-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Andrew,
Just to be clear, I'm not sure I agree that I'm hiding anything! I've tried very hard to limit this functionality to only being enabled if the still experimental LSM CONFIG_SECURITY_FILE_CAPABILITIES is yes. I've also arranged for all of the relevant support code to be inside an LSM. However, I'll do as you say - extend the comment and fix the thinko pointed out by Serge, and resubmit to more than the LSM list. Cheers Andrew Andrew Morton wrote: | On Wed, 30 Jan 2008 23:02:30 -0800 "Andrew G. Morgan" <[EMAIL PROTECTED]> wrote: | |> With filesystem capabilities it is now possible to do away with |> (set)uid-0 based privilege and use capabilities instead. |> |> Historically, this was first attempted with a kernel-global set of |> securebits. That implementation, however, proved problematic, and has |> slowly whithered in the kernel. Prior to this patch, there remained no |> interface for manipulating the securebits - and thus no interface for |> suppressing root as all-capable. |> |> This patch reimplements securebits, with bit locking, as a per-process |> value. (To avoid increasing the per-task footprint of this change, |> I've merged the implementation of the per-process keep_capabilities |> bit with the per-process securebits value.) |> |> A process can now drop all legacy privilege (through uid=0), for |> itself and all of its fork()'d/exec()'d children with: |> |> prctl(PR_SET_SECUREBITS, 0x2f); |> | | This is the sort of patch which strikes terror into many hearts. Please, | it cannot be hidden over on the lsm list. I'll assume that this version is | an rfc/rfr for now and will cheerily delete it. | | For the next version, please do circulate it more widely. It will need careful | explanation and review. | | I think it would be useful for this patch's changelog to give us a little | recap of what went wrong with capabilities, if that's possible (and if it's | relevant). What was the bug which caused us to cripple capability | inheritance (some sendmail thing?) and why was that bug considered unfixable | at the time and by what means does this new code avoid the same old bug? | | A bit more changelog-for-dummies would be nice, too. This particular dummy | doesn't understand why/how fs-caps made it possible for us to start using | capabilities properly. | | And last, but by no means least: s/whither/wither/ ;) | | Thanks. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFHofxO+bHCR3gb8jsRAvc5AJwPa2+mcPg+mZDsDaXnhGunQCYKdwCgkuG6 1UUWHCnsYZOXEPOPjRimKN8= =aE7E -----END PGP SIGNATURE----- - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html