Smack: ignore null signal in smack_task_kill
authorRafal Krypa <r.krypa@samsung.com>
Mon, 4 Apr 2016 09:14:53 +0000 (11:14 +0200)
committerCasey Schaufler <casey@schaufler-ca.com>
Wed, 8 Jun 2016 20:52:31 +0000 (13:52 -0700)
commit18d872f77cecec2677a394170f26aaeb08562cee
treeb9d58ab693ce181382a7c62a4d8a42676248a3fe
parent40d273782ff16fe1a7445cc05c66a447dfea3433
Smack: ignore null signal in smack_task_kill

Kill with signal number 0 is commonly used for checking PID existence.
Smack treated such cases like any other kills, although no signal is
actually delivered when sig == 0.

Checking permissions when sig == 0 didn't prevent an unprivileged caller
from learning whether PID exists or not. When it existed, kernel returned
EPERM, when it didn't - ESRCH. The only effect of policy check in such
case is noise in audit logs.

This change lets Smack silently ignore kill() invocations with sig == 0.

Signed-off-by: Rafal Krypa <r.krypa@samsung.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
security/smack/smack_lsm.c
This page took 0.025603 seconds and 5 git commands to generate.