From owner-svn-src-all@FreeBSD.ORG Sat Sep 7 07:03:15 2013 Return-Path: Delivered-To: svn-src-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 89012E39; Sat, 7 Sep 2013 07:03:15 +0000 (UTC) (envelope-from glebius@FreeBSD.org) Received: from cell.glebius.int.ru (glebius.int.ru [81.19.69.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 1168A2EFD; Sat, 7 Sep 2013 07:03:14 +0000 (UTC) Received: from cell.glebius.int.ru (localhost [127.0.0.1]) by cell.glebius.int.ru (8.14.7/8.14.7) with ESMTP id r8773DJt024135; Sat, 7 Sep 2013 11:03:13 +0400 (MSK) (envelope-from glebius@FreeBSD.org) Received: (from glebius@localhost) by cell.glebius.int.ru (8.14.7/8.14.7/Submit) id r8773DP9024134; Sat, 7 Sep 2013 11:03:13 +0400 (MSK) (envelope-from glebius@FreeBSD.org) X-Authentication-Warning: cell.glebius.int.ru: glebius set sender to glebius@FreeBSD.org using -f Date: Sat, 7 Sep 2013 11:03:13 +0400 From: Gleb Smirnoff To: Jamie Gritton Subject: Re: svn commit: r255316 - head/sys/kern Message-ID: <20130907070313.GO4574@FreeBSD.org> References: <201309061732.r86HWTha054904@svn.freebsd.org> <20130906181826.GL4574@FreeBSD.org> <522A25FA.5060008@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <522A25FA.5060008@FreeBSD.org> User-Agent: Mutt/1.5.21 (2010-09-15) Cc: svn-src-head@FreeBSD.org, svn-src-all@FreeBSD.org, src-committers@FreeBSD.org X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 07 Sep 2013 07:03:15 -0000 Jamie, On Fri, Sep 06, 2013 at 12:59:06PM -0600, Jamie Gritton wrote: J> > J> + J> > J> + /* J> > J> + * As in the non-jail case, non-root users are expected to be J> > J> + * able to read kernel/phyiscal memory (provided /dev/[k]mem J> > J> + * exists in the jail and they have permission to access it). J> > J> + */ J> > J> + case PRIV_KMEM_READ: J> > J> return (0); J> > J> J> > J> /* J> > J> > Was that discussed anywhere or reviewed by anyone? J> J> Yes, it was brought up by jase@ in src-committers last week, noting that J> my original PRIV_KMEM_* commit (r252841) broke existing jail behavior. J> The entire "discussion" was the mention of the problem and my mention of J> what it would take to fix it. There was no code review as such, but that J> seemed appropriate for an obvious one-liner. I'm sorry then. Does that mean that we always have had ability for a jail-root to investigate kernel memory? -- Totus tuus, Glebius.