^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* SPDX-License-Identifier: GPL-2.0-only */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * AppArmor security module
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * This file contains AppArmor capability mediation definitions.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * Copyright (C) 1998-2008 Novell/SUSE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * Copyright 2009-2013 Canonical Ltd.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #ifndef __AA_CAPABILITY_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #define __AA_CAPABILITY_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #include <linux/sched.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include "apparmorfs.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) struct aa_label;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) /* aa_caps - confinement data for capabilities
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) * @allowed: capabilities mask
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) * @audit: caps that are to be audited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) * @denied: caps that are explicitly denied
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) * @quiet: caps that should not be audited
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) * @kill: caps that when requested will result in the task being killed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) * @extended: caps that are subject finer grained mediation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) struct aa_caps {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) kernel_cap_t allow;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) kernel_cap_t audit;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) kernel_cap_t denied;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) kernel_cap_t quiet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) kernel_cap_t kill;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) kernel_cap_t extended;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) extern struct aa_sfs_entry aa_sfs_entry_caps[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) int aa_capable(struct aa_label *label, int cap, unsigned int opts);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) static inline void aa_free_cap_rules(struct aa_caps *caps)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) /* NOP */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) #endif /* __AA_CAPBILITY_H */