commoncap.c 39.0 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
J
James Morris 已提交
2
/* Common capabilities, needed by capability.o.
L
Linus Torvalds 已提交
3 4
 */

5
#include <linux/capability.h>
6
#include <linux/audit.h>
L
Linus Torvalds 已提交
7 8
#include <linux/init.h>
#include <linux/kernel.h>
C
Casey Schaufler 已提交
9
#include <linux/lsm_hooks.h>
L
Linus Torvalds 已提交
10 11 12 13 14 15 16 17 18 19
#include <linux/file.h>
#include <linux/mm.h>
#include <linux/mman.h>
#include <linux/pagemap.h>
#include <linux/swap.h>
#include <linux/skbuff.h>
#include <linux/netlink.h>
#include <linux/ptrace.h>
#include <linux/xattr.h>
#include <linux/hugetlb.h>
20
#include <linux/mount.h>
21
#include <linux/sched.h>
22 23
#include <linux/prctl.h>
#include <linux/securebits.h>
24
#include <linux/user_namespace.h>
A
Al Viro 已提交
25
#include <linux/binfmts.h>
26
#include <linux/personality.h>
27

28 29 30 31 32 33 34 35 36 37 38
/*
 * If a non-root user executes a setuid-root binary in
 * !secure(SECURE_NOROOT) mode, then we raise capabilities.
 * However if fE is also set, then the intent is for only
 * the file capabilities to be applied, and the setuid-root
 * bit is left on either to change the uid (plausible) or
 * to get full privilege on a kernel without file capabilities
 * support.  So in that case we do not raise capabilities.
 *
 * Warn if that happens, once per boot.
 */
39
static void warn_setuid_and_fcaps_mixed(const char *fname)
40 41 42 43 44 45 46 47 48 49
{
	static int warned;
	if (!warned) {
		printk(KERN_INFO "warning: `%s' has both setuid-root and"
			" effective capabilities. Therefore not raising all"
			" capabilities.\n", fname);
		warned = 1;
	}
}

D
David Howells 已提交
50 51
/**
 * cap_capable - Determine whether a task has a particular effective capability
52
 * @cred: The credentials to use
53
 * @ns:  The user namespace in which we need the capability
D
David Howells 已提交
54
 * @cap: The capability to check for
55
 * @opts: Bitmask of options defined in include/linux/security.h
D
David Howells 已提交
56 57 58 59
 *
 * Determine whether the nominated task has the specified capability amongst
 * its effective set, returning 0 if it does, -ve if it does not.
 *
60 61 62 63
 * NOTE WELL: cap_has_capability() cannot be used like the kernel's capable()
 * and has_capability() functions.  That is, it has the reverse semantics:
 * cap_has_capability() returns 0 when a task has a capability, but the
 * kernel's capable() and has_capability() returns 1 for this case.
64
 */
65
int cap_capable(const struct cred *cred, struct user_namespace *targ_ns,
66
		int cap, unsigned int opts)
L
Linus Torvalds 已提交
67
{
68
	struct user_namespace *ns = targ_ns;
69

70 71 72 73 74
	/* See if cred has the capability in the target user namespace
	 * by examining the target user namespace and all of the target
	 * user namespace's parents.
	 */
	for (;;) {
75
		/* Do we have the necessary capabilities? */
76
		if (ns == cred->user_ns)
77 78
			return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM;

79 80 81 82 83
		/*
		 * If we're already at a lower level than we're looking for,
		 * we're done searching.
		 */
		if (ns->level <= cred->user_ns->level)
84 85
			return -EPERM;

86 87 88 89 90 91 92
		/* 
		 * The owner of the user namespace in the parent of the
		 * user namespace has all caps.
		 */
		if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid))
			return 0;

93
		/*
94
		 * If you have a capability in a parent user ns, then you have
95 96
		 * it over all children user namespaces as well.
		 */
97
		ns = ns->parent;
98 99 100
	}

	/* We never get here */
L
Linus Torvalds 已提交
101 102
}

D
David Howells 已提交
103 104 105 106 107 108 109 110
/**
 * cap_settime - Determine whether the current process may set the system clock
 * @ts: The time to set
 * @tz: The timezone to set
 *
 * Determine whether the current process may set the system clock and timezone
 * information, returning 0 if permission granted, -ve if denied.
 */
111
int cap_settime(const struct timespec64 *ts, const struct timezone *tz)
L
Linus Torvalds 已提交
112 113 114 115 116 117
{
	if (!capable(CAP_SYS_TIME))
		return -EPERM;
	return 0;
}

D
David Howells 已提交
118
/**
119
 * cap_ptrace_access_check - Determine whether the current process may access
D
David Howells 已提交
120 121 122 123
 *			   another
 * @child: The process to be accessed
 * @mode: The mode of attachment.
 *
124 125 126 127 128 129
 * If we are in the same or an ancestor user_ns and have all the target
 * task's capabilities, then ptrace access is allowed.
 * If we have the ptrace capability to the target user_ns, then ptrace
 * access is allowed.
 * Else denied.
 *
D
David Howells 已提交
130 131 132
 * Determine whether a process may access another, returning 0 if permission
 * granted, -ve if denied.
 */
133
int cap_ptrace_access_check(struct task_struct *child, unsigned int mode)
L
Linus Torvalds 已提交
134
{
135
	int ret = 0;
136
	const struct cred *cred, *child_cred;
137
	const kernel_cap_t *caller_caps;
138 139

	rcu_read_lock();
140 141
	cred = current_cred();
	child_cred = __task_cred(child);
142 143 144 145
	if (mode & PTRACE_MODE_FSCREDS)
		caller_caps = &cred->cap_effective;
	else
		caller_caps = &cred->cap_permitted;
146
	if (cred->user_ns == child_cred->user_ns &&
147
	    cap_issubset(child_cred->cap_permitted, *caller_caps))
148
		goto out;
149
	if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE))
150 151 152
		goto out;
	ret = -EPERM;
out:
153 154
	rcu_read_unlock();
	return ret;
155 156
}

D
David Howells 已提交
157 158 159 160
/**
 * cap_ptrace_traceme - Determine whether another process may trace the current
 * @parent: The task proposed to be the tracer
 *
161 162 163 164 165 166
 * If parent is in the same or an ancestor user_ns and has all current's
 * capabilities, then ptrace access is allowed.
 * If parent has the ptrace capability to current's user_ns, then ptrace
 * access is allowed.
 * Else denied.
 *
D
David Howells 已提交
167 168 169
 * Determine whether the nominated task is permitted to trace the current
 * process, returning 0 if permission is granted, -ve if denied.
 */
170 171
int cap_ptrace_traceme(struct task_struct *parent)
{
172
	int ret = 0;
173
	const struct cred *cred, *child_cred;
174 175

	rcu_read_lock();
176 177
	cred = __task_cred(parent);
	child_cred = current_cred();
178
	if (cred->user_ns == child_cred->user_ns &&
179 180
	    cap_issubset(child_cred->cap_permitted, cred->cap_permitted))
		goto out;
181
	if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE))
182 183 184
		goto out;
	ret = -EPERM;
out:
185 186
	rcu_read_unlock();
	return ret;
L
Linus Torvalds 已提交
187 188
}

D
David Howells 已提交
189 190 191 192 193 194 195 196 197 198 199 200
/**
 * cap_capget - Retrieve a task's capability sets
 * @target: The task from which to retrieve the capability sets
 * @effective: The place to record the effective set
 * @inheritable: The place to record the inheritable set
 * @permitted: The place to record the permitted set
 *
 * This function retrieves the capabilities of the nominated task and returns
 * them to the caller.
 */
int cap_capget(struct task_struct *target, kernel_cap_t *effective,
	       kernel_cap_t *inheritable, kernel_cap_t *permitted)
L
Linus Torvalds 已提交
201
{
202
	const struct cred *cred;
203

L
Linus Torvalds 已提交
204
	/* Derived from kernel/capability.c:sys_capget. */
205 206
	rcu_read_lock();
	cred = __task_cred(target);
207 208 209
	*effective   = cred->cap_effective;
	*inheritable = cred->cap_inheritable;
	*permitted   = cred->cap_permitted;
210
	rcu_read_unlock();
L
Linus Torvalds 已提交
211 212 213
	return 0;
}

D
David Howells 已提交
214 215 216 217
/*
 * Determine whether the inheritable capabilities are limited to the old
 * permitted set.  Returns 1 if they are limited, 0 if they are not.
 */
218 219
static inline int cap_inh_is_capped(void)
{
D
David Howells 已提交
220 221 222
	/* they are so limited unless the current task has the CAP_SETPCAP
	 * capability
	 */
223
	if (cap_capable(current_cred(), current_cred()->user_ns,
224
			CAP_SETPCAP, CAP_OPT_NONE) == 0)
D
David Howells 已提交
225 226
		return 0;
	return 1;
227
}
228

D
David Howells 已提交
229 230 231 232 233 234 235 236 237 238 239 240
/**
 * cap_capset - Validate and apply proposed changes to current's capabilities
 * @new: The proposed new credentials; alterations should be made here
 * @old: The current task's current credentials
 * @effective: A pointer to the proposed new effective capabilities set
 * @inheritable: A pointer to the proposed new inheritable capabilities set
 * @permitted: A pointer to the proposed new permitted capabilities set
 *
 * This function validates and applies a proposed mass change to the current
 * process's capability sets.  The changes are made to the proposed new
 * credentials, and assuming no error, will be committed by the caller of LSM.
 */
D
David Howells 已提交
241 242 243 244 245
int cap_capset(struct cred *new,
	       const struct cred *old,
	       const kernel_cap_t *effective,
	       const kernel_cap_t *inheritable,
	       const kernel_cap_t *permitted)
L
Linus Torvalds 已提交
246
{
D
David Howells 已提交
247 248 249 250
	if (cap_inh_is_capped() &&
	    !cap_issubset(*inheritable,
			  cap_combine(old->cap_inheritable,
				      old->cap_permitted)))
251
		/* incapable of using this inheritable set */
L
Linus Torvalds 已提交
252
		return -EPERM;
D
David Howells 已提交
253

254
	if (!cap_issubset(*inheritable,
D
David Howells 已提交
255 256
			  cap_combine(old->cap_inheritable,
				      old->cap_bset)))
257 258
		/* no new pI capabilities outside bounding set */
		return -EPERM;
L
Linus Torvalds 已提交
259 260

	/* verify restrictions on target's new Permitted set */
D
David Howells 已提交
261
	if (!cap_issubset(*permitted, old->cap_permitted))
L
Linus Torvalds 已提交
262 263 264
		return -EPERM;

	/* verify the _new_Effective_ is a subset of the _new_Permitted_ */
D
David Howells 已提交
265
	if (!cap_issubset(*effective, *permitted))
L
Linus Torvalds 已提交
266 267
		return -EPERM;

D
David Howells 已提交
268 269 270
	new->cap_effective   = *effective;
	new->cap_inheritable = *inheritable;
	new->cap_permitted   = *permitted;
271 272 273 274 275 276 277 278 279 280

	/*
	 * Mask off ambient bits that are no longer both permitted and
	 * inheritable.
	 */
	new->cap_ambient = cap_intersect(new->cap_ambient,
					 cap_intersect(*permitted,
						       *inheritable));
	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EINVAL;
L
Linus Torvalds 已提交
281 282 283
	return 0;
}

D
David Howells 已提交
284 285 286 287 288 289
/**
 * cap_inode_need_killpriv - Determine if inode change affects privileges
 * @dentry: The inode/dentry in being changed with change marked ATTR_KILL_PRIV
 *
 * Determine if an inode having a change applied that's marked ATTR_KILL_PRIV
 * affects the security markings on that inode, and if it is, should
290
 * inode_killpriv() be invoked or the change rejected.
D
David Howells 已提交
291
 *
292 293
 * Returns 1 if security.capability has a value, meaning inode_killpriv()
 * is required, 0 otherwise, meaning inode_killpriv() is not required.
D
David Howells 已提交
294
 */
295 296
int cap_inode_need_killpriv(struct dentry *dentry)
{
297
	struct inode *inode = d_backing_inode(dentry);
298 299
	int error;

300 301
	error = __vfs_getxattr(dentry, inode, XATTR_NAME_CAPS, NULL, 0);
	return error > 0;
302 303
}

D
David Howells 已提交
304 305 306 307 308 309 310 311
/**
 * cap_inode_killpriv - Erase the security markings on an inode
 * @dentry: The inode/dentry to alter
 *
 * Erase the privilege-enhancing security markings on an inode.
 *
 * Returns 0 if successful, -ve on error.
 */
312 313
int cap_inode_killpriv(struct dentry *dentry)
{
314
	int error;
315

316 317 318 319
	error = __vfs_removexattr(dentry, XATTR_NAME_CAPS);
	if (error == -EOPNOTSUPP)
		error = 0;
	return error;
320 321
}

322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343
static bool rootid_owns_currentns(kuid_t kroot)
{
	struct user_namespace *ns;

	if (!uid_valid(kroot))
		return false;

	for (ns = current_user_ns(); ; ns = ns->parent) {
		if (from_kuid(ns, kroot) == 0)
			return true;
		if (ns == &init_user_ns)
			break;
	}

	return false;
}

static __u32 sansflags(__u32 m)
{
	return m & ~VFS_CAP_FLAGS_EFFECTIVE;
}

344
static bool is_v2header(size_t size, const struct vfs_cap_data *cap)
345 346 347
{
	if (size != XATTR_CAPS_SZ_2)
		return false;
348
	return sansflags(le32_to_cpu(cap->magic_etc)) == VFS_CAP_REVISION_2;
349 350
}

351
static bool is_v3header(size_t size, const struct vfs_cap_data *cap)
352 353 354
{
	if (size != XATTR_CAPS_SZ_3)
		return false;
355
	return sansflags(le32_to_cpu(cap->magic_etc)) == VFS_CAP_REVISION_3;
356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383
}

/*
 * getsecurity: We are called for security.* before any attempt to read the
 * xattr from the inode itself.
 *
 * This gives us a chance to read the on-disk value and convert it.  If we
 * return -EOPNOTSUPP, then vfs_getxattr() will call the i_op handler.
 *
 * Note we are not called by vfs_getxattr_alloc(), but that is only called
 * by the integrity subsystem, which really wants the unconverted values -
 * so that's good.
 */
int cap_inode_getsecurity(struct inode *inode, const char *name, void **buffer,
			  bool alloc)
{
	int size, ret;
	kuid_t kroot;
	uid_t root, mappedroot;
	char *tmpbuf = NULL;
	struct vfs_cap_data *cap;
	struct vfs_ns_cap_data *nscap;
	struct dentry *dentry;
	struct user_namespace *fs_ns;

	if (strcmp(name, "capability") != 0)
		return -EOPNOTSUPP;

384
	dentry = d_find_any_alias(inode);
385 386 387 388 389 390 391 392 393 394 395 396 397
	if (!dentry)
		return -EINVAL;

	size = sizeof(struct vfs_ns_cap_data);
	ret = (int) vfs_getxattr_alloc(dentry, XATTR_NAME_CAPS,
				 &tmpbuf, size, GFP_NOFS);
	dput(dentry);

	if (ret < 0)
		return ret;

	fs_ns = inode->i_sb->s_user_ns;
	cap = (struct vfs_cap_data *) tmpbuf;
398
	if (is_v2header((size_t) ret, cap)) {
399 400 401 402 403 404 405
		/* If this is sizeof(vfs_cap_data) then we're ok with the
		 * on-disk value, so return that.  */
		if (alloc)
			*buffer = tmpbuf;
		else
			kfree(tmpbuf);
		return ret;
406
	} else if (!is_v3header((size_t) ret, cap)) {
407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444
		kfree(tmpbuf);
		return -EINVAL;
	}

	nscap = (struct vfs_ns_cap_data *) tmpbuf;
	root = le32_to_cpu(nscap->rootid);
	kroot = make_kuid(fs_ns, root);

	/* If the root kuid maps to a valid uid in current ns, then return
	 * this as a nscap. */
	mappedroot = from_kuid(current_user_ns(), kroot);
	if (mappedroot != (uid_t)-1 && mappedroot != (uid_t)0) {
		if (alloc) {
			*buffer = tmpbuf;
			nscap->rootid = cpu_to_le32(mappedroot);
		} else
			kfree(tmpbuf);
		return size;
	}

	if (!rootid_owns_currentns(kroot)) {
		kfree(tmpbuf);
		return -EOPNOTSUPP;
	}

	/* This comes from a parent namespace.  Return as a v2 capability */
	size = sizeof(struct vfs_cap_data);
	if (alloc) {
		*buffer = kmalloc(size, GFP_ATOMIC);
		if (*buffer) {
			struct vfs_cap_data *cap = *buffer;
			__le32 nsmagic, magic;
			magic = VFS_CAP_REVISION_2;
			nsmagic = le32_to_cpu(nscap->magic_etc);
			if (nsmagic & VFS_CAP_FLAGS_EFFECTIVE)
				magic |= VFS_CAP_FLAGS_EFFECTIVE;
			memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
			cap->magic_etc = cpu_to_le32(magic);
445 446
		} else {
			size = -ENOMEM;
447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464
		}
	}
	kfree(tmpbuf);
	return size;
}

static kuid_t rootid_from_xattr(const void *value, size_t size,
				struct user_namespace *task_ns)
{
	const struct vfs_ns_cap_data *nscap = value;
	uid_t rootid = 0;

	if (size == XATTR_CAPS_SZ_3)
		rootid = le32_to_cpu(nscap->rootid);

	return make_kuid(task_ns, rootid);
}

465
static bool validheader(size_t size, const struct vfs_cap_data *cap)
466
{
467
	return is_v2header(size, cap) || is_v3header(size, cap);
468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489
}

/*
 * User requested a write of security.capability.  If needed, update the
 * xattr to change from v2 to v3, or to fixup the v3 rootid.
 *
 * If all is ok, we return the new size, on error return < 0.
 */
int cap_convert_nscap(struct dentry *dentry, void **ivalue, size_t size)
{
	struct vfs_ns_cap_data *nscap;
	uid_t nsrootid;
	const struct vfs_cap_data *cap = *ivalue;
	__u32 magic, nsmagic;
	struct inode *inode = d_backing_inode(dentry);
	struct user_namespace *task_ns = current_user_ns(),
		*fs_ns = inode->i_sb->s_user_ns;
	kuid_t rootid;
	size_t newsize;

	if (!*ivalue)
		return -EINVAL;
490
	if (!validheader(size, cap))
491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523
		return -EINVAL;
	if (!capable_wrt_inode_uidgid(inode, CAP_SETFCAP))
		return -EPERM;
	if (size == XATTR_CAPS_SZ_2)
		if (ns_capable(inode->i_sb->s_user_ns, CAP_SETFCAP))
			/* user is privileged, just write the v2 */
			return size;

	rootid = rootid_from_xattr(*ivalue, size, task_ns);
	if (!uid_valid(rootid))
		return -EINVAL;

	nsrootid = from_kuid(fs_ns, rootid);
	if (nsrootid == -1)
		return -EINVAL;

	newsize = sizeof(struct vfs_ns_cap_data);
	nscap = kmalloc(newsize, GFP_ATOMIC);
	if (!nscap)
		return -ENOMEM;
	nscap->rootid = cpu_to_le32(nsrootid);
	nsmagic = VFS_CAP_REVISION_3;
	magic = le32_to_cpu(cap->magic_etc);
	if (magic & VFS_CAP_FLAGS_EFFECTIVE)
		nsmagic |= VFS_CAP_FLAGS_EFFECTIVE;
	nscap->magic_etc = cpu_to_le32(nsmagic);
	memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);

	kvfree(*ivalue);
	*ivalue = nscap;
	return newsize;
}

D
David Howells 已提交
524 525 526 527
/*
 * Calculate the new process capability sets from the capability sets attached
 * to a file.
 */
528
static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
529
					  struct linux_binprm *bprm,
530
					  bool *effective,
531
					  bool *has_fcap)
532
{
533
	struct cred *new = bprm->cred;
534 535 536 537
	unsigned i;
	int ret = 0;

	if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
538
		*effective = true;
539

540
	if (caps->magic_etc & VFS_CAP_REVISION_MASK)
541
		*has_fcap = true;
542

543 544 545 546 547 548
	CAP_FOR_EACH_U32(i) {
		__u32 permitted = caps->permitted.cap[i];
		__u32 inheritable = caps->inheritable.cap[i];

		/*
		 * pP' = (X & fP) | (pI & fI)
549
		 * The addition of pA' is handled later.
550
		 */
551 552 553
		new->cap_permitted.cap[i] =
			(new->cap_bset.cap[i] & permitted) |
			(new->cap_inheritable.cap[i] & inheritable);
554

