On Wed, 2018-01-10 at 11:37 -0500, Paul Moore wrote: > On Sat, Dec 30, 2017 at 12:20 PM, Richard Haines > <richard_c_haines@xxxxxxxxxxxxxx> wrote: > > The SELinux SCTP implementation is explained in: > > Documentation/security/SELinux-sctp.rst > > > > Signed-off-by: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx> > > --- > > Documentation/security/SELinux-sctp.rst | 157 ++++++++++++++++++ > > security/selinux/hooks.c | 280 > > +++++++++++++++++++++++++++++--- > > security/selinux/include/classmap.h | 2 +- > > security/selinux/include/netlabel.h | 21 ++- > > security/selinux/include/objsec.h | 4 + > > security/selinux/netlabel.c | 138 ++++++++++++++-- > > 6 files changed, 570 insertions(+), 32 deletions(-) > > create mode 100644 Documentation/security/SELinux-sctp.rst > > ... > > > +/** > > + * selinux_netlbl_socket_connect - Label a client-side socket on > > connect > > + * @sk: the socket to label > > + * @addr: the destination address > > + * > > + * Description: > > + * Attempt to label a connected socket with NetLabel using the > > given address. > > + * Returns zero values on success, negative values on failure. > > + * > > + */ > > +int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr > > *addr) > > +{ > > + int rc; > > + struct sk_security_struct *sksec = sk->sk_security; > > + > > + if (sksec->nlbl_state != NLBL_REQSKB && > > + sksec->nlbl_state != NLBL_CONNLABELED) > > + return 0; > > + > > + lock_sock(sk); > > + rc = selinux_netlbl_socket_connect_helper(sk, addr); > > release_sock(sk); > > + > > return rc; > > } > > + > > +/** > > + * selinux_netlbl_socket_connect_locked - Label a client-side > > socket on > > + * connect > > + * @sk: the socket to label > > + * @addr: the destination address > > + * > > + * Description: > > + * Attempt to label a connected socket that already has the socket > > locked > > + * with NetLabel using the given address. > > + * Returns zero values on success, negative values on failure. > > + * > > + */ > > +int selinux_netlbl_socket_connect_locked(struct sock *sk, > > + struct sockaddr *addr) > > +{ > > + struct sk_security_struct *sksec = sk->sk_security; > > + > > + if (sksec->nlbl_state != NLBL_REQSKB && > > + sksec->nlbl_state != NLBL_CONNLABELED) > > + return 0; > > + > > + return selinux_netlbl_socket_connect_helper(sk, addr); > > +} > > [Sorry for the review delay, the holidays and some associated travel > made it hard to find some quiet time to look at the latest patches.] > > I probably should have been a bit more clear in my last comment, but > what I had in mind was something like the following: > > int selinux_netlbl_socket_connect_locked(...) > { > if (sksec->nlbl_state ...) > return 0; > > return selinux_netlbl_socket_connect_helper(); > } > > int selinux_netlbl_socket_connect(...) > { > int rc; > > lock_sock(); > rc = selinux_netlbl_socket_connect_locked(); > release_sock(); > > return rc; > } > > Yes, you do end up checking nlbl_state while the socket lock is held, > but I believe the benefit of consolidating the code outweighs any > additional overhead (I believe it would be "noise" anyway). Okay I'll send an updated [PATCH V5 4/4] tomorrow. > > Otherwise, this all looks good to me. >