forked from skristiansson/linux
-
Notifications
You must be signed in to change notification settings - Fork 14
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
LSM: syscalls for current process attributes
Create a system call lsm_get_self_attr() to provide the security module maintained attributes of the current process. Create a system call lsm_set_self_attr() to set a security module maintained attribute of the current process. Historically these attributes have been exposed to user space via entries in procfs under /proc/self/attr. The attribute value is provided in a lsm_ctx structure. The structure identifies the size of the attribute, and the attribute value. The format of the attribute value is defined by the security module. A flags field is included for LSM specific information. It is currently unused and must be 0. The total size of the data, including the lsm_ctx structure and any padding, is maintained as well. struct lsm_ctx { __u64 id; __u64 flags; __u64 len; __u64 ctx_len; __u8 ctx[]; }; Two new LSM hooks are used to interface with the LSMs. security_getselfattr() collects the lsm_ctx values from the LSMs that support the hook, accounting for space requirements. security_setselfattr() identifies which LSM the attribute is intended for and passes it along. Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Serge Hallyn <serge@hallyn.com> Reviewed-by: John Johansen <john.johansen@canonical.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
- Loading branch information
1 parent
267c068
commit a04a119
Showing
10 changed files
with
347 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,70 @@ | ||
.. SPDX-License-Identifier: GPL-2.0 | ||
.. Copyright (C) 2022 Casey Schaufler <casey@schaufler-ca.com> | ||
.. Copyright (C) 2022 Intel Corporation | ||
===================================== | ||
Linux Security Modules | ||
===================================== | ||
|
||
:Author: Casey Schaufler | ||
:Date: July 2023 | ||
|
||
Linux security modules (LSM) provide a mechanism to implement | ||
additional access controls to the Linux security policies. | ||
|
||
The various security modules may support any of these attributes: | ||
|
||
``LSM_ATTR_CURRENT`` is the current, active security context of the | ||
process. | ||
The proc filesystem provides this value in ``/proc/self/attr/current``. | ||
This is supported by the SELinux, Smack and AppArmor security modules. | ||
Smack also provides this value in ``/proc/self/attr/smack/current``. | ||
AppArmor also provides this value in ``/proc/self/attr/apparmor/current``. | ||
|
||
``LSM_ATTR_EXEC`` is the security context of the process at the time the | ||
current image was executed. | ||
The proc filesystem provides this value in ``/proc/self/attr/exec``. | ||
This is supported by the SELinux and AppArmor security modules. | ||
AppArmor also provides this value in ``/proc/self/attr/apparmor/exec``. | ||
|
||
``LSM_ATTR_FSCREATE`` is the security context of the process used when | ||
creating file system objects. | ||
The proc filesystem provides this value in ``/proc/self/attr/fscreate``. | ||
This is supported by the SELinux security module. | ||
|
||
``LSM_ATTR_KEYCREATE`` is the security context of the process used when | ||
creating key objects. | ||
The proc filesystem provides this value in ``/proc/self/attr/keycreate``. | ||
This is supported by the SELinux security module. | ||
|
||
``LSM_ATTR_PREV`` is the security context of the process at the time the | ||
current security context was set. | ||
The proc filesystem provides this value in ``/proc/self/attr/prev``. | ||
This is supported by the SELinux and AppArmor security modules. | ||
AppArmor also provides this value in ``/proc/self/attr/apparmor/prev``. | ||
|
||
``LSM_ATTR_SOCKCREATE`` is the security context of the process used when | ||
creating socket objects. | ||
The proc filesystem provides this value in ``/proc/self/attr/sockcreate``. | ||
This is supported by the SELinux security module. | ||
|
||
Kernel interface | ||
================ | ||
|
||
Set a security attribute of the current process | ||
----------------------------------------------- | ||
|
||
.. kernel-doc:: security/lsm_syscalls.c | ||
:identifiers: sys_lsm_set_self_attr | ||
|
||
Get the specified security attributes of the current process | ||
------------------------------------------------------------ | ||
|
||
.. kernel-doc:: security/lsm_syscalls.c | ||
:identifiers: sys_lsm_get_self_attr | ||
|
||
Additional documentation | ||
======================== | ||
|
||
* Documentation/security/lsm.rst | ||
* Documentation/security/lsm-development.rst |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
// SPDX-License-Identifier: GPL-2.0-only | ||
/* | ||
* System calls implementing the Linux Security Module API. | ||
* | ||
* Copyright (C) 2022 Casey Schaufler <casey@schaufler-ca.com> | ||
* Copyright (C) 2022 Intel Corporation | ||
*/ | ||
|
||
#include <asm/current.h> | ||
#include <linux/compiler_types.h> | ||
#include <linux/err.h> | ||
#include <linux/errno.h> | ||
#include <linux/security.h> | ||
#include <linux/stddef.h> | ||
#include <linux/syscalls.h> | ||
#include <linux/types.h> | ||
#include <linux/lsm_hooks.h> | ||
#include <uapi/linux/lsm.h> | ||
|
||
/** | ||
* sys_lsm_set_self_attr - Set current task's security module attribute | ||
* @attr: which attribute to set | ||
* @ctx: the LSM contexts | ||
* @size: size of @ctx | ||
* @flags: reserved for future use | ||
* | ||
* Sets the calling task's LSM context. On success this function | ||
* returns 0. If the attribute specified cannot be set a negative | ||
* value indicating the reason for the error is returned. | ||
*/ | ||
SYSCALL_DEFINE4(lsm_set_self_attr, unsigned int, attr, struct lsm_ctx __user *, | ||
ctx, size_t, size, u32, flags) | ||
{ | ||
return security_setselfattr(attr, ctx, size, flags); | ||
} | ||
|
||
/** | ||
* sys_lsm_get_self_attr - Return current task's security module attributes | ||
* @attr: which attribute to return | ||
* @ctx: the user-space destination for the information, or NULL | ||
* @size: pointer to the size of space available to receive the data | ||
* @flags: special handling options. LSM_FLAG_SINGLE indicates that only | ||
* attributes associated with the LSM identified in the passed @ctx be | ||
* reported. | ||
* | ||
* Returns the calling task's LSM contexts. On success this | ||
* function returns the number of @ctx array elements. This value | ||
* may be zero if there are no LSM contexts assigned. If @size is | ||
* insufficient to contain the return data -E2BIG is returned and | ||
* @size is set to the minimum required size. In all other cases | ||
* a negative value indicating the error is returned. | ||
*/ | ||
SYSCALL_DEFINE4(lsm_get_self_attr, unsigned int, attr, struct lsm_ctx __user *, | ||
ctx, size_t __user *, size, u32, flags) | ||
{ | ||
return security_getselfattr(attr, ctx, size, flags); | ||
} |
Oops, something went wrong.