Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp3143188rdb; Thu, 16 Nov 2023 01:02:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IE8G76jJbTCaHgyH536ggji5fYLRbFUP+Ku53IfPFwGktpg5IipvPsKOpykPbFqE2UeR3xd X-Received: by 2002:a05:6a20:7489:b0:187:2b7b:1b87 with SMTP id p9-20020a056a20748900b001872b7b1b87mr1673768pzd.21.1700125339890; Thu, 16 Nov 2023 01:02:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700125339; cv=none; d=google.com; s=arc-20160816; b=FKjtYfOd1JQsqxHtw9WmDpQMLNgJLXyP+GGJTg0VogdGot/qmbDVTUXfw8t/TH7oos XTRP3c4QFXbhmht+56iz6bzcZOV8s3wi66UcQSqjkPmw/hMPWirYSScIE3gynPz7CpKg P2UaR9fv1vT/6NneID5+jKTRUIBWH6Wbo+Nw4msFIMsGyjTNCcJbrzCuAaXOp82o8AkS JxC9MqFpTbvdsAGcpYA/GgGAPve7R/b3DQkqJkGoWRbqtgCYn91E19m/5GmG5+87Zk6+ rsuwdF11Vjx0ImJaDONRijVyImiruorNorNMw5alZwrtsxDiEmj2/EkV/JIVBprNjzGi yOIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=R31nRWrPv8SJ7yPqcjh5+aNFb/aszVx8qOLWnWdkyFI=; fh=7LGHJjxlgu98T/OBO4+U/pprB9WbjW7wNGdLE5+Tdi8=; b=ePyXQwsW0aFdVW1EcYyGdfST59mWZvn6iFxKHZhULdHO7hzYuZbHisf8bYatANMyvF nfiKGnWpI04HYCZwtSUn3diELghyHnr2JrrK5KHOu8iJiaik+7t0M9WkCpYHgT+wgGvh ZjD9jPDoT8GHPhA5wJvSU7CQX0E5nXT+EJGAxQiztdchPIi5ikCEcZiEYM1E8BYgAFuW hlmQRW4fkXvAoKudbIxGvgKWFOX8RgG2pITm6iLc+3ssySS8kd3QY+9j4KAdqhrLFX44 6+QMfXv8tdH9N9b6OS1OmRH9WZst6YR37j6N4exiaugDXFrdLqrj9vv7BTRo2zQ2YmVI wwbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id j7-20020a62e907000000b0068a5877bfaesi11531016pfh.382.2023.11.16.01.02.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Nov 2023 01:02:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 233C7807216B; Thu, 16 Nov 2023 01:02:18 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344998AbjKPJCN (ORCPT + 99 others); Thu, 16 Nov 2023 04:02:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52282 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235703AbjKPJCH (ORCPT ); Thu, 16 Nov 2023 04:02:07 -0500 Received: from frasgout13.his.huawei.com (frasgout13.his.huawei.com [14.137.139.46]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A61BCD5B; Thu, 16 Nov 2023 01:02:02 -0800 (PST) Received: from mail02.huawei.com (unknown [172.18.147.227]) by frasgout13.his.huawei.com (SkyGuard) with ESMTP id 4SWDG61L4Bz9yMLQ; Thu, 16 Nov 2023 16:48:30 +0800 (CST) Received: from huaweicloud.com (unknown [10.204.63.22]) by APP1 (Coremail) with SMTP id LxC2BwAnY3Nq2lVlSdzEAA--.16671S4; Thu, 16 Nov 2023 10:01:48 +0100 (CET) From: Roberto Sassu To: casey@schaufler-ca.com, paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Roberto Sassu , stable@vger.kernel.org Subject: [PATCH v3 2/5] smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity() Date: Thu, 16 Nov 2023 10:01:22 +0100 Message-Id: <20231116090125.187209-3-roberto.sassu@huaweicloud.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231116090125.187209-1-roberto.sassu@huaweicloud.com> References: <20231116090125.187209-1-roberto.sassu@huaweicloud.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID: LxC2BwAnY3Nq2lVlSdzEAA--.16671S4 X-Coremail-Antispam: 1UD129KBjvdXoW7Wr15tF17uw4xtrWfZFyxXwb_yoWkZwb_u3 4jyFykXrs8Z3W3Xa97Ar1Fvrn2g3ykJr1Fg3Wfta43Zay5Xr4kta15JF98WFW5Aw4fJ393 CFn8WFyfAw17XjkaLaAFLSUrUUUUUb8apTn2vfkv8UJUUUU8Yxn0WfASr-VFAUDa7-sFnT 9fnUUIcSsGvfJTRUUUbsAYFVCjjxCrM7AC8VAFwI0_Wr0E3s1l1xkIjI8I6I8E6xAIw20E Y4v20xvaj40_Wr0E3s1l1IIY67AEw4v_Jr0_Jr4l82xGYIkIc2x26280x7IE14v26r15M2 8IrcIa0xkI8VCY1x0267AKxVW8JVW5JwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK 021l84ACjcxK6xIIjxv20xvE14v26r1j6r1xM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r 4j6F4UM28EF7xvwVC2z280aVAFwI0_Gr0_Cr1l84ACjcxK6I8E87Iv6xkF7I0E14v26r4j 6r4UJwAS0I0E0xvYzxvE52x082IY62kv0487Mc02F40EFcxC0VAKzVAqx4xG6I80ewAv7V C0I7IYx2IY67AKxVWUJVWUGwAv7VC2z280aVAFwI0_Jr0_Gr1lOx8S6xCaFVCjc4AY6r1j 6r4UM4x0Y48IcxkI7VAKI48JMxAIw28IcxkI7VAKI48JMxC20s026xCaFVCjc4AY6r1j6r 4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF 67AKxVWUtVW8ZwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2I x0cI8IcVCY1x0267AKxVW8JVWxJwCI42IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2 z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2KfnxnU UI43ZEXa7IU8fcTPUUUUU== X-CM-SenderInfo: purev21wro2thvvxqx5xdzvxpfor3voofrz/1tbiAQADBF1jj5aE+QABsd X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 16 Nov 2023 01:02:18 -0800 (PST) From: Roberto Sassu If the SMACK64TRANSMUTE xattr is provided, and the inode is a directory, update the in-memory inode flags by setting SMK_INODE_TRANSMUTE. Cc: stable@vger.kernel.org Fixes: 5c6d1125f8db ("Smack: Transmute labels on specified directories") # v2.6.38.x Signed-off-by: Roberto Sassu --- security/smack/smack_lsm.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 0027803a43ac..7b6d7ddd6d36 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -2855,6 +2855,15 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name, if (value == NULL || size > SMK_LONGLABEL || size == 0) return -EINVAL; + if (strcmp(name, XATTR_SMACK_TRANSMUTE) == 0) { + if (!S_ISDIR(inode->i_mode) || size != TRANS_TRUE_SIZE || + strncmp(value, TRANS_TRUE, TRANS_TRUE_SIZE) != 0) + return -EINVAL; + + nsp->smk_flags |= SMK_INODE_TRANSMUTE; + return 0; + } + skp = smk_import_entry(value, size); if (IS_ERR(skp)) return PTR_ERR(skp); -- 2.34.1