diff options
| -rw-r--r-- | security/smack/smack.h | 18 | ||||
| -rw-r--r-- | security/smack/smack_access.c | 113 | ||||
| -rw-r--r-- | security/smack/smack_lsm.c | 126 | ||||
| -rw-r--r-- | security/smack/smackfs.c | 84 |
4 files changed, 220 insertions, 121 deletions
diff --git a/security/smack/smack.h b/security/smack/smack.h index 2b6c6a516123..174d3be9aaee 100644 --- a/security/smack/smack.h +++ b/security/smack/smack.h | |||
| @@ -41,9 +41,9 @@ struct superblock_smack { | |||
| 41 | }; | 41 | }; |
| 42 | 42 | ||
| 43 | struct socket_smack { | 43 | struct socket_smack { |
| 44 | char *smk_out; /* outbound label */ | 44 | char *smk_out; /* outbound label */ |
| 45 | char *smk_in; /* inbound label */ | 45 | char *smk_in; /* inbound label */ |
| 46 | char smk_packet[SMK_LABELLEN]; /* TCP peer label */ | 46 | char *smk_packet; /* TCP peer label */ |
| 47 | }; | 47 | }; |
| 48 | 48 | ||
| 49 | /* | 49 | /* |
| @@ -116,13 +116,19 @@ struct smk_netlbladdr { | |||
| 116 | * If there is a cipso value associated with the label it | 116 | * If there is a cipso value associated with the label it |
| 117 | * gets stored here, too. This will most likely be rare as | 117 | * gets stored here, too. This will most likely be rare as |
| 118 | * the cipso direct mapping in used internally. | 118 | * the cipso direct mapping in used internally. |
| 119 | * | ||
| 120 | * Keep the access rules for this subject label here so that | ||
| 121 | * the entire set of rules does not need to be examined every | ||
| 122 | * time. | ||
| 119 | */ | 123 | */ |
| 120 | struct smack_known { | 124 | struct smack_known { |
| 121 | struct list_head list; | 125 | struct list_head list; |
| 122 | char smk_known[SMK_LABELLEN]; | 126 | char smk_known[SMK_LABELLEN]; |
| 123 | u32 smk_secid; | 127 | u32 smk_secid; |
| 124 | struct smack_cipso *smk_cipso; | 128 | struct smack_cipso *smk_cipso; |
| 125 | spinlock_t smk_cipsolock; /* for changing cipso map */ | 129 | spinlock_t smk_cipsolock; /* for changing cipso map */ |
| 130 | struct list_head smk_rules; /* access rules */ | ||
| 131 | struct mutex smk_rules_lock; /* lock for the rules */ | ||
| 126 | }; | 132 | }; |
| 127 | 133 | ||
| 128 | /* | 134 | /* |
| @@ -201,10 +207,11 @@ int smk_access_entry(char *, char *, struct list_head *); | |||
| 201 | int smk_access(char *, char *, int, struct smk_audit_info *); | 207 | int smk_access(char *, char *, int, struct smk_audit_info *); |
| 202 | int smk_curacc(char *, u32, struct smk_audit_info *); | 208 | int smk_curacc(char *, u32, struct smk_audit_info *); |
| 203 | int smack_to_cipso(const char *, struct smack_cipso *); | 209 | int smack_to_cipso(const char *, struct smack_cipso *); |
| 204 | void smack_from_cipso(u32, char *, char *); | 210 | char *smack_from_cipso(u32, char *); |
| 205 | char *smack_from_secid(const u32); | 211 | char *smack_from_secid(const u32); |
| 206 | char *smk_import(const char *, int); | 212 | char *smk_import(const char *, int); |
| 207 | struct smack_known *smk_import_entry(const char *, int); | 213 | struct smack_known *smk_import_entry(const char *, int); |
| 214 | struct smack_known *smk_find_entry(const char *); | ||
| 208 | u32 smack_to_secid(const char *); | 215 | u32 smack_to_secid(const char *); |
| 209 | 216 | ||
| 210 | /* | 217 | /* |
| @@ -223,7 +230,6 @@ extern struct smack_known smack_known_star; | |||
| 223 | extern struct smack_known smack_known_web; | 230 | extern struct smack_known smack_known_web; |
| 224 | 231 | ||
| 225 | extern struct list_head smack_known_list; | 232 | extern struct list_head smack_known_list; |
| 226 | extern struct list_head smack_rule_list; | ||
| 227 | extern struct list_head smk_netlbladdr_list; | 233 | extern struct list_head smk_netlbladdr_list; |
| 228 | 234 | ||
| 229 | extern struct security_operations smack_ops; | 235 | extern struct security_operations smack_ops; |
diff --git a/security/smack/smack_access.c b/security/smack/smack_access.c index 9637e107f7ea..a885f628f56e 100644 --- a/security/smack/smack_access.c +++ b/security/smack/smack_access.c | |||
| @@ -77,14 +77,19 @@ int log_policy = SMACK_AUDIT_DENIED; | |||
| 77 | * entry is found returns -ENOENT. | 77 | * entry is found returns -ENOENT. |
| 78 | * | 78 | * |
| 79 | * NOTE: | 79 | * NOTE: |
| 80 | * Even though Smack labels are usually shared on smack_list | ||
| 81 | * labels that come in off the network can't be imported | ||
| 82 | * and added to the list for locking reasons. | ||
| 83 | * | 80 | * |
| 84 | * Therefore, it is necessary to check the contents of the labels, | 81 | * Earlier versions of this function allowed for labels that |
| 85 | * not just the pointer values. Of course, in most cases the labels | 82 | * were not on the label list. This was done to allow for |
| 86 | * will be on the list, so checking the pointers may be a worthwhile | 83 | * labels to come over the network that had never been seen |
| 87 | * optimization. | 84 | * before on this host. Unless the receiving socket has the |
| 85 | * star label this will always result in a failure check. The | ||
| 86 | * star labeled socket case is now handled in the networking | ||
| 87 | * hooks so there is no case where the label is not on the | ||
| 88 | * label list. Checking to see if the address of two labels | ||
| 89 | * is the same is now a reliable test. | ||
| 90 | * | ||
| 91 | * Do the object check first because that is more | ||
| 92 | * likely to differ. | ||
| 88 | */ | 93 | */ |
| 89 | int smk_access_entry(char *subject_label, char *object_label, | 94 | int smk_access_entry(char *subject_label, char *object_label, |
| 90 | struct list_head *rule_list) | 95 | struct list_head *rule_list) |
| @@ -93,13 +98,10 @@ int smk_access_entry(char *subject_label, char *object_label, | |||
| 93 | struct smack_rule *srp; | 98 | struct smack_rule *srp; |
| 94 | 99 | ||
| 95 | list_for_each_entry_rcu(srp, rule_list, list) { | 100 | list_for_each_entry_rcu(srp, rule_list, list) { |
| 96 | if (srp->smk_subject == subject_label || | 101 | if (srp->smk_object == object_label && |
| 97 | strcmp(srp->smk_subject, subject_label) == 0) { | 102 | srp->smk_subject == subject_label) { |
| 98 | if (srp->smk_object == object_label || | 103 | may = srp->smk_access; |
| 99 | strcmp(srp->smk_object, object_label) == 0) { | 104 | break; |
| 100 | may = srp->smk_access; | ||
| 101 | break; | ||
| 102 | } | ||
| 103 | } | 105 | } |
| 104 | } | 106 | } |
| 105 | 107 | ||
| @@ -117,18 +119,12 @@ int smk_access_entry(char *subject_label, char *object_label, | |||
| 117 | * access rule list and returns 0 if the access is permitted, | 119 | * access rule list and returns 0 if the access is permitted, |
| 118 | * non zero otherwise. | 120 | * non zero otherwise. |
| 119 | * | 121 | * |
| 120 | * Even though Smack labels are usually shared on smack_list | 122 | * Smack labels are shared on smack_list |
| 121 | * labels that come in off the network can't be imported | ||
| 122 | * and added to the list for locking reasons. | ||
| 123 | * | ||
| 124 | * Therefore, it is necessary to check the contents of the labels, | ||
| 125 | * not just the pointer values. Of course, in most cases the labels | ||
| 126 | * will be on the list, so checking the pointers may be a worthwhile | ||
| 127 | * optimization. | ||
| 128 | */ | 123 | */ |
| 129 | int smk_access(char *subject_label, char *object_label, int request, | 124 | int smk_access(char *subject_label, char *object_label, int request, |
| 130 | struct smk_audit_info *a) | 125 | struct smk_audit_info *a) |
| 131 | { | 126 | { |
| 127 | struct smack_known *skp; | ||
| 132 | int may = MAY_NOT; | 128 | int may = MAY_NOT; |
| 133 | int rc = 0; | 129 | int rc = 0; |
| 134 | 130 | ||
| @@ -137,8 +133,7 @@ int smk_access(char *subject_label, char *object_label, int request, | |||
| 137 | * | 133 | * |
| 138 | * A star subject can't access any object. | 134 | * A star subject can't access any object. |
| 139 | */ | 135 | */ |
| 140 | if (subject_label == smack_known_star.smk_known || | 136 | if (subject_label == smack_known_star.smk_known) { |
| 141 | strcmp(subject_label, smack_known_star.smk_known) == 0) { | ||
| 142 | rc = -EACCES; | 137 | rc = -EACCES; |
| 143 | goto out_audit; | 138 | goto out_audit; |
| 144 | } | 139 | } |
| @@ -148,33 +143,27 @@ int smk_access(char *subject_label, char *object_label, int request, | |||
| 148 | * An internet subject can access any object. | 143 | * An internet subject can access any object. |
| 149 | */ | 144 | */ |
| 150 | if (object_label == smack_known_web.smk_known || | 145 | if (object_label == smack_known_web.smk_known || |
| 151 | subject_label == smack_known_web.smk_known || | 146 | subject_label == smack_known_web.smk_known) |
| 152 | strcmp(object_label, smack_known_web.smk_known) == 0 || | ||
| 153 | strcmp(subject_label, smack_known_web.smk_known) == 0) | ||
| 154 | goto out_audit; | 147 | goto out_audit; |
| 155 | /* | 148 | /* |
| 156 | * A star object can be accessed by any subject. | 149 | * A star object can be accessed by any subject. |
| 157 | */ | 150 | */ |
| 158 | if (object_label == smack_known_star.smk_known || | 151 | if (object_label == smack_known_star.smk_known) |
| 159 | strcmp(object_label, smack_known_star.smk_known) == 0) | ||
| 160 | goto out_audit; | 152 | goto out_audit; |
| 161 | /* | 153 | /* |
| 162 | * An object can be accessed in any way by a subject | 154 | * An object can be accessed in any way by a subject |
| 163 | * with the same label. | 155 | * with the same label. |
| 164 | */ | 156 | */ |
| 165 | if (subject_label == object_label || | 157 | if (subject_label == object_label) |
| 166 | strcmp(subject_label, object_label) == 0) | ||
| 167 | goto out_audit; | 158 | goto out_audit; |
| 168 | /* | 159 | /* |
| 169 | * A hat subject can read any object. | 160 | * A hat subject can read any object. |
| 170 | * A floor object can be read by any subject. | 161 | * A floor object can be read by any subject. |
| 171 | */ | 162 | */ |
| 172 | if ((request & MAY_ANYREAD) == request) { | 163 | if ((request & MAY_ANYREAD) == request) { |
| 173 | if (object_label == smack_known_floor.smk_known || | 164 | if (object_label == smack_known_floor.smk_known) |
