]> bbs.cooldavid.org Git - net-next-2.6.git/blob - security/tomoyo/tomoyo.h
TOMOYO: Add rest of file operation restrictions.
[net-next-2.6.git] / security / tomoyo / tomoyo.h
1 /*
2  * security/tomoyo/tomoyo.h
3  *
4  * Implementation of the Domain-Based Mandatory Access Control.
5  *
6  * Copyright (C) 2005-2009  NTT DATA CORPORATION
7  *
8  * Version: 2.2.0   2009/04/01
9  *
10  */
11
12 #ifndef _SECURITY_TOMOYO_TOMOYO_H
13 #define _SECURITY_TOMOYO_TOMOYO_H
14
15 struct tomoyo_path_info;
16 struct path;
17 struct inode;
18 struct linux_binprm;
19 struct pt_regs;
20
21 int tomoyo_check_file_perm(struct tomoyo_domain_info *domain,
22                            const char *filename, const u8 perm);
23 int tomoyo_check_exec_perm(struct tomoyo_domain_info *domain,
24                            const struct tomoyo_path_info *filename);
25 int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
26                                  struct path *path, const int flag);
27 int tomoyo_check_1path_perm(struct tomoyo_domain_info *domain,
28                             const u8 operation, struct path *path);
29 int tomoyo_check_2path_perm(struct tomoyo_domain_info *domain,
30                             const u8 operation, struct path *path1,
31                             struct path *path2);
32 int tomoyo_check_rewrite_permission(struct tomoyo_domain_info *domain,
33                                     struct file *filp);
34 int tomoyo_find_next_domain(struct linux_binprm *bprm);
35
36 /* Index numbers for Access Controls. */
37
38 #define TOMOYO_TYPE_SINGLE_PATH_ACL                 0
39 #define TOMOYO_TYPE_DOUBLE_PATH_ACL                 1
40
41 /* Index numbers for File Controls. */
42
43 /*
44  * TYPE_READ_WRITE_ACL is special. TYPE_READ_WRITE_ACL is automatically set
45  * if both TYPE_READ_ACL and TYPE_WRITE_ACL are set. Both TYPE_READ_ACL and
46  * TYPE_WRITE_ACL are automatically set if TYPE_READ_WRITE_ACL is set.
47  * TYPE_READ_WRITE_ACL is automatically cleared if either TYPE_READ_ACL or
48  * TYPE_WRITE_ACL is cleared. Both TYPE_READ_ACL and TYPE_WRITE_ACL are
49  * automatically cleared if TYPE_READ_WRITE_ACL is cleared.
50  */
51
52 #define TOMOYO_TYPE_READ_WRITE_ACL    0
53 #define TOMOYO_TYPE_EXECUTE_ACL       1
54 #define TOMOYO_TYPE_READ_ACL          2
55 #define TOMOYO_TYPE_WRITE_ACL         3
56 #define TOMOYO_TYPE_CREATE_ACL        4
57 #define TOMOYO_TYPE_UNLINK_ACL        5
58 #define TOMOYO_TYPE_MKDIR_ACL         6
59 #define TOMOYO_TYPE_RMDIR_ACL         7
60 #define TOMOYO_TYPE_MKFIFO_ACL        8
61 #define TOMOYO_TYPE_MKSOCK_ACL        9
62 #define TOMOYO_TYPE_MKBLOCK_ACL      10
63 #define TOMOYO_TYPE_MKCHAR_ACL       11
64 #define TOMOYO_TYPE_TRUNCATE_ACL     12
65 #define TOMOYO_TYPE_SYMLINK_ACL      13
66 #define TOMOYO_TYPE_REWRITE_ACL      14
67 #define TOMOYO_TYPE_IOCTL_ACL        15
68 #define TOMOYO_TYPE_CHMOD_ACL        16
69 #define TOMOYO_TYPE_CHOWN_ACL        17
70 #define TOMOYO_TYPE_CHGRP_ACL        18
71 #define TOMOYO_TYPE_CHROOT_ACL       19
72 #define TOMOYO_TYPE_MOUNT_ACL        20
73 #define TOMOYO_TYPE_UMOUNT_ACL       21
74 #define TOMOYO_MAX_SINGLE_PATH_OPERATION 22
75
76 #define TOMOYO_TYPE_LINK_ACL         0
77 #define TOMOYO_TYPE_RENAME_ACL       1
78 #define TOMOYO_TYPE_PIVOT_ROOT_ACL   2
79 #define TOMOYO_MAX_DOUBLE_PATH_OPERATION 3
80
81 #define TOMOYO_DOMAINPOLICY          0
82 #define TOMOYO_EXCEPTIONPOLICY       1
83 #define TOMOYO_DOMAIN_STATUS         2
84 #define TOMOYO_PROCESS_STATUS        3
85 #define TOMOYO_MEMINFO               4
86 #define TOMOYO_SELFDOMAIN            5
87 #define TOMOYO_VERSION               6
88 #define TOMOYO_PROFILE               7
89 #define TOMOYO_MANAGER               8
90
91 extern struct tomoyo_domain_info tomoyo_kernel_domain;
92
93 static inline struct tomoyo_domain_info *tomoyo_domain(void)
94 {
95         return current_cred()->security;
96 }
97
98 static inline struct tomoyo_domain_info *tomoyo_real_domain(struct task_struct
99                                                             *task)
100 {
101         return task_cred_xxx(task, security);
102 }
103
104 #endif /* !defined(_SECURITY_TOMOYO_TOMOYO_H) */