xref: /OK3568_Linux_fs/kernel/security/selinux/ss/constraint.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * A constraint is a condition that must be satisfied in
4*4882a593Smuzhiyun  * order for one or more permissions to be granted.
5*4882a593Smuzhiyun  * Constraints are used to impose additional restrictions
6*4882a593Smuzhiyun  * beyond the type-based rules in `te' or the role-based
7*4882a593Smuzhiyun  * transition rules in `rbac'.  Constraints are typically
8*4882a593Smuzhiyun  * used to prevent a process from transitioning to a new user
9*4882a593Smuzhiyun  * identity or role unless it is in a privileged type.
10*4882a593Smuzhiyun  * Constraints are likewise typically used to prevent a
11*4882a593Smuzhiyun  * process from labeling an object with a different user
12*4882a593Smuzhiyun  * identity.
13*4882a593Smuzhiyun  *
14*4882a593Smuzhiyun  * Author : Stephen Smalley, <sds@tycho.nsa.gov>
15*4882a593Smuzhiyun  */
16*4882a593Smuzhiyun #ifndef _SS_CONSTRAINT_H_
17*4882a593Smuzhiyun #define _SS_CONSTRAINT_H_
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #include "ebitmap.h"
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun #define CEXPR_MAXDEPTH 5
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun struct constraint_expr {
24*4882a593Smuzhiyun #define CEXPR_NOT		1 /* not expr */
25*4882a593Smuzhiyun #define CEXPR_AND		2 /* expr and expr */
26*4882a593Smuzhiyun #define CEXPR_OR		3 /* expr or expr */
27*4882a593Smuzhiyun #define CEXPR_ATTR		4 /* attr op attr */
28*4882a593Smuzhiyun #define CEXPR_NAMES		5 /* attr op names */
29*4882a593Smuzhiyun 	u32 expr_type;		/* expression type */
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun #define CEXPR_USER 1		/* user */
32*4882a593Smuzhiyun #define CEXPR_ROLE 2		/* role */
33*4882a593Smuzhiyun #define CEXPR_TYPE 4		/* type */
34*4882a593Smuzhiyun #define CEXPR_TARGET 8		/* target if set, source otherwise */
35*4882a593Smuzhiyun #define CEXPR_XTARGET 16	/* special 3rd target for validatetrans rule */
36*4882a593Smuzhiyun #define CEXPR_L1L2 32		/* low level 1 vs. low level 2 */
37*4882a593Smuzhiyun #define CEXPR_L1H2 64		/* low level 1 vs. high level 2 */
38*4882a593Smuzhiyun #define CEXPR_H1L2 128		/* high level 1 vs. low level 2 */
39*4882a593Smuzhiyun #define CEXPR_H1H2 256		/* high level 1 vs. high level 2 */
40*4882a593Smuzhiyun #define CEXPR_L1H1 512		/* low level 1 vs. high level 1 */
41*4882a593Smuzhiyun #define CEXPR_L2H2 1024		/* low level 2 vs. high level 2 */
42*4882a593Smuzhiyun 	u32 attr;		/* attribute */
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun #define CEXPR_EQ     1		/* == or eq */
45*4882a593Smuzhiyun #define CEXPR_NEQ    2		/* != */
46*4882a593Smuzhiyun #define CEXPR_DOM    3		/* dom */
47*4882a593Smuzhiyun #define CEXPR_DOMBY  4		/* domby  */
48*4882a593Smuzhiyun #define CEXPR_INCOMP 5		/* incomp */
49*4882a593Smuzhiyun 	u32 op;			/* operator */
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun 	struct ebitmap names;	/* names */
52*4882a593Smuzhiyun 	struct type_set *type_names;
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun 	struct constraint_expr *next;   /* next expression */
55*4882a593Smuzhiyun };
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun struct constraint_node {
58*4882a593Smuzhiyun 	u32 permissions;	/* constrained permissions */
59*4882a593Smuzhiyun 	struct constraint_expr *expr;	/* constraint on permissions */
60*4882a593Smuzhiyun 	struct constraint_node *next;	/* next constraint */
61*4882a593Smuzhiyun };
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun #endif	/* _SS_CONSTRAINT_H_ */
64