diff options
| author | Serge E. Hallyn <[email protected]> | 2007-11-28 16:21:47 -0800 |
|---|---|---|
| committer | Linus Torvalds <[email protected]> | 2007-11-29 09:24:53 -0800 |
| commit | 8ec2328f1138a58eaea55ec6150985a1623b01c5 (patch) | |
| tree | ebaecf41dd8c8789f0c49ee9c0f30c0ce40e3e39 /include/linux/debugobjects.h | |
| parent | d0eec99ce50baa5cc2ac02363cdb2a771ed4e1e2 (diff) | |
file capabilities: don't prevent signaling setuid root programs
An unprivileged process must be able to kill a setuid root program started
by the same user. This is legacy behavior needed for instance for xinit to
kill X when the window manager exits.
When an unprivileged user runs a setuid root program in !SECURE_NOROOT
mode, fP, fI, and fE are set full on, so pP' and pE' are full on. Then
cap_task_kill() prevents the user from signaling the setuid root task.
This is a change in behavior compared to when
!CONFIG_SECURITY_FILE_CAPABILITIES.
This patch introduces a special check into cap_task_kill() just to check
whether a non-root user is signaling a setuid root program started by the
same user. If so, then signal is allowed.
Signed-off-by: Serge E. Hallyn <[email protected]>
Cc: Andrew Morgan <[email protected]>
Cc: Stephen Smalley <[email protected]>
Cc: Chris Wright <[email protected]>
Cc: James Morris <[email protected]>
Cc: Casey Schaufler <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Diffstat (limited to 'include/linux/debugobjects.h')
0 files changed, 0 insertions, 0 deletions