From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754936Ab1IPSHl (ORCPT ); Fri, 16 Sep 2011 14:07:41 -0400 Received: from mail-bw0-f46.google.com ([209.85.214.46]:47742 "EHLO mail-bw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750755Ab1IPSHj (ORCPT ); Fri, 16 Sep 2011 14:07:39 -0400 Date: Fri, 16 Sep 2011 22:07:32 +0400 From: Cyrill Gorcunov To: Vasiliy Kulikov Cc: Pavel Machek , Andrew Morton , linux-kernel@vger.kernel.org, containers@lists.osdl.org, linux-fsdevel@vger.kernel.org, Kirill Shutemov , Pavel Emelyanov , James Bottomley , Nathan Lynch , Zan Lynx , Daniel Lezcano , Tejun Heo , Alexey Dobriyan , Al Viro , Andrew Morton Subject: Re: [patch 2/2] fs, proc: Introduce the /proc//map_files/ directory v12 Message-ID: <20110916180731.GB8599@sun> References: <20110914134405.GV25367@sun> <20110914144841.GA7906@albatros> <20110914160018.GW25367@sun> <20110914160724.GA10612@albatros> <20110915091417.GA27755@sun> <20110915092757.GA23404@albatros> <20110915102922.GB27755@sun> <20110915105651.GA17575@albatros> <20110915201939.GE12040@sun> <20110916175618.GA20046@albatros> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20110916175618.GA20046@albatros> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 16, 2011 at 09:56:18PM +0400, Vasiliy Kulikov wrote: ... > > > > v14: (by Vasiliy Kulikov) > > - for security reason map_files/ entries are allowed for > > readers with CAP_SYS_ADMIN credentials granted only > > This changelog is currently much longer than the commit description text ;) Yes, I know ;) I would like to keep it (to appreciate everyone who spent time in review and feedback). ... > > > + > > + inode = dentry->d_inode; > > + task = get_proc_task(inode); > > + if (!task) > > + goto out_notask; > > + > > + if (!ptrace_may_access(task, PTRACE_MODE_READ)) > > + goto out; > > While this is not needed with capable() check, it's OK to keep it for > the future more finegranted access checks. yeah > > BTW, not a big deal, but probably you should return -EACCES on > !capable() as file presence is not an issue in this case. > > if (!ptrace_may_access(task, PTRACE_MODE_READ)) > goto out_notask; > > status = -EACCES; > if (!capable(CAP_SYS_ADMIN)) > goto out_notask; > > status = 0; > > That's not a proble to fix it actually. So can I fix it and put some tage here (Reviewed or something?). Cyrill