555 556
		if (permitted & ~new->cap_permitted.cap[i])
			/* insufficient to execute correctly */
557 558 559 560 561 562 563 564
			ret = -EPERM;
	}

	/*
	 * For legacy apps, with no internal support for recognizing they
	 * do not have enough capabilities, we return an error if they are
	 * missing some "forced" (aka file-permitted) capabilities.
	 */
565
	return *effective ? ret : 0;
566 567
}

D
David Howells 已提交
568 569 570
/*
 * Extract the on-exec-apply capability sets for an executable file.
 */
571 572
int get_vfs_caps_from_disk(const struct dentry *dentry, struct cpu_vfs_cap_data *cpu_caps)
{
573
	struct inode *inode = d_backing_inode(dentry);
574
	__u32 magic_etc;
575
	unsigned tocopy, i;
576
	int size;
577 578 579
	struct vfs_ns_cap_data data, *nscaps = &data;
	struct vfs_cap_data *caps = (struct vfs_cap_data *) &data;
	kuid_t rootkuid;
580
	struct user_namespace *fs_ns;
581 582 583

	memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));

584
	if (!inode)
585 586
		return -ENODATA;

587
	fs_ns = inode->i_sb->s_user_ns;
588
	size = __vfs_getxattr((struct dentry *)dentry, inode,
589
			      XATTR_NAME_CAPS, &data, XATTR_CAPS_SZ);
590
	if (size == -ENODATA || size == -EOPNOTSUPP)
591 592
		/* no data, that's ok */
		return -ENODATA;
593

594 595
	if (size < 0)
		return size;
596

597
	if (size < sizeof(magic_etc))
598 599
		return -EINVAL;

600
	cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps->magic_etc);
601

602
	rootkuid = make_kuid(fs_ns, 0);
603
	switch (magic_etc & VFS_CAP_REVISION_MASK) {
604 605 606 607 608 609 610 611 612 613
	case VFS_CAP_REVISION_1:
		if (size != XATTR_CAPS_SZ_1)
			return -EINVAL;
		tocopy = VFS_CAP_U32_1;
		break;
	case VFS_CAP_REVISION_2:
		if (size != XATTR_CAPS_SZ_2)
			return -EINVAL;
		tocopy = VFS_CAP_U32_2;
		break;
614 615 616 617 618 619 620
	case VFS_CAP_REVISION_3:
		if (size != XATTR_CAPS_SZ_3)
			return -EINVAL;
		tocopy = VFS_CAP_U32_3;
		rootkuid = make_kuid(fs_ns, le32_to_cpu(nscaps->rootid));
		break;

621 622 623
	default:
		return -EINVAL;
	}
624 625 626 627 628
	/* Limit the caps to the mounter of the filesystem
	 * or the more limited uid specified in the xattr.
	 */
	if (!rootid_owns_currentns(rootkuid))
		return -ENODATA;
629

630
	CAP_FOR_EACH_U32(i) {
631 632
		if (i >= tocopy)
			break;
633 634
		cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted);
		cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable);
635
	}
636

637 638 639
	cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;
	cpu_caps->inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;

640 641
	cpu_caps->rootid = rootkuid;

642
	return 0;
643 644
}

D
David Howells 已提交
645 646 647 648 649
/*
 * Attempt to get the on-exec apply capability sets for an executable file from
 * its xattrs and, if present, apply them to the proposed credentials being
 * constructed by execve().
 */
650 651
static int get_file_caps(struct linux_binprm *bprm, struct file *file,
			 bool *effective, bool *has_fcap)
652 653
{
	int rc = 0;
654
	struct cpu_vfs_cap_data vcaps;
655

656
	cap_clear(bprm->cred->cap_permitted);
657

658 659 660
	if (!file_caps_enabled)
		return 0;

661
	if (!mnt_may_suid(file->f_path.mnt))
662
		return 0;
663 664 665 666 667 668

	/*
	 * This check is redundant with mnt_may_suid() but is kept to make
	 * explicit that capability bits are limited to s_user_ns and its
	 * descendants.
	 */
669
	if (!current_in_userns(file->f_path.mnt->mnt_sb->s_user_ns))
670
		return 0;
671

672
	rc = get_vfs_caps_from_disk(file->f_path.dentry, &vcaps);
673 674
	if (rc < 0) {
		if (rc == -EINVAL)
675 676
			printk(KERN_NOTICE "Invalid argument reading file caps for %s\n",
					bprm->filename);
677 678
		else if (rc == -ENODATA)
			rc = 0;
679 680 681
		goto out;
	}

682
	rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap);
683 684 685

out:
	if (rc)
686
		cap_clear(bprm->cred->cap_permitted);
687 688 689 690

	return rc;
}

691 692
static inline bool root_privileged(void) { return !issecure(SECURE_NOROOT); }

693 694 695 696 697 698 699 700 701
static inline bool __is_real(kuid_t uid, struct cred *cred)
{ return uid_eq(cred->uid, uid); }

static inline bool __is_eff(kuid_t uid, struct cred *cred)
{ return uid_eq(cred->euid, uid); }

static inline bool __is_suid(kuid_t uid, struct cred *cred)
{ return !__is_real(uid, cred) && __is_eff(uid, cred); }

702 703 704 705 706 707 708 709 710 711 712 713
/*
 * handle_privileged_root - Handle case of privileged root
 * @bprm: The execution parameters, including the proposed creds
 * @has_fcap: Are any file capabilities set?
 * @effective: Do we have effective root privilege?
 * @root_uid: This namespace' root UID WRT initial USER namespace
 *
 * Handle the case where root is privileged and hasn't been neutered by
 * SECURE_NOROOT.  If file capabilities are set, they won't be combined with
 * set UID root and nothing is changed.  If we are root, cap_permitted is
 * updated.  If we have become set UID root, the effective bit is set.
 */
714
static void handle_privileged_root(struct linux_binprm *bprm, bool has_fcap,
715 716 717 718 719
				   bool *effective, kuid_t root_uid)
{
	const struct cred *old = current_cred();
	struct cred *new = bprm->cred;

720
	if (!root_privileged())
721 722 723 724 725 726
		return;
	/*
	 * If the legacy file capability is set, then don't set privs
	 * for a setuid root binary run by a non-root user.  Do set it
	 * for a root user just to cause least surprise to an admin.
	 */
727
	if (has_fcap && __is_suid(root_uid, new)) {
728 729 730 731 732 733 734 735
		warn_setuid_and_fcaps_mixed(bprm->filename);
		return;
	}
	/*
	 * To support inheritance of root-permissions and suid-root
	 * executables under compatibility mode, we override the
	 * capability sets for the file.
	 */
736
	if (__is_eff(root_uid, new) || __is_real(root_uid, new)) {
737 738 739 740 741 742 743
		/* pP' = (cap_bset & ~0) | (pI & ~0) */
		new->cap_permitted = cap_combine(old->cap_bset,
						 old->cap_inheritable);
	}
	/*
	 * If only the real uid is 0, we do not set the effective bit.
	 */
744
	if (__is_eff(root_uid, new))
745 746 747
		*effective = true;
}

748 749 750 751 752 753
#define __cap_gained(field, target, source) \
	!cap_issubset(target->cap_##field, source->cap_##field)
#define __cap_grew(target, source, cred) \
	!cap_issubset(cred->cap_##target, cred->cap_##source)
#define __cap_full(field, cred) \
	cap_issubset(CAP_FULL_SET, cred->cap_##field)
754 755 756 757 758 759 760

static inline bool __is_setuid(struct cred *new, const struct cred *old)
{ return !uid_eq(new->euid, old->uid); }

static inline bool __is_setgid(struct cred *new, const struct cred *old)
{ return !gid_eq(new->egid, old->gid); }

761
/*
762
 * 1) Audit candidate if current->cap_effective is set
763 764 765
 *
 * We do not bother to audit if 3 things are true:
 *   1) cap_effective has all caps
766
 *   2) we became root *OR* are were already root
767 768 769 770 771
 *   3) root is supposed to have all caps (SECURE_NOROOT)
 * Since this is just a normal root execing a process.
 *
 * Number 1 above might fail if you don't have a full bset, but I think
 * that is interesting information to audit.
772 773 774 775 776
 *
 * A number of other conditions require logging:
 * 2) something prevented setuid root getting all caps
 * 3) non-setuid root gets fcaps
 * 4) non-setuid root gets ambient
777
 */
778 779
static inline bool nonroot_raised_pE(struct cred *new, const struct cred *old,
				     kuid_t root, bool has_fcap)
780 781 782
{
	bool ret = false;

783 784 785 786 787 788 789 790 791 792 793 794
	if ((__cap_grew(effective, ambient, new) &&
	     !(__cap_full(effective, new) &&
	       (__is_eff(root, new) || __is_real(root, new)) &&
	       root_privileged())) ||
	    (root_privileged() &&
	     __is_suid(root, new) &&
	     !__cap_full(effective, new)) ||
	    (!__is_setuid(new, old) &&
	     ((has_fcap &&
	       __cap_gained(permitted, new, old)) ||
	      __cap_gained(ambient, new, old))))

795
		ret = true;
796

797 798 799
	return ret;
}

D
David Howells 已提交
800
/**
801
 * cap_bprm_creds_from_file - Set up the proposed credentials for execve().
D
David Howells 已提交
802
 * @bprm: The execution parameters, including the proposed creds
803
 * @file: The file to pull the credentials from
D
David Howells 已提交
804 805 806 807
 *
 * Set up the proposed credentials for a new execution context being
 * constructed by execve().  The proposed creds in @bprm->cred is altered,
 * which won't take effect immediately.  Returns 0 if successful, -ve on error.
808
 */
809
int cap_bprm_creds_from_file(struct linux_binprm *bprm, struct file *file)
L
Linus Torvalds 已提交
810
{
811
	/* Process setpcap binaries and capabilities for uid 0 */
812 813
	const struct cred *old = current_cred();
	struct cred *new = bprm->cred;
814
	bool effective = false, has_fcap = false, is_setid;
815
	int ret;
816
	kuid_t root_uid;
L
Linus Torvalds 已提交
817

818 819 820
	if (WARN_ON(!cap_ambient_invariant_ok(old)))
		return -EPERM;

821
	ret = get_file_caps(bprm, file, &effective, &has_fcap);
822 823
	if (ret < 0)
		return ret;
L
Linus Torvalds 已提交
824

825 826
	root_uid = make_kuid(new->user_ns, 0);

827
	handle_privileged_root(bprm, has_fcap, &effective, root_uid);
828

829
	/* if we have fs caps, clear dangerous personality flags */
830
	if (__cap_gained(permitted, new, old))
831
		bprm->per_clear |= PER_CLEAR_ON_SETID;
832

833
	/* Don't let someone trace a set[ug]id/setpcap binary with the revised
834 835 836
	 * credentials unless they have the appropriate permit.
	 *
	 * In addition, if NO_NEW_PRIVS, then ensure we get no new privs.
837
	 */
838
	is_setid = __is_setuid(new, old) || __is_setgid(new, old);
839

840
	if ((is_setid || __cap_gained(permitted, new, old)) &&
841
	    ((bprm->unsafe & ~LSM_UNSAFE_PTRACE) ||
842
	     !ptracer_capable(current, new->user_ns))) {
843
		/* downgrade; they get no more than they had, and maybe less */
844
		if (!ns_capable(new->user_ns, CAP_SETUID) ||
845
		    (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)) {
846 847
			new->euid = new->uid;
			new->egid = new->gid;
L
Linus Torvalds 已提交
848
		}
849 850
		new->cap_permitted = cap_intersect(new->cap_permitted,
						   old->cap_permitted);
L
Linus Torvalds 已提交
851 852
	}

853 854
	new->suid = new->fsuid = new->euid;
	new->sgid = new->fsgid = new->egid;
L
Linus Torvalds 已提交
855

856
	/* File caps or setid cancels ambient. */
857
	if (has_fcap || is_setid)
858 859 860 861 862 863 864 865 866 867 868 869
		cap_clear(new->cap_ambient);

	/*
	 * Now that we've computed pA', update pP' to give:
	 *   pP' = (X & fP) | (pI & fI) | pA'
	 */
	new->cap_permitted = cap_combine(new->cap_permitted, new->cap_ambient);

	/*
	 * Set pE' = (fE ? pP' : pA').  Because pA' is zero if fE is set,
	 * this is the same as pE' = (fE ? pP' : 0) | pA'.
	 */
870 871 872
	if (effective)
		new->cap_effective = new->cap_permitted;
	else
873 874 875 876 877
		new->cap_effective = new->cap_ambient;

	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EPERM;

878
	if (nonroot_raised_pE(new, old, root_uid, has_fcap)) {
879 880 881
		ret = audit_log_bprm_fcaps(bprm, new, old);
		if (ret < 0)
			return ret;
882
	}
L
Linus Torvalds 已提交
883

D
David Howells 已提交
884
	new->securebits &= ~issecure_mask(SECURE_KEEP_CAPS);
885 886 887 888

	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EPERM;

889
	/* Check for privilege-elevated exec. */
890 891 892 893
	if (is_setid ||
	    (!__is_real(root_uid, new) &&
	     (effective ||
	      __cap_grew(permitted, ambient, new))))
894
		bprm->secureexec = 1;
895

896
	return 0;
L
Linus Torvalds 已提交
897 898
}

D
David Howells 已提交
899 900 901 902 903 904 905 906 907 908 909 910 911 912
/**
 * cap_inode_setxattr - Determine whether an xattr may be altered
 * @dentry: The inode/dentry being altered
 * @name: The name of the xattr to be changed
 * @value: The value that the xattr will be changed to
 * @size: The size of value
 * @flags: The replacement flag
 *
 * Determine whether an xattr may be altered or set on an inode, returning 0 if
 * permission is granted, -ve if denied.
 *
 * This is used to make sure security xattrs don't get updated or set by those
 * who aren't privileged to do so.
 */
913 914
int cap_inode_setxattr(struct dentry *dentry, const char *name,
		       const void *value, size_t size, int flags)
L
Linus Torvalds 已提交
915
{
916 917
	struct user_namespace *user_ns = dentry->d_sb->s_user_ns;

918 919
	/* Ignore non-security xattrs */
	if (strncmp(name, XATTR_SECURITY_PREFIX,
920
			XATTR_SECURITY_PREFIX_LEN) != 0)
921 922 923 924 925 926 927
		return 0;

	/*
	 * For XATTR_NAME_CAPS the check will be done in
	 * cap_convert_nscap(), called by setxattr()
	 */
	if (strcmp(name, XATTR_NAME_CAPS) == 0)
928
		return 0;
D
David Howells 已提交
929

930
	if (!ns_capable(user_ns, CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
931 932 933 934
		return -EPERM;
	return 0;
}

D
David Howells 已提交
935 936 937 938 939 940 941 942 943 944 945
/**
 * cap_inode_removexattr - Determine whether an xattr may be removed
 * @dentry: The inode/dentry being altered
 * @name: The name of the xattr to be changed
 *
 * Determine whether an xattr may be removed from an inode, returning 0 if
 * permission is granted, -ve if denied.
 *
 * This is used to make sure security xattrs don't get removed by those who
 * aren't privileged to remove them.
 */
946
int cap_inode_removexattr(struct dentry *dentry, const char *name)
L
Linus Torvalds 已提交
947
{
948 949
	struct user_namespace *user_ns = dentry->d_sb->s_user_ns;

950 951
	/* Ignore non-security xattrs */
	if (strncmp(name, XATTR_SECURITY_PREFIX,
952
			XATTR_SECURITY_PREFIX_LEN) != 0)
953 954 955 956 957 958 959 960
		return 0;

	if (strcmp(name, XATTR_NAME_CAPS) == 0) {
		/* security.capability gets namespaced */
		struct inode *inode = d_backing_inode(dentry);
		if (!inode)
			return -EINVAL;
		if (!capable_wrt_inode_uidgid(inode, CAP_SETFCAP))
961 962
			return -EPERM;
		return 0;
D
David Howells 已提交
963 964
	}

965
	if (!ns_capable(user_ns, CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
966 967 968 969
		return -EPERM;
	return 0;
}

970
/*
L
Linus Torvalds 已提交
971 972 973 974 975 976 977 978 979 980 981 982 983
 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
 * a process after a call to setuid, setreuid, or setresuid.
 *
 *  1) When set*uiding _from_ one of {r,e,s}uid == 0 _to_ all of
 *  {r,e,s}uid != 0, the permitted and effective capabilities are
 *  cleared.
 *
 *  2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
 *  capabilities of the process are cleared.
 *
 *  3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
 *  capabilities are set to the permitted capabilities.
 *
984
 *  fsuid is handled elsewhere. fsuid == 0 and {r,e,s}uid!= 0 should
L
Linus Torvalds 已提交
985 986
 *  never happen.
 *
987
 *  -astor
L
Linus Torvalds 已提交
988 989 990 991 992 993 994 995 996 997 998
 *
 * cevans - New behaviour, Oct '99
 * A process may, via prctl(), elect to keep its capabilities when it
 * calls setuid() and switches away from uid==0. Both permitted and
 * effective sets will be retained.
 * Without this change, it was impossible for a daemon to drop only some
 * of its privilege. The call to setuid(!=0) would drop all privileges!
 * Keeping uid 0 is not an option because uid 0 owns too many vital
 * files..
 * Thanks to Olaf Kirch and Peter Benie for spotting this.
 */
D
David Howells 已提交
999
static inline void cap_emulate_setxuid(struct cred *new, const struct cred *old)
L
Linus Torvalds 已提交
1000
{
1001 1002 1003 1004 1005 1006 1007
	kuid_t root_uid = make_kuid(old->user_ns, 0);

	if ((uid_eq(old->uid, root_uid) ||
	     uid_eq(old->euid, root_uid) ||
	     uid_eq(old->suid, root_uid)) &&
	    (!uid_eq(new->uid, root_uid) &&
	     !uid_eq(new->euid, root_uid) &&
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019
	     !uid_eq(new->suid, root_uid))) {
		if (!issecure(SECURE_KEEP_CAPS)) {
			cap_clear(new->cap_permitted);
			cap_clear(new->cap_effective);
		}

		/*
		 * Pre-ambient programs expect setresuid to nonroot followed
		 * by exec to drop capabilities.  We should make sure that
		 * this remains the case.
		 */
		cap_clear(new->cap_ambient);
L
Linus Torvalds 已提交
1020
	}
1021
	if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid))
D
David Howells 已提交
1022
		cap_clear(new->cap_effective);
1023
	if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid))
D
David Howells 已提交
1024
		new->cap_effective = new->cap_permitted;
L
Linus Torvalds 已提交
1025 1026
}

D
David Howells 已提交
1027 1028 1029 1030 1031 1032 1033 1034 1035
/**
 * cap_task_fix_setuid - Fix up the results of setuid() call
 * @new: The proposed credentials
 * @old: The current task's current credentials
 * @flags: Indications of what has changed
 *
 * Fix up the results of setuid() call before the credential changes are
 * actually applied, returning 0 to grant the changes, -ve to deny them.
 */
D
David Howells 已提交
1036
int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags)
L
Linus Torvalds 已提交
1037 1038 1039 1040 1041
{
	switch (flags) {
	case LSM_SETID_RE:
	case LSM_SETID_ID:
	case LSM_SETID_RES:
D
David Howells 已提交
1042 1043
		/* juggle the capabilities to follow [RES]UID changes unless
		 * otherwise suppressed */
D
David Howells 已提交
1044 1045
		if (!issecure(SECURE_NO_SETUID_FIXUP))
			cap_emulate_setxuid(new, old);
L
Linus Torvalds 已提交
1046 1047
		break;

D
David Howells 已提交
1048 1049 1050 1051
	case LSM_SETID_FS:
		/* juggle the capabilties to follow FSUID changes, unless
		 * otherwise suppressed
		 *
D
David Howells 已提交
1052 1053 1054 1055
		 * FIXME - is fsuser used for all CAP_FS_MASK capabilities?
		 *          if not, we might be a bit too harsh here.
		 */
		if (!issecure(SECURE_NO_SETUID_FIXUP)) {
1056 1057
			kuid_t root_uid = make_kuid(old->user_ns, 0);
			if (uid_eq(old->fsuid, root_uid) && !uid_eq(new->fsuid, root_uid))
D
David Howells 已提交
1058 1059
				new->cap_effective =
					cap_drop_fs_set(new->cap_effective);
D
David Howells 已提交
1060

1061
			if (!uid_eq(old->fsuid, root_uid) && uid_eq(new->fsuid, root_uid))
D
David Howells 已提交
1062 1063 1064
				new->cap_effective =
					cap_raise_fs_set(new->cap_effective,
							 new->cap_permitted);
L
Linus Torvalds 已提交
1065
		}
D
David Howells 已提交
1066
		break;
D
David Howells 已提交
1067

L
Linus Torvalds 已提交
1068 1069 1070 1071 1072 1073 1074
	default:
		return -EINVAL;
	}

	return 0;
}

1075 1076 1077 1078 1079 1080 1081 1082 1083 1084
/*
 * Rationale: code calling task_setscheduler, task_setioprio, and
 * task_setnice, assumes that
 *   . if capable(cap_sys_nice), then those actions should be allowed
 *   . if not capable(cap_sys_nice), but acting on your own processes,
 *   	then those actions should be allowed
 * This is insufficient now since you can call code without suid, but
 * yet with increased caps.
 * So we check for increased caps on the target process.
 */
1085
static int cap_safe_nice(struct task_struct *p)
1086
{
1087
	int is_subset, ret = 0;
1088 1089 1090 1091

	rcu_read_lock();
	is_subset = cap_issubset(__task_cred(p)->cap_permitted,
				 current_cred()->cap_permitted);
1092 1093
	if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
		ret = -EPERM;
1094 1095
	rcu_read_unlock();

1096
	return ret;
1097 1098
}

D
David Howells 已提交
1099 1100 1101 1102 1103 1104 1105
/**
 * cap_task_setscheduler - Detemine if scheduler policy change is permitted
 * @p: The task to affect
 *
 * Detemine if the requested scheduler policy change is permitted for the
 * specified task, returning 0 if permission is granted, -ve if denied.
 */
1106
int cap_task_setscheduler(struct task_struct *p)
1107 1108 1109 1110
{
	return cap_safe_nice(p);
}

D
David Howells 已提交
1111 1112 1113 1114 1115 1116 1117 1118 1119
/**
 * cap_task_ioprio - Detemine if I/O priority change is permitted
 * @p: The task to affect
 * @ioprio: The I/O priority to set
 *
 * Detemine if the requested I/O priority change is permitted for the specified
 * task, returning 0 if permission is granted, -ve if denied.
 */
int cap_task_setioprio(struct task_struct *p, int ioprio)
1120 1121 1122 1123
{
	return cap_safe_nice(p);
}

D
David Howells 已提交
1124 1125 1126 1127 1128 1129 1130 1131 1132
/**
 * cap_task_ioprio - Detemine if task priority change is permitted
 * @p: The task to affect
 * @nice: The nice value to set
 *
 * Detemine if the requested task priority change is permitted for the
 * specified task, returning 0 if permission is granted, -ve if denied.
 */
int cap_task_setnice(struct task_struct *p, int nice)
1133 1134 1135 1136
{
	return cap_safe_nice(p);
}

1137
/*
D
David Howells 已提交
1138 1139
 * Implement PR_CAPBSET_DROP.  Attempt to remove the specified capability from
 * the current task's bounding set.  Returns 0 on success, -ve on error.
1140
 */
1141
static int cap_prctl_drop(unsigned long cap)
1142
{
1143 1144
	struct cred *new;

1145
	if (!ns_capable(current_user_ns(), CAP_SETPCAP))
1146 1147 1148
		return -EPERM;
	if (!cap_valid(cap))
		return -EINVAL;
D
David Howells 已提交
1149

1150 1151 1152
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
D
David Howells 已提交
1153
	cap_lower(new->cap_bset, cap);
1154
	return commit_creds(new);
1155
}
1156

D
David Howells 已提交
1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168
/**
 * cap_task_prctl - Implement process control functions for this security module
 * @option: The process control function requested
 * @arg2, @arg3, @arg4, @arg5: The argument data for this function
 *
 * Allow process control functions (sys_prctl()) to alter capabilities; may
 * also deny access to other functions not otherwise implemented here.
 *
 * Returns 0 or +ve on success, -ENOSYS if this function is not implemented
 * here, other -ve on error.  If -ENOSYS is returned, sys_prctl() and other LSM
 * modules will consider performing the function.
 */
1169
int cap_task_prctl(int option, unsigned long arg2, unsigned long arg3,
D
David Howells 已提交
1170
		   unsigned long arg4, unsigned long arg5)
1171
{
1172
	const struct cred *old = current_cred();
D
David Howells 已提交
1173 1174
	struct cred *new;

1175 1176 1177
	switch (option) {
	case PR_CAPBSET_READ:
		if (!cap_valid(arg2))
1178 1179
			return -EINVAL;
		return !!cap_raised(old->cap_bset, arg2);
D
David Howells 已提交
1180

1181
	case PR_CAPBSET_DROP:
1182
		return cap_prctl_drop(arg2);
1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203

	/*
	 * The next four prctl's remain to assist with transitioning a
	 * system from legacy UID=0 based privilege (when filesystem
	 * capabilities are not in use) to a system using filesystem
	 * capabilities only - as the POSIX.1e draft intended.
	 *
	 * Note:
	 *
	 *  PR_SET_SECUREBITS =
	 *      issecure_mask(SECURE_KEEP_CAPS_LOCKED)
	 *    | issecure_mask(SECURE_NOROOT)
	 *    | issecure_mask(SECURE_NOROOT_LOCKED)
	 *    | issecure_mask(SECURE_NO_SETUID_FIXUP)
	 *    | issecure_mask(SECURE_NO_SETUID_FIXUP_LOCKED)
	 *
	 * will ensure that the current process and all of its
	 * children will be locked into a pure
	 * capability-based-privilege environment.
	 */
	case PR_SET_SECUREBITS:
1204 1205 1206
		if ((((old->securebits & SECURE_ALL_LOCKS) >> 1)
		     & (old->securebits ^ arg2))			/*[1]*/
		    || ((old->securebits & SECURE_ALL_LOCKS & ~arg2))	/*[2]*/
D
David Howells 已提交
1207
		    || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS))	/*[3]*/
1208
		    || (cap_capable(current_cred(),
1209 1210 1211
				    current_cred()->user_ns,
				    CAP_SETPCAP,
				    CAP_OPT_NONE) != 0)			/*[4]*/
1212 1213 1214 1215 1216 1217 1218
			/*
			 * [1] no changing of bits that are locked
			 * [2] no unlocking of locks
			 * [3] no setting of unsupported bits
			 * [4] doing anything requires privilege (go read about
			 *     the "sendmail capabilities bug")
			 */
D
David Howells 已提交
1219 1220
		    )
			/* cannot change a locked bit */
1221 1222 1223 1224 1225
			return -EPERM;

		new = prepare_creds();
		if (!new)
			return -ENOMEM;
D
David Howells 已提交
1226
		new->securebits = arg2;
1227
		return commit_creds(new);
D
David Howells 已提交
1228

1229
	case PR_GET_SECUREBITS:
1230
		return old->securebits;
1231 1232

	case PR_GET_KEEPCAPS:
1233
		return !!issecure(SECURE_KEEP_CAPS);
D
David Howells 已提交
1234

1235 1236
	case PR_SET_KEEPCAPS:
		if (arg2 > 1) /* Note, we rely on arg2 being unsigned here */
1237
			return -EINVAL;
D
David Howells 已提交
1238
		if (issecure(SECURE_KEEP_CAPS_LOCKED))
1239 1240 1241 1242 1243
			return -EPERM;

		new = prepare_creds();
		if (!new)
			return -ENOMEM;
D
David Howells 已提交
1244 1245
		if (arg2)
			new->securebits |= issecure_mask(SECURE_KEEP_CAPS);
1246
		else
D
David Howells 已提交
1247
			new->securebits &= ~issecure_mask(SECURE_KEEP_CAPS);
1248
		return commit_creds(new);
1249

1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273
	case PR_CAP_AMBIENT:
		if (arg2 == PR_CAP_AMBIENT_CLEAR_ALL) {
			if (arg3 | arg4 | arg5)
				return -EINVAL;

			new = prepare_creds();
			if (!new)
				return -ENOMEM;
			cap_clear(new->cap_ambient);
			return commit_creds(new);
		}

		if (((!cap_valid(arg3)) | arg4 | arg5))
			return -EINVAL;

		if (arg2 == PR_CAP_AMBIENT_IS_SET) {
			return !!cap_raised(current_cred()->cap_ambient, arg3);
		} else if (arg2 != PR_CAP_AMBIENT_RAISE &&
			   arg2 != PR_CAP_AMBIENT_LOWER) {
			return -EINVAL;
		} else {
			if (arg2 == PR_CAP_AMBIENT_RAISE &&
			    (!cap_raised(current_cred()->cap_permitted, arg3) ||
			     !cap_raised(current_cred()->cap_inheritable,
1274 1275
					 arg3) ||
			     issecure(SECURE_NO_CAP_AMBIENT_RAISE)))
1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287
				return -EPERM;

			new = prepare_creds();
			if (!new)
				return -ENOMEM;
			if (arg2 == PR_CAP_AMBIENT_RAISE)
				cap_raise(new->cap_ambient, arg3);
			else
				cap_lower(new->cap_ambient, arg3);
			return commit_creds(new);
		}

1288 1289
	default:
		/* No functionality available - continue with default */
1290
		return -ENOSYS;
1291
	}
L
Linus Torvalds 已提交
1292 1293
}

D
David Howells 已提交
1294 1295 1296 1297 1298 1299
/**
 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
 * @mm: The VM space in which the new mapping is to be made
 * @pages: The size of the mapping
 *
 * Determine whether the allocation of a new virtual mapping by the current
C
Casey Schaufler 已提交
1300
 * task is permitted, returning 1 if permission is granted, 0 if not.
D
David Howells 已提交
1301
 */
1302
int cap_vm_enough_memory(struct mm_struct *mm, long pages)
L
Linus Torvalds 已提交
1303 1304 1305
{
	int cap_sys_admin = 0;

1306 1307
	if (cap_capable(current_cred(), &init_user_ns,
				CAP_SYS_ADMIN, CAP_OPT_NOAUDIT) == 0)
L
Linus Torvalds 已提交
1308
		cap_sys_admin = 1;
1309

C
Casey Schaufler 已提交
1310
	return cap_sys_admin;
L
Linus Torvalds 已提交
1311
}
1312 1313

/*
1314
 * cap_mmap_addr - check if able to map given addr
1315 1316
 * @addr: address attempting to be mapped
 *
1317
 * If the process is attempting to map memory below dac_mmap_min_addr they need
1318 1319 1320 1321
 * CAP_SYS_RAWIO.  The other parameters to this function are unused by the
 * capability security module.  Returns 0 if this mapping should be allowed
 * -EPERM if not.
 */
1322
int cap_mmap_addr(unsigned long addr)
1323 1324 1325
{
	int ret = 0;

1326
	if (addr < dac_mmap_min_addr) {
1327
		ret = cap_capable(current_cred(), &init_user_ns, CAP_SYS_RAWIO,
1328
				  CAP_OPT_NONE);
1329 1330 1331 1332 1333 1334
		/* set PF_SUPERPRIV if it turns out we allow the low mmap */
		if (ret == 0)
			current->flags |= PF_SUPERPRIV;
	}
	return ret;
}
1335

1336 1337
int cap_mmap_file(struct file *file, unsigned long reqprot,
		  unsigned long prot, unsigned long flags)
1338
{
1339
	return 0;
1340
}
C
Casey Schaufler 已提交
1341 1342 1343

#ifdef CONFIG_SECURITY

1344
static struct security_hook_list capability_hooks[] __lsm_ro_after_init = {
C
Casey Schaufler 已提交
1345 1346 1347 1348 1349 1350
	LSM_HOOK_INIT(capable, cap_capable),
	LSM_HOOK_INIT(settime, cap_settime),
	LSM_HOOK_INIT(ptrace_access_check, cap_ptrace_access_check),
	LSM_HOOK_INIT(ptrace_traceme, cap_ptrace_traceme),
	LSM_HOOK_INIT(capget, cap_capget),
	LSM_HOOK_INIT(capset, cap_capset),
1351
	LSM_HOOK_INIT(bprm_creds_from_file, cap_bprm_creds_from_file),
C
Casey Schaufler 已提交
1352 1353
	LSM_HOOK_INIT(inode_need_killpriv, cap_inode_need_killpriv),
	LSM_HOOK_INIT(inode_killpriv, cap_inode_killpriv),
1354
	LSM_HOOK_INIT(inode_getsecurity, cap_inode_getsecurity),
C
Casey Schaufler 已提交
1355 1356 1357 1358 1359 1360 1361 1362 1363 1364
	LSM_HOOK_INIT(mmap_addr, cap_mmap_addr),
	LSM_HOOK_INIT(mmap_file, cap_mmap_file),
	LSM_HOOK_INIT(task_fix_setuid, cap_task_fix_setuid),
	LSM_HOOK_INIT(task_prctl, cap_task_prctl),
	LSM_HOOK_INIT(task_setscheduler, cap_task_setscheduler),
	LSM_HOOK_INIT(task_setioprio, cap_task_setioprio),
	LSM_HOOK_INIT(task_setnice, cap_task_setnice),
	LSM_HOOK_INIT(vm_enough_memory, cap_vm_enough_memory),
};

1365
static int __init capability_init(void)
C
Casey Schaufler 已提交
1366
{
1367 1368
	security_add_hooks(capability_hooks, ARRAY_SIZE(capability_hooks),
				"capability");
1369
	return 0;
C
Casey Schaufler 已提交
1370 1371
}

1372 1373 1374 1375 1376 1377
DEFINE_LSM(capability) = {
	.name = "capability",
	.order = LSM_ORDER_FIRST,
	.init = capability_init,
};

C
Casey Schaufler 已提交
1378
#endif /* CONFIG_SECURITY */