apparmor: Refactor to remove bprm_secureexec hook
authorKees Cook <keescook@chromium.org>
Tue, 18 Jul 2017 22:25:24 +0000 (15:25 -0700)
committerKees Cook <keescook@chromium.org>
Tue, 1 Aug 2017 19:03:06 +0000 (12:03 -0700)
The AppArmor bprm_secureexec hook can be merged with the bprm_set_creds
hook since it's dealing with the same information, and all of the details
are finalized during the first call to the bprm_set_creds hook via
prepare_binprm() (subsequent calls due to binfmt_script, etc, are ignored
via bprm->called_set_creds).

Here, all the comments describe how secureexec is actually calculated
during bprm_set_creds, so this actually does it, drops the bprm flag that
was being used internally by AppArmor, and drops the bprm_secureexec hook.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
security/apparmor/domain.c
security/apparmor/include/domain.h
security/apparmor/include/file.h
security/apparmor/lsm.c

index 67ec52c..17a601c 100644 (file)
@@ -807,7 +807,7 @@ int apparmor_bprm_set_creds(struct linux_binprm *bprm)
                        aa_label_printk(new, GFP_ATOMIC);
                        dbg_printk("\n");
                }
-               bprm->unsafe |= AA_SECURE_X_NEEDED;
+               bprm->secureexec = 1;
        }
 
        if (label->proxy != new->proxy) {
@@ -843,23 +843,6 @@ audit:
        goto done;
 }
 
-/**
- * apparmor_bprm_secureexec - determine if secureexec is needed
- * @bprm: binprm for exec  (NOT NULL)
- *
- * Returns: %1 if secureexec is needed else %0
- */
-int apparmor_bprm_secureexec(struct linux_binprm *bprm)
-{
-       /* the decision to use secure exec is computed in set_creds
-        * and stored in bprm->unsafe.
-        */
-       if (bprm->unsafe & AA_SECURE_X_NEEDED)
-               return 1;
-
-       return 0;
-}
-
 /*
  * Functions for self directed profile change
  */
index bab5810..24c5976 100644 (file)
@@ -30,7 +30,6 @@ struct aa_domain {
 #define AA_CHANGE_STACK 8
 
 int apparmor_bprm_set_creds(struct linux_binprm *bprm);
-int apparmor_bprm_secureexec(struct linux_binprm *bprm);
 
 void aa_free_domain_entries(struct aa_domain *domain);
 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
index 001e400..4c2c8ac 100644 (file)
@@ -101,9 +101,6 @@ static inline struct aa_label *aa_get_file_label(struct aa_file_ctx *ctx)
 #define AA_X_INHERIT           0x4000
 #define AA_X_UNCONFINED                0x8000
 
-/* AA_SECURE_X_NEEDED - is passed in the bprm->unsafe field */
-#define AA_SECURE_X_NEEDED     0x8000
-
 /* need to make conditional which ones are being set */
 struct path_cond {
        kuid_t uid;
index 867bcd1..7a82c0f 100644 (file)
@@ -694,7 +694,6 @@ static struct security_hook_list apparmor_hooks[] __lsm_ro_after_init = {
        LSM_HOOK_INIT(bprm_set_creds, apparmor_bprm_set_creds),
        LSM_HOOK_INIT(bprm_committing_creds, apparmor_bprm_committing_creds),
        LSM_HOOK_INIT(bprm_committed_creds, apparmor_bprm_committed_creds),
-       LSM_HOOK_INIT(bprm_secureexec, apparmor_bprm_secureexec),
 
        LSM_HOOK_INIT(task_setrlimit, apparmor_task_setrlimit),
 };