diff options
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 41 |
1 files changed, 32 insertions, 9 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 3416cb85e77b..f9c390494f18 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -48,7 +48,8 @@ struct audit_krule; | |||
48 | * These functions are in security/capability.c and are used | 48 | * These functions are in security/capability.c and are used |
49 | * as the default capabilities functions | 49 | * as the default capabilities functions |
50 | */ | 50 | */ |
51 | extern int cap_capable(struct task_struct *tsk, int cap, int audit); | 51 | extern int cap_capable(struct task_struct *tsk, const struct cred *cred, |
52 | int cap, int audit); | ||
52 | extern int cap_settime(struct timespec *ts, struct timezone *tz); | 53 | extern int cap_settime(struct timespec *ts, struct timezone *tz); |
53 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); | 54 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); |
54 | extern int cap_ptrace_traceme(struct task_struct *parent); | 55 | extern int cap_ptrace_traceme(struct task_struct *parent); |
@@ -1195,9 +1196,12 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1195 | * @permitted contains the permitted capability set. | 1196 | * @permitted contains the permitted capability set. |
1196 | * Return 0 and update @new if permission is granted. | 1197 | * Return 0 and update @new if permission is granted. |
1197 | * @capable: | 1198 | * @capable: |
1198 | * Check whether the @tsk process has the @cap capability. | 1199 | * Check whether the @tsk process has the @cap capability in the indicated |
1200 | * credentials. | ||
1199 | * @tsk contains the task_struct for the process. | 1201 | * @tsk contains the task_struct for the process. |
1202 | * @cred contains the credentials to use. | ||
1200 | * @cap contains the capability <include/linux/capability.h>. | 1203 | * @cap contains the capability <include/linux/capability.h>. |
1204 | * @audit: Whether to write an audit message or not | ||
1201 | * Return 0 if the capability is granted for @tsk. | 1205 | * Return 0 if the capability is granted for @tsk. |
1202 | * @acct: | 1206 | * @acct: |
1203 | * Check permission before enabling or disabling process accounting. If | 1207 | * Check permission before enabling or disabling process accounting. If |
@@ -1290,7 +1294,8 @@ struct security_operations { | |||
1290 | const kernel_cap_t *effective, | 1294 | const kernel_cap_t *effective, |
1291 | const kernel_cap_t *inheritable, | 1295 | const kernel_cap_t *inheritable, |
1292 | const kernel_cap_t *permitted); | 1296 | const kernel_cap_t *permitted); |
1293 | int (*capable) (struct task_struct *tsk, int cap, int audit); | 1297 | int (*capable) (struct task_struct *tsk, const struct cred *cred, |
1298 | int cap, int audit); | ||
1294 | int (*acct) (struct file *file); | 1299 | int (*acct) (struct file *file); |
1295 | int (*sysctl) (struct ctl_table *table, int op); | 1300 | int (*sysctl) (struct ctl_table *table, int op); |
1296 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); | 1301 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); |
@@ -1556,8 +1561,9 @@ int security_capset(struct cred *new, const struct cred *old, | |||
1556 | const kernel_cap_t *effective, | 1561 | const kernel_cap_t *effective, |
1557 | const kernel_cap_t *inheritable, | 1562 | const kernel_cap_t *inheritable, |
1558 | const kernel_cap_t *permitted); | 1563 | const kernel_cap_t *permitted); |
1559 | int security_capable(struct task_struct *tsk, int cap); | 1564 | int security_capable(int cap); |
1560 | int security_capable_noaudit(struct task_struct *tsk, int cap); | 1565 | int security_real_capable(struct task_struct *tsk, int cap); |
1566 | int security_real_capable_noaudit(struct task_struct *tsk, int cap); | ||
1561 | int security_acct(struct file *file); | 1567 | int security_acct(struct file *file); |
1562 | int security_sysctl(struct ctl_table *table, int op); | 1568 | int security_sysctl(struct ctl_table *table, int op); |
1563 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); | 1569 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); |
@@ -1754,14 +1760,31 @@ static inline int security_capset(struct cred *new, | |||
1754 | return cap_capset(new, old, effective, inheritable, permitted); | 1760 | return cap_capset(new, old, effective, inheritable, permitted); |
1755 | } | 1761 | } |
1756 | 1762 | ||
1757 | static inline int security_capable(struct task_struct *tsk, int cap) | 1763 | static inline int security_capable(int cap) |
1758 | { | 1764 | { |
1759 | return cap_capable(tsk, cap, SECURITY_CAP_AUDIT); | 1765 | return cap_capable(current, current_cred(), cap, SECURITY_CAP_AUDIT); |
1760 | } | 1766 | } |
1761 | 1767 | ||
1762 | static inline int security_capable_noaudit(struct task_struct *tsk, int cap) | 1768 | static inline int security_real_capable(struct task_struct *tsk, int cap) |
1763 | { | 1769 | { |
1764 | return cap_capable(tsk, cap, SECURITY_CAP_NOAUDIT); | 1770 | int ret; |
1771 | |||
1772 | rcu_read_lock(); | ||
1773 | ret = cap_capable(tsk, __task_cred(tsk), cap, SECURITY_CAP_AUDIT); | ||
1774 | rcu_read_unlock(); | ||
1775 | return ret; | ||
1776 | } | ||
1777 | |||
1778 | static inline | ||
1779 | int security_real_capable_noaudit(struct task_struct *tsk, int cap) | ||
1780 | { | ||
1781 | int ret; | ||
1782 | |||
1783 | rcu_read_lock(); | ||
1784 | ret = cap_capable(tsk, __task_cred(tsk), cap, | ||
1785 | SECURITY_CAP_NOAUDIT); | ||
1786 | rcu_read_unlock(); | ||
1787 | return ret; | ||
1765 | } | 1788 | } |
1766 | 1789 | ||
1767 | static inline int security_acct(struct file *file) | 1790 | static inline int security_acct(struct file *file) |