Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
ae1251ab
Commit
ae1251ab
authored
Jan 14, 2009
by
Heiko Carstens
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[CVE-2009-0029] System call wrappers part 03
Signed-off-by:
Heiko Carstens
<
heiko.carstens@de.ibm.com
>
parent
dbf040d9
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
9 additions
and
9 deletions
+9
-9
kernel/sys.c
kernel/sys.c
+9
-9
No files found.
kernel/sys.c
View file @
ae1251ab
...
...
@@ -478,7 +478,7 @@ void ctrl_alt_del(void)
* SMP: There are not races, the GIDs are checked only by filesystem
* operations (as far as semantic preservation is concerned).
*/
asmlinkage
long
sys_setregid
(
gid_t
rgid
,
gid_t
egid
)
SYSCALL_DEFINE2
(
setregid
,
gid_t
,
rgid
,
gid_t
,
egid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -529,7 +529,7 @@ asmlinkage long sys_setregid(gid_t rgid, gid_t egid)
*
* SMP: Same implicit races as above.
*/
asmlinkage
long
sys_setgid
(
gid_t
gid
)
SYSCALL_DEFINE1
(
setgid
,
gid_t
,
gid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -597,7 +597,7 @@ static int set_user(struct cred *new)
* 100% compatible with BSD. A program which uses just setuid() will be
* 100% compatible with POSIX with saved IDs.
*/
asmlinkage
long
sys_setreuid
(
uid_t
ruid
,
uid_t
euid
)
SYSCALL_DEFINE2
(
setreuid
,
uid_t
,
ruid
,
uid_t
,
euid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -661,7 +661,7 @@ asmlinkage long sys_setreuid(uid_t ruid, uid_t euid)
* will allow a root program to temporarily drop privileges and be able to
* regain them by swapping the real and effective uid.
*/
asmlinkage
long
sys_setuid
(
uid_t
uid
)
SYSCALL_DEFINE1
(
setuid
,
uid_t
,
uid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -705,7 +705,7 @@ asmlinkage long sys_setuid(uid_t uid)
* This function implements a generic ability to update ruid, euid,
* and suid. This allows you to implement the 4.4 compatible seteuid().
*/
asmlinkage
long
sys_setresuid
(
uid_t
ruid
,
uid_t
euid
,
uid_t
suid
)
SYSCALL_DEFINE3
(
setresuid
,
uid_t
,
ruid
,
uid_t
,
euid
,
uid_t
,
suid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -771,7 +771,7 @@ SYSCALL_DEFINE3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __u
/*
* Same as above, but for rgid, egid, sgid.
*/
asmlinkage
long
sys_setresgid
(
gid_t
rgid
,
gid_t
egid
,
gid_t
sgid
)
SYSCALL_DEFINE3
(
setresgid
,
gid_t
,
rgid
,
gid_t
,
egid
,
gid_t
,
sgid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -833,7 +833,7 @@ SYSCALL_DEFINE3(getresgid, gid_t __user *, rgid, gid_t __user *, egid, gid_t __u
* whatever uid it wants to). It normally shadows "euid", except when
* explicitly set by setfsuid() or for access..
*/
asmlinkage
long
sys_setfsuid
(
uid_t
uid
)
SYSCALL_DEFINE1
(
setfsuid
,
uid_t
,
uid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -870,7 +870,7 @@ asmlinkage long sys_setfsuid(uid_t uid)
/*
* Samma på svenska..
*/
asmlinkage
long
sys_setfsgid
(
gid_t
gid
)
SYSCALL_DEFINE1
(
setfsgid
,
gid_t
,
gid
)
{
const
struct
cred
*
old
;
struct
cred
*
new
;
...
...
@@ -1311,7 +1311,7 @@ int set_current_groups(struct group_info *group_info)
EXPORT_SYMBOL
(
set_current_groups
);
asmlinkage
long
sys_getgroups
(
int
gidsetsize
,
gid_t
__user
*
grouplist
)
SYSCALL_DEFINE2
(
getgroups
,
int
,
gidsetsize
,
gid_t
__user
*
,
grouplist
)
{
const
struct
cred
*
cred
=
current_cred
();
int
i
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment