blob: d420e2d10b31bc50ec596d43b3d52fd92eef92dc [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001/* SPDX-License-Identifier: GPL-2.0-only */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * AppArmor security module
4 *
5 * This file contains AppArmor capability mediation definitions.
6 *
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2013 Canonical Ltd.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00009 */
10
11#ifndef __AA_CAPABILITY_H
12#define __AA_CAPABILITY_H
13
14#include <linux/sched.h>
15
16#include "apparmorfs.h"
17
18struct aa_label;
19
20/* aa_caps - confinement data for capabilities
21 * @allowed: capabilities mask
22 * @audit: caps that are to be audited
23 * @denied: caps that are explicitly denied
24 * @quiet: caps that should not be audited
25 * @kill: caps that when requested will result in the task being killed
26 * @extended: caps that are subject finer grained mediation
27 */
28struct aa_caps {
29 kernel_cap_t allow;
30 kernel_cap_t audit;
31 kernel_cap_t denied;
32 kernel_cap_t quiet;
33 kernel_cap_t kill;
34 kernel_cap_t extended;
35};
36
37extern struct aa_sfs_entry aa_sfs_entry_caps[];
38
David Brazdil0f672f62019-12-10 10:32:29 +000039int aa_capable(struct aa_label *label, int cap, unsigned int opts);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000040
41static inline void aa_free_cap_rules(struct aa_caps *caps)
42{
43 /* NOP */
44}
45
46#endif /* __AA_CAPBILITY_H */