2 * NSA Security-Enhanced Linux (SELinux) security module
4 * This file contains the SELinux hook function implementations.
6 * Authors: Stephen Smalley, <sds@epoch.ncsc.mil>
7 * Chris Vance, <cvance@nai.com>
8 * Wayne Salamon, <wsalamon@nai.com>
9 * James Morris <jmorris@redhat.com>
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
13 * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
14 * <dgoeddel@trustedcs.com>
15 * Copyright (C) 2006, 2007 Hewlett-Packard Development Company, L.P.
16 * Paul Moore <paul.moore@hp.com>
17 * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd.
18 * Yuichi Nakamura <ynakam@hitachisoft.jp>
20 * This program is free software; you can redistribute it and/or modify
21 * it under the terms of the GNU General Public License version 2,
22 * as published by the Free Software Foundation.
25 #include <linux/init.h>
26 #include <linux/kernel.h>
27 #include <linux/ptrace.h>
28 #include <linux/errno.h>
29 #include <linux/sched.h>
30 #include <linux/security.h>
31 #include <linux/xattr.h>
32 #include <linux/capability.h>
33 #include <linux/unistd.h>
35 #include <linux/mman.h>
36 #include <linux/slab.h>
37 #include <linux/pagemap.h>
38 #include <linux/swap.h>
39 #include <linux/spinlock.h>
40 #include <linux/syscalls.h>
41 #include <linux/file.h>
42 #include <linux/namei.h>
43 #include <linux/mount.h>
44 #include <linux/ext2_fs.h>
45 #include <linux/proc_fs.h>
47 #include <linux/netfilter_ipv4.h>
48 #include <linux/netfilter_ipv6.h>
49 #include <linux/tty.h>
51 #include <net/ip.h> /* for local_port_range[] */
52 #include <net/tcp.h> /* struct or_callable used in sock_rcv_skb */
53 #include <net/net_namespace.h>
54 #include <net/netlabel.h>
55 #include <asm/uaccess.h>
56 #include <asm/ioctls.h>
57 #include <asm/atomic.h>
58 #include <linux/bitops.h>
59 #include <linux/interrupt.h>
60 #include <linux/netdevice.h> /* for network interface checks */
61 #include <linux/netlink.h>
62 #include <linux/tcp.h>
63 #include <linux/udp.h>
64 #include <linux/dccp.h>
65 #include <linux/quota.h>
66 #include <linux/un.h> /* for Unix socket types */
67 #include <net/af_unix.h> /* for Unix socket types */
68 #include <linux/parser.h>
69 #include <linux/nfs_mount.h>
71 #include <linux/hugetlb.h>
72 #include <linux/personality.h>
73 #include <linux/sysctl.h>
74 #include <linux/audit.h>
75 #include <linux/string.h>
76 #include <linux/selinux.h>
77 #include <linux/mutex.h>
86 #define XATTR_SELINUX_SUFFIX "selinux"
87 #define XATTR_NAME_SELINUX XATTR_SECURITY_PREFIX XATTR_SELINUX_SUFFIX
89 #define NUM_SEL_MNT_OPTS 4
91 extern unsigned int policydb_loaded_version
;
92 extern int selinux_nlmsg_lookup(u16 sclass
, u16 nlmsg_type
, u32
*perm
);
93 extern int selinux_compat_net
;
94 extern struct security_operations
*security_ops
;
96 /* SECMARK reference count */
97 atomic_t selinux_secmark_refcount
= ATOMIC_INIT(0);
99 #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
100 int selinux_enforcing
= 0;
102 static int __init
enforcing_setup(char *str
)
104 selinux_enforcing
= simple_strtol(str
,NULL
,0);
107 __setup("enforcing=", enforcing_setup
);
110 #ifdef CONFIG_SECURITY_SELINUX_BOOTPARAM
111 int selinux_enabled
= CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE
;
113 static int __init
selinux_enabled_setup(char *str
)
115 selinux_enabled
= simple_strtol(str
, NULL
, 0);
118 __setup("selinux=", selinux_enabled_setup
);
120 int selinux_enabled
= 1;
123 /* Original (dummy) security module. */
124 static struct security_operations
*original_ops
= NULL
;
126 /* Minimal support for a secondary security module,
127 just to allow the use of the dummy or capability modules.
128 The owlsm module can alternatively be used as a secondary
129 module as long as CONFIG_OWLSM_FD is not enabled. */
130 static struct security_operations
*secondary_ops
= NULL
;
132 /* Lists of inode and superblock security structures initialized
133 before the policy was loaded. */
134 static LIST_HEAD(superblock_security_head
);
135 static DEFINE_SPINLOCK(sb_security_lock
);
137 static struct kmem_cache
*sel_inode_cache
;
140 * selinux_secmark_enabled - Check to see if SECMARK is currently enabled
143 * This function checks the SECMARK reference counter to see if any SECMARK
144 * targets are currently configured, if the reference counter is greater than
145 * zero SECMARK is considered to be enabled. Returns true (1) if SECMARK is
146 * enabled, false (0) if SECMARK is disabled.
149 static int selinux_secmark_enabled(void)
151 return (atomic_read(&selinux_secmark_refcount
) > 0);
154 /* Allocate and free functions for each kind of security blob. */
156 static int task_alloc_security(struct task_struct
*task
)
158 struct task_security_struct
*tsec
;
160 tsec
= kzalloc(sizeof(struct task_security_struct
), GFP_KERNEL
);
165 tsec
->osid
= tsec
->sid
= tsec
->ptrace_sid
= SECINITSID_UNLABELED
;
166 task
->security
= tsec
;
171 static void task_free_security(struct task_struct
*task
)
173 struct task_security_struct
*tsec
= task
->security
;
174 task
->security
= NULL
;
178 static int inode_alloc_security(struct inode
*inode
)
180 struct task_security_struct
*tsec
= current
->security
;
181 struct inode_security_struct
*isec
;
183 isec
= kmem_cache_zalloc(sel_inode_cache
, GFP_NOFS
);
187 mutex_init(&isec
->lock
);
188 INIT_LIST_HEAD(&isec
->list
);
190 isec
->sid
= SECINITSID_UNLABELED
;
191 isec
->sclass
= SECCLASS_FILE
;
192 isec
->task_sid
= tsec
->sid
;
193 inode
->i_security
= isec
;
198 static void inode_free_security(struct inode
*inode
)
200 struct inode_security_struct
*isec
= inode
->i_security
;
201 struct superblock_security_struct
*sbsec
= inode
->i_sb
->s_security
;
203 spin_lock(&sbsec
->isec_lock
);
204 if (!list_empty(&isec
->list
))
205 list_del_init(&isec
->list
);
206 spin_unlock(&sbsec
->isec_lock
);
208 inode
->i_security
= NULL
;
209 kmem_cache_free(sel_inode_cache
, isec
);
212 static int file_alloc_security(struct file
*file
)
214 struct task_security_struct
*tsec
= current
->security
;
215 struct file_security_struct
*fsec
;
217 fsec
= kzalloc(sizeof(struct file_security_struct
), GFP_KERNEL
);
222 fsec
->sid
= tsec
->sid
;
223 fsec
->fown_sid
= tsec
->sid
;
224 file
->f_security
= fsec
;
229 static void file_free_security(struct file
*file
)
231 struct file_security_struct
*fsec
= file
->f_security
;
232 file
->f_security
= NULL
;
236 static int superblock_alloc_security(struct super_block
*sb
)
238 struct superblock_security_struct
*sbsec
;
240 sbsec
= kzalloc(sizeof(struct superblock_security_struct
), GFP_KERNEL
);
244 mutex_init(&sbsec
->lock
);
245 INIT_LIST_HEAD(&sbsec
->list
);
246 INIT_LIST_HEAD(&sbsec
->isec_head
);
247 spin_lock_init(&sbsec
->isec_lock
);
249 sbsec
->sid
= SECINITSID_UNLABELED
;
250 sbsec
->def_sid
= SECINITSID_FILE
;
251 sbsec
->mntpoint_sid
= SECINITSID_UNLABELED
;
252 sb
->s_security
= sbsec
;
257 static void superblock_free_security(struct super_block
*sb
)
259 struct superblock_security_struct
*sbsec
= sb
->s_security
;
261 spin_lock(&sb_security_lock
);
262 if (!list_empty(&sbsec
->list
))
263 list_del_init(&sbsec
->list
);
264 spin_unlock(&sb_security_lock
);
266 sb
->s_security
= NULL
;
270 static int sk_alloc_security(struct sock
*sk
, int family
, gfp_t priority
)
272 struct sk_security_struct
*ssec
;
274 ssec
= kzalloc(sizeof(*ssec
), priority
);
279 ssec
->peer_sid
= SECINITSID_UNLABELED
;
280 ssec
->sid
= SECINITSID_UNLABELED
;
281 sk
->sk_security
= ssec
;
283 selinux_netlbl_sk_security_init(ssec
, family
);
288 static void sk_free_security(struct sock
*sk
)
290 struct sk_security_struct
*ssec
= sk
->sk_security
;
292 sk
->sk_security
= NULL
;
296 /* The security server must be initialized before
297 any labeling or access decisions can be provided. */
298 extern int ss_initialized
;
300 /* The file system's label must be initialized prior to use. */
302 static char *labeling_behaviors
[6] = {
304 "uses transition SIDs",
306 "uses genfs_contexts",
307 "not configured for labeling",
308 "uses mountpoint labeling",
311 static int inode_doinit_with_dentry(struct inode
*inode
, struct dentry
*opt_dentry
);
313 static inline int inode_doinit(struct inode
*inode
)
315 return inode_doinit_with_dentry(inode
, NULL
);
326 static match_table_t tokens
= {
327 {Opt_context
, "context=%s"},
328 {Opt_fscontext
, "fscontext=%s"},
329 {Opt_defcontext
, "defcontext=%s"},
330 {Opt_rootcontext
, "rootcontext=%s"},
334 #define SEL_MOUNT_FAIL_MSG "SELinux: duplicate or incompatible mount options\n"
336 static int may_context_mount_sb_relabel(u32 sid
,
337 struct superblock_security_struct
*sbsec
,
338 struct task_security_struct
*tsec
)
342 rc
= avc_has_perm(tsec
->sid
, sbsec
->sid
, SECCLASS_FILESYSTEM
,
343 FILESYSTEM__RELABELFROM
, NULL
);
347 rc
= avc_has_perm(tsec
->sid
, sid
, SECCLASS_FILESYSTEM
,
348 FILESYSTEM__RELABELTO
, NULL
);
352 static int may_context_mount_inode_relabel(u32 sid
,
353 struct superblock_security_struct
*sbsec
,
354 struct task_security_struct
*tsec
)
357 rc
= avc_has_perm(tsec
->sid
, sbsec
->sid
, SECCLASS_FILESYSTEM
,
358 FILESYSTEM__RELABELFROM
, NULL
);
362 rc
= avc_has_perm(sid
, sbsec
->sid
, SECCLASS_FILESYSTEM
,
363 FILESYSTEM__ASSOCIATE
, NULL
);
367 static int sb_finish_set_opts(struct super_block
*sb
)
369 struct superblock_security_struct
*sbsec
= sb
->s_security
;
370 struct dentry
*root
= sb
->s_root
;
371 struct inode
*root_inode
= root
->d_inode
;
374 if (sbsec
->behavior
== SECURITY_FS_USE_XATTR
) {
375 /* Make sure that the xattr handler exists and that no
376 error other than -ENODATA is returned by getxattr on
377 the root directory. -ENODATA is ok, as this may be
378 the first boot of the SELinux kernel before we have
379 assigned xattr values to the filesystem. */
380 if (!root_inode
->i_op
->getxattr
) {
381 printk(KERN_WARNING
"SELinux: (dev %s, type %s) has no "
382 "xattr support\n", sb
->s_id
, sb
->s_type
->name
);
386 rc
= root_inode
->i_op
->getxattr(root
, XATTR_NAME_SELINUX
, NULL
, 0);
387 if (rc
< 0 && rc
!= -ENODATA
) {
388 if (rc
== -EOPNOTSUPP
)
389 printk(KERN_WARNING
"SELinux: (dev %s, type "
390 "%s) has no security xattr handler\n",
391 sb
->s_id
, sb
->s_type
->name
);
393 printk(KERN_WARNING
"SELinux: (dev %s, type "
394 "%s) getxattr errno %d\n", sb
->s_id
,
395 sb
->s_type
->name
, -rc
);
400 sbsec
->initialized
= 1;
402 if (sbsec
->behavior
> ARRAY_SIZE(labeling_behaviors
))
403 printk(KERN_ERR
"SELinux: initialized (dev %s, type %s), unknown behavior\n",
404 sb
->s_id
, sb
->s_type
->name
);
406 printk(KERN_DEBUG
"SELinux: initialized (dev %s, type %s), %s\n",
407 sb
->s_id
, sb
->s_type
->name
,
408 labeling_behaviors
[sbsec
->behavior
-1]);
410 /* Initialize the root inode. */
411 rc
= inode_doinit_with_dentry(root_inode
, root
);
413 /* Initialize any other inodes associated with the superblock, e.g.
414 inodes created prior to initial policy load or inodes created
415 during get_sb by a pseudo filesystem that directly
417 spin_lock(&sbsec
->isec_lock
);
419 if (!list_empty(&sbsec
->isec_head
)) {
420 struct inode_security_struct
*isec
=
421 list_entry(sbsec
->isec_head
.next
,
422 struct inode_security_struct
, list
);
423 struct inode
*inode
= isec
->inode
;
424 spin_unlock(&sbsec
->isec_lock
);
425 inode
= igrab(inode
);
427 if (!IS_PRIVATE(inode
))
431 spin_lock(&sbsec
->isec_lock
);
432 list_del_init(&isec
->list
);
435 spin_unlock(&sbsec
->isec_lock
);
441 * This function should allow an FS to ask what it's mount security
442 * options were so it can use those later for submounts, displaying
443 * mount options, or whatever.
445 static int selinux_get_mnt_opts(const struct super_block
*sb
,
446 struct security_mnt_opts
*opts
)
449 struct superblock_security_struct
*sbsec
= sb
->s_security
;
450 char *context
= NULL
;
454 security_init_mnt_opts(opts
);
456 if (!sbsec
->initialized
)
463 * if we ever use sbsec flags for anything other than tracking mount
464 * settings this is going to need a mask
467 /* count the number of mount options for this sb */
468 for (i
= 0; i
< 8; i
++) {
470 opts
->num_mnt_opts
++;
474 opts
->mnt_opts
= kcalloc(opts
->num_mnt_opts
, sizeof(char *), GFP_ATOMIC
);
475 if (!opts
->mnt_opts
) {
480 opts
->mnt_opts_flags
= kcalloc(opts
->num_mnt_opts
, sizeof(int), GFP_ATOMIC
);
481 if (!opts
->mnt_opts_flags
) {
487 if (sbsec
->flags
& FSCONTEXT_MNT
) {
488 rc
= security_sid_to_context(sbsec
->sid
, &context
, &len
);
491 opts
->mnt_opts
[i
] = context
;
492 opts
->mnt_opts_flags
[i
++] = FSCONTEXT_MNT
;
494 if (sbsec
->flags
& CONTEXT_MNT
) {
495 rc
= security_sid_to_context(sbsec
->mntpoint_sid
, &context
, &len
);
498 opts
->mnt_opts
[i
] = context
;
499 opts
->mnt_opts_flags
[i
++] = CONTEXT_MNT
;
501 if (sbsec
->flags
& DEFCONTEXT_MNT
) {
502 rc
= security_sid_to_context(sbsec
->def_sid
, &context
, &len
);
505 opts
->mnt_opts
[i
] = context
;
506 opts
->mnt_opts_flags
[i
++] = DEFCONTEXT_MNT
;
508 if (sbsec
->flags
& ROOTCONTEXT_MNT
) {
509 struct inode
*root
= sbsec
->sb
->s_root
->d_inode
;
510 struct inode_security_struct
*isec
= root
->i_security
;
512 rc
= security_sid_to_context(isec
->sid
, &context
, &len
);
515 opts
->mnt_opts
[i
] = context
;
516 opts
->mnt_opts_flags
[i
++] = ROOTCONTEXT_MNT
;
519 BUG_ON(i
!= opts
->num_mnt_opts
);
524 security_free_mnt_opts(opts
);
528 static int bad_option(struct superblock_security_struct
*sbsec
, char flag
,
529 u32 old_sid
, u32 new_sid
)
531 /* check if the old mount command had the same options */
532 if (sbsec
->initialized
)
533 if (!(sbsec
->flags
& flag
) ||
534 (old_sid
!= new_sid
))
537 /* check if we were passed the same options twice,
538 * aka someone passed context=a,context=b
540 if (!sbsec
->initialized
)
541 if (sbsec
->flags
& flag
)
547 * Allow filesystems with binary mount data to explicitly set mount point
548 * labeling information.
550 static int selinux_set_mnt_opts(struct super_block
*sb
,
551 struct security_mnt_opts
*opts
)
554 struct task_security_struct
*tsec
= current
->security
;
555 struct superblock_security_struct
*sbsec
= sb
->s_security
;
556 const char *name
= sb
->s_type
->name
;
557 struct inode
*inode
= sbsec
->sb
->s_root
->d_inode
;
558 struct inode_security_struct
*root_isec
= inode
->i_security
;
559 u32 fscontext_sid
= 0, context_sid
= 0, rootcontext_sid
= 0;
560 u32 defcontext_sid
= 0;
561 char **mount_options
= opts
->mnt_opts
;
562 int *flags
= opts
->mnt_opts_flags
;
563 int num_opts
= opts
->num_mnt_opts
;
565 mutex_lock(&sbsec
->lock
);
567 if (!ss_initialized
) {
569 /* Defer initialization until selinux_complete_init,
570 after the initial policy is loaded and the security
571 server is ready to handle calls. */
572 spin_lock(&sb_security_lock
);
573 if (list_empty(&sbsec
->list
))
574 list_add(&sbsec
->list
, &superblock_security_head
);
575 spin_unlock(&sb_security_lock
);
579 printk(KERN_WARNING
"Unable to set superblock options before "
580 "the security server is initialized\n");
585 * Binary mount data FS will come through this function twice. Once
586 * from an explicit call and once from the generic calls from the vfs.
587 * Since the generic VFS calls will not contain any security mount data
588 * we need to skip the double mount verification.
590 * This does open a hole in which we will not notice if the first
591 * mount using this sb set explict options and a second mount using
592 * this sb does not set any security options. (The first options
593 * will be used for both mounts)
595 if (sbsec
->initialized
&& (sb
->s_type
->fs_flags
& FS_BINARY_MOUNTDATA
)
600 * parse the mount options, check if they are valid sids.
601 * also check if someone is trying to mount the same sb more
602 * than once with different security options.
604 for (i
= 0; i
< num_opts
; i
++) {
606 rc
= security_context_to_sid(mount_options
[i
],
607 strlen(mount_options
[i
]), &sid
);
609 printk(KERN_WARNING
"SELinux: security_context_to_sid"
610 "(%s) failed for (dev %s, type %s) errno=%d\n",
611 mount_options
[i
], sb
->s_id
, name
, rc
);
618 if (bad_option(sbsec
, FSCONTEXT_MNT
, sbsec
->sid
,
620 goto out_double_mount
;
622 sbsec
->flags
|= FSCONTEXT_MNT
;
627 if (bad_option(sbsec
, CONTEXT_MNT
, sbsec
->mntpoint_sid
,
629 goto out_double_mount
;
631 sbsec
->flags
|= CONTEXT_MNT
;
633 case ROOTCONTEXT_MNT
:
634 rootcontext_sid
= sid
;
636 if (bad_option(sbsec
, ROOTCONTEXT_MNT
, root_isec
->sid
,
638 goto out_double_mount
;
640 sbsec
->flags
|= ROOTCONTEXT_MNT
;
644 defcontext_sid
= sid
;
646 if (bad_option(sbsec
, DEFCONTEXT_MNT
, sbsec
->def_sid
,
648 goto out_double_mount
;
650 sbsec
->flags
|= DEFCONTEXT_MNT
;
659 if (sbsec
->initialized
) {
660 /* previously mounted with options, but not on this attempt? */
661 if (sbsec
->flags
&& !num_opts
)
662 goto out_double_mount
;
667 if (strcmp(sb
->s_type
->name
, "proc") == 0)
670 /* Determine the labeling behavior to use for this filesystem type. */
671 rc
= security_fs_use(sb
->s_type
->name
, &sbsec
->behavior
, &sbsec
->sid
);
673 printk(KERN_WARNING
"%s: security_fs_use(%s) returned %d\n",
674 __FUNCTION__
, sb
->s_type
->name
, rc
);
678 /* sets the context of the superblock for the fs being mounted. */
681 rc
= may_context_mount_sb_relabel(fscontext_sid
, sbsec
, tsec
);
685 sbsec
->sid
= fscontext_sid
;
689 * Switch to using mount point labeling behavior.
690 * sets the label used on all file below the mountpoint, and will set
691 * the superblock context if not already set.
694 if (!fscontext_sid
) {
695 rc
= may_context_mount_sb_relabel(context_sid
, sbsec
, tsec
);
698 sbsec
->sid
= context_sid
;
700 rc
= may_context_mount_inode_relabel(context_sid
, sbsec
, tsec
);
704 if (!rootcontext_sid
)
705 rootcontext_sid
= context_sid
;
707 sbsec
->mntpoint_sid
= context_sid
;
708 sbsec
->behavior
= SECURITY_FS_USE_MNTPOINT
;
711 if (rootcontext_sid
) {
712 rc
= may_context_mount_inode_relabel(rootcontext_sid
, sbsec
, tsec
);
716 root_isec
->sid
= rootcontext_sid
;
717 root_isec
->initialized
= 1;
720 if (defcontext_sid
) {
721 if (sbsec
->behavior
!= SECURITY_FS_USE_XATTR
) {
723 printk(KERN_WARNING
"SELinux: defcontext option is "
724 "invalid for this filesystem type\n");
728 if (defcontext_sid
!= sbsec
->def_sid
) {
729 rc
= may_context_mount_inode_relabel(defcontext_sid
,
735 sbsec
->def_sid
= defcontext_sid
;
738 rc
= sb_finish_set_opts(sb
);
740 mutex_unlock(&sbsec
->lock
);
744 printk(KERN_WARNING
"SELinux: mount invalid. Same superblock, different "
745 "security settings for (dev %s, type %s)\n", sb
->s_id
, name
);
749 static void selinux_sb_clone_mnt_opts(const struct super_block
*oldsb
,
750 struct super_block
*newsb
)
752 const struct superblock_security_struct
*oldsbsec
= oldsb
->s_security
;
753 struct superblock_security_struct
*newsbsec
= newsb
->s_security
;
755 int set_fscontext
= (oldsbsec
->flags
& FSCONTEXT_MNT
);
756 int set_context
= (oldsbsec
->flags
& CONTEXT_MNT
);
757 int set_rootcontext
= (oldsbsec
->flags
& ROOTCONTEXT_MNT
);
760 * if the parent was able to be mounted it clearly had no special lsm
761 * mount options. thus we can safely put this sb on the list and deal
764 if (!ss_initialized
) {
765 spin_lock(&sb_security_lock
);
766 if (list_empty(&newsbsec
->list
))
767 list_add(&newsbsec
->list
, &superblock_security_head
);
768 spin_unlock(&sb_security_lock
);
772 /* how can we clone if the old one wasn't set up?? */
773 BUG_ON(!oldsbsec
->initialized
);
775 /* if fs is reusing a sb, just let its options stand... */
776 if (newsbsec
->initialized
)
779 mutex_lock(&newsbsec
->lock
);
781 newsbsec
->flags
= oldsbsec
->flags
;
783 newsbsec
->sid
= oldsbsec
->sid
;
784 newsbsec
->def_sid
= oldsbsec
->def_sid
;
785 newsbsec
->behavior
= oldsbsec
->behavior
;
788 u32 sid
= oldsbsec
->mntpoint_sid
;
792 if (!set_rootcontext
) {
793 struct inode
*newinode
= newsb
->s_root
->d_inode
;
794 struct inode_security_struct
*newisec
= newinode
->i_security
;
797 newsbsec
->mntpoint_sid
= sid
;
799 if (set_rootcontext
) {
800 const struct inode
*oldinode
= oldsb
->s_root
->d_inode
;
801 const struct inode_security_struct
*oldisec
= oldinode
->i_security
;
802 struct inode
*newinode
= newsb
->s_root
->d_inode
;
803 struct inode_security_struct
*newisec
= newinode
->i_security
;
805 newisec
->sid
= oldisec
->sid
;
808 sb_finish_set_opts(newsb
);
809 mutex_unlock(&newsbsec
->lock
);
812 static int selinux_parse_opts_str(char *options
,
813 struct security_mnt_opts
*opts
)
816 char *context
= NULL
, *defcontext
= NULL
;
817 char *fscontext
= NULL
, *rootcontext
= NULL
;
818 int rc
, num_mnt_opts
= 0;
820 opts
->num_mnt_opts
= 0;
822 /* Standard string-based options. */
823 while ((p
= strsep(&options
, "|")) != NULL
) {
825 substring_t args
[MAX_OPT_ARGS
];
830 token
= match_token(p
, tokens
, args
);
834 if (context
|| defcontext
) {
836 printk(KERN_WARNING SEL_MOUNT_FAIL_MSG
);
839 context
= match_strdup(&args
[0]);
849 printk(KERN_WARNING SEL_MOUNT_FAIL_MSG
);
852 fscontext
= match_strdup(&args
[0]);
859 case Opt_rootcontext
:
862 printk(KERN_WARNING SEL_MOUNT_FAIL_MSG
);
865 rootcontext
= match_strdup(&args
[0]);
873 if (context
|| defcontext
) {
875 printk(KERN_WARNING SEL_MOUNT_FAIL_MSG
);
878 defcontext
= match_strdup(&args
[0]);
887 printk(KERN_WARNING
"SELinux: unknown mount option\n");
894 opts
->mnt_opts
= kcalloc(NUM_SEL_MNT_OPTS
, sizeof(char *), GFP_ATOMIC
);
898 opts
->mnt_opts_flags
= kcalloc(NUM_SEL_MNT_OPTS
, sizeof(int), GFP_ATOMIC
);
899 if (!opts
->mnt_opts_flags
) {
900 kfree(opts
->mnt_opts
);
905 opts
->mnt_opts
[num_mnt_opts
] = fscontext
;
906 opts
->mnt_opts_flags
[num_mnt_opts
++] = FSCONTEXT_MNT
;
909 opts
->mnt_opts
[num_mnt_opts
] = context
;
910 opts
->mnt_opts_flags
[num_mnt_opts
++] = CONTEXT_MNT
;
913 opts
->mnt_opts
[num_mnt_opts
] = rootcontext
;
914 opts
->mnt_opts_flags
[num_mnt_opts
++] = ROOTCONTEXT_MNT
;
917 opts
->mnt_opts
[num_mnt_opts
] = defcontext
;
918 opts
->mnt_opts_flags
[num_mnt_opts
++] = DEFCONTEXT_MNT
;
921 opts
->num_mnt_opts
= num_mnt_opts
;
932 * string mount options parsing and call set the sbsec
934 static int superblock_doinit(struct super_block
*sb
, void *data
)
937 char *options
= data
;
938 struct security_mnt_opts opts
;
940 security_init_mnt_opts(&opts
);
945 BUG_ON(sb
->s_type
->fs_flags
& FS_BINARY_MOUNTDATA
);
947 rc
= selinux_parse_opts_str(options
, &opts
);
952 rc
= selinux_set_mnt_opts(sb
, &opts
);
955 security_free_mnt_opts(&opts
);
959 static inline u16
inode_mode_to_security_class(umode_t mode
)
961 switch (mode
& S_IFMT
) {
963 return SECCLASS_SOCK_FILE
;
965 return SECCLASS_LNK_FILE
;
967 return SECCLASS_FILE
;
969 return SECCLASS_BLK_FILE
;
973 return SECCLASS_CHR_FILE
;
975 return SECCLASS_FIFO_FILE
;
979 return SECCLASS_FILE
;
982 static inline int default_protocol_stream(int protocol
)
984 return (protocol
== IPPROTO_IP
|| protocol
== IPPROTO_TCP
);
987 static inline int default_protocol_dgram(int protocol
)
989 return (protocol
== IPPROTO_IP
|| protocol
== IPPROTO_UDP
);
992 static inline u16
socket_type_to_security_class(int family
, int type
, int protocol
)
999 return SECCLASS_UNIX_STREAM_SOCKET
;
1001 return SECCLASS_UNIX_DGRAM_SOCKET
;
1008 if (default_protocol_stream(protocol
))
1009 return SECCLASS_TCP_SOCKET
;
1011 return SECCLASS_RAWIP_SOCKET
;
1013 if (default_protocol_dgram(protocol
))
1014 return SECCLASS_UDP_SOCKET
;
1016 return SECCLASS_RAWIP_SOCKET
;
1018 return SECCLASS_DCCP_SOCKET
;
1020 return SECCLASS_RAWIP_SOCKET
;
1026 return SECCLASS_NETLINK_ROUTE_SOCKET
;
1027 case NETLINK_FIREWALL
:
1028 return SECCLASS_NETLINK_FIREWALL_SOCKET
;
1029 case NETLINK_INET_DIAG
:
1030 return SECCLASS_NETLINK_TCPDIAG_SOCKET
;
1032 return SECCLASS_NETLINK_NFLOG_SOCKET
;
1034 return SECCLASS_NETLINK_XFRM_SOCKET
;
1035 case NETLINK_SELINUX
:
1036 return SECCLASS_NETLINK_SELINUX_SOCKET
;
1038 return SECCLASS_NETLINK_AUDIT_SOCKET
;
1039 case NETLINK_IP6_FW
:
1040 return SECCLASS_NETLINK_IP6FW_SOCKET
;
1041 case NETLINK_DNRTMSG
:
1042 return SECCLASS_NETLINK_DNRT_SOCKET
;
1043 case NETLINK_KOBJECT_UEVENT
:
1044 return SECCLASS_NETLINK_KOBJECT_UEVENT_SOCKET
;
1046 return SECCLASS_NETLINK_SOCKET
;
1049 return SECCLASS_PACKET_SOCKET
;
1051 return SECCLASS_KEY_SOCKET
;
1053 return SECCLASS_APPLETALK_SOCKET
;
1056 return SECCLASS_SOCKET
;
1059 #ifdef CONFIG_PROC_FS
1060 static int selinux_proc_get_sid(struct proc_dir_entry
*de
,
1065 char *buffer
, *path
, *end
;
1067 buffer
= (char*)__get_free_page(GFP_KERNEL
);
1072 end
= buffer
+buflen
;
1077 while (de
&& de
!= de
->parent
) {
1078 buflen
-= de
->namelen
+ 1;
1082 memcpy(end
, de
->name
, de
->namelen
);
1087 rc
= security_genfs_sid("proc", path
, tclass
, sid
);
1088 free_page((unsigned long)buffer
);
1092 static int selinux_proc_get_sid(struct proc_dir_entry
*de
,
1100 /* The inode's security attributes must be initialized before first use. */
1101 static int inode_doinit_with_dentry(struct inode
*inode
, struct dentry
*opt_dentry
)
1103 struct superblock_security_struct
*sbsec
= NULL
;
1104 struct inode_security_struct
*isec
= inode
->i_security
;
1106 struct dentry
*dentry
;
1107 #define INITCONTEXTLEN 255
1108 char *context
= NULL
;
1112 if (isec
->initialized
)
1115 mutex_lock(&isec
->lock
);
1116 if (isec
->initialized
)
1119 sbsec
= inode
->i_sb
->s_security
;
1120 if (!sbsec
->initialized
) {
1121 /* Defer initialization until selinux_complete_init,
1122 after the initial policy is loaded and the security
1123 server is ready to handle calls. */
1124 spin_lock(&sbsec
->isec_lock
);
1125 if (list_empty(&isec
->list
))
1126 list_add(&isec
->list
, &sbsec
->isec_head
);
1127 spin_unlock(&sbsec
->isec_lock
);
1131 switch (sbsec
->behavior
) {
1132 case SECURITY_FS_USE_XATTR
:
1133 if (!inode
->i_op
->getxattr
) {
1134 isec
->sid
= sbsec
->def_sid
;
1138 /* Need a dentry, since the xattr API requires one.
1139 Life would be simpler if we could just pass the inode. */
1141 /* Called from d_instantiate or d_splice_alias. */
1142 dentry
= dget(opt_dentry
);
1144 /* Called from selinux_complete_init, try to find a dentry. */
1145 dentry
= d_find_alias(inode
);
1148 printk(KERN_WARNING
"%s: no dentry for dev=%s "
1149 "ino=%ld\n", __FUNCTION__
, inode
->i_sb
->s_id
,
1154 len
= INITCONTEXTLEN
;
1155 context
= kmalloc(len
, GFP_NOFS
);
1161 rc
= inode
->i_op
->getxattr(dentry
, XATTR_NAME_SELINUX
,
1163 if (rc
== -ERANGE
) {
1164 /* Need a larger buffer. Query for the right size. */
1165 rc
= inode
->i_op
->getxattr(dentry
, XATTR_NAME_SELINUX
,
1173 context
= kmalloc(len
, GFP_NOFS
);
1179 rc
= inode
->i_op
->getxattr(dentry
,
1185 if (rc
!= -ENODATA
) {
1186 printk(KERN_WARNING
"%s: getxattr returned "
1187 "%d for dev=%s ino=%ld\n", __FUNCTION__
,
1188 -rc
, inode
->i_sb
->s_id
, inode
->i_ino
);
1192 /* Map ENODATA to the default file SID */
1193 sid
= sbsec
->def_sid
;
1196 rc
= security_context_to_sid_default(context
, rc
, &sid
,
1200 printk(KERN_WARNING
"%s: context_to_sid(%s) "
1201 "returned %d for dev=%s ino=%ld\n",
1202 __FUNCTION__
, context
, -rc
,
1203 inode
->i_sb
->s_id
, inode
->i_ino
);
1205 /* Leave with the unlabeled SID */
1213 case SECURITY_FS_USE_TASK
:
1214 isec
->sid
= isec
->task_sid
;
1216 case SECURITY_FS_USE_TRANS
:
1217 /* Default to the fs SID. */
1218 isec
->sid
= sbsec
->sid
;
1220 /* Try to obtain a transition SID. */
1221 isec
->sclass
= inode_mode_to_security_class(inode
->i_mode
);
1222 rc
= security_transition_sid(isec
->task_sid
,
1230 case SECURITY_FS_USE_MNTPOINT
:
1231 isec
->sid
= sbsec
->mntpoint_sid
;
1234 /* Default to the fs superblock SID. */
1235 isec
->sid
= sbsec
->sid
;
1238 struct proc_inode
*proci
= PROC_I(inode
);
1240 isec
->sclass
= inode_mode_to_security_class(inode
->i_mode
);
1241 rc
= selinux_proc_get_sid(proci
->pde
,
1252 isec
->initialized
= 1;
1255 mutex_unlock(&isec
->lock
);
1257 if (isec
->sclass
== SECCLASS_FILE
)
1258 isec
->sclass
= inode_mode_to_security_class(inode
->i_mode
);
1262 /* Convert a Linux signal to an access vector. */
1263 static inline u32
signal_to_av(int sig
)
1269 /* Commonly granted from child to parent. */
1270 perm
= PROCESS__SIGCHLD
;
1273 /* Cannot be caught or ignored */
1274 perm
= PROCESS__SIGKILL
;
1277 /* Cannot be caught or ignored */
1278 perm
= PROCESS__SIGSTOP
;
1281 /* All other signals. */
1282 perm
= PROCESS__SIGNAL
;
1289 /* Check permission betweeen a pair of tasks, e.g. signal checks,
1290 fork check, ptrace check, etc. */
1291 static int task_has_perm(struct task_struct
*tsk1
,
1292 struct task_struct
*tsk2
,
1295 struct task_security_struct
*tsec1
, *tsec2
;
1297 tsec1
= tsk1
->security
;
1298 tsec2
= tsk2
->security
;
1299 return avc_has_perm(tsec1
->sid
, tsec2
->sid
,
1300 SECCLASS_PROCESS
, perms
, NULL
);
1303 #if CAP_LAST_CAP > 63
1304 #error Fix SELinux to handle capabilities > 63.
1307 /* Check whether a task is allowed to use a capability. */
1308 static int task_has_capability(struct task_struct
*tsk
,
1311 struct task_security_struct
*tsec
;
1312 struct avc_audit_data ad
;
1314 u32 av
= CAP_TO_MASK(cap
);
1316 tsec
= tsk
->security
;
1318 AVC_AUDIT_DATA_INIT(&ad
,CAP
);
1322 switch (CAP_TO_INDEX(cap
)) {
1324 sclass
= SECCLASS_CAPABILITY
;
1327 sclass
= SECCLASS_CAPABILITY2
;
1331 "SELinux: out of range capability %d\n", cap
);
1334 return avc_has_perm(tsec
->sid
, tsec
->sid
, sclass
, av
, &ad
);
1337 /* Check whether a task is allowed to use a system operation. */
1338 static int task_has_system(struct task_struct
*tsk
,
1341 struct task_security_struct
*tsec
;
1343 tsec
= tsk
->security
;
1345 return avc_has_perm(tsec
->sid
, SECINITSID_KERNEL
,
1346 SECCLASS_SYSTEM
, perms
, NULL
);
1349 /* Check whether a task has a particular permission to an inode.
1350 The 'adp' parameter is optional and allows other audit
1351 data to be passed (e.g. the dentry). */
1352 static int inode_has_perm(struct task_struct
*tsk
,
1353 struct inode
*inode
,
1355 struct avc_audit_data
*adp
)
1357 struct task_security_struct
*tsec
;
1358 struct inode_security_struct
*isec
;
1359 struct avc_audit_data ad
;
1361 if (unlikely (IS_PRIVATE (inode
)))
1364 tsec
= tsk
->security
;
1365 isec
= inode
->i_security
;
1369 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1370 ad
.u
.fs
.inode
= inode
;
1373 return avc_has_perm(tsec
->sid
, isec
->sid
, isec
->sclass
, perms
, adp
);
1376 /* Same as inode_has_perm, but pass explicit audit data containing
1377 the dentry to help the auditing code to more easily generate the
1378 pathname if needed. */
1379 static inline int dentry_has_perm(struct task_struct
*tsk
,
1380 struct vfsmount
*mnt
,
1381 struct dentry
*dentry
,
1384 struct inode
*inode
= dentry
->d_inode
;
1385 struct avc_audit_data ad
;
1386 AVC_AUDIT_DATA_INIT(&ad
,FS
);
1387 ad
.u
.fs
.path
.mnt
= mnt
;
1388 ad
.u
.fs
.path
.dentry
= dentry
;
1389 return inode_has_perm(tsk
, inode
, av
, &ad
);
1392 /* Check whether a task can use an open file descriptor to
1393 access an inode in a given way. Check access to the
1394 descriptor itself, and then use dentry_has_perm to
1395 check a particular permission to the file.
1396 Access to the descriptor is implicitly granted if it
1397 has the same SID as the process. If av is zero, then
1398 access to the file is not checked, e.g. for cases
1399 where only the descriptor is affected like seek. */
1400 static int file_has_perm(struct task_struct
*tsk
,
1404 struct task_security_struct
*tsec
= tsk
->security
;
1405 struct file_security_struct
*fsec
= file
->f_security
;
1406 struct inode
*inode
= file
->f_path
.dentry
->d_inode
;
1407 struct avc_audit_data ad
;
1410 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1411 ad
.u
.fs
.path
= file
->f_path
;
1413 if (tsec
->sid
!= fsec
->sid
) {
1414 rc
= avc_has_perm(tsec
->sid
, fsec
->sid
,
1422 /* av is zero if only checking access to the descriptor. */
1424 return inode_has_perm(tsk
, inode
, av
, &ad
);
1429 /* Check whether a task can create a file. */
1430 static int may_create(struct inode
*dir
,
1431 struct dentry
*dentry
,
1434 struct task_security_struct
*tsec
;
1435 struct inode_security_struct
*dsec
;
1436 struct superblock_security_struct
*sbsec
;
1438 struct avc_audit_data ad
;
1441 tsec
= current
->security
;
1442 dsec
= dir
->i_security
;
1443 sbsec
= dir
->i_sb
->s_security
;
1445 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1446 ad
.u
.fs
.path
.dentry
= dentry
;
1448 rc
= avc_has_perm(tsec
->sid
, dsec
->sid
, SECCLASS_DIR
,
1449 DIR__ADD_NAME
| DIR__SEARCH
,
1454 if (tsec
->create_sid
&& sbsec
->behavior
!= SECURITY_FS_USE_MNTPOINT
) {
1455 newsid
= tsec
->create_sid
;
1457 rc
= security_transition_sid(tsec
->sid
, dsec
->sid
, tclass
,
1463 rc
= avc_has_perm(tsec
->sid
, newsid
, tclass
, FILE__CREATE
, &ad
);
1467 return avc_has_perm(newsid
, sbsec
->sid
,
1468 SECCLASS_FILESYSTEM
,
1469 FILESYSTEM__ASSOCIATE
, &ad
);
1472 /* Check whether a task can create a key. */
1473 static int may_create_key(u32 ksid
,
1474 struct task_struct
*ctx
)
1476 struct task_security_struct
*tsec
;
1478 tsec
= ctx
->security
;
1480 return avc_has_perm(tsec
->sid
, ksid
, SECCLASS_KEY
, KEY__CREATE
, NULL
);
1484 #define MAY_UNLINK 1
1487 /* Check whether a task can link, unlink, or rmdir a file/directory. */
1488 static int may_link(struct inode
*dir
,
1489 struct dentry
*dentry
,
1493 struct task_security_struct
*tsec
;
1494 struct inode_security_struct
*dsec
, *isec
;
1495 struct avc_audit_data ad
;
1499 tsec
= current
->security
;
1500 dsec
= dir
->i_security
;
1501 isec
= dentry
->d_inode
->i_security
;
1503 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1504 ad
.u
.fs
.path
.dentry
= dentry
;
1507 av
|= (kind
? DIR__REMOVE_NAME
: DIR__ADD_NAME
);
1508 rc
= avc_has_perm(tsec
->sid
, dsec
->sid
, SECCLASS_DIR
, av
, &ad
);
1523 printk(KERN_WARNING
"may_link: unrecognized kind %d\n", kind
);
1527 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, isec
->sclass
, av
, &ad
);
1531 static inline int may_rename(struct inode
*old_dir
,
1532 struct dentry
*old_dentry
,
1533 struct inode
*new_dir
,
1534 struct dentry
*new_dentry
)
1536 struct task_security_struct
*tsec
;
1537 struct inode_security_struct
*old_dsec
, *new_dsec
, *old_isec
, *new_isec
;
1538 struct avc_audit_data ad
;
1540 int old_is_dir
, new_is_dir
;
1543 tsec
= current
->security
;
1544 old_dsec
= old_dir
->i_security
;
1545 old_isec
= old_dentry
->d_inode
->i_security
;
1546 old_is_dir
= S_ISDIR(old_dentry
->d_inode
->i_mode
);
1547 new_dsec
= new_dir
->i_security
;
1549 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1551 ad
.u
.fs
.path
.dentry
= old_dentry
;
1552 rc
= avc_has_perm(tsec
->sid
, old_dsec
->sid
, SECCLASS_DIR
,
1553 DIR__REMOVE_NAME
| DIR__SEARCH
, &ad
);
1556 rc
= avc_has_perm(tsec
->sid
, old_isec
->sid
,
1557 old_isec
->sclass
, FILE__RENAME
, &ad
);
1560 if (old_is_dir
&& new_dir
!= old_dir
) {
1561 rc
= avc_has_perm(tsec
->sid
, old_isec
->sid
,
1562 old_isec
->sclass
, DIR__REPARENT
, &ad
);
1567 ad
.u
.fs
.path
.dentry
= new_dentry
;
1568 av
= DIR__ADD_NAME
| DIR__SEARCH
;
1569 if (new_dentry
->d_inode
)
1570 av
|= DIR__REMOVE_NAME
;
1571 rc
= avc_has_perm(tsec
->sid
, new_dsec
->sid
, SECCLASS_DIR
, av
, &ad
);
1574 if (new_dentry
->d_inode
) {
1575 new_isec
= new_dentry
->d_inode
->i_security
;
1576 new_is_dir
= S_ISDIR(new_dentry
->d_inode
->i_mode
);
1577 rc
= avc_has_perm(tsec
->sid
, new_isec
->sid
,
1579 (new_is_dir
? DIR__RMDIR
: FILE__UNLINK
), &ad
);
1587 /* Check whether a task can perform a filesystem operation. */
1588 static int superblock_has_perm(struct task_struct
*tsk
,
1589 struct super_block
*sb
,
1591 struct avc_audit_data
*ad
)
1593 struct task_security_struct
*tsec
;
1594 struct superblock_security_struct
*sbsec
;
1596 tsec
= tsk
->security
;
1597 sbsec
= sb
->s_security
;
1598 return avc_has_perm(tsec
->sid
, sbsec
->sid
, SECCLASS_FILESYSTEM
,
1602 /* Convert a Linux mode and permission mask to an access vector. */
1603 static inline u32
file_mask_to_av(int mode
, int mask
)
1607 if ((mode
& S_IFMT
) != S_IFDIR
) {
1608 if (mask
& MAY_EXEC
)
1609 av
|= FILE__EXECUTE
;
1610 if (mask
& MAY_READ
)
1613 if (mask
& MAY_APPEND
)
1615 else if (mask
& MAY_WRITE
)
1619 if (mask
& MAY_EXEC
)
1621 if (mask
& MAY_WRITE
)
1623 if (mask
& MAY_READ
)
1630 /* Convert a Linux file to an access vector. */
1631 static inline u32
file_to_av(struct file
*file
)
1635 if (file
->f_mode
& FMODE_READ
)
1637 if (file
->f_mode
& FMODE_WRITE
) {
1638 if (file
->f_flags
& O_APPEND
)
1645 * Special file opened with flags 3 for ioctl-only use.
1653 /* Hook functions begin here. */
1655 static int selinux_ptrace(struct task_struct
*parent
, struct task_struct
*child
)
1657 struct task_security_struct
*psec
= parent
->security
;
1658 struct task_security_struct
*csec
= child
->security
;
1661 rc
= secondary_ops
->ptrace(parent
,child
);
1665 rc
= task_has_perm(parent
, child
, PROCESS__PTRACE
);
1666 /* Save the SID of the tracing process for later use in apply_creds. */
1667 if (!(child
->ptrace
& PT_PTRACED
) && !rc
)
1668 csec
->ptrace_sid
= psec
->sid
;
1672 static int selinux_capget(struct task_struct
*target
, kernel_cap_t
*effective
,
1673 kernel_cap_t
*inheritable
, kernel_cap_t
*permitted
)
1677 error
= task_has_perm(current
, target
, PROCESS__GETCAP
);
1681 return secondary_ops
->capget(target
, effective
, inheritable
, permitted
);
1684 static int selinux_capset_check(struct task_struct
*target
, kernel_cap_t
*effective
,
1685 kernel_cap_t
*inheritable
, kernel_cap_t
*permitted
)
1689 error
= secondary_ops
->capset_check(target
, effective
, inheritable
, permitted
);
1693 return task_has_perm(current
, target
, PROCESS__SETCAP
);
1696 static void selinux_capset_set(struct task_struct
*target
, kernel_cap_t
*effective
,
1697 kernel_cap_t
*inheritable
, kernel_cap_t
*permitted
)
1699 secondary_ops
->capset_set(target
, effective
, inheritable
, permitted
);
1702 static int selinux_capable(struct task_struct
*tsk
, int cap
)
1706 rc
= secondary_ops
->capable(tsk
, cap
);
1710 return task_has_capability(tsk
,cap
);
1713 static int selinux_sysctl_get_sid(ctl_table
*table
, u16 tclass
, u32
*sid
)
1716 char *buffer
, *path
, *end
;
1719 buffer
= (char*)__get_free_page(GFP_KERNEL
);
1724 end
= buffer
+buflen
;
1730 const char *name
= table
->procname
;
1731 size_t namelen
= strlen(name
);
1732 buflen
-= namelen
+ 1;
1736 memcpy(end
, name
, namelen
);
1739 table
= table
->parent
;
1745 memcpy(end
, "/sys", 4);
1747 rc
= security_genfs_sid("proc", path
, tclass
, sid
);
1749 free_page((unsigned long)buffer
);
1754 static int selinux_sysctl(ctl_table
*table
, int op
)
1758 struct task_security_struct
*tsec
;
1762 rc
= secondary_ops
->sysctl(table
, op
);
1766 tsec
= current
->security
;
1768 rc
= selinux_sysctl_get_sid(table
, (op
== 0001) ?
1769 SECCLASS_DIR
: SECCLASS_FILE
, &tsid
);
1771 /* Default to the well-defined sysctl SID. */
1772 tsid
= SECINITSID_SYSCTL
;
1775 /* The op values are "defined" in sysctl.c, thereby creating
1776 * a bad coupling between this module and sysctl.c */
1778 error
= avc_has_perm(tsec
->sid
, tsid
,
1779 SECCLASS_DIR
, DIR__SEARCH
, NULL
);
1787 error
= avc_has_perm(tsec
->sid
, tsid
,
1788 SECCLASS_FILE
, av
, NULL
);
1794 static int selinux_quotactl(int cmds
, int type
, int id
, struct super_block
*sb
)
1807 rc
= superblock_has_perm(current
,
1809 FILESYSTEM__QUOTAMOD
, NULL
);
1814 rc
= superblock_has_perm(current
,
1816 FILESYSTEM__QUOTAGET
, NULL
);
1819 rc
= 0; /* let the kernel handle invalid cmds */
1825 static int selinux_quota_on(struct dentry
*dentry
)
1827 return dentry_has_perm(current
, NULL
, dentry
, FILE__QUOTAON
);
1830 static int selinux_syslog(int type
)
1834 rc
= secondary_ops
->syslog(type
);
1839 case 3: /* Read last kernel messages */
1840 case 10: /* Return size of the log buffer */
1841 rc
= task_has_system(current
, SYSTEM__SYSLOG_READ
);
1843 case 6: /* Disable logging to console */
1844 case 7: /* Enable logging to console */
1845 case 8: /* Set level of messages printed to console */
1846 rc
= task_has_system(current
, SYSTEM__SYSLOG_CONSOLE
);
1848 case 0: /* Close log */
1849 case 1: /* Open log */
1850 case 2: /* Read from log */
1851 case 4: /* Read/clear last kernel messages */
1852 case 5: /* Clear ring buffer */
1854 rc
= task_has_system(current
, SYSTEM__SYSLOG_MOD
);
1861 * Check that a process has enough memory to allocate a new virtual
1862 * mapping. 0 means there is enough memory for the allocation to
1863 * succeed and -ENOMEM implies there is not.
1865 * Note that secondary_ops->capable and task_has_perm_noaudit return 0
1866 * if the capability is granted, but __vm_enough_memory requires 1 if
1867 * the capability is granted.
1869 * Do not audit the selinux permission check, as this is applied to all
1870 * processes that allocate mappings.
1872 static int selinux_vm_enough_memory(struct mm_struct
*mm
, long pages
)
1874 int rc
, cap_sys_admin
= 0;
1875 struct task_security_struct
*tsec
= current
->security
;
1877 rc
= secondary_ops
->capable(current
, CAP_SYS_ADMIN
);
1879 rc
= avc_has_perm_noaudit(tsec
->sid
, tsec
->sid
,
1880 SECCLASS_CAPABILITY
,
1881 CAP_TO_MASK(CAP_SYS_ADMIN
),
1888 return __vm_enough_memory(mm
, pages
, cap_sys_admin
);
1891 /* binprm security operations */
1893 static int selinux_bprm_alloc_security(struct linux_binprm
*bprm
)
1895 struct bprm_security_struct
*bsec
;
1897 bsec
= kzalloc(sizeof(struct bprm_security_struct
), GFP_KERNEL
);
1902 bsec
->sid
= SECINITSID_UNLABELED
;
1905 bprm
->security
= bsec
;
1909 static int selinux_bprm_set_security(struct linux_binprm
*bprm
)
1911 struct task_security_struct
*tsec
;
1912 struct inode
*inode
= bprm
->file
->f_path
.dentry
->d_inode
;
1913 struct inode_security_struct
*isec
;
1914 struct bprm_security_struct
*bsec
;
1916 struct avc_audit_data ad
;
1919 rc
= secondary_ops
->bprm_set_security(bprm
);
1923 bsec
= bprm
->security
;
1928 tsec
= current
->security
;
1929 isec
= inode
->i_security
;
1931 /* Default to the current task SID. */
1932 bsec
->sid
= tsec
->sid
;
1934 /* Reset fs, key, and sock SIDs on execve. */
1935 tsec
->create_sid
= 0;
1936 tsec
->keycreate_sid
= 0;
1937 tsec
->sockcreate_sid
= 0;
1939 if (tsec
->exec_sid
) {
1940 newsid
= tsec
->exec_sid
;
1941 /* Reset exec SID on execve. */
1944 /* Check for a default transition on this program. */
1945 rc
= security_transition_sid(tsec
->sid
, isec
->sid
,
1946 SECCLASS_PROCESS
, &newsid
);
1951 AVC_AUDIT_DATA_INIT(&ad
, FS
);
1952 ad
.u
.fs
.path
= bprm
->file
->f_path
;
1954 if (bprm
->file
->f_path
.mnt
->mnt_flags
& MNT_NOSUID
)
1957 if (tsec
->sid
== newsid
) {
1958 rc
= avc_has_perm(tsec
->sid
, isec
->sid
,
1959 SECCLASS_FILE
, FILE__EXECUTE_NO_TRANS
, &ad
);
1963 /* Check permissions for the transition. */
1964 rc
= avc_has_perm(tsec
->sid
, newsid
,
1965 SECCLASS_PROCESS
, PROCESS__TRANSITION
, &ad
);
1969 rc
= avc_has_perm(newsid
, isec
->sid
,
1970 SECCLASS_FILE
, FILE__ENTRYPOINT
, &ad
);
1974 /* Clear any possibly unsafe personality bits on exec: */
1975 current
->personality
&= ~PER_CLEAR_ON_SETID
;
1977 /* Set the security field to the new SID. */
1985 static int selinux_bprm_check_security (struct linux_binprm
*bprm
)
1987 return secondary_ops
->bprm_check_security(bprm
);
1991 static int selinux_bprm_secureexec (struct linux_binprm
*bprm
)
1993 struct task_security_struct
*tsec
= current
->security
;
1996 if (tsec
->osid
!= tsec
->sid
) {
1997 /* Enable secure mode for SIDs transitions unless
1998 the noatsecure permission is granted between
1999 the two SIDs, i.e. ahp returns 0. */
2000 atsecure
= avc_has_perm(tsec
->osid
, tsec
->sid
,
2002 PROCESS__NOATSECURE
, NULL
);
2005 return (atsecure
|| secondary_ops
->bprm_secureexec(bprm
));
2008 static void selinux_bprm_free_security(struct linux_binprm
*bprm
)
2010 kfree(bprm
->security
);
2011 bprm
->security
= NULL
;
2014 extern struct vfsmount
*selinuxfs_mount
;
2015 extern struct dentry
*selinux_null
;
2017 /* Derived from fs/exec.c:flush_old_files. */
2018 static inline void flush_unauthorized_files(struct files_struct
* files
)
2020 struct avc_audit_data ad
;
2021 struct file
*file
, *devnull
= NULL
;
2022 struct tty_struct
*tty
;
2023 struct fdtable
*fdt
;
2027 mutex_lock(&tty_mutex
);
2028 tty
= get_current_tty();
2031 file
= list_entry(tty
->tty_files
.next
, typeof(*file
), f_u
.fu_list
);
2033 /* Revalidate access to controlling tty.
2034 Use inode_has_perm on the tty inode directly rather
2035 than using file_has_perm, as this particular open
2036 file may belong to another process and we are only
2037 interested in the inode-based check here. */
2038 struct inode
*inode
= file
->f_path
.dentry
->d_inode
;
2039 if (inode_has_perm(current
, inode
,
2040 FILE__READ
| FILE__WRITE
, NULL
)) {
2046 mutex_unlock(&tty_mutex
);
2047 /* Reset controlling tty. */
2051 /* Revalidate access to inherited open files. */
2053 AVC_AUDIT_DATA_INIT(&ad
,FS
);
2055 spin_lock(&files
->file_lock
);
2057 unsigned long set
, i
;
2062 fdt
= files_fdtable(files
);
2063 if (i
>= fdt
->max_fds
)
2065 set
= fdt
->open_fds
->fds_bits
[j
];
2068 spin_unlock(&files
->file_lock
);
2069 for ( ; set
; i
++,set
>>= 1) {
2074 if (file_has_perm(current
,
2076 file_to_av(file
))) {
2078 fd
= get_unused_fd();
2088 devnull
= dentry_open(dget(selinux_null
), mntget(selinuxfs_mount
), O_RDWR
);
2089 if (IS_ERR(devnull
)) {
2096 fd_install(fd
, devnull
);
2101 spin_lock(&files
->file_lock
);
2104 spin_unlock(&files
->file_lock
);
2107 static void selinux_bprm_apply_creds(struct linux_binprm
*bprm
, int unsafe
)
2109 struct task_security_struct
*tsec
;
2110 struct bprm_security_struct
*bsec
;
2114 secondary_ops
->bprm_apply_creds(bprm
, unsafe
);
2116 tsec
= current
->security
;
2118 bsec
= bprm
->security
;
2121 tsec
->osid
= tsec
->sid
;
2123 if (tsec
->sid
!= sid
) {
2124 /* Check for shared state. If not ok, leave SID
2125 unchanged and kill. */
2126 if (unsafe
& LSM_UNSAFE_SHARE
) {
2127 rc
= avc_has_perm(tsec
->sid
, sid
, SECCLASS_PROCESS
,
2128 PROCESS__SHARE
, NULL
);
2135 /* Check for ptracing, and update the task SID if ok.
2136 Otherwise, leave SID unchanged and kill. */
2137 if (unsafe
& (LSM_UNSAFE_PTRACE
| LSM_UNSAFE_PTRACE_CAP
)) {
2138 rc
= avc_has_perm(tsec
->ptrace_sid
, sid
,
2139 SECCLASS_PROCESS
, PROCESS__PTRACE
,
2151 * called after apply_creds without the task lock held
2153 static void selinux_bprm_post_apply_creds(struct linux_binprm
*bprm
)
2155 struct task_security_struct
*tsec
;
2156 struct rlimit
*rlim
, *initrlim
;
2157 struct itimerval itimer
;
2158 struct bprm_security_struct
*bsec
;
2161 tsec
= current
->security
;
2162 bsec
= bprm
->security
;
2165 force_sig_specific(SIGKILL
, current
);
2168 if (tsec
->osid
== tsec
->sid
)
2171 /* Close files for which the new task SID is not authorized. */
2172 flush_unauthorized_files(current
->files
);
2174 /* Check whether the new SID can inherit signal state
2175 from the old SID. If not, clear itimers to avoid
2176 subsequent signal generation and flush and unblock
2177 signals. This must occur _after_ the task SID has
2178 been updated so that any kill done after the flush
2179 will be checked against the new SID. */
2180 rc
= avc_has_perm(tsec
->osid
, tsec
->sid
, SECCLASS_PROCESS
,
2181 PROCESS__SIGINH
, NULL
);
2183 memset(&itimer
, 0, sizeof itimer
);
2184 for (i
= 0; i
< 3; i
++)
2185 do_setitimer(i
, &itimer
, NULL
);
2186 flush_signals(current
);
2187 spin_lock_irq(¤t
->sighand
->siglock
);
2188 flush_signal_handlers(current
, 1);
2189 sigemptyset(¤t
->blocked
);
2190 recalc_sigpending();
2191 spin_unlock_irq(¤t
->sighand
->siglock
);
2194 /* Always clear parent death signal on SID transitions. */
2195 current
->pdeath_signal
= 0;
2197 /* Check whether the new SID can inherit resource limits
2198 from the old SID. If not, reset all soft limits to
2199 the lower of the current task's hard limit and the init
2200 task's soft limit. Note that the setting of hard limits
2201 (even to lower them) can be controlled by the setrlimit
2202 check. The inclusion of the init task's soft limit into
2203 the computation is to avoid resetting soft limits higher
2204 than the default soft limit for cases where the default
2205 is lower than the hard limit, e.g. RLIMIT_CORE or
2207 rc
= avc_has_perm(tsec
->osid
, tsec
->sid
, SECCLASS_PROCESS
,
2208 PROCESS__RLIMITINH
, NULL
);
2210 for (i
= 0; i
< RLIM_NLIMITS
; i
++) {
2211 rlim
= current
->signal
->rlim
+ i
;
2212 initrlim
= init_task
.signal
->rlim
+i
;
2213 rlim
->rlim_cur
= min(rlim
->rlim_max
,initrlim
->rlim_cur
);
2215 if (current
->signal
->rlim
[RLIMIT_CPU
].rlim_cur
!= RLIM_INFINITY
) {
2217 * This will cause RLIMIT_CPU calculations
2220 current
->it_prof_expires
= jiffies_to_cputime(1);
2224 /* Wake up the parent if it is waiting so that it can
2225 recheck wait permission to the new task SID. */
2226 wake_up_interruptible(¤t
->parent
->signal
->wait_chldexit
);
2229 /* superblock security operations */
2231 static int selinux_sb_alloc_security(struct super_block
*sb
)
2233 return superblock_alloc_security(sb
);
2236 static void selinux_sb_free_security(struct super_block
*sb
)
2238 superblock_free_security(sb
);
2241 static inline int match_prefix(char *prefix
, int plen
, char *option
, int olen
)
2246 return !memcmp(prefix
, option
, plen
);
2249 static inline int selinux_option(char *option
, int len
)
2251 return (match_prefix("context=", sizeof("context=")-1, option
, len
) ||
2252 match_prefix("fscontext=", sizeof("fscontext=")-1, option
, len
) ||
2253 match_prefix("defcontext=", sizeof("defcontext=")-1, option
, len
) ||
2254 match_prefix("rootcontext=", sizeof("rootcontext=")-1, option
, len
));
2257 static inline void take_option(char **to
, char *from
, int *first
, int len
)
2264 memcpy(*to
, from
, len
);
2268 static inline void take_selinux_option(char **to
, char *from
, int *first
,
2271 int current_size
= 0;
2280 while (current_size
< len
) {
2290 static int selinux_sb_copy_data(char *orig
, char *copy
)
2292 int fnosec
, fsec
, rc
= 0;
2293 char *in_save
, *in_curr
, *in_end
;
2294 char *sec_curr
, *nosec_save
, *nosec
;
2300 nosec
= (char *)get_zeroed_page(GFP_KERNEL
);
2308 in_save
= in_end
= orig
;
2312 open_quote
= !open_quote
;
2313 if ((*in_end
== ',' && open_quote
== 0) ||
2315 int len
= in_end
- in_curr
;
2317 if (selinux_option(in_curr
, len
))
2318 take_selinux_option(&sec_curr
, in_curr
, &fsec
, len
);
2320 take_option(&nosec
, in_curr
, &fnosec
, len
);
2322 in_curr
= in_end
+ 1;
2324 } while (*in_end
++);
2326 strcpy(in_save
, nosec_save
);
2327 free_page((unsigned long)nosec_save
);
2332 static int selinux_sb_kern_mount(struct super_block
*sb
, void *data
)
2334 struct avc_audit_data ad
;
2337 rc
= superblock_doinit(sb
, data
);
2341 AVC_AUDIT_DATA_INIT(&ad
,FS
);
2342 ad
.u
.fs
.path
.dentry
= sb
->s_root
;
2343 return superblock_has_perm(current
, sb
, FILESYSTEM__MOUNT
, &ad
);
2346 static int selinux_sb_statfs(struct dentry
*dentry
)
2348 struct avc_audit_data ad
;
2350 AVC_AUDIT_DATA_INIT(&ad
,FS
);
2351 ad
.u
.fs
.path
.dentry
= dentry
->d_sb
->s_root
;
2352 return superblock_has_perm(current
, dentry
->d_sb
, FILESYSTEM__GETATTR
, &ad
);
2355 static int selinux_mount(char * dev_name
,
2356 struct nameidata
*nd
,
2358 unsigned long flags
,
2363 rc
= secondary_ops
->sb_mount(dev_name
, nd
, type
, flags
, data
);
2367 if (flags
& MS_REMOUNT
)
2368 return superblock_has_perm(current
, nd
->path
.mnt
->mnt_sb
,
2369 FILESYSTEM__REMOUNT
, NULL
);
2371 return dentry_has_perm(current
, nd
->path
.mnt
, nd
->path
.dentry
,
2375 static int selinux_umount(struct vfsmount
*mnt
, int flags
)
2379 rc
= secondary_ops
->sb_umount(mnt
, flags
);
2383 return superblock_has_perm(current
,mnt
->mnt_sb
,
2384 FILESYSTEM__UNMOUNT
,NULL
);
2387 /* inode security operations */
2389 static int selinux_inode_alloc_security(struct inode
*inode
)
2391 return inode_alloc_security(inode
);
2394 static void selinux_inode_free_security(struct inode
*inode
)
2396 inode_free_security(inode
);
2399 static int selinux_inode_init_security(struct inode
*inode
, struct inode
*dir
,
2400 char **name
, void **value
,
2403 struct task_security_struct
*tsec
;
2404 struct inode_security_struct
*dsec
;
2405 struct superblock_security_struct
*sbsec
;
2408 char *namep
= NULL
, *context
;
2410 tsec
= current
->security
;
2411 dsec
= dir
->i_security
;
2412 sbsec
= dir
->i_sb
->s_security
;
2414 if (tsec
->create_sid
&& sbsec
->behavior
!= SECURITY_FS_USE_MNTPOINT
) {
2415 newsid
= tsec
->create_sid
;
2417 rc
= security_transition_sid(tsec
->sid
, dsec
->sid
,
2418 inode_mode_to_security_class(inode
->i_mode
),
2421 printk(KERN_WARNING
"%s: "
2422 "security_transition_sid failed, rc=%d (dev=%s "
2425 -rc
, inode
->i_sb
->s_id
, inode
->i_ino
);
2430 /* Possibly defer initialization to selinux_complete_init. */
2431 if (sbsec
->initialized
) {
2432 struct inode_security_struct
*isec
= inode
->i_security
;
2433 isec
->sclass
= inode_mode_to_security_class(inode
->i_mode
);
2435 isec
->initialized
= 1;
2438 if (!ss_initialized
|| sbsec
->behavior
== SECURITY_FS_USE_MNTPOINT
)
2442 namep
= kstrdup(XATTR_SELINUX_SUFFIX
, GFP_NOFS
);
2449 rc
= security_sid_to_context(newsid
, &context
, &clen
);
2461 static int selinux_inode_create(struct inode
*dir
, struct dentry
*dentry
, int mask
)
2463 return may_create(dir
, dentry
, SECCLASS_FILE
);
2466 static int selinux_inode_link(struct dentry
*old_dentry
, struct inode
*dir
, struct dentry
*new_dentry
)
2470 rc
= secondary_ops
->inode_link(old_dentry
,dir
,new_dentry
);
2473 return may_link(dir
, old_dentry
, MAY_LINK
);
2476 static int selinux_inode_unlink(struct inode
*dir
, struct dentry
*dentry
)
2480 rc
= secondary_ops
->inode_unlink(dir
, dentry
);
2483 return may_link(dir
, dentry
, MAY_UNLINK
);
2486 static int selinux_inode_symlink(struct inode
*dir
, struct dentry
*dentry
, const char *name
)
2488 return may_create(dir
, dentry
, SECCLASS_LNK_FILE
);
2491 static int selinux_inode_mkdir(struct inode
*dir
, struct dentry
*dentry
, int mask
)
2493 return may_create(dir
, dentry
, SECCLASS_DIR
);
2496 static int selinux_inode_rmdir(struct inode
*dir
, struct dentry
*dentry
)
2498 return may_link(dir
, dentry
, MAY_RMDIR
);
2501 static int selinux_inode_mknod(struct inode
*dir
, struct dentry
*dentry
, int mode
, dev_t dev
)
2505 rc
= secondary_ops
->inode_mknod(dir
, dentry
, mode
, dev
);
2509 return may_create(dir
, dentry
, inode_mode_to_security_class(mode
));
2512 static int selinux_inode_rename(struct inode
*old_inode
, struct dentry
*old_dentry
,
2513 struct inode
*new_inode
, struct dentry
*new_dentry
)
2515 return may_rename(old_inode
, old_dentry
, new_inode
, new_dentry
);
2518 static int selinux_inode_readlink(struct dentry
*dentry
)
2520 return dentry_has_perm(current
, NULL
, dentry
, FILE__READ
);
2523 static int selinux_inode_follow_link(struct dentry
*dentry
, struct nameidata
*nameidata
)
2527 rc
= secondary_ops
->inode_follow_link(dentry
,nameidata
);
2530 return dentry_has_perm(current
, NULL
, dentry
, FILE__READ
);
2533 static int selinux_inode_permission(struct inode
*inode
, int mask
,
2534 struct nameidata
*nd
)
2538 rc
= secondary_ops
->inode_permission(inode
, mask
, nd
);
2543 /* No permission to check. Existence test. */
2547 return inode_has_perm(current
, inode
,
2548 file_mask_to_av(inode
->i_mode
, mask
), NULL
);
2551 static int selinux_inode_setattr(struct dentry
*dentry
, struct iattr
*iattr
)
2555 rc
= secondary_ops
->inode_setattr(dentry
, iattr
);
2559 if (iattr
->ia_valid
& ATTR_FORCE
)
2562 if (iattr
->ia_valid
& (ATTR_MODE
| ATTR_UID
| ATTR_GID
|
2563 ATTR_ATIME_SET
| ATTR_MTIME_SET
))
2564 return dentry_has_perm(current
, NULL
, dentry
, FILE__SETATTR
);
2566 return dentry_has_perm(current
, NULL
, dentry
, FILE__WRITE
);
2569 static int selinux_inode_getattr(struct vfsmount
*mnt
, struct dentry
*dentry
)
2571 return dentry_has_perm(current
, mnt
, dentry
, FILE__GETATTR
);
2574 static int selinux_inode_setotherxattr(struct dentry
*dentry
, char *name
)
2576 if (!strncmp(name
, XATTR_SECURITY_PREFIX
,
2577 sizeof XATTR_SECURITY_PREFIX
- 1)) {
2578 if (!strcmp(name
, XATTR_NAME_CAPS
)) {
2579 if (!capable(CAP_SETFCAP
))
2581 } else if (!capable(CAP_SYS_ADMIN
)) {
2582 /* A different attribute in the security namespace.
2583 Restrict to administrator. */
2588 /* Not an attribute we recognize, so just check the
2589 ordinary setattr permission. */
2590 return dentry_has_perm(current
, NULL
, dentry
, FILE__SETATTR
);
2593 static int selinux_inode_setxattr(struct dentry
*dentry
, char *name
, void *value
, size_t size
, int flags
)
2595 struct task_security_struct
*tsec
= current
->security
;
2596 struct inode
*inode
= dentry
->d_inode
;
2597 struct inode_security_struct
*isec
= inode
->i_security
;
2598 struct superblock_security_struct
*sbsec
;
2599 struct avc_audit_data ad
;
2603 if (strcmp(name
, XATTR_NAME_SELINUX
))
2604 return selinux_inode_setotherxattr(dentry
, name
);
2606 sbsec
= inode
->i_sb
->s_security
;
2607 if (sbsec
->behavior
== SECURITY_FS_USE_MNTPOINT
)
2610 if (!is_owner_or_cap(inode
))
2613 AVC_AUDIT_DATA_INIT(&ad
,FS
);
2614 ad
.u
.fs
.path
.dentry
= dentry
;
2616 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, isec
->sclass
,
2617 FILE__RELABELFROM
, &ad
);
2621 rc
= security_context_to_sid(value
, size
, &newsid
);
2625 rc
= avc_has_perm(tsec
->sid
, newsid
, isec
->sclass
,
2626 FILE__RELABELTO
, &ad
);
2630 rc
= security_validate_transition(isec
->sid
, newsid
, tsec
->sid
,
2635 return avc_has_perm(newsid
,
2637 SECCLASS_FILESYSTEM
,
2638 FILESYSTEM__ASSOCIATE
,
2642 static void selinux_inode_post_setxattr(struct dentry
*dentry
, char *name
,
2643 void *value
, size_t size
, int flags
)
2645 struct inode
*inode
= dentry
->d_inode
;
2646 struct inode_security_struct
*isec
= inode
->i_security
;
2650 if (strcmp(name
, XATTR_NAME_SELINUX
)) {
2651 /* Not an attribute we recognize, so nothing to do. */
2655 rc
= security_context_to_sid(value
, size
, &newsid
);
2657 printk(KERN_WARNING
"%s: unable to obtain SID for context "
2658 "%s, rc=%d\n", __FUNCTION__
, (char*)value
, -rc
);
2666 static int selinux_inode_getxattr (struct dentry
*dentry
, char *name
)
2668 return dentry_has_perm(current
, NULL
, dentry
, FILE__GETATTR
);
2671 static int selinux_inode_listxattr (struct dentry
*dentry
)
2673 return dentry_has_perm(current
, NULL
, dentry
, FILE__GETATTR
);
2676 static int selinux_inode_removexattr (struct dentry
*dentry
, char *name
)
2678 if (strcmp(name
, XATTR_NAME_SELINUX
))
2679 return selinux_inode_setotherxattr(dentry
, name
);
2681 /* No one is allowed to remove a SELinux security label.
2682 You can change the label, but all data must be labeled. */
2687 * Copy the in-core inode security context value to the user. If the
2688 * getxattr() prior to this succeeded, check to see if we need to
2689 * canonicalize the value to be finally returned to the user.
2691 * Permission check is handled by selinux_inode_getxattr hook.
2693 static int selinux_inode_getsecurity(const struct inode
*inode
, const char *name
, void **buffer
, bool alloc
)
2697 char *context
= NULL
;
2698 struct inode_security_struct
*isec
= inode
->i_security
;
2700 if (strcmp(name
, XATTR_SELINUX_SUFFIX
))
2703 error
= security_sid_to_context(isec
->sid
, &context
, &size
);
2716 static int selinux_inode_setsecurity(struct inode
*inode
, const char *name
,
2717 const void *value
, size_t size
, int flags
)
2719 struct inode_security_struct
*isec
= inode
->i_security
;
2723 if (strcmp(name
, XATTR_SELINUX_SUFFIX
))
2726 if (!value
|| !size
)
2729 rc
= security_context_to_sid((void*)value
, size
, &newsid
);
2737 static int selinux_inode_listsecurity(struct inode
*inode
, char *buffer
, size_t buffer_size
)
2739 const int len
= sizeof(XATTR_NAME_SELINUX
);
2740 if (buffer
&& len
<= buffer_size
)
2741 memcpy(buffer
, XATTR_NAME_SELINUX
, len
);
2745 static int selinux_inode_need_killpriv(struct dentry
*dentry
)
2747 return secondary_ops
->inode_need_killpriv(dentry
);
2750 static int selinux_inode_killpriv(struct dentry
*dentry
)
2752 return secondary_ops
->inode_killpriv(dentry
);
2755 /* file security operations */
2757 static int selinux_revalidate_file_permission(struct file
*file
, int mask
)
2760 struct inode
*inode
= file
->f_path
.dentry
->d_inode
;
2763 /* No permission to check. Existence test. */
2767 /* file_mask_to_av won't add FILE__WRITE if MAY_APPEND is set */
2768 if ((file
->f_flags
& O_APPEND
) && (mask
& MAY_WRITE
))
2771 rc
= file_has_perm(current
, file
,
2772 file_mask_to_av(inode
->i_mode
, mask
));
2776 return selinux_netlbl_inode_permission(inode
, mask
);
2779 static int selinux_file_permission(struct file
*file
, int mask
)
2781 struct inode
*inode
= file
->f_path
.dentry
->d_inode
;
2782 struct task_security_struct
*tsec
= current
->security
;
2783 struct file_security_struct
*fsec
= file
->f_security
;
2784 struct inode_security_struct
*isec
= inode
->i_security
;
2787 /* No permission to check. Existence test. */
2791 if (tsec
->sid
== fsec
->sid
&& fsec
->isid
== isec
->sid
2792 && fsec
->pseqno
== avc_policy_seqno())
2793 return selinux_netlbl_inode_permission(inode
, mask
);
2795 return selinux_revalidate_file_permission(file
, mask
);
2798 static int selinux_file_alloc_security(struct file
*file
)
2800 return file_alloc_security(file
);
2803 static void selinux_file_free_security(struct file
*file
)
2805 file_free_security(file
);
2808 static int selinux_file_ioctl(struct file
*file
, unsigned int cmd
,
2820 case EXT2_IOC_GETFLAGS
:
2822 case EXT2_IOC_GETVERSION
:
2823 error
= file_has_perm(current
, file
, FILE__GETATTR
);
2826 case EXT2_IOC_SETFLAGS
:
2828 case EXT2_IOC_SETVERSION
:
2829 error
= file_has_perm(current
, file
, FILE__SETATTR
);
2832 /* sys_ioctl() checks */
2836 error
= file_has_perm(current
, file
, 0);
2841 error
= task_has_capability(current
,CAP_SYS_TTY_CONFIG
);
2844 /* default case assumes that the command will go
2845 * to the file's ioctl() function.
2848 error
= file_has_perm(current
, file
, FILE__IOCTL
);
2854 static int file_map_prot_check(struct file
*file
, unsigned long prot
, int shared
)
2856 #ifndef CONFIG_PPC32
2857 if ((prot
& PROT_EXEC
) && (!file
|| (!shared
&& (prot
& PROT_WRITE
)))) {
2859 * We are making executable an anonymous mapping or a
2860 * private file mapping that will also be writable.
2861 * This has an additional check.
2863 int rc
= task_has_perm(current
, current
, PROCESS__EXECMEM
);
2870 /* read access is always possible with a mapping */
2871 u32 av
= FILE__READ
;
2873 /* write access only matters if the mapping is shared */
2874 if (shared
&& (prot
& PROT_WRITE
))
2877 if (prot
& PROT_EXEC
)
2878 av
|= FILE__EXECUTE
;
2880 return file_has_perm(current
, file
, av
);
2885 static int selinux_file_mmap(struct file
*file
, unsigned long reqprot
,
2886 unsigned long prot
, unsigned long flags
,
2887 unsigned long addr
, unsigned long addr_only
)
2890 u32 sid
= ((struct task_security_struct
*)(current
->security
))->sid
;
2892 if (addr
< mmap_min_addr
)
2893 rc
= avc_has_perm(sid
, sid
, SECCLASS_MEMPROTECT
,
2894 MEMPROTECT__MMAP_ZERO
, NULL
);
2895 if (rc
|| addr_only
)
2898 if (selinux_checkreqprot
)
2901 return file_map_prot_check(file
, prot
,
2902 (flags
& MAP_TYPE
) == MAP_SHARED
);
2905 static int selinux_file_mprotect(struct vm_area_struct
*vma
,
2906 unsigned long reqprot
,
2911 rc
= secondary_ops
->file_mprotect(vma
, reqprot
, prot
);
2915 if (selinux_checkreqprot
)
2918 #ifndef CONFIG_PPC32
2919 if ((prot
& PROT_EXEC
) && !(vma
->vm_flags
& VM_EXEC
)) {
2921 if (vma
->vm_start
>= vma
->vm_mm
->start_brk
&&
2922 vma
->vm_end
<= vma
->vm_mm
->brk
) {
2923 rc
= task_has_perm(current
, current
,
2925 } else if (!vma
->vm_file
&&
2926 vma
->vm_start
<= vma
->vm_mm
->start_stack
&&
2927 vma
->vm_end
>= vma
->vm_mm
->start_stack
) {
2928 rc
= task_has_perm(current
, current
, PROCESS__EXECSTACK
);
2929 } else if (vma
->vm_file
&& vma
->anon_vma
) {
2931 * We are making executable a file mapping that has
2932 * had some COW done. Since pages might have been
2933 * written, check ability to execute the possibly
2934 * modified content. This typically should only
2935 * occur for text relocations.
2937 rc
= file_has_perm(current
, vma
->vm_file
,
2945 return file_map_prot_check(vma
->vm_file
, prot
, vma
->vm_flags
&VM_SHARED
);
2948 static int selinux_file_lock(struct file
*file
, unsigned int cmd
)
2950 return file_has_perm(current
, file
, FILE__LOCK
);
2953 static int selinux_file_fcntl(struct file
*file
, unsigned int cmd
,
2960 if (!file
->f_path
.dentry
|| !file
->f_path
.dentry
->d_inode
) {
2965 if ((file
->f_flags
& O_APPEND
) && !(arg
& O_APPEND
)) {
2966 err
= file_has_perm(current
, file
,FILE__WRITE
);
2975 /* Just check FD__USE permission */
2976 err
= file_has_perm(current
, file
, 0);
2981 #if BITS_PER_LONG == 32
2986 if (!file
->f_path
.dentry
|| !file
->f_path
.dentry
->d_inode
) {
2990 err
= file_has_perm(current
, file
, FILE__LOCK
);
2997 static int selinux_file_set_fowner(struct file
*file
)
2999 struct task_security_struct
*tsec
;
3000 struct file_security_struct
*fsec
;
3002 tsec
= current
->security
;
3003 fsec
= file
->f_security
;
3004 fsec
->fown_sid
= tsec
->sid
;
3009 static int selinux_file_send_sigiotask(struct task_struct
*tsk
,
3010 struct fown_struct
*fown
, int signum
)
3014 struct task_security_struct
*tsec
;
3015 struct file_security_struct
*fsec
;
3017 /* struct fown_struct is never outside the context of a struct file */
3018 file
= container_of(fown
, struct file
, f_owner
);
3020 tsec
= tsk
->security
;
3021 fsec
= file
->f_security
;
3024 perm
= signal_to_av(SIGIO
); /* as per send_sigio_to_task */
3026 perm
= signal_to_av(signum
);
3028 return avc_has_perm(fsec
->fown_sid
, tsec
->sid
,
3029 SECCLASS_PROCESS
, perm
, NULL
);
3032 static int selinux_file_receive(struct file
*file
)
3034 return file_has_perm(current
, file
, file_to_av(file
));
3037 static int selinux_dentry_open(struct file
*file
)
3039 struct file_security_struct
*fsec
;
3040 struct inode
*inode
;
3041 struct inode_security_struct
*isec
;
3042 inode
= file
->f_path
.dentry
->d_inode
;
3043 fsec
= file
->f_security
;
3044 isec
= inode
->i_security
;
3046 * Save inode label and policy sequence number
3047 * at open-time so that selinux_file_permission
3048 * can determine whether revalidation is necessary.
3049 * Task label is already saved in the file security
3050 * struct as its SID.
3052 fsec
->isid
= isec
->sid
;
3053 fsec
->pseqno
= avc_policy_seqno();
3055 * Since the inode label or policy seqno may have changed
3056 * between the selinux_inode_permission check and the saving
3057 * of state above, recheck that access is still permitted.
3058 * Otherwise, access might never be revalidated against the
3059 * new inode label or new policy.
3060 * This check is not redundant - do not remove.
3062 return inode_has_perm(current
, inode
, file_to_av(file
), NULL
);
3065 /* task security operations */
3067 static int selinux_task_create(unsigned long clone_flags
)
3071 rc
= secondary_ops
->task_create(clone_flags
);
3075 return task_has_perm(current
, current
, PROCESS__FORK
);
3078 static int selinux_task_alloc_security(struct task_struct
*tsk
)
3080 struct task_security_struct
*tsec1
, *tsec2
;
3083 tsec1
= current
->security
;
3085 rc
= task_alloc_security(tsk
);
3088 tsec2
= tsk
->security
;
3090 tsec2
->osid
= tsec1
->osid
;
3091 tsec2
->sid
= tsec1
->sid
;
3093 /* Retain the exec, fs, key, and sock SIDs across fork */
3094 tsec2
->exec_sid
= tsec1
->exec_sid
;
3095 tsec2
->create_sid
= tsec1
->create_sid
;
3096 tsec2
->keycreate_sid
= tsec1
->keycreate_sid
;
3097 tsec2
->sockcreate_sid
= tsec1
->sockcreate_sid
;
3099 /* Retain ptracer SID across fork, if any.
3100 This will be reset by the ptrace hook upon any
3101 subsequent ptrace_attach operations. */
3102 tsec2
->ptrace_sid
= tsec1
->ptrace_sid
;
3107 static void selinux_task_free_security(struct task_struct
*tsk
)
3109 task_free_security(tsk
);
3112 static int selinux_task_setuid(uid_t id0
, uid_t id1
, uid_t id2
, int flags
)
3114 /* Since setuid only affects the current process, and
3115 since the SELinux controls are not based on the Linux
3116 identity attributes, SELinux does not need to control
3117 this operation. However, SELinux does control the use
3118 of the CAP_SETUID and CAP_SETGID capabilities using the
3123 static int selinux_task_post_setuid(uid_t id0
, uid_t id1
, uid_t id2
, int flags
)
3125 return secondary_ops
->task_post_setuid(id0
,id1
,id2
,flags
);
3128 static int selinux_task_setgid(gid_t id0
, gid_t id1
, gid_t id2
, int flags
)
3130 /* See the comment for setuid above. */
3134 static int selinux_task_setpgid(struct task_struct
*p
, pid_t pgid
)
3136 return task_has_perm(current
, p
, PROCESS__SETPGID
);
3139 static int selinux_task_getpgid(struct task_struct
*p
)
3141 return task_has_perm(current
, p
, PROCESS__GETPGID
);
3144 static int selinux_task_getsid(struct task_struct
*p
)
3146 return task_has_perm(current
, p
, PROCESS__GETSESSION
);
3149 static void selinux_task_getsecid(struct task_struct
*p
, u32
*secid
)
3151 selinux_get_task_sid(p
, secid
);
3154 static int selinux_task_setgroups(struct group_info
*group_info
)
3156 /* See the comment for setuid above. */
3160 static int selinux_task_setnice(struct task_struct
*p
, int nice
)
3164 rc
= secondary_ops
->task_setnice(p
, nice
);
3168 return task_has_perm(current
,p
, PROCESS__SETSCHED
);
3171 static int selinux_task_setioprio(struct task_struct
*p
, int ioprio
)
3175 rc
= secondary_ops
->task_setioprio(p
, ioprio
);
3179 return task_has_perm(current
, p
, PROCESS__SETSCHED
);
3182 static int selinux_task_getioprio(struct task_struct
*p
)
3184 return task_has_perm(current
, p
, PROCESS__GETSCHED
);
3187 static int selinux_task_setrlimit(unsigned int resource
, struct rlimit
*new_rlim
)
3189 struct rlimit
*old_rlim
= current
->signal
->rlim
+ resource
;
3192 rc
= secondary_ops
->task_setrlimit(resource
, new_rlim
);
3196 /* Control the ability to change the hard limit (whether
3197 lowering or raising it), so that the hard limit can
3198 later be used as a safe reset point for the soft limit
3199 upon context transitions. See selinux_bprm_apply_creds. */
3200 if (old_rlim
->rlim_max
!= new_rlim
->rlim_max
)
3201 return task_has_perm(current
, current
, PROCESS__SETRLIMIT
);
3206 static int selinux_task_setscheduler(struct task_struct
*p
, int policy
, struct sched_param
*lp
)
3210 rc
= secondary_ops
->task_setscheduler(p
, policy
, lp
);
3214 return task_has_perm(current
, p
, PROCESS__SETSCHED
);
3217 static int selinux_task_getscheduler(struct task_struct
*p
)
3219 return task_has_perm(current
, p
, PROCESS__GETSCHED
);
3222 static int selinux_task_movememory(struct task_struct
*p
)
3224 return task_has_perm(current
, p
, PROCESS__SETSCHED
);
3227 static int selinux_task_kill(struct task_struct
*p
, struct siginfo
*info
,
3232 struct task_security_struct
*tsec
;
3234 rc
= secondary_ops
->task_kill(p
, info
, sig
, secid
);
3238 if (info
!= SEND_SIG_NOINFO
&& (is_si_special(info
) || SI_FROMKERNEL(info
)))
3242 perm
= PROCESS__SIGNULL
; /* null signal; existence test */
3244 perm
= signal_to_av(sig
);
3247 rc
= avc_has_perm(secid
, tsec
->sid
, SECCLASS_PROCESS
, perm
, NULL
);
3249 rc
= task_has_perm(current
, p
, perm
);
3253 static int selinux_task_prctl(int option
,
3259 /* The current prctl operations do not appear to require
3260 any SELinux controls since they merely observe or modify
3261 the state of the current process. */
3265 static int selinux_task_wait(struct task_struct
*p
)
3267 return task_has_perm(p
, current
, PROCESS__SIGCHLD
);
3270 static void selinux_task_reparent_to_init(struct task_struct
*p
)
3272 struct task_security_struct
*tsec
;
3274 secondary_ops
->task_reparent_to_init(p
);
3277 tsec
->osid
= tsec
->sid
;
3278 tsec
->sid
= SECINITSID_KERNEL
;
3282 static void selinux_task_to_inode(struct task_struct
*p
,
3283 struct inode
*inode
)
3285 struct task_security_struct
*tsec
= p
->security
;
3286 struct inode_security_struct
*isec
= inode
->i_security
;
3288 isec
->sid
= tsec
->sid
;
3289 isec
->initialized
= 1;
3293 /* Returns error only if unable to parse addresses */
3294 static int selinux_parse_skb_ipv4(struct sk_buff
*skb
,
3295 struct avc_audit_data
*ad
, u8
*proto
)
3297 int offset
, ihlen
, ret
= -EINVAL
;
3298 struct iphdr _iph
, *ih
;
3300 offset
= skb_network_offset(skb
);
3301 ih
= skb_header_pointer(skb
, offset
, sizeof(_iph
), &_iph
);
3305 ihlen
= ih
->ihl
* 4;
3306 if (ihlen
< sizeof(_iph
))
3309 ad
->u
.net
.v4info
.saddr
= ih
->saddr
;
3310 ad
->u
.net
.v4info
.daddr
= ih
->daddr
;
3314 *proto
= ih
->protocol
;
3316 switch (ih
->protocol
) {
3318 struct tcphdr _tcph
, *th
;
3320 if (ntohs(ih
->frag_off
) & IP_OFFSET
)
3324 th
= skb_header_pointer(skb
, offset
, sizeof(_tcph
), &_tcph
);
3328 ad
->u
.net
.sport
= th
->source
;
3329 ad
->u
.net
.dport
= th
->dest
;
3334 struct udphdr _udph
, *uh
;
3336 if (ntohs(ih
->frag_off
) & IP_OFFSET
)
3340 uh
= skb_header_pointer(skb
, offset
, sizeof(_udph
), &_udph
);
3344 ad
->u
.net
.sport
= uh
->source
;
3345 ad
->u
.net
.dport
= uh
->dest
;
3349 case IPPROTO_DCCP
: {
3350 struct dccp_hdr _dccph
, *dh
;
3352 if (ntohs(ih
->frag_off
) & IP_OFFSET
)
3356 dh
= skb_header_pointer(skb
, offset
, sizeof(_dccph
), &_dccph
);
3360 ad
->u
.net
.sport
= dh
->dccph_sport
;
3361 ad
->u
.net
.dport
= dh
->dccph_dport
;
3372 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
3374 /* Returns error only if unable to parse addresses */
3375 static int selinux_parse_skb_ipv6(struct sk_buff
*skb
,
3376 struct avc_audit_data
*ad
, u8
*proto
)
3379 int ret
= -EINVAL
, offset
;
3380 struct ipv6hdr _ipv6h
, *ip6
;
3382 offset
= skb_network_offset(skb
);
3383 ip6
= skb_header_pointer(skb
, offset
, sizeof(_ipv6h
), &_ipv6h
);
3387 ipv6_addr_copy(&ad
->u
.net
.v6info
.saddr
, &ip6
->saddr
);
3388 ipv6_addr_copy(&ad
->u
.net
.v6info
.daddr
, &ip6
->daddr
);
3391 nexthdr
= ip6
->nexthdr
;
3392 offset
+= sizeof(_ipv6h
);
3393 offset
= ipv6_skip_exthdr(skb
, offset
, &nexthdr
);
3402 struct tcphdr _tcph
, *th
;
3404 th
= skb_header_pointer(skb
, offset
, sizeof(_tcph
), &_tcph
);
3408 ad
->u
.net
.sport
= th
->source
;
3409 ad
->u
.net
.dport
= th
->dest
;
3414 struct udphdr _udph
, *uh
;
3416 uh
= skb_header_pointer(skb
, offset
, sizeof(_udph
), &_udph
);
3420 ad
->u
.net
.sport
= uh
->source
;
3421 ad
->u
.net
.dport
= uh
->dest
;
3425 case IPPROTO_DCCP
: {
3426 struct dccp_hdr _dccph
, *dh
;
3428 dh
= skb_header_pointer(skb
, offset
, sizeof(_dccph
), &_dccph
);
3432 ad
->u
.net
.sport
= dh
->dccph_sport
;
3433 ad
->u
.net
.dport
= dh
->dccph_dport
;
3437 /* includes fragments */
3447 static int selinux_parse_skb(struct sk_buff
*skb
, struct avc_audit_data
*ad
,
3448 char **addrp
, int src
, u8
*proto
)
3452 switch (ad
->u
.net
.family
) {
3454 ret
= selinux_parse_skb_ipv4(skb
, ad
, proto
);
3457 *addrp
= (char *)(src
? &ad
->u
.net
.v4info
.saddr
:
3458 &ad
->u
.net
.v4info
.daddr
);
3461 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
3463 ret
= selinux_parse_skb_ipv6(skb
, ad
, proto
);
3466 *addrp
= (char *)(src
? &ad
->u
.net
.v6info
.saddr
:
3467 &ad
->u
.net
.v6info
.daddr
);
3476 "SELinux: failure in selinux_parse_skb(),"
3477 " unable to parse packet\n");
3483 * selinux_skb_peerlbl_sid - Determine the peer label of a packet
3485 * @family: protocol family
3486 * @sid: the packet's peer label SID
3489 * Check the various different forms of network peer labeling and determine
3490 * the peer label/SID for the packet; most of the magic actually occurs in
3491 * the security server function security_net_peersid_cmp(). The function
3492 * returns zero if the value in @sid is valid (although it may be SECSID_NULL)
3493 * or -EACCES if @sid is invalid due to inconsistencies with the different
3497 static int selinux_skb_peerlbl_sid(struct sk_buff
*skb
, u16 family
, u32
*sid
)
3504 selinux_skb_xfrm_sid(skb
, &xfrm_sid
);
3505 selinux_netlbl_skbuff_getsid(skb
, family
, &nlbl_type
, &nlbl_sid
);
3507 err
= security_net_peersid_resolve(nlbl_sid
, nlbl_type
, xfrm_sid
, sid
);
3508 if (unlikely(err
)) {
3510 "SELinux: failure in selinux_skb_peerlbl_sid(),"
3511 " unable to determine packet's peer label\n");
3518 /* socket security operations */
3519 static int socket_has_perm(struct task_struct
*task
, struct socket
*sock
,
3522 struct inode_security_struct
*isec
;
3523 struct task_security_struct
*tsec
;
3524 struct avc_audit_data ad
;
3527 tsec
= task
->security
;
3528 isec
= SOCK_INODE(sock
)->i_security
;
3530 if (isec
->sid
== SECINITSID_KERNEL
)
3533 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3534 ad
.u
.net
.sk
= sock
->sk
;
3535 err
= avc_has_perm(tsec
->sid
, isec
->sid
, isec
->sclass
, perms
, &ad
);
3541 static int selinux_socket_create(int family
, int type
,
3542 int protocol
, int kern
)
3545 struct task_security_struct
*tsec
;
3551 tsec
= current
->security
;
3552 newsid
= tsec
->sockcreate_sid
? : tsec
->sid
;
3553 err
= avc_has_perm(tsec
->sid
, newsid
,
3554 socket_type_to_security_class(family
, type
,
3555 protocol
), SOCKET__CREATE
, NULL
);
3561 static int selinux_socket_post_create(struct socket
*sock
, int family
,
3562 int type
, int protocol
, int kern
)
3565 struct inode_security_struct
*isec
;
3566 struct task_security_struct
*tsec
;
3567 struct sk_security_struct
*sksec
;
3570 isec
= SOCK_INODE(sock
)->i_security
;
3572 tsec
= current
->security
;
3573 newsid
= tsec
->sockcreate_sid
? : tsec
->sid
;
3574 isec
->sclass
= socket_type_to_security_class(family
, type
, protocol
);
3575 isec
->sid
= kern
? SECINITSID_KERNEL
: newsid
;
3576 isec
->initialized
= 1;
3579 sksec
= sock
->sk
->sk_security
;
3580 sksec
->sid
= isec
->sid
;
3581 sksec
->sclass
= isec
->sclass
;
3582 err
= selinux_netlbl_socket_post_create(sock
);
3588 /* Range of port numbers used to automatically bind.
3589 Need to determine whether we should perform a name_bind
3590 permission check between the socket and the port number. */
3592 static int selinux_socket_bind(struct socket
*sock
, struct sockaddr
*address
, int addrlen
)
3597 err
= socket_has_perm(current
, sock
, SOCKET__BIND
);
3602 * If PF_INET or PF_INET6, check name_bind permission for the port.
3603 * Multiple address binding for SCTP is not supported yet: we just
3604 * check the first address now.
3606 family
= sock
->sk
->sk_family
;
3607 if (family
== PF_INET
|| family
== PF_INET6
) {
3609 struct inode_security_struct
*isec
;
3610 struct task_security_struct
*tsec
;
3611 struct avc_audit_data ad
;
3612 struct sockaddr_in
*addr4
= NULL
;
3613 struct sockaddr_in6
*addr6
= NULL
;
3614 unsigned short snum
;
3615 struct sock
*sk
= sock
->sk
;
3616 u32 sid
, node_perm
, addrlen
;
3618 tsec
= current
->security
;
3619 isec
= SOCK_INODE(sock
)->i_security
;
3621 if (family
== PF_INET
) {
3622 addr4
= (struct sockaddr_in
*)address
;
3623 snum
= ntohs(addr4
->sin_port
);
3624 addrlen
= sizeof(addr4
->sin_addr
.s_addr
);
3625 addrp
= (char *)&addr4
->sin_addr
.s_addr
;
3627 addr6
= (struct sockaddr_in6
*)address
;
3628 snum
= ntohs(addr6
->sin6_port
);
3629 addrlen
= sizeof(addr6
->sin6_addr
.s6_addr
);
3630 addrp
= (char *)&addr6
->sin6_addr
.s6_addr
;
3636 inet_get_local_port_range(&low
, &high
);
3638 if (snum
< max(PROT_SOCK
, low
) || snum
> high
) {
3639 err
= security_port_sid(sk
->sk_family
,
3641 sk
->sk_protocol
, snum
,
3645 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3646 ad
.u
.net
.sport
= htons(snum
);
3647 ad
.u
.net
.family
= family
;
3648 err
= avc_has_perm(isec
->sid
, sid
,
3650 SOCKET__NAME_BIND
, &ad
);
3656 switch(isec
->sclass
) {
3657 case SECCLASS_TCP_SOCKET
:
3658 node_perm
= TCP_SOCKET__NODE_BIND
;
3661 case SECCLASS_UDP_SOCKET
:
3662 node_perm
= UDP_SOCKET__NODE_BIND
;
3665 case SECCLASS_DCCP_SOCKET
:
3666 node_perm
= DCCP_SOCKET__NODE_BIND
;
3670 node_perm
= RAWIP_SOCKET__NODE_BIND
;
3674 err
= sel_netnode_sid(addrp
, family
, &sid
);
3678 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3679 ad
.u
.net
.sport
= htons(snum
);
3680 ad
.u
.net
.family
= family
;
3682 if (family
== PF_INET
)
3683 ad
.u
.net
.v4info
.saddr
= addr4
->sin_addr
.s_addr
;
3685 ipv6_addr_copy(&ad
.u
.net
.v6info
.saddr
, &addr6
->sin6_addr
);
3687 err
= avc_has_perm(isec
->sid
, sid
,
3688 isec
->sclass
, node_perm
, &ad
);
3696 static int selinux_socket_connect(struct socket
*sock
, struct sockaddr
*address
, int addrlen
)
3698 struct inode_security_struct
*isec
;
3701 err
= socket_has_perm(current
, sock
, SOCKET__CONNECT
);
3706 * If a TCP or DCCP socket, check name_connect permission for the port.
3708 isec
= SOCK_INODE(sock
)->i_security
;
3709 if (isec
->sclass
== SECCLASS_TCP_SOCKET
||
3710 isec
->sclass
== SECCLASS_DCCP_SOCKET
) {
3711 struct sock
*sk
= sock
->sk
;
3712 struct avc_audit_data ad
;
3713 struct sockaddr_in
*addr4
= NULL
;
3714 struct sockaddr_in6
*addr6
= NULL
;
3715 unsigned short snum
;
3718 if (sk
->sk_family
== PF_INET
) {
3719 addr4
= (struct sockaddr_in
*)address
;
3720 if (addrlen
< sizeof(struct sockaddr_in
))
3722 snum
= ntohs(addr4
->sin_port
);
3724 addr6
= (struct sockaddr_in6
*)address
;
3725 if (addrlen
< SIN6_LEN_RFC2133
)
3727 snum
= ntohs(addr6
->sin6_port
);
3730 err
= security_port_sid(sk
->sk_family
, sk
->sk_type
,
3731 sk
->sk_protocol
, snum
, &sid
);
3735 perm
= (isec
->sclass
== SECCLASS_TCP_SOCKET
) ?
3736 TCP_SOCKET__NAME_CONNECT
: DCCP_SOCKET__NAME_CONNECT
;
3738 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3739 ad
.u
.net
.dport
= htons(snum
);
3740 ad
.u
.net
.family
= sk
->sk_family
;
3741 err
= avc_has_perm(isec
->sid
, sid
, isec
->sclass
, perm
, &ad
);
3750 static int selinux_socket_listen(struct socket
*sock
, int backlog
)
3752 return socket_has_perm(current
, sock
, SOCKET__LISTEN
);
3755 static int selinux_socket_accept(struct socket
*sock
, struct socket
*newsock
)
3758 struct inode_security_struct
*isec
;
3759 struct inode_security_struct
*newisec
;
3761 err
= socket_has_perm(current
, sock
, SOCKET__ACCEPT
);
3765 newisec
= SOCK_INODE(newsock
)->i_security
;
3767 isec
= SOCK_INODE(sock
)->i_security
;
3768 newisec
->sclass
= isec
->sclass
;
3769 newisec
->sid
= isec
->sid
;
3770 newisec
->initialized
= 1;
3775 static int selinux_socket_sendmsg(struct socket
*sock
, struct msghdr
*msg
,
3780 rc
= socket_has_perm(current
, sock
, SOCKET__WRITE
);
3784 return selinux_netlbl_inode_permission(SOCK_INODE(sock
), MAY_WRITE
);
3787 static int selinux_socket_recvmsg(struct socket
*sock
, struct msghdr
*msg
,
3788 int size
, int flags
)
3790 return socket_has_perm(current
, sock
, SOCKET__READ
);
3793 static int selinux_socket_getsockname(struct socket
*sock
)
3795 return socket_has_perm(current
, sock
, SOCKET__GETATTR
);
3798 static int selinux_socket_getpeername(struct socket
*sock
)
3800 return socket_has_perm(current
, sock
, SOCKET__GETATTR
);
3803 static int selinux_socket_setsockopt(struct socket
*sock
,int level
,int optname
)
3807 err
= socket_has_perm(current
, sock
, SOCKET__SETOPT
);
3811 return selinux_netlbl_socket_setsockopt(sock
, level
, optname
);
3814 static int selinux_socket_getsockopt(struct socket
*sock
, int level
,
3817 return socket_has_perm(current
, sock
, SOCKET__GETOPT
);
3820 static int selinux_socket_shutdown(struct socket
*sock
, int how
)
3822 return socket_has_perm(current
, sock
, SOCKET__SHUTDOWN
);
3825 static int selinux_socket_unix_stream_connect(struct socket
*sock
,
3826 struct socket
*other
,
3829 struct sk_security_struct
*ssec
;
3830 struct inode_security_struct
*isec
;
3831 struct inode_security_struct
*other_isec
;
3832 struct avc_audit_data ad
;
3835 err
= secondary_ops
->unix_stream_connect(sock
, other
, newsk
);
3839 isec
= SOCK_INODE(sock
)->i_security
;
3840 other_isec
= SOCK_INODE(other
)->i_security
;
3842 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3843 ad
.u
.net
.sk
= other
->sk
;
3845 err
= avc_has_perm(isec
->sid
, other_isec
->sid
,
3847 UNIX_STREAM_SOCKET__CONNECTTO
, &ad
);
3851 /* connecting socket */
3852 ssec
= sock
->sk
->sk_security
;
3853 ssec
->peer_sid
= other_isec
->sid
;
3855 /* server child socket */
3856 ssec
= newsk
->sk_security
;
3857 ssec
->peer_sid
= isec
->sid
;
3858 err
= security_sid_mls_copy(other_isec
->sid
, ssec
->peer_sid
, &ssec
->sid
);
3863 static int selinux_socket_unix_may_send(struct socket
*sock
,
3864 struct socket
*other
)
3866 struct inode_security_struct
*isec
;
3867 struct inode_security_struct
*other_isec
;
3868 struct avc_audit_data ad
;
3871 isec
= SOCK_INODE(sock
)->i_security
;
3872 other_isec
= SOCK_INODE(other
)->i_security
;
3874 AVC_AUDIT_DATA_INIT(&ad
,NET
);
3875 ad
.u
.net
.sk
= other
->sk
;
3877 err
= avc_has_perm(isec
->sid
, other_isec
->sid
,
3878 isec
->sclass
, SOCKET__SENDTO
, &ad
);
3885 static int selinux_inet_sys_rcv_skb(int ifindex
, char *addrp
, u16 family
,
3887 struct avc_audit_data
*ad
)
3893 err
= sel_netif_sid(ifindex
, &if_sid
);
3896 err
= avc_has_perm(peer_sid
, if_sid
,
3897 SECCLASS_NETIF
, NETIF__INGRESS
, ad
);
3901 err
= sel_netnode_sid(addrp
, family
, &node_sid
);
3904 return avc_has_perm(peer_sid
, node_sid
,
3905 SECCLASS_NODE
, NODE__RECVFROM
, ad
);
3908 static int selinux_sock_rcv_skb_iptables_compat(struct sock
*sk
,
3909 struct sk_buff
*skb
,
3910 struct avc_audit_data
*ad
,
3915 struct sk_security_struct
*sksec
= sk
->sk_security
;
3917 u32 netif_perm
, node_perm
, recv_perm
;
3918 u32 port_sid
, node_sid
, if_sid
, sk_sid
;
3920 sk_sid
= sksec
->sid
;
3921 sk_class
= sksec
->sclass
;
3924 case SECCLASS_UDP_SOCKET
:
3925 netif_perm
= NETIF__UDP_RECV
;
3926 node_perm
= NODE__UDP_RECV
;
3927 recv_perm
= UDP_SOCKET__RECV_MSG
;
3929 case SECCLASS_TCP_SOCKET
:
3930 netif_perm
= NETIF__TCP_RECV
;
3931 node_perm
= NODE__TCP_RECV
;
3932 recv_perm
= TCP_SOCKET__RECV_MSG
;
3934 case SECCLASS_DCCP_SOCKET
:
3935 netif_perm
= NETIF__DCCP_RECV
;
3936 node_perm
= NODE__DCCP_RECV
;
3937 recv_perm
= DCCP_SOCKET__RECV_MSG
;
3940 netif_perm
= NETIF__RAWIP_RECV
;
3941 node_perm
= NODE__RAWIP_RECV
;
3946 err
= sel_netif_sid(skb
->iif
, &if_sid
);
3949 err
= avc_has_perm(sk_sid
, if_sid
, SECCLASS_NETIF
, netif_perm
, ad
);
3953 err
= sel_netnode_sid(addrp
, family
, &node_sid
);
3956 err
= avc_has_perm(sk_sid
, node_sid
, SECCLASS_NODE
, node_perm
, ad
);
3962 err
= security_port_sid(sk
->sk_family
, sk
->sk_type
,
3963 sk
->sk_protocol
, ntohs(ad
->u
.net
.sport
),
3965 if (unlikely(err
)) {
3967 "SELinux: failure in"
3968 " selinux_sock_rcv_skb_iptables_compat(),"
3969 " network port label not found\n");
3972 return avc_has_perm(sk_sid
, port_sid
, sk_class
, recv_perm
, ad
);
3975 static int selinux_sock_rcv_skb_compat(struct sock
*sk
, struct sk_buff
*skb
,
3976 struct avc_audit_data
*ad
,
3977 u16 family
, char *addrp
)
3980 struct sk_security_struct
*sksec
= sk
->sk_security
;
3982 u32 sk_sid
= sksec
->sid
;
3984 if (selinux_compat_net
)
3985 err
= selinux_sock_rcv_skb_iptables_compat(sk
, skb
, ad
,
3988 err
= avc_has_perm(sk_sid
, skb
->secmark
, SECCLASS_PACKET
,
3993 if (selinux_policycap_netpeer
) {
3994 err
= selinux_skb_peerlbl_sid(skb
, family
, &peer_sid
);
3997 err
= avc_has_perm(sk_sid
, peer_sid
,
3998 SECCLASS_PEER
, PEER__RECV
, ad
);
4000 err
= selinux_netlbl_sock_rcv_skb(sksec
, skb
, family
, ad
);
4003 err
= selinux_xfrm_sock_rcv_skb(sksec
->sid
, skb
, ad
);
4009 static int selinux_socket_sock_rcv_skb(struct sock
*sk
, struct sk_buff
*skb
)
4012 struct sk_security_struct
*sksec
= sk
->sk_security
;
4013 u16 family
= sk
->sk_family
;
4014 u32 sk_sid
= sksec
->sid
;
4015 struct avc_audit_data ad
;
4018 if (family
!= PF_INET
&& family
!= PF_INET6
)
4021 /* Handle mapped IPv4 packets arriving via IPv6 sockets */
4022 if (family
== PF_INET6
&& skb
->protocol
== htons(ETH_P_IP
))
4025 AVC_AUDIT_DATA_INIT(&ad
, NET
);
4026 ad
.u
.net
.netif
= skb
->iif
;
4027 ad
.u
.net
.family
= family
;
4028 err
= selinux_parse_skb(skb
, &ad
, &addrp
, 1, NULL
);
4032 /* If any sort of compatibility mode is enabled then handoff processing
4033 * to the selinux_sock_rcv_skb_compat() function to deal with the
4034 * special handling. We do this in an attempt to keep this function
4035 * as fast and as clean as possible. */
4036 if (selinux_compat_net
|| !selinux_policycap_netpeer
)
4037 return selinux_sock_rcv_skb_compat(sk
, skb
, &ad
,
4040 if (netlbl_enabled() || selinux_xfrm_enabled()) {
4043 err
= selinux_skb_peerlbl_sid(skb
, family
, &peer_sid
);
4046 err
= selinux_inet_sys_rcv_skb(skb
->iif
, addrp
, family
,
4050 err
= avc_has_perm(sk_sid
, peer_sid
, SECCLASS_PEER
,
4054 if (selinux_secmark_enabled()) {
4055 err
= avc_has_perm(sk_sid
, skb
->secmark
, SECCLASS_PACKET
,
4064 static int selinux_socket_getpeersec_stream(struct socket
*sock
, char __user
*optval
,
4065 int __user
*optlen
, unsigned len
)
4070 struct sk_security_struct
*ssec
;
4071 struct inode_security_struct
*isec
;
4072 u32 peer_sid
= SECSID_NULL
;
4074 isec
= SOCK_INODE(sock
)->i_security
;
4076 if (isec
->sclass
== SECCLASS_UNIX_STREAM_SOCKET
||
4077 isec
->sclass
== SECCLASS_TCP_SOCKET
) {
4078 ssec
= sock
->sk
->sk_security
;
4079 peer_sid
= ssec
->peer_sid
;
4081 if (peer_sid
== SECSID_NULL
) {
4086 err
= security_sid_to_context(peer_sid
, &scontext
, &scontext_len
);
4091 if (scontext_len
> len
) {
4096 if (copy_to_user(optval
, scontext
, scontext_len
))
4100 if (put_user(scontext_len
, optlen
))
4108 static int selinux_socket_getpeersec_dgram(struct socket
*sock
, struct sk_buff
*skb
, u32
*secid
)
4110 u32 peer_secid
= SECSID_NULL
;
4114 family
= sock
->sk
->sk_family
;
4115 else if (skb
&& skb
->sk
)
4116 family
= skb
->sk
->sk_family
;
4120 if (sock
&& family
== PF_UNIX
)
4121 selinux_get_inode_sid(SOCK_INODE(sock
), &peer_secid
);
4123 selinux_skb_peerlbl_sid(skb
, family
, &peer_secid
);
4126 *secid
= peer_secid
;
4127 if (peer_secid
== SECSID_NULL
)
4132 static int selinux_sk_alloc_security(struct sock
*sk
, int family
, gfp_t priority
)
4134 return sk_alloc_security(sk
, family
, priority
);
4137 static void selinux_sk_free_security(struct sock
*sk
)
4139 sk_free_security(sk
);
4142 static void selinux_sk_clone_security(const struct sock
*sk
, struct sock
*newsk
)
4144 struct sk_security_struct
*ssec
= sk
->sk_security
;
4145 struct sk_security_struct
*newssec
= newsk
->sk_security
;
4147 newssec
->sid
= ssec
->sid
;
4148 newssec
->peer_sid
= ssec
->peer_sid
;
4149 newssec
->sclass
= ssec
->sclass
;
4151 selinux_netlbl_sk_security_clone(ssec
, newssec
);
4154 static void selinux_sk_getsecid(struct sock
*sk
, u32
*secid
)
4157 *secid
= SECINITSID_ANY_SOCKET
;
4159 struct sk_security_struct
*sksec
= sk
->sk_security
;
4161 *secid
= sksec
->sid
;
4165 static void selinux_sock_graft(struct sock
* sk
, struct socket
*parent
)
4167 struct inode_security_struct
*isec
= SOCK_INODE(parent
)->i_security
;
4168 struct sk_security_struct
*sksec
= sk
->sk_security
;
4170 if (sk
->sk_family
== PF_INET
|| sk
->sk_family
== PF_INET6
||
4171 sk
->sk_family
== PF_UNIX
)
4172 isec
->sid
= sksec
->sid
;
4173 sksec
->sclass
= isec
->sclass
;
4175 selinux_netlbl_sock_graft(sk
, parent
);
4178 static int selinux_inet_conn_request(struct sock
*sk
, struct sk_buff
*skb
,
4179 struct request_sock
*req
)
4181 struct sk_security_struct
*sksec
= sk
->sk_security
;
4186 err
= selinux_skb_peerlbl_sid(skb
, sk
->sk_family
, &peersid
);
4189 if (peersid
== SECSID_NULL
) {
4190 req
->secid
= sksec
->sid
;
4191 req
->peer_secid
= SECSID_NULL
;
4195 err
= security_sid_mls_copy(sksec
->sid
, peersid
, &newsid
);
4199 req
->secid
= newsid
;
4200 req
->peer_secid
= peersid
;
4204 static void selinux_inet_csk_clone(struct sock
*newsk
,
4205 const struct request_sock
*req
)
4207 struct sk_security_struct
*newsksec
= newsk
->sk_security
;
4209 newsksec
->sid
= req
->secid
;
4210 newsksec
->peer_sid
= req
->peer_secid
;
4211 /* NOTE: Ideally, we should also get the isec->sid for the
4212 new socket in sync, but we don't have the isec available yet.
4213 So we will wait until sock_graft to do it, by which
4214 time it will have been created and available. */
4216 /* We don't need to take any sort of lock here as we are the only
4217 * thread with access to newsksec */
4218 selinux_netlbl_sk_security_reset(newsksec
, req
->rsk_ops
->family
);
4221 static void selinux_inet_conn_established(struct sock
*sk
,
4222 struct sk_buff
*skb
)
4224 struct sk_security_struct
*sksec
= sk
->sk_security
;
4226 selinux_skb_peerlbl_sid(skb
, sk
->sk_family
, &sksec
->peer_sid
);
4229 static void selinux_req_classify_flow(const struct request_sock
*req
,
4232 fl
->secid
= req
->secid
;
4235 static int selinux_nlmsg_perm(struct sock
*sk
, struct sk_buff
*skb
)
4239 struct nlmsghdr
*nlh
;
4240 struct socket
*sock
= sk
->sk_socket
;
4241 struct inode_security_struct
*isec
= SOCK_INODE(sock
)->i_security
;
4243 if (skb
->len
< NLMSG_SPACE(0)) {
4247 nlh
= nlmsg_hdr(skb
);
4249 err
= selinux_nlmsg_lookup(isec
->sclass
, nlh
->nlmsg_type
, &perm
);
4251 if (err
== -EINVAL
) {
4252 audit_log(current
->audit_context
, GFP_KERNEL
, AUDIT_SELINUX_ERR
,
4253 "SELinux: unrecognized netlink message"
4254 " type=%hu for sclass=%hu\n",
4255 nlh
->nlmsg_type
, isec
->sclass
);
4256 if (!selinux_enforcing
)
4266 err
= socket_has_perm(current
, sock
, perm
);
4271 #ifdef CONFIG_NETFILTER
4273 static unsigned int selinux_ip_forward(struct sk_buff
*skb
, int ifindex
,
4278 struct avc_audit_data ad
;
4282 if (!selinux_policycap_netpeer
)
4285 secmark_active
= selinux_secmark_enabled();
4286 peerlbl_active
= netlbl_enabled() || selinux_xfrm_enabled();
4287 if (!secmark_active
&& !peerlbl_active
)
4290 AVC_AUDIT_DATA_INIT(&ad
, NET
);
4291 ad
.u
.net
.netif
= ifindex
;
4292 ad
.u
.net
.family
= family
;
4293 if (selinux_parse_skb(skb
, &ad
, &addrp
, 1, NULL
) != 0)
4296 if (selinux_skb_peerlbl_sid(skb
, family
, &peer_sid
) != 0)
4300 if (selinux_inet_sys_rcv_skb(ifindex
, addrp
, family
,
4301 peer_sid
, &ad
) != 0)
4305 if (avc_has_perm(peer_sid
, skb
->secmark
,
4306 SECCLASS_PACKET
, PACKET__FORWARD_IN
, &ad
))
4312 static unsigned int selinux_ipv4_forward(unsigned int hooknum
,
4313 struct sk_buff
*skb
,
4314 const struct net_device
*in
,
4315 const struct net_device
*out
,
4316 int (*okfn
)(struct sk_buff
*))
4318 return selinux_ip_forward(skb
, in
->ifindex
, PF_INET
);
4321 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
4322 static unsigned int selinux_ipv6_forward(unsigned int hooknum
,
4323 struct sk_buff
*skb
,
4324 const struct net_device
*in
,
4325 const struct net_device
*out
,
4326 int (*okfn
)(struct sk_buff
*))
4328 return selinux_ip_forward(skb
, in
->ifindex
, PF_INET6
);
4332 static int selinux_ip_postroute_iptables_compat(struct sock
*sk
,
4334 struct avc_audit_data
*ad
,
4335 u16 family
, char *addrp
)
4338 struct sk_security_struct
*sksec
= sk
->sk_security
;
4340 u32 netif_perm
, node_perm
, send_perm
;
4341 u32 port_sid
, node_sid
, if_sid
, sk_sid
;
4343 sk_sid
= sksec
->sid
;
4344 sk_class
= sksec
->sclass
;
4347 case SECCLASS_UDP_SOCKET
:
4348 netif_perm
= NETIF__UDP_SEND
;
4349 node_perm
= NODE__UDP_SEND
;
4350 send_perm
= UDP_SOCKET__SEND_MSG
;
4352 case SECCLASS_TCP_SOCKET
:
4353 netif_perm
= NETIF__TCP_SEND
;
4354 node_perm
= NODE__TCP_SEND
;
4355 send_perm
= TCP_SOCKET__SEND_MSG
;
4357 case SECCLASS_DCCP_SOCKET
:
4358 netif_perm
= NETIF__DCCP_SEND
;
4359 node_perm
= NODE__DCCP_SEND
;
4360 send_perm
= DCCP_SOCKET__SEND_MSG
;
4363 netif_perm
= NETIF__RAWIP_SEND
;
4364 node_perm
= NODE__RAWIP_SEND
;
4369 err
= sel_netif_sid(ifindex
, &if_sid
);
4372 err
= avc_has_perm(sk_sid
, if_sid
, SECCLASS_NETIF
, netif_perm
, ad
);
4375 err
= sel_netnode_sid(addrp
, family
, &node_sid
);
4378 err
= avc_has_perm(sk_sid
, node_sid
, SECCLASS_NODE
, node_perm
, ad
);
4385 err
= security_port_sid(sk
->sk_family
, sk
->sk_type
,
4386 sk
->sk_protocol
, ntohs(ad
->u
.net
.dport
),
4388 if (unlikely(err
)) {
4390 "SELinux: failure in"
4391 " selinux_ip_postroute_iptables_compat(),"
4392 " network port label not found\n");
4395 return avc_has_perm(sk_sid
, port_sid
, sk_class
, send_perm
, ad
);
4398 static unsigned int selinux_ip_postroute_compat(struct sk_buff
*skb
,
4400 struct avc_audit_data
*ad
,
4405 struct sock
*sk
= skb
->sk
;
4406 struct sk_security_struct
*sksec
;
4410 sksec
= sk
->sk_security
;
4412 if (selinux_compat_net
) {
4413 if (selinux_ip_postroute_iptables_compat(skb
->sk
, ifindex
,
4417 if (avc_has_perm(sksec
->sid
, skb
->secmark
,
4418 SECCLASS_PACKET
, PACKET__SEND
, ad
))
4422 if (selinux_policycap_netpeer
)
4423 if (selinux_xfrm_postroute_last(sksec
->sid
, skb
, ad
, proto
))
4429 static unsigned int selinux_ip_postroute(struct sk_buff
*skb
, int ifindex
,
4435 struct avc_audit_data ad
;
4441 AVC_AUDIT_DATA_INIT(&ad
, NET
);
4442 ad
.u
.net
.netif
= ifindex
;
4443 ad
.u
.net
.family
= family
;
4444 if (selinux_parse_skb(skb
, &ad
, &addrp
, 0, &proto
))
4447 /* If any sort of compatibility mode is enabled then handoff processing
4448 * to the selinux_ip_postroute_compat() function to deal with the
4449 * special handling. We do this in an attempt to keep this function
4450 * as fast and as clean as possible. */
4451 if (selinux_compat_net
|| !selinux_policycap_netpeer
)
4452 return selinux_ip_postroute_compat(skb
, ifindex
, &ad
,
4453 family
, addrp
, proto
);
4455 /* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec
4456 * packet transformation so allow the packet to pass without any checks
4457 * since we'll have another chance to perform access control checks
4458 * when the packet is on it's final way out.
4459 * NOTE: there appear to be some IPv6 multicast cases where skb->dst
4460 * is NULL, in this case go ahead and apply access control. */
4461 if (skb
->dst
!= NULL
&& skb
->dst
->xfrm
!= NULL
)
4464 secmark_active
= selinux_secmark_enabled();
4465 peerlbl_active
= netlbl_enabled() || selinux_xfrm_enabled();
4466 if (!secmark_active
&& !peerlbl_active
)
4469 /* if the packet is locally generated (skb->sk != NULL) then use the
4470 * socket's label as the peer label, otherwise the packet is being
4471 * forwarded through this system and we need to fetch the peer label
4472 * directly from the packet */
4475 struct sk_security_struct
*sksec
= sk
->sk_security
;
4476 peer_sid
= sksec
->sid
;
4477 secmark_perm
= PACKET__SEND
;
4479 if (selinux_skb_peerlbl_sid(skb
, family
, &peer_sid
))
4481 secmark_perm
= PACKET__FORWARD_OUT
;
4485 if (avc_has_perm(peer_sid
, skb
->secmark
,
4486 SECCLASS_PACKET
, secmark_perm
, &ad
))
4489 if (peerlbl_active
) {
4493 if (sel_netif_sid(ifindex
, &if_sid
))
4495 if (avc_has_perm(peer_sid
, if_sid
,
4496 SECCLASS_NETIF
, NETIF__EGRESS
, &ad
))
4499 if (sel_netnode_sid(addrp
, family
, &node_sid
))
4501 if (avc_has_perm(peer_sid
, node_sid
,
4502 SECCLASS_NODE
, NODE__SENDTO
, &ad
))
4509 static unsigned int selinux_ipv4_postroute(unsigned int hooknum
,
4510 struct sk_buff
*skb
,
4511 const struct net_device
*in
,
4512 const struct net_device
*out
,
4513 int (*okfn
)(struct sk_buff
*))
4515 return selinux_ip_postroute(skb
, out
->ifindex
, PF_INET
);
4518 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
4519 static unsigned int selinux_ipv6_postroute(unsigned int hooknum
,
4520 struct sk_buff
*skb
,
4521 const struct net_device
*in
,
4522 const struct net_device
*out
,
4523 int (*okfn
)(struct sk_buff
*))
4525 return selinux_ip_postroute(skb
, out
->ifindex
, PF_INET6
);
4529 #endif /* CONFIG_NETFILTER */
4531 static int selinux_netlink_send(struct sock
*sk
, struct sk_buff
*skb
)
4535 err
= secondary_ops
->netlink_send(sk
, skb
);
4539 if (policydb_loaded_version
>= POLICYDB_VERSION_NLCLASS
)
4540 err
= selinux_nlmsg_perm(sk
, skb
);
4545 static int selinux_netlink_recv(struct sk_buff
*skb
, int capability
)
4548 struct avc_audit_data ad
;
4550 err
= secondary_ops
->netlink_recv(skb
, capability
);
4554 AVC_AUDIT_DATA_INIT(&ad
, CAP
);
4555 ad
.u
.cap
= capability
;
4557 return avc_has_perm(NETLINK_CB(skb
).sid
, NETLINK_CB(skb
).sid
,
4558 SECCLASS_CAPABILITY
, CAP_TO_MASK(capability
), &ad
);
4561 static int ipc_alloc_security(struct task_struct
*task
,
4562 struct kern_ipc_perm
*perm
,
4565 struct task_security_struct
*tsec
= task
->security
;
4566 struct ipc_security_struct
*isec
;
4568 isec
= kzalloc(sizeof(struct ipc_security_struct
), GFP_KERNEL
);
4572 isec
->sclass
= sclass
;
4573 isec
->ipc_perm
= perm
;
4574 isec
->sid
= tsec
->sid
;
4575 perm
->security
= isec
;
4580 static void ipc_free_security(struct kern_ipc_perm
*perm
)
4582 struct ipc_security_struct
*isec
= perm
->security
;
4583 perm
->security
= NULL
;
4587 static int msg_msg_alloc_security(struct msg_msg
*msg
)
4589 struct msg_security_struct
*msec
;
4591 msec
= kzalloc(sizeof(struct msg_security_struct
), GFP_KERNEL
);
4596 msec
->sid
= SECINITSID_UNLABELED
;
4597 msg
->security
= msec
;
4602 static void msg_msg_free_security(struct msg_msg
*msg
)
4604 struct msg_security_struct
*msec
= msg
->security
;
4606 msg
->security
= NULL
;
4610 static int ipc_has_perm(struct kern_ipc_perm
*ipc_perms
,
4613 struct task_security_struct
*tsec
;
4614 struct ipc_security_struct
*isec
;
4615 struct avc_audit_data ad
;
4617 tsec
= current
->security
;
4618 isec
= ipc_perms
->security
;
4620 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4621 ad
.u
.ipc_id
= ipc_perms
->key
;
4623 return avc_has_perm(tsec
->sid
, isec
->sid
, isec
->sclass
, perms
, &ad
);
4626 static int selinux_msg_msg_alloc_security(struct msg_msg
*msg
)
4628 return msg_msg_alloc_security(msg
);
4631 static void selinux_msg_msg_free_security(struct msg_msg
*msg
)
4633 msg_msg_free_security(msg
);
4636 /* message queue security operations */
4637 static int selinux_msg_queue_alloc_security(struct msg_queue
*msq
)
4639 struct task_security_struct
*tsec
;
4640 struct ipc_security_struct
*isec
;
4641 struct avc_audit_data ad
;
4644 rc
= ipc_alloc_security(current
, &msq
->q_perm
, SECCLASS_MSGQ
);
4648 tsec
= current
->security
;
4649 isec
= msq
->q_perm
.security
;
4651 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4652 ad
.u
.ipc_id
= msq
->q_perm
.key
;
4654 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_MSGQ
,
4657 ipc_free_security(&msq
->q_perm
);
4663 static void selinux_msg_queue_free_security(struct msg_queue
*msq
)
4665 ipc_free_security(&msq
->q_perm
);
4668 static int selinux_msg_queue_associate(struct msg_queue
*msq
, int msqflg
)
4670 struct task_security_struct
*tsec
;
4671 struct ipc_security_struct
*isec
;
4672 struct avc_audit_data ad
;
4674 tsec
= current
->security
;
4675 isec
= msq
->q_perm
.security
;
4677 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4678 ad
.u
.ipc_id
= msq
->q_perm
.key
;
4680 return avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_MSGQ
,
4681 MSGQ__ASSOCIATE
, &ad
);
4684 static int selinux_msg_queue_msgctl(struct msg_queue
*msq
, int cmd
)
4692 /* No specific object, just general system-wide information. */
4693 return task_has_system(current
, SYSTEM__IPC_INFO
);
4696 perms
= MSGQ__GETATTR
| MSGQ__ASSOCIATE
;
4699 perms
= MSGQ__SETATTR
;
4702 perms
= MSGQ__DESTROY
;
4708 err
= ipc_has_perm(&msq
->q_perm
, perms
);
4712 static int selinux_msg_queue_msgsnd(struct msg_queue
*msq
, struct msg_msg
*msg
, int msqflg
)
4714 struct task_security_struct
*tsec
;
4715 struct ipc_security_struct
*isec
;
4716 struct msg_security_struct
*msec
;
4717 struct avc_audit_data ad
;
4720 tsec
= current
->security
;
4721 isec
= msq
->q_perm
.security
;
4722 msec
= msg
->security
;
4725 * First time through, need to assign label to the message
4727 if (msec
->sid
== SECINITSID_UNLABELED
) {
4729 * Compute new sid based on current process and
4730 * message queue this message will be stored in
4732 rc
= security_transition_sid(tsec
->sid
,
4740 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4741 ad
.u
.ipc_id
= msq
->q_perm
.key
;
4743 /* Can this process write to the queue? */
4744 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_MSGQ
,
4747 /* Can this process send the message */
4748 rc
= avc_has_perm(tsec
->sid
, msec
->sid
,
4749 SECCLASS_MSG
, MSG__SEND
, &ad
);
4751 /* Can the message be put in the queue? */
4752 rc
= avc_has_perm(msec
->sid
, isec
->sid
,
4753 SECCLASS_MSGQ
, MSGQ__ENQUEUE
, &ad
);
4758 static int selinux_msg_queue_msgrcv(struct msg_queue
*msq
, struct msg_msg
*msg
,
4759 struct task_struct
*target
,
4760 long type
, int mode
)
4762 struct task_security_struct
*tsec
;
4763 struct ipc_security_struct
*isec
;
4764 struct msg_security_struct
*msec
;
4765 struct avc_audit_data ad
;
4768 tsec
= target
->security
;
4769 isec
= msq
->q_perm
.security
;
4770 msec
= msg
->security
;
4772 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4773 ad
.u
.ipc_id
= msq
->q_perm
.key
;
4775 rc
= avc_has_perm(tsec
->sid
, isec
->sid
,
4776 SECCLASS_MSGQ
, MSGQ__READ
, &ad
);
4778 rc
= avc_has_perm(tsec
->sid
, msec
->sid
,
4779 SECCLASS_MSG
, MSG__RECEIVE
, &ad
);
4783 /* Shared Memory security operations */
4784 static int selinux_shm_alloc_security(struct shmid_kernel
*shp
)
4786 struct task_security_struct
*tsec
;
4787 struct ipc_security_struct
*isec
;
4788 struct avc_audit_data ad
;
4791 rc
= ipc_alloc_security(current
, &shp
->shm_perm
, SECCLASS_SHM
);
4795 tsec
= current
->security
;
4796 isec
= shp
->shm_perm
.security
;
4798 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4799 ad
.u
.ipc_id
= shp
->shm_perm
.key
;
4801 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_SHM
,
4804 ipc_free_security(&shp
->shm_perm
);
4810 static void selinux_shm_free_security(struct shmid_kernel
*shp
)
4812 ipc_free_security(&shp
->shm_perm
);
4815 static int selinux_shm_associate(struct shmid_kernel
*shp
, int shmflg
)
4817 struct task_security_struct
*tsec
;
4818 struct ipc_security_struct
*isec
;
4819 struct avc_audit_data ad
;
4821 tsec
= current
->security
;
4822 isec
= shp
->shm_perm
.security
;
4824 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4825 ad
.u
.ipc_id
= shp
->shm_perm
.key
;
4827 return avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_SHM
,
4828 SHM__ASSOCIATE
, &ad
);
4831 /* Note, at this point, shp is locked down */
4832 static int selinux_shm_shmctl(struct shmid_kernel
*shp
, int cmd
)
4840 /* No specific object, just general system-wide information. */
4841 return task_has_system(current
, SYSTEM__IPC_INFO
);
4844 perms
= SHM__GETATTR
| SHM__ASSOCIATE
;
4847 perms
= SHM__SETATTR
;
4854 perms
= SHM__DESTROY
;
4860 err
= ipc_has_perm(&shp
->shm_perm
, perms
);
4864 static int selinux_shm_shmat(struct shmid_kernel
*shp
,
4865 char __user
*shmaddr
, int shmflg
)
4870 rc
= secondary_ops
->shm_shmat(shp
, shmaddr
, shmflg
);
4874 if (shmflg
& SHM_RDONLY
)
4877 perms
= SHM__READ
| SHM__WRITE
;
4879 return ipc_has_perm(&shp
->shm_perm
, perms
);
4882 /* Semaphore security operations */
4883 static int selinux_sem_alloc_security(struct sem_array
*sma
)
4885 struct task_security_struct
*tsec
;
4886 struct ipc_security_struct
*isec
;
4887 struct avc_audit_data ad
;
4890 rc
= ipc_alloc_security(current
, &sma
->sem_perm
, SECCLASS_SEM
);
4894 tsec
= current
->security
;
4895 isec
= sma
->sem_perm
.security
;
4897 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4898 ad
.u
.ipc_id
= sma
->sem_perm
.key
;
4900 rc
= avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_SEM
,
4903 ipc_free_security(&sma
->sem_perm
);
4909 static void selinux_sem_free_security(struct sem_array
*sma
)
4911 ipc_free_security(&sma
->sem_perm
);
4914 static int selinux_sem_associate(struct sem_array
*sma
, int semflg
)
4916 struct task_security_struct
*tsec
;
4917 struct ipc_security_struct
*isec
;
4918 struct avc_audit_data ad
;
4920 tsec
= current
->security
;
4921 isec
= sma
->sem_perm
.security
;
4923 AVC_AUDIT_DATA_INIT(&ad
, IPC
);
4924 ad
.u
.ipc_id
= sma
->sem_perm
.key
;
4926 return avc_has_perm(tsec
->sid
, isec
->sid
, SECCLASS_SEM
,
4927 SEM__ASSOCIATE
, &ad
);
4930 /* Note, at this point, sma is locked down */
4931 static int selinux_sem_semctl(struct sem_array
*sma
, int cmd
)
4939 /* No specific object, just general system-wide information. */
4940 return task_has_system(current
, SYSTEM__IPC_INFO
);
4944 perms
= SEM__GETATTR
;
4955 perms
= SEM__DESTROY
;
4958 perms
= SEM__SETATTR
;
4962 perms
= SEM__GETATTR
| SEM__ASSOCIATE
;
4968 err
= ipc_has_perm(&sma
->sem_perm
, perms
);
4972 static int selinux_sem_semop(struct sem_array
*sma
,
4973 struct sembuf
*sops
, unsigned nsops
, int alter
)
4978 perms
= SEM__READ
| SEM__WRITE
;
4982 return ipc_has_perm(&sma
->sem_perm
, perms
);
4985 static int selinux_ipc_permission(struct kern_ipc_perm
*ipcp
, short flag
)
4991 av
|= IPC__UNIX_READ
;
4993 av
|= IPC__UNIX_WRITE
;
4998 return ipc_has_perm(ipcp
, av
);
5001 /* module stacking operations */
5002 static int selinux_register_security (const char *name
, struct security_operations
*ops
)
5004 if (secondary_ops
!= original_ops
) {
5005 printk(KERN_ERR
"%s: There is already a secondary security "
5006 "module registered.\n", __FUNCTION__
);
5010 secondary_ops
= ops
;
5012 printk(KERN_INFO
"%s: Registering secondary module %s\n",
5019 static void selinux_d_instantiate (struct dentry
*dentry
, struct inode
*inode
)
5022 inode_doinit_with_dentry(inode
, dentry
);
5025 static int selinux_getprocattr(struct task_struct
*p
,
5026 char *name
, char **value
)
5028 struct task_security_struct
*tsec
;
5034 error
= task_has_perm(current
, p
, PROCESS__GETATTR
);
5041 if (!strcmp(name
, "current"))
5043 else if (!strcmp(name
, "prev"))
5045 else if (!strcmp(name
, "exec"))
5046 sid
= tsec
->exec_sid
;
5047 else if (!strcmp(name
, "fscreate"))
5048 sid
= tsec
->create_sid
;
5049 else if (!strcmp(name
, "keycreate"))
5050 sid
= tsec
->keycreate_sid
;
5051 else if (!strcmp(name
, "sockcreate"))
5052 sid
= tsec
->sockcreate_sid
;
5059 error
= security_sid_to_context(sid
, value
, &len
);
5065 static int selinux_setprocattr(struct task_struct
*p
,
5066 char *name
, void *value
, size_t size
)
5068 struct task_security_struct
*tsec
;
5074 /* SELinux only allows a process to change its own
5075 security attributes. */
5080 * Basic control over ability to set these attributes at all.
5081 * current == p, but we'll pass them separately in case the
5082 * above restriction is ever removed.
5084 if (!strcmp(name
, "exec"))
5085 error
= task_has_perm(current
, p
, PROCESS__SETEXEC
);
5086 else if (!strcmp(name
, "fscreate"))
5087 error
= task_has_perm(current
, p
, PROCESS__SETFSCREATE
);
5088 else if (!strcmp(name
, "keycreate"))
5089 error
= task_has_perm(current
, p
, PROCESS__SETKEYCREATE
);
5090 else if (!strcmp(name
, "sockcreate"))
5091 error
= task_has_perm(current
, p
, PROCESS__SETSOCKCREATE
);
5092 else if (!strcmp(name
, "current"))
5093 error
= task_has_perm(current
, p
, PROCESS__SETCURRENT
);
5099 /* Obtain a SID for the context, if one was specified. */
5100 if (size
&& str
[1] && str
[1] != '\n') {
5101 if (str
[size
-1] == '\n') {
5105 error
= security_context_to_sid(value
, size
, &sid
);
5110 /* Permission checking based on the specified context is
5111 performed during the actual operation (execve,
5112 open/mkdir/...), when we know the full context of the
5113 operation. See selinux_bprm_set_security for the execve
5114 checks and may_create for the file creation checks. The
5115 operation will then fail if the context is not permitted. */
5117 if (!strcmp(name
, "exec"))
5118 tsec
->exec_sid
= sid
;
5119 else if (!strcmp(name
, "fscreate"))
5120 tsec
->create_sid
= sid
;
5121 else if (!strcmp(name
, "keycreate")) {
5122 error
= may_create_key(sid
, p
);
5125 tsec
->keycreate_sid
= sid
;
5126 } else if (!strcmp(name
, "sockcreate"))
5127 tsec
->sockcreate_sid
= sid
;
5128 else if (!strcmp(name
, "current")) {
5129 struct av_decision avd
;
5134 /* Only allow single threaded processes to change context */
5135 if (atomic_read(&p
->mm
->mm_users
) != 1) {
5136 struct task_struct
*g
, *t
;
5137 struct mm_struct
*mm
= p
->mm
;
5138 read_lock(&tasklist_lock
);
5139 do_each_thread(g
, t
)
5140 if (t
->mm
== mm
&& t
!= p
) {
5141 read_unlock(&tasklist_lock
);
5144 while_each_thread(g
, t
);
5145 read_unlock(&tasklist_lock
);
5148 /* Check permissions for the transition. */
5149 error
= avc_has_perm(tsec
->sid
, sid
, SECCLASS_PROCESS
,
5150 PROCESS__DYNTRANSITION
, NULL
);
5154 /* Check for ptracing, and update the task SID if ok.
5155 Otherwise, leave SID unchanged and fail. */
5157 if (p
->ptrace
& PT_PTRACED
) {
5158 error
= avc_has_perm_noaudit(tsec
->ptrace_sid
, sid
,
5160 PROCESS__PTRACE
, 0, &avd
);
5164 avc_audit(tsec
->ptrace_sid
, sid
, SECCLASS_PROCESS
,
5165 PROCESS__PTRACE
, &avd
, error
, NULL
);
5179 static int selinux_secid_to_secctx(u32 secid
, char **secdata
, u32
*seclen
)
5181 return security_sid_to_context(secid
, secdata
, seclen
);
5184 static int selinux_secctx_to_secid(char *secdata
, u32 seclen
, u32
*secid
)
5186 return security_context_to_sid(secdata
, seclen
, secid
);
5189 static void selinux_release_secctx(char *secdata
, u32 seclen
)
5196 static int selinux_key_alloc(struct key
*k
, struct task_struct
*tsk
,
5197 unsigned long flags
)
5199 struct task_security_struct
*tsec
= tsk
->security
;
5200 struct key_security_struct
*ksec
;
5202 ksec
= kzalloc(sizeof(struct key_security_struct
), GFP_KERNEL
);
5207 if (tsec
->keycreate_sid
)
5208 ksec
->sid
= tsec
->keycreate_sid
;
5210 ksec
->sid
= tsec
->sid
;
5216 static void selinux_key_free(struct key
*k
)
5218 struct key_security_struct
*ksec
= k
->security
;
5224 static int selinux_key_permission(key_ref_t key_ref
,
5225 struct task_struct
*ctx
,
5229 struct task_security_struct
*tsec
;
5230 struct key_security_struct
*ksec
;
5232 key
= key_ref_to_ptr(key_ref
);
5234 tsec
= ctx
->security
;
5235 ksec
= key
->security
;
5237 /* if no specific permissions are requested, we skip the
5238 permission check. No serious, additional covert channels
5239 appear to be created. */
5243 return avc_has_perm(tsec
->sid
, ksec
->sid
,
5244 SECCLASS_KEY
, perm
, NULL
);
5249 static struct security_operations selinux_ops
= {
5250 .ptrace
= selinux_ptrace
,
5251 .capget
= selinux_capget
,
5252 .capset_check
= selinux_capset_check
,
5253 .capset_set
= selinux_capset_set
,
5254 .sysctl
= selinux_sysctl
,
5255 .capable
= selinux_capable
,
5256 .quotactl
= selinux_quotactl
,
5257 .quota_on
= selinux_quota_on
,
5258 .syslog
= selinux_syslog
,
5259 .vm_enough_memory
= selinux_vm_enough_memory
,
5261 .netlink_send
= selinux_netlink_send
,
5262 .netlink_recv
= selinux_netlink_recv
,
5264 .bprm_alloc_security
= selinux_bprm_alloc_security
,
5265 .bprm_free_security
= selinux_bprm_free_security
,
5266 .bprm_apply_creds
= selinux_bprm_apply_creds
,
5267 .bprm_post_apply_creds
= selinux_bprm_post_apply_creds
,
5268 .bprm_set_security
= selinux_bprm_set_security
,
5269 .bprm_check_security
= selinux_bprm_check_security
,
5270 .bprm_secureexec
= selinux_bprm_secureexec
,
5272 .sb_alloc_security
= selinux_sb_alloc_security
,
5273 .sb_free_security
= selinux_sb_free_security
,
5274 .sb_copy_data
= selinux_sb_copy_data
,
5275 .sb_kern_mount
= selinux_sb_kern_mount
,
5276 .sb_statfs
= selinux_sb_statfs
,
5277 .sb_mount
= selinux_mount
,
5278 .sb_umount
= selinux_umount
,
5279 .sb_get_mnt_opts
= selinux_get_mnt_opts
,
5280 .sb_set_mnt_opts
= selinux_set_mnt_opts
,
5281 .sb_clone_mnt_opts
= selinux_sb_clone_mnt_opts
,
5282 .sb_parse_opts_str
= selinux_parse_opts_str
,
5285 .inode_alloc_security
= selinux_inode_alloc_security
,
5286 .inode_free_security
= selinux_inode_free_security
,
5287 .inode_init_security
= selinux_inode_init_security
,
5288 .inode_create
= selinux_inode_create
,
5289 .inode_link
= selinux_inode_link
,
5290 .inode_unlink
= selinux_inode_unlink
,
5291 .inode_symlink
= selinux_inode_symlink
,
5292 .inode_mkdir
= selinux_inode_mkdir
,
5293 .inode_rmdir
= selinux_inode_rmdir
,
5294 .inode_mknod
= selinux_inode_mknod
,
5295 .inode_rename
= selinux_inode_rename
,
5296 .inode_readlink
= selinux_inode_readlink
,
5297 .inode_follow_link
= selinux_inode_follow_link
,
5298 .inode_permission
= selinux_inode_permission
,
5299 .inode_setattr
= selinux_inode_setattr
,
5300 .inode_getattr
= selinux_inode_getattr
,
5301 .inode_setxattr
= selinux_inode_setxattr
,
5302 .inode_post_setxattr
= selinux_inode_post_setxattr
,
5303 .inode_getxattr
= selinux_inode_getxattr
,
5304 .inode_listxattr
= selinux_inode_listxattr
,
5305 .inode_removexattr
= selinux_inode_removexattr
,
5306 .inode_getsecurity
= selinux_inode_getsecurity
,
5307 .inode_setsecurity
= selinux_inode_setsecurity
,
5308 .inode_listsecurity
= selinux_inode_listsecurity
,
5309 .inode_need_killpriv
= selinux_inode_need_killpriv
,
5310 .inode_killpriv
= selinux_inode_killpriv
,
5312 .file_permission
= selinux_file_permission
,
5313 .file_alloc_security
= selinux_file_alloc_security
,
5314 .file_free_security
= selinux_file_free_security
,
5315 .file_ioctl
= selinux_file_ioctl
,
5316 .file_mmap
= selinux_file_mmap
,
5317 .file_mprotect
= selinux_file_mprotect
,
5318 .file_lock
= selinux_file_lock
,
5319 .file_fcntl
= selinux_file_fcntl
,
5320 .file_set_fowner
= selinux_file_set_fowner
,
5321 .file_send_sigiotask
= selinux_file_send_sigiotask
,
5322 .file_receive
= selinux_file_receive
,
5324 .dentry_open
= selinux_dentry_open
,
5326 .task_create
= selinux_task_create
,
5327 .task_alloc_security
= selinux_task_alloc_security
,
5328 .task_free_security
= selinux_task_free_security
,
5329 .task_setuid
= selinux_task_setuid
,
5330 .task_post_setuid
= selinux_task_post_setuid
,
5331 .task_setgid
= selinux_task_setgid
,
5332 .task_setpgid
= selinux_task_setpgid
,
5333 .task_getpgid
= selinux_task_getpgid
,
5334 .task_getsid
= selinux_task_getsid
,
5335 .task_getsecid
= selinux_task_getsecid
,
5336 .task_setgroups
= selinux_task_setgroups
,
5337 .task_setnice
= selinux_task_setnice
,
5338 .task_setioprio
= selinux_task_setioprio
,
5339 .task_getioprio
= selinux_task_getioprio
,
5340 .task_setrlimit
= selinux_task_setrlimit
,
5341 .task_setscheduler
= selinux_task_setscheduler
,
5342 .task_getscheduler
= selinux_task_getscheduler
,
5343 .task_movememory
= selinux_task_movememory
,
5344 .task_kill
= selinux_task_kill
,
5345 .task_wait
= selinux_task_wait
,
5346 .task_prctl
= selinux_task_prctl
,
5347 .task_reparent_to_init
= selinux_task_reparent_to_init
,
5348 .task_to_inode
= selinux_task_to_inode
,
5350 .ipc_permission
= selinux_ipc_permission
,
5352 .msg_msg_alloc_security
= selinux_msg_msg_alloc_security
,
5353 .msg_msg_free_security
= selinux_msg_msg_free_security
,
5355 .msg_queue_alloc_security
= selinux_msg_queue_alloc_security
,
5356 .msg_queue_free_security
= selinux_msg_queue_free_security
,
5357 .msg_queue_associate
= selinux_msg_queue_associate
,
5358 .msg_queue_msgctl
= selinux_msg_queue_msgctl
,
5359 .msg_queue_msgsnd
= selinux_msg_queue_msgsnd
,
5360 .msg_queue_msgrcv
= selinux_msg_queue_msgrcv
,
5362 .shm_alloc_security
= selinux_shm_alloc_security
,
5363 .shm_free_security
= selinux_shm_free_security
,
5364 .shm_associate
= selinux_shm_associate
,
5365 .shm_shmctl
= selinux_shm_shmctl
,
5366 .shm_shmat
= selinux_shm_shmat
,
5368 .sem_alloc_security
= selinux_sem_alloc_security
,
5369 .sem_free_security
= selinux_sem_free_security
,
5370 .sem_associate
= selinux_sem_associate
,
5371 .sem_semctl
= selinux_sem_semctl
,
5372 .sem_semop
= selinux_sem_semop
,
5374 .register_security
= selinux_register_security
,
5376 .d_instantiate
= selinux_d_instantiate
,
5378 .getprocattr
= selinux_getprocattr
,
5379 .setprocattr
= selinux_setprocattr
,
5381 .secid_to_secctx
= selinux_secid_to_secctx
,
5382 .secctx_to_secid
= selinux_secctx_to_secid
,
5383 .release_secctx
= selinux_release_secctx
,
5385 .unix_stream_connect
= selinux_socket_unix_stream_connect
,
5386 .unix_may_send
= selinux_socket_unix_may_send
,
5388 .socket_create
= selinux_socket_create
,
5389 .socket_post_create
= selinux_socket_post_create
,
5390 .socket_bind
= selinux_socket_bind
,
5391 .socket_connect
= selinux_socket_connect
,
5392 .socket_listen
= selinux_socket_listen
,
5393 .socket_accept
= selinux_socket_accept
,
5394 .socket_sendmsg
= selinux_socket_sendmsg
,
5395 .socket_recvmsg
= selinux_socket_recvmsg
,
5396 .socket_getsockname
= selinux_socket_getsockname
,
5397 .socket_getpeername
= selinux_socket_getpeername
,
5398 .socket_getsockopt
= selinux_socket_getsockopt
,
5399 .socket_setsockopt
= selinux_socket_setsockopt
,
5400 .socket_shutdown
= selinux_socket_shutdown
,
5401 .socket_sock_rcv_skb
= selinux_socket_sock_rcv_skb
,
5402 .socket_getpeersec_stream
= selinux_socket_getpeersec_stream
,
5403 .socket_getpeersec_dgram
= selinux_socket_getpeersec_dgram
,
5404 .sk_alloc_security
= selinux_sk_alloc_security
,
5405 .sk_free_security
= selinux_sk_free_security
,
5406 .sk_clone_security
= selinux_sk_clone_security
,
5407 .sk_getsecid
= selinux_sk_getsecid
,
5408 .sock_graft
= selinux_sock_graft
,
5409 .inet_conn_request
= selinux_inet_conn_request
,
5410 .inet_csk_clone
= selinux_inet_csk_clone
,
5411 .inet_conn_established
= selinux_inet_conn_established
,
5412 .req_classify_flow
= selinux_req_classify_flow
,
5414 #ifdef CONFIG_SECURITY_NETWORK_XFRM
5415 .xfrm_policy_alloc_security
= selinux_xfrm_policy_alloc
,
5416 .xfrm_policy_clone_security
= selinux_xfrm_policy_clone
,
5417 .xfrm_policy_free_security
= selinux_xfrm_policy_free
,
5418 .xfrm_policy_delete_security
= selinux_xfrm_policy_delete
,
5419 .xfrm_state_alloc_security
= selinux_xfrm_state_alloc
,
5420 .xfrm_state_free_security
= selinux_xfrm_state_free
,
5421 .xfrm_state_delete_security
= selinux_xfrm_state_delete
,
5422 .xfrm_policy_lookup
= selinux_xfrm_policy_lookup
,
5423 .xfrm_state_pol_flow_match
= selinux_xfrm_state_pol_flow_match
,
5424 .xfrm_decode_session
= selinux_xfrm_decode_session
,
5428 .key_alloc
= selinux_key_alloc
,
5429 .key_free
= selinux_key_free
,
5430 .key_permission
= selinux_key_permission
,
5434 static __init
int selinux_init(void)
5436 struct task_security_struct
*tsec
;
5438 if (!selinux_enabled
) {
5439 printk(KERN_INFO
"SELinux: Disabled at boot.\n");
5443 printk(KERN_INFO
"SELinux: Initializing.\n");
5445 /* Set the security state for the initial task. */
5446 if (task_alloc_security(current
))
5447 panic("SELinux: Failed to initialize initial task.\n");
5448 tsec
= current
->security
;
5449 tsec
->osid
= tsec
->sid
= SECINITSID_KERNEL
;
5451 sel_inode_cache
= kmem_cache_create("selinux_inode_security",
5452 sizeof(struct inode_security_struct
),
5453 0, SLAB_PANIC
, NULL
);
5456 original_ops
= secondary_ops
= security_ops
;
5458 panic ("SELinux: No initial security operations\n");
5459 if (register_security (&selinux_ops
))
5460 panic("SELinux: Unable to register with kernel.\n");
5462 if (selinux_enforcing
) {
5463 printk(KERN_DEBUG
"SELinux: Starting in enforcing mode\n");
5465 printk(KERN_DEBUG
"SELinux: Starting in permissive mode\n");
5469 /* Add security information to initial keyrings */
5470 selinux_key_alloc(&root_user_keyring
, current
,
5471 KEY_ALLOC_NOT_IN_QUOTA
);
5472 selinux_key_alloc(&root_session_keyring
, current
,
5473 KEY_ALLOC_NOT_IN_QUOTA
);
5479 void selinux_complete_init(void)
5481 printk(KERN_DEBUG
"SELinux: Completing initialization.\n");
5483 /* Set up any superblocks initialized prior to the policy load. */
5484 printk(KERN_DEBUG
"SELinux: Setting up existing superblocks.\n");
5485 spin_lock(&sb_lock
);
5486 spin_lock(&sb_security_lock
);
5488 if (!list_empty(&superblock_security_head
)) {
5489 struct superblock_security_struct
*sbsec
=
5490 list_entry(superblock_security_head
.next
,
5491 struct superblock_security_struct
,
5493 struct super_block
*sb
= sbsec
->sb
;
5495 spin_unlock(&sb_security_lock
);
5496 spin_unlock(&sb_lock
);
5497 down_read(&sb
->s_umount
);
5499 superblock_doinit(sb
, NULL
);
5501 spin_lock(&sb_lock
);
5502 spin_lock(&sb_security_lock
);
5503 list_del_init(&sbsec
->list
);
5506 spin_unlock(&sb_security_lock
);
5507 spin_unlock(&sb_lock
);
5510 /* SELinux requires early initialization in order to label
5511 all processes and objects when they are created. */
5512 security_initcall(selinux_init
);
5514 #if defined(CONFIG_NETFILTER)
5516 static struct nf_hook_ops selinux_ipv4_ops
[] = {
5518 .hook
= selinux_ipv4_postroute
,
5519 .owner
= THIS_MODULE
,
5521 .hooknum
= NF_INET_POST_ROUTING
,
5522 .priority
= NF_IP_PRI_SELINUX_LAST
,
5525 .hook
= selinux_ipv4_forward
,
5526 .owner
= THIS_MODULE
,
5528 .hooknum
= NF_INET_FORWARD
,
5529 .priority
= NF_IP_PRI_SELINUX_FIRST
,
5533 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
5535 static struct nf_hook_ops selinux_ipv6_ops
[] = {
5537 .hook
= selinux_ipv6_postroute
,
5538 .owner
= THIS_MODULE
,
5540 .hooknum
= NF_INET_POST_ROUTING
,
5541 .priority
= NF_IP6_PRI_SELINUX_LAST
,
5544 .hook
= selinux_ipv6_forward
,
5545 .owner
= THIS_MODULE
,
5547 .hooknum
= NF_INET_FORWARD
,
5548 .priority
= NF_IP6_PRI_SELINUX_FIRST
,
5554 static int __init
selinux_nf_ip_init(void)
5559 if (!selinux_enabled
)
5562 printk(KERN_DEBUG
"SELinux: Registering netfilter hooks\n");
5564 for (iter
= 0; iter
< ARRAY_SIZE(selinux_ipv4_ops
); iter
++) {
5565 err
= nf_register_hook(&selinux_ipv4_ops
[iter
]);
5567 panic("SELinux: nf_register_hook for IPv4: error %d\n",
5571 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
5572 for (iter
= 0; iter
< ARRAY_SIZE(selinux_ipv6_ops
); iter
++) {
5573 err
= nf_register_hook(&selinux_ipv6_ops
[iter
]);
5575 panic("SELinux: nf_register_hook for IPv6: error %d\n",
5584 __initcall(selinux_nf_ip_init
);
5586 #ifdef CONFIG_SECURITY_SELINUX_DISABLE
5587 static void selinux_nf_ip_exit(void)
5591 printk(KERN_DEBUG
"SELinux: Unregistering netfilter hooks\n");
5593 for (iter
= 0; iter
< ARRAY_SIZE(selinux_ipv4_ops
); iter
++)
5594 nf_unregister_hook(&selinux_ipv4_ops
[iter
]);
5595 #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
5596 for (iter
= 0; iter
< ARRAY_SIZE(selinux_ipv6_ops
); iter
++)
5597 nf_unregister_hook(&selinux_ipv6_ops
[iter
]);
5602 #else /* CONFIG_NETFILTER */
5604 #ifdef CONFIG_SECURITY_SELINUX_DISABLE
5605 #define selinux_nf_ip_exit()
5608 #endif /* CONFIG_NETFILTER */
5610 #ifdef CONFIG_SECURITY_SELINUX_DISABLE
5611 int selinux_disable(void)
5613 extern void exit_sel_fs(void);
5614 static int selinux_disabled
= 0;
5616 if (ss_initialized
) {
5617 /* Not permitted after initial policy load. */
5621 if (selinux_disabled
) {
5622 /* Only do this once. */
5626 printk(KERN_INFO
"SELinux: Disabled at runtime.\n");
5628 selinux_disabled
= 1;
5629 selinux_enabled
= 0;
5631 /* Reset security_ops to the secondary module, dummy or capability. */
5632 security_ops
= secondary_ops
;
5634 /* Unregister netfilter hooks. */
5635 selinux_nf_ip_exit();
5637 /* Unregister selinuxfs. */