Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755012Ab0DUCZw (ORCPT ); Tue, 20 Apr 2010 22:25:52 -0400 Received: from e35.co.us.ibm.com ([32.97.110.153]:49751 "EHLO e35.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754316Ab0DUCZs (ORCPT ); Tue, 20 Apr 2010 22:25:48 -0400 Date: Tue, 20 Apr 2010 21:25:46 -0500 From: "Serge E. Hallyn" To: Andrew Lutomirski Cc: Stephen Smalley , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Eric Biederman , "Andrew G. Morgan" Subject: Re: [PATCH 0/3] Taming execve, setuid, and LSMs Message-ID: <20100421022546.GA23877@us.ibm.com> References: <20100419172639.GA15800@us.ibm.com> <20100419213952.GA28494@hallyn.com> <1271767039.30027.50.camel@moss-pluto.epoch.ncsc.mil> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1309 Lines: 34 Quoting Andrew Lutomirski (luto@mit.edu): > On Tue, Apr 20, 2010 at 8:37 AM, Stephen Smalley wrote: > > On Mon, 2010-04-19 at 16:39 -0500, Serge E. Hallyn wrote: > >> Quoting Andrew Lutomirski (luto@mit.edu): > >> > ? 1. LSM transitions already scare me enough, and if anyone relies on > >> > them working in concert with setuid, then the mere act of separating > >> > them might break things, even if the "privileged" (by LSM) app in > >> > question is well-written. > >> > >> hmm... > >> > >> A good point. > > > > At least in the case of SELinux, context transitions upon execve are > > already disabled in the nosuid case, and Eric's patch updated the > > SELinux test accordingly. > > I don't see that code in current -linus, nor do I see where SELinux > affects dumpability. What's supposed to happen? I'm writing a patch > right now to clean this stuff up. check out security/selinux/hooks.c:selinux_bprm_set_creds() if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID) new_tsec->sid = old_tsec->sid; I assume that's it? -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/