mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	calipso: Allow request sockets to be relabelled by the lsm.
Request sockets need to have a label that takes into account the incoming connection as well as their parent's label. This is used for the outgoing SYN-ACK and for their child full-socket. Signed-off-by: Huw Davies <huw@codeweavers.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
		
							parent
							
								
									56ac42bc94
								
							
						
					
					
						commit
						e1adea9270
					
				
					 6 changed files with 163 additions and 8 deletions
				
			
		| 
						 | 
					@ -229,6 +229,8 @@ struct netlbl_lsm_secattr {
 | 
				
			||||||
 * @sock_getattr: retrieve the socket's attr
 | 
					 * @sock_getattr: retrieve the socket's attr
 | 
				
			||||||
 * @sock_setattr: set the socket's attr
 | 
					 * @sock_setattr: set the socket's attr
 | 
				
			||||||
 * @sock_delattr: remove the socket's attr
 | 
					 * @sock_delattr: remove the socket's attr
 | 
				
			||||||
 | 
					 * @req_setattr: set the req socket's attr
 | 
				
			||||||
 | 
					 * @req_delattr: remove the req socket's attr
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Description:
 | 
					 * Description:
 | 
				
			||||||
 * This structure is filled out by the CALIPSO engine and passed
 | 
					 * This structure is filled out by the CALIPSO engine and passed
 | 
				
			||||||
| 
						 | 
					@ -252,6 +254,10 @@ struct netlbl_calipso_ops {
 | 
				
			||||||
			    const struct calipso_doi *doi_def,
 | 
								    const struct calipso_doi *doi_def,
 | 
				
			||||||
			    const struct netlbl_lsm_secattr *secattr);
 | 
								    const struct netlbl_lsm_secattr *secattr);
 | 
				
			||||||
	void (*sock_delattr)(struct sock *sk);
 | 
						void (*sock_delattr)(struct sock *sk);
 | 
				
			||||||
 | 
						int (*req_setattr)(struct request_sock *req,
 | 
				
			||||||
 | 
								   const struct calipso_doi *doi_def,
 | 
				
			||||||
 | 
								   const struct netlbl_lsm_secattr *secattr);
 | 
				
			||||||
 | 
						void (*req_delattr)(struct request_sock *req);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					/*
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -889,6 +889,90 @@ static void calipso_sock_delattr(struct sock *sk)
 | 
				
			||||||
	txopt_put(txopts);
 | 
						txopt_put(txopts);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* request sock functions.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
 | 
				
			||||||
 | 
					 * @req: the connection request socket
 | 
				
			||||||
 | 
					 * @doi_def: the CALIPSO DOI to use
 | 
				
			||||||
 | 
					 * @secattr: the specific security attributes of the socket
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Description:
 | 
				
			||||||
 | 
					 * Set the CALIPSO option on the given socket using the DOI definition and
 | 
				
			||||||
 | 
					 * security attributes passed to the function.  Returns zero on success and
 | 
				
			||||||
 | 
					 * negative values on failure.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					static int calipso_req_setattr(struct request_sock *req,
 | 
				
			||||||
 | 
								       const struct calipso_doi *doi_def,
 | 
				
			||||||
 | 
								       const struct netlbl_lsm_secattr *secattr)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						struct ipv6_txoptions *txopts;
 | 
				
			||||||
 | 
						struct inet_request_sock *req_inet = inet_rsk(req);
 | 
				
			||||||
 | 
						struct ipv6_opt_hdr *old, *new;
 | 
				
			||||||
 | 
						struct sock *sk = sk_to_full_sk(req_to_sk(req));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (req_inet->ipv6_opt && req_inet->ipv6_opt->hopopt)
 | 
				
			||||||
 | 
							old = req_inet->ipv6_opt->hopopt;
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							old = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						new = calipso_opt_insert(old, doi_def, secattr);
 | 
				
			||||||
 | 
						if (IS_ERR(new))
 | 
				
			||||||
 | 
							return PTR_ERR(new);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						txopts = ipv6_renew_options_kern(sk, req_inet->ipv6_opt, IPV6_HOPOPTS,
 | 
				
			||||||
 | 
										 new, new ? ipv6_optlen(new) : 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						kfree(new);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (IS_ERR(txopts))
 | 
				
			||||||
 | 
							return PTR_ERR(txopts);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						txopts = xchg(&req_inet->ipv6_opt, txopts);
 | 
				
			||||||
 | 
						if (txopts) {
 | 
				
			||||||
 | 
							atomic_sub(txopts->tot_len, &sk->sk_omem_alloc);
 | 
				
			||||||
 | 
							txopt_put(txopts);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * calipso_req_delattr - Delete the CALIPSO option from a request socket
 | 
				
			||||||
 | 
					 * @reg: the request socket
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Description:
 | 
				
			||||||
 | 
					 * Removes the CALIPSO option from a request socket, if present.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					static void calipso_req_delattr(struct request_sock *req)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						struct inet_request_sock *req_inet = inet_rsk(req);
 | 
				
			||||||
 | 
						struct ipv6_opt_hdr *new;
 | 
				
			||||||
 | 
						struct ipv6_txoptions *txopts;
 | 
				
			||||||
 | 
						struct sock *sk = sk_to_full_sk(req_to_sk(req));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!req_inet->ipv6_opt || !req_inet->ipv6_opt->hopopt)
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (calipso_opt_del(req_inet->ipv6_opt->hopopt, &new))
 | 
				
			||||||
 | 
							return; /* Nothing to do */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						txopts = ipv6_renew_options_kern(sk, req_inet->ipv6_opt, IPV6_HOPOPTS,
 | 
				
			||||||
 | 
										 new, new ? ipv6_optlen(new) : 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!IS_ERR(txopts)) {
 | 
				
			||||||
 | 
							txopts = xchg(&req_inet->ipv6_opt, txopts);
 | 
				
			||||||
 | 
							if (txopts) {
 | 
				
			||||||
 | 
								atomic_sub(txopts->tot_len, &sk->sk_omem_alloc);
 | 
				
			||||||
 | 
								txopt_put(txopts);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						kfree(new);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static const struct netlbl_calipso_ops ops = {
 | 
					static const struct netlbl_calipso_ops ops = {
 | 
				
			||||||
	.doi_add          = calipso_doi_add,
 | 
						.doi_add          = calipso_doi_add,
 | 
				
			||||||
	.doi_free         = calipso_doi_free,
 | 
						.doi_free         = calipso_doi_free,
 | 
				
			||||||
| 
						 | 
					@ -899,6 +983,8 @@ static const struct netlbl_calipso_ops ops = {
 | 
				
			||||||
	.sock_getattr     = calipso_sock_getattr,
 | 
						.sock_getattr     = calipso_sock_getattr,
 | 
				
			||||||
	.sock_setattr     = calipso_sock_setattr,
 | 
						.sock_setattr     = calipso_sock_setattr,
 | 
				
			||||||
	.sock_delattr     = calipso_sock_delattr,
 | 
						.sock_delattr     = calipso_sock_delattr,
 | 
				
			||||||
 | 
						.req_setattr      = calipso_req_setattr,
 | 
				
			||||||
 | 
						.req_delattr      = calipso_req_delattr,
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -578,3 +578,43 @@ void calipso_sock_delattr(struct sock *sk)
 | 
				
			||||||
	if (ops)
 | 
						if (ops)
 | 
				
			||||||
		ops->sock_delattr(sk);
 | 
							ops->sock_delattr(sk);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
 | 
				
			||||||
 | 
					 * @req: the connection request socket
 | 
				
			||||||
 | 
					 * @doi_def: the CALIPSO DOI to use
 | 
				
			||||||
 | 
					 * @secattr: the specific security attributes of the socket
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Description:
 | 
				
			||||||
 | 
					 * Set the CALIPSO option on the given socket using the DOI definition and
 | 
				
			||||||
 | 
					 * security attributes passed to the function.  Returns zero on success and
 | 
				
			||||||
 | 
					 * negative values on failure.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					int calipso_req_setattr(struct request_sock *req,
 | 
				
			||||||
 | 
								const struct calipso_doi *doi_def,
 | 
				
			||||||
 | 
								const struct netlbl_lsm_secattr *secattr)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int ret_val = -ENOMSG;
 | 
				
			||||||
 | 
						const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (ops)
 | 
				
			||||||
 | 
							ret_val = ops->req_setattr(req, doi_def, secattr);
 | 
				
			||||||
 | 
						return ret_val;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * calipso_req_delattr - Delete the CALIPSO option from a request socket
 | 
				
			||||||
 | 
					 * @reg: the request socket
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Description:
 | 
				
			||||||
 | 
					 * Removes the CALIPSO option from a request socket, if present.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					void calipso_req_delattr(struct request_sock *req)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (ops)
 | 
				
			||||||
 | 
							ops->req_delattr(req);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -133,5 +133,9 @@ int calipso_sock_setattr(struct sock *sk,
 | 
				
			||||||
			 const struct calipso_doi *doi_def,
 | 
								 const struct calipso_doi *doi_def,
 | 
				
			||||||
			 const struct netlbl_lsm_secattr *secattr);
 | 
								 const struct netlbl_lsm_secattr *secattr);
 | 
				
			||||||
void calipso_sock_delattr(struct sock *sk);
 | 
					void calipso_sock_delattr(struct sock *sk);
 | 
				
			||||||
 | 
					int calipso_req_setattr(struct request_sock *req,
 | 
				
			||||||
 | 
								const struct calipso_doi *doi_def,
 | 
				
			||||||
 | 
								const struct netlbl_lsm_secattr *secattr);
 | 
				
			||||||
 | 
					void calipso_req_delattr(struct request_sock *req);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1053,12 +1053,13 @@ int netlbl_req_setattr(struct request_sock *req,
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	int ret_val;
 | 
						int ret_val;
 | 
				
			||||||
	struct netlbl_dommap_def *entry;
 | 
						struct netlbl_dommap_def *entry;
 | 
				
			||||||
 | 
						struct inet_request_sock *ireq = inet_rsk(req);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	rcu_read_lock();
 | 
						rcu_read_lock();
 | 
				
			||||||
	switch (req->rsk_ops->family) {
 | 
						switch (req->rsk_ops->family) {
 | 
				
			||||||
	case AF_INET:
 | 
						case AF_INET:
 | 
				
			||||||
		entry = netlbl_domhsh_getentry_af4(secattr->domain,
 | 
							entry = netlbl_domhsh_getentry_af4(secattr->domain,
 | 
				
			||||||
						   inet_rsk(req)->ir_rmt_addr);
 | 
											   ireq->ir_rmt_addr);
 | 
				
			||||||
		if (entry == NULL) {
 | 
							if (entry == NULL) {
 | 
				
			||||||
			ret_val = -ENOENT;
 | 
								ret_val = -ENOENT;
 | 
				
			||||||
			goto req_setattr_return;
 | 
								goto req_setattr_return;
 | 
				
			||||||
| 
						 | 
					@ -1069,9 +1070,7 @@ int netlbl_req_setattr(struct request_sock *req,
 | 
				
			||||||
						       entry->cipso, secattr);
 | 
											       entry->cipso, secattr);
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
		case NETLBL_NLTYPE_UNLABELED:
 | 
							case NETLBL_NLTYPE_UNLABELED:
 | 
				
			||||||
			/* just delete the protocols we support for right now
 | 
								netlbl_req_delattr(req);
 | 
				
			||||||
			 * but we could remove other protocols if needed */
 | 
					 | 
				
			||||||
			cipso_v4_req_delattr(req);
 | 
					 | 
				
			||||||
			ret_val = 0;
 | 
								ret_val = 0;
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
		default:
 | 
							default:
 | 
				
			||||||
| 
						 | 
					@ -1080,10 +1079,25 @@ int netlbl_req_setattr(struct request_sock *req,
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
#if IS_ENABLED(CONFIG_IPV6)
 | 
					#if IS_ENABLED(CONFIG_IPV6)
 | 
				
			||||||
	case AF_INET6:
 | 
						case AF_INET6:
 | 
				
			||||||
		/* since we don't support any IPv6 labeling protocols right
 | 
							entry = netlbl_domhsh_getentry_af6(secattr->domain,
 | 
				
			||||||
		 * now we can optimize everything away until we do */
 | 
											   &ireq->ir_v6_rmt_addr);
 | 
				
			||||||
 | 
							if (entry == NULL) {
 | 
				
			||||||
 | 
								ret_val = -ENOENT;
 | 
				
			||||||
 | 
								goto req_setattr_return;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							switch (entry->type) {
 | 
				
			||||||
 | 
							case NETLBL_NLTYPE_CALIPSO:
 | 
				
			||||||
 | 
								ret_val = calipso_req_setattr(req,
 | 
				
			||||||
 | 
											      entry->calipso, secattr);
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							case NETLBL_NLTYPE_UNLABELED:
 | 
				
			||||||
 | 
								netlbl_req_delattr(req);
 | 
				
			||||||
			ret_val = 0;
 | 
								ret_val = 0;
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
 | 
							default:
 | 
				
			||||||
 | 
								ret_val = -ENOENT;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
#endif /* IPv6 */
 | 
					#endif /* IPv6 */
 | 
				
			||||||
	default:
 | 
						default:
 | 
				
			||||||
		ret_val = -EPROTONOSUPPORT;
 | 
							ret_val = -EPROTONOSUPPORT;
 | 
				
			||||||
| 
						 | 
					@ -1108,6 +1122,11 @@ void netlbl_req_delattr(struct request_sock *req)
 | 
				
			||||||
	case AF_INET:
 | 
						case AF_INET:
 | 
				
			||||||
		cipso_v4_req_delattr(req);
 | 
							cipso_v4_req_delattr(req);
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
 | 
					#if IS_ENABLED(CONFIG_IPV6)
 | 
				
			||||||
 | 
						case AF_INET6:
 | 
				
			||||||
 | 
							calipso_req_delattr(req);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					#endif /* IPv6 */
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -284,7 +284,7 @@ int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family)
 | 
				
			||||||
	int rc;
 | 
						int rc;
 | 
				
			||||||
	struct netlbl_lsm_secattr secattr;
 | 
						struct netlbl_lsm_secattr secattr;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (family != PF_INET)
 | 
						if (family != PF_INET && family != PF_INET6)
 | 
				
			||||||
		return 0;
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	netlbl_secattr_init(&secattr);
 | 
						netlbl_secattr_init(&secattr);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue