From patchwork Thu Jan 25 03:27:55 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Taras Kondratiuk X-Patchwork-Id: 125767 Delivered-To: patch@linaro.org Received: by 10.46.66.141 with SMTP id h13csp833803ljf; Wed, 24 Jan 2018 19:38:49 -0800 (PST) X-Google-Smtp-Source: AH8x224gDUr9Aakt9KiHJ998yxN7YBI8T/iqaBNOhtkoIzFfhIWARjVfE8Z5IW8guBzDI8fBjhkC X-Received: by 10.99.116.22 with SMTP id p22mr4139497pgc.4.1516851528901; Wed, 24 Jan 2018 19:38:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516851528; cv=none; d=google.com; s=arc-20160816; b=aYGJ8Jn4kCkDufVrYpMeK3x/1b5AQ6biDU+WHxkuq1XjIilmTEP++AUsti1IJmHxUo AwD7yncaoR66jc1qiYbsSuAfWFSGDKc+rn4FcJAFwvP58ctjEfftkzRpvJ0wcs7Pqg7Y iM4aS6rH0acC9LdKxWzWzTfLjYkIlz01agSGuc7NMoNS8a9zoS6ILwIqyKKSVIVCTN/5 NlcEu85Yg9xqLEQTasFsl7yV1gdfduaJjG5lu2/Thcc7jUjjMXWrmsNiC06XWITLAY5K MAUpzO11H9gvh1lImdVl3W2pVUaGlePiBpRqAVQQCkzTGs8kqtvYFH21sqQBYG9b99rY 6qJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=SHULkiKs1SdlOrYXBNOUNyCiEY09xiCEmePUGn79qF8=; b=Up3fZK+fOmU9L9J7st9I41bR2YaBfyztAw/PkPHWAQSSTuJ4Fc1nd09Xp4DnQ5asev XK6BCwk3idnGT5z3I3QQf4HpZS1aSD2U54oZxqJuw/0GOftI3aDXYQnEoPc6eDsk36QY 2t2oB+ybq7+d3o1kwdiErYx2vYN15V2UzGI4y7awO7p5t20atTG7LpVmwXgmmfWmiZKS ZMiT+0rrC/LVn1khSywHoF+CX5kF+rZRZnd9RqrCBsn7hnQaStOSGRuzuYekRg73L/s4 nrY8QGgCwmiKtxxdIW6qrU2GUzBJdoeGBH6zD6CA9o8JVdMmQevX7ko8SMoxqEVeN6UA 36pA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cisco.com header.s=iport header.b=iDRxEcrH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cisco.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v11-v6si1253971plz.285.2018.01.24.19.38.48; Wed, 24 Jan 2018 19:38:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@cisco.com header.s=iport header.b=iDRxEcrH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cisco.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933789AbeAYDio (ORCPT + 28 others); Wed, 24 Jan 2018 22:38:44 -0500 Received: from alln-iport-5.cisco.com ([173.37.142.92]:56485 "EHLO alln-iport-5.cisco.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933490AbeAYDhh (ORCPT ); Wed, 24 Jan 2018 22:37:37 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2865; q=dns/txt; s=iport; t=1516851456; x=1518061056; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=h+x182m25pAUhcejAUrzU53jlgUVrI0n67CYLEcHg4c=; b=iDRxEcrHf0hVW+yEgRfKAG7gndch5g7eFDkZJhMDf3SrSUL6hTWcVWrp V/LK2Fyfh9JxJPwIg6wVzIaqSqLPwabehYIp0nLYdiNFo4Z8DI/lNgvIK DLrSZgL4gKbAbjcno0nAd2kpVhu0Y7Mje23fL0eDft8Ahbja+H3WYtFsD 4=; X-IronPort-AV: E=Sophos;i="5.46,409,1511827200"; d="scan'208";a="60755462" Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Jan 2018 03:28:10 +0000 Received: from sjc-ads-7132.cisco.com (sjc-ads-7132.cisco.com [10.30.217.207]) (authenticated bits=0) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id w0P3Ruj6007601 (version=TLSv1/SSLv3 cipher=AES128-SHA256 bits=128 verify=NO); Thu, 25 Jan 2018 03:28:09 GMT From: Taras Kondratiuk To: "H. Peter Anvin" , Al Viro , Arnd Bergmann , Rob Landley , Mimi Zohar , Jonathan Corbet , James McMechan Cc: initramfs@vger.kernel.org, Victor Kamensky , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, xe-linux-external@cisco.com Subject: [PATCH v2 15/15] selinux: delay sid population for rootfs till init is complete Date: Thu, 25 Jan 2018 03:27:55 +0000 Message-Id: <1516850875-25066-16-git-send-email-takondra@cisco.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1516850875-25066-1-git-send-email-takondra@cisco.com> References: <1516850875-25066-1-git-send-email-takondra@cisco.com> X-Auto-Response-Suppress: DR, OOF, AutoReply X-Authenticated-User: takondra@cisco.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Victor Kamensky With initramfs cpio format that supports extended attributes we need to skip sid population on sys_lsetxattr call from initramfs for rootfs if security server is not initialized yet. Otherwise callback in selinux_inode_post_setxattr will try to translate give security.selinux label into sid context and since security server is not available yet inode will receive default sid (typically kernel_t). Note that in the same time proper label will be stored in inode xattrs. Later, since inode sid would be already populated system will never look back at actual xattrs. But if we skip sid population for rootfs and we have policy that direct use of xattrs for rootfs, proper sid will be filled in from extended attributes one node is accessed and server is initialized. Note new DELAYAFTERINIT_MNT super block flag is introduced to only mark rootfs for such behavior. For other types of tmpfs original logic is still used. Signed-off-by: Victor Kamensky --- security/selinux/hooks.c | 9 ++++++++- security/selinux/include/security.h | 1 + 2 files changed, 9 insertions(+), 1 deletion(-) -- 2.10.3.dirty diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index f3fe65589f02..bb25268f734e 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -716,7 +716,7 @@ static int selinux_set_mnt_opts(struct super_block *sb, */ if (!strncmp(sb->s_type->name, "rootfs", sizeof("rootfs"))) - sbsec->flags |= SBLABEL_MNT; + sbsec->flags |= SBLABEL_MNT|DELAYAFTERINIT_MNT; /* Defer initialization until selinux_complete_init, after the initial policy is loaded and the security @@ -3253,6 +3253,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name, { struct inode *inode = d_backing_inode(dentry); struct inode_security_struct *isec; + struct superblock_security_struct *sbsec; u32 newsid; int rc; @@ -3261,6 +3262,12 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name, return; } + if (!ss_initialized) { + sbsec = inode->i_sb->s_security; + if (sbsec->flags & DELAYAFTERINIT_MNT) + return; + } + rc = security_context_to_sid_force(value, size, &newsid); if (rc) { printk(KERN_ERR "SELinux: unable to map context to SID" diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 02f0412d42f2..585acfd6cbcf 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -52,6 +52,7 @@ #define ROOTCONTEXT_MNT 0x04 #define DEFCONTEXT_MNT 0x08 #define SBLABEL_MNT 0x10 +#define DELAYAFTERINIT_MNT 0x20 /* Non-mount related flags */ #define SE_SBINITIALIZED 0x0100 #define SE_SBPROC 0x0200