | struct list_head list; /* list of inode_security_struct */ | ||
43 | u32 task_sid; /* SID of creating task */ | ||
44 | u32 sid; /* SID of this object */ | ||
45 | u16 sclass; /* security class of this object */ | ||
46 | unsigned char initialized; /* initialization flag */ | ||
47 | struct semaphore sem; | ||
48 | unsigned char inherit; /* inherit SID from parent entry */ | ||
49 | }; | ||
50 | |||
51 | struct file_security_struct { | ||
52 | unsigned long magic; /* magic number for this module */ | ||
53 | struct file *file; /* back pointer to file object */ | ||
54 | u32 sid; /* SID of open file description */ | ||
55 | u32 fown_sid; /* SID of file owner (for SIGIO) */ | ||
56 | }; | ||
57 | |||
58 | struct superblock_security_struct { | ||
59 | unsigned long magic; /* magic number for this module */ | ||
60 | struct super_block *sb; /* back pointer to sb object */ | ||
61 | struct list_head list; /* list of superblock_security_struct */ | ||
62 | u32 sid; /* SID of file system */ | ||
63 | u32 def_sid; /* default SID for labeling */ | ||
64 | unsigned int behavior; /* labeling behavior */ | ||
65 | unsigned char initialized; /* initialization flag */ | ||
66 | unsigned char proc; /* proc fs */ | ||
67 | struct semaphore sem; | ||
68 | struct list_head isec_head; | ||
69 | spinlock_t isec_lock; | ||
70 | }; | ||
71 | |||
72 | struct msg_security_struct { | ||
73 | unsigned long magic; /* magic number for this module */ | ||
74 | struct msg_msg *msg; /* back pointer */ | ||
75 | u32 sid; /* SID of message */ | ||
76 | }; | ||
77 | |||
78 | struct ipc_security_struct { | ||
79 | unsigned long magic; /* magic number for this module */ | ||
80 | struct kern_ipc_perm *ipc_perm; /* back pointer */ | ||
81 | u16 sclass; /* security class of this object */ | ||
82 | u32 sid; /* SID of IPC resource */ | ||
83 | }; | ||
84 | |||
85 | struct bprm_security_struct { | ||
86 | unsigned long magic; /* magic number for this module */ | ||
87 | struct linux_binprm *bprm; /* back pointer to bprm object */ | ||
88 | u32 sid; /* SID for transformed process */ | ||
89 | unsigned char set; | ||
90 | |||
91 | /* | ||
92 | * unsafe is used to share failure information from bprm_apply_creds() | ||
93 | * to bprm_post_apply_creds(). | ||
94 | */ | ||
95 | char unsafe; | ||
96 | }; | ||
97 | |||
98 | struct netif_security_struct { | ||
99 | struct net_device *dev; /* back pointer */ | ||
100 | u32 if_sid; /* SID for this interface */ | ||
101 | u32 msg_sid; /* default SID for messages received on this interface */ | ||
102 | }; | ||
103 | |||
104 | struct sk_security_struct { | ||
105 | unsigned long magic; /* magic number for this module */ | ||
106 | struct sock *sk; /* back pointer to sk object */ | ||
107 | u32 peer_sid; /* SID of peer */ | ||
108 | }; | ||
109 | |||
110 | extern unsigned int selinux_checkreqprot; | ||
111 | |||
112 | #endif /* _SELINUX_OBJSEC_H_ */ | ||