Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5415806ybv; Tue, 11 Feb 2020 15:28:09 -0800 (PST) X-Google-Smtp-Source: APXvYqyu+rkOqT3CjZ4z5fnL7dEKO2rqhZIbz9Glt43CYuMbLyZ7ZlPqfO33gwuf4S0QgmM+zf8r X-Received: by 2002:a9d:53cb:: with SMTP id i11mr7359701oth.158.1581463689248; Tue, 11 Feb 2020 15:28:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581463689; cv=none; d=google.com; s=arc-20160816; b=wXEGEkig1La50/xZsmvofkFXCAQ7grXEaYK4xccWI7uY4pqoP2vUTRdIlXGyHO7X6i urivS0GVY8TcHyIbn7LjoyUk1B+j42/CT8Hr5pgnfpO1s9KJ00tNuYxpXhMOZEwCv2ye vr95q/Yy3FNBdN5OaxjzA04JsAqSFHxGMdYSyVKozLlVuXqbuVLlEjAUbXxvcD2sFZzj hgL06sN/QZ84hwyFKIyWWscnrQexozH2ChZ5VH9xVKIN/Y7vLH1ZY4WTzJsr55FKfoS9 MdTvPMye307YZovP6dTBMyK6AB9SUQfEIOe9zRiSj4KzYjuek+FvSGlb5dU5z0tZdnCP aCLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=GQIwR4Iey9SqyBTPvSIcnQ+YLAZloOW5xwQXPpKs1II=; b=iXZ+TCfz0kMQDKhWQOsPT98W2B1UwjryyJhA23m127aK8uUKAEv7e5TRxpV75lyR/U uuTWYCDBBaEAw1wOWywwEEHAvLSaxc4T300xdO+XX8EyHeG3OUZNXP64cZy5BXEgtm2V YOnXWflKZTcicdDMOuh0Rxq7H+jR9us4Ps9JqPiJcWqFGfysoURH7mk3vSbGs0Z9Fl85 f8qOQO1mpkgstJrGrnQtfYkcl7vJntDytV7H4jx7r8XxVNIWc93/XllNpsw0SWxiLpTx FPYArcEPHb1uO1qOI0fo0RYDMBsBVZeppexP5oeYNGd1elYOVcqFxyiHcdUUnVJVtYAB jS2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=G3HXWmkU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p14si3000035ota.71.2020.02.11.15.27.57; Tue, 11 Feb 2020 15:28:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=G3HXWmkU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727911AbgBKX1s (ORCPT + 99 others); Tue, 11 Feb 2020 18:27:48 -0500 Received: from mail-oi1-f194.google.com ([209.85.167.194]:33783 "EHLO mail-oi1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727613AbgBKX1s (ORCPT ); Tue, 11 Feb 2020 18:27:48 -0500 Received: by mail-oi1-f194.google.com with SMTP id q81so233859oig.0 for ; Tue, 11 Feb 2020 15:27:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GQIwR4Iey9SqyBTPvSIcnQ+YLAZloOW5xwQXPpKs1II=; b=G3HXWmkUh7/VrPilWhIVjW3UV+g8eJl02dzhNI3d+SbmhX1jd4vIutW00Wj6m5O7f2 TuEEj0dNJtb1UVq8JHB/LsiqNmYDZuJRJh13TM7elLPNfECfyG9Z2mBSbIY4k8GTBddP 2IC7xRFEwSSiRreWHJMw2NnajFUF/35Ju9c1nvpVov5WKkmJURlKRMbMTleNzcanyphe eKA7eJY9h6lWxc3lo6CMOZHji76uqTFOEpZ/m8bS6WOQR8avyYKkEsB40XBQXXguLpZV WSf4TDl0XEdAYh1x6VoE2reAKHFv3A3y0D5dx/xOGZ02qrKxgtFWEcsmNVfoHVjsm/h2 BRXQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GQIwR4Iey9SqyBTPvSIcnQ+YLAZloOW5xwQXPpKs1II=; b=VmARN2ma+j05S8IAH3fDUoSFOYPmb6kCaPHxuZhXYJKYyh/czfLTEDdW3NKCdDG3u6 32mTYu3Bc+nfmiJfEDTBftmldq8R+Tmv64pTu7X+ux9bAKnIbwfT3116n3LW2NZ7clCw 0p6Zkq6l21pqNa6fCne5sGZ+LiAk/lwDi8RwHhF+d8eq1fjkirFqsaDM+dnxxRlAVBU3 ZouzOcWhPPtVKiNwGf0KLI9PaJnKh0YXBL96jp0UIT27b3S/dDxOHIZZ05QTtX6dFcov a1zjDow0kqn3Q5RXAT7l/B0xNi1Ooa2Dn5GpQPSLyjRUPzvrvEgE0DkYPrUq/XFmBhAb zGVA== X-Gm-Message-State: APjAAAU/jLBZgCQ/q9VpDuefA7TNo6aOyk2GiwAWYJAYE5j4zRUL/YUC exYvNfSmUxwNfrgzBOgGCy4E1IJCAOAuHJiWBsR00A== X-Received: by 2002:aca:8d5:: with SMTP id 204mr4255305oii.141.1581463667061; Tue, 11 Feb 2020 15:27:47 -0800 (PST) MIME-Version: 1.0 References: <20200211225547.235083-1-dancol@google.com> <9ae20f6e-c5c0-4fd7-5b61-77218d19480b@schaufler-ca.com> In-Reply-To: <9ae20f6e-c5c0-4fd7-5b61-77218d19480b@schaufler-ca.com> From: Daniel Colascione Date: Tue, 11 Feb 2020 15:27:10 -0800 Message-ID: Subject: Re: [PATCH v2 0/6] Harden userfaultfd To: Casey Schaufler Cc: Tim Murray , Nosh Minwalla , Nick Kralevich , Lokesh Gidra , linux-kernel , Linux API , selinux@vger.kernel.org, LSM List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 11, 2020 at 3:13 PM Casey Schaufler wrote: > > On 2/11/2020 2:55 PM, Daniel Colascione wrote: > > Userfaultfd in unprivileged contexts could be potentially very > > useful. We'd like to harden userfaultfd to make such unprivileged use > > less risky. This patch series allows SELinux to manage userfaultfd > > file descriptors and allows administrators to limit userfaultfd to > > servicing user-mode faults, increasing the difficulty of using > > userfaultfd in exploit chains invoking delaying kernel faults. > > > > A new anon_inodes interface allows callers to opt into SELinux > > management of anonymous file objects. In this mode, anon_inodes > > creates new ephemeral inodes for anonymous file objects instead of > > reusing a singleton dummy inode. A new LSM hook gives security modules > > an opportunity to configure and veto these ephemeral inodes. > > > > Existing anon_inodes users must opt into the new functionality. > > > > Daniel Colascione (6): > > Add a new flags-accepting interface for anonymous inodes > > Add a concept of a "secure" anonymous file > > Teach SELinux about a new userfaultfd class > > Wire UFFD up to SELinux > > Let userfaultfd opt out of handling kernel-mode faults > > Add a new sysctl for limiting userfaultfd to user mode faults > > This must be posted to the linux Security Module list > Added. I thought selinux@ was sufficient.