aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2015-11-05 16:39:24 -0500
committerDavid S. Miller <davem@davemloft.net>2015-11-05 16:45:51 -0500
commit212cd0895330b775f2db49451f046a5ca4e5704b (patch)
treec4f9be4c046587df4fad72299a5888096153f4c9 /security/selinux/hooks.c
parent432599d7a7062ad7e37e72601607dc35596afe40 (diff)
selinux: fix random read in selinux_ip_postroute_compat()
In commit e446f9dfe17b ("net: synack packets can be attached to request sockets"), I missed one remaining case of invalid skb->sk->sk_security access. Dmitry Vyukov got a KASan report pointing to it. Add selinux_skb_sk() helper that is responsible to get back to the listener if skb is attached to a request socket, instead of duplicating the logic. Fixes: ca6fb0651883 ("tcp: attach SYNACK messages to request sockets instead of listener") Signed-off-by: Eric Dumazet <edumazet@google.com> Reported-by: Dmitry Vyukov <dvyukov@google.com> Cc: Paul Moore <paul@paul-moore.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c18
1 files changed, 14 insertions, 4 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 26f4039d54b8..c9b2d5467477 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -4931,11 +4931,23 @@ static unsigned int selinux_ipv4_output(void *priv,
4931 return selinux_ip_output(skb, PF_INET); 4931 return selinux_ip_output(skb, PF_INET);
4932} 4932}
4933 4933
4934/* SYNACK messages might be attached to request sockets.
4935 * To get back to sk_security, we need to look at the listener.
4936 */
4937static struct sock *selinux_skb_sk(const struct sk_buff *skb)
4938{
4939 struct sock *sk = skb->sk;
4940
4941 if (sk && sk->sk_state == TCP_NEW_SYN_RECV)
4942 sk = inet_reqsk(sk)->rsk_listener;
4943 return sk;
4944}
4945
4934static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb, 4946static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
4935 int ifindex, 4947 int ifindex,
4936 u16 family) 4948 u16 family)
4937{ 4949{
4938 struct sock *sk = skb->sk; 4950 struct sock *sk = selinux_skb_sk(skb);
4939 struct sk_security_struct *sksec; 4951 struct sk_security_struct *sksec;
4940 struct common_audit_data ad; 4952 struct common_audit_data ad;
4941 struct lsm_network_audit net = {0,}; 4953 struct lsm_network_audit net = {0,};
@@ -4990,7 +5002,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb,
4990 if (!secmark_active && !peerlbl_active) 5002 if (!secmark_active && !peerlbl_active)
4991 return NF_ACCEPT; 5003 return NF_ACCEPT;
4992 5004
4993 sk = skb->sk; 5005 sk = selinux_skb_sk(skb);
4994 5006
4995#ifdef CONFIG_XFRM 5007#ifdef CONFIG_XFRM
4996 /* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec 5008 /* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec
@@ -5035,8 +5047,6 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb,
5035 u32 skb_sid; 5047 u32 skb_sid;
5036 struct sk_security_struct *sksec; 5048 struct sk_security_struct *sksec;
5037 5049
5038 if (sk->sk_state == TCP_NEW_SYN_RECV)
5039 sk = inet_reqsk(sk)->rsk_listener;
5040 sksec = sk->sk_security; 5050 sksec = sk->sk_security;
5041 if (selinux_skb_peerlbl_sid(skb, family, &skb_sid)) 5051 if (selinux_skb_peerlbl_sid(skb, family, &skb_sid))
5042 return NF_DROP; 5052 return NF_DROP;