]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
lsm: new security_file_ioctl_compat() hook
authorAlfred Piccioni <alpic@google.com>
Tue, 19 Dec 2023 09:09:09 +0000 (10:09 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 23 Feb 2024 07:12:58 +0000 (08:12 +0100)
commit f1bb47a31dff6d4b34fb14e99850860ee74bb003 upstream.

Some ioctl commands do not require ioctl permission, but are routed to
other permissions such as FILE_GETATTR or FILE_SETATTR. This routing is
done by comparing the ioctl cmd to a set of 64-bit flags (FS_IOC_*).

However, if a 32-bit process is running on a 64-bit kernel, it emits
32-bit flags (FS_IOC32_*) for certain ioctl operations. These flags are
being checked erroneously, which leads to these ioctl operations being
routed to the ioctl permission, rather than the correct file
permissions.

This was also noted in a RED-PEN finding from a while back -
"/* RED-PEN how should LSM module know it's handling 32bit? */".

This patch introduces a new hook, security_file_ioctl_compat(), that is
called from the compat ioctl syscall. All current LSMs have been changed
to support this hook.

Reviewing the three places where we are currently using
security_file_ioctl(), it appears that only SELinux needs a dedicated
compat change; TOMOYO and SMACK appear to be functional without any
change.

Cc: stable@vger.kernel.org
Fixes: 0b24dcb7f2f7 ("Revert "selinux: simplify ioctl checking"")
Signed-off-by: Alfred Piccioni <alpic@google.com>
Reviewed-by: Stephen Smalley <stephen.smalley.work@gmail.com>
[PM: subject tweak, line length fixes, and alignment corrections]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
fs/compat_ioctl.c
include/linux/lsm_hooks.h
include/linux/security.h
security/security.c
security/selinux/hooks.c
security/smack/smack_lsm.c
security/tomoyo/tomoyo.c

index c6fe9914440ef4e4e09605cf3f8ba8ccd3c9c376..368128c30e60cc9f7c27767ddfc86761af640ef4 100644 (file)
@@ -1370,8 +1370,7 @@ COMPAT_SYSCALL_DEFINE3(ioctl, unsigned int, fd, unsigned int, cmd,
        if (!f.file)
                goto out;
 
-       /* RED-PEN how should LSM module know it's handling 32bit? */
-       error = security_file_ioctl(f.file, cmd, arg);
+       error = security_file_ioctl_compat(f.file, cmd, arg);
        if (error)
                goto out_fput;
 
index e65dace667d360cc769243e254a1744ab3301000..9a3ded44fb60c1cf4a06d889f8fcfe3735e0eb15 100644 (file)
  *     simple integer value.  When @arg represents a user space pointer, it
  *     should never be used by the security module.
  *     Return 0 if permission is granted.
+ * @file_ioctl_compat:
+ *     @file contains the file structure.
+ *     @cmd contains the operation to perform.
+ *     @arg contains the operational arguments.
+ *     Check permission for a compat ioctl operation on @file.
+ *     Return 0 if permission is granted.
  * @mmap_addr :
  *     Check permissions for a mmap operation at @addr.
  *     @addr contains virtual address that will be used for the operation.
@@ -1563,6 +1569,8 @@ union security_list_options {
        void (*file_free_security)(struct file *file);
        int (*file_ioctl)(struct file *file, unsigned int cmd,
                                unsigned long arg);
+       int (*file_ioctl_compat)(struct file *file, unsigned int cmd,
+                               unsigned long arg);
        int (*mmap_addr)(unsigned long addr);
        int (*mmap_file)(struct file *file, unsigned long reqprot,
                                unsigned long prot, unsigned long flags);
@@ -1861,6 +1869,7 @@ struct security_hook_heads {
        struct hlist_head file_alloc_security;
        struct hlist_head file_free_security;
        struct hlist_head file_ioctl;
+       struct hlist_head file_ioctl_compat;
        struct hlist_head mmap_addr;
        struct hlist_head mmap_file;
        struct hlist_head file_mprotect;
index 273877cf47bfdc25e531084e04c6afad1e261df7..817af8ef3aef31c7466059ef7d682006de13fa15 100644 (file)
@@ -322,6 +322,8 @@ int security_file_permission(struct file *file, int mask);
 int security_file_alloc(struct file *file);
 void security_file_free(struct file *file);
 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
+int security_file_ioctl_compat(struct file *file, unsigned int cmd,
+                              unsigned long arg);
 int security_mmap_file(struct file *file, unsigned long prot,
                        unsigned long flags);
 int security_mmap_addr(unsigned long addr);
@@ -834,6 +836,13 @@ static inline int security_file_ioctl(struct file *file, unsigned int cmd,
        return 0;
 }
 
+static inline int security_file_ioctl_compat(struct file *file,
+                                            unsigned int cmd,
+                                            unsigned long arg)
+{
+       return 0;
+}
+
 static inline int security_mmap_file(struct file *file, unsigned long prot,
                                     unsigned long flags)
 {
index 21c27424a44be2ad364669f43b98434dea53a592..e8a53164e6b51b407b847ef40e19cdb834187bd8 100644 (file)
@@ -890,6 +890,23 @@ int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
        return call_int_hook(file_ioctl, 0, file, cmd, arg);
 }
 
+/**
+ * security_file_ioctl_compat() - Check if an ioctl is allowed in compat mode
+ * @file: associated file
+ * @cmd: ioctl cmd
+ * @arg: ioctl arguments
+ *
+ * Compat version of security_file_ioctl() that correctly handles 32-bit
+ * processes running on 64-bit kernels.
+ *
+ * Return: Returns 0 if permission is granted.
+ */
+int security_file_ioctl_compat(struct file *file, unsigned int cmd,
+                              unsigned long arg)
+{
+       return call_int_hook(file_ioctl_compat, 0, file, cmd, arg);
+}
+
 static inline unsigned long mmap_prot(struct file *file, unsigned long prot)
 {
        /*
index 749dbf9f2cfcafa9b8557811349086af95b68edf..a6086a6eb693d511c1dac000d1c864dac6270482 100644 (file)
@@ -3709,6 +3709,33 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
        return error;
 }
 
+static int selinux_file_ioctl_compat(struct file *file, unsigned int cmd,
+                             unsigned long arg)
+{
+       /*
+        * If we are in a 64-bit kernel running 32-bit userspace, we need to
+        * make sure we don't compare 32-bit flags to 64-bit flags.
+        */
+       switch (cmd) {
+       case FS_IOC32_GETFLAGS:
+               cmd = FS_IOC_GETFLAGS;
+               break;
+       case FS_IOC32_SETFLAGS:
+               cmd = FS_IOC_SETFLAGS;
+               break;
+       case FS_IOC32_GETVERSION:
+               cmd = FS_IOC_GETVERSION;
+               break;
+       case FS_IOC32_SETVERSION:
+               cmd = FS_IOC_SETVERSION;
+               break;
+       default:
+               break;
+       }
+
+       return selinux_file_ioctl(file, cmd, arg);
+}
+
 static int default_noexec;
 
 static int file_map_prot_check(struct file *file, unsigned long prot, int shared)
@@ -7054,6 +7081,7 @@ static struct security_hook_list selinux_hooks[] __lsm_ro_after_init = {
        LSM_HOOK_INIT(file_alloc_security, selinux_file_alloc_security),
        LSM_HOOK_INIT(file_free_security, selinux_file_free_security),
        LSM_HOOK_INIT(file_ioctl, selinux_file_ioctl),
+       LSM_HOOK_INIT(file_ioctl_compat, selinux_file_ioctl_compat),
        LSM_HOOK_INIT(mmap_file, selinux_mmap_file),
        LSM_HOOK_INIT(mmap_addr, selinux_mmap_addr),
        LSM_HOOK_INIT(file_mprotect, selinux_file_mprotect),
index 266eb8ca3381863427670dbdab4ab593ab6a1c5b..128a5f464740e48659c493e77f02d8f2eb8bc9f6 100644 (file)
@@ -4737,6 +4737,7 @@ static struct security_hook_list smack_hooks[] __lsm_ro_after_init = {
        LSM_HOOK_INIT(file_alloc_security, smack_file_alloc_security),
        LSM_HOOK_INIT(file_free_security, smack_file_free_security),
        LSM_HOOK_INIT(file_ioctl, smack_file_ioctl),
+       LSM_HOOK_INIT(file_ioctl_compat, smack_file_ioctl),
        LSM_HOOK_INIT(file_lock, smack_file_lock),
        LSM_HOOK_INIT(file_fcntl, smack_file_fcntl),
        LSM_HOOK_INIT(mmap_file, smack_mmap_file),
index 9f932e2d68521c2da50be376cb41c51d700425f4..6d7ea66f634a98a2ee7119c7abab8ebc4ddec6c7 100644 (file)
@@ -516,6 +516,7 @@ static struct security_hook_list tomoyo_hooks[] __lsm_ro_after_init = {
        LSM_HOOK_INIT(path_rename, tomoyo_path_rename),
        LSM_HOOK_INIT(inode_getattr, tomoyo_inode_getattr),
        LSM_HOOK_INIT(file_ioctl, tomoyo_file_ioctl),
+       LSM_HOOK_INIT(file_ioctl_compat, tomoyo_file_ioctl),
        LSM_HOOK_INIT(path_chmod, tomoyo_path_chmod),
        LSM_HOOK_INIT(path_chown, tomoyo_path_chown),
        LSM_HOOK_INIT(path_chroot, tomoyo_path_chroot),