1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
|
/*
* include/linux/sakura.h
*
* Implementation of the Domain-Free Mandatory Access Control.
*
* Copyright (C) 2005-2008 NTT DATA CORPORATION
*
* Version: 1.6.3 2008/07/15
*
* This file is applicable to both 2.4.30 and 2.6.11 and later.
* See README.ccs for ChangeLog.
*
*/
/*
* A brief description about SAKURA:
*
* SAKURA stands for "Security Advancement Know-how Upon Read-only Approach".
* As the name shows, SAKURA was originally a methodology to make root fs
* read-only to avoid tampering the system files.
* But now, SAKURA is not only a methodology but also a kernel patch
* that improves the system security with less effort.
*
* SAKURA can restrict operations that affect systemwide.
* SAKURA manages the filesystem's namespace related operations so that
* files remains where the administrator expects.
*/
#ifndef _LINUX_SAKURA_H
#define _LINUX_SAKURA_H
#ifndef __user
#define __user
#endif
#if defined(CONFIG_SAKURA)
/* Check whether the given pathname is allowed to chroot to. */
int ccs_check_chroot_permission(struct nameidata *nd);
/* Check whether the mount operation with the given parameters is allowed. */
int ccs_check_mount_permission(char *dev_name, char *dir_name, char *type,
const unsigned long *flags);
/* Check whether the current process is allowed to pivot_root. */
int ccs_check_pivot_root_permission(struct nameidata *old_nd,
struct nameidata *new_nd);
/* Check whether the given mount operation hides an mounted partition. */
int ccs_may_mount(struct nameidata *nd);
/* Check whether the given mountpoint is allowed to umount. */
int ccs_may_umount(struct vfsmount *mnt);
/* Check whether the given port is allowed to autobind. */
int ccs_may_autobind(const u16 port);
#else
static inline int ccs_check_chroot_permission(struct nameidata *nd)
{
return 0;
}
static inline int ccs_check_mount_permission(char *dev_name, char *dir_name,
char *type,
const unsigned long *flags)
{
return 0;
}
static inline int ccs_check_pivot_root_permission(struct nameidata *old_nd,
struct nameidata *new_nd)
{
return 0;
}
static inline int ccs_may_mount(struct nameidata *nd)
{
return 0;
}
static inline int ccs_may_umount(struct vfsmount *mnt)
{
return 0;
}
static inline int ccs_may_autobind(const u16 port)
{
return 0;
}
#endif
/* For compatibility with 1.4.x/1.5.x patches */
#define CheckChRootPermission ccs_check_chroot_permission
#define SAKURA_MayUmount ccs_may_umount
#define SAKURA_MayMount ccs_may_mount
#define CheckMountPermission ccs_check_mount_permission
#define CheckPivotRootPermission ccs_check_pivot_root_permission
#define SAKURA_MayAutobind ccs_may_autobind
#endif
|