* [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
@ 2002-10-13 12:46 Olaf Dietsche
2002-10-17 11:00 ` Olaf Dietsche
0 siblings, 1 reply; 11+ messages in thread
From: Olaf Dietsche @ 2002-10-13 12:46 UTC (permalink / raw)
To: linux-kernel
In drivers/char/mem.c there's open_port(), which is used as open_mem()
and open_kmem() as well. I don't see the benefit of this, since
/dev/mem and /dev/kmem are already protected by filesystem
permissions.
mem.c, line 526:
static int open_port(struct inode * inode, struct file * filp)
{
return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
}
If anyone knows, why this is done this way, please let me
know. Otherwise, I suggest the patch below.
Regards, Olaf.
--- a/drivers/char/mem.c Sat Oct 5 18:44:55 2002
+++ b/drivers/char/mem.c Sun Oct 13 13:59:25 2002
@@ -533,15 +533,12 @@
#define full_lseek null_lseek
#define write_zero write_null
#define read_full read_zero
-#define open_mem open_port
-#define open_kmem open_mem
static struct file_operations mem_fops = {
llseek: memory_lseek,
read: read_mem,
write: write_mem,
mmap: mmap_mem,
- open: open_mem,
};
static struct file_operations kmem_fops = {
@@ -549,7 +546,6 @@
read: read_kmem,
write: write_kmem,
mmap: mmap_kmem,
- open: open_kmem,
};
static struct file_operations null_fops = {
^ permalink raw reply [flat|nested] 11+ messages in thread* Re: [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
2002-10-13 12:46 [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem Olaf Dietsche
@ 2002-10-17 11:00 ` Olaf Dietsche
2002-10-17 11:32 ` Chris Evans
2002-10-17 12:30 ` Chris Wright
0 siblings, 2 replies; 11+ messages in thread
From: Olaf Dietsche @ 2002-10-17 11:00 UTC (permalink / raw)
To: torvalds; +Cc: linux-kernel
Olaf Dietsche <olaf.dietsche#list.linux-kernel@t-online.de> writes:
> In drivers/char/mem.c there's open_port(), which is used as open_mem()
> and open_kmem() as well. I don't see the benefit of this, since
> /dev/mem and /dev/kmem are already protected by filesystem
> permissions.
>
> mem.c, line 526:
> static int open_port(struct inode * inode, struct file * filp)
> {
> return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
> }
>
> If anyone knows, why this is done this way, please let me
> know. Otherwise, I suggest the patch below.
I haven't got a convincing answer against this patch, so far. The
patch applies to 2.5.43 as well.
Linus, please apply.
Regards, Olaf.
--- a/drivers/char/mem.c Sat Oct 5 18:44:55 2002
+++ b/drivers/char/mem.c Sun Oct 13 13:59:25 2002
@@ -533,15 +533,12 @@
#define full_lseek null_lseek
#define write_zero write_null
#define read_full read_zero
-#define open_mem open_port
-#define open_kmem open_mem
static struct file_operations mem_fops = {
llseek: memory_lseek,
read: read_mem,
write: write_mem,
mmap: mmap_mem,
- open: open_mem,
};
static struct file_operations kmem_fops = {
@@ -549,7 +546,6 @@
read: read_kmem,
write: write_kmem,
mmap: mmap_kmem,
- open: open_kmem,
};
static struct file_operations null_fops = {
^ permalink raw reply [flat|nested] 11+ messages in thread* Re: [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
2002-10-17 11:00 ` Olaf Dietsche
@ 2002-10-17 11:32 ` Chris Evans
2002-10-17 12:30 ` Chris Wright
1 sibling, 0 replies; 11+ messages in thread
From: Chris Evans @ 2002-10-17 11:32 UTC (permalink / raw)
To: Olaf Dietsche; +Cc: torvalds, linux-kernel
Hi,
No, please DON'T apply.
If /dev/mem and /dev/kmem are only protected by
filesystem permissions, then:
1) Ownership of either will confer CAP_SYS_RAWIO
2) CAP_DAC_OVERRIDE, etc. will confer CAP_SYS_RAWIO
3) Ability to mknod() one of the these will confer
CAP_SYS_RAWIO (I think to make one you only need
CAP_SYS_ADMIN, could be wrong).
CAP_SYS_RAWIO is extremely dangerous and must not
be leverageable via other system capabilities or
filesystem permissions.
There are many people who have systems with elaborate
security setups where root access is limited in what
it can do. If we allow a root user to get
CAP_SYS_RAWIO easily, this is lost.
Cheers
Chris
Quoting Olaf Dietsche
<olaf.dietsche#list.linux-kernel@t-online.de>:
> Olaf Dietsche
<olaf.dietsche#list.linux-kernel@t-online.de> writes:
>
> > In drivers/char/mem.c there's open_port(), which is
used as open_mem()
> > and open_kmem() as well. I don't see the benefit of
this, since
> > /dev/mem and /dev/kmem are already protected by
filesystem
> > permissions.
> >
> > mem.c, line 526:
> > static int open_port(struct inode * inode, struct
file * filp)
> > {
> > return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
> > }
> >
> > If anyone knows, why this is done this way, please
let me
> > know. Otherwise, I suggest the patch below.
>
> I haven't got a convincing answer against this patch,
so far. The
> patch applies to 2.5.43 as well.
> Linus, please apply.
>
> Regards, Olaf.
>
> --- a/drivers/char/mem.c Sat Oct 5 18:44:55 2002
> +++ b/drivers/char/mem.c Sun Oct 13 13:59:25 2002
> @@ -533,15 +533,12 @@
> #define full_lseek null_lseek
> #define write_zero write_null
> #define read_full read_zero
> -#define open_mem open_port
> -#define open_kmem open_mem
>
> static struct file_operations mem_fops = {
> llseek: memory_lseek,
> read: read_mem,
> write: write_mem,
> mmap: mmap_mem,
> - open: open_mem,
> };
>
> static struct file_operations kmem_fops = {
> @@ -549,7 +546,6 @@
> read: read_kmem,
> write: write_kmem,
> mmap: mmap_kmem,
> - open: open_kmem,
> };
>
> static struct file_operations null_fops = {
> -
> To unsubscribe from this list: send the line
"unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at
http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.tux.org/lkml/
>
^ permalink raw reply [flat|nested] 11+ messages in thread* Re: [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
2002-10-17 11:00 ` Olaf Dietsche
2002-10-17 11:32 ` Chris Evans
@ 2002-10-17 12:30 ` Chris Wright
2002-10-17 14:14 ` Olaf Dietsche
1 sibling, 1 reply; 11+ messages in thread
From: Chris Wright @ 2002-10-17 12:30 UTC (permalink / raw)
To: Olaf Dietsche; +Cc: torvalds, linux-kernel
* Olaf Dietsche (olaf.dietsche#list.linux-kernel@t-online.de) wrote:
> Olaf Dietsche <olaf.dietsche#list.linux-kernel@t-online.de> writes:
>
> > In drivers/char/mem.c there's open_port(), which is used as open_mem()
> > and open_kmem() as well. I don't see the benefit of this, since
> > /dev/mem and /dev/kmem are already protected by filesystem
> > permissions.
> >
> > mem.c, line 526:
> > static int open_port(struct inode * inode, struct file * filp)
> > {
> > return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
> > }
> >
> > If anyone knows, why this is done this way, please let me
> > know. Otherwise, I suggest the patch below.
>
> I haven't got a convincing answer against this patch, so far. The
> patch applies to 2.5.43 as well.
> Linus, please apply.
No way. This is clearly a bad idea. CAP_SYS_RAWIO should be treated very
seriously, look at what it enables. CAP_DAC_OVERRIDE is substantially
less powerful, and if you remove this check, it would be the only
capability protecting this.
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
^ permalink raw reply [flat|nested] 11+ messages in thread* Re: [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
2002-10-17 12:30 ` Chris Wright
@ 2002-10-17 14:14 ` Olaf Dietsche
[not found] ` <200210171807.33178.oliver@neukum.name>
0 siblings, 1 reply; 11+ messages in thread
From: Olaf Dietsche @ 2002-10-17 14:14 UTC (permalink / raw)
To: torvalds; +Cc: linux-kernel
Chris Wright <chris@wirex.com> writes:
> * Olaf Dietsche (olaf.dietsche#list.linux-kernel@t-online.de) wrote:
>>
>> I haven't got a convincing answer against this patch, so far. The
>> patch applies to 2.5.43 as well.
>> Linus, please apply.
Hehe, "please apply" is watched a lot more closely, it seems. Good to
know ;-)
> No way. This is clearly a bad idea. CAP_SYS_RAWIO should be treated very
> seriously, look at what it enables. CAP_DAC_OVERRIDE is substantially
> less powerful, and if you remove this check, it would be the only
> capability protecting this.
$ grep -r CAP_SYS_RAWIO v2.5.43 | wc
55
Well, since CAP_SYS_RAWIO is such a dangerous beast and /dev/kmem can't
live without, then something like CAP_SYS_KMEM would be more
appropriate.
Here's a new untested patch against 2.5.43. Comments?
Regards, Olaf.
diff -urN a/drivers/char/mem.c b/drivers/char/mem.c
--- a/drivers/char/mem.c Sat Oct 5 18:44:55 2002
+++ b/drivers/char/mem.c Thu Oct 17 16:02:56 2002
@@ -525,7 +525,7 @@
static int open_port(struct inode * inode, struct file * filp)
{
- return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
+ return capable(CAP_SYS_KMEM) ? 0 : -EPERM;
}
#define mmap_kmem mmap_mem
diff -urN a/include/linux/capability.h b/include/linux/capability.h
--- a/include/linux/capability.h Sat Oct 5 18:43:38 2002
+++ b/include/linux/capability.h Thu Oct 17 16:02:35 2002
@@ -283,6 +283,10 @@
#define CAP_LEASE 28
+/* Allow access to system memory */
+
+#define CAP_SYS_KMEM 29
+
#ifdef __KERNEL__
/*
* Bounding set
^ permalink raw reply [flat|nested] 11+ messages in thread
[parent not found: <3DA985E6.6090302@colorfullife.com>]
* Re: [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem
[not found] <3DA985E6.6090302@colorfullife.com>
@ 2002-10-13 15:48 ` Olaf Dietsche
[not found] ` <3DA99A8B.5050102@colorfullife.com>
0 siblings, 1 reply; 11+ messages in thread
From: Olaf Dietsche @ 2002-10-13 15:48 UTC (permalink / raw)
To: Manfred Spraul; +Cc: linux-kernel
Manfred Spraul <manfred@colorfullife.com> writes:
>> In drivers/char/mem.c there's open_port(), which is used as open_mem()
>> and open_kmem() as well. I don't see the benefit of this, since
>> /dev/mem and /dev/kmem are already protected by filesystem
>> permissions.
>>
> capabilities can be stricter than filesystem permissions
Which means, it prevents me from giving access to /dev/kmem to an
otherwise unprivileged process.
> , and the call
> is needed to update the PF_SUPERPRIV process flag.
What exactly is PF_SUPERPRIV good for? I see no real use in the
source. There is exactly one test for this flag (kernel/acct.c:336),
then sets another flag (ASU), which in turn is used nowhere else.
So, I think we could get rid of this flag as well. Comments?
Regards, Olaf.
^ permalink raw reply [flat|nested] 11+ messages in thread
end of thread, other threads:[~2002-10-17 16:55 UTC | newest]
Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-10-13 12:46 [PATCH][RFC] 2.5.42: remove capable(CAP_SYS_RAWIO) check from open_kmem Olaf Dietsche
2002-10-17 11:00 ` Olaf Dietsche
2002-10-17 11:32 ` Chris Evans
2002-10-17 12:30 ` Chris Wright
2002-10-17 14:14 ` Olaf Dietsche
[not found] ` <200210171807.33178.oliver@neukum.name>
2002-10-17 17:00 ` Olaf Dietsche
[not found] <3DA985E6.6090302@colorfullife.com>
2002-10-13 15:48 ` Olaf Dietsche
[not found] ` <3DA99A8B.5050102@colorfullife.com>
2002-10-13 16:45 ` Olaf Dietsche
2002-10-13 17:04 ` Manfred Spraul
2002-10-13 22:05 ` Olaf Dietsche
2002-10-17 11:42 ` Andreas Steinmetz
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox