Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752616AbZG3UIQ (ORCPT ); Thu, 30 Jul 2009 16:08:16 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752554AbZG3UIQ (ORCPT ); Thu, 30 Jul 2009 16:08:16 -0400 Received: from msux-gh1-uea01.nsa.gov ([63.239.67.1]:40336 "EHLO msux-gh1-uea01.nsa.gov" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752483AbZG3UIO (ORCPT ); Thu, 30 Jul 2009 16:08:14 -0400 Subject: Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c From: Stephen Smalley To: "Serge E. Hallyn" Cc: Eric Paris , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, jwcart2@tycho.nsa.gov, spender@grsecurity.net, dwalsh@redhat.com, cl@linux-foundation.org, arjan@infradead.org, alan@lxorguk.ukuu.org.uk, kees@outflux.net, csellers@tresys.com, penguin-kernel@i-love.sakura.ne.jp, Andrew Morgan In-Reply-To: <20090730200144.GB20292@us.ibm.com> References: <20090729185620.21757.44366.stgit@paris.rdu.redhat.com> <20090730051426.GA6082@us.ibm.com> <1248968428.2597.79.camel@localhost> <20090730155403.GA13939@us.ibm.com> <1248969492.11627.172.camel@moss-pluto.epoch.ncsc.mil> <1248976252.2771.1.camel@localhost> <1248982958.11627.187.camel@moss-pluto.epoch.ncsc.mil> <20090730200144.GB20292@us.ibm.com> Content-Type: text/plain Organization: National Security Agency Date: Thu, 30 Jul 2009 16:05:01 -0400 Message-Id: <1248984301.11627.199.camel@moss-pluto.epoch.ncsc.mil> Mime-Version: 1.0 X-Mailer: Evolution 2.26.3 (2.26.3-1.fc11) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4573 Lines: 102 On Thu, 2009-07-30 at 15:01 -0500, Serge E. Hallyn wrote: > Quoting Stephen Smalley (sds@tycho.nsa.gov): > > On Thu, 2009-07-30 at 13:50 -0400, Eric Paris wrote: > > > On Thu, 2009-07-30 at 11:58 -0400, Stephen Smalley wrote: > > > > On Thu, 2009-07-30 at 10:54 -0500, Serge E. Hallyn wrote: > > > > > Quoting Eric Paris (eparis@redhat.com): > > > > > > On Thu, 2009-07-30 at 00:14 -0500, Serge E. Hallyn wrote: > > > > > > > Quoting Eric Paris (eparis@redhat.com): > > > > > > > > Currently we duplicate the mmap_min_addr test in cap_file_mmap and in > > > > > > > > security_file_mmap if !CONFIG_SECURITY. This patch moves cap_file_mmap > > > > > > > > into commoncap.c and then calls that function directly from > > > > > > > > security_file_mmap ifndef CONFIG_SECURITY like all of the other capability > > > > > > > > checks are done. > > > > > > > > > > > > > > It also > > > > > > > > > > > > > > 1. changes the return value in error case from -EACCES to > > > > > > > -EPERM > > > > > > > 2. no onger sets PF_SUPERPRIV in t->flags if the capability > > > > > > > is used. > > > > > > > > > > > > > > Do we care about these? > > > > > > > > > > > > Personally, not really, but I'll gladly put them back if you care. #2 > > > > > > seems more interesting to me than number 1. I actually kinda like > > > > > > getting EPERM from caps rather than EACCES since them I know if I was > > > > > > denied by selinux or by caps..... > > > > > > > > > > > > -Eric > > > > > > > > > > Yup, I asked bc I didn't particularly care myself. > > > > > > > > > > I think I agree with you about -EPERM being better anyway. However I > > > > > (now) think in this case PF_SUPERPRIV definately should be set, as this > > > > > is a clear use of a capability to do something that couldn't have been > > > > > done without it. > > > > > > > > On a related but different note, we should consider all current uses of > > > > cap_capable(), as they represent capability checks that will not be > > > > subject to a further restrictive check by other security modules. In > > > > this case and in the vm_enough_memory case, that is intentional, but not > > > > so clear for other uses in commoncap.c. > > > > > > Most of commoncap.c is called either as a secondary hook from the active > > > lsm (aka selinux calls the commoncap.c functions) or in the ! > > > CONFIG_SECURITY case. > > > > > > I'll audit this afternoon to see which of them might not fit these > > > rules.... > > > > That isn't what I meant. Most of the commoncap functions call capable() > > rather than directly calling cap_capable(), thereby causing: > > - PF_SUPERPRIV to be set, and > > - The primary security module (e.g. SELinux) to apply its own > > restrictive check. > > > > That is useful as it allows SELinux or AppArmor or TOMOYO to veto e.g. > > CAP_SYS_PTRACE without replicating the same logic within its own hook. > > > > The current exceptions are: > > cap_inh_is_capped() called from cap_capset(), > > cap_task_prctl() in the PR_SET_SECUREBITS case, > > cap_vm_enough_memory(), > > cap_file_mmap() after your patch. > > > > The latter two are indeed cases where we made a conscious choice that > > SELinux would not apply its capability check against policy. But the > > first two are unclear to me. > > cap_inh_is_capped: > > I'm not sure why it's cap_capable() instead of capable(). However, if we > switch to using capable(), then we should switch the conditions in the caller > around, since at the moment just because the capable() check returned true > doesn't mean that we actually end up needing it. > > (CC:ing Andrew Morgan as I believe he wrote this and may have had a reason) > > cap_task_prctl: I don't see any reason why that shouldn't be capable(). > > cap_vm_enough_memory(): I seem to recall we explicitly decided that we > did not want PF_SUPERPRIV set in this case. Yes - that one was intentional, as it gets applied to all tasks that allocate mappings. For the same reason, we don't audit that check in SELinux. > cap_file_mmap(): well now that you mention it, it does seem like SELinux > would want a say in whether the task gets CAP_SYS_RAWIO here, so maybe > it should be capable() after all? No, we apply our own specific permission check for it. -- Stephen Smalley National Security Agency -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/