1. 05 Dec, 2014 1 commit
    • Eric W. Biederman's avatar
      groups: Consolidate the setgroups permission checks · 7ff4d90b
      Eric W. Biederman authored
      Today there are 3 instances of setgroups and due to an oversight their
      permission checking has diverged.  Add a common function so that
      they may all share the same permission checking code.
      
      This corrects the current oversight in the current permission checks
      and adds a helper to avoid this in the future.
      
      A user namespace security fix will update this new helper, shortly.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatar"Eric W. Biederman" <ebiederm@xmission.com>
      7ff4d90b
  2. 31 Aug, 2013 1 commit
  3. 03 Mar, 2013 1 commit
  4. 03 May, 2012 2 commits
  5. 23 Mar, 2011 1 commit
  6. 23 Sep, 2009 1 commit
  7. 14 Jan, 2009 3 commits
  8. 13 Nov, 2008 2 commits
  9. 10 Apr, 2008 1 commit
    • Roland McGrath's avatar
      asmlinkage_protect replaces prevent_tail_call · 54a01510
      Roland McGrath authored
      The prevent_tail_call() macro works around the problem of the compiler
      clobbering argument words on the stack, which for asmlinkage functions
      is the caller's (user's) struct pt_regs.  The tail/sibling-call
      optimization is not the only way that the compiler can decide to use
      stack argument words as scratch space, which we have to prevent.
      Other optimizations can do it too.
      
      Until we have new compiler support to make "asmlinkage" binding on the
      compiler's own use of the stack argument frame, we have work around all
      the manifestations of this issue that crop up.
      
      More cases seem to be prevented by also keeping the incoming argument
      variables live at the end of the function.  This makes their original
      stack slots attractive places to leave those variables, so the compiler
      tends not clobber them for something else.  It's still no guarantee, but
      it handles some observed cases that prevent_tail_call() did not.
      Signed-off-by: default avatarRoland McGrath <roland@redhat.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      54a01510
  10. 08 May, 2007 1 commit
  11. 19 Apr, 2006 1 commit
    • OGAWA Hirofumi's avatar
      [PATCH] Add more prevent_tail_call() · 5a7b46b3
      OGAWA Hirofumi authored
      Those also break userland regs like following.
      
         00000000 <sys_chown16>:
            0:	0f b7 44 24 0c       	movzwl 0xc(%esp),%eax
            5:	83 ca ff             	or     $0xffffffff,%edx
            8:	0f b7 4c 24 08       	movzwl 0x8(%esp),%ecx
            d:	66 83 f8 ff          	cmp    $0xffffffff,%ax
           11:	0f 44 c2             	cmove  %edx,%eax
           14:	66 83 f9 ff          	cmp    $0xffffffff,%cx
           18:	0f 45 d1             	cmovne %ecx,%edx
           1b:	89 44 24 0c          	mov    %eax,0xc(%esp)
           1f:	89 54 24 08          	mov    %edx,0x8(%esp)
           23:	e9 fc ff ff ff       	jmp    24 <sys_chown16+0x24>
      
      where the tailcall at the end overwrites the incoming stack-frame.
      Signed-off-by: default avatarOGAWA Hirofumi <hirofumi@mail.parknet.co.jp>
      [ I would _really_ like to have a way to tell gcc about calling
        conventions. The "prevent_tail_call()" macro is pretty ugly ]
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      5a7b46b3
  12. 11 Jan, 2006 1 commit
  13. 16 Apr, 2005 1 commit
    • Linus Torvalds's avatar
      Linux-2.6.12-rc2 · 1da177e4
      Linus Torvalds authored
      Initial git repository build. I'm not bothering with the full history,
      even though we have it. We can create a separate "historical" git
      archive of that later if we want to, and in the meantime it's about
      3.2GB when imported into git - space that would just make the early
      git days unnecessarily complicated, when we don't have a lot of good
      infrastructure for it.
      
      Let it rip!
      1da177e4