commoncap.c 37.4 KB
Newer Older
J
James Morris 已提交
1
/* Common capabilities, needed by capability.o.
L
Linus Torvalds 已提交
2 3 4 5 6 7 8 9
 *
 *	This program is free software; you can redistribute it and/or modify
 *	it under the terms of the GNU General Public License as published by
 *	the Free Software Foundation; either version 2 of the License, or
 *	(at your option) any later version.
 *
 */

10
#include <linux/capability.h>
11
#include <linux/audit.h>
L
Linus Torvalds 已提交
12 13 14
#include <linux/module.h>
#include <linux/init.h>
#include <linux/kernel.h>
C
Casey Schaufler 已提交
15
#include <linux/lsm_hooks.h>
L
Linus Torvalds 已提交
16 17 18 19 20 21 22 23 24 25
#include <linux/file.h>
#include <linux/mm.h>
#include <linux/mman.h>
#include <linux/pagemap.h>
#include <linux/swap.h>
#include <linux/skbuff.h>
#include <linux/netlink.h>
#include <linux/ptrace.h>
#include <linux/xattr.h>
#include <linux/hugetlb.h>
26
#include <linux/mount.h>
27
#include <linux/sched.h>
28 29
#include <linux/prctl.h>
#include <linux/securebits.h>
30
#include <linux/user_namespace.h>
A
Al Viro 已提交
31
#include <linux/binfmts.h>
32
#include <linux/personality.h>
33

34 35 36 37 38 39 40 41 42 43 44
/*
 * If a non-root user executes a setuid-root binary in
 * !secure(SECURE_NOROOT) mode, then we raise capabilities.
 * However if fE is also set, then the intent is for only
 * the file capabilities to be applied, and the setuid-root
 * bit is left on either to change the uid (plausible) or
 * to get full privilege on a kernel without file capabilities
 * support.  So in that case we do not raise capabilities.
 *
 * Warn if that happens, once per boot.
 */
45
static void warn_setuid_and_fcaps_mixed(const char *fname)
46 47 48 49 50 51 52 53 54 55
{
	static int warned;
	if (!warned) {
		printk(KERN_INFO "warning: `%s' has both setuid-root and"
			" effective capabilities. Therefore not raising all"
			" capabilities.\n", fname);
		warned = 1;
	}
}

D
David Howells 已提交
56 57
/**
 * cap_capable - Determine whether a task has a particular effective capability
58
 * @cred: The credentials to use
59
 * @ns:  The user namespace in which we need the capability
D
David Howells 已提交
60 61 62 63 64 65
 * @cap: The capability to check for
 * @audit: Whether to write an audit message or not
 *
 * Determine whether the nominated task has the specified capability amongst
 * its effective set, returning 0 if it does, -ve if it does not.
 *
66 67 68 69
 * NOTE WELL: cap_has_capability() cannot be used like the kernel's capable()
 * and has_capability() functions.  That is, it has the reverse semantics:
 * cap_has_capability() returns 0 when a task has a capability, but the
 * kernel's capable() and has_capability() returns 1 for this case.
70
 */
71 72
int cap_capable(const struct cred *cred, struct user_namespace *targ_ns,
		int cap, int audit)
L
Linus Torvalds 已提交
73
{
74
	struct user_namespace *ns = targ_ns;
75

76 77 78 79 80
	/* See if cred has the capability in the target user namespace
	 * by examining the target user namespace and all of the target
	 * user namespace's parents.
	 */
	for (;;) {
81
		/* Do we have the necessary capabilities? */
82
		if (ns == cred->user_ns)
83 84
			return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM;

85 86 87 88 89
		/*
		 * If we're already at a lower level than we're looking for,
		 * we're done searching.
		 */
		if (ns->level <= cred->user_ns->level)
90 91
			return -EPERM;

92 93 94 95 96 97 98
		/* 
		 * The owner of the user namespace in the parent of the
		 * user namespace has all caps.
		 */
		if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid))
			return 0;

99
		/*
100
		 * If you have a capability in a parent user ns, then you have
101 102
		 * it over all children user namespaces as well.
		 */
103
		ns = ns->parent;
104 105 106
	}

	/* We never get here */
L
Linus Torvalds 已提交
107 108
}

D
David Howells 已提交
109 110 111 112 113 114 115 116
/**
 * cap_settime - Determine whether the current process may set the system clock
 * @ts: The time to set
 * @tz: The timezone to set
 *
 * Determine whether the current process may set the system clock and timezone
 * information, returning 0 if permission granted, -ve if denied.
 */
117
int cap_settime(const struct timespec64 *ts, const struct timezone *tz)
L
Linus Torvalds 已提交
118 119 120 121 122 123
{
	if (!capable(CAP_SYS_TIME))
		return -EPERM;
	return 0;
}

D
David Howells 已提交
124
/**
125
 * cap_ptrace_access_check - Determine whether the current process may access
D
David Howells 已提交
126 127 128 129
 *			   another
 * @child: The process to be accessed
 * @mode: The mode of attachment.
 *
130 131 132 133 134 135
 * If we are in the same or an ancestor user_ns and have all the target
 * task's capabilities, then ptrace access is allowed.
 * If we have the ptrace capability to the target user_ns, then ptrace
 * access is allowed.
 * Else denied.
 *
D
David Howells 已提交
136 137 138
 * Determine whether a process may access another, returning 0 if permission
 * granted, -ve if denied.
 */
139
int cap_ptrace_access_check(struct task_struct *child, unsigned int mode)
L
Linus Torvalds 已提交
140
{
141
	int ret = 0;
142
	const struct cred *cred, *child_cred;
143
	const kernel_cap_t *caller_caps;
144 145

	rcu_read_lock();
146 147
	cred = current_cred();
	child_cred = __task_cred(child);
148 149 150 151
	if (mode & PTRACE_MODE_FSCREDS)
		caller_caps = &cred->cap_effective;
	else
		caller_caps = &cred->cap_permitted;
152
	if (cred->user_ns == child_cred->user_ns &&
153
	    cap_issubset(child_cred->cap_permitted, *caller_caps))
154
		goto out;
155
	if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE))
156 157 158
		goto out;
	ret = -EPERM;
out:
159 160
	rcu_read_unlock();
	return ret;
161 162
}

D
David Howells 已提交
163 164 165 166
/**
 * cap_ptrace_traceme - Determine whether another process may trace the current
 * @parent: The task proposed to be the tracer
 *
167 168 169 170 171 172
 * If parent is in the same or an ancestor user_ns and has all current's
 * capabilities, then ptrace access is allowed.
 * If parent has the ptrace capability to current's user_ns, then ptrace
 * access is allowed.
 * Else denied.
 *
D
David Howells 已提交
173 174 175
 * Determine whether the nominated task is permitted to trace the current
 * process, returning 0 if permission is granted, -ve if denied.
 */
176 177
int cap_ptrace_traceme(struct task_struct *parent)
{
178
	int ret = 0;
179
	const struct cred *cred, *child_cred;
180 181

	rcu_read_lock();
182 183
	cred = __task_cred(parent);
	child_cred = current_cred();
184
	if (cred->user_ns == child_cred->user_ns &&
185 186
	    cap_issubset(child_cred->cap_permitted, cred->cap_permitted))
		goto out;
187
	if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE))
188 189 190
		goto out;
	ret = -EPERM;
out:
191 192
	rcu_read_unlock();
	return ret;
L
Linus Torvalds 已提交
193 194
}

D
David Howells 已提交
195 196 197 198 199 200 201 202 203 204 205 206
/**
 * cap_capget - Retrieve a task's capability sets
 * @target: The task from which to retrieve the capability sets
 * @effective: The place to record the effective set
 * @inheritable: The place to record the inheritable set
 * @permitted: The place to record the permitted set
 *
 * This function retrieves the capabilities of the nominated task and returns
 * them to the caller.
 */
int cap_capget(struct task_struct *target, kernel_cap_t *effective,
	       kernel_cap_t *inheritable, kernel_cap_t *permitted)
L
Linus Torvalds 已提交
207
{
208
	const struct cred *cred;
209

L
Linus Torvalds 已提交
210
	/* Derived from kernel/capability.c:sys_capget. */
211 212
	rcu_read_lock();
	cred = __task_cred(target);
213 214 215
	*effective   = cred->cap_effective;
	*inheritable = cred->cap_inheritable;
	*permitted   = cred->cap_permitted;
216
	rcu_read_unlock();
L
Linus Torvalds 已提交
217 218 219
	return 0;
}

D
David Howells 已提交
220 221 222 223
/*
 * Determine whether the inheritable capabilities are limited to the old
 * permitted set.  Returns 1 if they are limited, 0 if they are not.
 */
224 225 226
static inline int cap_inh_is_capped(void)
{

D
David Howells 已提交
227 228 229
	/* they are so limited unless the current task has the CAP_SETPCAP
	 * capability
	 */
230
	if (cap_capable(current_cred(), current_cred()->user_ns,
231
			CAP_SETPCAP, SECURITY_CAP_AUDIT) == 0)
D
David Howells 已提交
232 233
		return 0;
	return 1;
234
}
235

D
David Howells 已提交
236 237 238 239 240 241 242 243 244 245 246 247
/**
 * cap_capset - Validate and apply proposed changes to current's capabilities
 * @new: The proposed new credentials; alterations should be made here
 * @old: The current task's current credentials
 * @effective: A pointer to the proposed new effective capabilities set
 * @inheritable: A pointer to the proposed new inheritable capabilities set
 * @permitted: A pointer to the proposed new permitted capabilities set
 *
 * This function validates and applies a proposed mass change to the current
 * process's capability sets.  The changes are made to the proposed new
 * credentials, and assuming no error, will be committed by the caller of LSM.
 */
D
David Howells 已提交
248 249 250 251 252
int cap_capset(struct cred *new,
	       const struct cred *old,
	       const kernel_cap_t *effective,
	       const kernel_cap_t *inheritable,
	       const kernel_cap_t *permitted)
L
Linus Torvalds 已提交
253
{
D
David Howells 已提交
254 255 256 257
	if (cap_inh_is_capped() &&
	    !cap_issubset(*inheritable,
			  cap_combine(old->cap_inheritable,
				      old->cap_permitted)))
258
		/* incapable of using this inheritable set */
L
Linus Torvalds 已提交
259
		return -EPERM;
D
David Howells 已提交
260

261
	if (!cap_issubset(*inheritable,
D
David Howells 已提交
262 263
			  cap_combine(old->cap_inheritable,
				      old->cap_bset)))
264 265
		/* no new pI capabilities outside bounding set */
		return -EPERM;
L
Linus Torvalds 已提交
266 267

	/* verify restrictions on target's new Permitted set */
D
David Howells 已提交
268
	if (!cap_issubset(*permitted, old->cap_permitted))
L
Linus Torvalds 已提交
269 270 271
		return -EPERM;

	/* verify the _new_Effective_ is a subset of the _new_Permitted_ */
D
David Howells 已提交
272
	if (!cap_issubset(*effective, *permitted))
L
Linus Torvalds 已提交
273 274
		return -EPERM;

D
David Howells 已提交
275 276 277
	new->cap_effective   = *effective;
	new->cap_inheritable = *inheritable;
	new->cap_permitted   = *permitted;
278 279 280 281 282 283 284 285 286 287

	/*
	 * Mask off ambient bits that are no longer both permitted and
	 * inheritable.
	 */
	new->cap_ambient = cap_intersect(new->cap_ambient,
					 cap_intersect(*permitted,
						       *inheritable));
	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EINVAL;
L
Linus Torvalds 已提交
288 289 290
	return 0;
}

D
David Howells 已提交
291 292 293
/*
 * Clear proposed capability sets for execve().
 */
294 295
static inline void bprm_clear_caps(struct linux_binprm *bprm)
{
296
	cap_clear(bprm->cred->cap_permitted);
297 298 299
	bprm->cap_effective = false;
}

D
David Howells 已提交
300 301 302 303 304 305 306 307 308 309 310
/**
 * cap_inode_need_killpriv - Determine if inode change affects privileges
 * @dentry: The inode/dentry in being changed with change marked ATTR_KILL_PRIV
 *
 * Determine if an inode having a change applied that's marked ATTR_KILL_PRIV
 * affects the security markings on that inode, and if it is, should
 * inode_killpriv() be invoked or the change rejected?
 *
 * Returns 0 if granted; +ve if granted, but inode_killpriv() is required; and
 * -ve to deny the change.
 */
311 312
int cap_inode_need_killpriv(struct dentry *dentry)
{
313
	struct inode *inode = d_backing_inode(dentry);
314 315
	int error;

316 317
	error = __vfs_getxattr(dentry, inode, XATTR_NAME_CAPS, NULL, 0);
	return error > 0;
318 319
}

D
David Howells 已提交
320 321 322 323 324 325 326 327
/**
 * cap_inode_killpriv - Erase the security markings on an inode
 * @dentry: The inode/dentry to alter
 *
 * Erase the privilege-enhancing security markings on an inode.
 *
 * Returns 0 if successful, -ve on error.
 */
328 329
int cap_inode_killpriv(struct dentry *dentry)
{
330
	int error;
331

332 333 334 335
	error = __vfs_removexattr(dentry, XATTR_NAME_CAPS);
	if (error == -EOPNOTSUPP)
		error = 0;
	return error;
336 337
}

338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540
static bool rootid_owns_currentns(kuid_t kroot)
{
	struct user_namespace *ns;

	if (!uid_valid(kroot))
		return false;

	for (ns = current_user_ns(); ; ns = ns->parent) {
		if (from_kuid(ns, kroot) == 0)
			return true;
		if (ns == &init_user_ns)
			break;
	}

	return false;
}

static __u32 sansflags(__u32 m)
{
	return m & ~VFS_CAP_FLAGS_EFFECTIVE;
}

static bool is_v2header(size_t size, __le32 magic)
{
	__u32 m = le32_to_cpu(magic);
	if (size != XATTR_CAPS_SZ_2)
		return false;
	return sansflags(m) == VFS_CAP_REVISION_2;
}

static bool is_v3header(size_t size, __le32 magic)
{
	__u32 m = le32_to_cpu(magic);

	if (size != XATTR_CAPS_SZ_3)
		return false;
	return sansflags(m) == VFS_CAP_REVISION_3;
}

/*
 * getsecurity: We are called for security.* before any attempt to read the
 * xattr from the inode itself.
 *
 * This gives us a chance to read the on-disk value and convert it.  If we
 * return -EOPNOTSUPP, then vfs_getxattr() will call the i_op handler.
 *
 * Note we are not called by vfs_getxattr_alloc(), but that is only called
 * by the integrity subsystem, which really wants the unconverted values -
 * so that's good.
 */
int cap_inode_getsecurity(struct inode *inode, const char *name, void **buffer,
			  bool alloc)
{
	int size, ret;
	kuid_t kroot;
	uid_t root, mappedroot;
	char *tmpbuf = NULL;
	struct vfs_cap_data *cap;
	struct vfs_ns_cap_data *nscap;
	struct dentry *dentry;
	struct user_namespace *fs_ns;

	if (strcmp(name, "capability") != 0)
		return -EOPNOTSUPP;

	dentry = d_find_alias(inode);
	if (!dentry)
		return -EINVAL;

	size = sizeof(struct vfs_ns_cap_data);
	ret = (int) vfs_getxattr_alloc(dentry, XATTR_NAME_CAPS,
				 &tmpbuf, size, GFP_NOFS);
	dput(dentry);

	if (ret < 0)
		return ret;

	fs_ns = inode->i_sb->s_user_ns;
	cap = (struct vfs_cap_data *) tmpbuf;
	if (is_v2header((size_t) ret, cap->magic_etc)) {
		/* If this is sizeof(vfs_cap_data) then we're ok with the
		 * on-disk value, so return that.  */
		if (alloc)
			*buffer = tmpbuf;
		else
			kfree(tmpbuf);
		return ret;
	} else if (!is_v3header((size_t) ret, cap->magic_etc)) {
		kfree(tmpbuf);
		return -EINVAL;
	}

	nscap = (struct vfs_ns_cap_data *) tmpbuf;
	root = le32_to_cpu(nscap->rootid);
	kroot = make_kuid(fs_ns, root);

	/* If the root kuid maps to a valid uid in current ns, then return
	 * this as a nscap. */
	mappedroot = from_kuid(current_user_ns(), kroot);
	if (mappedroot != (uid_t)-1 && mappedroot != (uid_t)0) {
		if (alloc) {
			*buffer = tmpbuf;
			nscap->rootid = cpu_to_le32(mappedroot);
		} else
			kfree(tmpbuf);
		return size;
	}

	if (!rootid_owns_currentns(kroot)) {
		kfree(tmpbuf);
		return -EOPNOTSUPP;
	}

	/* This comes from a parent namespace.  Return as a v2 capability */
	size = sizeof(struct vfs_cap_data);
	if (alloc) {
		*buffer = kmalloc(size, GFP_ATOMIC);
		if (*buffer) {
			struct vfs_cap_data *cap = *buffer;
			__le32 nsmagic, magic;
			magic = VFS_CAP_REVISION_2;
			nsmagic = le32_to_cpu(nscap->magic_etc);
			if (nsmagic & VFS_CAP_FLAGS_EFFECTIVE)
				magic |= VFS_CAP_FLAGS_EFFECTIVE;
			memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
			cap->magic_etc = cpu_to_le32(magic);
		}
	}
	kfree(tmpbuf);
	return size;
}

static kuid_t rootid_from_xattr(const void *value, size_t size,
				struct user_namespace *task_ns)
{
	const struct vfs_ns_cap_data *nscap = value;
	uid_t rootid = 0;

	if (size == XATTR_CAPS_SZ_3)
		rootid = le32_to_cpu(nscap->rootid);

	return make_kuid(task_ns, rootid);
}

static bool validheader(size_t size, __le32 magic)
{
	return is_v2header(size, magic) || is_v3header(size, magic);
}

/*
 * User requested a write of security.capability.  If needed, update the
 * xattr to change from v2 to v3, or to fixup the v3 rootid.
 *
 * If all is ok, we return the new size, on error return < 0.
 */
int cap_convert_nscap(struct dentry *dentry, void **ivalue, size_t size)
{
	struct vfs_ns_cap_data *nscap;
	uid_t nsrootid;
	const struct vfs_cap_data *cap = *ivalue;
	__u32 magic, nsmagic;
	struct inode *inode = d_backing_inode(dentry);
	struct user_namespace *task_ns = current_user_ns(),
		*fs_ns = inode->i_sb->s_user_ns;
	kuid_t rootid;
	size_t newsize;

	if (!*ivalue)
		return -EINVAL;
	if (!validheader(size, cap->magic_etc))
		return -EINVAL;
	if (!capable_wrt_inode_uidgid(inode, CAP_SETFCAP))
		return -EPERM;
	if (size == XATTR_CAPS_SZ_2)
		if (ns_capable(inode->i_sb->s_user_ns, CAP_SETFCAP))
			/* user is privileged, just write the v2 */
			return size;

	rootid = rootid_from_xattr(*ivalue, size, task_ns);
	if (!uid_valid(rootid))
		return -EINVAL;

	nsrootid = from_kuid(fs_ns, rootid);
	if (nsrootid == -1)
		return -EINVAL;

	newsize = sizeof(struct vfs_ns_cap_data);
	nscap = kmalloc(newsize, GFP_ATOMIC);
	if (!nscap)
		return -ENOMEM;
	nscap->rootid = cpu_to_le32(nsrootid);
	nsmagic = VFS_CAP_REVISION_3;
	magic = le32_to_cpu(cap->magic_etc);
	if (magic & VFS_CAP_FLAGS_EFFECTIVE)
		nsmagic |= VFS_CAP_FLAGS_EFFECTIVE;
	nscap->magic_etc = cpu_to_le32(nsmagic);
	memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);

	kvfree(*ivalue);
	*ivalue = nscap;
	return newsize;
}

D
David Howells 已提交
541 542 543 544
/*
 * Calculate the new process capability sets from the capability sets attached
 * to a file.
 */
545
static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
546
					  struct linux_binprm *bprm,
547 548
					  bool *effective,
					  bool *has_cap)
549
{
550
	struct cred *new = bprm->cred;
551 552 553 554
	unsigned i;
	int ret = 0;

	if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
555
		*effective = true;
556

557 558 559
	if (caps->magic_etc & VFS_CAP_REVISION_MASK)
		*has_cap = true;

560 561 562 563 564 565
	CAP_FOR_EACH_U32(i) {
		__u32 permitted = caps->permitted.cap[i];
		__u32 inheritable = caps->inheritable.cap[i];

		/*
		 * pP' = (X & fP) | (pI & fI)
566
		 * The addition of pA' is handled later.
567
		 */
568 569 570
		new->cap_permitted.cap[i] =
			(new->cap_bset.cap[i] & permitted) |
			(new->cap_inheritable.cap[i] & inheritable);
571

572 573
		if (permitted & ~new->cap_permitted.cap[i])
			/* insufficient to execute correctly */
574 575 576 577 578 579 580 581
			ret = -EPERM;
	}

	/*
	 * For legacy apps, with no internal support for recognizing they
	 * do not have enough capabilities, we return an error if they are
	 * missing some "forced" (aka file-permitted) capabilities.
	 */
582
	return *effective ? ret : 0;
583 584
}

D
David Howells 已提交
585 586 587
/*
 * Extract the on-exec-apply capability sets for an executable file.
 */
588 589
int get_vfs_caps_from_disk(const struct dentry *dentry, struct cpu_vfs_cap_data *cpu_caps)
{
590
	struct inode *inode = d_backing_inode(dentry);
591
	__u32 magic_etc;
592
	unsigned tocopy, i;
593
	int size;
594 595 596 597
	struct vfs_ns_cap_data data, *nscaps = &data;
	struct vfs_cap_data *caps = (struct vfs_cap_data *) &data;
	kuid_t rootkuid;
	struct user_namespace *fs_ns = inode->i_sb->s_user_ns;
598 599 600

	memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));

601
	if (!inode)
602 603
		return -ENODATA;

604
	size = __vfs_getxattr((struct dentry *)dentry, inode,
605
			      XATTR_NAME_CAPS, &data, XATTR_CAPS_SZ);
606
	if (size == -ENODATA || size == -EOPNOTSUPP)
607 608
		/* no data, that's ok */
		return -ENODATA;
609

610 611
	if (size < 0)
		return size;
612

613
	if (size < sizeof(magic_etc))
614 615
		return -EINVAL;

616
	cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps->magic_etc);
617

618
	rootkuid = make_kuid(fs_ns, 0);
619
	switch (magic_etc & VFS_CAP_REVISION_MASK) {
620 621 622 623 624 625 626 627 628 629
	case VFS_CAP_REVISION_1:
		if (size != XATTR_CAPS_SZ_1)
			return -EINVAL;
		tocopy = VFS_CAP_U32_1;
		break;
	case VFS_CAP_REVISION_2:
		if (size != XATTR_CAPS_SZ_2)
			return -EINVAL;
		tocopy = VFS_CAP_U32_2;
		break;
630 631 632 633 634 635 636
	case VFS_CAP_REVISION_3:
		if (size != XATTR_CAPS_SZ_3)
			return -EINVAL;
		tocopy = VFS_CAP_U32_3;
		rootkuid = make_kuid(fs_ns, le32_to_cpu(nscaps->rootid));
		break;

637 638 639
	default:
		return -EINVAL;
	}
640 641 642 643 644
	/* Limit the caps to the mounter of the filesystem
	 * or the more limited uid specified in the xattr.
	 */
	if (!rootid_owns_currentns(rootkuid))
		return -ENODATA;
645

646
	CAP_FOR_EACH_U32(i) {
647 648
		if (i >= tocopy)
			break;
649 650
		cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted);
		cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable);
651
	}
652

653 654 655
	cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;
	cpu_caps->inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;

656
	return 0;
657 658
}

D
David Howells 已提交
659 660 661 662 663
/*
 * Attempt to get the on-exec apply capability sets for an executable file from
 * its xattrs and, if present, apply them to the proposed credentials being
 * constructed by execve().
 */
664
static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_cap)
665 666
{
	int rc = 0;
667
	struct cpu_vfs_cap_data vcaps;
668

669 670
	bprm_clear_caps(bprm);

671 672 673
	if (!file_caps_enabled)
		return 0;

674
	if (!mnt_may_suid(bprm->file->f_path.mnt))
675
		return 0;
676 677 678 679 680 681

	/*
	 * This check is redundant with mnt_may_suid() but is kept to make
	 * explicit that capability bits are limited to s_user_ns and its
	 * descendants.
	 */
682 683
	if (!current_in_userns(bprm->file->f_path.mnt->mnt_sb->s_user_ns))
		return 0;
684

685
	rc = get_vfs_caps_from_disk(bprm->file->f_path.dentry, &vcaps);
686 687
	if (rc < 0) {
		if (rc == -EINVAL)
688 689
			printk(KERN_NOTICE "Invalid argument reading file caps for %s\n",
					bprm->filename);
690 691
		else if (rc == -ENODATA)
			rc = 0;
692 693 694
		goto out;
	}

695
	rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_cap);
696 697 698
	if (rc == -EINVAL)
		printk(KERN_NOTICE "%s: cap_from_disk returned %d for %s\n",
		       __func__, rc, bprm->filename);
699 700 701 702 703 704 705 706

out:
	if (rc)
		bprm_clear_caps(bprm);

	return rc;
}

D
David Howells 已提交
707 708 709 710 711 712 713
/**
 * cap_bprm_set_creds - Set up the proposed credentials for execve().
 * @bprm: The execution parameters, including the proposed creds
 *
 * Set up the proposed credentials for a new execution context being
 * constructed by execve().  The proposed creds in @bprm->cred is altered,
 * which won't take effect immediately.  Returns 0 if successful, -ve on error.
714 715
 */
int cap_bprm_set_creds(struct linux_binprm *bprm)
L
Linus Torvalds 已提交
716
{
717 718
	const struct cred *old = current_cred();
	struct cred *new = bprm->cred;
719
	bool effective, has_cap = false, is_setid;
720
	int ret;
721
	kuid_t root_uid;
L
Linus Torvalds 已提交
722

723 724 725
	if (WARN_ON(!cap_ambient_invariant_ok(old)))
		return -EPERM;

726
	effective = false;
727
	ret = get_file_caps(bprm, &effective, &has_cap);
728 729
	if (ret < 0)
		return ret;
L
Linus Torvalds 已提交
730

731 732
	root_uid = make_kuid(new->user_ns, 0);

733
	if (!issecure(SECURE_NOROOT)) {
734 735 736 737 738
		/*
		 * If the legacy file capability is set, then don't set privs
		 * for a setuid root binary run by a non-root user.  Do set it
		 * for a root user just to cause least surprise to an admin.
		 */
739
		if (has_cap && !uid_eq(new->uid, root_uid) && uid_eq(new->euid, root_uid)) {
740 741 742
			warn_setuid_and_fcaps_mixed(bprm->filename);
			goto skip;
		}
743 744 745 746 747
		/*
		 * To support inheritance of root-permissions and suid-root
		 * executables under compatibility mode, we override the
		 * capability sets for the file.
		 *
748
		 * If only the real uid is 0, we do not set the effective bit.
749
		 */
750
		if (uid_eq(new->euid, root_uid) || uid_eq(new->uid, root_uid)) {
751
			/* pP' = (cap_bset & ~0) | (pI & ~0) */
752 753
			new->cap_permitted = cap_combine(old->cap_bset,
							 old->cap_inheritable);
L
Linus Torvalds 已提交
754
		}
755
		if (uid_eq(new->euid, root_uid))
756
			effective = true;
L
Linus Torvalds 已提交
757
	}
758
skip:
759

760 761 762 763 764
	/* if we have fs caps, clear dangerous personality flags */
	if (!cap_issubset(new->cap_permitted, old->cap_permitted))
		bprm->per_clear |= PER_CLEAR_ON_SETID;


765
	/* Don't let someone trace a set[ug]id/setpcap binary with the revised
766 767 768
	 * credentials unless they have the appropriate permit.
	 *
	 * In addition, if NO_NEW_PRIVS, then ensure we get no new privs.
769
	 */
770 771 772
	is_setid = !uid_eq(new->euid, old->uid) || !gid_eq(new->egid, old->gid);

	if ((is_setid ||
773
	     !cap_issubset(new->cap_permitted, old->cap_permitted)) &&
774
	    ((bprm->unsafe & ~LSM_UNSAFE_PTRACE) ||
775
	     !ptracer_capable(current, new->user_ns))) {
776
		/* downgrade; they get no more than they had, and maybe less */
777
		if (!ns_capable(new->user_ns, CAP_SETUID) ||
778
		    (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)) {
779 780
			new->euid = new->uid;
			new->egid = new->gid;
L
Linus Torvalds 已提交
781
		}
782 783
		new->cap_permitted = cap_intersect(new->cap_permitted,
						   old->cap_permitted);
L
Linus Torvalds 已提交
784 785
	}

786 787
	new->suid = new->fsuid = new->euid;
	new->sgid = new->fsgid = new->egid;
L
Linus Torvalds 已提交
788

789 790 791 792 793 794 795 796 797 798 799 800 801 802
	/* File caps or setid cancels ambient. */
	if (has_cap || is_setid)
		cap_clear(new->cap_ambient);

	/*
	 * Now that we've computed pA', update pP' to give:
	 *   pP' = (X & fP) | (pI & fI) | pA'
	 */
	new->cap_permitted = cap_combine(new->cap_permitted, new->cap_ambient);

	/*
	 * Set pE' = (fE ? pP' : pA').  Because pA' is zero if fE is set,
	 * this is the same as pE' = (fE ? pP' : 0) | pA'.
	 */
803 804 805
	if (effective)
		new->cap_effective = new->cap_permitted;
	else
806 807 808 809 810
		new->cap_effective = new->cap_ambient;

	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EPERM;

811
	bprm->cap_effective = effective;
L
Linus Torvalds 已提交
812

813 814 815 816 817 818 819 820 821 822 823 824
	/*
	 * Audit candidate if current->cap_effective is set
	 *
	 * We do not bother to audit if 3 things are true:
	 *   1) cap_effective has all caps
	 *   2) we are root
	 *   3) root is supposed to have all caps (SECURE_NOROOT)
	 * Since this is just a normal root execing a process.
	 *
	 * Number 1 above might fail if you don't have a full bset, but I think
	 * that is interesting information to audit.
	 */
825
	if (!cap_issubset(new->cap_effective, new->cap_ambient)) {
D
David Howells 已提交
826
		if (!cap_issubset(CAP_FULL_SET, new->cap_effective) ||
827
		    !uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) ||
828 829 830 831 832
		    issecure(SECURE_NOROOT)) {
			ret = audit_log_bprm_fcaps(bprm, new, old);
			if (ret < 0)
				return ret;
		}
833
	}
L
Linus Torvalds 已提交
834

D
David Howells 已提交
835
	new->securebits &= ~issecure_mask(SECURE_KEEP_CAPS);
836 837 838 839

	if (WARN_ON(!cap_ambient_invariant_ok(new)))
		return -EPERM;

840
	return 0;
L
Linus Torvalds 已提交
841 842
}

D
David Howells 已提交
843 844 845 846 847 848 849 850 851
/**
 * cap_bprm_secureexec - Determine whether a secure execution is required
 * @bprm: The execution parameters
 *
 * Determine whether a secure execution is required, return 1 if it is, and 0
 * if it is not.
 *
 * The credentials have been committed by this point, and so are no longer
 * available through @bprm->cred.
852 853
 */
int cap_bprm_secureexec(struct linux_binprm *bprm)
L
Linus Torvalds 已提交
854
{
855
	const struct cred *cred = current_cred();
856
	kuid_t root_uid = make_kuid(cred->user_ns, 0);
857

858
	if (!uid_eq(cred->uid, root_uid)) {
859 860
		if (bprm->cap_effective)
			return 1;
861
		if (!cap_issubset(cred->cap_permitted, cred->cap_ambient))
862 863 864
			return 1;
	}

865 866
	return (!uid_eq(cred->euid, cred->uid) ||
		!gid_eq(cred->egid, cred->gid));
L
Linus Torvalds 已提交
867 868
}

D
David Howells 已提交
869 870 871 872 873 874 875 876 877 878 879 880 881 882
/**
 * cap_inode_setxattr - Determine whether an xattr may be altered
 * @dentry: The inode/dentry being altered
 * @name: The name of the xattr to be changed
 * @value: The value that the xattr will be changed to
 * @size: The size of value
 * @flags: The replacement flag
 *
 * Determine whether an xattr may be altered or set on an inode, returning 0 if
 * permission is granted, -ve if denied.
 *
 * This is used to make sure security xattrs don't get updated or set by those
 * who aren't privileged to do so.
 */
883 884
int cap_inode_setxattr(struct dentry *dentry, const char *name,
		       const void *value, size_t size, int flags)
L
Linus Torvalds 已提交
885
{
886 887 888 889 890 891 892 893 894 895
	/* Ignore non-security xattrs */
	if (strncmp(name, XATTR_SECURITY_PREFIX,
			sizeof(XATTR_SECURITY_PREFIX) - 1) != 0)
		return 0;

	/*
	 * For XATTR_NAME_CAPS the check will be done in
	 * cap_convert_nscap(), called by setxattr()
	 */
	if (strcmp(name, XATTR_NAME_CAPS) == 0)
896
		return 0;
D
David Howells 已提交
897

898
	if (!capable(CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
899 900 901 902
		return -EPERM;
	return 0;
}

D
David Howells 已提交
903 904 905 906 907 908 909 910 911 912 913
/**
 * cap_inode_removexattr - Determine whether an xattr may be removed
 * @dentry: The inode/dentry being altered
 * @name: The name of the xattr to be changed
 *
 * Determine whether an xattr may be removed from an inode, returning 0 if
 * permission is granted, -ve if denied.
 *
 * This is used to make sure security xattrs don't get removed by those who
 * aren't privileged to remove them.
 */
914
int cap_inode_removexattr(struct dentry *dentry, const char *name)
L
Linus Torvalds 已提交
915
{
916 917 918 919 920 921 922 923 924 925 926
	/* Ignore non-security xattrs */
	if (strncmp(name, XATTR_SECURITY_PREFIX,
			sizeof(XATTR_SECURITY_PREFIX) - 1) != 0)
		return 0;

	if (strcmp(name, XATTR_NAME_CAPS) == 0) {
		/* security.capability gets namespaced */
		struct inode *inode = d_backing_inode(dentry);
		if (!inode)
			return -EINVAL;
		if (!capable_wrt_inode_uidgid(inode, CAP_SETFCAP))
927 928
			return -EPERM;
		return 0;
D
David Howells 已提交
929 930
	}

931
	if (!capable(CAP_SYS_ADMIN))
L
Linus Torvalds 已提交
932 933 934 935
		return -EPERM;
	return 0;
}

936
/*
L
Linus Torvalds 已提交
937 938 939 940 941 942 943 944 945 946 947 948 949
 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
 * a process after a call to setuid, setreuid, or setresuid.
 *
 *  1) When set*uiding _from_ one of {r,e,s}uid == 0 _to_ all of
 *  {r,e,s}uid != 0, the permitted and effective capabilities are
 *  cleared.
 *
 *  2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
 *  capabilities of the process are cleared.
 *
 *  3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
 *  capabilities are set to the permitted capabilities.
 *
950
 *  fsuid is handled elsewhere. fsuid == 0 and {r,e,s}uid!= 0 should
L
Linus Torvalds 已提交
951 952
 *  never happen.
 *
953
 *  -astor
L
Linus Torvalds 已提交
954 955 956 957 958 959 960 961 962 963 964
 *
 * cevans - New behaviour, Oct '99
 * A process may, via prctl(), elect to keep its capabilities when it
 * calls setuid() and switches away from uid==0. Both permitted and
 * effective sets will be retained.
 * Without this change, it was impossible for a daemon to drop only some
 * of its privilege. The call to setuid(!=0) would drop all privileges!
 * Keeping uid 0 is not an option because uid 0 owns too many vital
 * files..
 * Thanks to Olaf Kirch and Peter Benie for spotting this.
 */
D
David Howells 已提交
965
static inline void cap_emulate_setxuid(struct cred *new, const struct cred *old)
L
Linus Torvalds 已提交
966
{
967 968 969 970 971 972 973
	kuid_t root_uid = make_kuid(old->user_ns, 0);

	if ((uid_eq(old->uid, root_uid) ||
	     uid_eq(old->euid, root_uid) ||
	     uid_eq(old->suid, root_uid)) &&
	    (!uid_eq(new->uid, root_uid) &&
	     !uid_eq(new->euid, root_uid) &&
974 975 976 977 978 979 980 981 982 983 984 985
	     !uid_eq(new->suid, root_uid))) {
		if (!issecure(SECURE_KEEP_CAPS)) {
			cap_clear(new->cap_permitted);
			cap_clear(new->cap_effective);
		}

		/*
		 * Pre-ambient programs expect setresuid to nonroot followed
		 * by exec to drop capabilities.  We should make sure that
		 * this remains the case.
		 */
		cap_clear(new->cap_ambient);
L
Linus Torvalds 已提交
986
	}
987
	if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid))
D
David Howells 已提交
988
		cap_clear(new->cap_effective);
989
	if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid))
D
David Howells 已提交
990
		new->cap_effective = new->cap_permitted;
L
Linus Torvalds 已提交
991 992
}

D
David Howells 已提交
993 994 995 996 997 998 999 1000 1001
/**
 * cap_task_fix_setuid - Fix up the results of setuid() call
 * @new: The proposed credentials
 * @old: The current task's current credentials
 * @flags: Indications of what has changed
 *
 * Fix up the results of setuid() call before the credential changes are
 * actually applied, returning 0 to grant the changes, -ve to deny them.
 */
D
David Howells 已提交
1002
int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags)
L
Linus Torvalds 已提交
1003 1004 1005 1006 1007
{
	switch (flags) {
	case LSM_SETID_RE:
	case LSM_SETID_ID:
	case LSM_SETID_RES:
D
David Howells 已提交
1008 1009
		/* juggle the capabilities to follow [RES]UID changes unless
		 * otherwise suppressed */
D
David Howells 已提交
1010 1011
		if (!issecure(SECURE_NO_SETUID_FIXUP))
			cap_emulate_setxuid(new, old);
L
Linus Torvalds 已提交
1012 1013
		break;

D
David Howells 已提交
1014 1015 1016 1017
	case LSM_SETID_FS:
		/* juggle the capabilties to follow FSUID changes, unless
		 * otherwise suppressed
		 *
D
David Howells 已提交
1018 1019 1020 1021
		 * FIXME - is fsuser used for all CAP_FS_MASK capabilities?
		 *          if not, we might be a bit too harsh here.
		 */
		if (!issecure(SECURE_NO_SETUID_FIXUP)) {
1022 1023
			kuid_t root_uid = make_kuid(old->user_ns, 0);
			if (uid_eq(old->fsuid, root_uid) && !uid_eq(new->fsuid, root_uid))
D
David Howells 已提交
1024 1025
				new->cap_effective =
					cap_drop_fs_set(new->cap_effective);
D
David Howells 已提交
1026

1027
			if (!uid_eq(old->fsuid, root_uid) && uid_eq(new->fsuid, root_uid))
D
David Howells 已提交
1028 1029 1030
				new->cap_effective =
					cap_raise_fs_set(new->cap_effective,
							 new->cap_permitted);
L
Linus Torvalds 已提交
1031
		}
D
David Howells 已提交
1032
		break;
D
David Howells 已提交
1033

L
Linus Torvalds 已提交
1034 1035 1036 1037 1038 1039 1040
	default:
		return -EINVAL;
	}

	return 0;
}

1041 1042 1043 1044 1045 1046 1047 1048 1049 1050
/*
 * Rationale: code calling task_setscheduler, task_setioprio, and
 * task_setnice, assumes that
 *   . if capable(cap_sys_nice), then those actions should be allowed
 *   . if not capable(cap_sys_nice), but acting on your own processes,
 *   	then those actions should be allowed
 * This is insufficient now since you can call code without suid, but
 * yet with increased caps.
 * So we check for increased caps on the target process.
 */
1051
static int cap_safe_nice(struct task_struct *p)
1052
{
1053
	int is_subset, ret = 0;
1054 1055 1056 1057

	rcu_read_lock();
	is_subset = cap_issubset(__task_cred(p)->cap_permitted,
				 current_cred()->cap_permitted);
1058 1059
	if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
		ret = -EPERM;
1060 1061
	rcu_read_unlock();

1062
	return ret;
1063 1064
}

D
David Howells 已提交
1065 1066 1067 1068 1069 1070 1071
/**
 * cap_task_setscheduler - Detemine if scheduler policy change is permitted
 * @p: The task to affect
 *
 * Detemine if the requested scheduler policy change is permitted for the
 * specified task, returning 0 if permission is granted, -ve if denied.
 */
1072
int cap_task_setscheduler(struct task_struct *p)
1073 1074 1075 1076
{
	return cap_safe_nice(p);
}

D
David Howells 已提交
1077 1078 1079 1080 1081 1082 1083 1084 1085
/**
 * cap_task_ioprio - Detemine if I/O priority change is permitted
 * @p: The task to affect
 * @ioprio: The I/O priority to set
 *
 * Detemine if the requested I/O priority change is permitted for the specified
 * task, returning 0 if permission is granted, -ve if denied.
 */
int cap_task_setioprio(struct task_struct *p, int ioprio)
1086 1087 1088 1089
{
	return cap_safe_nice(p);
}

D
David Howells 已提交
1090 1091 1092 1093 1094 1095 1096 1097 1098
/**
 * cap_task_ioprio - Detemine if task priority change is permitted
 * @p: The task to affect
 * @nice: The nice value to set
 *
 * Detemine if the requested task priority change is permitted for the
 * specified task, returning 0 if permission is granted, -ve if denied.
 */
int cap_task_setnice(struct task_struct *p, int nice)
1099 1100 1101 1102
{
	return cap_safe_nice(p);
}

1103
/*
D
David Howells 已提交
1104 1105
 * Implement PR_CAPBSET_DROP.  Attempt to remove the specified capability from
 * the current task's bounding set.  Returns 0 on success, -ve on error.
1106
 */
1107
static int cap_prctl_drop(unsigned long cap)
1108
{
1109 1110
	struct cred *new;

1111
	if (!ns_capable(current_user_ns(), CAP_SETPCAP))
1112 1113 1114
		return -EPERM;
	if (!cap_valid(cap))
		return -EINVAL;
D
David Howells 已提交
1115

1116 1117 1118
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
D
David Howells 已提交
1119
	cap_lower(new->cap_bset, cap);
1120
	return commit_creds(new);
1121
}
1122

D
David Howells 已提交
1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134
/**
 * cap_task_prctl - Implement process control functions for this security module
 * @option: The process control function requested
 * @arg2, @arg3, @arg4, @arg5: The argument data for this function
 *
 * Allow process control functions (sys_prctl()) to alter capabilities; may
 * also deny access to other functions not otherwise implemented here.
 *
 * Returns 0 or +ve on success, -ENOSYS if this function is not implemented
 * here, other -ve on error.  If -ENOSYS is returned, sys_prctl() and other LSM
 * modules will consider performing the function.
 */
1135
int cap_task_prctl(int option, unsigned long arg2, unsigned long arg3,
D
David Howells 已提交
1136
		   unsigned long arg4, unsigned long arg5)
1137
{
1138
	const struct cred *old = current_cred();
D
David Howells 已提交
1139 1140
	struct cred *new;

1141 1142 1143
	switch (option) {
	case PR_CAPBSET_READ:
		if (!cap_valid(arg2))
1144 1145
			return -EINVAL;
		return !!cap_raised(old->cap_bset, arg2);
D
David Howells 已提交
1146

1147
	case PR_CAPBSET_DROP:
1148
		return cap_prctl_drop(arg2);
1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169

	/*
	 * The next four prctl's remain to assist with transitioning a
	 * system from legacy UID=0 based privilege (when filesystem
	 * capabilities are not in use) to a system using filesystem
	 * capabilities only - as the POSIX.1e draft intended.
	 *
	 * Note:
	 *
	 *  PR_SET_SECUREBITS =
	 *      issecure_mask(SECURE_KEEP_CAPS_LOCKED)
	 *    | issecure_mask(SECURE_NOROOT)
	 *    | issecure_mask(SECURE_NOROOT_LOCKED)
	 *    | issecure_mask(SECURE_NO_SETUID_FIXUP)
	 *    | issecure_mask(SECURE_NO_SETUID_FIXUP_LOCKED)
	 *
	 * will ensure that the current process and all of its
	 * children will be locked into a pure
	 * capability-based-privilege environment.
	 */
	case PR_SET_SECUREBITS:
1170 1171 1172
		if ((((old->securebits & SECURE_ALL_LOCKS) >> 1)
		     & (old->securebits ^ arg2))			/*[1]*/
		    || ((old->securebits & SECURE_ALL_LOCKS & ~arg2))	/*[2]*/
D
David Howells 已提交
1173
		    || (arg2 & ~(SECURE_ALL_LOCKS | SECURE_ALL_BITS))	/*[3]*/
1174
		    || (cap_capable(current_cred(),
1175
				    current_cred()->user_ns, CAP_SETPCAP,
1176
				    SECURITY_CAP_AUDIT) != 0)		/*[4]*/
1177 1178 1179 1180 1181 1182 1183
			/*
			 * [1] no changing of bits that are locked
			 * [2] no unlocking of locks
			 * [3] no setting of unsupported bits
			 * [4] doing anything requires privilege (go read about
			 *     the "sendmail capabilities bug")
			 */
D
David Howells 已提交
1184 1185
		    )
			/* cannot change a locked bit */
1186 1187 1188 1189 1190
			return -EPERM;

		new = prepare_creds();
		if (!new)
			return -ENOMEM;
D
David Howells 已提交
1191
		new->securebits = arg2;
1192
		return commit_creds(new);
D
David Howells 已提交
1193

1194
	case PR_GET_SECUREBITS:
1195
		return old->securebits;
1196 1197

	case PR_GET_KEEPCAPS:
1198
		return !!issecure(SECURE_KEEP_CAPS);
D
David Howells 已提交
1199

1200 1201
	case PR_SET_KEEPCAPS:
		if (arg2 > 1) /* Note, we rely on arg2 being unsigned here */
1202
			return -EINVAL;
D
David Howells 已提交
1203
		if (issecure(SECURE_KEEP_CAPS_LOCKED))
1204 1205 1206 1207 1208
			return -EPERM;

		new = prepare_creds();
		if (!new)
			return -ENOMEM;
D
David Howells 已提交
1209 1210
		if (arg2)
			new->securebits |= issecure_mask(SECURE_KEEP_CAPS);
1211
		else
D
David Howells 已提交
1212
			new->securebits &= ~issecure_mask(SECURE_KEEP_CAPS);
1213
		return commit_creds(new);
1214

1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238
	case PR_CAP_AMBIENT:
		if (arg2 == PR_CAP_AMBIENT_CLEAR_ALL) {
			if (arg3 | arg4 | arg5)
				return -EINVAL;

			new = prepare_creds();
			if (!new)
				return -ENOMEM;
			cap_clear(new->cap_ambient);
			return commit_creds(new);
		}

		if (((!cap_valid(arg3)) | arg4 | arg5))
			return -EINVAL;

		if (arg2 == PR_CAP_AMBIENT_IS_SET) {
			return !!cap_raised(current_cred()->cap_ambient, arg3);
		} else if (arg2 != PR_CAP_AMBIENT_RAISE &&
			   arg2 != PR_CAP_AMBIENT_LOWER) {
			return -EINVAL;
		} else {
			if (arg2 == PR_CAP_AMBIENT_RAISE &&
			    (!cap_raised(current_cred()->cap_permitted, arg3) ||
			     !cap_raised(current_cred()->cap_inheritable,
1239 1240
					 arg3) ||
			     issecure(SECURE_NO_CAP_AMBIENT_RAISE)))
1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252
				return -EPERM;

			new = prepare_creds();
			if (!new)
				return -ENOMEM;
			if (arg2 == PR_CAP_AMBIENT_RAISE)
				cap_raise(new->cap_ambient, arg3);
			else
				cap_lower(new->cap_ambient, arg3);
			return commit_creds(new);
		}

1253 1254
	default:
		/* No functionality available - continue with default */
1255
		return -ENOSYS;
1256
	}
L
Linus Torvalds 已提交
1257 1258
}

D
David Howells 已提交
1259 1260 1261 1262 1263 1264
/**
 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
 * @mm: The VM space in which the new mapping is to be made
 * @pages: The size of the mapping
 *
 * Determine whether the allocation of a new virtual mapping by the current
C
Casey Schaufler 已提交
1265
 * task is permitted, returning 1 if permission is granted, 0 if not.
D
David Howells 已提交
1266
 */
1267
int cap_vm_enough_memory(struct mm_struct *mm, long pages)
L
Linus Torvalds 已提交
1268 1269 1270
{
	int cap_sys_admin = 0;

1271
	if (cap_capable(current_cred(), &init_user_ns, CAP_SYS_ADMIN,
1272
			SECURITY_CAP_NOAUDIT) == 0)
L
Linus Torvalds 已提交
1273
		cap_sys_admin = 1;
C
Casey Schaufler 已提交
1274
	return cap_sys_admin;
L
Linus Torvalds 已提交
1275
}
1276 1277

/*
1278
 * cap_mmap_addr - check if able to map given addr
1279 1280
 * @addr: address attempting to be mapped
 *
1281
 * If the process is attempting to map memory below dac_mmap_min_addr they need
1282 1283 1284 1285
 * CAP_SYS_RAWIO.  The other parameters to this function are unused by the
 * capability security module.  Returns 0 if this mapping should be allowed
 * -EPERM if not.
 */
1286
int cap_mmap_addr(unsigned long addr)
1287 1288 1289
{
	int ret = 0;

1290
	if (addr < dac_mmap_min_addr) {
1291
		ret = cap_capable(current_cred(), &init_user_ns, CAP_SYS_RAWIO,
1292 1293 1294 1295 1296 1297 1298
				  SECURITY_CAP_AUDIT);
		/* set PF_SUPERPRIV if it turns out we allow the low mmap */
		if (ret == 0)
			current->flags |= PF_SUPERPRIV;
	}
	return ret;
}
1299

1300 1301
int cap_mmap_file(struct file *file, unsigned long reqprot,
		  unsigned long prot, unsigned long flags)
1302
{
1303
	return 0;
1304
}
C
Casey Schaufler 已提交
1305 1306 1307

#ifdef CONFIG_SECURITY

1308
struct security_hook_list capability_hooks[] __lsm_ro_after_init = {
C
Casey Schaufler 已提交
1309 1310 1311 1312 1313 1314 1315 1316 1317 1318
	LSM_HOOK_INIT(capable, cap_capable),
	LSM_HOOK_INIT(settime, cap_settime),
	LSM_HOOK_INIT(ptrace_access_check, cap_ptrace_access_check),
	LSM_HOOK_INIT(ptrace_traceme, cap_ptrace_traceme),
	LSM_HOOK_INIT(capget, cap_capget),
	LSM_HOOK_INIT(capset, cap_capset),
	LSM_HOOK_INIT(bprm_set_creds, cap_bprm_set_creds),
	LSM_HOOK_INIT(bprm_secureexec, cap_bprm_secureexec),
	LSM_HOOK_INIT(inode_need_killpriv, cap_inode_need_killpriv),
	LSM_HOOK_INIT(inode_killpriv, cap_inode_killpriv),
1319
	LSM_HOOK_INIT(inode_getsecurity, cap_inode_getsecurity),
C
Casey Schaufler 已提交
1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331
	LSM_HOOK_INIT(mmap_addr, cap_mmap_addr),
	LSM_HOOK_INIT(mmap_file, cap_mmap_file),
	LSM_HOOK_INIT(task_fix_setuid, cap_task_fix_setuid),
	LSM_HOOK_INIT(task_prctl, cap_task_prctl),
	LSM_HOOK_INIT(task_setscheduler, cap_task_setscheduler),
	LSM_HOOK_INIT(task_setioprio, cap_task_setioprio),
	LSM_HOOK_INIT(task_setnice, cap_task_setnice),
	LSM_HOOK_INIT(vm_enough_memory, cap_vm_enough_memory),
};

void __init capability_add_hooks(void)
{
1332 1333
	security_add_hooks(capability_hooks, ARRAY_SIZE(capability_hooks),
				"capability");
C
Casey Schaufler 已提交
1334 1335 1336
}

#endif /* CONFIG_SECURITY */