From patchwork Tue Nov 21 09:49:23 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: James Morris X-Patchwork-Id: 10067877 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id AF4C660375 for ; Tue, 21 Nov 2017 09:50:25 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A50A428D8B for ; Tue, 21 Nov 2017 09:50:25 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 99A9A28E6A; Tue, 21 Nov 2017 09:50:25 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 Received: from USFB19PA12.eemsg.mail.mil (uphb19pa09.eemsg.mail.mil [214.24.26.83]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C391428D8B for ; Tue, 21 Nov 2017 09:50:23 +0000 (UTC) Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by USFB19PA12.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 21 Nov 2017 09:50:21 +0000 X-IronPort-AV: E=Sophos;i="5.44,432,1505779200"; d="scan'208";a="6212704" IronPort-PHdr: =?us-ascii?q?9a23=3ASqR+3BHpwOW7y1fZHC+anZ1GYnF86YWxBRYc798d?= =?us-ascii?q?s5kLTJ7+r8qybnLW6fgltlLVR4KTs6sC0LuG9fi4EUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQtFiT6+bL9oMBm6sRjau9ULj4dlNqs/0AbCrGFSe+?= =?us-ascii?q?RRy2NoJFaTkAj568yt4pNt8Dletuw4+cJYXqr0Y6o3TbpDDDQ7KG81/9HktQPC?= =?us-ascii?q?TQSU+HQRVHgdnwdSDAjE6BH6WYrxsjf/u+Fg1iSWIdH6QLYpUjus9adrTALjhj?= =?us-ascii?q?kBOTA37WrbjtV8gaNerB+nuhdxwZPbYJuNOfRwfq3TY9AUSmROUclNSiJBGoGx?= =?us-ascii?q?Y5YBAuUfJuZVtJX9q0cUoBeiGQWhHv3jxzlVjXH2x6061OEhHBnC0gM6GtIBrm?= =?us-ascii?q?/Up8jyOqcVS+C11qjIzS7eZP5R2zfy8o3IfQ46of2WWbJ8a8/RyU41FwPfj1WQ?= =?us-ascii?q?spfoPzSP1usXr2eb6/RvWfizhG4grgF8uz6izdoihInOg4Ia0FHE9SNhzYY2O9?= =?us-ascii?q?K4Ukh7YcW6H5RMrS2aMJF2QswkTmp1uyg60qULtYO0cSUF0pgqxwPTZ+aZf4WH?= =?us-ascii?q?/B7vTvudLS9liH9leb+znQu+/Ei9xuHmWMS4zUxGoyhYntXUq3wA2AHf5tKaRv?= =?us-ascii?q?Zy/0qtwyuD2x3S5+1ePEw5kazWIIM7zLEqjJocq0HDEzfzmEXxkaCZaF0p+vOt?= =?us-ascii?q?6+T7erXmoYKcN5NshgH+LKsunsu/DPwkMgcURWib+Pm81Kb58U3lQLRFkv02kq?= =?us-ascii?q?7DvJDcOcsbvbK2DxVQ0oYi7xazFzam0NIGknkbNF9JZR2KgofzN1zOPfz0F+mz?= =?us-ascii?q?jluynDtx2vzKJrjhDY/MLnjHnrfhZ7F960tExQoo099f45NUCrccIPP8Q0P+r9?= =?us-ascii?q?vYDgI/MwOo3ennE85w1p8eWG2TAq+ZN7nesVmT5u01OeWMa4gVuCjlJ/g/+/Hu?= =?us-ascii?q?lWM5mUMafaSx35sXb3a4Ee56I0WZe3XshMwMEWUNvgo4SezlkkaCUSJNaHaoRK?= =?us-ascii?q?Iw/DY7CJipDY3bXICinKSB3DunHp1Rfm1GCFKMHm30eIWHQPcMbySSIs5/kjEf?= =?us-ascii?q?W7ihT5Ih1B61uw/nzbpnMvfU9jcftZL529h///fTmg0q9TxoE8Sd1HmATm91nm?= =?us-ascii?q?MMQj85wrp/rFdzylidzKd4hOZYGsZL5/NTVQc6N4DTwPBmC9zoXQLBZNiJQk68?= =?us-ascii?q?Qtq6GTExUs4xw9gWbklgB9qiixfD3yy2A7MIjLGLGoI78rjd33nwIMZ9zWzK1K?= =?us-ascii?q?8/gFk6WsFPL3GphrZj9wjPAI7Ei1iWl7qweqQGxyPC6GCDzW+Ss05CSw5wTb/J?= =?us-ascii?q?XXYBaUvKtd75/F/NT6eyCbQ7NQtM0c6DK6pNat3vllhGQfPjNM3fY2K3gWuwAw?= =?us-ascii?q?yHxqmPbIrrZWUSwj/RCE4anAAP5XyGLxQxBj+9o2LCCzxjDUzgY1v2/ulkqXO7?= =?us-ascii?q?VVQ5zxmQYE171rq14QYVhfiGRPwPwL0IoiAhqy97HFylxdLZF8KApxZ9fKVbed?= =?us-ascii?q?497k1H2njftwNhP5ygNLtvhlsGcwR2pk/uzBt2Cp5ancgttnMqwxJ4KbiE31NZ?= =?us-ascii?q?azOYwZfwN6XUKmbo/xCvbLPW10rd0NmM+acP7+k4p0/kvAGzGUoo629n3MVN03?= =?us-ascii?q?uA+pXKCxIfXojsXUYt9hh1uavabzIn6IzI0H1gK660siXN29gxHusq1g6gf8tD?= =?us-ascii?q?MKODDALyCdAVCNW1JewlnlioYQgIPOZM+64oJ8mmbeeJ2La3POZ8mzKrlX9H4I?= =?us-ascii?q?5n0kKL7Cp8VvXF340Dw/Gf0AqHUi3zjFG7vsDxh49EeSkYHnCjxij8GI5Reqpy?= =?us-ascii?q?cJ4FCGi0J8232stxh4T2W3ND6l6sGUkG19S0eRqXdVD92hdQ1UsPq3y9hSS41y?= =?us-ascii?q?B0ky0urqeHwCzB3vntdBsdNW5PX2RtkVDsIY2ogN8AR0iocxIllB276kbm36Jb?= =?us-ascii?q?vrhwL3HPQUdUeCj7N2diUqq0trqGfcFP84glvj9JX+SmZlCWULn9owEV0yn7BW?= =?us-ascii?q?tR2Cg7dy22upX+hxF6lmOdI2pvrHreY8F83wvQ5NzbRf5X0ToLXy14iTjRBlem?= =?us-ascii?q?Jdmp+s+Yl5DZsuCxT2ihTIFccTH3zYOcsyu2/WlqARykn/Cvg9HnChY10Sv619?= =?us-ascii?q?lsSCXJow3xYpLz16S7N+Jnf1VnBETm58p8BI5+jpM6hIsM1ngCmpWV4X0HnH/p?= =?us-ascii?q?MdVc3aL+aGQCRSQXzN7S7gnow1ZjLm+VyILiTHmdxdFhZ9aiaGMMxi0999xKCL?= =?us-ascii?q?uT7LFcnit6vFy4rRnKbPh+gDgdz+Au6HgEjOEVogYtyT+dAr8KF0lCISPsjwiI?= =?us-ascii?q?78y5rKhPfGaga6Ww1E5gktC5Fr6CpB1cV2jjepo5AC9w9dtwMEjX0HHp8YHkf8?= =?us-ascii?q?TQbcgPuRKKnRfAiPJVKJ0vmfYQgypoJ379t2U/y+EnlRxuwY26vI+fJmVz+qK2?= =?us-ascii?q?HwVVNiPzZ8wO+jHhl6BekdiK34q3BJVuBi0LXIf0TfKvCD8Sre7oNxuKEDAntn?= =?us-ascii?q?ibGKbfHA+G5EdotX3PFYqnN3aNJHkW1d9iXgWSJFRDgAAIWzU3hpA5GRqsxMz9?= =?us-ascii?q?d0d54ysc5lDmpRRRzeJoLQPwUn/FpAevaDc7VoSQLAZM4gFF/UfVPtSU7vhvEC?= =?us-ascii?q?FA4p2hsAuNJ3SeZwtSCWEJXlKLB0z/Pra0/9bN6O6YCfSiL/vVfbqBs/ReWOmS?= =?us-ascii?q?yZKpzIRm4y6GNt+TMXl6E/07xk1DUGhjG8jDlTQDUSkXmDjJb86cpBax4Td4od?= =?us-ascii?q?y68PjxXwLv/4SPAaNIMdpz4xC2nbuDN+mIiSZ3MzZXyI4DxWTSx7gZwF4SjDpu?= =?us-ascii?q?eiK3HrscsC7BVqXQmrVYDxQDcSN8KNNI774g3glKIcPbjMn12aRgjv4tEFpFW1?= =?us-ascii?q?3hmtuyZcwWLWG9NVXHC1yNNLuaJD3E2cX3bbm7Sb1Kg+VerwewtiqDE0//IjSD?= =?us-ascii?q?kCHkVwixPu5Xki6bOh1euJ26cht2CGjsUszpZQOhPN9wlz02zqU+hmnWOm4ELT?