diff options
Diffstat (limited to 'include')
-rw-r--r-- | include/linux/capability.h | 17 | ||||
-rw-r--r-- | include/linux/security.h | 49 |
2 files changed, 55 insertions, 11 deletions
diff --git a/include/linux/capability.h b/include/linux/capability.h index e22f48c2a46f..5b8a13214451 100644 --- a/include/linux/capability.h +++ b/include/linux/capability.h | |||
@@ -529,8 +529,21 @@ extern const kernel_cap_t __cap_init_eff_set; | |||
529 | * | 529 | * |
530 | * Note that this does not set PF_SUPERPRIV on the task. | 530 | * Note that this does not set PF_SUPERPRIV on the task. |
531 | */ | 531 | */ |
532 | #define has_capability(t, cap) (security_capable((t), (cap)) == 0) | 532 | #define has_capability(t, cap) (security_task_capable((t), (cap)) == 0) |
533 | #define has_capability_noaudit(t, cap) (security_capable_noaudit((t), (cap)) == 0) | 533 | |
534 | /** | ||
535 | * has_capability_noaudit - Determine if a task has a superior capability available (unaudited) | ||
536 | * @t: The task in question | ||
537 | * @cap: The capability to be tested for | ||
538 | * | ||
539 | * Return true if the specified task has the given superior capability | ||
540 | * currently in effect, false if not, but don't write an audit message for the | ||
541 | * check. | ||
542 | * | ||
543 | * Note that this does not set PF_SUPERPRIV on the task. | ||
544 | */ | ||
545 | #define has_capability_noaudit(t, cap) \ | ||
546 | (security_task_capable_noaudit((t), (cap)) == 0) | ||
534 | 547 | ||
535 | extern int capable(int cap); | 548 | extern int capable(int cap); |
536 | 549 | ||
diff --git a/include/linux/security.h b/include/linux/security.h index 3416cb85e77b..76989b8bc34f 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -48,7 +48,9 @@ struct audit_krule; | |||
48 | * These functions are in security/capability.c and are used | 48 | * These functions are in security/capability.c and are used |
49 | * as the default capabilities functions | 49 | * as the default capabilities functions |
50 | */ | 50 | */ |
51 | extern int cap_capable(struct task_struct *tsk, int cap, int audit); | 51 | extern int cap_capable(int cap, int audit); |
52 | extern int cap_task_capable(struct task_struct *tsk, const struct cred *cred, | ||
53 | int cap, int audit); | ||
52 | extern int cap_settime(struct timespec *ts, struct timezone *tz); | 54 | extern int cap_settime(struct timespec *ts, struct timezone *tz); |
53 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); | 55 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); |
54 | extern int cap_ptrace_traceme(struct task_struct *parent); | 56 | extern int cap_ptrace_traceme(struct task_struct *parent); |
@@ -1195,9 +1197,18 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1195 | * @permitted contains the permitted capability set. | 1197 | * @permitted contains the permitted capability set. |
1196 | * Return 0 and update @new if permission is granted. | 1198 | * Return 0 and update @new if permission is granted. |
1197 | * @capable: | 1199 | * @capable: |
1198 | * Check whether the @tsk process has the @cap capability. | 1200 | * Check whether the current process has the @cap capability in its |
1201 | * subjective/effective credentials. | ||
1202 | * @cap contains the capability <include/linux/capability.h>. | ||
1203 | * @audit: Whether to write an audit message or not | ||
1204 | * Return 0 if the capability is granted for @tsk. | ||
1205 | * @task_capable: | ||
1206 | * Check whether the @tsk process has the @cap capability in its | ||
1207 | * objective/real credentials. | ||
1199 | * @tsk contains the task_struct for the process. | 1208 | * @tsk contains the task_struct for the process. |
1209 | * @cred contains the credentials to use. | ||
1200 | * @cap contains the capability <include/linux/capability.h>. | 1210 | * @cap contains the capability <include/linux/capability.h>. |
