lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 24 Sep 2007 16:52:55 +0100
From:	David Howells <dhowells@...hat.com>
To:	"Serge E. Hallyn" <serge@...lyn.com>
Cc:	dhowells@...hat.com, Stephen Smalley <sds@...ho.nsa.gov>,
	viro@....linux.org.uk, hch@...radead.org,
	Trond.Myklebust@...app.com, casey@...aufler-ca.com,
	linux-kernel@...r.kernel.org, selinux@...ho.nsa.gov,
	linux-security-module@...r.kernel.org
Subject: Re: [PATCH 2/3] CRED: Split the task security data and move part of it into struct cred

Serge E. Hallyn <serge@...lyn.com> wrote:

> Ah, ok, so the daemon would use this to act under the user's
> credentials.  I was thinking the user would be using this to act
> under the daemon's or kernel's sid.

Think kernel service rather than daemon.  NFSd provides its own daemons to
override the security of, whereas cachefiles runs in the process context of
whoever called NFS.

> Between that and David's response, that this is only for the duration of
> one syscall (IIUC),

That's more or less correct.  You have to add the pagefault handler to that
list.

> My worry arose from the fact that I don't see
> security_cred_kernel_act_as() being called anywhere in this patchset...

Look in:

[PATCH 04/22] CRED: Request a credential record for a kernel service

Which was part of a patchset I sent on the 21st Sept.  get_kernel_cred() is in
turn used by:

[PATCH 13/22] CacheFiles: A cache that backs onto a mounted filesystem

David
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