Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp1771733rda; Tue, 24 Oct 2023 02:50:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGagir/EgoVGMeQTe2zU8stKDkm1armicVTnzqyXx32XyzoZ8cAJQZNS3VOgsX2pfkNkfqP X-Received: by 2002:a05:6870:6c12:b0:1b0:649f:e68a with SMTP id na18-20020a0568706c1200b001b0649fe68amr15744998oab.25.1698141052860; Tue, 24 Oct 2023 02:50:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698141052; cv=none; d=google.com; s=arc-20160816; b=kLuTQeo5BZAW1VLDdr4y6VpoFCR586oAiDPHuQmlidaWvL5oZrdnOLjmThTNH2IicX UaMiwxBF76XHSE2GOvoUvaUBYQmb8/l+Kxxox2xF3BiQfSLDeHEtD10pw8yjLSk4PfTN KxzcSQuuzm8oTMZfnzhiArelUc6BX8yHxsmwhB+1IsQoFZxsqGvTCAY4YbkLXZw22U5e s00xyzsAJx4OtN0W7YpQyGBfEXZRbD0fnSR5TLFRTYBJS/LU6Xm1SgFvsDs+3l3YtEBn a1/FP/tjRPlifjei1H2Zlz2+rEG0PjWOvqIXu9yudgmVW8zp6sgd1gnrI2IzUafXWeRE Z7uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:autocrypt :from:references:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=YVHAjoZo8Evg/EWRacIP+kJioLWRuLCFf7xtlOc+fbg=; fh=Vqz3SEEiCjQsz81/Bq436lc1uInOV/oEXw8GHS2wjsE=; b=0LnVjDmGiSRtJgQkvTW4lgNHe0pAIn70Fcr3bhc7w0VFtZbkNCeGT6ixLuTE297RPI FOtNpnckNmh8ih/7ib6ymhAaTTg1omXiQDRCTQmG4BgNUeCCEL8Vfh6R6RSQ52x9Ely4 SSy7HYH4jemFUlvuBoNkP2e4iCMz6+rqsqloAimLKuS55MdwCNG94CSJpW6VRjAJGkEW 2+bBwLagzPk+R3481OTnBDEizvhlPLEy1phKEVEQw5N2fMPf9XZZwXfDi31yp5zJwV0O toBpGF5eTgF9+7r3GAJZVlPqkv5GWEGwU4JtFvswVd3YM6jrzMjGefBOhd5+Xs/NoQKv tDLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PNFIN5jB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id p16-20020a631e50000000b00584ca25959csi8075143pgm.540.2023.10.24.02.50.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Oct 2023 02:50:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PNFIN5jB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id CDD5D803465E; Tue, 24 Oct 2023 02:50:10 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234234AbjJXJtz (ORCPT + 99 others); Tue, 24 Oct 2023 05:49:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41106 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233823AbjJXJtw (ORCPT ); Tue, 24 Oct 2023 05:49:52 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B20E91 for ; Tue, 24 Oct 2023 02:49:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1698140951; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=YVHAjoZo8Evg/EWRacIP+kJioLWRuLCFf7xtlOc+fbg=; b=PNFIN5jBQzbgZZA0LxWIeHP+DQTHgGQ9k7i6NMxCx87x7osNuMBA9a9srHRqXqi3ukZ/1g YIBtCwHwBUjGZ38OoJl8ZYqiUAlO/AYEXgRiR7oTOAFC3u1SS1qHwA10aHEV7g4Amz30dd ZUNtTWGTFuPAC7U6MZY/2z36AkGyr6Y= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-194-W0SE3YLgPfuxYBPKf4WG9A-1; Tue, 24 Oct 2023 05:49:08 -0400 X-MC-Unique: W0SE3YLgPfuxYBPKf4WG9A-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 1F1C3881C8A; Tue, 24 Oct 2023 09:49:08 +0000 (UTC) Received: from [10.39.208.23] (unknown [10.39.208.23]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 3D2B1492BFB; Tue, 24 Oct 2023 09:49:04 +0000 (UTC) Message-ID: <7524dee3-7c48-4864-8182-1b166b0f6faa@redhat.com> Date: Tue, 24 Oct 2023 11:49:01 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type Content-Language: en-US To: Casey Schaufler , mst@redhat.com, jasowang@redhat.com, xuanzhuo@linux.alibaba.com, paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com, stephen.smalley.work@gmail.com, eparis@parisplace.org, xieyongji@bytedance.com, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, david.marchand@redhat.com, lulu@redhat.com References: <20231020155819.24000-1-maxime.coquelin@redhat.com> <20231020155819.24000-5-maxime.coquelin@redhat.com> <923f87a1-1871-479e-832e-db67b5ae87fd@redhat.com> <64626db9-e37a-4c65-a455-fc3985382216@schaufler-ca.com> From: Maxime Coquelin Autocrypt: addr=maxime.coquelin@redhat.com; keydata= xsFNBFOEQQIBEADjNLYZZqghYuWv1nlLisptPJp+TSxE/KuP7x47e1Gr5/oMDJ1OKNG8rlNg kLgBQUki3voWhUbMb69ybqdMUHOl21DGCj0BTU3lXwapYXOAnsh8q6RRM+deUpasyT+Jvf3a gU35dgZcomRh5HPmKMU4KfeA38cVUebsFec1HuJAWzOb/UdtQkYyZR4rbzw8SbsOemtMtwOx YdXodneQD7KuRU9IhJKiEfipwqk2pufm2VSGl570l5ANyWMA/XADNhcEXhpkZ1Iwj3TWO7XR uH4xfvPl8nBsLo/EbEI7fbuUULcAnHfowQslPUm6/yaGv6cT5160SPXT1t8U9QDO6aTSo59N jH519JS8oeKZB1n1eLDslCfBpIpWkW8ZElGkOGWAN0vmpLfdyiqBNNyS3eGAfMkJ6b1A24un /TKc6j2QxM0QK4yZGfAxDxtvDv9LFXec8ENJYsbiR6WHRHq7wXl/n8guyh5AuBNQ3LIK44x0 KjGXP1FJkUhUuruGyZsMrDLBRHYi+hhDAgRjqHgoXi5XGETA1PAiNBNnQwMf5aubt+mE2Q5r qLNTgwSo2dpTU3+mJ3y3KlsIfoaxYI7XNsPRXGnZi4hbxmeb2NSXgdCXhX3nELUNYm4ArKBP LugOIT/zRwk0H0+RVwL2zHdMO1Tht1UOFGfOZpvuBF60jhMzbQARAQABzSxNYXhpbWUgQ29x dWVsaW4gPG1heGltZS5jb3F1ZWxpbkByZWRoYXQuY29tPsLBeAQTAQIAIgUCV3u/5QIbAwYL CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyjiNKEaHD4ma2g/+P+Hg9WkONPaY1J4AR7Uf kBneosS4NO3CRy0x4WYmUSLYMLx1I3VH6SVjqZ6uBoYy6Fs6TbF6SHNc7QbB6Qjo3neqnQR1 71Ua1MFvIob8vUEl3jAR/+oaE1UJKrxjWztpppQTukIk4oJOmXbL0nj3d8dA2QgHdTyttZ1H xzZJWWz6vqxCrUqHU7RSH9iWg9R2iuTzii4/vk1oi4Qz7y/q8ONOq6ffOy/t5xSZOMtZCspu Mll2Szzpc/trFO0pLH4LZZfz/nXh2uuUbk8qRIJBIjZH3ZQfACffgfNefLe2PxMqJZ8mFJXc RQO0ONZvwoOoHL6CcnFZp2i0P5ddduzwPdGsPq1bnIXnZqJSl3dUfh3xG5ArkliZ/++zGF1O wvpGvpIuOgLqjyCNNRoR7cP7y8F24gWE/HqJBXs1qzdj/5Hr68NVPV1Tu/l2D1KMOcL5sOrz 2jLXauqDWn1Okk9hkXAP7+0Cmi6QwAPuBT3i6t2e8UdtMtCE4sLesWS/XohnSFFscZR6Vaf3 gKdWiJ/fW64L6b9gjkWtHd4jAJBAIAx1JM6xcA1xMbAFsD8gA2oDBWogHGYcScY/4riDNKXi lw92d6IEHnSf6y7KJCKq8F+Jrj2BwRJiFKTJ6ChbOpyyR6nGTckzsLgday2KxBIyuh4w+hMq TGDSp2rmWGJjASrOwU0EVPSbkwEQAMkaNc084Qvql+XW+wcUIY+Dn9A2D1gMr2BVwdSfVDN7 0ZYxo9PvSkzh6eQmnZNQtl8WSHl3VG3IEDQzsMQ2ftZn2sxjcCadexrQQv3Lu60Tgj7YVYRM H+fLYt9W5YuWduJ+FPLbjIKynBf6JCRMWr75QAOhhhaI0tsie3eDsKQBA0w7WCuPiZiheJaL 4MDe9hcH4rM3ybnRW7K2dLszWNhHVoYSFlZGYh+MGpuODeQKDS035+4H2rEWgg+iaOwqD7bg CQXwTZ1kSrm8NxIRVD3MBtzp9SZdUHLfmBl/tLVwDSZvHZhhvJHC6Lj6VL4jPXF5K2+Nn/Su CQmEBisOmwnXZhhu8ulAZ7S2tcl94DCo60ReheDoPBU8PR2TLg8rS5f9w6mLYarvQWL7cDtT d2eX3Z6TggfNINr/RTFrrAd7NHl5h3OnlXj7PQ1f0kfufduOeCQddJN4gsQfxo/qvWVB7PaE 1WTIggPmWS+Xxijk7xG6x9McTdmGhYaPZBpAxewK8ypl5+yubVsE9yOOhKMVo9DoVCjh5To5 aph7CQWfQsV7cd9PfSJjI2lXI0dhEXhQ7lRCFpf3V3mD6CyrhpcJpV6XVGjxJvGUale7+IOp sQIbPKUHpB2F+ZUPWds9yyVxGwDxD8WLqKKy0WLIjkkSsOb9UBNzgRyzrEC9lgQ/ABEBAAHC wV8EGAECAAkFAlT0m5MCGwwACgkQyjiNKEaHD4nU8hAAtt0xFJAy0sOWqSmyxTc7FUcX+pbD KVyPlpl6urKKMk1XtVMUPuae/+UwvIt0urk1mXi6DnrAN50TmQqvdjcPTQ6uoZ8zjgGeASZg jj0/bJGhgUr9U7oG7Hh2F8vzpOqZrdd65MRkxmc7bWj1k81tOU2woR/Gy8xLzi0k0KUa8ueB iYOcZcIGTcs9CssVwQjYaXRoeT65LJnTxYZif2pfNxfINFzCGw42s3EtZFteczClKcVSJ1+L +QUY/J24x0/ocQX/M1PwtZbB4c/2Pg/t5FS+s6UB1Ce08xsJDcwyOPIH6O3tccZuriHgvqKP yKz/Ble76+NFlTK1mpUlfM7PVhD5XzrDUEHWRTeTJSvJ8TIPL4uyfzhjHhlkCU0mw7Pscyxn DE8G0UYMEaNgaZap8dcGMYH/96EfE5s/nTX0M6MXV0yots7U2BDb4soLCxLOJz4tAFDtNFtA wLBhXRSvWhdBJZiig/9CG3dXmKfi2H+wdUCSvEFHRpgo7GK8/Kh3vGhgKmnnxhl8ACBaGy9n fxjSxjSO6rj4/MeenmlJw1yebzkX8ZmaSi8BHe+n6jTGEFNrbiOdWpJgc5yHIZZnwXaW54QT UhhSjDL1rV2B4F28w30jYmlRmm2RdN7iCZfbyP3dvFQTzQ4ySquuPkIGcOOHrvZzxbRjzMx1 Mwqu3GQ= In-Reply-To: <64626db9-e37a-4c65-a455-fc3985382216@schaufler-ca.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.10 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 24 Oct 2023 02:50:10 -0700 (PDT) On 10/23/23 17:13, Casey Schaufler wrote: > On 10/23/2023 12:28 AM, Maxime Coquelin wrote: >> >> >> On 10/21/23 00:20, Casey Schaufler wrote: >>> On 10/20/2023 8:58 AM, Maxime Coquelin wrote: >>>> This patch introduces LSM hooks for devices creation, >>>> destruction and opening operations, checking the >>>> application is allowed to perform these operations for >>>> the Virtio device type. >>> >>> Why do you think that there needs to be a special LSM check for virtio >>> devices? What can't existing device attributes be used? >> >> Michael asked for a way for SELinux to allow/prevent the creation of >> some types of devices [0]. >> >> A device is created using ioctl() on VDUSE control chardev. Its type is >> specified via a field in the structure passed in argument. >> >> I didn't see other way than adding dedicated LSM hooks to achieve this, >> but it is possible that their is a better way to do it? > > At the very least the hook should be made more general, and I'd have to > see a proposal before commenting on that. security_dev_destroy(dev) might > be a better approach. If there's reason to control destruction of vduse > devices it's reasonable to assume that there are other devices with the > same or similar properties. VDUSE is different from other devices as the device is actually implemented by the user-space application, so this is very specific in my opinion. > > Since SELinux is your target use case, can you explain why you can't > create SELinux policy to enforce the restrictions you're after? I believe > (but can be proven wrong, of course) that SELinux has mechanism for dealing > with controls on ioctls. > I am not aware of such mechanism to deal with ioctl(), if you have a pointer that would be welcome. Thanks, Maxime > >> >> Thanks, >> Maxime >> >> [0]: >> https://lore.kernel.org/all/20230829130430-mutt-send-email-mst@kernel.org/ >> >