Subject: Re: machdep kauth calls for i386_xxx
To: None <tech-security@netbsd.org, port-i386@netbsd.org,>
From: Thor Lancelot Simon <tls@rek.tjls.com>
List: port-amd64
Date: 11/08/2006 23:32:08
On Wed, Nov 08, 2006 at 11:30:54PM -0500, Thor Lancelot Simon wrote:
> I think the patch below is correct and allows the removal of some
> unnecessary (and somewhat obfuscatory) kauth requests. Fundamentally,
> access to the i386 iopl must be assumed to be access to raw memory.
Whoops! Here's the patch:
Index: amd64/amd64/sys_machdep.c
===================================================================
RCS file: /cvsroot/src/sys/arch/amd64/amd64/sys_machdep.c,v
retrieving revision 1.9
diff -u -r1.9 sys_machdep.c
--- amd64/amd64/sys_machdep.c 19 Sep 2006 22:03:10 -0000 1.9
+++ amd64/amd64/sys_machdep.c 9 Nov 2006 04:26:16 -0000
@@ -392,8 +392,9 @@
struct trapframe *tf = l->l_md.md_regs;
struct x86_64_iopl_args ua;
- if (kauth_authorize_machdep(l->l_cred, KAUTH_MACHDEP_X86,
- KAUTH_REQ_MACHDEP_X86_IOPL, NULL, NULL, NULL))
+ if (kauth_authorize_system(l->l_cred, KAUTH_SYSTEM_RAWIO,
+ KAUTH_REQ_SYSTEM_RAWIO_MEMORY, KAUTH_REQ_SYSTEM_RAWIO_RW,
+ NULL, NULL))
return EPERM;
if ((error = copyin(args, &ua, sizeof(ua))) != 0)
@@ -435,8 +436,9 @@
struct pcb *pcb = &p->p_addr->u_pcb;
struct x86_64_set_ioperm_args ua;
- if (kauth_authorize_machdep(p->p_cred, KAUTH_MACHDEP_X86,
- KAUTH_REQ_MACHDEP_X86_IOPERM, NULL, NULL, NULL))
+ if (kauth_authorize_system(p->p_cred, KAUTH_SYSTEM_RAWIO,
+ KAUTH_REQ_SYSTEM_RAWIO_MEMORY, KAUTH_REQ_SYSTEM_RAWIO_RW,
+ NULL, NULL, NULL))
return EPERM;
if ((error = copyin(args, &ua, sizeof(ua))) != 0)
Index: i386/i386/sys_machdep.c
===================================================================
RCS file: /cvsroot/src/sys/arch/i386/i386/sys_machdep.c,v
retrieving revision 1.77
diff -u -r1.77 sys_machdep.c
--- i386/i386/sys_machdep.c 12 Oct 2006 01:30:43 -0000 1.77
+++ i386/i386/sys_machdep.c 9 Nov 2006 04:20:43 -0000
@@ -351,9 +351,9 @@
struct trapframe *tf = l->l_md.md_regs;
struct i386_iopl_args ua;
- if ((error = kauth_authorize_machdep(l->l_cred,
- KAUTH_MACHDEP_X86, KAUTH_REQ_MACHDEP_X86_IOPL,
- NULL, NULL, NULL)) != 0)
+ if ((error = kauth_authorize_system(l->l_cred,
+ KAUTH_SYSTEM_RAWIO, KAUTH_REQ_SYSTEM_RAWIO_MEMORY,
+ KAUTH_REQ_SYSTEM_RAWIO_RW, NULL, NULL)) != 0)
return error;
if ((error = copyin(args, &ua, sizeof(ua))) != 0)
@@ -387,9 +387,9 @@
struct pcb *pcb = &l->l_addr->u_pcb;
struct i386_set_ioperm_args ua;
- if ((error = kauth_authorize_machdep(l->l_cred,
- KAUTH_MACHDEP_X86, KAUTH_REQ_MACHDEP_X86_IOPERM,
- NULL, NULL, NULL)) != 0)
+ if ((error = kauth_authorize_system(l->l_cred,
+ KAUTH_SYSTEM_RAWIO, KAUTH_REQ_SYSTEM_RAWIO_MEMORY,
+ KAUTH_REQ_SYSTEM_RAWIO_RW, NULL, NULL)) != 0)
return error;
if ((error = copyin(args, &ua, sizeof(ua))) != 0)