netlabel.c 8.4 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
/*
 * SELinux NetLabel Support
 *
 * This file provides the necessary glue to tie NetLabel into the SELinux
 * subsystem.
 *
 * Author: Paul Moore <paul.moore@hp.com>
 *
 */

/*
 * (c) Copyright Hewlett-Packard Development Company, L.P., 2007
 *
 * This program is free software;  you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY;  without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 * the GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program;  if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 *
 */

#include <linux/spinlock.h>
#include <linux/rcupdate.h>
#include <net/sock.h>
#include <net/netlabel.h>

#include "objsec.h"
#include "security.h"
37
#include "netlabel.h"
38

39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65
/**
 * selinux_netlbl_sidlookup_cached - Cache a SID lookup
 * @skb: the packet
 * @secattr: the NetLabel security attributes
 * @sid: the SID
 *
 * Description:
 * Query the SELinux security server to lookup the correct SID for the given
 * security attributes.  If the query is successful, cache the result to speed
 * up future lookups.  Returns zero on success, negative values on failure.
 *
 */
static int selinux_netlbl_sidlookup_cached(struct sk_buff *skb,
					   struct netlbl_lsm_secattr *secattr,
					   u32 *sid)
{
	int rc;

	rc = security_netlbl_secattr_to_sid(secattr, sid);
	if (rc == 0 &&
	    (secattr->flags & NETLBL_SECATTR_CACHEABLE) &&
	    (secattr->flags & NETLBL_SECATTR_CACHE))
		netlbl_cache_add(skb, secattr);

	return rc;
}

66
/**
67 68
 * selinux_netlbl_sock_setsid - Label a socket using the NetLabel mechanism
 * @sk: the socket to label
69 70
 *
 * Description:
71 72
 * Attempt to label a socket using the NetLabel mechanism.  Returns zero values
 * on success, negative values on failure.
73 74
 *
 */
75
static int selinux_netlbl_sock_setsid(struct sock *sk)
76 77
{
	int rc;
78
	struct sk_security_struct *sksec = sk->sk_security;
79 80
	struct netlbl_lsm_secattr secattr;

81 82 83
	if (sksec->nlbl_state != NLBL_REQUIRE)
		return 0;

84 85
	netlbl_secattr_init(&secattr);

86
	rc = security_netlbl_sid_to_secattr(sksec->sid, &secattr);
87
	if (rc != 0)
88
		goto sock_setsid_return;
89
	rc = netlbl_sock_setattr(sk, &secattr);
90
	if (rc == 0)
91 92
		sksec->nlbl_state = NLBL_LABELED;

93 94
sock_setsid_return:
	netlbl_secattr_destroy(&secattr);
95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122
	return rc;
}

/**
 * selinux_netlbl_cache_invalidate - Invalidate the NetLabel cache
 *
 * Description:
 * Invalidate the NetLabel security attribute mapping cache.
 *
 */
void selinux_netlbl_cache_invalidate(void)
{
	netlbl_cache_invalidate();
}

/**
 * selinux_netlbl_sk_security_reset - Reset the NetLabel fields
 * @ssec: the sk_security_struct
 * @family: the socket family
 *
 * Description:
 * Called when the NetLabel state of a sk_security_struct needs to be reset.
 * The caller is responsibile for all the NetLabel sk_security_struct locking.
 *
 */
void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
				      int family)
{
123
	if (family == PF_INET)
124 125 126 127 128 129 130 131
		ssec->nlbl_state = NLBL_REQUIRE;
	else
		ssec->nlbl_state = NLBL_UNSET;
}

/**
 * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel
 * @skb: the packet
132
 * @family: protocol family
133
 * @type: NetLabel labeling protocol type
134 135 136 137 138 139 140 141
 * @sid: the SID
 *
 * Description:
 * Call the NetLabel mechanism to get the security attributes of the given
 * packet and use those attributes to determine the correct context/SID to
 * assign to the packet.  Returns zero on success, negative values on failure.
 *
 */
142 143
int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
				 u16 family,
144
				 u32 *type,
145
				 u32 *sid)
146 147 148 149
{
	int rc;
	struct netlbl_lsm_secattr secattr;

150 151 152 153 154
	if (!netlbl_enabled()) {
		*sid = SECSID_NULL;
		return 0;
	}

155
	netlbl_secattr_init(&secattr);
156
	rc = netlbl_skbuff_getattr(skb, family, &secattr);
157 158 159
	if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
		rc = selinux_netlbl_sidlookup_cached(skb, &secattr, sid);
	else
160
		*sid = SECSID_NULL;
161
	*type = secattr.type;
162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181
	netlbl_secattr_destroy(&secattr);

	return rc;
}

/**
 * selinux_netlbl_sock_graft - Netlabel the new socket
 * @sk: the new connection
 * @sock: the new socket
 *
 * Description:
 * The connection represented by @sk is being grafted onto @sock so set the
 * socket's NetLabel to match the SID of @sk.
 *
 */
void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock)
{
	/* Try to set the NetLabel on the socket to save time later, if we fail
	 * here we will pick up the pieces in later calls to
	 * selinux_netlbl_inode_permission(). */
182
	selinux_netlbl_sock_setsid(sk);
183 184 185 186 187 188 189 190 191 192 193 194 195
}

/**
 * selinux_netlbl_socket_post_create - Label a socket using NetLabel
 * @sock: the socket to label
 *
 * Description:
 * Attempt to label a socket using the NetLabel mechanism using the given
 * SID.  Returns zero values on success, negative values on failure.
 *
 */
int selinux_netlbl_socket_post_create(struct socket *sock)
{
196
	return selinux_netlbl_sock_setsid(sock->sk);
197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213
}

/**
 * selinux_netlbl_inode_permission - Verify the socket is NetLabel labeled
 * @inode: the file descriptor's inode
 * @mask: the permission mask
 *
 * Description:
 * Looks at a file's inode and if it is marked as a socket protected by
 * NetLabel then verify that the socket has been labeled, if not try to label
 * the socket now with the inode's SID.  Returns zero on success, negative
 * values on failure.
 *
 */
int selinux_netlbl_inode_permission(struct inode *inode, int mask)
{
	int rc;
214
	struct sock *sk;
215
	struct socket *sock;
216
	struct sk_security_struct *sksec;
217 218 219 220

	if (!S_ISSOCK(inode->i_mode) ||
	    ((mask & (MAY_WRITE | MAY_APPEND)) == 0))
		return 0;
221

222
	sock = SOCKET_I(inode);
223 224
	sk = sock->sk;
	sksec = sk->sk_security;
225
	if (sksec->nlbl_state != NLBL_REQUIRE)
226
		return 0;
227

228
	local_bh_disable();
229
	bh_lock_sock_nested(sk);
230
	if (likely(sksec->nlbl_state == NLBL_REQUIRE))
231
		rc = selinux_netlbl_sock_setsid(sk);
232 233
	else
		rc = 0;
234
	bh_unlock_sock(sk);
235 236 237 238 239 240 241 242 243
	local_bh_enable();

	return rc;
}

/**
 * selinux_netlbl_sock_rcv_skb - Do an inbound access check using NetLabel
 * @sksec: the sock's sk_security_struct
 * @skb: the packet
244
 * @family: protocol family
245 246 247 248 249 250 251 252 253 254
 * @ad: the audit data
 *
 * Description:
 * Fetch the NetLabel security attributes from @skb and perform an access check
 * against the receiving socket.  Returns zero on success, negative values on
 * error.
 *
 */
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
				struct sk_buff *skb,
255
				u16 family,
256 257 258
				struct avc_audit_data *ad)
{
	int rc;
259 260 261
	u32 nlbl_sid;
	u32 perm;
	struct netlbl_lsm_secattr secattr;
262

263 264 265
	if (!netlbl_enabled())
		return 0;

266
	netlbl_secattr_init(&secattr);
267
	rc = netlbl_skbuff_getattr(skb, family, &secattr);
268 269 270
	if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
		rc = selinux_netlbl_sidlookup_cached(skb, &secattr, &nlbl_sid);
	else
271 272
		nlbl_sid = SECINITSID_UNLABELED;
	netlbl_secattr_destroy(&secattr);
273 274
	if (rc != 0)
		return rc;
275

276 277
	switch (sksec->sclass) {
	case SECCLASS_UDP_SOCKET:
278
		perm = UDP_SOCKET__RECVFROM;
279 280
		break;
	case SECCLASS_TCP_SOCKET:
281
		perm = TCP_SOCKET__RECVFROM;
282 283
		break;
	default:
284
		perm = RAWIP_SOCKET__RECVFROM;
285 286
	}

287
	rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
288 289 290
	if (rc == 0)
		return 0;

291 292
	if (nlbl_sid != SECINITSID_UNLABELED)
		netlbl_skbuff_err(skb, rc);
293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313
	return rc;
}

/**
 * selinux_netlbl_socket_setsockopt - Do not allow users to remove a NetLabel
 * @sock: the socket
 * @level: the socket level or protocol
 * @optname: the socket option name
 *
 * Description:
 * Check the setsockopt() call and if the user is trying to replace the IP
 * options on a socket and a NetLabel is in place for the socket deny the
 * access; otherwise allow the access.  Returns zero when the access is
 * allowed, -EACCES when denied, and other negative values on error.
 *
 */
int selinux_netlbl_socket_setsockopt(struct socket *sock,
				     int level,
				     int optname)
{
	int rc = 0;
314 315
	struct sock *sk = sock->sk;
	struct sk_security_struct *sksec = sk->sk_security;
316 317 318 319 320
	struct netlbl_lsm_secattr secattr;

	if (level == IPPROTO_IP && optname == IP_OPTIONS &&
	    sksec->nlbl_state == NLBL_LABELED) {
		netlbl_secattr_init(&secattr);
321 322 323
		lock_sock(sk);
		rc = netlbl_sock_getattr(sk, &secattr);
		release_sock(sk);
324 325 326 327 328 329 330
		if (rc == 0 && secattr.flags != NETLBL_SECATTR_NONE)
			rc = -EACCES;
		netlbl_secattr_destroy(&secattr);
	}

	return rc;
}