From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.0 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,UNWANTED_LANGUAGE_BODY autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A42E8C433E0 for ; Tue, 9 Mar 2021 15:03:10 +0000 (UTC) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 0AB81650DF for ; Tue, 9 Mar 2021 15:03:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0AB81650DF Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=schaufler-ca.com Authentication-Results: mail.kernel.org; spf=tempfail smtp.mailfrom=linux-audit-bounces@redhat.com Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-249-QCdmASGDMz6mcff7K4y3PA-1; Tue, 09 Mar 2021 10:03:05 -0500 X-MC-Unique: QCdmASGDMz6mcff7K4y3PA-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 0CB5A83DD29; Tue, 9 Mar 2021 15:03:02 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D37AE6062F; Tue, 9 Mar 2021 15:03:01 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 9165C5002F; Tue, 9 Mar 2021 15:03:01 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 129F30er022037 for ; Tue, 9 Mar 2021 10:03:00 -0500 Received: by smtp.corp.redhat.com (Postfix) id E9911201140A; Tue, 9 Mar 2021 15:02:59 +0000 (UTC) Received: from mimecast-mx02.redhat.com (mimecast03.extmail.prod.ext.rdu2.redhat.com [10.11.55.19]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E469720113EA for ; Tue, 9 Mar 2021 15:02:56 +0000 (UTC) Received: from us-smtp-1.mimecast.com (us-smtp-delivery-1.mimecast.com [207.211.31.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 39261855218 for ; Tue, 9 Mar 2021 15:02:56 +0000 (UTC) Received: from sonic309-26.consmr.mail.ne1.yahoo.com (sonic309-26.consmr.mail.ne1.yahoo.com [66.163.184.152]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-21-8aD0kYwFNLS_ZM7AHpYChg-1; Tue, 09 Mar 2021 10:02:54 -0500 X-MC-Unique: 8aD0kYwFNLS_ZM7AHpYChg-1 X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1615302173; bh=n4B2aMXEhl/rANrFIR28Yve3FPmx9aqcjy28vhfBYk3=; h=X-Sonic-MF:From:To:Subject:Date:From:Subject; b=m8r0fnjlXdejOMYfsf7nCKuLY3SNRiuLKEZK/fIKVeOLKAUzQ0hhnSr1MnQw7Akulhrr+hqBH5nm4OKtsarLLQFsZjJvLQNYc3q+TGcGsc0uJa+QFlMxtNSMNRFSvaN9/8B0eILkUlN0MSOPvyX0L6xNdtc2mLXlIJLBSQHAy3gfiKj3zmUGDalY16pQ7TkvnMlt/b51SDdP9QLLF6fm4Y/dF7tYNdVdZKx6f6ubLmqfNSd4GAp5ydddekYUTR9OkyhG5YfPVC5eLpPnBqVgxnxgUN1SnNeuwP8svWvXBwQvW/KT/gvTJFqA4uqCsbxKZNv6WMibe4jPWCuGThhdJA== X-YMail-OSG: MN8umH4VM1lX59sSB1DZsLSTWprG5qUFk4SCRa3raXs8gmFff5UkkQFG7uJYcvV U1mNgbGVXcFOnGrssTfUNtonVuMsfdagHsMN3EVHHBkqniJo0mtXqozqr4Rx1i.BJQSUc27uNpwr 8qfmTJtFmvlJvqwDGYWcXK18kR20kgwUP1TNnSWPUAcpbyooVh_VtD7YLmAxzHj.pd.uPZz9laRI fy_x1KndKJwVasKfYn3uXVCKZr59xTj1wRkN1onwzp3v3.D9Nso9t11ARg.TTNOyaB1T5kWQO6Vm pL0duI_qSyyqsEyEvYMBlwomjV188m90aj.X5AAa.KpTTJ3lATQTx3PGQC.zPg908AP_6xJbcwS2 Sy8hnWctbobxo8hbm1dl0YHsVOZCa3gFqvPxV0S01Jp6W6n.mZkHYaXYfBZtsSoFMHybO_uRTH7I 7hg0WGgnrU9NHlDYupoXkhijnutgDLwo6aT_0xg2jBQs.8Xjta9LjaBqNzDc3901NViJ7d4wsX1K yg8TOlxHjYdPYSI4zw8qTBokD46tlPVqhCxIiu64WIkeU5dUgbURcbfcaEjCpVRbUmYcY5XgFuNj OCYxGoo5b1xMRfqE434EoDUrb1JqIFoK3AAnTDD.eE8dcqv9._x.XGusXJHujC8Mxip6zqUfrsCu D8RbJtDEGjdQnOOXLwk_lfj2yMWJjWkKO5P7MjdujM3b7KsCo2tPTZS6geGUABm_4lhl_xmv7s3O dHjirccc7d0HQ82LgnBQTAJU57ABS6CmkwiopG7UwMNa5CRB6PZLN29K4LNbfAF.Ckqzj3yKiF18 Pu4.AdgKICUk_wedq52MHvAcnhzJgFy0s9KX3Kx68NLeJ4wnpQvj2oxHzlPVDB8m0wUymcZ3Dpad 9nKqWXF7MEukI.bc_zbXcQIrKKBqjrbUjdj.845aoVwHbuS7Qu761LEo1j0bt13._Af4xEL7RedW G9KnI2kDxFI0SmKtotXzBG9qay1eliZDlVfeROZnhJvY3AGbXDUYXcBeKwiUlui03hR11XjuLlgz g_G0UYnCCYBFiMO7J9fKYWZB28FrUtReKCwUezFtk6KgKFEM6Rf02jiO0DsBUHThF7Vc9VRQScpO oGqaCEsYEd14Xdb74lKarSJsh5m1v1j9jd5LDKo2nkl.6EHdOqQZnq8i3smG.3HcC1alIKWmEodh 103bpYGpo.Y2sr1zFenTQjJ60IKX6wig2D0BR1cMlH3U0dIvHbawVnj.IchKcn7pUBXkTdyQNW8E qcFH1TvZ7o_IME67.ooR3UtI91QMEvLyrCcEWRhBjsmGyhmpY2Juv3eDjeCnJG2zzXPzz4lBUaDp BqLgRJTSWIO8K3cu1gGHFI4bWD3ONg4pZCQoCn8YuJO.Gl4a3bfmwWheJv53m97wuWQ8FlIUIkx2 9ptudzTQPXo0RSeK1NkVfpRU3r.nDzgyW6x6H7ULqcI_8XuJ8zP.IeLBg72A..drUh_GuroXGbyS _RKHiZ5_ooG9x9EuGbsMOJMXhu5WM4HwTaXg35bYb5opdKVtZX.jNIe2OmWiNEQeP64BlMy5MciN SBsGIQ3.NZjoQbAnyddSo8GfQXKUbY7Gyt9VCWgM7.jDBuhIuSCNi_WeQercIcmmUMqMT3BRDg7I tXouJH8PXIOq4eDVI3L934JiU0Y7QX0axmzYi7RvQX3o1zVenquVv5zK3SD3OgUA.JpVwJvpFPBc E1zH1om9Dxy399cwLrxZQXENgt.AUHKXtOHcpjs_6wu6rZtFa70dUg7UQsmsCKNlVlQ4bVh4FxbD 3OHFFwt9wJHbcBSWVNiND5QQPwGxF6B5STkthxqkm9X8P72o6AinSwKebfmUscvE_MGwlaEJ0bhs C6A0hqSVKDpXW17f0edNSz7LcepUxZoy7nwo6pw6z0ykS9hM49CIO8jdnmia5nOhooswu1BLTx57 fBIauhdukx5ZgkLURlRNiB09Vc8r8Lnyljkj5prYjAb.bcT.6ZoUYf7mTI2c3Wdf7TDufEhKghw7 tezx5XecIuZVI4esWK_bvBwG3aJ9DDR1IeObDD91ZFeuf4pCbZMdGtt0bEGwCJK5Zaq96aYMM5k7 kWxYXRL260IRDEQ8a8ItisCnjqt6mo8I1MOizQXUeVt0sODniG9AgGvy67BZMwaU6l2g2Nk.tQW3 pu1QfTT8lxAS7r1CgNjiTBtGnRaj.a2N1Ao5Yahmrb_ILWgNANEIAW4_CMqQBw34QYnVDl3wMjN9 k_WuzY_VWYzZvpU_BOA8UtLUWG2_0IYwGMC2nUFegx3tt3rdywLqr3dOtjQt_kKlTigCPUOf8NGK 7uPGMw1GapsL5apyU1rzzr3RWXhI0iWtua12mllm8Tu1CQy9xPBi6G2Krw5.rbIjcMGZNPvINWDB Ruc8OczugfpD7Jqoqq2tWLs_a0id3_AS1fIyECzH5Ca3jX5MKQwzAVxHVM3s4BGP60pXW1d3F92i y8gEsvFZnMr8lv_sijfJhRFMfhMlQXKLH_vR3GfOyqKOMhn5A0Rm9DyhXzc50eV4RBy.5dTh1H2V lc0BuB4Au8ZTnU17JioYGLeZIPD.2aUB5Lg3Px.sAPC.RQxQzrYvOKk4YQyHIImUM43Q5z1xr2GK 5aLPYTtut5uIFeduGSXUzXWpiz1YSQGmR5q6FSJCV_BgdyUr1JgTdzQS0ilb_b0qNGzJb2j9cnPM l2V8KjKXd95C0ZwZYBS9VfNHQWU9mHk8ly4oUDLMtM2ueBFWpa_AYWSponI_2vU_JfdPOHe48h1x V_PTZAkwc53yrEUizgbZXG69ZKfq_KX2hVho_6.uoPzQfvAD2qsqGOa0L4RMjsz1KCkklCPniPXu aagXoAquTmzwIhc0GX8tHmgCb5qzp.TALy6lsZ0qqGWUv3eYycUdR23rD9ghSI.knmkM1YhFWRwq awnuNgoBJoNxeR84ZtT1dYlVfyMVC_KcJohY9lNulo60aB6hWwG6zTkBfI.uaw4IPPSJxKl9MRt0 