2 * NSA Security-Enhanced Linux (SELinux) security module
4 * This file contains the SELinux security data structures for kernel objects.
6 * Author(s): Stephen Smalley, <sds@epoch.ncsc.mil>
7 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>
9 * James Morris <jmorris@redhat.com>
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License version 2,
16 * as published by the Free Software Foundation.
18 #ifndef _SELINUX_OBJSEC_H_
19 #define _SELINUX_OBJSEC_H_
21 #include <linux/list.h>
22 #include <linux/sched.h>
24 #include <linux/binfmts.h>
26 #include <linux/spinlock.h>
30 struct task_security_struct
{
31 u32 osid
; /* SID prior to last execve */
32 u32 sid
; /* current SID */
33 u32 exec_sid
; /* exec SID */
34 u32 create_sid
; /* fscreate SID */
35 u32 keycreate_sid
; /* keycreate SID */
36 u32 sockcreate_sid
; /* fscreate SID */
39 struct inode_security_struct
{
40 struct inode
*inode
; /* back pointer to inode object */
41 struct list_head list
; /* list of inode_security_struct */
42 u32 task_sid
; /* SID of creating task */
43 u32 sid
; /* SID of this object */
44 u16 sclass
; /* security class of this object */
45 unsigned char initialized
; /* initialization flag */
49 struct file_security_struct
{
50 u32 sid
; /* SID of open file description */
51 u32 fown_sid
; /* SID of file owner (for SIGIO) */
52 u32 isid
; /* SID of inode at the time of file open */
53 u32 pseqno
; /* Policy seqno at the time of file open */
56 struct superblock_security_struct
{
57 struct super_block
*sb
; /* back pointer to sb object */
58 struct list_head list
; /* list of superblock_security_struct */
59 u32 sid
; /* SID of file system superblock */
60 u32 def_sid
; /* default SID for labeling */
61 u32 mntpoint_sid
; /* SECURITY_FS_USE_MNTPOINT context for files */
62 unsigned int behavior
; /* labeling behavior */
63 unsigned char initialized
; /* initialization flag */
64 unsigned char flags
; /* which mount options were specified */
65 unsigned char proc
; /* proc fs */
67 struct list_head isec_head
;
71 struct msg_security_struct
{
72 u32 sid
; /* SID of message */
75 struct ipc_security_struct
{
76 u16 sclass
; /* security class of this object */
77 u32 sid
; /* SID of IPC resource */
80 struct bprm_security_struct
{
81 u32 sid
; /* SID for transformed process */
85 * unsafe is used to share failure information from bprm_apply_creds()
86 * to bprm_post_apply_creds().
91 struct netif_security_struct
{
92 int ifindex
; /* device index */
93 u32 sid
; /* SID for this interface */
96 struct netnode_security_struct
{
98 __be32 ipv4
; /* IPv4 node address */
99 struct in6_addr ipv6
; /* IPv6 node address */
101 u32 sid
; /* SID for this node */
102 u16 family
; /* address family */
105 struct netport_security_struct
{
106 u32 sid
; /* SID for this node */
107 u16 port
; /* port number */
108 u8 protocol
; /* transport protocol */
111 struct sk_security_struct
{
112 u32 sid
; /* SID of this object */
113 u32 peer_sid
; /* SID of peer */
114 u16 sclass
; /* sock security class */
115 #ifdef CONFIG_NETLABEL
116 enum { /* NetLabel state */
124 struct key_security_struct
{
125 u32 sid
; /* SID of key */
128 extern unsigned int selinux_checkreqprot
;
130 #endif /* _SELINUX_OBJSEC_H_ */