2006-08-04 07:48:37 +08:00
|
|
|
/*
|
|
|
|
* NetLabel Kernel API
|
|
|
|
*
|
|
|
|
* This file defines the kernel API for the NetLabel system. The NetLabel
|
|
|
|
* system manages static and dynamic label mappings for network protocols such
|
|
|
|
* as CIPSO and RIPSO.
|
|
|
|
*
|
2011-08-01 19:10:33 +08:00
|
|
|
* Author: Paul Moore <paul@paul-moore.com>
|
2006-08-04 07:48:37 +08:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
2008-10-10 22:16:33 +08:00
|
|
|
* (c) Copyright Hewlett-Packard Development Company, L.P., 2006, 2008
|
2006-08-04 07:48:37 +08:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
|
|
* the GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2013-12-07 01:13:41 +08:00
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2006-08-04 07:48:37 +08:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/types.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2008-02-05 14:29:47 +08:00
|
|
|
#include <linux/audit.h>
|
2009-01-01 01:54:11 +08:00
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/in6.h>
|
2006-08-04 07:48:37 +08:00
|
|
|
#include <net/ip.h>
|
2009-01-01 01:54:11 +08:00
|
|
|
#include <net/ipv6.h>
|
2006-08-04 07:48:37 +08:00
|
|
|
#include <net/netlabel.h>
|
|
|
|
#include <net/cipso_ipv4.h>
|
|
|
|
#include <asm/bug.h>
|
2011-07-27 07:09:06 +08:00
|
|
|
#include <linux/atomic.h>
|
2006-08-04 07:48:37 +08:00
|
|
|
|
|
|
|
#include "netlabel_domainhash.h"
|
|
|
|
#include "netlabel_unlabeled.h"
|
2008-02-05 14:29:47 +08:00
|
|
|
#include "netlabel_cipso_v4.h"
|
2006-08-04 07:48:37 +08:00
|
|
|
#include "netlabel_user.h"
|
2007-07-19 00:28:45 +08:00
|
|
|
#include "netlabel_mgmt.h"
|
2009-01-01 01:54:11 +08:00
|
|
|
#include "netlabel_addrlist.h"
|
2006-08-04 07:48:37 +08:00
|
|
|
|
2008-02-05 14:29:47 +08:00
|
|
|
/*
|
|
|
|
* Configuration Functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cfg_map_del - Remove a NetLabel/LSM domain mapping
|
|
|
|
* @domain: the domain mapping to remove
|
2009-01-01 01:54:11 +08:00
|
|
|
* @family: address family
|
|
|
|
* @addr: IP address
|
|
|
|
* @mask: IP address mask
|
2008-02-05 14:29:47 +08:00
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Removes a NetLabel/LSM domain mapping. A @domain value of NULL causes the
|
|
|
|
* default domain mapping to be removed. Returns zero on success, negative
|
|
|
|
* values on failure.
|
|
|
|
*
|
|
|
|
*/
|
2009-01-01 01:54:11 +08:00
|
|
|
int netlbl_cfg_map_del(const char *domain,
|
|
|
|
u16 family,
|
|
|
|
const void *addr,
|
|
|
|
const void *mask,
|
|
|
|
struct netlbl_audit *audit_info)
|
2008-02-05 14:29:47 +08:00
|
|
|
{
|
2009-01-01 01:54:11 +08:00
|
|
|
if (addr == NULL && mask == NULL) {
|
|
|
|
return netlbl_domhsh_remove(domain, audit_info);
|
|
|
|
} else if (addr != NULL && mask != NULL) {
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
return netlbl_domhsh_remove_af4(domain, addr, mask,
|
|
|
|
audit_info);
|
|
|
|
default:
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
return -EINVAL;
|
2008-02-05 14:29:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2009-01-01 01:54:11 +08:00
|
|
|
* netlbl_cfg_unlbl_map_add - Add a new unlabeled mapping
|
2008-02-05 14:29:47 +08:00
|
|
|
* @domain: the domain mapping to add
|
2009-01-01 01:54:11 +08:00
|
|
|
* @family: address family
|
|
|
|
* @addr: IP address
|
|
|
|
* @mask: IP address mask
|
2008-02-05 14:29:47 +08:00
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Adds a new unlabeled NetLabel/LSM domain mapping. A @domain value of NULL
|
|
|
|
* causes a new default domain mapping to be added. Returns zero on success,
|
|
|
|
* negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
2009-01-01 01:54:11 +08:00
|
|
|
int netlbl_cfg_unlbl_map_add(const char *domain,
|
|
|
|
u16 family,
|
|
|
|
const void *addr,
|
|
|
|
const void *mask,
|
2008-02-05 14:29:47 +08:00
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
int ret_val = -ENOMEM;
|
|
|
|
struct netlbl_dom_map *entry;
|
2009-01-01 01:54:11 +08:00
|
|
|
struct netlbl_domaddr_map *addrmap = NULL;
|
|
|
|
struct netlbl_domaddr4_map *map4 = NULL;
|
|
|
|
struct netlbl_domaddr6_map *map6 = NULL;
|
2008-02-05 14:29:47 +08:00
|
|
|
|
|
|
|
entry = kzalloc(sizeof(*entry), GFP_ATOMIC);
|
|
|
|
if (entry == NULL)
|
2008-10-10 22:16:30 +08:00
|
|
|
return -ENOMEM;
|
2008-02-05 14:29:47 +08:00
|
|
|
if (domain != NULL) {
|
|
|
|
entry->domain = kstrdup(domain, GFP_ATOMIC);
|
|
|
|
if (entry->domain == NULL)
|
2009-01-01 01:54:11 +08:00
|
|
|
goto cfg_unlbl_map_add_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (addr == NULL && mask == NULL)
|
2013-08-03 02:45:08 +08:00
|
|
|
entry->def.type = NETLBL_NLTYPE_UNLABELED;
|
2009-01-01 01:54:11 +08:00
|
|
|
else if (addr != NULL && mask != NULL) {
|
|
|
|
addrmap = kzalloc(sizeof(*addrmap), GFP_ATOMIC);
|
|
|
|
if (addrmap == NULL)
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
|
|
|
INIT_LIST_HEAD(&addrmap->list4);
|
|
|
|
INIT_LIST_HEAD(&addrmap->list6);
|
|
|
|
|
|
|
|
switch (family) {
|
2011-11-29 18:10:54 +08:00
|
|
|
case AF_INET: {
|
|
|
|
const struct in_addr *addr4 = addr;
|
|
|
|
const struct in_addr *mask4 = mask;
|
2009-01-01 01:54:11 +08:00
|
|
|
map4 = kzalloc(sizeof(*map4), GFP_ATOMIC);
|
|
|
|
if (map4 == NULL)
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
2013-08-03 02:45:08 +08:00
|
|
|
map4->def.type = NETLBL_NLTYPE_UNLABELED;
|
2009-01-01 01:54:11 +08:00
|
|
|
map4->list.addr = addr4->s_addr & mask4->s_addr;
|
|
|
|
map4->list.mask = mask4->s_addr;
|
|
|
|
map4->list.valid = 1;
|
|
|
|
ret_val = netlbl_af4list_add(&map4->list,
|
|
|
|
&addrmap->list4);
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
|
|
|
break;
|
2011-11-29 18:10:54 +08:00
|
|
|
}
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2011-11-29 18:10:54 +08:00
|
|
|
case AF_INET6: {
|
|
|
|
const struct in6_addr *addr6 = addr;
|
|
|
|
const struct in6_addr *mask6 = mask;
|
2009-01-01 01:54:11 +08:00
|
|
|
map6 = kzalloc(sizeof(*map6), GFP_ATOMIC);
|
2009-07-30 12:38:19 +08:00
|
|
|
if (map6 == NULL)
|
2009-01-01 01:54:11 +08:00
|
|
|
goto cfg_unlbl_map_add_failure;
|
2013-08-03 02:45:08 +08:00
|
|
|
map6->def.type = NETLBL_NLTYPE_UNLABELED;
|
2011-11-21 11:39:03 +08:00
|
|
|
map6->list.addr = *addr6;
|
2009-01-01 01:54:11 +08:00
|
|
|
map6->list.addr.s6_addr32[0] &= mask6->s6_addr32[0];
|
|
|
|
map6->list.addr.s6_addr32[1] &= mask6->s6_addr32[1];
|
|
|
|
map6->list.addr.s6_addr32[2] &= mask6->s6_addr32[2];
|
|
|
|
map6->list.addr.s6_addr32[3] &= mask6->s6_addr32[3];
|
2011-11-21 11:39:03 +08:00
|
|
|
map6->list.mask = *mask6;
|
2009-01-01 01:54:11 +08:00
|
|
|
map6->list.valid = 1;
|
2011-11-24 05:18:20 +08:00
|
|
|
ret_val = netlbl_af6list_add(&map6->list,
|
|
|
|
&addrmap->list6);
|
2009-01-01 01:54:11 +08:00
|
|
|
if (ret_val != 0)
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
|
|
|
break;
|
2011-11-29 18:10:54 +08:00
|
|
|
}
|
|
|
|
#endif /* IPv6 */
|
2009-01-01 01:54:11 +08:00
|
|
|
default:
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-08-03 02:45:08 +08:00
|
|
|
entry->def.addrsel = addrmap;
|
|
|
|
entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
|
2009-01-01 01:54:11 +08:00
|
|
|
} else {
|
|
|
|
ret_val = -EINVAL;
|
|
|
|
goto cfg_unlbl_map_add_failure;
|
2008-02-05 14:29:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ret_val = netlbl_domhsh_add(entry, audit_info);
|
|
|
|
if (ret_val != 0)
|
2009-01-01 01:54:11 +08:00
|
|
|
goto cfg_unlbl_map_add_failure;
|
2008-02-05 14:29:47 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
cfg_unlbl_map_add_failure:
|
2009-07-27 14:15:43 +08:00
|
|
|
kfree(entry->domain);
|
2008-02-05 14:29:47 +08:00
|
|
|
kfree(entry);
|
2009-01-01 01:54:11 +08:00
|
|
|
kfree(addrmap);
|
|
|
|
kfree(map4);
|
|
|
|
kfree(map6);
|
2008-02-05 14:29:47 +08:00
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cfg_unlbl_static_add - Adds a new static label
|
|
|
|
* @net: network namespace
|
|
|
|
* @dev_name: interface name
|
|
|
|
* @addr: IP address in network byte order (struct in[6]_addr)
|
|
|
|
* @mask: address mask in network byte order (struct in[6]_addr)
|
|
|
|
* @family: address family
|
|
|
|
* @secid: LSM secid value for the entry
|
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Adds a new NetLabel static label to be used when protocol provided labels
|
|
|
|
* are not present on incoming traffic. If @dev_name is NULL then the default
|
|
|
|
* interface will be used. Returns zero on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_cfg_unlbl_static_add(struct net *net,
|
|
|
|
const char *dev_name,
|
|
|
|
const void *addr,
|
|
|
|
const void *mask,
|
|
|
|
u16 family,
|
|
|
|
u32 secid,
|
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
u32 addr_len;
|
|
|
|
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
addr_len = sizeof(struct in_addr);
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-01-01 01:54:11 +08:00
|
|
|
case AF_INET6:
|
|
|
|
addr_len = sizeof(struct in6_addr);
|
|
|
|
break;
|
2011-11-29 18:10:54 +08:00
|
|
|
#endif /* IPv6 */
|
2009-01-01 01:54:11 +08:00
|
|
|
default:
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
return netlbl_unlhsh_add(net,
|
|
|
|
dev_name, addr, mask, addr_len,
|
|
|
|
secid, audit_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cfg_unlbl_static_del - Removes an existing static label
|
|
|
|
* @net: network namespace
|
|
|
|
* @dev_name: interface name
|
|
|
|
* @addr: IP address in network byte order (struct in[6]_addr)
|
|
|
|
* @mask: address mask in network byte order (struct in[6]_addr)
|
|
|
|
* @family: address family
|
|
|
|
* @secid: LSM secid value for the entry
|
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Removes an existing NetLabel static label used when protocol provided labels
|
|
|
|
* are not present on incoming traffic. If @dev_name is NULL then the default
|
|
|
|
* interface will be used. Returns zero on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_cfg_unlbl_static_del(struct net *net,
|
|
|
|
const char *dev_name,
|
|
|
|
const void *addr,
|
|
|
|
const void *mask,
|
|
|
|
u16 family,
|
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
u32 addr_len;
|
|
|
|
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
addr_len = sizeof(struct in_addr);
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-01-01 01:54:11 +08:00
|
|
|
case AF_INET6:
|
|
|
|
addr_len = sizeof(struct in6_addr);
|
|
|
|
break;
|
2011-11-29 18:10:54 +08:00
|
|
|
#endif /* IPv6 */
|
2009-01-01 01:54:11 +08:00
|
|
|
default:
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
return netlbl_unlhsh_remove(net,
|
|
|
|
dev_name, addr, mask, addr_len,
|
|
|
|
audit_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cfg_cipsov4_add - Add a new CIPSOv4 DOI definition
|
|
|
|
* @doi_def: CIPSO DOI definition
|
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Add a new CIPSO DOI definition as defined by @doi_def. Returns zero on
|
|
|
|
* success and negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_cfg_cipsov4_add(struct cipso_v4_doi *doi_def,
|
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
return cipso_v4_doi_add(doi_def, audit_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cfg_cipsov4_del - Remove an existing CIPSOv4 DOI definition
|
|
|
|
* @doi: CIPSO DOI
|
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Remove an existing CIPSO DOI definition matching @doi. Returns zero on
|
|
|
|
* success and negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void netlbl_cfg_cipsov4_del(u32 doi, struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
cipso_v4_doi_remove(doi, audit_info);
|
|
|
|
}
|
|
|
|
|
2008-02-05 14:29:47 +08:00
|
|
|
/**
|
2009-01-01 01:54:11 +08:00
|
|
|
* netlbl_cfg_cipsov4_map_add - Add a new CIPSOv4 DOI mapping
|
|
|
|
* @doi: the CIPSO DOI
|
2008-02-05 14:29:47 +08:00
|
|
|
* @domain: the domain mapping to add
|
2009-01-01 01:54:11 +08:00
|
|
|
* @addr: IP address
|
|
|
|
* @mask: IP address mask
|
2008-02-05 14:29:47 +08:00
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
2009-01-01 01:54:11 +08:00
|
|
|
* Add a new NetLabel/LSM domain mapping for the given CIPSO DOI to the NetLabel
|
|
|
|
* subsystem. A @domain value of NULL adds a new default domain mapping.
|
|
|
|
* Returns zero on success, negative values on failure.
|
2008-02-05 14:29:47 +08:00
|
|
|
*
|
|
|
|
*/
|
2009-01-01 01:54:11 +08:00
|
|
|
int netlbl_cfg_cipsov4_map_add(u32 doi,
|
2008-02-05 14:29:47 +08:00
|
|
|
const char *domain,
|
2009-01-01 01:54:11 +08:00
|
|
|
const struct in_addr *addr,
|
|
|
|
const struct in_addr *mask,
|
2008-02-05 14:29:47 +08:00
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
int ret_val = -ENOMEM;
|
2009-01-01 01:54:11 +08:00
|
|
|
struct cipso_v4_doi *doi_def;
|
2008-02-05 14:29:47 +08:00
|
|
|
struct netlbl_dom_map *entry;
|
2009-01-01 01:54:11 +08:00
|
|
|
struct netlbl_domaddr_map *addrmap = NULL;
|
|
|
|
struct netlbl_domaddr4_map *addrinfo = NULL;
|
2008-02-05 14:29:47 +08:00
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
doi_def = cipso_v4_doi_getdef(doi);
|
|
|
|
if (doi_def == NULL)
|
|
|
|
return -ENOENT;
|
2008-10-10 22:16:31 +08:00
|
|
|
|
2008-02-05 14:29:47 +08:00
|
|
|
entry = kzalloc(sizeof(*entry), GFP_ATOMIC);
|
|
|
|
if (entry == NULL)
|
2011-08-11 08:06:04 +08:00
|
|
|
goto out_entry;
|
2008-02-05 14:29:47 +08:00
|
|
|
if (domain != NULL) {
|
|
|
|
entry->domain = kstrdup(domain, GFP_ATOMIC);
|
|
|
|
if (entry->domain == NULL)
|
2011-08-11 08:06:04 +08:00
|
|
|
goto out_domain;
|
2008-02-05 14:29:47 +08:00
|
|
|
}
|
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
if (addr == NULL && mask == NULL) {
|
2013-08-03 02:45:08 +08:00
|
|
|
entry->def.cipso = doi_def;
|
|
|
|
entry->def.type = NETLBL_NLTYPE_CIPSOV4;
|
2009-01-01 01:54:11 +08:00
|
|
|
} else if (addr != NULL && mask != NULL) {
|
|
|
|
addrmap = kzalloc(sizeof(*addrmap), GFP_ATOMIC);
|
|
|
|
if (addrmap == NULL)
|
2011-08-11 08:06:04 +08:00
|
|
|
goto out_addrmap;
|
2009-01-01 01:54:11 +08:00
|
|
|
INIT_LIST_HEAD(&addrmap->list4);
|
|
|
|
INIT_LIST_HEAD(&addrmap->list6);
|
|
|
|
|
|
|
|
addrinfo = kzalloc(sizeof(*addrinfo), GFP_ATOMIC);
|
|
|
|
if (addrinfo == NULL)
|
2011-08-11 08:06:04 +08:00
|
|
|
goto out_addrinfo;
|
2013-08-03 02:45:08 +08:00
|
|
|
addrinfo->def.cipso = doi_def;
|
|
|
|
addrinfo->def.type = NETLBL_NLTYPE_CIPSOV4;
|
2009-01-01 01:54:11 +08:00
|
|
|
addrinfo->list.addr = addr->s_addr & mask->s_addr;
|
|
|
|
addrinfo->list.mask = mask->s_addr;
|
|
|
|
addrinfo->list.valid = 1;
|
|
|
|
ret_val = netlbl_af4list_add(&addrinfo->list, &addrmap->list4);
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto cfg_cipsov4_map_add_failure;
|
|
|
|
|
2013-08-03 02:45:08 +08:00
|
|
|
entry->def.addrsel = addrmap;
|
|
|
|
entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
|
2009-01-01 01:54:11 +08:00
|
|
|
} else {
|
|
|
|
ret_val = -EINVAL;
|
2011-08-11 08:06:04 +08:00
|
|
|
goto out_addrmap;
|
2008-10-10 22:16:31 +08:00
|
|
|
}
|
2009-01-01 01:54:11 +08:00
|
|
|
|
2008-02-05 14:29:47 +08:00
|
|
|
