OSDN Git Service

LSM: generalize flag passing to security_capable
authorMicah Morton <mortonm@chromium.org>
Tue, 8 Jan 2019 00:10:53 +0000 (16:10 -0800)
committerJames Morris <james.morris@microsoft.com>
Thu, 10 Jan 2019 22:16:06 +0000 (14:16 -0800)
commitc1a85a00ea66cb6f0bd0f14e47c28c2b0999799f
tree310c082e0b41d2d3ff8b619553ed5e45ad244862
parent2233975cd7927672525361c4c6eebc0b8d018a74
LSM: generalize flag passing to security_capable

This patch provides a general mechanism for passing flags to the
security_capable LSM hook. It replaces the specific 'audit' flag that is
used to tell security_capable whether it should log an audit message for
the given capability check. The reason for generalizing this flag
passing is so we can add an additional flag that signifies whether
security_capable is being called by a setid syscall (which is needed by
the proposed SafeSetID LSM).

Signed-off-by: Micah Morton <mortonm@chromium.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: James Morris <james.morris@microsoft.com>
13 files changed:
include/linux/lsm_hooks.h
include/linux/security.h
kernel/capability.c
kernel/seccomp.c
security/apparmor/capability.c
security/apparmor/include/capability.h
security/apparmor/ipc.c
security/apparmor/lsm.c
security/apparmor/resource.c
security/commoncap.c
security/security.c
security/selinux/hooks.c
security/smack/smack_access.c