Received: by 10.192.165.148 with SMTP id m20csp554016imm; Fri, 4 May 2018 15:03:17 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrGlMNMW35sjBEeDjcav0/HxC0EE+cdpLFxMfkKpVII2lTVDeZy8DH9+PaXGP8KDwHGLFVS X-Received: by 2002:a17:902:5c6:: with SMTP id f64-v6mr29219673plf.77.1525471397341; Fri, 04 May 2018 15:03:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525471397; cv=none; d=google.com; s=arc-20160816; b=eNvUs45lh9OmLB+xblFxpnMzrWOWFI0sZG8Dy/9mtNtOkTfPRK7PyY9vXK4CqgZpR+ 9sDWcfoHtT+XjM52/5x8YyA6os9plSYwIjoB8/eX72IdyfTo6u4/uX5hnziJcoy7V+9V h2sBa3wGk/xAj5mkqS+3UPHwG8ALZRBoPpcCT07U4T9oIAzIsTdRmtyV9Y8JqQ7Ygtz4 ikKlqbN4j/5fOVKJfIkeDPs1cMEnPB3UNcVC8wAD3oUhHMObrCaDzNfDXwzJHXnQq06/ ckG/Ks6rr4zJcUI9SjADkkS64DbyoExPB97N9kG6JsD1ZklOaprrlJ8kp7+uNbqPuTQB GvEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=m9TUGJSO6BNyC7dTryxnm4SEgKncCZ3HhQIOL9BHgNg=; b=w0r5ftUJUfGnSxUTVshZR2P8UBuXoFSL4rsuY8XmiGTL2vjsSEDSwNX7S2eo3Ochvc yRTwgYpmsT18Md9BHg2HAZTCUusJ7VnZmnBDA4xgf8ISpqizg/NMq9HXofV1HRE+kFqi +dpa9I+J36yf8cn5Gmi3auooav36I7vbV3Ki+I2c+XCMvWGXViZDqWD7L8LxhDOY+f61 Mf2//Q297GQLK6BoSlfp2BvKTnX/qCTvQ22kC0kDTqaWYBlHQ/S8UKLzNjY5G7MuuNlg A5f2XmTyI6ouHHaRq3egXbTsLYimoawLEr9RCPX5Azdbky9+REy7EuMYpDBamS9BJna1 jvEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=ilkW/aaX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e29-v6si11962540pga.573.2018.05.04.15.03.03; Fri, 04 May 2018 15:03:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=ilkW/aaX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751710AbeEDWBb (ORCPT + 99 others); Fri, 4 May 2018 18:01:31 -0400 Received: from sonic316-20.consmr.mail.bf2.yahoo.com ([74.6.130.194]:46061 "EHLO sonic316-20.consmr.mail.bf2.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751687AbeEDWB2 (ORCPT ); Fri, 4 May 2018 18:01:28 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1525471288; bh=m9TUGJSO6BNyC7dTryxnm4SEgKncCZ3HhQIOL9BHgNg=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From:Subject; b=ilkW/aaXMpU4OKHCScJQg/N5jYVyJBnrTIfGQKZtUfsHw7gISz4nujQzIKaNdikPpTWbSjKvr1fwEYeg264mtcwnZsGDRvylwWu9rOaKTntBIEZtq4w2gDW5Zg+J4qie0KRhDZH0L4XeUGOlLXhxddEaF8QUmgFGoWGW+3ezj55g9CD294TymHWgin0tYt/UHyGEu/OXUhVjByYKGzmZAWqAF+/B3pYcDxKouSPZaG4ZH4nO3JLo+ipQMj/2girnWTcC+k3KBbUfGZBnSkUmSGoMdYNxcABcM+rYpaF4BIM2xuPf6Nyuok3OBJiEwMOBE+Zly3QpAtbnvMuNpcw6wA== X-YMail-OSG: meHPM8cVM1nMCP78r9IKLHC2.LMp0VY0YRfVAOVfGuAZ4Uo5MbGRkbgBtGvLcpZ NgMTGa53uzqEX8qw4OblJBbhdqjSdPwDY84GyeY0tUTwzv5AUeUEQAHUwQmjhnDX3tj7vJYG.Lpt VgGfDguzKOTfQcPXpJ1TdawOUr00fYXv2gGNOrtXl6vuBCJYBTzbm4B5NotYX19CbKRivij5_sOs jF6CKunFJmNJ_efsZJcQhB5LgIalRJk7Ztv7ZRXNLr6_M6l3ObOneavG00pK3bgNr4ZZz3cJM3HV flFbjPZq3XyAuwk8NtIExV6pIvnJqgEbfBrBINAaTaAIAqyqcmbHtYC964TvK8Qu8eUXvbxBoY.j YK76it6yoIiwll8GYPFKA.7twJDS.j8Y06rL_kBiCgH3Tm3vNAoORqgDqqYNPQW47ELfzNnVMu3h i.dBCfZtLUWnL6_lagpPfxW1.uDJ7L.Ub4TB8Dog9KBWGHAdhHlbCdZTrocG61N62pBtlmYIeTKU hArMbHxt4YH8OErm.u4cfrZnUaPEeNPz4mtsJBn5.IC1Z69W2PUVkrS1zjmYenem2WXGxJx_iB.S oMM7cTnN1yH.M3hkvjvNdqOckjVFeuFhTemPMsZNmVEcI.pmnRdMB.AD_nB_GMCMSC1DkXD7s9wY V8n4HoK8wvZJ1Dg4bN9lUKriAeEIF3xA6 Received: from sonic.gate.mail.ne1.yahoo.com by sonic316.consmr.mail.bf2.yahoo.com with HTTP; Fri, 4 May 2018 22:01:28 +0000 Received: from c-67-169-65-224.hsd1.ca.comcast.net (EHLO [192.168.0.105]) ([67.169.65.224]) by smtp432.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 9e0de47c7ca0ac0343414f800c9c1a03; Fri, 04 May 2018 22:01:27 +0000 (UTC) Subject: Re: [PATCH v2 4/4] smack: provide socketpair callback To: David Herrmann , linux-kernel@vger.kernel.org Cc: James Morris , Paul Moore , teg@jklm.no, Stephen Smalley , selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org, Eric Paris , serge@hallyn.com, davem@davemloft.net, netdev@vger.kernel.org References: <20180504142822.15233-1-dh.herrmann@gmail.com> <20180504142822.15233-5-dh.herrmann@gmail.com> From: Casey Schaufler Message-ID: Date: Fri, 4 May 2018 15:01:19 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180504142822.15233-5-dh.herrmann@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/4/2018 7:28 AM, David Herrmann wrote: > From: Tom Gundersen > > Make sure to implement the new socketpair callback so the SO_PEERSEC > call on socketpair(2)s will return correct information. > > Signed-off-by: Tom Gundersen > Signed-off-by: David Herrmann This doesn't look like it will cause any problems. I've only been able to test it in a general way. I haven't created specific tests, but it passes the usual Smack use cases. Acked-by: Casey Schaufler > --- > security/smack/smack_lsm.c | 22 ++++++++++++++++++++++ > 1 file changed, 22 insertions(+) > > diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c > index 0b414836bebd..dcb976f98df2 100644 > --- a/security/smack/smack_lsm.c > +++ b/security/smack/smack_lsm.c > @@ -2842,6 +2842,27 @@ static int smack_socket_post_create(struct socket *sock, int family, > return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET); > } > > +/** > + * smack_socket_socketpair - create socket pair > + * @socka: one socket > + * @sockb: another socket > + * > + * Cross reference the peer labels for SO_PEERSEC > + * > + * Returns 0 on success, and error code otherwise > + */ > +static int smack_socket_socketpair(struct socket *socka, > + struct socket *sockb) > +{ > + struct socket_smack *asp = socka->sk->sk_security; > + struct socket_smack *bsp = sockb->sk->sk_security; > + > + asp->smk_packet = bsp->smk_out; > + bsp->smk_packet = asp->smk_out; > + > + return 0; > +} > + > #ifdef SMACK_IPV6_PORT_LABELING > /** > * smack_socket_bind - record port binding information. > @@ -4724,6 +4745,7 @@ static struct security_hook_list smack_hooks[] __lsm_ro_after_init = { > LSM_HOOK_INIT(unix_may_send, smack_unix_may_send), > > LSM_HOOK_INIT(socket_post_create, smack_socket_post_create), > + LSM_HOOK_INIT(socket_socketpair, smack_socket_socketpair), > #ifdef SMACK_IPV6_PORT_LABELING > LSM_HOOK_INIT(socket_bind, smack_socket_bind), > #endif