selinux: wrap AVC state
Wrap the AVC state within the selinux_state structure and pass it explicitly to all AVC functions. The AVC private state is encapsulated in a selinux_avc structure that is referenced from the selinux_state. This change should have no effect on SELinux behavior or APIs (userspace or LSM). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Reviewed-by: James Morris <james.morris@microsoft.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
0619f0f5e3
commit
6b6bc6205d
|
@ -82,14 +82,42 @@ struct avc_callback_node {
|
||||||
struct avc_callback_node *next;
|
struct avc_callback_node *next;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Exported via selinufs */
|
|
||||||
unsigned int avc_cache_threshold = AVC_DEF_CACHE_THRESHOLD;
|
|
||||||
|
|
||||||
#ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
|
#ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
|
||||||
DEFINE_PER_CPU(struct avc_cache_stats, avc_cache_stats) = { 0 };
|
DEFINE_PER_CPU(struct avc_cache_stats, avc_cache_stats) = { 0 };
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
static struct avc_cache avc_cache;
|
struct selinux_avc {
|
||||||
|
unsigned int avc_cache_threshold;
|
||||||
|
struct avc_cache avc_cache;
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct selinux_avc selinux_avc;
|
||||||
|
|
||||||
|
void selinux_avc_init(struct selinux_avc **avc)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
selinux_avc.avc_cache_threshold = AVC_DEF_CACHE_THRESHOLD;
|
||||||
|
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
||||||
|
INIT_HLIST_HEAD(&selinux_avc.avc_cache.slots[i]);
|
||||||
|
spin_lock_init(&selinux_avc.avc_cache.slots_lock[i]);
|
||||||
|
}
|
||||||
|
atomic_set(&selinux_avc.avc_cache.active_nodes, 0);
|
||||||
|
atomic_set(&selinux_avc.avc_cache.lru_hint, 0);
|
||||||
|
*avc = &selinux_avc;
|
||||||
|
}
|
||||||
|
|
||||||
|
unsigned int avc_get_cache_threshold(struct selinux_avc *avc)
|
||||||
|
{
|
||||||
|
return avc->avc_cache_threshold;
|
||||||
|
}
|
||||||
|
|
||||||
|
void avc_set_cache_threshold(struct selinux_avc *avc,
|
||||||
|
unsigned int cache_threshold)
|
||||||
|
{
|
||||||
|
avc->avc_cache_threshold = cache_threshold;
|
||||||
|
}
|
||||||
|
|
||||||
static struct avc_callback_node *avc_callbacks;
|
static struct avc_callback_node *avc_callbacks;
|
||||||
static struct kmem_cache *avc_node_cachep;
|
static struct kmem_cache *avc_node_cachep;
|
||||||
static struct kmem_cache *avc_xperms_data_cachep;
|
static struct kmem_cache *avc_xperms_data_cachep;
|
||||||
|
@ -143,14 +171,14 @@ static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av)
|
||||||
* @tsid: target security identifier
|
* @tsid: target security identifier
|
||||||
* @tclass: target security class
|
* @tclass: target security class
|
||||||
*/
|
*/
|
||||||
static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass)
|
static void avc_dump_query(struct audit_buffer *ab, struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid, u16 tclass)
|
||||||
{
|
{
|
||||||
int rc;
|
int rc;
|
||||||
char *scontext;
|
char *scontext;
|
||||||
u32 scontext_len;
|
u32 scontext_len;
|
||||||
|
|
||||||
rc = security_sid_to_context(&selinux_state, ssid,
|
rc = security_sid_to_context(state, ssid, &scontext, &scontext_len);
|
||||||
&scontext, &scontext_len);
|
|
||||||
if (rc)
|
if (rc)
|
||||||
audit_log_format(ab, "ssid=%d", ssid);
|
audit_log_format(ab, "ssid=%d", ssid);
|
||||||
else {
|
else {
|
||||||
|
@ -158,8 +186,7 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
|
||||||
kfree(scontext);
|
kfree(scontext);
|
||||||
}
|
}
|
||||||
|
|
||||||
rc = security_sid_to_context(&selinux_state, tsid,
|
rc = security_sid_to_context(state, tsid, &scontext, &scontext_len);
|
||||||
&scontext, &scontext_len);
|
|
||||||
if (rc)
|
if (rc)
|
||||||
audit_log_format(ab, " tsid=%d", tsid);
|
audit_log_format(ab, " tsid=%d", tsid);
|
||||||
else {
|
else {
|
||||||
|
@ -178,15 +205,6 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
|
||||||
*/
|
*/
|
||||||
void __init avc_init(void)
|
void __init avc_init(void)
|
||||||
{
|
{
|
||||||
int i;
|
|
||||||
|
|
||||||
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
|
||||||
INIT_HLIST_HEAD(&avc_cache.slots[i]);
|
|
||||||
spin_lock_init(&avc_cache.slots_lock[i]);
|
|
||||||
}
|
|
||||||
atomic_set(&avc_cache.active_nodes, 0);
|
|
||||||
atomic_set(&avc_cache.lru_hint, 0);
|
|
||||||
|
|
||||||
avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
|
avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
|
||||||
0, SLAB_PANIC, NULL);
|
0, SLAB_PANIC, NULL);
|
||||||
avc_xperms_cachep = kmem_cache_create("avc_xperms_node",
|
avc_xperms_cachep = kmem_cache_create("avc_xperms_node",
|
||||||
|
@ -201,7 +219,7 @@ void __init avc_init(void)
|
||||||
0, SLAB_PANIC, NULL);
|
0, SLAB_PANIC, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
int avc_get_hash_stats(char *page)
|
int avc_get_hash_stats(struct selinux_avc *avc, char *page)
|
||||||
{
|
{
|
||||||
int i, chain_len, max_chain_len, slots_used;
|
int i, chain_len, max_chain_len, slots_used;
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
|
@ -212,7 +230,7 @@ int avc_get_hash_stats(char *page)
|
||||||
slots_used = 0;
|
slots_used = 0;
|
||||||
max_chain_len = 0;
|
max_chain_len = 0;
|
||||||
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
||||||
head = &avc_cache.slots[i];
|
head = &avc->avc_cache.slots[i];
|
||||||
if (!hlist_empty(head)) {
|
if (!hlist_empty(head)) {
|
||||||
slots_used++;
|
slots_used++;
|
||||||
chain_len = 0;
|
chain_len = 0;
|
||||||
|
@ -227,7 +245,7 @@ int avc_get_hash_stats(char *page)
|
||||||
|
|
||||||
return scnprintf(page, PAGE_SIZE, "entries: %d\nbuckets used: %d/%d\n"
|
return scnprintf(page, PAGE_SIZE, "entries: %d\nbuckets used: %d/%d\n"
|
||||||
"longest chain: %d\n",
|
"longest chain: %d\n",
|
||||||
atomic_read(&avc_cache.active_nodes),
|
atomic_read(&avc->avc_cache.active_nodes),
|
||||||
slots_used, AVC_CACHE_SLOTS, max_chain_len);
|
slots_used, AVC_CACHE_SLOTS, max_chain_len);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -464,11 +482,12 @@ static inline u32 avc_xperms_audit_required(u32 requested,
|
||||||
return audited;
|
return audited;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass,
|
static inline int avc_xperms_audit(struct selinux_state *state,
|
||||||
u32 requested, struct av_decision *avd,
|
u32 ssid, u32 tsid, u16 tclass,
|
||||||
struct extended_perms_decision *xpd,
|
u32 requested, struct av_decision *avd,
|
||||||
u8 perm, int result,
|
struct extended_perms_decision *xpd,
|
||||||
struct common_audit_data *ad)
|
u8 perm, int result,
|
||||||
|
struct common_audit_data *ad)
|
||||||
{
|
{
|
||||||
u32 audited, denied;
|
u32 audited, denied;
|
||||||
|
|
||||||
|
@ -476,7 +495,7 @@ static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
requested, avd, xpd, perm, result, &denied);
|
requested, avd, xpd, perm, result, &denied);
|
||||||
if (likely(!audited))
|
if (likely(!audited))
|
||||||
return 0;
|
return 0;
|
||||||
return slow_avc_audit(ssid, tsid, tclass, requested,
|
return slow_avc_audit(state, ssid, tsid, tclass, requested,
|
||||||
audited, denied, result, ad, 0);
|
audited, denied, result, ad, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -488,29 +507,30 @@ static void avc_node_free(struct rcu_head *rhead)
|
||||||
avc_cache_stats_incr(frees);
|
avc_cache_stats_incr(frees);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void avc_node_delete(struct avc_node *node)
|
static void avc_node_delete(struct selinux_avc *avc, struct avc_node *node)
|
||||||
{
|
{
|
||||||
hlist_del_rcu(&node->list);
|
hlist_del_rcu(&node->list);
|
||||||
call_rcu(&node->rhead, avc_node_free);
|
call_rcu(&node->rhead, avc_node_free);
|
||||||
atomic_dec(&avc_cache.active_nodes);
|
atomic_dec(&avc->avc_cache.active_nodes);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void avc_node_kill(struct avc_node *node)
|
static void avc_node_kill(struct selinux_avc *avc, struct avc_node *node)
|
||||||
{
|
{
|
||||||
avc_xperms_free(node->ae.xp_node);
|
avc_xperms_free(node->ae.xp_node);
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
kmem_cache_free(avc_node_cachep, node);
|
||||||
avc_cache_stats_incr(frees);
|
avc_cache_stats_incr(frees);
|
||||||
atomic_dec(&avc_cache.active_nodes);
|
atomic_dec(&avc->avc_cache.active_nodes);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void avc_node_replace(struct avc_node *new, struct avc_node *old)
|
static void avc_node_replace(struct selinux_avc *avc,
|
||||||
|
struct avc_node *new, struct avc_node *old)
|
||||||
{
|
{
|
||||||
hlist_replace_rcu(&old->list, &new->list);
|
hlist_replace_rcu(&old->list, &new->list);
|
||||||
call_rcu(&old->rhead, avc_node_free);
|
call_rcu(&old->rhead, avc_node_free);
|
||||||
atomic_dec(&avc_cache.active_nodes);
|
atomic_dec(&avc->avc_cache.active_nodes);
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline int avc_reclaim_node(void)
|
static inline int avc_reclaim_node(struct selinux_avc *avc)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
int hvalue, try, ecx;
|
int hvalue, try, ecx;
|
||||||
|
@ -519,16 +539,17 @@ static inline int avc_reclaim_node(void)
|
||||||
spinlock_t *lock;
|
spinlock_t *lock;
|
||||||
|
|
||||||
for (try = 0, ecx = 0; try < AVC_CACHE_SLOTS; try++) {
|
for (try = 0, ecx = 0; try < AVC_CACHE_SLOTS; try++) {
|
||||||
hvalue = atomic_inc_return(&avc_cache.lru_hint) & (AVC_CACHE_SLOTS - 1);
|
hvalue = atomic_inc_return(&avc->avc_cache.lru_hint) &
|
||||||
head = &avc_cache.slots[hvalue];
|
(AVC_CACHE_SLOTS - 1);
|
||||||
lock = &avc_cache.slots_lock[hvalue];
|
head = &avc->avc_cache.slots[hvalue];
|
||||||
|
lock = &avc->avc_cache.slots_lock[hvalue];
|
||||||
|
|
||||||
if (!spin_trylock_irqsave(lock, flags))
|
if (!spin_trylock_irqsave(lock, flags))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
hlist_for_each_entry(node, head, list) {
|
hlist_for_each_entry(node, head, list) {
|
||||||
avc_node_delete(node);
|
avc_node_delete(avc, node);
|
||||||
avc_cache_stats_incr(reclaims);
|
avc_cache_stats_incr(reclaims);
|
||||||
ecx++;
|
ecx++;
|
||||||
if (ecx >= AVC_CACHE_RECLAIM) {
|
if (ecx >= AVC_CACHE_RECLAIM) {
|
||||||
|
@ -544,7 +565,7 @@ out:
|
||||||
return ecx;
|
return ecx;
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct avc_node *avc_alloc_node(void)
|
static struct avc_node *avc_alloc_node(struct selinux_avc *avc)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
|
|
||||||
|
@ -555,8 +576,9 @@ static struct avc_node *avc_alloc_node(void)
|
||||||
INIT_HLIST_NODE(&node->list);
|
INIT_HLIST_NODE(&node->list);
|
||||||
avc_cache_stats_incr(allocations);
|
avc_cache_stats_incr(allocations);
|
||||||
|
|
||||||
if (atomic_inc_return(&avc_cache.active_nodes) > avc_cache_threshold)
|
if (atomic_inc_return(&avc->avc_cache.active_nodes) >
|
||||||
avc_reclaim_node();
|
avc->avc_cache_threshold)
|
||||||
|
avc_reclaim_node(avc);
|
||||||
|
|
||||||
out:
|
out:
|
||||||
return node;
|
return node;
|
||||||
|
@ -570,14 +592,15 @@ static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tcl
|
||||||
memcpy(&node->ae.avd, avd, sizeof(node->ae.avd));
|
memcpy(&node->ae.avd, avd, sizeof(node->ae.avd));
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline struct avc_node *avc_search_node(u32 ssid, u32 tsid, u16 tclass)
|
static inline struct avc_node *avc_search_node(struct selinux_avc *avc,
|
||||||
|
u32 ssid, u32 tsid, u16 tclass)
|
||||||
{
|
{
|
||||||
struct avc_node *node, *ret = NULL;
|
struct avc_node *node, *ret = NULL;
|
||||||
int hvalue;
|
int hvalue;
|
||||||
struct hlist_head *head;
|
struct hlist_head *head;
|
||||||
|
|
||||||
hvalue = avc_hash(ssid, tsid, tclass);
|
hvalue = avc_hash(ssid, tsid, tclass);
|
||||||
head = &avc_cache.slots[hvalue];
|
head = &avc->avc_cache.slots[hvalue];
|
||||||
hlist_for_each_entry_rcu(node, head, list) {
|
hlist_for_each_entry_rcu(node, head, list) {
|
||||||
if (ssid == node->ae.ssid &&
|
if (ssid == node->ae.ssid &&
|
||||||
tclass == node->ae.tclass &&
|
tclass == node->ae.tclass &&
|
||||||
|
@ -602,12 +625,13 @@ static inline struct avc_node *avc_search_node(u32 ssid, u32 tsid, u16 tclass)
|
||||||
* then this function returns the avc_node.
|
* then this function returns the avc_node.
|
||||||
* Otherwise, this function returns NULL.
|
* Otherwise, this function returns NULL.
|
||||||
*/
|
*/
|
||||||
static struct avc_node *avc_lookup(u32 ssid, u32 tsid, u16 tclass)
|
static struct avc_node *avc_lookup(struct selinux_avc *avc,
|
||||||
|
u32 ssid, u32 tsid, u16 tclass)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
|
|
||||||
avc_cache_stats_incr(lookups);
|
avc_cache_stats_incr(lookups);
|
||||||
node = avc_search_node(ssid, tsid, tclass);
|
node = avc_search_node(avc, ssid, tsid, tclass);
|
||||||
|
|
||||||
if (node)
|
if (node)
|
||||||
return node;
|
return node;
|
||||||
|
@ -616,7 +640,8 @@ static struct avc_node *avc_lookup(u32 ssid, u32 tsid, u16 tclass)
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int avc_latest_notif_update(int seqno, int is_insert)
|
static int avc_latest_notif_update(struct selinux_avc *avc,
|
||||||
|
int seqno, int is_insert)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
static DEFINE_SPINLOCK(notif_lock);
|
static DEFINE_SPINLOCK(notif_lock);
|
||||||
|
@ -624,14 +649,14 @@ static int avc_latest_notif_update(int seqno, int is_insert)
|
||||||
|
|
||||||
spin_lock_irqsave(¬if_lock, flag);
|
spin_lock_irqsave(¬if_lock, flag);
|
||||||
if (is_insert) {
|
if (is_insert) {
|
||||||
if (seqno < avc_cache.latest_notif) {
|
if (seqno < avc->avc_cache.latest_notif) {
|
||||||
printk(KERN_WARNING "SELinux: avc: seqno %d < latest_notif %d\n",
|
printk(KERN_WARNING "SELinux: avc: seqno %d < latest_notif %d\n",
|
||||||
seqno, avc_cache.latest_notif);
|
seqno, avc->avc_cache.latest_notif);
|
||||||
ret = -EAGAIN;
|
ret = -EAGAIN;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if (seqno > avc_cache.latest_notif)
|
if (seqno > avc->avc_cache.latest_notif)
|
||||||
avc_cache.latest_notif = seqno;
|
avc->avc_cache.latest_notif = seqno;
|
||||||
}
|
}
|
||||||
spin_unlock_irqrestore(¬if_lock, flag);
|
spin_unlock_irqrestore(¬if_lock, flag);
|
||||||
|
|
||||||
|
@ -656,18 +681,19 @@ static int avc_latest_notif_update(int seqno, int is_insert)
|
||||||
* the access vectors into a cache entry, returns
|
* the access vectors into a cache entry, returns
|
||||||
* avc_node inserted. Otherwise, this function returns NULL.
|
* avc_node inserted. Otherwise, this function returns NULL.
|
||||||
*/
|
*/
|
||||||
static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
|
static struct avc_node *avc_insert(struct selinux_avc *avc,
|
||||||
struct av_decision *avd,
|
u32 ssid, u32 tsid, u16 tclass,
|
||||||
struct avc_xperms_node *xp_node)
|
struct av_decision *avd,
|
||||||
|
struct avc_xperms_node *xp_node)
|
||||||
{
|
{
|
||||||
struct avc_node *pos, *node = NULL;
|
struct avc_node *pos, *node = NULL;
|
||||||
int hvalue;
|
int hvalue;
|
||||||
unsigned long flag;
|
unsigned long flag;
|
||||||
|
|
||||||
if (avc_latest_notif_update(avd->seqno, 1))
|
if (avc_latest_notif_update(avc, avd->seqno, 1))
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
node = avc_alloc_node();
|
node = avc_alloc_node(avc);
|
||||||
if (node) {
|
if (node) {
|
||||||
struct hlist_head *head;
|
struct hlist_head *head;
|
||||||
spinlock_t *lock;
|
spinlock_t *lock;
|
||||||
|
@ -680,15 +706,15 @@ static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
kmem_cache_free(avc_node_cachep, node);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
head = &avc_cache.slots[hvalue];
|
head = &avc->avc_cache.slots[hvalue];
|
||||||
lock = &avc_cache.slots_lock[hvalue];
|
lock = &avc->avc_cache.slots_lock[hvalue];
|
||||||
|
|
||||||
spin_lock_irqsave(lock, flag);
|
spin_lock_irqsave(lock, flag);
|
||||||
hlist_for_each_entry(pos, head, list) {
|
hlist_for_each_entry(pos, head, list) {
|
||||||
if (pos->ae.ssid == ssid &&
|
if (pos->ae.ssid == ssid &&
|
||||||
pos->ae.tsid == tsid &&
|
pos->ae.tsid == tsid &&
|
||||||
pos->ae.tclass == tclass) {
|
pos->ae.tclass == tclass) {
|
||||||
avc_node_replace(node, pos);
|
avc_node_replace(avc, node, pos);
|
||||||
goto found;
|
goto found;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -726,9 +752,10 @@ static void avc_audit_post_callback(struct audit_buffer *ab, void *a)
|
||||||
{
|
{
|
||||||
struct common_audit_data *ad = a;
|
struct common_audit_data *ad = a;
|
||||||
audit_log_format(ab, " ");
|
audit_log_format(ab, " ");
|
||||||
avc_dump_query(ab, ad->selinux_audit_data->ssid,
|
avc_dump_query(ab, ad->selinux_audit_data->state,
|
||||||
ad->selinux_audit_data->tsid,
|
ad->selinux_audit_data->ssid,
|
||||||
ad->selinux_audit_data->tclass);
|
ad->selinux_audit_data->tsid,
|
||||||
|
ad->selinux_audit_data->tclass);
|
||||||
if (ad->selinux_audit_data->denied) {
|
if (ad->selinux_audit_data->denied) {
|
||||||
audit_log_format(ab, " permissive=%u",
|
audit_log_format(ab, " permissive=%u",
|
||||||
ad->selinux_audit_data->result ? 0 : 1);
|
ad->selinux_audit_data->result ? 0 : 1);
|
||||||
|
@ -736,10 +763,11 @@ static void avc_audit_post_callback(struct audit_buffer *ab, void *a)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* This is the slow part of avc audit with big stack footprint */
|
/* This is the slow part of avc audit with big stack footprint */
|
||||||
noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
noinline int slow_avc_audit(struct selinux_state *state,
|
||||||
u32 requested, u32 audited, u32 denied, int result,
|
u32 ssid, u32 tsid, u16 tclass,
|
||||||
struct common_audit_data *a,
|
u32 requested, u32 audited, u32 denied, int result,
|
||||||
unsigned flags)
|
struct common_audit_data *a,
|
||||||
|
unsigned int flags)
|
||||||
{
|
{
|
||||||
struct common_audit_data stack_data;
|
struct common_audit_data stack_data;
|
||||||
struct selinux_audit_data sad;
|
struct selinux_audit_data sad;
|
||||||
|
@ -767,6 +795,7 @@ noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
sad.audited = audited;
|
sad.audited = audited;
|
||||||
sad.denied = denied;
|
sad.denied = denied;
|
||||||
sad.result = result;
|
sad.result = result;
|
||||||
|
sad.state = state;
|
||||||
|
|
||||||
a->selinux_audit_data = &sad;
|
a->selinux_audit_data = &sad;
|
||||||
|
|
||||||
|
@ -815,10 +844,11 @@ out:
|
||||||
* otherwise, this function updates the AVC entry. The original AVC-entry object
|
* otherwise, this function updates the AVC entry. The original AVC-entry object
|
||||||
* will release later by RCU.
|
* will release later by RCU.
|
||||||
*/
|
*/
|
||||||
static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
static int avc_update_node(struct selinux_avc *avc,
|
||||||
u32 tsid, u16 tclass, u32 seqno,
|
u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
||||||
struct extended_perms_decision *xpd,
|
u32 tsid, u16 tclass, u32 seqno,
|
||||||
u32 flags)
|
struct extended_perms_decision *xpd,
|
||||||
|
u32 flags)
|
||||||
{
|
{
|
||||||
int hvalue, rc = 0;
|
int hvalue, rc = 0;
|
||||||
unsigned long flag;
|
unsigned long flag;
|
||||||
|
@ -826,7 +856,7 @@ static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
||||||
struct hlist_head *head;
|
struct hlist_head *head;
|
||||||
spinlock_t *lock;
|
spinlock_t *lock;
|
||||||
|
|
||||||
node = avc_alloc_node();
|
node = avc_alloc_node(avc);
|
||||||
if (!node) {
|
if (!node) {
|
||||||
rc = -ENOMEM;
|
rc = -ENOMEM;
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -835,8 +865,8 @@ static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
||||||
/* Lock the target slot */
|
/* Lock the target slot */
|
||||||
hvalue = avc_hash(ssid, tsid, tclass);
|
hvalue = avc_hash(ssid, tsid, tclass);
|
||||||
|
|
||||||
head = &avc_cache.slots[hvalue];
|
head = &avc->avc_cache.slots[hvalue];
|
||||||
lock = &avc_cache.slots_lock[hvalue];
|
lock = &avc->avc_cache.slots_lock[hvalue];
|
||||||
|
|
||||||
spin_lock_irqsave(lock, flag);
|
spin_lock_irqsave(lock, flag);
|
||||||
|
|
||||||
|
@ -852,7 +882,7 @@ static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
||||||
|
|
||||||
if (!orig) {
|
if (!orig) {
|
||||||
rc = -ENOENT;
|
rc = -ENOENT;
|
||||||
avc_node_kill(node);
|
avc_node_kill(avc, node);
|
||||||
goto out_unlock;
|
goto out_unlock;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -896,7 +926,7 @@ static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
|
||||||
avc_add_xperms_decision(node, xpd);
|
avc_add_xperms_decision(node, xpd);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
avc_node_replace(node, orig);
|
avc_node_replace(avc, node, orig);
|
||||||
out_unlock:
|
out_unlock:
|
||||||
spin_unlock_irqrestore(lock, flag);
|
spin_unlock_irqrestore(lock, flag);
|
||||||
out:
|
out:
|
||||||
|
@ -906,7 +936,7 @@ out:
|
||||||
/**
|
/**
|
||||||
* avc_flush - Flush the cache
|
* avc_flush - Flush the cache
|
||||||
*/
|
*/
|
||||||
static void avc_flush(void)
|
static void avc_flush(struct selinux_avc *avc)
|
||||||
{
|
{
|
||||||
struct hlist_head *head;
|
struct hlist_head *head;
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
|
@ -915,8 +945,8 @@ static void avc_flush(void)
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
for (i = 0; i < AVC_CACHE_SLOTS; i++) {
|
||||||
head = &avc_cache.slots[i];
|
head = &avc->avc_cache.slots[i];
|
||||||
lock = &avc_cache.slots_lock[i];
|
lock = &avc->avc_cache.slots_lock[i];
|
||||||
|
|
||||||
spin_lock_irqsave(lock, flag);
|
spin_lock_irqsave(lock, flag);
|
||||||
/*
|
/*
|
||||||
|
@ -925,7 +955,7 @@ static void avc_flush(void)
|
||||||
*/
|
*/
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
hlist_for_each_entry(node, head, list)
|
hlist_for_each_entry(node, head, list)
|
||||||
avc_node_delete(node);
|
avc_node_delete(avc, node);
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
spin_unlock_irqrestore(lock, flag);
|
spin_unlock_irqrestore(lock, flag);
|
||||||
}
|
}
|
||||||
|
@ -935,12 +965,12 @@ static void avc_flush(void)
|
||||||
* avc_ss_reset - Flush the cache and revalidate migrated permissions.
|
* avc_ss_reset - Flush the cache and revalidate migrated permissions.
|
||||||
* @seqno: policy sequence number
|
* @seqno: policy sequence number
|
||||||
*/
|
*/
|
||||||
int avc_ss_reset(u32 seqno)
|
int avc_ss_reset(struct selinux_avc *avc, u32 seqno)
|
||||||
{
|
{
|
||||||
struct avc_callback_node *c;
|
struct avc_callback_node *c;
|
||||||
int rc = 0, tmprc;
|
int rc = 0, tmprc;
|
||||||
|
|
||||||
avc_flush();
|
avc_flush(avc);
|
||||||
|
|
||||||
for (c = avc_callbacks; c; c = c->next) {
|
for (c = avc_callbacks; c; c = c->next) {
|
||||||
if (c->events & AVC_CALLBACK_RESET) {
|
if (c->events & AVC_CALLBACK_RESET) {
|
||||||
|
@ -952,7 +982,7 @@ int avc_ss_reset(u32 seqno)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
avc_latest_notif_update(seqno, 0);
|
avc_latest_notif_update(avc, seqno, 0);
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -965,32 +995,34 @@ int avc_ss_reset(u32 seqno)
|
||||||
* Don't inline this, since it's the slow-path and just
|
* Don't inline this, since it's the slow-path and just
|
||||||
* results in a bigger stack frame.
|
* results in a bigger stack frame.
|
||||||
*/
|
*/
|
||||||
static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid,
|
static noinline
|
||||||
u16 tclass, struct av_decision *avd,
|
struct avc_node *avc_compute_av(struct selinux_state *state,
|
||||||
struct avc_xperms_node *xp_node)
|
u32 ssid, u32 tsid,
|
||||||
|
u16 tclass, struct av_decision *avd,
|
||||||
|
struct avc_xperms_node *xp_node)
|
||||||
{
|
{
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
INIT_LIST_HEAD(&xp_node->xpd_head);
|
INIT_LIST_HEAD(&xp_node->xpd_head);
|
||||||
security_compute_av(&selinux_state, ssid, tsid, tclass,
|
security_compute_av(state, ssid, tsid, tclass, avd, &xp_node->xp);
|
||||||
avd, &xp_node->xp);
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
return avc_insert(ssid, tsid, tclass, avd, xp_node);
|
return avc_insert(state->avc, ssid, tsid, tclass, avd, xp_node);
|
||||||
}
|
}
|
||||||
|
|
||||||
static noinline int avc_denied(u32 ssid, u32 tsid,
|
static noinline int avc_denied(struct selinux_state *state,
|
||||||
u16 tclass, u32 requested,
|
u32 ssid, u32 tsid,
|
||||||
u8 driver, u8 xperm, unsigned flags,
|
u16 tclass, u32 requested,
|
||||||
struct av_decision *avd)
|
u8 driver, u8 xperm, unsigned int flags,
|
||||||
|
struct av_decision *avd)
|
||||||
{
|
{
|
||||||
if (flags & AVC_STRICT)
|
if (flags & AVC_STRICT)
|
||||||
return -EACCES;
|
return -EACCES;
|
||||||
|
|
||||||
if (enforcing_enabled(&selinux_state) &&
|
if (enforcing_enabled(state) &&
|
||||||
!(avd->flags & AVD_FLAGS_PERMISSIVE))
|
!(avd->flags & AVD_FLAGS_PERMISSIVE))
|
||||||
return -EACCES;
|
return -EACCES;
|
||||||
|
|
||||||
avc_update_node(AVC_CALLBACK_GRANT, requested, driver, xperm, ssid,
|
avc_update_node(state->avc, AVC_CALLBACK_GRANT, requested, driver,
|
||||||
tsid, tclass, avd->seqno, NULL, flags);
|
xperm, ssid, tsid, tclass, avd->seqno, NULL, flags);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1001,8 +1033,9 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
|
||||||
* as-is the case with ioctls, then multiple may be chained together and the
|
* as-is the case with ioctls, then multiple may be chained together and the
|
||||||
* driver field is used to specify which set contains the permission.
|
* driver field is used to specify which set contains the permission.
|
||||||
*/
|
*/
|
||||||
int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
int avc_has_extended_perms(struct selinux_state *state,
|
||||||
u8 driver, u8 xperm, struct common_audit_data *ad)
|
u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
|
u8 driver, u8 xperm, struct common_audit_data *ad)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
struct av_decision avd;
|
struct av_decision avd;
|
||||||
|
@ -1021,9 +1054,9 @@ int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
|
|
||||||
node = avc_lookup(ssid, tsid, tclass);
|
node = avc_lookup(state->avc, ssid, tsid, tclass);
|
||||||
if (unlikely(!node)) {
|
if (unlikely(!node)) {
|
||||||
node = avc_compute_av(ssid, tsid, tclass, &avd, xp_node);
|
node = avc_compute_av(state, ssid, tsid, tclass, &avd, xp_node);
|
||||||
} else {
|
} else {
|
||||||
memcpy(&avd, &node->ae.avd, sizeof(avd));
|
memcpy(&avd, &node->ae.avd, sizeof(avd));
|
||||||
xp_node = node->ae.xp_node;
|
xp_node = node->ae.xp_node;
|
||||||
|
@ -1047,11 +1080,12 @@ int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
goto decision;
|
goto decision;
|
||||||
}
|
}
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
security_compute_xperms_decision(&selinux_state, ssid, tsid,
|
security_compute_xperms_decision(state, ssid, tsid, tclass,
|
||||||
tclass, driver, &local_xpd);
|
driver, &local_xpd);
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
avc_update_node(AVC_CALLBACK_ADD_XPERMS, requested, driver, xperm,
|
avc_update_node(state->avc, AVC_CALLBACK_ADD_XPERMS, requested,
|
||||||
ssid, tsid, tclass, avd.seqno, &local_xpd, 0);
|
driver, xperm, ssid, tsid, tclass, avd.seqno,
|
||||||
|
&local_xpd, 0);
|
||||||
} else {
|
} else {
|
||||||
avc_quick_copy_xperms_decision(xperm, &local_xpd, xpd);
|
avc_quick_copy_xperms_decision(xperm, &local_xpd, xpd);
|
||||||
}
|
}
|
||||||
|
@ -1063,12 +1097,12 @@ int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
decision:
|
decision:
|
||||||
denied = requested & ~(avd.allowed);
|
denied = requested & ~(avd.allowed);
|
||||||
if (unlikely(denied))
|
if (unlikely(denied))
|
||||||
rc = avc_denied(ssid, tsid, tclass, requested, driver, xperm,
|
rc = avc_denied(state, ssid, tsid, tclass, requested,
|
||||||
AVC_EXTENDED_PERMS, &avd);
|
driver, xperm, AVC_EXTENDED_PERMS, &avd);
|
||||||
|
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
|
|
||||||
rc2 = avc_xperms_audit(ssid, tsid, tclass, requested,
|
rc2 = avc_xperms_audit(state, ssid, tsid, tclass, requested,
|
||||||
&avd, xpd, xperm, rc, ad);
|
&avd, xpd, xperm, rc, ad);
|
||||||
if (rc2)
|
if (rc2)
|
||||||
return rc2;
|
return rc2;
|
||||||
|
@ -1095,10 +1129,11 @@ decision:
|
||||||
* auditing, e.g. in cases where a lock must be held for the check but
|
* auditing, e.g. in cases where a lock must be held for the check but
|
||||||
* should be released for the auditing.
|
* should be released for the auditing.
|
||||||
*/
|
*/
|
||||||
inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
inline int avc_has_perm_noaudit(struct selinux_state *state,
|
||||||
u16 tclass, u32 requested,
|
u32 ssid, u32 tsid,
|
||||||
unsigned flags,
|
u16 tclass, u32 requested,
|
||||||
struct av_decision *avd)
|
unsigned int flags,
|
||||||
|
struct av_decision *avd)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
struct avc_xperms_node xp_node;
|
struct avc_xperms_node xp_node;
|
||||||
|
@ -1109,15 +1144,16 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
||||||
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
|
|
||||||
node = avc_lookup(ssid, tsid, tclass);
|
node = avc_lookup(state->avc, ssid, tsid, tclass);
|
||||||
if (unlikely(!node))
|
if (unlikely(!node))
|
||||||
node = avc_compute_av(ssid, tsid, tclass, avd, &xp_node);
|
node = avc_compute_av(state, ssid, tsid, tclass, avd, &xp_node);
|
||||||
else
|
else
|
||||||
memcpy(avd, &node->ae.avd, sizeof(*avd));
|
memcpy(avd, &node->ae.avd, sizeof(*avd));
|
||||||
|
|
||||||
denied = requested & ~(avd->allowed);
|
denied = requested & ~(avd->allowed);
|
||||||
if (unlikely(denied))
|
if (unlikely(denied))
|
||||||
rc = avc_denied(ssid, tsid, tclass, requested, 0, 0, flags, avd);
|
rc = avc_denied(state, ssid, tsid, tclass, requested, 0, 0,
|
||||||
|
flags, avd);
|
||||||
|
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
return rc;
|
return rc;
|
||||||
|
@ -1139,39 +1175,43 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
||||||
* permissions are granted, -%EACCES if any permissions are denied, or
|
* permissions are granted, -%EACCES if any permissions are denied, or
|
||||||
* another -errno upon other errors.
|
* another -errno upon other errors.
|
||||||
*/
|
*/
|
||||||
int avc_has_perm(u32 ssid, u32 tsid, u16 tclass,
|
int avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass,
|
||||||
u32 requested, struct common_audit_data *auditdata)
|
u32 requested, struct common_audit_data *auditdata)
|
||||||
{
|
{
|
||||||
struct av_decision avd;
|
struct av_decision avd;
|
||||||
int rc, rc2;
|
int rc, rc2;
|
||||||
|
|
||||||
rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, 0, &avd);
|
rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested, 0,
|
||||||
|
&avd);
|
||||||
|
|
||||||
rc2 = avc_audit(ssid, tsid, tclass, requested, &avd, rc, auditdata, 0);
|
rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
|
||||||
|
auditdata, 0);
|
||||||
if (rc2)
|
if (rc2)
|
||||||
return rc2;
|
return rc2;
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
int avc_has_perm_flags(u32 ssid, u32 tsid, u16 tclass,
|
int avc_has_perm_flags(struct selinux_state *state,
|
||||||
u32 requested, struct common_audit_data *auditdata,
|
u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
|
struct common_audit_data *auditdata,
|
||||||
int flags)
|
int flags)
|
||||||
{
|
{
|
||||||
struct av_decision avd;
|
struct av_decision avd;
|
||||||
int rc, rc2;
|
int rc, rc2;
|
||||||
|
|
||||||
rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, 0, &avd);
|
rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested, 0,
|
||||||
|
&avd);
|
||||||
|
|
||||||
rc2 = avc_audit(ssid, tsid, tclass, requested, &avd, rc,
|
rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
|
||||||
auditdata, flags);
|
auditdata, flags);
|
||||||
if (rc2)
|
if (rc2)
|
||||||
return rc2;
|
return rc2;
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
u32 avc_policy_seqno(void)
|
u32 avc_policy_seqno(struct selinux_state *state)
|
||||||
{
|
{
|
||||||
return avc_cache.latest_notif;
|
return state->avc->avc_cache.latest_notif;
|
||||||
}
|
}
|
||||||
|
|
||||||
void avc_disable(void)
|
void avc_disable(void)
|
||||||
|
@ -1188,7 +1228,7 @@ void avc_disable(void)
|
||||||
* the cache and get that memory back.
|
* the cache and get that memory back.
|
||||||
*/
|
*/
|
||||||
if (avc_node_cachep) {
|
if (avc_node_cachep) {
|
||||||
avc_flush();
|
avc_flush(selinux_state.avc);
|
||||||
/* kmem_cache_destroy(avc_node_cachep); */
|
/* kmem_cache_destroy(avc_node_cachep); */
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -52,6 +52,7 @@ struct selinux_audit_data {
|
||||||
u32 audited;
|
u32 audited;
|
||||||
u32 denied;
|
u32 denied;
|
||||||
int result;
|
int result;
|
||||||
|
struct selinux_state *state;
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -96,7 +97,8 @@ static inline u32 avc_audit_required(u32 requested,
|
||||||
return audited;
|
return audited;
|
||||||
}
|
}
|
||||||
|
|
||||||
int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
int slow_avc_audit(struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid, u16 tclass,
|
||||||
u32 requested, u32 audited, u32 denied, int result,
|
u32 requested, u32 audited, u32 denied, int result,
|
||||||
struct common_audit_data *a,
|
struct common_audit_data *a,
|
||||||
unsigned flags);
|
unsigned flags);
|
||||||
|
@ -121,7 +123,8 @@ int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
* be performed under a lock, to allow the lock to be released
|
* be performed under a lock, to allow the lock to be released
|
||||||
* before calling the auditing code.
|
* before calling the auditing code.
|
||||||
*/
|
*/
|
||||||
static inline int avc_audit(u32 ssid, u32 tsid,
|
static inline int avc_audit(struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
struct av_decision *avd,
|
struct av_decision *avd,
|
||||||
int result,
|
int result,
|
||||||
|
@ -132,31 +135,35 @@ static inline int avc_audit(u32 ssid, u32 tsid,
|
||||||
audited = avc_audit_required(requested, avd, result, 0, &denied);
|
audited = avc_audit_required(requested, avd, result, 0, &denied);
|
||||||
if (likely(!audited))
|
if (likely(!audited))
|
||||||
return 0;
|
return 0;
|
||||||
return slow_avc_audit(ssid, tsid, tclass,
|
return slow_avc_audit(state, ssid, tsid, tclass,
|
||||||
requested, audited, denied, result,
|
requested, audited, denied, result,
|
||||||
a, flags);
|
a, flags);
|
||||||
}
|
}
|
||||||
|
|
||||||
#define AVC_STRICT 1 /* Ignore permissive mode. */
|
#define AVC_STRICT 1 /* Ignore permissive mode. */
|
||||||
#define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
#define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
||||||
int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
int avc_has_perm_noaudit(struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
unsigned flags,
|
unsigned flags,
|
||||||
struct av_decision *avd);
|
struct av_decision *avd);
|
||||||
|
|
||||||
int avc_has_perm(u32 ssid, u32 tsid,
|
int avc_has_perm(struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
struct common_audit_data *auditdata);
|
struct common_audit_data *auditdata);
|
||||||
int avc_has_perm_flags(u32 ssid, u32 tsid,
|
int avc_has_perm_flags(struct selinux_state *state,
|
||||||
|
u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
struct common_audit_data *auditdata,
|
struct common_audit_data *auditdata,
|
||||||
int flags);
|
int flags);
|
||||||
|
|
||||||
int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
int avc_has_extended_perms(struct selinux_state *state,
|
||||||
u8 driver, u8 perm, struct common_audit_data *ad);
|
u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
||||||
|
u8 driver, u8 perm, struct common_audit_data *ad);
|
||||||
|
|
||||||
|
|
||||||
u32 avc_policy_seqno(void);
|
u32 avc_policy_seqno(struct selinux_state *state);
|
||||||
|
|
||||||
#define AVC_CALLBACK_GRANT 1
|
#define AVC_CALLBACK_GRANT 1
|
||||||
#define AVC_CALLBACK_TRY_REVOKE 2
|
#define AVC_CALLBACK_TRY_REVOKE 2
|
||||||
|
@ -171,8 +178,11 @@ u32 avc_policy_seqno(void);
|
||||||
int avc_add_callback(int (*callback)(u32 event), u32 events);
|
int avc_add_callback(int (*callback)(u32 event), u32 events);
|
||||||
|
|
||||||
/* Exported to selinuxfs */
|
/* Exported to selinuxfs */
|
||||||
int avc_get_hash_stats(char *page);
|
struct selinux_avc;
|
||||||
extern unsigned int avc_cache_threshold;
|
int avc_get_hash_stats(struct selinux_avc *avc, char *page);
|
||||||
|
unsigned int avc_get_cache_threshold(struct selinux_avc *avc);
|
||||||
|
void avc_set_cache_threshold(struct selinux_avc *avc,
|
||||||
|
unsigned int cache_threshold);
|
||||||
|
|
||||||
/* Attempt to free avc node cache */
|
/* Attempt to free avc node cache */
|
||||||
void avc_disable(void);
|
void avc_disable(void);
|
||||||
|
|
|
@ -9,7 +9,8 @@
|
||||||
|
|
||||||
#include "flask.h"
|
#include "flask.h"
|
||||||
|
|
||||||
int avc_ss_reset(u32 seqno);
|
struct selinux_avc;
|
||||||
|
int avc_ss_reset(struct selinux_avc *avc, u32 seqno);
|
||||||
|
|
||||||
/* Class/perm mapping support */
|
/* Class/perm mapping support */
|
||||||
struct security_class_mapping {
|
struct security_class_mapping {
|
||||||
|
|
|
@ -93,6 +93,7 @@ extern char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
|
||||||
/* limitation of boundary depth */
|
/* limitation of boundary depth */
|
||||||
#define POLICYDB_BOUNDS_MAXDEPTH 4
|
#define POLICYDB_BOUNDS_MAXDEPTH 4
|
||||||
|
|
||||||
|
struct selinux_avc;
|
||||||
struct selinux_ss;
|
struct selinux_ss;
|
||||||
|
|
||||||
struct selinux_state {
|
struct selinux_state {
|
||||||
|
@ -103,10 +104,12 @@ struct selinux_state {
|
||||||
bool checkreqprot;
|
bool checkreqprot;
|
||||||
bool initialized;
|
bool initialized;
|
||||||
bool policycap[__POLICYDB_CAPABILITY_MAX];
|
bool policycap[__POLICYDB_CAPABILITY_MAX];
|
||||||
|
struct selinux_avc *avc;
|
||||||
struct selinux_ss *ss;
|
struct selinux_ss *ss;
|
||||||
};
|
};
|
||||||
|
|
||||||
void selinux_ss_init(struct selinux_ss **ss);
|
void selinux_ss_init(struct selinux_ss **ss);
|
||||||
|
void selinux_avc_init(struct selinux_avc **avc);
|
||||||
|
|
||||||
extern struct selinux_state selinux_state;
|
extern struct selinux_state selinux_state;
|
||||||
|
|
||||||
|
|
|
@ -478,7 +478,8 @@ int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
||||||
perm = RAWIP_SOCKET__RECVFROM;
|
perm = RAWIP_SOCKET__RECVFROM;
|
||||||
}
|
}
|
||||||
|
|
||||||
rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
|
rc = avc_has_perm(&selinux_state,
|
||||||
|
sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
|
||||||
if (rc == 0)
|
if (rc == 0)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
|
|
|
@ -161,7 +161,8 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
|
||||||
|
|
||||||
old_value = enforcing_enabled(state);
|
old_value = enforcing_enabled(state);
|
||||||
if (new_value != old_value) {
|
if (new_value != old_value) {
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__SETENFORCE,
|
SECCLASS_SECURITY, SECURITY__SETENFORCE,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -173,7 +174,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
|
||||||
audit_get_sessionid(current));
|
audit_get_sessionid(current));
|
||||||
enforcing_set(state, new_value);
|
enforcing_set(state, new_value);
|
||||||
if (new_value)
|
if (new_value)
|
||||||
avc_ss_reset(0);
|
avc_ss_reset(state->avc, 0);
|
||||||
selnl_notify_setenforce(new_value);
|
selnl_notify_setenforce(new_value);
|
||||||
selinux_status_update_setenforce(state, new_value);
|
selinux_status_update_setenforce(state, new_value);
|
||||||
if (!new_value)
|
if (!new_value)
|
||||||
|
@ -375,7 +376,8 @@ static int sel_open_policy(struct inode *inode, struct file *filp)
|
||||||
|
|
||||||
mutex_lock(&fsi->mutex);
|
mutex_lock(&fsi->mutex);
|
||||||
|
|
||||||
rc = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
rc = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__READ_POLICY, NULL);
|
SECCLASS_SECURITY, SECURITY__READ_POLICY, NULL);
|
||||||
if (rc)
|
if (rc)
|
||||||
goto err;
|
goto err;
|
||||||
|
@ -439,7 +441,8 @@ static ssize_t sel_read_policy(struct file *filp, char __user *buf,
|
||||||
|
|
||||||
mutex_lock(&fsi->mutex);
|
mutex_lock(&fsi->mutex);
|
||||||
|
|
||||||
ret = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
ret = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__READ_POLICY, NULL);
|
SECCLASS_SECURITY, SECURITY__READ_POLICY, NULL);
|
||||||
if (ret)
|
if (ret)
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -535,7 +538,8 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf,
|
||||||
|
|
||||||
mutex_lock(&fsi->mutex);
|
mutex_lock(&fsi->mutex);
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__LOAD_POLICY, NULL);
|
SECCLASS_SECURITY, SECURITY__LOAD_POLICY, NULL);
|
||||||
if (length)
|
if (length)
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -594,7 +598,8 @@ static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
|
||||||
u32 sid, len;
|
u32 sid, len;
|
||||||
ssize_t length;
|
ssize_t length;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__CHECK_CONTEXT, NULL);
|
SECCLASS_SECURITY, SECURITY__CHECK_CONTEXT, NULL);
|
||||||
if (length)
|
if (length)
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -640,7 +645,8 @@ static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
|
||||||
ssize_t length;
|
ssize_t length;
|
||||||
unsigned int new_value;
|
unsigned int new_value;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__SETCHECKREQPROT,
|
SECCLASS_SECURITY, SECURITY__SETCHECKREQPROT,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -685,7 +691,8 @@ static ssize_t sel_write_validatetrans(struct file *file,
|
||||||
u16 tclass;
|
u16 tclass;
|
||||||
int rc;
|
int rc;
|
||||||
|
|
||||||
rc = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
rc = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__VALIDATE_TRANS, NULL);
|
SECCLASS_SECURITY, SECURITY__VALIDATE_TRANS, NULL);
|
||||||
if (rc)
|
if (rc)
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -813,7 +820,8 @@ static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
|
||||||
struct av_decision avd;
|
struct av_decision avd;
|
||||||
ssize_t length;
|
ssize_t length;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__COMPUTE_AV, NULL);
|
SECCLASS_SECURITY, SECURITY__COMPUTE_AV, NULL);
|
||||||
if (length)
|
if (length)
|
||||||
goto out;
|
goto out;
|
||||||
|
@ -866,7 +874,8 @@ static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
|
||||||
u32 len;
|
u32 len;
|
||||||
int nargs;
|
int nargs;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__COMPUTE_CREATE,
|
SECCLASS_SECURITY, SECURITY__COMPUTE_CREATE,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -967,7 +976,8 @@ static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
|
||||||
char *newcon = NULL;
|
char *newcon = NULL;
|
||||||
u32 len;
|
u32 len;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__COMPUTE_RELABEL,
|
SECCLASS_SECURITY, SECURITY__COMPUTE_RELABEL,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -1027,7 +1037,8 @@ static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
|
||||||
int i, rc;
|
int i, rc;
|
||||||
u32 len, nsids;
|
u32 len, nsids;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__COMPUTE_USER,
|
SECCLASS_SECURITY, SECURITY__COMPUTE_USER,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -1091,7 +1102,8 @@ static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
|
||||||
char *newcon = NULL;
|
char *newcon = NULL;
|
||||||
u32 len;
|
u32 len;
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__COMPUTE_MEMBER,
|
SECCLASS_SECURITY, SECURITY__COMPUTE_MEMBER,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -1203,7 +1215,8 @@ static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
|
||||||
|
|
||||||
mutex_lock(&fsi->mutex);
|
mutex_lock(&fsi->mutex);
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__SETBOOL,
|
SECCLASS_SECURITY, SECURITY__SETBOOL,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -1263,7 +1276,8 @@ static ssize_t sel_commit_bools_write(struct file *filep,
|
||||||
|
|
||||||
mutex_lock(&fsi->mutex);
|
mutex_lock(&fsi->mutex);
|
||||||
|
|
||||||
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
length = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__SETBOOL,
|
SECCLASS_SECURITY, SECURITY__SETBOOL,
|
||||||
NULL);
|
NULL);
|
||||||
if (length)
|
if (length)
|
||||||
|
@ -1403,10 +1417,13 @@ out:
|
||||||
static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
|
static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
|
||||||
size_t count, loff_t *ppos)
|
size_t count, loff_t *ppos)
|
||||||
{
|
{
|
||||||
|
struct selinux_fs_info *fsi = file_inode(filp)->i_sb->s_fs_info;
|
||||||
|
struct selinux_state *state = fsi->state;
|
||||||
char tmpbuf[TMPBUFLEN];
|
char tmpbuf[TMPBUFLEN];
|
||||||
ssize_t length;
|
ssize_t length;
|
||||||
|
|
||||||
length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
|
length = scnprintf(tmpbuf, TMPBUFLEN, "%u",
|
||||||
|
avc_get_cache_threshold(state->avc));
|
||||||
return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
|
return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1415,11 +1432,14 @@ static ssize_t sel_write_avc_cache_threshold(struct file *file,
|
||||||
size_t count, loff_t *ppos)
|
size_t count, loff_t *ppos)
|
||||||
|
|
||||||
{
|
{
|
||||||
|
struct selinux_fs_info *fsi = file_inode(file)->i_sb->s_fs_info;
|
||||||
|
struct selinux_state *state = fsi->state;
|
||||||
char *page;
|
char *page;
|
||||||
ssize_t ret;
|
ssize_t ret;
|
||||||
unsigned int new_value;
|
unsigned int new_value;
|
||||||
|
|
||||||
ret = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
ret = avc_has_perm(&selinux_state,
|
||||||
|
current_sid(), SECINITSID_SECURITY,
|
||||||
SECCLASS_SECURITY, SECURITY__SETSECPARAM,
|
SECCLASS_SECURITY, SECURITY__SETSECPARAM,
|
||||||
NULL);
|
NULL);
|
||||||
if (ret)
|
if (ret)
|
||||||
|
@ -1440,7 +1460,7 @@ static ssize_t sel_write_avc_cache_threshold(struct file *file,
|
||||||
if (sscanf(page, "%u", &new_value) != 1)
|
if (sscanf(page, "%u", &new_value) != 1)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
avc_cache_threshold = new_value;
|
avc_set_cache_threshold(state->avc, new_value);
|
||||||
|
|
||||||
ret = count;
|
ret = count;
|
||||||
out:
|
out:
|
||||||
|
@ -1451,6 +1471,8 @@ out:
|
||||||
static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
|
static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
