Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2650169imm; Tue, 4 Sep 2018 07:55:33 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbDsM/CgyDCppPw8LbxTgm318EmXK9ETI/LH5jtU5hlAkIgRUVaohzJ1APgfY77LWLs8FZP X-Received: by 2002:a62:ca0d:: with SMTP id n13-v6mr35498451pfg.69.1536072933012; Tue, 04 Sep 2018 07:55:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536072932; cv=none; d=google.com; s=arc-20160816; b=yKUF7+H4yjC0uT5W30cEgypOydcF9r89sG/IZkMXrfQ+ndXZFSm1fnEBni5+VlX4nj /Rx0HTOq3qqqMoQbX6bQvWJoYDl26bQZ4PtcdPmJKLGoyoWajuB1nO9pbcodQHbTGTxb vo2L8hsfVyBOch4h51KbYceF7mBLRS98Br6KSixlJ9bYUOVycdEC7UT5+Xh3q2y/VWNK W9cZUNK5dpXSsuib93ZwWg+q8gZkYoiWeedqqwmA8IQDWiwdYj3wNZIKZVyuqCzFamGG GHUIqLzkYw9xE1BkV9uYb+QLm1tM/VYzR/ZaJmh3rwKEWXiYAAv7Sw+bQNQsTFk3XxBS r+hA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=coWdoHRL6z9PC7dYlC5R6Mj3FGq2bxqtoPEAzZFtnLU=; b=1LzlWQd7FcQjvXNK4I/8o1le9sFUyVgPtj0Bxu+YLu/HMFSib9u5zhnXVZ/aCdsQAr FQ7UwLOJS45OvE4Lva0NhPZyFuJNlnLnTvQBPjuKVOCl0MF1ELTUE8TpEfZCuCf6cedK At+jM0FN55V2zu0lWNs9rapdTz66GKuvs6vnrwvaLz3hl6HTDK9HhQnsETT7fz9uhd+S kLLDixwqmcX3P0Rkx6Q3V4rL4ndCuAP+rUTbkd2ip+bWhAllvD0tNEj5pVsYrlD9PIyR bVvJXLX3A+IttGDyy0mRmmpeEQwolR4EpPHx1s+6nK7vZfS82cVEE5UunNL1RjpptTk/ hKqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JNUmVCDC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1-v6si22438022plb.499.2018.09.04.07.55.17; Tue, 04 Sep 2018 07:55:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JNUmVCDC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727533AbeIDTS7 (ORCPT + 99 others); Tue, 4 Sep 2018 15:18:59 -0400 Received: from mail-pf1-f194.google.com ([209.85.210.194]:37784 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726004AbeIDTS7 (ORCPT ); Tue, 4 Sep 2018 15:18:59 -0400 Received: by mail-pf1-f194.google.com with SMTP id h69-v6so1826137pfd.4 for ; Tue, 04 Sep 2018 07:53:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=coWdoHRL6z9PC7dYlC5R6Mj3FGq2bxqtoPEAzZFtnLU=; b=JNUmVCDCWgr57UqFD6Z7MHR6z5SJPsaqMsi70uNc5y76bME6LsI4dSfSBL2HWULeu8 rgmMm3y5idWoh0kTveVVy3eHlmDo/xlYNdgw9qWFsEvoidUofosDE0LUsq/MKg9Af8Jw spHAMk9uwx+f0jp/uw/gBDJDIKZfZnEpfHH2aNvvPuY52ze91buvjKn1MW4E8284do+z RWviMEZ8bAjqLrmy88bSNpmz6XuoY7J27RvGfQFM2b8Bu6r5buB0P5B9BcdNPE4vfr3R TwDeFthxF7L7Olgsfi3L2mJ8uU2sCI0t+w7JTYeOQCwZR+vgVaT2WoWvrSG/aJX9Zrl8 0jxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=coWdoHRL6z9PC7dYlC5R6Mj3FGq2bxqtoPEAzZFtnLU=; b=oXXNInjapfTVHAeGOD7Ys0bM637YGrbM7F/5HlT4A4pgd/fuJbMjnJmwcyaoAfCtoD W/PPa1LqOSPGfmYZtTltTwdqFQpTbrFisjosP6zNTqdfJHdut5/FkpYrRAlyWgRCdWS3 Ltu3qm1mQp0dxOXaLsjzmOKsyhRpUNFZs3f36mkMXCwbV7wAEKW8/1OUc7JFp9kx10Zi ofdPJwewyCbgMOI1SwRKvTsykQBnmRdg8xH0dnzaYG7mcLMLY1BxkWuCiUI755G35DrI rNo4RmWp4zXWwUOX5MWwv+3DtJDrp2FJugTW0fOnSlCAXrti3seaVUamZBVDvoLzHrvV 15Og== X-Gm-Message-State: APzg51A6U4+/9xXF1yWjSaadjHCtM/Ivna91dDzvIUU9Mh02nU2jfKgH v59XV0+f9M4p7iB8MNJpfSiehvrTmjGIKZdmzaV9Vw== X-Received: by 2002:a62:3001:: with SMTP id w1-v6mr35017896pfw.19.1536072812594; Tue, 04 Sep 2018 07:53:32 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a17:90a:ac14:0:0:0:0 with HTTP; Tue, 4 Sep 2018 07:53:11 -0700 (PDT) In-Reply-To: <5806108.mdyebWjNCB@liv> References: <000000000000c178e305749daba4@google.com> <1ea19628-3bbe-2073-d623-824337c15ed6@tycho.nsa.gov> <5806108.mdyebWjNCB@liv> From: Dmitry Vyukov Date: Tue, 4 Sep 2018 16:53:11 +0200 Message-ID: Subject: Re: WARNING in apparmor_secid_to_secctx To: Russell Coker Cc: Stephen Smalley , Paul Moore , syzbot , tyhicks@canonical.com, John Johansen , James Morris , LKML , linux-security-module@vger.kernel.org, Serge Hallyn , syzkaller-bugs , Jeffrey Vander Stoep , SELinux , Laurent Bigonville Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 4, 2018 at 3:16 PM, Russell Coker wrote: > On Tuesday, 4 September 2018 10:57:15 PM AEST Stephen Smalley wrote: >> > I installed the tools, and we started loading policy. >> > But then it turned out that wheezy policy