Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
L
linux-davinci
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Redmine
Redmine
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Metrics
Environments
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
linux
linux-davinci
Commits
ae1251ab
Commit
ae1251ab
authored
Jan 14, 2009
by
Heiko Carstens
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[
CVE-2009
-0029] System call wrappers part 03
Signed-off-by:
Heiko Carstens
<
heiko.carstens@de.ibm.com
>
parent
dbf040d9
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
9 additions
and
9 deletions
+9
-9
kernel/sys.c
kernel/sys.c
+9
-9
No files found.
kernel/sys.c
View file @
ae1251ab
...
...
@@ -478,7 +478,7 @@ void ctrl_alt_del(void)
* SMP: There are not races, the GIDs are checked only by filesystem
* operations (as far as semantic preservation is concerned).
*/
asmlinkage
long
sys_setregid
(
gid_t
rgid
,
gid_t
egid
)
SYSCALL_DEFINE2
(
setregid
,
gid_t
,
rgid
,
gid_t
,
egid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -529,7 +529,7 @@ error:
*
* SMP: Same implicit races as above.
*/
asmlinkage
long
sys_setgid
(
gid_t
gid
)
SYSCALL_DEFINE1
(
setgid
,
gid_t
,
gid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -597,7 +597,7 @@ static int set_user(struct cred *new)
* 100% compatible with BSD. A program which uses just setuid() will be
* 100% compatible with POSIX with saved IDs.
*/
asmlinkage
long
sys_setreuid
(
uid_t
ruid
,
uid_t
euid
)
SYSCALL_DEFINE2
(
setreuid
,
uid_t
,
ruid
,
uid_t
,
euid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -661,7 +661,7 @@ error:
* will allow a root program to temporarily drop privileges and be able to
* regain them by swapping the real and effective uid.
*/
asmlinkage
long
sys_setuid
(
uid_t
uid
)
SYSCALL_DEFINE1
(
setuid
,
uid_t
,
uid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -705,7 +705,7 @@ error:
* This function implements a generic ability to update ruid, euid,
* and suid. This allows you to implement the 4.4 compatible seteuid().
*/
asmlinkage
long
sys_setresuid
(
uid_t
ruid
,
uid_t
euid
,
uid_t
suid
)
SYSCALL_DEFINE3
(
setresuid
,
uid_t
,
ruid
,
uid_t
,
euid
,
uid_t
,
suid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -771,7 +771,7 @@ SYSCALL_DEFINE3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __u
/*
* Same as above, but for rgid, egid, sgid.
*/
asmlinkage
long
sys_setresgid
(
gid_t
rgid
,
gid_t
egid
,
gid_t
sgid
)
SYSCALL_DEFINE3
(
setresgid
,
gid_t
,
rgid
,
gid_t
,
egid
,
gid_t
,
sgid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -833,7 +833,7 @@ SYSCALL_DEFINE3(getresgid, gid_t __user *, rgid, gid_t __user *, egid, gid_t __u
* whatever uid it wants to). It normally shadows "euid", except when
* explicitly set by setfsuid() or for access..
*/
asmlinkage
long
sys_setfsuid
(
uid_t
uid
)
SYSCALL_DEFINE1
(
setfsuid
,
uid_t
,
uid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -870,7 +870,7 @@ change_okay:
/*
* Samma på svenska..
*/
asmlinkage
long
sys_setfsgid
(
gid_t
gid
)
SYSCALL_DEFINE1
(
setfsgid
,
gid_t
,
gid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -1311,7 +1311,7 @@ int set_current_groups(struct group_info *group_info)
EXPORT_SYMBOL
(
set_current_groups
);
asmlinkage
long
sys_getgroups
(
int
gidsetsize
,
gid_t
__user
*
grouplist
)
SYSCALL_DEFINE2
(
getgroups
,
int
,
gidsetsize
,
gid_t
__user
*
,
grouplist
)
{
const
struct
cred
*
cred
=
current_cred
();
int
i
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment