Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
a39f44fa
Commit
a39f44fa
authored
Sep 15, 2016
by
James Morris
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'smack-for-4.9' of
http://github.com/cschaufler/smack-next
into next
parents
8ccc7d6b
c60b9066
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
32 additions
and
15 deletions
+32
-15
security/smack/Kconfig
security/smack/Kconfig
+12
-0
security/smack/smack.h
security/smack/smack.h
+10
-0
security/smack/smack_lsm.c
security/smack/smack_lsm.c
+7
-7
security/smack/smackfs.c
security/smack/smackfs.c
+3
-8
No files found.
security/smack/Kconfig
View file @
a39f44fa
...
...
@@ -40,3 +40,15 @@ config SECURITY_SMACK_NETFILTER
This enables security marking of network packets using
Smack labels.
If you are unsure how to answer this question, answer N.
config SECURITY_SMACK_APPEND_SIGNALS
bool "Treat delivering signals as an append operation"
depends on SECURITY_SMACK
default n
help
Sending a signal has been treated as a write operation to the
receiving process. If this option is selected, the delivery
will be an append operation instead. This makes it possible
to differentiate between delivering a network packet and
delivering a signal in the Smack rules.
If you are unsure how to answer this question, answer N.
security/smack/smack.h
View file @
a39f44fa
...
...
@@ -256,6 +256,16 @@ enum {
#define MAY_LOCK 0x00002000
/* Locks should be writes, but ... */
#define MAY_BRINGUP 0x00004000
/* Report use of this rule */
/*
* The policy for delivering signals is configurable.
* It is usually "write", but can be "append".
*/
#ifdef CONFIG_SECURITY_SMACK_APPEND_SIGNALS
#define MAY_DELIVER MAY_APPEND
/* Signal delivery requires append */
#else
#define MAY_DELIVER MAY_WRITE
/* Signal delivery requires write */
#endif
#define SMACK_BRINGUP_ALLOW 1
/* Allow bringup mode */
#define SMACK_UNCONFINED_SUBJECT 2
/* Allow unconfined label */
#define SMACK_UNCONFINED_OBJECT 3
/* Allow unconfined label */
...
...
security/smack/smack_lsm.c
View file @
a39f44fa
...
...
@@ -1857,14 +1857,14 @@ static int smack_file_send_sigiotask(struct task_struct *tsk,
/* we don't log here as rc can be overriden */
skp
=
file
->
f_security
;
rc
=
smk_access
(
skp
,
tkp
,
MAY_
WRITE
,
NULL
);
rc
=
smk_bu_note
(
"sigiotask"
,
skp
,
tkp
,
MAY_
WRITE
,
rc
);
rc
=
smk_access
(
skp
,
tkp
,
MAY_
DELIVER
,
NULL
);
rc
=
smk_bu_note
(
"sigiotask"
,
skp
,
tkp
,
MAY_
DELIVER
,
rc
);
if
(
rc
!=
0
&&
has_capability
(
tsk
,
CAP_MAC_OVERRIDE
))
rc
=
0
;
smk_ad_init
(
&
ad
,
__func__
,
LSM_AUDIT_DATA_TASK
);
smk_ad_setfield_u_tsk
(
&
ad
,
tsk
);
smack_log
(
skp
->
smk_known
,
tkp
->
smk_known
,
MAY_
WRITE
,
rc
,
&
ad
);
smack_log
(
skp
->
smk_known
,
tkp
->
smk_known
,
MAY_
DELIVER
,
rc
,
&
ad
);
return
rc
;
}
...
...
@@ -2265,8 +2265,8 @@ static int smack_task_kill(struct task_struct *p, struct siginfo *info,
* can write the receiver.
*/
if
(
secid
==
0
)
{
rc
=
smk_curacc
(
tkp
,
MAY_
WRITE
,
&
ad
);
rc
=
smk_bu_task
(
p
,
MAY_
WRITE
,
rc
);
rc
=
smk_curacc
(
tkp
,
MAY_
DELIVER
,
&
ad
);
rc
=
smk_bu_task
(
p
,
MAY_
DELIVER
,
rc
);
return
rc
;
}
/*
...
...
@@ -2275,8 +2275,8 @@ static int smack_task_kill(struct task_struct *p, struct siginfo *info,
* we can't take privilege into account.
*/
skp
=
smack_from_secid
(
secid
);
rc
=
smk_access
(
skp
,
tkp
,
MAY_
WRITE
,
&
ad
);
rc
=
smk_bu_note
(
"USB signal"
,
skp
,
tkp
,
MAY_
WRITE
,
rc
);
rc
=
smk_access
(
skp
,
tkp
,
MAY_
DELIVER
,
&
ad
);
rc
=
smk_bu_note
(
"USB signal"
,
skp
,
tkp
,
MAY_
DELIVER
,
rc
);
return
rc
;
}
...
...
security/smack/smackfs.c
View file @
a39f44fa
...
...
@@ -2523,14 +2523,9 @@ static ssize_t smk_write_revoke_subj(struct file *file, const char __user *buf,
if
(
count
==
0
||
count
>
SMK_LONGLABEL
)
return
-
EINVAL
;
data
=
kzalloc
(
count
,
GFP_KERNEL
);
if
(
data
==
NULL
)
return
-
ENOMEM
;
if
(
copy_from_user
(
data
,
buf
,
count
)
!=
0
)
{
rc
=
-
EFAULT
;
goto
out_data
;
}
data
=
memdup_user
(
buf
,
count
);
if
(
IS_ERR
(
data
))
return
PTR_ERR
(
data
);
cp
=
smk_parse_smack
(
data
,
count
);
if
(
IS_ERR
(
cp
))
{
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment