Re: [PATCH v26 08/25] LSM: Use lsmblob in security_secid_to_secctx

From: Paul Moore
Date: Fri May 21 2021 - 16:18:40 EST


On Thu, May 13, 2021 at 4:17 PM Casey Schaufler <casey@xxxxxxxxxxxxxxxx> wrote:
>
> Change security_secid_to_secctx() to take a lsmblob as input
> instead of a u32 secid. It will then call the LSM hooks
> using the lsmblob element allocated for that module. The
> callers have been updated as well. This allows for the
> possibility that more than one module may be called upon
> to translate a secid to a string, as can occur in the
> audit code.
>
> Signed-off-by: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
> Cc: netdev@xxxxxxxxxxxxxxx
> Cc: linux-audit@xxxxxxxxxx
> Cc: netfilter-devel@xxxxxxxxxxxxxxx
> To: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
> To: Paul Moore <paul@xxxxxxxxxxxxxx>
> ---
> drivers/android/binder.c | 12 +++++++++-
> include/linux/security.h | 5 +++--
> include/net/scm.h | 7 +++++-
> kernel/audit.c | 20 +++++++++++++++--
> kernel/auditsc.c | 28 +++++++++++++++++++----
> net/ipv4/ip_sockglue.c | 4 +++-
> net/netfilter/nf_conntrack_netlink.c | 14 ++++++++++--
> net/netfilter/nf_conntrack_standalone.c | 4 +++-
> net/netfilter/nfnetlink_queue.c | 11 +++++++--
> net/netlabel/netlabel_unlabeled.c | 30 +++++++++++++++++++++----
> net/netlabel/netlabel_user.c | 6 ++---
> security/security.c | 11 +++++----
> 12 files changed, 123 insertions(+), 29 deletions(-)

Acked-by: Paul Moore <paul@xxxxxxxxxxxxxx>


--
paul moore
www.paul-moore.com