diff options
Diffstat (limited to 'security/commoncap.c')
| -rw-r--r-- | security/commoncap.c | 29 |
1 files changed, 14 insertions, 15 deletions
diff --git a/security/commoncap.c b/security/commoncap.c index 79713545cd63..f0e671dcfff0 100644 --- a/security/commoncap.c +++ b/security/commoncap.c | |||
| @@ -45,26 +45,22 @@ EXPORT_SYMBOL(cap_netlink_recv); | |||
| 45 | /** | 45 | /** |
| 46 | * cap_capable - Determine whether a task has a particular effective capability | 46 | * cap_capable - Determine whether a task has a particular effective capability |
| 47 | * @tsk: The task to query | 47 | * @tsk: The task to query |
| 48 | * @cred: The credentials to use | ||
| 48 | * @cap: The capability to check for | 49 | * @cap: The capability to check for |
| 49 | * @audit: Whether to write an audit message or not | 50 | * @audit: Whether to write an audit message or not |
| 50 | * | 51 | * |
| 51 | * Determine whether the nominated task has the specified capability amongst | 52 | * Determine whether the nominated task has the specified capability amongst |
| 52 | * its effective set, returning 0 if it does, -ve if it does not. | 53 | * its effective set, returning 0 if it does, -ve if it does not. |
| 53 | * | 54 | * |
| 54 | * NOTE WELL: cap_capable() cannot be used like the kernel's capable() | 55 | * NOTE WELL: cap_has_capability() cannot be used like the kernel's capable() |
| 55 | * function. That is, it has the reverse semantics: cap_capable() returns 0 | 56 | * and has_capability() functions. That is, it has the reverse semantics: |
| 56 | * when a task has a capability, but the kernel's capable() returns 1 for this | 57 | * cap_has_capability() returns 0 when a task has a capability, but the |
| 57 | * case. | 58 | * kernel's capable() and has_capability() returns 1 for this case. |
| 58 | */ | 59 | */ |
| 59 | int cap_capable(struct task_struct *tsk, int cap, int audit) | 60 | int cap_capable(struct task_struct *tsk, const struct cred *cred, int cap, |
| 61 | int audit) | ||
| 60 | { | 62 | { |
| 61 | __u32 cap_raised; | 63 | return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM; |
| 62 | |||
| 63 | /* Derived from include/linux/sched.h:capable. */ | ||
| 64 | rcu_read_lock(); | ||
| 65 | cap_raised = cap_raised(__task_cred(tsk)->cap_effective, cap); | ||
| 66 | rcu_read_unlock(); | ||
| 67 | return cap_raised ? 0 : -EPERM; | ||
| 68 | } | 64 | } |
| 69 | 65 | ||
| 70 | /** | 66 | /** |
| @@ -160,7 +156,8 @@ static inline int cap_inh_is_capped(void) | |||
| 160 | /* they are so limited unless the current task has the CAP_SETPCAP | 156 | /* they are so limited unless the current task has the CAP_SETPCAP |
| 161 | * capability | 157 | * capability |
| 162 | */ | 158 | */ |
| 163 | if (cap_capable(current, CAP_SETPCAP, SECURITY_CAP_AUDIT) == 0) | 159 | if (cap_capable(current, current_cred(), CAP_SETPCAP, |
| 160 | SECURITY_CAP_AUDIT) == 0) | ||
| 164 | return 0; | 161 | return 0; |
| 165 | #endif | 162 | #endif |
| 166 | return 1; | 163 | return 1; |
| @@ -869,7 +866,8 @@ int cap_task_prctl(int option, unsigned long arg2, unsigned long arg3, | |||
| 869 | & (new->securebits ^ arg2)) /*[1]*/ | 866 | & (new->securebits ^ arg2)) /*[1]*/ |
| 870 | || ((new->securebits & SECURE_ALL_LOCKS & ~arg2)) /*[2]*/ | 867 | || ((new->securebits & SECURE_ALL_LOCKS & ~arg2)) /*[2]*/ |
| 871 | || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS)) /*[3]*/ | 868 | || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS)) /*[3]*/ |
| 872 | || (cap_capable(current, CAP_SETPCAP, SECURITY_CAP_AUDIT) != 0) /*[4]*/ | 869 | || (cap_capable(current, current_cred(), CAP_SETPCAP, |
| 870 | SECURITY_CAP_AUDIT) != 0) /*[4]*/ | ||
| 873 | /* | 871 | /* |
| 874 | * [1] no changing of bits that are locked | 872 | * [1] no changing of bits that are locked |
| 875 | * [2] no unlocking of locks | 873 | * [2] no unlocking of locks |
| @@ -950,7 +948,8 @@ int cap_vm_enough_memory(struct mm_struct *mm, long pages) | |||
| 950 | { | 948 | { |
| 951 | int cap_sys_admin = 0; | 949 | int cap_sys_admin = 0; |
| 952 | 950 | ||
| 953 | if (cap_capable(current, CAP_SYS_ADMIN, SECURITY_CAP_NOAUDIT) == 0) | 951 | if (cap_capable(current, current_cred(), CAP_SYS_ADMIN, |
| 952 | SECURITY_CAP_NOAUDIT) == 0) | ||
| 954 | cap_sys_admin = 1; | 953 | cap_sys_admin = 1; |
| 955 | return __vm_enough_memory(mm, pages, cap_sys_admin); | 954 | return __vm_enough_memory(mm, pages, cap_sys_admin); |
| 956 | } | 955 | } |