| 174 | strcmp(object_label, smack_known_floor.smk_known) == 0) | ||
| 175 | goto out_audit; | 165 | goto out_audit; |
| 176 | if (subject_label == smack_known_hat.smk_known || | 166 | if (subject_label == smack_known_hat.smk_known) |
| 177 | strcmp(subject_label, smack_known_hat.smk_known) == 0) | ||
| 178 | goto out_audit; | 167 | goto out_audit; |
| 179 | } | 168 | } |
| 180 | /* | 169 | /* |
| @@ -184,8 +173,9 @@ int smk_access(char *subject_label, char *object_label, int request, | |||
| 184 | * good. A negative response from smk_access_entry() | 173 | * good. A negative response from smk_access_entry() |
| 185 | * indicates there is no entry for this pair. | 174 | * indicates there is no entry for this pair. |
| 186 | */ | 175 | */ |
| 176 | skp = smk_find_entry(subject_label); | ||
| 187 | rcu_read_lock(); | 177 | rcu_read_lock(); |
| 188 | may = smk_access_entry(subject_label, object_label, &smack_rule_list); | 178 | may = smk_access_entry(subject_label, object_label, &skp->smk_rules); |
| 189 | rcu_read_unlock(); | 179 | rcu_read_unlock(); |
| 190 | 180 | ||
| 191 | if (may > 0 && (request & may) == request) | 181 | if (may > 0 && (request & may) == request) |
| @@ -344,6 +334,25 @@ void smack_log(char *subject_label, char *object_label, int request, | |||
| 344 | static DEFINE_MUTEX(smack_known_lock); | 334 | static DEFINE_MUTEX(smack_known_lock); |
| 345 | 335 | ||
| 346 | /** | 336 | /** |
| 337 | * smk_find_entry - find a label on the list, return the list entry | ||
| 338 | * @string: a text string that might be a Smack label | ||
| 339 | * | ||
| 340 | * Returns a pointer to the entry in the label list that | ||
| 341 | * matches the passed string. | ||
| 342 | */ | ||
| 343 | struct smack_known *smk_find_entry(const char *string) | ||
| 344 | { | ||
| 345 | struct smack_known *skp; | ||
| 346 | |||
| 347 | list_for_each_entry_rcu(skp, &smack_known_list, list) { | ||
| 348 | if (strncmp(skp->smk_known, string, SMK_MAXLEN) == 0) | ||
| 349 | return skp; | ||
| 350 | } | ||
| 351 | |||
| 352 | return NULL; | ||
| 353 | } | ||
| 354 | |||
| 355 | /** | ||
| 347 | * smk_import_entry - import a label, return the list entry | 356 | * smk_import_entry - import a label, return the list entry |
| 348 | * @string: a text string that might be a Smack label | 357 | * @string: a text string that might be a Smack label |
| 349 | * @len: the maximum size, or zero if it is NULL terminated. | 358 | * @len: the maximum size, or zero if it is NULL terminated. |
| @@ -378,21 +387,17 @@ struct smack_known *smk_import_entry(const char *string, int len) | |||
| 378 | 387 | ||
| 379 | mutex_lock(&smack_known_lock); | 388 | mutex_lock(&smack_known_lock); |
| 380 | 389 | ||
| 381 | found = 0; | 390 | skp = smk_find_entry(smack); |
| 382 | list_for_each_entry_rcu(skp, &smack_known_list, list) { | ||
| 383 | if (strncmp(skp->smk_known, smack, SMK_MAXLEN) == 0) { | ||
| 384 | found = 1; | ||
| 385 | break; | ||
| 386 | } | ||
| 387 | } | ||
| 388 | 391 | ||
| 389 | if (found == 0) { | 392 | if (skp == NULL) { |
| 390 | skp = kzalloc(sizeof(struct smack_known), GFP_KERNEL); | 393 | skp = kzalloc(sizeof(struct smack_known), GFP_KERNEL); |
| 391 | if (skp != NULL) { | 394 | if (skp != NULL) { |
| 392 | strncpy(skp->smk_known, smack, SMK_MAXLEN); | 395 | strncpy(skp->smk_known, smack, SMK_MAXLEN); |
| 393 | skp->smk_secid = smack_next_secid++; | 396 | skp->smk_secid = smack_next_secid++; |
| 394 | skp->smk_cipso = NULL; | 397 | skp->smk_cipso = NULL; |
| 398 | INIT_LIST_HEAD(&skp->smk_rules); | ||
| 395 | spin_lock_init(&skp->smk_cipsolock); | 399 | spin_lock_init(&skp->smk_cipsolock); |
| 400 | mutex_init(&skp->smk_rules_lock); | ||
| 396 | /* | 401 | /* |
| 397 | * Make sure that the entry is actually | 402 | * Make sure that the entry is actually |
| 398 | * filled before putting it on the list. | 403 | * filled before putting it on the list. |
| @@ -480,19 +485,12 @@ u32 smack_to_secid(const char *smack) | |||
| 480 | * smack_from_cipso - find the Smack label associated with a CIPSO option | 485 | * smack_from_cipso - find the Smack label associated with a CIPSO option |
| 481 | * @level: Bell & LaPadula level from the network | 486 | * @level: Bell & LaPadula level from the network |
| 482 | * @cp: Bell & LaPadula categories from the network | 487 | * @cp: Bell & LaPadula categories from the network |
| 483 | * @result: where to put the Smack value | ||
| 484 | * | 488 | * |
| 485 | * This is a simple lookup in the label table. | 489 | * This is a simple lookup in the label table. |
| 486 | * | 490 | * |
| 487 | * This is an odd duck as far as smack handling goes in that | 491 | * Return the matching label from the label list or NULL. |
| 488 | * it sends back a copy of the smack label rather than a pointer | ||
| 489 | * to the master list. This is done because it is possible for | ||
| 490 | * a foreign host to send a smack label that is new to this | ||
| 491 | * machine and hence not on the list. That would not be an | ||
| 492 | * issue except that adding an entry to the master list can't | ||
| 493 | * be done at that point. | ||
| 494 | */ | 492 | */ |
| 495 | void smack_from_cipso(u32 level, char *cp, char *result) | 493 | char *smack_from_cipso(u32 level, char *cp) |
| 496 | { | 494 | { |
| 497 | struct smack_known *kp; | 495 | struct smack_known *kp; |
| 498 | char *final = NULL; | 496 | char *final = NULL; |
| @@ -509,12 +507,13 @@ void smack_from_cipso(u32 level, char *cp, char *result) | |||
| 509 | final = kp->smk_known; | 507 | final = kp->smk_known; |
| 510 | 508 | ||
| 511 | spin_unlock_bh(&kp->smk_cipsolock); | 509 | spin_unlock_bh(&kp->smk_cipsolock); |
| 510 | |||
| 511 | if (final != NULL) | ||
| 512 | break; | ||
| 512 | } | 513 | } |
| 513 | rcu_read_unlock(); | 514 | rcu_read_unlock(); |
| 514 | if (final == NULL) | 515 | |
| 515 | final = smack_known_huh.smk_known; | 516 | return final; |
| 516 | strncpy(result, final, SMK_MAXLEN); | ||
| 517 | return; | ||
| 518 | } | 517 | } |
| 519 | 518 | ||
| 520 | /** | 519 | /** |
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index b9c5e149903b..fb915163f967 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
| @@ -516,6 +516,8 @@ static int smack_inode_init_security(struct inode *inode, struct inode *dir, | |||
| 516 | const struct qstr *qstr, char **name, | 516 | const struct qstr *qstr, char **name, |
| 517 | void **value, size_t *len) | 517 | void **value, size_t *len) |
| 518 | { | 518 | { |
| 519 | struct smack_known *skp; | ||
| 520 | char *csp = smk_of_current(); | ||
| 519 | char *isp = smk_of_inode(inode); | 521 | char *isp = smk_of_inode(inode); |
| 520 | char *dsp = smk_of_inode(dir); | 522 | char *dsp = smk_of_inode(dir); |
| 521 | int may; | 523 | int may; |
| @@ -527,8 +529,9 @@ static int smack_inode_init_security(struct inode *inode, struct inode *dir, | |||
| 527 | } | 529 | } |
| 528 | 530 | ||
| 529 | if (value) { | 531 | if (value) { |
| 532 | skp = smk_find_entry(csp); | ||
| 530 | rcu_read_lock(); | 533 | rcu_read_lock(); |
| 531 | may = smk_access_entry(smk_of_current(), dsp, &smack_rule_list); | 534 | may = smk_access_entry(csp, dsp, &skp->smk_rules); |
| 532 | rcu_read_unlock(); | 535 | rcu_read_unlock(); |
| 533 | 536 | ||
| 534 | /* | 537 | /* |
| @@ -1138,6 +1141,7 @@ static int smack_file_mmap(struct file *file, | |||
| 1138 | unsigned long flags, unsigned long addr, | 1141 | unsigned long flags, unsigned long addr, |
| 1139 | unsigned long addr_only) | 1142 | unsigned long addr_only) |
| 1140 | { | 1143 | { |
| 1144 | struct smack_known *skp; | ||
| 1141 | struct smack_rule *srp; | 1145 | struct smack_rule *srp; |
| 1142 | struct task_smack *tsp; | 1146 | struct task_smack *tsp; |
| 1143 | char *sp; | 1147 | char *sp; |
| @@ -1170,6 +1174,7 @@ static int smack_file_mmap(struct file *file, | |||
| 1170 | 1174 | ||
| 1171 | tsp = current_security(); | 1175 | tsp = current_security(); |
| 1172 | sp = smk_of_current(); | 1176 | sp = smk_of_current(); |
| 1177 | skp = smk_find_entry(sp); | ||
| 1173 | rc = 0; | 1178 | rc = 0; |
| 1174 | 1179 | ||
| 1175 | rcu_read_lock(); | 1180 | rcu_read_lock(); |
| @@ -1177,15 +1182,8 @@ static int smack_file_mmap(struct file *file, | |||
| 1177 | * For each Smack rule associated with the subject | 1182 | * For each Smack rule associated with the subject |
| 1178 | * label verify that the SMACK64MMAP also has access | 1183 | * label verify that the SMACK64MMAP also has access |
| 1179 | * to that rule's object label. | 1184 | * to that rule's object label. |
| 1180 | * | ||
| 1181 | * Because neither of the labels comes | ||
| 1182 | * from the networking code it is sufficient | ||
| 1183 | * to compare pointers. | ||
| 1184 | */ | 1185 | */ |
| 1185 | list_for_each_entry_rcu(srp, &smack_rule_list, list) { | 1186 | list_for_each_entry_rcu(srp, &skp->smk_rules, list) { |
| 1186 | if (srp->smk_subject != sp) | ||
| 1187 | continue; | ||
| 1188 | |||
| 1189 | osmack = srp->smk_object; | 1187 | osmack = srp->smk_object; |
| 1190 | /* | 1188 | /* |
| 1191 | * Matching labels always allows access. | 1189 | * Matching labels always allows access. |
| @@ -1214,7 +1212,8 @@ static int smack_file_mmap(struct file *file, | |||
| 1214 | * If there isn't one a SMACK64MMAP subject | 1212 | * If there isn't one a SMACK64MMAP subject |
| 1215 | * can't have as much access as current. | 1213 | * can't have as much access as current. |
| 1216 | */ | 1214 | */ |
| 1217 | mmay = smk_access_entry(msmack, osmack, &smack_rule_list); | 1215 | skp = smk_find_entry(msmack); |
| 1216 | mmay = smk_access_entry(msmack, osmack, &skp->smk_rules); | ||
| 1218 | if (mmay == -ENOENT) { | 1217 | if (mmay == -ENOENT) { |
| 1219 | rc = -EACCES; | 1218 | rc = -EACCES; |
| 1220 | break; | 1219 | break; |
| @@ -1711,7 +1710,7 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) | |||
| 1711 | 1710 | ||
| 1712 | ssp->smk_in = csp; | 1711 | ssp->smk_in = csp; |
| 1713 | ssp->smk_out = csp; | 1712 | ssp->smk_out = csp; |
| 1714 | ssp->smk_packet[0] = '\0'; | 1713 | ssp->smk_packet = NULL; |
| 1715 | 1714 | ||
| 1716 | sk->sk_security = ssp; | 1715 | sk->sk_security = ssp; |
| 1717 | 1716 | ||
| @@ -2813,16 +2812,17 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg, | |||
| 2813 | return smack_netlabel_send(sock->sk, sip); | 2812 | return smack_netlabel_send(sock->sk, sip); |
| 2814 | } | 2813 | } |
| 2815 | 2814 | ||
| 2816 | |||
| 2817 | /** | 2815 | /** |
| 2818 | * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack | 2816 | * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack |
| 2819 | * @sap: netlabel secattr | 2817 | * @sap: netlabel secattr |
| 2820 | * @sip: where to put the result | 2818 | * @ssp: socket security information |
| 2821 | * | 2819 | * |
| 2822 | * Copies a smack label into sip | 2820 | * Returns a pointer to a Smack label found on the label list. |
| 2823 | */ | 2821 | */ |
| 2824 | static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | 2822 | static char *smack_from_secattr(struct netlbl_lsm_secattr *sap, |
| 2823 | struct socket_smack *ssp) | ||
| 2825 | { | 2824 | { |
| 2825 | struct smack_known *skp; | ||
| 2826 | char smack[SMK_LABELLEN]; | 2826 | char smack[SMK_LABELLEN]; |
| 2827 | char *sp; | 2827 | char *sp; |
| 2828 | int pcat; | 2828 | int pcat; |
| @@ -2852,15 +2852,43 @@ static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | |||
| 2852 | * we are already done. WeeHee. | 2852 | * we are already done. WeeHee. |
| 2853 | */ | 2853 | */ |
| 2854 | if (sap->attr.mls.lvl == smack_cipso_direct) { | 2854 | if (sap->attr.mls.lvl == smack_cipso_direct) { |
| 2855 | memcpy(sip, smack, SMK_MAXLEN); | 2855 | /* |
| 2856 | return; | 2856 | * The label sent is usually on the label list. |
| 2857 | * | ||
| 2858 | * If it is not we may still want to allow the | ||
| 2859 | * delivery. | ||
| 2860 | * | ||
| 2861 | * If the recipient is accepting all packets | ||
| 2862 | * because it is using the star ("*") label | ||
| 2863 | * for SMACK64IPIN provide the web ("@") label | ||
| 2864 | * so that a directed response will succeed. | ||
| 2865 | * This is not very correct from a MAC point | ||
| 2866 | * of view, but gets around the problem that | ||
| 2867 | * locking prevents adding the newly discovered | ||
| 2868 | * label to the list. | ||
| 2869 | * The case where the recipient is not using | ||
| 2870 | * the star label should obviously fail. | ||
| 2871 | * The easy way to do this is to provide the | ||
| 2872 | * star label as the subject label. | ||
| 2873 | */ | ||
| 2874 | skp = smk_find_entry(smack); | ||
| 2875 | if (skp != NULL) | ||
| 2876 | return skp->smk_known; | ||
| 2877 | if (ssp != NULL && | ||
| 2878 | ssp->smk_in == smack_known_star.smk_known) | ||
| 2879 | return smack_known_web.smk_known; | ||
| 2880 | return smack_known_star.smk_known; | ||
| 2857 | } | 2881 | } |
| 2858 | /* | 2882 | /* |
| 2859 | * Look it up in the supplied table if it is not | 2883 | * Look it up in the supplied table if it is not |
| 2860 | * a direct mapping. | 2884 | * a direct mapping. |
| 2861 | */ | 2885 | */ |
| 2862 | smack_from_cipso(sap->attr.mls.lvl, smack, sip); | 2886 | sp = smack_from_cipso(sap->attr.mls.lvl, smack); |
| 2863 | return; | 2887 | if (sp != NULL) |
| 2888 | return sp; | ||
| 2889 | if (ssp != NULL && ssp->smk_in == smack_known_star.smk_known) | ||
| 2890 | return smack_known_web.smk_known; | ||
| 2891 | return smack_known_star.smk_known; | ||
| 2864 | } | 2892 | } |
| 2865 | if ((sap->flags & NETLBL_SECATTR_SECID) != 0) { | 2893 | if ((sap->flags & NETLBL_SECATTR_SECID) != 0) { |
| 2866 | /* | 2894 | /* |
| @@ -2875,16 +2903,14 @@ static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | |||
| 2875 | * secid is from a fallback. | 2903 | * secid is from a fallback. |
| 2876 | */ | 2904 | */ |
| 2877 | BUG_ON(sp == NULL); | 2905 | BUG_ON(sp == NULL); |
| 2878 | strncpy(sip, sp, SMK_MAXLEN); | 2906 | return sp; |
| 2879 | return; | ||
| 2880 | } | 2907 | } |
| 2881 | /* | 2908 | /* |
| 2882 | * Without guidance regarding the smack value | 2909 | * Without guidance regarding the smack value |
| 2883 | * for the packet fall back on the network | 2910 | * for the packet fall back on the network |
| 2884 | * ambient value. | 2911 | * ambient value. |
| 2885 | */ | 2912 | */ |
| 2886 | strncpy(sip, smack_net_ambient, SMK_MAXLEN); | 2913 | return smack_net_ambient; |
| 2887 | return; | ||
| 2888 | } | 2914 | } |
| 2889 | 2915 | ||
| 2890 | /** | 2916 | /** |
| @@ -2898,7 +2924,6 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
| 2898 | { | 2924 | { |
| 2899 | struct netlbl_lsm_secattr secattr; | 2925 | struct netlbl_lsm_secattr secattr; |
| 2900 | struct socket_smack *ssp = sk->sk_security; | 2926 | struct socket_smack *ssp = sk->sk_security; |
| 2901 | char smack[SMK_LABELLEN]; | ||
| 2902 | char *csp; | 2927 | char *csp; |
| 2903 | int rc; | 2928 | int rc; |
| 2904 | struct smk_audit_info ad; | 2929 | struct smk_audit_info ad; |
| @@ -2911,10 +2936,9 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
| 2911 | netlbl_secattr_init(&secattr); | 2936 | netlbl_secattr_init(&secattr); |
| 2912 | 2937 | ||
| 2913 | rc = netlbl_skbuff_getattr(skb, sk->sk_family, &secattr); | 2938 | rc = netlbl_skbuff_getattr(skb, sk->sk_family, &secattr); |
| 2914 | if (rc == 0) { | 2939 | if (rc == 0) |
| 2915 | smack_from_secattr(&secattr, smack); | 2940 | csp = smack_from_secattr(&secattr, ssp); |
