Re: [PATCH] selinux: drop unused packet flow permissions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2011-02-23 at 08:40 -0500, Christopher J. PeBenito wrote:
> On 02/22/11 21:54, Eric Paris wrote:
> > These permissions are not used and can be dropped in the kernel
> > definitions.
> > 
> > Suggested-by: Stephen Smalley <sds@xxxxxxxxxxxxx>
> > Signed-off-by: Eric Paris <eparis@xxxxxxxxxx>
> > ---
> > 
> >  security/selinux/include/classmap.h |    3 +--
> >  1 files changed, 1 insertions(+), 2 deletions(-)
> > 
> > diff --git a/security/selinux/include/classmap.h b/security/selinux/include/classmap.h
> > index e9a8eb7..fffd855 100644
> > --- a/security/selinux/include/classmap.h
> > +++ b/security/selinux/include/classmap.h
> > @@ -132,8 +132,7 @@ struct security_class_mapping secclass_map[] = {
> >  	{ "appletalk_socket",
> >  	  { COMMON_SOCK_PERMS, NULL } },
> >  	{ "packet",
> > -	  { "send", "recv", "relabelto", "flow_in", "flow_out",
> > -	    "forward_in", "forward_out", NULL } },
> > +	  { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } },
> >  	{ "key",
> >  	  { "view", "read", "write", "search", "link", "setattr", "create",
> >  	    NULL } },
> 
> I'm concerned about this.  Won't this break refpolicy?  I can't keep two
> sets of object class definitions around for systems that still have the
> flow_in and flow_out perms.

This just removes the entries in the kernel table so that the kernel
does not try to look up these permission strings in the policy.  As the
kernel is now dynamically mapping class/perm values, we don't need to
keep placeholders in its tables for obsolete permissions that are not in
use within the kernel (no hook function in the current kernel uses these
permissions).  But we will keep the definitions in refpolicy for older
kernels that predate the dynamic class/perm mappings.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux