diff options
| author | Jeff Garzik <jeff@garzik.org> | 2006-05-15 11:26:03 -0400 |
|---|---|---|
| committer | Jeff Garzik <jeff@garzik.org> | 2006-05-15 11:26:03 -0400 |
| commit | 5006ecc2d5073d4e52f54381fd0fee1575d4ce22 (patch) | |
| tree | bedfff6f96118771b809de30e559cc370f94c7be /ipc | |
| parent | acc696d93dcf993dec123d69d599979e1456ffec (diff) | |
| parent | 9be2f7c38e0bd64e8a0f74ea68df1e73e2ddfcc3 (diff) | |
Merge branch 'master' into upstream
Diffstat (limited to 'ipc')
| -rw-r--r-- | ipc/msg.c | 11 | ||||
| -rw-r--r-- | ipc/sem.c | 11 | ||||
| -rw-r--r-- | ipc/shm.c | 19 | ||||
| -rw-r--r-- | ipc/util.c | 7 |
4 files changed, 42 insertions, 6 deletions
| @@ -13,6 +13,9 @@ | |||
| 13 | * mostly rewritten, threaded and wake-one semantics added | 13 | * mostly rewritten, threaded and wake-one semantics added |
| 14 | * MSGMAX limit removed, sysctl's added | 14 | * MSGMAX limit removed, sysctl's added |
| 15 | * (c) 1999 Manfred Spraul <manfred@colorfullife.com> | 15 | * (c) 1999 Manfred Spraul <manfred@colorfullife.com> |
| 16 | * | ||
| 17 | * support for audit of ipc object properties and permission changes | ||
| 18 | * Dustin Kirkland <dustin.kirkland@us.ibm.com> | ||
| 16 | */ | 19 | */ |
| 17 | 20 | ||
| 18 | #include <linux/capability.h> | 21 | #include <linux/capability.h> |
| @@ -447,6 +450,11 @@ asmlinkage long sys_msgctl (int msqid, int cmd, struct msqid_ds __user *buf) | |||
| 447 | if (msg_checkid(msq,msqid)) | 450 | if (msg_checkid(msq,msqid)) |
| 448 | goto out_unlock_up; | 451 | goto out_unlock_up; |
| 449 | ipcp = &msq->q_perm; | 452 | ipcp = &msq->q_perm; |
| 453 | |||
| 454 | err = audit_ipc_obj(ipcp); | ||
| 455 | if (err) | ||
| 456 | goto out_unlock_up; | ||
| 457 | |||
| 450 | err = -EPERM; | 458 | err = -EPERM; |
| 451 | if (current->euid != ipcp->cuid && | 459 | if (current->euid != ipcp->cuid && |
| 452 | current->euid != ipcp->uid && !capable(CAP_SYS_ADMIN)) | 460 | current->euid != ipcp->uid && !capable(CAP_SYS_ADMIN)) |
| @@ -460,7 +468,8 @@ asmlinkage long sys_msgctl (int msqid, int cmd, struct msqid_ds __user *buf) | |||
| 460 | switch (cmd) { | 468 | switch (cmd) { |
| 461 | case IPC_SET: | 469 | case IPC_SET: |
| 462 | { | 470 | { |
| 463 | if ((err = audit_ipc_perms(setbuf.qbytes, setbuf.uid, setbuf.gid, setbuf.mode, ipcp))) | 471 | err = audit_ipc_set_perm(setbuf.qbytes, setbuf.uid, setbuf.gid, setbuf.mode, ipcp); |
| 472 | if (err) | ||
| 464 | goto out_unlock_up; | 473 | goto out_unlock_up; |
| 465 | 474 | ||
| 466 | err = -EPERM; | 475 | err = -EPERM; |
| @@ -61,6 +61,9 @@ | |||
| 61 | * (c) 2001 Red Hat Inc <alan@redhat.com> | 61 | * (c) 2001 Red Hat Inc <alan@redhat.com> |
| 62 | * Lockless wakeup | 62 | * Lockless wakeup |
| 63 | * (c) 2003 Manfred Spraul <manfred@colorfullife.com> | 63 | * (c) 2003 Manfred Spraul <manfred@colorfullife.com> |
| 64 | * | ||
| 65 | * support for audit of ipc object properties and permission changes | ||
| 66 | * Dustin Kirkland <dustin.kirkland@us.ibm.com> | ||
| 64 | */ | 67 | */ |
| 65 | 68 | ||
| 66 | #include <linux/config.h> | 69 | #include <linux/config.h> |
| @@ -820,6 +823,11 @@ static int semctl_down(int semid, int semnum, int cmd, int version, union semun | |||
| 820 | goto out_unlock; | 823 | goto out_unlock; |
| 821 | } | 824 | } |
| 822 | ipcp = &sma->sem_perm; | 825 | ipcp = &sma->sem_perm; |
| 826 | |||
| 827 | err = audit_ipc_obj(ipcp); | ||
| 828 | if (err) | ||
| 829 | goto out_unlock; | ||
| 830 | |||
| 823 | if (current->euid != ipcp->cuid && | 831 | if (current->euid != ipcp->cuid && |
| 824 | current->euid != ipcp->uid && !capable(CAP_SYS_ADMIN)) { | 832 | current->euid != ipcp->uid && !capable(CAP_SYS_ADMIN)) { |
| 825 | err=-EPERM; | 833 | err=-EPERM; |
| @@ -836,7 +844,8 @@ static int semctl_down(int semid, int semnum, int cmd, int version, union semun | |||
| 836 | err = 0; | 844 | err = 0; |
| 837 | break; | 845 | break; |
| 838 | case IPC_SET: | 846 | case IPC_SET: |
| 839 | if ((err = audit_ipc_perms(0, setbuf.uid, setbuf.gid, setbuf.mode, ipcp))) | 847 | err = audit_ipc_set_perm(0, setbuf.uid, setbuf.gid, setbuf.mode, ipcp); |
| 848 | if (err) | ||
| 840 | goto out_unlock; | 849 | goto out_unlock; |
| 841 | ipcp->uid = setbuf.uid; | 850 | ipcp->uid = setbuf.uid; |
| 842 | ipcp->gid = setbuf.gid; | 851 | ipcp->gid = setbuf.gid; |
| @@ -13,6 +13,8 @@ | |||
| 13 | * Shared /dev/zero support, Kanoj Sarcar <kanoj@sgi.com> | 13 | * Shared /dev/zero support, Kanoj Sarcar <kanoj@sgi.com> |
| 14 | * Move the mm functionality over to mm/shmem.c, Christoph Rohland <cr@sap.com> | 14 | * Move the mm functionality over to mm/shmem.c, Christoph Rohland <cr@sap.com> |
| 15 | * | 15 | * |
| 16 | * support for audit of ipc object properties and permission changes | ||
| 17 | * Dustin Kirkland <dustin.kirkland@us.ibm.com> | ||
| 16 | */ | 18 | */ |
| 17 | 19 | ||
| 18 | #include <linux/config.h> | 20 | #include <linux/config.h> |
| @@ -542,6 +544,10 @@ asmlinkage long sys_shmctl (int shmid, int cmd, struct shmid_ds __user *buf) | |||
| 542 | if(err) | 544 | if(err) |
| 543 | goto out_unlock; | 545 | goto out_unlock; |
| 544 | 546 | ||
| 547 | err = audit_ipc_obj(&(shp->shm_perm)); | ||
| 548 | if (err) | ||
| 549 | goto out_unlock; | ||
| 550 | |||
| 545 | if (!capable(CAP_IPC_LOCK)) { | 551 | if (!capable(CAP_IPC_LOCK)) { |
| 546 | err = -EPERM; | 552 | err = -EPERM; |
| 547 | if (current->euid != shp->shm_perm.uid && | 553 | if (current->euid != shp->shm_perm.uid && |
| @@ -594,6 +600,10 @@ asmlinkage long sys_shmctl (int shmid, int cmd, struct shmid_ds __user *buf) | |||
| 594 | if(err) | 600 | if(err) |
| 595 | goto out_unlock_up; | 601 | goto out_unlock_up; |
| 596 | 602 | ||
| 603 | err = audit_ipc_obj(&(shp->shm_perm)); | ||
| 604 | if (err) | ||
| 605 | goto out_unlock_up; | ||
| 606 | |||
| 597 | if (current->euid != shp->shm_perm.uid && | 607 | if (current->euid != shp->shm_perm.uid && |
| 598 | current->euid != shp->shm_perm.cuid && | 608 | current->euid != shp->shm_perm.cuid && |
| 599 | !capable(CAP_SYS_ADMIN)) { | 609 | !capable(CAP_SYS_ADMIN)) { |
