* [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms @ 2011-03-03 9:38 Patrick McHardy 2011-03-03 10:49 ` James Morris 2011-03-03 17:32 ` Chris Wright 0 siblings, 2 replies; 15+ messages in thread From: Patrick McHardy @ 2011-03-03 9:38 UTC (permalink / raw) To: NetDev, dm-devel Cc: David S. Miller, Chris Wright, linux-security-module@vger.kernel.org, drbd-dev [-- Attachment #1: Type: text/plain, Size: 0 bytes --] [-- Attachment #2: 02.diff --] [-- Type: text/plain, Size: 2971 bytes --] commit 8ff259625f0ab295fa085b0718eed13093813fbc Author: Patrick McHardy <kaber@trash.net> Date: Thu Mar 3 10:17:31 2011 +0100 netlink: kill eff_cap from struct netlink_skb_parms Netlink message processing in the kernel is synchronous these days, capabilities can be checked directly in security_netlink_recv() from the current process. Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/drivers/block/drbd/drbd_nl.c b/drivers/block/drbd/drbd_nl.c index 8cbfaa6..fe81c85 100644 --- a/drivers/block/drbd/drbd_nl.c +++ b/drivers/block/drbd/drbd_nl.c @@ -2177,7 +2177,7 @@ static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms return; } - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) { + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) { retcode = ERR_PERM; goto fail; } diff --git a/drivers/md/dm-log-userspace-transfer.c b/drivers/md/dm-log-userspace-transfer.c index 049eaf1..1f23e04 100644 --- a/drivers/md/dm-log-userspace-transfer.c +++ b/drivers/md/dm-log-userspace-transfer.c @@ -134,7 +134,7 @@ static void cn_ulog_callback(struct cn_msg *msg, struct netlink_skb_parms *nsp) { struct dm_ulog_request *tfr = (struct dm_ulog_request *)(msg + 1); - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) return; spin_lock(&receiving_list_lock); diff --git a/include/linux/netlink.h b/include/linux/netlink.h index 66823b8..4c4ac3f 100644 --- a/include/linux/netlink.h +++ b/include/linux/netlink.h @@ -160,7 +160,6 @@ struct netlink_skb_parms { struct ucred creds; /* Skb credentials */ __u32 pid; __u32 dst_group; - kernel_cap_t eff_cap; }; #define NETLINK_CB(skb) (*(struct netlink_skb_parms*)&((skb)->cb)) diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c index 97ecd92..a808fb1 100644 --- a/net/netlink/af_netlink.c +++ b/net/netlink/af_netlink.c @@ -1364,12 +1364,6 @@ static int netlink_sendmsg(struct kiocb *kiocb, struct socket *sock, NETLINK_CB(skb).dst_group = dst_group; memcpy(NETLINK_CREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); - /* What can I do? Netlink is asynchronous, so that - we will have to save current capabilities to - check them, when this message will be delivered - to corresponding kernel module. --ANK (980802) - */ - err = -EFAULT; if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) { kfree_skb(skb); diff --git a/security/commoncap.c b/security/commoncap.c index 64c2ed9..a83e607 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -52,13 +52,12 @@ static void warn_setuid_and_fcaps_mixed(const char *fname) int cap_netlink_send(struct sock *sk, struct sk_buff *skb) { - NETLINK_CB(skb).eff_cap = current_cap(); return 0; } int cap_netlink_recv(struct sk_buff *skb, int cap) { - if (!cap_raised(NETLINK_CB(skb).eff_cap, cap)) + if (!cap_raised(current_cap(), cap)) return -EPERM; return 0; } ^ permalink raw reply related [flat|nested] 15+ messages in thread
* Re: [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 9:38 [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms Patrick McHardy @ 2011-03-03 10:49 ` James Morris 2011-03-03 17:32 ` Chris Wright 1 sibling, 0 replies; 15+ messages in thread From: James Morris @ 2011-03-03 10:49 UTC (permalink / raw) To: Patrick McHardy Cc: NetDev, dm-devel, David S. Miller, Chris Wright, linux-security-module@vger.kernel.org, drbd-dev Reviewed-by: James Morris <jmorris@namei.org> -- James Morris <jmorris@namei.org> ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 9:38 [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms Patrick McHardy 2011-03-03 10:49 ` James Morris @ 2011-03-03 17:32 ` Chris Wright 2011-03-03 18:56 ` David Miller 2011-03-03 20:17 ` [PATCH 2/2] " Chris Wright 1 sibling, 2 replies; 15+ messages in thread From: Chris Wright @ 2011-03-03 17:32 UTC (permalink / raw) To: Patrick McHardy Cc: NetDev, dm-devel, David S. Miller, Chris Wright, linux-security-module@vger.kernel.org, drbd-dev * Patrick McHardy (kaber@trash.net) wrote: > commit 8ff259625f0ab295fa085b0718eed13093813fbc > Author: Patrick McHardy <kaber@trash.net> > Date: Thu Mar 3 10:17:31 2011 +0100 > > netlink: kill eff_cap from struct netlink_skb_parms > > Netlink message processing in the kernel is synchronous these days, > capabilities can be checked directly in security_netlink_recv() from > the current process. > > Signed-off-by: Patrick McHardy <kaber@trash.net> Thanks for doing that Patrick. I looked at this earlier and thought there was still an async path, but I guess that's just to another userspace process. BTW, I think you missed a couple connector based callers: drivers/staging/pohmelfs/config.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_AD drivers/video/uvesafb.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) Fix those and: Acked-by: Chris Wright <chrisw@sous-sol.org> Ideally, we'd consolidate those into a variant of security_netlink_recv(). However the issue is with types. Inside connector callback we only have netlink_skb_params (seems inapproriate to cast back out to skb). We could change the lsm hook to only pass nsp, but SELinux actually cares about the netlink type. Any ideas? ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 17:32 ` Chris Wright @ 2011-03-03 18:56 ` David Miller 2011-03-03 20:15 ` [PATCH 2/2 v2] " Chris Wright 2011-03-03 20:17 ` [PATCH 2/2] " Chris Wright 1 sibling, 1 reply; 15+ messages in thread From: David Miller @ 2011-03-03 18:56 UTC (permalink / raw) To: chrisw; +Cc: kaber, netdev, dm-devel, linux-security-module, drbd-dev From: Chris Wright <chrisw@sous-sol.org> Date: Thu, 3 Mar 2011 09:32:30 -0800 > * Patrick McHardy (kaber@trash.net) wrote: > >> commit 8ff259625f0ab295fa085b0718eed13093813fbc >> Author: Patrick McHardy <kaber@trash.net> >> Date: Thu Mar 3 10:17:31 2011 +0100 >> >> netlink: kill eff_cap from struct netlink_skb_parms >> >> Netlink message processing in the kernel is synchronous these days, >> capabilities can be checked directly in security_netlink_recv() from >> the current process. >> >> Signed-off-by: Patrick McHardy <kaber@trash.net> > > Thanks for doing that Patrick. I looked at this earlier and thought > there was still an async path, but I guess that's just to another > userspace process. > > BTW, I think you missed a couple connector based callers: > > drivers/staging/pohmelfs/config.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_AD > drivers/video/uvesafb.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) > > Fix those and: > > Acked-by: Chris Wright <chrisw@sous-sol.org> Patrick, I'll apply your first patch, please respin this second patch with the changes mentioned here. Thanks! ^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 18:56 ` David Miller @ 2011-03-03 20:15 ` Chris Wright 2011-03-03 21:39 ` David Miller [not found] ` <20110303201522.GT4988-JyIX8gxvWYPr2PDY2+4mTGD2FQJk+8+b@public.gmane.org> 0 siblings, 2 replies; 15+ messages in thread From: Chris Wright @ 2011-03-03 20:15 UTC (permalink / raw) To: David Miller Cc: chrisw, kaber, netdev, dm-devel, linux-security-module, drbd-dev, Evgeniy Polyakov, linux-fbdev * David Miller (davem@davemloft.net) wrote: > From: Chris Wright <chrisw@sous-sol.org> > Date: Thu, 3 Mar 2011 09:32:30 -0800 > > > * Patrick McHardy (kaber@trash.net) wrote: > > > >> commit 8ff259625f0ab295fa085b0718eed13093813fbc > >> Author: Patrick McHardy <kaber@trash.net> > >> Date: Thu Mar 3 10:17:31 2011 +0100 > >> > >> netlink: kill eff_cap from struct netlink_skb_parms > >> > >> Netlink message processing in the kernel is synchronous these days, > >> capabilities can be checked directly in security_netlink_recv() from > >> the current process. > >> > >> Signed-off-by: Patrick McHardy <kaber@trash.net> > > > > Thanks for doing that Patrick. I looked at this earlier and thought > > there was still an async path, but I guess that's just to another > > userspace process. > > > > BTW, I think you missed a couple connector based callers: > > > > drivers/staging/pohmelfs/config.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_AD > > drivers/video/uvesafb.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) > > > > Fix those and: > > > > Acked-by: Chris Wright <chrisw@sous-sol.org> > > Patrick, I'll apply your first patch, please respin this second patch with > the changes mentioned here. Here, I respun it so I could work on top of it thanks, -chris --- From: Patrick McHardy <kaber@trash.net> Subject: [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms Netlink message processing in the kernel is synchronous these days, capabilities can be checked directly in security_netlink_recv() from the current process. Signed-off-by: Patrick McHardy <kaber@trash.net> Reviewed-by: James Morris <jmorris@namei.org> [chrisw: update to include pohmelfs and uvesafb] Signed-off-by: Chris Wright <chrisw@sous-sol.org> --- I did not do exhaustive .config compile tests drivers/block/drbd/drbd_nl.c | 2 +- drivers/md/dm-log-userspace-transfer.c | 2 +- drivers/staging/pohmelfs/config.c | 2 +- drivers/video/uvesafb.c | 2 +- include/linux/netlink.h | 1 - net/netlink/af_netlink.c | 6 ------ security/commoncap.c | 3 +-- 7 files changed, 5 insertions(+), 13 deletions(-) diff --git a/drivers/block/drbd/drbd_nl.c b/drivers/block/drbd/drbd_nl.c index 8cbfaa6..fe81c85 100644 --- a/drivers/block/drbd/drbd_nl.c +++ b/drivers/block/drbd/drbd_nl.c @@ -2177,7 +2177,7 @@ static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms return; } - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) { + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) { retcode = ERR_PERM; goto fail; } diff --git a/drivers/md/dm-log-userspace-transfer.c b/drivers/md/dm-log-userspace-transfer.c index 049eaf1..1f23e04 100644 --- a/drivers/md/dm-log-userspace-transfer.c +++ b/drivers/md/dm-log-userspace-transfer.c @@ -134,7 +134,7 @@ static void cn_ulog_callback(struct cn_msg *msg, struct netlink_skb_parms *nsp) { struct dm_ulog_request *tfr = (struct dm_ulog_request *)(msg + 1); - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) return; spin_lock(&receiving_list_lock); diff --git a/drivers/staging/pohmelfs/config.c b/drivers/staging/pohmelfs/config.c index 89279ba..39413b7 100644 --- a/drivers/staging/pohmelfs/config.c +++ b/drivers/staging/pohmelfs/config.c @@ -525,7 +525,7 @@ static void pohmelfs_cn_callback(struct cn_msg *msg, struct netlink_skb_parms *n { int err; - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) return; switch (msg->flags) { diff --git a/drivers/video/uvesafb.c b/drivers/video/uvesafb.c index 52ec095..5180a21 100644 --- a/drivers/video/uvesafb.c +++ b/drivers/video/uvesafb.c @@ -73,7 +73,7 @@ static void uvesafb_cn_callback(struct cn_msg *msg, struct netlink_skb_parms *ns struct uvesafb_task *utask; struct uvesafb_ktask *task; - if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) + if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) return; if (msg->seq >= UVESAFB_TASKS_MAX) diff --git a/include/linux/netlink.h b/include/linux/netlink.h index 66823b8..4c4ac3f 100644 --- a/include/linux/netlink.h +++ b/include/linux/netlink.h @@ -160,7 +160,6 @@ struct netlink_skb_parms { struct ucred creds; /* Skb credentials */ __u32 pid; __u32 dst_group; - kernel_cap_t eff_cap; }; #define NETLINK_CB(skb) (*(struct netlink_skb_parms*)&((skb)->cb)) diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c index 97ecd92..a808fb1 100644 --- a/net/netlink/af_netlink.c +++ b/net/netlink/af_netlink.c @@ -1364,12 +1364,6 @@ static int netlink_sendmsg(struct kiocb *kiocb, struct socket *sock, NETLINK_CB(skb).dst_group = dst_group; memcpy(NETLINK_CREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); - /* What can I do? Netlink is asynchronous, so that - we will have to save current capabilities to - check them, when this message will be delivered - to corresponding kernel module. --ANK (980802) - */ - err = -EFAULT; if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) { kfree_skb(skb); diff --git a/security/commoncap.c b/security/commoncap.c index 64c2ed9..a83e607 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -52,13 +52,12 @@ static void warn_setuid_and_fcaps_mixed(const char *fname) int cap_netlink_send(struct sock *sk, struct sk_buff *skb) { - NETLINK_CB(skb).eff_cap = current_cap(); return 0; } int cap_netlink_recv(struct sk_buff *skb, int cap) { - if (!cap_raised(NETLINK_CB(skb).eff_cap, cap)) + if (!cap_raised(current_cap(), cap)) return -EPERM; return 0; } -- 1.7.1 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* Re: [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 20:15 ` [PATCH 2/2 v2] " Chris Wright @ 2011-03-03 21:39 ` David Miller [not found] ` <20110303201522.GT4988-JyIX8gxvWYPr2PDY2+4mTGD2FQJk+8+b@public.gmane.org> 1 sibling, 0 replies; 15+ messages in thread From: David Miller @ 2011-03-03 21:39 UTC (permalink / raw) To: chrisw Cc: kaber, netdev, dm-devel, linux-security-module, drbd-dev, zbr, linux-fbdev From: Chris Wright <chrisw@sous-sol.org> Date: Thu, 3 Mar 2011 12:15:22 -0800 > Here, I respun it so I could work on top of it ... > I did not do exhaustive .config compile tests Thanks a lot Chris, applied. ^ permalink raw reply [flat|nested] 15+ messages in thread
[parent not found: <20110303201522.GT4988-JyIX8gxvWYPr2PDY2+4mTGD2FQJk+8+b@public.gmane.org>]
* Re: [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms [not found] ` <20110303201522.GT4988-JyIX8gxvWYPr2PDY2+4mTGD2FQJk+8+b@public.gmane.org> @ 2011-03-03 22:37 ` Lars Ellenberg 2011-03-03 23:53 ` [Drbd-dev] " Chris Wright 2011-03-04 1:29 ` Evgeniy Polyakov 0 siblings, 2 replies; 15+ messages in thread From: Lars Ellenberg @ 2011-03-03 22:37 UTC (permalink / raw) To: Chris Wright Cc: linux-fbdev-u79uwXL29TY76Z2rM5mHXA, netdev-u79uwXL29TY76Z2rM5mHXA, linux-security-module-u79uwXL29TY76Z2rM5mHXA, kaber-dcUjhNyLwpNeoWH0uzbU5w, dm-devel-H+wXaHxf7aLQT0dZR+AlfA, Evgeniy Polyakov, David Miller, drbd-dev-cunTk1MwBs8qoQakbn7OcQ On Thu, Mar 03, 2011 at 12:15:22PM -0800, Chris Wright wrote: > * David Miller (davem-fT/PcQaiUtIeIZ0/mPfg9Q@public.gmane.org) wrote: > > From: Chris Wright <chrisw-69jw2NvuJkxg9hUCZPvPmw@public.gmane.org> > > Date: Thu, 3 Mar 2011 09:32:30 -0800 > > > > > * Patrick McHardy (kaber-dcUjhNyLwpNeoWH0uzbU5w@public.gmane.org) wrote: > > > > > >> commit 8ff259625f0ab295fa085b0718eed13093813fbc > > >> Author: Patrick McHardy <kaber-dcUjhNyLwpNeoWH0uzbU5w@public.gmane.org> > > >> Date: Thu Mar 3 10:17:31 2011 +0100 > > >> > > >> netlink: kill eff_cap from struct netlink_skb_parms > > >> > > >> Netlink message processing in the kernel is synchronous these days, > > >> capabilities can be checked directly in security_netlink_recv() from > > >> the current process. > > >> > > >> Signed-off-by: Patrick McHardy <kaber-dcUjhNyLwpNeoWH0uzbU5w@public.gmane.org> > > > > > > Thanks for doing that Patrick. I looked at this earlier and thought > > > there was still an async path, but I guess that's just to another > > > userspace process. > > > > > > BTW, I think you missed a couple connector based callers: > > > > > > drivers/staging/pohmelfs/config.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_AD > > > drivers/video/uvesafb.c: if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) Last time I checked, current() for connector based netlink message consumers was the work queue that is used for connector. So unless that changed, or my understanding is wrong, current_cap() inside cn_queue_wrapper(), respectively the d->callback() will not be the userland sender process' capabilities, but the work queue capabilities. If so, then this change introduces the possibility for normal users to send privileged commands to connector based subsystems, even if they may not be able to bind() to suitable sockets to receive any replies. Am I missing something? Lars ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 22:37 ` Lars Ellenberg @ 2011-03-03 23:53 ` Chris Wright 2011-03-04 1:29 ` Evgeniy Polyakov 1 sibling, 0 replies; 15+ messages in thread From: Chris Wright @ 2011-03-03 23:53 UTC (permalink / raw) To: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel * Lars Ellenberg (lars.ellenberg@linbit.com) wrote: > Last time I checked, current() for connector based netlink message > consumers was the work queue that is used for connector. > > So unless that changed, or my understanding is wrong, current_cap() > inside cn_queue_wrapper(), respectively the d->callback() > will not be the userland sender process' capabilities, but the work > queue capabilities. Yes, you're right. > If so, then this change introduces the possibility for normal users to > send privileged commands to connector based subsystems, even if they > may not be able to bind() to suitable sockets to receive any replies. > > Am I missing something? No, thanks for review. This puts back the async issue. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 22:37 ` Lars Ellenberg 2011-03-03 23:53 ` [Drbd-dev] " Chris Wright @ 2011-03-04 1:29 ` Evgeniy Polyakov 2011-03-04 1:38 ` David Miller 2011-03-08 14:50 ` Patrick McHardy 1 sibling, 2 replies; 15+ messages in thread From: Evgeniy Polyakov @ 2011-03-04 1:29 UTC (permalink / raw) To: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel Hi. On Thu, Mar 03, 2011 at 11:37:46PM +0100, Lars Ellenberg (lars.ellenberg@linbit.com) wrote: > If so, then this change introduces the possibility for normal users to > send privileged commands to connector based subsystems, even if they > may not be able to bind() to suitable sockets to receive any replies. > > Am I missing something? Yup, connector is very async at that place, but I wonder why the hell I ever made that decision. I believe we can replace it with pure sync call of the registered connector callback, since netlink is synchronous and no one has any problem with it. -- Evgeniy Polyakov ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-04 1:29 ` Evgeniy Polyakov @ 2011-03-04 1:38 ` David Miller 2011-03-08 14:50 ` Patrick McHardy 1 sibling, 0 replies; 15+ messages in thread From: David Miller @ 2011-03-04 1:38 UTC (permalink / raw) To: zbr Cc: chrisw, linux-fbdev, netdev, linux-security-module, dm-devel, kaber, drbd-dev From: Evgeniy Polyakov <zbr@ioremap.net> Date: Fri, 4 Mar 2011 04:29:56 +0300 > Hi. > > On Thu, Mar 03, 2011 at 11:37:46PM +0100, Lars Ellenberg (lars.ellenberg@linbit.com) wrote: >> If so, then this change introduces the possibility for normal users to >> send privileged commands to connector based subsystems, even if they >> may not be able to bind() to suitable sockets to receive any replies. >> >> Am I missing something? > > Yup, connector is very async at that place, but I wonder why the hell I > ever made that decision. I believe we can replace it with pure sync call > of the registered connector callback, since netlink is synchronous and > no one has any problem with it. Yes, please it would really help us with what we're trying to do here. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-04 1:29 ` Evgeniy Polyakov 2011-03-04 1:38 ` David Miller @ 2011-03-08 14:50 ` Patrick McHardy 2011-03-08 18:32 ` Evgeniy Polyakov 1 sibling, 1 reply; 15+ messages in thread From: Patrick McHardy @ 2011-03-08 14:50 UTC (permalink / raw) To: Evgeniy Polyakov Cc: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel, drbd-dev Am 04.03.2011 02:29, schrieb Evgeniy Polyakov: > Hi. > > On Thu, Mar 03, 2011 at 11:37:46PM +0100, Lars Ellenberg (lars.ellenberg@linbit.com) wrote: >> If so, then this change introduces the possibility for normal users to >> send privileged commands to connector based subsystems, even if they >> may not be able to bind() to suitable sockets to receive any replies. >> >> Am I missing something? > > Yup, connector is very async at that place, but I wonder why the hell I > ever made that decision. I believe we can replace it with pure sync call > of the registered connector callback, since netlink is synchronous and > no one has any problem with it. > Are you going to do this or do you want me to take care of it? ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-08 14:50 ` Patrick McHardy @ 2011-03-08 18:32 ` Evgeniy Polyakov 2011-03-08 18:54 ` Patrick McHardy 0 siblings, 1 reply; 15+ messages in thread From: Evgeniy Polyakov @ 2011-03-08 18:32 UTC (permalink / raw) To: Patrick McHardy Cc: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel, drbd-dev Hi Patrick. On Tue, Mar 08, 2011 at 03:50:47PM +0100, Patrick McHardy (kaber@trash.net) wrote: > > Yup, connector is very async at that place, but I wonder why the hell I > > ever made that decision. I believe we can replace it with pure sync call > > of the registered connector callback, since netlink is synchronous and > > no one has any problem with it. > > Are you going to do this or do you want me to take care of it? I will return back at the end of the week and will take care of this problem. I will not mind if you complete it first though :) -- Evgeniy Polyakov ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-08 18:32 ` Evgeniy Polyakov @ 2011-03-08 18:54 ` Patrick McHardy 2011-03-17 15:43 ` Evgeniy Polyakov 0 siblings, 1 reply; 15+ messages in thread From: Patrick McHardy @ 2011-03-08 18:54 UTC (permalink / raw) To: Evgeniy Polyakov Cc: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel, drbd-dev Am 08.03.2011 19:32, schrieb Evgeniy Polyakov: > Hi Patrick. > > On Tue, Mar 08, 2011 at 03:50:47PM +0100, Patrick McHardy (kaber@trash.net) wrote: >>> Yup, connector is very async at that place, but I wonder why the hell I >>> ever made that decision. I believe we can replace it with pure sync call >>> of the registered connector callback, since netlink is synchronous and >>> no one has any problem with it. >> >> Are you going to do this or do you want me to take care of it? > > I will return back at the end of the week and will take care of this > problem. I will not mind if you complete it first though :) Thanks Evgeniy, I'll give it a shot. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [Drbd-dev] [PATCH 2/2 v2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-08 18:54 ` Patrick McHardy @ 2011-03-17 15:43 ` Evgeniy Polyakov 0 siblings, 0 replies; 15+ messages in thread From: Evgeniy Polyakov @ 2011-03-17 15:43 UTC (permalink / raw) To: Patrick McHardy Cc: Chris Wright, David Miller, linux-fbdev, netdev, linux-security-module, dm-devel, drbd-dev Hi. On Tue, Mar 08, 2011 at 07:54:33PM +0100, Patrick McHardy (kaber@trash.net) wrote: > >> Are you going to do this or do you want me to take care of it? > > > > I will return back at the end of the week and will take care of this > > problem. I will not mind if you complete it first though :) > > Thanks Evgeniy, I'll give it a shot. Is my help needed there or you will clean things up? -- Evgeniy Polyakov ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms 2011-03-03 17:32 ` Chris Wright 2011-03-03 18:56 ` David Miller @ 2011-03-03 20:17 ` Chris Wright 1 sibling, 0 replies; 15+ messages in thread From: Chris Wright @ 2011-03-03 20:17 UTC (permalink / raw) To: Chris Wright Cc: Patrick McHardy, NetDev, dm-devel, David S. Miller, linux-security-module@vger.kernel.org, drbd-dev * Chris Wright (chrisw@sous-sol.org) wrote: > Ideally, we'd consolidate those into a variant of security_netlink_recv(). > However the issue is with types. Inside connector callback we only have > netlink_skb_params (seems inapproriate to cast back out to skb). > > We could change the lsm hook to only pass nsp, but SELinux actually > cares about the netlink type. Any ideas? Actually I misremembered, it only cares on the send path. We could completely drop skb from recv lsm hook, will send an RFC momentarily with example. thanks, -chris ^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2011-03-17 15:43 UTC | newest] Thread overview: 15+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2011-03-03 9:38 [PATCH 2/2] netlink: kill eff_cap from struct netlink_skb_parms Patrick McHardy 2011-03-03 10:49 ` James Morris 2011-03-03 17:32 ` Chris Wright 2011-03-03 18:56 ` David Miller 2011-03-03 20:15 ` [PATCH 2/2 v2] " Chris Wright 2011-03-03 21:39 ` David Miller [not found] ` <20110303201522.GT4988-JyIX8gxvWYPr2PDY2+4mTGD2FQJk+8+b@public.gmane.org> 2011-03-03 22:37 ` Lars Ellenberg 2011-03-03 23:53 ` [Drbd-dev] " Chris Wright 2011-03-04 1:29 ` Evgeniy Polyakov 2011-03-04 1:38 ` David Miller 2011-03-08 14:50 ` Patrick McHardy 2011-03-08 18:32 ` Evgeniy Polyakov 2011-03-08 18:54 ` Patrick McHardy 2011-03-17 15:43 ` Evgeniy Polyakov 2011-03-03 20:17 ` [PATCH 2/2] " Chris Wright
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).