diff options
Diffstat (limited to 'security/selinux/netlabel.c')
-rw-r--r-- | security/selinux/netlabel.c | 36 |
1 files changed, 21 insertions, 15 deletions
diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c index bf8750791dd1..e64eca246f1a 100644 --- a/security/selinux/netlabel.c +++ b/security/selinux/netlabel.c | |||
@@ -36,8 +36,8 @@ | |||
36 | #include "security.h" | 36 | #include "security.h" |
37 | 37 | ||
38 | /** | 38 | /** |
39 | * selinux_netlbl_socket_setsid - Label a socket using the NetLabel mechanism | 39 | * selinux_netlbl_sock_setsid - Label a socket using the NetLabel mechanism |
40 | * @sock: the socket to label | 40 | * @sk: the socket to label |
41 | * @sid: the SID to use | 41 | * @sid: the SID to use |
42 | * | 42 | * |
43 | * Description: | 43 | * Description: |
@@ -47,17 +47,17 @@ | |||
47 | * this function and rcu_read_unlock() after this function returns. | 47 | * this function and rcu_read_unlock() after this function returns. |
48 | * | 48 | * |
49 | */ | 49 | */ |
50 | static int selinux_netlbl_socket_setsid(struct socket *sock, u32 sid) | 50 | static int selinux_netlbl_sock_setsid(struct sock *sk, u32 sid) |
51 | { | 51 | { |
52 | int rc; | 52 | int rc; |
53 | struct sk_security_struct *sksec = sock->sk->sk_security; | 53 | struct sk_security_struct *sksec = sk->sk_security; |
54 | struct netlbl_lsm_secattr secattr; | 54 | struct netlbl_lsm_secattr secattr; |
55 | 55 | ||
56 | rc = security_netlbl_sid_to_secattr(sid, &secattr); | 56 | rc = security_netlbl_sid_to_secattr(sid, &secattr); |
57 | if (rc != 0) | 57 | if (rc != 0) |
58 | return rc; | 58 | return rc; |
59 | 59 | ||
60 | rc = netlbl_socket_setattr(sock, &secattr); | 60 | rc = netlbl_sock_setattr(sk, &secattr); |
61 | if (rc == 0) { | 61 | if (rc == 0) { |
62 | spin_lock_bh(&sksec->nlbl_lock); | 62 | spin_lock_bh(&sksec->nlbl_lock); |
63 | sksec->nlbl_state = NLBL_LABELED; | 63 | sksec->nlbl_state = NLBL_LABELED; |
@@ -206,7 +206,7 @@ void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock) | |||
206 | /* Try to set the NetLabel on the socket to save time later, if we fail | 206 | /* Try to set the NetLabel on the socket to save time later, if we fail |
207 | * here we will pick up the pieces in later calls to | 207 | * here we will pick up the pieces in later calls to |
208 | * selinux_netlbl_inode_permission(). */ | 208 | * selinux_netlbl_inode_permission(). */ |
209 | selinux_netlbl_socket_setsid(sock, sksec->sid); | 209 | selinux_netlbl_sock_setsid(sk, sksec->sid); |
210 | 210 | ||
211 | rcu_read_unlock(); | 211 | rcu_read_unlock(); |
212 | } | 212 | } |
@@ -223,14 +223,15 @@ void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock) | |||
223 | int selinux_netlbl_socket_post_create(struct socket *sock) | 223 | int selinux_netlbl_socket_post_create(struct socket *sock) |
224 | { | 224 | { |
225 | int rc = 0; | 225 | int rc = 0; |
226 | struct sock *sk = sock->sk; | ||
226 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | 227 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; |
227 | struct sk_security_struct *sksec = sock->sk->sk_security; | 228 | struct sk_security_struct *sksec = sk->sk_security; |
228 | 229 | ||
229 | sksec->sclass = isec->sclass; | 230 | sksec->sclass = isec->sclass; |
230 | 231 | ||
231 | rcu_read_lock(); | 232 | rcu_read_lock(); |
232 | if (sksec->nlbl_state == NLBL_REQUIRE) | 233 | if (sksec->nlbl_state == NLBL_REQUIRE) |
233 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | 234 | rc = selinux_netlbl_sock_setsid(sk, sksec->sid); |
234 | rcu_read_unlock(); | 235 | rcu_read_unlock(); |
235 | 236 | ||
236 | return rc; | 237 | return rc; |
@@ -251,14 +252,16 @@ int selinux_netlbl_socket_post_create(struct socket *sock) | |||
251 | int selinux_netlbl_inode_permission(struct inode *inode, int mask) | 252 | int selinux_netlbl_inode_permission(struct inode *inode, int mask) |
252 | { | 253 | { |
253 | int rc; | 254 | int rc; |
254 | struct sk_security_struct *sksec; | 255 | struct sock *sk; |
255 | struct socket *sock; | 256 | struct socket *sock; |
257 | struct sk_security_struct *sksec; | ||
256 | 258 | ||
257 | if (!S_ISSOCK(inode->i_mode) || | 259 | if (!S_ISSOCK(inode->i_mode) || |
258 | ((mask & (MAY_WRITE | MAY_APPEND)) == 0)) | 260 | ((mask & (MAY_WRITE | MAY_APPEND)) == 0)) |
259 | return 0; | 261 | return 0; |
260 | sock = SOCKET_I(inode); | 262 | sock = SOCKET_I(inode); |
261 | sksec = sock->sk->sk_security; | 263 | sk = sock->sk; |
264 | sksec = sk->sk_security; | ||
262 | 265 | ||
263 | rcu_read_lock(); | 266 | rcu_read_lock(); |
264 | if (sksec->nlbl_state != NLBL_REQUIRE) { | 267 | if (sksec->nlbl_state != NLBL_REQUIRE) { |
@@ -266,9 +269,9 @@ int selinux_netlbl_inode_permission(struct inode *inode, int mask) | |||
266 | return 0; | 269 | return 0; |
267 | } | 270 | } |
268 | local_bh_disable(); | 271 | local_bh_disable(); |
269 | bh_lock_sock_nested(sock->sk); | 272 | bh_lock_sock_nested(sk); |
270 | rc = selinux_netlbl_socket_setsid(sock, sksec->sid); | 273 | rc = selinux_netlbl_sock_setsid(sk, sksec->sid); |
271 | bh_unlock_sock(sock->sk); | 274 | bh_unlock_sock(sk); |
272 | local_bh_enable(); | 275 | local_bh_enable(); |
273 | rcu_read_unlock(); | 276 | rcu_read_unlock(); |
274 | 277 | ||
@@ -345,14 +348,17 @@ int selinux_netlbl_socket_setsockopt(struct socket *sock, | |||
345 | int optname) | 348 | int optname) |
346 | { | 349 | { |
347 | int rc = 0; | 350 | int rc = 0; |
348 | struct sk_security_struct *sksec = sock->sk->sk_security; | 351 | struct sock *sk = sock->sk; |
352 | struct sk_security_struct *sksec = sk->sk_security; | ||
349 | struct netlbl_lsm_secattr secattr; | 353 | struct netlbl_lsm_secattr secattr; |
350 | 354 | ||
351 | rcu_read_lock(); | 355 | rcu_read_lock(); |
352 | if (level == IPPROTO_IP && optname == IP_OPTIONS && | 356 | if (level == IPPROTO_IP && optname == IP_OPTIONS && |
353 | sksec->nlbl_state == NLBL_LABELED) { | 357 | sksec->nlbl_state == NLBL_LABELED) { |
354 | netlbl_secattr_init(&secattr); | 358 | netlbl_secattr_init(&secattr); |
355 | rc = netlbl_socket_getattr(sock, &secattr); | 359 | lock_sock(sk); |
360 | rc = netlbl_sock_getattr(sk, &secattr); | ||
361 | release_sock(sk); | ||
356 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) | 362 | if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE) |
357 | rc = -EACCES; | 363 | rc = -EACCES; |
358 | netlbl_secattr_destroy(&secattr); | 364 | netlbl_secattr_destroy(&secattr); |