selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Petr Lautrbach <lautrbach@redhat.com>
To: Stephen Smalley <stephen.smalley.work@gmail.com>,
	"Richard W.M. Jones" <rjones@redhat.com>
Cc: selinux@vger.kernel.org
Subject: Re: [PATCH] setfiles: Add -A option to disable SELINUX_RESTORECON_ADD_ASSOC
Date: Tue, 02 Sep 2025 18:12:14 +0200	[thread overview]
Message-ID: <871poo96ld.fsf@redhat.com> (raw)
In-Reply-To: <CAEjxPJ499HdhmsfX7kbchq7JFW07RD6jY5CrZMAAc3wZ+bbjXQ@mail.gmail.com>

Stephen Smalley <stephen.smalley.work@gmail.com> writes:

> On Mon, Sep 1, 2025 at 10:34 AM Richard W.M. Jones <rjones@redhat.com> wrote:
>>
>> SELINUX_RESTORECON_ADD_ASSOC tracks conflicts between inodes that have
>> differing contexts.  However doing this involves building a large
>> internal hashtable that stores the full path of every file examined by
>> setfiles.  For filesystems that have very large numbers of files or
>> long pathnames, this uses a lot of memory, which makes SELinux
>> relabelling in constrained memory environments infeasible.
>>
>> This adds a new setfiles -A option that disables this tracking.
>>
>> For example, using setfiles to relabel a filesystem with 15 million
>> files took 3.7GB of RAM.  Using this option, the same filesystem can
>> be relabelled in 121MB (albeit with no warnings or errors possible for
>> conflicting labels, but for our use case we don't care about that.)
>>
>> Fixes: https://issues.redhat.com/browse/RHEL-111505
>> Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
>
> I don't think we usually include downstream issue tracker links in our
> upstream commit messages, but no need to re-submit just for that.

FTR in git log there are already about 60 references to bugzilla.redhat.com and
issues.redhat.com is replacement of bugzilla.redhat.com for issues
reported on RHEL or CentOS. There are also bugs.debian.org,
bugs.gentoo.org, bugs.chromium.org references.


Until these issue trackers disappear, it could be a good source for another
context or related discussions.

> Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
>
>> ---
>>  policycoreutils/setfiles/setfiles.8 | 4 ++++
>>  policycoreutils/setfiles/setfiles.c | 5 ++++-
>>  2 files changed, 8 insertions(+), 1 deletion(-)
>>
>> diff --git a/policycoreutils/setfiles/setfiles.8 b/policycoreutils/setfiles/setfiles.8
>> index eabf0a1c..7c9c5d39 100644
>> --- a/policycoreutils/setfiles/setfiles.8
>> +++ b/policycoreutils/setfiles/setfiles.8
>> @@ -23,6 +23,7 @@ setfiles \- set SELinux file security contexts.
>>  .RB [ \-I | \-D ]
>>  .RB [ \-T
>>  .IR nthreads ]
>> +.RB [ \-A ]
>>  .I spec_file
>>  .IR pathname \ ...
>>
>> @@ -187,6 +188,9 @@ use up to
>>  threads.  Specify 0 to create as many threads as there are available
>>  CPU cores; 1 to use only a single thread (default); or any positive
>>  number to use the given number of threads (if possible).
>> +.TP
>> +.B \-A
>> +do not track conflicting inodes (saves memory)
>>
>>  .SH "ARGUMENTS"
>>  .TP
>> diff --git a/policycoreutils/setfiles/setfiles.c b/policycoreutils/setfiles/setfiles.c
>> index ad09f840..40f2e7fe 100644
>> --- a/policycoreutils/setfiles/setfiles.c
>> +++ b/policycoreutils/setfiles/setfiles.c
>> @@ -147,7 +147,7 @@ int main(int argc, char **argv)
>>         const char *base;
>>         int errors = 0;
>>         const char *ropts = "e:f:hiIDlmno:pqrsvFURW0xT:";
>> -       const char *sopts = "c:de:f:hiIDlmno:pqr:svCEFUR:W0T:";
>> +       const char *sopts = "c:de:f:hiIDlmno:pqr:svCEFUR:W0T:A";
>>         const char *opts;
>>         union selinux_callback cb;
>>         long unsigned skipped_errors;
>> @@ -375,6 +375,9 @@ int main(int argc, char **argv)
>>                         if (*optarg == '\0' || *endptr != '\0')
>>                                 usage(argv[0]);
>>                         break;
>> +               case 'A':
>> +                       r_opts.add_assoc = 0;
>> +                       break;
>>                 case 'h':
>>                 case '?':
>>                         usage(argv[0]);
>> --
>> 2.50.1
>>
>>


  reply	other threads:[~2025-09-02 16:12 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-01 14:31 [PATCH] setfiles: Add -A option to disable SELINUX_RESTORECON_ADD_ASSOC Richard W.M. Jones
2025-09-01 14:31 ` Richard W.M. Jones
2025-09-02 15:46   ` Stephen Smalley
2025-09-02 16:12     ` Petr Lautrbach [this message]
2025-09-02 16:30       ` Stephen Smalley
2025-09-02 16:54       ` Richard W.M. Jones
2025-09-02 17:45         ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=871poo96ld.fsf@redhat.com \
    --to=lautrbach@redhat.com \
    --cc=rjones@redhat.com \
    --cc=selinux@vger.kernel.org \
    --cc=stephen.smalley.work@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).