From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 95C6EC433E2 for ; Sat, 5 Sep 2020 13:13:04 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 54C802072D for ; Sat, 5 Sep 2020 13:13:04 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=paul-moore-com.20150623.gappssmtp.com header.i=@paul-moore-com.20150623.gappssmtp.com header.b="cd3x9gOW" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726582AbgIENND (ORCPT ); Sat, 5 Sep 2020 09:13:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43110 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726591AbgIENNB (ORCPT ); Sat, 5 Sep 2020 09:13:01 -0400 Received: from mail-ed1-x541.google.com (mail-ed1-x541.google.com [IPv6:2a00:1450:4864:20::541]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 16949C061245 for ; Sat, 5 Sep 2020 06:13:01 -0700 (PDT) Received: by mail-ed1-x541.google.com with SMTP id ay8so8553569edb.8 for ; Sat, 05 Sep 2020 06:13:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GvmgYYNwHzD6T9Nd+ecI/sUAmb1ZdlUVPQXlDK8Mi+o=; b=cd3x9gOWBZOf/7EefgRSuTi4zjtGmHQzRWQsXTgDuJJix+019shqs8YKC9TF4Cy05q /sq8T5FTdwQWS9fX3GqxGIeB5dMKg8FoJuD9MovcjaDCazJXtGytvF43HAc2LyKrBhYL kf3aGJ7iZxxBFg64ZrKTiqMIz9Yw47I64byHCSUbTd1ZOGFz9lVsk1j95pcA6vPAXpTC oFhfxyH2W8IZykE9TBXt2Tw3v84ozStGqtu5Dc2I7E2aBj/SboM9BiKuErKRRMonHDl2 YxX4rVsWvW+kfF0OaXxcvHALLhb+wo/Embpd1ZNs4cWsKO/IJ1bIcSqv7lEpX66tlJHa AgUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GvmgYYNwHzD6T9Nd+ecI/sUAmb1ZdlUVPQXlDK8Mi+o=; b=QdAQdqTEF+XaFr7g40hThI2IlUMHeDMQJATD3BwotTyQK6qUbWk9O8eEl83lARE/hh JrW/UR+Skb+EWtNzRpNXELN5XB9+I+bisg8fhEONZyi+EgOm3agOxgw+/JF8HVze778k T5T3ypp2NFflFuq18ljseCzmN0055T6q3qc5qZAwEWHZ3lrawViMwn+3hBmJJH8WOWrC uBs3j/gRMNiiHiZi+LcAC+Kqm6OIdwQsSFCjDcmJaWbzqvSVGVM3OP6ms/7E17e3iFsq ChhNB7RC3IjabecuVdOSmddowRwRBmc8TmjqAI05s+sSVA/w2eLmCBGp2q4dT3dc66c/ A2Gw== X-Gm-Message-State: AOAM533knnztx5Ia71aCDzhGoEK24PUlj2OIasJx4pihdtOJ7k14e7xI yntLQiBcObarLNjkbAzywfQw4upNm5Ced9mg5G// X-Google-Smtp-Source: ABdhPJxB3Um2Vn9uZL41RO2OGBqEPvhsjJCAOIRakxm1XvBVzXIhbB1cUi8oNnUdgF788eEM1r4narnbR2ocdo7LOEE= X-Received: by 2002:a50:d809:: with SMTP id o9mr13179145edj.12.1599311579532; Sat, 05 Sep 2020 06:12:59 -0700 (PDT) MIME-Version: 1.0 References: <20200826145247.10029-1-casey@schaufler-ca.com> <20200826145247.10029-9-casey@schaufler-ca.com> In-Reply-To: <20200826145247.10029-9-casey@schaufler-ca.com> From: Paul Moore Date: Sat, 5 Sep 2020 09:12:48 -0400 Message-ID: Subject: Re: [PATCH v20 08/23] LSM: Use lsmblob in security_ipc_getsecid To: Casey Schaufler Cc: casey.schaufler@intel.com, James Morris , linux-security-module@vger.kernel.org, selinux@vger.kernel.org, linux-audit@redhat.com, keescook@chromium.org, john.johansen@canonical.com, penguin-kernel@i-love.sakura.ne.jp, Stephen Smalley Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: On Wed, Aug 26, 2020 at 11:10 AM Casey Schaufler wrote: > > There may be more than one LSM that provides IPC data > for auditing. Change security_ipc_getsecid() to fill in > a lsmblob structure instead of the u32 secid. The > audit data structure containing the secid will be updated > later, so there is a bit of scaffolding here. > > Reviewed-by: Kees Cook > Reviewed-by: John Johansen > Acked-by: Stephen Smalley > Signed-off-by: Casey Schaufler > --- > include/linux/security.h | 7 ++++--- > kernel/auditsc.c | 7 ++++++- > security/security.c | 12 +++++++++--- > 3 files changed, 19 insertions(+), 7 deletions(-) Acked-by: Paul Moore -- paul moore www.paul-moore.com