kernel-janitors.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dan Carpenter <dan.carpenter@oracle.com>
To: kernel-janitors@vger.kernel.org
Subject: Re: Require mentoring for picking up
Date: Wed, 03 Jul 2013 07:25:02 +0000	[thread overview]
Message-ID: <20130703072502.GA22937@mwanda> (raw)
In-Reply-To: <CANpOL-w=W47NUg04nHRtL4S+Fpgt7SbigCwigHCsda31woccvQ@mail.gmail.com>

I have chopped your email up to respond to the easy bits first.

> I looked at the mailing lists and found no one is working on this.
> Please correct my understanding. I am new to kernel newbies, so this
> is what i think before starting:-
> 1. Contact Hans Grobler for starting up ?

Don't do that.  He wasn't offering to teach people he was just
suggesting ideas.

> 2. Find files with ioctl functions already implemented and do the
> required assessment.
> 
> Also, needed some advise on git branching to work on the kernel.

linux-next.

> "...From: Hans Grobler
> - audit ioctl functions to make sure there is no way a user can crash
> the machine or do sensitive stuff. For example, check for the
> necessary capabilities. Check that no userspace pointers are accessed
> directly. be careful with this... it takes a while to figure out which
> ioctls are covered by the parent ioctl function (these can be nested
> to great depths)..."
> 

Looking for these sort of security bugs is fun.

These days userspace pointers are annotated with the __user tag and
Sparse warns if they are used incorrectly.

	"warning: dereference of noderef expression"

We are pretty good about eliminating these kinds of bugs.  You will
find some warnings still, but the majority are false positives.

Really this task is quite hard because people are constantly looking
for security bugs.  I do with Smatch.  But in drivers/staging/ there
are still quite a few left.

Btw, most times when you think you have found a security bug in an
ioctl, you really haven't.  There is always some reason why the bug
is hard to exploit.  If you think you have found one, then let us
know on the list and we can check it for you.  (It's fine to discuss
security bugs from drivers/staging/ in public, no one will get
upset.  I fix these sorts of thing regularly.)

regards,
dan carpenter


      parent reply	other threads:[~2013-07-03  7:25 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-07-02 23:56 Require mentoring for picking up Imtiyaz Hussain
2013-07-03  0:52 ` Logan Blyth
2013-07-03  7:25 ` Dan Carpenter [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20130703072502.GA22937@mwanda \
    --to=dan.carpenter@oracle.com \
    --cc=kernel-janitors@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).