[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <48E818C0.3080109@kernel.org>
Date: Sat, 04 Oct 2008 18:30:40 -0700
From: "Andrew G. Morgan" <morgan@...nel.org>
To: "Serge E. Hallyn" <serue@...ibm.com>
CC: Eric Paris <eparis@...hat.com>, James Morris <jmorris@...ei.org>,
linux-kernel@...r.kernel.org, sds@...ho.nsa.gov,
selinux@...ho.nsa.gov
Subject: Re: [PATCH] capability: WARN when invalid capability is requested
rather than BUG/panic
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Serge E. Hallyn wrote:
> Andrew Morgan, any opinions?
[Sorry to get to this late.]
I'd prefer:
3) BUG_ON(!cap_valid(flag)) (garbage in BUG out, no panic)
It seems absurd to be guessing what a buggy driver might be wanting -
open source or not.
>> idea of mutating the inputs and then making the security decision based
>> on that mutation rather than on the original inputs (and yes, I realize
>> that exactly what 2.6.24 was doing)
and let's call it another bug fixed.
>>> Though I still think it's not unreasonable to simply ask for the driver
>>> to be fixed.
>> I'm not going to argue that the driver needs fixed and that is the real
>> problem. I know its been filed with them and the response was that
>> there is no support for linux. I have today tried to poke the path I
>> know of between Red Hat and them to ask them to take a look.
if distributions want to silently work around it (with some sort of
variant of 4 or perhaps 2) until the vendor of this driver has time to
fix it, then that doesn't seem unreasonable. But it seems to me that the
upstream kernel shouldn't institutionalize this sort of nonsense.
Cheers
Andrew
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFI6Bi9+bHCR3gb8jsRArIBAKCuODkju29dCosHWPiXZVKoNP0FSwCaAzPx
EWihO1+F0qd0BFZarm/CFKM=
=HJik
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists