|
@@ -93,7 +93,6 @@
|
|
|
|
|
|
extern unsigned int policydb_loaded_version;
|
|
extern unsigned int policydb_loaded_version;
|
|
extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
|
|
extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
|
|
-extern int selinux_compat_net;
|
|
|
|
extern struct security_operations *security_ops;
|
|
extern struct security_operations *security_ops;
|
|
|
|
|
|
/* SECMARK reference count */
|
|
/* SECMARK reference count */
|
|
@@ -4019,72 +4018,6 @@ static int selinux_inet_sys_rcv_skb(int ifindex, char *addrp, u16 family,
|
|
SECCLASS_NODE, NODE__RECVFROM, ad);
|
|
SECCLASS_NODE, NODE__RECVFROM, ad);
|
|
}
|
|
}
|
|
|
|
|
|
-static int selinux_sock_rcv_skb_iptables_compat(struct sock *sk,
|
|
|
|
- struct sk_buff *skb,
|
|
|
|
- struct avc_audit_data *ad,
|
|
|
|
- u16 family,
|
|
|
|
- char *addrp)
|
|
|
|
-{
|
|
|
|
- int err;
|
|
|
|
- struct sk_security_struct *sksec = sk->sk_security;
|
|
|
|
- u16 sk_class;
|
|
|
|
- u32 netif_perm, node_perm, recv_perm;
|
|
|
|
- u32 port_sid, node_sid, if_sid, sk_sid;
|
|
|
|
-
|
|
|
|
- sk_sid = sksec->sid;
|
|
|
|
- sk_class = sksec->sclass;
|
|
|
|
-
|
|
|
|
- switch (sk_class) {
|
|
|
|
- case SECCLASS_UDP_SOCKET:
|
|
|
|
- netif_perm = NETIF__UDP_RECV;
|
|
|
|
- node_perm = NODE__UDP_RECV;
|
|
|
|
- recv_perm = UDP_SOCKET__RECV_MSG;
|
|
|
|
- break;
|
|
|
|
- case SECCLASS_TCP_SOCKET:
|
|
|
|
- netif_perm = NETIF__TCP_RECV;
|
|
|
|
- node_perm = NODE__TCP_RECV;
|
|
|
|
- recv_perm = TCP_SOCKET__RECV_MSG;
|
|
|
|
- break;
|
|
|
|
- case SECCLASS_DCCP_SOCKET:
|
|
|
|
- netif_perm = NETIF__DCCP_RECV;
|
|
|
|
- node_perm = NODE__DCCP_RECV;
|
|
|
|
- recv_perm = DCCP_SOCKET__RECV_MSG;
|
|
|
|
- break;
|
|
|
|
- default:
|
|
|
|
- netif_perm = NETIF__RAWIP_RECV;
|
|
|
|
- node_perm = NODE__RAWIP_RECV;
|
|
|
|
- recv_perm = 0;
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- err = sel_netif_sid(skb->iif, &if_sid);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
- err = avc_has_perm(sk_sid, if_sid, SECCLASS_NETIF, netif_perm, ad);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
-
|
|
|
|
- err = sel_netnode_sid(addrp, family, &node_sid);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
- err = avc_has_perm(sk_sid, node_sid, SECCLASS_NODE, node_perm, ad);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
-
|
|
|
|
- if (!recv_perm)
|
|
|
|
- return 0;
|
|
|
|
- err = sel_netport_sid(sk->sk_protocol,
|
|
|
|
- ntohs(ad->u.net.sport), &port_sid);
|
|
|
|
- if (unlikely(err)) {
|
|
|
|
- printk(KERN_WARNING
|
|
|
|
- "SELinux: failure in"
|
|
|
|
- " selinux_sock_rcv_skb_iptables_compat(),"
|
|
|
|
- " network port label not found\n");
|
|
|
|
- return err;
|
|
|
|
- }
|
|
|
|
- return avc_has_perm(sk_sid, port_sid, sk_class, recv_perm, ad);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
|
|
static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
|
|
u16 family)
|
|
u16 family)
|
|
{
|
|
{
|
|
@@ -4102,14 +4035,12 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb,
|
|
if (err)
|
|
if (err)
|
|
return err;
|
|
return err;
|
|
|
|
|
|
- if (selinux_compat_net)
|
|
|
|
- err = selinux_sock_rcv_skb_iptables_compat(sk, skb, &ad,
|
|
|
|
- family, addrp);
|
|
|
|
- else if (selinux_secmark_enabled())
|
|
|
|
|
|
+ if (selinux_secmark_enabled()) {
|
|
err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET,
|
|
err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET,
|
|
PACKET__RECV, &ad);
|
|
PACKET__RECV, &ad);
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
|
|
+ if (err)
|
|
|
|
+ return err;
|
|
|
|
+ }
|
|
|
|
|
|
if (selinux_policycap_netpeer) {
|
|
if (selinux_policycap_netpeer) {
|
|
err = selinux_skb_peerlbl_sid(skb, family, &peer_sid);
|
|
err = selinux_skb_peerlbl_sid(skb, family, &peer_sid);
|
|
@@ -4151,7 +4082,7 @@ static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb)
|
|
* to the selinux_sock_rcv_skb_compat() function to deal with the
|
|
* to the selinux_sock_rcv_skb_compat() function to deal with the
|
|
* special handling. We do this in an attempt to keep this function
|
|
* special handling. We do this in an attempt to keep this function
|
|
* as fast and as clean as possible. */
|
|
* as fast and as clean as possible. */
|
|
- if (selinux_compat_net || !selinux_policycap_netpeer)
|
|
|
|
|
|
+ if (!selinux_policycap_netpeer)
|
|
return selinux_sock_rcv_skb_compat(sk, skb, family);
|
|
return selinux_sock_rcv_skb_compat(sk, skb, family);
|
|
|
|
|
|
secmark_active = selinux_secmark_enabled();
|
|
secmark_active = selinux_secmark_enabled();
|
|
@@ -4516,71 +4447,6 @@ static unsigned int selinux_ipv4_output(unsigned int hooknum,
|
|
return selinux_ip_output(skb, PF_INET);
|
|
return selinux_ip_output(skb, PF_INET);
|
|
}
|
|
}
|
|
|
|
|
|
-static int selinux_ip_postroute_iptables_compat(struct sock *sk,
|
|
|
|
- int ifindex,
|
|
|
|
- struct avc_audit_data *ad,
|
|
|
|
- u16 family, char *addrp)
|
|
|
|
-{
|
|
|
|
- int err;
|
|
|
|
- struct sk_security_struct *sksec = sk->sk_security;
|
|
|
|
- u16 sk_class;
|
|
|
|
- u32 netif_perm, node_perm, send_perm;
|
|
|
|
- u32 port_sid, node_sid, if_sid, sk_sid;
|
|
|
|
-
|
|
|
|
- sk_sid = sksec->sid;
|
|
|
|
- sk_class = sksec->sclass;
|
|
|
|
-
|
|
|
|
- switch (sk_class) {
|
|
|
|
- case SECCLASS_UDP_SOCKET:
|
|
|
|
- netif_perm = NETIF__UDP_SEND;
|
|
|
|
- node_perm = NODE__UDP_SEND;
|
|
|
|
- send_perm = UDP_SOCKET__SEND_MSG;
|
|
|
|
- break;
|
|
|
|
- case SECCLASS_TCP_SOCKET:
|
|
|
|
- netif_perm = NETIF__TCP_SEND;
|
|
|
|
- node_perm = NODE__TCP_SEND;
|
|
|
|
- send_perm = TCP_SOCKET__SEND_MSG;
|
|
|
|
- break;
|
|
|
|
- case SECCLASS_DCCP_SOCKET:
|
|
|
|
- netif_perm = NETIF__DCCP_SEND;
|
|
|
|
- node_perm = NODE__DCCP_SEND;
|
|
|
|
- send_perm = DCCP_SOCKET__SEND_MSG;
|
|
|
|
- break;
|
|
|
|
- default:
|
|
|
|
- netif_perm = NETIF__RAWIP_SEND;
|
|
|
|
- node_perm = NODE__RAWIP_SEND;
|
|
|
|
- send_perm = 0;
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- err = sel_netif_sid(ifindex, &if_sid);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
- err = avc_has_perm(sk_sid, if_sid, SECCLASS_NETIF, netif_perm, ad);
|
|
|
|
- return err;
|
|
|
|
-
|
|
|
|
- err = sel_netnode_sid(addrp, family, &node_sid);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
- err = avc_has_perm(sk_sid, node_sid, SECCLASS_NODE, node_perm, ad);
|
|
|
|
- if (err)
|
|
|
|
- return err;
|
|
|
|
-
|
|
|
|
- if (send_perm != 0)
|
|
|
|
- return 0;
|
|
|
|
-
|
|
|
|
- err = sel_netport_sid(sk->sk_protocol,
|
|
|
|
- ntohs(ad->u.net.dport), &port_sid);
|
|
|
|
- if (unlikely(err)) {
|
|
|
|
- printk(KERN_WARNING
|
|
|
|
- "SELinux: failure in"
|
|
|
|
- " selinux_ip_postroute_iptables_compat(),"
|
|
|
|
- " network port label not found\n");
|
|
|
|
- return err;
|
|
|
|
- }
|
|
|
|
- return avc_has_perm(sk_sid, port_sid, sk_class, send_perm, ad);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
|
|
static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
|
|
int ifindex,
|
|
int ifindex,
|
|
u16 family)
|
|
u16 family)
|
|
@@ -4601,15 +4467,10 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
|
|
if (selinux_parse_skb(skb, &ad, &addrp, 0, &proto))
|
|
if (selinux_parse_skb(skb, &ad, &addrp, 0, &proto))
|
|
return NF_DROP;
|
|
return NF_DROP;
|
|
|
|
|
|
- if (selinux_compat_net) {
|
|
|
|
- if (selinux_ip_postroute_iptables_compat(skb->sk, ifindex,
|
|
|
|
- &ad, family, addrp))
|
|
|
|
- return NF_DROP;
|
|
|
|
- } else if (selinux_secmark_enabled()) {
|
|
|
|
|
|
+ if (selinux_secmark_enabled())
|
|
if (avc_has_perm(sksec->sid, skb->secmark,
|
|
if (avc_has_perm(sksec->sid, skb->secmark,
|
|
SECCLASS_PACKET, PACKET__SEND, &ad))
|
|
SECCLASS_PACKET, PACKET__SEND, &ad))
|
|
return NF_DROP;
|
|
return NF_DROP;
|
|
- }
|
|
|
|
|
|
|
|
if (selinux_policycap_netpeer)
|
|
if (selinux_policycap_netpeer)
|
|
if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
|
|
if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
|
|
@@ -4633,7 +4494,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex,
|
|
* to the selinux_ip_postroute_compat() function to deal with the
|
|
* to the selinux_ip_postroute_compat() function to deal with the
|
|
* special handling. We do this in an attempt to keep this function
|
|
* special handling. We do this in an attempt to keep this function
|
|
* as fast and as clean as possible. */
|
|
* as fast and as clean as possible. */
|
|
- if (selinux_compat_net || !selinux_policycap_netpeer)
|
|
|
|
|
|
+ if (!selinux_policycap_netpeer)
|
|
return selinux_ip_postroute_compat(skb, ifindex, family);
|
|
return selinux_ip_postroute_compat(skb, ifindex, family);
|
|
#ifdef CONFIG_XFRM
|
|
#ifdef CONFIG_XFRM
|
|
/* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec
|
|
/* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec
|