On Thu, May 7, 2020 at 3:53 AM Chirantan Ekbote <chirantan@xxxxxxxxxxxx> wrote: > On Sat, May 2, 2020 at 3:32 AM Stephen Smalley > <stephen.smalley.work@xxxxxxxxx> wrote: > > > > > > (cc selinux list) > > > > security_inode_init_security() calls the initxattrs callback to > > actually set each xattr in the backing store (if any), so unless you > > have a way to pass that to the daemon along with the create request > > the attribute won't be persisted with the file. Setting the xattrs is > > supposed to be atomic with the file creation, not a separate > > setxattr() operation after creating the file, similar to ACL > > inheritance on new files. > > > > But it's not truly atomic, is it? The underlying file system creates > the inode and then the inode_init_security selinux hook actually sets > the attributes. What would happen if the computer lost power after > the file system driver created the inode but before the selinux hook > set the attributes? IIUC, in the case of ext4 and xfs at least, the setting of the security.selinux xattr is performed in the same transaction as the file create, so a crash will either yield a file that has its xattr set or no file at all. This is also true of POSIX ACLs. Labeled NFS (NFSv4.2) likewise is supposed to send the MAC label with the file create request and either create it with that label or not create it at all. Note that nfs however uses security_dentry_init_security() to get the MAC label since it doesn't yet have an inode and MAC labels are a first class abstraction in NFS not merely xattrs. > > - deadlock during mount with userspace waiting for mount(2) to complete > > and the kernel blocked on requesting the security.selinux xattr of the > > root directory as part of superblock setup during mount > > I haven't personally run into this. It Just Works, except for the > fscreate issue. Yes, this can be worked around in your fuse daemon if it supports handling getxattr during mount (e.g. multi-threaded, other threads can service the getxattr request while the mount(2) is still in progress). But not supported by stock fuse userspace IIUC. > I guess what I'm trying to understand is: what are the issues with > having the fuse driver call the inode_init_security hooks? Even if > it's not something that can be turned on by default in mainline, I'd > like to evaluate whether we can turn it on locally in our restricted > environment. > > One issue is the lack of atomicity guarantees. This is likely a > deal-breaker for general fuse usage. However, I don't think it's an > issue for our restricted use of virtiofs because the attributes will > be set "atomically" from the guest userspace's perspective. It won't > be atomic on the host side, but host processes don't have access to > those directories anyway. > > Are there any other issues? I don't have a problem with fuse calling the hook (either security_inode_init_security or security_dentry_init_security). It is just a question of what it will do with the result (i.e. what its initxattr callback will do for the former or what it will do with the returned label in the latter). Optimally it will take the label information and bundle it up along with the create request to the daemon, which can then handle it as a single transaction. Failing that, it needs to support setting the label in some manner during file creation that at least provides atomicity with respect to the user of the filesystem (the guest in your case).