Re: [PATCH][LSM] Early init for security modules and various cleanups

From: Chris Wright (chrisat_private)
Date: Mon Jun 02 2003 - 03:01:45 PDT

  • Next message: Chris Wright: "Re: [PATCH][LSM] Early init for security modules and various cleanups"

    # This is a BitKeeper generated patch for the following project:
    # Project Name: Linux kernel tree
    # This patch format is intended for GNU patch command version 2.5 or higher.
    # This patch includes the following deltas:
    #	           ChangeSet	1.1262  -> 1.1263 
    #	        kernel/sys.c	1.45    -> 1.46   
    #
    # The following is the BitKeeper ChangeSet Log
    # --------------------------------------------
    # 03/06/02	jakubat_private	1.1263
    # [LSM] make sure setfsuid/setfsgid return values are right. Before
    # include/linux/security.h was added, setfsuid/setfsgid always returned
    # old_fsuid, no matter if the fsuid was actually changed or not.  With
    # the default security ops it seems to do the same, because both
    # security_task_setuid and security_task_post_setuid return 0, but
    # these are hooks which seem to return 0 on success, -errno on failure,
    # so if some non-default security hook is installed and ever returns
    # -errno in setfsuid/setfsgid, -errno will be returned from the syscall
    # instead of the expected old_fsuid. This makes it hard to distinguish
    # uids 0xfffff001 .. 0xffffffff from errors of security hooks.
    # --------------------------------------------
    #
    diff -Nru a/kernel/sys.c b/kernel/sys.c
    --- a/kernel/sys.c	Mon Jun  2 01:31:40 2003
    +++ b/kernel/sys.c	Mon Jun  2 01:31:40 2003
    @@ -829,13 +829,11 @@
     asmlinkage long sys_setfsuid(uid_t uid)
     {
     	int old_fsuid;
    -	int retval;
    -
    -	retval = security_task_setuid(uid, (uid_t)-1, (uid_t)-1, LSM_SETID_FS);
    -	if (retval)
    -		return retval;
     
     	old_fsuid = current->fsuid;
    +	if (security_task_setuid(uid, (uid_t)-1, (uid_t)-1, LSM_SETID_FS))
    +		return old_fsuid;
    +
     	if (uid == current->uid || uid == current->euid ||
     	    uid == current->suid || uid == current->fsuid || 
     	    capable(CAP_SETUID))
    @@ -848,9 +846,7 @@
     		current->fsuid = uid;
     	}
     
    -	retval = security_task_post_setuid(old_fsuid, (uid_t)-1, (uid_t)-1, LSM_SETID_FS);
    -	if (retval)
    -		return retval;
    +	security_task_post_setuid(old_fsuid, (uid_t)-1, (uid_t)-1, LSM_SETID_FS);
     
     	return old_fsuid;
     }
    @@ -861,13 +857,11 @@
     asmlinkage long sys_setfsgid(gid_t gid)
     {
     	int old_fsgid;
    -	int retval;
    -
    -	retval = security_task_setgid(gid, (gid_t)-1, (gid_t)-1, LSM_SETID_FS);
    -	if (retval)
    -		return retval;
     
     	old_fsgid = current->fsgid;
    +	if (security_task_setgid(gid, (gid_t)-1, (gid_t)-1, LSM_SETID_FS))
    +		return old_fsgid;
    +
     	if (gid == current->gid || gid == current->egid ||
     	    gid == current->sgid || gid == current->fsgid || 
     	    capable(CAP_SETGID))
    _______________________________________________
    linux-security-module mailing list
    linux-security-moduleat_private
    http://mail.wirex.com/mailman/listinfo/linux-security-module
    



    This archive was generated by hypermail 2b30 : Mon Jun 02 2003 - 03:05:23 PDT