Re: selinux_inode_setsecurity and fsetxattr

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:

> 
> On Fri, 2008-01-18 at 10:38 -0800, Casey Schaufler wrote:
> > --- Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
> > 
> > > 
> > > On Fri, 2008-01-18 at 08:40 -0800, Casey Schaufler wrote:
> > > > I was looking in selinux_inode_setsecurity for my own
> > > > neffarious purposes and was curious what prevents a program
> > > > that has a file open from setting the context on the file
> > > > using fsetxattr. I confess that I haven't tried it to see
> > > > how it actually behaves.
> > > 
> > > Sorry, what's your question?  Of course you can relabel a file via
> > > fsetxattr (if you pass the permission check, which is a different hook
> > > called earlier).
> > 
> > In the case of fsetxattr, which hook would that be?
> 
> All three setxattr system calls ultimately call vfs_setxattr(), which
> calls security_inode_setxattr() to check security module permissions.
> If it passes that check, then it proceeds to the actual processing,
> which follows different paths depending on whether the fs implements a
> setxattr operation or not.
> 
> security_inode_setsecurity() is just the low level primitive for setting
> the value in the in-core security structure and can be called either
> from the vfs (as the fallback) or from the individual fs op (as in
> tmpfs).  Originally only the latter before the vfs fallbacks were
> introduced.

Thank you. That was what I was looking for.


Casey Schaufler
casey@xxxxxxxxxxxxxxxx

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux