diff options
Diffstat (limited to 'security/commoncap.c')
-rw-r--r-- | security/commoncap.c | 42 |
1 files changed, 29 insertions, 13 deletions
diff --git a/security/commoncap.c b/security/commoncap.c index 79713545cd63..7f0b2a68717d 100644 --- a/security/commoncap.c +++ b/security/commoncap.c | |||
@@ -43,28 +43,44 @@ int cap_netlink_recv(struct sk_buff *skb, int cap) | |||
43 | EXPORT_SYMBOL(cap_netlink_recv); | 43 | EXPORT_SYMBOL(cap_netlink_recv); |
44 | 44 | ||
45 | /** | 45 | /** |
46 | * cap_capable - Determine whether a task has a particular effective capability | 46 | * cap_capable - Determine whether current has a particular effective capability |
47 | * @tsk: The task to query | ||
48 | * @cap: The capability to check for | 47 | * @cap: The capability to check for |
49 | * @audit: Whether to write an audit message or not | 48 | * @audit: Whether to write an audit message or not |
50 | * | 49 | * |
51 | * Determine whether the nominated task has the specified capability amongst | 50 | * Determine whether the nominated task has the specified capability amongst |
52 | * its effective set, returning 0 if it does, -ve if it does not. | 51 | * its effective set, returning 0 if it does, -ve if it does not. Note that |
52 | * this uses current's subjective/effective credentials. | ||
53 | * | 53 | * |
54 | * NOTE WELL: cap_capable() cannot be used like the kernel's capable() | 54 | * NOTE WELL: cap_capable() cannot be used like the kernel's capable() |
55 | * function. That is, it has the reverse semantics: cap_capable() returns 0 | 55 | * function. That is, it has the reverse semantics: cap_capable() returns 0 |
56 | * when a task has a capability, but the kernel's capable() returns 1 for this | 56 | * when a task has a capability, but the kernel's capable() returns 1 for this |
57 | * case. | 57 | * case. |
58 | */ | 58 | */ |
59 | int cap_capable(struct task_struct *tsk, int cap, int audit) | 59 | int cap_capable(int cap, int audit) |
60 | { | 60 | { |
61 | __u32 cap_raised; | 61 | return cap_raised(current_cap(), cap) ? 0 : -EPERM; |
62 | } | ||
62 | 63 | ||
63 | /* Derived from include/linux/sched.h:capable. */ | 64 | /** |
64 | rcu_read_lock(); | 65 | * cap_has_capability - Determine whether a task has a particular effective capability |
65 | cap_raised = cap_raised(__task_cred(tsk)->cap_effective, cap); | 66 | * @tsk: The task to query |
66 | rcu_read_unlock(); | 67 | * @cred: The credentials to use |
67 | return cap_raised ? 0 : -EPERM; | 68 | * @cap: The capability to check for |
69 | * @audit: Whether to write an audit message or not | ||
70 | * | ||
71 | * Determine whether the nominated task has the specified capability amongst | ||
72 | * its effective set, returning 0 if it does, -ve if it does not. Note that | ||
73 | * this uses the task's objective/real credentials. | ||
74 | * | ||
75 | * NOTE WELL: cap_has_capability() cannot be used like the kernel's | ||
76 | * has_capability() function. That is, it has the reverse semantics: | ||
77 | * cap_has_capability() returns 0 when a task has a capability, but the | ||
78 | * kernel's has_capability() returns 1 for this case. | ||
79 | */ | ||
80 | int cap_task_capable(struct task_struct *tsk, const struct cred *cred, int cap, | ||
81 | int audit) | ||
82 | { | ||
83 | return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM; | ||
68 | } | 84 | } |
69 | 85 | ||
70 | /** | 86 | /** |
@@ -160,7 +176,7 @@ static inline int cap_inh_is_capped(void) | |||
160 | /* they are so limited unless the current task has the CAP_SETPCAP | 176 | /* they are so limited unless the current task has the CAP_SETPCAP |
161 | * capability | 177 | * capability |
162 | */ | 178 | */ |
163 | if (cap_capable(current, CAP_SETPCAP, SECURITY_CAP_AUDIT) == 0) | 179 | if (cap_capable(CAP_SETPCAP, SECURITY_CAP_AUDIT) == 0) |
164 | return 0; | 180 | return 0; |
165 | #endif | 181 | #endif |
166 | return 1; | 182 | return 1; |
@@ -869,7 +885,7 @@ int cap_task_prctl(int option, unsigned long arg2, unsigned long arg3, | |||
869 | & (new->securebits ^ arg2)) /*[1]*/ | 885 | & (new->securebits ^ arg2)) /*[1]*/ |
870 | || ((new->securebits & SECURE_ALL_LOCKS & ~arg2)) /*[2]*/ | 886 | || ((new->securebits & SECURE_ALL_LOCKS & ~arg2)) /*[2]*/ |
871 | || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS)) /*[3]*/ | 887 | || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS)) /*[3]*/ |
872 | || (cap_capable(current, CAP_SETPCAP, SECURITY_CAP_AUDIT) != 0) /*[4]*/ | 888 | || (cap_capable(CAP_SETPCAP, SECURITY_CAP_AUDIT) != 0) /*[4]*/ |
873 | /* | 889 | /* |
874 | * [1] no changing of bits that are locked | 890 | * [1] no changing of bits that are locked |
875 | * [2] no unlocking of locks | 891 | * [2] no unlocking of locks |
@@ -950,7 +966,7 @@ int cap_vm_enough_memory(struct mm_struct *mm, long pages) | |||
950 | { | 966 | { |
951 | int cap_sys_admin = 0; | 967 | int cap_sys_admin = 0; |
952 | 968 | ||
953 | if (cap_capable(current, CAP_SYS_ADMIN, SECURITY_CAP_NOAUDIT) == 0) | 969 | if (cap_capable(CAP_SYS_ADMIN, SECURITY_CAP_NOAUDIT) == 0) |
954 | cap_sys_admin = 1; | 970 | cap_sys_admin = 1; |
955 | return __vm_enough_memory(mm, pages, cap_sys_admin); | 971 | return __vm_enough_memory(mm, pages, cap_sys_admin); |
956 | } | 972 | } |