diff options
| -rw-r--r-- | include/linux/security.h | 30 | ||||
| -rw-r--r-- | security/dummy.c | 16 | ||||
| -rw-r--r-- | security/security.c | 10 |
3 files changed, 54 insertions, 2 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index c673dfd4dffc..45717d9d9656 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
| @@ -468,6 +468,11 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
| 468 | * @dentry is the dentry being changed. | 468 | * @dentry is the dentry being changed. |
| 469 | * Return 0 on success. If error is returned, then the operation | 469 | * Return 0 on success. If error is returned, then the operation |
| 470 | * causing setuid bit removal is failed. | 470 | * causing setuid bit removal is failed. |
| 471 | * @inode_getsecid: | ||
| 472 | * Get the secid associated with the node. | ||
| 473 | * @inode contains a pointer to the inode. | ||
| 474 | * @secid contains a pointer to the location where result will be saved. | ||
| 475 | * In case of failure, @secid will be set to zero. | ||
| 471 | * | 476 | * |
| 472 | * Security hooks for file operations | 477 | * Security hooks for file operations |
| 473 | * | 478 | * |
| @@ -636,6 +641,8 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
| 636 | * @task_getsecid: | 641 | * @task_getsecid: |
| 637 | * Retrieve the security identifier of the process @p. | 642 | * Retrieve the security identifier of the process @p. |
| 638 | * @p contains the task_struct for the process and place is into @secid. | 643 | * @p contains the task_struct for the process and place is into @secid. |
| 644 | * In case of failure, @secid will be set to zero. | ||
| 645 | * | ||
| 639 | * @task_setgroups: | 646 | * @task_setgroups: |
| 640 | * Check permission before setting the supplementary group set of the | 647 | * Check permission before setting the supplementary group set of the |
| 641 | * current process. | 648 | * current process. |
| @@ -997,6 +1004,11 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
| 997 | * @ipcp contains the kernel IPC permission structure | 1004 | * @ipcp contains the kernel IPC permission structure |
| 998 | * @flag contains the desired (requested) permission set | 1005 | * @flag contains the desired (requested) permission set |
| 999 | * Return 0 if permission is granted. | 1006 | * Return 0 if permission is granted. |
| 1007 | * @ipc_getsecid: | ||
| 1008 | * Get the secid associated with the ipc object. | ||
| 1009 | * @ipcp contains the kernel IPC permission structure. | ||
| 1010 | * @secid contains a pointer to the location where result will be saved. | ||
| 1011 | * In case of failure, @secid will be set to zero. | ||
| 1000 | * | 1012 | * |
| 1001 | * Security hooks for individual messages held in System V IPC message queues | 1013 | * Security hooks for individual messages held in System V IPC message queues |
| 1002 | * @msg_msg_alloc_security: | 1014 | * @msg_msg_alloc_security: |
| @@ -1317,6 +1329,7 @@ struct security_operations { | |||
| 1317 | int (*inode_getsecurity)(const struct inode *inode, const char *name, void **buffer, bool alloc); | 1329 | int (*inode_getsecurity)(const struct inode *inode, const char *name, void **buffer, bool alloc); |
| 1318 | int (*inode_setsecurity)(struct inode *inode, const char *name, const void *value, size_t size, int flags); | 1330 | int (*inode_setsecurity)(struct inode *inode, const char *name, const void *value, size_t size, int flags); |
| 1319 | int (*inode_listsecurity)(struct inode *inode, char *buffer, size_t buffer_size); | 1331 | int (*inode_listsecurity)(struct inode *inode, char *buffer, size_t buffer_size); |
| 1332 | void (*inode_getsecid)(const struct inode *inode, u32 *secid); | ||
| 1320 | 1333 | ||
| 1321 | int (*file_permission) (struct file * file, int mask); | 1334 | int (*file_permission) (struct file * file, int mask); |
| 1322 | int (*file_alloc_security) (struct file * file); | 1335 | int (*file_alloc_security) (struct file * file); |
| @@ -1369,6 +1382,7 @@ struct security_operations { | |||
| 1369 | void (*task_to_inode)(struct task_struct *p, struct inode *inode); | 1382 | void (*task_to_inode)(struct task_struct *p, struct inode *inode); |
| 1370 | 1383 | ||
| 1371 | int (*ipc_permission) (struct kern_ipc_perm * ipcp, short flag); | 1384 | int (*ipc_permission) (struct kern_ipc_perm * ipcp, short flag); |
| 1385 | void (*ipc_getsecid) (struct kern_ipc_perm *ipcp, u32 *secid); | ||
| 1372 | 1386 | ||
| 1373 | int (*msg_msg_alloc_security) (struct msg_msg * msg); | 1387 | int (*msg_msg_alloc_security) (struct msg_msg * msg); |
| 1374 | void (*msg_msg_free_security) (struct msg_msg * msg); | 1388 | void (*msg_msg_free_security) (struct msg_msg * msg); |
| @@ -1578,6 +1592,7 @@ int security_inode_killpriv(struct dentry *dentry); | |||
| 1578 | int security_inode_getsecurity(const struct inode *inode, const char *name, void **buffer, bool alloc); | 1592 | int security_inode_getsecurity(const struct inode *inode, const char *name, void **buffer, bool alloc); |
| 1579 | int security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags); | 1593 | int security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags); |
| 1580 | int security_inode_listsecurity(struct inode *inode, char *buffer, size_t buffer_size); | 1594 | int security_inode_listsecurity(struct inode *inode, char *buffer, size_t buffer_size); |
| 1595 | void security_inode_getsecid(const struct inode *inode, u32 *secid); | ||
| 1581 | int security_file_permission(struct file *file, int mask); | 1596 | int security_file_permission(struct file *file, int mask); |
| 1582 | int security_file_alloc(struct file *file); | 1597 | int security_file_alloc(struct file *file); |
| 1583 | void security_file_free(struct file *file); | 1598 | void security_file_free(struct file *file); |
| @@ -1622,6 +1637,7 @@ int security_task_prctl(int option, unsigned long arg2, unsigned long arg3, | |||
| 1622 | void security_task_reparent_to_init(struct task_struct *p); | 1637 | void security_task_reparent_to_init(struct task_struct *p); |
| 1623 | void security_task_to_inode(struct task_struct *p, struct inode *inode); | 1638 | void security_task_to_inode(struct task_struct *p, struct inode *inode); |
| 1624 | int security_ipc_permission(struct kern_ipc_perm *ipcp, short flag); | 1639 | int security_ipc_permission(struct kern_ipc_perm *ipcp, short flag); |
| 1640 | void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid); | ||
| 1625 | int security_msg_msg_alloc(struct msg_msg *msg); | 1641 | int security_msg_msg_alloc(struct msg_msg *msg); |
| 1626 | void security_msg_msg_free(struct msg_msg *msg); | 1642 | void security_msg_msg_free(struct msg_msg *msg); |
| 1627 | int security_msg_queue_alloc(struct msg_queue *msq); | 1643 | int security_msg_queue_alloc(struct msg_queue *msq); |
| @@ -2022,6 +2038,11 @@ static inline int security_inode_listsecurity(struct inode *inode, char *buffer, | |||
| 2022 | return 0; | 2038 | return 0; |
| 2023 | } | 2039 | } |
| 2024 | 2040 | ||
| 2041 | static inline void security_inode_getsecid(const struct inode *inode, u32 *secid) | ||
| 2042 | { | ||
| 2043 | *secid = 0; | ||
| 2044 | } | ||
| 2045 | |||
| 2025 | static inline int security_file_permission (struct file *file, int mask) | 2046 | static inline int security_file_permission (struct file *file, int mask) |
| 2026 | { | 2047 | { |
| 2027 | return 0; | 2048 | return 0; |
| @@ -2137,7 +2158,9 @@ static inline int security_task_getsid (struct task_struct *p) | |||
| 2137 | } | 2158 | } |
| 2138 | 2159 | ||
| 2139 | static inline void security_task_getsecid (struct task_struct *p, u32 *secid) | 2160 | static inline void security_task_getsecid (struct task_struct *p, u32 *secid) |
| 2140 | { } | 2161 | { |
| 2162 | *secid = 0; | ||
| 2163 | } | ||
| 2141 | 2164 | ||
| 2142 | static inline int security_task_setgroups (struct group_info *group_info) | 2165 | static inline int security_task_setgroups (struct group_info *group_info) |
| 2143 | { | 2166 | { |
| @@ -2216,6 +2239,11 @@ static inline int security_ipc_permission (struct kern_ipc_perm *ipcp, | |||
| 2216 | return 0; | 2239 | return 0; |
| 2217 | } | 2240 | } |
| 2218 | 2241 | ||
| 2242 | static inline void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) | ||
| 2243 | { | ||
| 2244 | *secid = 0; | ||
| 2245 | } | ||
| 2246 | |||
| 2219 | static inline int security_msg_msg_alloc (struct msg_msg * msg) | 2247 | static inline int security_msg_msg_alloc (struct msg_msg * msg) |
| 2220 | { | 2248 | { |
| 2221 | return 0; | 2249 | return 0; |
diff --git a/security/dummy.c b/security/dummy.c index 78d8f92310a4..fb2e942efbb6 100644 --- a/security/dummy.c +++ b/security/dummy.c | |||
| @@ -424,6 +424,11 @@ static int dummy_inode_listsecurity(struct inode *inode, char *buffer, size_t bu | |||
| 424 | return 0; | 424 | return 0; |
| 425 | } | 425 | } |
| 426 | 426 | ||
| 427 | static void dummy_inode_getsecid(const struct inode *inode, u32 *secid) | ||
| 428 | { | ||
| 429 | *secid = 0; | ||
| 430 | } | ||
| 431 | |||
| 427 | static int dummy_file_permission (struct file *file, int mask) | 432 | static int dummy_file_permission (struct file *file, int mask) |
| 428 | { | 433 | { |
| 429 | return 0; | 434 | return 0; |
| @@ -542,7 +547,9 @@ static int dummy_task_getsid (struct task_struct *p) | |||
| 542 | } | 547 | } |
| 543 | 548 | ||
| 544 | static void dummy_task_getsecid (struct task_struct *p, u32 *secid) | 549 | static void dummy_task_getsecid (struct task_struct *p, u32 *secid) |
| 545 | { } | 550 | { |
| 551 | *secid = 0; | ||
| 552 | } | ||
| 546 | 553 | ||
| 547 | static int dummy_task_setgroups (struct group_info *group_info) | 554 | static int dummy_task_setgroups (struct group_info *group_info) |
| 548 | { | 555 | { |
| @@ -616,6 +623,11 @@ static int dummy_ipc_permission (struct kern_ipc_perm *ipcp, short flag) | |||
| 616 | return 0; | 623 | return 0; |
| 617 | } | 624 | } |
| 618 | 625 | ||
| 626 | static void dummy_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) | ||
| 627 | { | ||
| 628 | *secid = 0; | ||
| 629 | } | ||
| 630 | |||
