[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YurtfvdeYh0kLd+8@gmail.com>
Date: Wed, 3 Aug 2022 21:49:50 +0000
From: Eric Biggers <ebiggers@...nel.org>
To: Daniil Lunev <dlunev@...omium.org>
Cc: Zdenek Kabelac <zdenek.kabelac@...il.com>,
Brian Geffon <bgeffon@...gle.com>,
Mike Snitzer <snitzer@...nel.org>,
linux-kernel@...r.kernel.org, dm-devel@...hat.com,
Mikulas Patocka <mpatocka@...hat.com>,
Alasdair Kergon <agk@...hat.com>
Subject: Re: [dm-devel] [PATCH 1/1] dm: add message command to disallow
device open
On Thu, Aug 04, 2022 at 06:44:53AM +1000, Daniil Lunev wrote:
> > Have you also considered unlinking the device node (/dev/dm-$idx) from the
> > filesystem after it has been set up for swap?
> Yes, the node can be re-linked with mknod, thus is not a suitable solution.
I thought you were trying to defend against path traversal attacks, not
arbitrary code execution? If your threat model includes arbitrary code
execution by root, you really need to be using SELinux.
- Eric
Powered by blists - more mailing lists