1. 09 1月, 2019 1 次提交
  2. 08 8月, 2018 1 次提交
  3. 18 7月, 2018 1 次提交
  4. 29 6月, 2018 1 次提交
    • J
      selinux: move user accesses in selinuxfs out of locked regions · 0da74120
      Jann Horn 提交于
      If a user is accessing a file in selinuxfs with a pointer to a userspace
      buffer that is backed by e.g. a userfaultfd, the userspace access can
      stall indefinitely, which can block fsi->mutex if it is held.
      
      For sel_read_policy(), remove the locking, since this method doesn't seem
      to access anything that requires locking.
      
      For sel_read_bool(), move the user access below the locked region.
      
      For sel_write_bool() and sel_commit_bools_write(), move the user access
      up above the locked region.
      
      Cc: stable@vger.kernel.org
      Fixes: 1da177e4 ("Linux-2.6.12-rc2")
      Signed-off-by: NJann Horn <jannh@google.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      [PM: removed an unused variable in sel_read_policy()]
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      0da74120
  5. 20 6月, 2018 1 次提交
  6. 15 5月, 2018 1 次提交
  7. 18 4月, 2018 2 次提交
    • R
      audit: normalize MAC_POLICY_LOAD record · d141136f
      Richard Guy Briggs 提交于
      The audit MAC_POLICY_LOAD record had redundant dangling keywords and was
      missing information about which LSM was responsible and its completion
      status.  While this record is only issued on success, the parser expects
      the res= field to be present.
      
      Old record:
      type=MAC_POLICY_LOAD msg=audit(1479299795.404:43): policy loaded auid=0 ses=1
      
      Delete the redundant dangling keywords, add the lsm= field and the res=
      field.
      
      New record:
      type=MAC_POLICY_LOAD msg=audit(1523293846.204:894): auid=0 ses=1 lsm=selinux res=1
      
      See: https://github.com/linux-audit/audit-kernel/issues/47Signed-off-by: NRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      d141136f
    • R
      audit: normalize MAC_STATUS record · 4195ed42
      Richard Guy Briggs 提交于
      There were two formats of the audit MAC_STATUS record, one of which was more
      standard than the other.  One listed enforcing status changes and the
      other listed enabled status changes with a non-standard label.  In
      addition, the record was missing information about which LSM was
      responsible and the operation's completion status.  While this record is
      only issued on success, the parser expects the res= field to be present.
      
      old enforcing/permissive:
      type=MAC_STATUS msg=audit(1523312831.378:24514): enforcing=0 old_enforcing=1 auid=0 ses=1
      old enable/disable:
      type=MAC_STATUS msg=audit(1523312831.378:24514): selinux=0 auid=0 ses=1
      
      List both sets of status and old values and add the lsm= field and the
      res= field.
      
      Here is the new format:
      type=MAC_STATUS msg=audit(1523293828.657:891): enforcing=0 old_enforcing=1 auid=0 ses=1 enabled=1 old-enabled=1 lsm=selinux res=1
      
      This record already accompanied a SYSCALL record.
      
      See: https://github.com/linux-audit/audit-kernel/issues/46Signed-off-by: NRichard Guy Briggs <rgb@redhat.com>
      [PM: 80-char fixes, merge fuzz, use new SELinux state functions]
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      4195ed42
  8. 17 4月, 2018 1 次提交
  9. 10 4月, 2018 1 次提交
  10. 21 3月, 2018 2 次提交
    • S
      selinux: wrap AVC state · 6b6bc620
      Stephen Smalley 提交于
      Wrap the AVC state within the selinux_state structure and
      pass it explicitly to all AVC functions.  The AVC private state
      is encapsulated in a selinux_avc structure that is referenced
      from the selinux_state.
      
      This change should have no effect on SELinux behavior or
      APIs (userspace or LSM).
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Reviewed-by: NJames Morris <james.morris@microsoft.com>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      6b6bc620
    • S
      selinux: wrap selinuxfs state · 0619f0f5
      Stephen Smalley 提交于
      Move global selinuxfs state to a per-instance structure (selinux_fs_info),
      and include a pointer to the selinux_state in this structure.
      Pass this selinux_state to all security server operations, thereby
      ensuring that each selinuxfs instance presents a view of and acts
      as an interface to a particular selinux_state instance.
      
      This change should have no effect on SELinux behavior or APIs
      (userspace or LSM).  It merely wraps the selinuxfs global state,
      links it to a particular selinux_state (currently always the single
      global selinux_state) and uses that state for all operations.
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      0619f0f5
  11. 03 3月, 2018 1 次提交
  12. 02 3月, 2018 1 次提交
    • S
      selinux: wrap global selinux state · aa8e712c
      Stephen Smalley 提交于
      Define a selinux state structure (struct selinux_state) for
      global SELinux state and pass it explicitly to all security server
      functions.  The public portion of the structure contains state
      that is used throughout the SELinux code, such as the enforcing mode.
      The structure also contains a pointer to a selinux_ss structure whose
      definition is private to the security server and contains security
      server specific state such as the policy database and SID table.
      
      This change should have no effect on SELinux behavior or APIs
      (userspace or LSM).  It merely wraps SELinux state and passes it
      explicitly as needed.
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      [PM: minor fixups needed due to collisions with the SCTP patches]
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      aa8e712c
  13. 26 5月, 2017 1 次提交
  14. 24 5月, 2017 1 次提交
  15. 23 5月, 2017 1 次提交
    • S
      selinux: log policy capability state when a policy is loaded · 4dc2fce3
      Stephen Smalley 提交于
      Log the state of SELinux policy capabilities when a policy is loaded.
      For each policy capability known to the kernel, log the policy capability
      name and the value set in the policy.  For policy capabilities that are
      set in the loaded policy but unknown to the kernel, log the policy
      capability index, since this is the only information presently available
      in the policy.
      
      Sample output with a policy created with a new capability defined
      that is not known to the kernel:
      SELinux:  policy capability network_peer_controls=1
      SELinux:  policy capability open_perms=1
      SELinux:  policy capability extended_socket_class=1
      SELinux:  policy capability always_check_network=0
      SELinux:  policy capability cgroup_seclabel=0
      SELinux:  unknown policy capability 5
      
      Resolves: https://github.com/SELinuxProject/selinux-kernel/issues/32Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      4dc2fce3
  16. 27 4月, 2017 1 次提交
  17. 29 3月, 2017 1 次提交
  18. 02 3月, 2017 1 次提交
  19. 25 2月, 2017 1 次提交
  20. 09 1月, 2017 4 次提交
    • G
      selinux: default to security isid in sel_make_bools() if no sid is found · 900fde06
      Gary Tierney 提交于
      Use SECINITSID_SECURITY as the default SID for booleans which don't have
      a matching SID returned from security_genfs_sid(), also update the
      error message to a warning which matches this.
      
      This prevents the policy failing to load (and consequently the system
      failing to boot) when there is no default genfscon statement matched for
      the selinuxfs in the new policy.
      Signed-off-by: NGary Tierney <gary.tierney@gmx.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      900fde06
    • G
      selinux: log errors when loading new policy · 4262fb51
      Gary Tierney 提交于
      Adds error logging to the code paths which can fail when loading a new
      policy in sel_write_load().  If the policy fails to be loaded from
      userspace then a warning message is printed, whereas if a failure occurs
      after loading policy from userspace an error message will be printed
      with details on where policy loading failed (recreating one of /classes/,
      /policy_capabilities/, /booleans/ in the SELinux fs).
      
      Also, if sel_make_bools() fails to obtain an SID for an entry in
      /booleans/* an error will be printed indicating the path of the
      boolean.
      Signed-off-by: NGary Tierney <gary.tierney@gmx.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      4262fb51
    • S
      selinux: clean up cred usage and simplify · be0554c9
      Stephen Smalley 提交于
      SELinux was sometimes using the task "objective" credentials when
      it could/should use the "subjective" credentials.  This was sometimes
      hidden by the fact that we were unnecessarily passing around pointers
      to the current task, making it appear as if the task could be something
      other than current, so eliminate all such passing of current.  Inline
      various permission checking helper functions that can be reduced to a
      single avc_has_perm() call.
      
      Since the credentials infrastructure only allows a task to alter
      its own credentials, we can always assume that current must be the same
      as the target task in selinux_setprocattr after the check. We likely
      should move this check from selinux_setprocattr() to proc_pid_attr_write()
      and drop the task argument to the security hook altogether; it can only
      serve to confuse things.
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      be0554c9
    • S
      selinux: support distinctions among all network address families · da69a530
      Stephen Smalley 提交于
      Extend SELinux to support distinctions among all network address families
      implemented by the kernel by defining new socket security classes
      and mapping to them. Otherwise, many sockets are mapped to the generic
      socket class and are indistinguishable in policy.  This has come up
      previously with regard to selectively allowing access to bluetooth sockets,
      and more recently with regard to selectively allowing access to AF_ALG
      sockets.  Guido Trentalancia submitted a patch that took a similar approach
      to add only support for distinguishing AF_ALG sockets, but this generalizes
      his approach to handle all address families implemented by the kernel.
      Socket security classes are also added for ICMP and SCTP sockets.
      Socket security classes were not defined for AF_* values that are reserved
      but unimplemented in the kernel, e.g. AF_NETBEUI, AF_SECURITY, AF_ASH,
      AF_ECONET, AF_SNA, AF_WANPIPE.
      
      Backward compatibility is provided by only enabling the finer-grained
      socket classes if a new policy capability is set in the policy; older
      policies will behave as before.  The legacy redhat1 policy capability
      that was only ever used in testing within Fedora for ptrace_child
      is reclaimed for this purpose; as far as I can tell, this policy
      capability is not enabled in any supported distro policy.
      
      Add a pair of conditional compilation guards to detect when new AF_* values
      are added so that we can update SELinux accordingly rather than having to
      belatedly update it long after new address families are introduced.
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      da69a530
  21. 21 11月, 2016 1 次提交
    • S
      selinux: normalize input to /sys/fs/selinux/enforce · ea49d10e
      Stephen Smalley 提交于
      At present, one can write any signed integer value to
      /sys/fs/selinux/enforce and it will be stored,
      e.g. echo -1 > /sys/fs/selinux/enforce or echo 2 >
      /sys/fs/selinux/enforce. This makes no real difference
      to the kernel, since it only ever cares if it is zero or non-zero,
      but some userspace code compares it with 1 to decide if SELinux
      is enforcing, and this could confuse it. Only a process that is
      already root and is allowed the setenforce permission in SELinux
      policy can write to /sys/fs/selinux/enforce, so this is not considered
      to be a security issue, but it should be fixed.
      Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: NPaul Moore <paul@paul-moore.com>
      ea49d10e
  22. 15 11月, 2016 1 次提交
  23. 28 9月, 2016 1 次提交
  24. 16 6月, 2016 1 次提交
  25. 23 1月, 2016 1 次提交
    • A
      wrappers for ->i_mutex access · 5955102c
      Al Viro 提交于
      parallel to mutex_{lock,unlock,trylock,is_locked,lock_nested},
      inode_foo(inode) being mutex_foo(&inode->i_mutex).
      
      Please, use those for access to ->i_mutex; over the coming cycle
      ->i_mutex will become rwsem, with ->lookup() done with it held
      only shared.
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      5955102c
  26. 04 1月, 2016 1 次提交
    • A
      selinuxfs: switch to memdup_user_nul() · 8365a719
      Al Viro 提交于
      Nothing in there gives a damn about the buffer alignment - it
      just parses its contents.  So the use of get_zeroed_page()
      doesn't buy us anything - might as well had been kmalloc(),
      which makes that code equivalent to open-coded memdup_user_nul()
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      8365a719
  27. 25 12月, 2015 1 次提交
  28. 22 10月, 2015 1 次提交
  29. 11 9月, 2015 1 次提交
  30. 01 7月, 2015 1 次提交
  31. 16 4月, 2015 1 次提交
  32. 26 3月, 2015 1 次提交
  33. 26 1月, 2015 1 次提交
  34. 04 11月, 2014 1 次提交
  35. 10 3月, 2014 1 次提交
    • N
      selinux: add gfp argument to security_xfrm_policy_alloc and fix callers · 52a4c640
      Nikolay Aleksandrov 提交于
      security_xfrm_policy_alloc can be called in atomic context so the
      allocation should be done with GFP_ATOMIC. Add an argument to let the
      callers choose the appropriate way. In order to do so a gfp argument
      needs to be added to the method xfrm_policy_alloc_security in struct
      security_operations and to the internal function
      selinux_xfrm_alloc_user. After that switch to GFP_ATOMIC in the atomic
      callers and leave GFP_KERNEL as before for the rest.
      The path that needed the gfp argument addition is:
      security_xfrm_policy_alloc -> security_ops.xfrm_policy_alloc_security ->
      all users of xfrm_policy_alloc_security (e.g. selinux_xfrm_policy_alloc) ->
      selinux_xfrm_alloc_user (here the allocation used to be GFP_KERNEL only)
      
      Now adding a gfp argument to selinux_xfrm_alloc_user requires us to also
      add it to security_context_to_sid which is used inside and prior to this
      patch did only GFP_KERNEL allocation. So add gfp argument to
      security_context_to_sid and adjust all of its callers as well.
      
      CC: Paul Moore <paul@paul-moore.com>
      CC: Dave Jones <davej@redhat.com>
      CC: Steffen Klassert <steffen.klassert@secunet.com>
      CC: Fan Du <fan.du@windriver.com>
      CC: David S. Miller <davem@davemloft.net>
      CC: LSM list <linux-security-module@vger.kernel.org>
      CC: SELinux list <selinux@tycho.nsa.gov>
      Signed-off-by: NNikolay Aleksandrov <nikolay@redhat.com>
      Acked-by: NPaul Moore <paul@paul-moore.com>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      52a4c640