| 619 | static int dummy_msg_msg_alloc_security (struct msg_msg *msg) | 631 | static int dummy_msg_msg_alloc_security (struct msg_msg *msg) |
| 620 | { | 632 | { |
| 621 | return 0; | 633 | return 0; |
| @@ -1058,6 +1070,7 @@ void security_fixup_ops (struct security_operations *ops) | |||
| 1058 | set_to_dummy_if_null(ops, inode_getsecurity); | 1070 | set_to_dummy_if_null(ops, inode_getsecurity); |
| 1059 | set_to_dummy_if_null(ops, inode_setsecurity); | 1071 | set_to_dummy_if_null(ops, inode_setsecurity); |
| 1060 | set_to_dummy_if_null(ops, inode_listsecurity); | 1072 | set_to_dummy_if_null(ops, inode_listsecurity); |
| 1073 | set_to_dummy_if_null(ops, inode_getsecid); | ||
| 1061 | set_to_dummy_if_null(ops, file_permission); | 1074 | set_to_dummy_if_null(ops, file_permission); |
| 1062 | set_to_dummy_if_null(ops, file_alloc_security); | 1075 | set_to_dummy_if_null(ops, file_alloc_security); |
| 1063 | set_to_dummy_if_null(ops, file_free_security); | 1076 | set_to_dummy_if_null(ops, file_free_security); |
| @@ -1094,6 +1107,7 @@ void security_fixup_ops (struct security_operations *ops) | |||
| 1094 | set_to_dummy_if_null(ops, task_reparent_to_init); | 1107 | set_to_dummy_if_null(ops, task_reparent_to_init); |
| 1095 | set_to_dummy_if_null(ops, task_to_inode); | 1108 | set_to_dummy_if_null(ops, task_to_inode); |
| 1096 | set_to_dummy_if_null(ops, ipc_permission); | 1109 | set_to_dummy_if_null(ops, ipc_permission); |
| 1110 | set_to_dummy_if_null(ops, ipc_getsecid); | ||
| 1097 | set_to_dummy_if_null(ops, msg_msg_alloc_security); | 1111 | set_to_dummy_if_null(ops, msg_msg_alloc_security); |
| 1098 | set_to_dummy_if_null(ops, msg_msg_free_security); | 1112 | set_to_dummy_if_null(ops, msg_msg_free_security); |
| 1099 | set_to_dummy_if_null(ops, msg_queue_alloc_security); | 1113 | set_to_dummy_if_null(ops, msg_queue_alloc_security); |
diff --git a/security/security.c b/security/security.c index 9beecac933b4..290482bdbbb0 100644 --- a/security/security.c +++ b/security/security.c | |||
| @@ -523,6 +523,11 @@ int security_inode_listsecurity(struct inode *inode, char *buffer, size_t buffer | |||
| 523 | return security_ops->inode_listsecurity(inode, buffer, buffer_size); | 523 | return security_ops->inode_listsecurity(inode, buffer, buffer_size); |
| 524 | } | 524 | } |
| 525 | 525 | ||
| 526 | void security_inode_getsecid(const struct inode *inode, u32 *secid) | ||
| 527 | { | ||
| 528 | security_ops->inode_getsecid(inode, secid); | ||
| 529 | } | ||
| 530 | |||
| 526 | int security_file_permission(struct file *file, int mask) | 531 | int security_file_permission(struct file *file, int mask) |
| 527 | { | 532 | { |
| 528 | return security_ops->file_permission(file, mask); | 533 | return security_ops->file_permission(file, mask); |
| @@ -712,6 +717,11 @@ int security_ipc_permission(struct kern_ipc_perm *ipcp, short flag) | |||
| 712 | return security_ops->ipc_permission(ipcp, flag); | 717 | return security_ops->ipc_permission(ipcp, flag); |
| 713 | } | 718 | } |
| 714 | 719 | ||
| 720 | void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) | ||
| 721 | { | ||
| 722 | security_ops->ipc_getsecid(ipcp, secid); | ||
| 723 | } | ||
| 724 | |||
| 715 | int security_msg_msg_alloc(struct msg_msg *msg) | 725 | int security_msg_msg_alloc(struct msg_msg *msg) |
| 716 | { | 726 | { |
| 717 | return security_ops->msg_msg_alloc_security(msg); | 727 | return security_ops->msg_msg_alloc_security(msg); |