| 2916 | csp = smack; | 2941 | else |
| 2917 | } else | ||
| 2918 | csp = smack_net_ambient; | 2942 | csp = smack_net_ambient; |
| 2919 | 2943 | ||
| 2920 | netlbl_secattr_destroy(&secattr); | 2944 | netlbl_secattr_destroy(&secattr); |
| @@ -2951,15 +2975,19 @@ static int smack_socket_getpeersec_stream(struct socket *sock, | |||
| 2951 | int __user *optlen, unsigned len) | 2975 | int __user *optlen, unsigned len) |
| 2952 | { | 2976 | { |
| 2953 | struct socket_smack *ssp; | 2977 | struct socket_smack *ssp; |
| 2954 | int slen; | 2978 | char *rcp = ""; |
| 2979 | int slen = 1; | ||
| 2955 | int rc = 0; | 2980 | int rc = 0; |
| 2956 | 2981 | ||
| 2957 | ssp = sock->sk->sk_security; | 2982 | ssp = sock->sk->sk_security; |
| 2958 | slen = strlen(ssp->smk_packet) + 1; | 2983 | if (ssp->smk_packet != NULL) { |
| 2984 | rcp = ssp->smk_packet; | ||
| 2985 | slen = strlen(rcp) + 1; | ||
| 2986 | } | ||
| 2959 | 2987 | ||
| 2960 | if (slen > len) | 2988 | if (slen > len) |
| 2961 | rc = -ERANGE; | 2989 | rc = -ERANGE; |
| 2962 | else if (copy_to_user(optval, ssp->smk_packet, slen) != 0) | 2990 | else if (copy_to_user(optval, rcp, slen) != 0) |
| 2963 | rc = -EFAULT; | 2991 | rc = -EFAULT; |
| 2964 | 2992 | ||
| 2965 | if (put_user(slen, optlen) != 0) | 2993 | if (put_user(slen, optlen) != 0) |
| @@ -2982,8 +3010,8 @@ static int smack_socket_getpeersec_dgram(struct socket *sock, | |||
| 2982 | 3010 | ||
| 2983 | { | 3011 | { |
| 2984 | struct netlbl_lsm_secattr secattr; | 3012 | struct netlbl_lsm_secattr secattr; |
| 2985 | struct socket_smack *sp; | 3013 | struct socket_smack *ssp = NULL; |
| 2986 | char smack[SMK_LABELLEN]; | 3014 | char *sp; |
| 2987 | int family = PF_UNSPEC; | 3015 | int family = PF_UNSPEC; |
| 2988 | u32 s = 0; /* 0 is the invalid secid */ | 3016 | u32 s = 0; /* 0 is the invalid secid */ |
| 2989 | int rc; | 3017 | int rc; |
| @@ -2998,17 +3026,19 @@ static int smack_socket_getpeersec_dgram(struct socket *sock, | |||
| 2998 | family = sock->sk->sk_family; | 3026 | family = sock->sk->sk_family; |
| 2999 | 3027 | ||
| 3000 | if (family == PF_UNIX) { | 3028 | if (family == PF_UNIX) { |
| 3001 | sp = sock->sk->sk_security; | 3029 | ssp = sock->sk->sk_security; |
| 3002 | s = smack_to_secid(sp->smk_out); | 3030 | s = smack_to_secid(ssp->smk_out); |
| 3003 | } else if (family == PF_INET || family == PF_INET6) { | 3031 | } else if (family == PF_INET || family == PF_INET6) { |
| 3004 | /* | 3032 | /* |
| 3005 | * Translate what netlabel gave us. | 3033 | * Translate what netlabel gave us. |
| 3006 | */ | 3034 | */ |
| 3035 | if (sock != NULL && sock->sk != NULL) | ||
| 3036 | ssp = sock->sk->sk_security; | ||
| 3007 | netlbl_secattr_init(&secattr); | 3037 | netlbl_secattr_init(&secattr); |
| 3008 | rc = netlbl_skbuff_getattr(skb, family, &secattr); | 3038 | rc = netlbl_skbuff_getattr(skb, family, &secattr); |
| 3009 | if (rc == 0) { | 3039 | if (rc == 0) { |
| 3010 | smack_from_secattr(&secattr, smack); | 3040 | sp = smack_from_secattr(&secattr, ssp); |
| 3011 | s = smack_to_secid(smack); | 3041 | s = smack_to_secid(sp); |
| 3012 | } | 3042 | } |
| 3013 | netlbl_secattr_destroy(&secattr); | 3043 | netlbl_secattr_destroy(&secattr); |
| 3014 | } | 3044 | } |
| @@ -3056,7 +3086,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3056 | struct netlbl_lsm_secattr secattr; | 3086 | struct netlbl_lsm_secattr secattr; |
| 3057 | struct sockaddr_in addr; | 3087 | struct sockaddr_in addr; |
| 3058 | struct iphdr *hdr; | 3088 | struct iphdr *hdr; |
| 3059 | char smack[SMK_LABELLEN]; | 3089 | char *sp; |
| 3060 | int rc; | 3090 | int rc; |
| 3061 | struct smk_audit_info ad; | 3091 | struct smk_audit_info ad; |
| 3062 | 3092 | ||
| @@ -3067,9 +3097,9 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3067 | netlbl_secattr_init(&secattr); | 3097 | netlbl_secattr_init(&secattr); |
| 3068 | rc = netlbl_skbuff_getattr(skb, family, &secattr); | 3098 | rc = netlbl_skbuff_getattr(skb, family, &secattr); |
| 3069 | if (rc == 0) | 3099 | if (rc == 0) |
| 3070 | smack_from_secattr(&secattr, smack); | 3100 | sp = smack_from_secattr(&secattr, ssp); |
| 3071 | else | 3101 | else |
| 3072 | strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN); | 3102 | sp = smack_known_huh.smk_known; |
| 3073 | netlbl_secattr_destroy(&secattr); | 3103 | netlbl_secattr_destroy(&secattr); |
| 3074 | 3104 | ||
| 3075 | #ifdef CONFIG_AUDIT | 3105 | #ifdef CONFIG_AUDIT |
| @@ -3082,7 +3112,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3082 | * Receiving a packet requires that the other end be able to write | 3112 | * Receiving a packet requires that the other end be able to write |
| 3083 | * here. Read access is not required. | 3113 | * here. Read access is not required. |
| 3084 | */ | 3114 | */ |
| 3085 | rc = smk_access(smack, ssp->smk_in, MAY_WRITE, &ad); | 3115 | rc = smk_access(sp, ssp->smk_in, MAY_WRITE, &ad); |
| 3086 | if (rc != 0) | 3116 | if (rc != 0) |
| 3087 | return rc; | 3117 | return rc; |
| 3088 | 3118 | ||
| @@ -3090,7 +3120,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3090 | * Save the peer's label in the request_sock so we can later setup | 3120 | * Save the peer's label in the request_sock so we can later setup |
| 3091 | * smk_packet in the child socket so that SO_PEERCRED can report it. | 3121 | * smk_packet in the child socket so that SO_PEERCRED can report it. |
| 3092 | */ | 3122 | */ |
| 3093 | req->peer_secid = smack_to_secid(smack); | 3123 | req->peer_secid = smack_to_secid(sp); |
| 3094 | 3124 | ||
| 3095 | /* | 3125 | /* |
| 3096 | * We need to decide if we want to label the incoming connection here | 3126 | * We need to decide if we want to label the incoming connection here |
| @@ -3103,7 +3133,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3103 | if (smack_host_label(&addr) == NULL) { | 3133 | if (smack_host_label(&addr) == NULL) { |
| 3104 | rcu_read_unlock(); | 3134 | rcu_read_unlock(); |
| 3105 | netlbl_secattr_init(&secattr); | 3135 | netlbl_secattr_init(&secattr); |
| 3106 | smack_to_secattr(smack, &secattr); | 3136 | smack_to_secattr(sp, &secattr); |
| 3107 | rc = netlbl_req_setattr(req, &secattr); | 3137 | rc = netlbl_req_setattr(req, &secattr); |
| 3108 | netlbl_secattr_destroy(&secattr); | 3138 | netlbl_secattr_destroy(&secattr); |
| 3109 | } else { | 3139 | } else { |
| @@ -3125,13 +3155,11 @@ static void smack_inet_csk_clone(struct sock *sk, | |||
| 3125 | const struct request_sock *req) | 3155 | const struct request_sock *req) |
| 3126 | { | 3156 | { |
| 3127 | struct socket_smack *ssp = sk->sk_security; | 3157 | struct socket_smack *ssp = sk->sk_security; |
| 3128 | char *smack; | ||
| 3129 | 3158 | ||
| 3130 | if (req->peer_secid != 0) { | 3159 | if (req->peer_secid != 0) |
| 3131 | smack = smack_from_secid(req->peer_secid); | 3160 | ssp->smk_packet = smack_from_secid(req->peer_secid); |
| 3132 | strncpy(ssp->smk_packet, smack, SMK_MAXLEN); | 3161 | else |
| 3133 | } else | 3162 | ssp->smk_packet = NULL; |
| 3134 | ssp->smk_packet[0] = '\0'; | ||
| 3135 | } | 3163 | } |
| 3136 | 3164 | ||
| 3137 | /* | 3165 | /* |
diff --git a/security/smack/smackfs.c b/security/smack/smackfs.c index f4c28eeba1b1..76e520be1b5d 100644 --- a/security/smack/smackfs.c +++ b/security/smack/smackfs.c | |||
| @@ -86,6 +86,16 @@ char *smack_onlycap; | |||
| 86 | */ | 86 | */ |
| 87 | 87 | ||
| 88 | LIST_HEAD(smk_netlbladdr_list); | 88 | LIST_HEAD(smk_netlbladdr_list); |
| 89 | |||
| 90 | /* | ||
| 91 | * Rule lists are maintained for each label. | ||
| 92 | * This master list is just for reading /smack/load. | ||
| 93 | */ | ||
| 94 | struct smack_master_list { | ||
| 95 | struct list_head list; | ||
| 96 | struct smack_rule *smk_rule; | ||
| 97 | }; | ||
| 98 | |||
| 89 | LIST_HEAD(smack_rule_list); | 99 | LIST_HEAD(smack_rule_list); |
| 90 | 100 | ||
| 91 | static int smk_cipso_doi_value = SMACK_CIPSO_DOI_DEFAULT; | 101 | static int smk_cipso_doi_value = SMACK_CIPSO_DOI_DEFAULT; |
| @@ -93,7 +103,10 @@ static int smk_cipso_doi_value = SMACK_CIPSO_DOI_DEFAULT; | |||
| 93 | const char *smack_cipso_option = SMACK_CIPSO_OPTION; | 103 | const char *smack_cipso_option = SMACK_CIPSO_OPTION; |
| 94 | 104 | ||
| 95 | 105 | ||
| 106 | #define SEQ_READ_FINISHED ((loff_t)-1) | ||
| 107 | /* | ||
| 96 | #define SEQ_READ_FINISHED 1 | 108 | #define SEQ_READ_FINISHED 1 |
| 109 | */ | ||
| 97 | 110 | ||
| 98 | /* | 111 | /* |
| 99 | * Values for parsing cipso rules | 112 | * Values for parsing cipso rules |
| @@ -160,9 +173,13 @@ static int smk_set_access(struct smack_rule *srp, struct list_head *rule_list, | |||
| 160 | 173 | ||
| 161 | mutex_lock(rule_lock); | 174 | mutex_lock(rule_lock); |
| 162 | 175 | ||
| 176 | /* | ||
| 177 | * Because the object label is less likely to match | ||
| 178 | * than the subject label check it first | ||
| 179 | */ | ||
| 163 | list_for_each_entry_rcu(sp, rule_list, list) { | 180 | list_for_each_entry_rcu(sp, rule_list, list) { |
| 164 | if (sp->smk_subject == srp->smk_subject && | 181 | if (sp->smk_object == srp->smk_object && |
| 165 | sp->smk_object == srp->smk_object) { | 182 | sp->smk_subject == srp->smk_subject) { |
| 166 | found = 1; | 183 | found = 1; |
| 167 | sp->smk_access = srp->smk_access; | 184 | sp->smk_access = srp->smk_access; |
| 168 | break; | 185 | break; |
| @@ -273,9 +290,12 @@ static ssize_t smk_write_load_list(struct file *file, const char __user *buf, | |||
| 273 | struct list_head *rule_list, | 290 | struct list_head *rule_list, |
| 274 | struct mutex *rule_lock) | 291 | struct mutex *rule_lock) |
| 275 | { | 292 | { |
| 293 | struct smack_master_list *smlp; | ||
| 294 | struct smack_known *skp; | ||
| 276 | struct smack_rule *rule; | 295 | struct smack_rule *rule; |
| 277 | char *data; | 296 | char *data; |
| 278 | int rc = -EINVAL; | 297 | int rc = -EINVAL; |
| 298 | int load = 0; | ||
| 279 | 299 | ||
| 280 | /* | 300 | /* |
| 281 | * No partial writes. | 301 | * No partial writes. |
| @@ -313,13 +333,27 @@ static ssize_t smk_write_load_list(struct file *file, const char __user *buf, | |||
| 313 | if (smk_parse_rule(data, rule)) | 333 | if (smk_parse_rule(data, rule)) |
| 314 | goto out_free_rule; | 334 | goto out_free_rule; |
| 315 | 335 | ||
| 336 | if (rule_list == NULL) { | ||
| 337 | load = 1; | ||
| 338 | skp = smk_find_entry(rule->smk_subject); | ||
| 339 | rule_list = &skp->smk_rules; | ||
| 340 | rule_lock = &skp->smk_rules_lock; | ||
| 341 | } | ||
| 342 | |||
| 316 | rc = count; | 343 | rc = count; |
| 317 | /* | 344 | /* |
| 318 | * smk_set_access returns true if there was already a rule | 345 | * smk_set_access returns true if there was already a rule |
| 319 | * for the subject/object pair, and false if it was new. | 346 | * for the subject/object pair, and false if it was new. |
| 320 | */ | 347 | */ |
| 321 | if (!smk_set_access(rule, rule_list, rule_lock)) | 348 | if (!smk_set_access(rule, rule_list, rule_lock)) { |
| 349 | smlp = kzalloc(sizeof(*smlp), GFP_KERNEL); | ||
| 350 | if (smlp != NULL) { | ||
| 351 | smlp->smk_rule = rule; | ||
| 352 | list_add_rcu(&smlp->list, &smack_rule_list); | ||
| 353 | } else | ||
| 354 | rc = -ENOMEM; | ||
| 322 | goto out; | 355 | goto out; |
| 356 | } | ||
| 323 | 357 | ||
| 324 | out_free_rule: | 358 | out_free_rule: |
| 325 | kfree(rule); | 359 | kfree(rule); |
| @@ -335,11 +369,24 @@ out: | |||
| 335 | 369 | ||
| 336 | static void *load_seq_start(struct seq_file *s, loff_t *pos) | 370 | static void *load_seq_start(struct seq_file *s, loff_t *pos) |
| 337 | { | 371 | { |
| 338 | if (*pos == SEQ_READ_FINISHED) | 372 | struct list_head *list; |
| 373 | |||
| 374 | /* | ||
| 375 | * This is 0 the first time through. | ||
| 376 | */ | ||
| 377 | if (s->index == 0) | ||
| 378 | s->private = &smack_rule_list; | ||
| 379 | |||
| 380 | if (s->private == NULL) | ||
| 339 | return NULL; | 381 | return NULL; |
| 340 | if (list_empty(&smack_rule_list)) | 382 | |
| 383 | list = s->private; | ||
| 384 | if (list_empty(list)) | ||
| 341 | return NULL; | 385 | return NULL; |
| 342 | return smack_rule_list.next; | 386 | |
| 387 | if (s->index == 0) | ||
| 388 | return list->next; | ||
| 389 | return list; | ||
| 343 | } | 390 | } |
| 344 | 391 | ||
| 345 | static void *load_seq_next(struct seq_file *s, void *v, loff_t *pos) | 392 | static void *load_seq_next(struct seq_file *s, void *v, loff_t *pos) |
| @@ -347,17 +394,19 @@ static void *load_seq_next(struct seq_file *s, void *v, loff_t *pos) | |||
| 347 | struct list_head *list = v; | 394 | struct list_head *list = v; |
| 348 | 395 | ||
| 349 | if (list_is_last(list, &smack_rule_list)) { | 396 | if (list_is_last(list, &smack_rule_list)) { |
| 350 | *pos = SEQ_READ_FINISHED; | 397 | s->private = NULL; |
| 351 | return NULL; | 398 | return NULL; |
| 352 | } | 399 | } |
| 400 | s->private = list->next; | ||
| 353 | return list->next; | 401 | return list->next; |
| 354 | } | 402 | } |
| 355 | 403 | ||
| 356 | static int load_seq_show(struct seq_file *s, void *v) | 404 | static int load_seq_show(struct seq_file *s, void *v) |
| 357 | { | 405 | { |
| 358 | struct list_head *list = v; | 406 | struct list_head *list = v; |
| 359 | struct smack_rule *srp = | 407 | struct smack_master_list *smlp = |
| 360 | list_entry(list, struct smack_rule, list); | 408 | list_entry(list, struct smack_master_list, list); |
| 409 | struct smack_rule *srp = smlp->smk_rule; | ||
| 361 | 410 | ||
| 362 | seq_printf(s, "%s %s", (char *)srp->smk_subject, | 411 | seq_printf(s, "%s %s", (char *)srp->smk_subject, |
| 363 | (char *)srp->smk_object); | 412 | (char *)srp->smk_object); |
| @@ -426,8 +475,11 @@ static ssize_t smk_write_load(struct file *file, const char __user *buf, | |||
| 426 | if (!capable(CAP_MAC_ADMIN)) | 475 | if (!capable(CAP_MAC_ADMIN)) |
| 427 | return -EPERM; | 476 | return -EPERM; |
| 428 | 477 | ||
| 478 | /* | ||
| 429 | return smk_write_load_list(file, buf, count, ppos, &smack_rule_list, | 479 | return smk_write_load_list(file, buf, count, ppos, &smack_rule_list, |
| 430 | &smack_list_lock); | 480 | &smack_list_lock); |
| 481 | */ | ||
| 482 | return smk_write_load_list(file, buf, count, ppos, NULL, NULL); | ||
| 431 | } | 483 | } |
| 432 | 484 | ||
| 433 | static const struct file_operations smk_load_ops = { | 485 | static const struct file_operations smk_load_ops = { |
| @@ -1588,6 +1640,20 @@ static int __init init_smk_fs(void) | |||
| 1588 | smk_cipso_doi(); | 1640 | smk_cipso_doi(); |
| 1589 | smk_unlbl_ambient(NULL); | 1641 | smk_unlbl_ambient(NULL); |
| 1590 | 1642 | ||
| 1643 | mutex_init(&smack_known_floor.smk_rules_lock); | ||
| 1644 | mutex_init(&smack_known_hat.smk_rules_lock); | ||
| 1645 | mutex_init(&smack_known_huh.smk_rules_lock); | ||
| 1646 | mutex_init(&smack_known_invalid.smk_rules_lock); | ||
| 1647 | mutex_init(&smack_known_star.smk_rules_lock); | ||
| 1648 | mutex_init(&smack_known_web.smk_rules_lock); | ||
| 1649 | |||
| 1650 | INIT_LIST_HEAD(&smack_known_floor.smk_rules); | ||
| 1651 | INIT_LIST_HEAD(&smack_known_hat.smk_rules); | ||
| 1652 | INIT_LIST_HEAD(&smack_known_huh.smk_rules); | ||
| 1653 | INIT_LIST_HEAD(&smack_known_invalid.smk_rules); | ||
| 1654 | INIT_LIST_HEAD(&smack_known_star.smk_rules); | ||
| 1655 | INIT_LIST_HEAD(&smack_known_web.smk_rules); | ||
| 1656 | |||
| 1591 | return err; | 1657 | return err; |
| 1592 | } | 1658 | } |
| 1593 | 1659 | ||
