diff options
-rw-r--r-- | MAINTAINERS | 4 | ||||
-rw-r--r-- | net/ipv4/cipso_ipv4.c | 41 | ||||
-rw-r--r-- | net/netlabel/netlabel_kapi.c | 3 | ||||
-rw-r--r-- | security/selinux/Makefile | 2 | ||||
-rw-r--r-- | security/selinux/avc.c | 2 | ||||
-rw-r--r-- | security/selinux/hooks.c | 38 | ||||
-rw-r--r-- | security/selinux/include/av_perm_to_string.h | 102 | ||||
-rw-r--r-- | security/selinux/include/av_permissions.h | 179 | ||||
-rw-r--r-- | security/selinux/include/class_to_string.h | 34 | ||||
-rw-r--r-- | security/selinux/include/flask.h | 16 | ||||
-rw-r--r-- | security/selinux/include/netlabel.h (renamed from security/selinux/include/selinux_netlabel.h) | 71 | ||||
-rw-r--r-- | security/selinux/include/security.h | 29 | ||||
-rw-r--r-- | security/selinux/netlabel.c | 363 | ||||
-rw-r--r-- | security/selinux/selinuxfs.c | 85 | ||||
-rw-r--r-- | security/selinux/ss/services.c | 499 |
15 files changed, 695 insertions, 773 deletions
diff --git a/MAINTAINERS b/MAINTAINERS index 2e83c82aa13d..5519d257b556 100644 --- a/MAINTAINERS +++ b/MAINTAINERS | |||
@@ -2980,8 +2980,10 @@ P: Stephen Smalley | |||
2980 | M: sds@tycho.nsa.gov | 2980 | M: sds@tycho.nsa.gov |
2981 | P: James Morris | 2981 | P: James Morris |
2982 | M: jmorris@namei.org | 2982 | M: jmorris@namei.org |
2983 | P: Eric Paris | ||
2984 | M: eparis@parisplace.org | ||
2983 | L: linux-kernel@vger.kernel.org (kernel issues) | 2985 | L: linux-kernel@vger.kernel.org (kernel issues) |
2984 | L: selinux@tycho.nsa.gov (general discussion) | 2986 | L: selinux@tycho.nsa.gov (subscribers-only, general discussion) |
2985 | W: http://www.nsa.gov/selinux | 2987 | W: http://www.nsa.gov/selinux |
2986 | S: Supported | 2988 | S: Supported |
2987 | 2989 | ||
diff --git a/net/ipv4/cipso_ipv4.c b/net/ipv4/cipso_ipv4.c index 11a3404d65af..e1f18489db1d 100644 --- a/net/ipv4/cipso_ipv4.c +++ b/net/ipv4/cipso_ipv4.c | |||
@@ -92,6 +92,33 @@ int cipso_v4_rbm_optfmt = 0; | |||
92 | int cipso_v4_rbm_strictvalid = 1; | 92 | int cipso_v4_rbm_strictvalid = 1; |
93 | 93 | ||
94 | /* | 94 | /* |
95 | * Protocol Constants | ||
96 | */ | ||
97 | |||
98 | /* Maximum size of the CIPSO IP option, derived from the fact that the maximum | ||
99 | * IPv4 header size is 60 bytes and the base IPv4 header is 20 bytes long. */ | ||
100 | #define CIPSO_V4_OPT_LEN_MAX 40 | ||
101 | |||
102 | /* Length of the base CIPSO option, this includes the option type (1 byte), the | ||
103 | * option length (1 byte), and the DOI (4 bytes). */ | ||
104 | #define CIPSO_V4_HDR_LEN 6 | ||
105 | |||
106 | /* Base length of the restrictive category bitmap tag (tag #1). */ | ||
107 | #define CIPSO_V4_TAG_RBM_BLEN 4 | ||
108 | |||
109 | /* Base length of the enumerated category tag (tag #2). */ | ||
110 | #define CIPSO_V4_TAG_ENUM_BLEN 4 | ||
111 | |||
112 | /* Base length of the ranged categories bitmap tag (tag #5). */ | ||
113 | #define CIPSO_V4_TAG_RNG_BLEN 4 | ||
114 | /* The maximum number of category ranges permitted in the ranged category tag | ||
115 | * (tag #5). You may note that the IETF draft states that the maximum number | ||
116 | * of category ranges is 7, but if the low end of the last category range is | ||
117 | * zero then it is possibile to fit 8 category ranges because the zero should | ||
118 | * be omitted. */ | ||
119 | #define CIPSO_V4_TAG_RNG_CAT_MAX 8 | ||
120 | |||
121 | /* | ||
95 | * Helper Functions | 122 | * Helper Functions |
96 | */ | 123 | */ |
97 | 124 | ||
@@ -1109,16 +1136,15 @@ static int cipso_v4_map_cat_rng_hton(const struct cipso_v4_doi *doi_def, | |||
1109 | unsigned char *net_cat, | 1136 | unsigned char *net_cat, |
1110 | u32 net_cat_len) | 1137 | u32 net_cat_len) |
1111 | { | 1138 | { |
1112 | /* The constant '16' is not random, it is the maximum number of | ||
1113 | * high/low category range pairs as permitted by the CIPSO draft based | ||
1114 | * on a maximum IPv4 header length of 60 bytes - the BUG_ON() assertion | ||
1115 | * does a sanity check to make sure we don't overflow the array. */ | ||
1116 | int iter = -1; | 1139 | int iter = -1; |
1117 | u16 array[16]; | 1140 | u16 array[CIPSO_V4_TAG_RNG_CAT_MAX * 2]; |
1118 | u32 array_cnt = 0; | 1141 | u32 array_cnt = 0; |
1119 | u32 cat_size = 0; | 1142 | u32 cat_size = 0; |
1120 | 1143 | ||
1121 | BUG_ON(net_cat_len > 30); | 1144 | /* make sure we don't overflow the 'array[]' variable */ |
1145 | if (net_cat_len > | ||
1146 | (CIPSO_V4_OPT_LEN_MAX - CIPSO_V4_HDR_LEN - CIPSO_V4_TAG_RNG_BLEN)) | ||
1147 | return -ENOSPC; | ||
1122 | 1148 | ||
1123 | for (;;) { | 1149 | for (;;) { |
1124 | iter = netlbl_secattr_catmap_walk(secattr->mls_cat, iter + 1); | 1150 | iter = netlbl_secattr_catmap_walk(secattr->mls_cat, iter + 1); |
@@ -1196,9 +1222,6 @@ static int cipso_v4_map_cat_rng_ntoh(const struct cipso_v4_doi *doi_def, | |||
1196 | * Protocol Handling Functions | 1222 | * Protocol Handling Functions |
1197 | */ | 1223 | */ |
1198 | 1224 | ||
1199 | #define CIPSO_V4_OPT_LEN_MAX 40 | ||
1200 | #define CIPSO_V4_HDR_LEN 6 | ||
1201 | |||
1202 | /** | 1225 | /** |
1203 | * cipso_v4_gentag_hdr - Generate a CIPSO option header | 1226 | * cipso_v4_gentag_hdr - Generate a CIPSO option header |
1204 | * @doi_def: the DOI definition | 1227 | * @doi_def: the DOI definition |
diff --git a/net/netlabel/netlabel_kapi.c b/net/netlabel/netlabel_kapi.c index e03a3282c551..f2535e7f2869 100644 --- a/net/netlabel/netlabel_kapi.c +++ b/net/netlabel/netlabel_kapi.c | |||
@@ -263,9 +263,6 @@ int netlbl_socket_setattr(const struct socket *sock, | |||
263 | int ret_val = -ENOENT; | 263 | int ret_val = -ENOENT; |
264 | struct netlbl_dom_map *dom_entry; | 264 | struct netlbl_dom_map *dom_entry; |
265 | 265 | ||
266 | if ((secattr->flags & NETLBL_SECATTR_DOMAIN) == 0) | ||
267 | return -ENOENT; | ||
268 | |||
269 | rcu_read_lock(); | 266 | rcu_read_lock(); |
270 | dom_entry = netlbl_domhsh_getentry(secattr->domain); | 267 | dom_entry = netlbl_domhsh_getentry(secattr->domain); |
271 | if (dom_entry == NULL) | 268 | if (dom_entry == NULL) |
diff --git a/security/selinux/Makefile b/security/selinux/Makefile index faf2e02e4410..dc3502e30b19 100644 --- a/security/selinux/Makefile +++ b/security/selinux/Makefile | |||
@@ -8,5 +8,7 @@ selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o exports.o | |||
8 | 8 | ||
9 | selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o | 9 | selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o |
10 | 10 | ||
11 | selinux-$(CONFIG_NETLABEL) += netlabel.o | ||
12 | |||
11 | EXTRA_CFLAGS += -Isecurity/selinux/include | 13 | EXTRA_CFLAGS += -Isecurity/selinux/include |
12 | 14 | ||
diff --git a/security/selinux/avc.c b/security/selinux/avc.c index da8caf10ef97..e4396a89edc6 100644 --- a/security/selinux/avc.c +++ b/security/selinux/avc.c | |||
@@ -217,6 +217,8 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla | |||
217 | audit_log_format(ab, " tcontext=%s", scontext); | 217 | audit_log_format(ab, " tcontext=%s", scontext); |
218 | kfree(scontext); | 218 | kfree(scontext); |
219 | } | 219 | } |
220 | |||
221 | BUG_ON(tclass >= ARRAY_SIZE(class_to_string) || !class_to_string[tclass]); | ||
220 | audit_log_format(ab, " tclass=%s", class_to_string[tclass]); | 222 | audit_log_format(ab, " tclass=%s", class_to_string[tclass]); |
221 | } | 223 | } |
222 | 224 | ||
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 5f02b4be1917..885a9a958b8d 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -77,7 +77,7 @@ | |||
77 | #include "objsec.h" | 77 | #include "objsec.h" |
78 | #include "netif.h" | 78 | #include "netif.h" |
79 | #include "xfrm.h" | 79 | #include "xfrm.h" |
80 | #include "selinux_netlabel.h" | 80 | #include "netlabel.h" |
81 | 81 | ||
82 | #define XATTR_SELINUX_SUFFIX "selinux" | 82 | #define XATTR_SELINUX_SUFFIX "selinux" |
83 | #define XATTR_NAME_SELINUX XATTR_SECURITY_PREFIX XATTR_SELINUX_SUFFIX | 83 | #define XATTR_NAME_SELINUX XATTR_SECURITY_PREFIX XATTR_SELINUX_SUFFIX |
@@ -3123,6 +3123,34 @@ static int selinux_parse_skb(struct sk_buff *skb, struct avc_audit_data *ad, | |||
3123 | return ret; | 3123 | return ret; |
3124 | } | 3124 | } |
3125 | 3125 | ||
3126 | /** | ||
3127 | * selinux_skb_extlbl_sid - Determine the external label of a packet | ||
3128 | * @skb: the packet | ||
3129 | * @base_sid: the SELinux SID to use as a context for MLS only external labels | ||
3130 | * @sid: the packet's SID | ||
3131 | * | ||
3132 | * Description: | ||
3133 | * Check the various different forms of external packet labeling and determine | ||
3134 | * the external SID for the packet. | ||
3135 | * | ||
3136 | */ | ||
3137 | static void selinux_skb_extlbl_sid(struct sk_buff *skb, | ||
3138 | u32 base_sid, | ||
3139 | u32 *sid) | ||
3140 | { | ||
3141 | u32 xfrm_sid; | ||
3142 | u32 nlbl_sid; | ||
3143 | |||
3144 | selinux_skb_xfrm_sid(skb, &xfrm_sid); | ||
3145 | if (selinux_netlbl_skbuff_getsid(skb, | ||
3146 | (xfrm_sid == SECSID_NULL ? | ||
3147 | base_sid : xfrm_sid), | ||
3148 | &nlbl_sid) != 0) | ||
3149 | nlbl_sid = SECSID_NULL; | ||
3150 | |||
3151 | *sid = (nlbl_sid == SECSID_NULL ? xfrm_sid : nlbl_sid); | ||
3152 | } | ||
3153 | |||
3126 | /* socket security operations */ | 3154 | /* socket security operations */ |
3127 | static int socket_has_perm(struct task_struct *task, struct socket *sock, | 3155 | static int socket_has_perm(struct task_struct *task, struct socket *sock, |
3128 | u32 perms) | 3156 | u32 perms) |
@@ -3664,9 +3692,7 @@ static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff * | |||
3664 | if (sock && sock->sk->sk_family == PF_UNIX) | 3692 | if (sock && sock->sk->sk_family == PF_UNIX) |
3665 | selinux_get_inode_sid(SOCK_INODE(sock), &peer_secid); | 3693 | selinux_get_inode_sid(SOCK_INODE(sock), &peer_secid); |
3666 | else if (skb) | 3694 | else if (skb) |
3667 | security_skb_extlbl_sid(skb, | 3695 | selinux_skb_extlbl_sid(skb, SECINITSID_UNLABELED, &peer_secid); |
3668 | SECINITSID_UNLABELED, | ||
3669 | &peer_secid); | ||
3670 | 3696 | ||
3671 | if (peer_secid == SECSID_NULL) | 3697 | if (peer_secid == SECSID_NULL) |
3672 | err = -EINVAL; | 3698 | err = -EINVAL; |
@@ -3727,7 +3753,7 @@ static int selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
3727 | u32 newsid; | 3753 | u32 newsid; |
3728 | u32 peersid; | 3754 | u32 peersid; |
3729 | 3755 | ||
3730 | security_skb_extlbl_sid(skb, SECINITSID_UNLABELED, &peersid); | 3756 | selinux_skb_extlbl_sid(skb, SECINITSID_UNLABELED, &peersid); |
3731 | if (peersid == SECSID_NULL) { | 3757 | if (peersid == SECSID_NULL) { |
3732 | req->secid = sksec->sid; | 3758 | req->secid = sksec->sid; |
3733 | req->peer_secid = SECSID_NULL; | 3759 | req->peer_secid = SECSID_NULL; |
@@ -3765,7 +3791,7 @@ static void selinux_inet_conn_established(struct sock *sk, | |||
3765 | { | 3791 | { |
3766 | struct sk_security_struct *sksec = sk->sk_security; | 3792 | struct sk_security_struct *sksec = sk->sk_security; |
3767 | 3793 | ||
3768 | security_skb_extlbl_sid(skb, SECINITSID_UNLABELED, &sksec->peer_sid); | 3794 | selinux_skb_extlbl_sid(skb, SECINITSID_UNLABELED, &sksec->peer_sid); |
3769 | } | 3795 | } |
3770 | 3796 | ||
3771 | static void selinux_req_classify_flow(const struct request_sock *req, | 3797 | static void selinux_req_classify_flow(const struct request_sock *req, |
diff --git a/security/selinux/include/av_perm_to_string.h b/security/selinux/include/av_perm_to_string.h index ad9fb2d69b50..b83e74012a97 100644 --- a/security/selinux/include/av_perm_to_string.h +++ b/security/selinux/include/av_perm_to_string.h | |||
@@ -128,96 +128,6 @@ | |||
128 | S_(SECCLASS_CAPABILITY, CAPABILITY__LEASE, "lease") | 128 | S_(SECCLASS_CAPABILITY, CAPABILITY__LEASE, "lease") |
129 | S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_WRITE, "audit_write") | 129 | S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_WRITE, "audit_write") |
130 | S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_CONTROL, "audit_control") | 130 | S_(SECCLASS_CAPABILITY, CAPABILITY__AUDIT_CONTROL, "audit_control") |
131 | S_(SECCLASS_PASSWD, PASSWD__PASSWD, "passwd") | ||
132 | S_(SECCLASS_PASSWD, PASSWD__CHFN, "chfn") | ||
133 | S_(SECCLASS_PASSWD, PASSWD__CHSH, "chsh") | ||
134 | S_(SECCLASS_PASSWD, PASSWD__ROOTOK, "rootok") | ||
135 | S_(SECCLASS_PASSWD, PASSWD__CRONTAB, "crontab") | ||
136 | S_(SECCLASS_DRAWABLE, DRAWABLE__CREATE, "create") | ||
137 | S_(SECCLASS_DRAWABLE, DRAWABLE__DESTROY, "destroy") | ||
138 | S_(SECCLASS_DRAWABLE, DRAWABLE__DRAW, "draw") | ||
139 | S_(SECCLASS_DRAWABLE, DRAWABLE__COPY, "copy") | ||
140 | S_(SECCLASS_DRAWABLE, DRAWABLE__GETATTR, "getattr") | ||
141 | S_(SECCLASS_GC, GC__CREATE, "create") | ||
142 | S_(SECCLASS_GC, GC__FREE, "free") | ||
143 | S_(SECCLASS_GC, GC__GETATTR, "getattr") | ||
144 | S_(SECCLASS_GC, GC__SETATTR, "setattr") | ||
145 | S_(SECCLASS_WINDOW, WINDOW__ADDCHILD, "addchild") | ||
146 | S_(SECCLASS_WINDOW, WINDOW__CREATE, "create") | ||
147 | S_(SECCLASS_WINDOW, WINDOW__DESTROY, "destroy") | ||
148 | S_(SECCLASS_WINDOW, WINDOW__MAP, "map") | ||
149 | S_(SECCLASS_WINDOW, WINDOW__UNMAP, "unmap") | ||
150 | S_(SECCLASS_WINDOW, WINDOW__CHSTACK, "chstack") | ||
151 | S_(SECCLASS_WINDOW, WINDOW__CHPROPLIST, "chproplist") | ||
152 | S_(SECCLASS_WINDOW, WINDOW__CHPROP, "chprop") | ||
153 | S_(SECCLASS_WINDOW, WINDOW__LISTPROP, "listprop") | ||
154 | S_(SECCLASS_WINDOW, WINDOW__GETATTR, "getattr") | ||
155 | S_(SECCLASS_WINDOW, WINDOW__SETATTR, "setattr") | ||
156 | S_(SECCLASS_WINDOW, WINDOW__SETFOCUS, "setfocus") | ||
157 | S_(SECCLASS_WINDOW, WINDOW__MOVE, "move") | ||
158 | S_(SECCLASS_WINDOW, WINDOW__CHSELECTION, "chselection") | ||
159 | S_(SECCLASS_WINDOW, WINDOW__CHPARENT, "chparent") | ||
160 | S_(SECCLASS_WINDOW, WINDOW__CTRLLIFE, "ctrllife") | ||
161 | S_(SECCLASS_WINDOW, WINDOW__ENUMERATE, "enumerate") | ||
162 | S_(SECCLASS_WINDOW, WINDOW__TRANSPARENT, "transparent") | ||
163 | S_(SECCLASS_WINDOW, WINDOW__MOUSEMOTION, "mousemotion") | ||
164 | S_(SECCLASS_WINDOW, WINDOW__CLIENTCOMEVENT, "clientcomevent") | ||
165 | S_(SECCLASS_WINDOW, WINDOW__INPUTEVENT, "inputevent") | ||
166 | S_(SECCLASS_WINDOW, WINDOW__DRAWEVENT, "drawevent") | ||
167 | S_(SECCLASS_WINDOW, WINDOW__WINDOWCHANGEEVENT, "windowchangeevent") | ||
168 | S_(SECCLASS_WINDOW, WINDOW__WINDOWCHANGEREQUEST, "windowchangerequest") | ||
169 | S_(SECCLASS_WINDOW, WINDOW__SERVERCHANGEEVENT, "serverchangeevent") | ||
170 | S_(SECCLASS_WINDOW, WINDOW__EXTENSIONEVENT, "extensionevent") | ||
171 | S_(SECCLASS_FONT, FONT__LOAD, "load") | ||
172 | S_(SECCLASS_FONT, FONT__FREE, "free") | ||
173 | S_(SECCLASS_FONT, FONT__GETATTR, "getattr") | ||
174 | S_(SECCLASS_FONT, FONT__USE, "use") | ||
175 | S_(SECCLASS_COLORMAP, COLORMAP__CREATE, "create") | ||
176 | S_(SECCLASS_COLORMAP, COLORMAP__FREE, "free") | ||
177 | S_(SECCLASS_COLORMAP, COLORMAP__INSTALL, "install") | ||
178 | S_(SECCLASS_COLORMAP, COLORMAP__UNINSTALL, "uninstall") | ||
179 | S_(SECCLASS_COLORMAP, COLORMAP__LIST, "list") | ||
180 | S_(SECCLASS_COLORMAP, COLORMAP__READ, "read") | ||
181 | S_(SECCLASS_COLORMAP, COLORMAP__STORE, "store") | ||
182 | S_(SECCLASS_COLORMAP, COLORMAP__GETATTR, "getattr") | ||
183 | S_(SECCLASS_COLORMAP, COLORMAP__SETATTR, "setattr") | ||
184 | S_(SECCLASS_PROPERTY, PROPERTY__CREATE, "create") | ||
185 | S_(SECCLASS_PROPERTY, PROPERTY__FREE, "free") | ||
186 | S_(SECCLASS_PROPERTY, PROPERTY__READ, "read") | ||
187 | S_(SECCLASS_PROPERTY, PROPERTY__WRITE, "write") | ||
188 | S_(SECCLASS_CURSOR, CURSOR__CREATE, "create") | ||
189 | S_(SECCLASS_CURSOR, CURSOR__CREATEGLYPH, "createglyph") | ||
190 | S_(SECCLASS_CURSOR, CURSOR__FREE, "free") | ||
191 | S_(SECCLASS_CURSOR, CURSOR__ASSIGN, "assign") | ||
192 | S_(SECCLASS_CURSOR, CURSOR__SETATTR, "setattr") | ||
193 | S_(SECCLASS_XCLIENT, XCLIENT__KILL, "kill") | ||
194 | S_(SECCLASS_XINPUT, XINPUT__LOOKUP, "lookup") | ||
195 | S_(SECCLASS_XINPUT, XINPUT__GETATTR, "getattr") | ||
196 | S_(SECCLASS_XINPUT, XINPUT__SETATTR, "setattr") | ||
197 | S_(SECCLASS_XINPUT, XINPUT__SETFOCUS, "setfocus") | ||
198 | S_(SECCLASS_XINPUT, XINPUT__WARPPOINTER, "warppointer") | ||
199 | S_(SECCLASS_XINPUT, XINPUT__ACTIVEGRAB, "activegrab") | ||
200 | S_(SECCLASS_XINPUT, XINPUT__PASSIVEGRAB, "passivegrab") | ||
201 | S_(SECCLASS_XINPUT, XINPUT__UNGRAB, "ungrab") | ||
202 | S_(SECCLASS_XINPUT, XINPUT__BELL, "bell") | ||
203 | S_(SECCLASS_XINPUT, XINPUT__MOUSEMOTION, "mousemotion") | ||
204 | S_(SECCLASS_XINPUT, XINPUT__RELABELINPUT, "relabelinput") | ||
205 | S_(SECCLASS_XSERVER, XSERVER__SCREENSAVER, "screensaver") | ||
206 | S_(SECCLASS_XSERVER, XSERVER__GETHOSTLIST, "gethostlist") | ||
207 | S_(SECCLASS_XSERVER, XSERVER__SETHOSTLIST, "sethostlist") | ||
208 | S_(SECCLASS_XSERVER, XSERVER__GETFONTPATH, "getfontpath") | ||
209 | S_(SECCLASS_XSERVER, XSERVER__SETFONTPATH, "setfontpath") | ||
210 | S_(SECCLASS_XSERVER, XSERVER__GETATTR, "getattr") | ||
211 | S_(SECCLASS_XSERVER, XSERVER__GRAB, "grab") | ||
212 | S_(SECCLASS_XSERVER, XSERVER__UNGRAB, "ungrab") | ||
213 | S_(SECCLASS_XEXTENSION, XEXTENSION__QUERY, "query") | ||
214 | S_(SECCLASS_XEXTENSION, XEXTENSION__USE, "use") | ||
215 | S_(SECCLASS_PAX, PAX__PAGEEXEC, "pageexec") | ||
216 | S_(SECCLASS_PAX, PAX__EMUTRAMP, "emutramp") | ||
217 | S_(SECCLASS_PAX, PAX__MPROTECT, "mprotect") | ||
218 | S_(SECCLASS_PAX, PAX__RANDMMAP, "randmmap") | ||
219 | S_(SECCLASS_PAX, PAX__RANDEXEC, "randexec") | ||
220 | S_(SECCLASS_PAX, PAX__SEGMEXEC, "segmexec") | ||
221 | S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_READ, "nlmsg_read") | 131 | S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_READ, "nlmsg_read") |
222 | S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_WRITE, "nlmsg_write") | 132 | S_(SECCLASS_NETLINK_ROUTE_SOCKET, NETLINK_ROUTE_SOCKET__NLMSG_WRITE, "nlmsg_write") |
223 | S_(SECCLASS_NETLINK_FIREWALL_SOCKET, NETLINK_FIREWALL_SOCKET__NLMSG_READ, "nlmsg_read") | 133 | S_(SECCLASS_NETLINK_FIREWALL_SOCKET, NETLINK_FIREWALL_SOCKET__NLMSG_READ, "nlmsg_read") |
@@ -232,16 +142,6 @@ | |||
232 | S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_READPRIV, "nlmsg_readpriv") | 142 | S_(SECCLASS_NETLINK_AUDIT_SOCKET, NETLINK_AUDIT_SOCKET__NLMSG_READPRIV, "nlmsg_readpriv") |
233 | S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_READ, "nlmsg_read") | 143 | S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_READ, "nlmsg_read") |
234 | S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_WRITE, "nlmsg_write") | 144 | S_(SECCLASS_NETLINK_IP6FW_SOCKET, NETLINK_IP6FW_SOCKET__NLMSG_WRITE, "nlmsg_write") |
235 | S_(SECCLASS_DBUS, DBUS__ACQUIRE_SVC, "acquire_svc") | ||
236 | S_(SECCLASS_DBUS, DBUS__SEND_MSG, "send_msg") | ||
237 | S_(SECCLASS_NSCD, NSCD__GETPWD, "getpwd") | ||
238 | S_(SECCLASS_NSCD, NSCD__GETGRP, "getgrp") | ||
239 | S_(SECCLASS_NSCD, NSCD__GETHOST, "gethost") | ||
240 | S_(SECCLASS_NSCD, NSCD__GETSTAT, "getstat") | ||
241 | S_(SECCLASS_NSCD, NSCD__ADMIN, "admin") | ||
242 | S_(SECCLASS_NSCD, NSCD__SHMEMPWD, "shmempwd") | ||
243 | S_(SECCLASS_NSCD, NSCD__SHMEMGRP, "shmemgrp") | ||
244 | S_(SECCLASS_NSCD, NSCD__SHMEMHOST, "shmemhost") | ||
245 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, "sendto") | 145 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, "sendto") |
246 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, "recvfrom") | 146 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, "recvfrom") |
247 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, "setcontext") | 147 | S_(SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, "setcontext") |
@@ -256,7 +156,5 @@ | |||
256 | S_(SECCLASS_KEY, KEY__LINK, "link") | 156 | S_(SECCLASS_KEY, KEY__LINK, "link") |
257 | S_(SECCLASS_KEY, KEY__SETATTR, "setattr") | 157 | S_(SECCLASS_KEY, KEY__SETATTR, "setattr") |
258 | S_(SECCLASS_KEY, KEY__CREATE, "create") | 158 | S_(SECCLASS_KEY, KEY__CREATE, "create") |
259 | S_(SECCLASS_CONTEXT, CONTEXT__TRANSLATE, "translate") | ||
260 | S_(SECCLASS_CONTEXT, CONTEXT__CONTAINS, "contains") | ||
261 | S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NODE_BIND, "node_bind") | 159 | S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NODE_BIND, "node_bind") |
262 | S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NAME_CONNECT, "name_connect") | 160 | S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NAME_CONNECT, "name_connect") |
diff --git a/security/selinux/include/av_permissions.h b/security/selinux/include/av_permissions.h index 2de4b5fe3aa1..5fee1735bffe 100644 --- a/security/selinux/include/av_permissions.h +++ b/security/selinux/include/av_permissions.h | |||
@@ -16,7 +16,6 @@ | |||
16 | #define COMMON_FILE__SWAPON 0x00004000UL | 16 | #define COMMON_FILE__SWAPON 0x00004000UL |
17 | #define COMMON_FILE__QUOTAON 0x00008000UL | 17 | #define COMMON_FILE__QUOTAON 0x00008000UL |
18 | #define COMMON_FILE__MOUNTON 0x00010000UL | 18 | #define COMMON_FILE__MOUNTON 0x00010000UL |
19 | |||
20 | #define COMMON_SOCKET__IOCTL 0x00000001UL | 19 | #define COMMON_SOCKET__IOCTL 0x00000001UL |
21 | #define COMMON_SOCKET__READ 0x00000002UL | 20 | #define COMMON_SOCKET__READ 0x00000002UL |
22 | #define COMMON_SOCKET__WRITE 0x00000004UL | 21 | #define COMMON_SOCKET__WRITE 0x00000004UL |
@@ -39,7 +38,6 @@ | |||
39 | #define COMMON_SOCKET__RECV_MSG 0x00080000UL | 38 | #define COMMON_SOCKET__RECV_MSG 0x00080000UL |
40 | #define COMMON_SOCKET__SEND_MSG 0x00100000UL | 39 | #define COMMON_SOCKET__SEND_MSG 0x00100000UL |
41 | #define COMMON_SOCKET__NAME_BIND 0x00200000UL | 40 | #define COMMON_SOCKET__NAME_BIND 0x00200000UL |
42 | |||
43 | #define COMMON_IPC__CREATE 0x00000001UL | 41 | #define COMMON_IPC__CREATE 0x00000001UL |
44 | #define COMMON_IPC__DESTROY 0x00000002UL | 42 | #define COMMON_IPC__DESTROY 0x00000002UL |
45 | #define COMMON_IPC__GETATTR 0x00000004UL | 43 | #define COMMON_IPC__GETATTR 0x00000004UL |
@@ -49,7 +47,6 @@ | |||
49 | #define COMMON_IPC__ASSOCIATE 0x00000040UL | 47 | #define COMMON_IPC__ASSOCIATE 0x00000040UL |
50 | #define COMMON_IPC__UNIX_READ 0x00000080UL | 48 | #define COMMON_IPC__UNIX_READ 0x00000080UL |
51 | #define COMMON_IPC__UNIX_WRITE 0x00000100UL | 49 | #define COMMON_IPC__UNIX_WRITE 0x00000100UL |
52 | |||
53 | #define FILESYSTEM__MOUNT 0x00000001UL | 50 | #define FILESYSTEM__MOUNT 0x00000001UL |
54 | #define FILESYSTEM__REMOUNT 0x00000002UL | 51 | #define FILESYSTEM__REMOUNT 0x00000002UL |
55 | #define FILESYSTEM__UNMOUNT 0x00000004UL | 52 | #define FILESYSTEM__UNMOUNT 0x00000004UL |
@@ -60,7 +57,6 @@ | |||
60 | #define FILESYSTEM__ASSOCIATE 0x00000080UL | 57 | #define FILESYSTEM__ASSOCIATE 0x00000080UL |
61 | #define FILESYSTEM__QUOTAMOD 0x00000100UL | 58 | #define FILESYSTEM__QUOTAMOD 0x00000100UL |
62 | #define FILESYSTEM__QUOTAGET 0x00000200UL | 59 | #define FILESYSTEM__QUOTAGET 0x00000200UL |
63 | |||
64 | #define DIR__IOCTL 0x00000001UL | 60 | #define DIR__IOCTL 0x00000001UL |
65 | #define DIR__READ 0x00000002UL | 61 | #define DIR__READ 0x00000002UL |
66 | #define DIR__WRITE 0x00000004UL | 62 | #define DIR__WRITE 0x00000004UL |
@@ -78,13 +74,11 @@ | |||
78 | #define DIR__SWAPON 0x00004000UL | 74 | #define DIR__SWAPON 0x00004000UL |
79 | #define DIR__QUOTAON 0x00008000UL | 75 | #define DIR__QUOTAON 0x00008000UL |
80 | #define DIR__MOUNTON 0x00010000UL | 76 | #define DIR__MOUNTON 0x00010000UL |
81 | |||
82 | #define DIR__ADD_NAME 0x00020000UL | 77 | #define DIR__ADD_NAME 0x00020000UL |
83 | #define DIR__REMOVE_NAME 0x00040000UL | 78 | #define DIR__REMOVE_NAME 0x00040000UL |
84 | #define DIR__REPARENT 0x00080000UL | 79 | #define DIR__REPARENT 0x00080000UL |
85 | #define DIR__SEARCH 0x00100000UL | 80 | #define DIR__SEARCH 0x00100000UL |
86 | #define DIR__RMDIR 0x00200000UL | 81 | #define DIR__RMDIR 0x00200000UL |
87 | |||
88 | #define FILE__IOCTL 0x00000001UL | 82 | #define FILE__IOCTL 0x00000001UL |
89 | #define FILE__READ 0x00000002UL | 83 | #define FILE__READ 0x00000002UL |
90 | #define FILE__WRITE 0x00000004UL | 84 | #define FILE__WRITE 0x00000004UL |
@@ -102,11 +96,9 @@ | |||
102 | #define FILE__SWAPON 0x00004000UL | 96 | #define FILE__SWAPON 0x00004000UL |
103 | #define FILE__QUOTAON 0x00008000UL | 97 | #define FILE__QUOTAON 0x00008000UL |
104 | #define FILE__MOUNTON 0x00010000UL | 98 | #define FILE__MOUNTON 0x00010000UL |
105 | |||
106 | #define FILE__EXECUTE_NO_TRANS 0x00020000UL | 99 | #define FILE__EXECUTE_NO_TRANS 0x00020000UL |
107 | #define FILE__ENTRYPOINT 0x00040000UL | 100 | #define FILE__ENTRYPOINT 0x00040000UL |
108 | #define FILE__EXECMOD 0x00080000UL | 101 | #define FILE__EXECMOD 0x00080000UL |
109 | |||
110 | #define LNK_FILE__IOCTL 0x00000001UL | 102 | #define LNK_FILE__IOCTL 0x00000001UL |
111 | #define LNK_FILE__READ 0x00000002UL | 103 | #define LNK_FILE__READ 0x00000002UL |
112 | #define LNK_FILE__WRITE 0x00000004UL | 104 | #define LNK_FILE__WRITE 0x00000004UL |
@@ -124,7 +116,6 @@ | |||
124 | #define LNK_FILE__SWAPON 0x00004000UL | 116 | #define LNK_FILE__SWAPON 0x00004000UL |
125 | #define LNK_FILE__QUOTAON 0x00008000UL | 117 | #define LNK_FILE__QUOTAON 0x00008000UL |
126 | #define LNK_FILE__MOUNTON 0x00010000UL | 118 | #define LNK_FILE__MOUNTON 0x00010000UL |
127 | |||
128 | #define CHR_FILE__IOCTL 0x00000001UL | 119 | #define CHR_FILE__IOCTL 0x00000001UL |
129 | #define CHR_FILE__READ 0x00000002UL | 120 | #define CHR_FILE__READ 0x00000002UL |
130 | #define CHR_FILE__WRITE 0x00000004UL | 121 | #define CHR_FILE__WRITE 0x00000004UL |
@@ -142,11 +133,9 @@ | |||
142 | #define CHR_FILE__SWAPON 0x00004000UL | 133 | #define CHR_FILE__SWAPON 0x00004000UL |
143 | #define CHR_FILE__QUOTAON 0x00008000UL | 134 | #define CHR_FILE__QUOTAON 0x00008000UL |
144 | #define CHR_FILE__MOUNTON 0x00010000UL | 135 | #define CHR_FILE__MOUNTON 0x00010000UL |
145 | |||
146 | #define CHR_FILE__EXECUTE_NO_TRANS 0x00020000UL | 136 | #define CHR_FILE__EXECUTE_NO_TRANS 0x00020000UL |
147 | #define CHR_FILE__ENTRYPOINT 0x00040000UL | 137 | #define CHR_FILE__ENTRYPOINT 0x00040000UL |
148 | #define CHR_FILE__EXECMOD 0x00080000UL | 138 | #define CHR_FILE__EXECMOD 0x00080000UL |
149 | |||
150 | #define BLK_FILE__IOCTL 0x00000001UL | 139 | #define BLK_FILE__IOCTL 0x00000001UL |
151 | #define BLK_FILE__READ 0x00000002UL | 140 | #define BLK_FILE__READ 0x00000002UL |
152 | #define BLK_FILE__WRITE 0x00000004UL | 141 | #define BLK_FILE__WRITE 0x00000004UL |
@@ -164,7 +153,6 @@ | |||
164 | #define BLK_FILE__SWAPON 0x00004000UL | 153 | #define BLK_FILE__SWAPON 0x00004000UL |
165 | #define BLK_FILE__QUOTAON 0x00008000UL | 154 | #define BLK_FILE__QUOTAON 0x00008000UL |
166 | #define BLK_FILE__MOUNTON 0x00010000UL | 155 | #define BLK_FILE__MOUNTON 0x00010000UL |
167 | |||
168 | #define SOCK_FILE__IOCTL 0x00000001UL | 156 | #define SOCK_FILE__IOCTL 0x00000001UL |
169 | #define SOCK_FILE__READ 0x00000002UL | 157 | #define SOCK_FILE__READ 0x00000002UL |
170 | #define SOCK_FILE__WRITE 0x00000004UL | 158 | #define SOCK_FILE__WRITE 0x00000004UL |
@@ -182,7 +170,6 @@ | |||
182 | #define SOCK_FILE__SWAPON 0x00004000UL | 170 | #define SOCK_FILE__SWAPON 0x00004000UL |
183 | #define SOCK_FILE__QUOTAON 0x00008000UL | 171 | #define SOCK_FILE__QUOTAON 0x00008000UL |
184 | #define SOCK_FILE__MOUNTON 0x00010000UL | 172 | #define SOCK_FILE__MOUNTON 0x00010000UL |
185 | |||
186 | #define FIFO_FILE__IOCTL 0x00000001UL | 173 | #define FIFO_FILE__IOCTL 0x00000001UL |
187 | #define FIFO_FILE__READ 0x00000002UL | 174 | #define FIFO_FILE__READ 0x00000002UL |
188 | #define FIFO_FILE__WRITE 0x00000004UL | 175 | #define FIFO_FILE__WRITE 0x00000004UL |
@@ -200,9 +187,7 @@ | |||
200 | #define FIFO_FILE__SWAPON 0x00004000UL | 187 | #define FIFO_FILE__SWAPON 0x00004000UL |
201 | #define FIFO_FILE__QUOTAON 0x00008000UL | 188 | #define FIFO_FILE__QUOTAON 0x00008000UL |
202 | #define FIFO_FILE__MOUNTON 0x00010000UL | 189 | #define FIFO_FILE__MOUNTON 0x00010000UL |
203 | |||
204 | #define FD__USE 0x00000001UL | 190 | #define FD__USE 0x00000001UL |
205 | |||
206 | #define SOCKET__IOCTL 0x00000001UL | 191 | #define SOCKET__IOCTL 0x00000001UL |
207 | #define SOCKET__READ 0x00000002UL | 192 | #define SOCKET__READ 0x00000002UL |
208 | #define SOCKET__WRITE 0x00000004UL | 193 | #define SOCKET__WRITE 0x00000004UL |
@@ -225,7 +210,6 @@ | |||
225 | #define SOCKET__RECV_MSG 0x00080000UL | 210 | #define SOCKET__RECV_MSG 0x00080000UL |
226 | #define SOCKET__SEND_MSG 0x00100000UL | 211 | #define SOCKET__SEND_MSG 0x00100000UL |
227 | #define SOCKET__NAME_BIND 0x00200000UL | 212 | #define SOCKET__NAME_BIND 0x00200000UL |
228 | |||
229 | #define TCP_SOCKET__IOCTL 0x00000001UL | 213 | #define TCP_SOCKET__IOCTL 0x00000001UL |
230 | #define TCP_SOCKET__READ 0x00000002UL | 214 | #define TCP_SOCKET__READ 0x00000002UL |
231 | #define TCP_SOCKET__WRITE 0x00000004UL | 215 | #define TCP_SOCKET__WRITE 0x00000004UL |
@@ -248,13 +232,11 @@ | |||
248 | #define TCP_SOCKET__RECV_MSG 0x00080000UL | 232 | #define TCP_SOCKET__RECV_MSG 0x00080000UL |
249 | #define TCP_SOCKET__SEND_MSG 0x00100000UL | 233 | #define TCP_SOCKET__SEND_MSG 0x00100000UL |
250 | #define TCP_SOCKET__NAME_BIND 0x00200000UL | 234 | #define TCP_SOCKET__NAME_BIND 0x00200000UL |
251 | |||
252 | #define TCP_SOCKET__CONNECTTO 0x00400000UL | 235 | #define TCP_SOCKET__CONNECTTO 0x00400000UL |
253 | #define TCP_SOCKET__NEWCONN 0x00800000UL | 236 | #define TCP_SOCKET__NEWCONN 0x00800000UL |
254 | #define TCP_SOCKET__ACCEPTFROM 0x01000000UL | 237 | #define TCP_SOCKET__ACCEPTFROM 0x01000000UL |
255 | #define TCP_SOCKET__NODE_BIND 0x02000000UL | 238 | #define TCP_SOCKET__NODE_BIND 0x02000000UL |
256 | #define TCP_SOCKET__NAME_CONNECT 0x04000000UL | 239 | #define TCP_SOCKET__NAME_CONNECT 0x04000000UL |
257 | |||
258 | #define UDP_SOCKET__IOCTL 0x00000001UL | 240 | #define UDP_SOCKET__IOCTL 0x00000001UL |
259 | #define UDP_SOCKET__READ 0x00000002UL | 241 | #define UDP_SOCKET__READ 0x00000002UL |
260 | #define UDP_SOCKET__WRITE 0x00000004UL | 242 | #define UDP_SOCKET__WRITE 0x00000004UL |
@@ -277,9 +259,7 @@ | |||
277 | #define UDP_SOCKET__RECV_MSG 0x00080000UL | 259 | #define UDP_SOCKET__RECV_MSG 0x00080000UL |
278 | #define UDP_SOCKET__SEND_MSG 0x00100000UL | 260 | #define UDP_SOCKET__SEND_MSG 0x00100000UL |
279 | #define UDP_SOCKET__NAME_BIND 0x00200000UL | 261 | #define UDP_SOCKET__NAME_BIND 0x00200000UL |
280 | |||
281 | #define UDP_SOCKET__NODE_BIND 0x00400000UL | 262 | #define UDP_SOCKET__NODE_BIND 0x00400000UL |
282 | |||
283 | #define RAWIP_SOCKET__IOCTL 0x00000001UL | 263 | #define RAWIP_SOCKET__IOCTL 0x00000001UL |
284 | #define RAWIP_SOCKET__READ 0x00000002UL | 264 | #define RAWIP_SOCKET__READ 0x00000002UL |
285 | #define RAWIP_SOCKET__WRITE 0x00000004UL | 265 | #define RAWIP_SOCKET__WRITE 0x00000004UL |
@@ -302,9 +282,7 @@ | |||
302 | #define RAWIP_SOCKET__RECV_MSG 0x00080000UL | 282 | #define RAWIP_SOCKET__RECV_MSG 0x00080000UL |
303 | #define RAWIP_SOCKET__SEND_MSG 0x00100000UL | 283 | #define RAWIP_SOCKET__SEND_MSG 0x00100000UL |
304 | #define RAWIP_SOCKET__NAME_BIND 0x00200000UL | 284 | #define RAWIP_SOCKET__NAME_BIND 0x00200000UL |
305 | |||
306 | #define RAWIP_SOCKET__NODE_BIND 0x00400000UL | 285 | #define RAWIP_SOCKET__NODE_BIND 0x00400000UL |
307 | |||
308 | #define NODE__TCP_RECV 0x00000001UL | 286 | #define NODE__TCP_RECV 0x00000001UL |
309 | #define NODE__TCP_SEND 0x00000002UL | 287 | #define NODE__TCP_SEND 0x00000002UL |
310 | #define NODE__UDP_RECV 0x00000004UL | 288 | #define NODE__UDP_RECV 0x00000004UL |
@@ -314,7 +292,6 @@ | |||
314 | #define NODE__ENFORCE_DEST 0x00000040UL | 292 | #define NODE__ENFORCE_DEST 0x00000040UL |
315 | #define NODE__DCCP_RECV 0x00000080UL | 293 | #define NODE__DCCP_RECV 0x00000080UL |
316 | #define NODE__DCCP_SEND 0x00000100UL | 294 | #define NODE__DCCP_SEND 0x00000100UL |
317 | |||
318 | #define NETIF__TCP_RECV 0x00000001UL | 295 | #define NETIF__TCP_RECV 0x00000001UL |
319 | #define NETIF__TCP_SEND 0x00000002UL | 296 | #define NETIF__TCP_SEND 0x00000002UL |
320 | #define NETIF__UDP_RECV 0x00000004UL | 297 | #define NETIF__UDP_RECV 0x00000004UL |
@@ -323,7 +300,6 @@ | |||
323 | #define NETIF__RAWIP_SEND 0x00000020UL | 300 | #define NETIF__RAWIP_SEND 0x00000020UL |
324 | #define NETIF__DCCP_RECV 0x00000040UL | 301 | #define NETIF__DCCP_RECV 0x00000040UL |
325 | #define NETIF__DCCP_SEND 0x00000080UL | 302 | #define NETIF__DCCP_SEND 0x00000080UL |
326 | |||
327 | #define NETLINK_SOCKET__IOCTL 0x00000001UL | 303 | #define NETLINK_SOCKET__IOCTL 0x00000001UL |
328 | #define NETLINK_SOCKET__READ 0x00000002UL | 304 | #define NETLINK_SOCKET__READ 0x00000002UL |
329 | #define NETLINK_SOCKET__WRITE 0x00000004UL | 305 | #define NETLINK_SOCKET__WRITE 0x00000004UL |
@@ -346,7 +322,6 @@ | |||
346 | #define NETLINK_SOCKET__RECV_MSG 0x00080000UL | 322 | #define NETLINK_SOCKET__RECV_MSG 0x00080000UL |
347 | #define NETLINK_SOCKET__SEND_MSG 0x00100000UL | 323 | #define NETLINK_SOCKET__SEND_MSG 0x00100000UL |
348 | #define NETLINK_SOCKET__NAME_BIND 0x00200000UL | 324 | #define NETLINK_SOCKET__NAME_BIND 0x00200000UL |
349 | |||
350 | #define PACKET_SOCKET__IOCTL 0x00000001UL | 325 | #define PACKET_SOCKET__IOCTL 0x00000001UL |
351 | #define PACKET_SOCKET__READ 0x00000002UL | 326 | #define PACKET_SOCKET__READ 0x00000002UL |
352 | #define PACKET_SOCKET__WRITE 0x00000004UL | 327 | #define PACKET_SOCKET__WRITE 0x00000004UL |
@@ -369,7 +344,6 @@ | |||
369 | #define PACKET_SOCKET__RECV_MSG 0x00080000UL | 344 | #define PACKET_SOCKET__RECV_MSG 0x00080000UL |
370 | #define PACKET_SOCKET__SEND_MSG 0x00100000UL | 345 | #define PACKET_SOCKET__SEND_MSG 0x00100000UL |
371 | #define PACKET_SOCKET__NAME_BIND 0x00200000UL | 346 | #define PACKET_SOCKET__NAME_BIND 0x00200000UL |
372 | |||
373 | #define KEY_SOCKET__IOCTL 0x00000001UL | 347 | #define KEY_SOCKET__IOCTL 0x00000001UL |
374 | #define KEY_SOCKET__READ 0x00000002UL | 348 | #define KEY_SOCKET__READ 0x00000002UL |
375 | #define KEY_SOCKET__WRITE 0x00000004UL | 349 | #define KEY_SOCKET__WRITE 0x00000004UL |
@@ -392,7 +366,6 @@ | |||
392 | #define KEY_SOCKET__RECV_MSG 0x00080000UL | 366 | #define KEY_SOCKET__RECV_MSG 0x00080000UL |
393 | #define KEY_SOCKET__SEND_MSG 0x00100000UL | 367 | #define KEY_SOCKET__SEND_MSG 0x00100000UL |
394 | #define KEY_SOCKET__NAME_BIND 0x00200000UL | 368 | #define KEY_SOCKET__NAME_BIND 0x00200000UL |
395 | |||
396 | #define UNIX_STREAM_SOCKET__IOCTL 0x00000001UL | 369 | #define UNIX_STREAM_SOCKET__IOCTL 0x00000001UL |
397 | #define UNIX_STREAM_SOCKET__READ 0x00000002UL | 370 | #define UNIX_STREAM_SOCKET__READ 0x00000002UL |
398 | #define UNIX_STREAM_SOCKET__WRITE 0x00000004UL | 371 | #define UNIX_STREAM_SOCKET__WRITE 0x00000004UL |
@@ -415,11 +388,9 @@ | |||
415 | #define UNIX_STREAM_SOCKET__RECV_MSG 0x00080000UL | 388 | #define UNIX_STREAM_SOCKET__RECV_MSG 0x00080000UL |
416 | #define UNIX_STREAM_SOCKET__SEND_MSG 0x00100000UL | 389 | #define UNIX_STREAM_SOCKET__SEND_MSG 0x00100000UL |
417 | #define UNIX_STREAM_SOCKET__NAME_BIND 0x00200000UL | 390 | #define UNIX_STREAM_SOCKET__NAME_BIND 0x00200000UL |
418 | |||
419 | #define UNIX_STREAM_SOCKET__CONNECTTO 0x00400000UL | 391 | #define UNIX_STREAM_SOCKET__CONNECTTO 0x00400000UL |
420 | #define UNIX_STREAM_SOCKET__NEWCONN 0x00800000UL | 392 | #define UNIX_STREAM_SOCKET__NEWCONN 0x00800000UL |
421 | #define UNIX_STREAM_SOCKET__ACCEPTFROM 0x01000000UL | 393 | #define UNIX_STREAM_SOCKET__ACCEPTFROM 0x01000000UL |
422 | |||
423 | #define UNIX_DGRAM_SOCKET__IOCTL 0x00000001UL | 394 | #define UNIX_DGRAM_SOCKET__IOCTL 0x00000001UL |
424 | #define UNIX_DGRAM_SOCKET__READ 0x00000002UL | 395 | #define UNIX_DGRAM_SOCKET__READ 0x00000002UL |
425 | #define UNIX_DGRAM_SOCKET__WRITE 0x00000004UL | 396 | #define UNIX_DGRAM_SOCKET__WRITE 0x00000004UL |
@@ -442,7 +413,6 @@ | |||
442 | #define UNIX_DGRAM_SOCKET__RECV_MSG 0x00080000UL | 413 | #define UNIX_DGRAM_SOCKET__RECV_MSG 0x00080000UL |
443 | #define UNIX_DGRAM_SOCKET__SEND_MSG 0x00100000UL | 414 | #define UNIX_DGRAM_SOCKET__SEND_MSG 0x00100000UL |
444 | #define UNIX_DGRAM_SOCKET__NAME_BIND 0x00200000UL | 415 | #define UNIX_DGRAM_SOCKET__NAME_BIND 0x00200000UL |
445 | |||
446 | #define PROCESS__FORK 0x00000001UL | 416 | #define PROCESS__FORK 0x00000001UL |
447 | #define PROCESS__TRANSITION 0x00000002UL | 417 | #define PROCESS__TRANSITION 0x00000002UL |
448 | #define PROCESS__SIGCHLD 0x00000004UL | 418 | #define PROCESS__SIGCHLD 0x00000004UL |
@@ -473,7 +443,6 @@ | |||
473 | #define PROCESS__EXECHEAP 0x08000000UL | 443 | #define PROCESS__EXECHEAP 0x08000000UL |
474 | #define PROCESS__SETKEYCREATE 0x10000000UL | 444 | #define PROCESS__SETKEYCREATE 0x10000000UL |
475 | #define PROCESS__SETSOCKCREATE 0x20000000UL | 445 | #define PROCESS__SETSOCKCREATE 0x20000000UL |
476 | |||
477 | #define IPC__CREATE 0x00000001UL | 446 | #define IPC__CREATE 0x00000001UL |
478 | #define IPC__DESTROY 0x00000002UL | 447 | #define IPC__DESTROY 0x00000002UL |
479 | #define IPC__GETATTR 0x00000004UL | 448 | #define IPC__GETATTR 0x00000004UL |
@@ -483,7 +452,6 @@ | |||
483 | #define IPC__ASSOCIATE 0x00000040UL | 452 | #define IPC__ASSOCIATE 0x00000040UL |
484 | #define IPC__UNIX_READ 0x00000080UL | 453 | #define IPC__UNIX_READ 0x00000080UL |
485 | #define IPC__UNIX_WRITE 0x00000100UL | 454 | #define IPC__UNIX_WRITE 0x00000100UL |
486 | |||
487 | #define SEM__CREATE 0x00000001UL | 455 | #define SEM__CREATE 0x00000001UL |
488 | #define SEM__DESTROY 0x00000002UL | 456 | #define SEM__DESTROY 0x00000002UL |
489 | #define SEM__GETATTR 0x00000004UL | 457 | #define SEM__GETATTR 0x00000004UL |
@@ -493,7 +461,6 @@ | |||
493 | #define SEM__ASSOCIATE 0x00000040UL | 461 | #define SEM__ASSOCIATE 0x00000040UL |
494 | #define SEM__UNIX_READ 0x00000080UL | 462 | #define SEM__UNIX_READ 0x00000080UL |
495 | #define SEM__UNIX_WRITE 0x00000100UL | 463 | #define SEM__UNIX_WRITE 0x00000100UL |
496 | |||
497 | #define MSGQ__CREATE 0x00000001UL | 464 | #define MSGQ__CREATE 0x00000001UL |
498 | #define MSGQ__DESTROY 0x00000002UL | 465 | #define MSGQ__DESTROY 0x00000002UL |
499 | #define MSGQ__GETATTR 0x00000004UL | 466 | #define MSGQ__GETATTR 0x00000004UL |
@@ -503,12 +470,9 @@ | |||
503 | #define MSGQ__ASSOCIATE 0x00000040UL | 470 | #define MSGQ__ASSOCIATE 0x00000040UL |
504 | #define MSGQ__UNIX_READ 0x00000080UL | 471 | #define MSGQ__UNIX_READ 0x00000080UL |
505 | #define MSGQ__UNIX_WRITE 0x00000100UL | 472 | #define MSGQ__UNIX_WRITE 0x00000100UL |
506 | |||
507 | #define MSGQ__ENQUEUE 0x00000200UL | 473 | #define MSGQ__ENQUEUE 0x00000200UL |
508 | |||
509 | #define MSG__SEND 0x00000001UL | 474 | #define MSG__SEND 0x00000001UL |
510 | #define MSG__RECEIVE 0x00000002UL | 475 | #define MSG__RECEIVE 0x00000002UL |
511 | |||
512 | #define SHM__CREATE 0x00000001UL | 476 | #define SHM__CREATE 0x00000001UL |
513 | #define SHM__DESTROY 0x00000002UL | 477 | #define SHM__DESTROY 0x00000002UL |
514 | #define SHM__GETATTR 0x00000004UL | 478 | #define SHM__GETATTR 0x00000004UL |
@@ -518,9 +482,7 @@ | |||
518 | #define SHM__ASSOCIATE 0x00000040UL | 482 | #define SHM__ASSOCIATE 0x00000040UL |
519 | #define SHM__UNIX_READ 0x00000080UL | 483 | #define SHM__UNIX_READ 0x00000080UL |
520 | #define SHM__UNIX_WRITE 0x00000100UL | 484 | #define SHM__UNIX_WRITE 0x00000100UL |
521 | |||
522 | #define SHM__LOCK 0x00000200UL | 485 | #define SHM__LOCK 0x00000200UL |
523 | |||
524 | #define SECURITY__COMPUTE_AV 0x00000001UL | 486 | #define SECURITY__COMPUTE_AV 0x00000001UL |
525 | #define SECURITY__COMPUTE_CREATE 0x00000002UL | 487 | #define SECURITY__COMPUTE_CREATE 0x00000002UL |
526 | #define SECURITY__COMPUTE_MEMBER 0x00000004UL | 488 | #define SECURITY__COMPUTE_MEMBER 0x00000004UL |
@@ -532,12 +494,10 @@ | |||
532 | #define SECURITY__SETBOOL 0x00000100UL | 494 | #define SECURITY__SETBOOL 0x00000100UL |
533 | #define SECURITY__SETSECPARAM 0x00000200UL | 495 | #define SECURITY__SETSECPARAM 0x00000200UL |
534 | #define SECURITY__SETCHECKREQPROT 0x00000400UL | 496 | #define SECURITY__SETCHECKREQPROT 0x00000400UL |
535 | |||
536 | #define SYSTEM__IPC_INFO 0x00000001UL | 497 | #define SYSTEM__IPC_INFO 0x00000001UL |
537 | #define SYSTEM__SYSLOG_READ 0x00000002UL | 498 | #define SYSTEM__SYSLOG_READ 0x00000002UL |
538 | #define SYSTEM__SYSLOG_MOD 0x00000004UL | 499 | #define SYSTEM__SYSLOG_MOD 0x00000004UL |
539 | #define SYSTEM__SYSLOG_CONSOLE 0x00000008UL | 500 | #define SYSTEM__SYSLOG_CONSOLE 0x00000008UL |
540 | |||
541 | #define CAPABILITY__CHOWN 0x00000001UL | 501 | #define CAPABILITY__CHOWN 0x00000001UL |
542 | #define CAPABILITY__DAC_OVERRIDE 0x00000002UL | 502 | #define CAPABILITY__DAC_OVERRIDE 0x00000002UL |
543 | #define CAPABILITY__DAC_READ_SEARCH 0x00000004UL | 503 | #define CAPABILITY__DAC_READ_SEARCH 0x00000004UL |
@@ -569,110 +529,6 @@ | |||
569 | #define CAPABILITY__LEASE 0x10000000UL | 529 | #define CAPABILITY__LEASE 0x10000000UL |
570 | #define CAPABILITY__AUDIT_WRITE 0x20000000UL | 530 | #define CAPABILITY__AUDIT_WRITE 0x20000000UL |
571 | #define CAPABILITY__AUDIT_CONTROL 0x40000000UL | 531 | #define CAPABILITY__AUDIT_CONTROL 0x40000000UL |
572 | |||
573 | #define PASSWD__PASSWD 0x00000001UL | ||
574 | #define PASSWD__CHFN 0x00000002UL | ||
575 | #define PASSWD__CHSH 0x00000004UL | ||
576 | #define PASSWD__ROOTOK 0x00000008UL | ||
577 | #define PASSWD__CRONTAB 0x00000010UL | ||
578 | |||
579 | #define DRAWABLE__CREATE 0x00000001UL | ||
580 | #define DRAWABLE__DESTROY 0x00000002UL | ||
581 | #define DRAWABLE__DRAW 0x00000004UL | ||
582 | #define DRAWABLE__COPY 0x00000008UL | ||
583 | #define DRAWABLE__GETATTR 0x00000010UL | ||
584 | |||
585 | #define GC__CREATE 0x00000001UL | ||
586 | #define GC__FREE 0x00000002UL | ||
587 | #define GC__GETATTR 0x00000004UL | ||
588 | #define GC__SETATTR 0x00000008UL | ||
589 | |||
590 | #define WINDOW__ADDCHILD 0x00000001UL | ||
591 | #define WINDOW__CREATE 0x00000002UL | ||
592 | #define WINDOW__DESTROY 0x00000004UL | ||
593 | #define WINDOW__MAP 0x00000008UL | ||
594 | #define WINDOW__UNMAP 0x00000010UL | ||
595 | #define WINDOW__CHSTACK 0x00000020UL | ||
596 | #define WINDOW__CHPROPLIST 0x00000040UL | ||
597 | #define WINDOW__CHPROP 0x00000080UL | ||
598 | #define WINDOW__LISTPROP 0x00000100UL | ||
599 | #define WINDOW__GETATTR 0x00000200UL | ||
600 | #define WINDOW__SETATTR 0x00000400UL | ||
601 | #define WINDOW__SETFOCUS 0x00000800UL | ||
602 | #define WINDOW__MOVE 0x00001000UL | ||
603 | #define WINDOW__CHSELECTION 0x00002000UL | ||
604 | #define WINDOW__CHPARENT 0x00004000UL | ||
605 | #define WINDOW__CTRLLIFE 0x00008000UL | ||
606 | #define WINDOW__ENUMERATE 0x00010000UL | ||
607 | #define WINDOW__TRANSPARENT 0x00020000UL | ||
608 | #define WINDOW__MOUSEMOTION 0x00040000UL | ||
609 | #define WINDOW__CLIENTCOMEVENT 0x00080000UL | ||
610 | #define WINDOW__INPUTEVENT 0x00100000UL | ||
611 | #define WINDOW__DRAWEVENT 0x00200000UL | ||
612 | #define WINDOW__WINDOWCHANGEEVENT 0x00400000UL | ||
613 | #define WINDOW__WINDOWCHANGEREQUEST 0x00800000UL | ||
614 | #define WINDOW__SERVERCHANGEEVENT 0x01000000UL | ||
615 | #define WINDOW__EXTENSIONEVENT 0x02000000UL | ||
616 | |||
617 | #define FONT__LOAD 0x00000001UL | ||
618 | #define FONT__FREE 0x00000002UL | ||
619 | #define FONT__GETATTR 0x00000004UL | ||
620 | #define FONT__USE 0x00000008UL | ||
621 | |||
622 | #define COLORMAP__CREATE 0x00000001UL | ||
623 | #define COLORMAP__FREE 0x00000002UL | ||
624 | #define COLORMAP__INSTALL 0x00000004UL | ||
625 | #define COLORMAP__UNINSTALL 0x00000008UL | ||
626 | #define COLORMAP__LIST 0x00000010UL | ||
627 | #define COLORMAP__READ 0x00000020UL | ||
628 | #define COLORMAP__STORE 0x00000040UL | ||
629 | #define COLORMAP__GETATTR 0x00000080UL | ||
630 | #define COLORMAP__SETATTR 0x00000100UL | ||
631 | |||
632 | #define PROPERTY__CREATE 0x00000001UL | ||
633 | #define PROPERTY__FREE 0x00000002UL | ||
634 | #define PROPERTY__READ 0x00000004UL | ||
635 | #define PROPERTY__WRITE 0x00000008UL | ||
636 | |||
637 | #define CURSOR__CREATE 0x00000001UL | ||
638 | #define CURSOR__CREATEGLYPH 0x00000002UL | ||
639 | #define CURSOR__FREE 0x00000004UL | ||
640 | #define CURSOR__ASSIGN 0x00000008UL | ||
641 | #define CURSOR__SETATTR 0x00000010UL | ||
642 | |||
643 | #define XCLIENT__KILL 0x00000001UL | ||
644 | |||
645 | #define XINPUT__LOOKUP 0x00000001UL | ||
646 | #define XINPUT__GETATTR 0x00000002UL | ||
647 | #define XINPUT__SETATTR 0x00000004UL | ||
648 | #define XINPUT__SETFOCUS 0x00000008UL | ||
