Once again, running into problems when trying this patch on SLES-10 IA64,
(Linux certify 2.6.18 #2 SMP PREEMPT Wed Nov 29 13:11:28 CST 2006 ia64)

1) replaced the ancient /lib/libcap.so.1.92 with less ancient libcap.so.1.10

2) successfully applied Serge's patch to SLES 2.6.18 sources and rebooted

3) installed Kaigai's userspace tools... no problems evident

4) ran setfcaps to see capabilities... (note Memory fault):

certify:~/libcap-1.10 # setfcaps
usage: setfcaps <capabilities> <file> ...
        cap_chown, cap_dac_override, cap_dac_read_search, cap_fowner
        cap_fsetid, cap_kill, cap_setgid, cap_setuid
        cap_setpcap, cap_linux_immutable,
        cap_net_bind_service, cap_net_broadcast
        cap_net_admin, cap_net_raw, cap_ipc_lock, cap_ipc_owner
        cap_sys_module, cap_sys_rawio, cap_sys_chroot, cap_sys_ptrace
        cap_sys_pacct, cap_sys_admin, cap_sys_boot, cap_sys_nice
        cap_sys_resource, cap_sys_time,
        cap_sys_tty_config, cap_mknod
        cap_lease, cap_audit_write, cap_audit_controlMemory fault

5) straced previous command:

[EMAIL PROTECTED]:/> strace -o /tmp/straceout4 setfcaps
[EMAIL PROTECTED]:/> cat  /tmp/straceout4
execve("/sbin/setfcaps", ["setfcaps"], [/* 65 vars */]) = 0
brk(0)                                  = 0x6000000000004000
uname({sys="Linux", node="certify", ...}) = 0
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or
directory)
open("/etc/ld.so.cache", O_RDONLY)      = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=111415, ...}) = 0
mmap(NULL, 111415, PROT_READ, MAP_PRIVATE, 3, 0) = 0x200000000004c000
close(3)                                = 0
open("/lib/libcap.so.1", O_RDONLY)      = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0002\0\1\0\0\0\340\25"..., 832) =
832
fstat(3, {st_mode=S_IFREG|0755, st_size=22672, ...}) = 0
mmap(NULL, 85800, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x2000000000068000
madvise(0x2000000000068000, 85800, MADV_SEQUENTIAL|0x1) = 0
mprotect(0x2000000000070000, 49152, PROT_NONE) = 0
mmap(0x200000000007c000, 16384, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x4000) = 0x200000000007c000
close(3)                                = 0
open("/lib/libc.so.6.1", O_RDONLY)      = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0002\0\1\0\0\0\3609\2"..., 832) =
832
fstat(3, {st_mode=S_IFREG|0755, st_size=2590313, ...}) = 0
mmap(NULL, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x2000000000080000
mmap(NULL, 2416624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x2000000000084000
madvise(0x2000000000084000, 2416624, MADV_SEQUENTIAL|0x1) = 0
mprotect(0x20000000002bc000, 49152, PROT_NONE) = 0
mmap(0x20000000002c8000, 32768, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x234000) = 0x20000000002c8000
mmap(0x20000000002d0000, 8176, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000002d0000
close(3)                                = 0
mmap(NULL, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x20000000002d4000
mmap(NULL, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x20000000002dc000
munmap(0x200000000004c000, 111415)      = 0
write(2, "usage: setfcaps <capabilities> <"..., 41) = 41
write(2, "\n\tcap_chown", 11)           = 11
write(2, ", cap_dac_override", 18)      = 18
write(2, ", cap_dac_read_search", 21)   = 21
write(2, ", cap_fowner", 12)            = 12
write(2, "\n\tcap_fsetid", 12)          = 12
write(2, ", cap_kill", 10)              = 10
write(2, ", cap_setgid", 12)            = 12
write(2, ", cap_setuid", 12)            = 12
write(2, "\n\tcap_setpcap", 13)         = 13
write(2, ", cap_linux_immutable", 21)   = 21
write(2, ", cap_net_bind_service", 22)  = 22
write(2, ", cap_net_broadcast", 19)     = 19
write(2, "\n\tcap_net_admin", 15)       = 15
write(2, ", cap_net_raw", 13)           = 13
write(2, ", cap_ipc_lock", 14)          = 14
write(2, ", cap_ipc_owner", 15)         = 15
write(2, "\n\tcap_sys_module", 16)      = 16
write(2, ", cap_sys_rawio", 15)         = 15
write(2, ", cap_sys_chroot", 16)        = 16
write(2, ", cap_sys_ptrace", 16)        = 16
write(2, "\n\tcap_sys_pacct", 15)       = 15
write(2, ", cap_sys_admin", 15)         = 15
write(2, ", cap_sys_boot", 14)          = 14
write(2, ", cap_sys_nice", 14)          = 14
write(2, "\n\tcap_sys_resource", 18)    = 18
write(2, ", cap_sys_time", 14)          = 14
write(2, ", cap_sys_tty_config", 20)    = 20
write(2, ", cap_mknod", 11)             = 11
write(2, "\n\tcap_lease", 11)           = 11
write(2, ", cap_audit_write", 17)       = 17
write(2, ", cap_audit_control", 19)     = 19
--- SIGSEGV (Segmentation fault) @ 200000000015ed20 (ffffffffffffffff) ---
+++ killed by SIGSEGV +++
[EMAIL PROTECTED]:/>                     

6) probably can't go much beyond (5), as problems likely relate to that
segfault.  Nevertheless, I tried to modify capabities for 
modprobe, yielding the all too familiar error... 

[EMAIL PROTECTED]:/> modprobe fuse major-0                            
FATAL: Error inserting fuse (/lib/modules/2.6.18/kernel/fs/fuse/fuse.ko):
Operation not permitted
[EMAIL PROTECTED]:/> sudo setfcaps cap_sys_module=ep /sbin/modprobe
/sbin/modprobe: Function not implemented (errno=38)

-Bill


On Wed, Nov 29, 2006 at 11:28:48AM +0100, Chris Friedhoff wrote:
| I use this patch with 2.6.18.3.
| patching: ok
| configuring: ok
| compiling: ok
| installing: ok
| running: ok
| tested with httpd, smbd, nmbd, named, cupsd, ping, traceroute,
| modprobe, traceroute, ntpdate, xinit, killall, eject, dhcpd, route,
| qemu: ok
| I use this patch as documented: http://www.friedhoff.org/fscaps.html
| 
| I also tested the patched kernel with "CONFIG_SECURITY_FS_CAPABILITIES
| is not set" and xinit kills X perfectly, when the GUI is stopped.
| 
| Any other tests that might be helpful?
| 
| The webpage is updated.
| 
| Chris
| 
| 
| On Mon, 27 Nov 2006 11:07:40 -0600
| "Serge E. Hallyn" <[EMAIL PROTECTED]> wrote:
| 
| > From: Serge E. Hallyn <[EMAIL PROTECTED]>
| > Subject: [PATCH 1/1] Implement file posix capabilities
| > 
| > Implement file posix capabilities.  This allows programs to be given a
| > subset of root's powers regardless of who runs them, without having to use
| > setuid and giving the binary all of root's powers.
| > 
| > This version works with Kaigai Kohei's userspace tools, found at
| > http://www.kaigai.gr.jp/index.php.  For more information on how to use this
| > patch, Chris Friedhoff has posted a nice page at
| > http://www.friedhoff.org/fscaps.html.
| > 
| > Changelog:
| >     Nov 27:
| >     Incorporate fixes from Andrew Morton
| >     (security-introduce-file-caps-tweaks and
| >     security-introduce-file-caps-warning-fix)
| >     Fix Kconfig dependency.
| >     Fix change signaling behavior when file caps are not compiled in.
| 
| - snip -
| 
| --------------------
| Chris Friedhoff
| [EMAIL PROTECTED]
| -
| To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
| the body of a message to [EMAIL PROTECTED]
| More majordomo info at  http://vger.kernel.org/majordomo-info.html

-- 
Bill O'Donnell
SGI
[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to