5 |
* |
* |
6 |
* Copyright (C) 2005-2007 NTT DATA CORPORATION |
* Copyright (C) 2005-2007 NTT DATA CORPORATION |
7 |
* |
* |
8 |
* Version: 1.5.0 2007/09/20 |
* Version: 1.5.1-pre 2007/10/16 |
9 |
* |
* |
10 |
* This file is applicable to both 2.4.30 and 2.6.11 and later. |
* This file is applicable to both 2.4.30 and 2.6.11 and later. |
11 |
* See README.ccs for ChangeLog. |
* See README.ccs for ChangeLog. |
56 |
/* Check whether the basename of program and argv0 is allowed to differ. */ |
/* Check whether the basename of program and argv0 is allowed to differ. */ |
57 |
int CheckArgv0Perm(const struct path_info *filename, const char *argv0); |
int CheckArgv0Perm(const struct path_info *filename, const char *argv0); |
58 |
|
|
59 |
|
/* Check whether the given environment is allowed to be received. */ |
60 |
|
int CheckEnvPerm(const char *env); |
61 |
|
|
62 |
/* Check whether the given IP address and port number are allowed to use. */ |
/* Check whether the given IP address and port number are allowed to use. */ |
63 |
int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port); |
int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port); |
64 |
int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port); |
int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port); |
82 |
static inline int CheckDoubleWritePermission(const unsigned int operation, struct dentry *dentry1, struct vfsmount *mnt1, struct dentry *dentry2, struct vfsmount *mnt2) { return 0; } |
static inline int CheckDoubleWritePermission(const unsigned int operation, struct dentry *dentry1, struct vfsmount *mnt1, struct dentry *dentry2, struct vfsmount *mnt2) { return 0; } |
83 |
static inline int CheckReWritePermission(struct file *filp) { return 0; } |
static inline int CheckReWritePermission(struct file *filp) { return 0; } |
84 |
static inline int CheckArgv0Perm(const struct path_info *filename, const char *argv0) { return 0; } |
static inline int CheckArgv0Perm(const struct path_info *filename, const char *argv0) { return 0; } |
85 |
|
static inline int CheckEnvPerm(const char *env) { return 0; } |
86 |
static inline int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port) { return 0; } |
static inline int CheckNetworkListenACL(const u8 is_ipv6, const u8 *address, const u16 port) { return 0; } |
87 |
static inline int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; } |
static inline int CheckNetworkConnectACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; } |
88 |
static inline int CheckNetworkBindACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; } |
static inline int CheckNetworkBindACL(const u8 is_ipv6, const int sock_type, const u8 *address, const u16 port) { return 0; } |
122 |
|
|
123 |
#define TYPE_FILE_ACL 100 |
#define TYPE_FILE_ACL 100 |
124 |
#define TYPE_ARGV0_ACL 101 |
#define TYPE_ARGV0_ACL 101 |
125 |
#define TYPE_CAPABILITY_ACL 102 |
#define TYPE_ENV_ACL 102 |
126 |
#define TYPE_IP_NETWORK_ACL 103 |
#define TYPE_CAPABILITY_ACL 103 |
127 |
#define TYPE_SIGNAL_ACL 104 |
#define TYPE_IP_NETWORK_ACL 104 |
128 |
|
#define TYPE_SIGNAL_ACL 105 |
129 |
|
|
130 |
/************************* Index numbers for Capability Controls. *************************/ |
/************************* Index numbers for Capability Controls. *************************/ |
131 |
|
|