blob: 1931370233d7b2123dad2947c930c0ecb9722ac5 [file] [log] [blame]
yuezonghe824eb0c2024-06-27 02:32:26 -07001/*
2 * Access vector cache interface for object managers.
3 *
4 * Author : Stephen Smalley, <sds@epoch.ncsc.mil>
5 */
6#ifndef _SELINUX_AVC_H_
7#define _SELINUX_AVC_H_
8
9#include <linux/stddef.h>
10#include <linux/errno.h>
11#include <linux/kernel.h>
12#include <linux/kdev_t.h>
13#include <linux/spinlock.h>
14#include <linux/init.h>
15#include <linux/audit.h>
16#include <linux/lsm_audit.h>
17#include <linux/in6.h>
18#include "flask.h"
19#include "av_permissions.h"
20#include "security.h"
21
22#ifdef CONFIG_SECURITY_SELINUX_DEVELOP
23extern int selinux_enforcing;
24#else
25#define selinux_enforcing 1
26#endif
27
28/*
29 * An entry in the AVC.
30 */
31struct avc_entry;
32
33struct task_struct;
34struct inode;
35struct sock;
36struct sk_buff;
37
38/*
39 * AVC statistics
40 */
41struct avc_cache_stats {
42 unsigned int lookups;
43 unsigned int misses;
44 unsigned int allocations;
45 unsigned int reclaims;
46 unsigned int frees;
47};
48
49/*
50 * We only need this data after we have decided to send an audit message.
51 */
52struct selinux_late_audit_data {
53 u32 ssid;
54 u32 tsid;
55 u16 tclass;
56 u32 requested;
57 u32 audited;
58 u32 denied;
59 int result;
60};
61
62/*
63 * We collect this at the beginning or during an selinux security operation
64 */
65struct selinux_audit_data {
66 /*
67 * auditdeny is a bit tricky and unintuitive. See the
68 * comments in avc.c for it's meaning and usage.
69 */
70 u32 auditdeny;
71 struct selinux_late_audit_data *slad;
72};
73
74/*
75 * AVC operations
76 */
77
78void __init avc_init(void);
79
80int avc_audit(u32 ssid, u32 tsid,
81 u16 tclass, u32 requested,
82 struct av_decision *avd,
83 int result,
84 struct common_audit_data *a, unsigned flags);
85
86#define AVC_STRICT 1 /* Ignore permissive mode. */
87int avc_has_perm_noaudit(u32 ssid, u32 tsid,
88 u16 tclass, u32 requested,
89 unsigned flags,
90 struct av_decision *avd);
91
92int avc_has_perm_flags(u32 ssid, u32 tsid,
93 u16 tclass, u32 requested,
94 struct common_audit_data *auditdata,
95 unsigned);
96
97static inline int avc_has_perm(u32 ssid, u32 tsid,
98 u16 tclass, u32 requested,
99 struct common_audit_data *auditdata)
100{
101 return avc_has_perm_flags(ssid, tsid, tclass, requested, auditdata, 0);
102}
103
104u32 avc_policy_seqno(void);
105
106#define AVC_CALLBACK_GRANT 1
107#define AVC_CALLBACK_TRY_REVOKE 2
108#define AVC_CALLBACK_REVOKE 4
109#define AVC_CALLBACK_RESET 8
110#define AVC_CALLBACK_AUDITALLOW_ENABLE 16
111#define AVC_CALLBACK_AUDITALLOW_DISABLE 32
112#define AVC_CALLBACK_AUDITDENY_ENABLE 64
113#define AVC_CALLBACK_AUDITDENY_DISABLE 128
114
115int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid,
116 u16 tclass, u32 perms,
117 u32 *out_retained),
118 u32 events, u32 ssid, u32 tsid,
119 u16 tclass, u32 perms);
120
121/* Exported to selinuxfs */
122int avc_get_hash_stats(char *page);
123extern unsigned int avc_cache_threshold;
124
125/* Attempt to free avc node cache */
126void avc_disable(void);
127
128#ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
129DECLARE_PER_CPU(struct avc_cache_stats, avc_cache_stats);
130#endif
131
132#endif /* _SELINUX_AVC_H_ */
133