linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Adding a security parameter to VFS functions
@ 2007-08-15 11:40 David Howells
  2007-08-15 16:23 ` Casey Schaufler
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: David Howells @ 2007-08-15 11:40 UTC (permalink / raw)
  To: torvalds, viro
  Cc: nfsv4, linux-kernel, dhowells, linux-fsdevel,
	linux-security-module, selinux, casey, sds


Hi Linus, Al,

Would you object greatly to functions like vfs_mkdir() gaining a security
parameter?  What I'm thinking of is this:

	int vfs_mkdir(struct inode *dir, struct dentry *dentry, int mode,
		      struct security *security)

Where the security context is the state of the context at the time the call
was issued:

	struct security {
		uid_t			fsuid;
		git_t			fsgid;
		struct group_info	*group_info;
		void			*security;
		struct key		*session_keyring;
		struct key		*process_keyring;
		struct key		*thread_keyring;

And perhaps:

		struct audit_context	*audit_context;
		seccomp_t		seccomp;
	};

This would, for the most part, be a temporary affair, being set up by such as
sys_mkdir()/sys_mkdirat() from data held in task_struct.

This information would then be passed into the filesystem and LSM layers so
that files, directories, etc. can be created, opened, deleted, or otherwise
mangled based on these security items, rather than the one in whichever
task_struct is current.


The reason for doing this would be to support an act-as interface, so that
services such as nfsd and cachefiles could act with different security details
to the ones attached to the task.  This would have a couple of potential
benefits:

 (1) nfsd threads don't have to keep changing their security contexts.

 (2) cachefiles can act on behalf of a process without changing its security
     context.


Note that I/O operations such as read, write and ioctl would *not* be passed
this data as the file struct should contain the relevant security information.
Similarly, page I/O operations would also not need alteration as the VMA
covering the region points to a file struct, which holds the appropriate
security.

David

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2007-08-20 12:09 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-08-15 11:40 Adding a security parameter to VFS functions David Howells
2007-08-15 16:23 ` Casey Schaufler
2007-08-15 16:52   ` David Howells
2007-08-16 22:20   ` Andreas Gruenbacher
2007-08-16 22:36 ` Andreas Gruenbacher
2007-08-16 22:57 ` Linus Torvalds
2007-08-16 23:30   ` Kyle Moffett
2007-08-16 23:34   ` Al Viro
2007-08-17 18:05     ` Andreas Gruenbacher
2007-08-20 12:09 ` David Howells

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).