From patchwork Tue Feb 8 22:28:27 2011 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Casey Schaufler X-Patchwork-Id: 82408 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 121AFB70E3 for ; Wed, 9 Feb 2011 09:28:55 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754736Ab1BHW2a (ORCPT ); Tue, 8 Feb 2011 17:28:30 -0500 Received: from smtp107.prem.mail.sp1.yahoo.com ([98.136.44.62]:39014 "HELO smtp107.prem.mail.sp1.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1754182Ab1BHW23 (ORCPT ); Tue, 8 Feb 2011 17:28:29 -0500 Received: (qmail 84279 invoked from network); 8 Feb 2011 22:28:28 -0000 Received: from [192.168.0.102] (casey@98.248.220.230 with plain) by smtp107.prem.mail.sp1.yahoo.com with SMTP; 08 Feb 2011 14:28:28 -0800 PST X-Yahoo-SMTP: OIJXglSswBDfgLtXluJ6wiAYv6_cnw-- X-YMail-OSG: ghrvZJgVM1nTwUM1XublQN5IFQmbf7h9ecFhWepmi3hoDIq xxD4wMkZrI5XSet2BkJYS4gJJ.aIey8nuxLMgWj8ktRXFWXi1.5lwmTQSugi DNGsdWDm04Oq6GDtMrdna8z_2UL8WsN3UX1AWu8s.RiH0if.lny8S5.hoZt0 LdZUeuMG1hB1tWcMl59iV.DI4G8UuIyDcGy7V0Yliuz.6AE5ovgSePAF.TiQ IlIqPrU_BydDf_hdTHFk6cNcxHdG0QEYgLoeUE7TgkJ.QrVrlRiNvtg73gW6 gyfqFKj7X0qjIZB9h1_kqoorGT6s- X-Yahoo-Newman-Property: ymail-3 Message-ID: <4D51C38B.1060902@schaufler-ca.com> Date: Tue, 08 Feb 2011 14:28:27 -0800 From: Casey Schaufler User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7 MIME-Version: 1.0 To: LKLM , netdev@vger.kernel.org CC: Casey Schaufler , "Sakkinen Jarkko.2 \(EXT-Tieto/Tampere\)" , Janne Karhunen , "Reshetova Elena \(Nokia-D/Helsinki\)" Subject: [PATCH] net: provide capability and group sets via SCM References: <4D3466BD.10500@schaufler-ca.com> In-Reply-To: <4D3466BD.10500@schaufler-ca.com> X-Enigmail-Version: 1.1.1 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Subject: [PATCH] net: provide group lists and capability set via CMSG Provide the namespace converted group list of the peer process using the SCM mechanism. Provide the capability set of the peer process. The capability set is not namespace converted on the assumption that there is no such conversion available or required. Signed-off-by: Casey Schaufler --- include/asm-generic/socket.h | 4 ++ include/linux/net.h | 2 + include/linux/socket.h | 18 +++++++++ include/net/scm.h | 33 +++++++++++++++++ net/core/sock.c | 82 ++++++++++++++++++++++++++++++++++++++++++ 5 files changed, 139 insertions(+), 0 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/include/asm-generic/socket.h b/include/asm-generic/socket.h index 9a6115e..fc2d609 100644 --- a/include/asm-generic/socket.h +++ b/include/asm-generic/socket.h @@ -64,4 +64,8 @@ #define SO_DOMAIN 39 #define SO_RXQ_OVFL 40 + +#define SO_PASSGROUPS 41 +#define SO_PASSCAPS 42 + #endif /* __ASM_GENERIC_SOCKET_H */ diff --git a/include/linux/net.h b/include/linux/net.h index 16faa13..929e241 100644 --- a/include/linux/net.h +++ b/include/linux/net.h @@ -71,6 +71,8 @@ struct net; #define SOCK_NOSPACE 2 #define SOCK_PASSCRED 3 #define SOCK_PASSSEC 4 +#define SOCK_PASSGROUPS 5 +#define SOCK_PASSCAPS 6 #ifndef ARCH_HAS_SOCKET_TYPES /** diff --git a/include/linux/socket.h b/include/linux/socket.h index edbb1d0..63f64f0 100644 --- a/include/linux/socket.h +++ b/include/linux/socket.h @@ -23,6 +23,7 @@ struct __kernel_sockaddr_storage { #include /* iovec support */ #include /* pid_t */ #include /* __user */ +#include /* _KERNEL_CAPABILITY_U32S */ struct pid; struct cred; @@ -145,6 +146,8 @@ static inline struct cmsghdr * cmsg_nxthdr (struct msghdr *__msg, struct cmsghdr #define SCM_RIGHTS 0x01 /* rw: access rights (array of int) */ #define SCM_CREDENTIALS 0x02 /* rw: struct ucred */ #define SCM_SECURITY 0x03 /* rw: security label */ +#define SCM_GROUPS 0x04 /* rw: group list */ +#define SCM_CAPS 0x05 /* rw: capability set */ struct ucred { __u32 pid; @@ -152,6 +155,16 @@ struct ucred { __u32 gid; }; +struct scm_groups { + __u32 count; + __u32 gids[0]; +}; + +struct scm_capabilities { + struct __user_cap_data_struct caps[_KERNEL_CAPABILITY_U32S]; +}; + + /* Supported address families. */ #define AF_UNSPEC 0 #define AF_UNIX 1 /* Unix domain sockets */ @@ -313,6 +326,11 @@ struct ucred { #define IPX_TYPE 1 extern void cred_to_ucred(struct pid *pid, const struct cred *cred, struct ucred *ucred); +extern