Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security layer updates from James Morris: - a major update for AppArmor. From JJ: * several bug fixes and cleanups * the patch to add symlink support to securityfs that was floated on the list earlier and the apparmorfs changes that make use of securityfs symlinks * it introduces the domain labeling base code that Ubuntu has been carrying for several years, with several cleanups applied. And it converts the current mediation over to using the domain labeling base, which brings domain stacking support with it. This finally will bring the base upstream code in line with Ubuntu and provide a base to upstream the new feature work that Ubuntu carries. * This does _not_ contain any of the newer apparmor mediation features/controls (mount, signals, network, keys, ...) that Ubuntu is currently carrying, all of which will be RFC'd on top of this. - Notable also is the Infiniband work in SELinux, and the new file:map permission. From Paul: "While we're down to 21 patches for v4.13 (it was 31 for v4.12), the diffstat jumps up tremendously with over 2k of line changes. Almost all of these changes are the SELinux/IB work done by Daniel Jurgens; some other noteworthy changes include a NFS v4.2 labeling fix, a new file:map permission, and reporting of policy capabilities on policy load" There's also now genfscon labeling support for tracefs, which was lost in v4.1 with the separation from debugfs. - Smack incorporates a safer socket check in file_receive, and adds a cap_capable call in privilege check. - TPM as usual has a bunch of fixes and enhancements. - Multiple calls to security_add_hooks() can now be made for the same LSM, to allow LSMs to have hook declarations across multiple files. - IMA now supports different "ima_appraise=" modes (eg. log, fix) from the boot command line. * 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (126 commits) apparmor: put back designators in struct initialisers seccomp: Switch from atomic_t to recount_t seccomp: Adjust selftests to avoid double-join seccomp: Clean up core dump logic IMA: update IMA policy documentation to include pcr= option ima: Log the same audit cause whenever a file has no signature ima: Simplify policy_func_show. integrity: Small code improvements ima: fix get_binary_runtime_size() ima: use ima_parse_buf() to parse template data ima: use ima_parse_buf() to parse measurements headers ima: introduce ima_parse_buf() ima: Add cgroups2 to the defaults list ima: use memdup_user_nul ima: fix up #endif comments IMA: Correct Kconfig dependencies for hash selection ima: define is_ima_appraise_enabled() ima: define Kconfig IMA_APPRAISE_BOOTPARAM option ima: define a set of appraisal rules requiring file signatures ima: extend the "ima_policy" boot command line to support multiple policies ...
This commit is contained in:
commit
e24dd9ee53
101 changed files with 9945 additions and 2438 deletions
|
@ -34,9 +34,10 @@ Description:
|
|||
fsuuid:= file system UUID (e.g 8bcbe394-4f13-4144-be8e-5aa9ea2ce2f6)
|
||||
uid:= decimal value
|
||||
euid:= decimal value
|
||||
fowner:=decimal value
|
||||
fowner:= decimal value
|
||||
lsm: are LSM specific
|
||||
option: appraise_type:= [imasig]
|
||||
pcr:= decimal value
|
||||
|
||||
default policy:
|
||||
# PROC_SUPER_MAGIC
|
||||
|
@ -96,3 +97,8 @@ Description:
|
|||
|
||||
Smack:
|
||||
measure subj_user=_ func=FILE_CHECK mask=MAY_READ
|
||||
|
||||
Example of measure rules using alternate PCRs:
|
||||
|
||||
measure func=KEXEC_KERNEL_CHECK pcr=4
|
||||
measure func=KEXEC_INITRAMFS_CHECK pcr=5
|
||||
|
|
|
@ -1501,12 +1501,21 @@
|
|||
in crypto/hash_info.h.
|
||||
|
||||
ima_policy= [IMA]
|
||||
The builtin measurement policy to load during IMA
|
||||
setup. Specyfing "tcb" as the value, measures all
|
||||
programs exec'd, files mmap'd for exec, and all files
|
||||
opened with the read mode bit set by either the
|
||||
effective uid (euid=0) or uid=0.
|
||||
Format: "tcb"
|
||||
The builtin policies to load during IMA setup.
|
||||
Format: "tcb | appraise_tcb | secure_boot"
|
||||
|
||||
The "tcb" policy measures all programs exec'd, files
|
||||
mmap'd for exec, and all files opened with the read
|
||||
mode bit set by either the effective uid (euid=0) or
|
||||
uid=0.
|
||||
|
||||
The "appraise_tcb" policy appraises the integrity of
|
||||
all files owned by root. (This is the equivalent
|
||||
of ima_appraise_tcb.)
|
||||
|
||||
The "secure_boot" policy appraises the integrity
|
||||
of files (eg. kexec kernel image, kernel modules,
|
||||
firmware, policy, etc) based on file signatures.
|
||||
|
||||
ima_tcb [IMA] Deprecated. Use ima_policy= instead.
|
||||
Load a policy which meets the needs of the Trusted
|
||||
|
|
|
@ -127,7 +127,7 @@ static int st33zp24_i2c_acpi_request_resources(struct i2c_client *client)
|
|||
struct device *dev = &client->dev;
|
||||
int ret;
|
||||
|
||||
ret = acpi_dev_add_driver_gpios(ACPI_COMPANION(dev), acpi_st33zp24_gpios);
|
||||
ret = devm_acpi_dev_add_driver_gpios(dev, acpi_st33zp24_gpios);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
|
@ -285,7 +285,6 @@ static int st33zp24_i2c_remove(struct i2c_client *client)
|
|||
if (ret)
|
||||
return ret;
|
||||
|
||||
acpi_dev_remove_driver_gpios(ACPI_COMPANION(&client->dev));
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
|
|
@ -246,7 +246,7 @@ static int st33zp24_spi_acpi_request_resources(struct spi_device *spi_dev)
|
|||
struct device *dev = &spi_dev->dev;
|
||||
int ret;
|
||||
|
||||
ret = acpi_dev_add_driver_gpios(ACPI_COMPANION(dev), acpi_st33zp24_gpios);
|
||||
ret = devm_acpi_dev_add_driver_gpios(dev, acpi_st33zp24_gpios);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
|
@ -402,7 +402,6 @@ static int st33zp24_spi_remove(struct spi_device *dev)
|
|||
if (ret)
|
||||
return ret;
|
||||
|
||||
acpi_dev_remove_driver_gpios(ACPI_COMPANION(&dev->dev));
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
|
|
@ -416,7 +416,8 @@ ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space,
|
|||
/* Store the decision as chip->locality will be changed. */
|
||||
need_locality = chip->locality == -1;
|
||||
|
||||
if (need_locality && chip->ops->request_locality) {
|
||||
if (!(flags & TPM_TRANSMIT_RAW) &&
|
||||
need_locality && chip->ops->request_locality) {
|
||||
rc = chip->ops->request_locality(chip, 0);
|
||||
if (rc < 0)
|
||||
goto out_no_locality;
|
||||
|
@ -429,8 +430,9 @@ ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space,
|
|||
|
||||
rc = chip->ops->send(chip, (u8 *) buf, count);
|
||||
if (rc < 0) {
|
||||
dev_err(&chip->dev,
|
||||
"tpm_transmit: tpm_send: error %d\n", rc);
|
||||
if (rc != -EPIPE)
|
||||
dev_err(&chip->dev,
|
||||
"%s: tpm_send: error %d\n", __func__, rc);
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
@ -536,59 +538,62 @@ ssize_t tpm_transmit_cmd(struct tpm_chip *chip, struct tpm_space *space,
|
|||
|
||||
return 0;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(tpm_transmit_cmd);
|
||||
|
||||
#define TPM_DIGEST_SIZE 20
|
||||
#define TPM_RET_CODE_IDX 6
|
||||
#define TPM_INTERNAL_RESULT_SIZE 200
|
||||
#define TPM_ORD_GET_CAP cpu_to_be32(101)
|
||||
#define TPM_ORD_GET_RANDOM cpu_to_be32(70)
|
||||
#define TPM_ORD_GET_CAP 101
|
||||
#define TPM_ORD_GET_RANDOM 70
|
||||
|
||||
static const struct tpm_input_header tpm_getcap_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(22),
|
||||
.ordinal = TPM_ORD_GET_CAP
|
||||
.ordinal = cpu_to_be32(TPM_ORD_GET_CAP)
|
||||
};
|
||||
|
||||
ssize_t tpm_getcap(struct tpm_chip *chip, u32 subcap_id, cap_t *cap,
|
||||
const char *desc, size_t min_cap_length)
|
||||
{
|
||||
struct tpm_cmd_t tpm_cmd;
|
||||
struct tpm_buf buf;
|
||||
int rc;
|
||||
|
||||
tpm_cmd.header.in = tpm_getcap_header;
|
||||
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_GET_CAP);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
if (subcap_id == TPM_CAP_VERSION_1_1 ||
|
||||
subcap_id == TPM_CAP_VERSION_1_2) {
|
||||
tpm_cmd.params.getcap_in.cap = cpu_to_be32(subcap_id);
|
||||
/*subcap field not necessary */
|
||||
tpm_cmd.params.getcap_in.subcap_size = cpu_to_be32(0);
|
||||
tpm_cmd.header.in.length -= cpu_to_be32(sizeof(__be32));
|
||||
tpm_buf_append_u32(&buf, subcap_id);
|
||||
tpm_buf_append_u32(&buf, 0);
|
||||
} else {
|
||||
if (subcap_id == TPM_CAP_FLAG_PERM ||
|
||||
subcap_id == TPM_CAP_FLAG_VOL)
|
||||
tpm_cmd.params.getcap_in.cap =
|
||||
cpu_to_be32(TPM_CAP_FLAG);
|
||||
tpm_buf_append_u32(&buf, TPM_CAP_FLAG);
|
||||
else
|
||||
tpm_cmd.params.getcap_in.cap =
|
||||
cpu_to_be32(TPM_CAP_PROP);
|
||||
tpm_cmd.params.getcap_in.subcap_size = cpu_to_be32(4);
|
||||
tpm_cmd.params.getcap_in.subcap = cpu_to_be32(subcap_id);
|
||||
tpm_buf_append_u32(&buf, TPM_CAP_PROP);
|
||||
|
||||
tpm_buf_append_u32(&buf, 4);
|
||||
tpm_buf_append_u32(&buf, subcap_id);
|
||||
}
|
||||
rc = tpm_transmit_cmd(chip, NULL, &tpm_cmd, TPM_INTERNAL_RESULT_SIZE,
|
||||
rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE,
|
||||
min_cap_length, 0, desc);
|
||||
if (!rc)
|
||||
*cap = tpm_cmd.params.getcap_out.cap;
|
||||
*cap = *(cap_t *)&buf.data[TPM_HEADER_SIZE + 4];
|
||||
|
||||
tpm_buf_destroy(&buf);
|
||||
return rc;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(tpm_getcap);
|
||||
|
||||
#define TPM_ORD_STARTUP cpu_to_be32(153)
|
||||
#define TPM_ORD_STARTUP 153
|
||||
#define TPM_ST_CLEAR cpu_to_be16(1)
|
||||
#define TPM_ST_STATE cpu_to_be16(2)
|
||||
#define TPM_ST_DEACTIVATED cpu_to_be16(3)
|
||||
static const struct tpm_input_header tpm_startup_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(12),
|
||||
.ordinal = TPM_ORD_STARTUP
|
||||
.ordinal = cpu_to_be32(TPM_ORD_STARTUP)
|
||||
};
|
||||
|
||||
static int tpm_startup(struct tpm_chip *chip, __be16 startup_type)
|
||||
|
@ -737,7 +742,7 @@ EXPORT_SYMBOL_GPL(tpm_get_timeouts);
|
|||
#define CONTINUE_SELFTEST_RESULT_SIZE 10
|
||||
|
||||
static const struct tpm_input_header continue_selftest_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(10),
|
||||
.ordinal = cpu_to_be32(TPM_ORD_CONTINUE_SELFTEST),
|
||||
};
|
||||
|
@ -760,13 +765,13 @@ static int tpm_continue_selftest(struct tpm_chip *chip)
|
|||
return rc;
|
||||
}
|
||||
|
||||
#define TPM_ORDINAL_PCRREAD cpu_to_be32(21)
|
||||
#define TPM_ORDINAL_PCRREAD 21
|
||||
#define READ_PCR_RESULT_SIZE 30
|
||||
#define READ_PCR_RESULT_BODY_SIZE 20
|
||||
static const struct tpm_input_header pcrread_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(14),
|
||||
.ordinal = TPM_ORDINAL_PCRREAD
|
||||
.ordinal = cpu_to_be32(TPM_ORDINAL_PCRREAD)
|
||||
};
|
||||
|
||||
int tpm_pcr_read_dev(struct tpm_chip *chip, int pcr_idx, u8 *res_buf)
|
||||
|
@ -838,15 +843,34 @@ int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf)
|
|||
}
|
||||
EXPORT_SYMBOL_GPL(tpm_pcr_read);
|
||||
|
||||
#define TPM_ORD_PCR_EXTEND cpu_to_be32(20)
|
||||
#define TPM_ORD_PCR_EXTEND 20
|
||||
#define EXTEND_PCR_RESULT_SIZE 34
|
||||
#define EXTEND_PCR_RESULT_BODY_SIZE 20
|
||||
static const struct tpm_input_header pcrextend_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(34),
|
||||
.ordinal = TPM_ORD_PCR_EXTEND
|
||||
.ordinal = cpu_to_be32(TPM_ORD_PCR_EXTEND)
|
||||
};
|
||||
|
||||
static int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash,
|
||||
char *log_msg)
|
||||
{
|
||||
struct tpm_buf buf;
|
||||
int rc;
|
||||
|
||||
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_PCR_EXTEND);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
tpm_buf_append_u32(&buf, pcr_idx);
|
||||
tpm_buf_append(&buf, hash, TPM_DIGEST_SIZE);
|
||||
|
||||
rc = tpm_transmit_cmd(chip, NULL, buf.data, EXTEND_PCR_RESULT_SIZE,
|
||||
EXTEND_PCR_RESULT_BODY_SIZE, 0, log_msg);
|
||||
tpm_buf_destroy(&buf);
|
||||
return rc;
|
||||
}
|
||||
|
||||
/**
|
||||
* tpm_pcr_extend - extend pcr value with hash
|
||||
* @chip_num: tpm idx # or AN&
|
||||
|
@ -859,7 +883,6 @@ static const struct tpm_input_header pcrextend_header = {
|
|||
*/
|
||||
int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash)
|
||||
{
|
||||
struct tpm_cmd_t cmd;
|
||||
int rc;
|
||||
struct tpm_chip *chip;
|
||||
struct tpm2_digest digest_list[ARRAY_SIZE(chip->active_banks)];
|
||||
|
@ -885,13 +908,8 @@ int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash)
|
|||
return rc;
|
||||
}
|
||||
|
||||
cmd.header.in = pcrextend_header;
|
||||
cmd.params.pcrextend_in.pcr_idx = cpu_to_be32(pcr_idx);
|
||||
memcpy(cmd.params.pcrextend_in.hash, hash, TPM_DIGEST_SIZE);
|
||||
rc = tpm_transmit_cmd(chip, NULL, &cmd, EXTEND_PCR_RESULT_SIZE,
|
||||
EXTEND_PCR_RESULT_BODY_SIZE, 0,
|
||||
"attempting extend a PCR value");
|
||||
|
||||
rc = tpm1_pcr_extend(chip, pcr_idx, hash,
|
||||
"attempting extend a PCR value");
|
||||
tpm_put_ops(chip);
|
||||
return rc;
|
||||
}
|
||||
|
@ -1060,13 +1078,13 @@ again:
|
|||
}
|
||||
EXPORT_SYMBOL_GPL(wait_for_tpm_stat);
|
||||
|
||||
#define TPM_ORD_SAVESTATE cpu_to_be32(152)
|
||||
#define TPM_ORD_SAVESTATE 152
|
||||
#define SAVESTATE_RESULT_SIZE 10
|
||||
|
||||
static const struct tpm_input_header savestate_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(10),
|
||||
.ordinal = TPM_ORD_SAVESTATE
|
||||
.ordinal = cpu_to_be32(TPM_ORD_SAVESTATE)
|
||||
};
|
||||
|
||||
/*
|
||||
|
@ -1090,15 +1108,9 @@ int tpm_pm_suspend(struct device *dev)
|
|||
}
|
||||
|
||||
/* for buggy tpm, flush pcrs with extend to selected dummy */
|
||||
if (tpm_suspend_pcr) {
|
||||
cmd.header.in = pcrextend_header;
|
||||
cmd.params.pcrextend_in.pcr_idx = cpu_to_be32(tpm_suspend_pcr);
|
||||
memcpy(cmd.params.pcrextend_in.hash, dummy_hash,
|
||||
TPM_DIGEST_SIZE);
|
||||
rc = tpm_transmit_cmd(chip, NULL, &cmd, EXTEND_PCR_RESULT_SIZE,
|
||||
EXTEND_PCR_RESULT_BODY_SIZE, 0,
|
||||
"extending dummy pcr before suspend");
|
||||
}
|
||||
if (tpm_suspend_pcr)
|
||||
rc = tpm1_pcr_extend(chip, tpm_suspend_pcr, dummy_hash,
|
||||
"extending dummy pcr before suspend");
|
||||
|
||||
/* now do the actual savestate */
|
||||
for (try = 0; try < TPM_RETRY; try++) {
|
||||
|
@ -1149,9 +1161,9 @@ EXPORT_SYMBOL_GPL(tpm_pm_resume);
|
|||
|
||||
#define TPM_GETRANDOM_RESULT_SIZE 18
|
||||
static const struct tpm_input_header tpm_getrandom_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(14),
|
||||
.ordinal = TPM_ORD_GET_RANDOM
|
||||
.ordinal = cpu_to_be32(TPM_ORD_GET_RANDOM)
|
||||
};
|
||||
|
||||
/**
|
||||
|
|
|
@ -22,11 +22,11 @@
|
|||
|
||||
#define READ_PUBEK_RESULT_SIZE 314
|
||||
#define READ_PUBEK_RESULT_MIN_BODY_SIZE (28 + 256)
|
||||
#define TPM_ORD_READPUBEK cpu_to_be32(124)
|
||||
#define TPM_ORD_READPUBEK 124
|
||||
static const struct tpm_input_header tpm_readpubek_header = {
|
||||
.tag = TPM_TAG_RQU_COMMAND,
|
||||
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
||||
.length = cpu_to_be32(30),
|
||||
.ordinal = TPM_ORD_READPUBEK
|
||||
.ordinal = cpu_to_be32(TPM_ORD_READPUBEK)
|
||||
};
|
||||
static ssize_t pubek_show(struct device *dev, struct device_attribute *attr,
|
||||
char *buf)
|
||||
|
|
|
@ -247,7 +247,7 @@ struct tpm_output_header {
|
|||
__be32 return_code;
|
||||
} __packed;
|
||||
|
||||
#define TPM_TAG_RQU_COMMAND cpu_to_be16(193)
|
||||
#define TPM_TAG_RQU_COMMAND 193
|
||||
|
||||
struct stclear_flags_t {
|
||||
__be16 tag;
|
||||
|
@ -339,17 +339,6 @@ enum tpm_sub_capabilities {
|
|||
TPM_CAP_PROP_TIS_DURATION = 0x120,
|
||||
};
|
||||
|
||||
struct tpm_getcap_params_in {
|
||||
__be32 cap;
|
||||
__be32 subcap_size;
|
||||
__be32 subcap;
|
||||
} __packed;
|
||||
|
||||
struct tpm_getcap_params_out {
|
||||
__be32 cap_size;
|
||||
cap_t cap;
|
||||
} __packed;
|
||||
|
||||
struct tpm_readpubek_params_out {
|
||||
u8 algorithm[4];
|
||||
u8 encscheme[2];
|
||||
|
@ -374,11 +363,6 @@ struct tpm_pcrread_in {
|
|||
__be32 pcr_idx;
|
||||
} __packed;
|
||||
|
||||
struct tpm_pcrextend_in {
|
||||
__be32 pcr_idx;
|
||||
u8 hash[TPM_DIGEST_SIZE];
|
||||
} __packed;
|
||||
|
||||
/* 128 bytes is an arbitrary cap. This could be as large as TPM_BUFSIZE - 18
|
||||
* bytes, but 128 is still a relatively large number of random bytes and
|
||||
* anything much bigger causes users of struct tpm_cmd_t to start getting
|
||||
|
@ -399,13 +383,10 @@ struct tpm_startup_in {
|
|||
} __packed;
|
||||
|
||||
typedef union {
|
||||
struct tpm_getcap_params_out getcap_out;
|
||||
struct tpm_readpubek_params_out readpubek_out;
|
||||
u8 readpubek_out_buffer[sizeof(struct tpm_readpubek_params_out)];
|
||||
struct tpm_getcap_params_in getcap_in;
|
||||
struct tpm_pcrread_in pcrread_in;
|
||||
struct tpm_pcrread_out pcrread_out;
|
||||
struct tpm_pcrextend_in pcrextend_in;
|
||||
struct tpm_getrandom_in getrandom_in;
|
||||
struct tpm_getrandom_out getrandom_out;
|
||||
struct tpm_startup_in startup_in;
|
||||
|
@ -525,6 +506,7 @@ extern struct idr dev_nums_idr;
|
|||
|
||||
enum tpm_transmit_flags {
|
||||
TPM_TRANSMIT_UNLOCKED = BIT(0),
|
||||
TPM_TRANSMIT_RAW = BIT(1),
|
||||
};
|
||||
|
||||
ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space,
|
||||
|
|
|
@ -840,7 +840,7 @@ void tpm2_shutdown(struct tpm_chip *chip, u16 shutdown_type)
|
|||
/* In places where shutdown command is sent there's no much we can do
|
||||
* except print the error code on a system failure.
