From: Eric Paris <eparis@redhat.com>
To: Serge Hallyn <serge.hallyn@canonical.com>
Cc: Vasiliy Kulikov <segoon@openwall.com>,
linux-kernel@vger.kernel.org,
linux-security-module@vger.kernel.org, apparmor@lists.ubuntu.com,
"selinux@tycho.nsa.gov Stephen Smalley" <sds@tycho.nsa.gov>,
James Morris <jmorris@namei.org>,
Eric Paris <eparis@parisplace.org>,
John Johansen <john.johansen@canonical.com>,
kernel-hardening@lists.openwall.com, serge@hallyn.com
Subject: Re: [RFC v2] security: intoduce ptrace_task_may_access_current
Date: Mon, 20 Jun 2011 12:50:33 -0400 [thread overview]
Message-ID: <4DFF7A59.40200@redhat.com> (raw)
In-Reply-To: <20110620150001.GF12469@mail.hallyn.com>
On 06/20/2011 11:00 AM, Serge Hallyn wrote:
> Quoting Eric Paris (eparis@redhat.com):
>> Ahhhh, I feel so unhappy with capability code these days. Serge can
>> you come to the rescue? I'm really really starting to dislike the
>> fact that we have lots of code flows that goes
>> kernel->kernel/capablities->LSM->security/capabilities. Which is a
>> very strange calling convention. I'd like to stop adding any calls
>> to kernel/capability.c and everything from now on needs to be done
>> with an LSM function named security_*. I'd really like to see
>> kernel/capabilities stripped back to nothing but syscall handling
>> and move all of has_capability, has_ns_capability, ns_capable,
>> task_ns_capable, and all that crap moved to normal LSM calls.
>
> I can see why you'd feel that way, but I'd like to hold off on that
> until we get targeted capabilities and VFS user namespace support ironed
> out. I'm working on it right now (at
> http://kernel.ubuntu.com/git?p=serge/userns-2.6.git;a=summary)
>
> I certainly do not want the targeted stuff duplicated in every LSM.
> Maybe we can move that stuff into security/security.c though.
>
> Anyway I'm just coming back after leave, and only ever took a
> quick glance at this patch. I'll look again.
I'm certainly not asking for you to throw down everything you have to do
and rewrite all of this code! But I'd like to see a slow move towards
the elimination of kernel/capability.c and wondered if you agreed that
was a good idea. If so, this can be the first place we start to think
about how to move intelligently to use LSM functions rather than direct
capability calls. I like the idea that he use the has_* functions
instead of creating new ones in there.
Hopefully you can help guide us on the right path Serge!
-Eric
prev parent reply other threads:[~2011-06-20 16:51 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-06-17 17:11 [RFC v2] security: intoduce ptrace_task_may_access_current Vasiliy Kulikov
2011-06-20 14:22 ` Eric Paris
2011-06-20 14:40 ` Vasiliy Kulikov
2011-06-20 14:43 ` Vasiliy Kulikov
2011-06-20 14:44 ` Eric Paris
2011-06-20 15:00 ` Serge Hallyn
2011-06-20 15:44 ` Vasiliy Kulikov
2011-06-20 15:51 ` Serge E. Hallyn
2011-06-20 16:50 ` Eric Paris [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4DFF7A59.40200@redhat.com \
--to=eparis@redhat.com \
--cc=apparmor@lists.ubuntu.com \
--cc=eparis@parisplace.org \
--cc=jmorris@namei.org \
--cc=john.johansen@canonical.com \
--cc=kernel-hardening@lists.openwall.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=sds@tycho.nsa.gov \
--cc=segoon@openwall.com \
--cc=serge.hallyn@canonical.com \
--cc=serge@hallyn.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox