[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250613222411.1216170-1-kuni1840@gmail.com>
Date: Fri, 13 Jun 2025 15:22:12 -0700
From: Kuniyuki Iwashima <kuni1840@...il.com>
To: Martin KaFai Lau <martin.lau@...ux.dev>,
Daniel Borkmann <daniel@...earbox.net>,
John Fastabend <john.fastabend@...il.com>,
Alexei Starovoitov <ast@...nel.org>,
Andrii Nakryiko <andrii@...nel.org>
Cc: Eduard Zingerman <eddyz87@...il.com>,
Song Liu <song@...nel.org>,
Yonghong Song <yonghong.song@...ux.dev>,
KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...ichev.me>,
Hao Luo <haoluo@...gle.com>,
Jiri Olsa <jolsa@...nel.org>,
Kumar Kartikeya Dwivedi <memxor@...il.com>,
Paul Moore <paul@...l-moore.com>,
James Morris <jmorris@...ei.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
Mickaël Salaün <mic@...ikod.net>,
Günther Noack <gnoack@...gle.com>,
Stephen Smalley <stephen.smalley.work@...il.com>,
Ondrej Mosnacek <omosnace@...hat.com>,
Casey Schaufler <casey@...aufler-ca.com>,
Kuniyuki Iwashima <kuniyu@...gle.com>,
Kuniyuki Iwashima <kuni1840@...il.com>,
bpf@...r.kernel.org,
linux-security-module@...r.kernel.org,
selinux@...r.kernel.org,
netdev@...r.kernel.org
Subject: [PATCH v2 bpf-next 0/4] af_unix: Allow BPF LSM to filter SCM_RIGHTS at sendmsg().
From: Kuniyuki Iwashima <kuniyu@...gle.com>
Since commit 77cbe1a6d873 ("af_unix: Introduce SO_PASSRIGHTS."),
we can disable SCM_RIGHTS per socket, but it's not flexible.
This series allows us to implement more fine-grained filtering for
SCM_RIGHTS with BPF LSM.
Changes:
v2: Remove SCM_RIGHTS fd scrubbing functionality
v1: https://lore.kernel.org/bpf/20250505215802.48449-1-kuniyu@amazon.com/
Kuniyuki Iwashima (4):
af_unix: Don't pass struct socket to security_unix_may_send().
af_unix: Call security_unix_may_send() in sendmsg() for all socket
types
af_unix: Pass skb to security_unix_may_send().
selftest: bpf: Add test for BPF LSM on unix_may_send().
include/linux/lsm_hook_defs.h | 3 +-
include/linux/security.h | 7 +-
net/unix/af_unix.c | 32 ++--
security/landlock/task.c | 16 +-
security/security.c | 5 +-
security/selinux/hooks.c | 14 +-
security/smack/smack_lsm.c | 12 +-
.../bpf/prog_tests/lsm_unix_may_send.c | 168 ++++++++++++++++++
.../selftests/bpf/progs/lsm_unix_may_send.c | 83 +++++++++
9 files changed, 309 insertions(+), 31 deletions(-)
create mode 100644 tools/testing/selftests/bpf/prog_tests/lsm_unix_may_send.c
create mode 100644 tools/testing/selftests/bpf/progs/lsm_unix_may_send.c
--
2.49.0
Powered by blists - more mailing lists