does not allows mounting >> > cgroup2 fs and maybe some others even in non-enforcing mode. As far as >> > I understand that's because the policy does not have definition for >> > the fs, and so loading bails out with an error. > > The aim has always been with SE Linux in Debian that the policy will support > the kernel from the next release and from the previous release. Much of this > comes from upstream, but sometimes we have to go out of our way to get it. > Sometimes if you want to run unusual combinations of kernel and OS Debian > doesn't get a backport of the policy to support it in which case I often have > a special policy on my site to do it. > > It seems strange that you wouldn't be able to mount a filesystem in permissive > mode. Which program was trying to mount it? Was it systemd? It might be a > systemd bug. The program was our binary, but also reproducible with just mount utility. I don't think the program matters, it's just that mount system call returns an error. It also looked weird to me that selinux fails the syscall in permissive mode. Maybe it's just a bug? Fixing that would resolve our problem, and it the easiest way to resolve it. Here is the script we use to build images: https://github.com/google/syzkaller/blob/master/tools/create-image.sh If you run it in qemu and try to mount cgroup2, it should fail. >> > We need cgroup2 both for testing and for better sandboxing (no other >> > way to restrict e.g. memory consumption). Moreover, we did not test >> > any actual interesting interactions with selinux (there must be some? >> > but I don't know what are they). >> > So I had to uninstall the tool and policy is not loaded again. >> > I investigated building a newer debian image with debootstrap (which >> > should have newer policy I guess). But they don't work, some cryptic >> > errors in init. Other people reported the same. >> > So that's we are. I don't have any ideas left... > > It would be nice to know what the errors are. Although we aren't really > interested in bug reports from Wheezy, Stretch is the current stable release. The errors were unrelated to selinux, the image just failed to bring up network or something. So it was just unusable. Other people reported the same: https://groups.google.com/forum/#!searchin/syzkaller/wheezy|sort:date/syzkaller/DJdHAsTXWVw/XXr8KMfgBQAJ https://groups.google.com/forum/#!searchin/syzkaller/wheezy|sort:date/syzkaller/bgkbvqbjnfA/tlH7SGwCDQAJ Again, if you change wheezy to stretch here, it should reproduce the problem: https://github.com/google/syzkaller/blob/master/tools/create-image.sh >> So why not ask for help from the SELinux community? I've cc'd the >> selinux list and a couple of folks involved in Debian selinux. I see a >> couple of options but I don't know your constraints for syzbot: >> >> 1) Run an instance of syzbot on a distro that supports SELinux enabled >> out of the box like Fedora. Then you don't have to fight with SELinux >> and can just focus on syzbot, while still testing SELinux enabled and >> enforcing. >> >> 2) Report the problems you are having with enabling SELinux on newer >> Debian to the selinux list and/or the Debian selinux package maintainers >> so that someone can help you resolve them. >> >> 3) Back-port the cgroup2 policy definitions to your wheezy policy, >> rebuild it, and install that. We could help provide guidance on that. >> I think you'll need to rebuild the base policy on wheezy; in >> distributions with modern SELinux userspace, one could do it just by >> adding a CIL module locally. > > I could backport that myself and put the package on my apt repository. Tell > me what version of the kernel you are using and I'll have a look at it. We are testing upstream master as well as 4.4, 4.9 and 4.14. We need some modifications to: https://github.com/google/syzkaller/blob/master/tools/create-image.sh produce image with working policy.