1211 | * @audit: Whether to write an audit message or not | ||
1201 | * Return 0 if the capability is granted for @tsk. | 1212 | * Return 0 if the capability is granted for @tsk. |
1202 | * @acct: | 1213 | * @acct: |
1203 | * Check permission before enabling or disabling process accounting. If | 1214 | * Check permission before enabling or disabling process accounting. If |
@@ -1290,7 +1301,9 @@ struct security_operations { | |||
1290 | const kernel_cap_t *effective, | 1301 | const kernel_cap_t *effective, |
1291 | const kernel_cap_t *inheritable, | 1302 | const kernel_cap_t *inheritable, |
1292 | const kernel_cap_t *permitted); | 1303 | const kernel_cap_t *permitted); |
1293 | int (*capable) (struct task_struct *tsk, int cap, int audit); | 1304 | int (*capable) (int cap, int audit); |
1305 | int (*task_capable) (struct task_struct *tsk, const struct cred *cred, | ||
1306 | int cap, int audit); | ||
1294 | int (*acct) (struct file *file); | 1307 | int (*acct) (struct file *file); |
1295 | int (*sysctl) (struct ctl_table *table, int op); | 1308 | int (*sysctl) (struct ctl_table *table, int op); |
1296 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); | 1309 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); |
@@ -1556,8 +1569,9 @@ int security_capset(struct cred *new, const struct cred *old, | |||
1556 | const kernel_cap_t *effective, | 1569 | const kernel_cap_t *effective, |
1557 | const kernel_cap_t *inheritable, | 1570 | const kernel_cap_t *inheritable, |
1558 | const kernel_cap_t *permitted); | 1571 | const kernel_cap_t *permitted); |
1559 | int security_capable(struct task_struct *tsk, int cap); | 1572 | int security_capable(int cap); |
1560 | int security_capable_noaudit(struct task_struct *tsk, int cap); | 1573 | int security_task_capable(struct task_struct *tsk, int cap); |
1574 | int security_task_capable_noaudit(struct task_struct *tsk, int cap); | ||
1561 | int security_acct(struct file *file); | 1575 | int security_acct(struct file *file); |
1562 | int security_sysctl(struct ctl_table *table, int op); | 1576 | int security_sysctl(struct ctl_table *table, int op); |
1563 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); | 1577 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); |
@@ -1754,14 +1768,31 @@ static inline int security_capset(struct cred *new, | |||
1754 | return cap_capset(new, old, effective, inheritable, permitted); | 1768 | return cap_capset(new, old, effective, inheritable, permitted); |
1755 | } | 1769 | } |
1756 | 1770 | ||
1757 | static inline int security_capable(struct task_struct *tsk, int cap) | 1771 | static inline int security_capable(int cap) |
1758 | { | 1772 | { |
1759 | return cap_capable(tsk, cap, SECURITY_CAP_AUDIT); | 1773 | return cap_capable(cap, SECURITY_CAP_AUDIT); |
1760 | } | 1774 | } |
1761 | 1775 | ||
1762 | static inline int security_capable_noaudit(struct task_struct *tsk, int cap) | 1776 | static inline int security_task_capable(struct task_struct *tsk, int cap) |
1763 | { | 1777 | { |
1764 | return cap_capable(tsk, cap, SECURITY_CAP_NOAUDIT); | 1778 | int ret; |
1779 | |||
1780 | rcu_read_lock(); | ||
1781 | ret = cap_task_capable(tsk, __task_cred(tsk), cap, SECURITY_CAP_AUDIT); | ||
1782 | rcu_read_unlock(); | ||
1783 | return ret; | ||
1784 | } | ||
1785 | |||
1786 | static inline | ||
1787 | int security_task_capable_noaudit(struct task_struct *tsk, int cap) | ||
1788 | { | ||
1789 | int ret; | ||
1790 | |||
1791 | rcu_read_lock(); | ||
1792 | ret = cap_task_capable(tsk, __task_cred(tsk), cap, | ||
1793 | SECURITY_CAP_NOAUDIT); | ||
1794 | rcu_read_unlock(); | ||
1795 | return ret; | ||
1765 | } | 1796 | } |
1766 | 1797 | ||
1767 | static inline int security_acct(struct file *file) | 1798 | static inline int security_acct(struct file *file) |