Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 12 Mar 2003 18:10:40 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 12 Mar 2003 18:10:40 -0500 Received: from pasky.ji.cz ([62.44.12.54]:28406 "HELO machine.sinus.cz") by vger.kernel.org with SMTP id ; Wed, 12 Mar 2003 18:09:44 -0500 Date: Thu, 13 Mar 2003 00:20:27 +0100 From: Petr Baudis To: Greg KH Cc: linux-kernel@vger.kernel.org, linux-security-module@wirex.com Subject: [PATCH] kobject support for LSM core (v2) Message-ID: <20030312232027.GQ7397@pasky.ji.cz> Mail-Followup-To: Greg KH , linux-kernel@vger.kernel.org, linux-security-module@wirex.com References: <20030310001310.GU3917@pasky.ji.cz> <20030310064738.GD6512@kroah.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20030310064738.GD6512@kroah.com> User-Agent: Mutt/1.4i X-message-flag: Outlook : A program to spread viri, but it can do mail too. Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6801 Lines: 191 Dear diary, on Mon, Mar 10, 2003 at 07:47:38AM CET, I got a letter, where Greg KH told me, that... > On Mon, Mar 10, 2003 at 01:13:10AM +0100, Petr Baudis wrote: > > > > the following patch (against 2.5.64) introduces kobject infrastructure > > scaffolding to the LSM framework. It does nothing but allocating security root > > subsystem for the LSMs, so that they are tied to one specific point in the > > kobject hierarchy. They are suggested to create own subsystems under the > > security subsystem, however such things are completely up to the individual > > LSMs and not regulated by core in any way (it's not that I would so much like > > such an approach, but I was advised so by GregKH and it makes sense in its own > > way as well). > > Hm, I thought I advised not doing this at all :) *mumble* ;-) > Anyway, if we were to add this, you might want to: > > > + > > +/* kobject stuff */ > > + > > +/* We define only the base subsystem here and leave everything to a LSM. It is > > + * heavily recommended that the LSM should create own subsystem under this one, > > + * so that it can be easily made stackable and it doesn't confuse userland by > > + * exporting its stuff directly to /sys/security/. */ > > +decl_subsys(security,NULL); > > Add a prototype of this variable to security.h so that everyone can > actually see it who wants to use it. Oops, I accidentally missed that file when diffing, sorry. > > +/** > > + * security_kobj_init - initializes the security kobject subsystem > > + * > > + * This is called after security_scaffolding_startup as a regular initcall, > > + * since we need sysfs mounted already. > > + */ > > +static int __init security_kobj_init (void) > > +{ > > + subsystem_register (&security_subsys); > > + return 0; > > +} > > + > > +subsys_initcall(security_kobj_init); > > Why not initialize this when the security core is initialized? Why > have a new initcall? See the comment before the function: + * since we need sysfs mounted already. At the time of security_scaffolding_setup(), sysfs is not mounted yet, thus subsystem_register() returns -EFAULT and is unsuccessful. > And when do you unregister this subsystem? Never ;-). Well it appears that there is no need to unregister it explicitly, at least noone else does it (subsystem_unregister() is called only for dynamically registered subsystems). If you insist on having it there, I can add it, but we are following the current way of doing things with leaving it out. > > +EXPORT_SYMBOL(security_subsys); > > No EXPORT_SYMBOL_GPL() for it? :) True, fixed. The second version of the patch follows... Hello, the following patch (against 2.5.64) introduces kobject infrastructure scaffolding to the LSM framework. It does nothing but allocating security root subsystem for the LSMs, so that they are tied to one specific point in the kobject hierarchy. They are suggested to create own subsystems under the security subsystem, however such things are completely up to the individual LSMs and not regulated by core in any way (it's not that I would so much like such an approach, but I was advised so by GregKH and it makes sense in its own way as well). A lot of LSMs use various ad hoc methods for communication with the userspace and using the sysfs framework could be very convient for them, and there is at least one real-world (altough yet a bit primitive) LSM which already uses the security subsystem: http://pasky.ji.cz/securitylevels/. It works fine for me and it should be pretty trivial. Please consider applying. include/linux/security.h | 2 ++ security/security.c | 30 ++++++++++++++++++++++++++++++ 2 files changed, 32 insertions(+) Note that this is the second version of the patch, containing changes based on GregKH's remarks. It fixes missing patch for include/linux/security.h and exports security_subsys GPL'd. Kind regards, Petr Baudis diff -ru linux/security/security.c linux+pasky/security/security.c --- linux/security/security.c Sun Mar 9 00:40:32 2003 +++ linux+pasky/security/security.c Thu Mar 13 00:15:21 2003 @@ -9,11 +9,15 @@ * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. + * + * Introduced kobject infrastructure. + * 2003-02-27 Petr Baudis */ #include #include #include +#include #include #include #include @@ -38,6 +42,7 @@ return 0; } + /** * security_scaffolding_startup - initialzes the security scaffolding framework * @@ -59,6 +64,30 @@ return 0; } + +/* kobject stuff */ + +/* We define only the base subsystem here and leave everything to a LSM. It is + * heavily recommended that the LSM should create own subsystem under this one, + * so that it can be easily made stackable and it doesn't confuse userland by + * exporting its stuff directly to /sys/security/. */ +decl_subsys(security,NULL); + +/** + * security_kobj_init - initializes the security kobject subsystem + * + * This is called after security_scaffolding_startup as a regular initcall, + * since we need sysfs mounted already. + */ +static int __init security_kobj_init (void) +{ + subsystem_register (&security_subsys); + return 0; +} + +subsys_initcall(security_kobj_init); + + /** * register_security - registers a security framework with the kernel * @ops: a pointer to the struct security_options that is to be registered @@ -195,5 +224,6 @@ EXPORT_SYMBOL_GPL(unregister_security); EXPORT_SYMBOL_GPL(mod_reg_security); EXPORT_SYMBOL_GPL(mod_unreg_security); +EXPORT_SYMBOL_GPL(security_subsys); EXPORT_SYMBOL(capable); EXPORT_SYMBOL(security_ops); diff -ru linux/include/linux/security.h linux+pasky/include/linux/security.h --- linux/include/linux/security.h Thu Mar 6 20:31:29 2003 +++ linux+pasky/include/linux/security.h Thu Mar 6 23:18:46 2003 @@ -22,6 +22,7 @@ #ifndef __LINUX_SECURITY_H #define __LINUX_SECURITY_H +#include #include #include #include @@ -1745,6 +1746,7 @@ extern int unregister_security (struct security_operations *ops); extern int mod_reg_security (const char *name, struct security_operations *ops); extern int mod_unreg_security (const char *name, struct security_operations *ops); +extern struct subsystem security_subsys; #else /* CONFIG_SECURITY */ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/