diff options
Diffstat (limited to 'security/selinux/ss')
| -rw-r--r-- | security/selinux/ss/mls.c | 21 | ||||
| -rw-r--r-- | security/selinux/ss/policydb.c | 27 | ||||
| -rw-r--r-- | security/selinux/ss/policydb.h | 7 | ||||
| -rw-r--r-- | security/selinux/ss/services.c | 30 |
4 files changed, 54 insertions, 31 deletions
diff --git a/security/selinux/ss/mls.c b/security/selinux/ss/mls.c index 119bd6078ba1..c713af23250a 100644 --- a/security/selinux/ss/mls.c +++ b/security/selinux/ss/mls.c | |||
| @@ -530,22 +530,21 @@ int mls_compute_sid(struct context *scontext, | |||
| 530 | u32 specified, | 530 | u32 specified, |
| 531 | struct context *newcontext) | 531 | struct context *newcontext) |
| 532 | { | 532 | { |
| 533 | struct range_trans *rtr; | ||
| 534 | |||
| 533 | if (!selinux_mls_enabled) | 535 | if (!selinux_mls_enabled) |
| 534 | return 0; | 536 | return 0; |
| 535 | 537 | ||
| 536 | switch (specified) { | 538 | switch (specified) { |
| 537 | case AVTAB_TRANSITION: | 539 | case AVTAB_TRANSITION: |
| 538 | if (tclass == SECCLASS_PROCESS) { | 540 | /* Look for a range transition rule. */ |
| 539 | struct range_trans *rangetr; | 541 | for (rtr = policydb.range_tr; rtr; rtr = rtr->next) { |
| 540 | /* Look for a range transition rule. */ | 542 | if (rtr->source_type == scontext->type && |
| 541 | for (rangetr = policydb.range_tr; rangetr; | 543 | rtr->target_type == tcontext->type && |
| 542 | rangetr = rangetr->next) { | 544 | rtr->target_class == tclass) { |
| 543 | if (rangetr->dom == scontext->type && | 545 | /* Set the range from the rule */ |
| 544 | rangetr->type == tcontext->type) { | 546 | return mls_range_set(newcontext, |
| 545 | /* Set the range from the rule */ | 547 | &rtr->target_range); |
| 546 | return mls_range_set(newcontext, | ||
| 547 | &rangetr->range); | ||
| 548 | } | ||
| 549 | } | 548 | } |
| 550 | } | 549 | } |
| 551 | /* Fallthrough */ | 550 | /* Fallthrough */ |
diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c index f03960e697ce..b18895302555 100644 --- a/security/selinux/ss/policydb.c +++ b/security/selinux/ss/policydb.c | |||
| @@ -96,6 +96,11 @@ static struct policydb_compat_info policydb_compat[] = { | |||
| 96 | .sym_num = SYM_NUM, | 96 | .sym_num = SYM_NUM, |
| 97 | .ocon_num = OCON_NUM, | 97 | .ocon_num = OCON_NUM, |
| 98 | }, | 98 | }, |
| 99 | { | ||
| 100 | .version = POLICYDB_VERSION_RANGETRANS, | ||
| 101 | .sym_num = SYM_NUM, | ||
| 102 | .ocon_num = OCON_NUM, | ||
| 103 | }, | ||
| 99 | }; | 104 | }; |
| 100 | 105 | ||
| 101 | static struct policydb_compat_info *policydb_lookup_compat(int version) | 106 | static struct policydb_compat_info *policydb_lookup_compat(int version) |
| @@ -645,15 +650,15 @@ void policydb_destroy(struct policydb *p) | |||
| 645 | 650 | ||
| 646 | for (rt = p->range_tr; rt; rt = rt -> next) { | 651 | for (rt = p->range_tr; rt; rt = rt -> next) { |
| 647 | if (lrt) { | 652 | if (lrt) { |
| 648 | ebitmap_destroy(&lrt->range.level[0].cat); | 653 | ebitmap_destroy(&lrt->target_range.level[0].cat); |
| 649 | ebitmap_destroy(&lrt->range.level[1].cat); | 654 | ebitmap_destroy(&lrt->target_range.level[1].cat); |
| 650 | kfree(lrt); | 655 | kfree(lrt); |
| 651 | } | 656 | } |
| 652 | lrt = rt; | 657 | lrt = rt; |
| 653 | } | 658 | } |
| 654 | if (lrt) { | 659 | if (lrt) { |
| 655 | ebitmap_destroy(&lrt->range.level[0].cat); | 660 | ebitmap_destroy(&lrt->target_range.level[0].cat); |
| 656 | ebitmap_destroy(&lrt->range.level[1].cat); | 661 | ebitmap_destroy(&lrt->target_range.level[1].cat); |
| 657 | kfree(lrt); | 662 | kfree(lrt); |
| 658 | } | 663 | } |
| 659 | 664 | ||
| @@ -1829,6 +1834,7 @@ int policydb_read(struct policydb *p, void *fp) | |||
| 1829 | } | 1834 | } |
| 1830 | 1835 | ||
| 1831 | if (p->policyvers >= POLICYDB_VERSION_MLS) { | 1836 | if (p->policyvers >= POLICYDB_VERSION_MLS) { |
| 1837 | int new_rangetr = p->policyvers >= POLICYDB_VERSION_RANGETRANS; | ||
| 1832 | rc = next_entry(buf, fp, sizeof(u32)); | 1838 | rc = next_entry(buf, fp, sizeof(u32)); |
| 1833 | if (rc < 0) | 1839 | if (rc < 0) |
| 1834 | goto bad; | 1840 | goto bad; |
| @@ -1847,9 +1853,16 @@ int policydb_read(struct policydb *p, void *fp) | |||
| 1847 | rc = next_entry(buf, fp, (sizeof(u32) * 2)); | 1853 | rc = next_entry(buf, fp, (sizeof(u32) * 2)); |
| 1848 | if (rc < 0) | 1854 | if (rc < 0) |
| 1849 | goto bad; | 1855 | goto bad; |
| 1850 | rt->dom = le32_to_cpu(buf[0]); | 1856 | rt->source_type = le32_to_cpu(buf[0]); |
| 1851 | rt->type = le32_to_cpu(buf[1]); | 1857 | rt->target_type = le32_to_cpu(buf[1]); |
| 1852 | rc = mls_read_range_helper(&rt->range, fp); | 1858 | if (new_rangetr) { |
| 1859 | rc = next_entry(buf, fp, sizeof(u32)); | ||
| 1860 | if (rc < 0) | ||
| 1861 | goto bad; | ||
| 1862 | rt->target_class = le32_to_cpu(buf[0]); | ||
| 1863 | } else | ||
| 1864 | rt->target_class = SECCLASS_PROCESS; | ||
| 1865 | rc = mls_read_range_helper(&rt->target_range, fp); | ||
| 1853 | if (rc) | 1866 | if (rc) |
| 1854 | goto bad; | 1867 | goto bad; |
| 1855 | lrt = rt; | 1868 | lrt = rt; |
diff --git a/security/selinux/ss/policydb.h b/security/selinux/ss/policydb.h index b1340711f721..8319d5ff5944 100644 --- a/security/selinux/ss/policydb.h +++ b/security/selinux/ss/policydb.h | |||
| @@ -106,9 +106,10 @@ struct cat_datum { | |||
| 106 | }; | 106 | }; |
| 107 | 107 | ||
| 108 | struct range_trans { | 108 | struct range_trans { |
| 109 | u32 dom; /* current process domain */ | 109 | u32 source_type; |
| 110 | u32 type; /* program executable type */ | 110 | u32 target_type; |
| 111 | struct mls_range range; /* new range */ | 111 | u32 target_class; |
| 112 | struct mls_range target_range; | ||
| 112 | struct range_trans *next; | 113 | struct range_trans *next; |
| 113 | }; | 114 | }; |
| 114 | 115 | ||
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 7eb69a602d8f..0c219a1b3243 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
| @@ -2003,7 +2003,7 @@ int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, | |||
| 2003 | return rc; | 2003 | return rc; |
| 2004 | } | 2004 | } |
| 2005 | 2005 | ||
| 2006 | int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | 2006 | int selinux_audit_rule_match(u32 sid, u32 field, u32 op, |
| 2007 | struct selinux_audit_rule *rule, | 2007 | struct selinux_audit_rule *rule, |
| 2008 | struct audit_context *actx) | 2008 | struct audit_context *actx) |
| 2009 | { | 2009 | { |
| @@ -2026,11 +2026,11 @@ int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | |||
| 2026 | goto out; | 2026 | goto out; |
| 2027 | } | 2027 | } |
| 2028 | 2028 | ||
| 2029 | ctxt = sidtab_search(&sidtab, ctxid); | 2029 | ctxt = sidtab_search(&sidtab, sid); |
| 2030 | if (!ctxt) { | 2030 | if (!ctxt) { |
| 2031 | audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, | 2031 | audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, |
| 2032 | "selinux_audit_rule_match: unrecognized SID %d\n", | 2032 | "selinux_audit_rule_match: unrecognized SID %d\n", |
| 2033 | ctxid); | 2033 | sid); |
| 2034 | match = -ENOENT; | 2034 | match = -ENOENT; |
| 2035 | goto out; | 2035 | goto out; |
| 2036 | } | 2036 | } |
| @@ -2502,14 +2502,24 @@ void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock) | |||
| 2502 | { | 2502 | { |
| 2503 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; | 2503 | struct inode_security_struct *isec = SOCK_INODE(sock)->i_security; |
| 2504 | struct sk_security_struct *sksec = sk->sk_security; | 2504 | struct sk_security_struct *sksec = sk->sk_security; |
| 2505 | struct netlbl_lsm_secattr secattr; | ||
| 2506 | u32 nlbl_peer_sid; | ||
| 2505 | 2507 | ||
| 2506 | sksec->sclass = isec->sclass; | 2508 | sksec->sclass = isec->sclass; |
| 2507 | 2509 | ||
| 2508 | if (sk->sk_family != PF_INET) | 2510 | if (sk->sk_family != PF_INET) |
| 2509 | return; | 2511 | return; |
| 2510 | 2512 | ||
| 2513 | netlbl_secattr_init(&secattr); | ||
| 2514 | if (netlbl_sock_getattr(sk, &secattr) == 0 && | ||
| 2515 | selinux_netlbl_secattr_to_sid(NULL, | ||
| 2516 | &secattr, | ||
| 2517 | sksec->sid, | ||
| 2518 | &nlbl_peer_sid) == 0) | ||
| 2519 | sksec->peer_sid = nlbl_peer_sid; | ||
| 2520 | netlbl_secattr_destroy(&secattr, 0); | ||
| 2521 | |||
| 2511 | sksec->nlbl_state = NLBL_REQUIRE; | 2522 | sksec->nlbl_state = NLBL_REQUIRE; |
| 2512 | sksec->peer_sid = sksec->sid; | ||
| 2513 | 2523 | ||
| 2514 | /* Try to set the NetLabel on the socket to save time later, if we fail | 2524 | /* Try to set the NetLabel on the socket to save time later, if we fail |
| 2515 | * here we will pick up the pieces in later calls to | 2525 | * here we will pick up the pieces in later calls to |
| @@ -2568,7 +2578,7 @@ int selinux_netlbl_inode_permission(struct inode *inode, int mask) | |||
| 2568 | sock = SOCKET_I(inode); | 2578 | sock = SOCKET_I(inode); |
| 2569 | isec = inode->i_security; | 2579 | isec = inode->i_security; |
| 2570 | sksec = sock->sk->sk_security; | 2580 | sksec = sock->sk->sk_security; |
| 2571 | down(&isec->sem); | 2581 | mutex_lock(&isec->lock); |
| 2572 | if (unlikely(sksec->nlbl_state == NLBL_REQUIRE && | 2582 | if (unlikely(sksec->nlbl_state == NLBL_REQUIRE && |
| 2573 | (mask & (MAY_WRITE | MAY_APPEND)))) { | 2583 | (mask & (MAY_WRITE | MAY_APPEND)))) { |
| 2574 | lock_sock(sock->sk); | 2584 | lock_sock(sock->sk); |
| @@ -2576,7 +2586,7 @@ int selinux_netlbl_inode_permission(struct inode *inode, int mask) | |||
| 2576 | release_sock(sock->sk); | 2586 | release_sock(sock->sk); |
| 2577 | } else | 2587 | } else |
| 2578 | rc = 0; | 2588 | rc = 0; |
| 2579 | up(&isec->sem); | 2589 | mutex_unlock(&isec->lock); |
| 2580 | 2590 | ||
| 2581 | return rc; | 2591 | return rc; |
| 2582 | } | 2592 | } |
| @@ -2601,7 +2611,7 @@ int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | |||
| 2601 | u32 netlbl_sid; | 2611 | u32 netlbl_sid; |
| 2602 | u32 recv_perm; | 2612 | u32 recv_perm; |
| 2603 | 2613 | ||
| 2604 | rc = selinux_netlbl_skbuff_getsid(skb, sksec->sid, &netlbl_sid); | 2614 | rc = selinux_netlbl_skbuff_getsid(skb, SECINITSID_NETMSG, &netlbl_sid); |
| 2605 | if (rc != 0) | 2615 | if (rc != 0) |
| 2606 | return rc; | 2616 | return rc; |
| 2607 | 2617 | ||
| @@ -2610,13 +2620,13 @@ int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | |||
| 2610 | 2620 | ||
| 2611 | switch (sksec->sclass) { | 2621 | switch (sksec->sclass) { |
| 2612 | case SECCLASS_UDP_SOCKET: | 2622 | case SECCLASS_UDP_SOCKET: |
| 2613 | recv_perm = UDP_SOCKET__RECV_MSG; | 2623 | recv_perm = UDP_SOCKET__RECVFROM; |
| 2614 | break; | 2624 | break; |
| 2615 | case SECCLASS_TCP_SOCKET: | 2625 | case SECCLASS_TCP_SOCKET: |
| 2616 | recv_perm = TCP_SOCKET__RECV_MSG; | 2626 | recv_perm = TCP_SOCKET__RECVFROM; |
| 2617 | break; | 2627 | break; |
| 2618 | default: | 2628 | default: |
| 2619 | recv_perm = RAWIP_SOCKET__RECV_MSG; | 2629 | recv_perm = RAWIP_SOCKET__RECVFROM; |
| 2620 | } | 2630 | } |
| 2621 | 2631 | ||
| 2622 | rc = avc_has_perm(sksec->sid, | 2632 | rc = avc_has_perm(sksec->sid, |
