* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) [not found] ` <1091474356.23449.272.camel@moss-spartans.epoch.ncsc.mil> @ 2004-08-02 21:12 ` Luke Kenneth Casson Leighton 2004-08-03 11:11 ` Stephen Smalley 2004-08-06 12:05 ` Russell Coker 2004-08-02 21:25 ` Luke Kenneth Casson Leighton 1 sibling, 2 replies; 6+ messages in thread From: Luke Kenneth Casson Leighton @ 2004-08-02 21:12 UTC (permalink / raw) To: Stephen Smalley; +Cc: SE-Linux, Daniel J Walsh, Linux Hotplug Dev List [-- Attachment #1: Type: text/plain, Size: 1542 bytes --] On Mon, Aug 02, 2004 at 03:19:16PM -0400, Stephen Smalley wrote: > On Mon, 2004-08-02 at 15:12, Luke Kenneth Casson Leighton wrote: > > On Mon, Aug 02, 2004 at 10:52:05AM -0400, Stephen Smalley wrote: > > > What's the objection to patching udev to directly invoke matchpathcon(3) > > > and setfscreatecon(3) prior to creating each device node? > > > > time! how long do those function calls take? > > > > using /sbin/restorecon, which is the present hack, each device node > > creation takes around a quarter of a second (!!) > > Directly invoking the library functions has to be faster than exec'ing a > separate helper program (restorecon) that then invokes the library > functions. Further, restorecon has to re-lookup the device node in the > filesystem, whereas udev can set up its context upon initial creation. > Further, matchpathcon() caches the file context specification upon the > first call, so if the udev process stays around for multiple device > creations, then subsequent matchpathcon() calls will be a bit faster > (although pathname regex matching is still going to take time). okay, quick question: if i use setfscreatecon(), is it a "one-time" create, or is it effective on all creates up until the time that freecon() is called? [because if it's "up until freecon() is called", then the bug that the selinux patch to udev was suffering from was that free(scontext) was being used instead of freecon().] oops ;) l. p.s. first cut at mods attached for general review NO I HAVEN'T COMPILED IT. [-- Attachment #2: f --] [-- Type: text/plain, Size: 2265 bytes --] --- udev-add.c.orig 2004-07-09 18:59:09.000000000 +0100 +++ udev-add.c 2004-08-02 22:10:50.000000000 +0100 @@ -50,6 +50,10 @@ #define LOCAL_USER "$local" +#ifdef WITH_SELINUX +#include <selinux/selinux.h> +#endif + /* * Right now the major/minor of a device is stored in a file called * "dev" in sysfs. @@ -109,6 +113,10 @@ { struct stat stats; int retval = 0; + int seretval = 0; +#ifdef WITH_SELINUX + security_context_t scontext; +#endif if (stat(file, &stats) != 0) goto create; @@ -117,6 +125,24 @@ if (((stats.st_mode & S_IFMT) == S_IFBLK || (stats.st_mode & S_IFMT) == S_IFCHR) && (stats.st_rdev == makedev(major, minor))) { dbg("preserve file '%s', cause it has correct dev_t", file); +#ifdef WITH_SELINUX + /* lkcl: maybe someone would like to do the same thing with se/linux + * security contexts (check they are the same) but hey, not me! + */ + if (is_selinux_enabled() > 0) + { + retval = matchpathcon(file, 0, &scontext); + if (retval < 0) { + dbg("matchpathcon(%s) failed\n", file); + } else { + retval=setfilecon(scontext, file); + if (retval < 0) + dbg("setfiles %s failed with error '%s'", + filename, strerror(errno)); + freecon(scontext); + } + } +#endif goto perms; } @@ -126,6 +152,21 @@ dbg("already present file '%s' unlinked", file); create: +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + seretval = matchpathcon(filename, 0, &scontext); + if (seretval < 0) { + dbg("matchpathcon(%s) failed\n", filename); + } else { + retval=setfscreatecon(scontext); + if (retval < 0) + dbg("setfiles %s failed with error '%s'", + filename, strerror(errno)); + } + } +#endif + retval = mknod(file, mode, makedev(major, minor)); if (retval != 0) { dbg("mknod(%s, %#o, %u, %u) failed with error '%s'", @@ -133,6 +174,15 @@ goto exit; } +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + /* after mknod, free the context */ + if (seretval == 0) + freecon(scontext); + } +#endif + perms: dbg("chmod(%s, %#o)", file, mode); if (chmod(file, mode) != 0) { @@ -150,7 +200,7 @@ } exit: - return retval; + return retval < 0 ? retval : seretval; } /* get the local logged in user */ ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) 2004-08-02 21:12 ` matchfilecon (the program) vs matchfilecon (the libselinux1 fn) Luke Kenneth Casson Leighton @ 2004-08-03 11:11 ` Stephen Smalley 2004-08-03 13:37 ` Luke Kenneth Casson Leighton 2004-08-06 12:05 ` Russell Coker 1 sibling, 1 reply; 6+ messages in thread From: Stephen Smalley @ 2004-08-03 11:11 UTC (permalink / raw) To: Luke Kenneth Casson Leighton Cc: SE-Linux, Daniel J Walsh, Linux Hotplug Dev List On Mon, 2004-08-02 at 17:12, Luke Kenneth Casson Leighton wrote: > okay, quick question: if i use setfscreatecon(), is it a "one-time" > create, or is it effective on all creates up until the time that > freecon() is called? Once set, the fscreate context remains set for all file creations until the program explicitly resets it (via another setfscreatecon() call) or the program performs an execve (in which case the context is reset so that all programs start in a known state, defaulting to the policy-defined labeling behavior). The freecon() is irrelevant to the "lifetime" of the fscreate context, as it just frees the context in the application's memory; it doesn't affect the saved value for the task in the kernel. > [because if it's "up until freecon() is called", then the bug that > the selinux patch to udev was suffering from was that free(scontext) > was being used instead of freecon().] While it is preferable to use freecon() for encapsulation, it is presently true that freecon(x) = free(x). With regard to your patch, please pass the actual mode to matchpathcon, not 0, as the second parameter. This allows the matching to take into account the file type, e.g. whether it is a character device or a block device. -- Stephen Smalley <sds@epoch.ncsc.mil> National Security Agency ------------------------------------------------------- This SF.Net email is sponsored by OSTG. Have you noticed the changes on Linux.com, ITManagersJournal and NewsForge in the past few weeks? Now, one more big change to announce. We are now OSTG- Open Source Technology Group. Come see the changes on the new OSTG site. www.ostg.com _______________________________________________ Linux-hotplug-devel mailing list http://linux-hotplug.sourceforge.net Linux-hotplug-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-hotplug-devel ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) 2004-08-03 11:11 ` Stephen Smalley @ 2004-08-03 13:37 ` Luke Kenneth Casson Leighton 0 siblings, 0 replies; 6+ messages in thread From: Luke Kenneth Casson Leighton @ 2004-08-03 13:37 UTC (permalink / raw) To: Stephen Smalley; +Cc: SE-Linux, Daniel J Walsh, Linux Hotplug Dev List On Tue, Aug 03, 2004 at 07:11:32AM -0400, Stephen Smalley wrote: > On Mon, 2004-08-02 at 17:12, Luke Kenneth Casson Leighton wrote: > > okay, quick question: if i use setfscreatecon(), is it a "one-time" > > create, or is it effective on all creates up until the time that > > freecon() is called? > > Once set, the fscreate context remains set for all file creations until > the program explicitly resets it (via another setfscreatecon() call) or > the program performs an execve (in which case the context is reset so > that all programs start in a known state, defaulting to the > policy-defined labeling behavior). eek okay so i should use getcon() and restore the context afterwards. > The freecon() is irrelevant to the > "lifetime" of the fscreate context, as it just frees the context in the > application's memory; it doesn't affect the saved value for the task in > the kernel. ack. > > [because if it's "up until freecon() is called", then the bug that > > the selinux patch to udev was suffering from was that free(scontext) > > was being used instead of freecon().] > > While it is preferable to use freecon() for encapsulation, it is > presently true that freecon(x) = free(x). > > With regard to your patch, please pass the actual mode to matchpathcon, > not 0, as the second parameter. This allows the matching to take into > account the file type, e.g. whether it is a character device or a block > device. oh yeah i forgot. l. ------------------------------------------------------- This SF.Net email is sponsored by OSTG. Have you noticed the changes on Linux.com, ITManagersJournal and NewsForge in the past few weeks? Now, one more big change to announce. We are now OSTG- Open Source Technology Group. Come see the changes on the new OSTG site. www.ostg.com _______________________________________________ Linux-hotplug-devel mailing list http://linux-hotplug.sourceforge.net Linux-hotplug-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-hotplug-devel ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) 2004-08-02 21:12 ` matchfilecon (the program) vs matchfilecon (the libselinux1 fn) Luke Kenneth Casson Leighton 2004-08-03 11:11 ` Stephen Smalley @ 2004-08-06 12:05 ` Russell Coker 2004-08-07 12:23 ` Luke Kenneth Casson Leighton 1 sibling, 1 reply; 6+ messages in thread From: Russell Coker @ 2004-08-06 12:05 UTC (permalink / raw) To: Luke Kenneth Casson Leighton Cc: Stephen Smalley, SE-Linux, Daniel J Walsh, Linux Hotplug Dev List On Tue, 3 Aug 2004 07:12, Luke Kenneth Casson Leighton <lkcl@lkcl.net> wrote: > p.s. first cut at mods attached for general review NO I HAVEN'T > COMPILED IT. One thing to note is that is_selinux_enabled() reads /proc/filesystems and then reads /proc/self/attr/current. This is more work than you want to do for every device node. So you want to cache the result of is_selinux_enabled() to some degree. You certainly don't want to call it twice in the same code path. udev is tricky in this regard because there is the possibility that udev may be started before SE Linux is enabled. Maybe the best thing to do would be to check for SE Linux being enabled once for each group of new devices that you add, and only once for the system startup. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page ------------------------------------------------------- This SF.Net email is sponsored by OSTG. Have you noticed the changes on Linux.com, ITManagersJournal and NewsForge in the past few weeks? Now, one more big change to announce. We are now OSTG- Open Source Technology Group. Come see the changes on the new OSTG site. www.ostg.com _______________________________________________ Linux-hotplug-devel mailing list http://linux-hotplug.sourceforge.net Linux-hotplug-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-hotplug-devel ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) 2004-08-06 12:05 ` Russell Coker @ 2004-08-07 12:23 ` Luke Kenneth Casson Leighton 0 siblings, 0 replies; 6+ messages in thread From: Luke Kenneth Casson Leighton @ 2004-08-07 12:23 UTC (permalink / raw) To: Russell Coker Cc: Stephen Smalley, SE-Linux, Daniel J Walsh, Linux Hotplug Dev List On Fri, Aug 06, 2004 at 10:05:08PM +1000, Russell Coker wrote: > On Tue, 3 Aug 2004 07:12, Luke Kenneth Casson Leighton <lkcl@lkcl.net> wrote: > > p.s. first cut at mods attached for general review NO I HAVEN'T > > COMPILED IT. > > One thing to note is that is_selinux_enabled() reads /proc/filesystems and > then reads /proc/self/attr/current. This is more work than you want to do > for every device node. So you want to cache the result of > is_selinux_enabled() to some degree. You certainly don't want to call it > twice in the same code path. ee! okay. > udev is tricky in this regard because there is the possibility that udev may > be started before SE Linux is enabled. ... for my purposes i am happy to assume that this not be the case. l. ------------------------------------------------------- This SF.Net email is sponsored by OSTG. Have you noticed the changes on Linux.com, ITManagersJournal and NewsForge in the past few weeks? Now, one more big change to announce. We are now OSTG- Open Source Technology Group. Come see the changes on the new OSTG site. www.ostg.com _______________________________________________ Linux-hotplug-devel mailing list http://linux-hotplug.sourceforge.net Linux-hotplug-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-hotplug-devel ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: matchfilecon (the program) vs matchfilecon (the libselinux1 fn) [not found] ` <1091474356.23449.272.camel@moss-spartans.epoch.ncsc.mil> 2004-08-02 21:12 ` matchfilecon (the program) vs matchfilecon (the libselinux1 fn) Luke Kenneth Casson Leighton @ 2004-08-02 21:25 ` Luke Kenneth Casson Leighton 1 sibling, 0 replies; 6+ messages in thread From: Luke Kenneth Casson Leighton @ 2004-08-02 21:25 UTC (permalink / raw) To: Stephen Smalley; +Cc: SE-Linux, Linux Hotplug Dev List [-- Attachment #1: Type: text/plain, Size: 499 bytes --] p.s. setting permissions on symlinks was missed out, too. _and_ directories. darn. l. -- -- Information I post is with honesty, integrity, and the expectation that you will take full responsibility if acting on the information contained, and that, should you find it to be flawed or even mildly useful, you will act with both honesty and integrity in return - and tell me. -- <a href="http://lkcl.net"> lkcl.net </a> <br /> <a href="mailto:lkcl@lkcl.net"> lkcl@lkcl.net </a> <br /> [-- Attachment #2: f --] [-- Type: text/plain, Size: 4619 bytes --] --- Makefile.orig 2004-08-02 22:23:58.000000000 +0100 +++ Makefile 2004-08-02 22:24:01.000000000 +0100 @@ -25,6 +25,8 @@ # Leave this set to `false' for production use. DEBUG = true +# Set this to compile with Security-Enhanced Linux support. +WITH_SELINUX = true ROOT = udev DAEMON = udevd @@ -39,6 +41,7 @@ LOCAL_CFG_DIR = etc/udev HOTPLUG_EXEC = $(ROOT) + DESTDIR = KERNEL_DIR = /lib/modules/${shell uname -r}/build @@ -172,6 +175,13 @@ CFLAGS += -I$(PWD)/libsysfs +ifeq ($(strip $(WITH_SELINUX)),true) + LIB_OBJS += \ + -lselinux + CFLAGS += \ + -DWITH_SELINUX +endif + all: $(ROOT) $(SENDER) $(DAEMON) $(INFO) $(TESTER) $(STARTER) @extras="$(EXTRAS)" ; for target in $$extras ; do \ echo $$target ; \ --- udev-add.c.orig 2004-07-09 18:59:09.000000000 +0100 +++ udev-add.c 2004-08-02 22:23:27.000000000 +0100 @@ -50,6 +50,10 @@ #define LOCAL_USER "$local" +#ifdef WITH_SELINUX +#include <selinux/selinux.h> +#endif + /* * Right now the major/minor of a device is stored in a file called * "dev" in sysfs. @@ -92,7 +96,31 @@ break; *pos = 0x00; if (stat(p, &stats)) { +#ifdef WITH_SELINUX + int seretval = 0; + security_context_t scontext; + if (is_selinux_enabled() > 0) + { + seretval = matchpathcon(p, 0, &scontext); + if (seretval < 0) { + dbg("matchpathcon(%s) failed\n", p); + } else { + seretval=setfscreatecon(scontext); + if (seretval < 0) + dbg("setfiles %s failed with error '%s'", + p, strerror(errno)); + } + } +#endif retval = mkdir(p, 0755); +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + /* after mkdir, free the context */ + freecon(scontext); + } +#endif + if (retval != 0) { dbg("mkdir(%s) failed with error '%s'", p, strerror(errno)); @@ -109,6 +137,10 @@ { struct stat stats; int retval = 0; + int seretval = 0; +#ifdef WITH_SELINUX + security_context_t scontext; +#endif if (stat(file, &stats) != 0) goto create; @@ -117,6 +149,24 @@ if (((stats.st_mode & S_IFMT) == S_IFBLK || (stats.st_mode & S_IFMT) == S_IFCHR) && (stats.st_rdev == makedev(major, minor))) { dbg("preserve file '%s', cause it has correct dev_t", file); +#ifdef WITH_SELINUX + /* lkcl: maybe someone would like to do the same thing with se/linux + * security contexts (check they are the same) but hey, not me! + */ + if (is_selinux_enabled() > 0) + { + retval = matchpathcon(file, 0, &scontext); + if (retval < 0) { + dbg("matchpathcon(%s) failed\n", file); + } else { + retval=setfilecon(scontext, file); + if (retval < 0) + dbg("setfiles %s failed with error '%s'", + file, strerror(errno)); + freecon(scontext); + } + } +#endif goto perms; } @@ -126,6 +176,21 @@ dbg("already present file '%s' unlinked", file); create: +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + seretval = matchpathcon(file, 0, &scontext); + if (seretval < 0) { + dbg("matchpathcon(%s) failed\n", file); + } else { + retval=setfscreatecon(scontext); + if (retval < 0) + dbg("setfiles %s failed with error '%s'", + file, strerror(errno)); + } + } +#endif + retval = mknod(file, mode, makedev(major, minor)); if (retval != 0) { dbg("mknod(%s, %#o, %u, %u) failed with error '%s'", @@ -133,6 +198,15 @@ goto exit; } +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + /* after mknod, free the context */ + if (seretval == 0) + freecon(scontext); + } +#endif + perms: dbg("chmod(%s, %#o)", file, mode); if (chmod(file, mode) != 0) { @@ -150,7 +224,7 @@ } exit: - return retval; + return retval < 0 ? retval : seretval; } /* get the local logged in user */ @@ -304,10 +378,36 @@ dbg("symlink(%s, %s)", linktarget, filename); if (!fake) { +#ifdef WITH_SELINUX + int seretval = 0; + security_context_t scontext; + if (is_selinux_enabled() > 0) + { + seretval = matchpathcon(filename, 0, &scontext); + if (seretval < 0) { + dbg("matchpathcon(%s) failed\n", filename); + } else { + seretval=setfscreatecon(scontext); + if (seretval < 0) + dbg("setfiles %s failed with error '%s'", + filename, strerror(errno)); + } + } +#endif + + unlink(filename); if (symlink(linktarget, filename) != 0) dbg("symlink(%s, %s) failed with error '%s'", linktarget, filename, strerror(errno)); +#ifdef WITH_SELINUX + if (is_selinux_enabled() > 0) + { + /* after symlink, free the context */ + freecon(scontext); + } +#endif + } } ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2004-08-07 12:23 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20040801172751.GD20103@lkcl.net>
[not found] ` <1091455223.23449.66.camel@moss-spartans.epoch.ncsc.mil>
[not found] ` <20040802145724.GG4194@lkcl.net>
[not found] ` <1091458325.23449.102.camel@moss-spartans.epoch.ncsc.mil>
[not found] ` <20040802191243.GJ4194@lkcl.net>
[not found] ` <1091474356.23449.272.camel@moss-spartans.epoch.ncsc.mil>
2004-08-02 21:12 ` matchfilecon (the program) vs matchfilecon (the libselinux1 fn) Luke Kenneth Casson Leighton
2004-08-03 11:11 ` Stephen Smalley
2004-08-03 13:37 ` Luke Kenneth Casson Leighton
2004-08-06 12:05 ` Russell Coker
2004-08-07 12:23 ` Luke Kenneth Casson Leighton
2004-08-02 21:25 ` Luke Kenneth Casson Leighton
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).