Greg Kroah-Hartman <gre...@linuxfoundation.org> writes: > From: Daniel Mack <dan...@zonque.org> > > Add the basic driver structure. > > handle.c is the main ioctl command dispatcher that calls into other parts > of the driver. > > main.c contains the code that creates the initial domain at startup, and > util.c has utility functions such as item iterators that are shared with > other files. > > limits.h describes limits on things like maximum data structure sizes, > number of messages per users and suchlike. Some of the numbers currently > picked are rough ideas of what what might be sufficient and are probably > rather conservative. > > Signed-off-by: Daniel Mack <dan...@zonque.org> > Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
> +/* kdbus control device commands */ > +static long kdbus_handle_ioctl_control(struct file *file, unsigned int cmd, > + void __user *buf) > +{ > + case KDBUS_CMD_DOMAIN_MAKE: { > + const char *name; > + > + if (!capable(CAP_IPC_OWNER)) { > + ret = -EPERM; > + break; > + } I don't know if this is exploitable (given that this happens in an ioctl) but capable checks outside of open usually are. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/