On Mon, 16 Jul 2007, Al Viro wrote:
> On Tue, Jul 17, 2007 at 01:00:42AM +0530, Satyam Sharma wrote:
> > > if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER))
> > >
> > > test is a rather common test, and in fact, arguably, every time you see
> > > one part of it, you should probably see the other. Would it make sense to
> > > make a helper inline function to do this, and replace all users? Doing a
> > >
> > > git grep 'fsuid.*\<i_uid\>'
> > >
> > > seems to show quite a few cases of this pattern..
> >
> > Yes, I thought of writing a helper function for this myself. The semantics
> > of CAP_FOWNER sort of justify that, but probably better to get Al's views
> > on this first.
>
> Helper makes sense (and most of these places will become its call), but...
> E.g. IIRC the change of UID requires CAP_CHOWN; CAP_FOWNER is not enough.
> Ditto for change of GID. setlease() is using CAP_LEASE and that appears
> to be intentional (no idea what relevant standards say here)...
>
> I'd suggest converting the obvious cases with new helper and taking the
> rest one-by-one after that. Some of those might want CAP_FOWNER added,
> some not...
There aren't too many negative results, here's a little audit:
fs/attr.c:32:
fs/attr.c:38:
-> Both are from inode_change_ok(). [ for chown(2) and chgrp(2) ]
-> CAP_FOWNER is not checked for either case, I think it should be.
-> CAP_CHOWN is anyway checked for explicitly later in that condition.
fs/namei.c:186: if (current->fsuid == inode->i_uid)
-> generic_permission().
-> I wonder if CAP_FOWNER processes should ever even be calling into
this function in the first place (?)
-> So best to keep CAP_FOWNER out of this condition (?)
fs/namei.c:438: if (current->fsuid == inode->i_uid)
-> exec_permission_lite().
-> This is a clone function of the previous one, so again CAP_FOWNER
out of this (?)
fs/reiserfs/ioctl.c:54:
fs/xattr.c:63:
-> False positives, CAP_FOWNER checked on line below.
-> Helper would help for both cases.
Anwyay, so I'm thinking of adding:
struct inode;
int is_not_owner(struct inode *)
{
return ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER));
}
to linux/capability.h inside the __KERNEL__ #ifdef, asm/current.h is
included in there already.
And then do the necessary conversions. Sounds OK?
Satyam
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]