[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 11/15] flask: improve unknown permission handling


  • To: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
  • From: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  • Date: Fri, 17 Jun 2016 13:20:31 -0400
  • Cc: xen-devel@xxxxxxxxxxxxx
  • Delivery-date: Fri, 17 Jun 2016 17:20:37 +0000
  • Ironport-phdr: 9a23:3nd0yxJhRVoO8osnr9mcpTZWNBhigK39O0sv0rFitYgVKvvxwZ3uMQTl6Ol3ixeRBMOAu6MC2rKd6vm4EUU7or+/81k6OKRWUBEEjchE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i760zceF13FOBZvIaytQ8iJ35Xxhrj5osSLKyxzxxODIppKZC2sqgvQssREyaBDEY0WjiXzn31TZu5NznlpL1/A1zz158O34YIxu38I46Fp34d6XK77Z6U1S6BDRHRjajhtpZ7Wrx2LcS+jrjtZCD1XwVJ0BF3m6xfgV5u5iDn3rfhgxCSZdfL3SbN8DTel6b1iRFn3iSMEHzkj+WrTh4p7i6cN8zy7oBkq74fSYYyRfNZzNozHdNoUDT5NUcpcWDZIKp+tZIsISewaNKBXqJer9AhGlge3GQT5XLCn8TRPnHKjmPRgi+k=
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

On 06/17/2016 01:13 PM, Konrad Rzeszutek Wilk wrote:
On Fri, Jun 17, 2016 at 01:02:58PM -0400, Daniel De Graaf wrote:
On 06/17/2016 11:45 AM, Konrad Rzeszutek Wilk wrote:
On Thu, Jun 09, 2016 at 10:47:14AM -0400, Daniel De Graaf wrote:
When an unknown domctl, sysctl, or other operation is encountered in the
FLASK security server, use the allow_unknown bit in the security policy
to decide if the permission should be allowed or denied.  This bit is
off by default, but it can be set by using checkpolicy -U allow when
compiling the policy.  This allows new operations to be tested without
needing to immediately add security checks; however, it is not flexible
enough to avoid adding the actual permission checks.  An error message
is printed to the hypervisor console when this fallback is encountered.

.. and the operation is permitted.

The error message is printed either way (with a different priority).  Were

correct.
you suggesting I expand this explanation to include both the error and
warning messages separately?

It just that the patch changes the behavior. That is in the past if
you had created an policy using checkpolicy -U allow it would print an
error and return -EPERM.

But now it will print an error and return 0 and pass the XSM check
(aka operation ends being permitted).

I would be surprised if someone actually used allow_unknown before now,
since it did nothing and required manually enabling.  But if they did,
this is a functionality change.  I'll add a note of that.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.