diff options
author | Sergey Bugaev <bugaevc@gmail.com> | 2021-05-29 17:53:56 +0300 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2022-08-10 22:15:14 +0200 |
commit | 281396c87082d7d09a651c5f614cf3767dcc15e3 (patch) | |
tree | 922a91c9e1938f5da3460207695425b499dd9e5c /exec | |
parent | fb59c57316054d84f64d3bd35072ac92d51f9419 (diff) | |
download | hurd-281396c87082d7d09a651c5f614cf3767dcc15e3.tar.gz hurd-281396c87082d7d09a651c5f614cf3767dcc15e3.tar.bz2 hurd-281396c87082d7d09a651c5f614cf3767dcc15e3.zip |
exec: Use proc_reauthenticate_reassign ()
This lets the exec server atomically replace the old task with the new task
while raising its privileges.
Diffstat (limited to 'exec')
-rw-r--r-- | exec/exec.c | 75 |
1 files changed, 33 insertions, 42 deletions
diff --git a/exec/exec.c b/exec/exec.c index 9827cbe8..43760321 100644 --- a/exec/exec.c +++ b/exec/exec.c @@ -1,6 +1,6 @@ /* GNU Hurd standard exec server. Copyright (C) 1992 ,1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001, - 2002, 2004, 2010 Free Software Foundation, Inc. + 2002, 2004, 2010, 2021 Free Software Foundation, Inc. Written by Roland McGrath. Can exec ELF format directly. @@ -1356,7 +1356,9 @@ do_exec (file_t file, { /* The program is on its way. The old task can be nuked. */ process_t proc; + process_t newproc; process_t psrv; + mach_port_t rendezvous; /* Use the canonical proc server if secure, or there is none other. When not secure, it is nice to let processes associate with @@ -1371,48 +1373,37 @@ do_exec (file_t file, /* XXX there is a race here for SIGKILLing the process. -roland I don't think it matters. -mib */ - if (! proc_task2proc (psrv, oldtask, &proc)) - { - proc_reassign (proc, newtask); - mach_port_deallocate (mach_task_self (), proc); - } - } + e.error = proc_task2proc (psrv, oldtask, &proc); + if (e.error) + goto out; + rendezvous = mach_reply_port (); + e.error = proc_reauthenticate_reassign (proc, + rendezvous, + MACH_MSG_TYPE_MAKE_SEND, + newtask); + if (e.error) + { + mach_port_mod_refs (mach_task_self (), rendezvous, + MACH_PORT_RIGHT_RECEIVE, -1); + mach_port_deallocate (mach_task_self (), proc); + goto out; + } - /* Make sure the proc server has the right idea of our identity. */ - if (secure) - { - uid_t euidbuf[10], egidbuf[10], auidbuf[10], agidbuf[10]; - uid_t *euids, *egids, *auids, *agids; - size_t neuids, negids, nauids, nagids; - error_t err; - - /* Find out what our UID is from the auth server. */ - neuids = negids = nauids = nagids = 10; - euids = euidbuf, egids = egidbuf; - auids = auidbuf, agids = agidbuf; - err = auth_getids (boot->portarray[INIT_PORT_AUTH], - &euids, &neuids, &auids, &nauids, - &egids, &negids, &agids, &nagids); - - if (!err) - { - /* Set the owner with the proc server */ - /* Not much we can do about errors here; caller is responsible - for making sure that the provided proc port is correctly - authenticated anyhow. */ - proc_setowner (boot->portarray[INIT_PORT_PROC], - neuids ? euids[0] : 0, !neuids); - - /* Clean up */ - if (euids != euidbuf) - munmap (euids, neuids * sizeof (uid_t)); - if (egids != egidbuf) - munmap (egids, negids * sizeof (uid_t)); - if (auids != auidbuf) - munmap (auids, nauids * sizeof (uid_t)); - if (agids != agidbuf) - munmap (agids, nagids * sizeof (uid_t)); - } + e.error = auth_user_authenticate (boot->portarray[INIT_PORT_AUTH], + rendezvous, MACH_MSG_TYPE_MAKE_SEND, + &newproc); + + mach_port_mod_refs (mach_task_self (), rendezvous, + MACH_PORT_RIGHT_RECEIVE, -1); + mach_port_deallocate (mach_task_self (), proc); + + if (e.error) + goto out; + + assert_backtrace (ports_replaced[INIT_PORT_PROC]); + mach_port_deallocate (mach_task_self (), + boot->portarray[INIT_PORT_PROC]); + boot->portarray[INIT_PORT_PROC] = newproc; } { |