Re: [RFC PATCH v2 2/3] gssd: using syscalls directly to change thread's identity

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 22, 2016 at 2:38 PM, Steve Dickson <SteveD@xxxxxxxxxx> wrote:
>
>
> On 04/20/2016 05:12 PM, Olga Kornievskaia wrote:
>> For the threaded version we have to set uid,gid per thread instead
>> of per process. glibc setresuid() when called from a thread, it'll
>> send a signal to all other threads to synchronize the uid in all
>> other threads. To bypass this, we have to call syscall() directly.
>>
>> Signed-off-by: Olga Kornievskaia <kolga@xxxxxxxxxx>
>> Reviewed-by: Steve Dickson <steved@xxxxxxxxxx>
>> ---
>>  utils/gssd/gssd_proc.c | 10 ++++++++--
>>  1 file changed, 8 insertions(+), 2 deletions(-)
>>
>> diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
>> index 581a125..5d9a6db 100644
>> --- a/utils/gssd/gssd_proc.c
>> +++ b/utils/gssd/gssd_proc.c
>> @@ -69,6 +69,7 @@
>>  #include <netdb.h>
>>  #include <sys/types.h>
>>  #include <sys/wait.h>
>> +#include <syscall.h>
>>
>>  #include "gssd.h"
>>  #include "err_util.h"
>> @@ -457,7 +458,12 @@ change_identity(uid_t uid)
>>        * Switch the GIDs. Note that we leave the saved-set-gid alone in an
>>        * attempt to prevent attacks via ptrace()
>>        */
>> -     if (setresgid(pw->pw_gid, pw->pw_gid, -1) != 0) {
>> +     /* For the threaded version we have to set uid,gid per thread instead
>> +      * of per process. glibc setresuid() when called from a thread, it'll
>> +      * send a signal to all other threads to synchronize the uid in all
>> +      * other threads. To bypass this, we have to call syscall() directly.
>> +      */
>> +     if (syscall(SYS_setresgid, pw->pw_gid) != 0) {
>>               printerr(0, "WARNING: failed to set gid to %u!\n", pw->pw_gid);
>>               return errno;
>>       }
>> @@ -466,7 +472,7 @@ change_identity(uid_t uid)
>>        * Switch UIDs, but leave saved-set-uid alone to prevent ptrace() by
>>        * other processes running with this uid.
>>        */
>> -     if (setresuid(uid, uid, -1) != 0) {
>> +     if (syscall(SYS_setresuid, uid) != 0) {
>>               printerr(0, "WARNING: Failed to setuid for user with uid %u\n",
>>                               uid);
>>               return errno;
>>
> We also have to do the same thing to the setgroups() call at the
> top of change_identity(). So add the following diff to this
> patch and we are good to go...
>
> diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
> index e651d71..2f9f8ab 100644
> --- a/utils/gssd/gssd_proc.c
> +++ b/utils/gssd/gssd_proc.c
> @@ -437,7 +437,7 @@ change_identity(uid_t uid)
>         struct passwd   *pw;
>
>         /* drop list of supplimentary groups first */
> -       if (setgroups(0, NULL) != 0) {
> +       if (syscall(SYS_setgroups, 0) != 0) {
>                 printerr(0, "WARNING: unable to drop supplimentary groups!");
>                 return errno;
>         }
>

Do you know why we do this before getting the passwd entry?

Doing as you suggest causes problems as in it it fails to drop the
supplementary groups.



> steved.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux