[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <11732.1190649175@redhat.com>
Date: Mon, 24 Sep 2007 16:52:55 +0100
From: David Howells <dhowells@...hat.com>
To: "Serge E. Hallyn" <serge@...lyn.com>
Cc: dhowells@...hat.com, Stephen Smalley <sds@...ho.nsa.gov>,
viro@....linux.org.uk, hch@...radead.org,
Trond.Myklebust@...app.com, casey@...aufler-ca.com,
linux-kernel@...r.kernel.org, selinux@...ho.nsa.gov,
linux-security-module@...r.kernel.org
Subject: Re: [PATCH 2/3] CRED: Split the task security data and move part of it into struct cred
Serge E. Hallyn <serge@...lyn.com> wrote:
> Ah, ok, so the daemon would use this to act under the user's
> credentials. I was thinking the user would be using this to act
> under the daemon's or kernel's sid.
Think kernel service rather than daemon. NFSd provides its own daemons to
override the security of, whereas cachefiles runs in the process context of
whoever called NFS.
> Between that and David's response, that this is only for the duration of
> one syscall (IIUC),
That's more or less correct. You have to add the pagefault handler to that
list.
> My worry arose from the fact that I don't see
> security_cred_kernel_act_as() being called anywhere in this patchset...
Look in:
[PATCH 04/22] CRED: Request a credential record for a kernel service
Which was part of a patchset I sent on the 21st Sept. get_kernel_cred() is in
turn used by:
[PATCH 13/22] CacheFiles: A cache that backs onto a mounted filesystem
David
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists