linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* SELinux "filtering" capabilities?
@ 2017-04-18 22:37 Casey Schaufler
  2017-04-19 11:58 ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Casey Schaufler @ 2017-04-18 22:37 UTC (permalink / raw)
  To: linux-security-module

I don't expect anyone else to have run into this
as I am working with SELinux and Smack on the same
machine at the same time. While there are a number
of interactions that I can explain, I have one that
is perplexing me. I assume something rational is
going on, but I am having trouble tracking it down.

A process with CAP_MAC_ADMIN can change its Smack label
by writing the new label to /proc/self/attr/smack/current.*
If I have both SELinux and Smack enabled the write fails
with -EPERM, indicating that the process lacks CAP_MAC_ADMIN.
Instrumenting the Smack code verifies that, even though the
process reports having CAP_MAC_ADMIN, the capability is gone
in smack_setprocattr().

It seem that this could be happening in the write() path,
or perhaps an artifact of SELinux not knowing something
special about smackfs. I don't see anything obvious.
Unfortunately, it is going to be somewhat difficult for
me to claim that I have SELinux and Smack working, if not
together, at least begrudgingly on the same system.

----
* The smack subdir of attr isn't upstream yet, but I hope
  to get it there real soon.

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-04-19 17:55 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-04-18 22:37 SELinux "filtering" capabilities? Casey Schaufler
2017-04-19 11:58 ` Stephen Smalley
2017-04-19 17:55   ` Casey Schaufler

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).