GNU Common Lisp (gcl) - need a new security context?

Paul Howarth paul at city-fan.org
Sat Sep 6 07:23:45 UTC 2008


On Fri, 05 Sep 2008 16:54:43 -0400 (EDT)
"David A. Wheeler" <dwheeler at dwheeler.com> wrote:

> Matt Domsch wrote regarding gcl (GNU Common Lisp):
> > > >> gcl-2.6.7-18.fc9 [u'440913 ASSIGNED'] (build/make) gemi,green
> > > > I would rather like  to let die. It is a pain and does not build
> > > > anymore on any architecture. Maybe someone have a try with it?
> 
> From: G?rard Milmeister <gemi at bluewin.ch>
> > Tried that too. However that Fedora memory management and security
> > features get in the way.
> 
> Dropping gcl is a bad idea. gcl generates much better code in many
> cases; dropping makes Fedora bad for running Common Lisp (CL)
> applications. There are a lot of CL programs, and CL is still
> important; "Practical Common Lisp" was published 2005 and was a
> really popular book.
> 
> For example, performance figures for ACL2 are here:
>  http://www.cs.utexas.edu/users/moore/acl2/current/new.html#performance
> gcl is 20% faster on 64-bit, and 32% faster on 32-bit,, compared
> to the next-best implementation available on Fedora.
> 
> This may illustrate a larger security issue:
> the Fedora memory management/security features appear to
> be tuned for C/C++ programs. Unfortunately,
> they interfere with running programs written in some other languages.
> It's especially silly when the language design prevents the problem
> anyway. Take a look at the rant here, where Axiom explains how to run
> on Fedora:
> http://axiom.axiom-developer.org/axiom-website/patches/20080527.01.tpd.patch
> Axiom's solution is completely disable a lot of security functions
> for the ENTIRE system, not just for that one program. That's not good.
> 
> I think it'd better to create an SELinux security context that grants
> additional memory privileges that can be used ONLY when the
> program actually _NEEDS_ those privileges (e.g., it uses
> a gcl runtime requiring additional privileges).
> You could document a "recipe" for how to create such a
> thing would be a good idea - but you'd need to recreate it for
> every program compiled by gcl, ugh. I think it'd be better to
> have a standard context for this case (the current "unconfined" really
> is confined; maybe the new one is "really_unconfined"?).
> Having some processes less confined is better than disabling
> the security mechanisms for the entire system.

This is the approach taken for mono and java, which have similar issues.

If you use a context type of java_exec_t for something using the gcl
runtime, does it work?

Paul.

> 
> --- David A. Wheeler
> 




More information about the fedora-devel-list mailing list