On Mon, Jun 18, 2018 at 02:59:50PM -0700, Mark Salyzyn wrote: > On 06/18/2018 12:43 PM, Vivek Goyal wrote: > > Will it be acceptable to write security policies in such a way so that > > mounter has access as well. > Unfortunately No. Policy of minimizing attack surface for a contained root > service (init in this case). Just because it can mount, does not mean it can > modify critical content; an attacker could use this to open a hole. > > > Current model does assume that mounter has privileges on underlying files. > > Only ones it appears to need is the workdir AFAIK, had to add ability to > create in the <wordir> xattr in order to enable r/w mounts later. Although > not all corners were tested, I did not see any copy_up issues b/c the caller > had the privs in the Android security model when mounted with this new flag. So in this system all callers are priviliged and have the capability to mknod and set trusted xattrs. (Amir mentioned the reason why we switch creds). If not, then file unlink (Should do mknod), lower non-empty directory rename (should set trusted REDIRECT) and bunch of other operations should fail. Thanks Vivek -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html