LSM: Add "contents" flag to kernel_read_file hook

As with the kernel_load_data LSM hook, add a "contents" flag to the
kernel_read_file LSM hook that indicates whether the LSM can expect
a matching call to the kernel_post_read_file LSM hook with the full
contents of the file. With the coming addition of partial file read
support for kernel_read_file*() API, the LSM will no longer be able
to always see the entire contents of a file during the read calls.

For cases where the LSM must read examine the complete file contents,
it will need to do so on its own every time the kernel_read_file
hook is called with contents=false (or reject such cases). Adjust all
existing LSMs to retain existing behavior.

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Link: https://lore.kernel.org/r/20201002173828.2099543-12-keescook@chromium.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
Kees Cook 2020-10-02 10:38:23 -07:00 committed by Greg Kroah-Hartman
parent 38f901735a
commit 2039bda1fa
9 changed files with 41 additions and 14 deletions

View File

@ -39,7 +39,7 @@ int kernel_read_file(struct file *file, void **buf,
if (ret) if (ret)
return ret; return ret;
ret = security_kernel_read_file(file, id); ret = security_kernel_read_file(file, id, true);
if (ret) if (ret)
goto out; goto out;

View File

@ -23,7 +23,8 @@ extern int ima_file_mprotect(struct vm_area_struct *vma, unsigned long prot);
extern int ima_load_data(enum kernel_load_data_id id, bool contents); extern int ima_load_data(enum kernel_load_data_id id, bool contents);
extern int ima_post_load_data(char *buf, loff_t size, extern int ima_post_load_data(char *buf, loff_t size,
enum kernel_load_data_id id, char *description); enum kernel_load_data_id id, char *description);
extern int ima_read_file(struct file *file, enum kernel_read_file_id id); extern int ima_read_file(struct file *file, enum kernel_read_file_id id,
bool contents);
extern int ima_post_read_file(struct file *file, void *buf, loff_t size, extern int ima_post_read_file(struct file *file, void *buf, loff_t size,
enum kernel_read_file_id id); enum kernel_read_file_id id);
extern void ima_post_path_mknod(struct dentry *dentry); extern void ima_post_path_mknod(struct dentry *dentry);
@ -92,7 +93,8 @@ static inline int ima_post_load_data(char *buf, loff_t size,
return 0; return 0;
} }
static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) static inline int ima_read_file(struct file *file, enum kernel_read_file_id id,
bool contents)
{ {
return 0; return 0;
} }

View File

@ -188,7 +188,7 @@ LSM_HOOK(int, 0, kernel_load_data, enum kernel_load_data_id id, bool contents)
LSM_HOOK(int, 0, kernel_post_load_data, char *buf, loff_t size, LSM_HOOK(int, 0, kernel_post_load_data, char *buf, loff_t size,
enum kernel_read_file_id id, char *description) enum kernel_read_file_id id, char *description)
LSM_HOOK(int, 0, kernel_read_file, struct file *file, LSM_HOOK(int, 0, kernel_read_file, struct file *file,
enum kernel_read_file_id id) enum kernel_read_file_id id, bool contents)
LSM_HOOK(int, 0, kernel_post_read_file, struct file *file, char *buf, LSM_HOOK(int, 0, kernel_post_read_file, struct file *file, char *buf,
loff_t size, enum kernel_read_file_id id) loff_t size, enum kernel_read_file_id id)
LSM_HOOK(int, 0, task_fix_setuid, struct cred *new, const struct cred *old, LSM_HOOK(int, 0, task_fix_setuid, struct cred *new, const struct cred *old,

View File

@ -651,6 +651,7 @@
* @file contains the file structure pointing to the file being read * @file contains the file structure pointing to the file being read
* by the kernel. * by the kernel.
* @id kernel read file identifier * @id kernel read file identifier
* @contents if a subsequent @kernel_post_read_file will be called.
* Return 0 if permission is granted. * Return 0 if permission is granted.
* @kernel_post_read_file: * @kernel_post_read_file:
* Read a file specified by userspace. * Read a file specified by userspace.
@ -659,6 +660,8 @@
* @buf pointer to buffer containing the file contents. * @buf pointer to buffer containing the file contents.
* @size length of the file contents. * @size length of the file contents.
* @id kernel read file identifier * @id kernel read file identifier
* This must be paired with a prior @kernel_read_file call that had
* @contents set to true.
* Return 0 if permission is granted. * Return 0 if permission is granted.
* @task_fix_setuid: * @task_fix_setuid:
* Update the module's state after setting one or more of the user * Update the module's state after setting one or more of the user

View File

@ -391,7 +391,8 @@ int security_kernel_load_data(enum kernel_load_data_id id, bool contents);
int security_kernel_post_load_data(char *buf, loff_t size, int security_kernel_post_load_data(char *buf, loff_t size,
enum kernel_load_data_id id, enum kernel_load_data_id id,
char *description); char *description);
int security_kernel_read_file(struct file *file, enum kernel_read_file_id id); int security_kernel_read_file(struct file *file, enum kernel_read_file_id id,
bool contents);
int security_kernel_post_read_file(struct file *file, char *buf, loff_t size, int security_kernel_post_read_file(struct file *file, char *buf, loff_t size,
enum kernel_read_file_id id); enum kernel_read_file_id id);
int security_task_fix_setuid(struct cred *new, const struct cred *old, int security_task_fix_setuid(struct cred *new, const struct cred *old,
@ -1030,7 +1031,8 @@ static inline int security_kernel_post_load_data(char *buf, loff_t size,
} }
static inline int security_kernel_read_file(struct file *file, static inline int security_kernel_read_file(struct file *file,
enum kernel_read_file_id id) enum kernel_read_file_id id,
bool contents)
{ {
return 0; return 0;
} }

View File

@ -602,6 +602,7 @@ void ima_post_path_mknod(struct dentry *dentry)
* ima_read_file - pre-measure/appraise hook decision based on policy * ima_read_file - pre-measure/appraise hook decision based on policy
* @file: pointer to the file to be measured/appraised/audit * @file: pointer to the file to be measured/appraised/audit
* @read_id: caller identifier * @read_id: caller identifier
* @contents: whether a subsequent call will be made to ima_post_read_file()
* *
* Permit reading a file based on policy. The policy rules are written * Permit reading a file based on policy. The policy rules are written
* in terms of the policy identifier. Appraising the integrity of * in terms of the policy identifier. Appraising the integrity of
@ -609,8 +610,15 @@ void ima_post_path_mknod(struct dentry *dentry)
* *
* For permission return 0, otherwise return -EACCES. * For permission return 0, otherwise return -EACCES.
*/ */
int ima_read_file(struct file *file, enum kernel_read_file_id read_id) int ima_read_file(struct file *file, enum kernel_read_file_id read_id,
bool contents)
{ {
/* Reject all partial reads during appraisal. */
if (!contents) {
if (ima_appraise & IMA_APPRAISE_ENFORCE)
return -EACCES;
}
/* /*
* Do devices using pre-allocated memory run the risk of the * Do devices using pre-allocated memory run the risk of the
* firmware being accessible to the device prior to the completion * firmware being accessible to the device prior to the completion

View File

@ -118,11 +118,21 @@ static void loadpin_sb_free_security(struct super_block *mnt_sb)
} }
} }
static int loadpin_read_file(struct file *file, enum kernel_read_file_id id) static int loadpin_read_file(struct file *file, enum kernel_read_file_id id,
bool contents)
{ {
struct super_block *load_root; struct super_block *load_root;
const char *origin = kernel_read_file_id_str(id); const char *origin = kernel_read_file_id_str(id);
/*
* If we will not know that we'll be seeing the full contents
* then we cannot trust a load will be complete and unchanged
* off disk. Treat all contents=false hooks as if there were
* no associated file struct.
*/
if (!contents)
file = NULL;
/* If the file id is excluded, ignore the pinning. */ /* If the file id is excluded, ignore the pinning. */
if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) && if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) &&
ignore_read_file_id[id]) { ignore_read_file_id[id]) {
@ -179,7 +189,7 @@ static int loadpin_read_file(struct file *file, enum kernel_read_file_id id)
static int loadpin_load_data(enum kernel_load_data_id id, bool contents) static int loadpin_load_data(enum kernel_load_data_id id, bool contents)
{ {
return loadpin_read_file(NULL, (enum kernel_read_file_id) id); return loadpin_read_file(NULL, (enum kernel_read_file_id) id, contents);
} }
static struct security_hook_list loadpin_hooks[] __lsm_ro_after_init = { static struct security_hook_list loadpin_hooks[] __lsm_ro_after_init = {

View File

@ -1672,14 +1672,15 @@ int security_kernel_module_request(char *kmod_name)
return integrity_kernel_module_request(kmod_name); return integrity_kernel_module_request(kmod_name);
} }
int security_kernel_read_file(struct file *file, enum kernel_read_file_id id) int security_kernel_read_file(struct file *file, enum kernel_read_file_id id,
bool contents)
{ {
int ret; int ret;
ret = call_int_hook(kernel_read_file, 0, file, id); ret = call_int_hook(kernel_read_file, 0, file, id, contents);
if (ret) if (ret)
return ret; return ret;
return ima_read_file(file, id); return ima_read_file(file, id, contents);
} }
EXPORT_SYMBOL_GPL(security_kernel_read_file); EXPORT_SYMBOL_GPL(security_kernel_read_file);

View File

@ -4003,13 +4003,14 @@ static int selinux_kernel_module_from_file(struct file *file)
} }
static int selinux_kernel_read_file(struct file *file, static int selinux_kernel_read_file(struct file *file,
enum kernel_read_file_id id) enum kernel_read_file_id id,
bool contents)
{ {
int rc = 0; int rc = 0;
switch (id) { switch (id) {
case READING_MODULE: case READING_MODULE:
rc = selinux_kernel_module_from_file(file); rc = selinux_kernel_module_from_file(contents ? file : NULL);
break; break;
default: default:
break; break;