Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp956906pxx; Thu, 29 Oct 2020 20:12:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYFtL88+3CIGw/twP5rZuK7HrDmvs6y7txxpJES2TDgpeco+XJwm1H4U3uJDrW2J+jOcmV X-Received: by 2002:a17:906:383:: with SMTP id b3mr420095eja.351.1604027537516; Thu, 29 Oct 2020 20:12:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604027537; cv=none; d=google.com; s=arc-20160816; b=gFLtISQIlVlkLHyDfS7CbPYCBjiEwlwjrqEP4C+Sn3R8u5yWhIkckleZHuDNWUlM4o lDouIfjxPRVKjq/F/5tCv/Dw4XMTaXUJmkxsQmc2YSGhTAWenWNRJMhTXTnfPvMq1l5I oy4eGDrkzgOkxDg12wjC0IR/ivgTX+rdxiagIR0506hUmb3rIr9FglJy1IzsDy90yTdf 959++25ZYFnBW+JrxplaeAUg4toL5VozCJEVmreSpo2NlaibZMWvc5E563zG8VVioBLz gtOw8VEYyK15YaW1JVFtbxe40Es8sAxTXlWy0dJkYrpmJHnol4pw7OdMYRkyLkcjKXle 5SQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=zehjsoI4/E9mlHSzS3GihRUsNzlSRlM3AQ/tc2JFGWU=; b=pwNpLpkITxuxOXdZ2I7Qbs0wpJGlLv9IIAdP8Hxk+qHvH/YOuQMNTDJ+xDobNj8yxU 6ODtQa9jad5ZFcxjsHAkN14uSAl4R1XO+++NKoR13985wTF9qQL8SUu5JycxlVo3nLcm Nm60oGDwL9Z9bBVStSmCiWZ2UBK9QMnekaB1hBX3cvS2OXn+TIu9LqwSJ5RxdmxCuw51 6FbPa1mH5+7QDQ3h5zrAhMdpprrHW/DpvhyZEIpp7h799ZeRaEVpwjBX/VqFJVlEcS76 M6OGyM99TesA2Uq/9ZgPQNpzjXp4ynSzd7u8tW3ZyTN1k5QVZ/ZLF04oP6DqQeULDcuP HTzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=q9NaR3BR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k25si3623495ejk.10.2020.10.29.20.11.55; Thu, 29 Oct 2020 20:12:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=q9NaR3BR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726215AbgJ3DIN (ORCPT + 99 others); Thu, 29 Oct 2020 23:08:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726110AbgJ3DIM (ORCPT ); Thu, 29 Oct 2020 23:08:12 -0400 Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com [IPv6:2a00:1450:4864:20::141]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2C355C0613D5 for ; Thu, 29 Oct 2020 20:08:12 -0700 (PDT) Received: by mail-lf1-x141.google.com with SMTP id v6so5948242lfa.13 for ; Thu, 29 Oct 2020 20:08:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=zehjsoI4/E9mlHSzS3GihRUsNzlSRlM3AQ/tc2JFGWU=; b=q9NaR3BRuvTzXjW1tFWJC7ghaDMvWYJV4F/R/sfglQ1Do9mBfL2N70a3GMysG9ufy0 u543bRU8Q+xerhl0QLubqtnupkWBP51hSdP6NGnIl1X+ZkNPyDykSBY9poLAPBpDjUaq 0s/iVSYcxsg8yKonlY/PJPY/jry+VmI1lRRiHS3TdiNh6LhgQu6AH1HsJODK3KCF2zbN XVJIkv9q1FDLnxGo0lUOJKAN5HFGYiHMifoR0MiKuttOYdJ8iNLqqbr7jNQUtCT2HPv6 PpvSh6aIPeBUKzLXaKv3qj2zy2CI2ktJbdFRW/aJd/vL4/1EkohKJVopAvgKPxXjiB09 YJRg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=zehjsoI4/E9mlHSzS3GihRUsNzlSRlM3AQ/tc2JFGWU=; b=bu1yR0YXDjVW5riheL/yVOHhnS+56bSpPp71vfuEiTlm28DGQRgjy8qjL2z+9Dh/j0 409TuTpH1jQN+B8hK/M1Xkbb7V9SMh6qp8WuDt+9JiqfGdJFv398x3ov15NdKd6YdE8R JC5HWbhVtB7VQvkSKCHbsOzQvUgSr6VvdNUpGHUjdyvvPtOG84JJOq1qt510uhm22tex /b4G7aROgyDb9Td3O7pXUQKAmH+pmGWZYGfDXmXaxUCXT5jGRPj3TPCNhbGf87mONcn0 rKbk9lMG93yKgyPRU55NVc3L8THsD4QNMmCMYy/YR7oBzyjo/zivOsPQA0V8KRFaInnZ PP9w== X-Gm-Message-State: AOAM532b9CVpRvtJcwzNzYE0k20ODQQuIHWQ6Bp8YRVOb5Kp8Fd9BwTO pfKciED5+c6xmJk9A9bea2rCRSARcqfX0XCOoGpv2g== X-Received: by 2002:a19:e308:: with SMTP id a8mr30300lfh.573.1604027290187; Thu, 29 Oct 2020 20:08:10 -0700 (PDT) MIME-Version: 1.0 References: <20201027200358.557003-1-mic@digikod.net> <20201027200358.557003-9-mic@digikod.net> In-Reply-To: From: Jann Horn Date: Fri, 30 Oct 2020 04:07:44 +0100 Message-ID: Subject: Re: [PATCH v22 08/12] landlock: Add syscall implementations To: =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , Kees Cook Cc: James Morris , "Serge E . Hallyn" , Al Viro , Andy Lutomirski , Anton Ivanov , Arnd Bergmann , Casey Schaufler , Jeff Dike , Jonathan Corbet , Michael Kerrisk , Richard Weinberger , Shuah Khan , Vincent Dagonneau , Kernel Hardening , Linux API , linux-arch , "open list:DOCUMENTATION" , linux-fsdevel , kernel list , "open list:KERNEL SELFTEST FRAMEWORK" , linux-security-module , "the arch/x86 maintainers" , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 29, 2020 at 12:30 PM Micka=C3=ABl Sala=C3=BCn = wrote: > On 29/10/2020 02:06, Jann Horn wrote: > > On Tue, Oct 27, 2020 at 9:04 PM Micka=C3=ABl Sala=C3=BCn wrote: > >> These 3 system calls are designed to be used by unprivileged processes > >> to sandbox themselves: [...] > >> + /* > >> + * Similar checks as for seccomp(2), except that an -EPERM may= be > >> + * returned. > >> + */ > >> + if (!task_no_new_privs(current)) { > >> + err =3D security_capable(current_cred(), current_user_= ns(), > >> + CAP_SYS_ADMIN, CAP_OPT_NOAUDIT); > > > > I think this should be ns_capable_noaudit(current_user_ns(), CAP_SYS_AD= MIN)? > > Right. The main difference is that ns_capable*() set PF_SUPERPRIV in > current->flags. I guess seccomp should use ns_capable_noaudit() as well? Yeah. That seccomp code is from commit e2cfabdfd0756, with commit date in April 2012, while ns_capable_noaudit() was introduced in commit 98f368e9e263, with commit date in June 2016; the seccomp code predates the availability of that API. Do you want to send a patch to Kees for that, or should I?