From: Greg KH <gregkh@suse.de>
To: linux-kernel@vger.kernel.org, stable@kernel.org,
linux-security-module@vger.kernel.org
Cc: Justin Forbes <jmforbes@linuxtx.org>,
Zwane Mwaikambo <zwane@arm.linux.org.uk>,
"Theodore Ts'o" <tytso@mit.edu>,
Randy Dunlap <rdunlap@xenotime.net>,
Dave Jones <davej@redhat.com>,
Chuck Wolber <chuckw@quantumlinux.com>,
Chris Wedgwood <reviews@ml.cw.f00f.org>,
Michael Krufky <mkrufky@linuxtv.org>,
Chuck Ebbert <cebbert@redhat.com>,
Domenico Andreoli <cavokz@gmail.com>, Willy Tarreau <w@1wt.eu>,
Rodrigo Rubira Branco <rbranco@la.checkpoint.com>,
Jake Edge <jake@lwn.net>, Eugene Teo <eteo@redhat.com>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
alan@lxorguk.ukuu.org.uk, Paul Moore <paul.moore@hp.com>
Subject: [patch 20/51] selinux: Add new NetLabel glue code to handle labeling of connection requests
Date: Thu, 14 May 2009 15:32:55 -0700 [thread overview]
Message-ID: <20090514223523.529046126@mini.kroah.org> (raw)
In-Reply-To: <20090514223755.GA27019@kroah.com>
[-- Attachment #1: selinux-add-new-netlabel-glue-code-to-handle-labeling-of-connection-requests.patch --]
[-- Type: text/plain, Size: 7317 bytes --]
2.6.29-stable review patch. If anyone has any objections, please let us know.
------------------
From: Paul Moore <paul.moore@hp.com>
[NOTE: based on 389fb800ac8be2832efedd19978a2b8ced37eb61]
This patch provides the missing functions to properly handle the labeling of
responses to incoming connection requests within SELinux.
Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
---
security/selinux/hooks.c | 4 -
security/selinux/include/netlabel.h | 17 +++--
security/selinux/netlabel.c | 118 ++++++++++++++++++------------------
3 files changed, 72 insertions(+), 67 deletions(-)
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3799,7 +3799,7 @@ static int selinux_socket_post_create(st
sksec = sock->sk->sk_security;
sksec->sid = isec->sid;
sksec->sclass = isec->sclass;
- err = selinux_netlbl_socket_post_create(sock);
+ err = selinux_netlbl_socket_post_create(sock->sk, family);
}
return err;
@@ -4467,8 +4467,6 @@ static void selinux_inet_conn_establishe
family = PF_INET;
selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid);
-
- selinux_netlbl_inet_conn_established(sk, family);
}
static void selinux_req_classify_flow(const struct request_sock *req,
--- a/security/selinux/include/netlabel.h
+++ b/security/selinux/include/netlabel.h
@@ -32,6 +32,7 @@
#include <linux/net.h>
#include <linux/skbuff.h>
#include <net/sock.h>
+#include <net/request_sock.h>
#include "avc.h"
#include "objsec.h"
@@ -53,8 +54,9 @@ int selinux_netlbl_skbuff_setsid(struct
u16 family,
u32 sid);
-void selinux_netlbl_inet_conn_established(struct sock *sk, u16 family);
-int selinux_netlbl_socket_post_create(struct socket *sock);
+int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
+void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family);
+int selinux_netlbl_socket_post_create(struct sock *sk, u16 family);
int selinux_netlbl_inode_permission(struct inode *inode, int mask);
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
struct sk_buff *skb,
@@ -113,12 +115,17 @@ static inline int selinux_netlbl_conn_se
return 0;
}
-static inline void selinux_netlbl_inet_conn_established(struct sock *sk,
- u16 family)
+static inline int selinux_netlbl_inet_conn_request(struct request_sock *req,
+ u16 family)
+{
+ return 0;
+}
+static inline void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family)
{
return;
}
-static inline int selinux_netlbl_socket_post_create(struct socket *sock)
+static inline int selinux_netlbl_socket_post_create(struct sock *sk,
+ u16 family)
{
return 0;
}
--- a/security/selinux/netlabel.c
+++ b/security/selinux/netlabel.c
@@ -281,73 +281,52 @@ skbuff_setsid_return:
}
/**
- * selinux_netlbl_inet_conn_established - Netlabel the newly accepted connection
- * @sk: the new connection
+ * selinux_netlbl_inet_conn_request - Label an incoming stream connection
+ * @req: incoming connection request socket
*
* Description:
- * A new connection has been established on @sk so make sure it is labeled
- * correctly with the NetLabel susbsystem.
+ * A new incoming connection request is represented by @req, we need to label
+ * the new request_sock here and the stack will ensure the on-the-wire label
+ * will get preserved when a full sock is created once the connection handshake
+ * is complete. Returns zero on success, negative values on failure.
*
*/
-void selinux_netlbl_inet_conn_established(struct sock *sk, u16 family)
+int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family)
{
int rc;
- struct sk_security_struct *sksec = sk->sk_security;
- struct netlbl_lsm_secattr *secattr;
- struct inet_sock *sk_inet = inet_sk(sk);
- struct sockaddr_in addr;
+ struct netlbl_lsm_secattr secattr;
- if (sksec->nlbl_state != NLBL_REQUIRE)
- return;
+ if (family != PF_INET)
+ return 0;
- secattr = selinux_netlbl_sock_genattr(sk);
- if (secattr == NULL)
- return;
+ netlbl_secattr_init(&secattr);
+ rc = security_netlbl_sid_to_secattr(req->secid, &secattr);
+ if (rc != 0)
+ goto inet_conn_request_return;
+ rc = netlbl_req_setattr(req, &secattr);
+inet_conn_request_return:
+ netlbl_secattr_destroy(&secattr);
+ return rc;
+}
- rc = netlbl_sock_setattr(sk, secattr);
- switch (rc) {
- case 0:
+/**
+ * selinux_netlbl_inet_csk_clone - Initialize the newly created sock
+ * @sk: the new sock
+ *
+ * Description:
+ * A new connection has been established using @sk, we've already labeled the
+ * socket via the request_sock struct in selinux_netlbl_inet_conn_request() but
+ * we need to set the NetLabel state here since we now have a sock structure.
+ *
+ */
+void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family)
+{
+ struct sk_security_struct *sksec = sk->sk_security;
+
+ if (family == PF_INET)
sksec->nlbl_state = NLBL_LABELED;
- break;
- case -EDESTADDRREQ:
- /* no PF_INET6 support yet because we don't support any IPv6
- * labeling protocols */
- if (family != PF_INET) {
- sksec->nlbl_state = NLBL_UNSET;
- return;
- }
-
- addr.sin_family = family;
- addr.sin_addr.s_addr = sk_inet->daddr;
- if (netlbl_conn_setattr(sk, (struct sockaddr *)&addr,
- secattr) != 0) {
- /* we failed to label the connected socket (could be
- * for a variety of reasons, the actual "why" isn't
- * important here) so we have to go to our backup plan,
- * labeling the packets individually in the netfilter
- * local output hook. this is okay but we need to
- * adjust the MSS of the connection to take into
- * account any labeling overhead, since we don't know
- * the exact overhead at this point we'll use the worst
- * case value which is 40 bytes for IPv4 */
- struct inet_connection_sock *sk_conn = inet_csk(sk);
- sk_conn->icsk_ext_hdr_len += 40 -
- (sk_inet->opt ? sk_inet->opt->optlen : 0);
- sk_conn->icsk_sync_mss(sk, sk_conn->icsk_pmtu_cookie);
-
- sksec->nlbl_state = NLBL_REQSKB;
- } else
- sksec->nlbl_state = NLBL_CONNLABELED;
- break;
- default:
- /* note that we are failing to label the socket which could be
- * a bad thing since it means traffic could leave the system
- * without the desired labeling, however, all is not lost as
- * we have a check in selinux_netlbl_inode_permission() to
- * pick up the pieces that we might drop here because we can't
- * return an error code */
- break;
- }
+ else
+ sksec->nlbl_state = NLBL_UNSET;
}
/**
@@ -359,9 +338,30 @@ void selinux_netlbl_inet_conn_establishe
* SID. Returns zero values on success, negative values on failure.
*
*/
-int selinux_netlbl_socket_post_create(struct socket *sock)
+int selinux_netlbl_socket_post_create(struct sock *sk, u16 family)
{
- return selinux_netlbl_sock_setsid(sock->sk);
+ int rc;
+ struct sk_security_struct *sksec = sk->sk_security;
+ struct netlbl_lsm_secattr *secattr;
+
+ if (family != PF_INET)
+ return 0;
+
+ secattr = selinux_netlbl_sock_genattr(sk);
+ if (secattr == NULL)
+ return -ENOMEM;
+ rc = netlbl_sock_setattr(sk, secattr);
+ switch (rc) {
+ case 0:
+ sksec->nlbl_state = NLBL_LABELED;
+ break;
+ case -EDESTADDRREQ:
+ sksec->nlbl_state = NLBL_REQSKB;
+ rc = 0;
+ break;
+ }
+
+ return rc;
}
/**
next prev parent reply other threads:[~2009-05-14 22:48 UTC|newest]
Thread overview: 60+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20090514223235.348540705@mini.kroah.org>
2009-05-14 22:37 ` [patch 00/51] 2.6.29-stable review Greg KH
2009-05-14 22:32 ` [patch 01/51] fiemap: fix problem with setting FIEMAP_EXTENT_LAST Greg KH
2009-05-14 22:32 ` [patch 02/51] md: remove ability to explicit set an inactive array to clean Greg KH
2009-05-14 22:32 ` [patch 03/51] md: fix some (more) errors with bitmaps on devices larger than 2TB Greg KH
2009-05-14 22:32 ` [patch 04/51] md/raid10: dont clear bitmap during recovery if array will still be degraded Greg KH
2009-05-14 22:32 ` [patch 05/51] md: fix loading of out-of-date bitmap Greg KH
2009-05-14 22:32 ` [patch 06/51] usb-serial: ftdi_sio: fix reference counting of ftdi_private Greg KH
2009-05-18 12:46 ` David Woodhouse
2009-05-18 23:33 ` [stable] " Greg KH
2009-05-14 22:32 ` [patch 07/51] USB: Gadget: fix UTF conversion in the usbstring library Greg KH
2009-05-14 22:32 ` [patch 08/51] ALSA: hda - Fix line-in on Mac Mini Core2 Duo Greg KH
2009-05-14 22:32 ` [patch 09/51] ASoC: Fix errors in WM8990 Greg KH
2009-05-14 22:32 ` [patch 10/51] e1000: fix virtualization bug Greg KH
2009-05-14 22:32 ` [patch 11/51] hwmon: (w83781d) Fix W83782D support (NULL pointer dereference) Greg KH
2009-05-14 22:32 ` [patch 12/51] Fix for enabling branch profiling makes sparse unusable Greg KH
2009-05-14 22:32 ` [patch 13/51] i2c-algo-bit: Fix timeout test Greg KH
2009-05-14 22:32 ` [patch 14/51] i2c-algo-pca: Let PCA9564 recover from unacked data byte (state 0x30) Greg KH
2009-05-14 22:32 ` [patch 15/51] dup2: Fix return value with oldfd == newfd and invalid fd Greg KH
2009-05-14 22:32 ` [patch 16/51] ne2k-pci: Do not register device until initialized Greg KH
2009-05-14 22:32 ` [patch 17/51] lsm: Relocate the IPv4 security_inet_conn_request() hooks Greg KH
2009-05-14 22:32 ` [patch 18/51] netlabel: Add CIPSO {set, del}attr request_sock functions Greg KH
2009-05-14 22:32 ` [patch 19/51] netlabel: Add new NetLabel KAPI interfaces for request_sock security attributes Greg KH
2009-05-14 22:32 ` Greg KH [this message]
2009-05-14 22:32 ` [patch 21/51] selinux: Set the proper NetLabel security attributes for connection requests Greg KH
2009-05-14 22:32 ` [patch 22/51] selinux: Remove dead code labeled networking code Greg KH
2009-05-14 22:32 ` [patch 23/51] smack: Set the proper NetLabel security attributes for connection requests Greg KH
2009-05-14 22:32 ` [patch 24/51] cifs: Fix buffer size for tcon->nativeFileSystem field Greg KH
2009-05-14 22:33 ` [patch 25/51] cifs: Increase size of tmp_buf in cifs_readdir to avoid potential overflows Greg KH
2009-05-14 22:33 ` [patch 26/51] cifs: Fix incorrect destination buffer size in cifs_strncpy_to_host Greg KH
2009-05-14 22:33 ` [patch 27/51] cifs: Fix buffer size in cifs_convertUCSpath Greg KH
2009-05-14 22:33 ` [patch 28/51] cifs: Fix unicode string area word alignment in session setup Greg KH
2009-05-14 22:33 ` [patch 29/51] mac80211: pid, fix memory corruption Greg KH
2009-05-15 6:23 ` Jiri Slaby
2009-05-15 14:49 ` Greg KH
2009-05-15 15:09 ` Jiri Slaby
2009-05-18 23:33 ` [stable] " Greg KH
2009-05-15 21:49 ` Jiri Slaby
2009-06-09 8:18 ` [stable] " Greg KH
2009-05-14 22:33 ` [patch 30/51] mm: page_mkwrite change prototype to match fault Greg KH
2009-05-14 22:33 ` [patch 31/51] fs: fix page_mkwrite error cases in core code and btrfs Greg KH
2009-05-14 22:33 ` [patch 32/51] mm: close page_mkwrite races Greg KH
2009-05-14 22:33 ` [patch 33/51] GFS2: Fix page_mkwrite() return code Greg KH
2009-05-14 22:33 ` [patch 34/51] NFS: Fix the return value in nfs_page_mkwrite() Greg KH
2009-05-14 22:33 ` [patch 35/51] NFS: Close page_mkwrite() races Greg KH
2009-05-14 22:33 ` [patch 36/51] CIFS: Fix endian conversion of vcnum field Greg KH
2009-05-14 22:33 ` [patch 37/51] epoll: fix size check in epoll_create() Greg KH
2009-05-14 22:33 ` [patch 38/51] nfsd4: check for negative dentry before use in nfsv4 readdir Greg KH
2009-05-14 22:33 ` [patch 39/51] NFS: Fix the notifications when renaming onto an existing file Greg KH
2009-05-14 22:33 ` [patch 40/51] lockd: fix list corruption on lockd restart Greg KH
2009-05-14 22:33 ` [patch 41/51] dmatest: fix max channels handling Greg KH
2009-05-14 22:33 ` [patch 42/51] HID: add NOGET quirk for devices from CH Products Greg KH
2009-05-14 22:33 ` [patch 43/51] KVM: SVM: Remove port 80 passthrough Greg KH
2009-05-14 22:33 ` [patch 44/51] KVM: Make EFER reads safe when EFER does not exist Greg KH
2009-05-14 22:33 ` [patch 45/51] fuse: destroy bdi on error Greg KH
2009-05-14 22:33 ` [patch 46/51] splice: split up __splice_from_pipe() Greg KH
2009-05-14 22:33 ` [patch 47/51] splice: remove i_mutex locking in splice_from_pipe() Greg KH
2009-05-14 22:33 ` [patch 48/51] splice: fix i_mutex locking in generic_splice_write() Greg KH
2009-05-14 22:33 ` [patch 49/51] ocfs2: fix i_mutex locking in ocfs2_splice_to_file() Greg KH
2009-05-14 22:33 ` [patch 50/51] ehea: fix invalid pointer access Greg KH
2009-05-14 22:33 ` [patch 51/51] powerpc/5200: Dont specify IRQF_SHARED in PSC UART driver Greg KH
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090514223523.529046126@mini.kroah.org \
--to=gregkh@suse.de \
--cc=akpm@linux-foundation.org \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=cavokz@gmail.com \
--cc=cebbert@redhat.com \
--cc=chuckw@quantumlinux.com \
--cc=davej@redhat.com \
--cc=eteo@redhat.com \
--cc=jake@lwn.net \
--cc=jmforbes@linuxtx.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=mkrufky@linuxtv.org \
--cc=paul.moore@hp.com \
--cc=rbranco@la.checkpoint.com \
--cc=rdunlap@xenotime.net \
--cc=reviews@ml.cw.f00f.org \
--cc=stable@kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=tytso@mit.edu \
--cc=w@1wt.eu \
--cc=zwane@arm.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox