|
Message-ID: <20160729181526.GE11621@pc.thejh.net>
Date: Fri, 29 Jul 2016 20:15:26 +0200
From: Jann Horn <jann@...jh.net>
To: kernel-hardening@...ts.openwall.com
Cc: linux-security-module@...r.kernel.org, keescook@...omium.org,
spender@...ecurity.net, jmorris@...ei.org,
casey.schaufler@...el.com, michael.leibowitz@...el.com,
william.c.roberts@...el.com,
Elena Reshetova <elena.reshetova@...el.com>
Subject: Re: [RFC] [PATCH 3/5] sb_unsharefs LSM hook
On Fri, Jul 29, 2016 at 10:34:38AM +0300, Elena Reshetova wrote:
> This adds a new security_sb_unsharefs() LSM hook.
> It can be used by LSMs concerned about unsharefs()
> system call.
>
> Signed-off-by: Elena Reshetova <elena.reshetova@...el.com>
> ---
[...]
> @@ -132,11 +133,15 @@ int unshare_fs_struct(void)
> {
> struct fs_struct *fs = current->fs;
> struct fs_struct *new_fs = copy_fs_struct(fs);
> - int kill;
> + int kill, retval;
>
> if (!new_fs)
> return -ENOMEM;
>
> + retval = security_sb_unsharefs(&new_fs->root);
> + if (retval)
> + return retval;
Oh, and this is a memory leak. If copy_fs_struct() succeeds but
security_sb_unsharefs() fails, new_fs isn't deallocated.
Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.