netlabel.c 9.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
/*
 * SELinux NetLabel Support
 *
 * This file provides the necessary glue to tie NetLabel into the SELinux
 * subsystem.
 *
 * Author: Paul Moore <paul.moore@hp.com>
 *
 */

/*
 * (c) Copyright Hewlett-Packard Development Company, L.P., 2007
 *
 * This program is free software;  you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY;  without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 * the GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program;  if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 *
 */

#include <linux/spinlock.h>
#include <linux/rcupdate.h>
#include <net/sock.h>
#include <net/netlabel.h>

#include "objsec.h"
#include "security.h"
37
#include "netlabel.h"
38

39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65
/**
 * selinux_netlbl_sidlookup_cached - Cache a SID lookup
 * @skb: the packet
 * @secattr: the NetLabel security attributes
 * @sid: the SID
 *
 * Description:
 * Query the SELinux security server to lookup the correct SID for the given
 * security attributes.  If the query is successful, cache the result to speed
 * up future lookups.  Returns zero on success, negative values on failure.
 *
 */
static int selinux_netlbl_sidlookup_cached(struct sk_buff *skb,
					   struct netlbl_lsm_secattr *secattr,
					   u32 *sid)
{
	int rc;

	rc = security_netlbl_secattr_to_sid(secattr, sid);
	if (rc == 0 &&
	    (secattr->flags & NETLBL_SECATTR_CACHEABLE) &&
	    (secattr->flags & NETLBL_SECATTR_CACHE))
		netlbl_cache_add(skb, secattr);

	return rc;
}

66
/**
67 68
 * selinux_netlbl_sock_setsid - Label a socket using the NetLabel mechanism
 * @sk: the socket to label
69 70 71 72
 * @sid: the SID to use
 *
 * Description:
 * Attempt to label a socket using the NetLabel mechanism using the given
73
 * SID.  Returns zero values on success, negative values on failure.
74 75
 *
 */
76
static int selinux_netlbl_sock_setsid(struct sock *sk, u32 sid)
77 78
{
	int rc;
79
	struct sk_security_struct *sksec = sk->sk_security;
80 81
	struct netlbl_lsm_secattr secattr;

82 83
	netlbl_secattr_init(&secattr);

84 85
	rc = security_netlbl_sid_to_secattr(sid, &secattr);
	if (rc != 0)
86
		goto sock_setsid_return;
87
	rc = netlbl_sock_setattr(sk, &secattr);
88
	if (rc == 0)
89 90
		sksec->nlbl_state = NLBL_LABELED;

91 92
sock_setsid_return:
	netlbl_secattr_destroy(&secattr);
93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
	return rc;
}

/**
 * selinux_netlbl_cache_invalidate - Invalidate the NetLabel cache
 *
 * Description:
 * Invalidate the NetLabel security attribute mapping cache.
 *
 */
void selinux_netlbl_cache_invalidate(void)
{
	netlbl_cache_invalidate();
}

/**
 * selinux_netlbl_sk_security_reset - Reset the NetLabel fields
 * @ssec: the sk_security_struct
 * @family: the socket family
 *
 * Description:
 * Called when the NetLabel state of a sk_security_struct needs to be reset.
 * The caller is responsibile for all the NetLabel sk_security_struct locking.
 *
 */
void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
				      int family)
{
121
	if (family == PF_INET)
122 123 124 125 126 127 128 129
		ssec->nlbl_state = NLBL_REQUIRE;
	else
		ssec->nlbl_state = NLBL_UNSET;
}

/**
 * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel
 * @skb: the packet
130
 * @family: protocol family
131
 * @type: NetLabel labeling protocol type
132 133 134 135 136 137 138 139
 * @sid: the SID
 *
 * Description:
 * Call the NetLabel mechanism to get the security attributes of the given
 * packet and use those attributes to determine the correct context/SID to
 * assign to the packet.  Returns zero on success, negative values on failure.
 *
 */
140 141
int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
				 u16 family,
142
				 u32 *type,
143
				 u32 *sid)
144 145 146 147
{
	int rc;
	struct netlbl_lsm_secattr secattr;

148 149 150 151 152
	if (!netlbl_enabled()) {
		*sid = SECSID_NULL;
		return 0;
	}

153
	netlbl_secattr_init(&secattr);
154
	rc = netlbl_skbuff_getattr(skb, family, &secattr);
155 156 157
	if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
		rc = selinux_netlbl_sidlookup_cached(skb, &secattr, sid);
	else
158
		*sid = SECSID_NULL;
159
	*type = secattr.type;
160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180
	netlbl_secattr_destroy(&secattr);

	return rc;
}

/**
 * selinux_netlbl_sock_graft - Netlabel the new socket
 * @sk: the new connection
 * @sock: the new socket
 *
 * Description:
 * The connection represented by @sk is being grafted onto @sock so set the
 * socket's NetLabel to match the SID of @sk.
 *
 */
void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock)
{
	struct sk_security_struct *sksec = sk->sk_security;
	struct netlbl_lsm_secattr secattr;
	u32 nlbl_peer_sid;

181
	if (sksec->nlbl_state != NLBL_REQUIRE)
182 183 184 185 186
		return;

	netlbl_secattr_init(&secattr);
	if (netlbl_sock_getattr(sk, &secattr) == 0 &&
	    secattr.flags != NETLBL_SECATTR_NONE &&
187
	    security_netlbl_secattr_to_sid(&secattr, &nlbl_peer_sid) == 0)
188 189 190 191 192 193
		sksec->peer_sid = nlbl_peer_sid;
	netlbl_secattr_destroy(&secattr);

	/* Try to set the NetLabel on the socket to save time later, if we fail
	 * here we will pick up the pieces in later calls to
	 * selinux_netlbl_inode_permission(). */
194
	selinux_netlbl_sock_setsid(sk, sksec->sid);
195 196 197 198 199 200 201 202 203 204 205 206 207
}

/**
 * selinux_netlbl_socket_post_create - Label a socket using NetLabel
 * @sock: the socket to label
 *
 * Description:
 * Attempt to label a socket using the NetLabel mechanism using the given
 * SID.  Returns zero values on success, negative values on failure.
 *
 */
int selinux_netlbl_socket_post_create(struct socket *sock)
{
208 209
	struct sock *sk = sock->sk;
	struct sk_security_struct *sksec = sk->sk_security;
210

211 212
	if (sksec->nlbl_state != NLBL_REQUIRE)
		return 0;
213

214
	return selinux_netlbl_sock_setsid(sk, sksec->sid);
215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231
}

/**
 * selinux_netlbl_inode_permission - Verify the socket is NetLabel labeled
 * @inode: the file descriptor's inode
 * @mask: the permission mask
 *
 * Description:
 * Looks at a file's inode and if it is marked as a socket protected by
 * NetLabel then verify that the socket has been labeled, if not try to label
 * the socket now with the inode's SID.  Returns zero on success, negative
 * values on failure.
 *
 */
int selinux_netlbl_inode_permission(struct inode *inode, int mask)
{
	int rc;
232
	struct sock *sk;
233
	struct socket *sock;
234
	struct sk_security_struct *sksec;
235 236 237 238

	if (!S_ISSOCK(inode->i_mode) ||
	    ((mask & (MAY_WRITE | MAY_APPEND)) == 0))
		return 0;
239

240
	sock = SOCKET_I(inode);
241 242
	sk = sock->sk;
	sksec = sk->sk_security;
243
	if (sksec->nlbl_state != NLBL_REQUIRE)
244
		return 0;
245

246
	local_bh_disable();
247
	bh_lock_sock_nested(sk);
248 249 250 251
	if (likely(sksec->nlbl_state == NLBL_REQUIRE))
		rc = selinux_netlbl_sock_setsid(sk, sksec->sid);
	else
		rc = 0;
252
	bh_unlock_sock(sk);
253 254 255 256 257 258 259 260 261
	local_bh_enable();

	return rc;
}

/**
 * selinux_netlbl_sock_rcv_skb - Do an inbound access check using NetLabel
 * @sksec: the sock's sk_security_struct
 * @skb: the packet
262
 * @family: protocol family
263 264 265 266 267 268 269 270 271 272
 * @ad: the audit data
 *
 * Description:
 * Fetch the NetLabel security attributes from @skb and perform an access check
 * against the receiving socket.  Returns zero on success, negative values on
 * error.
 *
 */
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
				struct sk_buff *skb,
273
				u16 family,
274 275 276
				struct avc_audit_data *ad)
{
	int rc;
277 278 279
	u32 nlbl_sid;
	u32 perm;
	struct netlbl_lsm_secattr secattr;
280

281 282 283
	if (!netlbl_enabled())
		return 0;

284
	netlbl_secattr_init(&secattr);
285
	rc = netlbl_skbuff_getattr(skb, family, &secattr);
286 287 288
	if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
		rc = selinux_netlbl_sidlookup_cached(skb, &secattr, &nlbl_sid);
	else
289 290
		nlbl_sid = SECINITSID_UNLABELED;
	netlbl_secattr_destroy(&secattr);
291 292
	if (rc != 0)
		return rc;
293

294 295
	switch (sksec->sclass) {
	case SECCLASS_UDP_SOCKET:
296
		perm = UDP_SOCKET__RECVFROM;
297 298
		break;
	case SECCLASS_TCP_SOCKET:
299
		perm = TCP_SOCKET__RECVFROM;
300 301
		break;
	default:
302
		perm = RAWIP_SOCKET__RECVFROM;
303 304
	}

305
	rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
306 307 308
	if (rc == 0)
		return 0;

309 310
	if (nlbl_sid != SECINITSID_UNLABELED)
		netlbl_skbuff_err(skb, rc);
311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331
	return rc;
}

/**
 * selinux_netlbl_socket_setsockopt - Do not allow users to remove a NetLabel
 * @sock: the socket
 * @level: the socket level or protocol
 * @optname: the socket option name
 *
 * Description:
 * Check the setsockopt() call and if the user is trying to replace the IP
 * options on a socket and a NetLabel is in place for the socket deny the
 * access; otherwise allow the access.  Returns zero when the access is
 * allowed, -EACCES when denied, and other negative values on error.
 *
 */
int selinux_netlbl_socket_setsockopt(struct socket *sock,
				     int level,
				     int optname)
{
	int rc = 0;
332 333
	struct sock *sk = sock->sk;
	struct sk_security_struct *sksec = sk->sk_security;
334 335 336 337 338
	struct netlbl_lsm_secattr secattr;

	if (level == IPPROTO_IP && optname == IP_OPTIONS &&
	    sksec->nlbl_state == NLBL_LABELED) {
		netlbl_secattr_init(&secattr);
339 340 341
		lock_sock(sk);
		rc = netlbl_sock_getattr(sk, &secattr);
		release_sock(sk);
342 343 344 345 346 347 348
		if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
			rc = -EACCES;
		netlbl_secattr_destroy(&secattr);
	}

	return rc;
}