Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030381AbXAHWi1 (ORCPT ); Mon, 8 Jan 2007 17:38:27 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S964977AbXAHWi1 (ORCPT ); Mon, 8 Jan 2007 17:38:27 -0500 Received: from e4.ny.us.ibm.com ([32.97.182.144]:48929 "EHLO e4.ny.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964982AbXAHWi0 (ORCPT ); Mon, 8 Jan 2007 17:38:26 -0500 In-Reply-To: <20070108134152.GA19811@infradead.org> To: Christoph Hellwig Cc: akpm@osdl.org, kjhall@linux.vnet.ibm.com, linux-kernel@vger.kernel.org, safford@watson.ibm.com MIME-Version: 1.0 Subject: Re: mprotect abuse in slim X-Mailer: Lotus Notes Release 7.0.1P Oct 16, 2006 Message-ID: From: Mimi Zohar Date: Mon, 8 Jan 2007 17:38:25 -0500 X-MIMETrack: Serialize by Router on D01ML604/01/M/IBM(Build V80_M3_10312006|October 31, 2006) at 01/08/2007 17:38:25, Serialize complete at 01/08/2007 17:38:25 Content-Type: text/plain; charset="US-ASCII" Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 884 Lines: 21 SLIM implements dynamic process labels, so when a process is demoted, we must be able to revoke write access to some resources to which it has previously valid handles. For example, if a shell reads an untrusted file, the shell is demoted, and write access to more trusted files revoked. Based on previous comments on lkml, we understand that this is not really possible in general, so SLIM only attempts to revoke access in certain simple cases. Starting with the fdtable, would it help if we move the fdtable tweaking out of slim itself and into helpers? Or can you recommend another way to implement this functionality. Mimi Zohar - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/