25 Jun, 2019

1 commit


22 Jun, 2019

1 commit


19 Jun, 2019

1 commit

  • Based on 2 normalized pattern(s):

    this program is free software you can redistribute it and or modify
    it under the terms of the gnu general public license version 2 as
    published by the free software foundation

    this program is free software you can redistribute it and or modify
    it under the terms of the gnu general public license version 2 as
    published by the free software foundation #

    extracted by the scancode license scanner the SPDX license identifier

    GPL-2.0-only

    has been chosen to replace the boilerplate/reference in 4122 file(s).

    Signed-off-by: Thomas Gleixner
    Reviewed-by: Enrico Weigelt
    Reviewed-by: Kate Stewart
    Reviewed-by: Allison Randal
    Cc: linux-spdx@vger.kernel.org
    Link: https://lkml.kernel.org/r/20190604081206.933168790@linutronix.de
    Signed-off-by: Greg Kroah-Hartman

    Thomas Gleixner
     

17 Jun, 2019

1 commit


01 Jun, 2019

1 commit

  • The XT_OWNER_SUPPL_GROUPS flag causes GIDs specified with XT_OWNER_GID
    to be also checked in the supplementary groups of a process.

    f_cred->group_info cannot be modified during its lifetime and f_cred
    holds a reference to it so it's safe to use.

    Signed-off-by: Lukasz Pawelczyk
    Signed-off-by: Pablo Neira Ayuso

    Lukasz Pawelczyk
     

28 Jun, 2018

1 commit

  • Netfilter assumes that if the socket is present in the skb, then
    it can be used because that reference is cleaned up while the skb
    is crossing netns.

    We want to change that to preserve the socket reference in a future
    patch, so this is a preparation updating netfilter to check if the
    socket netns matches before use it.

    Signed-off-by: Flavio Leitner
    Acked-by: Florian Westphal
    Signed-off-by: David S. Miller

    Flavio Leitner
     

02 Mar, 2017

1 commit


03 Nov, 2016

1 commit


23 Jun, 2016

1 commit

  • Making this work is a little tricky as it really isn't kosher to
    change the xt_owner_match_info in a check function.

    Without changing xt_owner_match_info we need to know the user
    namespace the uids and gids are specified in. In the common case
    net->user_ns == current_user_ns(). Verify net->user_ns ==
    current_user_ns() in owner_check so we can later assume it in
    owner_mt.

    In owner_check also verify that all of the uids and gids specified are
    in net->user_ns and that the expected min/max relationship exists
    between the uids and gids in xt_owner_match_info.

    In owner_mt get the network namespace from the outgoing socket, as this
    must be the same network namespace as the netfilter rules, and use that
    network namespace to find the user namespace the uids and gids in
    xt_match_owner_info are encoded in. Then convert from their encoded
    from into the kernel internal format for uids and gids and perform the
    owner match.

    Similar to ping_group_range, this code does not try to detect
    noncontiguous UID/GID ranges.

    Signed-off-by: "Eric W. Biederman"
    Signed-off-by: Kevin Cernekee
    Signed-off-by: Pablo Neira Ayuso

    Eric W. Biederman
     

09 Nov, 2015

1 commit


15 Aug, 2012

1 commit


12 May, 2010

2 commits


10 Aug, 2009

1 commit


14 Nov, 2008

1 commit

  • Attach creds to file structs and discard f_uid/f_gid.

    file_operations::open() methods (such as hppfs_open()) should use file->f_cred
    rather than current_cred(). At the moment file->f_cred will be current_cred()
    at this point.

    Signed-off-by: David Howells
    Reviewed-by: James Morris
    Signed-off-by: James Morris

    David Howells
     

08 Oct, 2008

4 commits


01 Feb, 2008

1 commit


29 Jan, 2008

2 commits