= =?us-ascii?q?h8b0RNo6WL4ixDhfl/H21B7mF5LemfgSqZ9PfXJYoMvftwHCt0k+Na4HIny7pa?= =?us-ascii?q?9yxLWPx0mDHPrt51uV2nnPOAyiZ8UBpJrDZHnoWLvV9tOa/B7JlPRW7E/A4R7W?= =?us-ascii?q?WXExkFvNplCtLou6BW0dXAibz8JyxD893O+8sQHc/UKNiIMHA5KxrmBCbUDBcZ?= =?us-ascii?q?TT6sLWzQnUNdn+uM9nKLtZU6rYDsl4QISr9eTlM1F/caBV9iHN0NOpt3WSkkkb?= =?us-ascii?q?GDhs4S+XW+tAXRRNldvp3fSvKSBvDvJCyDjblDZhoH37X4Ip8JNo38xUNiaUJ3?= =?us-ascii?q?k5jNG0rVQd9CuDZhbhMurEVL7nd+UnU521j5ZQO1/H8TCfm0kwY1igp+ZeQi6i?= =?us-ascii?q?zh41IwJlrEqis/jlUxmcnlgTCWdT7+Mr28XYdIBCror0IxKI/0Qx5pbQ2umkxp?= =?us-ascii?q?LDHESKxLgLtkbm1riwjcuYBTGfFGS61EexwQxfCNa/Uuz1tctj2txVVb6uvdFZ?= =?us-ascii?q?tiiAwqfIa2r31ewAJscsQ6JbbMK6pJ1VVfnaOOvjW12eA2zg8eP1wN/32SeSIS?= =?us-ascii?q?vkwHKKUmLTKy/uNw8QyChydDeG8UWvU3pfJq8EU9NPmewCLk0r5OMVq+OPKFL6?= =?us-ascii?q?OeoWTAktSIQlwo3EMSi0ZF5aR20dskc0eMSk8g1qWRFxUUOsrZMgxaddBS9GLU?= =?us-ascii?q?fSeAquXC3456P5inFuDpUe+PtLwYgkS6EwY1B44M9NgOHoGw0EHEKsfqNLoFyR?= =?us-ascii?q?I35Av1IlWEDfNJdQmEkDcBvsGz1ph33ZNSJjsFG2VyLT235qrLpg8tmPeDR8k5?= =?us-ascii?q?YnMbXosCK3I3V9a3lDJev3RFEDa4yPkZyBSY4z/6uCvQECH2b8B/a/eMeRNsFN?= =?us-ascii?q?a29C0j86i3jF7X9YneJ2H6NNl5p9DP6OMbqIycBP9OS7lyrVvckZFCR3O2S27P?= =?us-ascii?q?DcK1J5/oZoY2adz0C2q1XUKnhDIwT8bxOtGtLq6SjgzzXolUsZOU3DY6Oc+zCz?= =?us-ascii?q?ESARFwqP8f5Khkfw0Mf4I7YQL0twQ5L6GwOxmX0tO1Tmm3NDRWUedQzf+hZ7NN?= =?us-ascii?q?1SotbvW2yHw6TpE11+O361ICRIkWjhHCwvauf4ZeUTXyGnxZfwXAuy85mnN8Oe?= =?us-ascii?q?ks2eg/wQnHsV8GPzCMbuxpZ3ROv8sgClOKPXV2Fm04SkeGjYrF4w6jw7AS/yxZ?= =?us-ascii?q?n9ZPyeNLqWXwsIXDbTyrQ6GktZLVsy88Ytc8uK1xLZbvIs2Yu5PChjbfVoXfsh?= =?us-ascii?q?WZUC6mEPpXgsJQLzhCQPlPgm4oItAGuZBb5kovSMg+I71PCK8jprCuaDpkAi4S?= =?us-ascii?q?zTMXV4yaxjwCh/2w273EmReMaJ4iKgALsI1egtsBVC57ei0fqLW/WIXWlm+ET2?= =?us-ascii?q?kLLx0Q7QlX5QIPiJF/cf7/7IrPVp9MxCZco+hoXSvTCplo61z7R3mTgVfiUvWh?= =?us-ascii?q?kPKm3R5TzPLq3dkWQxB+BlJbx+lKkksoL6x3JLQLvoLQtD+Ha1/6tnr3yOS6PF?= =?us-ascii?q?lR1dHUd1rgAYXfr2r8Tysc9WcXRYJUyXHfFJUSkxZiZ6oxolVDPpymcF7k5zM4?= =?us-ascii?q?34RpA6W4VcezylYkq3YGWzmlE95fBOFjrl3XRCdlYpCwpZXiI5VdXGlQ+JiHpF?= =?us-ascii?q?dYlEViKCm5yJVGJ8FK+D4MUyBFoS+Bs9uqVM1Dxch2AocQItd4vnfwA79ENISU?= =?us-ascii?q?o3ItoLDvzGHW+ywkuleg2DqzA7O4T/5e/2AGGgUmPX6epVMrD+Qx6Wrd707Csk?= =?us-ascii?q?hs/+hFAriAk19xrCx6HpBUCTZDzWqlIEhrTHlar+VaL7zYc85bQ/YsfhKgJgIx?= =?us-ascii?q?FeU40EyT4UF7g2r2bzZ0tgRE5yDXRxM0WjUNgrfxhT0erdmqNiQUS51UcTksbT?= =?us-ascii?q?rJJgyAlC9LuxZfbl1lVIoCAtZZ4b0b25Vb/tbaQ0a2NS4FRABiNh4/0fdHj05M?= =?us-ascii?q?rliXeSDHAgq0bvvPthp3fdmPo8K3MPv5+xpIhZ39vOA+6aoDW2WsmRexTtDGs4?= =?us-ascii?q?/8qtqKu1OWdKfjL+2ze2LOTCTXgBCrgrckEoPK8DTNPwpdN5l602ArYZz7BW7M?= =?us-ascii?q?JxRGKLoRJ1BHWqBiddVGvudaatd4eKYT56BiGA+ISwjyGIyrsPlGNEzcRSrfLy?= =?us-ascii?q?WG9uywv57T4abaSej6acyG32zHTL5vPpdm9Tn7HK/n0Y1E9Urs3fdt7Ud6RkLY?= =?us-ascii?q?My2aqdThOwcL5NWjdkT+v50mBzXWAIxqnHrq3EFAeNIdQze2/5QA1JNZ9HHwRP?= =?us-ascii?q?p60kfptu1S+aNk6Y4q7L930sq0Ob3dKfJBsU9gGBSUABtl9ok1CmhlW29RevMR?= =?us-ascii?q?KOvWfakBi8Dur/v6F60R6B2Q4eBZaN3HJ0/bmsalETGcVQZEnBodpj4GMwucze?= =?us-ascii?q?CKl7VzSca/qujzwlgt7ESmLh4a0LBt4p+J+qyJpODLaBvRyaILWrPwSsPyqbQs?= =?us-ascii?q?vFiS5eY/mb4LdWF0bBerEO8HVs4S3m3g17wlzTowE8PfGLLt4OJMWGg9nj3+gJ?= =?us-ascii?q?B9A1UXGvQPELqQ4Yten3k3m+rFNt0XaK9OgGCPGgC4ErUa036k9zOXIHV5ghHJ?= =?us-ascii?q?yxzwRXiz7Fr2oCJjTyvD0crskk1PVratHUdSRS2pOU1mvzyTIArkrt33ub467E?= =?us-ascii?q?suKGzrqMqNlHe9OLNQB8D/Jt2cISwvqVISkpIwRsKg2ZoaGdq7L9cd6nd+YeXC?= =?us-ascii?q?62mziS9Ov79Hh5bC4sGS4vjXHHihgLeApLqR3z1Y0WY3vU0h5d+8LP3O4MeKQ/?= =?us-ascii?q?uw3WYLUyh/oxfBXwKyqrHDtF8UOFeL0UnRl4wIP9FZwWE42Vv75OgnW9886AJe?= =?us-ascii?q?GZveaPwYuDDzIjz0wUyFbN4tUSmeyTRXFErvEVZkAKg8xH7wvMXRmHfI4VIoWp?= =?us-ascii?q?V/d0zphBxwFYU4Klsh6EMJzSoHEAgNbw2bDb6zCET9N4QESVQMaRSJ3bi9YKc3?= =?us-ascii?q?3ld/wrCx6+/Ja+xzGa4NOuxajg6Uk1hRAogWvrEGQLJgZ19d87baphT4C4f5W/?= =?us-ascii?q?jpj3wwOuOuT89H8MAZuHoi4hqlSBq785hD9asbhIqOdqFafZjGpNp84Ft/5T4T?= =?us-ascii?q?aixNhwByjxyjXuAGuu/j/tjbvYGs6uavSKYiWeUX+AIpB2RllZfwhk4soc3P3e?= =?us-ascii?q?dGVoLVkZj/8BxKI3OSt4bVzR98KfYJK4Kse7pg7GsIJywfJ3IIINqXZOIx4ytz?= =?us-ascii?q?PzXJ511NGNkAZdUGM8rRgQpUkFHmWKlP9srHHV+VE5t8d8Iy4GXr0z067Zw8Uu?= =?us-ascii?q?Lk6D+3O5/f9U1NMO1fgyVsjt7Co/IVwfXKAigN/XaZcwR1wj+Fy5SVDvbw+uOM?= =?us-ascii?q?yM3bV1wYBSM2VoZdKyCE+QO5Wuq0mpLpUhmX6s/omp4+clyfRmCplqQfrqlMCf?= =?us-ascii?q?JAijn83jVGGYD6m+mVs8G15GVKuVNJFodz7RvYGKRQJZh7NhH4mdOtRkdiHCf/?= =?us-ascii?q?f9vUdhU2suqM2ugM+/l+N1f5ZYIDIBIEzLL66XxPQgRySL72ukuZUv8QZdtnTv?= =?us-ascii?q?PEtXNV6YN7Jq8RPViduoblrjNVp1A3GgMpbqE/riBCfEnUgAJVQ7r0uKIHigYE?= =?us-ascii?q?UN55p1VDGWSrNWI6+jrISKVVjK6KCPAP9TWTVKMOWV1yMixiWxO1xIlue7yxkP?= =?us-ascii?q?BFrGxGkC19oPwx3j1oXhS8vzPjp74X1TIm5r64qC0LuWZZQeWGjyfIFVJDwewF?= =?us-ascii?q?jacYDHbj50KzYH0HbIbp+7lnIsLg9Yg97HglZxUsYTEGV/y6Cy7sl6OIHpCPsN?= =?us-ascii?q?VEiR6PuMXPbaezLS8WNrQ81RLsWWNw0g3fnBZ06msEXC+s7Ng+JIWyIcwl3Dan?= =?us-ascii?q?GXDHdFYQ5aNEqNfxtV8OTOYtdVNhwXls0suZSS0JXsDPHXg6jhQ8Y2VebJ1D8Q?= =?us-ascii?q?MaF7UvgjuQu6lG/wIUYDTTEom++Infh8TI2X47Tdh0wGLavKuFiY020Hd9gdN7?= =?us-ascii?q?8jaOuGgOd+zfS8JjGWb81oFDyeHlfPWttucHSJd6yLS/TvANL9Ov+Wys2JVlQk?= =?us-ascii?q?Wl3KgRH0KlMO8fwbfWSz+lSWqcWeuRaWiNkTE5Mkr85RSzK103b8BKr1QjPeTe?= =?us-ascii?q?nJ5ckBbhUah1RiWWql/X1msjMfkVdwguooeoZxQKTPINZ+ibPeUuzuMxCF8Nb3?= =?us-ascii?q?/RAyR7EO63sV+onIh+JXpg+0H6bvr3/gDhKtuSFQEOEZTGoZ5p5fy6WmWBNGdu?= =?us-ascii?q?zR1qJkl09vvQGEoqu+9ZcpaRgcLQiMph3e4CbfdtPjU3usQPlYJ79YmUzMCKfA?= =?us-ascii?q?nWzpb2O97YueCYA/nFwEQxZmFaU6YWYR/v54okINE1QbvTEqVFvR4EH6g1XIQh?= =?us-ascii?q?N3vt9KFzNA5zdg/RZLKpgsjlv+6LYppUp2TK7lIrNyrcugcMyvqzTQBhaJCqnX?= =?us-ascii?q?ryKogqRj1dt91tFgdmHIxXFsMFtQWoH56UmKC9i9+24E56pe4KsazuBfDO1dS5?= =?us-ascii?q?2ZhxXpdA6UyMJjbRC7Fhgl55geSqnvfAzp7xBNvgedweV+h7RXXKZ6TbHoW5Nj?= =?us-ascii?q?KOOsX8e1NJ876czLJ1SBORaz7lX6Ceri2rKO1k4Vknyox/ZOfTzjkt77bB2Nvo?= =?us-ascii?q?ZmFbvTyurXiTO5ta8lPKBPbSXxVOSfqK6GxlB7EYbZPo9OcSNtwv2MOc4wd27D?= =?us-ascii?q?te0caIILOsrlHS1UJhdJLaLUzp2yAjVYkMPhu/LRhkvWiMkWjQGXRRKICfLMBp?= =?us-ascii?q?hNuERkj261JZhXAmZmkHHHHhA9iWJz5fk9mzYAyM6RJjE8cIn+nxf1Ux8KK1V7?= =?us-ascii?q?pGIJJAzMejsbgc2fNuMTvOX4AOPSjVIaQwOnxUCf/VpUMAZQQNuLw4HIwyYM7d?= =?us-ascii?q?cws8LE6cxHaqnkP52krueonpiqs=3D?= X-IPAS-Result: =?us-ascii?q?A2CTAABy9hNa/wHyM5BTCBkBAQEBAQEBAQEBAQEHAQEBAQG?= =?us-ascii?q?DECkDZm4njh50jjaBV5cIEIF+DRgNihg/GAEBAQEBAQEBAQFqKII4JIJCAQMEA?= =?us-ascii?q?hcNEz8DAwkCGAMDAQInCAMBSw4BEgWITYFQAwEBC6ojOosCAQEIAQEBASSDNII?= =?us-ascii?q?Hgz40h20NAYYPAQSRdJBKh3KPMGKJMIciAoxyiRMCBAIEBQIZAYE6HzmBdDQhB?= =?us-ascii?q?CFeEBWCPwmCUxwZgWJjAYkwLIIZAQEB?= Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 21 Nov 2017 09:50:19 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id vAL9nmvW031469; Tue, 21 Nov 2017 04:49:57 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id vAL9njsA077034 for ; Tue, 21 Nov 2017 04:49:45 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id vAL9niXl031463; Tue, 21 Nov 2017 04:49:44 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A1BqAABU9RNafygbGNZTCBkBAQEBAQEBA?= =?us-ascii?q?QEBAQEHAQEBAQGDEClpbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBEwE?= =?us-ascii?q?BCxZdhR4BAx0NEz8pAwMBAn4OARKIUoFQAwEBC6ofOosCAQEIAgElgzSCB4M+N?= =?us-ascii?q?IdtDQGGDwEEkXSQSodyjzBiiTCHJIxyiRMCBAIEBQIZAYE6H4ItNCEEIV4QFYI?= =?us-ascii?q?/CYJTHBmBYmMBiTAsghkBAQE?= X-IPAS-Result: =?us-ascii?q?A1BqAABU9RNafygbGNZTCBkBAQEBAQEBAQEBAQEHAQEBAQG?= =?us-ascii?q?DEClpbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBEwEBCxZdhR4BAx0NE?= =?us-ascii?q?z8pAwMBAn4OARKIUoFQAwEBC6ofOosCAQEIAgElgzSCB4M+NIdtDQGGDwEEkXS?= =?us-ascii?q?QSodyjzBiiTCHJIxyiRMCBAIEBQIZAYE6H4ItNCEEIV4QFYI/CYJTHBmBYmMBi?= =?us-ascii?q?TAsghkBAQE?= X-IronPort-AV: E=Sophos;i="5.44,432,1505793600"; d="scan'208";a="123606" Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.34]) by goalie.tycho.ncsc.mil with ESMTP; 21 Nov 2017 04:49:44 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3A1wU/hhxgqzRMa2vXCy+O+j09IxM/srCxBDY+r6Qd?= =?us-ascii?q?2u4UIJqq85mqBkHD//Il1AaPAd2DraIZw8Pt8InYEVQa5piAtH1QOLdtbDQizf?= =?us-ascii?q?ssogo7HcSeAlf6JvO5JwYzHcBFSUM3tyrjaRsdF8nxfUDdrWOv5jAOBBr/KRB1?= =?us-ascii?q?JuPoEYLOksi7ze+/94HPbwlShzewYa55IQmrownWqsQYm5ZpJLwryhvOrHtIeu?= =?us-ascii?q?BWyn1tKFmOgRvy5dq+8YB6/ShItP0v68BPUaPhf6QlVrNYFygpM3o05MLwqxbO?= =?us-ascii?q?SxaE62YGXWUXlhpIBBXF7A3/U5zsvCb2qvZx1S+HNsDtU7s6RSqt4LtqSB/wiS?= =?us-ascii?q?cIKTg58H3MisdtiK5XuQ+tqwBjz4LRZoyeKfhwcb7Hfd4CWGRPUMZfWTJCDIyy?= =?us-ascii?q?YIQAE/EMPfpEo4Tnu1cCsQGzCReqCejyyjFInHj23agi3uolCw7G2RIvH8kTu3?= =?us-ascii?q?rTq9X1Lr0SUeGuzKLVyjjDbelZ2TLj54jTaBwhpeuAXbd3ccrL00kvFhjFg06X?= =?us-ascii?q?qYz/JTyayuANvHaB4+V8UuKvjncqpgdsqTahwccsj5PGhoMTyl3c9iV23pw1Jd?= =?us-ascii?q?ujSEFlfdGoCpxQtzuVN4ZwX8gsQHlotT4kxrEbtpO3ZjYGxZs9yxLBafGLaYeF?= =?us-ascii?q?7g77WOqMITp1hWhpdK+/ihqv60StxPDwWtO23VpXtiZJj9bBum0X2xDO5cWKS+?= =?us-ascii?q?Fx8lq81TuOzQzf9+VJLEYpnqTBMZEh2KQ/lp8LvETDACD2nEL2gbeYeUs+9Oal?= =?us-ascii?q?9erqb6v8qJKAK4N4lxvyPbowlcy6GuQ4PRICX22B9uS90L3v50j5QLROjvEuk6?= =?us-ascii?q?nZto7VJdgDq6KnHgNY3Zwv5wiwAju8ztgVn2MLIV1ZdB6fiojmIVDOIPT2Dfel?= =?us-ascii?q?hFSslS9mx/LcMb3kHJrNNWLPkLP7cbZ47E5c0hAzzdFE559PDbEBOuj8VVP1tN?= =?us-ascii?q?PGFBM2Lwu0w+P/BNVnyoweQX6PArOeMK7Kql+H+/kvLvKQZI4VpDn9K/8l6+To?= =?us-ascii?q?jX8ig1ARZ6ap3ZwJaHqgBPRpP12ZYWbwgtcGCWoKpRQxTOjriF2ETD5SaG2/X7?= =?us-ascii?q?485z4nCIKmCp3PRoa2gLObxiu7EZpWZn4VQmyLREz0ep2EVvFEUyebJstsg3RQ?= =?us-ascii?q?TrS6Y5Mw3hGp8gnhwvxoKfSCvmUDuJbi0sVlz/HCnhE1szpvBoKS1H/eYXtzmz?= =?us-ascii?q?YqTjo7x+haplZny0zLhapxhvFDU9gV4vRTSAYhHZnGxud+Bpb5XQeXLYTBc0qv?= =?us-ascii?q?XtjzWWJ5ddk22dJbJh8lQ9g=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BTAABD9hNafygbGNZTCBkBAQEBAQEBA?= =?us-ascii?q?QEBAQEHAQEBAQGDEClpbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBARI?= =?us-ascii?q?BAQsWXYI4JAGCQQEDHQ0TPykDAwECfg4BEohSgVADAQELqiM6iwIBAQgCASWDN?= =?us-ascii?q?IIHgz40h20NAYYPBZF0kEqHco8wYokwhySMcokTAgQCBAUCGQGBOh+CLTQhBCF?= =?us-ascii?q?eEBWCPwmCUxwZgWJjAYkwLIIZAQEB?= X-IPAS-Result: =?us-ascii?q?A0BTAABD9hNafygbGNZTCBkBAQEBAQEBAQEBAQEHAQEBAQG?= =?us-ascii?q?DEClpbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBARIBAQsWXYI4JAGCQ?= =?us-ascii?q?QEDHQ0TPykDAwECfg4BEohSgVADAQELqiM6iwIBAQgCASWDNIIHgz40h20NAYY?= =?us-ascii?q?PBZF0kEqHco8wYokwhySMcokTAgQCBAUCGQGBOh+CLTQhBCFeEBWCPwmCUxwZg?= =?us-ascii?q?WJjAYkwLIIZAQEB?= X-IronPort-AV: E=Sophos;i="5.44,432,1505779200"; d="scan'208";a="6030990" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from updc3cpa01.eemsg.mail.mil ([214.24.27.40]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 21 Nov 2017 09:49:42 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;6353c263-1d87-4bcd-bfaa-0736826eb78f Received: from localhost.localdomain (localhost [127.0.0.1]) by UPDCF3IC15.oob.disa.mil (Postfix) with SMTP id 3yh15d3jl8z3GDHF; Tue, 21 Nov 2017 09:49:41 +0000 (UTC) Received: from UPDC3CPA02.eemsg.mil (unknown [192.168.18.9]) by UPDCF3IC15.oob.disa.mil (Postfix) with ESMTP id 3yh15Y3tzTz3GDHC; Tue, 21 Nov 2017 09:49:37 +0000 (UTC) Authentication-Results: UPDC3CPA02.eemsg.mail.mil; dkim=neutral (message not signed) header.i=none X-EEMSG-check-008: 188585821|UPDC3CPA02_EEMSG_MP18.csd.disa.mil X-EEMSG-check-001: false X-EEMSG-SBRS: 3.5 X-EEMSG-ORIG-IP: 156.151.31.81 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BkAADC9RNah1Efl5xTCBkBAQEBAQEBAQEBAQEHAQEBAQGDEIESbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBEwEBAQgNCQgoL4UeAQMdDRM/KQMDAQJ+DgESiFKBUAQBC6ogOosCAQEIAgElgzSCB4M+NIdtDQGGDwWRdJBKh3KPMGKJMIciAoxyiRMCBAIEBQIZAYE6H4ItNCEEIV4QFYI/CYJTEAwZgWJjAYkwLIIZAQEB X-IPAS-Result: A0BkAADC9RNah1Efl5xTCBkBAQEBAQEBAQEBAQEHAQEBAQGDEIESbieOHo8qgVeXCBCCAQolhRaFAj8YAQEBAQEBAQEBEwEBAQgNCQgoL4UeAQMdDRM/KQMDAQJ+DgESiFKBUAQBC6ogOosCAQEIAgElgzSCB4M+NIdtDQGGDwWRdJBKh3KPMGKJMIciAoxyiRMCBAIEBQIZAYE6H4ItNCEEIV4QFYI/CYJTEAwZgWJjAYkwLIIZAQEB Received: from userp1040.oracle.com ([156.151.31.81]) by UPDC3CPA02.eemsg.mail.mil with ESMTP; 21 Nov 2017 09:49:35 +0000 Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id vAL9nWKR009179 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 21 Nov 2017 09:49:32 GMT Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id vAL9nVBv029569 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 21 Nov 2017 09:49:32 GMT Received: from abhmp0013.oracle.com (abhmp0013.oracle.com [141.146.116.19]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id vAL9nT6u026617; Tue, 21 Nov 2017 09:49:31 GMT Received: from t440 (/58.166.67.31) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 21 Nov 2017 01:49:29 -0800 Date: Tue, 21 Nov 2017 20:49:23 +1100 (AEDT) X-EEMSG-check-009: 444-444 From: James Morris X-X-Sender: james.l.morris@localhost To: Stephen Smalley , selinux@tycho.nsa.gov Message-ID: User-Agent: Alpine 2.20 (LFD 67 2015-01-07) MIME-Version: 1.0 X-Source-IP: userv0021.oracle.com [156.151.31.71] Subject: [RFC][PATCH][v0.2] selinuxns: extend namespace support to security.selinux xattrs X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: linux-security-module@vger.kernel.org Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP This is an updated version of the patch which I first posted here: http://kernsec.org/pipermail/linux-security-module-archive/2017-October/004053.html I've incorporated some of the feedback provided, as follows: 1. The init namespace is now an empty string, rather than a hidden "init". 2. The ".ns." field for namespaced SELinux xattrs has been removed. 3. Namespace names are now hierarchical, and always include parent namespace names preceding the current namespace. As before, this works transparently for normal applications. Some usage examples with this patch: - Create a namespace "VM1": # echo VM1 > /sys/fs/selinux/unshare # unshare -m -n # umount /sys/fs/selinux && mount -t selinuxfs none /sys/fs/selinux && load_policy # runcon unconfined_u:unconfined_r:unconfined_t:s0:c0.c1023 /bin/bash # setenforce 1 # cat /sys/fs/selinux/unshare VM1 - Note that the current directory appears unlabeled: # ls -dZ drwxr-xr-x. root root system_u:object_r:unlabeled_t:s0 . - If you create a file, it will also thus be unlabeled: # touch b # ls -Z -rw-r--r--. root root unconfined_u:object_r:unlabeled_t:s0 b - With the current code, you need to manually label the current directory if you want labeling to work correctly: # restorecon -v . restorecon reset /root/selinux/test context system_u:object_r:unlabeled_t:s0->system_u:object_r:admin_home_t:s0 # touch c # ls -lZ -rw-r--r--. root root unconfined_u:object_r:unlabeled_t:s0 b -rw-r--r--. root root unconfined_u:object_r:admin_home_t:s0 c - The on-disk label looks like this: # getfattr -d -m . c # file: c security.selinux.VM1="unconfined_u:object_r:admin_home_t:s0" - Now, create a nested namespace, "VM2": # echo VM2 > /sys/fs/selinux/unshare # unshare -m -n # umount /sys/fs/selinux && mount -t selinuxfs none /sys/fs/selinux && load_policy # runcon unconfined_u:unconfined_r:unconfined_t:s0:c0.c1023 /bin/bash # setenforce 1 # cat /sys/fs/selinux/unshare VM1.VM2 - Label .: # restorecon -v . restorecon reset /root/selinux/test context system_u:object_r:unlabeled_t:s0->system_u:object_r:admin_home_t:s0 - Create a new file (note files from parent namespace are unlabled in this one): # touch d # ls -Z -rw-r--r--. root root system_u:object_r:unlabeled_t:s0 b -rw-r--r--. root root system_u:object_r:unlabeled_t:s0 c -rw-r--r--. root root unconfined_u:object_r:admin_home_t:s0 d - Relabel the file: # chcon -t etc_t d # ls -Z d -rw-r--r--. root root unconfined_u:object_r:etc_t:s0 d - View the on-disk label: # getfattr -d -m . d # file: d security.selinux.VM1.VM2="unconfined_u:object_r:etc_t:s0" There's a lot more work to do but I figured it would be useful for folk to see the hierarchical namespacing changes. Feedback welcome! Next TODO items: - Perform labeling of files in ancestor namespaces upon creation in a child namespace. - Label inheritence & label sharing (both ro/rw). --- From 91bcb0b9fe058d9b7b0de1d5a1c22e5e7303989a Mon Sep 17 00:00:00 2001 From: James Morris Date: Tue, 21 Nov 2017 19:45:22 +1100 Subject: [PATCH] selinuxns: extend namespace support to security.selinux xattrs RFC v0.2 Signed-off-by: James Morris --- fs/xattr.c | 12 +++-- include/linux/lsm_hooks.h | 2 + include/linux/security.h | 6 +++ include/linux/xattr.h | 2 +- security/integrity/evm/evm_crypto.c | 2 +- security/integrity/ima/ima_appraise.c | 2 +- security/security.c | 6 +++ security/selinux/hooks.c | 95 +++++++++++++++++++++++++++++++---- security/selinux/include/security.h | 7 ++- security/selinux/selinuxfs.c | 63 ++++++++++++++--------- security/smack/smack_lsm.c | 2 +- 11 files changed, 159 insertions(+), 40 deletions(-) diff --git a/fs/xattr.c b/fs/xattr.c index 4424f7f..d8107b7 100644 --- a/fs/xattr.c +++ b/fs/xattr.c @@ -157,6 +157,7 @@ * * @dentry - object to perform setxattr on * @name - xattr name to set + * @nsname - namespaced xattr name, use instead of @name if set * @value - value to set @name to * @size - size of @value * @flags - flags to pass into filesystem operations @@ -168,7 +169,7 @@ * permission checks. */ int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, - const void *value, size_t size, int flags) + const char *nsname, const void *value, size_t size, int flags) { struct inode *inode = dentry->d_inode; int error = -EAGAIN; @@ -178,7 +179,8 @@ int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, if (issec) inode->i_flags &= ~S_NOSEC; if (inode->i_opflags & IOP_XATTR) { - error = __vfs_setxattr(dentry, inode, name, value, size, flags); + error = __vfs_setxattr(dentry, inode, nsname?:name, value, + size, flags); if (!error) { fsnotify_xattr(dentry); security_inode_post_setxattr(dentry, name, value, @@ -211,6 +213,7 @@ int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, { struct inode *inode = dentry->d_inode; int error; + char *nsname = NULL; error = xattr_permission(inode, name, MAY_WRITE); if (error) @@ -221,8 +224,11 @@ int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, if (error) goto out; - error = __vfs_setxattr_noperm(dentry, name, value, size, flags); + error = security_inode_translate_xattr_to_ns(name, &nsname); + if (error) + goto out; + error = __vfs_setxattr_noperm(dentry, name, nsname, value, size, flags); out: inode_unlock(inode); return error; diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index c925812..e4eb43e 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1480,6 +1480,7 @@ void (*inode_getsecid)(struct inode *inode, u32 *secid); int (*inode_copy_up)(struct dentry *src, struct cred **new); int (*inode_copy_up_xattr)(const char *name); + int (*inode_translate_xattr_to_ns)(const char *name, char **tr); int (*file_permission)(struct file *file, int mask); int (*file_alloc_security)(struct file *file); @@ -1760,6 +1761,7 @@ struct security_hook_heads { struct list_head inode_getsecid; struct list_head inode_copy_up; struct list_head inode_copy_up_xattr; + struct list_head inode_translate_xattr_to_ns; struct list_head file_permission; struct list_head file_alloc_security; struct list_head file_free_security; diff --git a/include/linux/security.h b/include/linux/security.h index ce62659..64297e1 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -302,6 +302,7 @@ void security_inode_post_setxattr(struct dentry *dentry, const char *name, void security_inode_getsecid(struct inode *inode, u32 *secid); int security_inode_copy_up(struct dentry *src, struct cred **new); int security_inode_copy_up_xattr(const char *name); +int security_inode_translate_xattr_to_ns(const char *name, char **tr); int security_file_permission(struct file *file, int mask); int security_file_alloc(struct file *file); void security_file_free(struct file *file); @@ -808,6 +809,11 @@ static inline int security_inode_copy_up_xattr(const char *name) return -EOPNOTSUPP; } +static inline int security_inode_translate_xattr_to_ns(const char *name, char **tr) +{ + return 0; +} + static inline int security_file_permission(struct file *file, int mask) { return 0; diff --git a/include/linux/xattr.h b/include/linux/xattr.h index e77605a..c25eb8a 100644 --- a/include/linux/xattr.h +++ b/include/linux/xattr.h @@ -50,7 +50,7 @@ struct xattr { ssize_t vfs_getxattr(struct dentry *, const char *, void *, size_t); ssize_t vfs_listxattr(struct dentry *d, char *list, size_t size); int __vfs_setxattr(struct dentry *, struct inode *, const char *, const void *, size_t, int); -int __vfs_setxattr_noperm(struct dentry *, const char *, const void *, size_t, int); +int __vfs_setxattr_noperm(struct dentry *, const char *, const char *, const void *, size_t, int); int vfs_setxattr(struct dentry *, const char *, const void *, size_t, int); int __vfs_removexattr(struct dentry *, const char *); int vfs_removexattr(struct dentry *, const char *); diff --git a/security/integrity/evm/evm_crypto.c b/security/integrity/evm/evm_crypto.c index 1d32cd2..2249186 100644 --- a/security/integrity/evm/evm_crypto.c +++ b/security/integrity/evm/evm_crypto.c @@ -260,7 +260,7 @@ int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, if (rc == 0) { xattr_data.type = EVM_XATTR_HMAC; rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_EVM, - &xattr_data, + NULL, &xattr_data, sizeof(xattr_data), 0); } else if (rc == -ENODATA && (inode->i_opflags & IOP_XATTR)) { rc = __vfs_removexattr(dentry, XATTR_NAME_EVM); diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c index 809ba70..914cf5f 100644 --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -71,7 +71,7 @@ static int ima_fix_xattr(struct dentry *dentry, iint->ima_hash->xattr.ng.algo = algo; } rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_IMA, - &iint->ima_hash->xattr.data[offset], + NULL, &iint->ima_hash->xattr.data[offset], (sizeof(iint->ima_hash->xattr) - offset) + iint->ima_hash->length, 0); return rc; diff --git a/security/security.c b/security/security.c index 4bf0f57..7fce259 100644 --- a/security/security.c +++ b/security/security.c @@ -856,6 +856,12 @@ int security_inode_copy_up_xattr(const char *name) } EXPORT_SYMBOL(security_inode_copy_up_xattr); +int security_inode_translate_xattr_to_ns(const char *name, char **tr) +{ + return call_int_hook(inode_translate_xattr_to_ns, 0, name, tr); +} +EXPORT_SYMBOL(security_inode_translate_xattr_to_ns); + int security_file_permission(struct file *file, int mask) { int ret; diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 3daad14..e439ce2 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -646,6 +646,16 @@ static int selinux_is_sblabel_mnt(struct super_block *sb) !strcmp(sb->s_type->name, "cgroup2"))); } +static char *current_xattr_suffix(void) +{ + return current_selinux_ns->xattr_name + XATTR_SECURITY_PREFIX_LEN; +} + +static char *current_xattr_name(void) +{ + return current_selinux_ns->xattr_name; +} + static int sb_finish_set_opts(struct super_block *sb) { struct superblock_security_struct *sbsec = superblock_security(sb); @@ -654,6 +664,8 @@ static int sb_finish_set_opts(struct super_block *sb) int rc = 0; if (sbsec->behavior == SECURITY_FS_USE_XATTR) { + char *name; + /* Make sure that the xattr handler exists and that no error other than -ENODATA is returned by getxattr on the root directory. -ENODATA is ok, as this may be @@ -666,7 +678,9 @@ static int sb_finish_set_opts(struct super_block *sb) goto out; } - rc = __vfs_getxattr(root, root_inode, XATTR_NAME_SELINUX, NULL, 0); + name = current_xattr_name(); + + rc = __vfs_getxattr(root, root_inode, name, NULL, 0); if (rc < 0 && rc != -ENODATA) { if (rc == -EOPNOTSUPP) printk(KERN_WARNING "SELinux: (dev %s, type " @@ -1660,6 +1674,7 @@ static int inode_doinit_with_dentry(struct inode *inode, char *context = NULL; unsigned len = 0; int rc = 0; + char *name; if (isec->initialized == LABEL_INITIALIZED) return 0; @@ -1729,12 +1744,14 @@ static int inode_doinit_with_dentry(struct inode *inode, goto out; } context[len] = '\0'; - rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, context, len); + + name = current_xattr_name(); + rc = __vfs_getxattr(dentry, inode, name, context, len); if (rc == -ERANGE) { kfree(context); /* Need a larger buffer. Query for the right size. */ - rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, NULL, 0); + rc = __vfs_getxattr(dentry, inode, name, NULL, 0); if (rc < 0) { dput(dentry); goto out; @@ -1747,7 +1764,7 @@ static int inode_doinit_with_dentry(struct inode *inode, goto out; } context[len] = '\0'; - rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, context, len); + rc = __vfs_getxattr(dentry, inode, name, context, len); } dput(dentry); if (rc < 0) { @@ -3167,7 +3184,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir, return -EOPNOTSUPP; if (name) - *name = XATTR_SELINUX_SUFFIX; + *name = current_xattr_suffix(); if (value && len) { rc = security_sid_to_context_force(current_selinux_ns, newsid, @@ -3382,6 +3399,10 @@ static bool has_cap_mac_admin(bool audit) return true; } +/* TODO: + * - audit + * - handle raw namespaced xattrs + */ static int selinux_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) { @@ -3392,8 +3413,12 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name, u32 newsid, sid = current_sid(); int rc = 0; - if (strcmp(name, XATTR_NAME_SELINUX)) + if (strcmp(name, XATTR_NAME_SELINUX)) { + /* No raw namespaced xattrs, yet */ + if (!strncmp(name, XATTR_NAME_SELINUX, strlen(XATTR_NAME_SELINUX))) + return -EACCES; return selinux_inode_setotherxattr(dentry, name); + } sbsec = superblock_security(inode->i_sb); if (!(sbsec->flags & SBLABEL_MNT)) @@ -3640,6 +3665,13 @@ static int selinux_inode_copy_up_xattr(const char *name) return -EOPNOTSUPP; } +static int selinux_inode_translate_xattr_to_ns(const char *name, char **tr) +{ + if(!strcmp(name, XATTR_NAME_SELINUX)) + *tr = current_xattr_name(); + return 0; +} + /* file security operations */ static int selinux_revalidate_file_permission(struct file *file, int mask) @@ -6430,10 +6462,11 @@ static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen /* * called with inode->i_mutex locked + * TODO: namespace translation */ static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) { - return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0); + return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, NULL, ctx, ctxlen, 0); } static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) @@ -6647,6 +6680,7 @@ static void selinux_ib_free_security(void *ib_sec) LSM_HOOK_INIT(inode_getsecid, selinux_inode_getsecid), LSM_HOOK_INIT(inode_copy_up, selinux_inode_copy_up), LSM_HOOK_INIT(inode_copy_up_xattr, selinux_inode_copy_up_xattr), + LSM_HOOK_INIT(inode_translate_xattr_to_ns, selinux_inode_translate_xattr_to_ns), LSM_HOOK_INIT(file_permission, selinux_file_permission), LSM_HOOK_INIT(file_alloc_security, selinux_file_alloc_security), @@ -6805,7 +6839,37 @@ static void selinux_ib_free_security(void *ib_sec) static void selinux_ns_free(struct work_struct *work); -int selinux_ns_create(struct selinux_ns *parent, struct selinux_ns **ns) +static int selinux_ns_create_name(struct selinux_ns *parent, struct selinux_ns *newns, const char *name) +{ + int rc = 0; + + if (parent && parent->parent) + newns->name = kasprintf(GFP_KERNEL, "%s.%s", parent->name, name); + else + newns->name = kstrdup(name, GFP_KERNEL); + + if (!newns->name) + rc = -ENOMEM; + + return rc; +} + +static int selinux_ns_create_xattr_name(struct selinux_ns *parent, struct selinux_ns *newns) +{ + int rc = 0; + + if (!parent) + newns->xattr_name = kstrdup(XATTR_NAME_SELINUX, GFP_KERNEL); + else + newns->xattr_name = kasprintf(GFP_KERNEL, "%s.%s", XATTR_NAME_SELINUX, newns->name); + + if (!newns->xattr_name) + rc = -ENOMEM; + + return rc; +} + +int selinux_ns_create(struct selinux_ns *parent, struct selinux_ns **ns, const char *name) { struct selinux_ns *newns; int rc; @@ -6825,14 +6889,25 @@ int selinux_ns_create(struct selinux_ns *parent, struct selinux_ns **ns) if (rc) goto err; + rc = selinux_ns_create_name(parent, newns, name); + if (rc) + goto err_avc; + + rc = selinux_ns_create_xattr_name(parent, newns); + if (rc) + goto err_avc; + if (parent) newns->parent = get_selinux_ns(parent); *ns = newns; return 0; +err_avc: + selinux_avc_free(newns->avc); err: selinux_ss_free(newns->ss); kfree(newns); + kfree(newns->name); return rc; } @@ -6845,6 +6920,8 @@ static void selinux_ns_free(struct work_struct *work) parent = ns->parent; selinux_ss_free(ns->ss); selinux_avc_free(ns->avc); + kfree(ns->name); + kfree(ns->xattr_name); kfree(ns); ns = parent; } while (ns && refcount_dec_and_test(&ns->count)); @@ -6869,7 +6946,7 @@ static __init int selinux_init(void) printk(KERN_INFO "SELinux: Initializing.\n"); - if (selinux_ns_create(NULL, &init_selinux_ns)) + if (selinux_ns_create(NULL, &init_selinux_ns, SELINUX_NS_INIT_NAME)) panic("SELinux: Could not create initial namespace\n"); set_ns_enforcing(init_selinux_ns, selinux_enforcing_boot); diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index b80f9bd..300cc8a 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -92,6 +92,9 @@ enum { /* limitation of boundary depth */ #define POLICYDB_BOUNDS_MAXDEPTH 4 +/* Name of SELinux initial namespace */ +#define SELINUX_NS_INIT_NAME "" + struct selinux_avc; struct selinux_ss; @@ -108,9 +111,11 @@ struct selinux_ns { struct selinux_avc *avc; struct selinux_ss *ss; struct selinux_ns *parent; + char *name; + char *xattr_name; }; -int selinux_ns_create(struct selinux_ns *parent, struct selinux_ns **ns); +int selinux_ns_create(struct selinux_ns *parent, struct selinux_ns **ns, const char *name); void __put_selinux_ns(struct selinux_ns *ns); int selinux_ss_create(struct selinux_ss **ss); diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c index 6c52d24..d190213 100644 --- a/security/selinux/selinuxfs.c +++ b/security/selinux/selinuxfs.c @@ -334,9 +334,10 @@ static ssize_t sel_write_unshare(struct file *file, const char __user *buf, { struct selinux_fs_info *fsi = file_inode(file)->i_sb->s_fs_info; struct selinux_ns *ns = fsi->ns; + struct cred *cred; + struct task_security_struct *tsec; char *page; ssize_t length; - bool set; int rc; if (ns != current_selinux_ns) @@ -359,30 +360,32 @@ static ssize_t sel_write_unshare(struct file *file, const char __user *buf, if (IS_ERR(page)) return PTR_ERR(page); - length = -EINVAL; - if (kstrtobool(page, &set)) - goto out; + /* strip any trailing newline */ + if (page[strlen(page) - 1] == '\n') + page[strlen(page) - 1] = 0; - if (set) { - struct cred *cred = prepare_creds(); - struct task_security_struct *tsec; + /* TODO: check for uniqueness! */ + if (!strcmp(SELINUX_NS_INIT_NAME, page)) { + length = -EINVAL; + goto out; + } - if (!cred) { - length = -ENOMEM; - goto out; - } - tsec = cred->security; - if (selinux_ns_create(ns, &tsec->ns)) { - abort_creds(cred); - length = -ENOMEM; - goto out; - } - tsec->osid = tsec->sid = SECINITSID_KERNEL; - tsec->exec_sid = tsec->create_sid = tsec->keycreate_sid = - tsec->sockcreate_sid = SECSID_NULL; - tsec->parent_cred = get_current_cred(); - commit_creds(cred); + cred = prepare_creds(); + if (!cred) { + length = -ENOMEM; + goto out; + } + tsec = cred->security; + if (selinux_ns_create(ns, &tsec->ns, page)) { + abort_creds(cred); + length = -ENOMEM; + goto out; } + tsec->osid = tsec->sid = SECINITSID_KERNEL; + tsec->exec_sid = tsec->create_sid = tsec->keycreate_sid = + tsec->sockcreate_sid = SECSID_NULL; + tsec->parent_cred = get_current_cred(); + commit_creds(cred); length = count; out: @@ -390,8 +393,22 @@ static ssize_t sel_write_unshare(struct file *file, const char __user *buf, return length; } +static ssize_t sel_read_unshare(struct file *file, char __user *buf, + size_t count, loff_t *ppos) +{ + struct selinux_fs_info *fsi = file_inode(file)->i_sb->s_fs_info; + struct selinux_ns *ns = fsi->ns; + char *name = ns->name; + + if (ns != current_selinux_ns) + return -EPERM; + + return simple_read_from_buffer(buf, count, ppos, name, strlen(name)); +} + static const struct file_operations sel_unshare_ops = { .write = sel_write_unshare, + .read = sel_read_unshare, .llseek = generic_file_llseek, }; @@ -2021,7 +2038,7 @@ static int sel_fill_super(struct super_block *sb, void *data, int silent) [SEL_POLICY] = {"policy", &sel_policy_ops, S_IRUGO}, [SEL_VALIDATE_TRANS] = {"validatetrans", &sel_transition_ops, S_IWUGO}, - [SEL_UNSHARE] = {"unshare", &sel_unshare_ops, 0222}, + [SEL_UNSHARE] = {"unshare", &sel_unshare_ops, 0666}, /* last one */ {""} }; diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 319add3..5ea841f 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -4591,7 +4591,7 @@ static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) { - return __vfs_setxattr_noperm(dentry, XATTR_NAME_SMACK, ctx, ctxlen, 0); + return __vfs_setxattr_noperm(dentry, XATTR_NAME_SMACK, NULL, ctx, ctxlen, 0); } static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen)