Re: [PATCH 3/7] SLIM main patch
From: Benjamin LaHaise
Date: Wed Aug 23 2006 - 16:38:32 EST
On Wed, Aug 23, 2006 at 01:35:56PM -0700, Kylene Jo Hall wrote:
> Example: The current process is running at the USER level and writing to
> a USER file in /home/user/. The process then attempts to read an
> UNTRUSTED file. The current process will become UNTRUSTED and the read
> allowed to proceed but first write access to all USER files is revoked
> including the ones it has open.
Don't threads share file tables? What is preventing malicious code from
starting another thread which continues writing to the file that the
revoke attempt is made on?
"Time is of no importance, Mr. President, only life is important."
Don't Email: <dont@xxxxxxxxx>.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/