linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Stefan Berger <stefanb@linux.ibm.com>
To: Mimi Zohar <zohar@linux.ibm.com>, linux-integrity@vger.kernel.org
Cc: serge@hallyn.com, christian.brauner@ubuntu.com,
	containers@lists.linux.dev, dmitry.kasatkin@gmail.com,
	ebiederm@xmission.com, krzysztof.struczynski@huawei.com,
	roberto.sassu@huawei.com, mpeters@redhat.com, lhinds@redhat.com,
	lsturman@redhat.com, puiterwi@redhat.com, jejb@linux.ibm.com,
	jamjoom@us.ibm.com, linux-kernel@vger.kernel.org,
	paul@paul-moore.com, rgb@redhat.com,
	linux-security-module@vger.kernel.org, jmorris@namei.org
Subject: Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
Date: Wed, 23 Feb 2022 11:37:46 -0500	[thread overview]
Message-ID: <479f09e7-0d39-0281-45ef-5cce4861d24d@linux.ibm.com> (raw)
In-Reply-To: <5e4a862917785972281bbcb483404da01b71e801.camel@linux.ibm.com>


On 2/23/22 10:38, Mimi Zohar wrote:
> On Tue, 2022-02-01 at 15:37 -0500, Stefan Berger wrote:
>> Limit the number of policy rules one can set in non-init_ima_ns to a
>> hardcoded 1024 rules. If the user attempts to exceed this limit by
>> setting too many additional rules, emit an audit message with the cause
>> 'too-many-rules' and simply ignore the newly added rules.
> This paragraph describes 'what' you're doing, not 'why'.  Please prefix
> this paragraph with a short, probably one sentence, reason for the
> change.
>> Switch the accounting for the memory allocated for IMA policy rules to
>> GFP_KERNEL_ACCOUNT so that cgroups kernel memory accounting takes effect.
> Does this change affect the existing IMA policy rules for init_ima_ns?

There's typically no cgroup for the int_ima_ns, so not effect on 
init_ima_ns.


Here's the updated text:

Limit the number of policy rules one can set in non-init_ima_ns to a
hardcoded 1024 rules to restrict the amount of memory used for IMA's
policy. Ignore the added rules if the user attempts to exceed this
limit by setting too many additional rules.

Switch the accounting for the memory allocated for IMA policy rules to
GFP_KERNEL_ACCOUNT so that cgroups kernel memory accounting takes effect.
This switch has no effect on the init_ima_ns.

    Stefan


>> Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
>> ---
>>   security/integrity/ima/ima_fs.c     | 20 ++++++++++++++------
>>   security/integrity/ima/ima_policy.c | 23 ++++++++++++++++++-----
>>   2 files changed, 32 insertions(+), 11 deletions(-)
>>
>> diff --git a/security/integrity/ima/ima_fs.c b/security/integrity/ima/ima_fs.c
>> index 58d80884880f..cd102bbd4677 100644
>> --- a/security/integrity/ima/ima_fs.c
>> +++ b/security/integrity/ima/ima_fs.c
>> @@ -410,24 +410,32 @@ static int ima_release_policy(struct inode *inode, struct file *file)
>>   {
>>   	struct ima_namespace *ns = &init_ima_ns;
>>   	const char *cause = ns->valid_policy ? "completed" : "failed";
>> +	int err = 0;
>>   
>>   	if ((file->f_flags & O_ACCMODE) == O_RDONLY)
>>   		return seq_release(inode, file);
>>   
>> -	if (ns->valid_policy && ima_check_policy(ns) < 0) {
>> -		cause = "failed";
>> -		ns->valid_policy = 0;
>> +	if (ns->valid_policy) {
>> +		err = ima_check_policy(ns);
>> +		if (err < 0) {
>> +			if (err == -ENOSPC)
> Perhaps "EDQUOT" would be more appropriate.
>
>> +				cause = "too-many-rules";
>> +			else
>> +				cause = "failed";
>> +			ns->valid_policy = 0;
>> +		}
>>   	}
>>   
>>   	pr_info("policy update %s\n", cause);
>> -	integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL,
>> -			    "policy_update", cause, !ns->valid_policy, 0);
>> +	integrity_audit_message(AUDIT_INTEGRITY_STATUS, NULL, NULL,
>> +				"policy_update", cause, !ns->valid_policy, 0,
>> +				-err);
> The 'err' value is already properly set.  No need for the minus sign.
>
>>   
>>   	if (!ns->valid_policy) {
>>   		ima_delete_rules(ns);
>>   		ns->valid_policy = 1;
>>   		clear_bit(IMA_FS_BUSY, &ns->ima_fs_flags);
>> -		return 0;
>> +		return err;
>>   	}
>>   
>>   	ima_update_policy(ns);
>> diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
>> index acb4c36e539f..3f84d04f101d 100644
>> --- a/security/integrity/ima/ima_policy.c
>> +++ b/security/integrity/ima/ima_policy.c
>> @@ -305,7 +305,8 @@ static struct ima_rule_opt_list *ima_alloc_rule_opt_list(const substring_t *src)
>>   		return ERR_PTR(-EINVAL);
>>   	}
>>   
>> -	opt_list = kzalloc(struct_size(opt_list, items, count), GFP_KERNEL);
>> +	opt_list = kzalloc(struct_size(opt_list, items, count),
>> +			   GFP_KERNEL_ACCOUNT);
>>   	if (!opt_list) {
>>   		kfree(src_copy);
>>   		return ERR_PTR(-ENOMEM);
>> @@ -379,7 +380,7 @@ static struct ima_rule_entry *ima_lsm_copy_rule(struct ima_namespace *ns,
>>   	 * Immutable elements are copied over as pointers and data; only
>>   	 * lsm rules can change
>>   	 */
>> -	nentry = kmemdup(entry, sizeof(*nentry), GFP_KERNEL);
>> +	nentry = kmemdup(entry, sizeof(*nentry), GFP_KERNEL_ACCOUNT);
>>   	if (!nentry)
>>   		return NULL;
>>   
>> @@ -826,7 +827,7 @@ static void add_rules(struct ima_namespace *ns,
>>   
>>   		if (policy_rule & IMA_CUSTOM_POLICY) {
>>   			entry = kmemdup(&entries[i], sizeof(*entry),
>> -					GFP_KERNEL);
>> +					GFP_KERNEL_ACCOUNT);
>>   			if (!entry)
>>   				continue;
>>   
>> @@ -863,7 +864,7 @@ static int __init ima_init_arch_policy(struct ima_namespace *ns)
>>   
>>   	ns->arch_policy_entry = kcalloc(arch_entries + 1,
>>   					sizeof(*ns->arch_policy_entry),
>> -					GFP_KERNEL);
>> +					GFP_KERNEL_ACCOUNT);
>>   	if (!ns->arch_policy_entry)
>>   		return 0;
>>   
>> @@ -975,8 +976,20 @@ void __init ima_init_policy(struct ima_namespace *ns)
>>   /* Make sure we have a valid policy, at least containing some rules. */
>>   int ima_check_policy(struct ima_namespace *ns)
>>   {
>> +	struct ima_rule_entry *entry;
>> +	size_t len1 = 0;
>> +	size_t len2 = 0;
>> +
>>   	if (list_empty(&ns->ima_temp_rules))
>>   		return -EINVAL;
>> +	if (ns != &init_ima_ns) {
>> +		list_for_each_entry(entry, &ns->ima_temp_rules, list)
>> +			len1++;
>> +		list_for_each_entry(entry, &ns->ima_policy_rules, list)
> Using list_for_each_entry() is fine here, because multiple policy
> updates at the same time are blocked.  Please add a comment.
>
>> +			len2++;
>> +		if (len1 + len2 > 1024)
> One variable should be enough.
>
>> +			return -ENOSPC;
>> +	}
>>   	return 0;
>>   }
>>   
>> @@ -1848,7 +1861,7 @@ ssize_t ima_parse_add_rule(struct ima_namespace *ns, char *rule)
>>   	if (*p == '#' || *p == '\0')
>>   		return len;
>>   
>> -	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
>> +	entry = kzalloc(sizeof(*entry), GFP_KERNEL_ACCOUNT);
>>   	if (!entry) {
>>   		integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
>>   				    NULL, op, "-ENOMEM", -ENOMEM, audit_info);

  reply	other threads:[~2022-02-23 16:38 UTC|newest]

