Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966468AbWKTT5E (ORCPT ); Mon, 20 Nov 2006 14:57:04 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S966602AbWKTT5E (ORCPT ); Mon, 20 Nov 2006 14:57:04 -0500 Received: from mx1.redhat.com ([66.187.233.31]:35518 "EHLO mx1.redhat.com") by vger.kernel.org with ESMTP id S966468AbWKTT5B (ORCPT ); Mon, 20 Nov 2006 14:57:01 -0500 Message-ID: <4562085F.1040900@mentalrootkit.com> Date: Mon, 20 Nov 2006 14:56:15 -0500 From: Karl MacMillan User-Agent: Thunderbird 1.5.0.7 (X11/20061027) MIME-Version: 1.0 To: Stephen Smalley CC: James Morris , David Howells , Linus Torvalds , Andrew Morton , trond.myklebust@fys.uio.no, selinux@tycho.nsa.gov, linux-kernel@vger.kernel.org, aviro@redhat.com, steved@redhat.com Subject: Re: [PATCH 12/19] CacheFiles: Permit a process's create SID to be overridden References: <20061114200621.12943.18023.stgit@warthog.cambridge.redhat.com> <20061114200647.12943.39802.stgit@warthog.cambridge.redhat.com> <1164048073.13758.29.camel@moss-spartans.epoch.ncsc.mil> In-Reply-To: <1164048073.13758.29.camel@moss-spartans.epoch.ncsc.mil> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1305 Lines: 35 Stephen Smalley wrote: > On Tue, 2006-11-14 at 16:19 -0500, James Morris wrote: >> On Tue, 14 Nov 2006, David Howells wrote: >> >>> +static u32 selinux_set_fscreate_secid(u32 secid) >>> +{ >>> + struct task_security_struct *tsec = current->security; >>> + u32 oldsid = tsec->create_sid; >>> + >>> + tsec->create_sid = secid; >>> + return oldsid; >>> +} >> The ability to set this needs to be mediated via MAC policy. >> >> See selinux_setprocattr() > > That's different - selinux_set_fscreate_secid() is for internal use by a > kernel module that wishes to temporarily assume a particular fscreate > SID, whereas selinux_setprocattr() handles userspace writes > to /proc/self/attr nodes. Imposing a permission check here makes no > sense. > Since that discussion last week I have been thinking about this and I have to say I agree with Steve. This should be a kernel only mechanism for impersonating another SID - controlling the setting of process attributes shouldn't be restricted as this will only lead to inconsistencies in those attributes. Karl - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/