diff options
Diffstat (limited to 'security/smack/smack_lsm.c')
| -rw-r--r-- | security/smack/smack_lsm.c | 126 |
1 files changed, 77 insertions, 49 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index b9c5e149903b..fb915163f967 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
| @@ -516,6 +516,8 @@ static int smack_inode_init_security(struct inode *inode, struct inode *dir, | |||
| 516 | const struct qstr *qstr, char **name, | 516 | const struct qstr *qstr, char **name, |
| 517 | void **value, size_t *len) | 517 | void **value, size_t *len) |
| 518 | { | 518 | { |
| 519 | struct smack_known *skp; | ||
| 520 | char *csp = smk_of_current(); | ||
| 519 | char *isp = smk_of_inode(inode); | 521 | char *isp = smk_of_inode(inode); |
| 520 | char *dsp = smk_of_inode(dir); | 522 | char *dsp = smk_of_inode(dir); |
| 521 | int may; | 523 | int may; |
| @@ -527,8 +529,9 @@ static int smack_inode_init_security(struct inode *inode, struct inode *dir, | |||
| 527 | } | 529 | } |
| 528 | 530 | ||
| 529 | if (value) { | 531 | if (value) { |
| 532 | skp = smk_find_entry(csp); | ||
| 530 | rcu_read_lock(); | 533 | rcu_read_lock(); |
| 531 | may = smk_access_entry(smk_of_current(), dsp, &smack_rule_list); | 534 | may = smk_access_entry(csp, dsp, &skp->smk_rules); |
| 532 | rcu_read_unlock(); | 535 | rcu_read_unlock(); |
| 533 | 536 | ||
| 534 | /* | 537 | /* |
| @@ -1138,6 +1141,7 @@ static int smack_file_mmap(struct file *file, | |||
| 1138 | unsigned long flags, unsigned long addr, | 1141 | unsigned long flags, unsigned long addr, |
| 1139 | unsigned long addr_only) | 1142 | unsigned long addr_only) |
| 1140 | { | 1143 | { |
| 1144 | struct smack_known *skp; | ||
| 1141 | struct smack_rule *srp; | 1145 | struct smack_rule *srp; |
| 1142 | struct task_smack *tsp; | 1146 | struct task_smack *tsp; |
| 1143 | char *sp; | 1147 | char *sp; |
| @@ -1170,6 +1174,7 @@ static int smack_file_mmap(struct file *file, | |||
| 1170 | 1174 | ||
| 1171 | tsp = current_security(); | 1175 | tsp = current_security(); |
| 1172 | sp = smk_of_current(); | 1176 | sp = smk_of_current(); |
| 1177 | skp = smk_find_entry(sp); | ||
| 1173 | rc = 0; | 1178 | rc = 0; |
| 1174 | 1179 | ||
| 1175 | rcu_read_lock(); | 1180 | rcu_read_lock(); |
| @@ -1177,15 +1182,8 @@ static int smack_file_mmap(struct file *file, | |||
| 1177 | * For each Smack rule associated with the subject | 1182 | * For each Smack rule associated with the subject |
| 1178 | * label verify that the SMACK64MMAP also has access | 1183 | * label verify that the SMACK64MMAP also has access |
| 1179 | * to that rule's object label. | 1184 | * to that rule's object label. |
| 1180 | * | ||
| 1181 | * Because neither of the labels comes | ||
| 1182 | * from the networking code it is sufficient | ||
| 1183 | * to compare pointers. | ||
| 1184 | */ | 1185 | */ |
| 1185 | list_for_each_entry_rcu(srp, &smack_rule_list, list) { | 1186 | list_for_each_entry_rcu(srp, &skp->smk_rules, list) { |
| 1186 | if (srp->smk_subject != sp) | ||
| 1187 | continue; | ||
| 1188 | |||
| 1189 | osmack = srp->smk_object; | 1187 | osmack = srp->smk_object; |
| 1190 | /* | 1188 | /* |
| 1191 | * Matching labels always allows access. | 1189 | * Matching labels always allows access. |
| @@ -1214,7 +1212,8 @@ static int smack_file_mmap(struct file *file, | |||
