Message ID | 20190228224356.2608-1-casey@schaufler-ca.com (mailing list archive) |
---|---|
Headers | show
Return-Path: <linux-security-module-owner@kernel.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 5EF681390 for <patchwork-linux-security-module@patchwork.kernel.org>; Thu, 28 Feb 2019 22:44:09 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5054F28EAB for <patchwork-linux-security-module@patchwork.kernel.org>; Thu, 28 Feb 2019 22:44:09 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 4184C290F8; Thu, 28 Feb 2019 22:44:09 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_HI autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B3A80290BB for <patchwork-linux-security-module@patchwork.kernel.org>; Thu, 28 Feb 2019 22:44:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727871AbfB1WoH (ORCPT <rfc822;patchwork-linux-security-module@patchwork.kernel.org>); Thu, 28 Feb 2019 17:44:07 -0500 Received: from sonic302-10.consmr.mail.bf2.yahoo.com ([74.6.135.49]:43944 "EHLO sonic302-10.consmr.mail.bf2.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726088AbfB1WoG (ORCPT <rfc822;linux-security-module@vger.kernel.org>); Thu, 28 Feb 2019 17:44:06 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1551393844; bh=r1y0GBXKkBbY5qhMGHClPoSe5dafkvFJUOvqdLXhntA=; h=From:To:Cc:Subject:Date:From:Subject; b=qaGjqFMAXNyzRtnofY+PJKnFanD5u2I5hYIsz0AtnO5nHqTqIPhMV7k8VkLr100kGytm1zX20nUv6Y8IO/UaSGwlzknT8fSX46TrI9uaB+gpsJ0+KIS6f52KpW2KJ58m3qR/tTwlifyfVORfdZd+2IRelw+GeyaJqyt9zYvOYSS/6OgvJLa8zNYKv34pgVTJZEBNvocbSqgxgrgumLs6OPokGAUCtNINT7e2YjUBAMNn9JkRTMYSVtz/yazVNVFDhzwE5TpYGX3uYzlGCxoAJVrjXHraDQy2++FitvbPnlnm+eYXfzFOZgmjKGPHwh/5Nv32/yN2XPgCBQi0VY4cuA== X-YMail-OSG: OwiW1_cVM1mm1.xFLLfdNJz7fAeVvyo3ed3xRca2PGybJzt7ioV.SpVkRJzpbMI 4z60GfLj0b0bbEo0wgRosoiyEwAElACuzTluTeUyS1yfdOF2SYF84eU657QzPGCNzbCNxUba0jTd NdD7d.3F4wXYXywMbastlH6_RDYI9uGd_WPpfs0._C3b_LGJTmPmlbOclQPlU4Zf1P5lvVWGT5ii CEDIgQfCGts1MX59.2KDoWz8P7fQrx_X6votQkteQcqi14Xi6VGMwPDzn6KdcxEsXeZ3Cw3fG7r9 6ZoWKOvi22aSc5XDkOLsGgoAcDr2WeXZT7sAuu0SUVS2HCR8OPc8WK.h_hLVw5ZvDa._DrdRG7yN 5QrekLoVsMxvvcB2JQWal95OGA50tWBELN_j.auis3lolF7FDTUIfxA6Cp.bf3pUd.Ns4xcHAnkS c6e7dC4lSxXfeC5SqTTArJunxiroWTFZlKfDojvA0PW1HbEbU0fDvvGHY0gaRCLh0oVl0OkrcH6Q tTnCypSKCCtnJFz73LnHHZ96eJFlaLFWVcnskRfoH7GpVOnORyxvgjlwCf2Qd1MN_O65OJCHUEsZ w9ngEKvhAr.pycMQ6Pa6hy2t85c4sEUkIxIGxvvraeNK6i7Aqqj6cdRdwkKgo7D7G1FOmF87N1Zi IdyVW6SCnj6Er4hURD8ko4jBiSQd3e61MT1YfIduqqWWkCxkjGnYD66uGQddnJkow3fcHwU_vdYp pmPq9obXrS2XvE03KmTsfMlyXIvF6jiBrdidT4CCVC6KpI3x_Ruj3jhLoO9jwTBjJizKT8Kj_WwM orWi9RV3Qig0804de7ok.4G2QUt3SjKLeV.nCEt1TOl4v8ei_xlCQ1a0ZFH52WlkXF7wawBH8DqE ZRYLsSyrIvMKM1zt.NTrqKoH44cqkYi8RIL_HJoMno7yQMUVB1Ue0dxJI6S1fs0pa7I4520oX_h1 oXSVRCzIx9mxAtasvxeoi00K8N1GKFD5c_lU.OnSr2w.WKza4pOSd0w1tpMOYO1R.XGV9J9uxtqX 613.YqyY5tezWDDC9HF87yO0WwtUo895PzwO6WTEcOet.6ivBi.LTUu63J5Z.Z2LdGfqpBKIvMJX pabftFHy7HedUQs7aAgyS1zSZpAraOixB0d3CWbANYzE6nW5hEmi08_Fy76uW0XMw4P107fOu3qG n6Q-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic302.consmr.mail.bf2.yahoo.com with HTTP; Thu, 28 Feb 2019 22:44:04 +0000 Received: from c-67-169-65-224.hsd1.ca.comcast.net (EHLO localhost.localdomain) ([67.169.65.224]) by smtp428.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 731ec5e129ec3fdeedd3a533970a7e62; Thu, 28 Feb 2019 22:44:03 +0000 (UTC) From: Casey Schaufler <casey@schaufler-ca.com> To: jmorris@namei.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org Cc: keescook@chromium.org, john.johansen@canonical.com, penguin-kernel@i-love.sakura.ne.jp, paul@paul-moore.com Subject: [PATCH 00/97] LSM: Complete module stacking Date: Thu, 28 Feb 2019 14:43:29 -0800 Message-Id: <20190228224356.2608-1-casey@schaufler-ca.com> X-Mailer: git-send-email 2.17.0 Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: <linux-security-module.vger.kernel.org> X-Virus-Scanned: ClamAV using ClamSMTP |
Series |
LSM: Complete module stacking
|
expand
|
This is a preliminary version of the complete stacking implementation. The patches need to be cleaned up, and several are not strictly necessary. There is likely to be work required in the audit sub-system. It does address all the shared data, including CIPSO headers. It should handle CALIPSO once Smack supports it. I will be revising the set after 5.1. Complete the transition from module based blob management to infrastructure based blob management. This includes the socket, superblock and key blobs. Change the LSM infrastructure from exposing secids to exposing an opaque "lsm_export" structure that can contain information for multiple active security modules. Update all of the security modules to use information from the lsm_export structure. Update the LSM interfaces that expose secids for more than one module to use the export structure. Update all the users of these interfaces. Change the LSM infrastructure from using a string/size pair for security "contexts" to a "lsm_context" structure that can represent information for multiple modules. This contains information that allows the "context" to be properly freed regardless of where it is allocated and where it is used. Add an interface to identify which security module data should be presented with SO_PEERSEC. /proc/.../attr/display will set and report the name of the LSM for which the security_secid_to_secctx() will use to translate to text. If it is not explicitly set, the first security module that supplies secid (now lsm_export) interfaces will be used. To ensure consistency, a set of module hooks dealing with the secid/context processing is maintained with each process that explicitly sets it. Before sending a network packet verify that all interested security modules agree on the labeling. Fail if the labeling cannot be reconciled. This requires a new Netlabel interface to compare proposed labels, and a change to the return values from the existing netlabel attribute setting functions. git://github.com/cschaufler/lsm-stacking.git#5.0-rc3-plus-a Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> --- fs/kernfs/dir.c | 6 +- fs/kernfs/inode.c | 31 +- fs/kernfs/kernfs-internal.h | 4 +- fs/nfs/inode.c | 13 +- fs/nfs/internal.h | 8 +- fs/nfs/nfs4proc.c | 17 +- fs/nfs/nfs4xdr.c | 16 +- fs/nfsd/nfs4proc.c | 8 +- fs/nfsd/nfs4xdr.c | 14 +- fs/nfsd/vfs.c | 7 +- fs/proc/base.c | 1 + include/linux/cred.h | 3 +- include/linux/lsm_hooks.h | 122 ++-- include/linux/nfs4.h | 8 +- include/linux/security.h | 165 +++-- include/net/netlabel.h | 18 +- include/net/route.h | 55 +- include/net/scm.h | 14 +- include/net/sock.h | 14 +- include/uapi/linux/netfilter/xt_CONNMARK.h | 45 +- include/uapi/linux/netfilter/xt_DSCP.h | 27 +- include/uapi/linux/netfilter/xt_MARK.h | 17 +- include/uapi/linux/netfilter/xt_RATEEST.h | 38 +- include/uapi/linux/netfilter/xt_TCPMSS.h | 13 +- include/uapi/linux/netfilter_ipv4/ipt_ECN.h | 40 +- include/uapi/linux/netfilter_ipv4/ipt_TTL.h | 14 +- include/uapi/linux/netfilter_ipv6/ip6t_HL.h | 14 +- kernel/audit.c | 60 +- kernel/audit.h | 9 +- kernel/auditfilter.c | 6 +- kernel/auditsc.c | 61 +- kernel/cred.c | 15 +- net/ipv4/cipso_ipv4.c | 13 +- net/ipv4/ip_sockglue.c | 14 +- net/ipv4/route.c | 61 ++ net/netfilter/nf_conntrack_netlink.c | 27 +- net/netfilter/nf_conntrack_standalone.c | 16 +- net/netfilter/nfnetlink_queue.c | 35 +- net/netfilter/nft_meta.c | 8 +- net/netfilter/xt_DSCP.c | 149 ++--- net/netfilter/xt_HL.c | 164 ++--- net/netfilter/xt_RATEEST.c | 278 +++------ net/netfilter/xt_SECMARK.c | 9 +- net/netfilter/xt_TCPMSS.c | 378 +++--------- net/netlabel/netlabel_kapi.c | 125 +++- net/netlabel/netlabel_unlabeled.c | 99 ++- net/netlabel/netlabel_unlabeled.h | 2 +- net/netlabel/netlabel_user.c | 13 +- net/netlabel/netlabel_user.h | 2 +- net/socket.c | 17 + net/unix/af_unix.c | 11 +- security/apparmor/audit.c | 4 +- security/apparmor/include/audit.h | 2 +- security/apparmor/include/net.h | 6 +- security/apparmor/include/secid.h | 9 +- security/apparmor/lsm.c | 64 +- security/apparmor/secid.c | 42 +- security/integrity/ima/ima.h | 14 +- security/integrity/ima/ima_api.c | 9 +- security/integrity/ima/ima_appraise.c | 6 +- security/integrity/ima/ima_main.c | 34 +- security/integrity/ima/ima_policy.c | 19 +- security/security.c | 682 ++++++++++++++++++--- security/selinux/hooks.c | 308 +++++----- security/selinux/include/audit.h | 6 +- security/selinux/include/netlabel.h | 7 + security/selinux/include/objsec.h | 43 +- security/selinux/netlabel.c | 69 ++- security/selinux/ss/services.c | 19 +- security/smack/smack.h | 34 + security/smack/smack_access.c | 14 +- security/smack/smack_lsm.c | 389 ++++++------ security/smack/smack_netfilter.c | 48 +- security/smack/smackfs.c | 23 +- .../Z6.0+pooncelock+poonceLock+pombonce.litmus | 12 +- 75 files changed, 2369 insertions(+), 1798 deletions(-)