BACKPORT: Smack: Assign smack_known_web label for kernel thread's
authorjooseong lee <jooseong.lee@samsung.com>
Thu, 3 Nov 2016 10:54:39 +0000 (11:54 +0100)
committerRafal Krypa <r.krypa@samsung.com>
Mon, 21 Nov 2016 15:30:51 +0000 (16:30 +0100)
Assign smack_known_web label for kernel thread's socket

Creating struct sock by sk_alloc function in various kernel subsystems
like bluetooth doesn't call smack_socket_post_create(). In such case,
received sock label is the floor('_') label and makes access deny.

Signed-off-by: jooseong lee <jooseong.lee@samsung.com>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
(cherry-picked from upstream 08382c9f6efe08b8bb30645c2744480cbd8f161a)

security/smack/smack_lsm.c

index 137163b8b3c658e5122e953762b7d30c2c4c92df..2c3d060c98a2e0cf847fae9f97c6e20767a84695 100644 (file)
@@ -2314,8 +2314,16 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags)
        if (ssp == NULL)
                return -ENOMEM;
 
-       ssp->smk_in = skp;
-       ssp->smk_out = skp;
+       /*
+        * Sockets created by kernel threads receive web label.
+        */
+       if (unlikely(current->flags & PF_KTHREAD)) {
+               ssp->smk_in = &smack_known_web;
+               ssp->smk_out = &smack_known_web;
+       } else {
+               ssp->smk_in = skp;
+               ssp->smk_out = skp;
+       }
        ssp->smk_packet = NULL;
 
        sk->sk_security = ssp;