| 1214 | * If there isn't one a SMACK64MMAP subject | 1212 | * If there isn't one a SMACK64MMAP subject |
| 1215 | * can't have as much access as current. | 1213 | * can't have as much access as current. |
| 1216 | */ | 1214 | */ |
| 1217 | mmay = smk_access_entry(msmack, osmack, &smack_rule_list); | 1215 | skp = smk_find_entry(msmack); |
| 1216 | mmay = smk_access_entry(msmack, osmack, &skp->smk_rules); | ||
| 1218 | if (mmay == -ENOENT) { | 1217 | if (mmay == -ENOENT) { |
| 1219 | rc = -EACCES; | 1218 | rc = -EACCES; |
| 1220 | break; | 1219 | break; |
| @@ -1711,7 +1710,7 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) | |||
| 1711 | 1710 | ||
| 1712 | ssp->smk_in = csp; | 1711 | ssp->smk_in = csp; |
| 1713 | ssp->smk_out = csp; | 1712 | ssp->smk_out = csp; |
| 1714 | ssp->smk_packet[0] = '\0'; | 1713 | ssp->smk_packet = NULL; |
| 1715 | 1714 | ||
| 1716 | sk->sk_security = ssp; | 1715 | sk->sk_security = ssp; |
| 1717 | 1716 | ||
| @@ -2813,16 +2812,17 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg, | |||
| 2813 | return smack_netlabel_send(sock->sk, sip); | 2812 | return smack_netlabel_send(sock->sk, sip); |
| 2814 | } | 2813 | } |
| 2815 | 2814 | ||
| 2816 | |||
| 2817 | /** | 2815 | /** |
| 2818 | * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack | 2816 | * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack |
| 2819 | * @sap: netlabel secattr | 2817 | * @sap: netlabel secattr |
| 2820 | * @sip: where to put the result | 2818 | * @ssp: socket security information |
| 2821 | * | 2819 | * |
| 2822 | * Copies a smack label into sip | 2820 | * Returns a pointer to a Smack label found on the label list. |
| 2823 | */ | 2821 | */ |
| 2824 | static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | 2822 | static char *smack_from_secattr(struct netlbl_lsm_secattr *sap, |
| 2823 | struct socket_smack *ssp) | ||
| 2825 | { | 2824 | { |
| 2825 | struct smack_known *skp; | ||
| 2826 | char smack[SMK_LABELLEN]; | 2826 | char smack[SMK_LABELLEN]; |
| 2827 | char *sp; | 2827 | char *sp; |
| 2828 | int pcat; | 2828 | int pcat; |
| @@ -2852,15 +2852,43 @@ static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | |||
| 2852 | * we are already done. WeeHee. | 2852 | * we are already done. WeeHee. |
| 2853 | */ | 2853 | */ |
| 2854 | if (sap->attr.mls.lvl == smack_cipso_direct) { | 2854 | if (sap->attr.mls.lvl == smack_cipso_direct) { |
| 2855 | memcpy(sip, smack, SMK_MAXLEN); | 2855 | /* |
| 2856 | return; | 2856 | * The label sent is usually on the label list. |
| 2857 | * | ||
| 2858 | * If it is not we may still want to allow the | ||
| 2859 | * delivery. | ||
| 2860 | * | ||
| 2861 | * If the recipient is accepting all packets | ||
| 2862 | * because it is using the star ("*") label | ||
| 2863 | * for SMACK64IPIN provide the web ("@") label | ||
| 2864 | * so that a directed response will succeed. | ||
| 2865 | * This is not very correct from a MAC point | ||
| 2866 | * of view, but gets around the problem that | ||
| 2867 | * locking prevents adding the newly discovered | ||
| 2868 | * label to the list. | ||
| 2869 | * The case where the recipient is not using | ||
| 2870 | * the star label should obviously fail. | ||
| 2871 | * The easy way to do this is to provide the | ||
| 2872 | * star label as the subject label. | ||
| 2873 | */ | ||
| 2874 | skp = smk_find_entry(smack); | ||
| 2875 | if (skp != NULL) | ||
| 2876 | return skp->smk_known; | ||
| 2877 | if (ssp != NULL && | ||
| 2878 | ssp->smk_in == smack_known_star.smk_known) | ||
| 2879 | return smack_known_web.smk_known; | ||
| 2880 | return smack_known_star.smk_known; | ||
| 2857 | } | 2881 | } |
| 2858 | /* | 2882 | /* |
| 2859 | * Look it up in the supplied table if it is not | 2883 | * Look it up in the supplied table if it is not |
| 2860 | * a direct mapping. | 2884 | * a direct mapping. |
| 2861 | */ | 2885 | */ |
| 2862 | smack_from_cipso(sap->attr.mls.lvl, smack, sip); | 2886 | sp = smack_from_cipso(sap->attr.mls.lvl, smack); |
| 2863 | return; | 2887 | if (sp != NULL) |
| 2888 | return sp; | ||
| 2889 | if (ssp != NULL && ssp->smk_in == smack_known_star.smk_known) | ||
| 2890 | return smack_known_web.smk_known; | ||
| 2891 | return smack_known_star.smk_known; | ||
| 2864 | } | 2892 | } |
| 2865 | if ((sap->flags & NETLBL_SECATTR_SECID) != 0) { | 2893 | if ((sap->flags & NETLBL_SECATTR_SECID) != 0) { |
| 2866 | /* | 2894 | /* |
| @@ -2875,16 +2903,14 @@ static void smack_from_secattr(struct netlbl_lsm_secattr *sap, char *sip) | |||
| 2875 | * secid is from a fallback. | 2903 | * secid is from a fallback. |
| 2876 | */ | 2904 | */ |
| 2877 | BUG_ON(sp == NULL); | 2905 | BUG_ON(sp == NULL); |
| 2878 | strncpy(sip, sp, SMK_MAXLEN); | 2906 | return sp; |
| 2879 | return; | ||
| 2880 | } | 2907 | } |
| 2881 | /* | 2908 | /* |
| 2882 | * Without guidance regarding the smack value | 2909 | * Without guidance regarding the smack value |
| 2883 | * for the packet fall back on the network | 2910 | * for the packet fall back on the network |
| 2884 | * ambient value. | 2911 | * ambient value. |
| 2885 | */ | 2912 | */ |
| 2886 | strncpy(sip, smack_net_ambient, SMK_MAXLEN); | 2913 | return smack_net_ambient; |
| 2887 | return; | ||
| 2888 | } | 2914 | } |
| 2889 | 2915 | ||
| 2890 | /** | 2916 | /** |
| @@ -2898,7 +2924,6 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
| 2898 | { | 2924 | { |
| 2899 | struct netlbl_lsm_secattr secattr; | 2925 | struct netlbl_lsm_secattr secattr; |
| 2900 | struct socket_smack *ssp = sk->sk_security; | 2926 | struct socket_smack *ssp = sk->sk_security; |
| 2901 | char smack[SMK_LABELLEN]; | ||
| 2902 | char *csp; | 2927 | char *csp; |
| 2903 | int rc; | 2928 | int rc; |
| 2904 | struct smk_audit_info ad; | 2929 | struct smk_audit_info ad; |
| @@ -2911,10 +2936,9 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
| 2911 | netlbl_secattr_init(&secattr); | 2936 | netlbl_secattr_init(&secattr); |
| 2912 | 2937 | ||
| 2913 | rc = netlbl_skbuff_getattr(skb, sk->sk_family, &secattr); | 2938 | rc = netlbl_skbuff_getattr(skb, sk->sk_family, &secattr); |
| 2914 | if (rc == 0) { | 2939 | if (rc == 0) |
| 2915 | smack_from_secattr(&secattr, smack); | 2940 | csp = smack_from_secattr(&secattr, ssp); |
| 2916 | csp = smack; | 2941 | else |
| 2917 | } else | ||
| 2918 | csp = smack_net_ambient; | 2942 | csp = smack_net_ambient; |
| 2919 | 2943 | ||
| 2920 | netlbl_secattr_destroy(&secattr); | 2944 | netlbl_secattr_destroy(&secattr); |
| @@ -2951,15 +2975,19 @@ static int smack_socket_getpeersec_stream(struct socket *sock, | |||
| 2951 | int __user *optlen, unsigned len) | 2975 | int __user *optlen, unsigned len) |
| 2952 | { | 2976 | { |