|
||||||
size_t count, loff_t *ppos)
|
size_t count, loff_t *ppos)
|
||||||
{
|
{
|
||||||
|
struct selinux_fs_info *fsi = file_inode(filp)->i_sb->s_fs_info;
|
||||||
|
struct selinux_state *state = fsi->state;
|
||||||
char *page;
|
char *page;
|
||||||
ssize_t length;
|
ssize_t length;
|
||||||
|
|
||||||
|
@ -1458,7 +1480,7 @@ static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
|
||||||
if (!page)
|
if (!page)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
length = avc_get_hash_stats(page);
|
length = avc_get_hash_stats(state->avc, page);
|
||||||
if (length >= 0)
|
if (length >= 0)
|
||||||
length = simple_read_from_buffer(buf, count, ppos, page, length);
|
length = simple_read_from_buffer(buf, count, ppos, page, length);
|
||||||
free_page((unsigned long)page);
|
free_page((unsigned long)page);
|
||||||
|
|
|
@ -2151,7 +2151,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len)
|
||||||
state->initialized = 1;
|
state->initialized = 1;
|
||||||
seqno = ++state->ss->latest_granting;
|
seqno = ++state->ss->latest_granting;
|
||||||
selinux_complete_init();
|
selinux_complete_init();
|
||||||
avc_ss_reset(seqno);
|
avc_ss_reset(state->avc, seqno);
|
||||||
selnl_notify_policyload(seqno);
|
selnl_notify_policyload(seqno);
|
||||||
selinux_status_update_policyload(state, seqno);
|
selinux_status_update_policyload(state, seqno);
|
||||||
selinux_netlbl_cache_invalidate();
|
selinux_netlbl_cache_invalidate();
|
||||||
|
@ -2233,7 +2233,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len)
|
||||||
sidtab_destroy(&oldsidtab);
|
sidtab_destroy(&oldsidtab);
|
||||||
kfree(oldmapping);
|
kfree(oldmapping);
|
||||||
|
|
||||||
avc_ss_reset(seqno);
|
avc_ss_reset(state->avc, seqno);
|
||||||
selnl_notify_policyload(seqno);
|
selnl_notify_policyload(seqno);
|
||||||
selinux_status_update_policyload(state, seqno);
|
selinux_status_update_policyload(state, seqno);
|
||||||
selinux_netlbl_cache_invalidate();
|
selinux_netlbl_cache_invalidate();
|
||||||
|
@ -2649,7 +2649,8 @@ out_unlock:
|
||||||
}
|
}
|
||||||
for (i = 0, j = 0; i < mynel; i++) {
|
for (i = 0, j = 0; i < mynel; i++) {
|
||||||
struct av_decision dummy_avd;
|
struct av_decision dummy_avd;
|
||||||
rc = avc_has_perm_noaudit(fromsid, mysids[i],
|
rc = avc_has_perm_noaudit(state,
|
||||||
|
fromsid, mysids[i],
|
||||||
SECCLASS_PROCESS, /* kernel value */
|
SECCLASS_PROCESS, /* kernel value */
|
||||||
PROCESS__TRANSITION, AVC_STRICT,
|
PROCESS__TRANSITION, AVC_STRICT,
|
||||||
&dummy_avd);
|
&dummy_avd);
|
||||||
|
@ -2907,7 +2908,7 @@ int security_set_bools(struct selinux_state *state, int len, int *values)
|
||||||
out:
|
out:
|
||||||
write_unlock_irq(&state->ss->policy_rwlock);
|
write_unlock_irq(&state->ss->policy_rwlock);
|
||||||
if (!rc) {
|
if (!rc) {
|
||||||
avc_ss_reset(seqno);
|
avc_ss_reset(state->avc, seqno);
|
||||||
selnl_notify_policyload(seqno);
|
selnl_notify_policyload(seqno);
|
||||||
selinux_status_update_policyload(state, seqno);
|
selinux_status_update_policyload(state, seqno);
|
||||||
selinux_xfrm_notify_policyload();
|
selinux_xfrm_notify_policyload();
|
||||||
|
|
|
@ -106,7 +106,8 @@ static int selinux_xfrm_alloc_user(struct xfrm_sec_ctx **ctxp,
|
||||||
if (rc)
|
if (rc)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
rc = avc_has_perm(tsec->sid, ctx->ctx_sid,
|
rc = avc_has_perm(&selinux_state,
|
||||||
|
tsec->sid, ctx->ctx_sid,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, NULL);
|
SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, NULL);
|
||||||
if (rc)
|
if (rc)
|
||||||
goto err;
|
goto err;
|
||||||
|
@ -142,7 +143,8 @@ static int selinux_xfrm_delete(struct xfrm_sec_ctx *ctx)
|
||||||
if (!ctx)
|
if (!ctx)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
return avc_has_perm(tsec->sid, ctx->ctx_sid,
|
return avc_has_perm(&selinux_state,
|
||||||
|
tsec->sid, ctx->ctx_sid,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT,
|
SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT,
|
||||||
NULL);
|
NULL);
|
||||||
}
|
}
|
||||||
|
@ -164,7 +166,8 @@ int selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir)
|
||||||
if (!selinux_authorizable_ctx(ctx))
|
if (!selinux_authorizable_ctx(ctx))
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
rc = avc_has_perm(fl_secid, ctx->ctx_sid,
|
rc = avc_has_perm(&selinux_state,
|
||||||
|
fl_secid, ctx->ctx_sid,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__POLMATCH, NULL);
|
SECCLASS_ASSOCIATION, ASSOCIATION__POLMATCH, NULL);
|
||||||
return (rc == -EACCES ? -ESRCH : rc);
|
return (rc == -EACCES ? -ESRCH : rc);
|
||||||
}
|
}
|
||||||
|
@ -203,7 +206,8 @@ int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
|
||||||
/* We don't need a separate SA Vs. policy polmatch check since the SA
|
/* We don't need a separate SA Vs. policy polmatch check since the SA
|
||||||
* is now of the same label as the flow and a flow Vs. policy polmatch
|
* is now of the same label as the flow and a flow Vs. policy polmatch
|
||||||
* check had already happened in selinux_xfrm_policy_lookup() above. */
|
* check had already happened in selinux_xfrm_policy_lookup() above. */
|
||||||
return (avc_has_perm(fl->flowi_secid, state_sid,
|
return (avc_has_perm(&selinux_state,
|
||||||
|
fl->flowi_secid, state_sid,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO,
|
SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO,
|
||||||
NULL) ? 0 : 1);
|
NULL) ? 0 : 1);
|
||||||
}
|
}
|
||||||
|
@ -422,7 +426,8 @@ int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
|
||||||
/* This check even when there's no association involved is intended,
|
/* This check even when there's no association involved is intended,
|
||||||
* according to Trent Jaeger, to make sure a process can't engage in
|
* according to Trent Jaeger, to make sure a process can't engage in
|
||||||
* non-IPsec communication unless explicitly allowed by policy. */
|
* non-IPsec communication unless explicitly allowed by policy. */
|
||||||
return avc_has_perm(sk_sid, peer_sid,
|
return avc_has_perm(&selinux_state,
|
||||||
|
sk_sid, peer_sid,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, ad);
|
SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, ad);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -465,6 +470,6 @@ int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
|
||||||
/* This check even when there's no association involved is intended,
|
/* This check even when there's no association involved is intended,
|
||||||
* according to Trent Jaeger, to make sure a process can't engage in
|
* according to Trent Jaeger, to make sure a process can't engage in
|
||||||
* non-IPsec communication unless explicitly allowed by policy. */
|
* non-IPsec communication unless explicitly allowed by policy. */
|
||||||
return avc_has_perm(sk_sid, SECINITSID_UNLABELED,
|
return avc_has_perm(&selinux_state, sk_sid, SECINITSID_UNLABELED,
|
||||||
SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, ad);
|
SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, ad);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue