On 5/23/19 6:24 AM, Ondrej Mosnacek wrote:
This series implements an optional optimization step when building
a policydb via semodule or secilc, which identifies and removes rules
that are redundant -- i.e. they are already covered by a more general
rule based on attribute inheritance.
Since the performance penalty of this additional step is very small
(it adds about 1 s to the current running time of ~20-30 s [1]) and
it can have a big positive effect on the number of rules in policy
(it manages to remove ~40% AV rules from Fedora 29 policy), the
optimization is enabled by default and can be turned off using a
command-line option (--no-optimize) in secilc and semodule [2].
The optimization routine eliminates:
* all allow/neverallow/dontaudit/auditallow rules (including xperm
variants) that are covered by another more general rule,
* all conditional versions of the above rules that are covered by a
more general rule either in the unconditional table or in the same
branch of the same conditional.
The optimization doesn't process other rules, since they currently
do not support attributes. There is some room left for more precise
optimization of conditional rules, but it would likely bring only
little additional benefit.
When the policy is mostly or fully expanded, the optimization should
be turned off. If it isn't, the policy build time will increase a lot
for no benefit. However, the complexity of optimization will be only
linear w.r.t. the number of rules and so the impact should not be
catastrophic. (When testing with secilc on a subset of Fedora policy
with -X 100000 the build time was 1.7 s with optimization vs. 1 s
without it.)
Tested live on my Fedora 29 devel machine under normal use. No unusual
AVCs were observed with optimized policy loaded.
Travis build passed: https://travis-ci.org/WOnder93/selinux/builds/536157427
NOTE: The xperm rule support wasn't tested -- I would welcome some
peer review/testing of this part.
[1] As measured on my machine (Fedora 29 policy, x86_64).
[2] I have no problem with switching it to opt-in if that is preferred.
Ondrej Mosnacek (4):
libsepol: add a function to optimize kernel policy
secilc: optimize policy before writing
libsemanage: optimize policy on rebuild
semodule: add flag to disable policy optimization
libsemanage/include/semanage/handle.h | 4 +
libsemanage/src/direct_api.c | 7 +
libsemanage/src/handle.c | 13 +
libsemanage/src/handle.h | 1 +
libsemanage/src/libsemanage.map | 5 +
libsepol/include/sepol/policydb.h | 5 +
libsepol/include/sepol/policydb/policydb.h | 2 +
libsepol/src/libsepol.map.in | 5 +
libsepol/src/optimize.c | 370 +++++++++++++++++++++
libsepol/src/policydb_public.c | 5 +
policycoreutils/semodule/semodule.c | 12 +-
secilc/secilc.c | 16 +-
12 files changed, 442 insertions(+), 3 deletions(-)
create mode 100644 libsepol/src/optimize.c
It would be nice to have checkpolicy support this as well. It shouldn't be too
hard to do that.
I need to do some more testing, but I think something is not working correctly.
I am starting from conf files here because I have both Fedora and Android ones
that I have used for testing and it is easier to run them through checkpolicy to
convert to CIL.
With these rules:
# Redundant 1
allow tp01 tpr1:cl01 { p01a p11a p01b p11b };
allow tp02 tpr1:cl01 { p01a p11a };
allow at02 tpr1:cl01 { p01a p11a p01b };
# Redundant 2
dontaudit tp01 tpr2:cl01 { p01a p11a p01b p11b };
dontaudit tp02 tpr2:cl01 { p01a p11a };
dontaudit at02 tpr2:cl01 { p01a p11a p01b };
# Redundant 3
allow at02 tpr3:cl01 { p01a p11a p01b };
if (b01) {
allow tp01 tpr3:cl01 { p01a p11a p01b p11b };
allow tp02 tpr3:cl01 { p01a p11a };
}
# Redundant 4
dontaudit at02 tpr4:cl01 { p01a p11a p01b };
if (b01) {
dontaudit tp01 tpr4:cl01 { p01a p11a p01b p11b };
dontaudit tp02 tpr4:cl01 { p01a p11a };
}
I see the following from sediff:
Allow Rules (0 Added, 1 Removed, 0 Modified)
Removed Allow Rules: 1
- allow tp02 tpr3:cl01 { p01a p11a }; [ b01 ]:True
Dontaudit Rules (0 Added, 1 Removed, 1 Modified)
Removed Dontaudit Rules: 1
- dontaudit tp01 tpr4:cl01 { p01a p01b p11a p11b }; [ b01 ]:True
Modified Dontaudit Rules: 1
* dontaudit tp01 tpr2:cl01 { p01b p11a p01a -p11b };
So it handles Redundant 1 just fine, but has problems with Redundant 2 which
should be the same.
I don't remember what to expect from sediff for boolean rules. I had played
around with removing rules with some of my earlier lua tools and I thought that
sediff handled removing redundant rules from booleans, but I could be wrong.
I will look at this more maybe tomorrow, but most likely after the Memorial day
weekend.
Jim
--
James Carter <jwcart2@xxxxxxxxxxxxx>
National Security Agency