summaryrefslogtreecommitdiffstats
path: root/meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch')
-rw-r--r--meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch39
1 files changed, 0 insertions, 39 deletions
diff --git a/meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch b/meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch
deleted file mode 100644
index c9180bb..0000000
--- a/meta-sota-raspberrypi/recipes-kernel/linux/linux-raspberrypi/0003-Smack-ignore-null-signal-in-smack_task_kill.patch
+++ /dev/null
@@ -1,39 +0,0 @@
1From ec4eb03af07b0fbc330aecca6ac4ebd6accd8825 Mon Sep 17 00:00:00 2001
2From: Rafal Krypa <r.krypa@samsung.com>
3Date: Mon, 4 Apr 2016 11:14:53 +0200
4Subject: [PATCH 3/4] Smack: ignore null signal in smack_task_kill
5
6Kill with signal number 0 is commonly used for checking PID existence.
7Smack treated such cases like any other kills, although no signal is
8actually delivered when sig == 0.
9
10Checking permissions when sig == 0 didn't prevent an unprivileged caller
11from learning whether PID exists or not. When it existed, kernel returned
12EPERM, when it didn't - ESRCH. The only effect of policy check in such
13case is noise in audit logs.
14
15This change lets Smack silently ignore kill() invocations with sig == 0.
16
17Signed-off-by: Rafal Krypa <r.krypa@samsung.com>
18Acked-by: Casey Schaufler <casey@schaufler-ca.com>
19---
20 security/smack/smack_lsm.c | 3 +++
21 1 file changed, 3 insertions(+)
22
23diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
24index b2bcb14..cf8a93f 100644
25--- a/security/smack/smack_lsm.c
26+++ b/security/smack/smack_lsm.c
27@@ -2239,6 +2239,9 @@ static int smack_task_kill(struct task_struct *p, struct siginfo *info,
28 struct smack_known *tkp = smk_of_task_struct(p);
29 int rc;
30
31+ if (!sig)
32+ return 0; /* null signal; existence test */
33+
34 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_TASK);
35 smk_ad_setfield_u_tsk(&ad, p);
36 /*
37--
382.7.4
39