Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp4308583iog; Tue, 21 Jun 2022 17:07:48 -0700 (PDT) X-Google-Smtp-Source: AGRyM1svn5QsvPNg3MA16ns5eSUSzGm+yn36yJ+equaecwlDFW57sl6pdwG6oB6UleK6e7bSCoGC X-Received: by 2002:a17:907:72ce:b0:722:e1a5:164c with SMTP id du14-20020a17090772ce00b00722e1a5164cmr563871ejc.111.1655856468012; Tue, 21 Jun 2022 17:07:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655856468; cv=none; d=google.com; s=arc-20160816; b=wXuYPjB9TtIE6FLU8GOsfSYlxJ4f8vNa+cB6DerClZTxkkT0a2h/lfUWaTlZPRHUbI dI5Iz9Gm/h5ALjibh13yBtjiY38/xrDsE74Q7fCa3Lqx88tcxHDvPJ5rfO+ELmRV/dvr Rxq6hLNj7ReEtceLLo9u9DHMv8n0w2Xi42BnmR+Lsubre/RbyoQa2/X7ZrHlcUS1/xMj /0jGCZwo04n+gpyYbPtX8w21jfTTUTOod3RAX5yilb9TwOKC3MEiDeUlxT+MfYrL0agg 6h106Z19tDLDvgz26eCXPbzkwzw5gfkfzAATddZ4MoyLFZs/VR09CMQxjeYUl+++PMh9 E2Cg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=jUmOqM8bvsG8cDfx+XvNCDDl82awPaNafAtF5jFkQEY=; b=dc3x1EMA90k1TBq73GIZA3jpJ+oQhR9blc711JYfZhZVvCEWofAjfaUtXGo5PxxlQ4 y7TSccQI5UC8Y1ZtdcjD/i9vU3aaKYI9jTsVVUePRq0w255aZZVh3PaIsFEabFd4i2pV c4Keyh1ayhxZq+sNNEyb0W45LWZjWY68JDPa8l4jwGQ11Wf3BzvBxZfSAJ2dRX3GVT61 FmjM3xnUVzuADTvbUZFKevlYMwd3laaoSHQpRkZBBMPYDhQNlPwc5ft0Karj+fZYZ6bK l1a3Hwre/Vnf3ugvELz/I9h/j0Wb9SU87kAPS3jpHUZG2Cs1LXuAB4IAgb11HRWjH2zj DqnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cloudflare.com header.s=google header.b=o5t9urnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cloudflare.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 9-20020a170906008900b00722db69668csi5547329ejc.386.2022.06.21.17.07.07; Tue, 21 Jun 2022 17:07:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@cloudflare.com header.s=google header.b=o5t9urnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cloudflare.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354897AbiFUXj7 (ORCPT + 99 others); Tue, 21 Jun 2022 19:39:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353748AbiFUXjw (ORCPT ); Tue, 21 Jun 2022 19:39:52 -0400 Received: from mail-oa1-x2d.google.com (mail-oa1-x2d.google.com [IPv6:2001:4860:4864:20::2d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F1A831222 for ; Tue, 21 Jun 2022 16:39:51 -0700 (PDT) Received: by mail-oa1-x2d.google.com with SMTP id 586e51a60fabf-101d96fe0a5so10910355fac.2 for ; Tue, 21 Jun 2022 16:39:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=jUmOqM8bvsG8cDfx+XvNCDDl82awPaNafAtF5jFkQEY=; b=o5t9urnpI0OdvMgRHCew9GBUrfvNLmNKP8PEUMDjteDWRX9zW0tnOI51xheMxEFYAJ 5SEdi6X2zEaSJF4Ud4OzuVLtfivzHa7Ctp2wYHZsqHTr8iBuDQVvzZN4vZpmSiqciPwK VVjhfdZ+3Ur1hFKuRE3jvHYIR5noV4NdKabvc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=jUmOqM8bvsG8cDfx+XvNCDDl82awPaNafAtF5jFkQEY=; b=tTqk3XjSamInYjNluQZ5RZN/INWgUw6LU+kPmM9sg1OCNVSpw48sNTf4Ni3dBTdy7h DkHTvzR/47wNlQ5TxQXpQ3ckYN0vcL/u6jm13xRpW4oja6PL3K/J5B1w3iSV8cS9SDhE 3HbM1+dfr8LYP6707SRjKAY4KC2aVB/suFRXZxxDOxMNZ6rDxKv2oWTeX0p3LvVuH93b R5ecsZUKEiu1xFam4LpfCatVU/rDgzfBDPinTs3LncsCcJsFp5Uapy0SSKIy8gqoA7mj nrlm+VCWRdcfN10IXV/euuSb116rf0v6qVqTj0MJal+S4LecJZi2IW8s/2JaU2tnYdKv 36Jg== X-Gm-Message-State: AJIora9t1m9kKRRKpj2X7PoUSbj+kL8z8HAElyYKORgEJHIEzHzthIcK 52wE7W6fzVXk5iFij8Zbc349SQ== X-Received: by 2002:a05:6870:8909:b0:101:202e:a71d with SMTP id i9-20020a056870890900b00101202ea71dmr371858oao.272.1655854790690; Tue, 21 Jun 2022 16:39:50 -0700 (PDT) Received: from localhost.localdomain ([172.58.70.161]) by smtp.gmail.com with ESMTPSA id v73-20020acaac4c000000b00326414c1bb7sm9839181oie.35.2022.06.21.16.39.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Jun 2022 16:39:50 -0700 (PDT) From: Frederick Lawler To: kpsingh@kernel.org, revest@chromium.org, jackmanb@chromium.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, jmorris@namei.org, serge@hallyn.com, bpf@vger.kernel.org, linux-security-module@vger.kernel.org Cc: brauner@kernel.org, casey@schaufler-ca.com, paul@paul-moore.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@cloudflare.com, Frederick Lawler Subject: [PATCH 2/2] bpf-lsm: Make bpf_lsm_create_user_ns() sleepable Date: Tue, 21 Jun 2022 18:39:39 -0500 Message-Id: <20220621233939.993579-3-fred@cloudflare.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220621233939.993579-1-fred@cloudflare.com> References: <20220621233939.993579-1-fred@cloudflare.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Users may want to audit calls to security_create_user_ns() and access user space memory. Also create_user_ns() runs without pagefault_disabled(). Therefore, make bpf_lsm_create_user_ns() sleepable for mandatory access control policies. Signed-off-by: Frederick Lawler --- kernel/bpf/bpf_lsm.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/bpf/bpf_lsm.c b/kernel/bpf/bpf_lsm.c index c1351df9f7ee..75853965e7b0 100644 --- a/kernel/bpf/bpf_lsm.c +++ b/kernel/bpf/bpf_lsm.c @@ -250,6 +250,7 @@ BTF_ID(func, bpf_lsm_task_getsecid_obj) BTF_ID(func, bpf_lsm_task_prctl) BTF_ID(func, bpf_lsm_task_setscheduler) BTF_ID(func, bpf_lsm_task_to_inode) +BTF_ID(func, bpf_lsm_create_user_ns) BTF_SET_END(sleepable_lsm_hooks) bool bpf_lsm_is_sleepable_hook(u32 btf_id) -- 2.30.2