On Tue, Jul 28, 2015 at 10:13 AM, David Drysdale <drysd...@google.com> wrote:
> On Tue, Jul 28, 2015 at 5:43 PM, Kees Cook <keesc...@chromium.org> wrote:
>> On Tue, Jul 28, 2015 at 4:41 AM, David Drysdale <drysd...@google.com> wrote:
>>> Add a document describing the process of adding a new system call,
>>> including the need for a flags argument for future compatibility, and
>>> covering 32-bit/64-bit concerns (albeit in an x86-centric way).
>>>
>>> Signed-off-by: David Drysdale <drysd...@google.com>
>>> Reviewed-by: Michael Kerrisk <mtk.manpa...@gmail.com>
>>
>> This is great!
>>
>> Reviewed-by: Kees Cook <keesc...@chromium.org>
>>
>> I have a few minor suggestions below...
>
> Thanks, I've applied all bar one -- a query below.
>
>>> ---
>>>  Documentation/adding-syscalls.txt | 454 
>>> ++++++++++++++++++++++++++++++++++++++
>>>  1 file changed, 454 insertions(+)
>>>  create mode 100644 Documentation/adding-syscalls.txt
>>>
>>> diff --git a/Documentation/adding-syscalls.txt 
>>> b/Documentation/adding-syscalls.txt
>>> new file mode 100644
>>> index 000000000000..5f52edda8951
>>> --- /dev/null
>>> +++ b/Documentation/adding-syscalls.txt
>
> [snip]
>
>>> + - If there is an existing capability that governs related functionality, 
>>> then
>>> +   use that.  However, avoid combining lots of only vaguely related 
>>> functions
>>> +   together under the same bit, as this goes against capabilities' purpose 
>>> of
>>> +   splitting the power of root.  In particular, avoid adding new uses of 
>>> the
>>> +   already overly-general CAP_SYS_ADMIN capability.
>>> + - If there is no related capability, then consider adding a new capability
>>> +   bit -- but bear in mind that the numbering space is limited, and each 
>>> new
>>> +   bit needs to be understood and administered by sysadmins.
>>
>> Perhaps mention alternative mechanisms for access control when working
>> on file descriptors, like avoiding security issues by looking at fd
>> _opener_ credentials, rather than current's credentials?
>
> I'm struggling to cope up with text about this that doesn't feel either
> too vague or much too detailed / internal, so maybe I'm misunderstanding
> what you're after.  Could you clarify or maybe suggest a sentence or two?

Hm, yes, I think you're right: my suggestion here was too specific.
Please ignore! :)

-Kees

-- 
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to