* [d-kernel] (без темы) @ 2022-04-26 9:47 Vladimir D. Seleznev 2022-04-26 9:47 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev ` (2 more replies) 0 siblings, 3 replies; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-26 9:47 UTC (permalink / raw) To: devel-kernel Hi! This patch is intended for all kernel flavours that support AltHa. Caps provide subsets of privilleges and should be covered by AltHa. ^ permalink raw reply [flat|nested] 15+ messages in thread
* [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-26 9:47 [d-kernel] (без темы) Vladimir D. Seleznev @ 2022-04-26 9:47 ` Vladimir D. Seleznev 2022-04-26 21:09 ` Vitaly Chikunov 2022-04-26 19:23 ` [d-kernel] (без темы) " Vitaly Chikunov 2022-04-28 14:55 ` [d-kernel] [PATCH] " Vladimir D. Seleznev 2 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-26 9:47 UTC (permalink / raw) To: devel-kernel Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> --- Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- 2 files changed, 33 insertions(+), 10 deletions(-) diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst index be698709d3f0..beda40601c9e 100644 --- a/Documentation/admin-guide/LSM/AltHa.rst +++ b/Documentation/admin-guide/LSM/AltHa.rst @@ -3,7 +3,7 @@ AltHa ==== AltHa is a Linux Security Module currently has three userspace hardening options: - * ignore SUID on binaries (with exceptions possible); + * ignore SUID and setcaps on binaries (with exceptions possible); * prevent running selected script interpreters in interactive mode; * disable open file unlinking in selected dirs. * enable kiosk mode @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. NoSUID ============ -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. Sysctl parameters and defaults: * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` RestrScript ============ diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c index c670ad7ed458..5f0505a51644 100644 --- a/security/altha/altha_lsm.c +++ b/security/altha/altha_lsm.c @@ -11,6 +11,7 @@ #include <linux/lsm_hooks.h> #include <linux/cred.h> +#include <linux/capability.h> #include <linux/sysctl.h> #include <linux/binfmts.h> #include <linux/file.h> @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) return 0; } +static int has_any_caps(struct cred *cred) +{ + return !cap_isclear(cred->cap_permitted) || + !cap_isclear(cred->cap_effective); + + return 0; +} + /* Hooks */ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) { struct altha_list_struct *node; + int is_set_caps = 0; + char *set_uid_cap = "setuid"; /* when it's not a shebang issued script interpreter */ if (rstrscript_enabled && bprm->executable == bprm->interpreter) { char *path_p; @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f up_read(&interpreters_sem); kfree(path_buffer); } - if (unlikely(nosuid_enabled && - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { + if (nosuid_enabled) { char *path_p; char *path_buffer; uid_t cur_uid; + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); + /* Check for any caps for non-superuser. */ + if (cur_euid != (uid_t) 0 + && has_any_caps(bprm->cred)) { + is_set_caps = 1; + set_uid_cap = "setcap"; + } else if (uid_eq(bprm->cred->uid, bprm->cred->euid)) + return 0; path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); if (!path_buffer) @@ -283,8 +301,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f list_for_each_entry(node, &nosuid_exceptions_list, list) { if (strcmp(path_p, node->spath) == 0) { pr_notice_ratelimited - ("AltHa/NoSUID: %s permitted to setuid from %d\n", - bprm->filename, cur_uid); + ("AltHa/NoSUID: %s permitted to %s from %d\n", + bprm->filename, set_uid_cap, cur_uid); up_read(&nosuid_exceptions_sem); kfree(path_buffer); return 0; @@ -292,9 +310,14 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f } up_read(&nosuid_exceptions_sem); pr_notice_ratelimited - ("AltHa/NoSUID: %s prevented to setuid from %d\n", - bprm->filename, cur_uid); - bprm->cred->euid = bprm->cred->uid; + ("AltHa/NoSUID: %s prevented to %s from %d\n", + bprm->filename, set_uid_cap, cur_uid); + if (is_set_caps) { + cap_clear(bprm->cred->cap_inheritable); + cap_clear(bprm->cred->cap_permitted); + cap_clear(bprm->cred->cap_effective); + } else + bprm->cred->euid = bprm->cred->uid; kfree(path_buffer); } return 0; -- 2.33.2 ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-26 9:47 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev @ 2022-04-26 21:09 ` Vitaly Chikunov 2022-04-28 9:42 ` Vladimir D. Seleznev 0 siblings, 1 reply; 15+ messages in thread From: Vitaly Chikunov @ 2022-04-26 21:09 UTC (permalink / raw) To: ALT Linux kernel packages development Vladimir, On Tue, Apr 26, 2022 at 09:47:33AM +0000, Vladimir D. Seleznev wrote: > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > --- > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- > 2 files changed, 33 insertions(+), 10 deletions(-) > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > index be698709d3f0..beda40601c9e 100644 > --- a/Documentation/admin-guide/LSM/AltHa.rst > +++ b/Documentation/admin-guide/LSM/AltHa.rst > @@ -3,7 +3,7 @@ AltHa > ==== > > AltHa is a Linux Security Module currently has three userspace hardening options: > - * ignore SUID on binaries (with exceptions possible); > + * ignore SUID and setcaps on binaries (with exceptions possible); > * prevent running selected script interpreters in interactive mode; > * disable open file unlinking in selected dirs. > * enable kiosk mode > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > NoSUID > ============ > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > Sysctl parameters and defaults: > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > RestrScript > ============ > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > index c670ad7ed458..5f0505a51644 100644 > --- a/security/altha/altha_lsm.c > +++ b/security/altha/altha_lsm.c > @@ -11,6 +11,7 @@ > > #include <linux/lsm_hooks.h> > #include <linux/cred.h> > +#include <linux/capability.h> > #include <linux/sysctl.h> > #include <linux/binfmts.h> > #include <linux/file.h> > @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) > return 0; > } > > +static int has_any_caps(struct cred *cred) > +{ > + return !cap_isclear(cred->cap_permitted) || > + !cap_isclear(cred->cap_effective); > + > + return 0; > +} > + > /* Hooks */ > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > { > struct altha_list_struct *node; > + int is_set_caps = 0; > + char *set_uid_cap = "setuid"; > /* when it's not a shebang issued script interpreter */ > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > char *path_p; > @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > up_read(&interpreters_sem); > kfree(path_buffer); > } > - if (unlikely(nosuid_enabled && > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > + if (nosuid_enabled) { > char *path_p; > char *path_buffer; > uid_t cur_uid; > + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); > + /* Check for any caps for non-superuser. */ > + if (cur_euid != (uid_t) 0 > + && has_any_caps(bprm->cred)) { Логика этого не понятна. Было бы неплохо чтоб она была пояснена в комментариях чтоб и простые люди могли её понять. Почему caps проверяются только для non-superuser? Ведь и superuser может сбрасывать capabilities. У superuser может не быть каких-то capabilities вплоть до никаких, кроме его uid 0. Следовательно, установка new capabilities не должна зависеть от uid. Далее, capabilities могут устанавливаться не все, но если в этой проверке были обнаружены capabilities, то далее suid игнорируются и не сбрасываются если они были. Что будет если установлены одновременно и setcap, и suid? Неплохо было бы, чтоб это все было пояснено в комментариях. Например, почему не важно не сбрасывать suid при setcap. Thanks, > + is_set_caps = 1; > + set_uid_cap = "setcap"; > + } else if (uid_eq(bprm->cred->uid, bprm->cred->euid)) > + return 0; > > path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); > if (!path_buffer) > @@ -283,8 +301,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > list_for_each_entry(node, &nosuid_exceptions_list, list) { > if (strcmp(path_p, node->spath) == 0) { > pr_notice_ratelimited > - ("AltHa/NoSUID: %s permitted to setuid from %d\n", > - bprm->filename, cur_uid); > + ("AltHa/NoSUID: %s permitted to %s from %d\n", > + bprm->filename, set_uid_cap, cur_uid); > up_read(&nosuid_exceptions_sem); > kfree(path_buffer); > return 0; > @@ -292,9 +310,14 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > } > up_read(&nosuid_exceptions_sem); > pr_notice_ratelimited > - ("AltHa/NoSUID: %s prevented to setuid from %d\n", > - bprm->filename, cur_uid); > - bprm->cred->euid = bprm->cred->uid; > + ("AltHa/NoSUID: %s prevented to %s from %d\n", > + bprm->filename, set_uid_cap, cur_uid); > + if (is_set_caps) { > + cap_clear(bprm->cred->cap_inheritable); > + cap_clear(bprm->cred->cap_permitted); > + cap_clear(bprm->cred->cap_effective); > + } else > + bprm->cred->euid = bprm->cred->uid; > kfree(path_buffer); > } > return 0; > -- > 2.33.2 > > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-26 21:09 ` Vitaly Chikunov @ 2022-04-28 9:42 ` Vladimir D. Seleznev 2022-04-28 22:18 ` Vitaly Chikunov 0 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-28 9:42 UTC (permalink / raw) To: ALT Linux kernel packages development On Wed, Apr 27, 2022 at 12:09:44AM +0300, Vitaly Chikunov wrote: > Vladimir, > > On Tue, Apr 26, 2022 at 09:47:33AM +0000, Vladimir D. Seleznev wrote: > > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > > --- > > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > > security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- > > 2 files changed, 33 insertions(+), 10 deletions(-) > > > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > > index be698709d3f0..beda40601c9e 100644 > > --- a/Documentation/admin-guide/LSM/AltHa.rst > > +++ b/Documentation/admin-guide/LSM/AltHa.rst > > @@ -3,7 +3,7 @@ AltHa > > ==== > > > > AltHa is a Linux Security Module currently has three userspace hardening options: > > - * ignore SUID on binaries (with exceptions possible); > > + * ignore SUID and setcaps on binaries (with exceptions possible); > > * prevent running selected script interpreters in interactive mode; > > * disable open file unlinking in selected dirs. > > * enable kiosk mode > > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > > > NoSUID > > ============ > > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > > > Sysctl parameters and defaults: > > > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > RestrScript > > ============ > > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > > index c670ad7ed458..5f0505a51644 100644 > > --- a/security/altha/altha_lsm.c > > +++ b/security/altha/altha_lsm.c > > @@ -11,6 +11,7 @@ > > > > #include <linux/lsm_hooks.h> > > #include <linux/cred.h> > > +#include <linux/capability.h> > > #include <linux/sysctl.h> > > #include <linux/binfmts.h> > > #include <linux/file.h> > > @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) > > return 0; > > } > > > > +static int has_any_caps(struct cred *cred) > > +{ > > + return !cap_isclear(cred->cap_permitted) || > > + !cap_isclear(cred->cap_effective); > > + > > + return 0; > > +} > > + > > /* Hooks */ > > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > > { > > struct altha_list_struct *node; > > + int is_set_caps = 0; > > + char *set_uid_cap = "setuid"; > > /* when it's not a shebang issued script interpreter */ > > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > > char *path_p; > > @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > up_read(&interpreters_sem); > > kfree(path_buffer); > > } > > - if (unlikely(nosuid_enabled && > > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > > + if (nosuid_enabled) { > > char *path_p; > > char *path_buffer; > > uid_t cur_uid; > > + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); > > + /* Check for any caps for non-superuser. */ > > + if (cur_euid != (uid_t) 0 > > + && has_any_caps(bprm->cred)) { > > Логика этого не понятна. Было бы неплохо чтоб она была пояснена в > комментариях чтоб и простые люди могли её понять. > > Почему caps проверяются только для non-superuser? Ведь и superuser может > сбрасывать capabilities. У superuser может не быть каких-то capabilities > вплоть до никаких, кроме его uid 0. Следовательно, установка new > capabilities не должна зависеть от uid. Вероятно, сбрасывать caps следует и для процессов с euid == 0, а проверять для них их наличие полагаю излишним. > Далее, capabilities могут устанавливаться не все, но если в этой > проверке были обнаружены capabilities, то далее suid игнорируются > и не сбрасываются если они были. Что будет если установлены > одновременно и setcap, и suid? Не понял этой мысли, по коду caps проверяются только есть *не* был обнаружен suid. > Неплохо было бы, чтоб это все было пояснено в комментариях. Например, > почему не важно не сбрасывать suid при setcap. > > Thanks, > > > + is_set_caps = 1; > > + set_uid_cap = "setcap"; > > + } else if (uid_eq(bprm->cred->uid, bprm->cred->euid)) > > + return 0; > > > > path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); > > if (!path_buffer) > > @@ -283,8 +301,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > list_for_each_entry(node, &nosuid_exceptions_list, list) { > > if (strcmp(path_p, node->spath) == 0) { > > pr_notice_ratelimited > > - ("AltHa/NoSUID: %s permitted to setuid from %d\n", > > - bprm->filename, cur_uid); > > + ("AltHa/NoSUID: %s permitted to %s from %d\n", > > + bprm->filename, set_uid_cap, cur_uid); > > up_read(&nosuid_exceptions_sem); > > kfree(path_buffer); > > return 0; > > @@ -292,9 +310,14 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > } > > up_read(&nosuid_exceptions_sem); > > pr_notice_ratelimited > > - ("AltHa/NoSUID: %s prevented to setuid from %d\n", > > - bprm->filename, cur_uid); > > - bprm->cred->euid = bprm->cred->uid; > > + ("AltHa/NoSUID: %s prevented to %s from %d\n", > > + bprm->filename, set_uid_cap, cur_uid); > > + if (is_set_caps) { > > + cap_clear(bprm->cred->cap_inheritable); > > + cap_clear(bprm->cred->cap_permitted); > > + cap_clear(bprm->cred->cap_effective); > > + } else > > + bprm->cred->euid = bprm->cred->uid; > > kfree(path_buffer); > > } > > return 0; > > -- > > 2.33.2 -- WBR, Vladimir D. Seleznev ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-28 9:42 ` Vladimir D. Seleznev @ 2022-04-28 22:18 ` Vitaly Chikunov 2022-04-28 23:24 ` Vladimir D. Seleznev 0 siblings, 1 reply; 15+ messages in thread From: Vitaly Chikunov @ 2022-04-28 22:18 UTC (permalink / raw) To: ALT Linux kernel packages development On Thu, Apr 28, 2022 at 12:42:52PM +0300, Vladimir D. Seleznev wrote: > On Wed, Apr 27, 2022 at 12:09:44AM +0300, Vitaly Chikunov wrote: > > Vladimir, > > > > On Tue, Apr 26, 2022 at 09:47:33AM +0000, Vladimir D. Seleznev wrote: > > > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > > > --- > > > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > > > security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- > > > 2 files changed, 33 insertions(+), 10 deletions(-) > > > > > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > > > index be698709d3f0..beda40601c9e 100644 > > > --- a/Documentation/admin-guide/LSM/AltHa.rst > > > +++ b/Documentation/admin-guide/LSM/AltHa.rst > > > @@ -3,7 +3,7 @@ AltHa > > > ==== > > > > > > AltHa is a Linux Security Module currently has three userspace hardening options: > > > - * ignore SUID on binaries (with exceptions possible); > > > + * ignore SUID and setcaps on binaries (with exceptions possible); > > > * prevent running selected script interpreters in interactive mode; > > > * disable open file unlinking in selected dirs. > > > * enable kiosk mode > > > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > > > > > NoSUID > > > ============ > > > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > > > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > > > > > Sysctl parameters and defaults: > > > > > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > > > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > > > RestrScript > > > ============ > > > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > > > index c670ad7ed458..5f0505a51644 100644 > > > --- a/security/altha/altha_lsm.c > > > +++ b/security/altha/altha_lsm.c > > > @@ -11,6 +11,7 @@ > > > > > > #include <linux/lsm_hooks.h> > > > #include <linux/cred.h> > > > +#include <linux/capability.h> > > > #include <linux/sysctl.h> > > > #include <linux/binfmts.h> > > > #include <linux/file.h> > > > @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) > > > return 0; > > > } > > > > > > +static int has_any_caps(struct cred *cred) > > > +{ > > > + return !cap_isclear(cred->cap_permitted) || > > > + !cap_isclear(cred->cap_effective); > > > + > > > + return 0; > > > +} > > > + > > > /* Hooks */ > > > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > > > { > > > struct altha_list_struct *node; > > > + int is_set_caps = 0; > > > + char *set_uid_cap = "setuid"; > > > /* when it's not a shebang issued script interpreter */ > > > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > > > char *path_p; > > > @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > > up_read(&interpreters_sem); > > > kfree(path_buffer); > > > } > > > - if (unlikely(nosuid_enabled && > > > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > > > + if (nosuid_enabled) { > > > char *path_p; > > > char *path_buffer; > > > uid_t cur_uid; > > > + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); > > > + /* Check for any caps for non-superuser. */ > > > + if (cur_euid != (uid_t) 0 > > > + && has_any_caps(bprm->cred)) { > > > > Логика этого не понятна. Было бы неплохо чтоб она была пояснена в > > комментариях чтоб и простые люди могли её понять. > > > > Почему caps проверяются только для non-superuser? Ведь и superuser может > > сбрасывать capabilities. У superuser может не быть каких-то capabilities > > вплоть до никаких, кроме его uid 0. Следовательно, установка new > > capabilities не должна зависеть от uid. > > Вероятно, сбрасывать caps следует и для процессов с euid == 0, а > проверять для них их наличие полагаю излишним. > > > Далее, capabilities могут устанавливаться не все, но если в этой > > проверке были обнаружены capabilities, то далее suid игнорируются > > и не сбрасываются если они были. Что будет если установлены > > одновременно и setcap, и suid? > > Не понял этой мысли, по коду caps проверяются только есть *не* был > обнаружен suid. Почему? > > > Неплохо было бы, чтоб это все было пояснено в комментариях. Например, > > почему не важно не сбрасывать suid при setcap. > > > > Thanks, > > > > > + is_set_caps = 1; > > > + set_uid_cap = "setcap"; > > > + } else if (uid_eq(bprm->cred->uid, bprm->cred->euid)) > > > + return 0; > > > > > > path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); > > > if (!path_buffer) > > > @@ -283,8 +301,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > > list_for_each_entry(node, &nosuid_exceptions_list, list) { > > > if (strcmp(path_p, node->spath) == 0) { > > > pr_notice_ratelimited > > > - ("AltHa/NoSUID: %s permitted to setuid from %d\n", > > > - bprm->filename, cur_uid); > > > + ("AltHa/NoSUID: %s permitted to %s from %d\n", > > > + bprm->filename, set_uid_cap, cur_uid); > > > up_read(&nosuid_exceptions_sem); > > > kfree(path_buffer); > > > return 0; > > > @@ -292,9 +310,14 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > > } > > > up_read(&nosuid_exceptions_sem); > > > pr_notice_ratelimited > > > - ("AltHa/NoSUID: %s prevented to setuid from %d\n", > > > - bprm->filename, cur_uid); > > > - bprm->cred->euid = bprm->cred->uid; > > > + ("AltHa/NoSUID: %s prevented to %s from %d\n", > > > + bprm->filename, set_uid_cap, cur_uid); > > > + if (is_set_caps) { > > > + cap_clear(bprm->cred->cap_inheritable); > > > + cap_clear(bprm->cred->cap_permitted); > > > + cap_clear(bprm->cred->cap_effective); > > > + } else > > > + bprm->cred->euid = bprm->cred->uid; > > > kfree(path_buffer); > > > } > > > return 0; > > > -- > > > 2.33.2 > > -- > WBR, > Vladimir D. Seleznev > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-28 22:18 ` Vitaly Chikunov @ 2022-04-28 23:24 ` Vladimir D. Seleznev 2022-04-29 0:04 ` Vitaly Chikunov 0 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-28 23:24 UTC (permalink / raw) To: ALT Linux kernel packages development On Fri, Apr 29, 2022 at 01:18:47AM +0300, Vitaly Chikunov wrote: > On Thu, Apr 28, 2022 at 12:42:52PM +0300, Vladimir D. Seleznev wrote: > > On Wed, Apr 27, 2022 at 12:09:44AM +0300, Vitaly Chikunov wrote: > > > Vladimir, > > > > > > On Tue, Apr 26, 2022 at 09:47:33AM +0000, Vladimir D. Seleznev wrote: > > > > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > > > > --- > > > > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > > > > security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- > > > > 2 files changed, 33 insertions(+), 10 deletions(-) > > > > > > > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > > > > index be698709d3f0..beda40601c9e 100644 > > > > --- a/Documentation/admin-guide/LSM/AltHa.rst > > > > +++ b/Documentation/admin-guide/LSM/AltHa.rst > > > > @@ -3,7 +3,7 @@ AltHa > > > > ==== > > > > > > > > AltHa is a Linux Security Module currently has three userspace hardening options: > > > > - * ignore SUID on binaries (with exceptions possible); > > > > + * ignore SUID and setcaps on binaries (with exceptions possible); > > > > * prevent running selected script interpreters in interactive mode; > > > > * disable open file unlinking in selected dirs. > > > > * enable kiosk mode > > > > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > > > > > > > NoSUID > > > > ============ > > > > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > > > > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > > > > > > > Sysctl parameters and defaults: > > > > > > > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > > > > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > > > > > RestrScript > > > > ============ > > > > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > > > > index c670ad7ed458..5f0505a51644 100644 > > > > --- a/security/altha/altha_lsm.c > > > > +++ b/security/altha/altha_lsm.c > > > > @@ -11,6 +11,7 @@ > > > > > > > > #include <linux/lsm_hooks.h> > > > > #include <linux/cred.h> > > > > +#include <linux/capability.h> > > > > #include <linux/sysctl.h> > > > > #include <linux/binfmts.h> > > > > #include <linux/file.h> > > > > @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) > > > > return 0; > > > > } > > > > > > > > +static int has_any_caps(struct cred *cred) > > > > +{ > > > > + return !cap_isclear(cred->cap_permitted) || > > > > + !cap_isclear(cred->cap_effective); > > > > + > > > > + return 0; > > > > +} > > > > + > > > > /* Hooks */ > > > > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > > > > { > > > > struct altha_list_struct *node; > > > > + int is_set_caps = 0; > > > > + char *set_uid_cap = "setuid"; > > > > /* when it's not a shebang issued script interpreter */ > > > > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > > > > char *path_p; > > > > @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > > > up_read(&interpreters_sem); > > > > kfree(path_buffer); > > > > } > > > > - if (unlikely(nosuid_enabled && > > > > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > > > > + if (nosuid_enabled) { > > > > char *path_p; > > > > char *path_buffer; > > > > uid_t cur_uid; > > > > + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); > > > > + /* Check for any caps for non-superuser. */ > > > > + if (cur_euid != (uid_t) 0 > > > > + && has_any_caps(bprm->cred)) { > > > > > > Логика этого не понятна. Было бы неплохо чтоб она была пояснена в > > > комментариях чтоб и простые люди могли её понять. > > > > > > Почему caps проверяются только для non-superuser? Ведь и superuser может > > > сбрасывать capabilities. У superuser может не быть каких-то capabilities > > > вплоть до никаких, кроме его uid 0. Следовательно, установка new > > > capabilities не должна зависеть от uid. > > > > Вероятно, сбрасывать caps следует и для процессов с euid == 0, а > > проверять для них их наличие полагаю излишним. > > > > > Далее, capabilities могут устанавливаться не все, но если в этой > > > проверке были обнаружены capabilities, то далее suid игнорируются > > > и не сбрасываются если они были. Что будет если установлены > > > одновременно и setcap, и suid? > > > > Не понял этой мысли, по коду caps проверяются только есть *не* был > > обнаружен suid. > > Почему? А зачем иначе? Тем более, что cap'ы сбрасываются безусловно. -- WBR, Vladimir D. Seleznev ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-28 23:24 ` Vladimir D. Seleznev @ 2022-04-29 0:04 ` Vitaly Chikunov 0 siblings, 0 replies; 15+ messages in thread From: Vitaly Chikunov @ 2022-04-29 0:04 UTC (permalink / raw) To: ALT Linux kernel packages development On Fri, Apr 29, 2022 at 02:24:16AM +0300, Vladimir D. Seleznev wrote: > On Fri, Apr 29, 2022 at 01:18:47AM +0300, Vitaly Chikunov wrote: > > On Thu, Apr 28, 2022 at 12:42:52PM +0300, Vladimir D. Seleznev wrote: > > > On Wed, Apr 27, 2022 at 12:09:44AM +0300, Vitaly Chikunov wrote: > > > > Vladimir, > > > > > > > > On Tue, Apr 26, 2022 at 09:47:33AM +0000, Vladimir D. Seleznev wrote: > > > > > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > > > > > --- > > > > > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > > > > > security/altha/altha_lsm.c | 37 ++++++++++++++++++++----- > > > > > 2 files changed, 33 insertions(+), 10 deletions(-) > > > > > > > > > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > > > > > index be698709d3f0..beda40601c9e 100644 > > > > > --- a/Documentation/admin-guide/LSM/AltHa.rst > > > > > +++ b/Documentation/admin-guide/LSM/AltHa.rst > > > > > @@ -3,7 +3,7 @@ AltHa > > > > > ==== > > > > > > > > > > AltHa is a Linux Security Module currently has three userspace hardening options: > > > > > - * ignore SUID on binaries (with exceptions possible); > > > > > + * ignore SUID and setcaps on binaries (with exceptions possible); > > > > > * prevent running selected script interpreters in interactive mode; > > > > > * disable open file unlinking in selected dirs. > > > > > * enable kiosk mode > > > > > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > > > > > > > > > NoSUID > > > > > ============ > > > > > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > > > > > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > > > > > > > > > Sysctl parameters and defaults: > > > > > > > > > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > > > > > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > > > > > > > > > RestrScript > > > > > ============ > > > > > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > > > > > index c670ad7ed458..5f0505a51644 100644 > > > > > --- a/security/altha/altha_lsm.c > > > > > +++ b/security/altha/altha_lsm.c > > > > > @@ -11,6 +11,7 @@ > > > > > > > > > > #include <linux/lsm_hooks.h> > > > > > #include <linux/cred.h> > > > > > +#include <linux/capability.h> > > > > > #include <linux/sysctl.h> > > > > > #include <linux/binfmts.h> > > > > > #include <linux/file.h> > > > > > @@ -237,10 +238,20 @@ int is_olock_dir(struct inode *inode) > > > > > return 0; > > > > > } > > > > > > > > > > +static int has_any_caps(struct cred *cred) > > > > > +{ > > > > > + return !cap_isclear(cred->cap_permitted) || > > > > > + !cap_isclear(cred->cap_effective); > > > > > + > > > > > + return 0; > > > > > +} > > > > > + > > > > > /* Hooks */ > > > > > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > > > > > { > > > > > struct altha_list_struct *node; > > > > > + int is_set_caps = 0; > > > > > + char *set_uid_cap = "setuid"; > > > > > /* when it's not a shebang issued script interpreter */ > > > > > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > > > > > char *path_p; > > > > > @@ -267,11 +278,18 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > > > > > up_read(&interpreters_sem); > > > > > kfree(path_buffer); > > > > > } > > > > > - if (unlikely(nosuid_enabled && > > > > > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > > > > > + if (nosuid_enabled) { > > > > > char *path_p; > > > > > char *path_buffer; > > > > > uid_t cur_uid; > > > > > + uid_t cur_euid = from_kuid(bprm->cred->user_ns, bprm->cred->euid); > > > > > + /* Check for any caps for non-superuser. */ > > > > > + if (cur_euid != (uid_t) 0 > > > > > + && has_any_caps(bprm->cred)) { > > > > > > > > Логика этого не понятна. Было бы неплохо чтоб она была пояснена в > > > > комментариях чтоб и простые люди могли её понять. > > > > > > > > Почему caps проверяются только для non-superuser? Ведь и superuser может > > > > сбрасывать capabilities. У superuser может не быть каких-то capabilities > > > > вплоть до никаких, кроме его uid 0. Следовательно, установка new > > > > capabilities не должна зависеть от uid. > > > > > > Вероятно, сбрасывать caps следует и для процессов с euid == 0, а > > > проверять для них их наличие полагаю излишним. > > > > > > > Далее, capabilities могут устанавливаться не все, но если в этой > > > > проверке были обнаружены capabilities, то далее suid игнорируются > > > > и не сбрасываются если они были. Что будет если установлены > > > > одновременно и setcap, и suid? > > > > > > Не понял этой мысли, по коду caps проверяются только есть *не* был > > > обнаружен suid. > > > > Почему? > > А зачем иначе? Тем более, что cap'ы сбрасываются безусловно. А ты уже поменял код, но не написал про это изменение. > > -- > WBR, > Vladimir D. Seleznev > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] (без темы) AltHa: nosuid handles capabilities as well 2022-04-26 9:47 [d-kernel] (без темы) Vladimir D. Seleznev 2022-04-26 9:47 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev @ 2022-04-26 19:23 ` Vitaly Chikunov 2022-04-28 14:55 ` [d-kernel] [PATCH] " Vladimir D. Seleznev 2 siblings, 0 replies; 15+ messages in thread From: Vitaly Chikunov @ 2022-04-26 19:23 UTC (permalink / raw) To: ALT Linux kernel packages development Vladimir, On Tue, Apr 26, 2022 at 09:47:32AM +0000, Vladimir D. Seleznev wrote: > Hi! > > This patch is intended for all kernel flavours that support AltHa. > > Caps provide subsets of privilleges and should be covered by AltHa. Было бы неплохо если бы были хотя бы какие-то тесты для этой feature. Как например есть для kiosk. Не говоря уже о commit message. Thanks, > > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-26 9:47 [d-kernel] (без темы) Vladimir D. Seleznev 2022-04-26 9:47 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev 2022-04-26 19:23 ` [d-kernel] (без темы) " Vitaly Chikunov @ 2022-04-28 14:55 ` Vladimir D. Seleznev 2022-04-28 14:59 ` [d-kernel] AltHa Covers capabilities Vladimir D. Seleznev 2 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-28 14:55 UTC (permalink / raw) To: devel-kernel * Documentation/admin-guide/LSM/AltHa.rst: Update documentation. * security/altha/altha_lsm.c (altha_bprm_creds_from_file): Cover capabilities. (has_any_caps): New static function. Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> --- Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- security/altha/altha_lsm.c | 46 ++++++++++++++++++++----- 2 files changed, 41 insertions(+), 11 deletions(-) diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst index be698709d3f0..beda40601c9e 100644 --- a/Documentation/admin-guide/LSM/AltHa.rst +++ b/Documentation/admin-guide/LSM/AltHa.rst @@ -3,7 +3,7 @@ AltHa ==== AltHa is a Linux Security Module currently has three userspace hardening options: - * ignore SUID on binaries (with exceptions possible); + * ignore SUID and setcaps on binaries (with exceptions possible); * prevent running selected script interpreters in interactive mode; * disable open file unlinking in selected dirs. * enable kiosk mode @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. NoSUID ============ -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. Sysctl parameters and defaults: * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` RestrScript ============ diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c index c670ad7ed458..d5863621212b 100644 --- a/security/altha/altha_lsm.c +++ b/security/altha/altha_lsm.c @@ -11,6 +11,7 @@ #include <linux/lsm_hooks.h> #include <linux/cred.h> +#include <linux/capability.h> #include <linux/sysctl.h> #include <linux/binfmts.h> #include <linux/file.h> @@ -237,10 +238,19 @@ int is_olock_dir(struct inode *inode) return 0; } +static int has_any_caps(struct cred *cred) +{ + return !cap_isclear(cred->cap_permitted) || + !cap_isclear(cred->cap_effective); + + return 0; +} + /* Hooks */ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) { struct altha_list_struct *node; + char *setuidcap_srt = "setuid"; /* when it's not a shebang issued script interpreter */ if (rstrscript_enabled && bprm->executable == bprm->interpreter) { char *path_p; @@ -267,11 +277,27 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f up_read(&interpreters_sem); kfree(path_buffer); } - if (unlikely(nosuid_enabled && - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { + if (nosuid_enabled) { char *path_p; char *path_buffer; - uid_t cur_uid; + int is_setuid = 0, is_setcap = 0; + uid_t cur_uid, cur_euid; + + is_setuid = !uid_eq(bprm->cred->uid, bprm->cred->euid); + + if (!is_setuid) + is_setcap = has_any_caps(bprm->cred); + + /* + * If no suid but it has any caps, change message string from + * setuid to setcap. + */ + if (is_setcap) + setuidcap_srt = "setcap"; + + /* If no suid and no caps detected, exit. */ + if (!is_setuid && !is_setcap) + return 0; path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); if (!path_buffer) @@ -283,8 +309,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f list_for_each_entry(node, &nosuid_exceptions_list, list) { if (strcmp(path_p, node->spath) == 0) { pr_notice_ratelimited - ("AltHa/NoSUID: %s permitted to setuid from %d\n", - bprm->filename, cur_uid); + ("AltHa/NoSUID: %s permitted to %s from %d\n", + bprm->filename, setuidcap_srt, cur_uid); up_read(&nosuid_exceptions_sem); kfree(path_buffer); return 0; @@ -292,9 +318,13 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f } up_read(&nosuid_exceptions_sem); pr_notice_ratelimited - ("AltHa/NoSUID: %s prevented to setuid from %d\n", - bprm->filename, cur_uid); - bprm->cred->euid = bprm->cred->uid; + ("AltHa/NoSUID: %s prevented to %s from %d\n", + bprm->filename, setuidcap_srt, cur_uid); + if (cur_euid == (uid_t) 0) + bprm->cred->euid = bprm->cred->uid; + cap_clear(bprm->cred->cap_inheritable); + cap_clear(bprm->cred->cap_permitted); + cap_clear(bprm->cred->cap_effective); kfree(path_buffer); } return 0; -- 2.33.3 ^ permalink raw reply [flat|nested] 15+ messages in thread
* [d-kernel] AltHa Covers capabilities 2022-04-28 14:55 ` [d-kernel] [PATCH] " Vladimir D. Seleznev @ 2022-04-28 14:59 ` Vladimir D. Seleznev 2022-04-28 14:59 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev 0 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-28 14:59 UTC (permalink / raw) To: devel-kernel Quickfix ^ permalink raw reply [flat|nested] 15+ messages in thread
* [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-28 14:59 ` [d-kernel] AltHa Covers capabilities Vladimir D. Seleznev @ 2022-04-28 14:59 ` Vladimir D. Seleznev 2022-05-05 15:55 ` Vitaly Chikunov 0 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-04-28 14:59 UTC (permalink / raw) To: devel-kernel * Documentation/admin-guide/LSM/AltHa.rst: Update documentation. * security/altha/altha_lsm.c (altha_bprm_creds_from_file): Cover capabilities. (has_any_caps): New static function. Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> --- Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- security/altha/altha_lsm.c | 46 ++++++++++++++++++++----- 2 files changed, 41 insertions(+), 11 deletions(-) diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst index be698709d3f0..beda40601c9e 100644 --- a/Documentation/admin-guide/LSM/AltHa.rst +++ b/Documentation/admin-guide/LSM/AltHa.rst @@ -3,7 +3,7 @@ AltHa ==== AltHa is a Linux Security Module currently has three userspace hardening options: - * ignore SUID on binaries (with exceptions possible); + * ignore SUID and setcaps on binaries (with exceptions possible); * prevent running selected script interpreters in interactive mode; * disable open file unlinking in selected dirs. * enable kiosk mode @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. NoSUID ============ -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. Sysctl parameters and defaults: * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` RestrScript ============ diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c index c670ad7ed458..cdc9abdac0df 100644 --- a/security/altha/altha_lsm.c +++ b/security/altha/altha_lsm.c @@ -11,6 +11,7 @@ #include <linux/lsm_hooks.h> #include <linux/cred.h> +#include <linux/capability.h> #include <linux/sysctl.h> #include <linux/binfmts.h> #include <linux/file.h> @@ -237,10 +238,19 @@ int is_olock_dir(struct inode *inode) return 0; } +static int has_any_caps(struct cred *cred) +{ + return !cap_isclear(cred->cap_permitted) || + !cap_isclear(cred->cap_effective); + + return 0; +} + /* Hooks */ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) { struct altha_list_struct *node; + char *setuidcap_srt = "setuid"; /* when it's not a shebang issued script interpreter */ if (rstrscript_enabled && bprm->executable == bprm->interpreter) { char *path_p; @@ -267,11 +277,27 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f up_read(&interpreters_sem); kfree(path_buffer); } - if (unlikely(nosuid_enabled && - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { + if (nosuid_enabled) { char *path_p; char *path_buffer; - uid_t cur_uid; + int is_setuid = 0, is_setcap = 0; + uid_t cur_uid, cur_euid; + + is_setuid = !uid_eq(bprm->cred->uid, bprm->cred->euid); + + if (!is_setuid) + is_setcap = has_any_caps(bprm->cred); + + /* + * If no suid but it has any caps, change message string from + * setuid to setcap. + */ + if (is_setcap) + setuidcap_srt = "setcap"; + + /* If no suid and no caps detected, exit. */ + if (!is_setuid && !is_setcap) + return 0; path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); if (!path_buffer) @@ -283,8 +309,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f list_for_each_entry(node, &nosuid_exceptions_list, list) { if (strcmp(path_p, node->spath) == 0) { pr_notice_ratelimited - ("AltHa/NoSUID: %s permitted to setuid from %d\n", - bprm->filename, cur_uid); + ("AltHa/NoSUID: %s permitted to %s from %d\n", + bprm->filename, setuidcap_srt, cur_uid); up_read(&nosuid_exceptions_sem); kfree(path_buffer); return 0; @@ -292,9 +318,13 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f } up_read(&nosuid_exceptions_sem); pr_notice_ratelimited - ("AltHa/NoSUID: %s prevented to setuid from %d\n", - bprm->filename, cur_uid); - bprm->cred->euid = bprm->cred->uid; + ("AltHa/NoSUID: %s prevented to %s from %d\n", + bprm->filename, setuidcap_srt, cur_uid); + if (is_setuid) + bprm->cred->euid = bprm->cred->uid; + cap_clear(bprm->cred->cap_inheritable); + cap_clear(bprm->cred->cap_permitted); + cap_clear(bprm->cred->cap_effective); kfree(path_buffer); } return 0; -- 2.33.3 ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-04-28 14:59 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev @ 2022-05-05 15:55 ` Vitaly Chikunov 2022-05-05 23:45 ` Vladimir D. Seleznev 0 siblings, 1 reply; 15+ messages in thread From: Vitaly Chikunov @ 2022-05-05 15:55 UTC (permalink / raw) To: ALT Linux kernel packages development Vladimir, On Thu, Apr 28, 2022 at 02:59:55PM +0000, Vladimir D. Seleznev wrote: > * Documentation/admin-guide/LSM/AltHa.rst: Update documentation. > * security/altha/altha_lsm.c (altha_bprm_creds_from_file): Cover > capabilities. > (has_any_caps): New static function. > > Signed-off-by: Vladimir D. Seleznev <vseleznv@altlinux.org> > --- > Documentation/admin-guide/LSM/AltHa.rst | 6 ++-- > security/altha/altha_lsm.c | 46 ++++++++++++++++++++----- > 2 files changed, 41 insertions(+), 11 deletions(-) > > diff --git a/Documentation/admin-guide/LSM/AltHa.rst b/Documentation/admin-guide/LSM/AltHa.rst > index be698709d3f0..beda40601c9e 100644 > --- a/Documentation/admin-guide/LSM/AltHa.rst > +++ b/Documentation/admin-guide/LSM/AltHa.rst > @@ -3,7 +3,7 @@ AltHa > ==== > > AltHa is a Linux Security Module currently has three userspace hardening options: > - * ignore SUID on binaries (with exceptions possible); > + * ignore SUID and setcaps on binaries (with exceptions possible); > * prevent running selected script interpreters in interactive mode; > * disable open file unlinking in selected dirs. > * enable kiosk mode > @@ -15,12 +15,12 @@ through sysctls in ``/proc/sys/kernel/altha``. > > NoSUID > ============ > -Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID binaries. When this submodule is enabled, SUID bits on all binaries except explicitly listed are system-wide ignored. > +Modern Linux systems can be used with minimal (or even zero at least for OWL and ALT) usage of SUID programms, but in many cases in full-featured desktop or server systems there are plenty of them: uncounted and sometimes unnecessary. Privileged programms are always an attack surface, but mounting filesystems with ``nosuid`` flag doesn't provide enough granularity in SUID binaries management. This LSM module provides a single control point for all SUID and setcap binaries. When this submodule is enabled, SUID and setcap bits on all binaries except explicitly listed are system-wide ignored. > > Sysctl parameters and defaults: > > * ``kernel.altha.nosuid.enabled = 0``, set to 1 to enable > -* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > +* ``kernel.altha.nosuid.exceptions =``, colon-separated list of enabled SUID and setcap binaries, for example: ``/bin/su:/usr/libexec/hasher-priv/hasher-priv`` > > RestrScript > ============ > diff --git a/security/altha/altha_lsm.c b/security/altha/altha_lsm.c > index c670ad7ed458..cdc9abdac0df 100644 > --- a/security/altha/altha_lsm.c > +++ b/security/altha/altha_lsm.c > @@ -11,6 +11,7 @@ > > #include <linux/lsm_hooks.h> > #include <linux/cred.h> > +#include <linux/capability.h> > #include <linux/sysctl.h> > #include <linux/binfmts.h> > #include <linux/file.h> > @@ -237,10 +238,19 @@ int is_olock_dir(struct inode *inode) > return 0; > } > > +static int has_any_caps(struct cred *cred) > +{ > + return !cap_isclear(cred->cap_permitted) || > + !cap_isclear(cred->cap_effective); > + > + return 0; > +} > + > /* Hooks */ > static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * fi) > { > struct altha_list_struct *node; > + char *setuidcap_srt = "setuid"; > /* when it's not a shebang issued script interpreter */ > if (rstrscript_enabled && bprm->executable == bprm->interpreter) { > char *path_p; > @@ -267,11 +277,27 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > up_read(&interpreters_sem); > kfree(path_buffer); > } > - if (unlikely(nosuid_enabled && > - !uid_eq(bprm->cred->uid, bprm->cred->euid))) { > + if (nosuid_enabled) { > char *path_p; > char *path_buffer; > - uid_t cur_uid; > + int is_setuid = 0, is_setcap = 0; > + uid_t cur_uid, cur_euid; CC security/altha/altha_lsm.o security/altha/altha_lsm.c: In function 'altha_bprm_creds_from_file': security/altha/altha_lsm.c:284:32: error: unused variable 'cur_euid' [-Werror=unused-variable] 284 | uid_t cur_uid, cur_euid; | ^~~~~~~~ cc1: all warnings being treated as errors make[2]: *** [scripts/Makefile.build:277: security/altha/altha_lsm.o] Error 1 make[1]: *** [scripts/Makefile.build:540: security/altha] Error 2 make: *** [Makefile:1868: security] Error 2 make: *** Waiting for unfinished jobs.... > + > + is_setuid = !uid_eq(bprm->cred->uid, bprm->cred->euid); > + > + if (!is_setuid) > + is_setcap = has_any_caps(bprm->cred); > + > + /* > + * If no suid but it has any caps, change message string from > + * setuid to setcap. > + */ > + if (is_setcap) > + setuidcap_srt = "setcap"; > + > + /* If no suid and no caps detected, exit. */ > + if (!is_setuid && !is_setcap) > + return 0; > > path_buffer = kmalloc(PATH_MAX, GFP_KERNEL); > if (!path_buffer) > @@ -283,8 +309,8 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > list_for_each_entry(node, &nosuid_exceptions_list, list) { > if (strcmp(path_p, node->spath) == 0) { > pr_notice_ratelimited > - ("AltHa/NoSUID: %s permitted to setuid from %d\n", > - bprm->filename, cur_uid); > + ("AltHa/NoSUID: %s permitted to %s from %d\n", > + bprm->filename, setuidcap_srt, cur_uid); > up_read(&nosuid_exceptions_sem); > kfree(path_buffer); > return 0; > @@ -292,9 +318,13 @@ static int altha_bprm_creds_from_file(struct linux_binprm *bprm, struct file * f > } > up_read(&nosuid_exceptions_sem); > pr_notice_ratelimited > - ("AltHa/NoSUID: %s prevented to setuid from %d\n", > - bprm->filename, cur_uid); > - bprm->cred->euid = bprm->cred->uid; > + ("AltHa/NoSUID: %s prevented to %s from %d\n", > + bprm->filename, setuidcap_srt, cur_uid); > + if (is_setuid) > + bprm->cred->euid = bprm->cred->uid; > + cap_clear(bprm->cred->cap_inheritable); > + cap_clear(bprm->cred->cap_permitted); > + cap_clear(bprm->cred->cap_effective); > kfree(path_buffer); > } > return 0; > -- > 2.33.3 > > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-05-05 15:55 ` Vitaly Chikunov @ 2022-05-05 23:45 ` Vladimir D. Seleznev 2022-05-09 11:47 ` Vitaly Chikunov 0 siblings, 1 reply; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-05-05 23:45 UTC (permalink / raw) To: ALT Linux kernel packages development On Thu, May 05, 2022 at 06:55:05PM +0300, Vitaly Chikunov wrote: > Vladimir, Hi! > On Thu, Apr 28, 2022 at 02:59:55PM +0000, Vladimir D. Seleznev wrote: > [skip] > > CC security/altha/altha_lsm.o > security/altha/altha_lsm.c: In function 'altha_bprm_creds_from_file': > security/altha/altha_lsm.c:284:32: error: unused variable 'cur_euid' [-Werror=unused-variable] > 284 | uid_t cur_uid, cur_euid; > | ^~~~~~~~ > cc1: all warnings being treated as errors > make[2]: *** [scripts/Makefile.build:277: security/altha/altha_lsm.o] Error 1 > make[1]: *** [scripts/Makefile.build:540: security/altha] Error 2 > make: *** [Makefile:1868: security] Error 2 > make: *** Waiting for unfinished jobs.... Hmm, interesting. My build is OK. I'll see on this tomorrow. -- WBR, Vladimir D. Seleznev ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-05-05 23:45 ` Vladimir D. Seleznev @ 2022-05-09 11:47 ` Vitaly Chikunov 2022-05-10 21:36 ` Vladimir D. Seleznev 0 siblings, 1 reply; 15+ messages in thread From: Vitaly Chikunov @ 2022-05-09 11:47 UTC (permalink / raw) To: ALT Linux kernel packages development Vladimir, On Fri, May 06, 2022 at 02:45:36AM +0300, Vladimir D. Seleznev wrote: > On Thu, May 05, 2022 at 06:55:05PM +0300, Vitaly Chikunov wrote: > > > On Thu, Apr 28, 2022 at 02:59:55PM +0000, Vladimir D. Seleznev wrote: > > [skip] > > > > CC security/altha/altha_lsm.o > > security/altha/altha_lsm.c: In function 'altha_bprm_creds_from_file': > > security/altha/altha_lsm.c:284:32: error: unused variable 'cur_euid' [-Werror=unused-variable] > > 284 | uid_t cur_uid, cur_euid; > > | ^~~~~~~~ > > cc1: all warnings being treated as errors > > make[2]: *** [scripts/Makefile.build:277: security/altha/altha_lsm.o] Error 1 > > make[1]: *** [scripts/Makefile.build:540: security/altha] Error 2 > > make: *** [Makefile:1868: security] Error 2 > > make: *** Waiting for unfinished jobs.... > > Hmm, interesting. My build is OK. I'll see on this tomorrow. While you will look at it tomorrow, please also add minimal tests, for positive and negative case, also preferable make them self-contained enough to be runnable in vm-run. Example of the test in security/kiosk/kiosk-test.sh Thanks, > > -- > WBR, > Vladimir D. Seleznev > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well 2022-05-09 11:47 ` Vitaly Chikunov @ 2022-05-10 21:36 ` Vladimir D. Seleznev 0 siblings, 0 replies; 15+ messages in thread From: Vladimir D. Seleznev @ 2022-05-10 21:36 UTC (permalink / raw) To: ALT Linux kernel packages development On Mon, May 09, 2022 at 02:47:07PM +0300, Vitaly Chikunov wrote: > Vladimir, Hi! > On Fri, May 06, 2022 at 02:45:36AM +0300, Vladimir D. Seleznev wrote: > > On Thu, May 05, 2022 at 06:55:05PM +0300, Vitaly Chikunov wrote: > > > > > On Thu, Apr 28, 2022 at 02:59:55PM +0000, Vladimir D. Seleznev wrote: > > > [skip] > > > > > > CC security/altha/altha_lsm.o > > > security/altha/altha_lsm.c: In function 'altha_bprm_creds_from_file': > > > security/altha/altha_lsm.c:284:32: error: unused variable 'cur_euid' [-Werror=unused-variable] > > > 284 | uid_t cur_uid, cur_euid; > > > | ^~~~~~~~ > > > cc1: all warnings being treated as errors > > > make[2]: *** [scripts/Makefile.build:277: security/altha/altha_lsm.o] Error 1 > > > make[1]: *** [scripts/Makefile.build:540: security/altha] Error 2 > > > make: *** [Makefile:1868: security] Error 2 > > > make: *** Waiting for unfinished jobs.... > > > > Hmm, interesting. My build is OK. I'll see on this tomorrow. > > While you will look at it tomorrow, I did look at it that day. When I built and tested it, it was std-def-5.15.34-alt2 and it was successfully built. The same patch is failing on 5.15.37-alt1. When I fixed it on 5.15.37-alt1, I found that there are some bugs in the logic that should be fixed, and I postponed it because of several reasons. Obviously I can't send a buggy patch. I'll fix it as soon as I have time, hope it will be very soon. I also notice that the first version of the patch, that I sent in private mail, has no these issue, but we rejected it for other reasons. > please also add minimal tests, for positive and negative case, also > preferable make them self-contained enough to be runnable in vm-run. > Example of the test in security/kiosk/kiosk-test.sh Tests are good, but I consider it as a separate task, I would like to not mixing them. > Thanks, -- WBR, Vladimir D. Seleznev ^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2022-05-10 21:36 UTC | newest] Thread overview: 15+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2022-04-26 9:47 [d-kernel] (без темы) Vladimir D. Seleznev 2022-04-26 9:47 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev 2022-04-26 21:09 ` Vitaly Chikunov 2022-04-28 9:42 ` Vladimir D. Seleznev 2022-04-28 22:18 ` Vitaly Chikunov 2022-04-28 23:24 ` Vladimir D. Seleznev 2022-04-29 0:04 ` Vitaly Chikunov 2022-04-26 19:23 ` [d-kernel] (без темы) " Vitaly Chikunov 2022-04-28 14:55 ` [d-kernel] [PATCH] " Vladimir D. Seleznev 2022-04-28 14:59 ` [d-kernel] AltHa Covers capabilities Vladimir D. Seleznev 2022-04-28 14:59 ` [d-kernel] [PATCH] AltHa: nosuid handles capabilities as well Vladimir D. Seleznev 2022-05-05 15:55 ` Vitaly Chikunov 2022-05-05 23:45 ` Vladimir D. Seleznev 2022-05-09 11:47 ` Vitaly Chikunov 2022-05-10 21:36 ` Vladimir D. Seleznev
ALT Linux kernel packages development This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/devel-kernel/0 devel-kernel/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 devel-kernel devel-kernel/ http://lore.altlinux.org/devel-kernel \ devel-kernel@altlinux.org devel-kernel@altlinux.ru devel-kernel@altlinux.com public-inbox-index devel-kernel Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.devel-kernel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git