From patchwork Tue Sep 11 16:42:07 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Casey Schaufler X-Patchwork-Id: 10595925 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id AE7F66CB for ; Tue, 11 Sep 2018 16:49:36 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9A5C028CF9 for ; Tue, 11 Sep 2018 16:49:36 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 8E6FA29890; Tue, 11 Sep 2018 16:49:36 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=2.0 tests=BAYES_00,DKIM_SIGNED, MAILING_LIST_MULTI,NO_RDNS_DOTCOM_HELO,RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from ucol19pa09.eemsg.mail.mil (ucol19pa09.eemsg.mail.mil [214.24.24.82]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA256 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 92DD128CF9 for ; Tue, 11 Sep 2018 16:49:35 +0000 (UTC) X-EEMSG-check-008: 767194852|UCOL19PA09_EEMSG_MP7.csd.disa.mil X-IronPort-AV: E=Sophos;i="5.53,361,1531785600"; d="scan'208";a="767194852" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by ucol19pa09.eemsg.mail.mil with ESMTP; 11 Sep 2018 16:49:36 +0000 X-IronPort-AV: E=Sophos;i="5.53,361,1531785600"; d="scan'208";a="18080392" IronPort-PHdr: 9a23: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 X-IPAS-Result: A2DgFQACrpdb/wHyM5BcGwEBAQEDAQEBCQEBAYNLA4EIXCiMZIs/gWCDBpNvgV8qEwGFBINIITgUAQIBAQEBAQECAWwcDII1JIJgAwMBAiQTBgEBDCALAQIDCQEBQAgIAwEtFAERBgEHBQYCAQEBGASDAIFqAxUDmg6KHIFqM4J1AQEFgQQBAWqCPgOCUAgXiTOBGxeCAIESJ4I9hHkBEgGFd4gohR8/MI1UCYIIjXQdWIgdhXuOGIdOIWRxTSMVO4JsghkMF4NFihwBVU97AQGKYYI8AQE Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 11 Sep 2018 16:49:34 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus.infosec.tycho.ncsc.mil [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w8BGnWYb023243; Tue, 11 Sep 2018 12:49:33 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id w8BGgSCl031951 for ; Tue, 11 Sep 2018 12:42:28 -0400 Received: from goalie.tycho.ncsc.mil (goalie.infosec.tycho.ncsc.mil [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w8BGgSct023093 for ; Tue, 11 Sep 2018 12:42:28 -0400 IronPort-PHdr: 9a23:xKfZ1BwDEyQQ08fXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5ZheCt+h1hlOQDJ3Ss6kChufTqK+mXGUB5dCEsXRROIdUWUojjsMb1xclHNbDEVfyefXjdCErNN9JVFZ48XW2Kw1eEYD1YFiB6maq42s0HRPyfRFwOvyzH4fTi8qt0OXn8JTIbhRgnzG9aK58KBis6A7Y8MIRhNgqMb4/nz3OpHYAYOFK3SVoKFaUyg77/du19YV//j54oPUn9sUbCf6/Jft+RrteFzE8dWU85cmtsxSaCxqG5nwbFG4Rl0kADwvE6UTiV4zq+mvht+V70TWHJ8C+U70uWDqj4qsqAB/lgSsKLXg4pUnGg8x3i+RQpxes X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1AZBAACrpdblywbGNZcHAEBAQQBAQoBAYNLgWcog3KIcos/gWCDBpVVhHcCQoNIITgUAQIBAQEBAQECFAEBAQEBCBYGTIVFAwMjBBkBATcBDyUCJgICRRIGAQwGAgEBgx2BagMVA5oOihxvezOCdQEBBYEEAQFqgj4DglAIF3SIP4EbF4IAgRIngj2ILYJXiCiFHz8wjVQJggiNdB1YiB2Fe44Yh06Bdk0jFYMnghkMDgmDRYocAVVPjhoBAQ X-IPAS-Result: A1AZBAACrpdblywbGNZcHAEBAQQBAQoBAYNLgWcog3KIcos/gWCDBpVVhHcCQoNIITgUAQIBAQEBAQECFAEBAQEBCBYGTIVFAwMjBBkBATcBDyUCJgICRRIGAQwGAgEBgx2BagMVA5oOihxvezOCdQEBBYEEAQFqgj4DglAIF3SIP4EbF4IAgRIngj2ILYJXiCiFHz8wjVQJggiNdB1YiB2Fe44Yh06Bdk0jFYMnghkMDgmDRYocAVVPjhoBAQ X-IronPort-AV: E=Sophos;i="5.53,360,1531800000"; d="scan'208";a="366483" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 11 Sep 2018 12:42:27 -0400 IronPort-PHdr: 9a23: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 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DLAwACrpdblywbGNZcHAEBAQQBAQoBAYNLgWcog3KIcos/gWCDBpVVhHcCQoNIITgUAQIBAQEBAQECARMBAQEBAQgWBkwMgjUkgmADAyMEGQEBNwEPJQImAgJFEgYBDAYCAQGDHYFqAxUDmg6KHG97M4J1AQEFgQQBAWqCPgOCUAgXdIg/gRsXggCBEieCPYgtgleIKIUfPzCNVAmCCI10HViIHYV7jhiHToF2TSMVgyeCGQwOCYNFihwBVU+OGgEB X-IPAS-Result: A0DLAwACrpdblywbGNZcHAEBAQQBAQoBAYNLgWcog3KIcos/gWCDBpVVhHcCQoNIITgUAQIBAQEBAQECARMBAQEBAQgWBkwMgjUkgmADAyMEGQEBNwEPJQImAgJFEgYBDAYCAQGDHYFqAxUDmg6KHG97M4J1AQEFgQQBAWqCPgOCUAgXdIg/gRsXggCBEieCPYgtgleIKIUfPzCNVAmCCI10HViIHYV7jhiHToF2TSMVgyeCGQwOCYNFihwBVU+OGgEB X-IronPort-AV: E=Sophos;i="5.53,361,1531785600"; d="scan'208";a="18080007" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from updc3cpa05.eemsg.mail.mil ([214.24.27.44]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 11 Sep 2018 16:42:27 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;94b266a6-1ecf-4a10-b3b3-d41aefdfa651 Authentication-Results: upbd19pa03.eemsg.mail.mil; spf=None smtp.pra=casey@schaufler-ca.com; spf=None smtp.mailfrom=casey@schaufler-ca.com; spf=None smtp.helo=postmaster@sonic303-27.consmr.mail.ne1.yahoo.com; dkim=pass (signature verified) header.i=@yahoo.com X-EEMSG-check-008: 324482612|UPBD19PA03_EEMSG_MP3.csd.disa.mil X-EEMSG-SBRS: 3.5 X-EEMSG-ORIG-IP: 66.163.188.153 X-EEMSG-check-002: true IronPort-PHdr: 9a23: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 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CUAwDfypdbh5m8o0JbHAEBAQQBAQoBAYUyKINyiHKNIIMGlVWEdwJCg0gZBgY0FAECAQEBAQEBAQEBEwEBAQgNCQgpIwyCNSSCYAMDIwQZAQE3AQ8lAiYCAkUSBgEMBgIBAYMdgWoDFZoiihxvezOCdQEBBYEEAQFqgjwDglAIF3SIP4EyggCBEieCPYgtgleIKIUfPzCNVAmCCI10HViIHYV7jhiHToF2TSMVgyeCGQwOCYNFihwBVR8wjhoBAQ X-IPAS-Result: A0CUAwDfypdbh5m8o0JbHAEBAQQBAQoBAYUyKINyiHKNIIMGlVWEdwJCg0gZBgY0FAECAQEBAQEBAQEBEwEBAQgNCQgpIwyCNSSCYAMDIwQZAQE3AQ8lAiYCAkUSBgEMBgIBAYMdgWoDFZoiihxvezOCdQEBBYEEAQFqgjwDglAIF3SIP4EyggCBEieCPYgtgleIKIUfPzCNVAmCCI10HViIHYV7jhiHToF2TSMVgyeCGQwOCYNFihwBVR8wjhoBAQ Received: from sonic303-27.consmr.mail.ne1.yahoo.com ([66.163.188.153]) by upbd19pa03.eemsg.mail.mil with ESMTP; 11 Sep 2018 16:42:22 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1536684133; bh=pxMBbdWyRUQWupRMTBSQXs1ILab0LPqTMI4w5YFgpL0=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From:Subject; b=ecuuO93MXTPkV87HW9hjfzQlfIWFIYISreV7tpjpQxTCrOgctfJZ+Up8ntfbfjRzmItO4RIsU4mgxIxVjMZ2bhilpHTL0eRKdvB8IsL3Dr+3zZd9MIWQSYvtwb+6IomvghfIPwGpsmb7yuTZ5DB0noRcAnRVLgyqF/qtP0shC5J1vndQ5r2IhWVgsVgGMlg2P6jgVXAnq8Gx+QHTrS7MBHtYQaU16Cpn8BYJC7UeDCh5z7mU6GAO/FMyFEWfPCiF4JuMVxetMud6Qkzlbq/Zytx4Kzk4LG0G67lE8jGljxWN1Fm9b1KerQ5dHbTFIMup9i3AEjBbY5IgZ3TLJ4hnlQ== X-YMail-OSG: xLgbNVoVM1kRoG1JU0i16pGMii6aHPqtG9ySp_7vIok2XHvQJHv_zGYSj3RDY44 k5vCUMHJWws9GraSHFxt1tbNmMXFmY4mV1W7ppSy6eCAJlNOkDhiJAZAGRRfRWADFHxMVyKzUElF UAQ1.VBVx_TwaajZwM1D5dwkqiKBoVVuTrVv9AXnHtKcbSOps.secSZtX8xBh5I0k_neraN9y.cr crvaARkTCoJm.P3mM8dt_yI6K3YruvO.mX9HC2votxiQVSEvPsx5kGvOvoTMe47K7CUGocOPqyhU 2FpeavM655A7_m3sC.MWcFLPwr9ZdTeiRN4.Fgqh.vsgXzQP7LGE9.e81sSH7U6XYWuAVN8ObH1m OuqDkI9RebqRw4YUavJ_aqC5zpyqRBE8uYgO5Q0psgoNPsmOs4HloArV07OQlFiJnBmVg7HTE97v YZOYMiVd18gZql3SAv_WrFd95IoOEZ_NZcQmSRY1b47F89jKeuUHTyKRyO.qrZauzeGy6KT5TROp hJiq2yJXWsR47sTNaYM.8lV_Gfi_rrGjqITbU7BUIUOTjbx1JeYEqIs.NbdEyOdUt4CJJfH5sPVu .4Bh_jBKlodTX9mMS9iahTrJrSBIr3EU.ToeDgQ8X4e.rEf8MLeVAyVNNtM08H0whAMq_BMFn0YW nO7x85.Ofl6pQhxmllQvMZMXkHBLGBCBmXbx4r_piuL6f6HhkneHa66dNRYd9KZdUGSpfSfuRZvv 3FrktHCDVMniYZX1L8DvqyDV00Y1PmIpjGbQ6X6q7CF.ERsgYDzrSOnVhhL1vP4v4CdE7b8sNSXR Hpoq1AKa8ffemcV8vBlEi5VWVjID71kGKDKhS3JR3J5R_Hx.ZHBU9Tyf7lwp80bcV9_qzpy4fDAY PDOzuaNG_plkTHRjdymFns3Td78dKFa3XkmEtTNXxBISLSb4d61UI2dFaDIdO4OVdMR0BCpQ0J.v lwOogZrmaNucNHRZ1tDyG_OjHbB0H7UrXOV9Cl2DR.ewxgyVhvC14nvM61TEwzYfCHS3JKP1_cfg AF80xc3l2bUO94gDbvhhrnj6eeGykmbUpIHwiWRaoXrJgSA-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic303.consmr.mail.ne1.yahoo.com with HTTP; Tue, 11 Sep 2018 16:42:13 +0000 Received: from c-67-169-65-224.hsd1.ca.comcast.net (EHLO [192.168.0.102]) ([67.169.65.224]) by smtp420.mail.ne1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID a9dff44e5e7d4424e9ee126a36ee4bba; Tue, 11 Sep 2018 16:42:11 +0000 (UTC) To: LSM , James Morris , LKLM , SE Linux , John Johansen , Kees Cook , Tetsuo Handa , Paul Moore , Stephen Smalley , "linux-fsdevel@vger.kernel.org" , Alexey Dobriyan References: X-EEMSG-check-009: 444-444 From: Casey Schaufler Message-ID: <70b7f8cf-bfb1-1ec3-e4d4-5d2da632b52b@schaufler-ca.com> Date: Tue, 11 Sep 2018 09:42:07 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US X-Mailman-Approved-At: Tue, 11 Sep 2018 12:45:04 -0400 Subject: [PATCH 08/10] Smack: Abstract use of inode security blob X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: "Schaufler, Casey" Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Don't use the inode->i_security pointer directly. Provide a helper function that provides the security blob pointer. Signed-off-by: Casey Schaufler Reviewed-by: Kees Cook --- security/smack/smack.h | 9 +++++++-- security/smack/smack_lsm.c | 32 ++++++++++++++++---------------- 2 files changed, 23 insertions(+), 18 deletions(-) diff --git a/security/smack/smack.h b/security/smack/smack.h index 043525a52e94..5da5bd1b9b47 100644 --- a/security/smack/smack.h +++ b/security/smack/smack.h @@ -367,12 +367,17 @@ static inline struct smack_known **smack_file(const struct file *file) return file->f_security; } +static inline struct inode_smack *smack_inode(const struct inode *inode) +{ + return inode->i_security; +} + /* * Is the directory transmuting? */ static inline int smk_inode_transmutable(const struct inode *isp) { - struct inode_smack *sip = isp->i_security; + struct inode_smack *sip = smack_inode(isp); return (sip->smk_flags & SMK_INODE_TRANSMUTE) != 0; } @@ -381,7 +386,7 @@ static inline int smk_inode_transmutable(const struct inode *isp) */ static inline struct smack_known *smk_of_inode(const struct inode *isp) { - struct inode_smack *sip = isp->i_security; + struct inode_smack *sip = smack_inode(isp); return sip->smk_inode; } diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index d1430341798f..364699ad55b9 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -166,7 +166,7 @@ static int smk_bu_task(struct task_struct *otp, int mode, int rc) static int smk_bu_inode(struct inode *inode, int mode, int rc) { struct task_smack *tsp = smack_cred(current_cred()); - struct inode_smack *isp = inode->i_security; + struct inode_smack *isp = smack_inode(inode); char acc[SMK_NUM_ACCESS_TYPE + 1]; if (isp->smk_flags & SMK_INODE_IMPURE) @@ -198,7 +198,7 @@ static int smk_bu_file(struct file *file, int mode, int rc) struct task_smack *tsp = smack_cred(current_cred()); struct smack_known *sskp = tsp->smk_task; struct inode *inode = file_inode(file); - struct inode_smack *isp = inode->i_security; + struct inode_smack *isp = smack_inode(inode); char acc[SMK_NUM_ACCESS_TYPE + 1]; if (isp->smk_flags & SMK_INODE_IMPURE) @@ -228,7 +228,7 @@ static int smk_bu_credfile(const struct cred *cred, struct file *file, struct task_smack *tsp = smack_cred(cred); struct smack_known *sskp = tsp->smk_task; struct inode *inode = file_inode(file); - struct inode_smack *isp = inode->i_security; + struct inode_smack *isp = smack_inode(inode); char acc[SMK_NUM_ACCESS_TYPE + 1]; if (isp->smk_flags & SMK_INODE_IMPURE) @@ -824,7 +824,7 @@ static int smack_set_mnt_opts(struct super_block *sb, /* * Initialize the root inode. */ - isp = inode->i_security; + isp = smack_inode(inode); if (isp == NULL) { isp = new_inode_smack(sp->smk_root); if (isp == NULL) @@ -912,7 +912,7 @@ static int smack_bprm_set_creds(struct linux_binprm *bprm) if (bprm->called_set_creds) return 0; - isp = inode->i_security; + isp = smack_inode(inode); if (isp->smk_task == NULL || isp->smk_task == bsp->smk_task) return 0; @@ -992,7 +992,7 @@ static void smack_inode_free_rcu(struct rcu_head *head) */ static void smack_inode_free_security(struct inode *inode) { - struct inode_smack *issp = inode->i_security; + struct inode_smack *issp = smack_inode(inode); /* * The inode may still be referenced in a path walk and @@ -1020,7 +1020,7 @@ static int smack_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) { - struct inode_smack *issp = inode->i_security; + struct inode_smack *issp = smack_inode(inode); struct smack_known *skp = smk_of_current(); struct smack_known *isp = smk_of_inode(inode); struct smack_known *dsp = smk_of_inode(dir); @@ -1358,7 +1358,7 @@ static void smack_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) { struct smack_known *skp; - struct inode_smack *isp = d_backing_inode(dentry)->i_security; + struct inode_smack *isp = smack_inode(d_backing_inode(dentry)); if (strcmp(name, XATTR_NAME_SMACKTRANSMUTE) == 0) { isp->smk_flags |= SMK_INODE_TRANSMUTE; @@ -1439,7 +1439,7 @@ static int smack_inode_removexattr(struct dentry *dentry, const char *name) if (rc != 0) return rc; - isp = d_backing_inode(dentry)->i_security; + isp = smack_inode(d_backing_inode(dentry)); /* * Don't do anything special for these. * XATTR_NAME_SMACKIPIN @@ -1714,7 +1714,7 @@ static int smack_mmap_file(struct file *file, if (unlikely(IS_PRIVATE(file_inode(file)))) return 0; - isp = file_inode(file)->i_security; + isp = smack_inode(file_inode(file)); if (isp->smk_mmap == NULL) return 0; sbsp = file_inode(file)->i_sb->s_security; @@ -2056,7 +2056,7 @@ static int smack_kernel_act_as(struct cred *new, u32 secid) static int smack_kernel_create_files_as(struct cred *new, struct inode *inode) { - struct inode_smack *isp = inode->i_security; + struct inode_smack *isp = smack_inode(inode); struct task_smack *tsp = smack_cred(new); tsp->smk_forked = isp->smk_inode; @@ -2256,7 +2256,7 @@ static int smack_task_kill(struct task_struct *p, struct siginfo *info, */ static void smack_task_to_inode(struct task_struct *p, struct inode *inode) { - struct inode_smack *isp = inode->i_security; + struct inode_smack *isp = smack_inode(inode); struct smack_known *skp = smk_of_task_struct(p); isp->smk_inode = skp; @@ -2719,7 +2719,7 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) { struct smack_known *skp; - struct inode_smack *nsp = inode->i_security; + struct inode_smack *nsp = smack_inode(inode); struct socket_smack *ssp; struct socket *sock; int rc = 0; @@ -3327,7 +3327,7 @@ static void smack_d_instantiate(struct dentry *opt_dentry, struct inode *inode) if (inode == NULL) return; - isp = inode->i_security; + isp = smack_inode(inode); mutex_lock(&isp->smk_lock); /* @@ -4559,7 +4559,7 @@ static int smack_inode_copy_up(struct dentry *dentry, struct cred **new) /* * Get label from overlay inode and set it in create_sid */ - isp = d_inode(dentry->d_parent)->i_security; + isp = smack_inode(d_inode(dentry->d_parent)); skp = isp->smk_inode; tsp->smk_task = skp; *new = new_creds; @@ -4596,7 +4596,7 @@ static int smack_dentry_create_files_as(struct dentry *dentry, int mode, /* * the attribute of the containing directory */ - isp = d_inode(dentry->d_parent)->i_security; + isp = smack_inode(d_inode(dentry->d_parent)); if (isp->smk_flags & SMK_INODE_TRANSMUTE) { rcu_read_lock();