diff options
Diffstat (limited to 'include/linux')
-rw-r--r-- | include/linux/capability.h | 17 | ||||
-rw-r--r-- | include/linux/security.h | 41 |
2 files changed, 47 insertions, 11 deletions
diff --git a/include/linux/capability.h b/include/linux/capability.h index e22f48c2a46f..02bdb768d43b 100644 --- a/include/linux/capability.h +++ b/include/linux/capability.h | |||
@@ -529,8 +529,21 @@ extern const kernel_cap_t __cap_init_eff_set; | |||
529 | * | 529 | * |
530 | * Note that this does not set PF_SUPERPRIV on the task. | 530 | * Note that this does not set PF_SUPERPRIV on the task. |
531 | */ | 531 | */ |
532 | #define has_capability(t, cap) (security_capable((t), (cap)) == 0) | 532 | #define has_capability(t, cap) (security_real_capable((t), (cap)) == 0) |
533 | #define has_capability_noaudit(t, cap) (security_capable_noaudit((t), (cap)) == 0) | 533 | |
534 | /** | ||
535 | * has_capability_noaudit - Determine if a task has a superior capability available (unaudited) | ||
536 | * @t: The task in question | ||
537 | * @cap: The capability to be tested for | ||
538 | * | ||
539 | * Return true if the specified task has the given superior capability | ||
540 | * currently in effect, false if not, but don't write an audit message for the | ||
541 | * check. | ||
542 | * | ||
543 | * Note that this does not set PF_SUPERPRIV on the task. | ||
544 | */ | ||
545 | #define has_capability_noaudit(t, cap) \ | ||
546 | (security_real_capable_noaudit((t), (cap)) == 0) | ||
534 | 547 | ||
535 | extern int capable(int cap); | 548 | extern int capable(int cap); |
536 | 549 | ||
diff --git a/include/linux/security.h b/include/linux/security.h index 3416cb85e77b..f9c390494f18 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -48,7 +48,8 @@ struct audit_krule; | |||
48 | * These functions are in security/capability.c and are used | 48 | * These functions are in security/capability.c and are used |
49 | * as the default capabilities functions | 49 | * as the default capabilities functions |
50 | */ | 50 | */ |
51 | extern int cap_capable(struct task_struct *tsk, int cap, int audit); | 51 | extern int cap_capable(struct task_struct *tsk, const struct cred *cred, |
52 | int cap, int audit); | ||
52 | extern int cap_settime(struct timespec *ts, struct timezone *tz); | 53 | extern int cap_settime(struct timespec *ts, struct timezone *tz); |
53 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); | 54 | extern int cap_ptrace_may_access(struct task_struct *child, unsigned int mode); |
54 | extern int cap_ptrace_traceme(struct task_struct *parent); | 55 | extern int cap_ptrace_traceme(struct task_struct *parent); |
@@ -1195,9 +1196,12 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1195 | * @permitted contains the permitted capability set. | 1196 | * @permitted contains the permitted capability set. |
1196 | * Return 0 and update @new if permission is granted. | 1197 | * Return 0 and update @new if permission is granted. |
1197 | * @capable: | 1198 | * @capable: |
1198 | * Check whether the @tsk process has the @cap capability. | 1199 | * Check whether the @tsk process has the @cap capability in the indicated |
1200 | * credentials. | ||
1199 | * @tsk contains the task_struct for the process. | 1201 | * @tsk contains the task_struct for the process. |
1202 | * @cred contains the credentials to use. | ||
1200 | * @cap contains the capability <include/linux/capability.h>. | 1203 | * @cap contains the capability <include/linux/capability.h>. |
1204 | * @audit: Whether to write an audit message or not | ||
1201 | * Return 0 if the capability is granted for @tsk. | 1205 | * Return 0 if the capability is granted for @tsk. |
1202 | * @acct: | 1206 | * @acct: |
1203 | * Check permission before enabling or disabling process accounting. If | 1207 | * Check permission before enabling or disabling process accounting. If |
@@ -1290,7 +1294,8 @@ struct security_operations { | |||
1290 | const kernel_cap_t *effective, | 1294 | const kernel_cap_t *effective, |
1291 | const kernel_cap_t *inheritable, | 1295 | const kernel_cap_t *inheritable, |
1292 | const kernel_cap_t *permitted); | 1296 | const kernel_cap_t *permitted); |
1293 | int (*capable) (struct task_struct *tsk, int cap, int audit); | 1297 | int (*capable) (struct task_struct *tsk, const struct cred *cred, |
1298 | int cap, int audit); | ||
1294 | int (*acct) (struct file *file); | 1299 | int (*acct) (struct file *file); |
1295 | int (*sysctl) (struct ctl_table *table, int op); | 1300 | int (*sysctl) (struct ctl_table *table, int op); |
1296 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); | 1301 | int (*quotactl) (int cmds, int type, int id, struct super_block *sb); |
@@ -1556,8 +1561,9 @@ int security_capset(struct cred *new, const struct cred *old, | |||
1556 | const kernel_cap_t *effective, | 1561 | const kernel_cap_t *effective, |
1557 | const kernel_cap_t *inheritable, | 1562 | const kernel_cap_t *inheritable, |
1558 | const kernel_cap_t *permitted); | 1563 | const kernel_cap_t *permitted); |
1559 | int security_capable(struct task_struct *tsk, int cap); | 1564 | int security_capable(int cap); |
1560 | int security_capable_noaudit(struct task_struct *tsk, int cap); | 1565 | int security_real_capable(struct task_struct *tsk, int cap); |
1566 | int security_real_capable_noaudit(struct task_struct *tsk, int cap); | ||
1561 | int security_acct(struct file *file); | 1567 | int security_acct(struct file *file); |
1562 | int security_sysctl(struct ctl_table *table, int op); | 1568 | int security_sysctl(struct ctl_table *table, int op); |
1563 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); | 1569 | int security_quotactl(int cmds, int type, int id, struct super_block *sb); |
@@ -1754,14 +1760,31 @@ static inline int security_capset(struct cred *new, | |||
1754 | return cap_capset(new, old, effective, inheritable, permitted); | 1760 | return cap_capset(new, old, effective, inheritable, permitted); |
1755 | } | 1761 | } |
1756 | 1762 | ||
1757 | static inline int security_capable(struct task_struct *tsk, int cap) | 1763 | static inline int security_capable(int cap) |
1758 | { | 1764 | { |
1759 | return cap_capable(tsk, cap, SECURITY_CAP_AUDIT); | 1765 | return cap_capable(current, current_cred(), cap, SECURITY_CAP_AUDIT); |
1760 | } | 1766 | } |
1761 | 1767 | ||
1762 | static inline int security_capable_noaudit(struct task_struct *tsk, int cap) | 1768 | static inline int security_real_capable(struct task_struct *tsk, int cap) |
1763 | { | 1769 | { |
1764 | return cap_capable(tsk, cap, SECURITY_CAP_NOAUDIT); | 1770 | int ret; |
1771 | |||
1772 | rcu_read_lock(); | ||
1773 | ret = cap_capable(tsk, __task_cred(tsk), cap, SECURITY_CAP_AUDIT); | ||
1774 | rcu_read_unlock(); | ||
1775 | return ret; | ||
1776 | } | ||
1777 | |||
1778 | static inline | ||
1779 | int security_real_capable_noaudit(struct task_struct *tsk, int cap) | ||
1780 | { | ||
1781 | int ret; | ||
1782 | |||
1783 | rcu_read_lock(); | ||
1784 | ret = cap_capable(tsk, __task_cred(tsk), cap, | ||
1785 | SECURITY_CAP_NOAUDIT); | ||
1786 | rcu_read_unlock(); | ||
1787 | return ret; | ||
1765 | } | 1788 | } |
1766 | 1789 | ||
1767 | static inline int security_acct(struct file *file) | 1790 | static inline int security_acct(struct file *file) |