linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
@ 2017-09-28 22:34 Eric W. Biederman
  2017-09-29  1:16 ` Casey Schaufler
  2017-09-29 12:36 ` Stephen Smalley
  0 siblings, 2 replies; 20+ messages in thread
From: Eric W. Biederman @ 2017-09-28 22:34 UTC (permalink / raw)
  To: linux-security-module


It looks like once upon a time a long time ago selinux copied code
from cap_inode_removexattr and cap_inode_setxattr into
selinux_inode_setotherxattr.  However the code has now diverged and
selinux is implementing a policy that is quite different than
cap_inode_setxattr and cap_inode_removexattr especially when it comes
to the security.capable xattr.

To keep things working and to make the comments in security/security.c
correct when the xattr is securit.capable, call cap_inode_setxattr
or cap_inode_removexattr as appropriate.

I suspect there is a larger conversation to be had here but this
is enough to keep selinux from implementing a non-sense hard coded
policy that breaks other parts of the kernel.

Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
---
 security/selinux/hooks.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index f5d304736852..edf4bd292dc7 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3167,6 +3167,9 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
 	u32 newsid, sid = current_sid();
 	int rc = 0;
 
+	if (strcmp(name, XATTR_NAME_CAPS) == 0)
+		return cap_inode_setxattr(dentry, name, value, size, flags);
+
 	if (strcmp(name, XATTR_NAME_SELINUX))
 		return selinux_inode_setotherxattr(dentry, name);
 
@@ -3282,6 +3285,9 @@ static int selinux_inode_listxattr(struct dentry *dentry)
 
 static int selinux_inode_removexattr(struct dentry *dentry, const char *name)
 {
+	if (strcmp(name, XATTR_NAME_CAPS) == 0)
+		return cap_inode_removexattr(dentry, name);
+
 	if (strcmp(name, XATTR_NAME_SELINUX))
 		return selinux_inode_setotherxattr(dentry, name);
 
-- 
2.14.1

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply related	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2017-10-04 14:53 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-09-28 22:34 [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave Eric W. Biederman
2017-09-29  1:16 ` Casey Schaufler
2017-09-29 14:18   ` Stephen Smalley
2017-09-29 15:46     ` Casey Schaufler
2017-09-30 16:22       ` Eric W. Biederman
2017-09-30 17:01         ` Casey Schaufler
2017-09-30 20:40           ` Eric W. Biederman
2017-09-30 23:22             ` Casey Schaufler
2017-10-01  1:02               ` Eric W. Biederman
2017-10-01 18:52                 ` Casey Schaufler
2017-10-01 19:54                   ` Serge E. Hallyn
2017-10-01 22:11                   ` Eric W. Biederman
2017-09-29 12:36 ` Stephen Smalley
2017-10-02  3:26   ` Eric W. Biederman
2017-10-02 14:38   ` [PATCH] selinux: Perform both commoncap and selinux xattr checks Eric W. Biederman
2017-10-02 15:52     ` Serge E. Hallyn
2017-10-03 16:24     ` Stephen Smalley
2017-10-03 21:08     ` Paul Moore
2017-10-03 21:26       ` Eric W. Biederman
2017-10-04 14:53         ` Paul Moore

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).