security: Introduce path_post_mknod hook
In preparation for moving IMA and EVM to the LSM infrastructure, introduce the path_post_mknod hook. IMA-appraisal requires all existing files in policy to have a file hash/signature stored in security.ima. An exception is made for empty files created by mknod, by tagging them as new files. LSMs could also take some action after files are created. The new hook cannot return an error and cannot cause the operation to be reverted. Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Acked-by: Casey Schaufler <casey@schaufler-ca.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Acked-by: Christian Brauner <brauner@kernel.org> Reviewed-by: Stefan Berger <stefanb@linux.ibm.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
f09068b5a1
commit
08abce60d6
@ -4063,6 +4063,11 @@ retry:
|
||||
dentry, mode, 0);
|
||||
break;
|
||||
}
|
||||
|
||||
if (error)
|
||||
goto out2;
|
||||
|
||||
security_path_post_mknod(idmap, dentry);
|
||||
out2:
|
||||
done_path_create(&path, dentry);
|
||||
if (retry_estale(error, lookup_flags)) {
|
||||
|
@ -94,6 +94,8 @@ LSM_HOOK(int, 0, path_mkdir, const struct path *dir, struct dentry *dentry,
|
||||
LSM_HOOK(int, 0, path_rmdir, const struct path *dir, struct dentry *dentry)
|
||||
LSM_HOOK(int, 0, path_mknod, const struct path *dir, struct dentry *dentry,
|
||||
umode_t mode, unsigned int dev)
|
||||
LSM_HOOK(void, LSM_RET_VOID, path_post_mknod, struct mnt_idmap *idmap,
|
||||
struct dentry *dentry)
|
||||
LSM_HOOK(int, 0, path_truncate, const struct path *path)
|
||||
LSM_HOOK(int, 0, path_symlink, const struct path *dir, struct dentry *dentry,
|
||||
const char *old_name)
|
||||
|
@ -1893,6 +1893,7 @@ int security_path_mkdir(const struct path *dir, struct dentry *dentry, umode_t m
|
||||
int security_path_rmdir(const struct path *dir, struct dentry *dentry);
|
||||
int security_path_mknod(const struct path *dir, struct dentry *dentry, umode_t mode,
|
||||
unsigned int dev);
|
||||
void security_path_post_mknod(struct mnt_idmap *idmap, struct dentry *dentry);
|
||||
int security_path_truncate(const struct path *path);
|
||||
int security_path_symlink(const struct path *dir, struct dentry *dentry,
|
||||
const char *old_name);
|
||||
@ -1927,6 +1928,10 @@ static inline int security_path_mknod(const struct path *dir, struct dentry *den
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void security_path_post_mknod(struct mnt_idmap *idmap,
|
||||
struct dentry *dentry)
|
||||
{ }
|
||||
|
||||
static inline int security_path_truncate(const struct path *path)
|
||||
{
|
||||
return 0;
|
||||
|
@ -1800,6 +1800,20 @@ int security_path_mknod(const struct path *dir, struct dentry *dentry,
|
||||
}
|
||||
EXPORT_SYMBOL(security_path_mknod);
|
||||
|
||||
/**
|
||||
* security_path_post_mknod() - Update inode security field after file creation
|
||||
* @idmap: idmap of the mount
|
||||
* @dentry: new file
|
||||
*
|
||||
* Update inode security field after a file has been created.
|
||||
*/
|
||||
void security_path_post_mknod(struct mnt_idmap *idmap, struct dentry *dentry)
|
||||
{
|
||||
if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
|
||||
return;
|
||||
call_void_hook(path_post_mknod, idmap, dentry);
|
||||
}
|
||||
|
||||
/**
|
||||
* security_path_mkdir() - Check if creating a new directory is allowed
|
||||
* @dir: parent directory
|
||||
|
Loading…
Reference in New Issue
Block a user