* + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree
@ 2009-08-20 21:39 akpm
2009-08-21 15:57 ` Serge E. Hallyn
0 siblings, 1 reply; 4+ messages in thread
From: akpm @ 2009-08-20 21:39 UTC (permalink / raw)
To: mm-commits; +Cc: mschmidt, dhowells, jmorris, sds, serue
The patch titled
bsdacct: switch credentials for writing to the accounting file
has been added to the -mm tree. Its filename is
bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
Before you just go and hit "reply", please:
a) Consider who else should be cc'ed
b) Prefer to cc a suitable mailing list as well
c) Ideally: find the original patch on the mailing list and do a
reply-to-all to that, adding suitable additional cc's
*** Remember to use Documentation/SubmitChecklist when testing your code ***
See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find
out what to do about this
The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/
------------------------------------------------------
Subject: bsdacct: switch credentials for writing to the accounting file
From: Michal Schmidt <mschmidt@redhat.com>
When process accounting is enabled, every exiting process writes a log to
the account file. In addition, every once in a while one of the exiting
processes checks whether there's enough free space for the log.
SELinux policy may or may not allow the exiting process to stat the fs.
So unsuspecting processes start generating AVC denials just because
someone enabled process accounting.
For these filesystem operations, the exiting process's credentials should
be temporarily switched to that of the process which enabled accounting,
because it's really that process which wanted to have the accounting
information logged.
Signed-off-by: Michal Schmidt <mschmidt@redhat.com>
Acked-by: David Howells <dhowells@redhat.com>
Cc: James Morris <jmorris@namei.org>
Cc: Serge Hallyn <serue@us.ibm.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
---
kernel/acct.c | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff -puN kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file kernel/acct.c
--- a/kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file
+++ a/kernel/acct.c
@@ -491,13 +491,17 @@ static void do_acct_process(struct bsd_a
u64 run_time;
struct timespec uptime;
struct tty_struct *tty;
+ const struct cred *orig_cred;
+
+ /* Perform file operations on behalf of whoever enabled accounting */
+ orig_cred = override_creds(file->f_cred);
/*
* First check to see if there is enough free_space to continue
* the process accounting system.
*/
if (!check_free_space(acct, file))
- return;
+ goto out;
/*
* Fill the accounting struct with the needed info as recorded
@@ -578,6 +582,8 @@ static void do_acct_process(struct bsd_a
sizeof(acct_t), &file->f_pos);
current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
set_fs(fs);
+out:
+ revert_creds(orig_cred);
}
/**
_
Patches currently in -mm which might be from mschmidt@redhat.com are
bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree
2009-08-20 21:39 + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree akpm
@ 2009-08-21 15:57 ` Serge E. Hallyn
2009-08-24 1:34 ` James Morris
0 siblings, 1 reply; 4+ messages in thread
From: Serge E. Hallyn @ 2009-08-21 15:57 UTC (permalink / raw)
To: linux-kernel; +Cc: mm-commits, mschmidt, dhowells, jmorris, sds
Quoting akpm@linux-foundation.org (akpm@linux-foundation.org):
>
> The patch titled
> bsdacct: switch credentials for writing to the accounting file
> has been added to the -mm tree. Its filename is
> bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
>
> Before you just go and hit "reply", please:
> a) Consider who else should be cc'ed
> b) Prefer to cc a suitable mailing list as well
> c) Ideally: find the original patch on the mailing list and do a
> reply-to-all to that, adding suitable additional cc's
>
> *** Remember to use Documentation/SubmitChecklist when testing your code ***
>
> See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find
> out what to do about this
>
> The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/
>
> ------------------------------------------------------
> Subject: bsdacct: switch credentials for writing to the accounting file
> From: Michal Schmidt <mschmidt@redhat.com>
>
> When process accounting is enabled, every exiting process writes a log to
> the account file. In addition, every once in a while one of the exiting
> processes checks whether there's enough free space for the log.
>
> SELinux policy may or may not allow the exiting process to stat the fs.
> So unsuspecting processes start generating AVC denials just because
> someone enabled process accounting.
>
> For these filesystem operations, the exiting process's credentials should
> be temporarily switched to that of the process which enabled accounting,
> because it's really that process which wanted to have the accounting
> information logged.
>
> Signed-off-by: Michal Schmidt <mschmidt@redhat.com>
> Acked-by: David Howells <dhowells@redhat.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
> Cc: James Morris <jmorris@namei.org>
> Cc: Serge Hallyn <serue@us.ibm.com>
> Cc: Stephen Smalley <sds@tycho.nsa.gov>
> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> ---
>
> kernel/acct.c | 8 +++++++-
> 1 file changed, 7 insertions(+), 1 deletion(-)
>
> diff -puN kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file kernel/acct.c
> --- a/kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file
> +++ a/kernel/acct.c
> @@ -491,13 +491,17 @@ static void do_acct_process(struct bsd_a
> u64 run_time;
> struct timespec uptime;
> struct tty_struct *tty;
> + const struct cred *orig_cred;
> +
> + /* Perform file operations on behalf of whoever enabled accounting */
> + orig_cred = override_creds(file->f_cred);
>
> /*
> * First check to see if there is enough free_space to continue
> * the process accounting system.
> */
> if (!check_free_space(acct, file))
> - return;
> + goto out;
>
> /*
> * Fill the accounting struct with the needed info as recorded
> @@ -578,6 +582,8 @@ static void do_acct_process(struct bsd_a
> sizeof(acct_t), &file->f_pos);
> current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
> set_fs(fs);
> +out:
> + revert_creds(orig_cred);
> }
>
> /**
> _
>
> Patches currently in -mm which might be from mschmidt@redhat.com are
>
> bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
>
> --
> To unsubscribe from this list: send the line "unsubscribe mm-commits" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree
2009-08-21 15:57 ` Serge E. Hallyn
@ 2009-08-24 1:34 ` James Morris
0 siblings, 0 replies; 4+ messages in thread
From: James Morris @ 2009-08-24 1:34 UTC (permalink / raw)
To: Serge E. Hallyn; +Cc: linux-kernel, mm-commits, mschmidt, dhowells, sds
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6#next
On Fri, 21 Aug 2009, Serge E. Hallyn wrote:
> Quoting akpm@linux-foundation.org (akpm@linux-foundation.org):
> >
> > The patch titled
> > bsdacct: switch credentials for writing to the accounting file
> > has been added to the -mm tree. Its filename is
> > bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
> >
> > Before you just go and hit "reply", please:
> > a) Consider who else should be cc'ed
> > b) Prefer to cc a suitable mailing list as well
> > c) Ideally: find the original patch on the mailing list and do a
> > reply-to-all to that, adding suitable additional cc's
> >
> > *** Remember to use Documentation/SubmitChecklist when testing your code ***
> >
> > See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find
> > out what to do about this
> >
> > The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/
> >
> > ------------------------------------------------------
> > Subject: bsdacct: switch credentials for writing to the accounting file
> > From: Michal Schmidt <mschmidt@redhat.com>
> >
> > When process accounting is enabled, every exiting process writes a log to
> > the account file. In addition, every once in a while one of the exiting
> > processes checks whether there's enough free space for the log.
> >
> > SELinux policy may or may not allow the exiting process to stat the fs.
> > So unsuspecting processes start generating AVC denials just because
> > someone enabled process accounting.
> >
> > For these filesystem operations, the exiting process's credentials should
> > be temporarily switched to that of the process which enabled accounting,
> > because it's really that process which wanted to have the accounting
> > information logged.
> >
> > Signed-off-by: Michal Schmidt <mschmidt@redhat.com>
> > Acked-by: David Howells <dhowells@redhat.com>
>
> Acked-by: Serge Hallyn <serue@us.ibm.com>
>
> > Cc: James Morris <jmorris@namei.org>
> > Cc: Serge Hallyn <serue@us.ibm.com>
> > Cc: Stephen Smalley <sds@tycho.nsa.gov>
> > Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> > ---
> >
> > kernel/acct.c | 8 +++++++-
> > 1 file changed, 7 insertions(+), 1 deletion(-)
> >
> > diff -puN kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file kernel/acct.c
> > --- a/kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file
> > +++ a/kernel/acct.c
> > @@ -491,13 +491,17 @@ static void do_acct_process(struct bsd_a
> > u64 run_time;
> > struct timespec uptime;
> > struct tty_struct *tty;
> > + const struct cred *orig_cred;
> > +
> > + /* Perform file operations on behalf of whoever enabled accounting */
> > + orig_cred = override_creds(file->f_cred);
> >
> > /*
> > * First check to see if there is enough free_space to continue
> > * the process accounting system.
> > */
> > if (!check_free_space(acct, file))
> > - return;
> > + goto out;
> >
> > /*
> > * Fill the accounting struct with the needed info as recorded
> > @@ -578,6 +582,8 @@ static void do_acct_process(struct bsd_a
> > sizeof(acct_t), &file->f_pos);
> > current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
> > set_fs(fs);
> > +out:
> > + revert_creds(orig_cred);
> > }
> >
> > /**
> > _
> >
> > Patches currently in -mm which might be from mschmidt@redhat.com are
> >
> > bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
> >
> > --
> > To unsubscribe from this list: send the line "unsubscribe mm-commits" in
> > the body of a message to majordomo@vger.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.tux.org/lkml/
>
--
James Morris
<jmorris@namei.org>
^ permalink raw reply [flat|nested] 4+ messages in thread
* + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree
@ 2009-08-24 21:31 akpm
0 siblings, 0 replies; 4+ messages in thread
From: akpm @ 2009-08-24 21:31 UTC (permalink / raw)
To: mm-commits; +Cc: mschmidt, dhowells, jmorris, sds, serue
The patch titled
bsdacct: switch credentials for writing to the accounting file
has been added to the -mm tree. Its filename is
bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
Before you just go and hit "reply", please:
a) Consider who else should be cc'ed
b) Prefer to cc a suitable mailing list as well
c) Ideally: find the original patch on the mailing list and do a
reply-to-all to that, adding suitable additional cc's
*** Remember to use Documentation/SubmitChecklist when testing your code ***
See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find
out what to do about this
The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/
------------------------------------------------------
Subject: bsdacct: switch credentials for writing to the accounting file
From: Michal Schmidt <mschmidt@redhat.com>
When process accounting is enabled, every exiting process writes a log to
the account file. In addition, every once in a while one of the exiting
processes checks whether there's enough free space for the log.
SELinux policy may or may not allow the exiting process to stat the fs.
So unsuspecting processes start generating AVC denials just because
someone enabled process accounting.
For these filesystem operations, the exiting process's credentials should
be temporarily switched to that of the process which enabled accounting,
because it's really that process which wanted to have the accounting
information logged.
Signed-off-by: Michal Schmidt <mschmidt@redhat.com>
Acked-by: David Howells <dhowells@redhat.com>
Cc: James Morris <jmorris@namei.org>
Cc: Serge Hallyn <serue@us.ibm.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
---
kernel/acct.c | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff -puN kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file kernel/acct.c
--- a/kernel/acct.c~bsdacct-switch-credentials-for-writing-to-the-accounting-file
+++ a/kernel/acct.c
@@ -491,13 +491,17 @@ static void do_acct_process(struct bsd_a
u64 run_time;
struct timespec uptime;
struct tty_struct *tty;
+ const struct cred *orig_cred;
+
+ /* Perform file operations on behalf of whoever enabled accounting */
+ orig_cred = override_creds(file->f_cred);
/*
* First check to see if there is enough free_space to continue
* the process accounting system.
*/
if (!check_free_space(acct, file))
- return;
+ goto out;
/*
* Fill the accounting struct with the needed info as recorded
@@ -578,6 +582,8 @@ static void do_acct_process(struct bsd_a
sizeof(acct_t), &file->f_pos);
current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
set_fs(fs);
+out:
+ revert_creds(orig_cred);
}
/**
_
Patches currently in -mm which might be from mschmidt@redhat.com are
bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2009-08-24 21:32 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-08-20 21:39 + bsdacct-switch-credentials-for-writing-to-the-accounting-file.patch added to -mm tree akpm
2009-08-21 15:57 ` Serge E. Hallyn
2009-08-24 1:34 ` James Morris
2009-08-24 21:31 akpm
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.