BACKPORT: Smack: Assign smack_known_web label for kernel thread's
authorjooseong lee <jooseong.lee@samsung.com>
Thu, 3 Nov 2016 10:54:39 +0000 (11:54 +0100)
committerRafal Krypa <r.krypa@samsung.com>
Mon, 21 Nov 2016 16:02:10 +0000 (17:02 +0100)
Assign smack_known_web label for kernel thread's socket

Creating struct sock by sk_alloc function in various kernel subsystems
like bluetooth doesn't call smack_socket_post_create(). In such case,
received sock label is the floor('_') label and makes access deny.

Signed-off-by: jooseong lee <jooseong.lee@samsung.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
(cherry-picked from upstream 08382c9f6efe08b8bb30645c2744480cbd8f161a)

security/smack/smack_lsm.c

index 5d0ff5d30bf305694b76315778862de44b05de96..c29f824c7c1c0fe6c4dcb055dd8d6401389eab1f 100644 (file)
@@ -2326,8 +2326,16 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags)
        if (ssp == NULL)
                return -ENOMEM;
 
-       ssp->smk_in = skp;
-       ssp->smk_out = skp;
+       /*
+        * Sockets created by kernel threads receive web label.
+        */
+       if (unlikely(current->flags & PF_KTHREAD)) {
+               ssp->smk_in = &smack_known_web;
+               ssp->smk_out = &smack_known_web;
+       } else {
+               ssp->smk_in = skp;
+               ssp->smk_out = skp;
+       }
        ssp->smk_packet = NULL;
 
        sk->sk_security = ssp;