All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel Burgener <dburgener@linux.microsoft.com>
To: Stephen Smalley <stephen.smalley.work@gmail.com>, paul@paul-moore.com
Cc: omosnace@redhat.com, selinux@vger.kernel.org
Subject: Re: [RFC PATCH v2 2/2] selinux: move policy commit after updating selinuxfs
Date: Thu, 6 Aug 2020 14:09:11 -0400	[thread overview]
Message-ID: <6d681eeb-7c26-1419-29ab-2ad71ecf3bda@linux.microsoft.com> (raw)
In-Reply-To: <20200805155240.26473-2-stephen.smalley.work@gmail.com>

On 8/5/20 11:52 AM, Stephen Smalley wrote:
> With the refactoring of the policy load logic in the security
> server from the previous change, it is now possible to split out
> the committing of the new policy from security_load_policy() and
> perform it only after successful updating of selinuxfs.  Change
> security_load_policy() to return the newly populated policy
> data structures to the caller, export selinux_policy_commit()
> for external callers, and introduce selinux_policy_cancel() to
> provide a way to cancel the policy load in the event of an error
> during updating of the selinuxfs directory tree.  Further, rework
> the interfaces used by selinuxfs to get information from the policy
> when creating the new directory tree to take and act upon the
> new policy data structure rather than the current/active policy.
> Update selinuxfs to use these updated and new interfaces.  While
> we are here, stop re-creating the policy_capabilities directory
> on each policy load since it does not depend on the policy, and
> stop trying to create the booleans and classes directories during
> the initial creation of selinuxfs since no information is available
> until first policy load.
>
> After this change, a failure while updating the booleans and class
> directories will cause the entire policy load to be canceled, leaving
> the original policy intact, and policy load notifications to userspace
> will only happen after a successful completion of updating those
> directories.  This does not (yet) provide full atomicity with respect
> to the updating of the directory trees themselves.
>
> Signed-off-by: Stephen Smalley <stephen.smalley.work@gmail.com>

I spent a while generating userspace AVC lookups during policy load and 
everything worked as expected.

I did note unsurprisingly that the approach of querying 
/sys/fs/selinux/class directly continues to periodically fail to find 
classes, which is still expected.

Tested-by: Daniel Burgener <dburgener@linux.microsoft.com>


  reply	other threads:[~2020-08-06 18:16 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-08-05 15:52 [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load Stephen Smalley
2020-08-05 15:52 ` [RFC PATCH v2 2/2] selinux: move policy commit after updating selinuxfs Stephen Smalley
2020-08-06 18:09   ` Daniel Burgener [this message]
2020-08-07  3:41 ` [RFC PATCH v4 1/2] selinux: encapsulate policy state, refactor policy load Paul Moore
2020-08-07 12:20   ` Stephen Smalley
2020-08-12  1:50     ` Paul Moore
2020-08-12  7:15   ` peter enderborg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6d681eeb-7c26-1419-29ab-2ad71ecf3bda@linux.microsoft.com \
    --to=dburgener@linux.microsoft.com \
    --cc=omosnace@redhat.com \
    --cc=paul@paul-moore.com \
    --cc=selinux@vger.kernel.org \
    --cc=stephen.smalley.work@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.