Thread overview: 82+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-02-01 20:37 [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns Stefan Berger
2022-02-01 20:37 ` [PATCH v10 01/27] ima: Remove ima_policy file before directory Stefan Berger
2022-02-10 12:02   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels Stefan Berger
2022-02-02 14:17   ` Christian Brauner
2022-02-01 20:37 ` [PATCH v10 03/27] ima: Return error code obtained from securityfs functions Stefan Berger
2022-02-10 12:02   ` Mimi Zohar
2022-02-15 18:09     ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 04/27] securityfs: rework dentry creation Stefan Berger
2022-02-10 12:03   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it Stefan Berger
2022-02-16 14:41   ` Mimi Zohar
2022-02-16 20:25     ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace Stefan Berger
2022-02-16 16:39   ` Mimi Zohar
2022-02-16 20:48     ` Stefan Berger
2022-02-16 20:56       ` Mimi Zohar
2022-02-16 21:19         ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 07/27] ima: Move ima_htable " Stefan Berger
2022-02-16 14:41   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 08/27] ima: Move measurement list related variables " Stefan Berger
2022-02-17 14:46   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 09/27] ima: Move some IMA policy and filesystem " Stefan Berger
2022-02-17 14:44   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack Stefan Berger
2022-02-17 14:44   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace Stefan Berger
2022-02-17 20:30   ` Mimi Zohar
2022-02-17 20:59     ` Stefan Berger
2022-02-17 21:24       ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable() Stefan Berger
2022-02-05  5:58   ` Serge E. Hallyn
2022-02-06 17:20     ` Stefan Berger
2022-02-07 18:43       ` Stefan Berger
2022-02-23 17:51         ` Serge E. Hallyn
2022-02-01 20:37 ` [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now Stefan Berger
2022-02-17 21:32   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace Stefan Berger
2022-02-18 16:26   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses Stefan Berger
2022-02-18 16:27   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace Stefan Berger
2022-02-18 17:09   ` Mimi Zohar
2022-02-18 19:38     ` Stefan Berger
2022-02-18 20:04       ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 17/27] ima: Add functions for creating and " Stefan Berger
2022-02-18 19:49   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data Stefan Berger
2022-02-23 16:12   ` Mimi Zohar
2022-02-24  2:21     ` Stefan Berger
2022-02-24  2:49       ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 19/27] integrity: Add optional callback function to integrity_inode_free() Stefan Berger
2022-02-01 20:37 ` [PATCH v10 20/27] ima: Namespace audit status flags Stefan Berger
2022-02-01 20:37 ` [PATCH v10 21/27] ima: Remove unused iints from the integrity_iint_cache Stefan Berger
2022-02-01 20:37 ` [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support Stefan Berger
2022-02-23  1:48   ` Mimi Zohar
2022-02-23  8:14     ` Christian Brauner
2022-02-23 15:44       ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 23/27] ima: Setup securityfs for IMA namespace Stefan Berger
2022-02-23 11:45   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 24/27] ima: Introduce securityfs file to activate an " Stefan Berger
2022-02-23 13:54   ` Mimi Zohar
2022-02-23 17:08     ` Stefan Berger
2022-02-23 17:12       ` Mimi Zohar
2022-02-23 22:30         ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy Stefan Berger
2022-02-23 14:06   ` Mimi Zohar
2022-02-01 20:37 ` [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns Stefan Berger
2022-02-23 15:38   ` Mimi Zohar
2022-02-23 16:37     ` Stefan Berger [this message]
2022-02-23 17:04       ` Mimi Zohar
2022-02-23 20:45         ` Stefan Berger
2022-02-23 20:59           ` Mimi Zohar
2022-02-23 21:06             ` Stefan Berger
2022-02-01 20:37 ` [PATCH v10 27/27] ima: Enable IMA namespaces Stefan Berger
2022-02-23 17:58   ` Serge E. Hallyn
2022-02-23 20:53     ` Stefan Berger
2022-02-02 14:13 ` [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns Christian Brauner
2022-02-02 14:40   ` Stefan Berger
2022-02-02 16:04     ` Mimi Zohar
2022-02-02 18:18       ` Stefan Berger
2022-02-02 21:27         ` Stefan Berger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=479f09e7-0d39-0281-45ef-5cce4861d24d@linux.ibm.com \
    --to=stefanb@linux.ibm.com \
    --cc=christian.brauner@ubuntu.com \
    --cc=containers@lists.linux.dev \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=ebiederm@xmission.com \
    --cc=jamjoom@us.ibm.com \
    --cc=jejb@linux.ibm.com \
    --cc=jmorris@namei.org \
    --cc=krzysztof.struczynski@huawei.com \
    --cc=lhinds@redhat.com \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=lsturman@redhat.com \
    --cc=mpeters@redhat.com \
    --cc=paul@paul-moore.com \
    --cc=puiterwi@redhat.com \
    --cc=rgb@redhat.com \
    --cc=roberto.sassu@huawei.com \
    --cc=serge@hallyn.com \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).