From: Evgeniy Polyakov <[EMAIL PROTECTED]>
Date: Sun, 28 May 2006 19:33:21 +0400

> Does SELinux have security handlers for each type of possible ioctls
> over the world? Each ioctl number is like each netlink type of message,
> but instead there is only one check per ioctl syscall as long as lsm
> hook for socket's send/recv syscall. 

Yes, the problem is similar to what the compat layer needs to face.
But I think James will tell us that SELinux has a way that it handles
the mess that is ioctl(). :-)

More to the point I think that none of this will be handled
transparently unless the onus is put on new netlink module users.
Ie. make the register of a netlink subsystem user (either direct
netlink or via generic netlink) fail if the operations don't
provide the SELinux handlers.

Otherwise, the SELinux folks will continually be playing catchup
writing the handlers.  That doesn't scale.

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to