|
||||
*/
|
||||
if (rc < 0)
|
||||
if (rc < 0 && rc != -EPIPE)
|
||||
dev_warn(&chip->dev, "transmit returned %d while stopping the TPM",
|
||||
rc);
|
||||
}
|
||||
|
|
|
@ -144,13 +144,11 @@ static void atml_plat_remove(void)
|
|||
struct tpm_chip *chip = dev_get_drvdata(&pdev->dev);
|
||||
struct tpm_atmel_priv *priv = dev_get_drvdata(&chip->dev);
|
||||
|
||||
if (chip) {
|
||||
tpm_chip_unregister(chip);
|
||||
if (priv->have_region)
|
||||
atmel_release_region(priv->base, priv->region_size);
|
||||
atmel_put_base_addr(priv->iobase);
|
||||
platform_device_unregister(pdev);
|
||||
}
|
||||
tpm_chip_unregister(chip);
|
||||
if (priv->have_region)
|
||||
atmel_release_region(priv->base, priv->region_size);
|
||||
atmel_put_base_addr(priv->iobase);
|
||||
platform_device_unregister(pdev);
|
||||
}
|
||||
|
||||
static SIMPLE_DEV_PM_OPS(tpm_atml_pm, tpm_pm_suspend, tpm_pm_resume);
|
||||
|
|
|
@ -70,6 +70,7 @@ struct tpm_inf_dev {
|
|||
u8 buf[TPM_BUFSIZE + sizeof(u8)]; /* max. buffer size + addr */
|
||||
struct tpm_chip *chip;
|
||||
enum i2c_chip_type chip_type;
|
||||
unsigned int adapterlimit;
|
||||
};
|
||||
|
||||
static struct tpm_inf_dev tpm_dev;
|
||||
|
@ -111,6 +112,7 @@ static int iic_tpm_read(u8 addr, u8 *buffer, size_t len)
|
|||
|
||||
int rc = 0;
|
||||
int count;
|
||||
unsigned int msglen = len;
|
||||
|
||||
/* Lock the adapter for the duration of the whole sequence. */
|
||||
if (!tpm_dev.client->adapter->algo->master_xfer)
|
||||
|
@ -131,27 +133,61 @@ static int iic_tpm_read(u8 addr, u8 *buffer, size_t len)
|
|||
usleep_range(SLEEP_DURATION_LOW, SLEEP_DURATION_HI);
|
||||
}
|
||||
} else {
|
||||
/* slb9635 protocol should work in all cases */
|
||||
for (count = 0; count < MAX_COUNT; count++) {
|
||||
rc = __i2c_transfer(tpm_dev.client->adapter, &msg1, 1);
|
||||
if (rc > 0)
|
||||
break; /* break here to skip sleep */
|
||||
|
||||
usleep_range(SLEEP_DURATION_LOW, SLEEP_DURATION_HI);
|
||||
}
|
||||
|
||||
if (rc <= 0)
|
||||
goto out;
|
||||
|
||||
/* After the TPM has successfully received the register address
|
||||
* it needs some time, thus we're sleeping here again, before
|
||||
* retrieving the data
|
||||
/* Expect to send one command message and one data message, but
|
||||
* support looping over each or both if necessary.
|
||||
*/
|
||||
for (count = 0; count < MAX_COUNT; count++) {
|
||||
usleep_range(SLEEP_DURATION_LOW, SLEEP_DURATION_HI);
|
||||
rc = __i2c_transfer(tpm_dev.client->adapter, &msg2, 1);
|
||||
if (rc > 0)
|
||||
break;
|
||||
while (len > 0) {
|
||||
/* slb9635 protocol should work in all cases */
|
||||
for (count = 0; count < MAX_COUNT; count++) {
|
||||
rc = __i2c_transfer(tpm_dev.client->adapter,
|
||||
&msg1, 1);
|
||||
if (rc > 0)
|
||||
break; /* break here to skip sleep */
|
||||
|
||||
usleep_range(SLEEP_DURATION_LOW,
|
||||
SLEEP_DURATION_HI);
|
||||
}
|
||||
|
||||
if (rc <= 0)
|
||||
goto out;
|
||||
|
||||
/* After the TPM has successfully received the register
|
||||
* address it needs some time, thus we're sleeping here
|
||||
* again, before retrieving the data
|
||||
*/
|
||||
for (count = 0; count < MAX_COUNT; count++) {
|
||||
if (tpm_dev.adapterlimit) {
|
||||
msglen = min_t(unsigned int,
|
||||
tpm_dev.adapterlimit,
|
||||
len);
|
||||
msg2.len = msglen;
|
||||
}
|
||||
usleep_range(SLEEP_DURATION_LOW,
|
||||
SLEEP_DURATION_HI);
|
||||
rc = __i2c_transfer(tpm_dev.client->adapter,
|
||||
&msg2, 1);
|
||||
if (rc > 0) {
|
||||
/* Since len is unsigned, make doubly
|
||||
* sure we do not underflow it.
|
||||
*/
|
||||
if (msglen > len)
|
||||
len = 0;
|
||||
else
|
||||
len -= msglen;
|
||||
msg2.buf += msglen;
|
||||
break;
|
||||
}
|
||||
/* If the I2C adapter rejected the request (e.g
|
||||
* when the quirk read_max_len < len) fall back
|
||||
* to a sane minimum value and try again.
|
||||
*/
|
||||
if (rc == -EOPNOTSUPP)
|
||||
tpm_dev.adapterlimit =
|
||||
I2C_SMBUS_BLOCK_MAX;
|
||||
}
|
||||
|
||||
if (rc <= 0)
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -397,7 +397,7 @@ static int tpm_inf_pnp_probe(struct pnp_dev *dev,
|
|||
int vendorid[2];
|
||||
int version[2];
|
||||
int productid[2];
|
||||
char chipname[20];
|
||||
const char *chipname;
|
||||
struct tpm_chip *chip;
|
||||
|
||||
/* read IO-ports through PnP */
|
||||
|
@ -488,13 +488,13 @@ static int tpm_inf_pnp_probe(struct pnp_dev *dev,
|
|||
|
||||
switch ((productid[0] << 8) | productid[1]) {
|
||||
case 6:
|
||||
snprintf(chipname, sizeof(chipname), " (SLD 9630 TT 1.1)");
|
||||
chipname = " (SLD 9630 TT 1.1)";
|
||||
break;
|
||||
case 11:
|
||||
snprintf(chipname, sizeof(chipname), " (SLB 9635 TT 1.2)");
|
||||
chipname = " (SLB 9635 TT 1.2)";
|
||||
break;
|
||||
default:
|
||||
snprintf(chipname, sizeof(chipname), " (unknown chip)");
|
||||
chipname = " (unknown chip)";
|
||||
break;
|
||||
}
|
||||
|
||||
|
|
|
@ -80,6 +80,8 @@ static int has_hid(struct acpi_device *dev, const char *hid)
|
|||
|
||||
static inline int is_itpm(struct acpi_device *dev)
|
||||
{
|
||||
if (!dev)
|
||||
return 0;
|
||||
return has_hid(dev, "INTC0102");
|
||||
}
|
||||
#else
|
||||
|
@ -89,6 +91,47 @@ static inline int is_itpm(struct acpi_device *dev)
|
|||
}
|
||||
#endif
|
||||
|
||||
#if defined(CONFIG_ACPI)
|
||||
#define DEVICE_IS_TPM2 1
|
||||
|
||||
static const struct acpi_device_id tpm_acpi_tbl[] = {
|
||||
{"MSFT0101", DEVICE_IS_TPM2},
|
||||
{},
|
||||
};
|
||||
MODULE_DEVICE_TABLE(acpi, tpm_acpi_tbl);
|
||||
|
||||
static int check_acpi_tpm2(struct device *dev)
|
||||
{
|
||||
const struct acpi_device_id *aid = acpi_match_device(tpm_acpi_tbl, dev);
|
||||
struct acpi_table_tpm2 *tbl;
|
||||
acpi_status st;
|
||||
|
||||
if (!aid || aid->driver_data != DEVICE_IS_TPM2)
|
||||
return 0;
|
||||
|
||||
/* If the ACPI TPM2 signature is matched then a global ACPI_SIG_TPM2
|
||||
* table is mandatory
|
||||
*/
|
||||
st =
|
||||
acpi_get_table(ACPI_SIG_TPM2, 1, (struct acpi_table_header **)&tbl);
|
||||
if (ACPI_FAILURE(st) || tbl->header.length < sizeof(*tbl)) {
|
||||
dev_err(dev, FW_BUG "failed to get TPM2 ACPI table\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* The tpm2_crb driver handles this device */
|
||||
if (tbl->start_method != ACPI_TPM2_MEMORY_MAPPED)
|
||||
return -ENODEV;
|
||||
|
||||
return 0;
|
||||
}
|
||||
#else
|
||||
static int check_acpi_tpm2(struct device *dev)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
static int tpm_tcg_read_bytes(struct tpm_tis_data *data, u32 addr, u16 len,
|
||||
u8 *result)
|
||||
{
|
||||
|
@ -141,11 +184,15 @@ static const struct tpm_tis_phy_ops tpm_tcg = {
|
|||
.write32 = tpm_tcg_write32,
|
||||
};
|
||||
|
||||
static int tpm_tis_init(struct device *dev, struct tpm_info *tpm_info,
|
||||
acpi_handle acpi_dev_handle)
|
||||
static int tpm_tis_init(struct device *dev, struct tpm_info *tpm_info)
|
||||
{
|
||||
struct tpm_tis_tcg_phy *phy;
|
||||
int irq = -1;
|
||||
int rc;
|
||||
|
||||
rc = check_acpi_tpm2(dev);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
phy = devm_kzalloc(dev, sizeof(struct tpm_tis_tcg_phy), GFP_KERNEL);
|
||||
if (phy == NULL)
|
||||
|
@ -158,11 +205,11 @@ static int tpm_tis_init(struct device *dev, struct tpm_info *tpm_info,
|
|||
if (interrupts)
|
||||
irq = tpm_info->irq;
|
||||
|
||||
if (itpm)
|
||||
if (itpm || is_itpm(ACPI_COMPANION(dev)))
|
||||
phy->priv.flags |= TPM_TIS_ITPM_WORKAROUND;
|
||||
|
||||
return tpm_tis_core_init(dev, &phy->priv, irq, &tpm_tcg,
|
||||
acpi_dev_handle);
|
||||
ACPI_HANDLE(dev));
|
||||
}
|
||||
|
||||
static SIMPLE_DEV_PM_OPS(tpm_tis_pm, tpm_pm_suspend, tpm_tis_resume);
|
||||
|
@ -171,7 +218,6 @@ static int tpm_tis_pnp_init(struct pnp_dev *pnp_dev,
|
|||
const struct pnp_device_id *pnp_id)
|
||||
{
|
||||
struct tpm_info tpm_info = {};
|
||||
acpi_handle acpi_dev_handle = NULL;
|
||||
struct resource *res;
|
||||
|
||||
res = pnp_get_resource(pnp_dev, IORESOURCE_MEM, 0);
|
||||
|
@ -184,14 +230,7 @@ static int tpm_tis_pnp_init(struct pnp_dev *pnp_dev,
|
|||
else
|
||||
tpm_info.irq = -1;
|
||||
|
||||
if (pnp_acpi_device(pnp_dev)) {
|
||||
if (is_itpm(pnp_acpi_device(pnp_dev)))
|
||||
itpm = true;
|
||||
|
||||
acpi_dev_handle = ACPI_HANDLE(&pnp_dev->dev);
|
||||
}
|
||||
|
||||
return tpm_tis_init(&pnp_dev->dev, &tpm_info, acpi_dev_handle);
|
||||
return tpm_tis_init(&pnp_dev->dev, &tpm_info);
|
||||
}
|
||||
|
||||
static struct pnp_device_id tpm_pnp_tbl[] = {
|
||||
|
@ -231,93 +270,6 @@ module_param_string(hid, tpm_pnp_tbl[TIS_HID_USR_IDX].id,
|
|||
sizeof(tpm_pnp_tbl[TIS_HID_USR_IDX].id), 0444);
|
||||
MODULE_PARM_DESC(hid, "Set additional specific HID for this driver to probe");
|
||||
|
||||
#ifdef CONFIG_ACPI
|
||||
static int tpm_check_resource(struct acpi_resource *ares, void *data)
|
||||
{
|
||||
struct tpm_info *tpm_info = (struct tpm_info *) data;
|
||||
struct resource res;
|
||||
|
||||
if (acpi_dev_resource_interrupt(ares, 0, &res))
|
||||
tpm_info->irq = res.start;
|
||||
else if (acpi_dev_resource_memory(ares, &res)) {
|
||||
tpm_info->res = res;
|
||||
tpm_info->res.name = NULL;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int tpm_tis_acpi_init(struct acpi_device *acpi_dev)
|
||||
{
|
||||
struct acpi_table_tpm2 *tbl;
|
||||
acpi_status st;
|
||||
struct list_head resources;
|
||||
struct tpm_info tpm_info = {};
|
||||
int ret;
|
||||
|
||||
st = acpi_get_table(ACPI_SIG_TPM2, 1,
|
||||
(struct acpi_table_header **) &tbl);
|
||||
if (ACPI_FAILURE(st) || tbl->header.length < sizeof(*tbl)) {
|
||||
dev_err(&acpi_dev->dev,
|
||||
FW_BUG "failed to get TPM2 ACPI table\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (tbl->start_method != ACPI_TPM2_MEMORY_MAPPED)
|
||||
return -ENODEV;
|
||||
|
||||
INIT_LIST_HEAD(&resources);
|
||||
tpm_info.irq = -1;
|
||||
ret = acpi_dev_get_resources(acpi_dev, &resources, tpm_check_resource,
|
||||
&tpm_info);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
acpi_dev_free_resource_list(&resources);
|
||||
|
||||
if (resource_type(&tpm_info.res) != IORESOURCE_MEM) {
|
||||
dev_err(&acpi_dev->dev,
|
||||
FW_BUG "TPM2 ACPI table does not define a memory resource\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (is_itpm(acpi_dev))
|
||||
itpm = true;
|
||||
|
||||
return tpm_tis_init(&acpi_dev->dev, &tpm_info, acpi_dev->handle);
|
||||
}
|
||||
|
||||
static int tpm_tis_acpi_remove(struct acpi_device *dev)
|
||||
{
|
||||
struct tpm_chip *chip = dev_get_drvdata(&dev->dev);
|
||||
|
||||
tpm_chip_unregister(chip);
|
||||
tpm_tis_remove(chip);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct acpi_device_id tpm_acpi_tbl[] = {
|
||||
{"MSFT0101", 0}, /* TPM 2.0 */
|
||||
/* Add new here */
|
||||
{"", 0}, /* User Specified */
|
||||
{"", 0} /* Terminator */
|
||||
};
|
||||
MODULE_DEVICE_TABLE(acpi, tpm_acpi_tbl);
|
||||
|
||||
static struct acpi_driver tis_acpi_driver = {
|
||||
.name = "tpm_tis",
|
||||
.ids = tpm_acpi_tbl,
|
||||
.ops = {
|
||||
.add = tpm_tis_acpi_init,
|
||||
.remove = tpm_tis_acpi_remove,
|
||||
},
|
||||
.drv = {
|
||||
.pm = &tpm_tis_pm,
|
||||
},
|
||||
};
|
||||
#endif
|
||||
|
||||
static struct platform_device *force_pdev;
|
||||
|
||||
static int tpm_tis_plat_probe(struct platform_device *pdev)
|
||||
|
@ -332,18 +284,16 @@ static int tpm_tis_plat_probe(struct platform_device *pdev)
|
|||
}
|
||||
tpm_info.res = *res;
|
||||
|
||||
res = platform_get_resource(pdev, IORESOURCE_IRQ, 0);
|
||||
if (res) {
|
||||
tpm_info.irq = res->start;
|
||||
} else {
|
||||
if (pdev == force_pdev)
|
||||
tpm_info.irq = platform_get_irq(pdev, 0);
|
||||
if (tpm_info.irq <= 0) {
|
||||
if (pdev != force_pdev)
|
||||
tpm_info.irq = -1;
|
||||
else
|
||||
/* When forcing auto probe the IRQ */
|
||||
tpm_info.irq = 0;
|
||||
}
|
||||
|
||||
return tpm_tis_init(&pdev->dev, &tpm_info, NULL);
|
||||
return tpm_tis_init(&pdev->dev, &tpm_info);
|
||||
}
|
||||
|
||||
static int tpm_tis_plat_remove(struct platform_device *pdev)
|
||||
|
@ -371,6 +321,7 @@ static struct platform_driver tis_drv = {
|
|||
.name = "tpm_tis",
|
||||
.pm = &tpm_tis_pm,
|
||||
.of_match_table = of_match_ptr(tis_of_platform_match),
|
||||
.acpi_match_table = ACPI_PTR(tpm_acpi_tbl),
|
||||
},
|
||||
};
|
||||
|
||||
|
@ -413,11 +364,6 @@ static int __init init_tis(void)
|
|||
if (rc)
|
||||
goto err_platform;
|
||||
|
||||
#ifdef CONFIG_ACPI
|
||||
rc = acpi_bus_register_driver(&tis_acpi_driver);
|
||||
if (rc)
|
||||
goto err_acpi;
|
||||
#endif
|
||||
|
||||
if (IS_ENABLED(CONFIG_PNP)) {
|
||||
rc = pnp_register_driver(&tis_pnp_driver);
|
||||
|
@ -428,10 +374,6 @@ static int __init init_tis(void)
|
|||
return 0;
|
||||
|
||||
err_pnp:
|
||||
#ifdef CONFIG_ACPI
|
||||
acpi_bus_unregister_driver(&tis_acpi_driver);
|
||||
err_acpi:
|
||||
#endif
|
||||
platform_driver_unregister(&tis_drv);
|
||||
err_platform:
|
||||
if (force_pdev)
|
||||
|
@ -443,9 +385,6 @@ err_force:
|
|||
static void __exit cleanup_tis(void)
|
||||
{
|
||||
pnp_unregister_driver(&tis_pnp_driver);
|
||||
#ifdef CONFIG_ACPI
|
||||
acpi_bus_unregister_driver(&tis_acpi_driver);
|
||||
#endif
|
||||
platform_driver_unregister(&tis_drv);
|
||||
|
||||
if (force_pdev)
|
||||
|
|
|
@ -43,6 +43,7 @@ struct proxy_dev {
|
|||
#define STATE_OPENED_FLAG BIT(0)
|
||||
#define STATE_WAIT_RESPONSE_FLAG BIT(1) /* waiting for emulator response */
|
||||
#define STATE_REGISTERED_FLAG BIT(2)
|
||||
#define STATE_DRIVER_COMMAND BIT(3) /* sending a driver specific command */
|
||||
|
||||
size_t req_len; /* length of queued TPM request */
|
||||
size_t resp_len; /* length of queued TPM response */
|
||||
|
@ -299,6 +300,28 @@ out:
|
|||
return len;
|
||||
}
|
||||
|
||||
static int vtpm_proxy_is_driver_command(struct tpm_chip *chip,
|
||||
u8 *buf, size_t count)
|
||||
{
|
||||
struct tpm_input_header *hdr = (struct tpm_input_header *)buf;
|
||||
|
||||
if (count < sizeof(struct tpm_input_header))
|
||||
return 0;
|
||||
|
||||
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
||||
switch (be32_to_cpu(hdr->ordinal)) {
|
||||
case TPM2_CC_SET_LOCALITY:
|
||||
return 1;
|
||||
}
|
||||
} else {
|
||||
switch (be32_to_cpu(hdr->ordinal)) {
|
||||
case TPM_ORD_SET_LOCALITY:
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* Called when core TPM driver forwards TPM requests to 'server side'.
|
||||
*
|
||||
|
@ -321,6 +344,10 @@ static int vtpm_proxy_tpm_op_send(struct tpm_chip *chip, u8 *buf, size_t count)
|
|||
return -EIO;
|
||||
}
|
||||
|
||||
if (!(proxy_dev->state & STATE_DRIVER_COMMAND) &&
|
||||
vtpm_proxy_is_driver_command(chip, buf, count))
|
||||
return -EFAULT;
|
||||
|
||||
mutex_lock(&proxy_dev->buf_lock);
|
||||
|
||||
if (!(proxy_dev->state & STATE_OPENED_FLAG)) {
|
||||
|
@ -371,6 +398,47 @@ static bool vtpm_proxy_tpm_req_canceled(struct tpm_chip *chip, u8 status)
|
|||
return ret;
|
||||
}
|
||||
|
||||
static int vtpm_proxy_request_locality(struct tpm_chip *chip, int locality)
|
||||
{
|
||||
struct tpm_buf buf;
|
||||
int rc;
|
||||
const struct tpm_output_header *header;
|
||||
struct proxy_dev *proxy_dev = dev_get_drvdata(&chip->dev);
|
||||
|
||||
if (chip->flags & TPM_CHIP_FLAG_TPM2)
|
||||
rc = tpm_buf_init(&buf, TPM2_ST_SESSIONS,
|
||||
TPM2_CC_SET_LOCALITY);
|
||||
else
|
||||
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND,
|
||||
TPM_ORD_SET_LOCALITY);
|
||||
if (rc)
|
||||
return rc;
|
||||
tpm_buf_append_u8(&buf, locality);
|
||||
|
||||
proxy_dev->state |= STATE_DRIVER_COMMAND;
|
||||
|
||||
rc = tpm_transmit_cmd(chip, NULL, buf.data, tpm_buf_length(&buf), 0,
|
||||
TPM_TRANSMIT_UNLOCKED | TPM_TRANSMIT_RAW,
|
||||
"attempting to set locality");
|
||||
|
||||
proxy_dev->state &= ~STATE_DRIVER_COMMAND;
|
||||
|
||||
if (rc < 0) {
|
||||
locality = rc;
|
||||
goto out;
|
||||
}
|
||||
|
||||
header = (const struct tpm_output_header *)buf.data;
|
||||
rc = be32_to_cpu(header->return_code);
|
||||
if (rc)
|
||||
locality = -1;
|
||||
|
||||
out:
|
||||
tpm_buf_destroy(&buf);
|
||||
|
||||
return locality;
|
||||
}
|
||||
|
||||
static const struct tpm_class_ops vtpm_proxy_tpm_ops = {
|
||||
.flags = TPM_OPS_AUTO_STARTUP,
|
||||
.recv = vtpm_proxy_tpm_op_recv,
|
||||
|
@ -380,6 +448,7 @@ static const struct tpm_class_ops vtpm_proxy_tpm_ops = {
|
|||
.req_complete_mask = VTPM_PROXY_REQ_COMPLETE_FLAG,
|
||||
.req_complete_val = VTPM_PROXY_REQ_COMPLETE_FLAG,
|
||||
.req_canceled = vtpm_proxy_tpm_req_canceled,
|
||||
.request_locality = vtpm_proxy_request_locality,
|
||||
};
|
||||
|
||||
/*
|
||||
|
|
|
@ -45,7 +45,7 @@ static int tpmrm_release(struct inode *inode, struct file *file)
|
|||
return 0;
|
||||
}
|
||||
|
||||
ssize_t tpmrm_write(struct file *file, const char __user *buf,
|
||||
static ssize_t tpmrm_write(struct file *file, const char __user *buf,
|
||||
size_t size, loff_t *off)
|
||||
{
|
||||
struct file_priv *fpriv = file->private_data;
|
||||
|
|
|
@ -10,7 +10,8 @@ obj-$(CONFIG_INFINIBAND_USER_ACCESS) += ib_uverbs.o ib_ucm.o \
|
|||
ib_core-y := packer.o ud_header.o verbs.o cq.o rw.o sysfs.o \
|
||||
device.o fmr_pool.o cache.o netlink.o \
|
||||
roce_gid_mgmt.o mr_pool.o addr.o sa_query.o \
|
||||
multicast.o mad.o smi.o agent.o mad_rmpp.o
|
||||
multicast.o mad.o smi.o agent.o mad_rmpp.o \
|
||||
security.o
|
||||
ib_core-$(CONFIG_INFINIBAND_USER_MEM) += umem.o
|
||||
ib_core-$(CONFIG_INFINIBAND_ON_DEMAND_PAGING) += umem_odp.o umem_rbtree.o
|
||||
ib_core-$(CONFIG_CGROUP_RDMA) += cgroup.o
|
||||
|
|
|
@ -53,6 +53,7 @@ struct ib_update_work {
|
|||
struct work_struct work;
|
||||
struct ib_device *device;
|
||||
u8 port_num;
|
||||
bool enforce_security;
|
||||
};
|
||||
|
||||
union ib_gid zgid;
|
||||
|
@ -911,6 +912,26 @@ int ib_get_cached_pkey(struct ib_device *device,
|
|||
}
|
||||
EXPORT_SYMBOL(ib_get_cached_pkey);
|
||||
|
||||
int ib_get_cached_subnet_prefix(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 *sn_pfx)
|
||||
{
|
||||
unsigned long flags;
|
||||
int p;
|
||||
|
||||
if (port_num < rdma_start_port(device) ||
|
||||
port_num > rdma_end_port(device))
|
||||
return -EINVAL;
|
||||
|
||||
p = port_num - rdma_start_port(device);
|
||||
read_lock_irqsave(&device->cache.lock, flags);
|
||||
*sn_pfx = device->cache.ports[p].subnet_prefix;
|
||||
read_unlock_irqrestore(&device->cache.lock, flags);
|
||||
|
||||
return 0;
|
||||
}
|
||||
EXPORT_SYMBOL(ib_get_cached_subnet_prefix);
|
||||
|
||||
int ib_find_cached_pkey(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u16 pkey,
|
||||
|
@ -1022,7 +1043,8 @@ int ib_get_cached_port_state(struct ib_device *device,
|
|||
EXPORT_SYMBOL(ib_get_cached_port_state);
|
||||
|
||||
static void ib_cache_update(struct ib_device *device,
|
||||
u8 port)
|
||||
u8 port,
|
||||
bool enforce_security)
|
||||
{
|
||||
struct ib_port_attr *tprops = NULL;
|
||||
struct ib_pkey_cache *pkey_cache = NULL, *old_pkey_cache;
|
||||
|
@ -1108,8 +1130,15 @@ static void ib_cache_update(struct ib_device *device,
|
|||
device->cache.ports[port - rdma_start_port(device)].port_state =
|
||||
tprops->state;
|
||||
|
||||
device->cache.ports[port - rdma_start_port(device)].subnet_prefix =
|
||||
tprops->subnet_prefix;
|
||||
write_unlock_irq(&device->cache.lock);
|
||||
|
||||
if (enforce_security)
|
||||
ib_security_cache_change(device,
|
||||
port,
|
||||
tprops->subnet_prefix);
|
||||
|
||||
kfree(gid_cache);
|
||||
kfree(old_pkey_cache);
|
||||
kfree(tprops);
|
||||
|
@ -1126,7 +1155,9 @@ static void ib_cache_task(struct work_struct *_work)
|
|||
struct ib_update_work *work =
|
||||
container_of(_work, struct ib_update_work, work);
|
||||
|
||||
ib_cache_update(work->device, work->port_num);
|
||||
ib_cache_update(work->device,
|
||||
work->port_num,
|
||||
work->enforce_security);
|
||||
kfree(work);
|
||||
}
|
||||
|
||||
|
@ -1147,6 +1178,12 @@ static void ib_cache_event(struct ib_event_handler *handler,
|
|||
INIT_WORK(&work->work, ib_cache_task);
|
||||
work->device = event->device;
|
||||
work->port_num = event->element.port_num;
|
||||
if (event->event == IB_EVENT_PKEY_CHANGE ||
|
||||
event->event == IB_EVENT_GID_CHANGE)
|
||||
work->enforce_security = true;
|
||||
else
|
||||
work->enforce_security = false;
|
||||
|
||||
queue_work(ib_wq, &work->work);
|
||||
}
|
||||
}
|
||||
|
@ -1172,7 +1209,7 @@ int ib_cache_setup_one(struct ib_device *device)
|
|||
goto out;
|
||||
|
||||
for (p = 0; p <= rdma_end_port(device) - rdma_start_port(device); ++p)
|
||||
ib_cache_update(device, p + rdma_start_port(device));
|
||||
ib_cache_update(device, p + rdma_start_port(device), true);
|
||||
|
||||
INIT_IB_EVENT_HANDLER(&device->cache.event_handler,
|
||||
device, ib_cache_event);
|
||||
|
|
|
@ -38,6 +38,16 @@
|
|||
#include <linux/cgroup_rdma.h>
|
||||
|
||||
#include <rdma/ib_verbs.h>
|
||||
#include <rdma/ib_mad.h>
|
||||
#include "mad_priv.h"
|
||||
|
||||
struct pkey_index_qp_list {
|
||||
struct list_head pkey_index_list;
|
||||
u16 pkey_index;
|
||||
/* Lock to hold while iterating the qp_list. */
|
||||
spinlock_t qp_list_lock;
|
||||
struct list_head qp_list;
|
||||
};
|
||||
|
||||
#if IS_ENABLED(CONFIG_INFINIBAND_ADDR_TRANS_CONFIGFS)
|
||||
int cma_configfs_init(void);
|
||||
|
@ -186,4 +196,109 @@ int ib_nl_handle_set_timeout(struct sk_buff *skb,
|
|||
int ib_nl_handle_ip_res_resp(struct sk_buff *skb,
|
||||
struct netlink_callback *cb);
|
||||
|
||||
int ib_get_cached_subnet_prefix(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 *sn_pfx);
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
int ib_security_pkey_access(struct ib_device *dev,
|
||||
u8 port_num,
|
||||
u16 pkey_index,
|
||||
void *sec);
|
||||
|
||||
void ib_security_destroy_port_pkey_list(struct ib_device *device);
|
||||
|
||||
void ib_security_cache_change(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 subnet_prefix);
|
||||
|
||||
int ib_security_modify_qp(struct ib_qp *qp,
|
||||
struct ib_qp_attr *qp_attr,
|
||||
int qp_attr_mask,
|
||||
struct ib_udata *udata);
|
||||
|
||||
int ib_create_qp_security(struct ib_qp *qp, struct ib_device *dev);
|
||||
void ib_destroy_qp_security_begin(struct ib_qp_security *sec);
|
||||
void ib_destroy_qp_security_abort(struct ib_qp_security *sec);
|
||||
void ib_destroy_qp_security_end(struct ib_qp_security *sec);
|
||||
int ib_open_shared_qp_security(struct ib_qp *qp, struct ib_device *dev);
|
||||
void ib_close_shared_qp_security(struct ib_qp_security *sec);
|
||||
int ib_mad_agent_security_setup(struct ib_mad_agent *agent,
|
||||
enum ib_qp_type qp_type);
|
||||
void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent);
|
||||
int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index);
|
||||
#else
|
||||
static inline int ib_security_pkey_access(struct ib_device *dev,
|
||||
u8 port_num,
|
||||
u16 pkey_index,
|
||||
void *sec)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void ib_security_destroy_port_pkey_list(struct ib_device *device)
|
||||
{
|
||||
}
|
||||
|
||||
static inline void ib_security_cache_change(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 subnet_prefix)
|
||||
{
|
||||
}
|
||||
|
||||
static inline int ib_security_modify_qp(struct ib_qp *qp,
|
||||
struct ib_qp_attr *qp_attr,
|
||||
int qp_attr_mask,
|
||||
struct ib_udata *udata)
|
||||
{
|
||||
return qp->device->modify_qp(qp->real_qp,
|
||||
qp_attr,
|
||||
qp_attr_mask,
|
||||
udata);
|
||||
}
|
||||
|
||||
static inline int ib_create_qp_security(struct ib_qp *qp,
|
||||
struct ib_device *dev)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void ib_destroy_qp_security_begin(struct ib_qp_security *sec)
|
||||
{
|
||||
}
|
||||
|
||||
static inline void ib_destroy_qp_security_abort(struct ib_qp_security *sec)
|
||||
{
|
||||
}
|
||||
|
||||
static inline void ib_destroy_qp_security_end(struct ib_qp_security *sec)
|
||||
{
|
||||
}
|
||||
|
||||
static inline int ib_open_shared_qp_security(struct ib_qp *qp,
|
||||
struct ib_device *dev)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void ib_close_shared_qp_security(struct ib_qp_security *sec)
|
||||
{
|
||||
}
|
||||
|
||||
static inline int ib_mad_agent_security_setup(struct ib_mad_agent *agent,
|
||||
enum ib_qp_type qp_type)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent)
|
||||
{
|
||||
}
|
||||
|
||||
static inline int ib_mad_enforce_security(struct ib_mad_agent_private *map,
|
||||
u16 pkey_index)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
#endif /* _CORE_PRIV_H */
|
||||
|
|
|
@ -39,6 +39,8 @@
|
|||
#include <linux/init.h>
|
||||
#include <linux/mutex.h>
|
||||
#include <linux/netdevice.h>
|
||||
#include <linux/security.h>
|
||||
#include <linux/notifier.h>
|
||||
#include <rdma/rdma_netlink.h>
|
||||
#include <rdma/ib_addr.h>
|
||||
#include <rdma/ib_cache.h>
|
||||
|
@ -82,6 +84,14 @@ static LIST_HEAD(client_list);
|
|||
static DEFINE_MUTEX(device_mutex);
|
||||
static DECLARE_RWSEM(lists_rwsem);
|
||||
|
||||
static int ib_security_change(struct notifier_block *nb, unsigned long event,
|
||||
void *lsm_data);
|
||||
static void ib_policy_change_task(struct work_struct *work);
|
||||
static DECLARE_WORK(ib_policy_change_work, ib_policy_change_task);
|
||||
|
||||
static struct notifier_block ibdev_lsm_nb = {
|
||||
.notifier_call = ib_security_change,
|
||||
};
|
||||
|
||||
static int ib_device_check_mandatory(struct ib_device *device)
|
||||
{
|
||||
|
@ -325,6 +335,64 @@ void ib_get_device_fw_str(struct ib_device *dev, char *str, size_t str_len)
|
|||
}
|
||||
EXPORT_SYMBOL(ib_get_device_fw_str);
|
||||
|
||||
static int setup_port_pkey_list(struct ib_device *device)
|
||||
{
|
||||
int i;
|
||||
|
||||
/**
|
||||
* device->port_pkey_list is indexed directly by the port number,
|
||||
* Therefore it is declared as a 1 based array with potential empty
|
||||
* slots at the beginning.
|
||||
*/
|
||||
device->port_pkey_list = kcalloc(rdma_end_port(device) + 1,
|
||||
sizeof(*device->port_pkey_list),
|
||||
GFP_KERNEL);
|
||||
|
||||
if (!device->port_pkey_list)
|
||||
return -ENOMEM;
|
||||
|
||||
for (i = 0; i < (rdma_end_port(device) + 1); i++) {
|
||||
spin_lock_init(&device->port_pkey_list[i].list_lock);
|
||||
INIT_LIST_HEAD(&device->port_pkey_list[i].pkey_list);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void ib_policy_change_task(struct work_struct *work)
|
||||
{
|
||||
struct ib_device *dev;
|
||||
|
||||
down_read(&lists_rwsem);
|
||||
list_for_each_entry(dev, &device_list, core_list) {
|
||||
int i;
|
||||
|
||||
for (i = rdma_start_port(dev); i <= rdma_end_port(dev); i++) {
|
||||
u64 sp;
|
||||
int ret = ib_get_cached_subnet_prefix(dev,
|
||||
i,
|
||||
&sp);
|
||||
|
||||
WARN_ONCE(ret,
|
||||
"ib_get_cached_subnet_prefix err: %d, this should never happen here\n",
|
||||
ret);
|
||||
ib_security_cache_change(dev, i, sp);
|
||||
}
|
||||
}
|
||||
up_read(&lists_rwsem);
|
||||
}
|
||||
|
||||
static int ib_security_change(struct notifier_block *nb, unsigned long event,
|
||||
void *lsm_data)
|
||||
{
|
||||
if (event != LSM_POLICY_CHANGE)
|
||||
return NOTIFY_DONE;
|
||||
|
||||
schedule_work(&ib_policy_change_work);
|
||||
|
||||
return NOTIFY_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* ib_register_device - Register an IB device with IB core
|
||||
* @device:Device to register
|
||||
|
@ -385,6 +453,12 @@ int ib_register_device(struct ib_device *device,
|
|||
goto out;
|
||||
}
|
||||
|
||||
ret = setup_port_pkey_list(device);
|
||||
if (ret) {
|
||||
pr_warn("Couldn't create per port_pkey_list\n");
|
||||
goto out;
|
||||
}
|
||||
|
||||
ret = ib_cache_setup_one(device);
|
||||
if (ret) {
|
||||
pr_warn("Couldn't set up InfiniBand P_Key/GID cache\n");
|
||||
|
@ -468,6 +542,9 @@ void ib_unregister_device(struct ib_device *device)
|
|||
ib_device_unregister_sysfs(device);
|
||||
ib_cache_cleanup_one(device);
|
||||
|
||||
ib_security_destroy_port_pkey_list(device);
|
||||
kfree(device->port_pkey_list);
|
||||
|
||||
down_write(&lists_rwsem);
|
||||
spin_lock_irqsave(&device->client_data_lock, flags);
|
||||
list_for_each_entry_safe(context, tmp, &device->client_data_list, list)
|
||||
|
@ -1082,10 +1159,18 @@ static int __init ib_core_init(void)
|
|||
goto err_sa;
|
||||
}
|
||||
|
||||
ret = register_lsm_notifier(&ibdev_lsm_nb);
|
||||
if (ret) {
|
||||
pr_warn("Couldn't register LSM notifier. ret %d\n", ret);
|
||||
goto err_ibnl_clients;
|
||||
}
|
||||
|
||||
ib_cache_setup();
|
||||
|
||||
return 0;
|
||||
|
||||
err_ibnl_clients:
|
||||
ib_remove_ibnl_clients();
|
||||
err_sa:
|
||||
ib_sa_cleanup();
|
||||
err_mad:
|
||||
|
@ -1105,6 +1190,7 @@ err:
|
|||
|
||||
static void __exit ib_core_cleanup(void)
|
||||
{
|
||||
unregister_lsm_notifier(&ibdev_lsm_nb);
|
||||
ib_cache_cleanup();
|
||||
ib_remove_ibnl_clients();
|
||||
ib_sa_cleanup();
|
||||
|
|
|
@ -40,9 +40,11 @@
|
|||
#include <linux/dma-mapping.h>
|
||||
#include <linux/slab.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/security.h>
|
||||
#include <rdma/ib_cache.h>
|
||||
|
||||
#include "mad_priv.h"
|
||||
#include "core_priv.h"
|
||||
#include "mad_rmpp.h"
|
||||
#include "smi.h"
|
||||
#include "opa_smi.h"
|
||||
|
@ -369,6 +371,12 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device,
|
|||
atomic_set(&mad_agent_priv->refcount, 1);
|
||||
init_completion(&mad_agent_priv->comp);
|
||||
|
||||
ret2 = ib_mad_agent_security_setup(&mad_agent_priv->agent, qp_type);
|
||||
if (ret2) {
|
||||
ret = ERR_PTR(ret2);
|
||||
goto error4;
|
||||
}
|
||||
|
||||
spin_lock_irqsave(&port_priv->reg_lock, flags);
|
||||
mad_agent_priv->agent.hi_tid = ++ib_mad_client_id;
|
||||
|
||||
|
@ -386,7 +394,7 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device,
|
|||
if (method) {
|
||||
if (method_in_use(&method,
|
||||
mad_reg_req))
|
||||
goto error4;
|
||||
goto error5;
|
||||
}
|
||||
}
|
||||
ret2 = add_nonoui_reg_req(mad_reg_req, mad_agent_priv,
|
||||
|
@ -402,14 +410,14 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device,
|
|||
if (is_vendor_method_in_use(
|
||||
vendor_class,
|
||||
mad_reg_req))
|
||||
goto error4;
|
||||
goto error5;
|
||||
}
|
||||
}
|
||||
ret2 = add_oui_reg_req(mad_reg_req, mad_agent_priv);
|
||||
}
|
||||
if (ret2) {
|
||||
ret = ERR_PTR(ret2);
|
||||
goto error4;
|
||||
goto error5;
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -418,9 +426,10 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device,
|
|||
spin_unlock_irqrestore(&port_priv->reg_lock, flags);
|
||||
|
||||
return &mad_agent_priv->agent;
|
||||
|
||||
error4:
|
||||
error5:
|
||||
spin_unlock_irqrestore(&port_priv->reg_lock, flags);
|
||||
ib_mad_agent_security_cleanup(&mad_agent_priv->agent);
|
||||
error4:
|
||||
kfree(reg_req);
|
||||
error3:
|
||||
kfree(mad_agent_priv);
|
||||
|
@ -491,6 +500,7 @@ struct ib_mad_agent *ib_register_mad_snoop(struct ib_device *device,
|
|||
struct ib_mad_agent *ret;
|
||||
struct ib_mad_snoop_private *mad_snoop_priv;
|
||||
int qpn;
|
||||
int err;
|
||||
|
||||
/* Validate parameters */
|
||||
if ((is_snooping_sends(mad_snoop_flags) && !snoop_handler) ||
|
||||
|
@ -525,17 +535,25 @@ struct ib_mad_agent *ib_register_mad_snoop(struct ib_device *device,
|
|||
mad_snoop_priv->agent.port_num = port_num;
|
||||
mad_snoop_priv->mad_snoop_flags = mad_snoop_flags;
|
||||
init_completion(&mad_snoop_priv->comp);
|
||||
|
||||
err = ib_mad_agent_security_setup(&mad_snoop_priv->agent, qp_type);
|
||||
if (err) {
|
||||
ret = ERR_PTR(err);
|
||||
goto error2;
|
||||
}
|
||||
|
||||
mad_snoop_priv->snoop_index = register_snoop_agent(
|
||||
&port_priv->qp_info[qpn],
|
||||
mad_snoop_priv);
|
||||
if (mad_snoop_priv->snoop_index < 0) {
|
||||
ret = ERR_PTR(mad_snoop_priv->snoop_index);
|
||||
goto error2;
|
||||
goto error3;
|
||||
}
|
||||
|
||||
atomic_set(&mad_snoop_priv->refcount, 1);
|
||||
return &mad_snoop_priv->agent;
|
||||
|
||||
error3:
|
||||
ib_mad_agent_security_cleanup(&mad_snoop_priv->agent);
|
||||
error2:
|
||||
kfree(mad_snoop_priv);
|
||||
error1:
|
||||
|
@ -581,6 +599,8 @@ static void unregister_mad_agent(struct ib_mad_agent_private *mad_agent_priv)
|
|||
deref_mad_agent(mad_agent_priv);
|
||||
wait_for_completion(&mad_agent_priv->comp);
|
||||
|
||||
ib_mad_agent_security_cleanup(&mad_agent_priv->agent);
|
||||
|
||||
kfree(mad_agent_priv->reg_req);
|
||||
kfree(mad_agent_priv);
|
||||
}
|
||||
|
@ -599,6 +619,8 @@ static void unregister_mad_snoop(struct ib_mad_snoop_private *mad_snoop_priv)
|
|||
deref_snoop_agent(mad_snoop_priv);
|
||||
wait_for_completion(&mad_snoop_priv->comp);
|
||||
|
||||
ib_mad_agent_security_cleanup(&mad_snoop_priv->agent);
|
||||
|
||||
kfree(mad_snoop_priv);
|
||||
}
|
||||
|
||||
|
@ -1215,12 +1237,16 @@ int ib_post_send_mad(struct ib_mad_send_buf *send_buf,
|
|||
|
||||
/* Walk list of send WRs and post each on send list */
|
||||
for (; send_buf; send_buf = next_send_buf) {
|
||||
|
||||
mad_send_wr = container_of(send_buf,
|
||||
struct ib_mad_send_wr_private,
|
||||
send_buf);
|
||||
mad_agent_priv = mad_send_wr->mad_agent_priv;
|
||||
|
||||
ret = ib_mad_enforce_security(mad_agent_priv,
|
||||
mad_send_wr->send_wr.pkey_index);
|
||||
if (ret)
|
||||
goto error;
|
||||
|
||||
if (!send_buf->mad_agent->send_handler ||
|
||||
(send_buf->timeout_ms &&
|
||||
!send_buf->mad_agent->recv_handler)) {
|
||||
|
@ -1946,6 +1972,14 @@ static void ib_mad_complete_recv(struct ib_mad_agent_private *mad_agent_priv,
|
|||
struct ib_mad_send_wr_private *mad_send_wr;
|
||||
struct ib_mad_send_wc mad_send_wc;
|
||||
unsigned long flags;
|
||||
int ret;
|
||||
|
||||
ret = ib_mad_enforce_security(mad_agent_priv,
|
||||
mad_recv_wc->wc->pkey_index);
|
||||
if (ret) {
|
||||
ib_free_recv_mad(mad_recv_wc);
|
||||
deref_mad_agent(mad_agent_priv);
|
||||
}
|
||||
|
||||
INIT_LIST_HEAD(&mad_recv_wc->rmpp_list);
|
||||
list_add(&mad_recv_wc->recv_buf.list, &mad_recv_wc->rmpp_list);
|
||||
|
@ -2003,6 +2037,8 @@ static void ib_mad_complete_recv(struct ib_mad_agent_private *mad_agent_priv,
|
|||
mad_recv_wc);
|
||||
deref_mad_agent(mad_agent_priv);
|
||||
}
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
static enum smi_action handle_ib_smi(const struct ib_mad_port_private *port_priv,
|
||||
|
|
705
drivers/infiniband/core/security.c
Normal file
705
drivers/infiniband/core/security.c
Normal file
|
@ -0,0 +1,705 @@
|
|||
/*
|
||||
* Copyright (c) 2016 Mellanox Technologies Ltd. All rights reserved.
|
||||
*
|
||||
* This software is available to you under a choice of one of two
|
||||
* licenses. You may choose to be licensed under the terms of the GNU
|
||||
* General Public License (GPL) Version 2, available from the file
|
||||
* COPYING in the main directory of this source tree, or the
|
||||
* OpenIB.org BSD license below:
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or
|
||||
* without modification, are permitted provided that the following
|
||||
* conditions are met:
|
||||
*
|
||||
* - Redistributions of source code must retain the above
|
||||
* copyright notice, this list of conditions and the following
|
||||
* disclaimer.
|
||||
*
|
||||
* - Redistributions in binary form must reproduce the above
|
||||
* copyright notice, this list of conditions and the following
|
||||
* disclaimer in the documentation and/or other materials
|
||||
* provided with the distribution.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||||
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||||
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
* SOFTWARE.
