[PATCH v12 03/25] LSM: Use lsmblob in security_audit_rule_match

Casey Schaufler casey at schaufler-ca.com
Tue Dec 31 17:36:26 UTC 2019


On 12/31/2019 9:14 AM, Mimi Zohar wrote:
> [Cc'ing Matthew Garret based on the additional bprm call to
> process_measurement() - commit d906c10d8a31 ("IMA: Support using new
> creds in appraisal policy")]
>
> On Tue, 2019-12-24 at 15:18 -0800, Casey Schaufler wrote:
>> diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
>> index f19a895ad7cd..193ddd55420b 100644
>> --- a/security/integrity/ima/ima_policy.c
>> +++ b/security/integrity/ima/ima_policy.c
>> @@ -414,6 +414,7 @@ static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
>>  	for (i = 0; i < MAX_LSM_RULES; i++) {
>>  		int rc = 0;
>>  		u32 osid;
>> +		struct lsmblob blob;
>>
>>  		if (!rule->lsm[i].rule)
>>  			continue;
>> @@ -423,7 +424,8 @@ static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
>>  		case LSM_OBJ_ROLE:
>>  		case LSM_OBJ_TYPE:
>>  			security_inode_getsecid(inode, &osid);
>> -			rc = security_filter_rule_match(osid,
>> +			lsmblob_init(&blob, osid);
>> +			rc = security_filter_rule_match(&blob,
>>  							rule->lsm[i].type,
>>  							Audit_equal,
>>  							rule->lsm[i].rule);
>> @@ -431,7 +433,8 @@ static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
>>  		case LSM_SUBJ_USER:
>>  		case LSM_SUBJ_ROLE:
>>  		case LSM_SUBJ_TYPE:
>> -			rc = security_filter_rule_match(secid,
>> +			lsmblob_init(&blob, secid);
>> +			rc = security_filter_rule_match(&blob,
> On the bprm hook, IMA calls process_measurement() twice.  The first
> time the secid is passed as an argument based on a call to
> security_task_getsecid(), while the second time it is based on
> security_cred_getsecid().  process_measurement() passes the correct
> secid converted to a blob, but instead of using the passed variable,
> this code uses the locally defined blob field.  A later patch removes
> the the lsmblob_init(), leaving the local blob uninitialized.
>  Something is terribly wrong here.

I can see that there's significant work required on audit rule
filtering. security_audit_rule_init() isn't going to work correctly
the way it is. 

I'll admit that the aliasing of audit_rule to filter_rule had me
very confused for some time.

>
> Mimi
>
>>  							rule->lsm[i].type,
>>  							Audit_equal,
>>  							rule->lsm[i].rule);
>
>




More information about the Linux-security-module-archive mailing list