| 2953 | struct socket_smack *ssp; | 2977 | struct socket_smack *ssp; |
| 2954 | int slen; | 2978 | char *rcp = ""; |
| 2979 | int slen = 1; | ||
| 2955 | int rc = 0; | 2980 | int rc = 0; |
| 2956 | 2981 | ||
| 2957 | ssp = sock->sk->sk_security; | 2982 | ssp = sock->sk->sk_security; |
| 2958 | slen = strlen(ssp->smk_packet) + 1; | 2983 | if (ssp->smk_packet != NULL) { |
| 2984 | rcp = ssp->smk_packet; | ||
| 2985 | slen = strlen(rcp) + 1; | ||
| 2986 | } | ||
| 2959 | 2987 | ||
| 2960 | if (slen > len) | 2988 | if (slen > len) |
| 2961 | rc = -ERANGE; | 2989 | rc = -ERANGE; |
| 2962 | else if (copy_to_user(optval, ssp->smk_packet, slen) != 0) | 2990 | else if (copy_to_user(optval, rcp, slen) != 0) |
| 2963 | rc = -EFAULT; | 2991 | rc = -EFAULT; |
| 2964 | 2992 | ||
| 2965 | if (put_user(slen, optlen) != 0) | 2993 | if (put_user(slen, optlen) != 0) |
| @@ -2982,8 +3010,8 @@ static int smack_socket_getpeersec_dgram(struct socket *sock, | |||
| 2982 | 3010 | ||
| 2983 | { | 3011 | { |
| 2984 | struct netlbl_lsm_secattr secattr; | 3012 | struct netlbl_lsm_secattr secattr; |
| 2985 | struct socket_smack *sp; | 3013 | struct socket_smack *ssp = NULL; |
| 2986 | char smack[SMK_LABELLEN]; | 3014 | char *sp; |
| 2987 | int family = PF_UNSPEC; | 3015 | int family = PF_UNSPEC; |
| 2988 | u32 s = 0; /* 0 is the invalid secid */ | 3016 | u32 s = 0; /* 0 is the invalid secid */ |
| 2989 | int rc; | 3017 | int rc; |
| @@ -2998,17 +3026,19 @@ static int smack_socket_getpeersec_dgram(struct socket *sock, | |||
| 2998 | family = sock->sk->sk_family; | 3026 | family = sock->sk->sk_family; |
| 2999 | 3027 | ||
| 3000 | if (family == PF_UNIX) { | 3028 | if (family == PF_UNIX) { |
| 3001 | sp = sock->sk->sk_security; | 3029 | ssp = sock->sk->sk_security; |
| 3002 | s = smack_to_secid(sp->smk_out); | 3030 | s = smack_to_secid(ssp->smk_out); |
| 3003 | } else if (family == PF_INET || family == PF_INET6) { | 3031 | } else if (family == PF_INET || family == PF_INET6) { |
| 3004 | /* | 3032 | /* |
| 3005 | * Translate what netlabel gave us. | 3033 | * Translate what netlabel gave us. |
| 3006 | */ | 3034 | */ |
| 3035 | if (sock != NULL && sock->sk != NULL) | ||
| 3036 | ssp = sock->sk->sk_security; | ||
| 3007 | netlbl_secattr_init(&secattr); | 3037 | netlbl_secattr_init(&secattr); |
| 3008 | rc = netlbl_skbuff_getattr(skb, family, &secattr); | 3038 | rc = netlbl_skbuff_getattr(skb, family, &secattr); |
| 3009 | if (rc == 0) { | 3039 | if (rc == 0) { |
| 3010 | smack_from_secattr(&secattr, smack); | 3040 | sp = smack_from_secattr(&secattr, ssp); |
| 3011 | s = smack_to_secid(smack); | 3041 | s = smack_to_secid(sp); |
| 3012 | } | 3042 | } |
| 3013 | netlbl_secattr_destroy(&secattr); | 3043 | netlbl_secattr_destroy(&secattr); |
| 3014 | } | 3044 | } |
| @@ -3056,7 +3086,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3056 | struct netlbl_lsm_secattr secattr; | 3086 | struct netlbl_lsm_secattr secattr; |
| 3057 | struct sockaddr_in addr; | 3087 | struct sockaddr_in addr; |
| 3058 | struct iphdr *hdr; | 3088 | struct iphdr *hdr; |
| 3059 | char smack[SMK_LABELLEN]; | 3089 | char *sp; |
| 3060 | int rc; | 3090 | int rc; |
| 3061 | struct smk_audit_info ad; | 3091 | struct smk_audit_info ad; |
| 3062 | 3092 | ||
| @@ -3067,9 +3097,9 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3067 | netlbl_secattr_init(&secattr); | 3097 | netlbl_secattr_init(&secattr); |
| 3068 | rc = netlbl_skbuff_getattr(skb, family, &secattr); | 3098 | rc = netlbl_skbuff_getattr(skb, family, &secattr); |
| 3069 | if (rc == 0) | 3099 | if (rc == 0) |
| 3070 | smack_from_secattr(&secattr, smack); | 3100 | sp = smack_from_secattr(&secattr, ssp); |
| 3071 | else | 3101 | else |
| 3072 | strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN); | 3102 | sp = smack_known_huh.smk_known; |
| 3073 | netlbl_secattr_destroy(&secattr); | 3103 | netlbl_secattr_destroy(&secattr); |
| 3074 | 3104 | ||
| 3075 | #ifdef CONFIG_AUDIT | 3105 | #ifdef CONFIG_AUDIT |
| @@ -3082,7 +3112,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3082 | * Receiving a packet requires that the other end be able to write | 3112 | * Receiving a packet requires that the other end be able to write |
| 3083 | * here. Read access is not required. | 3113 | * here. Read access is not required. |
| 3084 | */ | 3114 | */ |
| 3085 | rc = smk_access(smack, ssp->smk_in, MAY_WRITE, &ad); | 3115 | rc = smk_access(sp, ssp->smk_in, MAY_WRITE, &ad); |
| 3086 | if (rc != 0) | 3116 | if (rc != 0) |
| 3087 | return rc; | 3117 | return rc; |
| 3088 | 3118 | ||
| @@ -3090,7 +3120,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3090 | * Save the peer's label in the request_sock so we can later setup | 3120 | * Save the peer's label in the request_sock so we can later setup |
| 3091 | * smk_packet in the child socket so that SO_PEERCRED can report it. | 3121 | * smk_packet in the child socket so that SO_PEERCRED can report it. |
| 3092 | */ | 3122 | */ |
| 3093 | req->peer_secid = smack_to_secid(smack); | 3123 | req->peer_secid = smack_to_secid(sp); |
| 3094 | 3124 | ||
| 3095 | /* | 3125 | /* |
| 3096 | * We need to decide if we want to label the incoming connection here | 3126 | * We need to decide if we want to label the incoming connection here |
| @@ -3103,7 +3133,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
| 3103 | if (smack_host_label(&addr) == NULL) { | 3133 | if (smack_host_label(&addr) == NULL) { |
| 3104 | rcu_read_unlock(); | 3134 | rcu_read_unlock(); |
| 3105 | netlbl_secattr_init(&secattr); | 3135 | netlbl_secattr_init(&secattr); |
| 3106 | smack_to_secattr(smack, &secattr); | 3136 | smack_to_secattr(sp, &secattr); |
| 3107 | rc = netlbl_req_setattr(req, &secattr); | 3137 | rc = netlbl_req_setattr(req, &secattr); |
| 3108 | netlbl_secattr_destroy(&secattr); | 3138 | netlbl_secattr_destroy(&secattr); |
| 3109 | } else { | 3139 | } else { |
| @@ -3125,13 +3155,11 @@ static void smack_inet_csk_clone(struct sock *sk, | |||
| 3125 | const struct request_sock *req) | 3155 | const struct request_sock *req) |
| 3126 | { | 3156 | { |
| 3127 | struct socket_smack *ssp = sk->sk_security; | 3157 | struct socket_smack *ssp = sk->sk_security; |
| 3128 | char *smack; | ||
| 3129 | 3158 | ||
| 3130 | if (req->peer_secid != 0) { | 3159 | if (req->peer_secid != 0) |
| 3131 | smack = smack_from_secid(req->peer_secid); | 3160 | ssp->smk_packet = smack_from_secid(req->peer_secid); |
| 3132 | strncpy(ssp->smk_packet, smack, SMK_MAXLEN); | 3161 | else |
| 3133 | } else | 3162 | ssp->smk_packet = NULL; |
| 3134 | ssp->smk_packet[0] = '\0'; | ||
| 3135 | } | 3163 | } |
| 3136 | 3164 | ||
| 3137 | /* | 3165 | /* |
