Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
5c8c40be
Commit
5c8c40be
authored
Jan 05, 2009
by
James Morris
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'master' of
git://git.infradead.org/users/pcmoore/lblnet-2.6_next
into next
parents
90bd49ab
6d3dc07c
Changes
17
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
17 changed files
with
1122 additions
and
375 deletions
+1122
-375
Documentation/feature-removal-schedule.txt
Documentation/feature-removal-schedule.txt
+12
-0
include/net/cipso_ipv4.h
include/net/cipso_ipv4.h
+4
-2
include/net/netlabel.h
include/net/netlabel.h
+80
-6
net/ipv4/cipso_ipv4.c
net/ipv4/cipso_ipv4.c
+65
-21
net/netlabel/netlabel_cipso_v4.c
net/netlabel/netlabel_cipso_v4.c
+18
-43
net/netlabel/netlabel_domainhash.c
net/netlabel/netlabel_domainhash.c
+67
-0
net/netlabel/netlabel_domainhash.h
net/netlabel/netlabel_domainhash.h
+4
-0
net/netlabel/netlabel_kapi.c
net/netlabel/netlabel_kapi.c
+287
-60
net/netlabel/netlabel_unlabeled.c
net/netlabel/netlabel_unlabeled.c
+13
-13
net/netlabel/netlabel_unlabeled.h
net/netlabel/netlabel_unlabeled.h
+15
-0
security/selinux/Kconfig
security/selinux/Kconfig
+0
-27
security/selinux/hooks.c
security/selinux/hooks.c
+3
-3
security/selinux/selinuxfs.c
security/selinux/selinuxfs.c
+8
-8
security/smack/smack.h
security/smack/smack.h
+29
-2
security/smack/smack_access.c
security/smack/smack_access.c
+19
-9
security/smack/smack_lsm.c
security/smack/smack_lsm.c
+255
-55
security/smack/smackfs.c
security/smack/smackfs.c
+243
-126
No files found.
Documentation/feature-removal-schedule.txt
View file @
5c8c40be
...
...
@@ -324,3 +324,15 @@ When: 2.6.29 (ideally) or 2.6.30 (more likely)
Why: Deprecated by the new (standard) device driver binding model. Use
i2c_driver->probe() and ->remove() instead.
Who: Jean Delvare <khali@linux-fr.org>
---------------------------
What: SELinux "compat_net" functionality
When: 2.6.30 at the earliest
Why: In 2.6.18 the Secmark concept was introduced to replace the "compat_net"
network access control functionality of SELinux. Secmark offers both
better performance and greater flexibility than the "compat_net"
mechanism. Now that the major Linux distributions have moved to
Secmark, it is time to deprecate the older mechanism and start the
process of removing the old code.
Who: Paul Moore <paul.moore@hp.com>
include/net/cipso_ipv4.h
View file @
5c8c40be
...
...
@@ -131,7 +131,8 @@ extern int cipso_v4_rbm_strictvalid;
*/
#ifdef CONFIG_NETLABEL
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
);
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
,
struct
netlbl_audit
*
audit_info
);
void
cipso_v4_doi_free
(
struct
cipso_v4_doi
*
doi_def
);
int
cipso_v4_doi_remove
(
u32
doi
,
struct
netlbl_audit
*
audit_info
);
struct
cipso_v4_doi
*
cipso_v4_doi_getdef
(
u32
doi
);
...
...
@@ -140,7 +141,8 @@ int cipso_v4_doi_walk(u32 *skip_cnt,
int
(
*
callback
)
(
struct
cipso_v4_doi
*
doi_def
,
void
*
arg
),
void
*
cb_arg
);
#else
static
inline
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
)
static
inline
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
...
...
include/net/netlabel.h
View file @
5c8c40be
...
...
@@ -33,6 +33,8 @@
#include <linux/types.h>
#include <linux/net.h>
#include <linux/skbuff.h>
#include <linux/in.h>
#include <linux/in6.h>
#include <net/netlink.h>
#include <asm/atomic.h>
...
...
@@ -353,13 +355,37 @@ static inline void netlbl_secattr_free(struct netlbl_lsm_secattr *secattr)
/*
* LSM configuration operations
*/
int
netlbl_cfg_map_del
(
const
char
*
domain
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_unlbl_add_map
(
const
char
*
domain
,
int
netlbl_cfg_map_del
(
const
char
*
domain
,
u16
family
,
const
void
*
addr
,
const
void
*
mask
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_unlbl_map_add
(
const
char
*
domain
,
u16
family
,
const
void
*
addr
,
const
void
*
mask
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_cipsov4_add_map
(
struct
cipso_v4_doi
*
doi_def
,
int
netlbl_cfg_unlbl_static_add
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u16
family
,
u32
secid
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_unlbl_static_del
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u16
family
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_cipsov4_add
(
struct
cipso_v4_doi
*
doi_def
,
struct
netlbl_audit
*
audit_info
);
void
netlbl_cfg_cipsov4_del
(
u32
doi
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_cfg_cipsov4_map_add
(
u32
doi
,
const
char
*
domain
,
const
struct
in_addr
*
addr
,
const
struct
in_addr
*
mask
,
struct
netlbl_audit
*
audit_info
);
/*
* LSM security attribute operations
*/
...
...
@@ -401,19 +427,62 @@ void netlbl_skbuff_err(struct sk_buff *skb, int error, int gateway);
void
netlbl_cache_invalidate
(
void
);
int
netlbl_cache_add
(
const
struct
sk_buff
*
skb
,
const
struct
netlbl_lsm_secattr
*
secattr
);
/*
* Protocol engine operations
*/
struct
audit_buffer
*
netlbl_audit_start
(
int
type
,
struct
netlbl_audit
*
audit_info
);
#else
static
inline
int
netlbl_cfg_map_del
(
const
char
*
domain
,
u16
family
,
const
void
*
addr
,
const
void
*
mask
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
static
inline
int
netlbl_cfg_unlbl_add_map
(
const
char
*
domain
,
static
inline
int
netlbl_cfg_unlbl_map_add
(
const
char
*
domain
,
u16
family
,
void
*
addr
,
void
*
mask
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
static
inline
int
netlbl_cfg_cipsov4_add_map
(
struct
cipso_v4_doi
*
doi_def
,
static
inline
int
netlbl_cfg_unlbl_static_add
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u16
family
,
u32
secid
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
static
inline
int
netlbl_cfg_unlbl_static_del
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u16
family
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
static
inline
int
netlbl_cfg_cipsov4_add
(
struct
cipso_v4_doi
*
doi_def
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
}
static
inline
void
netlbl_cfg_cipsov4_del
(
u32
doi
,
struct
netlbl_audit
*
audit_info
)
{
return
;
}
static
inline
int
netlbl_cfg_cipsov4_map_add
(
u32
doi
,
const
char
*
domain
,
const
struct
in_addr
*
addr
,
const
struct
in_addr
*
mask
,
struct
netlbl_audit
*
audit_info
)
{
return
-
ENOSYS
;
...
...
@@ -495,6 +564,11 @@ static inline int netlbl_cache_add(const struct sk_buff *skb,
{
return
0
;
}
static
inline
struct
audit_buffer
*
netlbl_audit_start
(
int
type
,
struct
netlbl_audit
*
audit_info
)
{
return
NULL
;
}
#endif
/* CONFIG_NETLABEL */
#endif
/* _NETLABEL_H */
net/ipv4/cipso_ipv4.c
View file @
5c8c40be
...
...
@@ -38,6 +38,7 @@
#include <linux/spinlock.h>
#include <linux/string.h>
#include <linux/jhash.h>
#include <linux/audit.h>
#include <net/ip.h>
#include <net/icmp.h>
#include <net/tcp.h>
...
...
@@ -449,6 +450,7 @@ static struct cipso_v4_doi *cipso_v4_doi_search(u32 doi)
/**
* cipso_v4_doi_add - Add a new DOI to the CIPSO protocol engine
* @doi_def: the DOI structure
* @audit_info: NetLabel audit information
*
* Description:
* The caller defines a new DOI for use by the CIPSO engine and calls this
...
...
@@ -458,50 +460,78 @@ static struct cipso_v4_doi *cipso_v4_doi_search(u32 doi)
* zero on success and non-zero on failure.
*
*/
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
)
int
cipso_v4_doi_add
(
struct
cipso_v4_doi
*
doi_def
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
=
-
EINVAL
;
u32
iter
;
u32
doi
;
u32
doi_type
;
struct
audit_buffer
*
audit_buf
;
doi
=
doi_def
->
doi
;
doi_type
=
doi_def
->
type
;
if
(
doi_def
==
NULL
||
doi_def
->
doi
==
CIPSO_V4_DOI_UNKNOWN
)
return
-
EINVAL
;
goto
doi_add_return
;
for
(
iter
=
0
;
iter
<
CIPSO_V4_TAG_MAXCNT
;
iter
++
)
{
switch
(
doi_def
->
tags
[
iter
])
{
case
CIPSO_V4_TAG_RBITMAP
:
break
;
case
CIPSO_V4_TAG_RANGE
:
if
(
doi_def
->
type
!=
CIPSO_V4_MAP_PASS
)
return
-
EINVAL
;
break
;
case
CIPSO_V4_TAG_INVALID
:
if
(
iter
==
0
)
return
-
EINVAL
;
break
;
case
CIPSO_V4_TAG_ENUM
:
if
(
doi_def
->
type
!=
CIPSO_V4_MAP_PASS
)
return
-
EINVAL
;
goto
doi_add_return
;
break
;
case
CIPSO_V4_TAG_LOCAL
:
if
(
doi_def
->
type
!=
CIPSO_V4_MAP_LOCAL
)
return
-
EINVAL
;
goto
doi_add_return
;
break
;
case
CIPSO_V4_TAG_INVALID
:
if
(
iter
==
0
)
goto
doi_add_return
;
break
;
default:
return
-
EINVAL
;
goto
doi_add_return
;
}
}
atomic_set
(
&
doi_def
->
refcount
,
1
);
spin_lock
(
&
cipso_v4_doi_list_lock
);
if
(
cipso_v4_doi_search
(
doi_def
->
doi
)
!=
NULL
)
goto
doi_add_failure
;
if
(
cipso_v4_doi_search
(
doi_def
->
doi
)
!=
NULL
)
{
spin_unlock
(
&
cipso_v4_doi_list_lock
);
ret_val
=
-
EEXIST
;
goto
doi_add_return
;
}
list_add_tail_rcu
(
&
doi_def
->
list
,
&
cipso_v4_doi_list
);
spin_unlock
(
&
cipso_v4_doi_list_lock
);
ret_val
=
0
;
return
0
;
doi_add_return:
audit_buf
=
netlbl_audit_start
(
AUDIT_MAC_CIPSOV4_ADD
,
audit_info
);
if
(
audit_buf
!=
NULL
)
{
const
char
*
type_str
;
switch
(
doi_type
)
{
case
CIPSO_V4_MAP_TRANS
:
type_str
=
"trans"
;
break
;
case
CIPSO_V4_MAP_PASS
:
type_str
=
"pass"
;
break
;
case
CIPSO_V4_MAP_LOCAL
:
type_str
=
"local"
;
break
;
default:
type_str
=
"(unknown)"
;
}
audit_log_format
(
audit_buf
,
" cipso_doi=%u cipso_type=%s res=%u"
,
doi
,
type_str
,
ret_val
==
0
?
1
:
0
);
audit_log_end
(
audit_buf
);
}
doi_add_failure:
spin_unlock
(
&
cipso_v4_doi_list_lock
);
return
-
EEXIST
;
return
ret_val
;
}
/**
...
...
@@ -559,25 +589,39 @@ static void cipso_v4_doi_free_rcu(struct rcu_head *entry)
*/
int
cipso_v4_doi_remove
(
u32
doi
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
;
struct
cipso_v4_doi
*
doi_def
;
struct
audit_buffer
*
audit_buf
;
spin_lock
(
&
cipso_v4_doi_list_lock
);
doi_def
=
cipso_v4_doi_search
(
doi
);
if
(
doi_def
==
NULL
)
{
spin_unlock
(
&
cipso_v4_doi_list_lock
);
return
-
ENOENT
;
ret_val
=
-
ENOENT
;
goto
doi_remove_return
;
}
if
(
!
atomic_dec_and_test
(
&
doi_def
->
refcount
))
{
spin_unlock
(
&
cipso_v4_doi_list_lock
);
return
-
EBUSY
;
ret_val
=
-
EBUSY
;
goto
doi_remove_return
;
}
list_del_rcu
(
&
doi_def
->
list
);
spin_unlock
(
&
cipso_v4_doi_list_lock
);
cipso_v4_cache_invalidate
();
call_rcu
(
&
doi_def
->
rcu
,
cipso_v4_doi_free_rcu
);
ret_val
=
0
;
doi_remove_return:
audit_buf
=
netlbl_audit_start
(
AUDIT_MAC_CIPSOV4_DEL
,
audit_info
);
if
(
audit_buf
!=
NULL
)
{
audit_log_format
(
audit_buf
,
" cipso_doi=%u res=%u"
,
doi
,
ret_val
==
0
?
1
:
0
);
audit_log_end
(
audit_buf
);
}
return
0
;
return
ret_val
;
}
/**
...
...
net/netlabel/netlabel_cipso_v4.c
View file @
5c8c40be
...
...
@@ -130,6 +130,7 @@ static int netlbl_cipsov4_add_common(struct genl_info *info,
/**
* netlbl_cipsov4_add_std - Adds a CIPSO V4 DOI definition
* @info: the Generic NETLINK info block
* @audit_info: NetLabel audit information
*
* Description:
* Create a new CIPSO_V4_MAP_TRANS DOI definition based on the given ADD
...
...
@@ -137,7 +138,8 @@ static int netlbl_cipsov4_add_common(struct genl_info *info,
* non-zero on error.
*
*/
static
int
netlbl_cipsov4_add_std
(
struct
genl_info
*
info
)
static
int
netlbl_cipsov4_add_std
(
struct
genl_info
*
info
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
=
-
EINVAL
;
struct
cipso_v4_doi
*
doi_def
=
NULL
;
...
...
@@ -316,7 +318,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info)
}
}
ret_val
=
cipso_v4_doi_add
(
doi_def
);
ret_val
=
cipso_v4_doi_add
(
doi_def
,
audit_info
);
if
(
ret_val
!=
0
)
goto
add_std_failure
;
return
0
;
...
...
@@ -330,6 +332,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info)
/**
* netlbl_cipsov4_add_pass - Adds a CIPSO V4 DOI definition
* @info: the Generic NETLINK info block
* @audit_info: NetLabel audit information
*
* Description:
* Create a new CIPSO_V4_MAP_PASS DOI definition based on the given ADD message
...
...
@@ -337,7 +340,8 @@ static int netlbl_cipsov4_add_std(struct genl_info *info)
* error.
*
*/
static
int
netlbl_cipsov4_add_pass
(
struct
genl_info
*
info
)
static
int
netlbl_cipsov4_add_pass
(
struct
genl_info
*
info
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
;
struct
cipso_v4_doi
*
doi_def
=
NULL
;
...
...
@@ -354,7 +358,7 @@ static int netlbl_cipsov4_add_pass(struct genl_info *info)
if
(
ret_val
!=
0
)
goto
add_pass_failure
;
ret_val
=
cipso_v4_doi_add
(
doi_def
);
ret_val
=
cipso_v4_doi_add
(
doi_def
,
audit_info
);
if
(
ret_val
!=
0
)
goto
add_pass_failure
;
return
0
;
...
...
@@ -367,6 +371,7 @@ static int netlbl_cipsov4_add_pass(struct genl_info *info)
/**
* netlbl_cipsov4_add_local - Adds a CIPSO V4 DOI definition
* @info: the Generic NETLINK info block
* @audit_info: NetLabel audit information
*
* Description:
* Create a new CIPSO_V4_MAP_LOCAL DOI definition based on the given ADD
...
...
@@ -374,7 +379,8 @@ static int netlbl_cipsov4_add_pass(struct genl_info *info)
* non-zero on error.
*
*/
static
int
netlbl_cipsov4_add_local
(
struct
genl_info
*
info
)
static
int
netlbl_cipsov4_add_local
(
struct
genl_info
*
info
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
;
struct
cipso_v4_doi
*
doi_def
=
NULL
;
...
...
@@ -391,7 +397,7 @@ static int netlbl_cipsov4_add_local(struct genl_info *info)
if
(
ret_val
!=
0
)
goto
add_local_failure
;
ret_val
=
cipso_v4_doi_add
(
doi_def
);
ret_val
=
cipso_v4_doi_add
(
doi_def
,
audit_info
);
if
(
ret_val
!=
0
)
goto
add_local_failure
;
return
0
;
...
...
@@ -415,48 +421,31 @@ static int netlbl_cipsov4_add(struct sk_buff *skb, struct genl_info *info)
{
int
ret_val
=
-
EINVAL
;
u32
type
;
u32
doi
;
const
char
*
type_str
=
"(unknown)"
;
struct
audit_buffer
*
audit_buf
;
struct
netlbl_audit
audit_info
;
if
(
!
info
->
attrs
[
NLBL_CIPSOV4_A_DOI
]
||
!
info
->
attrs
[
NLBL_CIPSOV4_A_MTYPE
])
return
-
EINVAL
;
doi
=
nla_get_u32
(
info
->
attrs
[
NLBL_CIPSOV4_A_DOI
]);
netlbl_netlink_auditinfo
(
skb
,
&
audit_info
);
type
=
nla_get_u32
(
info
->
attrs
[
NLBL_CIPSOV4_A_MTYPE
]);
switch
(
type
)
{
switch
(
nla_get_u32
(
info
->
attrs
[
NLBL_CIPSOV4_A_MTYPE
]))
{
case
CIPSO_V4_MAP_TRANS
:
type_str
=
"trans"
;
ret_val
=
netlbl_cipsov4_add_std
(
info
);
ret_val
=
netlbl_cipsov4_add_std
(
info
,
&
audit_info
);
break
;
case
CIPSO_V4_MAP_PASS
:
type_str
=
"pass"
;
ret_val
=
netlbl_cipsov4_add_pass
(
info
);
ret_val
=
netlbl_cipsov4_add_pass
(
info
,
&
audit_info
);
break
;
case
CIPSO_V4_MAP_LOCAL
:
type_str
=
"local"
;
ret_val
=
netlbl_cipsov4_add_local
(
info
);
ret_val
=
netlbl_cipsov4_add_local
(
info
,
&
audit_info
);
break
;
}
if
(
ret_val
==
0
)
atomic_inc
(
&
netlabel_mgmt_protocount
);
audit_buf
=
netlbl_audit_start_common
(
AUDIT_MAC_CIPSOV4_ADD
,
&
audit_info
);
if
(
audit_buf
!=
NULL
)
{
audit_log_format
(
audit_buf
,
" cipso_doi=%u cipso_type=%s res=%u"
,
doi
,
type_str
,
ret_val
==
0
?
1
:
0
);
audit_log_end
(
audit_buf
);
}
return
ret_val
;
}
...
...
@@ -725,9 +714,7 @@ static int netlbl_cipsov4_remove_cb(struct netlbl_dom_map *entry, void *arg)
static
int
netlbl_cipsov4_remove
(
struct
sk_buff
*
skb
,
struct
genl_info
*
info
)
{
int
ret_val
=
-
EINVAL
;
u32
doi
=
0
;
struct
netlbl_domhsh_walk_arg
cb_arg
;
struct
audit_buffer
*
audit_buf
;
struct
netlbl_audit
audit_info
;
u32
skip_bkt
=
0
;
u32
skip_chain
=
0
;
...
...
@@ -735,29 +722,17 @@ static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info)
if
(
!
info
->
attrs
[
NLBL_CIPSOV4_A_DOI
])
return
-
EINVAL
;
doi
=
nla_get_u32
(
info
->
attrs
[
NLBL_CIPSOV4_A_DOI
]);
netlbl_netlink_auditinfo
(
skb
,
&
audit_info
);
cb_arg
.
doi
=
doi
;
cb_arg
.
doi
=
nla_get_u32
(
info
->
attrs
[
NLBL_CIPSOV4_A_DOI
]);
cb_arg
.
audit_info
=
&
audit_info
;
ret_val
=
netlbl_domhsh_walk
(
&
skip_bkt
,
&
skip_chain
,
netlbl_cipsov4_remove_cb
,
&
cb_arg
);
if
(
ret_val
==
0
||
ret_val
==
-
ENOENT
)
{
ret_val
=
cipso_v4_doi_remove
(
doi
,
&
audit_info
);
ret_val
=
cipso_v4_doi_remove
(
cb_arg
.
doi
,
&
audit_info
);
if
(
ret_val
==
0
)
atomic_dec
(
&
netlabel_mgmt_protocount
);
}
audit_buf
=
netlbl_audit_start_common
(
AUDIT_MAC_CIPSOV4_DEL
,
&
audit_info
);
if
(
audit_buf
!=
NULL
)
{
audit_log_format
(
audit_buf
,
" cipso_doi=%u res=%u"
,
doi
,
ret_val
==
0
?
1
:
0
);
audit_log_end
(
audit_buf
);
}
return
ret_val
;
}
...
...
net/netlabel/netlabel_domainhash.c
View file @
5c8c40be
...
...
@@ -482,6 +482,73 @@ int netlbl_domhsh_remove_entry(struct netlbl_dom_map *entry,
return
ret_val
;
}
/**
* netlbl_domhsh_remove_af4 - Removes an address selector entry
* @domain: the domain
* @addr: IPv4 address
* @mask: IPv4 address mask
* @audit_info: NetLabel audit information
*
* Description:
* Removes an individual address selector from a domain mapping and potentially
* the entire mapping if it is empty. Returns zero on success, negative values
* on failure.
*
*/
int
netlbl_domhsh_remove_af4
(
const
char
*
domain
,
const
struct
in_addr
*
addr
,
const
struct
in_addr
*
mask
,
struct
netlbl_audit
*
audit_info
)
{
struct
netlbl_dom_map
*
entry_map
;
struct
netlbl_af4list
*
entry_addr
;
struct
netlbl_af4list
*
iter4
;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
struct
netlbl_af6list
*
iter6
;
#endif
/* IPv6 */
struct
netlbl_domaddr4_map
*
entry
;
rcu_read_lock
();
if
(
domain
)
entry_map
=
netlbl_domhsh_search
(
domain
);
else
entry_map
=
netlbl_domhsh_search_def
(
domain
);
if
(
entry_map
==
NULL
||
entry_map
->
type
!=
NETLBL_NLTYPE_ADDRSELECT
)
goto
remove_af4_failure
;
spin_lock
(
&
netlbl_domhsh_lock
);
entry_addr
=
netlbl_af4list_remove
(
addr
->
s_addr
,
mask
->
s_addr
,
&
entry_map
->
type_def
.
addrsel
->
list4
);
spin_unlock
(
&
netlbl_domhsh_lock
);
if
(
entry_addr
==
NULL
)
goto
remove_af4_failure
;
netlbl_af4list_foreach_rcu
(
iter4
,
&
entry_map
->
type_def
.
addrsel
->
list4
)
goto
remove_af4_single_addr
;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
netlbl_af6list_foreach_rcu
(
iter6
,
&
entry_map
->
type_def
.
addrsel
->
list6
)
goto
remove_af4_single_addr
;
#endif
/* IPv6 */
/* the domain mapping is empty so remove it from the mapping table */
netlbl_domhsh_remove_entry
(
entry_map
,
audit_info
);
remove_af4_single_addr:
rcu_read_unlock
();
/* yick, we can't use call_rcu here because we don't have a rcu head
* pointer but hopefully this should be a rare case so the pause
* shouldn't be a problem */
synchronize_rcu
();
entry
=
netlbl_domhsh_addr4_entry
(
entry_addr
);
cipso_v4_doi_putdef
(
entry
->
type_def
.
cipsov4
);
kfree
(
entry
);
return
0
;
remove_af4_failure:
rcu_read_unlock
();
return
-
ENOENT
;
}
/**
* netlbl_domhsh_remove - Removes an entry from the domain hash table
* @domain: the domain to remove
...
...
net/netlabel/netlabel_domainhash.h
View file @
5c8c40be
...
...
@@ -90,6 +90,10 @@ int netlbl_domhsh_add_default(struct netlbl_dom_map *entry,
struct
netlbl_audit
*
audit_info
);
int
netlbl_domhsh_remove_entry
(
struct
netlbl_dom_map
*
entry
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_domhsh_remove_af4
(
const
char
*
domain
,
const
struct
in_addr
*
addr
,
const
struct
in_addr
*
mask
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_domhsh_remove
(
const
char
*
domain
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_domhsh_remove_default
(
struct
netlbl_audit
*
audit_info
);
struct
netlbl_dom_map
*
netlbl_domhsh_getentry
(
const
char
*
domain
);
...
...
net/netlabel/netlabel_kapi.c
View file @
5c8c40be
This diff is collapsed.
Click to expand it.
net/netlabel/netlabel_unlabeled.c
View file @
5c8c40be
...
...
@@ -450,13 +450,13 @@ static struct netlbl_unlhsh_iface *netlbl_unlhsh_add_iface(int ifindex)
* success, negative values on failure.
*
*/
static
int
netlbl_unlhsh_add
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
u32
secid
,
struct
netlbl_audit
*
audit_info
)
int
netlbl_unlhsh_add
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
u32
secid
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
;
int
ifindex
;
...
...
@@ -720,12 +720,12 @@ static void netlbl_unlhsh_condremove_iface(struct netlbl_unlhsh_iface *iface)
* Returns zero on success, negative values on failure.
*
*/
static
int
netlbl_unlhsh_remove
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
struct
netlbl_audit
*
audit_info
)
int
netlbl_unlhsh_remove
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
struct
netlbl_audit
*
audit_info
)
{
int
ret_val
;
struct
net_device
*
dev
;
...
...
net/netlabel/netlabel_unlabeled.h
View file @
5c8c40be
...
...
@@ -221,6 +221,21 @@ int netlbl_unlabel_genl_init(void);
/* General Unlabeled init function */
int
netlbl_unlabel_init
(
u32
size
);
/* Static/Fallback label management functions */
int
netlbl_unlhsh_add
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
u32
secid
,
struct
netlbl_audit
*
audit_info
);
int
netlbl_unlhsh_remove
(
struct
net
*
net
,
const
char
*
dev_name
,
const
void
*
addr
,
const
void
*
mask
,
u32
addr_len
,
struct
netlbl_audit
*
audit_info
);
/* Process Unlabeled incoming network packets */
int
netlbl_unlabel_getattr
(
const
struct
sk_buff
*
skb
,
u16
family
,
...
...
security/selinux/Kconfig
View file @
5c8c40be
...
...
@@ -94,33 +94,6 @@ config SECURITY_SELINUX_CHECKREQPROT_VALUE
If you are unsure how to answer this question, answer 1.
config SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT
bool "NSA SELinux enable new secmark network controls by default"
depends on SECURITY_SELINUX
default n
help
This option determines whether the new secmark-based network
controls will be enabled by default. If not, the old internal
per-packet controls will be enabled by default, preserving
old behavior.
If you enable the new controls, you will need updated
SELinux userspace libraries, tools and policy. Typically,
your distribution will provide these and enable the new controls
in the kernel they also distribute.
Note that this option can be overridden at boot with the
selinux_compat_net parameter, and after boot via
/selinux/compat_net. See Documentation/kernel-parameters.txt
for details on this parameter.
If you enable the new network controls, you will likely
also require the SECMARK and CONNSECMARK targets, as
well as any conntrack helpers for protocols which you
wish to control.
If you are unsure what to do here, select N.
config SECURITY_SELINUX_POLICYDB_VERSION_MAX
bool "NSA SELinux maximum supported policy format version"
depends on SECURITY_SELINUX
...
...
security/selinux/hooks.c
View file @
5c8c40be
...
...
@@ -4185,7 +4185,7 @@ static int selinux_sock_rcv_skb_iptables_compat(struct sock *sk,
static
int
selinux_sock_rcv_skb_compat
(
struct
sock
*
sk
,
struct
sk_buff
*
skb
,
u16
family
)
{
int
err
;
int
err
=
0
;
struct
sk_security_struct
*
sksec
=
sk
->
sk_security
;
u32
peer_sid
;
u32
sk_sid
=
sksec
->
sid
;
...
...
@@ -4202,7 +4202,7 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
if
(
selinux_compat_net
)
err
=
selinux_sock_rcv_skb_iptables_compat
(
sk
,
skb
,
&
ad
,
family
,
addrp
);
else
else
if
(
selinux_secmark_enabled
())
err
=
avc_has_perm
(
sk_sid
,
skb
->
secmark
,
SECCLASS_PACKET
,
PACKET__RECV
,
&
ad
);
if
(
err
)
...
...
@@ -4705,7 +4705,7 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
if
(
selinux_ip_postroute_iptables_compat
(
skb
->
sk
,
ifindex
,
&
ad
,
family
,
addrp
))
return
NF_DROP
;
}
else
{
}
else
if
(
selinux_secmark_enabled
())
{
if
(
avc_has_perm
(
sksec
->
sid
,
skb
->
secmark
,
SECCLASS_PACKET
,
PACKET__SEND
,
&
ad
))
return
NF_DROP
;
...
...
security/selinux/selinuxfs.c
View file @
5c8c40be
...
...
@@ -47,13 +47,7 @@ static char *policycap_names[] = {
unsigned
int
selinux_checkreqprot
=
CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE
;
#ifdef CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT
#define SELINUX_COMPAT_NET_VALUE 0
#else
#define SELINUX_COMPAT_NET_VALUE 1
#endif
int
selinux_compat_net
=
SELINUX_COMPAT_NET_VALUE
;
int
selinux_compat_net
=
0
;
static
int
__init
checkreqprot_setup
(
char
*
str
)
{
...
...
@@ -494,7 +488,13 @@ static ssize_t sel_write_compat_net(struct file *file, const char __user *buf,
if
(
sscanf
(
page
,
"%d"
,
&
new_value
)
!=
1
)
goto
out
;
selinux_compat_net
=
new_value
?
1
:
0
;
if
(
new_value
)
{
printk
(
KERN_NOTICE
"SELinux: compat_net is deprecated, please use secmark"
" instead
\n
"
);
selinux_compat_net
=
1
;
}
else
selinux_compat_net
=
0
;
length
=
count
;
out:
free_page
((
unsigned
long
)
page
);
...
...
security/smack/smack.h
View file @
5c8c40be
...
...
@@ -16,6 +16,7 @@
#include <linux/capability.h>
#include <linux/spinlock.h>
#include <linux/security.h>
#include <linux/in.h>
#include <net/netlabel.h>
/*
...
...
@@ -39,6 +40,7 @@ struct superblock_smack {
struct
socket_smack
{
char
*
smk_out
;
/* outbound label */
char
*
smk_in
;
/* inbound label */
int
smk_labeled
;
/* label scheme */
char
smk_packet
[
SMK_LABELLEN
];
/* TCP peer label */
};
...
...
@@ -79,6 +81,16 @@ struct smack_cipso {
char
smk_catset
[
SMK_LABELLEN
];
};
/*
* An entry in the table identifying hosts.
*/
struct
smk_netlbladdr
{
struct
smk_netlbladdr
*
smk_next
;
struct
sockaddr_in
smk_host
;
/* network address */
struct
in_addr
smk_mask
;
/* network mask */
char
*
smk_label
;
/* label */
};
/*
* This is the repository for labels seen so that it is
* not necessary to keep allocating tiny chuncks of memory
...
...
@@ -127,6 +139,20 @@ struct smack_known {
#define XATTR_NAME_SMACKIPOUT XATTR_SECURITY_PREFIX XATTR_SMACK_IPOUT
/*
* How communications on this socket are treated.
* Usually it's determined by the underlying netlabel code
* but there are certain cases, including single label hosts
* and potentially single label interfaces for which the
* treatment can not be known in advance.
*
* The possibility of additional labeling schemes being
* introduced in the future exists as well.
*/
#define SMACK_UNLABELED_SOCKET 0
#define SMACK_CIPSO_SOCKET 1
/*
* smackfs magic number
* smackfs macic number
*/
#define SMACK_MAGIC 0x43415d53
/* "SMAC" */
...
...
@@ -141,6 +167,7 @@ struct smack_known {
* CIPSO defaults.
*/
#define SMACK_CIPSO_DOI_DEFAULT 3
/* Historical */
#define SMACK_CIPSO_DOI_INVALID -1
/* Not a DOI */
#define SMACK_CIPSO_DIRECT_DEFAULT 250
/* Arbitrary */
#define SMACK_CIPSO_MAXCATVAL 63
/* Bigger gets harder */
#define SMACK_CIPSO_MAXLEVEL 255
/* CIPSO 2.2 standard */
...
...
@@ -176,7 +203,6 @@ u32 smack_to_secid(const char *);
* Shared data.
*/
extern
int
smack_cipso_direct
;
extern
int
smack_net_nltype
;
extern
char
*
smack_net_ambient
;
extern
char
*
smack_onlycap
;
...
...
@@ -186,9 +212,10 @@ extern struct smack_known smack_known_hat;
extern
struct
smack_known
smack_known_huh
;
extern
struct
smack_known
smack_known_invalid
;
extern
struct
smack_known
smack_known_star
;
extern
struct
smack_known
smack_known_
unset
;
extern
struct
smack_known
smack_known_
web
;
extern
struct
smk_list_entry
*
smack_list
;
extern
struct
smk_netlbladdr
*
smack_netlbladdrs
;
extern
struct
security_operations
smack_ops
;
/*
...
...
security/smack/smack_access.c
View file @
5c8c40be
...
...
@@ -15,15 +15,8 @@
#include <linux/sched.h>
#include "smack.h"
struct
smack_known
smack_known_unset
=
{
.
smk_next
=
NULL
,
.
smk_known
=
"UNSET"
,
.
smk_secid
=
1
,
.
smk_cipso
=
NULL
,
};
struct
smack_known
smack_known_huh
=
{
.
smk_next
=
&
smack_known_unset
,
.
smk_next
=
NULL
,
.
smk_known
=
"?"
,
.
smk_secid
=
2
,
.
smk_cipso
=
NULL
,
...
...
@@ -57,7 +50,14 @@ struct smack_known smack_known_invalid = {
.
smk_cipso
=
NULL
,
};
struct
smack_known
*
smack_known
=
&
smack_known_invalid
;
struct
smack_known
smack_known_web
=
{
.
smk_next
=
&
smack_known_invalid
,
.
smk_known
=
"@"
,
.
smk_secid
=
7
,
.
smk_cipso
=
NULL
,
};
struct
smack_known
*
smack_known
=
&
smack_known_web
;
/*
* The initial value needs to be bigger than any of the
...
...
@@ -98,6 +98,16 @@ int smk_access(char *subject_label, char *object_label, int request)
if
(
subject_label
==
smack_known_star
.
smk_known
||
strcmp
(
subject_label
,
smack_known_star
.
smk_known
)
==
0
)
return
-
EACCES
;
/*
* An internet object can be accessed by any subject.
* Tasks cannot be assigned the internet label.
* An internet subject can access any object.
*/
if
(
object_label
==
smack_known_web
.
smk_known
||
subject_label
==
smack_known_web
.
smk_known
||
strcmp
(
object_label
,
smack_known_web
.
smk_known
)
==
0
||
strcmp
(
subject_label
,
smack_known_web
.
smk_known
)
==
0
)
return
0
;
/*
* A star object can be accessed by any subject.
*/
...
...
security/smack/smack_lsm.c
View file @
5c8c40be
This diff is collapsed.
Click to expand it.
security/smack/smackfs.c
View file @
5c8c40be
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment