1. 09 Mar, 2021 3 commits
    • Xiong Zhenwu's avatar
      selinux: fix misspellings using codespell tool · 63ddf1ba
      Xiong Zhenwu authored
      A typo is found out by codespell tool in 16th line of hashtab.c
      
      $ codespell ./security/selinux/ss/
      ./hashtab.c:16: rouding  ==> rounding
      
      Fix a typo found by codespell.
      Signed-off-by: default avatarXiong Zhenwu <xiong.zhenwu@zte.com.cn>
      [PM: subject line tweak]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      63ddf1ba
    • Lakshmi Ramasubramanian's avatar
      selinux: measure state and policy capabilities · 2554a48f
      Lakshmi Ramasubramanian authored
      SELinux stores the configuration state and the policy capabilities
      in kernel memory.  Changes to this data at runtime would have an impact
      on the security guarantees provided by SELinux.  Measuring this data
      through IMA subsystem provides a tamper-resistant way for
      an attestation service to remotely validate it at runtime.
      
      Measure the configuration state and policy capabilities by calling
      the IMA hook ima_measure_critical_data().
      
      To enable SELinux data measurement, the following steps are required:
      
       1, Add "ima_policy=critical_data" to the kernel command line arguments
          to enable measuring SELinux data at boot time.
          For example,
            BOOT_IMAGE=/boot/vmlinuz-5.11.0-rc3+ root=UUID=fd643309-a5d2-4ed3-b10d-3c579a5fab2f ro nomodeset security=selinux ima_policy=critical_data
      
       2, Add the following rule to /etc/ima/ima-policy
             measure func=CRITICAL_DATA label=selinux
      
      Sample measurement of SELinux state and policy capabilities:
      
      10 2122...65d8 ima-buf sha256:13c2...1292 selinux-state 696e...303b
      
      Execute the following command to extract the measured data
      from the IMA's runtime measurements list:
      
        grep "selinux-state" /sys/kernel/security/integrity/ima/ascii_runtime_measurements | tail -1 | cut -d' ' -f 6 | xxd -r -p
      
      The output should be a list of key-value pairs. For example,
       initialized=1;enforcing=0;checkreqprot=1;network_peer_controls=1;open_perms=1;extended_socket_class=1;always_check_network=0;cgroup_seclabel=1;nnp_nosuid_transition=1;genfs_seclabel_symlinks=0;
      
      To verify the measurement is consistent with the current SELinux state
      reported on the system, compare the integer values in the following
      files with those set in the IMA measurement (using the following commands):
      
       - cat /sys/fs/selinux/enforce
       - cat /sys/fs/selinux/checkreqprot
       - cat /sys/fs/selinux/policy_capabilities/[capability_file]
      
      Note that the actual verification would be against an expected state
      and done on a separate system (likely an attestation server) requiring
      "initialized=1;enforcing=1;checkreqprot=0;"
      for a secure state and then whatever policy capabilities are actually
      set in the expected policy (which can be extracted from the policy
      itself via seinfo, for example).
      Signed-off-by: default avatarLakshmi Ramasubramanian <nramas@linux.microsoft.com>
      Suggested-by: default avatarStephen Smalley <stephen.smalley.work@gmail.com>
      Suggested-by: default avatarPaul Moore <paul@paul-moore.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      2554a48f
    • Vivek Goyal's avatar
      selinux: Allow context mounts for unpriviliged overlayfs · 7fa2e79a
      Vivek Goyal authored
      Now overlayfs allow unpriviliged mounts. That is root inside a non-init
      user namespace can mount overlayfs. This is being added in 5.11 kernel.
      
      Giuseppe tried to mount overlayfs with option "context" and it failed
      with error -EACCESS.
      
      $ su test
      $ unshare -rm
      $ mkdir -p lower upper work merged
      $ mount -t overlay -o lowerdir=lower,workdir=work,upperdir=upper,userxattr,context='system_u:object_r:container_file_t:s0' none merged
      
      This fails with -EACCESS. It works if option "-o context" is not specified.
      
      Little debugging showed that selinux_set_mnt_opts() returns -EACCESS.
      
      So this patch adds "overlay" to the list, where it is fine to specific
      context from non init_user_ns.
      Reported-by: default avatarGiuseppe Scrivano <gscrivan@redhat.com>
      Signed-off-by: default avatarVivek Goyal <vgoyal@redhat.com>
      [PM: trimmed the changelog from the description]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      7fa2e79a
  2. 06 Mar, 2021 4 commits
  3. 05 Mar, 2021 33 commits