RE: hierarchy_check_constraints() needs reworks?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



KaiGai Kohei wrote:
> 
> In addition, I found two more potential matter in this code.
> 
> The first one is lack of checks for permissions via attribute.
> When a child domain has an attribute which does not applied
> to the parent one, the child can have wider permissions that
> its parent.
> I think any attribute attached to child domain also have to
> be attached to the parent domain.
> (I guess it derived from legacy attribute implementation.)
>

Hierarchy.c:409, expand_avtab will expand all attribute usage into the
avtab. We don't care about attribute usage, only about net permissions
granted. 
 
> The later one is dependencies to the state of boolean.
> Hierarchy constraint allows a child domain to have
> permissions which are enabled for the parent, only if
> specific boolean is turned on. It potentially makes a
> situation that child domain has wider permissions.
> I think it is difficult to check in the policy toolchain, so
> checks on an avc entry creation is better way.
> 

We don't consider the state of booleans when doing analysis of the
policy. The idea was that the avtab is the maximum permissions allowed
and we always test on the maximum permissions. Whether a boolean may
reduce the parents permissions without doing so to the child I think is
a non-issue. Do you have an example of why this might be detrimental?


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux