lsm: create new security_cred_getlsmprop LSM hook
authorCasey Schaufler <casey@schaufler-ca.com>
Wed, 9 Oct 2024 17:32:18 +0000 (10:32 -0700)
committerPaul Moore <paul@paul-moore.com>
Fri, 11 Oct 2024 18:34:15 +0000 (14:34 -0400)
Create a new LSM hook security_cred_getlsmprop() which, like
security_cred_getsecid(), fetches LSM specific attributes from the
cred structure.  The associated data elements in the audit sub-system
are changed from a secid to a lsm_prop to accommodate multiple possible
LSM audit users.

Cc: linux-integrity@vger.kernel.org
Cc: audit@vger.kernel.org
Cc: selinux@vger.kernel.org
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
[PM: subj line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
include/linux/lsm_hook_defs.h
include/linux/security.h
security/integrity/ima/ima_main.c
security/security.c
security/selinux/hooks.c
security/smack/smack_lsm.c

index 23ad7e4f8c6787585460701182412d4e58cf8280..eb2937599cb029004f491012b3bf5a3d6d2731df 100644 (file)
@@ -218,6 +218,8 @@ LSM_HOOK(int, 0, cred_prepare, struct cred *new, const struct cred *old,
 LSM_HOOK(void, LSM_RET_VOID, cred_transfer, struct cred *new,
         const struct cred *old)
 LSM_HOOK(void, LSM_RET_VOID, cred_getsecid, const struct cred *c, u32 *secid)
+LSM_HOOK(void, LSM_RET_VOID, cred_getlsmprop, const struct cred *c,
+        struct lsm_prop *prop)
 LSM_HOOK(int, 0, kernel_act_as, struct cred *new, u32 secid)
 LSM_HOOK(int, 0, kernel_create_files_as, struct cred *new, struct inode *inode)
 LSM_HOOK(int, 0, kernel_module_request, char *kmod_name)
index 2b19ef5d799c0f1da2f03823ff07e981d6617a81..acd2e5d1b0ff2ce5e1fa9479d842d804ea22cec3 100644 (file)
@@ -488,6 +488,7 @@ void security_cred_free(struct cred *cred);
 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp);
 void security_transfer_creds(struct cred *new, const struct cred *old);
 void security_cred_getsecid(const struct cred *c, u32 *secid);
+void security_cred_getlsmprop(const struct cred *c, struct lsm_prop *prop);
 int security_kernel_act_as(struct cred *new, u32 secid);
 int security_kernel_create_files_as(struct cred *new, struct inode *inode);
 int security_kernel_module_request(char *kmod_name);
@@ -1229,6 +1230,10 @@ static inline void security_cred_getsecid(const struct cred *c, u32 *secid)
        *secid = 0;
 }
 
+static inline void security_cred_getlsmprop(const struct cred *c,
+                                           struct lsm_prop *prop)
+{ }
+
 static inline int security_kernel_act_as(struct cred *cred, u32 secid)
 {
        return 0;
index 553a6f54a1e205a90e7e6534ce67eed0885d7cc6..91154bb05900f3539a90117dc724c84ec3032da0 100644 (file)
@@ -541,8 +541,7 @@ static int ima_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
 static int ima_bprm_check(struct linux_binprm *bprm)
 {
        int ret;
-       u32 secid;
-       struct lsm_prop prop = { };
+       struct lsm_prop prop;
 
        security_current_getlsmprop_subj(&prop);
        ret = process_measurement(bprm->file, current_cred(),
@@ -550,9 +549,7 @@ static int ima_bprm_check(struct linux_binprm *bprm)
        if (ret)
                return ret;
 
-       security_cred_getsecid(bprm->cred, &secid);
-       /* scaffolding */
-       prop.scaffold.secid = secid;
+       security_cred_getlsmprop(bprm->cred, &prop);
        return process_measurement(bprm->file, bprm->cred, &prop, NULL, 0,
                                   MAY_EXEC, CREDS_CHECK);
 }
index 5e76e35dda092031627644bad9f6fdf5584810e0..0003d5ace5cc1b465c492146d499354664e94913 100644 (file)
@@ -3272,6 +3272,21 @@ void security_cred_getsecid(const struct cred *c, u32 *secid)
 }
 EXPORT_SYMBOL(security_cred_getsecid);
 
+/**
+ * security_cred_getlsmprop() - Get the LSM data from a set of credentials
+ * @c: credentials
+ * @prop: destination for the LSM data
+ *
+ * Retrieve the security data of the cred structure @c.  In case of
+ * failure, @prop will be cleared.
+ */
+void security_cred_getlsmprop(const struct cred *c, struct lsm_prop *prop)
+{
+       lsmprop_init(prop);
+       call_void_hook(cred_getlsmprop, c, prop);
+}
+EXPORT_SYMBOL(security_cred_getlsmprop);
+
 /**
  * security_kernel_act_as() - Set the kernel credentials to act as secid
  * @new: credentials
index a9f8d10062b58d5cf4e6f6e5d523c7e0e3529ac4..438dfa17faae7efbe74291c70209ae6e511d36a7 100644 (file)
@@ -4037,6 +4037,13 @@ static void selinux_cred_getsecid(const struct cred *c, u32 *secid)
        *secid = cred_sid(c);
 }
 
+static void selinux_cred_getlsmprop(const struct cred *c, struct lsm_prop *prop)
+{
+       prop->selinux.secid = cred_sid(c);
+       /* scaffolding */
+       prop->scaffold.secid = prop->selinux.secid;
+}
+
 /*
  * set the security data for a kernel service
  * - all the creation contexts are set to unlabelled
@@ -7203,6 +7210,7 @@ static struct security_hook_list selinux_hooks[] __ro_after_init = {
        LSM_HOOK_INIT(cred_prepare, selinux_cred_prepare),
        LSM_HOOK_INIT(cred_transfer, selinux_cred_transfer),
        LSM_HOOK_INIT(cred_getsecid, selinux_cred_getsecid),
+       LSM_HOOK_INIT(cred_getlsmprop, selinux_cred_getlsmprop),
        LSM_HOOK_INIT(kernel_act_as, selinux_kernel_act_as),
        LSM_HOOK_INIT(kernel_create_files_as, selinux_kernel_create_files_as),
        LSM_HOOK_INIT(kernel_module_request, selinux_kernel_module_request),
index 5c3cb283710531ae7e5f53460e9c9c59615b50d6..52cc6a65d67420ec2135771fdb482adba2e0f995 100644 (file)
@@ -2150,6 +2150,23 @@ static void smack_cred_getsecid(const struct cred *cred, u32 *secid)
        rcu_read_unlock();
 }
 
+/**
+ * smack_cred_getlsmprop - get the Smack label for a creds structure
+ * @cred: the object creds
+ * @prop: where to put the data
+ *
+ * Sets the Smack part of the ref
+ */
+static void smack_cred_getlsmprop(const struct cred *cred,
+                                 struct lsm_prop *prop)
+{
+       rcu_read_lock();
+       prop->smack.skp = smk_of_task(smack_cred(cred));
+       /* scaffolding */
+       prop->scaffold.secid = prop->smack.skp->smk_secid;
+       rcu_read_unlock();
+}
+
 /**
  * smack_kernel_act_as - Set the subjective context in a set of credentials
  * @new: points to the set of credentials to be modified.
@@ -5132,6 +5149,7 @@ static struct security_hook_list smack_hooks[] __ro_after_init = {
        LSM_HOOK_INIT(cred_prepare, smack_cred_prepare),
        LSM_HOOK_INIT(cred_transfer, smack_cred_transfer),
        LSM_HOOK_INIT(cred_getsecid, smack_cred_getsecid),
+       LSM_HOOK_INIT(cred_getlsmprop, smack_cred_getlsmprop),
        LSM_HOOK_INIT(kernel_act_as, smack_kernel_act_as),
        LSM_HOOK_INIT(kernel_create_files_as, smack_kernel_create_files_as),
        LSM_HOOK_INIT(task_setpgid, smack_task_setpgid),