xref: /freebsd/sys/security/mac/mac_socket.c (revision aed557087269cd052aa76cc15af4a1fd70cbbf24)
1c66b4d8dSRobert Watson /*-
2c66b4d8dSRobert Watson  * Copyright (c) 1999-2002 Robert N. M. Watson
3c66b4d8dSRobert Watson  * Copyright (c) 2001 Ilmar S. Habibulin
47f53207bSRobert Watson  * Copyright (c) 2001-2005 Networks Associates Technology, Inc.
56758f88eSRobert Watson  * Copyright (c) 2005 SPARTA, Inc.
6c66b4d8dSRobert Watson  * All rights reserved.
7c66b4d8dSRobert Watson  *
8c66b4d8dSRobert Watson  * This software was developed by Robert Watson and Ilmar Habibulin for the
9c66b4d8dSRobert Watson  * TrustedBSD Project.
10c66b4d8dSRobert Watson  *
117f53207bSRobert Watson  * This software was developed for the FreeBSD Project in part by McAfee
127f53207bSRobert Watson  * Research, the Technology Research Division of Network Associates, Inc.
137f53207bSRobert Watson  * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
147f53207bSRobert Watson  * DARPA CHATS research program.
15c66b4d8dSRobert Watson  *
166758f88eSRobert Watson  * This software was enhanced by SPARTA ISSO under SPAWAR contract
176758f88eSRobert Watson  * N66001-04-C-6019 ("SEFOS").
186758f88eSRobert Watson  *
19c66b4d8dSRobert Watson  * Redistribution and use in source and binary forms, with or without
20c66b4d8dSRobert Watson  * modification, are permitted provided that the following conditions
21c66b4d8dSRobert Watson  * are met:
22c66b4d8dSRobert Watson  * 1. Redistributions of source code must retain the above copyright
23c66b4d8dSRobert Watson  *    notice, this list of conditions and the following disclaimer.
24c66b4d8dSRobert Watson  * 2. Redistributions in binary form must reproduce the above copyright
25c66b4d8dSRobert Watson  *    notice, this list of conditions and the following disclaimer in the
26c66b4d8dSRobert Watson  *    documentation and/or other materials provided with the distribution.
27c66b4d8dSRobert Watson  *
28c66b4d8dSRobert Watson  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
29c66b4d8dSRobert Watson  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30c66b4d8dSRobert Watson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31c66b4d8dSRobert Watson  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
32c66b4d8dSRobert Watson  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33c66b4d8dSRobert Watson  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34c66b4d8dSRobert Watson  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35c66b4d8dSRobert Watson  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36c66b4d8dSRobert Watson  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37c66b4d8dSRobert Watson  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38c66b4d8dSRobert Watson  * SUCH DAMAGE.
39c66b4d8dSRobert Watson  */
40c66b4d8dSRobert Watson 
41c66b4d8dSRobert Watson #include <sys/cdefs.h>
42c66b4d8dSRobert Watson __FBSDID("$FreeBSD$");
43c66b4d8dSRobert Watson 
44c66b4d8dSRobert Watson #include "opt_mac.h"
45c66b4d8dSRobert Watson 
46c66b4d8dSRobert Watson #include <sys/param.h>
47c66b4d8dSRobert Watson #include <sys/kernel.h>
48c66b4d8dSRobert Watson #include <sys/lock.h>
49c66b4d8dSRobert Watson #include <sys/malloc.h>
50c66b4d8dSRobert Watson #include <sys/mutex.h>
51c66b4d8dSRobert Watson #include <sys/mac.h>
52c66b4d8dSRobert Watson #include <sys/sbuf.h>
53c66b4d8dSRobert Watson #include <sys/systm.h>
54c66b4d8dSRobert Watson #include <sys/mount.h>
55c66b4d8dSRobert Watson #include <sys/file.h>
56c66b4d8dSRobert Watson #include <sys/namei.h>
57c66b4d8dSRobert Watson #include <sys/protosw.h>
58c66b4d8dSRobert Watson #include <sys/socket.h>
59c66b4d8dSRobert Watson #include <sys/socketvar.h>
60c66b4d8dSRobert Watson #include <sys/sysctl.h>
61c66b4d8dSRobert Watson 
62c66b4d8dSRobert Watson #include <sys/mac_policy.h>
63c66b4d8dSRobert Watson 
64c66b4d8dSRobert Watson #include <net/bpfdesc.h>
65c66b4d8dSRobert Watson #include <net/if.h>
66c66b4d8dSRobert Watson #include <net/if_var.h>
67c66b4d8dSRobert Watson 
68c66b4d8dSRobert Watson #include <netinet/in.h>
69c66b4d8dSRobert Watson #include <netinet/in_pcb.h>
70c66b4d8dSRobert Watson #include <netinet/ip_var.h>
71c66b4d8dSRobert Watson 
72aed55708SRobert Watson #include <security/mac/mac_framework.h>
73c66b4d8dSRobert Watson #include <security/mac/mac_internal.h>
74c66b4d8dSRobert Watson 
75c66b4d8dSRobert Watson /*
76c66b4d8dSRobert Watson  * mac_enforce_socket is used by the inet code when delivering to an inpcb
77c66b4d8dSRobert Watson  * without hitting the socket layer, and has to be non-static for now.
78c66b4d8dSRobert Watson  */
79c66b4d8dSRobert Watson int	mac_enforce_socket = 1;
80c66b4d8dSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_socket, CTLFLAG_RW,
81c66b4d8dSRobert Watson     &mac_enforce_socket, 0, "Enforce MAC policy on socket operations");
82c66b4d8dSRobert Watson TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
83c66b4d8dSRobert Watson 
84c66b4d8dSRobert Watson struct label *
85c66b4d8dSRobert Watson mac_socket_label_alloc(int flag)
86c66b4d8dSRobert Watson {
87c66b4d8dSRobert Watson 	struct label *label;
88c66b4d8dSRobert Watson 	int error;
89c66b4d8dSRobert Watson 
90c66b4d8dSRobert Watson 	label = mac_labelzone_alloc(flag);
91c66b4d8dSRobert Watson 	if (label == NULL)
92c66b4d8dSRobert Watson 		return (NULL);
93c66b4d8dSRobert Watson 
94c66b4d8dSRobert Watson 	MAC_CHECK(init_socket_label, label, flag);
95c66b4d8dSRobert Watson 	if (error) {
96c66b4d8dSRobert Watson 		MAC_PERFORM(destroy_socket_label, label);
97c66b4d8dSRobert Watson 		mac_labelzone_free(label);
98c66b4d8dSRobert Watson 		return (NULL);
99c66b4d8dSRobert Watson 	}
100c66b4d8dSRobert Watson 	return (label);
101c66b4d8dSRobert Watson }
102c66b4d8dSRobert Watson 
103c66b4d8dSRobert Watson static struct label *
104c66b4d8dSRobert Watson mac_socket_peer_label_alloc(int flag)
105c66b4d8dSRobert Watson {
106c66b4d8dSRobert Watson 	struct label *label;
107c66b4d8dSRobert Watson 	int error;
108c66b4d8dSRobert Watson 
109c66b4d8dSRobert Watson 	label = mac_labelzone_alloc(flag);
110c66b4d8dSRobert Watson 	if (label == NULL)
111c66b4d8dSRobert Watson 		return (NULL);
112c66b4d8dSRobert Watson 
113c66b4d8dSRobert Watson 	MAC_CHECK(init_socket_peer_label, label, flag);
114c66b4d8dSRobert Watson 	if (error) {
115c66b4d8dSRobert Watson 		MAC_PERFORM(destroy_socket_peer_label, label);
116c66b4d8dSRobert Watson 		mac_labelzone_free(label);
117c66b4d8dSRobert Watson 		return (NULL);
118c66b4d8dSRobert Watson 	}
119c66b4d8dSRobert Watson 	return (label);
120c66b4d8dSRobert Watson }
121c66b4d8dSRobert Watson 
122c66b4d8dSRobert Watson int
123c66b4d8dSRobert Watson mac_init_socket(struct socket *so, int flag)
124c66b4d8dSRobert Watson {
125c66b4d8dSRobert Watson 
126c66b4d8dSRobert Watson 	so->so_label = mac_socket_label_alloc(flag);
127c66b4d8dSRobert Watson 	if (so->so_label == NULL)
128c66b4d8dSRobert Watson 		return (ENOMEM);
129c66b4d8dSRobert Watson 	so->so_peerlabel = mac_socket_peer_label_alloc(flag);
130c66b4d8dSRobert Watson 	if (so->so_peerlabel == NULL) {
131c66b4d8dSRobert Watson 		mac_socket_label_free(so->so_label);
132c66b4d8dSRobert Watson 		so->so_label = NULL;
133c66b4d8dSRobert Watson 		return (ENOMEM);
134c66b4d8dSRobert Watson 	}
135c66b4d8dSRobert Watson 	return (0);
136c66b4d8dSRobert Watson }
137c66b4d8dSRobert Watson 
138c66b4d8dSRobert Watson void
139c66b4d8dSRobert Watson mac_socket_label_free(struct label *label)
140c66b4d8dSRobert Watson {
141c66b4d8dSRobert Watson 
142c66b4d8dSRobert Watson 	MAC_PERFORM(destroy_socket_label, label);
143c66b4d8dSRobert Watson 	mac_labelzone_free(label);
144c66b4d8dSRobert Watson }
145c66b4d8dSRobert Watson 
146c66b4d8dSRobert Watson static void
147c66b4d8dSRobert Watson mac_socket_peer_label_free(struct label *label)
148c66b4d8dSRobert Watson {
149c66b4d8dSRobert Watson 
150c66b4d8dSRobert Watson 	MAC_PERFORM(destroy_socket_peer_label, label);
151c66b4d8dSRobert Watson 	mac_labelzone_free(label);
152c66b4d8dSRobert Watson }
153c66b4d8dSRobert Watson 
154c66b4d8dSRobert Watson void
155c66b4d8dSRobert Watson mac_destroy_socket(struct socket *socket)
156c66b4d8dSRobert Watson {
157c66b4d8dSRobert Watson 
158c66b4d8dSRobert Watson 	mac_socket_label_free(socket->so_label);
159c66b4d8dSRobert Watson 	socket->so_label = NULL;
160c66b4d8dSRobert Watson 	mac_socket_peer_label_free(socket->so_peerlabel);
161c66b4d8dSRobert Watson 	socket->so_peerlabel = NULL;
162c66b4d8dSRobert Watson }
163c66b4d8dSRobert Watson 
164c66b4d8dSRobert Watson void
165c66b4d8dSRobert Watson mac_copy_socket_label(struct label *src, struct label *dest)
166c66b4d8dSRobert Watson {
167c66b4d8dSRobert Watson 
168c66b4d8dSRobert Watson 	MAC_PERFORM(copy_socket_label, src, dest);
169c66b4d8dSRobert Watson }
170c66b4d8dSRobert Watson 
171c66b4d8dSRobert Watson int
172c66b4d8dSRobert Watson mac_externalize_socket_label(struct label *label, char *elements,
173c66b4d8dSRobert Watson     char *outbuf, size_t outbuflen)
174c66b4d8dSRobert Watson {
175c66b4d8dSRobert Watson 	int error;
176c66b4d8dSRobert Watson 
177c66b4d8dSRobert Watson 	MAC_EXTERNALIZE(socket, label, elements, outbuf, outbuflen);
178c66b4d8dSRobert Watson 
179c66b4d8dSRobert Watson 	return (error);
180c66b4d8dSRobert Watson }
181c66b4d8dSRobert Watson 
182c66b4d8dSRobert Watson static int
183c66b4d8dSRobert Watson mac_externalize_socket_peer_label(struct label *label, char *elements,
184c66b4d8dSRobert Watson     char *outbuf, size_t outbuflen)
185c66b4d8dSRobert Watson {
186c66b4d8dSRobert Watson 	int error;
187c66b4d8dSRobert Watson 
188c66b4d8dSRobert Watson 	MAC_EXTERNALIZE(socket_peer, label, elements, outbuf, outbuflen);
189c66b4d8dSRobert Watson 
190c66b4d8dSRobert Watson 	return (error);
191c66b4d8dSRobert Watson }
192c66b4d8dSRobert Watson 
193c66b4d8dSRobert Watson int
194c66b4d8dSRobert Watson mac_internalize_socket_label(struct label *label, char *string)
195c66b4d8dSRobert Watson {
196c66b4d8dSRobert Watson 	int error;
197c66b4d8dSRobert Watson 
198c66b4d8dSRobert Watson 	MAC_INTERNALIZE(socket, label, string);
199c66b4d8dSRobert Watson 
200c66b4d8dSRobert Watson 	return (error);
201c66b4d8dSRobert Watson }
202c66b4d8dSRobert Watson 
203c66b4d8dSRobert Watson void
204c66b4d8dSRobert Watson mac_create_socket(struct ucred *cred, struct socket *socket)
205c66b4d8dSRobert Watson {
206c66b4d8dSRobert Watson 
207c66b4d8dSRobert Watson 	MAC_PERFORM(create_socket, cred, socket, socket->so_label);
208c66b4d8dSRobert Watson }
209c66b4d8dSRobert Watson 
210c66b4d8dSRobert Watson void
211c66b4d8dSRobert Watson mac_create_socket_from_socket(struct socket *oldsocket,
212c66b4d8dSRobert Watson     struct socket *newsocket)
213c66b4d8dSRobert Watson {
214c66b4d8dSRobert Watson 
215310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(oldsocket);
216c66b4d8dSRobert Watson 	MAC_PERFORM(create_socket_from_socket, oldsocket, oldsocket->so_label,
217c66b4d8dSRobert Watson 	    newsocket, newsocket->so_label);
218c66b4d8dSRobert Watson }
219c66b4d8dSRobert Watson 
220c66b4d8dSRobert Watson static void
221c66b4d8dSRobert Watson mac_relabel_socket(struct ucred *cred, struct socket *socket,
222c66b4d8dSRobert Watson     struct label *newlabel)
223c66b4d8dSRobert Watson {
224c66b4d8dSRobert Watson 
225310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
226c66b4d8dSRobert Watson 	MAC_PERFORM(relabel_socket, cred, socket, socket->so_label, newlabel);
227c66b4d8dSRobert Watson }
228c66b4d8dSRobert Watson 
229c66b4d8dSRobert Watson void
230c66b4d8dSRobert Watson mac_set_socket_peer_from_mbuf(struct mbuf *mbuf, struct socket *socket)
231c66b4d8dSRobert Watson {
232c66b4d8dSRobert Watson 	struct label *label;
233c66b4d8dSRobert Watson 
234310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
235310e7cebSRobert Watson 
236c66b4d8dSRobert Watson 	label = mac_mbuf_to_label(mbuf);
237c66b4d8dSRobert Watson 
238c66b4d8dSRobert Watson 	MAC_PERFORM(set_socket_peer_from_mbuf, mbuf, label, socket,
239c66b4d8dSRobert Watson 	    socket->so_peerlabel);
240c66b4d8dSRobert Watson }
241c66b4d8dSRobert Watson 
242c66b4d8dSRobert Watson void
243c66b4d8dSRobert Watson mac_set_socket_peer_from_socket(struct socket *oldsocket,
244c66b4d8dSRobert Watson     struct socket *newsocket)
245c66b4d8dSRobert Watson {
246c66b4d8dSRobert Watson 
247310e7cebSRobert Watson 	/*
248310e7cebSRobert Watson 	 * XXXRW: only hold the socket lock on one at a time, as one
249310e7cebSRobert Watson 	 * socket is the original, and one is the new.  However, it's
250310e7cebSRobert Watson 	 * called in both directions, so we can't assert the lock
251310e7cebSRobert Watson 	 * here currently.
252310e7cebSRobert Watson 	 */
253c66b4d8dSRobert Watson 	MAC_PERFORM(set_socket_peer_from_socket, oldsocket,
254c66b4d8dSRobert Watson 	    oldsocket->so_label, newsocket, newsocket->so_peerlabel);
255c66b4d8dSRobert Watson }
256c66b4d8dSRobert Watson 
257c66b4d8dSRobert Watson void
258c66b4d8dSRobert Watson mac_create_mbuf_from_socket(struct socket *socket, struct mbuf *mbuf)
259c66b4d8dSRobert Watson {
260c66b4d8dSRobert Watson 	struct label *label;
261c66b4d8dSRobert Watson 
262c66b4d8dSRobert Watson 	label = mac_mbuf_to_label(mbuf);
263c66b4d8dSRobert Watson 
264310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
265c66b4d8dSRobert Watson 	MAC_PERFORM(create_mbuf_from_socket, socket, socket->so_label, mbuf,
266c66b4d8dSRobert Watson 	    label);
267c66b4d8dSRobert Watson }
268c66b4d8dSRobert Watson 
269c66b4d8dSRobert Watson int
2707f53207bSRobert Watson mac_check_socket_accept(struct ucred *cred, struct socket *socket)
2717f53207bSRobert Watson {
2727f53207bSRobert Watson 	int error;
2737f53207bSRobert Watson 
2747f53207bSRobert Watson 	SOCK_LOCK_ASSERT(socket);
2757f53207bSRobert Watson 
2767f53207bSRobert Watson 	if (!mac_enforce_socket)
2777f53207bSRobert Watson 		return (0);
2787f53207bSRobert Watson 
2797f53207bSRobert Watson 	MAC_CHECK(check_socket_accept, cred, socket, socket->so_label);
2807f53207bSRobert Watson 
2817f53207bSRobert Watson 	return (error);
2827f53207bSRobert Watson }
2837f53207bSRobert Watson 
2847f53207bSRobert Watson int
285c66b4d8dSRobert Watson mac_check_socket_bind(struct ucred *ucred, struct socket *socket,
286c66b4d8dSRobert Watson     struct sockaddr *sockaddr)
287c66b4d8dSRobert Watson {
288c66b4d8dSRobert Watson 	int error;
289c66b4d8dSRobert Watson 
290310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
291310e7cebSRobert Watson 
292c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
293c66b4d8dSRobert Watson 		return (0);
294c66b4d8dSRobert Watson 
295c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_bind, ucred, socket, socket->so_label,
296c66b4d8dSRobert Watson 	    sockaddr);
297c66b4d8dSRobert Watson 
298c66b4d8dSRobert Watson 	return (error);
299c66b4d8dSRobert Watson }
300c66b4d8dSRobert Watson 
301c66b4d8dSRobert Watson int
302c66b4d8dSRobert Watson mac_check_socket_connect(struct ucred *cred, struct socket *socket,
303c66b4d8dSRobert Watson     struct sockaddr *sockaddr)
304c66b4d8dSRobert Watson {
305c66b4d8dSRobert Watson 	int error;
306c66b4d8dSRobert Watson 
307310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
308310e7cebSRobert Watson 
309c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
310c66b4d8dSRobert Watson 		return (0);
311c66b4d8dSRobert Watson 
312c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_connect, cred, socket, socket->so_label,
313c66b4d8dSRobert Watson 	    sockaddr);
314c66b4d8dSRobert Watson 
315c66b4d8dSRobert Watson 	return (error);
316c66b4d8dSRobert Watson }
317c66b4d8dSRobert Watson 
318c66b4d8dSRobert Watson int
3196758f88eSRobert Watson mac_check_socket_create(struct ucred *cred, int domain, int type,
3206758f88eSRobert Watson     int protocol)
3216758f88eSRobert Watson {
3226758f88eSRobert Watson 	int error;
3236758f88eSRobert Watson 
3246758f88eSRobert Watson 	if (!mac_enforce_socket)
3256758f88eSRobert Watson 		return (0);
3266758f88eSRobert Watson 
3276758f88eSRobert Watson 	MAC_CHECK(check_socket_create, cred, domain, type, protocol);
3286758f88eSRobert Watson 
3296758f88eSRobert Watson 	return (error);
3306758f88eSRobert Watson }
3316758f88eSRobert Watson 
3326758f88eSRobert Watson int
333c66b4d8dSRobert Watson mac_check_socket_deliver(struct socket *socket, struct mbuf *mbuf)
334c66b4d8dSRobert Watson {
335c66b4d8dSRobert Watson 	struct label *label;
336c66b4d8dSRobert Watson 	int error;
337c66b4d8dSRobert Watson 
338310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
339310e7cebSRobert Watson 
340c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
341c66b4d8dSRobert Watson 		return (0);
342c66b4d8dSRobert Watson 
343c66b4d8dSRobert Watson 	label = mac_mbuf_to_label(mbuf);
344c66b4d8dSRobert Watson 
345c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_deliver, socket, socket->so_label, mbuf,
346c66b4d8dSRobert Watson 	    label);
347c66b4d8dSRobert Watson 
348c66b4d8dSRobert Watson 	return (error);
349c66b4d8dSRobert Watson }
350c66b4d8dSRobert Watson 
351c66b4d8dSRobert Watson int
352c66b4d8dSRobert Watson mac_check_socket_listen(struct ucred *cred, struct socket *socket)
353c66b4d8dSRobert Watson {
354c66b4d8dSRobert Watson 	int error;
355c66b4d8dSRobert Watson 
356310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
357310e7cebSRobert Watson 
358c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
359c66b4d8dSRobert Watson 		return (0);
360c66b4d8dSRobert Watson 
361c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_listen, cred, socket, socket->so_label);
362c66b4d8dSRobert Watson 	return (error);
363c66b4d8dSRobert Watson }
364c66b4d8dSRobert Watson 
365c66b4d8dSRobert Watson int
3667f53207bSRobert Watson mac_check_socket_poll(struct ucred *cred, struct socket *so)
3677f53207bSRobert Watson {
3687f53207bSRobert Watson 	int error;
3697f53207bSRobert Watson 
3707f53207bSRobert Watson 	SOCK_LOCK_ASSERT(so);
3717f53207bSRobert Watson 
3727f53207bSRobert Watson 	if (!mac_enforce_socket)
3737f53207bSRobert Watson 		return (0);
3747f53207bSRobert Watson 
3757f53207bSRobert Watson 	MAC_CHECK(check_socket_poll, cred, so, so->so_label);
3767f53207bSRobert Watson 	return (error);
3777f53207bSRobert Watson }
3787f53207bSRobert Watson 
3797f53207bSRobert Watson int
380c66b4d8dSRobert Watson mac_check_socket_receive(struct ucred *cred, struct socket *so)
381c66b4d8dSRobert Watson {
382c66b4d8dSRobert Watson 	int error;
383c66b4d8dSRobert Watson 
384310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(so);
385310e7cebSRobert Watson 
386c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
387c66b4d8dSRobert Watson 		return (0);
388c66b4d8dSRobert Watson 
389c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_receive, cred, so, so->so_label);
390c66b4d8dSRobert Watson 
391c66b4d8dSRobert Watson 	return (error);
392c66b4d8dSRobert Watson }
393c66b4d8dSRobert Watson 
394c66b4d8dSRobert Watson static int
395c66b4d8dSRobert Watson mac_check_socket_relabel(struct ucred *cred, struct socket *socket,
396c66b4d8dSRobert Watson     struct label *newlabel)
397c66b4d8dSRobert Watson {
398c66b4d8dSRobert Watson 	int error;
399c66b4d8dSRobert Watson 
400310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
401310e7cebSRobert Watson 
402c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_relabel, cred, socket, socket->so_label,
403c66b4d8dSRobert Watson 	    newlabel);
404c66b4d8dSRobert Watson 
405c66b4d8dSRobert Watson 	return (error);
406c66b4d8dSRobert Watson }
407c66b4d8dSRobert Watson 
408c66b4d8dSRobert Watson int
409c66b4d8dSRobert Watson mac_check_socket_send(struct ucred *cred, struct socket *so)
410c66b4d8dSRobert Watson {
411c66b4d8dSRobert Watson 	int error;
412c66b4d8dSRobert Watson 
413310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(so);
414310e7cebSRobert Watson 
415c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
416c66b4d8dSRobert Watson 		return (0);
417c66b4d8dSRobert Watson 
418c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_send, cred, so, so->so_label);
419c66b4d8dSRobert Watson 
420c66b4d8dSRobert Watson 	return (error);
421c66b4d8dSRobert Watson }
422c66b4d8dSRobert Watson 
423c66b4d8dSRobert Watson int
4247f53207bSRobert Watson mac_check_socket_stat(struct ucred *cred, struct socket *so)
4257f53207bSRobert Watson {
4267f53207bSRobert Watson 	int error;
4277f53207bSRobert Watson 
4287f53207bSRobert Watson 	SOCK_LOCK_ASSERT(so);
4297f53207bSRobert Watson 
4307f53207bSRobert Watson 	if (!mac_enforce_socket)
4317f53207bSRobert Watson 		return (0);
4327f53207bSRobert Watson 
4337f53207bSRobert Watson 	MAC_CHECK(check_socket_stat, cred, so, so->so_label);
4347f53207bSRobert Watson 
4357f53207bSRobert Watson 	return (error);
4367f53207bSRobert Watson }
4377f53207bSRobert Watson 
4387f53207bSRobert Watson int
439c66b4d8dSRobert Watson mac_check_socket_visible(struct ucred *cred, struct socket *socket)
440c66b4d8dSRobert Watson {
441c66b4d8dSRobert Watson 	int error;
442c66b4d8dSRobert Watson 
443310e7cebSRobert Watson 	SOCK_LOCK_ASSERT(socket);
444310e7cebSRobert Watson 
445c66b4d8dSRobert Watson 	if (!mac_enforce_socket)
446c66b4d8dSRobert Watson 		return (0);
447c66b4d8dSRobert Watson 
448c66b4d8dSRobert Watson 	MAC_CHECK(check_socket_visible, cred, socket, socket->so_label);
449c66b4d8dSRobert Watson 
450c66b4d8dSRobert Watson 	return (error);
451c66b4d8dSRobert Watson }
452c66b4d8dSRobert Watson 
453c66b4d8dSRobert Watson int
454c66b4d8dSRobert Watson mac_socket_label_set(struct ucred *cred, struct socket *so,
455c66b4d8dSRobert Watson     struct label *label)
456c66b4d8dSRobert Watson {
457c66b4d8dSRobert Watson 	int error;
458c66b4d8dSRobert Watson 
459310e7cebSRobert Watson 	/*
460310e7cebSRobert Watson 	 * We acquire the socket lock when we perform the test and set,
461310e7cebSRobert Watson 	 * but have to release it as the pcb code needs to acquire the
462310e7cebSRobert Watson 	 * pcb lock, which will precede the socket lock in the lock
463310e7cebSRobert Watson 	 * order.  However, this is fine, as any race will simply
464310e7cebSRobert Watson 	 * result in the inpcb being refreshed twice, but still
465310e7cebSRobert Watson 	 * consistently, as the inpcb code will acquire the socket lock
466310e7cebSRobert Watson 	 * before refreshing, holding both locks.
467310e7cebSRobert Watson 	 */
468310e7cebSRobert Watson 	SOCK_LOCK(so);
469c66b4d8dSRobert Watson 	error = mac_check_socket_relabel(cred, so, label);
470310e7cebSRobert Watson 	if (error) {
471310e7cebSRobert Watson 		SOCK_UNLOCK(so);
472c66b4d8dSRobert Watson 		return (error);
473310e7cebSRobert Watson 	}
474c66b4d8dSRobert Watson 
475c66b4d8dSRobert Watson 	mac_relabel_socket(cred, so, label);
476310e7cebSRobert Watson 	SOCK_UNLOCK(so);
477c66b4d8dSRobert Watson 	/*
478c66b4d8dSRobert Watson 	 * If the protocol has expressed interest in socket layer changes,
479c66b4d8dSRobert Watson 	 * such as if it needs to propagate changes to a cached pcb
480c66b4d8dSRobert Watson 	 * label from the socket, notify it of the label change while
481c66b4d8dSRobert Watson 	 * holding the socket lock.
482c66b4d8dSRobert Watson 	 */
483c66b4d8dSRobert Watson 	if (so->so_proto->pr_usrreqs->pru_sosetlabel != NULL)
484c66b4d8dSRobert Watson 		(so->so_proto->pr_usrreqs->pru_sosetlabel)(so);
485c66b4d8dSRobert Watson 
486c66b4d8dSRobert Watson 	return (0);
487c66b4d8dSRobert Watson }
488c66b4d8dSRobert Watson 
489c66b4d8dSRobert Watson int
490c66b4d8dSRobert Watson mac_setsockopt_label(struct ucred *cred, struct socket *so, struct mac *mac)
491c66b4d8dSRobert Watson {
492c66b4d8dSRobert Watson 	struct label *intlabel;
493c66b4d8dSRobert Watson 	char *buffer;
494c66b4d8dSRobert Watson 	int error;
495c66b4d8dSRobert Watson 
496c66b4d8dSRobert Watson 	error = mac_check_structmac_consistent(mac);
497c66b4d8dSRobert Watson 	if (error)
498c66b4d8dSRobert Watson 		return (error);
499c66b4d8dSRobert Watson 
500c66b4d8dSRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
501c66b4d8dSRobert Watson 	error = copyinstr(mac->m_string, buffer, mac->m_buflen, NULL);
502c66b4d8dSRobert Watson 	if (error) {
503c66b4d8dSRobert Watson 		free(buffer, M_MACTEMP);
504c66b4d8dSRobert Watson 		return (error);
505c66b4d8dSRobert Watson 	}
506c66b4d8dSRobert Watson 
507c66b4d8dSRobert Watson 	intlabel = mac_socket_label_alloc(M_WAITOK);
508c66b4d8dSRobert Watson 	error = mac_internalize_socket_label(intlabel, buffer);
509c66b4d8dSRobert Watson 	free(buffer, M_MACTEMP);
510c66b4d8dSRobert Watson 	if (error)
511c66b4d8dSRobert Watson 		goto out;
512c66b4d8dSRobert Watson 
513c66b4d8dSRobert Watson 	error = mac_socket_label_set(cred, so, intlabel);
514c66b4d8dSRobert Watson out:
515c66b4d8dSRobert Watson 	mac_socket_label_free(intlabel);
516c66b4d8dSRobert Watson 	return (error);
517c66b4d8dSRobert Watson }
518c66b4d8dSRobert Watson 
519c66b4d8dSRobert Watson int
520c66b4d8dSRobert Watson mac_getsockopt_label(struct ucred *cred, struct socket *so, struct mac *mac)
521c66b4d8dSRobert Watson {
522c66b4d8dSRobert Watson 	char *buffer, *elements;
523310e7cebSRobert Watson 	struct label *intlabel;
524c66b4d8dSRobert Watson 	int error;
525c66b4d8dSRobert Watson 
526c66b4d8dSRobert Watson 	error = mac_check_structmac_consistent(mac);
527c66b4d8dSRobert Watson 	if (error)
528c66b4d8dSRobert Watson 		return (error);
529c66b4d8dSRobert Watson 
530c66b4d8dSRobert Watson 	elements = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
531c66b4d8dSRobert Watson 	error = copyinstr(mac->m_string, elements, mac->m_buflen, NULL);
532c66b4d8dSRobert Watson 	if (error) {
533c66b4d8dSRobert Watson 		free(elements, M_MACTEMP);
534c66b4d8dSRobert Watson 		return (error);
535c66b4d8dSRobert Watson 	}
536c66b4d8dSRobert Watson 
537c66b4d8dSRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
538310e7cebSRobert Watson 	intlabel = mac_socket_label_alloc(M_WAITOK);
539310e7cebSRobert Watson 	SOCK_LOCK(so);
540310e7cebSRobert Watson 	mac_copy_socket_label(so->so_label, intlabel);
541310e7cebSRobert Watson 	SOCK_UNLOCK(so);
542310e7cebSRobert Watson 	error = mac_externalize_socket_label(intlabel, elements, buffer,
543310e7cebSRobert Watson 	    mac->m_buflen);
544310e7cebSRobert Watson 	mac_socket_label_free(intlabel);
545c66b4d8dSRobert Watson 	if (error == 0)
546c66b4d8dSRobert Watson 		error = copyout(buffer, mac->m_string, strlen(buffer)+1);
547c66b4d8dSRobert Watson 
548c66b4d8dSRobert Watson 	free(buffer, M_MACTEMP);
549c66b4d8dSRobert Watson 	free(elements, M_MACTEMP);
550c66b4d8dSRobert Watson 
551c66b4d8dSRobert Watson 	return (error);
552c66b4d8dSRobert Watson }
553c66b4d8dSRobert Watson 
554c66b4d8dSRobert Watson int
555c66b4d8dSRobert Watson mac_getsockopt_peerlabel(struct ucred *cred, struct socket *so,
556c66b4d8dSRobert Watson     struct mac *mac)
557c66b4d8dSRobert Watson {
558c66b4d8dSRobert Watson 	char *elements, *buffer;
559310e7cebSRobert Watson 	struct label *intlabel;
560c66b4d8dSRobert Watson 	int error;
561c66b4d8dSRobert Watson 
562c66b4d8dSRobert Watson 	error = mac_check_structmac_consistent(mac);
563c66b4d8dSRobert Watson 	if (error)
564c66b4d8dSRobert Watson 		return (error);
565c66b4d8dSRobert Watson 
566c66b4d8dSRobert Watson 	elements = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
567c66b4d8dSRobert Watson 	error = copyinstr(mac->m_string, elements, mac->m_buflen, NULL);
568c66b4d8dSRobert Watson 	if (error) {
569c66b4d8dSRobert Watson 		free(elements, M_MACTEMP);
570c66b4d8dSRobert Watson 		return (error);
571c66b4d8dSRobert Watson 	}
572c66b4d8dSRobert Watson 
573c66b4d8dSRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
574310e7cebSRobert Watson 	intlabel = mac_socket_label_alloc(M_WAITOK);
575310e7cebSRobert Watson 	SOCK_LOCK(so);
576310e7cebSRobert Watson 	mac_copy_socket_label(so->so_peerlabel, intlabel);
577310e7cebSRobert Watson 	SOCK_UNLOCK(so);
578310e7cebSRobert Watson 	error = mac_externalize_socket_peer_label(intlabel, elements, buffer,
579310e7cebSRobert Watson 	    mac->m_buflen);
580310e7cebSRobert Watson 	mac_socket_label_free(intlabel);
581c66b4d8dSRobert Watson 	if (error == 0)
582c66b4d8dSRobert Watson 		error = copyout(buffer, mac->m_string, strlen(buffer)+1);
583c66b4d8dSRobert Watson 
584c66b4d8dSRobert Watson 	free(buffer, M_MACTEMP);
585c66b4d8dSRobert Watson 	free(elements, M_MACTEMP);
586c66b4d8dSRobert Watson 
587c66b4d8dSRobert Watson 	return (error);
588c66b4d8dSRobert Watson }
589