[PATCH] Disable a.out for AMD64
[linux-2.6/history.git] / security / security.c
blob0fb1ad99cd3cd791a202b2bb0d07d3d03091b201
1 /*
2 * Security plug functions
4 * Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com>
5 * Copyright (C) 2001-2002 Greg Kroah-Hartman <greg@kroah.com>
6 * Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
14 #include <linux/config.h>
15 #include <linux/module.h>
16 #include <linux/init.h>
17 #include <linux/kernel.h>
18 #include <linux/sched.h>
19 #include <linux/security.h>
21 #define SECURITY_SCAFFOLD_VERSION "1.0.0"
23 /* things that live in dummy.c */
24 extern struct security_operations dummy_security_ops;
25 extern void security_fixup_ops (struct security_operations *ops);
27 struct security_operations *security_ops; /* Initialized to NULL */
29 static inline int verify (struct security_operations *ops)
31 /* verify the security_operations structure exists */
32 if (!ops) {
33 printk (KERN_INFO "Passed a NULL security_operations "
34 "pointer, %s failed.\n", __FUNCTION__);
35 return -EINVAL;
37 security_fixup_ops (ops);
38 return 0;
41 static void __init do_security_initcalls(void)
43 initcall_t *call;
44 call = &__security_initcall_start;
45 while (call < &__security_initcall_end) {
46 (*call)();
47 call++;
51 /**
52 * security_scaffolding_startup - initialzes the security scaffolding framework
54 * This should be called early in the kernel initialization sequence.
56 int __init security_scaffolding_startup (void)
58 printk (KERN_INFO "Security Scaffold v" SECURITY_SCAFFOLD_VERSION
59 " initialized\n");
61 if (verify (&dummy_security_ops)) {
62 printk (KERN_ERR "%s could not verify "
63 "dummy_security_ops structure.\n", __FUNCTION__);
64 return -EIO;
67 security_ops = &dummy_security_ops;
68 do_security_initcalls();
70 return 0;
73 /**
74 * register_security - registers a security framework with the kernel
75 * @ops: a pointer to the struct security_options that is to be registered
77 * This function is to allow a security module to register itself with the
78 * kernel security subsystem. Some rudimentary checking is done on the @ops
79 * value passed to this function. A call to unregister_security() should be
80 * done to remove this security_options structure from the kernel.
82 * If the @ops structure does not contain function pointers for all hooks in
83 * the structure, or there is already a security module registered with the
84 * kernel, an error will be returned. Otherwise 0 is returned on success.
86 int register_security (struct security_operations *ops)
88 if (verify (ops)) {
89 printk (KERN_INFO "%s could not verify "
90 "security_operations structure.\n", __FUNCTION__);
91 return -EINVAL;
94 if (security_ops != &dummy_security_ops) {
95 printk (KERN_INFO "There is already a security "
96 "framework initialized, %s failed.\n", __FUNCTION__);
97 return -EINVAL;
100 security_ops = ops;
102 return 0;
106 * unregister_security - unregisters a security framework with the kernel
107 * @ops: a pointer to the struct security_options that is to be registered
109 * This function removes a struct security_operations variable that had
110 * previously been registered with a successful call to register_security().
112 * If @ops does not match the valued previously passed to register_security()
113 * an error is returned. Otherwise the default security options is set to the
114 * the dummy_security_ops structure, and 0 is returned.
116 int unregister_security (struct security_operations *ops)
118 if (ops != security_ops) {
119 printk (KERN_INFO "%s: trying to unregister "
120 "a security_opts structure that is not "
121 "registered, failing.\n", __FUNCTION__);
122 return -EINVAL;
125 security_ops = &dummy_security_ops;
127 return 0;
131 * mod_reg_security - allows security modules to be "stacked"
132 * @name: a pointer to a string with the name of the security_options to be registered
133 * @ops: a pointer to the struct security_options that is to be registered
135 * This function allows security modules to be stacked if the currently loaded
136 * security module allows this to happen. It passes the @name and @ops to the
137 * register_security function of the currently loaded security module.
139 * The return value depends on the currently loaded security module, with 0 as
140 * success.
142 int mod_reg_security (const char *name, struct security_operations *ops)
144 if (verify (ops)) {
145 printk (KERN_INFO "%s could not verify "
146 "security operations.\n", __FUNCTION__);
147 return -EINVAL;
150 if (ops == security_ops) {
151 printk (KERN_INFO "%s security operations "
152 "already registered.\n", __FUNCTION__);
153 return -EINVAL;
156 return security_ops->register_security (name, ops);
160 * mod_unreg_security - allows a security module registered with mod_reg_security() to be unloaded
161 * @name: a pointer to a string with the name of the security_options to be removed
162 * @ops: a pointer to the struct security_options that is to be removed
164 * This function allows security modules that have been successfully registered
165 * with a call to mod_reg_security() to be unloaded from the system.
166 * This calls the currently loaded security module's unregister_security() call
167 * with the @name and @ops variables.
169 * The return value depends on the currently loaded security module, with 0 as
170 * success.
172 int mod_unreg_security (const char *name, struct security_operations *ops)
174 if (ops == security_ops) {
175 printk (KERN_INFO "%s invalid attempt to unregister "
176 " primary security ops.\n", __FUNCTION__);
177 return -EINVAL;
180 return security_ops->unregister_security (name, ops);
184 * capable - calls the currently loaded security module's capable() function with the specified capability
185 * @cap: the requested capability level.
187 * This function calls the currently loaded security module's cabable()
188 * function with a pointer to the current task and the specified @cap value.
190 * This allows the security module to implement the capable function call
191 * however it chooses to.
193 int capable (int cap)
195 if (security_ops->capable (current, cap)) {
196 /* capability denied */
197 return 0;
200 /* capability granted */
201 current->flags |= PF_SUPERPRIV;
202 return 1;
205 EXPORT_SYMBOL_GPL(register_security);
206 EXPORT_SYMBOL_GPL(unregister_security);
207 EXPORT_SYMBOL_GPL(mod_reg_security);
208 EXPORT_SYMBOL_GPL(mod_unreg_security);
209 EXPORT_SYMBOL(capable);
210 EXPORT_SYMBOL(security_ops);