Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757221AbYBTRvS (ORCPT ); Wed, 20 Feb 2008 12:51:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754297AbYBTRvG (ORCPT ); Wed, 20 Feb 2008 12:51:06 -0500 Received: from e6.ny.us.ibm.com ([32.97.182.146]:52449 "EHLO e6.ny.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753016AbYBTRvC (ORCPT ); Wed, 20 Feb 2008 12:51:02 -0500 Date: Wed, 20 Feb 2008 11:50:51 -0600 From: "Serge E. Hallyn" To: Casey Schaufler Cc: torvalds@linux-foundation.org, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH] (linus git 02/19/08) Smack update for file capabilities Message-ID: <20080220175051.GA16489@sergelap.austin.ibm.com> References: <47BB4437.8020600@schaufler-ca.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <47BB4437.8020600@schaufler-ca.com> User-Agent: Mutt/1.5.16 (2007-06-09) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6168 Lines: 200 Quoting Casey Schaufler (casey@schaufler-ca.com): > From: Casey Schaufler > > Update the Smack LSM to allow the registration of the capability > "module" as a secondary LSM. Integrate the new hooks required for > file based capabilities. Hi Casey, to help people keep their mailboxes straight it'd be good to have a changelog here pointing out that you addressed Stephen's point. Looks good to me. It's too bad the logic has to be quite so convoluted between the two, but I'm not sure it can be improved upon... And thanks Stephen, I well might have missed the issue you pointed out. Acked-by: Serge Hallyn thanks, -serge > Signed-off-by: Casey Schaufler > > --- > > security/smack/smack_lsm.c | 87 +++++++++++++++++++++++++++++------ > 1 file changed, 74 insertions(+), 13 deletions(-) > > diff -uprN -X linux-2.6.25-g0219-precap/Documentation/dontdiff > linux-2.6.25-g0219-precap/security/smack/smack_lsm.c > linux-2.6.25-g0219/security/smack/smack_lsm.c > --- linux-2.6.25-g0219-precap/security/smack/smack_lsm.c 2008-02-19 > 10:15:30.000000000 -0800 > +++ linux-2.6.25-g0219/security/smack/smack_lsm.c 2008-02-19 > 09:24:19.000000000 -0800 > @@ -584,14 +584,20 @@ static int smack_inode_getattr(struct vf > static int smack_inode_setxattr(struct dentry *dentry, char *name, > void *value, size_t size, int flags) > { > - if (!capable(CAP_MAC_ADMIN)) { > - if (strcmp(name, XATTR_NAME_SMACK) == 0 || > - strcmp(name, XATTR_NAME_SMACKIPIN) == 0 || > - strcmp(name, XATTR_NAME_SMACKIPOUT) == 0) > - return -EPERM; > - } > + int rc = 0; > + > + if (strcmp(name, XATTR_NAME_SMACK) == 0 || > + strcmp(name, XATTR_NAME_SMACKIPIN) == 0 || > + strcmp(name, XATTR_NAME_SMACKIPOUT) == 0) { > + if (!capable(CAP_MAC_ADMIN)) > + rc = -EPERM; > + } else > + rc = cap_inode_setxattr(dentry, name, value, size, flags); > + > + if (rc == 0) > + rc = smk_curacc(smk_of_inode(dentry->d_inode), MAY_WRITE); > > - return smk_curacc(smk_of_inode(dentry->d_inode), MAY_WRITE); > + return rc; > } > > /** > @@ -658,10 +664,20 @@ static int smack_inode_getxattr(struct d > */ > static int smack_inode_removexattr(struct dentry *dentry, char *name) > { > - if (strcmp(name, XATTR_NAME_SMACK) == 0 && !capable(CAP_MAC_ADMIN)) > - return -EPERM; > + int rc = 0; > > - return smk_curacc(smk_of_inode(dentry->d_inode), MAY_WRITE); > + if (strcmp(name, XATTR_NAME_SMACK) == 0 || > + strcmp(name, XATTR_NAME_SMACKIPIN) == 0 || > + strcmp(name, XATTR_NAME_SMACKIPOUT) == 0) { > + if (!capable(CAP_MAC_ADMIN)) > + rc = -EPERM; > + } else > + rc = cap_inode_removexattr(dentry, name); > + > + if (rc == 0) > + rc = smk_curacc(smk_of_inode(dentry->d_inode), MAY_WRITE); > + > + return rc; > } > > /** > @@ -1016,7 +1032,12 @@ static void smack_task_getsecid(struct t > */ > static int smack_task_setnice(struct task_struct *p, int nice) > { > - return smk_curacc(p->security, MAY_WRITE); > + int rc; > + > + rc = cap_task_setnice(p, nice); > + if (rc == 0) > + rc = smk_curacc(p->security, MAY_WRITE); > + return rc; > } > > /** > @@ -1028,7 +1049,12 @@ static int smack_task_setnice(struct tas > */ > static int smack_task_setioprio(struct task_struct *p, int ioprio) > { > - return smk_curacc(p->security, MAY_WRITE); > + int rc; > + > + rc = cap_task_setioprio(p, ioprio); > + if (rc == 0) > + rc = smk_curacc(p->security, MAY_WRITE); > + return rc; > } > > /** > @@ -1053,7 +1079,12 @@ static int smack_task_getioprio(struct t > static int smack_task_setscheduler(struct task_struct *p, int policy, > struct sched_param *lp) > { > - return smk_curacc(p->security, MAY_WRITE); > + int rc; > + > + rc = cap_task_setscheduler(p, policy, lp); > + if (rc == 0) > + rc = smk_curacc(p->security, MAY_WRITE); > + return rc; > } > > /** > @@ -1093,6 +1124,11 @@ static int smack_task_movememory(struct static int > smack_task_kill(struct task_struct *p, struct siginfo *info, > int sig, u32 secid) > { > + int rc; > + > + rc = cap_task_kill(p, info, sig, secid); > + if (rc != 0) > + return rc; > /* > * Special cases where signals really ought to go through > * in spite of policy. Stephen Smalley suggests it may > @@ -1778,6 +1814,27 @@ static int smack_ipc_permission(struct k > return smk_curacc(isp, may); > } > > +/* module stacking operations */ > + > +/** > + * smack_register_security - stack capability module > + * @name: module name > + * @ops: module operations - ignored > + * > + * Allow the capability module to register. > + */ > +static int smack_register_security(const char *name, > + struct security_operations *ops) > +{ > + if (strcmp(name, "capability") != 0) > + return -EINVAL; > + > + printk(KERN_INFO "%s: Registering secondary module %s\n", > + __func__, name); > + > + return 0; > +} > + > /** > * smack_d_instantiate - Make sure the blob is correct on an inode > * @opt_dentry: unused > @@ -2412,6 +2469,8 @@ static struct security_operations smack_ > .inode_post_setxattr = smack_inode_post_setxattr, > .inode_getxattr = smack_inode_getxattr, > .inode_removexattr = smack_inode_removexattr, > + .inode_need_killpriv = cap_inode_need_killpriv, > + .inode_killpriv = cap_inode_killpriv, > .inode_getsecurity = smack_inode_getsecurity, > .inode_setsecurity = smack_inode_setsecurity, > .inode_listsecurity = smack_inode_listsecurity, > @@ -2471,6 +2530,8 @@ static struct security_operations smack_ > .netlink_send = cap_netlink_send, > .netlink_recv = cap_netlink_recv, > > + .register_security = smack_register_security, > + > .d_instantiate = smack_d_instantiate, > > .getprocattr = smack_getprocattr, > > > - > To unsubscribe from this list: send the line "unsubscribe > linux-security-module" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/