ret_val = netlbl_domhsh_add(entry, audit_info);
|
|
|
|
if (ret_val != 0)
|
2009-01-01 01:54:11 +08:00
|
|
|
goto cfg_cipsov4_map_add_failure;
|
2008-10-10 22:16:31 +08:00
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
return 0;
|
2008-10-10 22:16:31 +08:00
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
cfg_cipsov4_map_add_failure:
|
2011-08-11 08:06:04 +08:00
|
|
|
kfree(addrinfo);
|
|
|
|
out_addrinfo:
|
|
|
|
kfree(addrmap);
|
|
|
|
out_addrmap:
|
2009-07-27 14:15:43 +08:00
|
|
|
kfree(entry->domain);
|
2011-08-11 08:06:04 +08:00
|
|
|
out_domain:
|
2008-02-05 14:29:47 +08:00
|
|
|
kfree(entry);
|
2011-08-11 08:06:04 +08:00
|
|
|
out_entry:
|
|
|
|
cipso_v4_doi_putdef(doi_def);
|
2009-01-01 01:54:11 +08:00
|
|
|
return ret_val;
|
2008-02-05 14:29:47 +08:00
|
|
|
}
|
|
|
|
|
2006-11-30 02:18:18 +08:00
|
|
|
/*
|
|
|
|
* Security Attribute Functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_secattr_catmap_walk - Walk a LSM secattr catmap looking for a bit
|
|
|
|
* @catmap: the category bitmap
|
|
|
|
* @offset: the offset to start searching at, in bits
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function walks a LSM secattr category bitmap starting at @offset and
|
|
|
|
* returns the spot of the first set bit or -ENOENT if no bits are set.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_secattr_catmap_walk(struct netlbl_lsm_secattr_catmap *catmap,
|
|
|
|
u32 offset)
|
|
|
|
{
|
|
|
|
struct netlbl_lsm_secattr_catmap *iter = catmap;
|
|
|
|
u32 node_idx;
|
|
|
|
u32 node_bit;
|
|
|
|
NETLBL_CATMAP_MAPTYPE bitmap;
|
|
|
|
|
|
|
|
if (offset > iter->startbit) {
|
|
|
|
while (offset >= (iter->startbit + NETLBL_CATMAP_SIZE)) {
|
|
|
|
iter = iter->next;
|
|
|
|
if (iter == NULL)
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
node_idx = (offset - iter->startbit) / NETLBL_CATMAP_MAPSIZE;
|
|
|
|
node_bit = offset - iter->startbit -
|
|
|
|
(NETLBL_CATMAP_MAPSIZE * node_idx);
|
|
|
|
} else {
|
|
|
|
node_idx = 0;
|
|
|
|
node_bit = 0;
|
|
|
|
}
|
|
|
|
bitmap = iter->bitmap[node_idx] >> node_bit;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
if (bitmap != 0) {
|
|
|
|
while ((bitmap & NETLBL_CATMAP_BIT) == 0) {
|
|
|
|
bitmap >>= 1;
|
|
|
|
node_bit++;
|
|
|
|
}
|
|
|
|
return iter->startbit +
|
|
|
|
(NETLBL_CATMAP_MAPSIZE * node_idx) + node_bit;
|
|
|
|
}
|
|
|
|
if (++node_idx >= NETLBL_CATMAP_MAPCNT) {
|
|
|
|
if (iter->next != NULL) {
|
|
|
|
iter = iter->next;
|
|
|
|
node_idx = 0;
|
|
|
|
} else
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
bitmap = iter->bitmap[node_idx];
|
|
|
|
node_bit = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_secattr_catmap_walk_rng - Find the end of a string of set bits
|
|
|
|
* @catmap: the category bitmap
|
|
|
|
* @offset: the offset to start searching at, in bits
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function walks a LSM secattr category bitmap starting at @offset and
|
|
|
|
* returns the spot of the first cleared bit or -ENOENT if the offset is past
|
|
|
|
* the end of the bitmap.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_secattr_catmap_walk_rng(struct netlbl_lsm_secattr_catmap *catmap,
|
|
|
|
u32 offset)
|
|
|
|
{
|
|
|
|
struct netlbl_lsm_secattr_catmap *iter = catmap;
|
|
|
|
u32 node_idx;
|
|
|
|
u32 node_bit;
|
|
|
|
NETLBL_CATMAP_MAPTYPE bitmask;
|
|
|
|
NETLBL_CATMAP_MAPTYPE bitmap;
|
|
|
|
|
|
|
|
if (offset > iter->startbit) {
|
|
|
|
while (offset >= (iter->startbit + NETLBL_CATMAP_SIZE)) {
|
|
|
|
iter = iter->next;
|
|
|
|
if (iter == NULL)
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
node_idx = (offset - iter->startbit) / NETLBL_CATMAP_MAPSIZE;
|
|
|
|
node_bit = offset - iter->startbit -
|
|
|
|
(NETLBL_CATMAP_MAPSIZE * node_idx);
|
|
|
|
} else {
|
|
|
|
node_idx = 0;
|
|
|
|
node_bit = 0;
|
|
|
|
}
|
|
|
|
bitmask = NETLBL_CATMAP_BIT << node_bit;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
bitmap = iter->bitmap[node_idx];
|
|
|
|
while (bitmask != 0 && (bitmap & bitmask) != 0) {
|
|
|
|
bitmask <<= 1;
|
|
|
|
node_bit++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bitmask != 0)
|
|
|
|
return iter->startbit +
|
|
|
|
(NETLBL_CATMAP_MAPSIZE * node_idx) +
|
|
|
|
node_bit - 1;
|
|
|
|
else if (++node_idx >= NETLBL_CATMAP_MAPCNT) {
|
|
|
|
if (iter->next == NULL)
|
|
|
|
return iter->startbit + NETLBL_CATMAP_SIZE - 1;
|
|
|
|
iter = iter->next;
|
|
|
|
node_idx = 0;
|
|
|
|
}
|
|
|
|
bitmask = NETLBL_CATMAP_BIT;
|
|
|
|
node_bit = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_secattr_catmap_setbit - Set a bit in a LSM secattr catmap
|
2014-08-01 23:17:03 +08:00
|
|
|
* @catmap: pointer to the category bitmap
|
2006-11-30 02:18:18 +08:00
|
|
|
* @bit: the bit to set
|
|
|
|
* @flags: memory allocation flags
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set the bit specified by @bit in @catmap. Returns zero on success,
|
|
|
|
* negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
2014-08-01 23:17:03 +08:00
|
|
|
int netlbl_secattr_catmap_setbit(struct netlbl_lsm_secattr_catmap **catmap,
|
2006-11-30 02:18:18 +08:00
|
|
|
u32 bit,
|
|
|
|
gfp_t flags)
|
|
|
|
{
|
2014-08-01 23:17:03 +08:00
|
|
|
struct netlbl_lsm_secattr_catmap *iter = *catmap;
|
2006-11-30 02:18:18 +08:00
|
|
|
u32 node_bit;
|
|
|
|
u32 node_idx;
|
|
|
|
|
|
|
|
while (iter->next != NULL &&
|
|
|
|
bit >= (iter->startbit + NETLBL_CATMAP_SIZE))
|
|
|
|
iter = iter->next;
|
2014-08-01 23:17:03 +08:00
|
|
|
if (bit < iter->startbit) {
|
|
|
|
iter = netlbl_secattr_catmap_alloc(flags);
|
|
|
|
if (iter == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iter->next = *catmap;
|
|
|
|
iter->startbit = bit & ~(NETLBL_CATMAP_SIZE - 1);
|
|
|
|
*catmap = iter;
|
|
|
|
} else if (bit >= (iter->startbit + NETLBL_CATMAP_SIZE)) {
|
2006-11-30 02:18:18 +08:00
|
|
|
iter->next = netlbl_secattr_catmap_alloc(flags);
|
|
|
|
if (iter->next == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
iter = iter->next;
|
|
|
|
iter->startbit = bit & ~(NETLBL_CATMAP_SIZE - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* gcc always rounds to zero when doing integer division */
|
|
|
|
node_idx = (bit - iter->startbit) / NETLBL_CATMAP_MAPSIZE;
|
|
|
|
node_bit = bit - iter->startbit - (NETLBL_CATMAP_MAPSIZE * node_idx);
|
|
|
|
iter->bitmap[node_idx] |= NETLBL_CATMAP_BIT << node_bit;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_secattr_catmap_setrng - Set a range of bits in a LSM secattr catmap
|
2014-08-01 23:17:03 +08:00
|
|
|
* @catmap: pointer to the category bitmap
|
2006-11-30 02:18:18 +08:00
|
|
|
* @start: the starting bit
|
|
|
|
* @end: the last bit in the string
|
|
|
|
* @flags: memory allocation flags
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set a range of bits, starting at @start and ending with @end. Returns zero
|
|
|
|
* on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
2014-08-01 23:17:03 +08:00
|
|
|
int netlbl_secattr_catmap_setrng(struct netlbl_lsm_secattr_catmap **catmap,
|
2006-11-30 02:18:18 +08:00
|
|
|
u32 start,
|
|
|
|
u32 end,
|
|
|
|
gfp_t flags)
|
|
|
|
{
|
|
|
|
int ret_val = 0;
|
2014-08-01 23:17:03 +08:00
|
|
|
struct netlbl_lsm_secattr_catmap *iter = *catmap;
|
2006-11-30 02:18:18 +08:00
|
|
|
u32 iter_max_spot;
|
|
|
|
u32 spot;
|
2014-08-01 23:17:03 +08:00
|
|
|
u32 orig_spot = iter->startbit;
|
2006-11-30 02:18:18 +08:00
|
|
|
|
|
|
|
/* XXX - This could probably be made a bit faster by combining writes
|
|
|
|
* to the catmap instead of setting a single bit each time, but for
|
|
|
|
* right now skipping to the start of the range in the catmap should
|
|
|
|
* be a nice improvement over calling the individual setbit function
|
|
|
|
* repeatedly from a loop. */
|
|
|
|
|
|
|
|
while (iter->next != NULL &&
|
|
|
|
start >= (iter->startbit + NETLBL_CATMAP_SIZE))
|
|
|
|
iter = iter->next;
|
|
|
|
iter_max_spot = iter->startbit + NETLBL_CATMAP_SIZE;
|
|
|
|
|
|
|
|
for (spot = start; spot <= end && ret_val == 0; spot++) {
|
|
|
|
if (spot >= iter_max_spot && iter->next != NULL) {
|
|
|
|
iter = iter->next;
|
|
|
|
iter_max_spot = iter->startbit + NETLBL_CATMAP_SIZE;
|
|
|
|
}
|
2014-08-01 23:17:03 +08:00
|
|
|
ret_val = netlbl_secattr_catmap_setbit(&iter, spot, flags);
|
|
|
|
if (iter->startbit < orig_spot)
|
|
|
|
*catmap = iter;
|
2006-11-30 02:18:18 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2006-08-04 07:48:37 +08:00
|
|
|
/*
|
|
|
|
* LSM Functions
|
|
|
|
*/
|
|
|
|
|
2007-07-19 00:28:45 +08:00
|
|
|
/**
|
|
|
|
* netlbl_enabled - Determine if the NetLabel subsystem is enabled
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The LSM can use this function to determine if it should use NetLabel
|
|
|
|
* security attributes in it's enforcement mechanism. Currently, NetLabel is
|
|
|
|
* considered to be enabled when it's configuration contains a valid setup for
|
|
|
|
* at least one labeled protocol (i.e. NetLabel can understand incoming
|
|
|
|
* labeled packets of at least one type); otherwise NetLabel is considered to
|
|
|
|
* be disabled.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_enabled(void)
|
|
|
|
{
|
|
|
|
/* At some point we probably want to expose this mechanism to the user
|
|
|
|
* as well so that admins can toggle NetLabel regardless of the
|
|
|
|
* configuration */
|
2008-01-29 21:37:52 +08:00
|
|
|
return (atomic_read(&netlabel_mgmt_protocount) > 0);
|
2007-07-19 00:28:45 +08:00
|
|
|
}
|
|
|
|
|
2006-08-04 07:48:37 +08:00
|
|
|
/**
|
2009-03-28 05:10:34 +08:00
|
|
|
* netlbl_sock_setattr - Label a socket using the correct protocol
|
2007-06-08 09:37:15 +08:00
|
|
|
* @sk: the socket to label
|
2009-03-28 05:10:34 +08:00
|
|
|
* @family: protocol family
|
2006-08-04 07:48:37 +08:00
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Attach the correct label to the given socket using the security attributes
|
2007-06-08 09:37:15 +08:00
|
|
|
* specified in @secattr. This function requires exclusive access to @sk,
|
|
|
|
* which means it either needs to be in the process of being created or locked.
|
2008-10-10 22:16:32 +08:00
|
|
|
* Returns zero on success, -EDESTADDRREQ if the domain is configured to use
|
|
|
|
* network address selectors (can't blindly label the socket), and negative
|
|
|
|
* values on all other failures.
|
2006-08-04 07:48:37 +08:00
|
|
|
*
|
|
|
|
*/
|
2007-06-08 09:37:15 +08:00
|
|
|
int netlbl_sock_setattr(struct sock *sk,
|
2009-03-28 05:10:34 +08:00
|
|
|
u16 family,
|
2007-06-08 09:37:15 +08:00
|
|
|
const struct netlbl_lsm_secattr *secattr)
|
2006-08-04 07:48:37 +08:00
|
|
|
{
|
2009-03-28 05:10:34 +08:00
|
|
|
int ret_val;
|
2006-08-04 07:48:37 +08:00
|
|
|
struct netlbl_dom_map *dom_entry;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
dom_entry = netlbl_domhsh_getentry(secattr->domain);
|
2009-03-28 05:10:34 +08:00
|
|
|
if (dom_entry == NULL) {
|
|
|
|
ret_val = -ENOENT;
|
2006-08-04 07:48:37 +08:00
|
|
|
goto socket_setattr_return;
|
2009-03-28 05:10:34 +08:00
|
|
|
}
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
2013-08-03 02:45:08 +08:00
|
|
|
switch (dom_entry->def.type) {
|
2009-03-28 05:10:34 +08:00
|
|
|
case NETLBL_NLTYPE_ADDRSELECT:
|
|
|
|
ret_val = -EDESTADDRREQ;
|
|
|
|
break;
|
|
|
|
case NETLBL_NLTYPE_CIPSOV4:
|
|
|
|
ret_val = cipso_v4_sock_setattr(sk,
|
2013-08-03 02:45:08 +08:00
|
|
|
dom_entry->def.cipso,
|
|
|
|
secattr);
|
2009-03-28 05:10:34 +08:00
|
|
|
break;
|
|
|
|
case NETLBL_NLTYPE_UNLABELED:
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret_val = -ENOENT;
|
|
|
|
}
|
2006-08-04 07:48:37 +08:00
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-03-28 05:10:34 +08:00
|
|
|
case AF_INET6:
|
|
|
|
/* since we don't support any IPv6 labeling protocols right
|
|
|
|
* now we can optimize everything away until we do */
|
2006-08-04 07:48:37 +08:00
|
|
|
ret_val = 0;
|
|
|
|
break;
|
2009-03-28 05:10:34 +08:00
|
|
|
#endif /* IPv6 */
|
2006-08-04 07:48:37 +08:00
|
|
|
default:
|
2009-03-28 05:10:34 +08:00
|
|
|
ret_val = -EPROTONOSUPPORT;
|
2006-08-04 07:48:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
socket_setattr_return:
|
|
|
|
rcu_read_unlock();
|
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2008-10-10 22:16:33 +08:00
|
|
|
/**
|
|
|
|
* netlbl_sock_delattr - Delete all the NetLabel labels on a socket
|
|
|
|
* @sk: the socket
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Remove all the NetLabel labeling from @sk. The caller is responsible for
|
|
|
|
* ensuring that @sk is locked.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void netlbl_sock_delattr(struct sock *sk)
|
|
|
|
{
|
|
|
|
cipso_v4_sock_delattr(sk);
|
|
|
|
}
|
|
|
|
|
2006-09-26 06:52:01 +08:00
|
|
|
/**
|
|
|
|
* netlbl_sock_getattr - Determine the security attributes of a sock
|
|
|
|
* @sk: the sock
|
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
2008-01-29 21:44:21 +08:00
|
|
|
* Examines the given sock to see if any NetLabel style labeling has been
|
2006-09-26 06:52:01 +08:00
|
|
|
* applied to the sock, if so it parses the socket label and returns the
|
|
|
|
* security attributes in @secattr. Returns zero on success, negative values
|
|
|
|
* on failure.
|
|
|
|
*
|
|
|
|
*/
|
2009-03-28 05:10:34 +08:00
|
|
|
int netlbl_sock_getattr(struct sock *sk,
|
|
|
|
struct netlbl_lsm_secattr *secattr)
|
2006-09-26 06:52:01 +08:00
|
|
|
{
|
2009-03-28 05:10:34 +08:00
|
|
|
int ret_val;
|
|
|
|
|
|
|
|
switch (sk->sk_family) {
|
|
|
|
case AF_INET:
|
|
|
|
ret_val = cipso_v4_sock_getattr(sk, secattr);
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-03-28 05:10:34 +08:00
|
|
|
case AF_INET6:
|
|
|
|
ret_val = -ENOMSG;
|
|
|
|
break;
|
|
|
|
#endif /* IPv6 */
|
|
|
|
default:
|
|
|
|
ret_val = -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret_val;
|
2006-09-26 06:52:01 +08:00
|
|
|
}
|
|
|
|
|
2008-10-10 22:16:33 +08:00
|
|
|
/**
|
|
|
|
* netlbl_conn_setattr - Label a connected socket using the correct protocol
|
|
|
|
* @sk: the socket to label
|
|
|
|
* @addr: the destination address
|
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Attach the correct label to the given connected socket using the security
|
|
|
|
* attributes specified in @secattr. The caller is responsible for ensuring
|
|
|
|
* that @sk is locked. Returns zero on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_conn_setattr(struct sock *sk,
|
|
|
|
struct sockaddr *addr,
|
|
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
|
|
|
int ret_val;
|
|
|
|
struct sockaddr_in *addr4;
|
2013-08-03 02:45:08 +08:00
|
|
|
struct netlbl_dommap_def *entry;
|
2008-10-10 22:16:33 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
addr4 = (struct sockaddr_in *)addr;
|
2013-08-03 02:45:08 +08:00
|
|
|
entry = netlbl_domhsh_getentry_af4(secattr->domain,
|
|
|
|
addr4->sin_addr.s_addr);
|
|
|
|
if (entry == NULL) {
|
2008-10-10 22:16:33 +08:00
|
|
|
ret_val = -ENOENT;
|
|
|
|
goto conn_setattr_return;
|
|
|
|
}
|
2013-08-03 02:45:08 +08:00
|
|
|
switch (entry->type) {
|
2008-10-10 22:16:33 +08:00
|
|
|
case NETLBL_NLTYPE_CIPSOV4:
|
|
|
|
ret_val = cipso_v4_sock_setattr(sk,
|
2013-08-03 02:45:08 +08:00
|
|
|
entry->cipso, secattr);
|
2008-10-10 22:16:33 +08:00
|
|
|
break;
|
|
|
|
case NETLBL_NLTYPE_UNLABELED:
|
|
|
|
/* just delete the protocols we support for right now
|
|
|
|
* but we could remove other protocols if needed */
|
|
|
|
cipso_v4_sock_delattr(sk);
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret_val = -ENOENT;
|
|
|
|
}
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2008-10-10 22:16:33 +08:00
|
|
|
case AF_INET6:
|
|
|
|
/* since we don't support any IPv6 labeling protocols right
|
|
|
|
* now we can optimize everything away until we do */
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
#endif /* IPv6 */
|
|
|
|
default:
|
2009-03-28 05:10:34 +08:00
|
|
|
ret_val = -EPROTONOSUPPORT;
|
2008-10-10 22:16:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
conn_setattr_return:
|
|
|
|
rcu_read_unlock();
|
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2009-03-28 05:10:34 +08:00
|
|
|
/**
|
|
|
|
* netlbl_req_setattr - Label a request socket using the correct protocol
|
|
|
|
* @req: the request socket to label
|
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Attach the correct label to the given socket using the security attributes
|
|
|
|
* specified in @secattr. Returns zero on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_req_setattr(struct request_sock *req,
|
|
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
|
|
|
int ret_val;
|
2013-08-03 02:45:08 +08:00
|
|
|
struct netlbl_dommap_def *entry;
|
2009-03-28 05:10:34 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
switch (req->rsk_ops->family) {
|
|
|
|
case AF_INET:
|
2013-08-03 02:45:08 +08:00
|
|
|
entry = netlbl_domhsh_getentry_af4(secattr->domain,
|
2013-10-10 06:21:29 +08:00
|
|
|
inet_rsk(req)->ir_rmt_addr);
|
2013-08-03 02:45:08 +08:00
|
|
|
if (entry == NULL) {
|
|
|
|
ret_val = -ENOENT;
|
|
|
|
goto req_setattr_return;
|
2009-03-28 05:10:34 +08:00
|
|
|
}
|
2013-08-03 02:45:08 +08:00
|
|
|
switch (entry->type) {
|
2009-03-28 05:10:34 +08:00
|
|
|
case NETLBL_NLTYPE_CIPSOV4:
|
2013-08-03 02:45:08 +08:00
|
|
|
ret_val = cipso_v4_req_setattr(req,
|
|
|
|
entry->cipso, secattr);
|
2009-03-28 05:10:34 +08:00
|
|
|
break;
|
|
|
|
case NETLBL_NLTYPE_UNLABELED:
|
|
|
|
/* just delete the protocols we support for right now
|
|
|
|
* but we could remove other protocols if needed */
|
|
|
|
cipso_v4_req_delattr(req);
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret_val = -ENOENT;
|
|
|
|
}
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-03-28 05:10:34 +08:00
|
|
|
case AF_INET6:
|
|
|
|
/* since we don't support any IPv6 labeling protocols right
|
|
|
|
* now we can optimize everything away until we do */
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
#endif /* IPv6 */
|
|
|
|
default:
|
|
|
|
ret_val = -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
req_setattr_return:
|
|
|
|
rcu_read_unlock();
|
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2009-03-28 05:10:54 +08:00
|
|
|
/**
|
|
|
|
* netlbl_req_delattr - Delete all the NetLabel labels on a socket
|
|
|
|
* @req: the socket
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Remove all the NetLabel labeling from @req.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void netlbl_req_delattr(struct request_sock *req)
|
|
|
|
{
|
|
|
|
cipso_v4_req_delattr(req);
|
|
|
|
}
|
|
|
|
|
2008-10-10 22:16:32 +08:00
|
|
|
/**
|
|
|
|
* netlbl_skbuff_setattr - Label a packet using the correct protocol
|
|
|
|
* @skb: the packet
|
|
|
|
* @family: protocol family
|
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Attach the correct label to the given packet using the security attributes
|
|
|
|
* specified in @secattr. Returns zero on success, negative values on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_skbuff_setattr(struct sk_buff *skb,
|
|
|
|
u16 family,
|
|
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
|
|
|
int ret_val;
|
|
|
|
struct iphdr *hdr4;
|
2013-08-03 02:45:08 +08:00
|
|
|
struct netlbl_dommap_def *entry;
|
2008-10-10 22:16:32 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
hdr4 = ip_hdr(skb);
|
2013-08-03 02:45:08 +08:00
|
|
|
entry = netlbl_domhsh_getentry_af4(secattr->domain,hdr4->daddr);
|
|
|
|
if (entry == NULL) {
|
2008-10-10 22:16:32 +08:00
|
|
|
ret_val = -ENOENT;
|
|
|
|
goto skbuff_setattr_return;
|
|
|
|
}
|
2013-08-03 02:45:08 +08:00
|
|
|
switch (entry->type) {
|
2008-10-10 22:16:32 +08:00
|
|
|
case NETLBL_NLTYPE_CIPSOV4:
|
2013-08-03 02:45:08 +08:00
|
|
|
ret_val = cipso_v4_skbuff_setattr(skb, entry->cipso,
|
|
|
|
secattr);
|
2008-10-10 22:16:32 +08:00
|
|
|
break;
|
|
|
|
case NETLBL_NLTYPE_UNLABELED:
|
|
|
|
/* just delete the protocols we support for right now
|
|
|
|
* but we could remove other protocols if needed */
|
|
|
|
ret_val = cipso_v4_skbuff_delattr(skb);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret_val = -ENOENT;
|
|
|
|
}
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2008-10-10 22:16:32 +08:00
|
|
|
case AF_INET6:
|
|
|
|
/* since we don't support any IPv6 labeling protocols right
|
|
|
|
* now we can optimize everything away until we do */
|
|
|
|
ret_val = 0;
|
|
|
|
break;
|
|
|
|
#endif /* IPv6 */
|
|
|
|
default:
|
2009-03-28 05:10:34 +08:00
|
|
|
ret_val = -EPROTONOSUPPORT;
|
2008-10-10 22:16:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
skbuff_setattr_return:
|
|
|
|
rcu_read_unlock();
|
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
2006-08-04 07:48:37 +08:00
|
|
|
/**
|
|
|
|
* netlbl_skbuff_getattr - Determine the security attributes of a packet
|
|
|
|
* @skb: the packet
|
2008-01-29 21:38:04 +08:00
|
|
|
* @family: protocol family
|
2006-08-04 07:48:37 +08:00
|
|
|
* @secattr: the security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Examines the given packet to see if a recognized form of packet labeling
|
|
|
|
* is present, if so it parses the packet label and returns the security
|
|
|
|
* attributes in @secattr. Returns zero on success, negative values on
|
|
|
|
* failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_skbuff_getattr(const struct sk_buff *skb,
|
2008-01-29 21:38:04 +08:00
|
|
|
u16 family,
|
2006-08-04 07:48:37 +08:00
|
|
|
struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
2009-03-28 05:10:34 +08:00
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (CIPSO_V4_OPTEXIST(skb) &&
|
|
|
|
cipso_v4_skbuff_getattr(skb, secattr) == 0)
|
|
|
|
return 0;
|
|
|
|
break;
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2009-03-28 05:10:34 +08:00
|
|
|
case AF_INET6:
|
|
|
|
break;
|
|
|
|
#endif /* IPv6 */
|
|
|
|
}
|
2006-08-04 07:48:37 +08:00
|
|
|
|
2008-01-29 21:44:21 +08:00
|
|
|
return netlbl_unlabel_getattr(skb, family, secattr);
|
2006-08-04 07:48:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_skbuff_err - Handle a LSM error on a sk_buff
|
|
|
|
* @skb: the packet
|
|
|
|
* @error: the error code
|
2008-10-10 22:16:31 +08:00
|
|
|
* @gateway: true if host is acting as a gateway, false otherwise
|
2006-08-04 07:48:37 +08:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Deal with a LSM problem when handling the packet in @skb, typically this is
|
|
|
|
* a permission denied problem (-EACCES). The correct action is determined
|
|
|
|
* according to the packet's labeling protocol.
|
|
|
|
*
|
|
|
|
*/
|
2008-10-10 22:16:31 +08:00
|
|
|
void netlbl_skbuff_err(struct sk_buff *skb, int error, int gateway)
|
2006-08-04 07:48:37 +08:00
|
|
|
{
|
|
|
|
if (CIPSO_V4_OPTEXIST(skb))
|
2008-10-10 22:16:31 +08:00
|
|
|
cipso_v4_error(skb, error, gateway);
|
2006-08-04 07:48:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cache_invalidate - Invalidate all of the NetLabel protocol caches
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* For all of the NetLabel protocols that support some form of label mapping
|
|
|
|
* cache, invalidate the cache. Returns zero on success, negative values on
|
|
|
|
* error.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void netlbl_cache_invalidate(void)
|
|
|
|
{
|
|
|
|
cipso_v4_cache_invalidate();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_cache_add - Add an entry to a NetLabel protocol cache
|
|
|
|
* @skb: the packet
|
|
|
|
* @secattr: the packet's security attributes
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Add the LSM security attributes for the given packet to the underlying
|
|
|
|
* NetLabel protocol's label mapping cache. Returns zero on success, negative
|
|
|
|
* values on error.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
int netlbl_cache_add(const struct sk_buff *skb,
|
|
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
2006-11-18 06:38:46 +08:00
|
|
|
if ((secattr->flags & NETLBL_SECATTR_CACHE) == 0)
|
2006-08-04 07:48:37 +08:00
|
|
|
return -ENOMSG;
|
|
|
|
|
|
|
|
if (CIPSO_V4_OPTEXIST(skb))
|
|
|
|
return cipso_v4_cache_add(skb, secattr);
|
|
|
|
|
|
|
|
return -ENOMSG;
|
|
|
|
}
|
|
|
|
|
2009-01-01 01:54:11 +08:00
|
|
|
/*
|
|
|
|
* Protocol Engine Functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_audit_start - Start an audit message
|
|
|
|
* @type: audit message type
|
|
|
|
* @audit_info: NetLabel audit information
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Start an audit message using the type specified in @type and fill the audit
|
|
|
|
* message with some fields common to all NetLabel audit messages. This
|
|
|
|
* function should only be used by protocol engines, not LSMs. Returns a
|
|
|
|
* pointer to the audit buffer on success, NULL on failure.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
struct audit_buffer *netlbl_audit_start(int type,
|
|
|
|
struct netlbl_audit *audit_info)
|
|
|
|
{
|
|
|
|
return netlbl_audit_start_common(type, audit_info);
|
|
|
|
}
|
|
|
|
|
2006-08-04 07:48:37 +08:00
|
|
|
/*
|
|
|
|
* Setup Functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* netlbl_init - Initialize NetLabel
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the required NetLabel initialization before first use.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static int __init netlbl_init(void)
|
|
|
|
{
|
|
|
|
int ret_val;
|
|
|
|
|
|
|
|
printk(KERN_INFO "NetLabel: Initializing\n");
|
|
|
|
printk(KERN_INFO "NetLabel: domain hash size = %u\n",
|
|
|
|
(1 << NETLBL_DOMHSH_BITSIZE));
|
|
|
|
printk(KERN_INFO "NetLabel: protocols ="
|
|
|
|
" UNLABELED"
|
|
|
|
" CIPSOv4"
|
|
|
|
"\n");
|
|
|
|
|
|
|
|
ret_val = netlbl_domhsh_init(NETLBL_DOMHSH_BITSIZE);
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto init_failure;
|
|
|
|
|
2008-01-29 21:44:21 +08:00
|
|
|
ret_val = netlbl_unlabel_init(NETLBL_UNLHSH_BITSIZE);
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto init_failure;
|
|
|
|
|
2006-08-04 07:48:37 +08:00
|
|
|
ret_val = netlbl_netlink_init();
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto init_failure;
|
|
|
|
|
|
|
|
ret_val = netlbl_unlabel_defconf();
|
|
|
|
if (ret_val != 0)
|
|
|
|
goto init_failure;
|
|
|
|
printk(KERN_INFO "NetLabel: unlabeled traffic allowed by default\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
init_failure:
|
|
|
|
panic("NetLabel: failed to initialize properly (%d)\n", ret_val);
|
|
|
|
}
|
|
|
|
|
|
|
|
subsys_initcall(netlbl_init);
|