linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [RFC]Introduce generalized hooks for getting and setting inode secctx v3
@ 2008-03-18 18:57 David P. Quigley
       [not found] ` <1205866664-24902-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
  2008-03-19 13:38 ` [RFC]Introduce generalized hooks for getting and setting inode secctx v3 Casey Schaufler
  0 siblings, 2 replies; 31+ messages in thread
From: David P. Quigley @ 2008-03-18 18:57 UTC (permalink / raw)
  To: casey-iSGtlc1asvQWG2LlvL+J4A, chrisw-69jw2NvuJkxg9hUCZPvPmw,
	sds-+05T5uksL2qpZYMLLGbcSA, jmorris-gx6/JNMH7DfYtjvyW6yDsg,
	hch-jcswGhMUV9g, viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn
  Cc: selinux-+05T5uksL2qpZYMLLGbcSA,
	linux-security-module-u79uwXL29TY76Z2rM5mHXA,
	linux-fsdevel-u79uwXL29TY76Z2rM5mHXA,
	nfsv4-6DNke4IJHB0gsBAKwltoeQ

This patch set does two things. First it factors the section of vfs_setxattr
that does the real work into a helper function. This allows LSMs the ability to
set the xattrs they need without hitting the permission check inside
vfs_setxattr each time. Second it introduces three new hooks
inode_{get,set}secctx, and inode_notifysecctx.

The first hook retreives all security information the
LSM feels is relavent in the form of a security context. The second hook given
this context can sets both the in-core and on-disk store for the particular
inode. The third hook is used to notify the in-core inode of a change to it's
security state.

This is the third revision of this patch which takes into account concerns by
Casey Schaufler, and Christop Hellwig.

fs/xattr.c               |   55 +++++++++++++++++++++++++++++++++++-----------
 include/linux/security.h |   37 +++++++++++++++++++++++++++++++
 include/linux/xattr.h    |    3 +-
 security/dummy.c         |   17 ++++++++++++++
 security/security.c      |   18 +++++++++++++++
 security/selinux/hooks.c |   32 ++++++++++++++++++++++++++-
 6 files changed, 147 insertions(+), 15 deletions(-)

^ permalink raw reply	[flat|nested] 31+ messages in thread
* [RFC]Introduce generalized hooks for getting and setting inode secctx
@ 2008-03-05 18:54 David P. Quigley
  2008-03-05 18:54 ` [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information David P. Quigley
  0 siblings, 1 reply; 31+ messages in thread
From: David P. Quigley @ 2008-03-05 18:54 UTC (permalink / raw)
  To: casey-iSGtlc1asvQWG2LlvL+J4A, chrisw-69jw2NvuJkxg9hUCZPvPmw,
	sds-+05T5uksL2qpZYMLLGbcSA, jmorris-gx6/JNMH7DfYtjvyW6yDsg,
	hch-jcswGhMUV9g, viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn
  Cc: selinux-+05T5uksL2qpZYMLLGbcSA,
	linux-security-module-u79uwXL29TY76Z2rM5mHXA,
	linux-fsdevel-u79uwXL29TY76Z2rM5mHXA

This patch set does two things. First it factors the section of vfs_setxattr
that does the real work into a helper function. This allows LSMs the ability to
set the xattrs they need without hitting the permission check inside
vfs_setxattr each time. Second it introduces two new hooks
inode_{get,set}secctx. The first hook retreives all security information the
LSM feels is relavent in the form of a security context. The second hook given
this context can set the in-core and on-disk store for the particular inode.
This differentiation is necessary since there are times when it is necessary
only to set the in-core representation.

^ permalink raw reply	[flat|nested] 31+ messages in thread

end of thread, other threads:[~2008-03-19 15:24 UTC | newest]

Thread overview: 31+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-03-18 18:57 [RFC]Introduce generalized hooks for getting and setting inode secctx v3 David P. Quigley
     [not found] ` <1205866664-24902-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
2008-03-18 18:57   ` [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx David P. Quigley
2008-03-18 18:57   ` [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information David P. Quigley
2008-03-19 13:38 ` [RFC]Introduce generalized hooks for getting and setting inode secctx v3 Casey Schaufler
     [not found]   ` <868245.60928.qm-he8kWsucR9OvuULXzWHTWIglqE1Y4D90QQ4Iyu8u01E@public.gmane.org>
2008-03-19 14:19     ` James Morris
2008-03-19 14:28     ` Stephen Smalley
2008-03-19 15:11       ` Casey Schaufler
2008-03-19 15:20         ` Stephen Smalley
2008-03-19 15:24         ` James Morris
  -- strict thread matches above, loose matches on Subject: below --
2008-03-05 18:54 [RFC]Introduce generalized hooks for getting and setting inode secctx David P. Quigley
2008-03-05 18:54 ` [PATCH 2/2] LSM/SELinux: inode_{get,set}secctx hooks to access LSM security context information David P. Quigley
2008-03-05 20:45   ` Paul Moore
2008-03-05 20:54     ` Stephen Smalley
2008-03-05 22:28   ` Casey Schaufler
2008-03-06 12:30   ` Christoph Hellwig
2008-03-06 13:50     ` Stephen Smalley
2008-03-06 13:54       ` Christoph Hellwig
2008-03-06 14:05         ` Stephen Smalley
2008-03-06 14:07           ` Christoph Hellwig
2008-03-06 14:25             ` James Morris
2008-03-06 14:48               ` Stephen Smalley
2008-03-06 17:13                 ` Dave Quigley
2008-03-07 10:03                   ` Christoph Hellwig
     [not found]                     ` <20080307100353.GA16831-jcswGhMUV9g@public.gmane.org>
2008-03-07 16:06                       ` Dave Quigley
2008-03-07 16:54                         ` Miklos Szeredi
     [not found]                           ` <E1JXfpu-0001d1-57-8f8m9JG5TPIdUIPVzhDTVZP2KDSNp7ea@public.gmane.org>
2008-03-07 17:30                             ` Dave Quigley
2008-03-07 20:24                               ` Miklos Szeredi
2008-03-07 21:07                                 ` Dave Quigley
2008-03-07 21:46                                   ` Miklos Szeredi
2008-03-08  0:24                                     ` Brad Boyer
2008-03-07 21:23                         ` Dave Quigley
2008-03-08 11:49                           ` Christoph Hellwig

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).