Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5176233ybi; Tue, 28 May 2019 08:45:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqyJI4tPd2OkJ+nYGjPu6VW3/Vn0o0m3l7kgnhRYZnfgHlT7BussYFL1/4Igz1R9OGWCK2++ X-Received: by 2002:a17:90a:b106:: with SMTP id z6mr6670801pjq.91.1559058330415; Tue, 28 May 2019 08:45:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559058330; cv=none; d=google.com; s=arc-20160816; b=ZO14OxgROeTKHsZkhBA0uqaksjQASztuD6WPJVeL1w49FAqcyfPcteoN81CY7mpzo/ f0T8NWm7qDHSPEzMNLfzeghg9G2ZAKfswJiPhcF/iw/qdqX5MQ+rwnqa1qsQ4u4TnJKf AbECYsuVwsf4f1IlY/bhTuBffswDlkxR2zzffv4D1LM5WhX+77KIwBB/oMURQwipGg+J JxWAMQosfeiAMOxPhWoWc3GUShIRtpKZPGdZ1X8CyHQ7gHeNuGGi3b8SY3ApybzATjvT LlNBW5mv46Q+rHT0ZGdwevdS9QDntXZmmQL2b3M1oQ6jnGgZKrgrPl/mnIgPosQ8aoYl g0lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization; bh=nKArOwJYjPXelHykL1ou692STooXo0Mgsb1bX1RoyhQ=; b=NXu4uMPx8s/KmzEODD0ItcPpNxfD3HTVRzrjTOmPMvf3wbGGG55CBygSknk/1Fi7cc sbSMuEQJMJiiabn7DNRH2bjWKoj9FaMu6gCVB6rTK6txoCxdbMJ7JPj60QOIR5BHR/8m MOahBucjA6Sb2gvqvNJZr056XPA0fxK0dPO5f47Zb4mtYG4H56wevPU80As9tt2z/kxW /t2+ZtcXH1EGzvyjSMDG0uHh+hRdWNTZoLrIghSD8YzprkiUdfDeceyUGgNyREfJ89+d 5EXg14VTFDd3tCPOt5M7rpVsuH5EMOc9Q5RqJu+txEdS75U6sf2mide/2PCBpj+w/3r+ i4SQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i2si23593604pfb.7.2019.05.28.08.45.14; Tue, 28 May 2019 08:45:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727809AbfE1PNH (ORCPT + 99 others); Tue, 28 May 2019 11:13:07 -0400 Received: from mx1.redhat.com ([209.132.183.28]:38509 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727267AbfE1PNG (ORCPT ); Tue, 28 May 2019 11:13:06 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 2700E317914E; Tue, 28 May 2019 15:13:06 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-125-65.rdu2.redhat.com [10.10.125.65]) by smtp.corp.redhat.com (Postfix) with ESMTP id 164872C31E; Tue, 28 May 2019 15:13:01 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH 14/25] fsinfo: Support Smack superblock parameter retrieval [ver #13] From: David Howells To: viro@zeniv.linux.org.uk Cc: dhowells@redhat.com, raven@themaw.net, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, mszeredi@redhat.com Date: Tue, 28 May 2019 16:13:00 +0100 Message-ID: <155905638053.1662.16622749706126627482.stgit@warthog.procyon.org.uk> In-Reply-To: <155905626142.1662.18430571708534506785.stgit@warthog.procyon.org.uk> References: <155905626142.1662.18430571708534506785.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.41]); Tue, 28 May 2019 15:13:06 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add support to Smack for retrieval of the superblock parameters. Signed-off-by: David Howells --- security/smack/smack_lsm.c | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 0de725f88bed..0a1e88d50ad3 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -45,6 +45,7 @@ #include #include #include +#include #include "smack.h" #define TRANS_TRUE "TRUE" @@ -893,6 +894,45 @@ static int smack_sb_statfs(struct dentry *dentry) return rc; } +#ifdef CONFIG_FSINFO +/* + * Retrieve the Smack filesystem information, including mount parameters. + */ +static int smack_sb_fsinfo(struct path *path, struct fsinfo_kparams *params) +{ + struct superblock_smack *sp = path->dentry->d_sb->s_security; + + switch (params->request) { + case FSINFO_ATTR_LSM_PARAMETERS: { + struct dentry *root = path->dentry->d_sb->s_root; + struct inode *inode = d_backing_inode(root); + struct inode_smack *isp = inode->i_security; + + if (sp->smk_flags & SMK_SB_INITIALIZED) + return 0; + if (sp->smk_floor) + fsinfo_note_param(params, "fsfloor", sp->smk_floor->smk_known); + if (sp->smk_hat) + fsinfo_note_param(params, "fshat", sp->smk_hat->smk_known); + if (sp->smk_default) + fsinfo_note_param(params, "fsdefault", sp->smk_default->smk_known); + + if (sp->smk_root) { + if (isp && isp->smk_flags & SMK_INODE_TRANSMUTE) + fsinfo_note_param(params, "fstransmute", sp->smk_root->smk_known); + else + fsinfo_note_param(params, "fsroot", sp->smk_root->smk_known); + } + return params->usage; + } + + default: + return -ENODATA; + } + return 0; +} +#endif + /* * BPRM hooks */ @@ -4606,6 +4646,9 @@ static struct security_hook_list smack_hooks[] __lsm_ro_after_init = { LSM_HOOK_INIT(sb_free_mnt_opts, smack_free_mnt_opts), LSM_HOOK_INIT(sb_eat_lsm_opts, smack_sb_eat_lsm_opts), LSM_HOOK_INIT(sb_statfs, smack_sb_statfs), +#ifdef CONFIG_FSINFO + LSM_HOOK_INIT(sb_fsinfo, smack_sb_fsinfo), +#endif LSM_HOOK_INIT(sb_set_mnt_opts, smack_set_mnt_opts), LSM_HOOK_INIT(bprm_set_creds, smack_bprm_set_creds),