selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2] libselinux: Use sestatus if open
@ 2020-07-16 21:03 Mike Palmiotto
  2020-07-20 13:47 ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Mike Palmiotto @ 2020-07-16 21:03 UTC (permalink / raw)
  To: selinux

Commit bc2a8f418e3b ("libselinux: add selinux_status_* interfaces for
/selinux/status") introduced the sestatus mechanism, which allows for
mmap()'ing of the kernel status page as a replacement for avc_netlink.

The mechanism was initially intended for use by userspace object
managers which were calculating access decisions within their
application and did not rely on the libselinux AVC implementation. In
order to properly make use of sestatus within avc_has_perm(), the status
mechanism needs to properly set avc internals during status events;
else, avc_enforcing is never updated upon sestatus changes.

This commit introduces a new selinux_status_loop() function, which
replaces the default netlink-equivalent, avc_netlink_loop(). The
function watches the kernel status page until an error occurs, at which
point it will close the status page and exit the thread.In the event
that the status page cannot be opened, the thread will continue to
function as before by using a fallback netlink socket.

This allows us to replace the call to avc_netlink_open() in
avc_init_internal() with a call to selinux_status_open() and remove the
avc_netlink_check_nb() call from the critical code path in
avc_has_perm_noaudit(), as well as selinux_check_access().

Userspace object managers wanting a netlink socket can call
avc_netlink_acquire_fd() to open a netlink socket if there is not one
open already.

Update the manpage to reflect the new selinux_status_loop() and
avc_netlink_acquire_fd() functionality.

Signed-off-by: Mike Palmiotto <mike.palmiotto@crunchydata.com>
---
Tested against dbus-daemon v1.12.8 on RHEL8.2 for legacy support.
Patch V2 Changes:
- Added selinux_status_loop function for watcher threads.
- Replaced avc_netlink_open with selinux_status_open.
- Moved avc_netlink_open into avc_netlink_acquire_fd.
- Replaced avc_netlink_check_nb() call in selinux_check_access with sestatus
equivalent.
- Updated manpage and mapfile.

 libselinux/include/selinux/avc.h          |  6 ++
 libselinux/man/man3/avc_netlink_loop.3    |  8 +++
 libselinux/man/man3/selinux_status_loop.3 |  1 +
 libselinux/man/man3/selinux_status_open.3 | 12 ++++
 libselinux/src/avc.c                      | 15 +++--
 libselinux/src/avc_internal.c             | 82 ++++++++++++++++-------
 libselinux/src/avc_internal.h             |  4 ++
 libselinux/src/checkAccess.c              |  2 +-
 libselinux/src/libselinux.map             |  1 +
 libselinux/src/sestatus.c                 | 32 ++++++++-
 10 files changed, 126 insertions(+), 37 deletions(-)
 create mode 100644 libselinux/man/man3/selinux_status_loop.3

diff --git a/libselinux/include/selinux/avc.h b/libselinux/include/selinux/avc.h
index 9b23357a..fd681df4 100644
--- a/libselinux/include/selinux/avc.h
+++ b/libselinux/include/selinux/avc.h
@@ -487,6 +487,12 @@ extern int avc_netlink_check_nb(void);
  */
 extern int selinux_status_open(int fallback);
 
+/**
+ * selinux_status_loop - Watch kernel status page
+ *
+ */
+extern void selinux_status_loop(void);
+
 /**
  * selinux_status_close - Unmap and close SELinux kernel status page
  *
diff --git a/libselinux/man/man3/avc_netlink_loop.3 b/libselinux/man/man3/avc_netlink_loop.3
index c8268a12..f03d7813 100644
--- a/libselinux/man/man3/avc_netlink_loop.3
+++ b/libselinux/man/man3/avc_netlink_loop.3
@@ -54,6 +54,11 @@ closes the netlink socket.  This function is called automatically by
 returns the netlink socket descriptor number and informs the userspace AVC
 not to check the socket descriptor automatically on calls to
 .BR avc_has_perm (3).
+If no such socket descriptor exists,
+.BR avc_netlink_acquire_fd (3)
+will first call
+.BR avc_netlink_open (3)
+and then return the resulting fd.
 
 .BR avc_netlink_release_fd ()
 returns control of the netlink socket to the userspace AVC, re-enabling
@@ -78,6 +83,9 @@ with a return value return zero on success.  On error, \-1 is returned and
 .I errno
 is set appropriately.
 .
+.SH "AUTHOR"
+Originally KaiGai Kohei. Updated by Mike Palmiotto <mike.palmiotto@crunchydata.com>
+.
 .SH "SEE ALSO"
 .BR avc_open (3),
 .BR selinux_set_callback (3),
diff --git a/libselinux/man/man3/selinux_status_loop.3 b/libselinux/man/man3/selinux_status_loop.3
new file mode 100644
index 00000000..52a41690
--- /dev/null
+++ b/libselinux/man/man3/selinux_status_loop.3
@@ -0,0 +1 @@
+.so man3/selinux_status_open.3
diff --git a/libselinux/man/man3/selinux_status_open.3 b/libselinux/man/man3/selinux_status_open.3
index 2d44be57..c7f2eb6c 100644
--- a/libselinux/man/man3/selinux_status_open.3
+++ b/libselinux/man/man3/selinux_status_open.3
@@ -10,6 +10,8 @@ without invocation of system calls
 .sp
 .BI "int selinux_status_open(int " fallback ");"
 .sp
+.BI "void selinux_status_loop(void);"
+.sp
 .BI "void selinux_status_close(void);"
 .sp
 .BI "int selinux_status_updated(void);"
@@ -52,6 +54,16 @@ and overwrite corresponding callbacks ( setenforce and policyload).
 Thus, we need to pay attention to the interaction with these interfaces,
 when fallback mode is enabled.
 .sp
+.BR selinux_status_loop ()
+enters a loop which processes messages by continually checking the kernel
+status page via calls to
+.BR selinux_status_updated (3).
+If the kernel status page was not opened and
+.BR selinux_status_open (3)
+instead opened the fallback netlink socket, that socket will be checked and
+processed. On error, the function exits and unmaps the status page, or closes
+the fallback netlink socket.
+.sp
 .BR selinux_status_close ()
 unmap the kernel status page and close its file descriptor, or close the
 netlink socket if fallbacked.
diff --git a/libselinux/src/avc.c b/libselinux/src/avc.c
index b4648b2d..e36a9a53 100644
--- a/libselinux/src/avc.c
+++ b/libselinux/src/avc.c
@@ -50,7 +50,7 @@ struct avc_callback_node {
 	struct avc_callback_node *next;
 };
 
-static void *avc_netlink_thread = NULL;
+static void *avc_status_thread = NULL;
 static void *avc_lock = NULL;
 static void *avc_log_lock = NULL;
 static struct avc_node *avc_node_freelist = NULL;
@@ -215,15 +215,15 @@ static int avc_init_internal(const char *prefix,
 		avc_enforcing = rc;
 	}
 
-	rc = avc_netlink_open(0);
+	rc = selinux_status_open(1);
 	if (rc < 0) {
 		avc_log(SELINUX_ERROR,
-			"%s:  can't open netlink socket: %d (%s)\n",
+			"%s: could not open selinux status page: %d (%s)\n",
 			avc_prefix, errno, strerror(errno));
 		goto out;
 	}
 	if (avc_using_threads) {
-		avc_netlink_thread = avc_create_thread(&avc_netlink_loop);
+		avc_status_thread = avc_create_thread(&selinux_status_loop);
 		avc_netlink_trouble = 0;
 	}
 	avc_running = 1;
@@ -557,9 +557,10 @@ void avc_destroy(void)
 
 	avc_get_lock(avc_lock);
 
+	selinux_status_close();
+
 	if (avc_using_threads)
-		avc_stop_thread(avc_netlink_thread);
-	avc_netlink_close();
+		avc_stop_thread(avc_status_thread);
 
 	for (i = 0; i < AVC_CACHE_SLOTS; i++) {
 		node = avc_cache.slots[i];
@@ -766,7 +767,7 @@ int avc_has_perm_noaudit(security_id_t ssid,
 		avd_init(avd);
 
 	if (!avc_using_threads && !avc_app_main_loop) {
-		(void)avc_netlink_check_nb();
+		(void)selinux_status_updated();
 	}
 
 	if (!aeref) {
diff --git a/libselinux/src/avc_internal.c b/libselinux/src/avc_internal.c
index 568a3d92..4ef92452 100644
--- a/libselinux/src/avc_internal.c
+++ b/libselinux/src/avc_internal.c
@@ -53,6 +53,49 @@ int avc_enforcing = 1;
 int avc_setenforce = 0;
 int avc_netlink_trouble = 0;
 
+/* process setenforce events for netlink and sestatus */
+int avc_process_setenforce(int enforcing)
+{
+	int rc = 0;
+
+	avc_log(SELINUX_INFO,
+		"%s:  received setenforce notice (enforcing=%d)\n",
+		avc_prefix, enforcing);
+	if (avc_setenforce)
+		goto out;
+	avc_enforcing = enforcing;
+	if (avc_enforcing && (rc = avc_ss_reset(0)) < 0) {
+		avc_log(SELINUX_ERROR,
+			"%s:  cache reset returned %d (errno %d)\n",
+			avc_prefix, rc, errno);
+		return rc;
+	}
+
+out:
+	return selinux_netlink_setenforce(enforcing);
+}
+
+/* process policyload events for netlink and sestatus */
+int avc_process_policyload(uint32_t seqno)
+{
+	int rc = 0;
+
+	avc_log(SELINUX_INFO,
+		"%s:  received policyload notice (seqno=%u)\n",
+		avc_prefix, seqno);
+	rc = avc_ss_reset(seqno);
+	if (rc < 0) {
+		avc_log(SELINUX_ERROR,
+			"%s:  cache reset returned %d (errno %d)\n",
+			avc_prefix, rc, errno);
+		return rc;
+	}
+
+	selinux_flush_class_cache();
+
+	return selinux_netlink_policyload(seqno);
+}
+
 /* netlink socket code */
 static int fd = -1;
 
@@ -177,20 +220,7 @@ static int avc_netlink_process(void *buf)
 
 	case SELNL_MSG_SETENFORCE:{
 		struct selnl_msg_setenforce *msg = NLMSG_DATA(nlh);
-		msg->val = !!msg->val;
-		avc_log(SELINUX_INFO,
-			"%s:  received setenforce notice (enforcing=%d)\n",
-			avc_prefix, msg->val);
-		if (avc_setenforce)
-			break;
-		avc_enforcing = msg->val;
-		if (avc_enforcing && (rc = avc_ss_reset(0)) < 0) {
-			avc_log(SELINUX_ERROR,
-				"%s:  cache reset returned %d (errno %d)\n",
-				avc_prefix, rc, errno);
-			return rc;
-		}
-		rc = selinux_netlink_setenforce(msg->val);
+		rc = avc_process_setenforce(!!msg->val);
 		if (rc < 0)
 			return rc;
 		break;
@@ -198,18 +228,7 @@ static int avc_netlink_process(void *buf)
 
 	case SELNL_MSG_POLICYLOAD:{
 		struct selnl_msg_policyload *msg = NLMSG_DATA(nlh);
-		avc_log(SELINUX_INFO,
-			"%s:  received policyload notice (seqno=%u)\n",
-			avc_prefix, msg->seqno);
-		rc = avc_ss_reset(msg->seqno);
-		if (rc < 0) {
-			avc_log(SELINUX_ERROR,
-				"%s:  cache reset returned %d (errno %d)\n",
-				avc_prefix, rc, errno);
-			return rc;
-		}
-		selinux_flush_class_cache();
-		rc = selinux_netlink_policyload(msg->seqno);
+		rc = avc_process_policyload(msg->seqno);
 		if (rc < 0)
 			return rc;
 		break;
@@ -284,6 +303,17 @@ void avc_netlink_loop(void)
 
 int avc_netlink_acquire_fd(void)
 {
+	if (fd < 0) {
+		int rc = 0;
+		rc = avc_netlink_open(0);
+		if (rc < 0) {
+			avc_log(SELINUX_ERROR,
+				"%s: could not open netlink socket: %d (%s)\n",
+				avc_prefix, errno, strerror(errno));
+			return rc;
+		}
+	}
+
     avc_app_main_loop = 1;
 
     return fd;
diff --git a/libselinux/src/avc_internal.h b/libselinux/src/avc_internal.h
index 3f8a6bb1..da67affc 100644
--- a/libselinux/src/avc_internal.h
+++ b/libselinux/src/avc_internal.h
@@ -32,6 +32,10 @@ extern void (*avc_func_get_lock) (void *);
 extern void (*avc_func_release_lock) (void *);
 extern void (*avc_func_free_lock) (void *);
 
+/* selinux status processing for netlink and sestatus */
+extern int avc_process_setenforce(int enforcing);
+extern int avc_process_policyload(uint32_t seqno);
+
 static inline void set_callbacks(const struct avc_memory_callback *mem_cb,
 				 const struct avc_log_callback *log_cb,
 				 const struct avc_thread_callback *thread_cb,
diff --git a/libselinux/src/checkAccess.c b/libselinux/src/checkAccess.c
index 3491fded..b337ea64 100644
--- a/libselinux/src/checkAccess.c
+++ b/libselinux/src/checkAccess.c
@@ -39,7 +39,7 @@ int selinux_check_access(const char *scon, const char *tcon, const char *class,
 	if (rc < 0)
 		return rc;
 
-	(void) avc_netlink_check_nb();
+	(void) selinux_status_updated();
 
        sclass = string_to_security_class(class);
        if (sclass == 0) {
diff --git a/libselinux/src/libselinux.map b/libselinux/src/libselinux.map
index 2a368e93..8d8d8fd2 100644
--- a/libselinux/src/libselinux.map
+++ b/libselinux/src/libselinux.map
@@ -203,6 +203,7 @@ LIBSELINUX_1.0 {
     selinux_status_close;
     selinux_status_deny_unknown;
     selinux_status_getenforce;
+    selinux_status_loop;
     selinux_status_open;
     selinux_status_policyload;
     selinux_status_updated;
diff --git a/libselinux/src/sestatus.c b/libselinux/src/sestatus.c
index 86267ff8..6ecb6337 100644
--- a/libselinux/src/sestatus.c
+++ b/libselinux/src/sestatus.c
@@ -39,6 +39,7 @@ struct selinux_status_t
 static struct selinux_status_t *selinux_status = NULL;
 static int			selinux_status_fd;
 static uint32_t			last_seqno;
+static uint32_t			last_policyload;
 
 static uint32_t			fallback_sequence;
 static int			fallback_enforcing;
@@ -116,6 +117,15 @@ int selinux_status_updated(void)
 
 	if (last_seqno != curr_seqno)
 	{
+		if (avc_enforcing != (int) selinux_status->enforcing) {
+			if (avc_process_setenforce(selinux_status->enforcing) < 0)
+				return -1;
+		}
+		if (last_policyload != selinux_status->policyload) {
+			if (avc_process_policyload(selinux_status->policyload) < 0)
+				return -1;
+			last_policyload = selinux_status->policyload;
+		}
 		last_seqno = curr_seqno;
 		result = 1;
 	}
@@ -131,7 +141,6 @@ int selinux_status_updated(void)
 int selinux_status_getenforce(void)
 {
 	uint32_t	seqno;
-	uint32_t	enforcing;
 
 	if (selinux_status == NULL) {
 		errno = EINVAL;
@@ -149,11 +158,11 @@ int selinux_status_getenforce(void)
 	do {
 		seqno = read_sequence(selinux_status);
 
-		enforcing = selinux_status->enforcing;
+		avc_enforcing = selinux_status->enforcing;
 
 	} while (seqno != read_sequence(selinux_status));
 
-	return enforcing ? 1 : 0;
+	return avc_enforcing;
 }
 
 /*
@@ -316,6 +325,23 @@ error:
 	return -1;
 }
 
+/*
+ * selinux_status_loop
+ *
+ * Run routine for checking kernel status page in a listening thread.
+ * Falls back on netlink socket in the event of failure to open status page.
+ */
+void selinux_status_loop(void)
+{
+	/* Check kernel status page until error occurs */
+	while(selinux_status_updated() >= 0);
+
+	avc_log(SELINUX_ERROR,
+		"%s: status thread terminating due to error: %d (%s)\n",
+		avc_prefix, errno, strerror(errno));
+	selinux_status_close();
+}
+
 /*
  * selinux_status_close
  *
-- 
2.27.0


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH v2] libselinux: Use sestatus if open
  2020-07-16 21:03 [PATCH v2] libselinux: Use sestatus if open Mike Palmiotto
@ 2020-07-20 13:47 ` Stephen Smalley
  2020-07-20 13:57   ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Stephen Smalley @ 2020-07-20 13:47 UTC (permalink / raw)
  To: Mike Palmiotto; +Cc: SElinux list

On Thu, Jul 16, 2020 at 5:06 PM Mike Palmiotto
<mike.palmiotto@crunchydata.com> wrote:
>
> Commit bc2a8f418e3b ("libselinux: add selinux_status_* interfaces for
> /selinux/status") introduced the sestatus mechanism, which allows for
> mmap()'ing of the kernel status page as a replacement for avc_netlink.
>
> The mechanism was initially intended for use by userspace object
> managers which were calculating access decisions within their
> application and did not rely on the libselinux AVC implementation. In
> order to properly make use of sestatus within avc_has_perm(), the status
> mechanism needs to properly set avc internals during status events;
> else, avc_enforcing is never updated upon sestatus changes.
>
> This commit introduces a new selinux_status_loop() function, which
> replaces the default netlink-equivalent, avc_netlink_loop(). The
> function watches the kernel status page until an error occurs, at which
> point it will close the status page and exit the thread.In the event
> that the status page cannot be opened, the thread will continue to
> function as before by using a fallback netlink socket.
>
> This allows us to replace the call to avc_netlink_open() in
> avc_init_internal() with a call to selinux_status_open() and remove the
> avc_netlink_check_nb() call from the critical code path in
> avc_has_perm_noaudit(), as well as selinux_check_access().
>
> Userspace object managers wanting a netlink socket can call
> avc_netlink_acquire_fd() to open a netlink socket if there is not one
> open already.
>
> Update the manpage to reflect the new selinux_status_loop() and
> avc_netlink_acquire_fd() functionality.
>
> Signed-off-by: Mike Palmiotto <mike.palmiotto@crunchydata.com>

A few minor comments.  First, the subject line should be changed to
reflect the fact that you are changing it to use the SELinux kernel
status page whenever it is available, not just if it is already open.
Second, I'm unclear on the need/benefit of exporting
selinux_status_loop() as a public API/ABI of libselinux.  The
difference from avc_netlink_loop() I think is that one requires access
to functions/state private to libselinux while the other only uses
other public APIs/ABIs.  Also selinux_status_loop() is a pretty
trivial function.  So unless there is a compelling reason to export
selinux_status_loop(), I wouldn't make it a public interface.  A
couple of comments on the code below.

> diff --git a/libselinux/src/avc.c b/libselinux/src/avc.c
> index b4648b2d..e36a9a53 100644
> --- a/libselinux/src/avc.c
> +++ b/libselinux/src/avc.c
> @@ -557,9 +557,10 @@ void avc_destroy(void)
>
>         avc_get_lock(avc_lock);
>
> +       selinux_status_close();
> +
>         if (avc_using_threads)
> -               avc_stop_thread(avc_netlink_thread);
> -       avc_netlink_close();
> +               avc_stop_thread(avc_status_thread);

Shouldn't we perform the selinux_status_close() after stopping the thread?

> diff --git a/libselinux/src/libselinux.map b/libselinux/src/libselinux.map
> index 2a368e93..8d8d8fd2 100644
> --- a/libselinux/src/libselinux.map
> +++ b/libselinux/src/libselinux.map
> @@ -203,6 +203,7 @@ LIBSELINUX_1.0 {
>      selinux_status_close;
>      selinux_status_deny_unknown;
>      selinux_status_getenforce;
> +    selinux_status_loop;
>      selinux_status_open;
>      selinux_status_policyload;
>      selinux_status_updated;

If we were going to add a new API/ABI, it would go in a new version
for the map, tagged with whatever version it would first appear in
e.g. LIBSELINUX_3.2.  But I don't think we need it exported at all.

> diff --git a/libselinux/src/sestatus.c b/libselinux/src/sestatus.c
> index 86267ff8..6ecb6337 100644
> --- a/libselinux/src/sestatus.c
> +++ b/libselinux/src/sestatus.c
> @@ -131,7 +141,6 @@ int selinux_status_updated(void)
>  int selinux_status_getenforce(void)
>  {
>         uint32_t        seqno;
> -       uint32_t        enforcing;
>
>         if (selinux_status == NULL) {
>                 errno = EINVAL;
> @@ -149,11 +158,11 @@ int selinux_status_getenforce(void)
>         do {
>                 seqno = read_sequence(selinux_status);
>
> -               enforcing = selinux_status->enforcing;
> +               avc_enforcing = selinux_status->enforcing;
>
>         } while (seqno != read_sequence(selinux_status));
>
> -       return enforcing ? 1 : 0;
> +       return avc_enforcing;
>  }

I'm not sure this should update avc_enforcing at all, but if it does,
it should only do so once (e.g. after the loop, not within it), only
if the value actually changed, and it should use
avc_process_setenforce() to do it so that it honors avc_setenforce,
resets the AVC, and calls any callbacks.  Otherwise that will never
happen if a selinux_status_getenforce() call occurs prior to
selinux_status_updated() after a setenforce operation.

> @@ -316,6 +325,23 @@ error:
>         return -1;
>  }
>
> +/*
> + * selinux_status_loop
> + *
> + * Run routine for checking kernel status page in a listening thread.
> + * Falls back on netlink socket in the event of failure to open status page.
> + */
> +void selinux_status_loop(void)
> +{
> +       /* Check kernel status page until error occurs */
> +       while(selinux_status_updated() >= 0);
> +
> +       avc_log(SELINUX_ERROR,
> +               "%s: status thread terminating due to error: %d (%s)\n",
> +               avc_prefix, errno, strerror(errno));
> +       selinux_status_close();

Should we really be closing it here or leaving that to the caller?  We
are closing it anyway in the destroy function.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH v2] libselinux: Use sestatus if open
  2020-07-20 13:47 ` Stephen Smalley
@ 2020-07-20 13:57   ` Stephen Smalley
  0 siblings, 0 replies; 3+ messages in thread
From: Stephen Smalley @ 2020-07-20 13:57 UTC (permalink / raw)
  To: Mike Palmiotto; +Cc: SElinux list

On Mon, Jul 20, 2020 at 9:47 AM Stephen Smalley
<stephen.smalley.work@gmail.com> wrote:
>
> On Thu, Jul 16, 2020 at 5:06 PM Mike Palmiotto
> <mike.palmiotto@crunchydata.com> wrote:
> >
> > Commit bc2a8f418e3b ("libselinux: add selinux_status_* interfaces for
> > /selinux/status") introduced the sestatus mechanism, which allows for
> > mmap()'ing of the kernel status page as a replacement for avc_netlink.
> >
> > The mechanism was initially intended for use by userspace object
> > managers which were calculating access decisions within their
> > application and did not rely on the libselinux AVC implementation. In
> > order to properly make use of sestatus within avc_has_perm(), the status
> > mechanism needs to properly set avc internals during status events;
> > else, avc_enforcing is never updated upon sestatus changes.
> >
> > This commit introduces a new selinux_status_loop() function, which
> > replaces the default netlink-equivalent, avc_netlink_loop(). The
> > function watches the kernel status page until an error occurs, at which
> > point it will close the status page and exit the thread.In the event
> > that the status page cannot be opened, the thread will continue to
> > function as before by using a fallback netlink socket.
> >
> > This allows us to replace the call to avc_netlink_open() in
> > avc_init_internal() with a call to selinux_status_open() and remove the
> > avc_netlink_check_nb() call from the critical code path in
> > avc_has_perm_noaudit(), as well as selinux_check_access().
> >
> > Userspace object managers wanting a netlink socket can call
> > avc_netlink_acquire_fd() to open a netlink socket if there is not one
> > open already.
> >
> > Update the manpage to reflect the new selinux_status_loop() and
> > avc_netlink_acquire_fd() functionality.
> >
> > Signed-off-by: Mike Palmiotto <mike.palmiotto@crunchydata.com>
>
> A few minor comments.  First, the subject line should be changed to
> reflect the fact that you are changing it to use the SELinux kernel
> status page whenever it is available, not just if it is already open.
> Second, I'm unclear on the need/benefit of exporting
> selinux_status_loop() as a public API/ABI of libselinux.  The
> difference from avc_netlink_loop() I think is that one requires access
> to functions/state private to libselinux while the other only uses
> other public APIs/ABIs.  Also selinux_status_loop() is a pretty
> trivial function.  So unless there is a compelling reason to export
> selinux_status_loop(), I wouldn't make it a public interface.  A
> couple of comments on the code below.
>
> > diff --git a/libselinux/src/avc.c b/libselinux/src/avc.c
> > index b4648b2d..e36a9a53 100644
> > --- a/libselinux/src/avc.c
> > +++ b/libselinux/src/avc.c
> > @@ -557,9 +557,10 @@ void avc_destroy(void)
> >
> >         avc_get_lock(avc_lock);
> >
> > +       selinux_status_close();
> > +
> >         if (avc_using_threads)
> > -               avc_stop_thread(avc_netlink_thread);
> > -       avc_netlink_close();
> > +               avc_stop_thread(avc_status_thread);
>
> Shouldn't we perform the selinux_status_close() after stopping the thread?
>
> > diff --git a/libselinux/src/libselinux.map b/libselinux/src/libselinux.map
> > index 2a368e93..8d8d8fd2 100644
> > --- a/libselinux/src/libselinux.map
> > +++ b/libselinux/src/libselinux.map
> > @@ -203,6 +203,7 @@ LIBSELINUX_1.0 {
> >      selinux_status_close;
> >      selinux_status_deny_unknown;
> >      selinux_status_getenforce;
> > +    selinux_status_loop;
> >      selinux_status_open;
> >      selinux_status_policyload;
> >      selinux_status_updated;
>
> If we were going to add a new API/ABI, it would go in a new version
> for the map, tagged with whatever version it would first appear in
> e.g. LIBSELINUX_3.2.  But I don't think we need it exported at all.
>
> > diff --git a/libselinux/src/sestatus.c b/libselinux/src/sestatus.c
> > index 86267ff8..6ecb6337 100644
> > --- a/libselinux/src/sestatus.c
> > +++ b/libselinux/src/sestatus.c
> > @@ -131,7 +141,6 @@ int selinux_status_updated(void)
> >  int selinux_status_getenforce(void)
> >  {
> >         uint32_t        seqno;
> > -       uint32_t        enforcing;
> >
> >         if (selinux_status == NULL) {
> >                 errno = EINVAL;
> > @@ -149,11 +158,11 @@ int selinux_status_getenforce(void)
> >         do {
> >                 seqno = read_sequence(selinux_status);
> >
> > -               enforcing = selinux_status->enforcing;
> > +               avc_enforcing = selinux_status->enforcing;
> >
> >         } while (seqno != read_sequence(selinux_status));
> >
> > -       return enforcing ? 1 : 0;
> > +       return avc_enforcing;
> >  }
>
> I'm not sure this should update avc_enforcing at all, but if it does,
> it should only do so once (e.g. after the loop, not within it), only
> if the value actually changed, and it should use
> avc_process_setenforce() to do it so that it honors avc_setenforce,
> resets the AVC, and calls any callbacks.  Otherwise that will never
> happen if a selinux_status_getenforce() call occurs prior to
> selinux_status_updated() after a setenforce operation.
>
> > @@ -316,6 +325,23 @@ error:
> >         return -1;
> >  }
> >
> > +/*
> > + * selinux_status_loop
> > + *
> > + * Run routine for checking kernel status page in a listening thread.
> > + * Falls back on netlink socket in the event of failure to open status page.
> > + */
> > +void selinux_status_loop(void)
> > +{
> > +       /* Check kernel status page until error occurs */
> > +       while(selinux_status_updated() >= 0);
> > +
> > +       avc_log(SELINUX_ERROR,
> > +               "%s: status thread terminating due to error: %d (%s)\n",
> > +               avc_prefix, errno, strerror(errno));
> > +       selinux_status_close();
>
> Should we really be closing it here or leaving that to the caller?  We
> are closing it anyway in the destroy function.

Also, please put a space between while and ( above and put the
semicolon on a line by itself.
I'd also prefer a space between the (void) typecast and various calls
even though it wasn't that way in the existing code.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-07-20 13:58 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-16 21:03 [PATCH v2] libselinux: Use sestatus if open Mike Palmiotto
2020-07-20 13:47 ` Stephen Smalley
2020-07-20 13:57   ` Stephen Smalley

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).