Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2211898imm; Thu, 20 Sep 2018 09:24:12 -0700 (PDT) X-Google-Smtp-Source: ANB0VdagBRt2vFsp2LRBVJQOqjZ49Sgr1s+PMQNHdiYWhJ0qBm5d31AXcToXjrkVG9h9jelb4gDa X-Received: by 2002:a62:8a4f:: with SMTP id y76-v6mr41900143pfd.233.1537460651934; Thu, 20 Sep 2018 09:24:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537460651; cv=none; d=google.com; s=arc-20160816; b=wswTbuYSMplxj9utL3aQYGEnPi8Cvd3PrdVHXGwfK4HdIawY6/6pJjP8yHeBqJyx+J P98spgclP+FQAp3MOAPXZXP/3mICvjqAPMqFtEf9cC+XyXdtIVg38Nep7RMLC+kYp+uu ROJVtQyYOb/rxfWkYlkuNp5aXzS2Q8YcJfBNLOg9MO42TQ/u25x5OfaNj0Uoz40AvqUD c3+ZRd5JVIio2OBviFpJ+GJ8KLiMI7sgNXx14yAItaAv61x42sAuIph6OOhquhNE7r2C lpLPQjLiXZ53dC+kditrAnG1F6yorWMItBqPxiuO4RXEH4JHz+WynQ9RMOfq0WJ0fwu8 cAgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=xgMgBw7rqdztgQH4xJtoHpikGmKBxPLvzemE+0cuWuw=; b=qHd8bhGRB7VEVxOfCDTl7vEgQGcFABMqhJoWYa0s3EWk3ryfHLIwV9ztVHvWtu6TnM gsB2Vncijv5WAQpXegjs83K03Dr9sIqD2+XW8cu6HfC9veiu/cJ/Q+2caaTZGmwh6tdH jV1r/n3V/y8DMygclnEUmYgL0BaEVIOl87znadxT7BCJaueAAOigmmzyVPZxxZ3WJQPp LmUQb/gyepPDuDdUPavCo1Lsmi6BElOxlo+K27f+tLS3d2KDx5YVxI6Wx93BHTtSQA1h paPlcd6wYtADbJiEPRe52EvB6oyYw/TWElXlqubsYouPZCDPlay5W5JKzjidJfXUc73a pNTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Ax500h3T; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u26-v6si21803197pge.590.2018.09.20.09.23.55; Thu, 20 Sep 2018 09:24:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Ax500h3T; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387471AbeITWIE (ORCPT + 99 others); Thu, 20 Sep 2018 18:08:04 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:39375 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727649AbeITWID (ORCPT ); Thu, 20 Sep 2018 18:08:03 -0400 Received: by mail-pg1-f195.google.com with SMTP id 85-v6so1601338pge.6 for ; Thu, 20 Sep 2018 09:23:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id; bh=xgMgBw7rqdztgQH4xJtoHpikGmKBxPLvzemE+0cuWuw=; b=Ax500h3T9Nx2HsBskl7y253iwaQudCZ4HzE80JhA1TBdwbGRo7qjzPyMVLupCR1HO1 YJXwKOP8zKhbO6NoTH3IYs5+LNdJrmdu2+ofpkPnyvpdWwfinBSrkcDeKkweUXvX7LG7 PCgnVdcZWLQdWFfK2YlDziyQzGVDmiAaGyACY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=xgMgBw7rqdztgQH4xJtoHpikGmKBxPLvzemE+0cuWuw=; b=ubetU+gJZuIXMre3vQJnVEubF2VNC4wt0gnYTJoTXzURkQKEY1cg3mdmDCpYZE5iYG FMvj3ZxafVX3AJF9H0QPPbFpv5ntx0NBYpFr4fscD15dnw7qSL2KksUsnGvIwQArfm5q Rq7Re8ev2ooFlURIT5RSC382dsUQ12RKrB7aKDadKh44feMtgsVZr9GkJmJF77bIP3rw hHMB58SOneL0ub4Yo32xnkUSbGmPX6ezJEjiLifcE99lcWwhM0MCLjTz87K/3hwmE5EU 0fNpFYRpFY/CYebawwYBnOaD/OwEniLHN2Xjp6eL6waIp2snSXrDpTF4cUgqYmqdZO00 uKIQ== X-Gm-Message-State: APzg51AlXFl4gvVeS50NkOSFBbzpOQGywgqtOoIEjuYEwLZkjCjUkA9E fCSy5ESAcTjycH6llz/9293V3w== X-Received: by 2002:a62:12c7:: with SMTP id 68-v6mr42161882pfs.216.1537460628253; Thu, 20 Sep 2018 09:23:48 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id d22-v6sm59911971pfm.48.2018.09.20.09.23.43 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 20 Sep 2018 09:23:43 -0700 (PDT) From: Kees Cook To: James Morris Cc: Kees Cook , Casey Schaufler , John Johansen , Tetsuo Handa , Paul Moore , Stephen Smalley , "Schaufler, Casey" , LSM , Jonathan Corbet , linux-doc@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH security-next v2 00/26] LSM: Explict LSM ordering Date: Thu, 20 Sep 2018 09:23:12 -0700 Message-Id: <20180920162338.21060-1-keescook@chromium.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org v2: - add "lsm.order=" and CONFIG_LSM_ORDER instead of overloading "security=" - reorganize introduction of ordering logic code Updated cover letter: This refactors the LSM registration and initialization infrastructure to more centrally support different LSM types. What was considered a "major" LSM is kept for legacy use of the "security=" boot parameter, and now overlaps with the new class of "exclusive" LSMs for the future blob sharing (to be added later). The "minor" LSMs become more well defined as a result of the refactoring. Instead of continuing to (somewhat improperly) overload the kernel's initcall system, this changes the LSM infrastructure to store a registration structure (struct lsm_info) table instead, where metadata about each LSM can be recorded (name, flags, order, enable flag, init function). This can be extended in the future to include things like required blob size for the coming "blob sharing" LSMs. The "major" LSMs had to individually negotiate which of them should be enabled. This didn't provide a way to negotiate combinations of other LSMs (as will be needed for "blob sharing" LSMs). This is solved by providing the LSM infrastructure with all the details needed to make the choice (exposing the per-LSM "enabled" flag, if used, the LSM characteristics, and ordering expectations). As a result of the refactoring, the "minor" LSMs are able to remove the open-coded security_add_hooks() calls for "capability", "yama", and "loadpin", and to redefine "integrity" properly as a general LSM. (Note that "integrity" actually defined _no_ hooks, but needs the early initialization). With all LSMs being proessed centrally, it was possible to implement a new boot parameter "lsm.order=" to provide explicit ordering, which is helpful for the future "blob sharing" LSMs. Matching this is the new CONFIG_LSM_ORDER, which replaces CONFIG_DEFAULT_SECURITY, as it provides a higher granularity of control. To better show LSMs activation some debug reporting was added (enabled with the "lsm.debug" boot commandline option). Finally, I added a WARN() around LSM initialization failures, which appear to have always been silently ignored. (Realistically any LSM init failures would have only been due to catastrophic kernel issues that would render a system unworkable anyway, but it'd be better to expose the problem as early as possible.) -Kees Kees Cook (26): LSM: Correctly announce start of LSM initialization vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Rename .security_initcall section to .lsm_info LSM: Remove initcall tracing LSM: Convert from initcall to struct lsm_info vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Convert security_initcall() into DEFINE_LSM() LSM: Record LSM name in struct lsm_info LSM: Provide init debugging infrastructure LSM: Don't ignore initialization failures LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Provide separate ordered initialization LSM: Plumb visibility into optional "enabled" state LSM: Lift LSM selection out of individual LSMs LSM: Introduce lsm.enable= and lsm.disable= LSM: Prepare for reorganizing "security=" logic LSM: Refactor "security=" in terms of enable/disable LSM: Build ordered list of ordered LSMs for init LSM: Introduce CONFIG_LSM_ORDER LSM: Introduce "lsm.order=" for boottime ordering LoadPin: Initialize as ordered LSM Yama: Initialize as ordered LSM LSM: Introduce enum lsm_order capability: Mark as LSM_ORDER_FIRST LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Add all exclusive LSMs to ordered initialization .../admin-guide/kernel-parameters.txt | 7 + arch/arc/kernel/vmlinux.lds.S | 1 - arch/arm/kernel/vmlinux-xip.lds.S | 1 - arch/arm64/kernel/vmlinux.lds.S | 1 - arch/h8300/kernel/vmlinux.lds.S | 1 - arch/microblaze/kernel/vmlinux.lds.S | 2 - arch/powerpc/kernel/vmlinux.lds.S | 2 - arch/um/include/asm/common.lds.S | 2 - arch/xtensa/kernel/vmlinux.lds.S | 1 - include/asm-generic/vmlinux.lds.h | 25 +- include/linux/init.h | 2 - include/linux/lsm_hooks.h | 43 ++- include/linux/module.h | 1 - security/Kconfig | 42 +-- security/apparmor/lsm.c | 16 +- security/commoncap.c | 8 +- security/integrity/iint.c | 5 +- security/loadpin/loadpin.c | 10 +- security/security.c | 304 ++++++++++++++---- security/selinux/hooks.c | 16 +- security/smack/smack_lsm.c | 8 +- security/tomoyo/tomoyo.c | 7 +- security/yama/yama_lsm.c | 7 +- 23 files changed, 348 insertions(+), 164 deletions(-) -- 2.17.1