Re: can't unmount /sys/fs/selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 14, 2021 at 9:22 AM Petr Lautrbach <plautrba@xxxxxxxxxx> wrote:
>
> Petr Lautrbach <plautrba@xxxxxxxxxx> writes:
>
> > Stephen Smalley <stephen.smalley.work@xxxxxxxxx> writes:
> >
> >> On Wed, Jan 13, 2021 at 4:52 PM Petr Lautrbach <plautrba@xxxxxxxxxx> wrote:
> >>>
> >>> Hi,
> >>>
> >>> we have few tests which uses `umount /sys/fs/selinux` trick to check how
> >>> userspace works in SELinux "disabled" environment. But it's not possible
> >>> with the current master:
> >>>
> >>>     # umount /sys/fs/selinux
> >>>     umount: /sys/fs/selinux: target is busy.
> >>>
> >>>     # lsof /sys/fs/selinux
> >>>     COMMAND      PID     USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
> >>>     systemd        1     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd        1     root   55r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd-u    875     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd-u    875     root    6r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     dbus-brok   1116     dbus  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     dbus-brok   1116     dbus    5r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd-l   1134     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd-l   1134     root    4r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd     1643     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     systemd     1643     root   28r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     (sd-pam)    1645     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     ...
> >>>     sshd      218874     root  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     sshd      218874     root    3r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>     sshd      218880 plautrba  mem    REG   0,21        0   19 /sys/fs/selinux/status
> >>>     sshd      218880 plautrba    3r   REG   0,21        0   19 /sys/fs/selinux/status
> >>>
> >>> It seems to be caused by commit 05bdc03130d7 ("libselinux: use kernel
> >>> status page by default") which replaced avc_netlink_open() in
> >>> avc_init_internal() with selinux_status_open()
> >>>
> >>> In case of sshd process, /sys/fs/selinux/status seems to be mapped by
> >>> selinux_check_access() which is called from pam_selinux and it's left
> >>> open as there's no selinux_status_close() in selinux_check_access().
> >>> The similar situations probably happen in systemd and dbus.
> >>>
> >>> So is it expected? Is it a bug? Do we need to change other components so
> >>> that they would call selinux_status_close() when they use check access?
> >>
> >> What if we just close the fd after mmap and not keep it open?  I don't
> >> see any use of selinux_status_fd beyond assignment and closing.
> >> Tearing down the mapping and re-creating it on every access check
> >> would defeat the purpose.
> >
> > Thanks for this hint! I've checked mmap(2) and it's there: After the
> > mmap() call has returned, the file descriptor, fd, can be closed
> > immediately without invalidating the mapping.
> >
> > I'll try it tomorrow.
>
> https://patchwork.kernel.org/project/selinux/patch/20210114133910.282686-1-plautrba@xxxxxxxxxx/
>
> With this patch fd's are closed but the mapped memory is still there:
>
>     # umount /sys/fs/selinux
>     umount: /sys/fs/selinux: target is busy.
>
>     # lsof /sys/fs/selinux
>     COMMAND   PID            USER  FD   TYPE DEVICE SIZE/OFF NODE NAME
>     systemd     1            root mem    REG   0,21        0   19 /sys/fs/selinux/status
>     systemd-u 363            root mem    REG   0,21        0   19 /sys/fs/selinux/status
>     systemd-r 393 systemd-resolve mem    REG   0,21        0   19 /sys/fs/selinux/status
>     dbus-brok 432            dbus mem    REG   0,21        0   19 /sys/fs/selinux/status
>     ...
>
>
> For now we have a workaround for our tests - `umount -l /sys/fs/selinux` works.
>
> But we should document the side effect of selinux status page change in
> release notes if there's no better solution.

Is this a problem for clean shutdown/reboot as well or does that
already use lazy unmount?
Keeping the status page mapped is by design to avoid needing to
perform system calls each time to check enforcing status, policy
seqno, etc.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux