Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp997320imm; Sat, 14 Jul 2018 19:15:15 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeP72HVAW34K0/8XIJ5R2S3hxymAphM/IAAVsm1jkWuGHFKXGdF4PG4smTkpNc88XiaQM4t X-Received: by 2002:a17:902:5ac3:: with SMTP id g3-v6mr11674875plm.90.1531620915664; Sat, 14 Jul 2018 19:15:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531620915; cv=none; d=google.com; s=arc-20160816; b=NRkpy4nEtUxKOyxim/6q5wdGYVYYz07zVe3NHHlUR7GLICWuOgyNP8piiHpeeNnp+J 90Oqr+xM+UtBe7ARNX+UpA77dIzLElOBqpElkqSW+Tw5FeNnFlhPDf5QrsBC7VQNI4xp WZf/rBsrG97kANpqyg5wPCf2s8nfdSvb8aKayaMSt6R6Ks+3DmAA+xky9JjB6Y9R014J aZYWENOh28p6NJqZ+a/e2nYS6MCJMXA9M3Pso675V2gh8RfilJ/Yy6qupR3sbi1n07vb eZoyFEFrb/t6Xq92eK6Nz/e+dyu1UI1+hj0lKrbVYBJpE4yNAT6Ax+V8jXTIwElP3VWr yJ5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature:dkim-signature :arc-authentication-results; bh=lf7EjxEathMQDSEh30vNcuL6Ar5Z2/NAVW3HpMOerOE=; b=WGBCEgkscdP2edMYlLu/jBRuSbITe6bWM+fznkvsVtyMrBu+2S6csEBCZyfcVsJidd PfEEbu0fdFKgTMk18h1uXnI7G4zxnk+PWCBMP1jTZQBsip/1E8NE0lXi94g6PG4B1AcW NTrSqL1BgpO+ZiVFhOEVt1YsS5bA0khqhF3EPvOeKOG72HlG8GhgQfzFL+5/9+myYxsN gi9kRxy5WZAPpxN4xJGe8dNcntkgehkHHAYVyPGU2RfEM8NP7/qqq0PJy2k6hEcH23Uf SWZVmVGFvpFB0WxT5IxUHo2VQpqO5lmKAK74j/HdJ14QxJnLt8DXwvLY+8Bv4m8XoNLF byGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@google.com header.s=20161025 header.b=ALJzaEHY; dkim=fail header.i=@chromium.org header.s=google header.b=iEdUTZj9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k6-v6si6114156pla.473.2018.07.14.19.15.00; Sat, 14 Jul 2018 19:15:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@google.com header.s=20161025 header.b=ALJzaEHY; dkim=fail header.i=@chromium.org header.s=google header.b=iEdUTZj9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733110AbeGOCfe (ORCPT + 99 others); Sat, 14 Jul 2018 22:35:34 -0400 Received: from mail-yw0-f196.google.com ([209.85.161.196]:35628 "EHLO mail-yw0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731978AbeGOCfe (ORCPT ); Sat, 14 Jul 2018 22:35:34 -0400 Received: by mail-yw0-f196.google.com with SMTP id t18-v6so13107802ywg.2 for ; Sat, 14 Jul 2018 19:14:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=lf7EjxEathMQDSEh30vNcuL6Ar5Z2/NAVW3HpMOerOE=; b=ALJzaEHYGw9eimvzN4vuphWMbbvzVyAlS0QCBm4MqIX31GlmGfeRTNLugVmzANuLSE 5Lh5PdLG44rp4wWFQY8AB+YC27kuojrTvXNSR/0ucdN0mi3lHnC+tcFKw6W6SDiF2VbF BcE5NxKfW54dyrTvTGPeq3nnKz7TAy+jjvJkI7+2BrbcYJYJHG2HWzIPuwM7HnMu5I7h IhjEJpQWyUj+ZiHuEK11+OUg33IWNVH3Lqu0CnDK2FHLpVNvUhTpg1n27rHwgRmw+P48 VELXEVV9CUbhx3W11qYNWr+W4Ds5/WzH+Sw5SD0yuCtCjHKsz7DQC8URtsV8t9/kM9jh vMWw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=lf7EjxEathMQDSEh30vNcuL6Ar5Z2/NAVW3HpMOerOE=; b=iEdUTZj9w7g61fbkcry9B/7uJDbOW+wcBQsANyUhrbO1DOFs24n0aQd9NCNf4QcPI6 v1Ey/6zfpAoYZWgJf4oDFNWrPHMcbInE88fdbj2O0WRoYQMz8a49Ml4pdrRSNi2Nk+aE ejwT0HN6tWTvVZskOo/GuKZD1CrSQ87IzEK5c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=lf7EjxEathMQDSEh30vNcuL6Ar5Z2/NAVW3HpMOerOE=; b=Yqolv3N3HbhqnB5eHK1borNOli5fRLGtk6/1pAccmJN5ZAYf/MC2E7xHJJlgZbEfeF AzMgaLC15RsRU+LeVR8IH5nH83k89Tq/d0DEnI6LcR/oa+9NDs5XJPhq/SrOWLRLmkGA NnLo6MAZzuwKnzq807VZeQX9LrfcJIWMCtwcroTiQi5NMUXxzlxzH2Kjj0ae6LnRPttc y68TyrDrM2IFmTAb4N6M9kNaenylUGU3PHgy2xEFWKmJyiWxPhFCwTymJebRqbTqycZL vTUvCAexL7Ub/bP8EbNadTREx8yAYodSTtVfzGX+scb4Gj9iJTygQuI+OXwEPHUO1Q48 Pzug== X-Gm-Message-State: AOUpUlEOhrzRyeD3gNccoLFcxxpGrWizirPc04zeOjE2bc8V7n2ghaBx o02gzvtSN8qeV08s3SiLimVrrUeGmRLJMHuDdpa7FA== X-Received: by 2002:a0d:d287:: with SMTP id u129-v6mr5934419ywd.95.1531620864884; Sat, 14 Jul 2018 19:14:24 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:6602:0:0:0:0:0 with HTTP; Sat, 14 Jul 2018 19:14:24 -0700 (PDT) In-Reply-To: <1531505163-20227-3-git-send-email-zohar@linux.vnet.ibm.com> References: <1531505163-20227-1-git-send-email-zohar@linux.vnet.ibm.com> <1531505163-20227-3-git-send-email-zohar@linux.vnet.ibm.com> From: Kees Cook Date: Sat, 14 Jul 2018 19:14:24 -0700 X-Google-Sender-Auth: 6iMaYXYn0t83wT0y65eTVTpQa4o Message-ID: Subject: Re: [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall To: Mimi Zohar Cc: linux-integrity , linux-security-module , LKML , "Luis R . Rodriguez" , Eric Biederman , Kexec Mailing List , Andres Rodriguez , Greg Kroah-Hartman Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 13, 2018 at 11:05 AM, Mimi Zohar wrote: > In order for LSMs and IMA-appraisal to differentiate between kexec_load > and kexec_file_load syscalls, both the original and new syscalls must > call an LSM hook. This patch adds a call to security_kernel_load_data() > in the original kexec_load syscall. > > Signed-off-by: Mimi Zohar > Cc: Eric Biederman > Cc: Kees Cook > Acked-by: Serge Hallyn Acked-by: Kees Cook -Kees -- Kees Cook Pixel Security