Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759211AbYBYUnV (ORCPT ); Mon, 25 Feb 2008 15:43:21 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757026AbYBYUnM (ORCPT ); Mon, 25 Feb 2008 15:43:12 -0500 Received: from x346.tv-sign.ru ([89.108.83.215]:44191 "EHLO mail.screens.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756685AbYBYUnL (ORCPT ); Mon, 25 Feb 2008 15:43:11 -0500 Date: Mon, 25 Feb 2008 23:42:07 +0300 From: Oleg Nesterov To: Casey Schaufler Cc: Stephen Smalley , Andrew Morton , David Quigley , "Eric W. Biederman" , Eric Paris , Harald Welte , Pavel Emelyanov , "Serge E. Hallyn" , linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/3] kill_pid_info_as_uid: don't use security_task_kill() Message-ID: <20080225204207.GA116@tv-sign.ru> References: <1203965042.2804.196.camel@moss-spartans.epoch.ncsc.mil> <976891.59157.qm@web36608.mail.mud.yahoo.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <976891.59157.qm@web36608.mail.mud.yahoo.com> User-Agent: Mutt/1.5.11 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1570 Lines: 39 On 02/25, Casey Schaufler wrote: > > --- Stephen Smalley wrote: > > > > > ... > > > > > > I think we should omit the permission checks completely, the task which > > does > > > ioctl(USBDEVFS_SUBMITURB) explicitly asks to send the signal to it, we > > should > > > not deny the signal even if the task changes its credentials in any way. > > > > If we are applying checks based on uid/gid to protect suid/sgid > > programs, then we ought to also invoke the LSM hook to allow protection > > of other credential-changing transformations, like SELinux context > > transitions. You either remove all checking or none, please. And if > > all, what's the rationale? > > Perhaps more important to my mind is what lead the developers of > this code to go to such significant lengths to provide this access > check in the first place. Why was it considered sufficiently important? > I concur that it's an ugly bit of hackery, but someone must have felt > it was necessary or they wouldn't have done it. Previously, USB used "pid_t pid" as a target for the signal. This pid could be reused by the completely unrelated process, these checks ensure that we at least doesn't kill the wrong user in this case. Now we are using "struct pid", this means that the signal always goes to the "right" task. Oleg. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/