R3DKVRCXbKyf8Cij8LSEpxZKj6ZaOPqI4dk.k_gunXOojNDKejSwDY42hZZmqN3kXjcO5dSmljRG tyoKc6yfuBByr7y1F42ju.OtrTT6JTXr4M8haz6lFyluY62zrr_Lx.CRrbmsb8EDqjYe2XNMft1g m3QntwndazmROZUxX1TRJQ4iA_k3rYVg6isLPx.Mcw3A8ZWggCiCo9JUtCQOLrfTt01kuv.uPuUP uLkeQMGmLdE28jso7.wuRdq5CRQAd8dCE8qDLeSHJlswpsYHxGg9RkXvdjRCh8VC4Tzijsuus2gu w4fKpXwS6yp2pHOZSlAY7BtaWSZz86.7WfZifH3C_GgcrSSKh6aoRkXN2dX76QmxwG.zhZQ-- X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic309.consmr.mail.ne1.yahoo.com with HTTP; Tue, 9 Mar 2021 15:02:53 +0000 Received: by smtp412.mail.ne1.yahoo.com (VZM Hermes SMTP Server) with ESMTPA ID 0b0b60e1a865012f293c98f03ce575b1; Tue, 09 Mar 2021 15:02:48 +0000 (UTC) From: Casey Schaufler To: casey.schaufler@intel.com, jmorris@namei.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org Subject: [PATCH v25 18/25] LSM: security_secid_to_secctx in netlink netfilter Date: Tue, 9 Mar 2021 06:42:36 -0800 Message-Id: <20210309144243.12519-19-casey@schaufler-ca.com> In-Reply-To: <20210309144243.12519-1-casey@schaufler-ca.com> References: <20210309144243.12519-1-casey@schaufler-ca.com> MIME-Version: 1.0 X-Mimecast-Impersonation-Protect: Policy=CLT - Impersonation Protection Definition; Similar Internal Domain=false; Similar Monitored External Domain=false; Custom External Domain=false; Mimecast External Domain=false; Newly Observed Domain=false; Internal User Name=false; Custom Display Name List=false; Reply-to Address Mismatch=false; Targeted Threat Dictionary=false; Mimecast Threat Dictionary=false; Custom Threat Dictionary=false X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-loop: linux-audit@redhat.com Cc: john.johansen@canonical.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com, netfilter-devel@vger.kernel.org, sds@tycho.nsa.gov, Pablo Neira Ayuso X-BeenThere: linux-audit@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Linux Audit Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=linux-audit-bounces@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Change netlink netfilter interfaces to use lsmcontext pointers, and remove scaffolding. Reviewed-by: Kees Cook Reviewed-by: John Johansen Acked-by: Stephen Smalley Acked-by: Pablo Neira Ayuso Signed-off-by: Casey Schaufler Cc: netdev@vger.kernel.org Cc: netfilter-devel@vger.kernel.org --- net/netfilter/nfnetlink_queue.c | 37 +++++++++++++-------------------- 1 file changed, 14 insertions(+), 23 deletions(-) diff --git a/net/netfilter/nfnetlink_queue.c b/net/netfilter/nfnetlink_queue.c index 449c2c7c7b27..56784592c820 100644 --- a/net/netfilter/nfnetlink_queue.c +++ b/net/netfilter/nfnetlink_queue.c @@ -301,15 +301,13 @@ static int nfqnl_put_sk_uidgid(struct sk_buff *skb, struct sock *sk) return -1; } -static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) +static void nfqnl_get_sk_secctx(struct sk_buff *skb, struct lsmcontext *context) { - u32 seclen = 0; #if IS_ENABLED(CONFIG_NETWORK_SECMARK) struct lsmblob blob; - struct lsmcontext context = { }; if (!skb || !sk_fullsock(skb->sk)) - return 0; + return; read_lock_bh(&skb->sk->sk_callback_lock); @@ -318,14 +316,12 @@ static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) * blob. security_secid_to_secctx() will know which security * module to use to create the secctx. */ lsmblob_init(&blob, skb->secmark); - security_secid_to_secctx(&blob, &context); - *secdata = context.context; + security_secid_to_secctx(&blob, context); } read_unlock_bh(&skb->sk->sk_callback_lock); - seclen = context.len; #endif - return seclen; + return; } static u32 nfqnl_get_bridge_size(struct nf_queue_entry *entry) @@ -398,12 +394,10 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue, struct net_device *indev; struct net_device *outdev; struct nf_conn *ct = NULL; + struct lsmcontext context = { }; enum ip_conntrack_info ctinfo; struct nfnl_ct_hook *nfnl_ct; bool csum_verify; - struct lsmcontext scaff; /* scaffolding */ - char *secdata = NULL; - u32 seclen = 0; size = nlmsg_total_size(sizeof(struct nfgenmsg)) + nla_total_size(sizeof(struct nfqnl_msg_packet_hdr)) @@ -471,9 +465,9 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue, } if ((queue->flags & NFQA_CFG_F_SECCTX) && entskb->sk) { - seclen = nfqnl_get_sk_secctx(entskb, &secdata); - if (seclen) - size += nla_total_size(seclen); + nfqnl_get_sk_secctx(entskb, &context); + if (context.len) + size += nla_total_size(context.len); } skb = alloc_skb(size, GFP_ATOMIC); @@ -606,7 +600,8 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue, nfqnl_put_sk_uidgid(skb, entskb->sk) < 0) goto nla_put_failure; - if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) + if (context.len && + nla_put(skb, NFQA_SECCTX, context.len, context.context)) goto nla_put_failure; if (ct && nfnl_ct->build(skb, ct, ctinfo, NFQA_CT, NFQA_CT_INFO) < 0) @@ -634,10 +629,8 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue, } nlh->nlmsg_len = skb->len; - if (seclen) { - lsmcontext_init(&scaff, secdata, seclen, 0); - security_release_secctx(&scaff); - } + if (context.len) + security_release_secctx(&context); return skb; nla_put_failure: @@ -645,10 +638,8 @@ nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue, kfree_skb(skb); net_err_ratelimited("nf_queue: error creating packet message\n"); nlmsg_failure: - if (seclen) { - lsmcontext_init(&scaff, secdata, seclen, 0); - security_release_secctx(&scaff); - } + if (context.len) + security_release_secctx(&context); return NULL; } -- 2.29.2 -- Linux-audit mailing list Linux-audit@redhat.com https://listman.redhat.com/mailman/listinfo/linux-audit