| @@ -627,12 +637,15 @@ asmlinkage long sys_shmctl (int shmid, int cmd, struct shmid_ds __user *buf) | |||
| 627 | err=-EINVAL; | 637 | err=-EINVAL; |
| 628 | if(shp==NULL) | 638 | if(shp==NULL) |
| 629 | goto out_up; | 639 | goto out_up; |
| 630 | if ((err = audit_ipc_perms(0, setbuf.uid, setbuf.gid, | ||
| 631 | setbuf.mode, &(shp->shm_perm)))) | ||
| 632 | goto out_unlock_up; | ||
| 633 | err = shm_checkid(shp,shmid); | 640 | err = shm_checkid(shp,shmid); |
| 634 | if(err) | 641 | if(err) |
| 635 | goto out_unlock_up; | 642 | goto out_unlock_up; |
| 643 | err = audit_ipc_obj(&(shp->shm_perm)); | ||
| 644 | if (err) | ||
| 645 | goto out_unlock_up; | ||
| 646 | err = audit_ipc_set_perm(0, setbuf.uid, setbuf.gid, setbuf.mode, &(shp->shm_perm)); | ||
| 647 | if (err) | ||
| 648 | goto out_unlock_up; | ||
| 636 | err=-EPERM; | 649 | err=-EPERM; |
| 637 | if (current->euid != shp->shm_perm.uid && | 650 | if (current->euid != shp->shm_perm.uid && |
| 638 | current->euid != shp->shm_perm.cuid && | 651 | current->euid != shp->shm_perm.cuid && |
diff --git a/ipc/util.c b/ipc/util.c index b3dcfad3b4f7..8193299f45f6 100644 --- a/ipc/util.c +++ b/ipc/util.c | |||
| @@ -10,6 +10,8 @@ | |||
| 10 | * Manfred Spraul <manfred@colorfullife.com> | 10 | * Manfred Spraul <manfred@colorfullife.com> |
| 11 | * Oct 2002 - One lock per IPC id. RCU ipc_free for lock-free grow_ary(). | 11 | * Oct 2002 - One lock per IPC id. RCU ipc_free for lock-free grow_ary(). |
| 12 | * Mingming Cao <cmm@us.ibm.com> | 12 | * Mingming Cao <cmm@us.ibm.com> |
| 13 | * Mar 2006 - support for audit of ipc object properties | ||
| 14 | * Dustin Kirkland <dustin.kirkland@us.ibm.com> | ||
| 13 | */ | 15 | */ |
| 14 | 16 | ||
| 15 | #include <linux/config.h> | 17 | #include <linux/config.h> |
| @@ -27,6 +29,7 @@ | |||
| 27 | #include <linux/workqueue.h> | 29 | #include <linux/workqueue.h> |
| 28 | #include <linux/seq_file.h> | 30 | #include <linux/seq_file.h> |
| 29 | #include <linux/proc_fs.h> | 31 | #include <linux/proc_fs.h> |
| 32 | #include <linux/audit.h> | ||
| 30 | 33 | ||
| 31 | #include <asm/unistd.h> | 34 | #include <asm/unistd.h> |
| 32 | 35 | ||
| @@ -464,8 +467,10 @@ void ipc_rcu_putref(void *ptr) | |||
| 464 | 467 | ||
| 465 | int ipcperms (struct kern_ipc_perm *ipcp, short flag) | 468 | int ipcperms (struct kern_ipc_perm *ipcp, short flag) |
| 466 | { /* flag will most probably be 0 or S_...UGO from <linux/stat.h> */ | 469 | { /* flag will most probably be 0 or S_...UGO from <linux/stat.h> */ |
| 467 | int requested_mode, granted_mode; | 470 | int requested_mode, granted_mode, err; |
| 468 | 471 | ||
| 472 | if (unlikely((err = audit_ipc_obj(ipcp)))) | ||
| 473 | return err; | ||
| 469 | requested_mode = (flag >> 6) | (flag >> 3) | flag; | 474 | requested_mode = (flag >> 6) | (flag >> 3) | flag; |
| 470 | granted_mode = ipcp->mode; | 475 | granted_mode = ipcp->mode; |
| 471 | if (current->euid == ipcp->cuid || current->euid == ipcp->uid) | 476 | if (current->euid == ipcp->cuid || current->euid == ipcp->uid) |