649 | #define XINPUT__WARPPOINTER 0x00000010UL | ||
650 | #define XINPUT__ACTIVEGRAB 0x00000020UL | ||
651 | #define XINPUT__PASSIVEGRAB 0x00000040UL | ||
652 | #define XINPUT__UNGRAB 0x00000080UL | ||
653 | #define XINPUT__BELL 0x00000100UL | ||
654 | #define XINPUT__MOUSEMOTION 0x00000200UL | ||
655 | #define XINPUT__RELABELINPUT 0x00000400UL | ||
656 | |||
657 | #define XSERVER__SCREENSAVER 0x00000001UL | ||
658 | #define XSERVER__GETHOSTLIST 0x00000002UL | ||
659 | #define XSERVER__SETHOSTLIST 0x00000004UL | ||
660 | #define XSERVER__GETFONTPATH 0x00000008UL | ||
661 | #define XSERVER__SETFONTPATH 0x00000010UL | ||
662 | #define XSERVER__GETATTR 0x00000020UL | ||
663 | #define XSERVER__GRAB 0x00000040UL | ||
664 | #define XSERVER__UNGRAB 0x00000080UL | ||
665 | |||
666 | #define XEXTENSION__QUERY 0x00000001UL | ||
667 | #define XEXTENSION__USE 0x00000002UL | ||
668 | |||
669 | #define PAX__PAGEEXEC 0x00000001UL | ||
670 | #define PAX__EMUTRAMP 0x00000002UL | ||
671 | #define PAX__MPROTECT 0x00000004UL | ||
672 | #define PAX__RANDMMAP 0x00000008UL | ||
673 | #define PAX__RANDEXEC 0x00000010UL | ||
674 | #define PAX__SEGMEXEC 0x00000020UL | ||
675 | |||
676 | #define NETLINK_ROUTE_SOCKET__IOCTL 0x00000001UL | 532 | #define NETLINK_ROUTE_SOCKET__IOCTL 0x00000001UL |
677 | #define NETLINK_ROUTE_SOCKET__READ 0x00000002UL | 533 | #define NETLINK_ROUTE_SOCKET__READ 0x00000002UL |
678 | #define NETLINK_ROUTE_SOCKET__WRITE 0x00000004UL | 534 | #define NETLINK_ROUTE_SOCKET__WRITE 0x00000004UL |
@@ -695,10 +551,8 @@ | |||
695 | #define NETLINK_ROUTE_SOCKET__RECV_MSG 0x00080000UL | 551 | #define NETLINK_ROUTE_SOCKET__RECV_MSG 0x00080000UL |
696 | #define NETLINK_ROUTE_SOCKET__SEND_MSG 0x00100000UL | 552 | #define NETLINK_ROUTE_SOCKET__SEND_MSG 0x00100000UL |
697 | #define NETLINK_ROUTE_SOCKET__NAME_BIND 0x00200000UL | 553 | #define NETLINK_ROUTE_SOCKET__NAME_BIND 0x00200000UL |
698 | |||
699 | #define NETLINK_ROUTE_SOCKET__NLMSG_READ 0x00400000UL | 554 | #define NETLINK_ROUTE_SOCKET__NLMSG_READ 0x00400000UL |
700 | #define NETLINK_ROUTE_SOCKET__NLMSG_WRITE 0x00800000UL | 555 | #define NETLINK_ROUTE_SOCKET__NLMSG_WRITE 0x00800000UL |
701 | |||
702 | #define NETLINK_FIREWALL_SOCKET__IOCTL 0x00000001UL | 556 | #define NETLINK_FIREWALL_SOCKET__IOCTL 0x00000001UL |
703 | #define NETLINK_FIREWALL_SOCKET__READ 0x00000002UL | 557 | #define NETLINK_FIREWALL_SOCKET__READ 0x00000002UL |
704 | #define NETLINK_FIREWALL_SOCKET__WRITE 0x00000004UL | 558 | #define NETLINK_FIREWALL_SOCKET__WRITE 0x00000004UL |
@@ -721,10 +575,8 @@ | |||
721 | #define NETLINK_FIREWALL_SOCKET__RECV_MSG 0x00080000UL | 575 | #define NETLINK_FIREWALL_SOCKET__RECV_MSG 0x00080000UL |
722 | #define NETLINK_FIREWALL_SOCKET__SEND_MSG 0x00100000UL | 576 | #define NETLINK_FIREWALL_SOCKET__SEND_MSG 0x00100000UL |
723 | #define NETLINK_FIREWALL_SOCKET__NAME_BIND 0x00200000UL | 577 | #define NETLINK_FIREWALL_SOCKET__NAME_BIND 0x00200000UL |
724 | |||
725 | #define NETLINK_FIREWALL_SOCKET__NLMSG_READ 0x00400000UL | 578 | #define NETLINK_FIREWALL_SOCKET__NLMSG_READ 0x00400000UL |
726 | #define NETLINK_FIREWALL_SOCKET__NLMSG_WRITE 0x00800000UL | 579 | #define NETLINK_FIREWALL_SOCKET__NLMSG_WRITE 0x00800000UL |
727 | |||
728 | #define NETLINK_TCPDIAG_SOCKET__IOCTL 0x00000001UL | 580 | #define NETLINK_TCPDIAG_SOCKET__IOCTL 0x00000001UL |
729 | #define NETLINK_TCPDIAG_SOCKET__READ 0x00000002UL | 581 | #define NETLINK_TCPDIAG_SOCKET__READ 0x00000002UL |
730 | #define NETLINK_TCPDIAG_SOCKET__WRITE 0x00000004UL | 582 | #define NETLINK_TCPDIAG_SOCKET__WRITE 0x00000004UL |
@@ -747,10 +599,8 @@ | |||
747 | #define NETLINK_TCPDIAG_SOCKET__RECV_MSG 0x00080000UL | 599 | #define NETLINK_TCPDIAG_SOCKET__RECV_MSG 0x00080000UL |
748 | #define NETLINK_TCPDIAG_SOCKET__SEND_MSG 0x00100000UL | 600 | #define NETLINK_TCPDIAG_SOCKET__SEND_MSG 0x00100000UL |
749 | #define NETLINK_TCPDIAG_SOCKET__NAME_BIND 0x00200000UL | 601 | #define NETLINK_TCPDIAG_SOCKET__NAME_BIND 0x00200000UL |
750 | |||
751 | #define NETLINK_TCPDIAG_SOCKET__NLMSG_READ 0x00400000UL | 602 | #define NETLINK_TCPDIAG_SOCKET__NLMSG_READ 0x00400000UL |
752 | #define NETLINK_TCPDIAG_SOCKET__NLMSG_WRITE 0x00800000UL | 603 | #define NETLINK_TCPDIAG_SOCKET__NLMSG_WRITE 0x00800000UL |
753 | |||
754 | #define NETLINK_NFLOG_SOCKET__IOCTL 0x00000001UL | 604 | #define NETLINK_NFLOG_SOCKET__IOCTL 0x00000001UL |
755 | #define NETLINK_NFLOG_SOCKET__READ 0x00000002UL | 605 | #define NETLINK_NFLOG_SOCKET__READ 0x00000002UL |
756 | #define NETLINK_NFLOG_SOCKET__WRITE 0x00000004UL | 606 | #define NETLINK_NFLOG_SOCKET__WRITE 0x00000004UL |
@@ -773,7 +623,6 @@ | |||
773 | #define NETLINK_NFLOG_SOCKET__RECV_MSG 0x00080000UL | 623 | #define NETLINK_NFLOG_SOCKET__RECV_MSG 0x00080000UL |
774 | #define NETLINK_NFLOG_SOCKET__SEND_MSG 0x00100000UL | 624 | #define NETLINK_NFLOG_SOCKET__SEND_MSG 0x00100000UL |
775 | #define NETLINK_NFLOG_SOCKET__NAME_BIND 0x00200000UL | 625 | #define NETLINK_NFLOG_SOCKET__NAME_BIND 0x00200000UL |
776 | |||
777 | #define NETLINK_XFRM_SOCKET__IOCTL 0x00000001UL | 626 | #define NETLINK_XFRM_SOCKET__IOCTL 0x00000001UL |
778 | #define NETLINK_XFRM_SOCKET__READ 0x00000002UL | 627 | #define NETLINK_XFRM_SOCKET__READ 0x00000002UL |
779 | #define NETLINK_XFRM_SOCKET__WRITE 0x00000004UL | 628 | #define NETLINK_XFRM_SOCKET__WRITE 0x00000004UL |
@@ -796,10 +645,8 @@ | |||
796 | #define NETLINK_XFRM_SOCKET__RECV_MSG 0x00080000UL | 645 | #define NETLINK_XFRM_SOCKET__RECV_MSG 0x00080000UL |
797 | #define NETLINK_XFRM_SOCKET__SEND_MSG 0x00100000UL | 646 | #define NETLINK_XFRM_SOCKET__SEND_MSG 0x00100000UL |
798 | #define NETLINK_XFRM_SOCKET__NAME_BIND 0x00200000UL | 647 | #define NETLINK_XFRM_SOCKET__NAME_BIND 0x00200000UL |
799 | |||
800 | #define NETLINK_XFRM_SOCKET__NLMSG_READ 0x00400000UL | 648 | #define NETLINK_XFRM_SOCKET__NLMSG_READ 0x00400000UL |
801 | #define NETLINK_XFRM_SOCKET__NLMSG_WRITE 0x00800000UL | 649 | #define NETLINK_XFRM_SOCKET__NLMSG_WRITE 0x00800000UL |
802 | |||
803 | #define NETLINK_SELINUX_SOCKET__IOCTL 0x00000001UL | 650 | #define NETLINK_SELINUX_SOCKET__IOCTL 0x00000001UL |
804 | #define NETLINK_SELINUX_SOCKET__READ 0x00000002UL | 651 | #define NETLINK_SELINUX_SOCKET__READ 0x00000002UL |
805 | #define NETLINK_SELINUX_SOCKET__WRITE 0x00000004UL | 652 | #define NETLINK_SELINUX_SOCKET__WRITE 0x00000004UL |
@@ -822,7 +669,6 @@ | |||
822 | #define NETLINK_SELINUX_SOCKET__RECV_MSG 0x00080000UL | 669 | #define NETLINK_SELINUX_SOCKET__RECV_MSG 0x00080000UL |
823 | #define NETLINK_SELINUX_SOCKET__SEND_MSG 0x00100000UL | 670 | #define NETLINK_SELINUX_SOCKET__SEND_MSG 0x00100000UL |
824 | #define NETLINK_SELINUX_SOCKET__NAME_BIND 0x00200000UL | 671 | #define NETLINK_SELINUX_SOCKET__NAME_BIND 0x00200000UL |
825 | |||
826 | #define NETLINK_AUDIT_SOCKET__IOCTL 0x00000001UL | 672 | #define NETLINK_AUDIT_SOCKET__IOCTL 0x00000001UL |
827 | #define NETLINK_AUDIT_SOCKET__READ 0x00000002UL | 673 | #define NETLINK_AUDIT_SOCKET__READ 0x00000002UL |
828 | #define NETLINK_AUDIT_SOCKET__WRITE 0x00000004UL | 674 | #define NETLINK_AUDIT_SOCKET__WRITE 0x00000004UL |
@@ -845,12 +691,10 @@ | |||
845 | #define NETLINK_AUDIT_SOCKET__RECV_MSG 0x00080000UL | 691 | #define NETLINK_AUDIT_SOCKET__RECV_MSG 0x00080000UL |
846 | #define NETLINK_AUDIT_SOCKET__SEND_MSG 0x00100000UL | 692 | #define NETLINK_AUDIT_SOCKET__SEND_MSG 0x00100000UL |
847 | #define NETLINK_AUDIT_SOCKET__NAME_BIND 0x00200000UL | 693 | #define NETLINK_AUDIT_SOCKET__NAME_BIND 0x00200000UL |
848 | |||
849 | #define NETLINK_AUDIT_SOCKET__NLMSG_READ 0x00400000UL | 694 | #define NETLINK_AUDIT_SOCKET__NLMSG_READ 0x00400000UL |
850 | #define NETLINK_AUDIT_SOCKET__NLMSG_WRITE 0x00800000UL | 695 | #define NETLINK_AUDIT_SOCKET__NLMSG_WRITE 0x00800000UL |
851 | #define NETLINK_AUDIT_SOCKET__NLMSG_RELAY 0x01000000UL | 696 | #define NETLINK_AUDIT_SOCKET__NLMSG_RELAY 0x01000000UL |
852 | #define NETLINK_AUDIT_SOCKET__NLMSG_READPRIV 0x02000000UL | 697 | #define NETLINK_AUDIT_SOCKET__NLMSG_READPRIV 0x02000000UL |
853 | |||
854 | #define NETLINK_IP6FW_SOCKET__IOCTL 0x00000001UL | 698 | #define NETLINK_IP6FW_SOCKET__IOCTL 0x00000001UL |
855 | #define NETLINK_IP6FW_SOCKET__READ 0x00000002UL | 699 | #define NETLINK_IP6FW_SOCKET__READ 0x00000002UL |
856 | #define NETLINK_IP6FW_SOCKET__WRITE 0x00000004UL | 700 | #define NETLINK_IP6FW_SOCKET__WRITE 0x00000004UL |
@@ -873,10 +717,8 @@ | |||
873 | #define NETLINK_IP6FW_SOCKET__RECV_MSG 0x00080000UL | 717 | #define NETLINK_IP6FW_SOCKET__RECV_MSG 0x00080000UL |
874 | #define NETLINK_IP6FW_SOCKET__SEND_MSG 0x00100000UL | 718 | #define NETLINK_IP6FW_SOCKET__SEND_MSG 0x00100000UL |
875 | #define NETLINK_IP6FW_SOCKET__NAME_BIND 0x00200000UL | 719 | #define NETLINK_IP6FW_SOCKET__NAME_BIND 0x00200000UL |
876 | |||
877 | #define NETLINK_IP6FW_SOCKET__NLMSG_READ 0x00400000UL | 720 | #define NETLINK_IP6FW_SOCKET__NLMSG_READ 0x00400000UL |
878 | #define NETLINK_IP6FW_SOCKET__NLMSG_WRITE 0x00800000UL | 721 | #define NETLINK_IP6FW_SOCKET__NLMSG_WRITE 0x00800000UL |
879 | |||
880 | #define NETLINK_DNRT_SOCKET__IOCTL 0x00000001UL | 722 | #define NETLINK_DNRT_SOCKET__IOCTL 0x00000001UL |
881 | #define NETLINK_DNRT_SOCKET__READ 0x00000002UL | 723 | #define NETLINK_DNRT_SOCKET__READ 0x00000002UL |
882 | #define NETLINK_DNRT_SOCKET__WRITE 0x00000004UL | 724 | #define NETLINK_DNRT_SOCKET__WRITE 0x00000004UL |
@@ -899,24 +741,10 @@ | |||
899 | #define NETLINK_DNRT_SOCKET__RECV_MSG 0x00080000UL | 741 | #define NETLINK_DNRT_SOCKET__RECV_MSG 0x00080000UL |
900 | #define NETLINK_DNRT_SOCKET__SEND_MSG 0x00100000UL | 742 | #define NETLINK_DNRT_SOCKET__SEND_MSG 0x00100000UL |
901 | #define NETLINK_DNRT_SOCKET__NAME_BIND 0x00200000UL | 743 | #define NETLINK_DNRT_SOCKET__NAME_BIND 0x00200000UL |
902 | |||
903 | #define DBUS__ACQUIRE_SVC 0x00000001UL | ||
904 | #define DBUS__SEND_MSG 0x00000002UL | ||
905 | |||
906 | #define NSCD__GETPWD 0x00000001UL | ||
907 | #define NSCD__GETGRP 0x00000002UL | ||
908 | #define NSCD__GETHOST 0x00000004UL | ||
909 | #define NSCD__GETSTAT 0x00000008UL | ||
910 | #define NSCD__ADMIN 0x00000010UL | ||
911 | #define NSCD__SHMEMPWD 0x00000020UL | ||
912 | #define NSCD__SHMEMGRP 0x00000040UL | ||
913 | #define NSCD__SHMEMHOST 0x00000080UL | ||
914 | |||
915 | #define ASSOCIATION__SENDTO 0x00000001UL | 744 | #define ASSOCIATION__SENDTO 0x00000001UL |
916 | #define ASSOCIATION__RECVFROM 0x00000002UL | 745 | #define ASSOCIATION__RECVFROM 0x00000002UL |
917 | #define ASSOCIATION__SETCONTEXT 0x00000004UL | 746 | #define ASSOCIATION__SETCONTEXT 0x00000004UL |
918 | #define ASSOCIATION__POLMATCH 0x00000008UL | 747 | #define ASSOCIATION__POLMATCH 0x00000008UL |
919 | |||
920 | #define NETLINK_KOBJECT_UEVENT_SOCKET__IOCTL 0x00000001UL | 748 | #define NETLINK_KOBJECT_UEVENT_SOCKET__IOCTL 0x00000001UL |
921 | #define NETLINK_KOBJECT_UEVENT_SOCKET__READ 0x00000002UL | 749 | #define NETLINK_KOBJECT_UEVENT_SOCKET__READ 0x00000002UL |
922 | #define NETLINK_KOBJECT_UEVENT_SOCKET__WRITE 0x00000004UL | 750 | #define NETLINK_KOBJECT_UEVENT_SOCKET__WRITE 0x00000004UL |
@@ -939,7 +767,6 @@ | |||
939 | #define NETLINK_KOBJECT_UEVENT_SOCKET__RECV_MSG 0x00080000UL | 767 | #define NETLINK_KOBJECT_UEVENT_SOCKET__RECV_MSG 0x00080000UL |
940 | #define NETLINK_KOBJECT_UEVENT_SOCKET__SEND_MSG 0x00100000UL | 768 | #define NETLINK_KOBJECT_UEVENT_SOCKET__SEND_MSG 0x00100000UL |
941 | #define NETLINK_KOBJECT_UEVENT_SOCKET__NAME_BIND 0x00200000UL | 769 | #define NETLINK_KOBJECT_UEVENT_SOCKET__NAME_BIND 0x00200000UL |
942 | |||
943 | #define APPLETALK_SOCKET__IOCTL 0x00000001UL | 770 | #define APPLETALK_SOCKET__IOCTL 0x00000001UL |
944 | #define APPLETALK_SOCKET__READ 0x00000002UL | 771 | #define APPLETALK_SOCKET__READ 0x00000002UL |
945 | #define APPLETALK_SOCKET__WRITE 0x00000004UL | 772 | #define APPLETALK_SOCKET__WRITE 0x00000004UL |
@@ -962,11 +789,9 @@ | |||
962 | #define APPLETALK_SOCKET__RECV_MSG 0x00080000UL | 789 | #define APPLETALK_SOCKET__RECV_MSG 0x00080000UL |
963 | #define APPLETALK_SOCKET__SEND_MSG 0x00100000UL | 790 | #define APPLETALK_SOCKET__SEND_MSG 0x00100000UL |
964 | #define APPLETALK_SOCKET__NAME_BIND 0x00200000UL | 791 | #define APPLETALK_SOCKET__NAME_BIND 0x00200000UL |
965 | |||
966 | #define PACKET__SEND 0x00000001UL | 792 | #define PACKET__SEND 0x00000001UL |
967 | #define PACKET__RECV 0x00000002UL | 793 | #define PACKET__RECV 0x00000002UL |
968 | #define PACKET__RELABELTO 0x00000004UL | 794 | #define PACKET__RELABELTO 0x00000004UL |
969 | |||
970 | #define KEY__VIEW 0x00000001UL | 795 | #define KEY__VIEW 0x00000001UL |
971 | #define KEY__READ 0x00000002UL | 796 | #define KEY__READ 0x00000002UL |
972 | #define KEY__WRITE 0x00000004UL | 797 | #define KEY__WRITE 0x00000004UL |
@@ -974,10 +799,6 @@ | |||
974 | #define KEY__LINK 0x00000010UL | 799 | #define KEY__LINK 0x00000010UL |
975 | #define KEY__SETATTR 0x00000020UL | 800 | #define KEY__SETATTR 0x00000020UL |
976 | #define KEY__CREATE 0x00000040UL | 801 | #define KEY__CREATE 0x00000040UL |
977 | |||
978 | #define CONTEXT__TRANSLATE 0x00000001UL | ||
979 | #define CONTEXT__CONTAINS 0x00000002UL | ||
980 | |||
981 | #define DCCP_SOCKET__IOCTL 0x00000001UL | 802 | #define DCCP_SOCKET__IOCTL 0x00000001UL |
982 | #define DCCP_SOCKET__READ 0x00000002UL | 803 | #define DCCP_SOCKET__READ 0x00000002UL |
983 | #define DCCP_SOCKET__WRITE 0x00000004UL | 804 | #define DCCP_SOCKET__WRITE 0x00000004UL |
diff --git a/security/selinux/include/class_to_string.h b/security/selinux/include/class_to_string.h index 9f3ebb1bfae6..378799068441 100644 --- a/security/selinux/include/class_to_string.h +++ b/security/selinux/include/class_to_string.h | |||
@@ -2,7 +2,7 @@ | |||
2 | /* | 2 | /* |
3 | * Security object class definitions | 3 | * Security object class definitions |
4 | */ | 4 | */ |
5 | S_("null") | 5 | S_(NULL) |
6 | S_("security") | 6 | S_("security") |
7 | S_("process") | 7 | S_("process") |
8 | S_("system") | 8 | S_("system") |
@@ -32,19 +32,19 @@ | |||
32 | S_("msgq") | 32 | S_("msgq") |
33 | S_("shm") | 33 | S_("shm") |
34 | S_("ipc") | 34 | S_("ipc") |
35 | S_("passwd") | 35 | S_(NULL) |
36 | S_("drawable") | 36 | S_(NULL) |
37 | S_("window") | 37 | S_(NULL) |
38 | S_("gc") | 38 | S_(NULL) |
39 | S_("font") | 39 | S_(NULL) |
40 | S_("colormap") | 40 | S_(NULL) |
41 | S_("property") | 41 | S_(NULL) |
42 | S_("cursor") | 42 | S_(NULL) |
43 | S_("xclient") | 43 | S_(NULL) |
44 | S_("xinput") | 44 | S_(NULL) |
45 | S_("xserver") | 45 | S_(NULL) |
46 | S_("xextension") | 46 | S_(NULL) |
47 | S_("pax") | 47 | S_(NULL) |
48 | S_("netlink_route_socket") | 48 | S_("netlink_route_socket") |
49 | S_("netlink_firewall_socket") | 49 | S_("netlink_firewall_socket") |
50 | S_("netlink_tcpdiag_socket") | 50 | S_("netlink_tcpdiag_socket") |
@@ -54,12 +54,12 @@ | |||
54 | S_("netlink_audit_socket") | 54 | S_("netlink_audit_socket") |
55 | S_("netlink_ip6fw_socket") | 55 | S_("netlink_ip6fw_socket") |
56 | S_("netlink_dnrt_socket") | 56 | S_("netlink_dnrt_socket") |
57 | S_("dbus") | 57 | S_(NULL) |
58 | S_("nscd") | 58 | S_(NULL) |
59 | S_("association") | 59 | S_("association") |
60 | S_("netlink_kobject_uevent_socket") | 60 | S_("netlink_kobject_uevent_socket") |
61 | S_("appletalk_socket") | 61 | S_("appletalk_socket") |
62 | S_("packet") | 62 | S_("packet") |
63 | S_("key") | 63 | S_("key") |
64 | S_("context") | 64 | S_(NULL) |
65 | S_("dccp_socket") | 65 | S_("dccp_socket") |
diff --git a/security/selinux/include/flask.h b/security/selinux/include/flask.h index 67cef371ee00..35f309f47873 100644 --- a/security/selinux/include/flask.h +++ b/security/selinux/include/flask.h | |||
@@ -34,19 +34,6 @@ | |||
34 | #define SECCLASS_MSGQ 27 | 34 | #define SECCLASS_MSGQ 27 |
35 | #define SECCLASS_SHM 28 | 35 | #define SECCLASS_SHM 28 |
36 | #define SECCLASS_IPC 29 | 36 | #define SECCLASS_IPC 29 |
37 | #define SECCLASS_PASSWD 30 | ||
38 | #define SECCLASS_DRAWABLE 31 | ||
39 | #define SECCLASS_WINDOW 32 | ||
40 | #define SECCLASS_GC 33 | ||
41 | #define SECCLASS_FONT 34 | ||
42 | #define SECCLASS_COLORMAP 35 | ||
43 | #define SECCLASS_PROPERTY 36 | ||
44 | #define SECCLASS_CURSOR 37 | ||
45 | #define SECCLASS_XCLIENT 38 | ||
46 | #define SECCLASS_XINPUT 39 | ||
47 | #define SECCLASS_XSERVER 40 | ||
48 | #define SECCLASS_XEXTENSION 41 | ||
49 | #define SECCLASS_PAX 42 | ||
50 | #define SECCLASS_NETLINK_ROUTE_SOCKET 43 | 37 | #define SECCLASS_NETLINK_ROUTE_SOCKET 43 |
51 | #define SECCLASS_NETLINK_FIREWALL_SOCKET 44 | 38 | #define SECCLASS_NETLINK_FIREWALL_SOCKET 44 |
52 | #define SECCLASS_NETLINK_TCPDIAG_SOCKET 45 | 39 | #define SECCLASS_NETLINK_TCPDIAG_SOCKET 45 |
@@ -56,14 +43,11 @@ | |||
56 | #define SECCLASS_NETLINK_AUDIT_SOCKET 49 | 43 | #define SECCLASS_NETLINK_AUDIT_SOCKET 49 |
57 | #define SECCLASS_NETLINK_IP6FW_SOCKET 50 | 44 | #define SECCLASS_NETLINK_IP6FW_SOCKET 50 |
58 | #define SECCLASS_NETLINK_DNRT_SOCKET 51 | 45 | #define SECCLASS_NETLINK_DNRT_SOCKET 51 |
59 | #define SECCLASS_DBUS 52 | ||
60 | #define SECCLASS_NSCD 53 | ||
61 | #define SECCLASS_ASSOCIATION 54 | 46 | #define SECCLASS_ASSOCIATION 54 |
62 | #define SECCLASS_NETLINK_KOBJECT_UEVENT_SOCKET 55 | 47 | #define SECCLASS_NETLINK_KOBJECT_UEVENT_SOCKET 55 |
63 | #define SECCLASS_APPLETALK_SOCKET 56 | 48 | #define SECCLASS_APPLETALK_SOCKET 56 |
64 | #define SECCLASS_PACKET 57 | 49 | #define SECCLASS_PACKET 57 |
65 | #define SECCLASS_KEY 58 | 50 | #define SECCLASS_KEY 58 |
66 | #define SECCLASS_CONTEXT 59 | ||
67 | #define SECCLASS_DCCP_SOCKET 60 | 51 | #define SECCLASS_DCCP_SOCKET 60 |
68 | 52 | ||
69 | /* | 53 | /* |
diff --git a/security/selinux/include/selinux_netlabel.h b/security/selinux/include/netlabel.h index 2a732c9033e3..218e3f77c350 100644 --- a/security/selinux/include/selinux_netlabel.h +++ b/security/selinux/include/netlabel.h | |||
@@ -38,19 +38,22 @@ | |||
38 | 38 | ||
39 | #ifdef CONFIG_NETLABEL | 39 | #ifdef CONFIG_NETLABEL |
40 | void selinux_netlbl_cache_invalidate(void); | 40 | void selinux_netlbl_cache_invalidate(void); |
41 | int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid); | 41 | |
42 | int selinux_netlbl_socket_post_create(struct socket *sock); | ||
43 | void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock); | ||
44 | int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
45 | struct sk_buff *skb, | ||
46 | struct avc_audit_data *ad); | ||
47 | void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec, | 42 | void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec, |
48 | int family); | 43 | int family); |
49 | void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec, | 44 | void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec, |
50 | int family); | 45 | int family); |
51 | void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec, | 46 | void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec, |
52 | struct sk_security_struct *newssec); | 47 | struct sk_security_struct *newssec); |
48 | |||
49 | int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid); | ||
50 | |||
51 | void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock); | ||
52 | int selinux_netlbl_socket_post_create(struct socket *sock); | ||
53 | int selinux_netlbl_inode_permission(struct inode *inode, int mask); | 53 | int selinux_netlbl_inode_permission(struct inode *inode, int mask); |
54 | int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
55 | struct sk_buff *skb, | ||
56 | struct avc_audit_data *ad); | ||
54 | int selinux_netlbl_socket_setsockopt(struct socket *sock, | 57 | int selinux_netlbl_socket_setsockopt(struct socket *sock, |
55 | int level, | 58 | int level, |
56 | int optname); | 59 | int optname); |
@@ -60,59 +63,53 @@ static inline void selinux_netlbl_cache_invalidate(void) | |||
60 | return; | 63 | return; |
61 | } | 64 | } |
62 | 65 | ||
63 | static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, | 66 | static inline void selinux_netlbl_sk_security_reset( |
64 | u32 base_sid, | 67 | struct sk_security_struct *ssec, |
65 | u32 *sid) | 68 | int family) |
66 | { | 69 | { |
67 | *sid = SECSID_NULL; | 70 | return; |
68 | return 0; | ||
69 | } | 71 | } |
70 | 72 | static inline void selinux_netlbl_sk_security_init( | |
71 | static inline int selinux_netlbl_socket_post_create(struct socket *sock) | 73 | struct sk_security_struct *ssec, |
74 | int family) | ||
72 | { | 75 | { |
73 | return 0; | 76 | return; |
74 | } | 77 | } |
75 | 78 | static inline void selinux_netlbl_sk_security_clone( | |
76 | static inline void selinux_netlbl_sock_graft(struct sock *sk, | 79 | struct sk_security_struct *ssec, |
77 | struct socket *sock) | 80 | struct sk_security_struct *newssec) |
78 | { | 81 | { |
79 | return; | 82 | return; |
80 | } | 83 | } |
81 | 84 | ||
82 | static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | 85 | static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, |
83 | struct sk_buff *skb, | 86 | u32 base_sid, |
84 | struct avc_audit_data *ad) | 87 | u32 *sid) |
85 | { | 88 | { |
89 | *sid = SECSID_NULL; | ||
86 | return 0; | 90 | return 0; |
87 | } | 91 | } |
88 | 92 | ||
89 | static inline void selinux_netlbl_sk_security_reset( | 93 | static inline void selinux_netlbl_sock_graft(struct sock *sk, |
90 | struct sk_security_struct *ssec, | 94 | struct socket *sock) |
91 | int family) | ||
92 | { | ||
93 | return; | ||
94 | } | ||
95 | |||
96 | static inline void selinux_netlbl_sk_security_init( | ||
97 | struct sk_security_struct *ssec, | ||
98 | int family) | ||
99 | { | 95 | { |
100 | return; | 96 | return; |
101 | } | 97 | } |
102 | 98 | static inline int selinux_netlbl_socket_post_create(struct socket *sock) | |
103 | static inline void selinux_netlbl_sk_security_clone( | ||
104 | struct sk_security_struct *ssec, | ||
105 | struct sk_security_struct *newssec) | ||
106 | { | 99 | { |
107 | return; | 100 | return 0; |
108 | } | 101 | } |
109 | |||
110 | static inline int selinux_netlbl_inode_permission(struct inode *inode, | 102 | static inline int selinux_netlbl_inode_permission(struct inode *inode, |
111 | int mask) | 103 | int mask) |
112 | { | 104 | { |
113 | return 0; | 105 | return 0; |
114 | } | 106 | } |
115 | 107 | static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | |
108 | struct sk_buff *skb, | ||
109 | struct avc_audit_data *ad) | ||
110 | { | ||
111 | return 0; | ||
112 | } | ||
116 | static inline int selinux_netlbl_socket_setsockopt(struct socket *sock, | 113 | static inline int selinux_netlbl_socket_setsockopt(struct socket *sock, |
117 | int level, | 114 | int level, |
118 | int optname) | 115 | int optname) |
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 210eec77e7ff..b94378afea25 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h | |||
@@ -34,7 +34,7 @@ | |||
34 | #define POLICYDB_VERSION_MAX POLICYDB_VERSION_RANGETRANS | 34 | #define POLICYDB_VERSION_MAX POLICYDB_VERSION_RANGETRANS |
35 | #endif | 35 | #endif |
36 | 36 | ||
37 | struct sk_buff; | 37 | struct netlbl_lsm_secattr; |
38 | 38 | ||
39 | extern int selinux_enabled; | 39 | extern int selinux_enabled; |
40 | extern int selinux_mls_enabled; | 40 | extern int selinux_mls_enabled; |
@@ -82,8 +82,6 @@ int security_netif_sid(char *name, u32 *if_sid, | |||
82 | int security_node_sid(u16 domain, void *addr, u32 addrlen, | 82 | int security_node_sid(u16 domain, void *addr, u32 addrlen, |
83 | u32 *out_sid); | 83 | u32 *out_sid); |
84 | 84 | ||
85 | void security_skb_extlbl_sid(struct sk_buff *skb, u32 base_sid, u32 *sid); | ||
86 | |||
87 | int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, | 85 | int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, |
88 | u16 tclass); | 86 | u16 tclass); |
89 | 87 | ||
@@ -102,5 +100,30 @@ int security_fs_use(const char *fstype, unsigned int *behavior, | |||
102 | int security_genfs_sid(const char *fstype, char *name, u16 sclass, | 100 | int security_genfs_sid(const char *fstype, char *name, u16 sclass, |
103 | u32 *sid); | 101 | u32 *sid); |
104 | 102 | ||
103 | #ifdef CONFIG_NETLABEL | ||
104 | int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, | ||
105 | u32 base_sid, | ||
106 | u32 *sid); | ||
107 | |||
108 | int security_netlbl_sid_to_secattr(u32 sid, | ||
109 | struct netlbl_lsm_secattr *secattr); | ||
110 | #else | ||
111 | static inline int security_netlbl_secattr_to_sid( | ||
112 | struct netlbl_lsm_secattr *secattr, | ||
113 | u32 base_sid, | ||
114 | u32 *sid) | ||
115 | { | ||
116 | return -EIDRM; | ||
117 | } | ||
118 | |||
119 | static inline int security_netlbl_sid_to_secattr(u32 sid, | ||
120 | struct netlbl_lsm_secattr *secattr) | ||
121 | { | ||
122 | return -ENOENT; | ||
123 | } | ||
124 | #endif /* CONFIG_NETLABEL */ | ||
125 | |||
126 | const char *security_get_initial_sid_context(u32 sid); | ||
127 | |||
105 | #endif /* _SELINUX_SECURITY_H_ */ | 128 | #endif /* _SELINUX_SECURITY_H_ */ |
106 | 129 | ||
diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c new file mode 100644 index 000000000000..bf8750791dd1 --- /dev/null +++ b/security/selinux/netlabel.c | |||
@@ -0,0 +1,363 @@ | |||
1 | /* | ||
2 | * SELinux NetLabel Support | ||
3 | * | ||
4 | * This file provides the necessary glue to tie NetLabel into the SELinux | ||
5 | * subsystem. | ||
6 | * | ||
7 | * Author: Paul Moore <paul.moore@hp.com> | ||
8 | * | ||
9 | */ | ||
10 | |||
11 | /* | ||
12 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2007 | ||
13 | * | ||
14 | * This program is free software; you can redistribute it and/or modify | ||
15 | * it under the terms of the GNU General Public License as published by | ||
16 | * the Free Software Foundation; either version 2 of the License, or | ||
17 | * (at your option) any later version. | ||
18 | * | ||
19 | * This program is distributed in the hope that it will be useful, | ||
20 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
21 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | ||
22 | * the GNU General Public License for more details. | ||
23 | * | ||
24 | * You should have received a copy of the GNU General Public License | ||
25 | * along with this program; if not, write to the Free Software | ||
26 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | ||
27 | * | ||
28 | */ | ||
29 | |||
30 | #include <linux/spinlock.h> | ||
31 | #include <linux/rcupdate.h> | ||
32 | #include <net/sock.h> | ||
33 | #include <net/netlabel.h> | ||
34 | |||
35 | #include "objsec.h" | ||
36 | #include "security.h" | ||
37 | |||
38 | /** | ||
39 | * selinux_netlbl_socket_setsid - Label a socket using the NetLabel mechanism | ||
40 | * @sock: the socket to label | ||
41 | * @sid: the SID to use | ||
42 | * | ||
43 | * Description: | ||
44 | * Attempt to label a socket using the NetLabel mechanism using the given | ||
45 | * SID. Returns zero values on success, negative values on failure. The | ||
46 | * caller is responsibile for calling rcu_read_lock() before calling this | ||
47 | * this function and rcu_read_unlock() after this function returns. | ||
48 | * | ||
49 | */ | ||
50 | static int selinux_netlbl_socket_setsid(struct socket *sock, u32 sid) | ||
51 | { | ||
52 | int rc; | ||
53 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
54 | struct netlbl_lsm_secattr secattr; | ||
55 | |||
56 | rc = security_netlbl_sid_to_secattr(sid, &secattr); | ||
57 | if (rc != 0) | ||
58 | return rc; | ||
59 | |||
60 | rc = netlbl_socket_setattr(sock, &secattr); | ||
61 | if (rc == 0) { | ||
62 | spin_lock_bh(&sksec->nlbl_lock); | ||
63 | sksec->nlbl_state = NLBL_LABELED; | ||
64 | spin_unlock_bh(&sksec->nlbl_lock); | ||
65 | } | ||
66 | |||
67 | return rc; | ||
68 | } | ||
69 | |||
70 | /** | ||
71 | * selinux_netlbl_cache_invalidate - Invalidate the NetLabel cache | ||
72 | * | ||
73 | * Description: | ||
74 | * Invalidate the NetLabel security attribute mapping cache. | ||
75 | * | ||
76 | */ | ||
77 | void selinux_netlbl_cache_invalidate(void) | ||
78 | { | ||
79 | netlbl_cache_invalidate(); | ||
80 | } | ||
81 | |||
82 | /** | ||
83 | * selinux_netlbl_sk_security_reset - Reset the NetLabel fields | ||
84 | * @ssec: the sk_security_struct | ||
85 | * @family: the socket family | ||
86 | * | ||
87 | * Description: | ||
88 | * Called when the NetLabel state of a sk_security_struct needs to be reset. | ||
89 | * The caller is responsibile for all the NetLabel sk_security_struct locking. | ||
90 | * | ||
91 | */ | ||
92 | void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec, | ||
93 | int family) | ||
94 | { | ||
95 | if (family == PF_INET) | ||
96 | ssec->nlbl_state = NLBL_REQUIRE; | ||
97 | else | ||
98 | ssec->nlbl_state = NLBL_UNSET; | ||
99 | } | ||
100 | |||
101 | /** | ||
102 | * selinux_netlbl_sk_security_init - Setup the NetLabel fields | ||
103 | * @ssec: the sk_security_struct | ||
104 | * @family: the socket family | ||
105 | * | ||
106 | * Description: | ||
107 | * Called when a new sk_security_struct is allocated to initialize the NetLabel | ||
108 | * fields. | ||
109 | * | ||
110 | */ | ||
111 | void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec, | ||
112 | int family) | ||
113 | { | ||
114 | /* No locking needed, we are the only one who has access to ssec */ | ||
115 | selinux_netlbl_sk_security_reset(ssec, family); | ||
116 | spin_lock_init(&ssec->nlbl_lock); | ||
117 | } | ||
118 | |||
119 | /** | ||
120 | * selinux_netlbl_sk_security_clone - Copy the NetLabel fields | ||
121 | * @ssec: the original sk_security_struct | ||
122 | * @newssec: the cloned sk_security_struct | ||
123 | * | ||
124 | * Description: | ||
125 | * Clone the NetLabel specific sk_security_struct fields from @ssec to | ||
126 | * @newssec. | ||
127 | * | ||
128 | */ | ||
129 | void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec, | ||
130 | struct sk_security_struct *newssec) | ||
131 | { | ||
132 | /* We don't need to take newssec->nlbl_lock because we are the only | ||
133 | * thread with access to newssec, but we do need to take the RCU read | ||
134 | * lock as other threads could have access to ssec */ | ||
135 | rcu_read_lock(); | ||
136 | selinux_netlbl_sk_security_reset(newssec, ssec->sk->sk_family); | ||
137 | newssec->sclass = ssec->sclass; | ||
138 | rcu_read_unlock(); | ||
139 | } | ||
140 | |||
141 | /** | ||
142 | * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel | ||
143 | * @skb: the packet | ||
144 | * @base_sid: the SELinux SID to use as a context for MLS only attributes | ||
145 | * @sid: the SID | ||
146 | * | ||
147 | * Description: | ||
148 | * Call the NetLabel mechanism to get the security attributes of the given | ||
149 | * packet and use those attributes to determine the correct context/SID to | ||
150 | * assign to the packet. Returns zero on success, negative values on failure. | ||
151 | * | ||
152 | */ | ||
153 | int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid) | ||
154 | { | ||
155 | int rc; | ||
156 | struct netlbl_lsm_secattr secattr; | ||
157 | |||
158 | netlbl_secattr_init(&secattr); | ||
159 | rc = netlbl_skbuff_getattr(skb, &secattr); | ||
160 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) | ||
161 | rc = security_netlbl_secattr_to_sid(&secattr, | ||
162 | base_sid, | ||
163 | sid); | ||
164 | else | ||
165 | *sid = SECSID_NULL; | ||
166 | netlbl_secattr_destroy(&secattr); | ||
167 | |||
168 | return rc; | ||
169 | } | ||
170 | |||
171 | /** | ||
172 | * selinux_netlbl_sock_graft - Netlabel the new socket | ||
173 | * @sk: the new connection | ||
174 | * @sock: the new socket | ||
175 | * | ||
176 | * Description: | ||
177 | * The connection represented by @sk is being grafted onto @sock so set the | ||
178 | * socket's NetLabel to match the SID of @sk. | ||
179 | * | ||
180 | */ | ||
181 | void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock) | ||
182 | { | ||
183 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | ||
184 | struct sk_security_struct *sksec = sk->sk_security; | ||
185 | struct netlbl_lsm_secattr secattr; | ||
186 | u32 nlbl_peer_sid; | ||
187 | |||
188 | sksec->sclass = isec->sclass; | ||
189 | |||
190 | rcu_read_lock(); | ||
191 | |||
192 | if (sksec->nlbl_state != NLBL_REQUIRE) { | ||
193 | rcu_read_unlock(); | ||
194 | return; | ||
195 | } | ||
196 | |||
197 | netlbl_secattr_init(&secattr); | ||
198 | if (netlbl_sock_getattr(sk, &secattr) == 0 && | ||
199 | secattr.flags != NETLBL_SECATTR_NONE && | ||
200 | security_netlbl_secattr_to_sid(&secattr, | ||
201 | SECINITSID_UNLABELED, | ||
202 | &nlbl_peer_sid) == 0) | ||
203 | sksec->peer_sid = nlbl_peer_sid; | ||
204 | netlbl_secattr_destroy(&secattr); | ||
205 | |||
206 | /* Try to set the NetLabel on the socket to save time later, if we fail | ||
207 | * here we will pick up the pieces in later calls to | ||
208 | * selinux_netlbl_inode_permission(). */ | ||
209 | selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
210 | |||
211 | rcu_read_unlock(); | ||
212 | } | ||
213 | |||
214 | /** | ||
215 | * selinux_netlbl_socket_post_create - Label a socket using NetLabel | ||
216 | * @sock: the socket to label | ||
217 | * | ||
218 | * Description: | ||
219 | * Attempt to label a socket using the NetLabel mechanism using the given | ||
220 | * SID. Returns zero values on success, negative values on failure. | ||
221 | * | ||
222 | */ | ||
223 | int selinux_netlbl_socket_post_create(struct socket *sock) | ||
224 | { | ||
225 | int rc = 0; | ||
226 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | ||
227 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
228 | |||
229 | sksec->sclass = isec->sclass; | ||
230 | |||
231 | rcu_read_lock(); | ||
232 | if (sksec->nlbl_state == NLBL_REQUIRE) | ||
233 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
234 | rcu_read_unlock(); | ||
235 | |||
236 | return rc; | ||
237 | } | ||
238 | |||
239 | /** | ||
240 | * selinux_netlbl_inode_permission - Verify the socket is NetLabel labeled | ||
241 | * @inode: the file descriptor's inode | ||
242 | * @mask: the permission mask | ||
243 | * | ||
244 | * Description: | ||
245 | * Looks at a file's inode and if it is marked as a socket protected by | ||
246 | * NetLabel then verify that the socket has been labeled, if not try to label | ||
247 | * the socket now with the inode's SID. Returns zero on success, negative | ||
248 | * values on failure. | ||
249 | * | ||
250 | */ | ||
251 | int selinux_netlbl_inode_permission(struct inode *inode, int mask) | ||
252 | { | ||
253 | int rc; | ||
254 | struct sk_security_struct *sksec; | ||
255 | struct socket *sock; | ||
256 | |||
257 | if (!S_ISSOCK(inode->i_mode) || | ||
258 | ((mask & (MAY_WRITE | MAY_APPEND)) == 0)) | ||
259 | return 0; | ||
260 | sock = SOCKET_I(inode); | ||
261 | sksec = sock->sk->sk_security; | ||
262 | |||
263 | rcu_read_lock(); | ||
264 | if (sksec->nlbl_state != NLBL_REQUIRE) { | ||
265 | rcu_read_unlock(); | ||
266 | return 0; | ||
267 | } | ||
268 | local_bh_disable(); | ||
269 | bh_lock_sock_nested(sock->sk); | ||
270 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
271 | bh_unlock_sock(sock->sk); | ||
272 | local_bh_enable(); | ||
273 | rcu_read_unlock(); | ||
274 | |||
275 | return rc; | ||
276 | } | ||
277 | |||
278 | /** | ||
279 | * selinux_netlbl_sock_rcv_skb - Do an inbound access check using NetLabel | ||
280 | * @sksec: the sock's sk_security_struct | ||
281 | * @skb: the packet | ||
282 | * @ad: the audit data | ||
283 | * | ||
284 | * Description: | ||
285 | * Fetch the NetLabel security attributes from @skb and perform an access check | ||
286 | * against the receiving socket. Returns zero on success, negative values on | ||
287 | * error. | ||
288 | * | ||
289 | */ | ||
290 | int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
291 | struct sk_buff *skb, | ||
292 | struct avc_audit_data *ad) | ||
293 | { | ||
294 | int rc; | ||
295 | u32 netlbl_sid; | ||
296 | u32 recv_perm; | ||
297 | |||
298 | rc = selinux_netlbl_skbuff_getsid(skb, | ||
299 | SECINITSID_UNLABELED, | ||
300 | &netlbl_sid); | ||
301 | if (rc != 0) | ||
302 | return rc; | ||
303 | |||
304 | if (netlbl_sid == SECSID_NULL) | ||
305 | return 0; | ||
306 | |||
307 | switch (sksec->sclass) { | ||
308 | case SECCLASS_UDP_SOCKET: | ||
309 | recv_perm = UDP_SOCKET__RECVFROM; | ||
310 | break; | ||
311 | case SECCLASS_TCP_SOCKET: | ||
312 | recv_perm = TCP_SOCKET__RECVFROM; | ||
313 | break; | ||
314 | default: | ||
315 | recv_perm = RAWIP_SOCKET__RECVFROM; | ||
316 | } | ||
317 | |||
318 | rc = avc_has_perm(sksec->sid, | ||
319 | netlbl_sid, | ||
320 | sksec->sclass, | ||
321 | recv_perm, | ||
322 | ad); | ||
323 | if (rc == 0) | ||
324 | return 0; | ||
325 | |||
326 | netlbl_skbuff_err(skb, rc); | ||
327 | return rc; | ||
328 | } | ||
329 | |||
330 | /** | ||
331 | * selinux_netlbl_socket_setsockopt - Do not allow users to remove a NetLabel | ||
332 | * @sock: the socket | ||
333 | * @level: the socket level or protocol | ||
334 | * @optname: the socket option name | ||
335 | * | ||
336 | * Description: | ||
337 | * Check the setsockopt() call and if the user is trying to replace the IP | ||
338 | * options on a socket and a NetLabel is in place for the socket deny the | ||
339 | * access; otherwise allow the access. Returns zero when the access is | ||
340 | * allowed, -EACCES when denied, and other negative values on error. | ||
341 | * | ||
342 | */ | ||
343 | int selinux_netlbl_socket_setsockopt(struct socket *sock, | ||
344 | int level, | ||
345 | int optname) | ||
346 | { | ||
347 | int rc = 0; | ||
348 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
349 | struct netlbl_lsm_secattr secattr; | ||
350 | |||
351 | rcu_read_lock(); | ||
352 | if (level == IPPROTO_IP && optname == IP_OPTIONS && | ||
353 | sksec->nlbl_state == NLBL_LABELED) { | ||
354 | netlbl_secattr_init(&secattr); | ||
355 | rc = netlbl_socket_getattr(sock, &secattr); | ||
356 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) | ||
357 | rc = -EACCES; | ||
358 | netlbl_secattr_destroy(&secattr); | ||
359 | } | ||
360 | rcu_read_unlock(); | ||
361 | |||
362 | return rc; | ||
363 | } | ||
diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c index 93b3177c7585..aca099aa2ed3 100644 --- a/security/selinux/selinuxfs.c +++ b/security/selinux/selinuxfs.c | |||
@@ -96,12 +96,18 @@ enum sel_inos { | |||
96 | SEL_COMMIT_BOOLS, /* commit new boolean values */ | 96 | SEL_COMMIT_BOOLS, /* commit new boolean values */ |
97 | SEL_MLS, /* return if MLS policy is enabled */ | 97 | SEL_MLS, /* return if MLS policy is enabled */ |
98 | SEL_DISABLE, /* disable SELinux until next reboot */ | 98 | SEL_DISABLE, /* disable SELinux until next reboot */ |
99 | SEL_AVC, /* AVC management directory */ | ||
100 | SEL_MEMBER, /* compute polyinstantiation membership decision */ | 99 | SEL_MEMBER, /* compute polyinstantiation membership decision */ |
101 | SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */ | 100 | SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */ |
102 | SEL_COMPAT_NET, /* whether to use old compat network packet controls */ | 101 | SEL_COMPAT_NET, /* whether to use old compat network packet controls */ |
102 | SEL_INO_NEXT, /* The next inode number to use */ | ||
103 | }; | 103 | }; |
104 | 104 | ||
105 | static unsigned long sel_last_ino = SEL_INO_NEXT - 1; | ||
106 | |||
107 | #define SEL_INITCON_INO_OFFSET 0x01000000 | ||
108 | #define SEL_BOOL_INO_OFFSET 0x02000000 | ||
109 | #define SEL_INO_MASK 0x00ffffff | ||
110 | |||
105 | #define TMPBUFLEN 12 | 111 | #define TMPBUFLEN 12 |
106 | static ssize_t sel_read_enforce(struct file *filp, char __user *buf, | 112 | static ssize_t sel_read_enforce(struct file *filp, char __user *buf, |
107 | size_t count, loff_t *ppos) | 113 | size_t count, loff_t *ppos) |
@@ -777,8 +783,6 @@ static struct inode *sel_make_inode(struct super_block *sb, int mode) | |||
777 | return ret; | 783 | return ret; |
778 | } | 784 | } |
779 | 785 | ||
780 | #define BOOL_INO_OFFSET 30 | ||
781 | |||
782 | static ssize_t sel_read_bool(struct file *filep, char __user *buf, | 786 | static ssize_t sel_read_bool(struct file *filep, char __user *buf, |
783 | size_t count, loff_t *ppos) | 787 | size_t count, loff_t *ppos) |
784 | { | 788 | { |
@@ -806,14 +810,14 @@ static ssize_t sel_read_bool(struct file *filep, char __user *buf, | |||
806 | } | 810 | } |
807 | 811 | ||
808 | inode = filep->f_path.dentry->d_inode; | 812 | inode = filep->f_path.dentry->d_inode; |
809 | cur_enforcing = security_get_bool_value(inode->i_ino - BOOL_INO_OFFSET); | 813 | cur_enforcing = security_get_bool_value(inode->i_ino&SEL_INO_MASK); |
810 | if (cur_enforcing < 0) { | 814 | if (cur_enforcing < 0) { |
811 | ret = cur_enforcing; | 815 | ret = cur_enforcing; |
812 | goto out; | 816 | goto out; |
813 | } | 817 | } |
814 | 818 | ||
815 | length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing, | 819 | length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing, |
816 | bool_pending_values[inode->i_ino - BOOL_INO_OFFSET]); | 820 | bool_pending_values[inode->i_ino&SEL_INO_MASK]); |
817 | ret = simple_read_from_buffer(buf, count, ppos, page, length); | 821 | ret = simple_read_from_buffer(buf, count, ppos, page, length); |
818 | out: | 822 | out: |
819 | mutex_unlock(&sel_mutex); | 823 | mutex_unlock(&sel_mutex); |
@@ -865,7 +869,7 @@ static ssize_t sel_write_bool(struct file *filep, const char __user *buf, | |||
865 | new_value = 1; | 869 | new_value = 1; |
866 | 870 | ||
867 | inode = filep->f_path.dentry->d_inode; | 871 | inode = filep->f_path.dentry->d_inode; |
868 | bool_pending_values[inode->i_ino - BOOL_INO_OFFSET] = new_value; | 872 | bool_pending_values[inode->i_ino&SEL_INO_MASK] = new_value; |
869 | length = count; | 873 | length = count; |
870 | 874 | ||
871 | out: | 875 | out: |
@@ -1029,7 +1033,7 @@ static int sel_make_bools(void) | |||
1029 | isec->sid = sid; | 1033 | isec->sid = sid; |
1030 | isec->initialized = 1; | 1034 | isec->initialized = 1; |
1031 | inode->i_fop = &sel_bool_ops; | 1035 | inode->i_fop = &sel_bool_ops; |
1032 | inode->i_ino = i + BOOL_INO_OFFSET; | 1036 | inode->i_ino = i|SEL_BOOL_INO_OFFSET; |
1033 | d_add(dentry, inode); | 1037 | d_add(dentry, inode); |
1034 | } | 1038 | } |
1035 | bool_num = num; | 1039 | bool_num = num; |
@@ -1234,6 +1238,56 @@ static int sel_make_avc_files(struct dentry *dir) | |||
1234 | goto out; | 1238 | goto out; |
1235 | } | 1239 | } |
1236 | inode->i_fop = files[i].ops; | 1240 | inode->i_fop = files[i].ops; |
1241 | inode->i_ino = ++sel_last_ino; | ||
1242 | d_add(dentry, inode); | ||
1243 | } | ||
1244 | out: | ||
1245 | return ret; | ||
1246 | } | ||
1247 | |||
1248 | static ssize_t sel_read_initcon(struct file * file, char __user *buf, | ||
1249 | size_t count, loff_t *ppos) | ||
1250 | { | ||
1251 | struct inode *inode; | ||
1252 | char *con; | ||
1253 | u32 sid, len; | ||
1254 | ssize_t ret; | ||
1255 | |||
1256 | inode = file->f_path.dentry->d_inode; | ||
1257 | sid = inode->i_ino&SEL_INO_MASK; | ||
1258 | ret = security_sid_to_context(sid, &con, &len); | ||
1259 | if (ret < 0) | ||
1260 | return ret; | ||
1261 | |||
1262 | ret = simple_read_from_buffer(buf, count, ppos, con, len); | ||
1263 | kfree(con); | ||
1264 | return ret; | ||
1265 | } | ||
1266 | |||
1267 | static const struct file_operations sel_initcon_ops = { | ||
1268 | .read = sel_read_initcon, | ||
1269 | }; | ||
1270 | |||
1271 | static int sel_make_initcon_files(struct dentry *dir) | ||
1272 | { | ||
1273 | int i, ret = 0; | ||
1274 | |||
1275 | for (i = 1; i <= SECINITSID_NUM; i++) { | ||
1276 | struct inode *inode; | ||
1277 | struct dentry *dentry; | ||
1278 | dentry = d_alloc_name(dir, security_get_initial_sid_context(i)); | ||
1279 | if (!dentry) { | ||
1280 | ret = -ENOMEM; | ||
1281 | goto out; | ||
1282 | } | ||
1283 | |||
1284 | inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO); | ||
1285 | if (!inode) { | ||
1286 | ret = -ENOMEM; | ||
1287 | goto out; | ||
1288 | } | ||
1289 | inode->i_fop = &sel_initcon_ops; | ||
1290 | inode->i_ino = i|SEL_INITCON_INO_OFFSET; | ||
1237 | d_add(dentry, inode); | 1291 | d_add(dentry, inode); |
1238 | } | 1292 | } |
1239 | out: | 1293 | out: |
@@ -1252,6 +1306,7 @@ static int sel_make_dir(struct inode *dir, struct dentry *dentry) | |||
1252 | } | 1306 | } |
1253 | inode->i_op = &simple_dir_inode_operations; | 1307 | inode->i_op = &simple_dir_inode_operations; |
1254 | inode->i_fop = &simple_dir_operations; | 1308 | inode->i_fop = &simple_dir_operations; |
1309 | inode->i_ino = ++sel_last_ino; | ||
1255 | /* directory inodes start off with i_nlink == 2 (for "." entry) */ | 1310 | /* directory inodes start off with i_nlink == 2 (for "." entry) */ |
1256 | inc_nlink(inode); | 1311 | inc_nlink(inode); |
1257 | d_add(dentry, inode); | 1312 | d_add(dentry, inode); |
@@ -1314,6 +1369,7 @@ static int sel_fill_super(struct super_block * sb, void * data, int silent) | |||
1314 | ret = -ENOMEM; | 1369 | ret = -ENOMEM; |
1315 | goto err; | 1370 | goto err; |
1316 | } | 1371 | } |
1372 | inode->i_ino = ++sel_last_ino; | ||
1317 | isec = (struct inode_security_struct*)inode->i_security; | 1373 | isec = (struct inode_security_struct*)inode->i_security; |
1318 | isec->sid = SECINITSID_DEVNULL; | 1374 | isec->sid = SECINITSID_DEVNULL; |
1319 | isec->sclass = SECCLASS_CHR_FILE; | 1375 | isec->sclass = SECCLASS_CHR_FILE; |
@@ -1336,6 +1392,21 @@ static int sel_fill_super(struct super_block * sb, void * data, int silent) | |||
1336 | ret = sel_make_avc_files(dentry); | 1392 | ret = sel_make_avc_files(dentry); |
1337 | if (ret) | 1393 | if (ret) |
1338 | goto err; | 1394 | goto err; |
1395 | |||
1396 | dentry = d_alloc_name(sb->s_root, "initial_contexts"); | ||
1397 | if (!dentry) { | ||
1398 | ret = -ENOMEM; | ||
1399 | goto err; | ||
1400 | } | ||
1401 | |||
1402 | ret = sel_make_dir(root_inode, dentry); | ||
1403 | if (ret) | ||
1404 | goto err; | ||
1405 | |||
1406 | ret = sel_make_initcon_files(dentry); | ||
1407 | if (ret) | ||
1408 | goto err; | ||
1409 | |||
1339 | out: | 1410 | out: |
1340 | return ret; | 1411 | return ret; |
1341 | err: | 1412 | err: |
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 1e52356664d6..40660ffd49b6 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
@@ -39,7 +39,6 @@ | |||
39 | #include <linux/sched.h> | 39 | #include <linux/sched.h> |
40 | #include <linux/audit.h> | 40 | #include <linux/audit.h> |
41 | #include <linux/mutex.h> | 41 | #include <linux/mutex.h> |
42 | #include <net/sock.h> | ||
43 | #include <net/netlabel.h> | 42 | #include <net/netlabel.h> |
44 | 43 | ||
45 | #include "flask.h" | 44 | #include "flask.h" |
@@ -53,7 +52,7 @@ | |||
53 | #include "conditional.h" | 52 | #include "conditional.h" |
54 | #include "mls.h" | 53 | #include "mls.h" |
55 | #include "objsec.h" | 54 | #include "objsec.h" |
56 | #include "selinux_netlabel.h" | 55 | #include "netlabel.h" |
57 | #include "xfrm.h" | 56 | #include "xfrm.h" |
58 | #include "ebitmap.h" | 57 | #include "ebitmap.h" |
59 | 58 | ||
@@ -594,6 +593,13 @@ static int context_struct_to_string(struct context *context, char **scontext, u3 | |||
594 | 593 | ||
595 | #include "initial_sid_to_string.h" | 594 | #include "initial_sid_to_string.h" |
596 | 595 | ||
596 | const char *security_get_initial_sid_context(u32 sid) | ||
597 | { | ||
598 | if (unlikely(sid > SECINITSID_NUM)) | ||
599 | return NULL; | ||
600 | return initial_sid_to_string[sid]; | ||
601 | } | ||
602 | |||
597 | /** | 603 | /** |
598 | * security_sid_to_context - Obtain a context for a given SID. | 604 | * security_sid_to_context - Obtain a context for a given SID. |
599 | * @sid: security identifier, SID | 605 | * @sid: security identifier, SID |
@@ -1050,6 +1056,8 @@ static int validate_classes(struct policydb *p) | |||
1050 | 1056 | ||
1051 | for (i = 1; i < kdefs->cts_len; i++) { | 1057 | for (i = 1; i < kdefs->cts_len; i++) { |
1052 | def_class = kdefs->class_to_string[i]; | 1058 | def_class = kdefs->class_to_string[i]; |
1059 | if (!def_class) | ||
1060 | continue; | ||
1053 | if (i > p->p_classes.nprim) { | 1061 | if (i > p->p_classes.nprim) { |
1054 | printk(KERN_INFO | 1062 | printk(KERN_INFO |
1055 | "security: class %s not defined in policy\n", | 1063 | "security: class %s not defined in policy\n", |
@@ -1249,6 +1257,7 @@ bad: | |||
1249 | } | 1257 | } |
1250 | 1258 | ||
1251 | extern void selinux_complete_init(void); | 1259 | extern void selinux_complete_init(void); |
1260 | static int security_preserve_bools(struct policydb *p); | ||
1252 | 1261 | ||
1253 | /** | 1262 | /** |
1254 | * security_load_policy - Load a security policy configuration. | 1263 | * security_load_policy - Load a security policy configuration. |
@@ -1325,6 +1334,12 @@ int security_load_policy(void *data, size_t len) | |||
1325 | goto err; | 1334 | goto err; |
1326 | } | 1335 | } |
1327 | 1336 | ||
1337 | rc = security_preserve_bools(&newpolicydb); | ||
1338 | if (rc) { | ||
1339 | printk(KERN_ERR "security: unable to preserve booleans\n"); | ||
1340 | goto err; | ||
1341 | } | ||
1342 | |||
1328 | /* Clone the SID table. */ | 1343 | /* Clone the SID table. */ |
1329 | sidtab_shutdown(&sidtab); | 1344 | sidtab_shutdown(&sidtab); |
1330 | if (sidtab_map(&sidtab, clone_sid, &newsidtab)) { | 1345 | if (sidtab_map(&sidtab, clone_sid, &newsidtab)) { |
@@ -1882,6 +1897,37 @@ out: | |||
1882 | return rc; | 1897 | return rc; |
1883 | } | 1898 | } |
1884 | 1899 | ||
1900 | static int security_preserve_bools(struct policydb *p) | ||
1901 | { | ||
1902 | int rc, nbools = 0, *bvalues = NULL, i; | ||
1903 | char **bnames = NULL; | ||
1904 | struct cond_bool_datum *booldatum; | ||
1905 | struct cond_node *cur; | ||
1906 | |||
1907 | rc = security_get_bools(&nbools, &bnames, &bvalues); | ||
1908 | if (rc) | ||
1909 | goto out; | ||
1910 | for (i = 0; i < nbools; i++) { | ||
1911 | booldatum = hashtab_search(p->p_bools.table, bnames[i]); | ||
1912 | if (booldatum) | ||
1913 | booldatum->state = bvalues[i]; | ||
1914 | } | ||
1915 | for (cur = p->cond_list; cur != NULL; cur = cur->next) { | ||
1916 | rc = evaluate_cond_node(p, cur); | ||
1917 | if (rc) | ||
1918 | goto out; | ||
1919 | } | ||
1920 | |||
1921 | out: | ||
1922 | if (bnames) { | ||
1923 | for (i = 0; i < nbools; i++) | ||
1924 | kfree(bnames[i]); | ||
1925 | } | ||
1926 | kfree(bnames); | ||
1927 | kfree(bvalues); | ||
1928 | return rc; | ||
1929 | } | ||
1930 | |||
1885 | /* | 1931 | /* |
1886 | * security_sid_mls_copy() - computes a new sid based on the given | 1932 | * security_sid_mls_copy() - computes a new sid based on the given |
1887 | * sid and the mls portion of mls_sid. | 1933 | * sid and the mls portion of mls_sid. |
@@ -2198,41 +2244,15 @@ void selinux_audit_set_callback(int (*callback)(void)) | |||
2198 | aurule_callback = callback; | 2244 | aurule_callback = callback; |
2199 | } | 2245 | } |
2200 | 2246 | ||
2201 | /** | ||
2202 | * security_skb_extlbl_sid - Determine the external label of a packet | ||
2203 | * @skb: the packet | ||
2204 | * @base_sid: the SELinux SID to use as a context for MLS only external labels | ||
2205 | * @sid: the packet's SID | ||
2206 | * | ||
2207 | * Description: | ||
2208 | * Check the various different forms of external packet labeling and determine | ||
2209 | * the external SID for the packet. | ||
2210 | * | ||
2211 | */ | ||
2212 | void security_skb_extlbl_sid(struct sk_buff *skb, u32 base_sid, u32 *sid) | ||
2213 | { | ||
2214 | u32 xfrm_sid; | ||
2215 | u32 nlbl_sid; | ||
2216 | |||
2217 | selinux_skb_xfrm_sid(skb, &xfrm_sid); | ||
2218 | if (selinux_netlbl_skbuff_getsid(skb, | ||
2219 | (xfrm_sid == SECSID_NULL ? | ||
2220 | base_sid : xfrm_sid), | ||
2221 | &nlbl_sid) != 0) | ||
2222 | nlbl_sid = SECSID_NULL; | ||
2223 | |||
2224 | *sid = (nlbl_sid == SECSID_NULL ? xfrm_sid : nlbl_sid); | ||
2225 | } | ||
2226 | |||
2227 | #ifdef CONFIG_NETLABEL | 2247 | #ifdef CONFIG_NETLABEL |
2228 | /* | 2248 | /* |
2229 | * This is the structure we store inside the NetLabel cache block. | 2249 | * NetLabel cache structure |
2230 | */ | 2250 | */ |
2231 | #define NETLBL_CACHE(x) ((struct netlbl_cache *)(x)) | 2251 | #define NETLBL_CACHE(x) ((struct selinux_netlbl_cache *)(x)) |
2232 | #define NETLBL_CACHE_T_NONE 0 | 2252 | #define NETLBL_CACHE_T_NONE 0 |
2233 | #define NETLBL_CACHE_T_SID 1 | 2253 | #define NETLBL_CACHE_T_SID 1 |
2234 | #define NETLBL_CACHE_T_MLS 2 | 2254 | #define NETLBL_CACHE_T_MLS 2 |
2235 | struct netlbl_cache { | 2255 | struct selinux_netlbl_cache { |
2236 | u32 type; | 2256 | u32 type; |
2237 | union { | 2257 | union { |
2238 | u32 sid; | 2258 | u32 sid; |
@@ -2241,7 +2261,7 @@ struct netlbl_cache { | |||
2241 | }; | 2261 | }; |
2242 | 2262 | ||
2243 | /** | 2263 | /** |
2244 | * selinux_netlbl_cache_free - Free the NetLabel cached data | 2264 | * security_netlbl_cache_free - Free the NetLabel cached data |
2245 | * @data: the data to free | 2265 | * @data: the data to free |
2246 | * | 2266 | * |
2247 | * Description: | 2267 | * Description: |
@@ -2249,9 +2269,9 @@ struct netlbl_cache { | |||
2249 | * netlbl_lsm_cache structure. | 2269 | * netlbl_lsm_cache structure. |
2250 | * | 2270 | * |
2251 | */ | 2271 | */ |
2252 | static void selinux_netlbl_cache_free(const void *data) | 2272 | static void security_netlbl_cache_free(const void *data) |
2253 | { | 2273 | { |
2254 | struct netlbl_cache *cache; | 2274 | struct selinux_netlbl_cache *cache; |
2255 | 2275 | ||
2256 | if (data == NULL) | 2276 | if (data == NULL) |
2257 | return; | 2277 | return; |
@@ -2266,33 +2286,33 @@ static void selinux_netlbl_cache_free(const void *data) | |||
2266 | } | 2286 | } |
2267 | 2287 | ||
2268 | /** | 2288 | /** |
2269 | * selinux_netlbl_cache_add - Add an entry to the NetLabel cache | 2289 | * security_netlbl_cache_add - Add an entry to the NetLabel cache |
2270 | * @skb: the packet | 2290 | * @secattr: the NetLabel packet security attributes |
2271 | * @ctx: the SELinux context | 2291 | * @ctx: the SELinux context |
2272 | * | 2292 | * |
2273 | * Description: | 2293 | * Description: |
2274 | * Attempt to cache the context in @ctx, which was derived from the packet in | 2294 | * Attempt to cache the context in @ctx, which was derived from the packet in |
2275 | * @skb, in the NetLabel subsystem cache. | 2295 | * @skb, in the NetLabel subsystem cache. This function assumes @secattr has |
2296 | * already been initialized. | ||
2276 | * | 2297 | * |
2277 | */ | 2298 | */ |
2278 | static void selinux_netlbl_cache_add(struct sk_buff *skb, struct context *ctx) | 2299 | static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, |
2300 | struct context *ctx) | ||
2279 | { | 2301 | { |
2280 | struct netlbl_cache *cache = NULL; | 2302 | struct selinux_netlbl_cache *cache = NULL; |
2281 | struct netlbl_lsm_secattr secattr; | ||
2282 | 2303 | ||
2283 | netlbl_secattr_init(&secattr); | 2304 | secattr->cache = netlbl_secattr_cache_alloc(GFP_ATOMIC); |
2284 | secattr.cache = netlbl_secattr_cache_alloc(GFP_ATOMIC); | 2305 | if (secattr->cache == NULL) |
2285 | if (secattr.cache == NULL) | 2306 | return; |
2286 | goto netlbl_cache_add_return; | ||
2287 | 2307 | ||
2288 | cache = kzalloc(sizeof(*cache), GFP_ATOMIC); | 2308 | cache = kzalloc(sizeof(*cache), GFP_ATOMIC); |
2289 | if (cache == NULL) | 2309 | if (cache == NULL) |
2290 | goto netlbl_cache_add_return; | 2310 | return; |
2291 | 2311 | ||
2292 | cache->type = NETLBL_CACHE_T_MLS; | 2312 | cache->type = NETLBL_CACHE_T_MLS; |
2293 | if (ebitmap_cpy(&cache->data.mls_label.level[0].cat, | 2313 | if (ebitmap_cpy(&cache->data.mls_label.level[0].cat, |
2294 | &ctx->range.level[0].cat) != 0) | 2314 | &ctx->range.level[0].cat) != 0) |
2295 | goto netlbl_cache_add_return; | 2315 | return; |
2296 | cache->data.mls_label.level[1].cat.highbit = | 2316 | cache->data.mls_label.level[1].cat.highbit = |
2297 | cache->data.mls_label.level[0].cat.highbit; | 2317 | cache->data.mls_label.level[0].cat.highbit; |
2298 | cache->data.mls_label.level[1].cat.node = | 2318 | cache->data.mls_label.level[1].cat.node = |
@@ -2300,52 +2320,40 @@ static void selinux_netlbl_cache_add(struct sk_buff *skb, struct context *ctx) | |||
2300 | cache->data.mls_label.level[0].sens = ctx->range.level[0].sens; | 2320 | cache->data.mls_label.level[0].sens = ctx->range.level[0].sens; |
2301 | cache->data.mls_label.level[1].sens = ctx->range.level[0].sens; | 2321 | cache->data.mls_label.level[1].sens = ctx->range.level[0].sens; |
2302 | 2322 | ||
2303 | secattr.cache->free = selinux_netlbl_cache_free; | 2323 | secattr->cache->free = security_netlbl_cache_free; |
2304 | secattr.cache->data = (void *)cache; | 2324 | secattr->cache->data = (void *)cache; |
2305 | secattr.flags = NETLBL_SECATTR_CACHE; | 2325 | secattr->flags |= NETLBL_SECATTR_CACHE; |
2306 | |||
2307 | netlbl_cache_add(skb, &secattr); | ||
2308 | |||
2309 | netlbl_cache_add_return: | ||
2310 | netlbl_secattr_destroy(&secattr); | ||
2311 | } | 2326 | } |
2312 | 2327 | ||
2313 | /** | 2328 | /** |
2314 | * selinux_netlbl_cache_invalidate - Invalidate the NetLabel cache | 2329 | * security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID |
2315 | * | ||
2316 | * Description: | ||
2317 | * Invalidate the NetLabel security attribute mapping cache. | ||
2318 | * | ||
2319 | */ | ||
2320 | void selinux_netlbl_cache_invalidate(void) | ||
2321 | { | ||
2322 | netlbl_cache_invalidate(); | ||
2323 | } | ||
2324 | |||
2325 | /** | ||
2326 | * selinux_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID | ||
2327 | * @skb: the network packet | ||
2328 | * @secattr: the NetLabel packet security attributes | 2330 | * @secattr: the NetLabel packet security attributes |
2329 | * @base_sid: the SELinux SID to use as a context for MLS only attributes | 2331 | * @base_sid: the SELinux SID to use as a context for MLS only attributes |
2330 | * @sid: the SELinux SID | 2332 | * @sid: the SELinux SID |
2331 | * | 2333 | * |
2332 | * Description: | 2334 | * Description: |
2333 | * Convert the given NetLabel packet security attributes in @secattr into a | 2335 | * Convert the given NetLabel security attributes in @secattr into a |
2334 | * SELinux SID. If the @secattr field does not contain a full SELinux | 2336 | * SELinux SID. If the @secattr field does not contain a full SELinux |
2335 | * SID/context then use the context in @base_sid as the foundation. If @skb | 2337 | * SID/context then use the context in @base_sid as the foundation. If |
2336 | * is not NULL attempt to cache as much data as possibile. Returns zero on | 2338 | * possibile the 'cache' field of @secattr is set and the CACHE flag is set; |
2337 | * success, negative values on failure. | 2339 | * this is to allow the @secattr to be used by NetLabel to cache the secattr to |
2340 | * SID conversion for future lookups. Returns zero on success, negative | ||
2341 | * values on failure. | ||
2338 | * | 2342 | * |
2339 | */ | 2343 | */ |
2340 | static int selinux_netlbl_secattr_to_sid(struct sk_buff *skb, | 2344 | int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, |
2341 | struct netlbl_lsm_secattr *secattr, | 2345 | u32 base_sid, |
2342 | u32 base_sid, | 2346 | u32 *sid) |
2343 | u32 *sid) | ||
2344 | { | 2347 | { |
2345 | int rc = -EIDRM; | 2348 | int rc = -EIDRM; |
2346 | struct context *ctx; | 2349 | struct context *ctx; |
2347 | struct context ctx_new; | 2350 | struct context ctx_new; |
2348 | struct netlbl_cache *cache; | 2351 | struct selinux_netlbl_cache *cache; |
2352 | |||
2353 | if (!ss_initialized) { | ||
2354 | *sid = SECSID_NULL; | ||
2355 | return 0; | ||
2356 | } | ||
2349 | 2357 | ||
2350 | POLICY_RDLOCK; | 2358 | POLICY_RDLOCK; |
2351 | 2359 | ||
@@ -2410,8 +2418,8 @@ static int selinux_netlbl_secattr_to_sid(struct sk_buff *skb, | |||
2410 | if (rc != 0) | 2418 | if (rc != 0) |
2411 | goto netlbl_secattr_to_sid_return_cleanup; | 2419 | goto netlbl_secattr_to_sid_return_cleanup; |
2412 | 2420 | ||
2413 | if (skb != NULL) | 2421 | security_netlbl_cache_add(secattr, &ctx_new); |
2414 | selinux_netlbl_cache_add(skb, &ctx_new); | 2422 | |
2415 | ebitmap_destroy(&ctx_new.range.level[0].cat); | 2423 | ebitmap_destroy(&ctx_new.range.level[0].cat); |
2416 | } else { | 2424 | } else { |
2417 | *sid = SECSID_NULL; | 2425 | *sid = SECSID_NULL; |
@@ -2427,338 +2435,43 @@ netlbl_secattr_to_sid_return_cleanup: | |||
2427 | } | 2435 | } |
2428 | 2436 | ||
2429 | /** | 2437 | /** |
2430 | * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel | 2438 | * security_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr |
2431 | * @skb: the packet | 2439 | * @sid: the SELinux SID |
2432 | * @base_sid: the SELinux SID to use as a context for MLS only attributes | 2440 | * @secattr: the NetLabel packet security attributes |
2433 | * @sid: the SID | ||
2434 | * | ||
2435 | * Description: | ||
2436 | * Call the NetLabel mechanism to get the security attributes of the given | ||
2437 | * packet and use those attributes to determine the correct context/SID to | ||
2438 | * assign to the packet. Returns zero on success, negative values on failure. | ||
2439 | * | ||
2440 | */ | ||
2441 | int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid) | ||
2442 | { | ||
2443 | int rc; | ||
2444 | struct netlbl_lsm_secattr secattr; | ||
2445 | |||
2446 | netlbl_secattr_init(&secattr); | ||
2447 | rc = netlbl_skbuff_getattr(skb, &secattr); | ||
2448 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) | ||
2449 | rc = selinux_netlbl_secattr_to_sid(skb, | ||
2450 | &secattr, | ||
2451 | base_sid, | ||
2452 | sid); | ||
2453 | else | ||
2454 | *sid = SECSID_NULL; | ||
2455 | netlbl_secattr_destroy(&secattr); | ||
2456 | |||
2457 | return rc; | ||
2458 | } | ||
2459 | |||
2460 | /** | ||
2461 | * selinux_netlbl_socket_setsid - Label a socket using the NetLabel mechanism | ||
2462 | * @sock: the socket to label | ||
2463 | * @sid: the SID to use | ||
2464 | * | 2441 | * |
2465 | * Description: | 2442 | * Description: |
2466 | * Attempt to label a socket using the NetLabel mechanism using the given | 2443 | * Convert the given SELinux SID in @sid into a NetLabel security attribute. |
2467 | * SID. Returns zero values on success, negative values on failure. The | 2444 | * Returns zero on success, negative values on failure. |
2468 | * caller is responsibile for calling rcu_read_lock() before calling this | ||
2469 | * this function and rcu_read_unlock() after this function returns. | ||
2470 | * | 2445 | * |
2471 | */ | 2446 | */ |
2472 | static int selinux_netlbl_socket_setsid(struct socket *sock, u32 sid) | 2447 | int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) |
2473 | { | 2448 | { |
2474 | int rc = -ENOENT; | 2449 | int rc = -ENOENT; |
2475 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
2476 | struct netlbl_lsm_secattr secattr; | ||
2477 | struct context *ctx; | 2450 | struct context *ctx; |
2478 | 2451 | ||
2452 | netlbl_secattr_init(secattr); | ||
2453 | |||
2479 | if (!ss_initialized) | 2454 | if (!ss_initialized) |
2480 | return 0; | 2455 | return 0; |
2481 | 2456 | ||
2482 | netlbl_secattr_init(&secattr); | ||
2483 | |||
2484 | POLICY_RDLOCK; | 2457 | POLICY_RDLOCK; |
2485 | |||
2486 | ctx = sidtab_search(&sidtab, sid); | 2458 | ctx = sidtab_search(&sidtab, sid); |
2487 | if (ctx == NULL) | 2459 | if (ctx == NULL) |
2488 | goto netlbl_socket_setsid_return; | 2460 | goto netlbl_sid_to_secattr_failure; |
2489 | 2461 | secattr->domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1], | |
2490 | secattr.domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1], | 2462 | GFP_ATOMIC); |
2491 | GFP_ATOMIC); | 2463 | secattr->flags |= NETLBL_SECATTR_DOMAIN; |
2492 | secattr.flags |= NETLBL_SECATTR_DOMAIN; | 2464 | mls_export_netlbl_lvl(ctx, secattr); |
2493 | mls_export_netlbl_lvl(ctx, &secattr); | 2465 | rc = mls_export_netlbl_cat(ctx, secattr); |
2494 | rc = mls_export_netlbl_cat(ctx, &secattr); | ||
2495 | if (rc != 0) | 2466 | if (rc != 0) |
2496 | goto netlbl_socket_setsid_return; | 2467 | goto netlbl_sid_to_secattr_failure; |
2497 | |||
2498 | rc = netlbl_socket_setattr(sock, &secattr); | ||
2499 | if (rc == 0) { | ||
2500 | spin_lock_bh(&sksec->nlbl_lock); | ||
2501 | sksec->nlbl_state = NLBL_LABELED; | ||
2502 | spin_unlock_bh(&sksec->nlbl_lock); | ||
2503 | } | ||
2504 | |||
2505 | netlbl_socket_setsid_return: | ||
2506 | POLICY_RDUNLOCK; | 2468 | POLICY_RDUNLOCK; |
2507 | netlbl_secattr_destroy(&secattr); | ||
2508 | return rc; | ||
2509 | } | ||
2510 | |||
2511 | /** | ||
2512 | * selinux_netlbl_sk_security_reset - Reset the NetLabel fields | ||
2513 | * @ssec: the sk_security_struct | ||
2514 | * @family: the socket family | ||
2515 | * | ||
2516 | * Description: | ||
2517 | * Called when the NetLabel state of a sk_security_struct needs to be reset. | ||
2518 | * The caller is responsibile for all the NetLabel sk_security_struct locking. | ||
2519 | * | ||
2520 | */ | ||
2521 | void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec, | ||
2522 | int family) | ||
2523 | { | ||
2524 | if (family == PF_INET) | ||
2525 | ssec->nlbl_state = NLBL_REQUIRE; | ||
2526 | else | ||
2527 | ssec->nlbl_state = NLBL_UNSET; | ||
2528 | } | ||
2529 | 2469 | ||
2530 | /** | 2470 | return 0; |
2531 | * selinux_netlbl_sk_security_init - Setup the NetLabel fields | ||
2532 | * @ssec: the sk_security_struct | ||
2533 | * @family: the socket family | ||
2534 | * | ||
2535 | * Description: | ||
2536 | * Called when a new sk_security_struct is allocated to initialize the NetLabel | ||
2537 | * fields. | ||
2538 | * | ||
2539 | */ | ||
2540 | void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec, | ||
2541 | int family) | ||
2542 | { | ||
2543 | /* No locking needed, we are the only one who has access to ssec */ | ||
2544 | selinux_netlbl_sk_security_reset(ssec, family); | ||
2545 | spin_lock_init(&ssec->nlbl_lock); | ||
2546 | } | ||
2547 | |||
2548 | /** | ||
2549 | * selinux_netlbl_sk_security_clone - Copy the NetLabel fields | ||
2550 | * @ssec: the original sk_security_struct | ||
2551 | * @newssec: the cloned sk_security_struct | ||
2552 | * | ||
2553 | * Description: | ||
2554 | * Clone the NetLabel specific sk_security_struct fields from @ssec to | ||
2555 | * @newssec. | ||
2556 | * | ||
2557 | */ | ||
2558 | void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec, | ||
2559 | struct sk_security_struct *newssec) | ||
2560 | { | ||
2561 | /* We don't need to take newssec->nlbl_lock because we are the only | ||
2562 | * thread with access to newssec, but we do need to take the RCU read | ||
2563 | * lock as other threads could have access to ssec */ | ||
2564 | rcu_read_lock(); | ||
2565 | selinux_netlbl_sk_security_reset(newssec, ssec->sk->sk_family); | ||
2566 | newssec->sclass = ssec->sclass; | ||
2567 | rcu_read_unlock(); | ||
2568 | } | ||
2569 | |||
2570 | /** | ||
2571 | * selinux_netlbl_socket_post_create - Label a socket using NetLabel | ||
2572 | * @sock: the socket to label | ||
2573 | * | ||
2574 | * Description: | ||
2575 | * Attempt to label a socket using the NetLabel mechanism using the given | ||
2576 | * SID. Returns zero values on success, negative values on failure. | ||
2577 | * | ||
2578 | */ | ||
2579 | int selinux_netlbl_socket_post_create(struct socket *sock) | ||
2580 | { | ||
2581 | int rc = 0; | ||
2582 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | ||
2583 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
2584 | |||
2585 | sksec->sclass = isec->sclass; | ||
2586 | |||
2587 | rcu_read_lock(); | ||
2588 | if (sksec->nlbl_state == NLBL_REQUIRE) | ||
2589 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
2590 | rcu_read_unlock(); | ||
2591 | |||
2592 | return rc; | ||
2593 | } | ||
2594 | |||
2595 | /** | ||
2596 | * selinux_netlbl_sock_graft - Netlabel the new socket | ||
2597 | * @sk: the new connection | ||
2598 | * @sock: the new socket | ||
2599 | * | ||
2600 | * Description: | ||
2601 | * The connection represented by @sk is being grafted onto @sock so set the | ||
2602 | * socket's NetLabel to match the SID of @sk. | ||
2603 | * | ||
2604 | */ | ||
2605 | void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock) | ||
2606 | { | ||
2607 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | ||
2608 | struct sk_security_struct *sksec = sk->sk_security; | ||
2609 | struct netlbl_lsm_secattr secattr; | ||
2610 | u32 nlbl_peer_sid; | ||
2611 | |||
2612 | sksec->sclass = isec->sclass; | ||
2613 | |||
2614 | rcu_read_lock(); | ||
2615 | |||
2616 | if (sksec->nlbl_state != NLBL_REQUIRE) { | ||
2617 | rcu_read_unlock(); | ||
2618 | return; | ||
2619 | } | ||
2620 | |||
2621 | netlbl_secattr_init(&secattr); | ||
2622 | if (netlbl_sock_getattr(sk, &secattr) == 0 && | ||
2623 | secattr.flags != NETLBL_SECATTR_NONE && | ||
2624 | selinux_netlbl_secattr_to_sid(NULL, | ||
2625 | &secattr, | ||
2626 | SECINITSID_UNLABELED, | ||
2627 | &nlbl_peer_sid) == 0) | ||
2628 | sksec->peer_sid = nlbl_peer_sid; | ||
2629 | netlbl_secattr_destroy(&secattr); | ||
2630 | |||
2631 | /* Try to set the NetLabel on the socket to save time later, if we fail | ||
2632 | * here we will pick up the pieces in later calls to | ||
2633 | * selinux_netlbl_inode_permission(). */ | ||
2634 | selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
2635 | |||
2636 | rcu_read_unlock(); | ||
2637 | } | ||
2638 | |||
2639 | /** | ||
2640 | * selinux_netlbl_inode_permission - Verify the socket is NetLabel labeled | ||
2641 | * @inode: the file descriptor's inode | ||
2642 | * @mask: the permission mask | ||
2643 | * | ||
2644 | * Description: | ||
2645 | * Looks at a file's inode and if it is marked as a socket protected by | ||
2646 | * NetLabel then verify that the socket has been labeled, if not try to label | ||
2647 | * the socket now with the inode's SID. Returns zero on success, negative | ||
2648 | * values on failure. | ||
2649 | * | ||
2650 | */ | ||
2651 | int selinux_netlbl_inode_permission(struct inode *inode, int mask) | ||
2652 | { | ||
2653 | int rc; | ||
2654 | struct sk_security_struct *sksec; | ||
2655 | struct socket *sock; | ||
2656 | |||
2657 | if (!S_ISSOCK(inode->i_mode) || | ||
2658 | ((mask & (MAY_WRITE | MAY_APPEND)) == 0)) | ||
2659 | return 0; | ||
2660 | sock = SOCKET_I(inode); | ||
2661 | sksec = sock->sk->sk_security; | ||
2662 | |||
2663 | rcu_read_lock(); | ||
2664 | if (sksec->nlbl_state != NLBL_REQUIRE) { | ||
2665 | rcu_read_unlock(); | ||
2666 | return 0; | ||
2667 | } | ||
2668 | local_bh_disable(); | ||
2669 | bh_lock_sock_nested(sock->sk); | ||
2670 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | ||
2671 | bh_unlock_sock(sock->sk); | ||
2672 | local_bh_enable(); | ||
2673 | rcu_read_unlock(); | ||
2674 | |||
2675 | return rc; | ||
2676 | } | ||
2677 | |||
2678 | /** | ||
2679 | * selinux_netlbl_sock_rcv_skb - Do an inbound access check using NetLabel | ||
2680 | * @sksec: the sock's sk_security_struct | ||
2681 | * @skb: the packet | ||
2682 | * @ad: the audit data | ||
2683 | * | ||
2684 | * Description: | ||
2685 | * Fetch the NetLabel security attributes from @skb and perform an access check | ||
2686 | * against the receiving socket. Returns zero on success, negative values on | ||
2687 | * error. | ||
2688 | * | ||
2689 | */ | ||
2690 | int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
2691 | struct sk_buff *skb, | ||
2692 | struct avc_audit_data *ad) | ||
2693 | { | ||
2694 | int rc; | ||
2695 | u32 netlbl_sid; | ||
2696 | u32 recv_perm; | ||
2697 | |||
2698 | rc = selinux_netlbl_skbuff_getsid(skb, | ||
2699 | SECINITSID_UNLABELED, | ||
2700 | &netlbl_sid); | ||
2701 | if (rc != 0) | ||
2702 | return rc; | ||
2703 | |||
2704 | if (netlbl_sid == SECSID_NULL) | ||
2705 | return 0; | ||
2706 | |||
2707 | switch (sksec->sclass) { | ||
2708 | case SECCLASS_UDP_SOCKET: | ||
2709 | recv_perm = UDP_SOCKET__RECVFROM; | ||
2710 | break; | ||
2711 | case SECCLASS_TCP_SOCKET: | ||
2712 | recv_perm = TCP_SOCKET__RECVFROM; | ||
2713 | break; | ||
2714 | default: | ||
2715 | recv_perm = RAWIP_SOCKET__RECVFROM; | ||
2716 | } | ||
2717 | |||
2718 | rc = avc_has_perm(sksec->sid, | ||
2719 | netlbl_sid, | ||
2720 | sksec->sclass, | ||
2721 | recv_perm, | ||
2722 | ad); | ||
2723 | if (rc == 0) | ||
2724 | return 0; | ||
2725 | |||
2726 | netlbl_skbuff_err(skb, rc); | ||
2727 | return rc; | ||
2728 | } | ||
2729 | |||
2730 | /** | ||
2731 | * selinux_netlbl_socket_setsockopt - Do not allow users to remove a NetLabel | ||
2732 | * @sock: the socket | ||
2733 | * @level: the socket level or protocol | ||
2734 | * @optname: the socket option name | ||
2735 | * | ||
2736 | * Description: | ||
2737 | * Check the setsockopt() call and if the user is trying to replace the IP | ||
2738 | * options on a socket and a NetLabel is in place for the socket deny the | ||
2739 | * access; otherwise allow the access. Returns zero when the access is | ||
2740 | * allowed, -EACCES when denied, and other negative values on error. | ||
2741 | * | ||
2742 | */ | ||
2743 | int selinux_netlbl_socket_setsockopt(struct socket *sock, | ||
2744 | int level, | ||
2745 | int optname) | ||
2746 | { | ||
2747 | int rc = 0; | ||
2748 | struct sk_security_struct *sksec = sock->sk->sk_security; | ||
2749 | struct netlbl_lsm_secattr secattr; | ||
2750 | |||
2751 | rcu_read_lock(); | ||
2752 | if (level == IPPROTO_IP && optname == IP_OPTIONS && | ||
2753 | sksec->nlbl_state == NLBL_LABELED) { | ||
2754 | netlbl_secattr_init(&secattr); | ||
2755 | rc = netlbl_socket_getattr(sock, &secattr); | ||
2756 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) | ||
2757 | rc = -EACCES; | ||
2758 | netlbl_secattr_destroy(&secattr); | ||
2759 | } | ||
2760 | rcu_read_unlock(); | ||
2761 | 2471 | ||
2472 | netlbl_sid_to_secattr_failure: | ||
2473 | POLICY_RDUNLOCK; | ||
2474 | netlbl_secattr_destroy(secattr); | ||
2762 | return rc; | 2475 | return rc; |
2763 | } | 2476 | } |
2764 | #endif /* CONFIG_NETLABEL */ | 2477 | #endif /* CONFIG_NETLABEL */ |