[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHC9VhR_eDyfUUH=0PyJ06R739yFJLgxGsi5i9My3PXaPEskNA@mail.gmail.com>
Date: Fri, 21 May 2021 16:18:11 -0400
From: Paul Moore <paul@...l-moore.com>
To: Casey Schaufler <casey@...aufler-ca.com>
Cc: casey.schaufler@...el.com, James Morris <jmorris@...ei.org>,
linux-security-module@...r.kernel.org, selinux@...r.kernel.org,
linux-audit@...hat.com, keescook@...omium.org,
john.johansen@...onical.com, penguin-kernel@...ove.sakura.ne.jp,
Stephen Smalley <sds@...ho.nsa.gov>,
linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
netfilter-devel@...r.kernel.org
Subject: Re: [PATCH v26 07/25] LSM: Use lsmblob in security_secctx_to_secid
On Thu, May 13, 2021 at 4:16 PM Casey Schaufler <casey@...aufler-ca.com> wrote:
>
> Change the security_secctx_to_secid interface to use a lsmblob
> structure in place of the single u32 secid in support of
> module stacking. Change its callers to do the same.
>
> The security module hook is unchanged, still passing back a secid.
> The infrastructure passes the correct entry from the lsmblob.
>
> Signed-off-by: Casey Schaufler <casey@...aufler-ca.com>
> Cc: netdev@...r.kernel.org
> Cc: netfilter-devel@...r.kernel.org
> To: Pablo Neira Ayuso <pablo@...filter.org>
> ---
> include/linux/security.h | 26 ++++++++++++++++++--
> kernel/cred.c | 4 +---
> net/netfilter/nft_meta.c | 10 ++++----
> net/netfilter/xt_SECMARK.c | 7 +++++-
> net/netlabel/netlabel_unlabeled.c | 23 +++++++++++-------
> security/security.c | 40 ++++++++++++++++++++++++++-----
> 6 files changed, 85 insertions(+), 25 deletions(-)
Acked-by: Paul Moore <paul@...l-moore.com>
--
paul moore
www.paul-moore.com
Powered by blists - more mailing lists