Re: [PATCH 2/2 v6] selinux: extended permissions for ioctls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jun 12, 2015 at 9:02 AM, Jeff Vander Stoep <jeffv@xxxxxxxxxx> wrote:
> Add extended permissions logic to selinux. Extended permissions
> provides additional permissions in 256 bit increments. Extend the
> generic ioctl permission check to use the extended permissions for
> per-command filtering. Source/target/class sets including the ioctl
> permission may additionally include a set of commands. Example:
>
> allowxperm <source> <target>:<class> ioctl unpriv_app_socket_cmds
> auditallowxperm <source> <target>:<class> ioctl priv_gpu_cmds
>
> Where unpriv_app_socket_cmds and priv_gpu_cmds are macros
> representing commonly granted sets of ioctl commands.
>
> When ioctl commands are omitted only the permissions are checked.
> This feature is intended to provide finer granularity for the ioctl
> permission that may be too imprecise. For example, the same driver
> may use ioctls to provide important and benign functionality such as
> driver version or socket type as well as dangerous capabilities such
> as debugging features, read/write/execute to physical memory or
> access to sensitive data. Per-command filtering provides a mechanism
> to reduce the attack surface of the kernel, and limit applications
> to the subset of commands required.
>
> The format of the policy binary has been modified to include ioctl
> commands, and the policy version number has been incremented to
> POLICYDB_VERSION_XPERMS_IOCTL=30 to account for the format
> change.
>
> The extended permissions logic is deliberately generic to allow
> components to be reused e.g. netlink filters
>
> Bug: 19416735
> Change-Id: Ibd462f12ba5748cf5dd91f28e5795764363121a2
> Signed-off-by: Jeff Vander Stoep <jeffv@xxxxxxxxxx>

Acked-by: Nick Kralevich <nnk@xxxxxxxxxx>

> ---
> v6 adds ommitted function comment header entries for avc_update_node
>
>  security/selinux/avc.c              | 415 ++++++++++++++++++++++++++++++++++--
>  security/selinux/hooks.c            |  42 +++-
>  security/selinux/include/avc.h      |   6 +
>  security/selinux/include/security.h |  32 ++-
>  security/selinux/ss/avtab.c         | 104 +++++++--
>  security/selinux/ss/avtab.h         |  33 ++-
>  security/selinux/ss/conditional.c   |  32 ++-
>  security/selinux/ss/conditional.h   |   6 +-
>  security/selinux/ss/policydb.c      |   5 +
>  security/selinux/ss/services.c      | 213 ++++++++++++++++--
>  security/selinux/ss/services.h      |   6 +
>  11 files changed, 834 insertions(+), 60 deletions(-)
>
> diff --git a/security/selinux/avc.c b/security/selinux/avc.c
> index 3c17dda..2d5e1b0 100644
> --- a/security/selinux/avc.c
> +++ b/security/selinux/avc.c
> @@ -22,6 +22,7 @@
>  #include <linux/init.h>
>  #include <linux/skbuff.h>
>  #include <linux/percpu.h>
> +#include <linux/list.h>
>  #include <net/sock.h>
>  #include <linux/un.h>
>  #include <net/af_unix.h>
> @@ -48,6 +49,7 @@ struct avc_entry {
>         u32                     tsid;
>         u16                     tclass;
>         struct av_decision      avd;
> +       struct avc_xperms_node  *xp_node;
>  };
>
>  struct avc_node {
> @@ -56,6 +58,16 @@ struct avc_node {
>         struct rcu_head         rhead;
>  };
>
> +struct avc_xperms_decision_node {
> +       struct extended_perms_decision xpd;
> +       struct list_head xpd_list; /* list of extended_perms_decision */
> +};
> +
> +struct avc_xperms_node {
> +       struct extended_perms xp;
> +       struct list_head xpd_head; /* list head of extended_perms_decision */
> +};
> +
>  struct avc_cache {
>         struct hlist_head       slots[AVC_CACHE_SLOTS]; /* head for avc_node->list */
>         spinlock_t              slots_lock[AVC_CACHE_SLOTS]; /* lock for writes */
> @@ -80,6 +92,9 @@ DEFINE_PER_CPU(struct avc_cache_stats, avc_cache_stats) = { 0 };
>  static struct avc_cache avc_cache;
>  static struct avc_callback_node *avc_callbacks;
>  static struct kmem_cache *avc_node_cachep;
> +static struct kmem_cache *avc_xperms_data_cachep;
> +static struct kmem_cache *avc_xperms_decision_cachep;
> +static struct kmem_cache *avc_xperms_cachep;
>
>  static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass)
>  {
> @@ -170,7 +185,17 @@ void __init avc_init(void)
>         atomic_set(&avc_cache.lru_hint, 0);
>
>         avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
> -                                            0, SLAB_PANIC, NULL);
> +                                       0, SLAB_PANIC, NULL);
> +       avc_xperms_cachep = kmem_cache_create("avc_xperms_node",
> +                                       sizeof(struct avc_xperms_node),
> +                                       0, SLAB_PANIC, NULL);
> +       avc_xperms_decision_cachep = kmem_cache_create(
> +                                       "avc_xperms_decision_node",
> +                                       sizeof(struct avc_xperms_decision_node),
> +                                       0, SLAB_PANIC, NULL);
> +       avc_xperms_data_cachep = kmem_cache_create("avc_xperms_data",
> +                                       sizeof(struct extended_perms_data),
> +                                       0, SLAB_PANIC, NULL);
>
>         audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n");
>  }
> @@ -205,9 +230,261 @@ int avc_get_hash_stats(char *page)
>                          slots_used, AVC_CACHE_SLOTS, max_chain_len);
>  }
>
> +/*
> + * using a linked list for extended_perms_decision lookup because the list is
> + * always small. i.e. less than 5, typically 1
> + */
> +static struct extended_perms_decision *avc_xperms_decision_lookup(u8 driver,
> +                                       struct avc_xperms_node *xp_node)
> +{
> +       struct avc_xperms_decision_node *xpd_node;
> +
> +       list_for_each_entry(xpd_node, &xp_node->xpd_head, xpd_list) {
> +               if (xpd_node->xpd.driver == driver)
> +                       return &xpd_node->xpd;
> +       }
> +       return NULL;
> +}
> +
> +static inline unsigned int
> +avc_xperms_has_perm(struct extended_perms_decision *xpd,
> +                                       u8 perm, u8 which)
> +{
> +       unsigned int rc = 0;
> +
> +       if ((which == XPERMS_ALLOWED) &&
> +                       (xpd->used & XPERMS_ALLOWED))
> +               rc = security_xperm_test(xpd->allowed->p, perm);
> +       else if ((which == XPERMS_AUDITALLOW) &&
> +                       (xpd->used & XPERMS_AUDITALLOW))
> +               rc = security_xperm_test(xpd->auditallow->p, perm);
> +       else if ((which == XPERMS_DONTAUDIT) &&
> +                       (xpd->used & XPERMS_DONTAUDIT))
> +               rc = security_xperm_test(xpd->dontaudit->p, perm);
> +       return rc;
> +}
> +
> +static void avc_xperms_allow_perm(struct avc_xperms_node *xp_node,
> +                               u8 driver, u8 perm)
> +{
> +       struct extended_perms_decision *xpd;
> +       security_xperm_set(xp_node->xp.drivers.p, driver);
> +       xpd = avc_xperms_decision_lookup(driver, xp_node);
> +       if (xpd && xpd->allowed)
> +               security_xperm_set(xpd->allowed->p, perm);
> +}
> +
> +static void avc_xperms_decision_free(struct avc_xperms_decision_node *xpd_node)
> +{
> +       struct extended_perms_decision *xpd;
> +
> +       xpd = &xpd_node->xpd;
> +       if (xpd->allowed)
> +               kmem_cache_free(avc_xperms_data_cachep, xpd->allowed);
> +       if (xpd->auditallow)
> +               kmem_cache_free(avc_xperms_data_cachep, xpd->auditallow);
> +       if (xpd->dontaudit)
> +               kmem_cache_free(avc_xperms_data_cachep, xpd->dontaudit);
> +       kmem_cache_free(avc_xperms_decision_cachep, xpd_node);
> +}
> +
> +static void avc_xperms_free(struct avc_xperms_node *xp_node)
> +{
> +       struct avc_xperms_decision_node *xpd_node, *tmp;
> +
> +       if (!xp_node)
> +               return;
> +
> +       list_for_each_entry_safe(xpd_node, tmp, &xp_node->xpd_head, xpd_list) {
> +               list_del(&xpd_node->xpd_list);
> +               avc_xperms_decision_free(xpd_node);
> +       }
> +       kmem_cache_free(avc_xperms_cachep, xp_node);
> +}
> +
> +static void avc_copy_xperms_decision(struct extended_perms_decision *dest,
> +                                       struct extended_perms_decision *src)
> +{
> +       dest->driver = src->driver;
> +       dest->used = src->used;
> +       if (dest->used & XPERMS_ALLOWED)
> +               memcpy(dest->allowed->p, src->allowed->p,
> +                               sizeof(src->allowed->p));
> +       if (dest->used & XPERMS_AUDITALLOW)
> +               memcpy(dest->auditallow->p, src->auditallow->p,
> +                               sizeof(src->auditallow->p));
> +       if (dest->used & XPERMS_DONTAUDIT)
> +               memcpy(dest->dontaudit->p, src->dontaudit->p,
> +                               sizeof(src->dontaudit->p));
> +}
> +
> +/*
> + * similar to avc_copy_xperms_decision, but only copy decision
> + * information relevant to this perm
> + */
> +static inline void avc_quick_copy_xperms_decision(u8 perm,
> +                       struct extended_perms_decision *dest,
> +                       struct extended_perms_decision *src)
> +{
> +       /*
> +        * compute index of the u32 of the 256 bits (8 u32s) that contain this
> +        * command permission
> +        */
> +       u8 i = perm >> 5;
> +
> +       dest->used = src->used;
> +       if (dest->used & XPERMS_ALLOWED)
> +               dest->allowed->p[i] = src->allowed->p[i];
> +       if (dest->used & XPERMS_AUDITALLOW)
> +               dest->auditallow->p[i] = src->auditallow->p[i];
> +       if (dest->used & XPERMS_DONTAUDIT)
> +               dest->dontaudit->p[i] = src->dontaudit->p[i];
> +}
> +
> +static struct avc_xperms_decision_node
> +               *avc_xperms_decision_alloc(u8 which)
> +{
> +       struct avc_xperms_decision_node *xpd_node;
> +       struct extended_perms_decision *xpd;
> +
> +       xpd_node = kmem_cache_zalloc(avc_xperms_decision_cachep,
> +                               GFP_ATOMIC | __GFP_NOMEMALLOC);
> +       if (!xpd_node)
> +               return NULL;
> +
> +       xpd = &xpd_node->xpd;
> +       if (which & XPERMS_ALLOWED) {
> +               xpd->allowed = kmem_cache_zalloc(avc_xperms_data_cachep,
> +                                               GFP_ATOMIC | __GFP_NOMEMALLOC);
> +               if (!xpd->allowed)
> +                       goto error;
> +       }
> +       if (which & XPERMS_AUDITALLOW) {
> +               xpd->auditallow = kmem_cache_zalloc(avc_xperms_data_cachep,
> +                                               GFP_ATOMIC | __GFP_NOMEMALLOC);
> +               if (!xpd->auditallow)
> +                       goto error;
> +       }
> +       if (which & XPERMS_DONTAUDIT) {
> +               xpd->dontaudit = kmem_cache_zalloc(avc_xperms_data_cachep,
> +                                               GFP_ATOMIC | __GFP_NOMEMALLOC);
> +               if (!xpd->dontaudit)
> +                       goto error;
> +       }
> +       return xpd_node;
> +error:
> +       avc_xperms_decision_free(xpd_node);
> +       return NULL;
> +}
> +
> +static int avc_add_xperms_decision(struct avc_node *node,
> +                       struct extended_perms_decision *src)
> +{
> +       struct avc_xperms_decision_node *dest_xpd;
> +
> +       node->ae.xp_node->xp.len++;
> +       dest_xpd = avc_xperms_decision_alloc(src->used);
> +       if (!dest_xpd)
> +               return -ENOMEM;
> +       avc_copy_xperms_decision(&dest_xpd->xpd, src);
> +       list_add(&dest_xpd->xpd_list, &node->ae.xp_node->xpd_head);
> +       return 0;
> +}
> +
> +static struct avc_xperms_node *avc_xperms_alloc(void)
> +{
> +       struct avc_xperms_node *xp_node;
> +
> +       xp_node = kmem_cache_zalloc(avc_xperms_cachep,
> +                               GFP_ATOMIC|__GFP_NOMEMALLOC);
> +       if (!xp_node)
> +               return xp_node;
> +       INIT_LIST_HEAD(&xp_node->xpd_head);
> +       return xp_node;
> +}
> +
> +static int avc_xperms_populate(struct avc_node *node,
> +                               struct avc_xperms_node *src)
> +{
> +       struct avc_xperms_node *dest;
> +       struct avc_xperms_decision_node *dest_xpd;
> +       struct avc_xperms_decision_node *src_xpd;
> +
> +       if (src->xp.len == 0)
> +               return 0;
> +       dest = avc_xperms_alloc();
> +       if (!dest)
> +               return -ENOMEM;
> +
> +       memcpy(dest->xp.drivers.p, src->xp.drivers.p, sizeof(dest->xp.drivers.p));
> +       dest->xp.len = src->xp.len;
> +
> +       /* for each source xpd allocate a destination xpd and copy */
> +       list_for_each_entry(src_xpd, &src->xpd_head, xpd_list) {
> +               dest_xpd = avc_xperms_decision_alloc(src_xpd->xpd.used);
> +               if (!dest_xpd)
> +                       goto error;
> +               avc_copy_xperms_decision(&dest_xpd->xpd, &src_xpd->xpd);
> +               list_add(&dest_xpd->xpd_list, &dest->xpd_head);
> +       }
> +       node->ae.xp_node = dest;
> +       return 0;
> +error:
> +       avc_xperms_free(dest);
> +       return -ENOMEM;
> +
> +}
> +
> +static inline u32 avc_xperms_audit_required(u32 requested,
> +                                       struct av_decision *avd,
> +                                       struct extended_perms_decision *xpd,
> +                                       u8 perm,
> +                                       int result,
> +                                       u32 *deniedp)
> +{
> +       u32 denied, audited;
> +
> +       denied = requested & ~avd->allowed;
> +       if (unlikely(denied)) {
> +               audited = denied & avd->auditdeny;
> +               if (audited && xpd) {
> +                       if (avc_xperms_has_perm(xpd, perm, XPERMS_DONTAUDIT))
> +                               audited &= ~requested;
> +               }
> +       } else if (result) {
> +               audited = denied = requested;
> +       } else {
> +               audited = requested & avd->auditallow;
> +               if (audited && xpd) {
> +                       if (!avc_xperms_has_perm(xpd, perm, XPERMS_AUDITALLOW))
> +                               audited &= ~requested;
> +               }
> +       }
> +
> +       *deniedp = denied;
> +       return audited;
> +}
> +
> +static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass,
> +                               u32 requested, struct av_decision *avd,
> +                               struct extended_perms_decision *xpd,
> +                               u8 perm, int result,
> +                               struct common_audit_data *ad)
> +{
> +       u32 audited, denied;
> +
> +       audited = avc_xperms_audit_required(
> +                       requested, avd, xpd, perm, result, &denied);
> +       if (likely(!audited))
> +               return 0;
> +       return slow_avc_audit(ssid, tsid, tclass, requested,
> +                       audited, denied, result, ad, 0);
> +}
> +
>  static void avc_node_free(struct rcu_head *rhead)
>  {
>         struct avc_node *node = container_of(rhead, struct avc_node, rhead);
> +       avc_xperms_free(node->ae.xp_node);
>         kmem_cache_free(avc_node_cachep, node);
>         avc_cache_stats_incr(frees);
>  }
> @@ -221,6 +498,7 @@ static void avc_node_delete(struct avc_node *node)
>
>  static void avc_node_kill(struct avc_node *node)
>  {
> +       avc_xperms_free(node->ae.xp_node);
>         kmem_cache_free(avc_node_cachep, node);
>         avc_cache_stats_incr(frees);
>         atomic_dec(&avc_cache.active_nodes);
> @@ -367,6 +645,7 @@ static int avc_latest_notif_update(int seqno, int is_insert)
>   * @tsid: target security identifier
>   * @tclass: target security class
>   * @avd: resulting av decision
> + * @xp_node: resulting extended permissions
>   *
>   * Insert an AVC entry for the SID pair
>   * (@ssid, @tsid) and class @tclass.
> @@ -378,7 +657,9 @@ static int avc_latest_notif_update(int seqno, int is_insert)
>   * the access vectors into a cache entry, returns
>   * avc_node inserted. Otherwise, this function returns NULL.
>   */
> -static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd)
> +static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
> +                               struct av_decision *avd,
> +                               struct avc_xperms_node *xp_node)
>  {
>         struct avc_node *pos, *node = NULL;
>         int hvalue;
> @@ -391,10 +672,15 @@ static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_dec
>         if (node) {
>                 struct hlist_head *head;
>                 spinlock_t *lock;
> +               int rc = 0;
>
>                 hvalue = avc_hash(ssid, tsid, tclass);
>                 avc_node_populate(node, ssid, tsid, tclass, avd);
> -
> +               rc = avc_xperms_populate(node, xp_node);
> +               if (rc) {
> +                       kmem_cache_free(avc_node_cachep, node);
> +                       return NULL;
> +               }
>                 head = &avc_cache.slots[hvalue];
>                 lock = &avc_cache.slots_lock[hvalue];
>
> @@ -523,14 +809,17 @@ out:
>   * @perms : Permission mask bits
>   * @ssid,@tsid,@tclass : identifier of an AVC entry
>   * @seqno : sequence number when decision was made
> + * @xpd: extended_perms_decision to be added to the node
>   *
>   * if a valid AVC entry doesn't exist,this function returns -ENOENT.
>   * if kmalloc() called internal returns NULL, this function returns -ENOMEM.
>   * otherwise, this function updates the AVC entry. The original AVC-entry object
>   * will release later by RCU.
>   */
> -static int avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass,
> -                          u32 seqno)
> +static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid,
> +                       u32 tsid, u16 tclass, u32 seqno,
> +                       struct extended_perms_decision *xpd,
> +                       u32 flags)
>  {
>         int hvalue, rc = 0;
>         unsigned long flag;
> @@ -574,9 +863,19 @@ static int avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass,
>
>         avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
>
> +       if (orig->ae.xp_node) {
> +               rc = avc_xperms_populate(node, orig->ae.xp_node);
> +               if (rc) {
> +                       kmem_cache_free(avc_node_cachep, node);
> +                       goto out_unlock;
> +               }
> +       }
> +
>         switch (event) {
>         case AVC_CALLBACK_GRANT:
>                 node->ae.avd.allowed |= perms;
> +               if (node->ae.xp_node && (flags & AVC_EXTENDED_PERMS))
> +                       avc_xperms_allow_perm(node->ae.xp_node, driver, xperm);
>                 break;
>         case AVC_CALLBACK_TRY_REVOKE:
>         case AVC_CALLBACK_REVOKE:
> @@ -594,6 +893,9 @@ static int avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass,
>         case AVC_CALLBACK_AUDITDENY_DISABLE:
>                 node->ae.avd.auditdeny &= ~perms;
>                 break;
> +       case AVC_CALLBACK_ADD_XPERMS:
> +               avc_add_xperms_decision(node, xpd);
> +               break;
>         }
>         avc_node_replace(node, orig);
>  out_unlock:
> @@ -665,18 +967,20 @@ int avc_ss_reset(u32 seqno)
>   * results in a bigger stack frame.
>   */
>  static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid,
> -                        u16 tclass, struct av_decision *avd)
> +                        u16 tclass, struct av_decision *avd,
> +                        struct avc_xperms_node *xp_node)
>  {
>         rcu_read_unlock();
> -       security_compute_av(ssid, tsid, tclass, avd);
> +       INIT_LIST_HEAD(&xp_node->xpd_head);
> +       security_compute_av(ssid, tsid, tclass, avd, &xp_node->xp);
>         rcu_read_lock();
> -       return avc_insert(ssid, tsid, tclass, avd);
> +       return avc_insert(ssid, tsid, tclass, avd, xp_node);
>  }
>
>  static noinline int avc_denied(u32 ssid, u32 tsid,
> -                        u16 tclass, u32 requested,
> -                        unsigned flags,
> -                        struct av_decision *avd)
> +                               u16 tclass, u32 requested,
> +                               u8 driver, u8 xperm, unsigned flags,
> +                               struct av_decision *avd)
>  {
>         if (flags & AVC_STRICT)
>                 return -EACCES;
> @@ -684,11 +988,91 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
>         if (selinux_enforcing && !(avd->flags & AVD_FLAGS_PERMISSIVE))
>                 return -EACCES;
>
> -       avc_update_node(AVC_CALLBACK_GRANT, requested, ssid,
> -                               tsid, tclass, avd->seqno);
> +       avc_update_node(AVC_CALLBACK_GRANT, requested, driver, xperm, ssid,
> +                               tsid, tclass, avd->seqno, NULL, flags);
>         return 0;
>  }
>
> +/*
> + * The avc extended permissions logic adds an additional 256 bits of
> + * permissions to an avc node when extended permissions for that node are
> + * specified in the avtab. If the additional 256 permissions is not adequate,
> + * as-is the case with ioctls, then multiple may be chained together and the
> + * driver field is used to specify which set contains the permission.
> + */
> +int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
> +                       u8 driver, u8 xperm, struct common_audit_data *ad)
> +{
> +       struct avc_node *node;
> +       struct av_decision avd;
> +       u32 denied;
> +       struct extended_perms_decision local_xpd;
> +       struct extended_perms_decision *xpd = NULL;
> +       struct extended_perms_data allowed;
> +       struct extended_perms_data auditallow;
> +       struct extended_perms_data dontaudit;
> +       struct avc_xperms_node local_xp_node;
> +       struct avc_xperms_node *xp_node;
> +       int rc = 0, rc2;
> +
> +       xp_node = &local_xp_node;
> +       BUG_ON(!requested);
> +
> +       rcu_read_lock();
> +
> +       node = avc_lookup(ssid, tsid, tclass);
> +       if (unlikely(!node)) {
> +               node = avc_compute_av(ssid, tsid, tclass, &avd, xp_node);
> +       } else {
> +               memcpy(&avd, &node->ae.avd, sizeof(avd));
> +               xp_node = node->ae.xp_node;
> +       }
> +       /* if extended permissions are not defined, only consider av_decision */
> +       if (!xp_node || !xp_node->xp.len)
> +               goto decision;
> +
> +       local_xpd.allowed = &allowed;
> +       local_xpd.auditallow = &auditallow;
> +       local_xpd.dontaudit = &dontaudit;
> +
> +       xpd = avc_xperms_decision_lookup(driver, xp_node);
> +       if (unlikely(!xpd)) {
> +               /*
> +                * Compute the extended_perms_decision only if the driver
> +                * is flagged
> +                */
> +               if (!security_xperm_test(xp_node->xp.drivers.p, driver)) {
> +                       avd.allowed &= ~requested;
> +                       goto decision;
> +               }
> +               rcu_read_unlock();
> +               security_compute_xperms_decision(ssid, tsid, tclass, driver,
> +                                               &local_xpd);
> +               rcu_read_lock();
> +               avc_update_node(AVC_CALLBACK_ADD_XPERMS, requested, driver, xperm,
> +                               ssid, tsid, tclass, avd.seqno, &local_xpd, 0);
> +       } else {
> +               avc_quick_copy_xperms_decision(xperm, &local_xpd, xpd);
> +       }
> +       xpd = &local_xpd;
> +
> +       if (!avc_xperms_has_perm(xpd, xperm, XPERMS_ALLOWED))
> +               avd.allowed &= ~requested;
> +
> +decision:
> +       denied = requested & ~(avd.allowed);
> +       if (unlikely(denied))
> +               rc = avc_denied(ssid, tsid, tclass, requested, driver, xperm,
> +                               AVC_EXTENDED_PERMS, &avd);
> +
> +       rcu_read_unlock();
> +
> +       rc2 = avc_xperms_audit(ssid, tsid, tclass, requested,
> +                       &avd, xpd, xperm, rc, ad);
> +       if (rc2)
> +               return rc2;
> +       return rc;
> +}
>
>  /**
>   * avc_has_perm_noaudit - Check permissions but perform no auditing.
> @@ -716,6 +1100,7 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
>                          struct av_decision *avd)
>  {
>         struct avc_node *node;
> +       struct avc_xperms_node xp_node;
>         int rc = 0;
>         u32 denied;
>
> @@ -725,13 +1110,13 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
>
>         node = avc_lookup(ssid, tsid, tclass);
>         if (unlikely(!node))
> -               node = avc_compute_av(ssid, tsid, tclass, avd);
> +               node = avc_compute_av(ssid, tsid, tclass, avd, &xp_node);
>         else
>                 memcpy(avd, &node->ae.avd, sizeof(*avd));
>
>         denied = requested & ~(avd->allowed);
>         if (unlikely(denied))
> -               rc = avc_denied(ssid, tsid, tclass, requested, flags, avd);
> +               rc = avc_denied(ssid, tsid, tclass, requested, 0, 0, flags, avd);
>
>         rcu_read_unlock();
>         return rc;
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 312537d..c67ed08 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -3216,6 +3216,46 @@ static void selinux_file_free_security(struct file *file)
>         file_free_security(file);
>  }
>
> +/*
> + * Check whether a task has the ioctl permission and cmd
> + * operation to an inode.
> + */
> +int ioctl_has_perm(const struct cred *cred, struct file *file,
> +               u32 requested, u16 cmd)
> +{
> +       struct common_audit_data ad;
> +       struct file_security_struct *fsec = file->f_security;
> +       struct inode *inode = file_inode(file);
> +       struct inode_security_struct *isec = inode->i_security;
> +       struct lsm_ioctlop_audit ioctl;
> +       u32 ssid = cred_sid(cred);
> +       int rc;
> +       u8 driver = cmd >> 8;
> +       u8 xperm = cmd & 0xff;
> +
> +       ad.type = LSM_AUDIT_DATA_IOCTL_OP;
> +       ad.u.op = &ioctl;
> +       ad.u.op->cmd = cmd;
> +       ad.u.op->path = file->f_path;
> +
> +       if (ssid != fsec->sid) {
> +               rc = avc_has_perm(ssid, fsec->sid,
> +                               SECCLASS_FD,
> +                               FD__USE,
> +                               &ad);
> +               if (rc)
> +                       goto out;
> +       }
> +
> +       if (unlikely(IS_PRIVATE(inode)))
> +               return 0;
> +
> +       rc = avc_has_extended_perms(ssid, isec->sid, isec->sclass,
> +                       requested, driver, xperm, &ad);
> +out:
> +       return rc;
> +}
> +
>  static int selinux_file_ioctl(struct file *file, unsigned int cmd,
>                               unsigned long arg)
>  {
> @@ -3258,7 +3298,7 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
>          * to the file's ioctl() function.
>          */
>         default:
> -               error = file_has_perm(cred, file, FILE__IOCTL);
> +               error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd);
>         }
>         return error;
>  }
> diff --git a/security/selinux/include/avc.h b/security/selinux/include/avc.h
> index ddf8eec..db12ff1 100644
> --- a/security/selinux/include/avc.h
> +++ b/security/selinux/include/avc.h
> @@ -142,6 +142,7 @@ static inline int avc_audit(u32 ssid, u32 tsid,
>  }
>
>  #define AVC_STRICT 1 /* Ignore permissive mode. */
> +#define AVC_EXTENDED_PERMS 2   /* update extended permissions */
>  int avc_has_perm_noaudit(u32 ssid, u32 tsid,
>                          u16 tclass, u32 requested,
>                          unsigned flags,
> @@ -151,6 +152,10 @@ int avc_has_perm(u32 ssid, u32 tsid,
>                  u16 tclass, u32 requested,
>                  struct common_audit_data *auditdata);
>
> +int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
> +               u8 driver, u8 perm, struct common_audit_data *ad);
> +
> +
>  u32 avc_policy_seqno(void);
>
>  #define AVC_CALLBACK_GRANT             1
> @@ -161,6 +166,7 @@ u32 avc_policy_seqno(void);
>  #define AVC_CALLBACK_AUDITALLOW_DISABLE        32
>  #define AVC_CALLBACK_AUDITDENY_ENABLE  64
>  #define AVC_CALLBACK_AUDITDENY_DISABLE 128
> +#define AVC_CALLBACK_ADD_XPERMS                256
>
>  int avc_add_callback(int (*callback)(u32 event), u32 events);
>
> diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h
> index 36993ad..6a681d2 100644
> --- a/security/selinux/include/security.h
> +++ b/security/selinux/include/security.h
> @@ -35,13 +35,14 @@
>  #define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS   27
>  #define POLICYDB_VERSION_DEFAULT_TYPE  28
>  #define POLICYDB_VERSION_CONSTRAINT_NAMES      29
> +#define POLICYDB_VERSION_XPERMS_IOCTL  30
>
>  /* Range of policy versions we understand*/
>  #define POLICYDB_VERSION_MIN   POLICYDB_VERSION_BASE
>  #ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
>  #define POLICYDB_VERSION_MAX   CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
>  #else
> -#define POLICYDB_VERSION_MAX   POLICYDB_VERSION_CONSTRAINT_NAMES
> +#define POLICYDB_VERSION_MAX   POLICYDB_VERSION_XPERMS_IOCTL
>  #endif
>
>  /* Mask for just the mount related flags */
> @@ -109,11 +110,38 @@ struct av_decision {
>         u32 flags;
>  };
>
> +#define XPERMS_ALLOWED 1
> +#define XPERMS_AUDITALLOW 2
> +#define XPERMS_DONTAUDIT 4
> +
> +#define security_xperm_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f))
> +#define security_xperm_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f)))
> +struct extended_perms_data {
> +       u32 p[8];
> +};
> +
> +struct extended_perms_decision {
> +       u8 used;
> +       u8 driver;
> +       struct extended_perms_data *allowed;
> +       struct extended_perms_data *auditallow;
> +       struct extended_perms_data *dontaudit;
> +};
> +
> +struct extended_perms {
> +       u16 len;        /* length associated decision chain */
> +       struct extended_perms_data drivers; /* flag drivers that are used */
> +};
> +
>  /* definitions of av_decision.flags */
>  #define AVD_FLAGS_PERMISSIVE   0x0001
>
>  void security_compute_av(u32 ssid, u32 tsid,
> -                        u16 tclass, struct av_decision *avd);
> +                        u16 tclass, struct av_decision *avd,
> +                        struct extended_perms *xperms);
> +
> +void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass,
> +                        u8 driver, struct extended_perms_decision *xpermd);
>
>  void security_compute_av_user(u32 ssid, u32 tsid,
>                              u16 tclass, struct av_decision *avd);
> diff --git a/security/selinux/ss/avtab.c b/security/selinux/ss/avtab.c
> index b64f277..3628d3a 100644
> --- a/security/selinux/ss/avtab.c
> +++ b/security/selinux/ss/avtab.c
> @@ -24,6 +24,7 @@
>  #include "policydb.h"
>
>  static struct kmem_cache *avtab_node_cachep;
> +static struct kmem_cache *avtab_xperms_cachep;
>
>  /* Based on MurmurHash3, written by Austin Appleby and placed in the
>   * public domain.
> @@ -70,11 +71,24 @@ avtab_insert_node(struct avtab *h, int hvalue,
>                   struct avtab_key *key, struct avtab_datum *datum)
>  {
>         struct avtab_node *newnode;
> +       struct avtab_extended_perms *xperms;
>         newnode = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL);
>         if (newnode == NULL)
>                 return NULL;
>         newnode->key = *key;
> -       newnode->datum = *datum;
> +
> +       if (key->specified & AVTAB_XPERMS) {
> +               xperms = kmem_cache_zalloc(avtab_xperms_cachep, GFP_KERNEL);
> +               if (xperms == NULL) {
> +                       kmem_cache_free(avtab_node_cachep, newnode);
> +                       return NULL;
> +               }
> +               *xperms = *(datum->u.xperms);
> +               newnode->datum.u.xperms = xperms;
> +       } else {
> +               newnode->datum.u.data = datum->u.data;
> +       }
> +
>         if (prev) {
>                 newnode->next = prev->next;
>                 prev->next = newnode;
> @@ -107,8 +121,12 @@ static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_dat
>                 if (key->source_type == cur->key.source_type &&
>                     key->target_type == cur->key.target_type &&
>                     key->target_class == cur->key.target_class &&
> -                   (specified & cur->key.specified))
> +                   (specified & cur->key.specified)) {
> +                       /* extended perms may not be unique */
> +                       if (specified & AVTAB_XPERMS)
> +                               break;
>                         return -EEXIST;
> +               }
>                 if (key->source_type < cur->key.source_type)
>                         break;
>                 if (key->source_type == cur->key.source_type &&
> @@ -271,6 +289,9 @@ void avtab_destroy(struct avtab *h)
>                 while (cur) {
>                         temp = cur;
>                         cur = cur->next;
> +                       if (temp->key.specified & AVTAB_XPERMS)
> +                               kmem_cache_free(avtab_xperms_cachep,
> +                                               temp->datum.u.xperms);
>                         kmem_cache_free(avtab_node_cachep, temp);
>                 }
>         }
> @@ -359,7 +380,10 @@ static uint16_t spec_order[] = {
>         AVTAB_AUDITALLOW,
>         AVTAB_TRANSITION,
>         AVTAB_CHANGE,
> -       AVTAB_MEMBER
> +       AVTAB_MEMBER,
> +       AVTAB_XPERMS_ALLOWED,
> +       AVTAB_XPERMS_AUDITALLOW,
> +       AVTAB_XPERMS_DONTAUDIT
>  };
>
>  int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
> @@ -369,10 +393,11 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
>  {
>         __le16 buf16[4];
>         u16 enabled;
> -       __le32 buf32[7];
>         u32 items, items2, val, vers = pol->policyvers;
>         struct avtab_key key;
>         struct avtab_datum datum;
> +       struct avtab_extended_perms xperms;
> +       __le32 buf32[ARRAY_SIZE(xperms.perms.p)];
>         int i, rc;
>         unsigned set;
>
> @@ -429,11 +454,15 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
>                         printk(KERN_ERR "SELinux: avtab: entry has both access vectors and types\n");
>                         return -EINVAL;
>                 }
> +               if (val & AVTAB_XPERMS) {
> +                       printk(KERN_ERR "SELinux: avtab: entry has extended permissions\n");
> +                       return -EINVAL;
> +               }
>
>                 for (i = 0; i < ARRAY_SIZE(spec_order); i++) {
>                         if (val & spec_order[i]) {
>                                 key.specified = spec_order[i] | enabled;
> -                               datum.data = le32_to_cpu(buf32[items++]);
> +                               datum.u.data = le32_to_cpu(buf32[items++]);
>                                 rc = insertf(a, &key, &datum, p);
>                                 if (rc)
>                                         return rc;
> @@ -476,14 +505,42 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
>                 return -EINVAL;
>         }
>
> -       rc = next_entry(buf32, fp, sizeof(u32));
> -       if (rc) {
> -               printk(KERN_ERR "SELinux: avtab: truncated entry\n");
> -               return rc;
> +       if ((vers < POLICYDB_VERSION_XPERMS_IOCTL) &&
> +                       (key.specified & AVTAB_XPERMS)) {
> +               printk(KERN_ERR "SELinux:  avtab:  policy version %u does not "
> +                               "support extended permissions rules and one "
> +                               "was specified\n", vers);
> +               return -EINVAL;
> +       } else if (key.specified & AVTAB_XPERMS) {
> +               memset(&xperms, 0, sizeof(struct avtab_extended_perms));
> +               rc = next_entry(&xperms.specified, fp, sizeof(u8));
> +               if (rc) {
> +                       printk(KERN_ERR "SELinux: avtab: truncated entry\n");
> +                       return rc;
> +               }
> +               rc = next_entry(&xperms.driver, fp, sizeof(u8));
> +               if (rc) {
> +                       printk(KERN_ERR "SELinux: avtab: truncated entry\n");
> +                       return rc;
> +               }
> +               rc = next_entry(buf32, fp, sizeof(u32)*ARRAY_SIZE(xperms.perms.p));
> +               if (rc) {
> +                       printk(KERN_ERR "SELinux: avtab: truncated entry\n");
> +                       return rc;
> +               }
> +               for (i = 0; i < ARRAY_SIZE(xperms.perms.p); i++)
> +                       xperms.perms.p[i] = le32_to_cpu(buf32[i]);
> +               datum.u.xperms = &xperms;
> +       } else {
> +               rc = next_entry(buf32, fp, sizeof(u32));
> +               if (rc) {
> +                       printk(KERN_ERR "SELinux: avtab: truncated entry\n");
> +                       return rc;
> +               }
> +               datum.u.data = le32_to_cpu(*buf32);
>         }
> -       datum.data = le32_to_cpu(*buf32);
>         if ((key.specified & AVTAB_TYPE) &&
> -           !policydb_type_isvalid(pol, datum.data)) {
> +           !policydb_type_isvalid(pol, datum.u.data)) {
>                 printk(KERN_ERR "SELinux: avtab: invalid type\n");
>                 return -EINVAL;
>         }
> @@ -543,8 +600,9 @@ bad:
>  int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
>  {
>         __le16 buf16[4];
> -       __le32 buf32[1];
> +       __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)];
>         int rc;
> +       unsigned int i;
>
>         buf16[0] = cpu_to_le16(cur->key.source_type);
>         buf16[1] = cpu_to_le16(cur->key.target_type);
> @@ -553,8 +611,22 @@ int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
>         rc = put_entry(buf16, sizeof(u16), 4, fp);
>         if (rc)
>                 return rc;
> -       buf32[0] = cpu_to_le32(cur->datum.data);
> -       rc = put_entry(buf32, sizeof(u32), 1, fp);
> +
> +       if (cur->key.specified & AVTAB_XPERMS) {
> +               rc = put_entry(&cur->datum.u.xperms->specified, sizeof(u8), 1, fp);
> +               if (rc)
> +                       return rc;
> +               rc = put_entry(&cur->datum.u.xperms->driver, sizeof(u8), 1, fp);
> +               if (rc)
> +                       return rc;
> +               for (i = 0; i < ARRAY_SIZE(cur->datum.u.xperms->perms.p); i++)
> +                       buf32[i] = cpu_to_le32(cur->datum.u.xperms->perms.p[i]);
> +               rc = put_entry(buf32, sizeof(u32),
> +                               ARRAY_SIZE(cur->datum.u.xperms->perms.p), fp);
> +       } else {
> +               buf32[0] = cpu_to_le32(cur->datum.u.data);
> +               rc = put_entry(buf32, sizeof(u32), 1, fp);
> +       }
>         if (rc)
>                 return rc;
>         return 0;
> @@ -588,9 +660,13 @@ void avtab_cache_init(void)
>         avtab_node_cachep = kmem_cache_create("avtab_node",
>                                               sizeof(struct avtab_node),
>                                               0, SLAB_PANIC, NULL);
> +       avtab_xperms_cachep = kmem_cache_create("avtab_extended_perms",
> +                                               sizeof(struct avtab_extended_perms),
> +                                               0, SLAB_PANIC, NULL);
>  }
>
>  void avtab_cache_destroy(void)
>  {
>         kmem_cache_destroy(avtab_node_cachep);
> +       kmem_cache_destroy(avtab_xperms_cachep);
>  }
> diff --git a/security/selinux/ss/avtab.h b/security/selinux/ss/avtab.h
> index adb451c..d946c9d 100644
> --- a/security/selinux/ss/avtab.h
> +++ b/security/selinux/ss/avtab.h
> @@ -23,6 +23,7 @@
>  #ifndef _SS_AVTAB_H_
>  #define _SS_AVTAB_H_
>
> +#include "security.h"
>  #include <linux/flex_array.h>
>
>  struct avtab_key {
> @@ -37,13 +38,43 @@ struct avtab_key {
>  #define AVTAB_MEMBER           0x0020
>  #define AVTAB_CHANGE           0x0040
>  #define AVTAB_TYPE             (AVTAB_TRANSITION | AVTAB_MEMBER | AVTAB_CHANGE)
> +/* extended permissions */
> +#define AVTAB_XPERMS_ALLOWED   0x0100
> +#define AVTAB_XPERMS_AUDITALLOW        0x0200
> +#define AVTAB_XPERMS_DONTAUDIT 0x0400
> +#define AVTAB_XPERMS           (AVTAB_XPERMS_ALLOWED | \
> +                               AVTAB_XPERMS_AUDITALLOW | \
> +                               AVTAB_XPERMS_DONTAUDIT)
>  #define AVTAB_ENABLED_OLD   0x80000000 /* reserved for used in cond_avtab */
>  #define AVTAB_ENABLED          0x8000 /* reserved for used in cond_avtab */
>         u16 specified;  /* what field is specified */
>  };
>
> +/*
> + * For operations that require more than the 32 permissions provided by the avc
> + * extended permissions may be used to provide 256 bits of permissions.
> + */
> +struct avtab_extended_perms {
> +/* These are not flags. All 256 values may be used */
> +#define AVTAB_XPERMS_IOCTLFUNCTION     0x01
> +#define AVTAB_XPERMS_IOCTLDRIVER       0x02
> +       /* extension of the avtab_key specified */
> +       u8 specified; /* ioctl, netfilter, ... */
> +       /*
> +        * if 256 bits is not adequate as is often the case with ioctls, then
> +        * multiple extended perms may be used and the driver field
> +        * specifies which permissions are included.
> +        */
> +       u8 driver;
> +       /* 256 bits of permissions */
> +       struct extended_perms_data perms;
> +};
> +
>  struct avtab_datum {
> -       u32 data; /* access vector or type value */
> +       union {
> +               u32 data; /* access vector or type value */
> +               struct avtab_extended_perms *xperms;
> +       } u;
>  };
>
>  struct avtab_node {
> diff --git a/security/selinux/ss/conditional.c b/security/selinux/ss/conditional.c
> index 62c6773..18643bf 100644
> --- a/security/selinux/ss/conditional.c
> +++ b/security/selinux/ss/conditional.c
> @@ -15,6 +15,7 @@
>
>  #include "security.h"
>  #include "conditional.h"
> +#include "services.h"
>
>  /*
>   * cond_evaluate_expr evaluates a conditional expr
> @@ -612,21 +613,39 @@ int cond_write_list(struct policydb *p, struct cond_node *list, void *fp)
>
>         return 0;
>  }
> +
> +void cond_compute_xperms(struct avtab *ctab, struct avtab_key *key,
> +               struct extended_perms_decision *xpermd)
> +{
> +       struct avtab_node *node;
> +
> +       if (!ctab || !key || !xpermd)
> +               return;
> +
> +       for (node = avtab_search_node(ctab, key); node;
> +                       node = avtab_search_node_next(node, key->specified)) {
> +               if (node->key.specified & AVTAB_ENABLED)
> +                       services_compute_xperms_decision(xpermd, node);
> +       }
> +       return;
> +
> +}
>  /* Determine whether additional permissions are granted by the conditional
>   * av table, and if so, add them to the result
>   */
> -void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd)
> +void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
> +               struct av_decision *avd, struct extended_perms *xperms)
>  {
>         struct avtab_node *node;
>
> -       if (!ctab || !key || !avd)
> +       if (!ctab || !key || !avd || !xperms)
>                 return;
>
>         for (node = avtab_search_node(ctab, key); node;
>                                 node = avtab_search_node_next(node, key->specified)) {
>                 if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) ==
>                     (node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED)))
> -                       avd->allowed |= node->datum.data;
> +                       avd->allowed |= node->datum.u.data;
>                 if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) ==
>                     (node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED)))
>                         /* Since a '0' in an auditdeny mask represents a
> @@ -634,10 +653,13 @@ void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decisi
>                          * the '&' operand to ensure that all '0's in the mask
>                          * are retained (much unlike the allow and auditallow cases).
>                          */
> -                       avd->auditdeny &= node->datum.data;
> +                       avd->auditdeny &= node->datum.u.data;
>                 if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) ==
>                     (node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED)))
> -                       avd->auditallow |= node->datum.data;
> +                       avd->auditallow |= node->datum.u.data;
> +               if ((node->key.specified & AVTAB_ENABLED) &&
> +                               (node->key.specified & AVTAB_XPERMS))
> +                       services_compute_xperms_drivers(xperms, node);
>         }
>         return;
>  }
> diff --git a/security/selinux/ss/conditional.h b/security/selinux/ss/conditional.h
> index 4d1f874..ddb43e7 100644
> --- a/security/selinux/ss/conditional.h
> +++ b/security/selinux/ss/conditional.h
> @@ -73,8 +73,10 @@ int cond_read_list(struct policydb *p, void *fp);
>  int cond_write_bool(void *key, void *datum, void *ptr);
>  int cond_write_list(struct policydb *p, struct cond_node *list, void *fp);
>
> -void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd);
> -
> +void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
> +               struct av_decision *avd, struct extended_perms *xperms);
> +void cond_compute_xperms(struct avtab *ctab, struct avtab_key *key,
> +               struct extended_perms_decision *xpermd);
>  int evaluate_cond_node(struct policydb *p, struct cond_node *node);
>
>  #endif /* _CONDITIONAL_H_ */
> diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
> index 74aa224..992a315 100644
> --- a/security/selinux/ss/policydb.c
> +++ b/security/selinux/ss/policydb.c
> @@ -148,6 +148,11 @@ static struct policydb_compat_info policydb_compat[] = {
>                 .sym_num        = SYM_NUM,
>                 .ocon_num       = OCON_NUM,
>         },
> +       {
> +               .version        = POLICYDB_VERSION_XPERMS_IOCTL,
> +               .sym_num        = SYM_NUM,
> +               .ocon_num       = OCON_NUM,
> +       },
>  };
>
>  static struct policydb_compat_info *policydb_lookup_compat(int version)
> diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
> index 9e2d820..b7df12b 100644
> --- a/security/selinux/ss/services.c
> +++ b/security/selinux/ss/services.c
> @@ -93,9 +93,10 @@ static int context_struct_to_string(struct context *context, char **scontext,
>                                     u32 *scontext_len);
>
>  static void context_struct_compute_av(struct context *scontext,
> -                                     struct context *tcontext,
> -                                     u16 tclass,
> -                                     struct av_decision *avd);
> +                                       struct context *tcontext,
> +                                       u16 tclass,
> +                                       struct av_decision *avd,
> +                                       struct extended_perms *xperms);
>
>  struct selinux_mapping {
>         u16 value; /* policy value */
> @@ -565,7 +566,8 @@ static void type_attribute_bounds_av(struct context *scontext,
>                 context_struct_compute_av(&lo_scontext,
>                                           tcontext,
>                                           tclass,
> -                                         &lo_avd);
> +                                         &lo_avd,
> +                                         NULL);
>                 if ((lo_avd.allowed & avd->allowed) == avd->allowed)
>                         return;         /* no masked permission */
>                 masked = ~lo_avd.allowed & avd->allowed;
> @@ -580,7 +582,8 @@ static void type_attribute_bounds_av(struct context *scontext,
>                 context_struct_compute_av(scontext,
>                                           &lo_tcontext,
>                                           tclass,
> -                                         &lo_avd);
> +                                         &lo_avd,
> +                                         NULL);
>                 if ((lo_avd.allowed & avd->allowed) == avd->allowed)
>                         return;         /* no masked permission */
>                 masked = ~lo_avd.allowed & avd->allowed;
> @@ -596,7 +599,8 @@ static void type_attribute_bounds_av(struct context *scontext,
>                 context_struct_compute_av(&lo_scontext,
>                                           &lo_tcontext,
>                                           tclass,
> -                                         &lo_avd);
> +                                         &lo_avd,
> +                                         NULL);
>                 if ((lo_avd.allowed & avd->allowed) == avd->allowed)
>                         return;         /* no masked permission */
>                 masked = ~lo_avd.allowed & avd->allowed;
> @@ -613,13 +617,39 @@ static void type_attribute_bounds_av(struct context *scontext,
>  }
>
>  /*
> - * Compute access vectors based on a context structure pair for
> - * the permissions in a particular class.
> + * flag which drivers have permissions
> + * only looking for ioctl based extended permssions
> + */
> +void services_compute_xperms_drivers(
> +               struct extended_perms *xperms,
> +               struct avtab_node *node)
> +{
> +       unsigned int i;
> +
> +       if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) {
> +               /* if one or more driver has all permissions allowed */
> +               for (i = 0; i < ARRAY_SIZE(xperms->drivers.p); i++)
> +                       xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i];
> +       } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) {
> +               /* if allowing permissions within a driver */
> +               security_xperm_set(xperms->drivers.p,
> +                                       node->datum.u.xperms->driver);
> +       }
> +
> +       /* If no ioctl commands are allowed, ignore auditallow and auditdeny */
> +       if (node->key.specified & AVTAB_XPERMS_ALLOWED)
> +               xperms->len = 1;
> +}
> +
> +/*
> + * Compute access vectors and extended permissions based on a context
> + * structure pair for the permissions in a particular class.
>   */
>  static void context_struct_compute_av(struct context *scontext,
> -                                     struct context *tcontext,
> -                                     u16 tclass,
> -                                     struct av_decision *avd)
> +                                       struct context *tcontext,
> +                                       u16 tclass,
> +                                       struct av_decision *avd,
> +                                       struct extended_perms *xperms)
>  {
>         struct constraint_node *constraint;
>         struct role_allow *ra;
> @@ -633,6 +663,10 @@ static void context_struct_compute_av(struct context *scontext,
>         avd->allowed = 0;
>         avd->auditallow = 0;
>         avd->auditdeny = 0xffffffff;
> +       if (xperms) {
> +               memset(&xperms->drivers, 0, sizeof(xperms->drivers));
> +               xperms->len = 0;
> +       }
>
>         if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
>                 if (printk_ratelimit())
> @@ -647,7 +681,7 @@ static void context_struct_compute_av(struct context *scontext,
>          * this permission check, then use it.
>          */
>         avkey.target_class = tclass;
> -       avkey.specified = AVTAB_AV;
> +       avkey.specified = AVTAB_AV | AVTAB_XPERMS;
>         sattr = flex_array_get(policydb.type_attr_map_array, scontext->type - 1);
>         BUG_ON(!sattr);
>         tattr = flex_array_get(policydb.type_attr_map_array, tcontext->type - 1);
> @@ -660,15 +694,18 @@ static void context_struct_compute_av(struct context *scontext,
>                              node;
>                              node = avtab_search_node_next(node, avkey.specified)) {
>                                 if (node->key.specified == AVTAB_ALLOWED)
> -                                       avd->allowed |= node->datum.data;
> +                                       avd->allowed |= node->datum.u.data;
>                                 else if (node->key.specified == AVTAB_AUDITALLOW)
> -                                       avd->auditallow |= node->datum.data;
> +                                       avd->auditallow |= node->datum.u.data;
>                                 else if (node->key.specified == AVTAB_AUDITDENY)
> -                                       avd->auditdeny &= node->datum.data;
> +                                       avd->auditdeny &= node->datum.u.data;
> +                               else if (xperms && (node->key.specified & AVTAB_XPERMS))
> +                                       services_compute_xperms_drivers(xperms, node);
>                         }
>
>                         /* Check conditional av table for additional permissions */
> -                       cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);
> +                       cond_compute_av(&policydb.te_cond_avtab, &avkey,
> +                                       avd, xperms);
>
>                 }
>         }
> @@ -899,6 +936,139 @@ static void avd_init(struct av_decision *avd)
>         avd->flags = 0;
>  }
>
> +void services_compute_xperms_decision(struct extended_perms_decision *xpermd,
> +                                       struct avtab_node *node)
> +{
> +       unsigned int i;
> +
> +       if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) {
> +               if (xpermd->driver != node->datum.u.xperms->driver)
> +                       return;
> +       } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) {
> +               if (!security_xperm_test(node->datum.u.xperms->perms.p,
> +                                       xpermd->driver))
> +                       return;
> +       } else {
> +               BUG();
> +       }
> +
> +       if (node->key.specified == AVTAB_XPERMS_ALLOWED) {
> +               xpermd->used |= XPERMS_ALLOWED;
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) {
> +                       memset(xpermd->allowed->p, 0xff,
> +                                       sizeof(xpermd->allowed->p));
> +               }
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) {
> +                       for (i = 0; i < ARRAY_SIZE(xpermd->allowed->p); i++)
> +                               xpermd->allowed->p[i] |=
> +                                       node->datum.u.xperms->perms.p[i];
> +               }
> +       } else if (node->key.specified == AVTAB_XPERMS_AUDITALLOW) {
> +               xpermd->used |= XPERMS_AUDITALLOW;
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) {
> +                       memset(xpermd->auditallow->p, 0xff,
> +                                       sizeof(xpermd->auditallow->p));
> +               }
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) {
> +                       for (i = 0; i < ARRAY_SIZE(xpermd->auditallow->p); i++)
> +                               xpermd->auditallow->p[i] |=
> +                                       node->datum.u.xperms->perms.p[i];
> +               }
> +       } else if (node->key.specified == AVTAB_XPERMS_DONTAUDIT) {
> +               xpermd->used |= XPERMS_DONTAUDIT;
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) {
> +                       memset(xpermd->dontaudit->p, 0xff,
> +                                       sizeof(xpermd->dontaudit->p));
> +               }
> +               if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) {
> +                       for (i = 0; i < ARRAY_SIZE(xpermd->dontaudit->p); i++)
> +                               xpermd->dontaudit->p[i] |=
> +                                       node->datum.u.xperms->perms.p[i];
> +               }
> +       } else {
> +               BUG();
> +       }
> +}
> +
> +void security_compute_xperms_decision(u32 ssid,
> +                               u32 tsid,
> +                               u16 orig_tclass,
> +                               u8 driver,
> +                               struct extended_perms_decision *xpermd)
> +{
> +       u16 tclass;
> +       struct context *scontext, *tcontext;
> +       struct avtab_key avkey;
> +       struct avtab_node *node;
> +       struct ebitmap *sattr, *tattr;
> +       struct ebitmap_node *snode, *tnode;
> +       unsigned int i, j;
> +
> +       xpermd->driver = driver;
> +       xpermd->used = 0;
> +       memset(xpermd->allowed->p, 0, sizeof(xpermd->allowed->p));
> +       memset(xpermd->auditallow->p, 0, sizeof(xpermd->auditallow->p));
> +       memset(xpermd->dontaudit->p, 0, sizeof(xpermd->dontaudit->p));
> +
> +       read_lock(&policy_rwlock);
> +       if (!ss_initialized)
> +               goto allow;
> +
> +       scontext = sidtab_search(&sidtab, ssid);
> +       if (!scontext) {
> +               printk(KERN_ERR "SELinux: %s:  unrecognized SID %d\n",
> +                      __func__, ssid);
> +               goto out;
> +       }
> +
> +       tcontext = sidtab_search(&sidtab, tsid);
> +       if (!tcontext) {
> +               printk(KERN_ERR "SELinux: %s:  unrecognized SID %d\n",
> +                      __func__, tsid);
> +               goto out;
> +       }
> +
> +       tclass = unmap_class(orig_tclass);
> +       if (unlikely(orig_tclass && !tclass)) {
> +               if (policydb.allow_unknown)
> +                       goto allow;
> +               goto out;
> +       }
> +
> +
> +       if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
> +               pr_warn_ratelimited("SELinux:  Invalid class %hu\n", tclass);
> +               goto out;
> +       }
> +
> +       avkey.target_class = tclass;
> +       avkey.specified = AVTAB_XPERMS;
> +       sattr = flex_array_get(policydb.type_attr_map_array,
> +                               scontext->type - 1);
> +       BUG_ON(!sattr);
> +       tattr = flex_array_get(policydb.type_attr_map_array,
> +                               tcontext->type - 1);
> +       BUG_ON(!tattr);
> +       ebitmap_for_each_positive_bit(sattr, snode, i) {
> +               ebitmap_for_each_positive_bit(tattr, tnode, j) {
> +                       avkey.source_type = i + 1;
> +                       avkey.target_type = j + 1;
> +                       for (node = avtab_search_node(&policydb.te_avtab, &avkey);
> +                            node;
> +                            node = avtab_search_node_next(node, avkey.specified))
> +                               services_compute_xperms_decision(xpermd, node);
> +
> +                       cond_compute_xperms(&policydb.te_cond_avtab,
> +                                               &avkey, xpermd);
> +               }
> +       }
> +out:
> +       read_unlock(&policy_rwlock);
> +       return;
> +allow:
> +       memset(xpermd->allowed->p, 0xff, sizeof(xpermd->allowed->p));
> +       goto out;
> +}
>
>  /**
>   * security_compute_av - Compute access vector decisions.
> @@ -906,6 +1076,7 @@ static void avd_init(struct av_decision *avd)
>   * @tsid: target security identifier
>   * @tclass: target security class
>   * @avd: access vector decisions
> + * @xperms: extended permissions
>   *
>   * Compute a set of access vector decisions based on the
>   * SID pair (@ssid, @tsid) for the permissions in @tclass.
> @@ -913,13 +1084,15 @@ static void avd_init(struct av_decision *avd)
>  void security_compute_av(u32 ssid,
>                          u32 tsid,
>                          u16 orig_tclass,
> -                        struct av_decision *avd)
> +                        struct av_decision *avd,
> +                        struct extended_perms *xperms)
>  {
>         u16 tclass;
>         struct context *scontext = NULL, *tcontext = NULL;
>
>         read_lock(&policy_rwlock);
>         avd_init(avd);
> +       xperms->len = 0;
>         if (!ss_initialized)
>                 goto allow;
>
> @@ -947,7 +1120,7 @@ void security_compute_av(u32 ssid,
>                         goto allow;
>                 goto out;
>         }
> -       context_struct_compute_av(scontext, tcontext, tclass, avd);
> +       context_struct_compute_av(scontext, tcontext, tclass, avd, xperms);
>         map_decision(orig_tclass, avd, policydb.allow_unknown);
>  out:
>         read_unlock(&policy_rwlock);
> @@ -993,7 +1166,7 @@ void security_compute_av_user(u32 ssid,
>                 goto out;
>         }
>
> -       context_struct_compute_av(scontext, tcontext, tclass, avd);
> +       context_struct_compute_av(scontext, tcontext, tclass, avd, NULL);
>   out:
>         read_unlock(&policy_rwlock);
>         return;
> @@ -1515,7 +1688,7 @@ static int security_compute_sid(u32 ssid,
>
>         if (avdatum) {
>                 /* Use the type from the type transition/member/change rule. */
> -               newcontext.type = avdatum->data;
> +               newcontext.type = avdatum->u.data;
>         }
>
>         /* if we have a objname this is a file trans check so check those rules */
> diff --git a/security/selinux/ss/services.h b/security/selinux/ss/services.h
> index e8d907e..6abcd87 100644
> --- a/security/selinux/ss/services.h
> +++ b/security/selinux/ss/services.h
> @@ -11,5 +11,11 @@
>
>  extern struct policydb policydb;
>
> +void services_compute_xperms_drivers(struct extended_perms *xperms,
> +                               struct avtab_node *node);
> +
> +void services_compute_xperms_decision(struct extended_perms_decision *xpermd,
> +                                       struct avtab_node *node);
> +
>  #endif /* _SS_SERVICES_H_ */
>
> --
> 2.2.0.rc0.207.ga3a616c
>
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



-- 
Nick Kralevich | Android Security | nnk@xxxxxxxxxx | 650.214.4037
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux