Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751511AbZGNA3L (ORCPT ); Mon, 13 Jul 2009 20:29:11 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751267AbZGNA3K (ORCPT ); Mon, 13 Jul 2009 20:29:10 -0400 Received: from out02.mta.xmission.com ([166.70.13.232]:34208 "EHLO out02.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751071AbZGNA3J (ORCPT ); Mon, 13 Jul 2009 20:29:09 -0400 To: "David P. Quigley" Cc: jmorris@namei.org, gregkh@suse.de, sds@tycho.nsa.gov, Casey Schaufler , linux-kernel@vger.kernel.org References: <1247074106-23405-1-git-send-email-dpquigl@tycho.nsa.gov> <1247498399.4398.259.camel@localhost> <1247512705.4398.292.camel@localhost> From: ebiederm@xmission.com (Eric W. Biederman) Date: Mon, 13 Jul 2009 17:29:01 -0700 In-Reply-To: <1247512705.4398.292.camel@localhost> (David P. Quigley's message of "Mon\, 13 Jul 2009 15\:18\:25 -0400") Message-ID: User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-XM-SPF: eid=;;;mid=;;;hst=in02.mta.xmission.com;;;ip=76.21.114.89;;;frm=ebiederm@xmission.com;;;spf=neutral X-SA-Exim-Connect-IP: 76.21.114.89 X-SA-Exim-Rcpt-To: dpquigl@tycho.nsa.gov, linux-kernel@vger.kernel.org, casey@schaufler-ca.com, sds@tycho.nsa.gov, gregkh@suse.de, jmorris@namei.org X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-DCC: XMission; sa01 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;"David P. Quigley" X-Spam-Relay-Country: X-Spam-Report: * -1.8 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.0 T_TM2_M_HEADER_IN_MSG BODY: T_TM2_M_HEADER_IN_MSG * -2.6 BAYES_00 BODY: Bayesian spam probability is 0 to 1% * [score: 0.0000] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa01 1397; Body=1 Fuz1=1 Fuz2=1] * 0.0 T_TooManySym_01 4+ unique symbols in subject * 0.0 XM_SPF_Neutral SPF-Neutral * 0.0 T_TooManySym_02 5+ unique symbols in subject * 0.4 UNTRUSTED_Relay Comes from a non-trusted relay Subject: Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks. X-SA-Exim-Version: 4.2.1 (built Thu, 25 Oct 2007 00:26:12 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 9155 Lines: 197 "David P. Quigley" writes: > [ Inline Comments...] > > On Mon, 2009-07-13 at 09:50 -0700, Eric W. Biederman wrote: >> Taking the conversation back on the list. >> >> "David P. Quigley" writes: >> >> > On Sun, 2009-07-12 at 07:51 -0700, Eric W. Biederman wrote: >> >> "David P. Quigley" writes: >> >> >> >> > This patch adds a setxattr handler to the file, directory, and symlink >> >> > inode_operations structures for sysfs. This handler uses two new LSM hooks. The >> >> > first hook takes the xattr name and value and turns the context into a secid. >> >> > This is embedded into the sysfs_dirent structure so it remains persistent even >> >> > if the inode structures are evicted from the cache. The second hook allows for >> >> > the secid to be taken from the sysfs_dirent and be pushed into the inode >> >> > structure as the actual secid for the inode. >> >> > >> >> > This patch addresses an issue where SELinux was denying KVM access to the PCI >> >> > configuration entries in sysfs. The lack of setxattr handlers for sysfs >> >> > required that a single label be assigned to all entries in sysfs. Granting KVM >> >> > access to every entry in sysfs is not an acceptable solution so fine grained >> >> > labeling of sysfs is required such that individual entries can be labeled >> >> > appropriately. >> >> >> >> You are talking about write access from KVM? >> >> >> >> How can direct hardware access to something that can do arbitrary >> >> DMAs be secure? >> > >> > The bug in question is listed below. >> > >> > https://bugzilla.redhat.com/show_bug.cgi?id=499259 >> >> I see a discussion, but no discuss of the security of direct hardware >> access of a DMA capable device. > > So after reading through this again the problem isn't with KVM its with > libvirtd and other libvirt related programs. > >> >> >> > diff --git a/fs/sysfs/sysfs.h b/fs/sysfs/sysfs.h >> >> > index 3fa0d98..732d183 100644 >> >> > --- a/fs/sysfs/sysfs.h >> >> > +++ b/fs/sysfs/sysfs.h >> >> > @@ -57,6 +57,7 @@ struct sysfs_dirent { >> >> > ino_t s_ino; >> >> > umode_t s_mode; >> >> > struct iattr *s_iattr; >> >> > + u32 s_secid; >> >> > }; >> >> >> >> Could you please expand s_iattr and store the secid there? >> >> That is where all of the rest of the security information is >> >> stored in sysfs. >> > >> > I'm sorry but doing that would make the security labels first class >> > attributes. It was decided a long time ago that security labels are >> > stored in xattrs and as such don't belong in the iattr structure. I >> > tried placing the label in the iattr structure for the Labeled NFS code >> > and Christoph told me to do it another way since he didn't find that >> > approach acceptable. I'm assuming his response will be the same for a >> > secid which is supposed to be very sparingly used outside of the >> > security module. >> >> What I mean is something like: >> >> struct sysfs_iattr { >> struct iattr s_iattr; >> u32 s_secid; >> }; >> >> struct sysfs_dirent { >> ... >> ino_t s_ino; >> umode_t s_mode; >> struct sysfs_inode_attr *s_iattr; >> }; >> >> The point is to simply allocate all of this optional stuff together, >> and not use two fields in sysfs_dirent. >> >> sysfs by default keeps a very sparse inode because it can assume >> default values for all of the fields, and only bothers to keep >> the extra fields when someone changes things explicitly. Like your >> xattrs, the uid or the gid. > > Looking at the sysfs code I can see where the inode gets its default > values for everything but uid and gid. Are those set somewhere higher up > in the vfs on the init_inode path? The approach does seem reasonable but > do we want to have to allocate an entire iattr structure inside the > sysfs_inode_attr structure you propose just to store the secid? For a non-default secid. I think so. I assume we want to track when the label was set and that requires timestamps. If wind up allocating a lot of these things perhaps it will make sense to do something different. But I expect the common case will be few nodes in sysfs having non-default attributes. >> >> > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c >> >> > index 2081055..395c36d 100644 >> >> > --- a/security/selinux/hooks.c >> >> > +++ b/security/selinux/hooks.c >> >> > @@ -448,6 +448,10 @@ static int sb_finish_set_opts(struct super_block *sb) >> >> > sbsec->behavior > ARRAY_SIZE(labeling_behaviors)) >> >> > sbsec->flags &= ~SE_SBLABELSUPP; >> >> > >> >> > + /* Special handling for sysfs. Is genfs but also has setxattr handler*/ >> >> > + if (strncmp(sb->s_type->name, "sysfs", sizeof("sysfs")) == 0) >> >> > + sbsec->flags |= SE_SBLABELSUPP; >> >> >> >> What is this about? My impression is that if we have generic xattr >> >> handling sysfs is not special so why do we have a special case? >> >> >> >> Is this interface appropriate for dealing with xattrs to all >> >> linux virtual filesystmes similar to sysfs that do not currently >> >> implement xattrs. aka debugfs, proc, etc? >> > >> > Even though sysfs has a setxattr handler the labeling behavior with >> > respect to SELinux needs special handling. The idea here is that by >> > default sysfs will be labeled across the board with the same label. The >> > reason we can't use a normal style xattr handler here is because there >> > is no original backing store to pull the label from. Only after a label >> > has been changed is there a semi-persistent value that can be used for >> > reinstantiating the inode in the case that it is pruned from the cache. >> > Otherwise it falls back to the base genfs labeling of sysfs entries as >> > sysfs_t. >> >> Sounds like we want a mount option or the like here. Something explicit >> in sysfs not something explicit in the security module. >> >> I am also a bit dubious about > > I don't think a mount option is the best thing here. Labeling behavior > is something that is LSM dependent and even file system dependent within > certain LSMs. Since I don't speak for Casey that the way SELinux handles > sysfs is the way he want's Smack handling sysfs, and we can't tell what > future label based LSMs will do I think leaving it to the module to > decide is best. Sure the source needs to be the lsm and not user space. The concept however of setting a default at the beginning of time and having no special cases beyond that seems reasonable. After that beginning of time default you would not need special cases. >> > Proc also has some special case handling in the SELinux module but I >> > haven't had a chance to look at it and try to understand why. I don't >> > think that this would be a general purpose solution for all pseudo file >> > systems like you mentioned above but it may work for some of them. I'll >> > look into them a bit more and then respond about them. >> >> Sounds good. If we are going to expand the LSM it would be good to design >> something decent instead of adding a nasty add-hoc case. > > A quick look over proc and debugfs leads me to believe that a generic > mechanism for all of them short of adding generic xattr support to all > pseudo file systems would be tricky at best and even more add-hoc than > what we already do. There isn't any uniformity in the data structures > that are used in these file systems so even if we came up with a lazy > update mechanism for these attributes it looks like the implementation > would vary greatly depending on the file system. Even then it doesn't > change the add-hoc nature of the functionality as we are only trying to > handle security attributes. So why should the lsm hooks care. That is what I am really after. A common set of lsm hooks, and the lsm hooks shouldn't need to see all of the data structures for those filesystems. > The real solution which is a lot of work and I don't exactly know how I > would go about putting it together is to try to provide a generic xattr > mechanism for pseudo file systems. However I don't have any use cases > for the majority of the xattr name spaces. The only thing we have at the > moment that needs attention and only on sysfs is the security.* name > space. So trying to implement full-blown xattrs on sysfs seems like a > bunch of effort with no clear user for it. Sort of. What we are taking about with this patch is generic xattr support facing user space and the security modules. With an optimized storage backend, that will only store well know attributes. I think it makes sense to talk about a way to keep from growing lsm special cases for each new virtual filesystem. Which means sysfs and debugfs at least should share the same lsm hooks. Ideally sysctl and proc would as well but they have special cases that likely would break userspace if we changed things at the moment. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/