|
Message-ID: <CAGXu5jJPk5a_66FpMd6D-XdWyzD7sxCPQirz1C6_hEFu4qsP5g@mail.gmail.com> Date: Thu, 1 Jun 2017 12:10:07 -0700 From: Kees Cook <keescook@...gle.com> To: Djalal Harouni <tixxdz@...il.com> Cc: "Serge E. Hallyn" <serge@...lyn.com>, Rusty Russell <rusty@...tcorp.com.au>, "David S . Miller" <davem@...emloft.net>, Jessica Yu <jeyu@...hat.com>, LKML <linux-kernel@...r.kernel.org>, Network Development <netdev@...r.kernel.org>, linux-security-module <linux-security-module@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Andy Lutomirski <luto@...nel.org>, Andrew Morton <akpm@...ux-foundation.org>, James Morris <james.l.morris@...cle.com>, Paul Moore <paul@...l-moore.com>, Stephen Smalley <sds@...ho.nsa.gov>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>, Ingo Molnar <mingo@...nel.org>, Linux API <linux-api@...r.kernel.org>, Dongsu Park <dpark@...teo.net>, Casey Schaufler <casey@...aufler-ca.com>, Jonathan Corbet <corbet@....net>, Arnaldo Carvalho de Melo <acme@...hat.com>, Mauro Carvalho Chehab <mchehab@...nel.org>, Peter Zijlstra <peterz@...radead.org>, Zendyani <zendyani@...il.com>, "linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>, Al Viro <viro@...iv.linux.org.uk>, Ben Hutchings <ben.hutchings@...ethink.co.uk> Subject: Re: [PATCH v4 next 1/3] modules:capabilities: allow __request_module() to take a capability argument On Thu, Jun 1, 2017 at 7:56 AM, Djalal Harouni <tixxdz@...il.com> wrote: > module_require_cap = 0; > > if (autoload == MODULES_AUTOLOAD_DISABLED) > return -EPERM; > > if (autoload == MODULES_AUTOLOAD_PRIVILEGED || require_cap > 0) { > if (prefix != NULL && *prefix != '\0') > /* > * Allow non-CAP_SYS_MODULE caps when > * using a distinct prefix. > */ > module_require_cap = require_cap; > else > /* > * Otherwise always require CAP_SYS_MODULE if no > * valid prefix. Callers that do not provide a valid prefix > * should not provide a require_cap > 0 > */ > module_require_cap = CAP_SYS_MODULE; > } > > /* If autoload allowed and 'module_require_cap' was *never* set, allow */ > if (module_require_cap == 0 && autoload == MODULES_AUTOLOAD_ALLOWED) > return 0; > > return capable(module_require_cap) ? 0 : -EPERM; > > Maybe you will agree :-) ? Yes! Looks good. I was accidentally still thinking about the caps checks being in the net code, but obviously, that wouldn't be the case anymore. Thanks for the catch. :) > BTW Kees, also in next version I won't remove the > capable(CAP_NET_ADMIN) check from [1] > even if there is the new request_module_cap(), I would like it to be > in a different patches, this way we go incremental > and maybe it is better to merge what we have now ? and follow up > later, and of course if other maintainers agree too! Yes, incremental. I would suggest first creating the API changes to move a basic require_cap test into the LSM (which would drop the open-coded capable() checks in the net code), and then add the autoload logic in the following patches. That way the "infrastructure" changes happen separately and do not change any behaviors, but moves the caps test down where its wanted in the LSM, before then augmenting the logic. > I just need a bit of free time to check again everything and will send > a v5 with all requested changes. Great, thank you! -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.