Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp4529001pxb; Tue, 25 Jan 2022 12:21:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJzs4gpMrcL8H4Hla296LFsdPG9hSIjmAG6JCKw6VuOeSCcv2exFU4ydmPZ7n19dR16hH3UK X-Received: by 2002:a17:902:8211:b0:14a:fd00:201a with SMTP id x17-20020a170902821100b0014afd00201amr19971240pln.153.1643142093797; Tue, 25 Jan 2022 12:21:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643142093; cv=none; d=google.com; s=arc-20160816; b=HghssCTnJ7AssbDGnX7AXrkszt+XAhFOG8IcNqFoGZmWqyTX3z7MKKHzN6Y4jUbJLD 38f9/i9Bz8nz+49x4af2gwgD9yE9y+9xgf5ByoQDAgrtblvJZ9tFQPdDGGj9aNuoiu+Q rzWgR8LhjbV3w5SPkp272wv51hdjkSiWmkW0p1SFv+4EB4GEWAi3ectURjh1qrbAzL7F rApDyn8ohB8SjHMLwLPqPg2UcYOu87YduFK5K6xj592kxUmpG/LuxcZVBIV1oQl38rbZ 8M2EjBmQojplZEvqfoyMt+PLIt9JKh9j5Iie8riFt4JCsrEyPrjbCFUnNUhJ8AphN8Nv JIsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bLGRSDBqt3CI9o30EqMaKBgi/Og7jvCpHq0R8ShXmFM=; b=YNZE9DREHXEdXfPWiWgnwQq1VMuc6i+W1bTfAbRX9wKf/f7VKPjQnAHmCf3zAU4RvY //S4aePXxtBh4lcGsz/WcecN7E4DrW5asAkncZua3NhTTrEFZnBJdiridqa+O+mzS0DH 5bOWSxdFlaLNR6yPxbkP6LOeLdXkAWl5El9jgY5o0GbH4sEG3EEs740fhJ0w36FghamR qejxB0CLYdPUonrVvp2/3cIE1JQjtQ27/HpFG94WYWRo7QB834fhK0pn3k/IBUva/zlp YRfegiEgWbCyXGup9lSrh9vHyiVpSPsxc4FujKql5Z8gAgOND1CXWe3dPAmEiWc9MgaR g+3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@googlemail.com header.s=20210112 header.b="Mn4PK6g/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w15si10033805ply.248.2022.01.25.12.21.22; Tue, 25 Jan 2022 12:21:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@googlemail.com header.s=20210112 header.b="Mn4PK6g/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356613AbiAYOhV (ORCPT + 99 others); Tue, 25 Jan 2022 09:37:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38654 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1389067AbiAYOd2 (ORCPT ); Tue, 25 Jan 2022 09:33:28 -0500 Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 35396C06173B; Tue, 25 Jan 2022 06:33:27 -0800 (PST) Received: by mail-ed1-x536.google.com with SMTP id c24so61217072edy.4; Tue, 25 Jan 2022 06:33:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bLGRSDBqt3CI9o30EqMaKBgi/Og7jvCpHq0R8ShXmFM=; b=Mn4PK6g/oizWyfQ/FlsNpx8KUGy4lvZNH4Q44yveFyG6XwfO4vkxu5X4ytfU6J68Jp t/Ep8y+dU+4NrFLJMNh5dhoE3ITMKtr8o4VcdBESKAXHbnpqb0CjYOyMH+JgwlHcFxUg SdYu2BojdjheT8JGAjkEWzq6FCuwKY1y7yWHJguJTGz1GcYRHYZkH++kWEoZ0Pvrl0EM TNidQED+LEGzAweI2o8TceH5KTyp97FCGQZyfp44hk6hrSdAJIzr1V/CxQJtFyfq8bnP oy9Avv4wKRXUE6cJtJrAk60hQGmhsPB+EiNE1/cwxu7YTSuMAE9EwA6e/ZhT9IOo9xYz OTkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bLGRSDBqt3CI9o30EqMaKBgi/Og7jvCpHq0R8ShXmFM=; b=mCeSOG42rHLmdlqIFonaAw/LVJGsOJVJUGUbEoi371kQt8tCnpbqWBr0OpDAKA4Km5 dTA3UUB+E5L4U7TwbRa6PCrHk18+wk4wGViYQGu4UWuNGjPKu/iV4bRXwETkP9ipzuzp UZs9rshkgoL7hex1gUJxxXwEBoqCYE0wrxUW38zKMXlNfg5hgNechwPMdkNzyeBPJAoG Kjz3tuXf1b6cMmddrvbOLy23gDWDQAaE0UMtpGyPyMYBCt97phaflruOQPyT9wX+lCVr N2ToCYS+QDfij6hQjuqNC8S3+jcNiwH2DPvSjd1SFtT7u/DtaBjttx0L8ViiF6E3Xext yAaA== X-Gm-Message-State: AOAM531Y2srWANeW/QtBz/6X4vAk9SGw5PYNolzTI9C8TD6fL/mvCi2a z5hf6nSINNTSbn2yLE4ZIo9oGMAYj4dDkg== X-Received: by 2002:a17:906:7306:: with SMTP id di6mr16139066ejc.93.1643121205668; Tue, 25 Jan 2022 06:33:25 -0800 (PST) Received: from debianHome.localdomain (dynamic-077-010-144-044.77.10.pool.telefonica.de. [77.10.144.44]) by smtp.gmail.com with ESMTPSA id gz12sm6291530ejc.124.2022.01.25.06.33.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Jan 2022 06:33:25 -0800 (PST) From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= To: selinux@vger.kernel.org, James Morris , "Serge E. Hallyn" , linux-security-module@vger.kernel.org, Paul Moore , Stephen Smalley , Eric Paris Cc: Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH] mm: create security context for memfd_secret inodes Date: Tue, 25 Jan 2022 15:33:04 +0100 Message-Id: <20220125143304.34628-1-cgzones@googlemail.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Create a security context for the inodes created by memfd_secret(2) via the LSM hook inode_init_security_anon to allow a fine grained control. As secret memory areas can affect hibernation and have a global shared limit access control might be desirable. Signed-off-by: Christian Göttsche --- An alternative way of checking memfd_secret(2) is to create a new LSM hook and e.g. for SELinux check via a new process class permission. --- mm/secretmem.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/mm/secretmem.c b/mm/secretmem.c index 22b310adb53d..b61cd2f661bc 100644 --- a/mm/secretmem.c +++ b/mm/secretmem.c @@ -164,11 +164,20 @@ static struct file *secretmem_file_create(unsigned long flags) { struct file *file = ERR_PTR(-ENOMEM); struct inode *inode; + const char *anon_name = "[secretmem]"; + const struct qstr qname = QSTR_INIT(anon_name, strlen(anon_name)); + int err; inode = alloc_anon_inode(secretmem_mnt->mnt_sb); if (IS_ERR(inode)) return ERR_CAST(inode); + err = security_inode_init_security_anon(inode, &qname, NULL); + if (err) { + file = ERR_PTR(err); + goto err_free_inode; + } + file = alloc_file_pseudo(inode, secretmem_mnt, "secretmem", O_RDWR, &secretmem_fops); if (IS_ERR(file)) -- 2.34.1