lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Sep 2009 11:45:03 +0200 From: Jiri Slaby <jirislaby@...il.com> To: oleg@...hat.com Cc: akpm@...ux-foundation.org, mingo@...hat.com, linux-kernel@...r.kernel.org, Jiri Slaby <jirislaby@...il.com> Subject: [PATCH 2/2] core: allow setrlimit to non-current tasks Add locking to allow setrlimit accept task parameter other than current. Namely, lock tasklist_lock for read and check whether the task structure has signal and sighand non-null. Do all the signal processing under that lock still held. Signed-off-by: Jiri Slaby <jirislaby@...il.com> Cc: Oleg Nesterov <oleg@...hat.com> --- kernel/sys.c | 25 ++++++++++++++++++------- 1 files changed, 18 insertions(+), 7 deletions(-) diff --git a/kernel/sys.c b/kernel/sys.c index 919cebe..4a55bef 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -1240,20 +1240,28 @@ int setrlimit(struct task_struct *tsk, unsigned int resource, struct rlimit *new_rlim) { struct rlimit *old_rlim; + unsigned long flags; int retval; if (new_rlim->rlim_cur > new_rlim->rlim_max) return -EINVAL; + + if (lock_task_sighand(tsk, &flags) == NULL) + return -ESRCH; old_rlim = tsk->signal->rlim + resource; if ((new_rlim->rlim_max > old_rlim->rlim_max) && - !capable(CAP_SYS_RESOURCE)) - return -EPERM; - if (resource == RLIMIT_NOFILE && new_rlim->rlim_max > sysctl_nr_open) - return -EPERM; + !capable(CAP_SYS_RESOURCE)) { + retval = -EPERM; + goto unlock; + } + if (resource == RLIMIT_NOFILE && new_rlim->rlim_max > sysctl_nr_open) { + retval = -EPERM; + goto unlock; + } retval = security_task_setrlimit(tsk, resource, new_rlim); if (retval) - return retval; + goto unlock; if (resource == RLIMIT_CPU && new_rlim->rlim_cur == 0) { /* @@ -1281,9 +1289,12 @@ int setrlimit(struct task_struct *tsk, unsigned int resource, if (new_rlim->rlim_cur == RLIM_INFINITY) goto out; - update_rlimit_cpu(tsk, new_rlim->rlim_cur); + __update_rlimit_cpu(tsk, new_rlim->rlim_cur); out: - return 0; + retval = 0; +unlock: + unlock_task_sighand(tsk, &flags); + return retval; } SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim) -- 1.6.3.3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists