aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2011-05-14 06:06:36 -0400
committerThomas Gleixner <tglx@linutronix.de>2011-05-14 06:06:36 -0400
commita18f22a968de17b29f2310cdb7ba69163e65ec15 (patch)
treea7d56d88fad5e444d7661484109758a2f436129e /security/selinux/hooks.c
parenta1c57e0fec53defe745e64417eacdbd3618c3e66 (diff)
parent798778b8653f64b7b2162ac70eca10367cff6ce8 (diff)
Merge branch 'consolidate-clksrc-i8253' of master.kernel.org:~rmk/linux-2.6-arm into timers/clocksource
Conflicts: arch/ia64/kernel/cyclone.c arch/mips/kernel/i8253.c arch/x86/kernel/i8253.c Reason: Resolve conflicts so further cleanups do not conflict further Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c396
1 files changed, 216 insertions, 180 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index c8d699270687..8fb248843009 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -24,9 +24,11 @@
24 */ 24 */
25 25
26#include <linux/init.h> 26#include <linux/init.h>
27#include <linux/kd.h>
27#include <linux/kernel.h> 28#include <linux/kernel.h>
28#include <linux/tracehook.h> 29#include <linux/tracehook.h>
29#include <linux/errno.h> 30#include <linux/errno.h>
31#include <linux/ext2_fs.h>
30#include <linux/sched.h> 32#include <linux/sched.h>
31#include <linux/security.h> 33#include <linux/security.h>
32#include <linux/xattr.h> 34#include <linux/xattr.h>
@@ -36,14 +38,15 @@
36#include <linux/mman.h> 38#include <linux/mman.h>
37#include <linux/slab.h> 39#include <linux/slab.h>
38#include <linux/pagemap.h> 40#include <linux/pagemap.h>
41#include <linux/proc_fs.h>
39#include <linux/swap.h> 42#include <linux/swap.h>
40#include <linux/spinlock.h> 43#include <linux/spinlock.h>
41#include <linux/syscalls.h> 44#include <linux/syscalls.h>
45#include <linux/dcache.h>
42#include <linux/file.h> 46#include <linux/file.h>
43#include <linux/fdtable.h> 47#include <linux/fdtable.h>
44#include <linux/namei.h> 48#include <linux/namei.h>
45#include <linux/mount.h> 49#include <linux/mount.h>
46#include <linux/proc_fs.h>
47#include <linux/netfilter_ipv4.h> 50#include <linux/netfilter_ipv4.h>
48#include <linux/netfilter_ipv6.h> 51#include <linux/netfilter_ipv6.h>
49#include <linux/tty.h> 52#include <linux/tty.h>
@@ -70,13 +73,13 @@
70#include <net/ipv6.h> 73#include <net/ipv6.h>
71#include <linux/hugetlb.h> 74#include <linux/hugetlb.h>
72#include <linux/personality.h> 75#include <linux/personality.h>
73#include <linux/sysctl.h>
74#include <linux/audit.h> 76#include <linux/audit.h>
75#include <linux/string.h> 77#include <linux/string.h>
76#include <linux/selinux.h> 78#include <linux/selinux.h>
77#include <linux/mutex.h> 79#include <linux/mutex.h>
78#include <linux/posix-timers.h> 80#include <linux/posix-timers.h>
79#include <linux/syslog.h> 81#include <linux/syslog.h>
82#include <linux/user_namespace.h>
80 83
81#include "avc.h" 84#include "avc.h"
82#include "objsec.h" 85#include "objsec.h"
@@ -1120,39 +1123,35 @@ static inline u16 socket_type_to_security_class(int family, int type, int protoc
1120} 1123}
1121 1124
1122#ifdef CONFIG_PROC_FS 1125#ifdef CONFIG_PROC_FS
1123static int selinux_proc_get_sid(struct proc_dir_entry *de, 1126static int selinux_proc_get_sid(struct dentry *dentry,
1124 u16 tclass, 1127 u16 tclass,
1125 u32 *sid) 1128 u32 *sid)
1126{ 1129{
1127 int buflen, rc; 1130 int rc;
1128 char *buffer, *path, *end; 1131 char *buffer, *path;
1129 1132
1130 buffer = (char *)__get_free_page(GFP_KERNEL); 1133 buffer = (char *)__get_free_page(GFP_KERNEL);
1131 if (!buffer) 1134 if (!buffer)
1132 return -ENOMEM; 1135 return -ENOMEM;
1133 1136
1134 buflen = PAGE_SIZE; 1137 path = dentry_path_raw(dentry, buffer, PAGE_SIZE);
1135 end = buffer+buflen; 1138 if (IS_ERR(path))
1136 *--end = '\0'; 1139 rc = PTR_ERR(path);
1137 buflen--; 1140 else {
1138 path = end-1; 1141 /* each process gets a /proc/PID/ entry. Strip off the
1139 *path = '/'; 1142 * PID part to get a valid selinux labeling.
1140 while (de && de != de->parent) { 1143 * e.g. /proc/1/net/rpc/nfs -> /net/rpc/nfs */
1141 buflen -= de->namelen + 1; 1144 while (path[1] >= '0' && path[1] <= '9') {
1142 if (buflen < 0) 1145 path[1] = '/';
1143 break; 1146 path++;
1144 end -= de->namelen; 1147 }
1145 memcpy(end, de->name, de->namelen); 1148 rc = security_genfs_sid("proc", path, tclass, sid);
1146 *--end = '/';
1147 path = end;
1148 de = de->parent;
1149 } 1149 }
1150 rc = security_genfs_sid("proc", path, tclass, sid);
1151 free_page((unsigned long)buffer); 1150 free_page((unsigned long)buffer);
1152 return rc; 1151 return rc;
1153} 1152}
1154#else 1153#else
1155static int selinux_proc_get_sid(struct proc_dir_entry *de, 1154static int selinux_proc_get_sid(struct dentry *dentry,
1156 u16 tclass, 1155 u16 tclass,
1157 u32 *sid) 1156 u32 *sid)
1158{ 1157{
@@ -1300,10 +1299,8 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
1300 1299
1301 /* Try to obtain a transition SID. */ 1300 /* Try to obtain a transition SID. */
1302 isec->sclass = inode_mode_to_security_class(inode->i_mode); 1301 isec->sclass = inode_mode_to_security_class(inode->i_mode);
1303 rc = security_transition_sid(isec->task_sid, 1302 rc = security_transition_sid(isec->task_sid, sbsec->sid,
1304 sbsec->sid, 1303 isec->sclass, NULL, &sid);
1305 isec->sclass,
1306 &sid);
1307 if (rc) 1304 if (rc)
1308 goto out_unlock; 1305 goto out_unlock;
1309 isec->sid = sid; 1306 isec->sid = sid;
@@ -1316,10 +1313,9 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
1316 isec->sid = sbsec->sid; 1313 isec->sid = sbsec->sid;
1317 1314
1318 if ((sbsec->flags & SE_SBPROC) && !S_ISLNK(inode->i_mode)) { 1315 if ((sbsec->flags & SE_SBPROC) && !S_ISLNK(inode->i_mode)) {
1319 struct proc_inode *proci = PROC_I(inode); 1316 if (opt_dentry) {
1320 if (proci->pde) {
1321 isec->sclass = inode_mode_to_security_class(inode->i_mode); 1317 isec->sclass = inode_mode_to_security_class(inode->i_mode);
1322 rc = selinux_proc_get_sid(proci->pde, 1318 rc = selinux_proc_get_sid(opt_dentry,
1323 isec->sclass, 1319 isec->sclass,
1324 &sid); 1320 &sid);
1325 if (rc) 1321 if (rc)
@@ -1450,8 +1446,11 @@ static int task_has_capability(struct task_struct *tsk,
1450 } 1446 }
1451 1447
1452 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd); 1448 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd);
1453 if (audit == SECURITY_CAP_AUDIT) 1449 if (audit == SECURITY_CAP_AUDIT) {
1454 avc_audit(sid, sid, sclass, av, &avd, rc, &ad); 1450 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad, 0);
1451 if (rc2)
1452 return rc2;
1453 }
1455 return rc; 1454 return rc;
1456} 1455}
1457 1456
@@ -1471,7 +1470,8 @@ static int task_has_system(struct task_struct *tsk,
1471static int inode_has_perm(const struct cred *cred, 1470static int inode_has_perm(const struct cred *cred,
1472 struct inode *inode, 1471 struct inode *inode,
1473 u32 perms, 1472 u32 perms,
1474 struct common_audit_data *adp) 1473 struct common_audit_data *adp,
1474 unsigned flags)
1475{ 1475{
1476 struct inode_security_struct *isec; 1476 struct inode_security_struct *isec;
1477 struct common_audit_data ad; 1477 struct common_audit_data ad;
@@ -1491,7 +1491,7 @@ static int inode_has_perm(const struct cred *cred,
1491 ad.u.fs.inode = inode; 1491 ad.u.fs.inode = inode;
1492 } 1492 }
1493 1493
1494 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp); 1494 return avc_has_perm_flags(sid, isec->sid, isec->sclass, perms, adp, flags);
1495} 1495}
1496 1496
1497/* Same as inode_has_perm, but pass explicit audit data containing 1497/* Same as inode_has_perm, but pass explicit audit data containing
@@ -1508,7 +1508,7 @@ static inline int dentry_has_perm(const struct cred *cred,
1508 COMMON_AUDIT_DATA_INIT(&ad, FS); 1508 COMMON_AUDIT_DATA_INIT(&ad, FS);
1509 ad.u.fs.path.mnt = mnt; 1509 ad.u.fs.path.mnt = mnt;
1510 ad.u.fs.path.dentry = dentry; 1510 ad.u.fs.path.dentry = dentry;
1511 return inode_has_perm(cred, inode, av, &ad); 1511 return inode_has_perm(cred, inode, av, &ad, 0);
1512} 1512}
1513 1513
1514/* Check whether a task can use an open file descriptor to 1514/* Check whether a task can use an open file descriptor to
@@ -1544,7 +1544,7 @@ static int file_has_perm(const struct cred *cred,
1544 /* av is zero if only checking access to the descriptor. */ 1544 /* av is zero if only checking access to the descriptor. */
1545 rc = 0; 1545 rc = 0;
1546 if (av) 1546 if (av)
1547 rc = inode_has_perm(cred, inode, av, &ad); 1547 rc = inode_has_perm(cred, inode, av, &ad, 0);
1548 1548
1549out: 1549out:
1550 return rc; 1550 return rc;
@@ -1578,7 +1578,8 @@ static int may_create(struct inode *dir,
1578 return rc; 1578 return rc;
1579 1579
1580 if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) { 1580 if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) {
1581 rc = security_transition_sid(sid, dsec->sid, tclass, &newsid); 1581 rc = security_transition_sid(sid, dsec->sid, tclass,
1582 &dentry->d_name, &newsid);
1582 if (rc) 1583 if (rc)
1583 return rc; 1584 return rc;
1584 } 1585 }
@@ -1851,93 +1852,17 @@ static int selinux_capset(struct cred *new, const struct cred *old,
1851 */ 1852 */
1852 1853
1853static int selinux_capable(struct task_struct *tsk, const struct cred *cred, 1854static int selinux_capable(struct task_struct *tsk, const struct cred *cred,
1854 int cap, int audit) 1855 struct user_namespace *ns, int cap, int audit)
1855{ 1856{
1856 int rc; 1857 int rc;
1857 1858
1858 rc = cap_capable(tsk, cred, cap, audit); 1859 rc = cap_capable(tsk, cred, ns, cap, audit);
1859 if (rc) 1860 if (rc)
1860 return rc; 1861 return rc;
1861 1862
1862 return task_has_capability(tsk, cred, cap, audit); 1863 return task_has_capability(tsk, cred, cap, audit);
1863} 1864}
1864 1865
1865static int selinux_sysctl_get_sid(ctl_table *table, u16 tclass, u32 *sid)
1866{
1867 int buflen, rc;
1868 char *buffer, *path, *end;
1869
1870 rc = -ENOMEM;
1871 buffer = (char *)__get_free_page(GFP_KERNEL);
1872 if (!buffer)
1873 goto out;
1874
1875 buflen = PAGE_SIZE;
1876 end = buffer+buflen;
1877 *--end = '\0';
1878 buflen--;
1879 path = end-1;
1880 *path = '/';
1881 while (table) {
1882 const char *name = table->procname;
1883 size_t namelen = strlen(name);
1884 buflen -= namelen + 1;
1885 if (buflen < 0)
1886 goto out_free;
1887 end -= namelen;
1888 memcpy(end, name, namelen);
1889 *--end = '/';
1890 path = end;
1891 table = table->parent;
1892 }
1893 buflen -= 4;
1894 if (buflen < 0)
1895 goto out_free;
1896 end -= 4;
1897 memcpy(end, "/sys", 4);
1898 path = end;
1899 rc = security_genfs_sid("proc", path, tclass, sid);
1900out_free:
1901 free_page((unsigned long)buffer);
1902out:
1903 return rc;
1904}
1905
1906static int selinux_sysctl(ctl_table *table, int op)
1907{
1908 int error = 0;
1909 u32 av;
1910 u32 tsid, sid;
1911 int rc;
1912
1913 sid = current_sid();
1914
1915 rc = selinux_sysctl_get_sid(table, (op == 0001) ?
1916 SECCLASS_DIR : SECCLASS_FILE, &tsid);
1917 if (rc) {
1918 /* Default to the well-defined sysctl SID. */
1919 tsid = SECINITSID_SYSCTL;
1920 }
1921
1922 /* The op values are "defined" in sysctl.c, thereby creating
1923 * a bad coupling between this module and sysctl.c */
1924 if (op == 001) {
1925 error = avc_has_perm(sid, tsid,
1926 SECCLASS_DIR, DIR__SEARCH, NULL);
1927 } else {
1928 av = 0;
1929 if (op & 004)
1930 av |= FILE__READ;
1931 if (op & 002)
1932 av |= FILE__WRITE;
1933 if (av)
1934 error = avc_has_perm(sid, tsid,
1935 SECCLASS_FILE, av, NULL);
1936 }
1937
1938 return error;
1939}
1940
1941static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) 1866static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb)
1942{ 1867{
1943 const struct cred *cred = current_cred(); 1868 const struct cred *cred = current_cred();
@@ -2012,7 +1937,8 @@ static int selinux_vm_enough_memory(struct mm_struct *mm, long pages)
2012{ 1937{
2013 int rc, cap_sys_admin = 0; 1938 int rc, cap_sys_admin = 0;
2014 1939
2015 rc = selinux_capable(current, current_cred(), CAP_SYS_ADMIN, 1940 rc = selinux_capable(current, current_cred(),
1941 &init_user_ns, CAP_SYS_ADMIN,
2016 SECURITY_CAP_NOAUDIT); 1942 SECURITY_CAP_NOAUDIT);
2017 if (rc == 0) 1943 if (rc == 0)
2018 cap_sys_admin = 1; 1944 cap_sys_admin = 1;
@@ -2060,7 +1986,8 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
2060 } else { 1986 } else {
2061 /* Check for a default transition on this program. */ 1987 /* Check for a default transition on this program. */
2062 rc = security_transition_sid(old_tsec->sid, isec->sid, 1988 rc = security_transition_sid(old_tsec->sid, isec->sid,
2063 SECCLASS_PROCESS, &new_tsec->sid); 1989 SECCLASS_PROCESS, NULL,
1990 &new_tsec->sid);
2064 if (rc) 1991 if (rc)
2065 return rc; 1992 return rc;
2066 } 1993 }
@@ -2181,7 +2108,7 @@ static inline void flush_unauthorized_files(const struct cred *cred,
2181 file = file_priv->file; 2108 file = file_priv->file;
2182 inode = file->f_path.dentry->d_inode; 2109 inode = file->f_path.dentry->d_inode;
2183 if (inode_has_perm(cred, inode, 2110 if (inode_has_perm(cred, inode,
2184 FILE__READ | FILE__WRITE, NULL)) { 2111 FILE__READ | FILE__WRITE, NULL, 0)) {
2185 drop_tty = 1; 2112 drop_tty = 1;
2186 } 2113 }
2187 } 2114 }
@@ -2443,6 +2370,91 @@ out:
2443 return rc; 2370 return rc;
2444} 2371}
2445 2372
2373static int selinux_sb_remount(struct super_block *sb, void *data)
2374{
2375 int rc, i, *flags;
2376 struct security_mnt_opts opts;
2377 char *secdata, **mount_options;
2378 struct superblock_security_struct *sbsec = sb->s_security;
2379
2380 if (!(sbsec->flags & SE_SBINITIALIZED))
2381 return 0;
2382
2383 if (!data)
2384 return 0;
2385
2386 if (sb->s_type->fs_flags & FS_BINARY_MOUNTDATA)
2387 return 0;
2388
2389 security_init_mnt_opts(&opts);
2390 secdata = alloc_secdata();
2391 if (!secdata)
2392 return -ENOMEM;
2393 rc = selinux_sb_copy_data(data, secdata);
2394 if (rc)
2395 goto out_free_secdata;
2396
2397 rc = selinux_parse_opts_str(secdata, &opts);
2398 if (rc)
2399 goto out_free_secdata;
2400
2401 mount_options = opts.mnt_opts;
2402 flags = opts.mnt_opts_flags;
2403
2404 for (i = 0; i < opts.num_mnt_opts; i++) {
2405 u32 sid;
2406 size_t len;
2407
2408 if (flags[i] == SE_SBLABELSUPP)
2409 continue;
2410 len = strlen(mount_options[i]);
2411 rc = security_context_to_sid(mount_options[i], len, &sid);
2412 if (rc) {
2413 printk(KERN_WARNING "SELinux: security_context_to_sid"
2414 "(%s) failed for (dev %s, type %s) errno=%d\n",
2415 mount_options[i], sb->s_id, sb->s_type->name, rc);
2416 goto out_free_opts;
2417 }
2418 rc = -EINVAL;
2419 switch (flags[i]) {
2420 case FSCONTEXT_MNT:
2421 if (bad_option(sbsec, FSCONTEXT_MNT, sbsec->sid, sid))
2422 goto out_bad_option;
2423 break;
2424 case CONTEXT_MNT:
2425 if (bad_option(sbsec, CONTEXT_MNT, sbsec->mntpoint_sid, sid))
2426 goto out_bad_option;
2427 break;
2428 case ROOTCONTEXT_MNT: {
2429 struct inode_security_struct *root_isec;
2430 root_isec = sb->s_root->d_inode->i_security;
2431
2432 if (bad_option(sbsec, ROOTCONTEXT_MNT, root_isec->sid, sid))
2433 goto out_bad_option;
2434 break;
2435 }
2436 case DEFCONTEXT_MNT:
2437 if (bad_option(sbsec, DEFCONTEXT_MNT, sbsec->def_sid, sid))
2438 goto out_bad_option;
2439 break;
2440 default:
2441 goto out_free_opts;
2442 }
2443 }
2444
2445 rc = 0;
2446out_free_opts:
2447 security_free_mnt_opts(&opts);
2448out_free_secdata:
2449 free_secdata(secdata);
2450 return rc;
2451out_bad_option:
2452 printk(KERN_WARNING "SELinux: unable to change security options "
2453 "during remount (dev %s, type=%s)\n", sb->s_id,
2454 sb->s_type->name);
2455 goto out_free_opts;
2456}
2457
2446static int selinux_sb_kern_mount(struct super_block *sb, int flags, void *data) 2458static int selinux_sb_kern_mount(struct super_block *sb, int flags, void *data)
2447{ 2459{
2448 const struct cred *cred = current_cred(); 2460 const struct cred *cred = current_cred();
@@ -2509,8 +2521,8 @@ static void selinux_inode_free_security(struct inode *inode)
2509} 2521}
2510 2522
2511static int selinux_inode_init_security(struct inode *inode, struct inode *dir, 2523static int selinux_inode_init_security(struct inode *inode, struct inode *dir,
2512 char **name, void **value, 2524 const struct qstr *qstr, char **name,
2513 size_t *len) 2525 void **value, size_t *len)
2514{ 2526{
2515 const struct task_security_struct *tsec = current_security(); 2527 const struct task_security_struct *tsec = current_security();
2516 struct inode_security_struct *dsec; 2528 struct inode_security_struct *dsec;
@@ -2531,7 +2543,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir,
2531 else if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) { 2543 else if (!newsid || !(sbsec->flags & SE_SBLABELSUPP)) {
2532 rc = security_transition_sid(sid, dsec->sid, 2544 rc = security_transition_sid(sid, dsec->sid,
2533 inode_mode_to_security_class(inode->i_mode), 2545 inode_mode_to_security_class(inode->i_mode),
2534 &newsid); 2546 qstr, &newsid);
2535 if (rc) { 2547 if (rc) {
2536 printk(KERN_WARNING "%s: " 2548 printk(KERN_WARNING "%s: "
2537 "security_transition_sid failed, rc=%d (dev=%s " 2549 "security_transition_sid failed, rc=%d (dev=%s "
@@ -2628,7 +2640,7 @@ static int selinux_inode_follow_link(struct dentry *dentry, struct nameidata *na
2628 return dentry_has_perm(cred, NULL, dentry, FILE__READ); 2640 return dentry_has_perm(cred, NULL, dentry, FILE__READ);
2629} 2641}
2630 2642
2631static int selinux_inode_permission(struct inode *inode, int mask) 2643static int selinux_inode_permission(struct inode *inode, int mask, unsigned flags)
2632{ 2644{
2633 const struct cred *cred = current_cred(); 2645 const struct cred *cred = current_cred();
2634 struct common_audit_data ad; 2646 struct common_audit_data ad;
@@ -2650,7 +2662,7 @@ static int selinux_inode_permission(struct inode *inode, int mask)
2650 2662
2651 perms = file_mask_to_av(inode->i_mode, mask); 2663 perms = file_mask_to_av(inode->i_mode, mask);
2652 2664
2653 return inode_has_perm(cred, inode, perms, &ad); 2665 return inode_has_perm(cred, inode, perms, &ad, flags);
2654} 2666}
2655 2667
2656static int selinux_inode_setattr(struct dentry *dentry, struct iattr *iattr) 2668static int selinux_inode_setattr(struct dentry *dentry, struct iattr *iattr)
@@ -2718,7 +2730,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
2718 if (!(sbsec->flags & SE_SBLABELSUPP)) 2730 if (!(sbsec->flags & SE_SBLABELSUPP))
2719 return -EOPNOTSUPP; 2731 return -EOPNOTSUPP;
2720 2732
2721 if (!is_owner_or_cap(inode)) 2733 if (!inode_owner_or_capable(inode))
2722 return -EPERM; 2734 return -EPERM;
2723 2735
2724 COMMON_AUDIT_DATA_INIT(&ad, FS); 2736 COMMON_AUDIT_DATA_INIT(&ad, FS);
@@ -2829,7 +2841,8 @@ static int selinux_inode_getsecurity(const struct inode *inode, const char *name
2829 * and lack of permission just means that we fall back to the 2841 * and lack of permission just means that we fall back to the
2830 * in-core context value, not a denial. 2842 * in-core context value, not a denial.
2831 */ 2843 */
2832 error = selinux_capable(current, current_cred(), CAP_MAC_ADMIN, 2844 error = selinux_capable(current, current_cred(),
2845 &init_user_ns, CAP_MAC_ADMIN,
2833 SECURITY_CAP_NOAUDIT); 2846 SECURITY_CAP_NOAUDIT);
2834 if (!error) 2847 if (!error)
2835 error = security_sid_to_context_force(isec->sid, &context, 2848 error = security_sid_to_context_force(isec->sid, &context,
@@ -2932,16 +2945,47 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
2932 unsigned long arg) 2945 unsigned long arg)
2933{ 2946{
2934 const struct cred *cred = current_cred(); 2947 const struct cred *cred = current_cred();
2935 u32 av = 0; 2948 int error = 0;
2936 2949
2937 if (_IOC_DIR(cmd) & _IOC_WRITE) 2950 switch (cmd) {
2938 av |= FILE__WRITE; 2951 case FIONREAD:
2939 if (_IOC_DIR(cmd) & _IOC_READ) 2952 /* fall through */
2940 av |= FILE__READ; 2953 case FIBMAP:
2941 if (!av) 2954 /* fall through */
2942 av = FILE__IOCTL; 2955 case FIGETBSZ:
2956 /* fall through */
2957 case EXT2_IOC_GETFLAGS:
2958 /* fall through */
2959 case EXT2_IOC_GETVERSION:
2960 error = file_has_perm(cred, file, FILE__GETATTR);
2961 break;
2962
2963 case EXT2_IOC_SETFLAGS:
2964 /* fall through */
2965 case EXT2_IOC_SETVERSION:
2966 error = file_has_perm(cred, file, FILE__SETATTR);
2967 break;
2968
2969 /* sys_ioctl() checks */
2970 case FIONBIO:
2971 /* fall through */
2972 case FIOASYNC:
2973 error = file_has_perm(cred, file, 0);
2974 break;
2943 2975
2944 return file_has_perm(cred, file, av); 2976 case KDSKBENT:
2977 case KDSKBSENT:
2978 error = task_has_capability(current, cred, CAP_SYS_TTY_CONFIG,
2979 SECURITY_CAP_AUDIT);
2980 break;
2981
2982 /* default case assumes that the command will go
2983 * to the file's ioctl() function.
2984 */
2985 default:
2986 error = file_has_perm(cred, file, FILE__IOCTL);
2987 }
2988 return error;
2945} 2989}
2946 2990
2947static int default_noexec; 2991static int default_noexec;
@@ -3166,7 +3210,7 @@ static int selinux_dentry_open(struct file *file, const struct cred *cred)
3166 * new inode label or new policy. 3210 * new inode label or new policy.
3167 * This check is not redundant - do not remove. 3211 * This check is not redundant - do not remove.
3168 */ 3212 */
3169 return inode_has_perm(cred, inode, open_file_to_av(file), NULL); 3213 return inode_has_perm(cred, inode, open_file_to_av(file), NULL, 0);
3170} 3214}
3171 3215
3172/* task security operations */ 3216/* task security operations */
@@ -3644,9 +3688,16 @@ static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid)
3644 3688
3645/* socket security operations */ 3689/* socket security operations */
3646 3690
3647static u32 socket_sockcreate_sid(const struct task_security_struct *tsec) 3691static int socket_sockcreate_sid(const struct task_security_struct *tsec,
3692 u16 secclass, u32 *socksid)
3648{ 3693{
3649 return tsec->sockcreate_sid ? : tsec->sid; 3694 if (tsec->sockcreate_sid > SECSID_NULL) {
3695 *socksid = tsec->sockcreate_sid;
3696 return 0;
3697 }
3698
3699 return security_transition_sid(tsec->sid, tsec->sid, secclass, NULL,
3700 socksid);
3650} 3701}
3651 3702
3652static int sock_has_perm(struct task_struct *task, struct sock *sk, u32 perms) 3703static int sock_has_perm(struct task_struct *task, struct sock *sk, u32 perms)
@@ -3670,12 +3721,16 @@ static int selinux_socket_create(int family, int type,
3670 const struct task_security_struct *tsec = current_security(); 3721 const struct task_security_struct *tsec = current_security();
3671 u32 newsid; 3722 u32 newsid;
3672 u16 secclass; 3723 u16 secclass;
3724 int rc;
3673 3725
3674 if (kern) 3726 if (kern)
3675 return 0; 3727 return 0;
3676 3728
3677 newsid = socket_sockcreate_sid(tsec);
3678 secclass = socket_type_to_security_class(family, type, protocol); 3729 secclass = socket_type_to_security_class(family, type, protocol);
3730 rc = socket_sockcreate_sid(tsec, secclass, &newsid);
3731 if (rc)
3732 return rc;
3733
3679 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); 3734 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL);
3680} 3735}
3681 3736
@@ -3687,12 +3742,16 @@ static int selinux_socket_post_create(struct socket *sock, int family,
3687 struct sk_security_struct *sksec; 3742 struct sk_security_struct *sksec;
3688 int err = 0; 3743 int err = 0;
3689 3744
3745 isec->sclass = socket_type_to_security_class(family, type, protocol);
3746
3690 if (kern) 3747 if (kern)
3691 isec->sid = SECINITSID_KERNEL; 3748 isec->sid = SECINITSID_KERNEL;
3692 else 3749 else {
3693 isec->sid = socket_sockcreate_sid(tsec); 3750 err = socket_sockcreate_sid(tsec, isec->sclass, &(isec->sid));
3751 if (err)
3752 return err;
3753 }
3694 3754
3695 isec->sclass = socket_type_to_security_class(family, type, protocol);
3696 isec->initialized = 1; 3755 isec->initialized = 1;
3697 3756
3698 if (sock->sk) { 3757 if (sock->sk) {
@@ -4002,7 +4061,6 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
4002{ 4061{
4003 int err = 0; 4062 int err = 0;
4004 struct sk_security_struct *sksec = sk->sk_security; 4063 struct sk_security_struct *sksec = sk->sk_security;
4005 u32 peer_sid;
4006 u32 sk_sid = sksec->sid; 4064 u32 sk_sid = sksec->sid;
4007 struct common_audit_data ad; 4065 struct common_audit_data ad;
4008 char *addrp; 4066 char *addrp;
@@ -4021,20 +4079,10 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
4021 return err; 4079 return err;
4022 } 4080 }
4023 4081
4024 if (selinux_policycap_netpeer) { 4082 err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad);
4025 err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); 4083 if (err)
4026 if (err) 4084 return err;
4027 return err; 4085 err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad);
4028 err = avc_has_perm(sk_sid, peer_sid,
4029 SECCLASS_PEER, PEER__RECV, &ad);
4030 if (err)
4031 selinux_netlbl_err(skb, err, 0);
4032 } else {
4033 err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad);
4034 if (err)
4035 return err;
4036 err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad);
4037 }
4038 4086
4039 return err; 4087 return err;
4040} 4088}
@@ -4306,7 +4354,7 @@ static void selinux_secmark_refcount_dec(void)
4306static void selinux_req_classify_flow(const struct request_sock *req, 4354static void selinux_req_classify_flow(const struct request_sock *req,
4307 struct flowi *fl) 4355 struct flowi *fl)
4308{ 4356{
4309 fl->secid = req->secid; 4357 fl->flowi_secid = req->secid;
4310} 4358}
4311 4359
4312static int selinux_tun_dev_create(void) 4360static int selinux_tun_dev_create(void)
@@ -4529,9 +4577,8 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
4529 SECCLASS_PACKET, PACKET__SEND, &ad)) 4577 SECCLASS_PACKET, PACKET__SEND, &ad))
4530 return NF_DROP_ERR(-ECONNREFUSED); 4578 return NF_DROP_ERR(-ECONNREFUSED);
4531 4579
4532 if (selinux_policycap_netpeer) 4580 if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
4533 if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto)) 4581 return NF_DROP_ERR(-ECONNREFUSED);
4534 return NF_DROP_ERR(-ECONNREFUSED);
4535 4582
4536 return NF_ACCEPT; 4583 return NF_ACCEPT;
4537} 4584}
@@ -4574,27 +4621,14 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex,
4574 * from the sending socket, otherwise use the kernel's sid */ 4621 * from the sending socket, otherwise use the kernel's sid */
4575 sk = skb->sk; 4622 sk = skb->sk;
4576 if (sk == NULL) { 4623 if (sk == NULL) {
4577 switch (family) { 4624 if (skb->skb_iif) {
4578 case PF_INET: 4625 secmark_perm = PACKET__FORWARD_OUT;
4579 if (IPCB(skb)->flags & IPSKB_FORWARDED)
4580 secmark_perm = PACKET__FORWARD_OUT;
4581 else
4582 secmark_perm = PACKET__SEND;
4583 break;
4584 case PF_INET6:
4585 if (IP6CB(skb)->flags & IP6SKB_FORWARDED)
4586 secmark_perm = PACKET__FORWARD_OUT;
4587 else
4588 secmark_perm = PACKET__SEND;
4589 break;
4590 default:
4591 return NF_DROP_ERR(-ECONNREFUSED);
4592 }
4593 if (secmark_perm == PACKET__FORWARD_OUT) {
4594 if (selinux_skb_peerlbl_sid(skb, family, &peer_sid)) 4626 if (selinux_skb_peerlbl_sid(skb, family, &peer_sid))
4595 return NF_DROP; 4627 return NF_DROP;
4596 } else 4628 } else {
4629 secmark_perm = PACKET__SEND;
4597 peer_sid = SECINITSID_KERNEL; 4630 peer_sid = SECINITSID_KERNEL;
4631 }
4598 } else { 4632 } else {
4599 struct sk_security_struct *sksec = sk->sk_security; 4633 struct sk_security_struct *sksec = sk->sk_security;
4600 peer_sid = sksec->sid; 4634 peer_sid = sksec->sid;
@@ -4669,6 +4703,7 @@ static int selinux_netlink_recv(struct sk_buff *skb, int capability)
4669{ 4703{
4670 int err; 4704 int err;
4671 struct common_audit_data ad; 4705 struct common_audit_data ad;
4706 u32 sid;
4672 4707
4673 err = cap_netlink_recv(skb, capability); 4708 err = cap_netlink_recv(skb, capability);
4674 if (err) 4709 if (err)
@@ -4677,8 +4712,9 @@ static int selinux_netlink_recv(struct sk_buff *skb, int capability)
4677 COMMON_AUDIT_DATA_INIT(&ad, CAP); 4712 COMMON_AUDIT_DATA_INIT(&ad, CAP);
4678 ad.u.cap = capability; 4713 ad.u.cap = capability;
4679 4714
4680 return avc_has_perm(NETLINK_CB(skb).sid, NETLINK_CB(skb).sid, 4715 security_task_getsecid(current, &sid);
4681 SECCLASS_CAPABILITY, CAP_TO_MASK(capability), &ad); 4716 return avc_has_perm(sid, sid, SECCLASS_CAPABILITY,
4717 CAP_TO_MASK(capability), &ad);
4682} 4718}
4683 4719
4684static int ipc_alloc_security(struct task_struct *task, 4720static int ipc_alloc_security(struct task_struct *task,
@@ -4848,7 +4884,7 @@ static int selinux_msg_queue_msgsnd(struct msg_queue *msq, struct msg_msg *msg,
4848 * message queue this message will be stored in 4884 * message queue this message will be stored in
4849 */ 4885 */
4850 rc = security_transition_sid(sid, isec->sid, SECCLASS_MSG, 4886 rc = security_transition_sid(sid, isec->sid, SECCLASS_MSG,
4851 &msec->sid); 4887 NULL, &msec->sid);
4852 if (rc) 4888 if (rc)
4853 return rc; 4889 return rc;
4854 } 4890 }
@@ -5402,7 +5438,6 @@ static struct security_operations selinux_ops = {
5402 .ptrace_traceme = selinux_ptrace_traceme, 5438 .ptrace_traceme = selinux_ptrace_traceme,
5403 .capget = selinux_capget, 5439 .capget = selinux_capget,
5404 .capset = selinux_capset, 5440 .capset = selinux_capset,
5405 .sysctl = selinux_sysctl,
5406 .capable = selinux_capable, 5441 .capable = selinux_capable,
5407 .quotactl = selinux_quotactl, 5442 .quotactl = selinux_quotactl,
5408 .quota_on = selinux_quota_on, 5443 .quota_on = selinux_quota_on,
@@ -5420,6 +5455,7 @@ static struct security_operations selinux_ops = {
5420 .sb_alloc_security = selinux_sb_alloc_security, 5455 .sb_alloc_security = selinux_sb_alloc_security,
5421 .sb_free_security = selinux_sb_free_security, 5456 .sb_free_security = selinux_sb_free_security,
5422 .sb_copy_data = selinux_sb_copy_data, 5457 .sb_copy_data = selinux_sb_copy_data,
5458 .sb_remount = selinux_sb_remount,
5423 .sb_kern_mount = selinux_sb_kern_mount, 5459 .sb_kern_mount = selinux_sb_kern_mount,
5424 .sb_show_options = selinux_sb_show_options, 5460 .sb_show_options = selinux_sb_show_options,
5425 .sb_statfs = selinux_sb_statfs, 5461 .sb_statfs = selinux_sb_statfs,