[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-security-module
Subject: Re: [RFC][PATCH] Pass requested protection to
From: Stephen Smalley <sds () epoch ! ncsc ! mil>
Date: 2005-02-23 13:09:58
Message-ID: 1109164198.17298.17.camel () moss-spartans ! epoch ! ncsc ! mil
[Download RAW message or body]
On Tue, 2005-02-22 at 15:47 -0800, Chris Wright wrote:
> Only other way I can see is to effectively tweak policy based on
> tsk->personality. While it seems ugly, it's an accurate reflection
> of both policy and reality (with some confusion of audit messages when
> building policy). But your patch is probably the most straight-forward
> way to do it.
Yes, the patch lets us distinguish between application-requested execute
protection and the implied execute protection by read-implies-exec
logic, which I think is useful, e.g. we'll still apply execute-related
checking when ld.so explicitly requests an executable mapping. It also
avoids having to explicitly check current->personality and file-
>f_vfsmnt->mnt_flags again for READ_IMPLIES_EXEC and MNT_NOEXEC
respectively in the security module.
> Do you want to sample prot after it's been cleared of GROWSUP/DOWN bits
> just to keep reqport as clean as possible?
Good idea.
> unnecessary initialization
Ok, thanks.
> Looks an unnecessary duplicate
Yes, good catch.
Ok, I'll rework accordingly and plan to submit post 2.6.11.
--
Stephen Smalley <sds@epoch.ncsc.mil>
National Security Agency
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic