[PATCH v2 0/2] fuse: Send file/inode security context during creation
Vivek Goyal
vgoyal at redhat.com
Tue Oct 12 18:06:22 UTC 2021
Hi,
This is V2 of patches. Posted V1 here.
https://lore.kernel.org/linux-fsdevel/20210924192442.916927-1-vgoyal@redhat.com/
Changes since v1:
- Added capability to send multiple security contexts in fuse protocol.
Miklos suggestd this. So now protocol can easily carry multiple
security labels. Just that right now we only send one. When a security
hook becomes available which can handle multiple security labels,
it should be easy to send those.
This patch series is dependent on following patch I have posted to
change signature of security_dentry_init_security().
https://lore.kernel.org/linux-fsdevel/YWWMO%2FZDrvDZ5X4c@redhat.com/
Description
-----------
When a file is created (create, mknod, mkdir, symlink), typically file
systems call security_inode_init_security() to initialize security
context of an inode. But this does not very well with remote filesystems
as inode is not there yet. Client will send a creation request to
server and once server has created the file, client will instantiate
the inode.
So filesystems like nfs and ceph use security_dentry_init_security()
instead. This takes in a dentry and returns the security context of
file if any.
These patches call security_dentry_init_security() and send security
label of file along with creation request (FUSE_CREATE, FUSE_MKDIR,
FUSE_MKNOD, FUSE_SYMLINK). This will give server an opportunity
to create new file and also set security label (possibly atomically
where possible).
These patches are based on the work Chirantan Ekbote did some time
back but it never got upstreamed. So I have taken his patches,
and made modifications on top.
https://listman.redhat.com/archives/virtio-fs/2020-July/msg00014.html
https://listman.redhat.com/archives/virtio-fs/2020-July/msg00015.html
These patches will allow us to support SELinux on virtiofs.
Vivek Goyal (2):
fuse: Add a flag FUSE_SECURITY_CTX
fuse: Send security context of inode on file creation
fs/fuse/dir.c | 115 ++++++++++++++++++++++++++++++++++++--
fs/fuse/fuse_i.h | 3 +
fs/fuse/inode.c | 4 +-
include/uapi/linux/fuse.h | 29 +++++++++-
4 files changed, 144 insertions(+), 7 deletions(-)
--
2.31.1
More information about the Linux-security-module-archive
mailing list