Date: Tue, 28 Nov 2017 16:26:39 -0800 From: Kees Cook <keescook@...omium.org> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Geo Kozey <geokozey@...lfence.com>, LSM List <linux-security-module@...r.kernel.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com> Subject: Re: Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules On Tue, Nov 28, 2017 at 4:17 PM, Linus Torvalds <torvalds@...ux-foundation.org> wrote: > But at the same time, if people can't even be bothered to try to > improve the general case, and only do things that you have to opt in > for, it really isn't much of an improvement. We had this whole Right, and I'm fine to help with those general improvements. As I mentioned in another reply, we've been steadily narrowing the exposures by keeping request_module() from being exposed to "all possible modules" in many of the places it's been exposed to userspace: 7f78e0351394 ("fs: Limit sys_mount to only request filesystem modules.") 5d26a105b5a7 ("crypto: prefix module autoloading with "crypto-"") 4943ba16bbc2 ("crypto: include crypto- module prefix in template") I don't want you to think this is an area where work hasn't already been done to try to improve things. > The model that I am a proponent of is to take a softer approach > initially: don't forbid module loading (because that breaks users), > but instead _warn_ about non-root module loading. And then we can > start fixing the cases that we find. I am totally fine with this. The question I'm hoping to have answered is, "then what?" We already have concrete examples of module autoloading that will still be need to stay unprivileged and as-is in the kernel (even if we remove others). What do you see as the way to allow an admin to turn those off? -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.