diff options
author | Carlos O'Donell <carlos@redhat.com> | 2014-04-10 18:31:53 -0400 |
---|---|---|
committer | Carlos O'Donell <carlos@redhat.com> | 2014-04-14 04:10:39 -0400 |
commit | 0699f766b10c86912b75f35bef697106b70c1cf6 (patch) | |
tree | a5dc479f70809dba741a4cc60dc9d0a660885659 /ChangeLog | |
parent | 809bd45fa91992dd96aeb4dc4a58d471f9e0996c (diff) | |
download | glibc-0699f766b10c86912b75f35bef697106b70c1cf6.zip glibc-0699f766b10c86912b75f35bef697106b70c1cf6.tar.gz glibc-0699f766b10c86912b75f35bef697106b70c1cf6.tar.bz2 |
nscd: Make SELinux checks dynamic.
The SELinux team has indicated to me that glibc's SELinux checks
in nscd are not being carried out as they would expect the API
to be used today. They would like to move away from static header
defines for class and permissions and instead use dynamic checks
at runtime that provide an answer which is dependent on the runtime
status of SELinux i.e. more dynamic.
The following patch is a minimal change that moves us forward in
this direction.
It does the following:
* Stop checking for SELinux headers that define NSCD__SHMEMHOST.
Check only for the presence or absence of the library.
* Don't encode the specific SELinux permission constants into a
table at build time, and instead use the symbolic name for the
permission as expected.
* Lookup the "What do we do if we don't know this permission?"
policy and use that if we find SELinux's policy is older than
the glibc policy e.g. we make a request for a permission that
SELinux doesn't know about.
* Lastly, translate the class and permission and then make
the permission check. This is done every time we lookup
a permission, and this is the expected way to use the API.
SELinux will optimize this for us, and we expect the network
latencies to hide these extra library calls.
Tested on x86, x86-64, and via Fedora Rawhide since November 2013.
See:
https://sourceware.org/ml/libc-alpha/2014-04/msg00179.html
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 10 |
1 files changed, 10 insertions, 0 deletions
@@ -1,3 +1,13 @@ +2014-04-14 Carlos O'Donell <carlos@redhat.com> + + * configure.ac: Remove SELinux header check. + * configure: Regenerate. + * nscd/selinux.c (perms): Array of const char* to permission names. + (nscd_request_avc_has_perm): Call security_deny_unknown to find + default policy. Call string_to_security_class and string_to_av_perm to + translate strings. Enforce default policy and call avs_has_perm with + results of translated strings. + 2014-04-13 David S. Miller <davem@davemloft.net> * sysdeps/sparc/fpu/libm-test-ulps: Update. |