diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2012-06-01 18:14:19 -0400 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-09-21 06:13:25 -0400 |
commit | d2b31ca644fdc8704de3367a6a56a5c958c77f53 (patch) | |
tree | 70967aaec7a5a86ffdd6adf3a45d3b3cb8833678 /security | |
parent | 8b94eea4bfb8df693c5b35d08b74f13cfb92f3de (diff) |
userns: Teach security_path_chown to take kuids and kgids
Don't make the security modules deal with raw user space uid and
gids instead pass in a kuid_t and a kgid_t so that security modules
only have to deal with internal kernel uids and gids.
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: James Morris <james.l.morris@oracle.com>
Cc: John Johansen <john.johansen@canonical.com>
Cc: Kentaro Takeda <takedakn@nttdata.co.jp>
Cc: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/apparmor/lsm.c | 2 | ||||
-rw-r--r-- | security/capability.c | 2 | ||||
-rw-r--r-- | security/security.c | 2 | ||||
-rw-r--r-- | security/tomoyo/tomoyo.c | 12 |
4 files changed, 10 insertions, 8 deletions
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index 8ea39aabe948..8c2a7f6b35e2 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c | |||
@@ -352,7 +352,7 @@ static int apparmor_path_chmod(struct path *path, umode_t mode) | |||
352 | return common_perm_mnt_dentry(OP_CHMOD, path->mnt, path->dentry, AA_MAY_CHMOD); | 352 | return common_perm_mnt_dentry(OP_CHMOD, path->mnt, path->dentry, AA_MAY_CHMOD); |
353 | } | 353 | } |
354 | 354 | ||
355 | static int apparmor_path_chown(struct path *path, uid_t uid, gid_t gid) | 355 | static int apparmor_path_chown(struct path *path, kuid_t uid, kgid_t gid) |
356 | { | 356 | { |
357 | struct path_cond cond = { path->dentry->d_inode->i_uid, | 357 | struct path_cond cond = { path->dentry->d_inode->i_uid, |
358 | path->dentry->d_inode->i_mode | 358 | path->dentry->d_inode->i_mode |
diff --git a/security/capability.c b/security/capability.c index 61095df8b89a..a40aac677c72 100644 --- a/security/capability.c +++ b/security/capability.c | |||
@@ -284,7 +284,7 @@ static int cap_path_chmod(struct path *path, umode_t mode) | |||
284 | return 0; | 284 | return 0; |
285 | } | 285 | } |
286 | 286 | ||
287 | static int cap_path_chown(struct path *path, uid_t uid, gid_t gid) | 287 | static int cap_path_chown(struct path *path, kuid_t uid, kgid_t gid) |
288 | { | 288 | { |
289 | return 0; | 289 | return 0; |
290 | } | 290 | } |
diff --git a/security/security.c b/security/security.c index 860aeb349cb3..f9a2f2ef2454 100644 --- a/security/security.c +++ b/security/security.c | |||
@@ -434,7 +434,7 @@ int security_path_chmod(struct path *path, umode_t mode) | |||
434 | return security_ops->path_chmod(path, mode); | 434 | return security_ops->path_chmod(path, mode); |
435 | } | 435 | } |
436 | 436 | ||
437 | int security_path_chown(struct path *path, uid_t uid, gid_t gid) | 437 | int security_path_chown(struct path *path, kuid_t uid, kgid_t gid) |
438 | { | 438 | { |
439 | if (unlikely(IS_PRIVATE(path->dentry->d_inode))) | 439 | if (unlikely(IS_PRIVATE(path->dentry->d_inode))) |
440 | return 0; | 440 | return 0; |
diff --git a/security/tomoyo/tomoyo.c b/security/tomoyo/tomoyo.c index c2d04a50f76a..d88eb3a046ed 100644 --- a/security/tomoyo/tomoyo.c +++ b/security/tomoyo/tomoyo.c | |||
@@ -373,13 +373,15 @@ static int tomoyo_path_chmod(struct path *path, umode_t mode) | |||
373 | * | 373 | * |
374 | * Returns 0 on success, negative value otherwise. | 374 | * Returns 0 on success, negative value otherwise. |
375 | */ | 375 | */ |
376 | static int tomoyo_path_chown(struct path *path, uid_t uid, gid_t gid) | 376 | static int tomoyo_path_chown(struct path *path, kuid_t uid, kgid_t gid) |
377 | { | 377 | { |
378 | int error = 0; | 378 | int error = 0; |
379 | if (uid != (uid_t) -1) | 379 | if (uid_valid(uid)) |
380 | error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path, uid); | 380 | error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path, |
381 | if (!error && gid != (gid_t) -1) | 381 | from_kuid(&init_user_ns, uid)); |
382 | error = tomoyo_path_number_perm(TOMOYO_TYPE_CHGRP, path, gid); | 382 | if (!error && gid_valid(gid)) |
383 | error = tomoyo_path_number_perm(TOMOYO_TYPE_CHGRP, path, | ||
384 | from_kgid(&init_user_ns, gid)); | ||
383 | return error; | 385 | return error; |
384 | } | 386 | } |
385 | 387 | ||