diff options
Diffstat (limited to 'security/selinux/include/security.h')
-rw-r--r-- | security/selinux/include/security.h | 97 |
1 files changed, 97 insertions, 0 deletions
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h new file mode 100644 index 000000000000..fa187c9a351d --- /dev/null +++ b/security/selinux/include/security.h | |||
@@ -0,0 +1,97 @@ | |||
1 | /* | ||
2 | * Security server interface. | ||
3 | * | ||
4 | * Author : Stephen Smalley, <sds@epoch.ncsc.mil> | ||
5 | * | ||
6 | */ | ||
7 | |||
8 | #ifndef _SELINUX_SECURITY_H_ | ||
9 | #define _SELINUX_SECURITY_H_ | ||
10 | |||
11 | #include "flask.h" | ||
12 | |||
13 | #define SECSID_NULL 0x00000000 /* unspecified SID */ | ||
14 | #define SECSID_WILD 0xffffffff /* wildcard SID */ | ||
15 | #define SECCLASS_NULL 0x0000 /* no class */ | ||
16 | |||
17 | #define SELINUX_MAGIC 0xf97cff8c | ||
18 | |||
19 | /* Identify specific policy version changes */ | ||
20 | #define POLICYDB_VERSION_BASE 15 | ||
21 | #define POLICYDB_VERSION_BOOL 16 | ||
22 | #define POLICYDB_VERSION_IPV6 17 | ||
23 | #define POLICYDB_VERSION_NLCLASS 18 | ||
24 | #define POLICYDB_VERSION_VALIDATETRANS 19 | ||
25 | #define POLICYDB_VERSION_MLS 19 | ||
26 | |||
27 | /* Range of policy versions we understand*/ | ||
28 | #define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE | ||
29 | #define POLICYDB_VERSION_MAX POLICYDB_VERSION_MLS | ||
30 | |||
31 | #ifdef CONFIG_SECURITY_SELINUX_BOOTPARAM | ||
32 | extern int selinux_enabled; | ||
33 | #else | ||
34 | #define selinux_enabled 1 | ||
35 | #endif | ||
36 | |||
37 | extern int selinux_mls_enabled; | ||
38 | |||
39 | int security_load_policy(void * data, size_t len); | ||
40 | |||
41 | struct av_decision { | ||
42 | u32 allowed; | ||
43 | u32 decided; | ||
44 | u32 auditallow; | ||
45 | u32 auditdeny; | ||
46 | u32 seqno; | ||
47 | }; | ||
48 | |||
49 | int security_compute_av(u32 ssid, u32 tsid, | ||
50 | u16 tclass, u32 requested, | ||
51 | struct av_decision *avd); | ||
52 | |||
53 | int security_transition_sid(u32 ssid, u32 tsid, | ||
54 | u16 tclass, u32 *out_sid); | ||
55 | |||
56 | int security_member_sid(u32 ssid, u32 tsid, | ||
57 | u16 tclass, u32 *out_sid); | ||
58 | |||
59 | int security_change_sid(u32 ssid, u32 tsid, | ||
60 | u16 tclass, u32 *out_sid); | ||
61 | |||
62 | int security_sid_to_context(u32 sid, char **scontext, | ||
63 | u32 *scontext_len); | ||
64 | |||
65 | int security_context_to_sid(char *scontext, u32 scontext_len, | ||
66 | u32 *out_sid); | ||
67 | |||
68 | int security_get_user_sids(u32 callsid, char *username, | ||
69 | u32 **sids, u32 *nel); | ||
70 | |||
71 | int security_port_sid(u16 domain, u16 type, u8 protocol, u16 port, | ||
72 | u32 *out_sid); | ||
73 | |||
74 | int security_netif_sid(char *name, u32 *if_sid, | ||
75 | u32 *msg_sid); | ||
76 | |||
77 | int security_node_sid(u16 domain, void *addr, u32 addrlen, | ||
78 | u32 *out_sid); | ||
79 | |||
80 | int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, | ||
81 | u16 tclass); | ||
82 | |||
83 | #define SECURITY_FS_USE_XATTR 1 /* use xattr */ | ||
84 | #define SECURITY_FS_USE_TRANS 2 /* use transition SIDs, e.g. devpts/tmpfs */ | ||
85 | #define SECURITY_FS_USE_TASK 3 /* use task SIDs, e.g. pipefs/sockfs */ | ||
86 | #define SECURITY_FS_USE_GENFS 4 /* use the genfs support */ | ||
87 | #define SECURITY_FS_USE_NONE 5 /* no labeling support */ | ||
88 | #define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */ | ||
89 | |||
90 | int security_fs_use(const char *fstype, unsigned int *behavior, | ||
91 | u32 *sid); | ||
92 | |||
93 | int security_genfs_sid(const char *fstype, char *name, u16 sclass, | ||
94 | u32 *sid); | ||
95 | |||
96 | #endif /* _SELINUX_SECURITY_H_ */ | ||
97 | |||