void cred_to_scm_groups(const struct cred *cred, + struct scm_groups **sgp, int *size); +extern void cred_to_scm_capabilities(const struct cred *cred, + struct scm_capabilities **scp, + int *size); extern int memcpy_fromiovec(unsigned char *kdata, struct iovec *iov, int len); extern int memcpy_fromiovecend(unsigned char *kdata, const struct iovec *iov, diff --git a/include/net/scm.h b/include/net/scm.h index 745460f..b263867 100644 --- a/include/net/scm.h +++ b/include/net/scm.h @@ -102,6 +102,36 @@ static inline void scm_passec(struct socket *sock, struct msghdr *msg, struct sc { } #endif /* CONFIG_SECURITY_NETWORK */ +static inline void scm_passgroups(struct socket *sock, struct msghdr *msg, + struct scm_cookie *scm) +{ + struct scm_groups *data; + int size = 0; + + if (test_bit(SOCK_PASSGROUPS, &sock->flags)) { + cred_to_scm_groups(scm->cred, &data, &size); + if (size) { + put_cmsg(msg, SOL_SOCKET, SCM_GROUPS, size, data); + kfree(data); + } + } +} + +static inline void scm_passcaps(struct socket *sock, struct msghdr *msg, + struct scm_cookie *scm) +{ + struct scm_capabilities *data; + int size = 0; + + if (test_bit(SOCK_PASSCAPS, &sock->flags)) { + cred_to_scm_capabilities(scm->cred, &data, &size); + if (size) { + put_cmsg(msg, SOL_SOCKET, SCM_CAPS, size, data); + kfree(data); + } + } +} + static __inline__ void scm_recv(struct socket *sock, struct msghdr *msg, struct scm_cookie *scm, int flags) { @@ -115,6 +145,9 @@ static __inline__ void scm_recv(struct socket *sock, struct msghdr *msg, if (test_bit(SOCK_PASSCRED, &sock->flags)) put_cmsg(msg, SOL_SOCKET, SCM_CREDENTIALS, sizeof(scm->creds), &scm->creds); + scm_passgroups(sock, msg, scm); + scm_passcaps(sock, msg, scm); + scm_destroy_cred(scm); scm_passec(sock, msg, scm); diff --git a/net/core/sock.c b/net/core/sock.c index 7dfed79..80eb5d7 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -648,6 +648,20 @@ set_rcvbuf: clear_bit(SOCK_PASSCRED, &sock->flags); break; + case SO_PASSGROUPS: + if (valbool) + set_bit(SOCK_PASSGROUPS, &sock->flags); + else + clear_bit(SOCK_PASSGROUPS, &sock->flags); + break; + + case SO_PASSCAPS: + if (valbool) + set_bit(SOCK_PASSCAPS, &sock->flags); + else + clear_bit(SOCK_PASSCAPS, &sock->flags); + break; + case SO_TIMESTAMP: case SO_TIMESTAMPNS: if (valbool) { @@ -764,6 +778,66 @@ void cred_to_ucred(struct pid *pid, const struct cred *cred, } EXPORT_SYMBOL_GPL(cred_to_ucred); +void cred_to_scm_groups(const struct cred *cred, + struct scm_groups **scm_groups, int *size) +{ + struct user_namespace *current_ns; + struct scm_groups *sgp; + struct group_info *gip; + int bytes; + int i; + + if (!cred || !scm_groups) + return; + + gip = cred->group_info; + if (gip == NULL) + return; + + bytes = sizeof(struct scm_groups) + gip->ngroups * sizeof(__u32); + sgp = kmalloc(bytes, GFP_KERNEL); + if (sgp == NULL) { + *scm_groups = NULL; + *size = 0; + return; + } + + current_ns = current_user_ns(); + + for (i = 0 ; i < gip->ngroups; i++) + sgp->gids[i] = user_ns_map_gid(current_ns, cred, + GROUP_AT(gip, i)); + sgp->count = gip->ngroups; + *scm_groups = sgp; + *size = bytes; +} +EXPORT_SYMBOL_GPL(cred_to_scm_groups); + +void cred_to_scm_capabilities(const struct cred *cred, + struct scm_capabilities **scm_caps, int *size) +{ + struct scm_capabilities *scp; + int i; + + if (!cred || !scm_caps) + return; + + scp = kmalloc(sizeof(struct scm_capabilities), GFP_KERNEL); + if (!scp) { + *scm_caps = NULL; + *size = 0; + return; + } + for (i = 0; i < _LINUX_CAPABILITY_U32S_3; i++) { + scp->caps[i].permitted = cred->cap_permitted.cap[i]; + scp->caps[i].effective = cred->cap_effective.cap[i]; + scp->caps[i].inheritable = cred->cap_inheritable.cap[i]; + } + *scm_caps = scp; + *size = sizeof(struct scm_capabilities); +} +EXPORT_SYMBOL_GPL(cred_to_scm_capabilities); + int sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) { @@ -915,6 +989,14 @@ int sock_getsockopt(struct socket *sock, int level, int optname, v.val = test_bit(SOCK_PASSCRED, &sock->flags) ? 1 : 0; break; + case SO_PASSGROUPS: + v.val = test_bit(SOCK_PASSGROUPS, &sock->flags) ? 1 : 0; + break; + + case SO_PASSCAPS: + v.val = test_bit(SOCK_PASSCAPS, &sock->flags) ? 1 : 0; + break; + case SO_PEERCRED: { struct ucred peercred;