1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29#include <linux/spinlock.h>
30#include <linux/rcupdate.h>
31#include <linux/gfp.h>
32#include <linux/ip.h>
33#include <linux/ipv6.h>
34#include <net/sock.h>
35#include <net/netlabel.h>
36#include <net/ip.h>
37#include <net/ipv6.h>
38
39#include "objsec.h"
40#include "security.h"
41#include "netlabel.h"
42
43
44
45
46
47
48
49
50
51
52
53
54
55static int selinux_netlbl_sidlookup_cached(struct sk_buff *skb,
56 u16 family,
57 struct netlbl_lsm_secattr *secattr,
58 u32 *sid)
59{
60 int rc;
61
62 rc = security_netlbl_secattr_to_sid(&selinux_state, secattr, sid);
63 if (rc == 0 &&
64 (secattr->flags & NETLBL_SECATTR_CACHEABLE) &&
65 (secattr->flags & NETLBL_SECATTR_CACHE))
66 netlbl_cache_add(skb, family, secattr);
67
68 return rc;
69}
70
71
72
73
74
75
76
77
78
79
80
81static struct netlbl_lsm_secattr *selinux_netlbl_sock_genattr(struct sock *sk)
82{
83 int rc;
84 struct sk_security_struct *sksec = sk->sk_security;
85 struct netlbl_lsm_secattr *secattr;
86
87 if (sksec->nlbl_secattr != NULL)
88 return sksec->nlbl_secattr;
89
90 secattr = netlbl_secattr_alloc(GFP_ATOMIC);
91 if (secattr == NULL)
92 return NULL;
93 rc = security_netlbl_sid_to_secattr(&selinux_state, sksec->sid,
94 secattr);
95 if (rc != 0) {
96 netlbl_secattr_free(secattr);
97 return NULL;
98 }
99 sksec->nlbl_secattr = secattr;
100
101 return secattr;
102}
103
104
105
106
107
108
109
110
111
112
113static struct netlbl_lsm_secattr *selinux_netlbl_sock_getattr(
114 const struct sock *sk,
115 u32 sid)
116{
117 struct sk_security_struct *sksec = sk->sk_security;
118 struct netlbl_lsm_secattr *secattr = sksec->nlbl_secattr;
119
120 if (secattr == NULL)
121 return NULL;
122
123 if ((secattr->flags & NETLBL_SECATTR_SECID) &&
124 (secattr->attr.secid == sid))
125 return secattr;
126
127 return NULL;
128}
129
130
131
132
133
134
135
136
137void selinux_netlbl_cache_invalidate(void)
138{
139 netlbl_cache_invalidate();
140}
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error, int gateway)
156{
157 netlbl_skbuff_err(skb, family, error, gateway);
158}
159
160
161
162
163
164
165
166
167
168void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec)
169{
170 if (sksec->nlbl_secattr != NULL)
171 netlbl_secattr_free(sksec->nlbl_secattr);
172}
173
174
175
176
177
178
179
180
181
182
183
184void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec)
185{
186 sksec->nlbl_state = NLBL_UNSET;
187}
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
203 u16 family,
204 u32 *type,
205 u32 *sid)
206{
207 int rc;
208 struct netlbl_lsm_secattr secattr;
209
210 if (!netlbl_enabled()) {
211 *sid = SECSID_NULL;
212 return 0;
213 }
214
215 netlbl_secattr_init(&secattr);
216 rc = netlbl_skbuff_getattr(skb, family, &secattr);
217 if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
218 rc = selinux_netlbl_sidlookup_cached(skb, family,
219 &secattr, sid);
220 else
221 *sid = SECSID_NULL;
222 *type = secattr.type;
223 netlbl_secattr_destroy(&secattr);
224
225 return rc;
226}
227
228
229
230
231
232
233
234
235
236
237
238
239int selinux_netlbl_skbuff_setsid(struct sk_buff *skb,
240 u16 family,
241 u32 sid)
242{
243 int rc;
244 struct netlbl_lsm_secattr secattr_storage;
245 struct netlbl_lsm_secattr *secattr = NULL;
246 struct sock *sk;
247
248
249
250 sk = skb_to_full_sk(skb);
251 if (sk != NULL) {
252 struct sk_security_struct *sksec = sk->sk_security;
253
254 if (sksec->nlbl_state != NLBL_REQSKB)
255 return 0;
256 secattr = selinux_netlbl_sock_getattr(sk, sid);
257 }
258 if (secattr == NULL) {
259 secattr = &secattr_storage;
260 netlbl_secattr_init(secattr);
261 rc = security_netlbl_sid_to_secattr(&selinux_state, sid,
262 secattr);
263 if (rc != 0)
264 goto skbuff_setsid_return;
265 }
266
267 rc = netlbl_skbuff_setattr(skb, family, secattr);
268
269skbuff_setsid_return:
270 if (secattr == &secattr_storage)
271 netlbl_secattr_destroy(secattr);
272 return rc;
273}
274
275
276
277
278
279
280
281
282
283
284
285int selinux_netlbl_sctp_assoc_request(struct sctp_endpoint *ep,
286 struct sk_buff *skb)
287{
288 int rc;
289 struct netlbl_lsm_secattr secattr;
290 struct sk_security_struct *sksec = ep->base.sk->sk_security;
291 struct sockaddr_in addr4;
292 struct sockaddr_in6 addr6;
293
294 if (ep->base.sk->sk_family != PF_INET &&
295 ep->base.sk->sk_family != PF_INET6)
296 return 0;
297
298 netlbl_secattr_init(&secattr);
299 rc = security_netlbl_sid_to_secattr(&selinux_state,
300 ep->secid, &secattr);
301 if (rc != 0)
302 goto assoc_request_return;
303
304
305
306
307 if (ip_hdr(skb)->version == 4) {
308 addr4.sin_family = AF_INET;
309 addr4.sin_addr.s_addr = ip_hdr(skb)->saddr;
310 rc = netlbl_conn_setattr(ep->base.sk, (void *)&addr4, &secattr);
311 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) {
312 addr6.sin6_family = AF_INET6;
313 addr6.sin6_addr = ipv6_hdr(skb)->saddr;
314 rc = netlbl_conn_setattr(ep->base.sk, (void *)&addr6, &secattr);
315 } else {
316 rc = -EAFNOSUPPORT;
317 }
318
319 if (rc == 0)
320 sksec->nlbl_state = NLBL_LABELED;
321
322assoc_request_return:
323 netlbl_secattr_destroy(&secattr);
324 return rc;
325}
326
327
328
329
330
331
332
333
334
335
336
337
338int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family)
339{
340 int rc;
341 struct netlbl_lsm_secattr secattr;
342
343 if (family != PF_INET && family != PF_INET6)
344 return 0;
345
346 netlbl_secattr_init(&secattr);
347 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid,
348 &secattr);
349 if (rc != 0)
350 goto inet_conn_request_return;
351 rc = netlbl_req_setattr(req, &secattr);
352inet_conn_request_return:
353 netlbl_secattr_destroy(&secattr);
354 return rc;
355}
356
357
358
359
360
361
362
363
364
365
366
367void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family)
368{
369 struct sk_security_struct *sksec = sk->sk_security;
370
371 if (family == PF_INET)
372 sksec->nlbl_state = NLBL_LABELED;
373 else
374 sksec->nlbl_state = NLBL_UNSET;
375}
376
377
378
379
380
381
382
383
384
385void selinux_netlbl_sctp_sk_clone(struct sock *sk, struct sock *newsk)
386{
387 struct sk_security_struct *sksec = sk->sk_security;
388 struct sk_security_struct *newsksec = newsk->sk_security;
389
390 newsksec->nlbl_state = sksec->nlbl_state;
391}
392
393
394
395
396
397
398
399
400
401
402
403int selinux_netlbl_socket_post_create(struct sock *sk, u16 family)
404{
405 int rc;
406 struct sk_security_struct *sksec = sk->sk_security;
407 struct netlbl_lsm_secattr *secattr;
408
409 if (family != PF_INET && family != PF_INET6)
410 return 0;
411
412 secattr = selinux_netlbl_sock_genattr(sk);
413 if (secattr == NULL)
414 return -ENOMEM;
415 rc = netlbl_sock_setattr(sk, family, secattr);
416 switch (rc) {
417 case 0:
418 sksec->nlbl_state = NLBL_LABELED;
419 break;
420 case -EDESTADDRREQ:
421 sksec->nlbl_state = NLBL_REQSKB;
422 rc = 0;
423 break;
424 }
425
426 return rc;
427}
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
443 struct sk_buff *skb,
444 u16 family,
445 struct common_audit_data *ad)
446{
447 int rc;
448 u32 nlbl_sid;
449 u32 perm;
450 struct netlbl_lsm_secattr secattr;
451
452 if (!netlbl_enabled())
453 return 0;
454
455 netlbl_secattr_init(&secattr);
456 rc = netlbl_skbuff_getattr(skb, family, &secattr);
457 if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
458 rc = selinux_netlbl_sidlookup_cached(skb, family,
459 &secattr, &nlbl_sid);
460 else
461 nlbl_sid = SECINITSID_UNLABELED;
462 netlbl_secattr_destroy(&secattr);
463 if (rc != 0)
464 return rc;
465
466 switch (sksec->sclass) {
467 case SECCLASS_UDP_SOCKET:
468 perm = UDP_SOCKET__RECVFROM;
469 break;
470 case SECCLASS_TCP_SOCKET:
471 perm = TCP_SOCKET__RECVFROM;
472 break;
473 default:
474 perm = RAWIP_SOCKET__RECVFROM;
475 }
476
477 rc = avc_has_perm(&selinux_state,
478 sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
479 if (rc == 0)
480 return 0;
481
482 if (nlbl_sid != SECINITSID_UNLABELED)
483 netlbl_skbuff_err(skb, family, rc, 0);
484 return rc;
485}
486
487
488
489
490
491
492
493
494
495
496static inline int selinux_netlbl_option(int level, int optname)
497{
498 return (level == IPPROTO_IP && optname == IP_OPTIONS) ||
499 (level == IPPROTO_IPV6 && optname == IPV6_HOPOPTS);
500}
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515int selinux_netlbl_socket_setsockopt(struct socket *sock,
516 int level,
517 int optname)
518{
519 int rc = 0;
520 struct sock *sk = sock->sk;
521 struct sk_security_struct *sksec = sk->sk_security;
522 struct netlbl_lsm_secattr secattr;
523
524 if (selinux_netlbl_option(level, optname) &&
525 (sksec->nlbl_state == NLBL_LABELED ||
526 sksec->nlbl_state == NLBL_CONNLABELED)) {
527 netlbl_secattr_init(&secattr);
528 lock_sock(sk);
529
530
531
532 rc = netlbl_sock_getattr(sk, &secattr);
533 release_sock(sk);
534 if (rc == 0)
535 rc = -EACCES;
536 else if (rc == -ENOMSG)
537 rc = 0;
538 netlbl_secattr_destroy(&secattr);
539 }
540
541 return rc;
542}
543
544
545
546
547
548
549
550
551
552
553
554
555static int selinux_netlbl_socket_connect_helper(struct sock *sk,
556 struct sockaddr *addr)
557{
558 int rc;
559 struct sk_security_struct *sksec = sk->sk_security;
560 struct netlbl_lsm_secattr *secattr;
561
562
563
564
565 if (addr->sa_family == AF_UNSPEC) {
566 netlbl_sock_delattr(sk);
567 sksec->nlbl_state = NLBL_REQSKB;
568 rc = 0;
569 return rc;
570 }
571 secattr = selinux_netlbl_sock_genattr(sk);
572 if (secattr == NULL) {
573 rc = -ENOMEM;
574 return rc;
575 }
576 rc = netlbl_conn_setattr(sk, addr, secattr);
577 if (rc == 0)
578 sksec->nlbl_state = NLBL_CONNLABELED;
579
580 return rc;
581}
582
583
584
585
586
587
588
589
590
591
592
593
594
595int selinux_netlbl_socket_connect_locked(struct sock *sk,
596 struct sockaddr *addr)
597{
598 struct sk_security_struct *sksec = sk->sk_security;
599
600 if (sksec->nlbl_state != NLBL_REQSKB &&
601 sksec->nlbl_state != NLBL_CONNLABELED)
602 return 0;
603
604 return selinux_netlbl_socket_connect_helper(sk, addr);
605}
606
607
608
609
610
611
612
613
614
615
616
617int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr)
618{
619 int rc;
620
621 lock_sock(sk);
622 rc = selinux_netlbl_socket_connect_locked(sk, addr);
623 release_sock(sk);
624
625 return rc;
626}
627