Re: [PATCH] EVM: Allow runtime modification of the set of verified xattrs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Apr 16, 2018 at 1:16 PM Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx> wrote:

> On Mon, 2018-04-16 at 18:32 +0000, Matthew Garrett wrote:
> > Runtime. I'll look into the post-init stuff, but given that this doesn't
> > change the current security position do you think it's a blocker?

> I would probably make the existing evm_config_xattrnames a const and
> create a link list.  As new xattrs are defined, append them to the
> tail.

Ok, that's definitely an option. But thinking about it some more - if an
attacker has arbitrary memory overwrite of writable pages, wouldn't it be
easier for them to just overwrite the policy and disable appraisal?

> Is there a reason for adding one additional xattrs one at a time, as
> opposed to parsing a string?

Mostly to avoid introducing more string parsing into the kernel.

> Is it better to define a securityfs file, rather than a boot command
> line argument?  With a boot command line argument, the list of xattrs
> could be defined as __ro_after_init.

I could go either way on this - I think that doing it on the command line
would satisfy all my use cases.



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux