Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2472183yba; Mon, 15 Apr 2019 12:20:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqwbf2jq92iu5OVwjI/6saaBu7UzPJUSBtl6n+KOoHeiOObAaWLpQXUVyzQNRFHKQRsRLsWI X-Received: by 2002:a62:480d:: with SMTP id v13mr78181755pfa.125.1555356057037; Mon, 15 Apr 2019 12:20:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555356057; cv=none; d=google.com; s=arc-20160816; b=qSzRI9BDfCAJq1/0EDwd/XqfXEuSN99Zd3SxhhgShKxvwhDDGJbnAI+wF+iXOKkLyI D6oZ0SAfIpsqiuhQxNxWlcXc1ObxIET4svvR55ecruwDWuVXJvMlTbAQujm+RJEnR5Xo 9DBgHNXQEkL2tcDkExyjHmNLmHlHBnTOhZDlJeirDymrGLsnHlxHc7Y9cADXl69DDBgI AufvEfUWQiWIZFglVyN/GHGzQO8fVdW1/5/kxhINky828SYKvzq6cWupifDWj6vf1EEJ CzykDDh6qUb3MQj/HlnmTsSVwjKNXi3W0wyxz8vi1XybiXt8/OGBX1qBYXYG7h13NSA6 OI0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vEd7U0HkBvR8ZeDfkmzxaQPWMX/yHHvTaLWPDGZcP2g=; b=x5clooAPHTjKSJmCyhVl+7on8Tp6HSDBuTj4t1OF6lBbrFtaZ4+rsR7wrGOmpKQMK3 24Vfox/E3nX8tJp6zx2icyPsDoCB/v0qh2w6Q8SZwKozgiZzqi9Nna0t50ynmmAkd+cM xuwU+rM+jiJJo4qMn0YngLngYgHx7paY3MHeVSISmSpu802yu6OPoq26LY9GUrdvxZS5 ajKwbAeoplvR3KgkINb6XC6/LjIEPapnHGNBdrjSX4eTvqjT1AS7QvcDwCqWPIvcp3iD Rqt4byVz7Sq1fC/xEIbcBPo+5kyaNKsmIYy6tKhlSKCPGGihhPJ4pY7Pf3XT5FSPBwtr s6IA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Yii41YSI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f191si44615538pgc.570.2019.04.15.12.20.40; Mon, 15 Apr 2019 12:20:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Yii41YSI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731726AbfDOTSJ (ORCPT + 99 others); Mon, 15 Apr 2019 15:18:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:48858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730293AbfDOTLo (ORCPT ); Mon, 15 Apr 2019 15:11:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE4F3218D3; Mon, 15 Apr 2019 19:11:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555355504; bh=r8SHsjJGlWWTZqdw8qKMnVSngj6vv2Aa/Q2ZL+Rs0pM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Yii41YSIgIqH4IHSm2adTMNZFjrW4WCAF26KtgOsYL9J6zllTFJE6nlR1b0LLQktO en7s980nYPfpuQhY/EAZBXDoNPD/99JFQSUMh+4jpZNiLwIwTjA8C2JBD7S9EKy7DI l2HRGf647/epaFuQTsU4xv8WqhlUpD3sMZ7BGe2c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Theodore Tso Subject: [PATCH 5.0 046/117] tty: ldisc: add sysctl to prevent autoloading of ldiscs Date: Mon, 15 Apr 2019 21:00:16 +0200 Message-Id: <20190415183747.343405280@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190415183744.887851196@linuxfoundation.org> References: <20190415183744.887851196@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman commit 7c0cca7c847e6e019d67b7d793efbbe3b947d004 upstream. By default, the kernel will automatically load the module of any line dicipline that is asked for. As this sometimes isn't the safest thing to do, provide a sysctl to disable this feature. By default, we set this to 'y' as that is the historical way that Linux has worked, and we do not want to break working systems. But in the future, perhaps this can default to 'n' to prevent this functionality. Signed-off-by: Greg Kroah-Hartman Reviewed-by: Theodore Ts'o Signed-off-by: Greg Kroah-Hartman --- drivers/tty/Kconfig | 24 ++++++++++++++++++++++++ drivers/tty/tty_io.c | 3 +++ drivers/tty/tty_ldisc.c | 47 +++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 74 insertions(+) --- a/drivers/tty/Kconfig +++ b/drivers/tty/Kconfig @@ -441,4 +441,28 @@ config VCC depends on SUN_LDOMS help Support for Sun logical domain consoles. + +config LDISC_AUTOLOAD + bool "Automatically load TTY Line Disciplines" + default y + help + Historically the kernel has always automatically loaded any + line discipline that is in a kernel module when a user asks + for it to be loaded with the TIOCSETD ioctl, or through other + means. This is not always the best thing to do on systems + where you know you will not be using some of the more + "ancient" line disciplines, so prevent the kernel from doing + this unless the request is coming from a process with the + CAP_SYS_MODULE permissions. + + Say 'Y' here if you trust your userspace users to do the right + thing, or if you have only provided the line disciplines that + you know you will be using, or if you wish to continue to use + the traditional method of on-demand loading of these modules + by any user. + + This functionality can be changed at runtime with the + dev.tty.ldisc_autoload sysctl, this configuration option will + only set the default value of this functionality. + endif # TTY --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -513,6 +513,8 @@ static const struct file_operations hung static DEFINE_SPINLOCK(redirect_lock); static struct file *redirect; +extern void tty_sysctl_init(void); + /** * tty_wakeup - request more data * @tty: terminal @@ -3483,6 +3485,7 @@ void console_sysfs_notify(void) */ int __init tty_init(void) { + tty_sysctl_init(); cdev_init(&tty_cdev, &tty_fops); if (cdev_add(&tty_cdev, MKDEV(TTYAUX_MAJOR, 0), 1) || register_chrdev_region(MKDEV(TTYAUX_MAJOR, 0), 1, "/dev/tty") < 0) --- a/drivers/tty/tty_ldisc.c +++ b/drivers/tty/tty_ldisc.c @@ -156,6 +156,13 @@ static void put_ldops(struct tty_ldisc_o * takes tty_ldiscs_lock to guard against ldisc races */ +#if defined(CONFIG_LDISC_AUTOLOAD) + #define INITIAL_AUTOLOAD_STATE 1 +#else + #define INITIAL_AUTOLOAD_STATE 0 +#endif +static int tty_ldisc_autoload = INITIAL_AUTOLOAD_STATE; + static struct tty_ldisc *tty_ldisc_get(struct tty_struct *tty, int disc) { struct tty_ldisc *ld; @@ -170,6 +177,8 @@ static struct tty_ldisc *tty_ldisc_get(s */ ldops = get_ldops(disc); if (IS_ERR(ldops)) { + if (!capable(CAP_SYS_MODULE) && !tty_ldisc_autoload) + return ERR_PTR(-EPERM); request_module("tty-ldisc-%d", disc); ldops = get_ldops(disc); if (IS_ERR(ldops)) @@ -845,3 +854,41 @@ void tty_ldisc_deinit(struct tty_struct tty_ldisc_put(tty->ldisc); tty->ldisc = NULL; } + +static int zero; +static int one = 1; +static struct ctl_table tty_table[] = { + { + .procname = "ldisc_autoload", + .data = &tty_ldisc_autoload, + .maxlen = sizeof(tty_ldisc_autoload), + .mode = 0644, + .proc_handler = proc_dointvec, + .extra1 = &zero, + .extra2 = &one, + }, + { } +}; + +static struct ctl_table tty_dir_table[] = { + { + .procname = "tty", + .mode = 0555, + .child = tty_table, + }, + { } +}; + +static struct ctl_table tty_root_table[] = { + { + .procname = "dev", + .mode = 0555, + .child = tty_dir_table, + }, + { } +}; + +void tty_sysctl_init(void) +{ + register_sysctl_table(tty_root_table); +}