Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp252463pxb; Wed, 11 Nov 2020 02:49:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJx6mKOqtpdktfOBHcQcVushVIrJPWHuRRK3sm3pktiYU2L0NBQJPx8Iiwm0r1ieUPvVpTTU X-Received: by 2002:a50:950e:: with SMTP id u14mr4237496eda.260.1605091752223; Wed, 11 Nov 2020 02:49:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605091752; cv=none; d=google.com; s=arc-20160816; b=I/UwW5hoNhrIDDVXxnrg1JD1B4sLonNLlcij6P+/9mf7lhI1xJyXaUXOe/DbSUbuRt xyZ8DimvzZPLJNm5bGA1NqiF0M1veW3KjQ6xUF0LHW9Qqi5Z3DcUYBZS5E3CT7aK5bqO +KUn/bZRZMPYqz1k1HpwxUEUrcPjTOjDc71fa+64+6jzfH/3MhZztC2JfFiGSGx44r+d YGLNPMZkvnG98JCjk2Bnzwwl3j0EQNXkMucYumroCC464tCDreBZzaEYfrlMPgCxAJLL vGnGfocM0lSt7/6JFjwvYxg17loQ2DmbNtc2bdVYQ66UtS9QWyBJOtOdIi4hleZ5S11n wcPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sT+gZe0r8U7E1fOWd1D4bWdDDMPbW0dyZ/UKoJjOFwo=; b=iSVQSg9mkjWPDUhjhuXdz1JvG7pX45KA1IYM2GCk91HDQKv2jp/OByPW3TfaSoEuWI 7Y0NasZAKQZK4zcHrUKvIrxOpFM2vfLIiEt6ym1L/3rbNi0BPqFXJibMjWNatd/vj2A5 D9GciZrAlGKI8lzIG1U/L0a2WzqY/sjVpEyItA9UljrZaIFpqBxCRwEkdkeL/n/BhkOh lMChRtV7+r/VPK0IYwIDqoQT34eTKFOSYVXki5Txlhv3RIeb+Lffack4FSGoxKXS0oUx NlKy12oVRtFujmVllVda7rOc9xUaga76r3Xc7j11qwhsiMMZ8QMTWsx2De/XjH9VYxoB yIDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IjeglUGh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i6si1264496ejs.300.2020.11.11.02.48.47; Wed, 11 Nov 2020 02:49:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IjeglUGh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726036AbgKKKpM (ORCPT + 99 others); Wed, 11 Nov 2020 05:45:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55428 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725859AbgKKKpL (ORCPT ); Wed, 11 Nov 2020 05:45:11 -0500 Received: from mail-wm1-x341.google.com (mail-wm1-x341.google.com [IPv6:2a00:1450:4864:20::341]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5A7B6C0613D1; Wed, 11 Nov 2020 02:45:11 -0800 (PST) Received: by mail-wm1-x341.google.com with SMTP id h62so1874361wme.3; Wed, 11 Nov 2020 02:45:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=sT+gZe0r8U7E1fOWd1D4bWdDDMPbW0dyZ/UKoJjOFwo=; b=IjeglUGhhwfyqF1t7cRE2AWo+xXAdfcUxs6HWQeAOup8QzPegm1owlp+4JqPar0TC3 JTVj3XDEebdOVpOOp6cOqU9GdI1gEuiIGF9Nr+GqFbVnXz6XZh55FLDEQZavgxL4fvxX 6SKql2uoULuDYTnaYAA4/5G0lW3axvufGDZLPmiuO7sokzBCvh5kH9EUfiiJU8Ml7VHe pTwoDRf6JrwcCSpHxLZAjW6Y4CxyMt1BQcVDHWwiHHxAervGsGqknQB4iEfMOFLiR3Lh dtNakCkiC2SuWTwru7vQe6qAlraXN6YsdZkV9xmGnl3SGWIr9qCnw0bnX/GwtBfztpxF 7ZUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=sT+gZe0r8U7E1fOWd1D4bWdDDMPbW0dyZ/UKoJjOFwo=; b=LvKL+DZpyx4/NZKaxDxnpJbgRgKgbOy2Aqi908msJ/udNWklkKy+/H28vdffUCsAqi 9EdjKKlPuhC6O598MMxiGqDIa8kiLcTcI7a+zH1u02YTHDsvPsFKk8uvYMBzXEgaplS6 KE4yUFOt31wJ7aXTqrhGHBICQalg4sfHPA7gLsgToo1/IXUjlZUfah+oNWrGhTqFack8 0F69gKEZJRzuOdLOGMkHJFVfciy4v07pxK+wooYIuT3iGq8V6LypoUzVRsqbc5c1T8ez v53TIEZQ1uEejgdJfuBotLiPNfHz1iXLmfCvdkylTxTN0pvZJPy6U6CVavnEcxeH+Kju bXxQ== X-Gm-Message-State: AOAM531B4IXyamUmLENv9PiTF72Zj8cSnwdE1JvcQRaridBk6RlqkQKR uuVSSQXOpH2qbs50oPbEi4w= X-Received: by 2002:a1c:c203:: with SMTP id s3mr3353522wmf.77.1605091510130; Wed, 11 Nov 2020 02:45:10 -0800 (PST) Received: from nogikh.c.googlers.com.com (88.140.78.34.bc.googleusercontent.com. [34.78.140.88]) by smtp.gmail.com with ESMTPSA id u195sm2111549wmu.18.2020.11.11.02.45.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 02:45:09 -0800 (PST) From: Aleksandr Nogikh To: jmorris@namei.org, serge@hallyn.com, akinobu.mita@gmail.com Cc: andreyknvl@google.com, dvyukov@google.com, elver@google.com, glider@google.com, keescook@google.com, casey@schaufler-ca.com, penguin-kernel@i-love.sakura.ne.jp, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, mortonm@chromium.org, Aleksandr Nogikh , Tetsuo Handa Subject: [PATCH v4 1/2] security: add fault injection capability Date: Wed, 11 Nov 2020 10:44:08 +0000 Message-Id: <20201111104409.1530957-2-a.nogikh@gmail.com> X-Mailer: git-send-email 2.29.2.222.g5d2a92d10f8-goog In-Reply-To: <20201111104409.1530957-1-a.nogikh@gmail.com> References: <20201111104409.1530957-1-a.nogikh@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aleksandr Nogikh Add a fault injection capability to call_int_hook macro. This will facilitate testing of fault tolerance of the code that invokes security hooks as well as the fault tolerance of the LSM implementations themselves. Add a KConfig option (CONFIG_FAIL_LSM_HOOKS) that controls whether the capability is enabled. In order to enable configuration from the user space, add the standard debugfs entries for fault injection (if CONFIG_FAULT_INJECTION_DEBUG_FS is enabled). Signed-off-by: Aleksandr Nogikh Reviewed-by: Marco Elver Reviewed-by: Tetsuo Handa Reviewed-by: Andrey Konovalov --- v4: - Changed retval debugfs file type - now it keeps a signed integer. - Made CONFIG_FAIL_LSM_HOOKS depend on CONFIG_SECURITY. v2: - Renamed should_fail_lsm_hook() to lsm_hooks_inject_fail(). --- lib/Kconfig.debug | 6 ++++ security/security.c | 69 +++++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 72 insertions(+), 3 deletions(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 6140413174be..5f4399816019 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -1813,6 +1813,12 @@ config FAIL_MAKE_REQUEST help Provide fault-injection capability for disk IO. +config FAIL_LSM_HOOKS + bool "Fault-injection capability for LSM hooks" + depends on FAULT_INJECTION && SECURITY + help + Provide fault-injection capability for LSM hooks. + config FAIL_IO_TIMEOUT bool "Fault-injection capability for faking disk interrupts" depends on FAULT_INJECTION && BLOCK diff --git a/security/security.c b/security/security.c index 69ff6e2e2cd4..be3a3c7c6d6a 100644 --- a/security/security.c +++ b/security/security.c @@ -28,6 +28,7 @@ #include #include #include +#include #include #define MAX_LSM_EVM_XATTR 2 @@ -669,6 +670,67 @@ static void __init lsm_early_task(struct task_struct *task) panic("%s: Early task alloc failed.\n", __func__); } + +#ifdef CONFIG_FAIL_LSM_HOOKS + +static struct { + struct fault_attr attr; + int retval; +} fail_lsm_hooks = { + .attr = FAULT_ATTR_INITIALIZER, + .retval = -EACCES +}; + +static int __init setup_fail_lsm_hooks(char *str) +{ + return setup_fault_attr(&fail_lsm_hooks.attr, str); +} +__setup("fail_lsm_hooks=", setup_fail_lsm_hooks); + +static int lsm_hooks_inject_fail(void) +{ + return should_fail(&fail_lsm_hooks.attr, 1) ? fail_lsm_hooks.retval : 0; +} + +#ifdef CONFIG_FAULT_INJECTION_DEBUG_FS + +static int fail_lsm_retval_set(void *data, u64 val) +{ + fail_lsm_hooks.retval = (int)val; + return 0; +} + +static int fail_lsm_retval_get(void *data, u64 *val) +{ + *val = (u64)fail_lsm_hooks.retval; + return 0; +} + +DEFINE_DEBUGFS_ATTRIBUTE(fail_lsm_retval_ops, fail_lsm_retval_get, + fail_lsm_retval_set, "%lld\n"); + +static int __init fail_lsm_hooks_debugfs(void) +{ + umode_t mode = S_IFREG | 0600; + struct dentry *dir; + + dir = fault_create_debugfs_attr("fail_lsm_hooks", NULL, + &fail_lsm_hooks.attr); + debugfs_create_file("retval", mode, dir, NULL, + &fail_lsm_retval_ops); + return 0; +} + +late_initcall(fail_lsm_hooks_debugfs); + +#endif /* CONFIG_FAULT_INJECTION_DEBUG_FS */ + +#else + +static inline int lsm_hooks_inject_fail(void) { return 0; } + +#endif /* CONFIG_FAIL_LSM_HOOKS */ + /* * The default value of the LSM hook is defined in linux/lsm_hook_defs.h and * can be accessed with: @@ -707,16 +769,17 @@ static void __init lsm_early_task(struct task_struct *task) } while (0) #define call_int_hook(FUNC, IRC, ...) ({ \ - int RC = IRC; \ - do { \ + int RC = lsm_hooks_inject_fail(); \ + if (RC == 0) { \ struct security_hook_list *P; \ + RC = IRC; \ \ hlist_for_each_entry(P, &security_hook_heads.FUNC, list) { \ RC = P->hook.FUNC(__VA_ARGS__); \ if (RC != 0) \ break; \ } \ - } while (0); \ + } \ RC; \ }) -- 2.29.2.222.g5d2a92d10f8-goog