All of lore.kernel.org
 help / color / mirror / Atom feed
From: Casey Schaufler <casey@schaufler-ca.com>
To: Trond Myklebust <Trond.Myklebust@netapp.com>,
	Andrew Morgan <morgan@kernel.org>
Cc: David Howells <dhowells@redhat.com>,
	viro@ftp.linux.org.uk, hch@infradead.org, sds@tycho.nsa.gov,
	casey@schaufler-ca.com, linux-kernel@vger.kernel.org,
	selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org
Subject: Re: [PATCH 3/3] CRED: Move the effective capabilities into the cred struct
Date: Thu, 20 Sep 2007 08:36:57 -0700 (PDT)	[thread overview]
Message-ID: <176624.5520.qm@web36603.mail.mud.yahoo.com> (raw)
In-Reply-To: <1190295535.6763.29.camel@heimdal.trondhjem.org>


--- Trond Myklebust <Trond.Myklebust@netapp.com> wrote:

> On Wed, 2007-09-19 at 21:11 -0700, Andrew Morgan wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> > 
> > David Howells wrote:
> > > Move the effective capabilities mask from the task struct into the
> credentials
> > > record.
> > > 
> > > Note that the effective capabilities mask in the cred struct shadows that
> in
> > > the task_struct because a thread can have its capabilities masks changed
> by
> > > another thread.  The shadowing is performed by update_current_cred()
> which is
> > > invoked on entry to any system call that might need it.
> > 
> > OOC If we were to simply drop support for one process changing the
> > capabilities of another, would we need this patch?
> 
> No. This has nothing to do about one process changing some other
> process' capabilities. It has to do with being able to pass security
> information around the kernel beyond the confines of the task struct.
> 
> This is needed in order to deal with asynchronous i/o where security
> checks may have to be deferred, and where the task struct may no longer
> be available.
> One example would be a failover situation when doing deferred writes: if
> the first choice of storage medium is unavailable, and the kernel tries
> to fail the write over to another storage. On NFS that might involve
> having to build up a new RPCSEC_GSS security context for the new server.
> Currently, you cannot do this safely because all the security info is
> cached in the task struct and much of it cannot be copied.

Ok, what can't be copied, and why can't it be copied?


Casey Schaufler
casey@schaufler-ca.com

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

WARNING: multiple messages have this Message-ID (diff)
From: Casey Schaufler <casey@schaufler-ca.com>
To: Trond Myklebust <Trond.Myklebust@netapp.com>,
	Andrew Morgan <morgan@kernel.org>
Cc: David Howells <dhowells@redhat.com>,
	viro@ftp.linux.org.uk, hch@infradead.org, sds@tycho.nsa.gov,
	casey@schaufler-ca.com, linux-kernel@vger.kernel.org,
	selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org
Subject: Re: [PATCH 3/3] CRED: Move the effective capabilities into the cred struct
Date: Thu, 20 Sep 2007 08:36:57 -0700 (PDT)	[thread overview]
Message-ID: <176624.5520.qm@web36603.mail.mud.yahoo.com> (raw)
In-Reply-To: <1190295535.6763.29.camel@heimdal.trondhjem.org>


--- Trond Myklebust <Trond.Myklebust@netapp.com> wrote:

> On Wed, 2007-09-19 at 21:11 -0700, Andrew Morgan wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> > 
> > David Howells wrote:
> > > Move the effective capabilities mask from the task struct into the
> credentials
> > > record.
> > > 
> > > Note that the effective capabilities mask in the cred struct shadows that
> in
> > > the task_struct because a thread can have its capabilities masks changed
> by
> > > another thread.  The shadowing is performed by update_current_cred()
> which is
> > > invoked on entry to any system call that might need it.
> > 
> > OOC If we were to simply drop support for one process changing the
> > capabilities of another, would we need this patch?
> 
> No. This has nothing to do about one process changing some other
> process' capabilities. It has to do with being able to pass security
> information around the kernel beyond the confines of the task struct.
> 
> This is needed in order to deal with asynchronous i/o where security
> checks may have to be deferred, and where the task struct may no longer
> be available.
> One example would be a failover situation when doing deferred writes: if
> the first choice of storage medium is unavailable, and the kernel tries
> to fail the write over to another storage. On NFS that might involve
> having to build up a new RPCSEC_GSS security context for the new server.
> Currently, you cannot do this safely because all the security info is
> cached in the task struct and much of it cannot be copied.

Ok, what can't be copied, and why can't it be copied?


Casey Schaufler
casey@schaufler-ca.com

  reply	other threads:[~2007-09-20 15:44 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-09-19 16:17 [PATCH 0/3] Introduce credential record David Howells
2007-09-19 16:17 ` David Howells
2007-09-19 16:17 ` [PATCH 1/3] CRED: Introduce a COW credentials record David Howells
2007-09-19 16:17   ` David Howells
2007-09-19 16:18 ` [PATCH 2/3] CRED: Split the task security data and move part of it into struct cred David Howells
2007-09-19 16:18   ` David Howells
2007-09-19 17:28   ` Casey Schaufler
2007-09-19 17:28     ` Casey Schaufler
2007-09-19 22:57     ` David Howells
2007-09-19 22:57       ` David Howells
2007-09-20 16:31       ` Casey Schaufler
2007-09-20 16:31         ` Casey Schaufler
2007-09-20 17:17         ` David Howells
2007-09-20 17:17           ` David Howells
2007-09-20 17:33           ` David Howells
2007-09-20 17:33             ` David Howells
2007-09-24 14:00   ` Serge E. Hallyn
2007-09-24 14:00     ` Serge E. Hallyn
2007-09-24 14:21     ` Stephen Smalley
2007-09-24 14:21       ` Stephen Smalley
2007-09-24 15:35       ` Serge E. Hallyn
2007-09-24 15:35         ` Serge E. Hallyn
2007-09-24 15:52         ` David Howells
2007-09-24 15:52           ` David Howells
2007-09-26 13:30       ` David Howells
2007-09-26 13:30         ` David Howells
2007-09-26 14:14         ` Stephen Smalley
2007-09-26 14:14           ` Stephen Smalley
2007-09-26 14:58         ` Casey Schaufler
2007-09-26 14:58           ` Casey Schaufler
2007-09-19 16:18 ` [PATCH 3/3] CRED: Move the effective capabilities into the cred struct David Howells
2007-09-19 16:18   ` David Howells
2007-09-20  4:11   ` Andrew Morgan
2007-09-20  4:11     ` Andrew Morgan
2007-09-20  8:15     ` David Howells
2007-09-20  8:15       ` David Howells
2007-09-20 13:38     ` Trond Myklebust
2007-09-20 15:36       ` Casey Schaufler [this message]
2007-09-20 15:36         ` Casey Schaufler
2007-09-20 16:09         ` Trond Myklebust
2007-09-26 18:23     ` Al Viro

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=176624.5520.qm@web36603.mail.mud.yahoo.com \
    --to=casey@schaufler-ca.com \
    --cc=Trond.Myklebust@netapp.com \
    --cc=dhowells@redhat.com \
    --cc=hch@infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=morgan@kernel.org \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    --cc=viro@ftp.linux.org.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.