All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Serge E. Hallyn" <serge@hallyn.com>
To: Christian Brauner <brauner@kernel.org>
Cc: Stefan Berger <stefanb@linux.ibm.com>,
	"Serge E. Hallyn" <serge@hallyn.com>,
	linux-integrity@vger.kernel.org, zohar@linux.ibm.com,
	christian.brauner@ubuntu.com, containers@lists.linux.dev,
	dmitry.kasatkin@gmail.com, ebiederm@xmission.com,
	krzysztof.struczynski@huawei.com, roberto.sassu@huawei.com,
	mpeters@redhat.com, lhinds@redhat.com, lsturman@redhat.com,
	puiterwi@redhat.com, jejb@linux.ibm.com, jamjoom@us.ibm.com,
	linux-kernel@vger.kernel.org, paul@paul-moore.com,
	rgb@redhat.com, linux-security-module@vger.kernel.org,
	jmorris@namei.org, jpenumak@redhat.com
Subject: Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
Date: Mon, 23 May 2022 09:25:00 -0500	[thread overview]
Message-ID: <20220523142500.GA1599@mail.hallyn.com> (raw)
In-Reply-To: <20220523124159.zsbp2gonh2dum4jm@wittgenstein>

On Mon, May 23, 2022 at 02:41:59PM +0200, Christian Brauner wrote:
> On Mon, May 23, 2022 at 07:31:29AM -0400, Stefan Berger wrote:
> > 
> > 
> > On 5/23/22 05:59, Christian Brauner wrote:
> > > On Sun, May 22, 2022 at 01:24:26PM -0500, Serge Hallyn wrote:
> > > > On Wed, Apr 20, 2022 at 10:06:20AM -0400, Stefan Berger wrote:
> > > > > Add a pointer to ima_namespace to the user_namespace and initialize
> > > > > the init_user_ns with a pointer to init_ima_ns. We need a pointer from
> > > > > the user namespace to its associated IMA namespace since IMA namespaces
> > > > > are piggybacking on user namespaces.
> > > > > 
> > > > > Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
> > > > > Acked-by: Christian Brauner <brauner@kernel.org>
> > > > > Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
> > > > > 
> > > > > ---
> > > > > v11:
> > > > >   - Added lost A-b from Christian back
> > > > >   - Added sentence to patch description explaining why we need the pointer
> > > > > 
> > > > > v9:
> > > > >   - Deferred implementation of ima_ns_from_user_ns() to later patch
> > > > > ---
> > > > >   include/linux/ima.h            | 2 ++
> > > > >   include/linux/user_namespace.h | 4 ++++
> > > > >   kernel/user.c                  | 4 ++++
> > > > >   3 files changed, 10 insertions(+)
> > > > > 
> > > > > diff --git a/include/linux/ima.h b/include/linux/ima.h
> > > > > index 426b1744215e..fcb60a44e05f 100644
> > > > > --- a/include/linux/ima.h
> > > > > +++ b/include/linux/ima.h
> > > > > @@ -14,6 +14,8 @@
> > > > >   #include <crypto/hash_info.h>
> > > > >   struct linux_binprm;
> > > > > +extern struct ima_namespace init_ima_ns;
> > > > > +
> > > > >   #ifdef CONFIG_IMA
> > > > >   extern enum hash_algo ima_get_current_hash_algo(void);
> > > > >   extern int ima_bprm_check(struct linux_binprm *bprm);
> > > > > diff --git a/include/linux/user_namespace.h b/include/linux/user_namespace.h
> > > > > index 33a4240e6a6f..019e8cf7b633 100644
> > > > > --- a/include/linux/user_namespace.h
> > > > > +++ b/include/linux/user_namespace.h
> > > > > @@ -36,6 +36,7 @@ struct uid_gid_map { /* 64 bytes -- 1 cache line */
> > > > >   #define USERNS_INIT_FLAGS USERNS_SETGROUPS_ALLOWED
> > > > >   struct ucounts;
> > > > > +struct ima_namespace;
> > > > >   enum ucount_type {
> > > > >   	UCOUNT_USER_NAMESPACES,
> > > > > @@ -99,6 +100,9 @@ struct user_namespace {
> > > > >   #endif
> > > > >   	struct ucounts		*ucounts;
> > > > >   	long ucount_max[UCOUNT_COUNTS];
> > > > > +#ifdef CONFIG_IMA_NS
> > > > 
> > > > It's probably worth putting a comment here saying that user_ns does not
> > > > pin ima_ns.
> > > > 
> > > > That the only time the ima_ns will be freed is when user_ns is freed,
> > > > and only time it will be changed is when user_ns is freed, or during
> > > > ima_fs_ns_init() (under smp_load_acquire) during a new mount.
> > > > 
> > > > > +	struct ima_namespace	*ima_ns;
> > > > 
> > > > So, if I create a new user_ns with a new ima_ns, and in there I
> > > > create a new user_ns again, it looks like ima_ns will be NULL in
> > > > the new user_ns?  Should it not be set to the parent->ima_ns?
> > > > (which would cause trouble for the way it's currently being
> > > > freed...)
> > > 
> > > Would also work and wouldn't be difficult to do imho.
> > 
> > We previously decide to create an ima_namespace when securityfs is mounted.
> > This now also applies to nested containers where an IMA namespace is first
> > configured with the hash and template to use in a particular container and
> > then activated. If no configuration is done it will inherit the hash and
> > template from the first ancestor that has been configure when it is
> > activated. So the same steps and behavior applies to *all* containers, no
> > difference at any depth of nesting. Besides that, we don't want nested
> > containers to share policy and logs but keep them isolated from each other,
> > or do we not?
> > 
> > Further, how should it work if we were to apply this even to the first
> > container? Should it just inherit the &init_ima_namespace and we'd have no
> > isolation at all? Why would we start treating containers at deeper nesting
> > levels differently?
> 
> Valid points. I understood Serge as suggesting an implementation detail
> change not a design change but might misunderstand him here.
> 
> # Currently
> 
> 1. create new userns -> imans set to NULL
> 2. mount securityfs and configure imans -> set imans to &new_ima_ns
> 
> When 2. hasn't been done then we find the relevant imans by walking
> the userns hierarchy upwards finding the first parent userns that has a
> non-NULL imans.

Ah, right, thanks Christian.

But so the code - I think where the ima_ns is defined in the user_ns
struct, needs to make this clear.  Just something like

	// Pointer to ima_ns which this user_ns created.  Can be null.
	// Access checks will walk the userns->parent chain and check
	// against all active ima_ns's.  Note that when the user_ns is
	// freed, the ima_ns is guaranteed to be free-able.
	struct ima_namespace	*ima_ns;

> # Serge's suggestion
> 
> 1. create new userns -> imans is set to parent imans
> 2. mount securityfs and configure imans -> replace parent with &new_ima_ns
> 
> So when 2. hasn't been done we don't need to walk the userns hierarchy
> upwards. We always find the relevant imans directly. Some massaging
> would be needed in process_measurement() probably but it wouldn't need
> to change semantics per se.
> 
> But I think I misunderstood something in any case. So looking at an
> example like ima_post_path_mknod(). You seem to not call into
> ima_must_appraise() if the caller's userns doesn't have an imans
> enabled. I somehow had thought that the same logic applied as in
> process_measurement. But if it isn't then it might make sense to keep
> the current implementation.

  parent reply	other threads:[~2022-05-23 14:25 UTC|newest]

Thread overview: 76+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-20 14:06 [PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns Stefan Berger
2022-04-20 14:06 ` [PATCH v12 01/26] securityfs: rework dentry creation Stefan Berger
2022-05-09 19:54   ` Serge E. Hallyn
2022-05-09 20:36     ` Serge E. Hallyn
2022-05-10  8:43       ` Amir Goldstein
2022-05-10 10:38         ` Christian Brauner
2022-05-10 14:51           ` Serge E. Hallyn
2022-05-10 14:53         ` Serge E. Hallyn
2022-05-10 10:26       ` Christian Brauner
2022-05-10 10:25     ` Christian Brauner
2022-05-10 14:10       ` Serge E. Hallyn
2022-05-10 15:51         ` Christian Brauner
2022-05-10 18:51           ` Serge E. Hallyn
2022-05-10 20:41           ` Serge E. Hallyn
2022-06-09 14:27             ` Mimi Zohar
2022-05-10 16:50       ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support Stefan Berger
2022-05-21  2:23   ` Serge E. Hallyn
2022-05-21  9:38     ` Christian Brauner
2022-05-21 15:09       ` Serge E. Hallyn
2022-07-07 14:34     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it Stefan Berger
2022-05-21  2:33   ` Serge E. Hallyn
2022-05-24 14:57     ` Stefan Berger
2022-05-24 15:05       ` Serge E. Hallyn
2022-05-24 16:18     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace Stefan Berger
2022-05-21  2:46   ` Serge E. Hallyn
2022-05-21  3:07     ` Serge E. Hallyn
2022-07-07 14:12     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 05/26] ima: Move ima_htable " Stefan Berger
2022-05-21  2:50   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 06/26] ima: Move measurement list related variables " Stefan Berger
2022-05-21  2:55   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 07/26] ima: Move some IMA policy and filesystem " Stefan Berger
2022-05-21  3:03   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack Stefan Berger
2022-05-21  3:24   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace Stefan Berger
2022-05-22  2:35   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance Stefan Berger
2022-05-22 17:06   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable() Stefan Berger
2022-05-22 17:31   ` Serge E. Hallyn
2022-05-24 14:17     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now Stefan Berger
2022-05-22 17:38   ` Serge E. Hallyn
2022-05-24 13:25     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace Stefan Berger
2022-05-22 18:24   ` Serge E. Hallyn
2022-05-23  9:59     ` Christian Brauner
2022-05-23 11:31       ` Stefan Berger
2022-05-23 12:41         ` Christian Brauner
2022-05-23 12:58           ` Stefan Berger
2022-05-23 14:25           ` Serge E. Hallyn [this message]
2022-07-07 14:14             ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses Stefan Berger
2022-05-23  0:42   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace Stefan Berger
2022-05-23  0:43   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 16/26] ima: Add functions for creating and " Stefan Berger
2022-05-30  1:07   ` Serge E. Hallyn
2022-04-20 14:06 ` [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data Stefan Berger
2022-04-20 14:06 ` [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free() Stefan Berger
2022-04-20 14:06 ` [PATCH v12 19/26] ima: Namespace audit status flags Stefan Berger
2022-04-20 14:06 ` [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache Stefan Berger
2022-04-20 14:06 ` [PATCH v12 21/26] ima: Setup securityfs for IMA namespace Stefan Berger
2022-05-30  1:16   ` Serge E. Hallyn
2022-05-31 19:26     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 22/26] ima: Introduce securityfs file to activate an " Stefan Berger
2022-04-20 14:06 ` [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy Stefan Berger
2022-05-22 17:54   ` Serge E. Hallyn
2022-05-24 13:19     ` Stefan Berger
2022-04-20 14:06 ` [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns Stefan Berger
2022-04-20 14:06 ` [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns Stefan Berger
2022-04-20 14:06 ` [PATCH v12 26/26] ima: Enable IMA namespaces Stefan Berger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220523142500.GA1599@mail.hallyn.com \
    --to=serge@hallyn.com \
    --cc=brauner@kernel.org \
    --cc=christian.brauner@ubuntu.com \
    --cc=containers@lists.linux.dev \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=ebiederm@xmission.com \
    --cc=jamjoom@us.ibm.com \
    --cc=jejb@linux.ibm.com \
    --cc=jmorris@namei.org \
    --cc=jpenumak@redhat.com \
    --cc=krzysztof.struczynski@huawei.com \
    --cc=lhinds@redhat.com \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=lsturman@redhat.com \
    --cc=mpeters@redhat.com \
    --cc=paul@paul-moore.com \
    --cc=puiterwi@redhat.com \
    --cc=rgb@redhat.com \
    --cc=roberto.sassu@huawei.com \
    --cc=stefanb@linux.ibm.com \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.