|
||||
*/
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
|
||||
#include <linux/security.h>
|
||||
#include <linux/completion.h>
|
||||
#include <linux/list.h>
|
||||
|
||||
#include <rdma/ib_verbs.h>
|
||||
#include <rdma/ib_cache.h>
|
||||
#include "core_priv.h"
|
||||
#include "mad_priv.h"
|
||||
|
||||
static struct pkey_index_qp_list *get_pkey_idx_qp_list(struct ib_port_pkey *pp)
|
||||
{
|
||||
struct pkey_index_qp_list *pkey = NULL;
|
||||
struct pkey_index_qp_list *tmp_pkey;
|
||||
struct ib_device *dev = pp->sec->dev;
|
||||
|
||||
spin_lock(&dev->port_pkey_list[pp->port_num].list_lock);
|
||||
list_for_each_entry(tmp_pkey,
|
||||
&dev->port_pkey_list[pp->port_num].pkey_list,
|
||||
pkey_index_list) {
|
||||
if (tmp_pkey->pkey_index == pp->pkey_index) {
|
||||
pkey = tmp_pkey;
|
||||
break;
|
||||
}
|
||||
}
|
||||
spin_unlock(&dev->port_pkey_list[pp->port_num].list_lock);
|
||||
return pkey;
|
||||
}
|
||||
|
||||
static int get_pkey_and_subnet_prefix(struct ib_port_pkey *pp,
|
||||
u16 *pkey,
|
||||
u64 *subnet_prefix)
|
||||
{
|
||||
struct ib_device *dev = pp->sec->dev;
|
||||
int ret;
|
||||
|
||||
ret = ib_get_cached_pkey(dev, pp->port_num, pp->pkey_index, pkey);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = ib_get_cached_subnet_prefix(dev, pp->port_num, subnet_prefix);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int enforce_qp_pkey_security(u16 pkey,
|
||||
u64 subnet_prefix,
|
||||
struct ib_qp_security *qp_sec)
|
||||
{
|
||||
struct ib_qp_security *shared_qp_sec;
|
||||
int ret;
|
||||
|
||||
ret = security_ib_pkey_access(qp_sec->security, subnet_prefix, pkey);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (qp_sec->qp == qp_sec->qp->real_qp) {
|
||||
list_for_each_entry(shared_qp_sec,
|
||||
&qp_sec->shared_qp_list,
|
||||
shared_qp_list) {
|
||||
ret = security_ib_pkey_access(shared_qp_sec->security,
|
||||
subnet_prefix,
|
||||
pkey);
|
||||
if (ret)
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* The caller of this function must hold the QP security
|
||||
* mutex of the QP of the security structure in *pps.
|
||||
*
|
||||
* It takes separate ports_pkeys and security structure
|
||||
* because in some cases the pps will be for a new settings
|
||||
* or the pps will be for the real QP and security structure
|
||||
* will be for a shared QP.
|
||||
*/
|
||||
static int check_qp_port_pkey_settings(struct ib_ports_pkeys *pps,
|
||||
struct ib_qp_security *sec)
|
||||
{
|
||||
u64 subnet_prefix;
|
||||
u16 pkey;
|
||||
int ret = 0;
|
||||
|
||||
if (!pps)
|
||||
return 0;
|
||||
|
||||
if (pps->main.state != IB_PORT_PKEY_NOT_VALID) {
|
||||
get_pkey_and_subnet_prefix(&pps->main,
|
||||
&pkey,
|
||||
&subnet_prefix);
|
||||
|
||||
ret = enforce_qp_pkey_security(pkey,
|
||||
subnet_prefix,
|
||||
sec);
|
||||
}
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (pps->alt.state != IB_PORT_PKEY_NOT_VALID) {
|
||||
get_pkey_and_subnet_prefix(&pps->alt,
|
||||
&pkey,
|
||||
&subnet_prefix);
|
||||
|
||||
ret = enforce_qp_pkey_security(pkey,
|
||||
subnet_prefix,
|
||||
sec);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* The caller of this function must hold the QP security
|
||||
* mutex.
|
||||
*/
|
||||
static void qp_to_error(struct ib_qp_security *sec)
|
||||
{
|
||||
struct ib_qp_security *shared_qp_sec;
|
||||
struct ib_qp_attr attr = {
|
||||
.qp_state = IB_QPS_ERR
|
||||
};
|
||||
struct ib_event event = {
|
||||
.event = IB_EVENT_QP_FATAL
|
||||
};
|
||||
|
||||
/* If the QP is in the process of being destroyed
|
||||
* the qp pointer in the security structure is
|
||||
* undefined. It cannot be modified now.
|
||||
*/
|
||||
if (sec->destroying)
|
||||
return;
|
||||
|
||||
ib_modify_qp(sec->qp,
|
||||
&attr,
|
||||
IB_QP_STATE);
|
||||
|
||||
if (sec->qp->event_handler && sec->qp->qp_context) {
|
||||
event.element.qp = sec->qp;
|
||||
sec->qp->event_handler(&event,
|
||||
sec->qp->qp_context);
|
||||
}
|
||||
|
||||
list_for_each_entry(shared_qp_sec,
|
||||
&sec->shared_qp_list,
|
||||
shared_qp_list) {
|
||||
struct ib_qp *qp = shared_qp_sec->qp;
|
||||
|
||||
if (qp->event_handler && qp->qp_context) {
|
||||
event.element.qp = qp;
|
||||
event.device = qp->device;
|
||||
qp->event_handler(&event,
|
||||
qp->qp_context);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static inline void check_pkey_qps(struct pkey_index_qp_list *pkey,
|
||||
struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 subnet_prefix)
|
||||
{
|
||||
struct ib_port_pkey *pp, *tmp_pp;
|
||||
bool comp;
|
||||
LIST_HEAD(to_error_list);
|
||||
u16 pkey_val;
|
||||
|
||||
if (!ib_get_cached_pkey(device,
|
||||
port_num,
|
||||
pkey->pkey_index,
|
||||
&pkey_val)) {
|
||||
spin_lock(&pkey->qp_list_lock);
|
||||
list_for_each_entry(pp, &pkey->qp_list, qp_list) {
|
||||
if (atomic_read(&pp->sec->error_list_count))
|
||||
continue;
|
||||
|
||||
if (enforce_qp_pkey_security(pkey_val,
|
||||
subnet_prefix,
|
||||
pp->sec)) {
|
||||
atomic_inc(&pp->sec->error_list_count);
|
||||
list_add(&pp->to_error_list,
|
||||
&to_error_list);
|
||||
}
|
||||
}
|
||||
spin_unlock(&pkey->qp_list_lock);
|
||||
}
|
||||
|
||||
list_for_each_entry_safe(pp,
|
||||
tmp_pp,
|
||||
&to_error_list,
|
||||
to_error_list) {
|
||||
mutex_lock(&pp->sec->mutex);
|
||||
qp_to_error(pp->sec);
|
||||
list_del(&pp->to_error_list);
|
||||
atomic_dec(&pp->sec->error_list_count);
|
||||
comp = pp->sec->destroying;
|
||||
mutex_unlock(&pp->sec->mutex);
|
||||
|
||||
if (comp)
|
||||
complete(&pp->sec->error_complete);
|
||||
}
|
||||
}
|
||||
|
||||
/* The caller of this function must hold the QP security
|
||||
* mutex.
|
||||
*/
|
||||
static int port_pkey_list_insert(struct ib_port_pkey *pp)
|
||||
{
|
||||
struct pkey_index_qp_list *tmp_pkey;
|
||||
struct pkey_index_qp_list *pkey;
|
||||
struct ib_device *dev;
|
||||
u8 port_num = pp->port_num;
|
||||
int ret = 0;
|
||||
|
||||
if (pp->state != IB_PORT_PKEY_VALID)
|
||||
return 0;
|
||||
|
||||
dev = pp->sec->dev;
|
||||
|
||||
pkey = get_pkey_idx_qp_list(pp);
|
||||
|
||||
if (!pkey) {
|
||||
bool found = false;
|
||||
|
||||
pkey = kzalloc(sizeof(*pkey), GFP_KERNEL);
|
||||
if (!pkey)
|
||||
return -ENOMEM;
|
||||
|
||||
spin_lock(&dev->port_pkey_list[port_num].list_lock);
|
||||
/* Check for the PKey again. A racing process may
|
||||
* have created it.
|
||||
*/
|
||||
list_for_each_entry(tmp_pkey,
|
||||
&dev->port_pkey_list[port_num].pkey_list,
|
||||
pkey_index_list) {
|
||||
if (tmp_pkey->pkey_index == pp->pkey_index) {
|
||||
kfree(pkey);
|
||||
pkey = tmp_pkey;
|
||||
found = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (!found) {
|
||||
pkey->pkey_index = pp->pkey_index;
|
||||
spin_lock_init(&pkey->qp_list_lock);
|
||||
INIT_LIST_HEAD(&pkey->qp_list);
|
||||
list_add(&pkey->pkey_index_list,
|
||||
&dev->port_pkey_list[port_num].pkey_list);
|
||||
}
|
||||
spin_unlock(&dev->port_pkey_list[port_num].list_lock);
|
||||
}
|
||||
|
||||
spin_lock(&pkey->qp_list_lock);
|
||||
list_add(&pp->qp_list, &pkey->qp_list);
|
||||
spin_unlock(&pkey->qp_list_lock);
|
||||
|
||||
pp->state = IB_PORT_PKEY_LISTED;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* The caller of this function must hold the QP security
|
||||
* mutex.
|
||||
*/
|
||||
static void port_pkey_list_remove(struct ib_port_pkey *pp)
|
||||
{
|
||||
struct pkey_index_qp_list *pkey;
|
||||
|
||||
if (pp->state != IB_PORT_PKEY_LISTED)
|
||||
return;
|
||||
|
||||
pkey = get_pkey_idx_qp_list(pp);
|
||||
|
||||
spin_lock(&pkey->qp_list_lock);
|
||||
list_del(&pp->qp_list);
|
||||
spin_unlock(&pkey->qp_list_lock);
|
||||
|
||||
/* The setting may still be valid, i.e. after
|
||||
* a destroy has failed for example.
|
||||
*/
|
||||
pp->state = IB_PORT_PKEY_VALID;
|
||||
}
|
||||
|
||||
static void destroy_qp_security(struct ib_qp_security *sec)
|
||||
{
|
||||
security_ib_free_security(sec->security);
|
||||
kfree(sec->ports_pkeys);
|
||||
kfree(sec);
|
||||
}
|
||||
|
||||
/* The caller of this function must hold the QP security
|
||||
* mutex.
|
||||
*/
|
||||
static struct ib_ports_pkeys *get_new_pps(const struct ib_qp *qp,
|
||||
const struct ib_qp_attr *qp_attr,
|
||||
int qp_attr_mask)
|
||||
{
|
||||
struct ib_ports_pkeys *new_pps;
|
||||
struct ib_ports_pkeys *qp_pps = qp->qp_sec->ports_pkeys;
|
||||
|
||||
new_pps = kzalloc(sizeof(*new_pps), GFP_KERNEL);
|
||||
if (!new_pps)
|
||||
return NULL;
|
||||
|
||||
if (qp_attr_mask & (IB_QP_PKEY_INDEX | IB_QP_PORT)) {
|
||||
if (!qp_pps) {
|
||||
new_pps->main.port_num = qp_attr->port_num;
|
||||
new_pps->main.pkey_index = qp_attr->pkey_index;
|
||||
} else {
|
||||
new_pps->main.port_num = (qp_attr_mask & IB_QP_PORT) ?
|
||||
qp_attr->port_num :
|
||||
qp_pps->main.port_num;
|
||||
|
||||
new_pps->main.pkey_index =
|
||||
(qp_attr_mask & IB_QP_PKEY_INDEX) ?
|
||||
qp_attr->pkey_index :
|
||||
qp_pps->main.pkey_index;
|
||||
}
|
||||
new_pps->main.state = IB_PORT_PKEY_VALID;
|
||||
} else if (qp_pps) {
|
||||
new_pps->main.port_num = qp_pps->main.port_num;
|
||||
new_pps->main.pkey_index = qp_pps->main.pkey_index;
|
||||
if (qp_pps->main.state != IB_PORT_PKEY_NOT_VALID)
|
||||
new_pps->main.state = IB_PORT_PKEY_VALID;
|
||||
}
|
||||
|
||||
if (qp_attr_mask & IB_QP_ALT_PATH) {
|
||||
new_pps->alt.port_num = qp_attr->alt_port_num;
|
||||
new_pps->alt.pkey_index = qp_attr->alt_pkey_index;
|
||||
new_pps->alt.state = IB_PORT_PKEY_VALID;
|
||||
} else if (qp_pps) {
|
||||
new_pps->alt.port_num = qp_pps->alt.port_num;
|
||||
new_pps->alt.pkey_index = qp_pps->alt.pkey_index;
|
||||
if (qp_pps->alt.state != IB_PORT_PKEY_NOT_VALID)
|
||||
new_pps->alt.state = IB_PORT_PKEY_VALID;
|
||||
}
|
||||
|
||||
new_pps->main.sec = qp->qp_sec;
|
||||
new_pps->alt.sec = qp->qp_sec;
|
||||
return new_pps;
|
||||
}
|
||||
|
||||
int ib_open_shared_qp_security(struct ib_qp *qp, struct ib_device *dev)
|
||||
{
|
||||
struct ib_qp *real_qp = qp->real_qp;
|
||||
int ret;
|
||||
|
||||
ret = ib_create_qp_security(qp, dev);
|
||||
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
mutex_lock(&real_qp->qp_sec->mutex);
|
||||
ret = check_qp_port_pkey_settings(real_qp->qp_sec->ports_pkeys,
|
||||
qp->qp_sec);
|
||||
|
||||
if (ret)
|
||||
goto ret;
|
||||
|
||||
if (qp != real_qp)
|
||||
list_add(&qp->qp_sec->shared_qp_list,
|
||||
&real_qp->qp_sec->shared_qp_list);
|
||||
ret:
|
||||
mutex_unlock(&real_qp->qp_sec->mutex);
|
||||
if (ret)
|
||||
destroy_qp_security(qp->qp_sec);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
void ib_close_shared_qp_security(struct ib_qp_security *sec)
|
||||
{
|
||||
struct ib_qp *real_qp = sec->qp->real_qp;
|
||||
|
||||
mutex_lock(&real_qp->qp_sec->mutex);
|
||||
list_del(&sec->shared_qp_list);
|
||||
mutex_unlock(&real_qp->qp_sec->mutex);
|
||||
|
||||
destroy_qp_security(sec);
|
||||
}
|
||||
|
||||
int ib_create_qp_security(struct ib_qp *qp, struct ib_device *dev)
|
||||
{
|
||||
int ret;
|
||||
|
||||
qp->qp_sec = kzalloc(sizeof(*qp->qp_sec), GFP_KERNEL);
|
||||
if (!qp->qp_sec)
|
||||
return -ENOMEM;
|
||||
|
||||
qp->qp_sec->qp = qp;
|
||||
qp->qp_sec->dev = dev;
|
||||
mutex_init(&qp->qp_sec->mutex);
|
||||
INIT_LIST_HEAD(&qp->qp_sec->shared_qp_list);
|
||||
atomic_set(&qp->qp_sec->error_list_count, 0);
|
||||
init_completion(&qp->qp_sec->error_complete);
|
||||
ret = security_ib_alloc_security(&qp->qp_sec->security);
|
||||
if (ret)
|
||||
kfree(qp->qp_sec);
|
||||
|
||||
return ret;
|
||||
}
|
||||
EXPORT_SYMBOL(ib_create_qp_security);
|
||||
|
||||
void ib_destroy_qp_security_begin(struct ib_qp_security *sec)
|
||||
{
|
||||
mutex_lock(&sec->mutex);
|
||||
|
||||
/* Remove the QP from the lists so it won't get added to
|
||||
* a to_error_list during the destroy process.
|
||||
*/
|
||||
if (sec->ports_pkeys) {
|
||||
port_pkey_list_remove(&sec->ports_pkeys->main);
|
||||
port_pkey_list_remove(&sec->ports_pkeys->alt);
|
||||
}
|
||||
|
||||
/* If the QP is already in one or more of those lists
|
||||
* the destroying flag will ensure the to error flow
|
||||
* doesn't operate on an undefined QP.
|
||||
*/
|
||||
sec->destroying = true;
|
||||
|
||||
/* Record the error list count to know how many completions
|
||||
* to wait for.
|
||||
*/
|
||||
sec->error_comps_pending = atomic_read(&sec->error_list_count);
|
||||
|
||||
mutex_unlock(&sec->mutex);
|
||||
}
|
||||
|
||||
void ib_destroy_qp_security_abort(struct ib_qp_security *sec)
|
||||
{
|
||||
int ret;
|
||||
int i;
|
||||
|
||||
/* If a concurrent cache update is in progress this
|
||||
* QP security could be marked for an error state
|
||||
* transition. Wait for this to complete.
|
||||
*/
|
||||
for (i = 0; i < sec->error_comps_pending; i++)
|
||||
wait_for_completion(&sec->error_complete);
|
||||
|
||||
mutex_lock(&sec->mutex);
|
||||
sec->destroying = false;
|
||||
|
||||
/* Restore the position in the lists and verify
|
||||
* access is still allowed in case a cache update
|
||||
* occurred while attempting to destroy.
|
||||
*
|
||||
* Because these setting were listed already
|
||||
* and removed during ib_destroy_qp_security_begin
|
||||
* we know the pkey_index_qp_list for the PKey
|
||||
* already exists so port_pkey_list_insert won't fail.
|
||||
*/
|
||||
if (sec->ports_pkeys) {
|
||||
port_pkey_list_insert(&sec->ports_pkeys->main);
|
||||
port_pkey_list_insert(&sec->ports_pkeys->alt);
|
||||
}
|
||||
|
||||
ret = check_qp_port_pkey_settings(sec->ports_pkeys, sec);
|
||||
if (ret)
|
||||
qp_to_error(sec);
|
||||
|
||||
mutex_unlock(&sec->mutex);
|
||||
}
|
||||
|
||||
void ib_destroy_qp_security_end(struct ib_qp_security *sec)
|
||||
{
|
||||
int i;
|
||||
|
||||
/* If a concurrent cache update is occurring we must
|
||||
* wait until this QP security structure is processed
|
||||
* in the QP to error flow before destroying it because
|
||||
* the to_error_list is in use.
|
||||
*/
|
||||
for (i = 0; i < sec->error_comps_pending; i++)
|
||||
wait_for_completion(&sec->error_complete);
|
||||
|
||||
destroy_qp_security(sec);
|
||||
}
|
||||
|
||||
void ib_security_cache_change(struct ib_device *device,
|
||||
u8 port_num,
|
||||
u64 subnet_prefix)
|
||||
{
|
||||
struct pkey_index_qp_list *pkey;
|
||||
|
||||
list_for_each_entry(pkey,
|
||||
&device->port_pkey_list[port_num].pkey_list,
|
||||
pkey_index_list) {
|
||||
check_pkey_qps(pkey,
|
||||
device,
|
||||
port_num,
|
||||
subnet_prefix);
|
||||
}
|
||||
}
|
||||
|
||||
void ib_security_destroy_port_pkey_list(struct ib_device *device)
|
||||
{
|
||||
struct pkey_index_qp_list *pkey, *tmp_pkey;
|
||||
int i;
|
||||
|
||||
for (i = rdma_start_port(device); i <= rdma_end_port(device); i++) {
|
||||
spin_lock(&device->port_pkey_list[i].list_lock);
|
||||
list_for_each_entry_safe(pkey,
|
||||
tmp_pkey,
|
||||
&device->port_pkey_list[i].pkey_list,
|
||||
pkey_index_list) {
|
||||
list_del(&pkey->pkey_index_list);
|
||||
kfree(pkey);
|
||||
}
|
||||
spin_unlock(&device->port_pkey_list[i].list_lock);
|
||||
}
|
||||
}
|
||||
|
||||
int ib_security_modify_qp(struct ib_qp *qp,
|
||||
struct ib_qp_attr *qp_attr,
|
||||
int qp_attr_mask,
|
||||
struct ib_udata *udata)
|
||||
{
|
||||
int ret = 0;
|
||||
struct ib_ports_pkeys *tmp_pps;
|
||||
struct ib_ports_pkeys *new_pps;
|
||||
bool special_qp = (qp->qp_type == IB_QPT_SMI ||
|
||||
qp->qp_type == IB_QPT_GSI ||
|
||||
qp->qp_type >= IB_QPT_RESERVED1);
|
||||
bool pps_change = ((qp_attr_mask & (IB_QP_PKEY_INDEX | IB_QP_PORT)) ||
|
||||
(qp_attr_mask & IB_QP_ALT_PATH));
|
||||
|
||||
if (pps_change && !special_qp) {
|
||||
mutex_lock(&qp->qp_sec->mutex);
|
||||
new_pps = get_new_pps(qp,
|
||||
qp_attr,
|
||||
qp_attr_mask);
|
||||
|
||||
/* Add this QP to the lists for the new port
|
||||
* and pkey settings before checking for permission
|
||||
* in case there is a concurrent cache update
|
||||
* occurring. Walking the list for a cache change
|
||||
* doesn't acquire the security mutex unless it's
|
||||
* sending the QP to error.
|
||||
*/
|
||||
ret = port_pkey_list_insert(&new_pps->main);
|
||||
|
||||
if (!ret)
|
||||
ret = port_pkey_list_insert(&new_pps->alt);
|
||||
|
||||
if (!ret)
|
||||
ret = check_qp_port_pkey_settings(new_pps,
|
||||
qp->qp_sec);
|
||||
}
|
||||
|
||||
if (!ret)
|
||||
ret = qp->device->modify_qp(qp->real_qp,
|
||||
qp_attr,
|
||||
qp_attr_mask,
|
||||
udata);
|
||||
|
||||
if (pps_change && !special_qp) {
|
||||
/* Clean up the lists and free the appropriate
|
||||
* ports_pkeys structure.
|
||||
*/
|
||||
if (ret) {
|
||||
tmp_pps = new_pps;
|
||||
} else {
|
||||
tmp_pps = qp->qp_sec->ports_pkeys;
|
||||
qp->qp_sec->ports_pkeys = new_pps;
|
||||
}
|
||||
|
||||
if (tmp_pps) {
|
||||
port_pkey_list_remove(&tmp_pps->main);
|
||||
port_pkey_list_remove(&tmp_pps->alt);
|
||||
}
|
||||
kfree(tmp_pps);
|
||||
mutex_unlock(&qp->qp_sec->mutex);
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
EXPORT_SYMBOL(ib_security_modify_qp);
|
||||
|
||||
int ib_security_pkey_access(struct ib_device *dev,
|
||||
u8 port_num,
|
||||
u16 pkey_index,
|
||||
void *sec)
|
||||
{
|
||||
u64 subnet_prefix;
|
||||
u16 pkey;
|
||||
int ret;
|
||||
|
||||
ret = ib_get_cached_pkey(dev, port_num, pkey_index, &pkey);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = ib_get_cached_subnet_prefix(dev, port_num, &subnet_prefix);
|
||||
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
return security_ib_pkey_access(sec, subnet_prefix, pkey);
|
||||
}
|
||||
EXPORT_SYMBOL(ib_security_pkey_access);
|
||||
|
||||
static int ib_mad_agent_security_change(struct notifier_block *nb,
|
||||
unsigned long event,
|
||||
void *data)
|
||||
{
|
||||
struct ib_mad_agent *ag = container_of(nb, struct ib_mad_agent, lsm_nb);
|
||||
|
||||
if (event != LSM_POLICY_CHANGE)
|
||||
return NOTIFY_DONE;
|
||||
|
||||
ag->smp_allowed = !security_ib_endport_manage_subnet(ag->security,
|
||||
ag->device->name,
|
||||
ag->port_num);
|
||||
|
||||
return NOTIFY_OK;
|
||||
}
|
||||
|
||||
int ib_mad_agent_security_setup(struct ib_mad_agent *agent,
|
||||
enum ib_qp_type qp_type)
|
||||
{
|
||||
int ret;
|
||||
|
||||
ret = security_ib_alloc_security(&agent->security);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (qp_type != IB_QPT_SMI)
|
||||
return 0;
|
||||
|
||||
ret = security_ib_endport_manage_subnet(agent->security,
|
||||
agent->device->name,
|
||||
agent->port_num);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
agent->lsm_nb.notifier_call = ib_mad_agent_security_change;
|
||||
ret = register_lsm_notifier(&agent->lsm_nb);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
agent->smp_allowed = true;
|
||||
agent->lsm_nb_reg = true;
|
||||
return 0;
|
||||
}
|
||||
|
||||
void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent)
|
||||
{
|
||||
security_ib_free_security(agent->security);
|
||||
if (agent->lsm_nb_reg)
|
||||
unregister_lsm_notifier(&agent->lsm_nb);
|
||||
}
|
||||
|
||||
int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index)
|
||||
{
|
||||
int ret;
|
||||
|
||||
if (map->agent.qp->qp_type == IB_QPT_SMI && !map->agent.smp_allowed)
|
||||
return -EACCES;
|
||||
|
||||
ret = ib_security_pkey_access(map->agent.device,
|
||||
map->agent.port_num,
|
||||
pkey_index,
|
||||
map->agent.security);
|
||||
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif /* CONFIG_SECURITY_INFINIBAND */
|
|
@ -1508,6 +1508,10 @@ static int create_qp(struct ib_uverbs_file *file,
|
|||
}
|
||||
|
||||
if (cmd->qp_type != IB_QPT_XRC_TGT) {
|
||||
ret = ib_create_qp_security(qp, device);
|
||||
if (ret)
|
||||
goto err_cb;
|
||||
|
||||
qp->real_qp = qp;
|
||||
qp->device = device;
|
||||
qp->pd = pd;
|
||||
|
@ -2002,14 +2006,17 @@ static int modify_qp(struct ib_uverbs_file *file,
|
|||
if (ret)
|
||||
goto release_qp;
|
||||
}
|
||||
ret = qp->device->modify_qp(qp, attr,
|
||||
ret = ib_security_modify_qp(qp,
|
||||
attr,
|
||||
modify_qp_mask(qp->qp_type,
|
||||
cmd->base.attr_mask),
|
||||
udata);
|
||||
} else {
|
||||
ret = ib_modify_qp(qp, attr,
|
||||
modify_qp_mask(qp->qp_type,
|
||||
cmd->base.attr_mask));
|
||||
ret = ib_security_modify_qp(qp,
|
||||
attr,
|
||||
modify_qp_mask(qp->qp_type,
|
||||
cmd->base.attr_mask),
|
||||
NULL);
|
||||
}
|
||||
|
||||
release_qp:
|
||||
|
|
|
@ -44,6 +44,7 @@
|
|||
#include <linux/in.h>
|
||||
#include <linux/in6.h>
|
||||
#include <net/addrconf.h>
|
||||
#include <linux/security.h>
|
||||
|
||||
#include <rdma/ib_verbs.h>
|
||||
#include <rdma/ib_cache.h>
|
||||
|
@ -713,11 +714,19 @@ static struct ib_qp *__ib_open_qp(struct ib_qp *real_qp,
|
|||
{
|
||||
struct ib_qp *qp;
|
||||
unsigned long flags;
|
||||
int err;
|
||||
|
||||
qp = kzalloc(sizeof *qp, GFP_KERNEL);
|
||||
if (!qp)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
qp->real_qp = real_qp;
|
||||
err = ib_open_shared_qp_security(qp, real_qp->device);
|
||||
if (err) {
|
||||
kfree(qp);
|
||||
return ERR_PTR(err);
|
||||
}
|
||||
|
||||
qp->real_qp = real_qp;
|
||||
atomic_inc(&real_qp->usecnt);
|
||||
qp->device = real_qp->device;
|
||||
|
@ -804,6 +813,12 @@ struct ib_qp *ib_create_qp(struct ib_pd *pd,
|
|||
if (IS_ERR(qp))
|
||||
return qp;
|
||||
|
||||
ret = ib_create_qp_security(qp, device);
|
||||
if (ret) {
|
||||
ib_destroy_qp(qp);
|
||||
return ERR_PTR(ret);
|
||||
}
|
||||
|
||||
qp->device = device;
|
||||
qp->real_qp = qp;
|
||||
qp->uobject = NULL;
|
||||
|
@ -1266,7 +1281,7 @@ int ib_modify_qp(struct ib_qp *qp,
|
|||
return ret;
|
||||
}
|
||||
|
||||
return qp->device->modify_qp(qp->real_qp, qp_attr, qp_attr_mask, NULL);
|
||||
return ib_security_modify_qp(qp->real_qp, qp_attr, qp_attr_mask, NULL);
|
||||
}
|
||||
EXPORT_SYMBOL(ib_modify_qp);
|
||||
|
||||
|
@ -1295,6 +1310,7 @@ int ib_close_qp(struct ib_qp *qp)
|
|||
spin_unlock_irqrestore(&real_qp->device->event_handler_lock, flags);
|
||||
|
||||
atomic_dec(&real_qp->usecnt);
|
||||
ib_close_shared_qp_security(qp->qp_sec);
|
||||
kfree(qp);
|
||||
|
||||
return 0;
|
||||
|
@ -1335,6 +1351,7 @@ int ib_destroy_qp(struct ib_qp *qp)
|
|||
struct ib_cq *scq, *rcq;
|
||||
struct ib_srq *srq;
|
||||
struct ib_rwq_ind_table *ind_tbl;
|
||||
struct ib_qp_security *sec;
|
||||
int ret;
|
||||
|
||||
WARN_ON_ONCE(qp->mrs_used > 0);
|
||||
|
@ -1350,6 +1367,9 @@ int ib_destroy_qp(struct ib_qp *qp)
|
|||
rcq = qp->recv_cq;
|
||||
srq = qp->srq;
|
||||
ind_tbl = qp->rwq_ind_tbl;
|
||||
sec = qp->qp_sec;
|
||||
if (sec)
|
||||
ib_destroy_qp_security_begin(sec);
|
||||
|
||||
if (!qp->uobject)
|
||||
rdma_rw_cleanup_mrs(qp);
|
||||
|
@ -1366,6 +1386,11 @@ int ib_destroy_qp(struct ib_qp *qp)
|
|||
atomic_dec(&srq->usecnt);
|
||||
if (ind_tbl)
|
||||
atomic_dec(&ind_tbl->usecnt);
|
||||
if (sec)
|
||||
ib_destroy_qp_security_end(sec);
|
||||
} else {
|
||||
if (sec)
|
||||
ib_destroy_qp_security_abort(sec);
|
||||
}
|
||||
|
||||
return ret;
|
||||
|
|
|
@ -2545,10 +2545,25 @@ EXPORT_SYMBOL_GPL(nfs_set_sb_security);
|
|||
int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
|
||||
struct nfs_mount_info *mount_info)
|
||||
{
|
||||
int error;
|
||||
unsigned long kflags = 0, kflags_out = 0;
|
||||
|
||||
/* clone any lsm security options from the parent to the new sb */
|
||||
if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
|
||||
return -ESTALE;
|
||||
return security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
|
||||
|
||||
if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
|
||||
kflags |= SECURITY_LSM_NATIVE_LABELS;
|
||||
|
||||
error = security_sb_clone_mnt_opts(mount_info->cloned->sb, s, kflags,
|
||||
&kflags_out);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
|
||||
!(kflags_out & SECURITY_LSM_NATIVE_LABELS))
|
||||
NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
|
||||
return 0;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
|
||||
|
||||
|
|
|
@ -75,11 +75,17 @@ static inline void ima_add_kexec_buffer(struct kimage *image)
|
|||
#endif
|
||||
|
||||
#ifdef CONFIG_IMA_APPRAISE
|
||||
extern bool is_ima_appraise_enabled(void);
|
||||
extern void ima_inode_post_setattr(struct dentry *dentry);
|
||||
extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name,
|
||||
const void *xattr_value, size_t xattr_value_len);
|
||||
extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name);
|
||||
#else
|
||||
static inline bool is_ima_appraise_enabled(void)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void ima_inode_post_setattr(struct dentry *dentry)
|
||||
{
|
||||
return;
|
||||
|
|
|
@ -21,6 +21,7 @@
|
|||
#include <linux/path.h>
|
||||
#include <linux/key.h>
|
||||
#include <linux/skbuff.h>
|
||||
#include <rdma/ib_verbs.h>
|
||||
|
||||
struct lsm_network_audit {
|
||||
int netif;
|
||||
|
@ -45,6 +46,16 @@ struct lsm_ioctlop_audit {
|
|||
u16 cmd;
|
||||
};
|
||||
|
||||
struct lsm_ibpkey_audit {
|
||||
u64 subnet_prefix;
|
||||
u16 pkey;
|
||||
};
|
||||
|
||||
struct lsm_ibendport_audit {
|
||||
char dev_name[IB_DEVICE_NAME_MAX];
|
||||
u8 port;
|
||||
};
|
||||
|
||||
/* Auxiliary data to use in generating the audit record. */
|
||||
struct common_audit_data {
|
||||
char type;
|
||||
|
@ -60,6 +71,8 @@ struct common_audit_data {
|
|||
#define LSM_AUDIT_DATA_DENTRY 10
|
||||
#define LSM_AUDIT_DATA_IOCTL_OP 11
|
||||
#define LSM_AUDIT_DATA_FILE 12
|
||||
#define LSM_AUDIT_DATA_IBPKEY 13
|
||||
#define LSM_AUDIT_DATA_IBENDPORT 14
|
||||
union {
|
||||
struct path path;
|
||||
struct dentry *dentry;
|
||||
|
@ -77,6 +90,8 @@ struct common_audit_data {
|
|||
char *kmod_name;
|
||||
struct lsm_ioctlop_audit *op;
|
||||
struct file *file;
|
||||
struct lsm_ibpkey_audit *ibpkey;
|
||||
struct lsm_ibendport_audit *ibendport;
|
||||
} u;
|
||||
/* this union contains LSM specific data */
|
||||
union {
|
||||
|
|
|
@ -8,6 +8,7 @@
|
|||
* Copyright (C) 2001 Silicon Graphics, Inc. (Trust Technology Group)
|
||||
* Copyright (C) 2015 Intel Corporation.
|
||||
* Copyright (C) 2015 Casey Schaufler <casey@schaufler-ca.com>
|
||||
* Copyright (C) 2016 Mellanox Techonologies
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -912,6 +913,26 @@
|
|||
* associated with the TUN device's security structure.
|
||||
* @security pointer to the TUN devices's security structure.
|
||||
*
|
||||
* Security hooks for Infiniband
|
||||
*
|
||||
* @ib_pkey_access:
|
||||
* Check permission to access a pkey when modifing a QP.
|
||||
* @subnet_prefix the subnet prefix of the port being used.
|
||||
* @pkey the pkey to be accessed.
|
||||
* @sec pointer to a security structure.
|
||||
* @ib_endport_manage_subnet:
|
||||
* Check permissions to send and receive SMPs on a end port.
|
||||
* @dev_name the IB device name (i.e. mlx4_0).
|
||||
* @port_num the port number.
|
||||
* @sec pointer to a security structure.
|
||||
* @ib_alloc_security:
|
||||
* Allocate a security structure for Infiniband objects.
|
||||
* @sec pointer to a security structure pointer.
|
||||
* Returns 0 on success, non-zero on failure
|
||||
* @ib_free_security:
|
||||
* Deallocate an Infiniband security structure.
|
||||
* @sec contains the security structure to be freed.
|
||||
*
|
||||
* Security hooks for XFRM operations.
|
||||
*
|
||||
* @xfrm_policy_alloc_security:
|
||||
|
@ -1387,7 +1408,9 @@ union security_list_options {
|
|||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags);
|
||||
int (*sb_clone_mnt_opts)(const struct super_block *oldsb,
|
||||
struct super_block *newsb);
|
||||
struct super_block *newsb,
|
||||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags);
|
||||
int (*sb_parse_opts_str)(char *options, struct security_mnt_opts *opts);
|
||||
int (*dentry_init_security)(struct dentry *dentry, int mode,
|
||||
const struct qstr *name, void **ctx,
|
||||
|
@ -1619,6 +1642,14 @@ union security_list_options {
|
|||
int (*tun_dev_open)(void *security);
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
int (*ib_pkey_access)(void *sec, u64 subnet_prefix, u16 pkey);
|
||||
int (*ib_endport_manage_subnet)(void *sec, const char *dev_name,
|
||||
u8 port_num);
|
||||
int (*ib_alloc_security)(void **sec);
|
||||
void (*ib_free_security)(void *sec);
|
||||
#endif /* CONFIG_SECURITY_INFINIBAND */
|
||||
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
int (*xfrm_policy_alloc_security)(struct xfrm_sec_ctx **ctxp,
|
||||
struct xfrm_user_sec_ctx *sec_ctx,
|
||||
|
@ -1850,6 +1881,12 @@ struct security_hook_heads {
|
|||
struct list_head tun_dev_attach;
|
||||
struct list_head tun_dev_open;
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
struct list_head ib_pkey_access;
|
||||
struct list_head ib_endport_manage_subnet;
|
||||
struct list_head ib_alloc_security;
|
||||
struct list_head ib_free_security;
|
||||
#endif /* CONFIG_SECURITY_INFINIBAND */
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
struct list_head xfrm_policy_alloc_security;
|
||||
struct list_head xfrm_policy_clone_security;
|
||||
|
|
|
@ -6,6 +6,7 @@
|
|||
* Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com>
|
||||
* Copyright (C) 2001 James Morris <jmorris@intercode.com.au>
|
||||
* Copyright (C) 2001 Silicon Graphics, Inc. (Trust Technology Group)
|
||||
* Copyright (C) 2016 Mellanox Techonologies
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -68,6 +69,10 @@ struct audit_krule;
|
|||
struct user_namespace;
|
||||
struct timezone;
|
||||
|
||||
enum lsm_event {
|
||||
LSM_POLICY_CHANGE,
|
||||
};
|
||||
|
||||
/* These functions are in security/commoncap.c */
|
||||
extern int cap_capable(const struct cred *cred, struct user_namespace *ns,
|
||||
int cap, int audit);
|
||||
|
@ -163,6 +168,10 @@ struct security_mnt_opts {
|
|||
int num_mnt_opts;
|
||||
};
|
||||
|
||||
int call_lsm_notifier(enum lsm_event event, void *data);
|
||||
int register_lsm_notifier(struct notifier_block *nb);
|
||||
int unregister_lsm_notifier(struct notifier_block *nb);
|
||||
|
||||
static inline void security_init_mnt_opts(struct security_mnt_opts *opts)
|
||||
{
|
||||
opts->mnt_opts = NULL;
|
||||
|
@ -240,7 +249,9 @@ int security_sb_set_mnt_opts(struct super_block *sb,
|
|||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags);
|
||||
int security_sb_clone_mnt_opts(const struct super_block *oldsb,
|
||||
struct super_block *newsb);
|
||||
struct super_block *newsb,
|
||||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags);
|
||||
int security_sb_parse_opts_str(char *options, struct security_mnt_opts *opts);
|
||||
int security_dentry_init_security(struct dentry *dentry, int mode,
|
||||
const struct qstr *name, void **ctx,
|
||||
|
@ -381,6 +392,21 @@ int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen);
|
|||
struct security_mnt_opts {
|
||||
};
|
||||
|
||||
static inline int call_lsm_notifier(enum lsm_event event, void *data)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int register_lsm_notifier(struct notifier_block *nb)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int unregister_lsm_notifier(struct notifier_block *nb)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void security_init_mnt_opts(struct security_mnt_opts *opts)
|
||||
{
|
||||
}
|
||||
|
@ -581,7 +607,9 @@ static inline int security_sb_set_mnt_opts(struct super_block *sb,
|
|||
}
|
||||
|
||||
static inline int security_sb_clone_mnt_opts(const struct super_block *oldsb,
|
||||
struct super_block *newsb)
|
||||
struct super_block *newsb,
|
||||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
@ -1406,6 +1434,32 @@ static inline int security_tun_dev_open(void *security)
|
|||
}
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey);
|
||||
int security_ib_endport_manage_subnet(void *sec, const char *name, u8 port_num);
|
||||
int security_ib_alloc_security(void **sec);
|
||||
void security_ib_free_security(void *sec);
|
||||
#else /* CONFIG_SECURITY_INFINIBAND */
|
||||
static inline int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_ib_alloc_security(void **sec)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline void security_ib_free_security(void *sec)
|
||||
{
|
||||
}
|
||||
#endif /* CONFIG_SECURITY_INFINIBAND */
|
||||
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
|
||||
int security_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
|
||||
|
@ -1651,6 +1705,10 @@ extern struct dentry *securityfs_create_file(const char *name, umode_t mode,
|
|||
struct dentry *parent, void *data,
|
||||
const struct file_operations *fops);
|
||||
extern struct dentry *securityfs_create_dir(const char *name, struct dentry *parent);
|
||||
struct dentry *securityfs_create_symlink(const char *name,
|
||||
struct dentry *parent,
|
||||
const char *target,
|
||||
const struct inode_operations *iops);
|
||||
extern void securityfs_remove(struct dentry *dentry);
|
||||
|
||||
#else /* CONFIG_SECURITYFS */
|
||||
|
@ -1670,6 +1728,14 @@ static inline struct dentry *securityfs_create_file(const char *name,
|
|||
return ERR_PTR(-ENODEV);
|
||||
}
|
||||
|
||||
static inline struct dentry *securityfs_create_symlink(const char *name,
|
||||
struct dentry *parent,
|
||||
const char *target,
|
||||
const struct inode_operations *iops)
|
||||
{
|
||||
return ERR_PTR(-ENODEV);
|
||||
}
|
||||
|
||||
static inline void securityfs_remove(struct dentry *dentry)
|
||||
{}
|
||||
|
||||
|
|
|
@ -575,6 +575,10 @@ struct ib_mad_agent {
|
|||
u32 flags;
|
||||
u8 port_num;
|
||||
u8 rmpp_version;
|
||||
void *security;
|
||||
bool smp_allowed;
|
||||
bool lsm_nb_reg;
|
||||
struct notifier_block lsm_nb;
|
||||
};
|
||||
|
||||
/**
|
||||
|
|
|
@ -1614,6 +1614,45 @@ struct ib_rwq_ind_table_init_attr {
|
|||
struct ib_wq **ind_tbl;
|
||||
};
|
||||
|
||||
enum port_pkey_state {
|
||||
IB_PORT_PKEY_NOT_VALID = 0,
|
||||
IB_PORT_PKEY_VALID = 1,
|
||||
IB_PORT_PKEY_LISTED = 2,
|
||||
};
|
||||
|
||||
struct ib_qp_security;
|
||||
|
||||
struct ib_port_pkey {
|
||||
enum port_pkey_state state;
|
||||
u16 pkey_index;
|
||||
u8 port_num;
|
||||
struct list_head qp_list;
|
||||
struct list_head to_error_list;
|
||||
struct ib_qp_security *sec;
|
||||
};
|
||||
|
||||
struct ib_ports_pkeys {
|
||||
struct ib_port_pkey main;
|
||||
struct ib_port_pkey alt;
|
||||
};
|
||||
|
||||
struct ib_qp_security {
|
||||
struct ib_qp *qp;
|
||||
struct ib_device *dev;
|
||||
/* Hold this mutex when changing port and pkey settings. */
|
||||
struct mutex mutex;
|
||||
struct ib_ports_pkeys *ports_pkeys;
|
||||
/* A list of all open shared QP handles. Required to enforce security
|
||||
* properly for all users of a shared QP.
|
||||
*/
|
||||
struct list_head shared_qp_list;
|
||||
void *security;
|
||||
bool destroying;
|
||||
atomic_t error_list_count;
|
||||
struct completion error_complete;
|
||||
int error_comps_pending;
|
||||
};
|
||||
|
||||
/*
|
||||
* @max_write_sge: Maximum SGE elements per RDMA WRITE request.
|
||||
* @max_read_sge: Maximum SGE elements per RDMA READ request.
|
||||
|
@ -1643,6 +1682,7 @@ struct ib_qp {
|
|||
u32 max_read_sge;
|
||||
enum ib_qp_type qp_type;
|
||||
struct ib_rwq_ind_table *rwq_ind_tbl;
|
||||
struct ib_qp_security *qp_sec;
|
||||
};
|
||||
|
||||
struct ib_mr {
|
||||
|
@ -1891,6 +1931,7 @@ enum ib_mad_result {
|
|||
};
|
||||
|
||||
struct ib_port_cache {
|
||||
u64 subnet_prefix;
|
||||
struct ib_pkey_cache *pkey;
|
||||
struct ib_gid_table *gid;
|
||||
u8 lmc;
|
||||
|
@ -1940,6 +1981,12 @@ struct rdma_netdev {
|
|||
union ib_gid *gid, u16 mlid);
|
||||
};
|
||||
|
||||
struct ib_port_pkey_list {
|
||||
/* Lock to hold while modifying the list. */
|
||||
spinlock_t list_lock;
|
||||
struct list_head pkey_list;
|
||||
};
|
||||
|
||||
struct ib_device {
|
||||
/* Do not access @dma_device directly from ULP nor from HW drivers. */
|
||||
struct device *dma_device;
|
||||
|
@ -1963,6 +2010,8 @@ struct ib_device {
|
|||
|
||||
int num_comp_vectors;
|
||||
|
||||
struct ib_port_pkey_list *port_pkey_list;
|
||||
|
||||
struct iw_cm_verbs *iwcm;
|
||||
|
||||
/**
|
||||
|
|
|
@ -80,6 +80,8 @@
|
|||
#define BTRFS_TEST_MAGIC 0x73727279
|
||||
#define NSFS_MAGIC 0x6e736673
|
||||
#define BPF_FS_MAGIC 0xcafe4a11
|
||||
#define AAFS_MAGIC 0x5a3c69f0
|
||||
|
||||
/* Since UDF 2.01 is ISO 13346 based... */
|
||||
#define UDF_SUPER_MAGIC 0x15013346
|
||||
#define BALLOON_KVM_MAGIC 0x13661366
|
||||
|
|
|
@ -46,4 +46,8 @@ struct vtpm_proxy_new_dev {
|
|||
|
||||
#define VTPM_PROXY_IOC_NEW_DEV _IOWR(0xa1, 0x00, struct vtpm_proxy_new_dev)
|
||||
|
||||
/* vendor specific commands to set locality */
|
||||
#define TPM2_CC_SET_LOCALITY 0x20001000
|
||||
#define TPM_ORD_SET_LOCALITY 0x20001000
|
||||
|
||||
#endif /* _UAPI_LINUX_VTPM_PROXY_H */
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
* of Berkeley Packet Filters/Linux Socket Filters.
|
||||
*/
|
||||
|
||||
#include <linux/atomic.h>
|
||||
#include <linux/refcount.h>
|
||||
#include <linux/audit.h>
|
||||
#include <linux/compat.h>
|
||||
#include <linux/coredump.h>
|
||||
|
@ -56,7 +56,7 @@
|
|||
* to a task_struct (other than @usage).
|
||||
*/
|
||||
struct seccomp_filter {
|
||||
atomic_t usage;
|
||||
refcount_t usage;
|
||||
struct seccomp_filter *prev;
|
||||
struct bpf_prog *prog;
|
||||
};
|
||||
|
@ -378,7 +378,7 @@ static struct seccomp_filter *seccomp_prepare_filter(struct sock_fprog *fprog)
|
|||
return ERR_PTR(ret);
|
||||
}
|
||||
|
||||
atomic_set(&sfilter->usage, 1);
|
||||
refcount_set(&sfilter->usage, 1);
|
||||
|
||||
return sfilter;
|
||||
}
|
||||
|
@ -465,7 +465,7 @@ void get_seccomp_filter(struct task_struct *tsk)
|
|||
if (!orig)
|
||||
return;
|
||||
/* Reference count is bounded by the number of total processes. */
|
||||
atomic_inc(&orig->usage);
|
||||
refcount_inc(&orig->usage);
|
||||
}
|
||||
|
||||
static inline void seccomp_filter_free(struct seccomp_filter *filter)
|
||||
|
@ -481,7 +481,7 @@ void put_seccomp_filter(struct task_struct *tsk)
|
|||
{
|
||||
struct seccomp_filter *orig = tsk->seccomp.filter;
|
||||
/* Clean up single-reference branches iteratively. */
|
||||
while (orig && atomic_dec_and_test(&orig->usage)) {
|
||||
while (orig && refcount_dec_and_test(&orig->usage)) {
|
||||
struct seccomp_filter *freeme = orig;
|
||||
orig = orig->prev;
|
||||
seccomp_filter_free(freeme);
|
||||
|
@ -641,11 +641,12 @@ static int __seccomp_filter(int this_syscall, const struct seccomp_data *sd,
|
|||
return 0;
|
||||
|
||||
case SECCOMP_RET_KILL:
|
||||
default: {
|
||||
siginfo_t info;
|
||||
default:
|
||||
audit_seccomp(this_syscall, SIGSYS, action);
|
||||
/* Dump core only if this is the last remaining thread. */
|
||||
if (get_nr_threads(current) == 1) {
|
||||
siginfo_t info;
|
||||
|
||||
/* Show the original registers in the dump. */
|
||||
syscall_rollback(current, task_pt_regs(current));
|
||||
/* Trigger a manual coredump since do_exit skips it. */
|
||||
|
@ -654,7 +655,6 @@ static int __seccomp_filter(int this_syscall, const struct seccomp_data *sd,
|
|||
}
|
||||
do_exit(SIGSYS);
|
||||
}
|
||||
}
|
||||
|
||||
unreachable();
|
||||
|
||||
|
|
|
@ -54,6 +54,15 @@ config SECURITY_NETWORK
|
|||
implement socket and networking access controls.
|
||||
If you are unsure how to answer this question, answer N.
|
||||
|
||||
config SECURITY_INFINIBAND
|
||||
bool "Infiniband Security Hooks"
|
||||
depends on SECURITY && INFINIBAND
|
||||
help
|
||||
This enables the Infiniband security hooks.
|
||||
If enabled, a security module can use these hooks to
|
||||
implement Infiniband access controls.
|
||||
If you are unsure how to answer this question, answer N.
|
||||
|
||||
config SECURITY_NETWORK_XFRM
|
||||
bool "XFRM (IPSec) Networking Security Hooks"
|
||||
depends on XFRM && SECURITY_NETWORK
|
||||
|
@ -139,7 +148,7 @@ config HARDENED_USERCOPY
|
|||
copying memory to/from the kernel (via copy_to_user() and
|
||||
copy_from_user() functions) by rejecting memory ranges that
|
||||
are larger than the specified heap object, span multiple
|
||||
separately allocates pages, are not on the process stack,
|
||||
separately allocated pages, are not on the process stack,
|
||||
or are part of the kernel text. This kills entire classes
|
||||
of heap overflow exploits and similar kernel memory exposures.
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o
|
|||
|
||||
apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
|
||||
path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
||||
resource.o secid.o file.o policy_ns.o
|
||||
resource.o secid.o file.o policy_ns.o label.o
|
||||
apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o
|
||||
|
||||
clean-files := capability_names.h rlim_names.h
|
||||
|
@ -20,7 +20,7 @@ cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\
|
|||
sed $< >>$@ -r -n -e '/CAP_FS_MASK/d' \
|
||||
-e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';\
|
||||
echo "};" >> $@ ;\
|
||||
echo -n '\#define AA_FS_CAPS_MASK "' >> $@ ;\
|
||||
printf '%s' '\#define AA_SFS_CAPS_MASK "' >> $@ ;\
|
||||
sed $< -r -n -e '/CAP_FS_MASK/d' \
|
||||
-e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' | \
|
||||
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@
|
||||
|
@ -46,7 +46,7 @@ cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\
|
|||
# #define RLIMIT_FSIZE 1 /* Maximum filesize */
|
||||
# #define RLIMIT_STACK 3 /* max stack size */
|
||||
# to
|
||||
# #define AA_FS_RLIMIT_MASK "fsize stack"
|
||||
# #define AA_SFS_RLIMIT_MASK "fsize stack"
|
||||
quiet_cmd_make-rlim = GEN $@
|
||||
cmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \
|
||||
> $@ ;\
|
||||
|
@ -56,7 +56,7 @@ cmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \
|
|||
echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;\
|
||||
sed -r -n "s/^\# ?define[ \t]+(RLIMIT_[A-Z0-9_]+).*/\1,/p" $< >> $@ ;\
|
||||
echo "};" >> $@ ; \
|
||||
echo -n '\#define AA_FS_RLIMIT_MASK "' >> $@ ;\
|
||||
printf '%s' '\#define AA_SFS_RLIMIT_MASK "' >> $@ ;\
|
||||
sed -r -n 's/^\# ?define[ \t]+RLIMIT_([A-Z0-9_]+).*/\L\1/p' $< | \
|
||||
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@
|
||||
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -77,14 +77,24 @@ static void audit_pre(struct audit_buffer *ab, void *ca)
|
|||
audit_log_format(ab, " error=%d", aad(sa)->error);
|
||||
}
|
||||
|
||||
if (aad(sa)->profile) {
|
||||
struct aa_profile *profile = aad(sa)->profile;
|
||||
if (profile->ns != root_ns) {
|
||||
audit_log_format(ab, " namespace=");
|
||||
audit_log_untrustedstring(ab, profile->ns->base.hname);
|
||||
if (aad(sa)->label) {
|
||||
struct aa_label *label = aad(sa)->label;
|
||||
|
||||
if (label_isprofile(label)) {
|
||||
struct aa_profile *profile = labels_profile(label);
|
||||
|
||||
if (profile->ns != root_ns) {
|
||||
audit_log_format(ab, " namespace=");
|
||||
audit_log_untrustedstring(ab,
|
||||
profile->ns->base.hname);
|
||||
}
|
||||
audit_log_format(ab, " profile=");
|
||||
audit_log_untrustedstring(ab, profile->base.hname);
|
||||
} else {
|
||||
audit_log_format(ab, " label=");
|
||||
aa_label_xaudit(ab, root_ns, label, FLAG_VIEW_SUBNS,
|
||||
GFP_ATOMIC);
|
||||
}
|
||||
audit_log_format(ab, " profile=");
|
||||
audit_log_untrustedstring(ab, profile->base.hname);
|
||||
}
|
||||
|
||||
if (aad(sa)->name) {
|
||||
|
@ -139,8 +149,7 @@ int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa,
|
|||
if (KILL_MODE(profile) && type == AUDIT_APPARMOR_DENIED)
|
||||
type = AUDIT_APPARMOR_KILL;
|
||||
|
||||
if (!unconfined(profile))
|
||||
aad(sa)->profile = profile;
|
||||
aad(sa)->label = &profile->label;
|
||||
|
||||
aa_audit_msg(type, sa, cb);
|
||||
|
||||
|
|
|
@ -28,8 +28,8 @@
|
|||
*/
|
||||
#include "capability_names.h"
|
||||
|
||||
struct aa_fs_entry aa_fs_entry_caps[] = {
|
||||
AA_FS_FILE_STRING("mask", AA_FS_CAPS_MASK),
|
||||
struct aa_sfs_entry aa_sfs_entry_caps[] = {
|
||||
AA_SFS_FILE_STRING("mask", AA_SFS_CAPS_MASK),
|
||||
{ }
|
||||
};
|
||||
|
||||
|
@ -48,15 +48,16 @@ static DEFINE_PER_CPU(struct audit_cache, audit_cache);
|
|||
static void audit_cb(struct audit_buffer *ab, void *va)
|
||||
{
|
||||
struct common_audit_data *sa = va;
|
||||
|
||||
audit_log_format(ab, " capname=");
|
||||
audit_log_untrustedstring(ab, capability_names[sa->u.cap]);
|
||||
}
|
||||
|
||||
/**
|
||||
* audit_caps - audit a capability
|
||||
* @sa: audit data
|
||||
* @profile: profile being tested for confinement (NOT NULL)
|
||||
* @cap: capability tested
|
||||
@audit: whether an audit record should be generated
|
||||
* @error: error code returned by test
|
||||
*
|
||||
* Do auditing of capability and handle, audit/complain/kill modes switching
|
||||
|
@ -64,16 +65,13 @@ static void audit_cb(struct audit_buffer *ab, void *va)
|
|||
*
|
||||
* Returns: 0 or sa->error on success, error code on failure
|
||||
*/
|
||||
static int audit_caps(struct aa_profile *profile, int cap, int audit,
|
||||
int error)
|
||||
static int audit_caps(struct common_audit_data *sa, struct aa_profile *profile,
|
||||
int cap, int error)
|
||||
{
|
||||
struct audit_cache *ent;
|
||||
int type = AUDIT_APPARMOR_AUTO;
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_CAP, OP_CAPABLE);
|
||||
sa.u.cap = cap;
|
||||
aad(&sa)->error = error;
|
||||
if (audit == SECURITY_CAP_NOAUDIT)
|
||||
aad(&sa)->info = "optional: no audit";
|
||||
|
||||
aad(sa)->error = error;
|
||||
|
||||
if (likely(!error)) {
|
||||
/* test if auditing is being forced */
|
||||
|
@ -105,24 +103,44 @@ static int audit_caps(struct aa_profile *profile, int cap, int audit,
|
|||
}
|
||||
put_cpu_var(audit_cache);
|
||||
|
||||
return aa_audit(type, profile, &sa, audit_cb);
|
||||
return aa_audit(type, profile, sa, audit_cb);
|
||||
}
|
||||
|
||||
/**
|
||||
* profile_capable - test if profile allows use of capability @cap
|
||||
* @profile: profile being enforced (NOT NULL, NOT unconfined)
|
||||
* @cap: capability to test if allowed
|
||||
* @audit: whether an audit record should be generated
|
||||
* @sa: audit data (MAY BE NULL indicating no auditing)
|
||||
*
|
||||
* Returns: 0 if allowed else -EPERM
|
||||
*/
|
||||
static int profile_capable(struct aa_profile *profile, int cap)
|
||||
static int profile_capable(struct aa_profile *profile, int cap, int audit,
|
||||
struct common_audit_data *sa)
|
||||
{
|
||||
return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM;
|
||||
int error;
|
||||
|
||||
if (cap_raised(profile->caps.allow, cap) &&
|
||||
!cap_raised(profile->caps.denied, cap))
|
||||
error = 0;
|
||||
else
|
||||
error = -EPERM;
|
||||
|
||||
if (audit == SECURITY_CAP_NOAUDIT) {
|
||||
if (!COMPLAIN_MODE(profile))
|
||||
return error;
|
||||
/* audit the cap request in complain mode but note that it
|
||||
* should be optional.
|
||||
*/
|
||||
aad(sa)->info = "optional: no audit";
|
||||
}
|
||||
|
||||
return audit_caps(sa, profile, cap, error);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_capable - test permission to use capability
|
||||
* @profile: profile being tested against (NOT NULL)
|
||||
* @label: label being tested for capability (NOT NULL)
|
||||
* @cap: capability to be tested
|
||||
* @audit: whether an audit record should be generated
|
||||
*
|
||||
|
@ -130,14 +148,15 @@ static int profile_capable(struct aa_profile *profile, int cap)
|
|||
*
|
||||
* Returns: 0 on success, or else an error code.
|
||||
*/
|
||||
int aa_capable(struct aa_profile *profile, int cap, int audit)
|
||||
int aa_capable(struct aa_label *label, int cap, int audit)
|
||||
{
|
||||
int error = profile_capable(profile, cap);
|
||||
struct aa_profile *profile;
|
||||
int error = 0;
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_CAP, OP_CAPABLE);
|
||||
|
||||
if (audit == SECURITY_CAP_NOAUDIT) {
|
||||
if (!COMPLAIN_MODE(profile))
|
||||
return error;
|
||||
}
|
||||
sa.u.cap = cap;
|
||||
error = fn_for_each_confined(label, profile,
|
||||
profile_capable(profile, cap, audit, &sa));
|
||||
|
||||
return audit_caps(profile, cap, audit, error);
|
||||
return error;
|
||||
}
|
||||
|
|
|
@ -14,9 +14,9 @@
|
|||
*
|
||||
*
|
||||
* AppArmor sets confinement on every task, via the the aa_task_ctx and
|
||||
* the aa_task_ctx.profile, both of which are required and are not allowed
|
||||
* the aa_task_ctx.label, both of which are required and are not allowed
|
||||
* to be NULL. The aa_task_ctx is not reference counted and is unique
|
||||
* to each cred (which is reference count). The profile pointed to by
|
||||
* to each cred (which is reference count). The label pointed to by
|
||||
* the task_ctx is reference counted.
|
||||
*
|
||||
* TODO
|
||||
|
@ -47,9 +47,9 @@ struct aa_task_ctx *aa_alloc_task_context(gfp_t flags)
|
|||
void aa_free_task_context(struct aa_task_ctx *ctx)
|
||||
{
|
||||
if (ctx) {
|
||||
aa_put_profile(ctx->profile);
|
||||
aa_put_profile(ctx->previous);
|
||||
aa_put_profile(ctx->onexec);
|
||||
aa_put_label(ctx->label);
|
||||
aa_put_label(ctx->previous);
|
||||
aa_put_label(ctx->onexec);
|
||||
|
||||
kzfree(ctx);
|
||||
}
|
||||
|
@ -63,41 +63,41 @@ void aa_free_task_context(struct aa_task_ctx *ctx)
|
|||
void aa_dup_task_context(struct aa_task_ctx *new, const struct aa_task_ctx *old)
|
||||
{
|
||||
*new = *old;
|
||||
aa_get_profile(new->profile);
|
||||
aa_get_profile(new->previous);
|
||||
aa_get_profile(new->onexec);
|
||||
aa_get_label(new->label);
|
||||
aa_get_label(new->previous);
|
||||
aa_get_label(new->onexec);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_get_task_profile - Get another task's profile
|
||||
* aa_get_task_label - Get another task's label
|
||||
* @task: task to query (NOT NULL)
|
||||
*
|
||||
* Returns: counted reference to @task's profile
|
||||
* Returns: counted reference to @task's label
|
||||
*/
|
||||
struct aa_profile *aa_get_task_profile(struct task_struct *task)
|
||||
struct aa_label *aa_get_task_label(struct task_struct *task)
|
||||
{
|
||||
struct aa_profile *p;
|
||||
struct aa_label *p;
|
||||
|
||||
rcu_read_lock();
|
||||
p = aa_get_profile(__aa_task_profile(task));
|
||||
p = aa_get_newest_label(__aa_task_raw_label(task));
|
||||
rcu_read_unlock();
|
||||
|
||||
return p;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_replace_current_profile - replace the current tasks profiles
|
||||
* @profile: new profile (NOT NULL)
|
||||
* aa_replace_current_label - replace the current tasks label
|
||||
* @label: new label (NOT NULL)
|
||||
*
|
||||
* Returns: 0 or error on failure
|
||||
*/
|
||||
int aa_replace_current_profile(struct aa_profile *profile)
|
||||
int aa_replace_current_label(struct aa_label *label)
|
||||
{
|
||||
struct aa_task_ctx *ctx = current_ctx();
|
||||
struct cred *new;
|
||||
AA_BUG(!profile);
|
||||
AA_BUG(!label);
|
||||
|
||||
if (ctx->profile == profile)
|
||||
if (ctx->label == label)
|
||||
return 0;
|
||||
|
||||
if (current_cred() != current_real_cred())
|
||||
|
@ -108,8 +108,8 @@ int aa_replace_current_profile(struct aa_profile *profile)
|
|||
return -ENOMEM;
|
||||
|
||||
ctx = cred_ctx(new);
|
||||
if (unconfined(profile) || (ctx->profile->ns != profile->ns))
|
||||
/* if switching to unconfined or a different profile namespace
|
||||
if (unconfined(label) || (labels_ns(ctx->label) != labels_ns(label)))
|
||||
/* if switching to unconfined or a different label namespace
|
||||
* clear out context state
|
||||
*/
|
||||
aa_clear_task_ctx_trans(ctx);
|
||||
|
@ -120,9 +120,9 @@ int aa_replace_current_profile(struct aa_profile *profile)
|
|||
* keeping @profile valid, so make sure to get its reference before
|
||||
* dropping the reference on ctx->profile
|
||||
*/
|
||||
aa_get_profile(profile);
|
||||
aa_put_profile(ctx->profile);
|
||||
ctx->profile = profile;
|
||||
aa_get_label(label);
|
||||
aa_put_label(ctx->label);
|
||||
ctx->label = label;
|
||||
|
||||
commit_creds(new);
|
||||
return 0;
|
||||
|
@ -130,11 +130,11 @@ int aa_replace_current_profile(struct aa_profile *profile)
|
|||
|
||||
/**
|
||||
* aa_set_current_onexec - set the tasks change_profile to happen onexec
|
||||
* @profile: system profile to set at exec (MAYBE NULL to clear value)
|
||||
*
|
||||
* @label: system label to set at exec (MAYBE NULL to clear value)
|
||||
* @stack: whether stacking should be done
|
||||
* Returns: 0 or error on failure
|
||||
*/
|
||||
int aa_set_current_onexec(struct aa_profile *profile)
|
||||
int aa_set_current_onexec(struct aa_label *label, bool stack)
|
||||
{
|
||||
struct aa_task_ctx *ctx;
|
||||
struct cred *new = prepare_creds();
|
||||
|
@ -142,9 +142,10 @@ int aa_set_current_onexec(struct aa_profile *profile)
|
|||
return -ENOMEM;
|
||||
|
||||
ctx = cred_ctx(new);
|
||||
aa_get_profile(profile);
|
||||
aa_put_profile(ctx->onexec);
|
||||
ctx->onexec = profile;
|
||||
aa_get_label(label);
|
||||
aa_clear_task_ctx_trans(ctx);
|
||||
ctx->onexec = label;
|
||||
ctx->token = stack;
|
||||
|
||||
commit_creds(new);
|
||||
return 0;
|
||||
|
@ -152,7 +153,7 @@ int aa_set_current_onexec(struct aa_profile *profile)
|
|||
|
||||
/**
|
||||
* aa_set_current_hat - set the current tasks hat
|
||||
* @profile: profile to set as the current hat (NOT NULL)
|
||||
* @label: label to set as the current hat (NOT NULL)
|
||||
* @token: token value that must be specified to change from the hat
|
||||
*
|
||||
* Do switch of tasks hat. If the task is currently in a hat
|
||||
|
@ -160,29 +161,29 @@ int aa_set_current_onexec(struct aa_profile *profile)
|
|||
*
|
||||
* Returns: 0 or error on failure
|
||||
*/
|
||||
int aa_set_current_hat(struct aa_profile *profile, u64 token)
|
||||
int aa_set_current_hat(struct aa_label *label, u64 token)
|
||||
{
|
||||
struct aa_task_ctx *ctx;
|
||||
struct cred *new = prepare_creds();
|
||||
if (!new)
|
||||
return -ENOMEM;
|
||||
AA_BUG(!profile);
|
||||
AA_BUG(!label);
|
||||
|
||||
ctx = cred_ctx(new);
|
||||
if (!ctx->previous) {
|
||||
/* transfer refcount */
|
||||
ctx->previous = ctx->profile;
|
||||
ctx->previous = ctx->label;
|
||||
ctx->token = token;
|
||||
} else if (ctx->token == token) {
|
||||
aa_put_profile(ctx->profile);
|
||||
aa_put_label(ctx->label);
|
||||
} else {
|
||||
/* previous_profile && ctx->token != token */
|
||||
abort_creds(new);
|
||||
return -EACCES;
|
||||
}
|
||||
ctx->profile = aa_get_newest_profile(profile);
|
||||
ctx->label = aa_get_newest_label(label);
|
||||
/* clear exec on switching context */
|
||||
aa_put_profile(ctx->onexec);
|
||||
aa_put_label(ctx->onexec);
|
||||
ctx->onexec = NULL;
|
||||
|
||||
commit_creds(new);
|
||||
|
@ -190,15 +191,15 @@ int aa_set_current_hat(struct aa_profile *profile, u64 token)
|
|||
}
|
||||
|
||||
/**
|
||||
* aa_restore_previous_profile - exit from hat context restoring the profile
|
||||
* aa_restore_previous_label - exit from hat context restoring previous label
|
||||
* @token: the token that must be matched to exit hat context
|
||||
*
|
||||
* Attempt to return out of a hat to the previous profile. The token
|
||||
* Attempt to return out of a hat to the previous label. The token
|
||||
* must match the stored token value.
|
||||
*
|
||||
* Returns: 0 or error of failure
|
||||
*/
|
||||
int aa_restore_previous_profile(u64 token)
|
||||
int aa_restore_previous_label(u64 token)
|
||||
{
|
||||
struct aa_task_ctx *ctx;
|
||||
struct cred *new = prepare_creds();
|
||||
|
@ -210,15 +211,15 @@ int aa_restore_previous_profile(u64 token)
|
|||
abort_creds(new);
|
||||
return -EACCES;
|
||||
}
|
||||
/* ignore restores when there is no saved profile */
|
||||
/* ignore restores when there is no saved label */
|
||||
if (!ctx->previous) {
|
||||
abort_creds(new);
|
||||
return 0;
|
||||
}
|
||||
|
||||
aa_put_profile(ctx->profile);
|
||||
ctx->profile = aa_get_newest_profile(ctx->previous);
|
||||
AA_BUG(!ctx->profile);
|
||||
aa_put_label(ctx->label);
|
||||
ctx->label = aa_get_newest_label(ctx->previous);
|
||||
AA_BUG(!ctx->label);
|
||||
/* clear exec && prev information when restoring to previous context */
|
||||
aa_clear_task_ctx_trans(ctx);
|
||||
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -12,15 +12,30 @@
|
|||
* License.
|
||||
*/
|
||||
|
||||
#include <linux/tty.h>
|
||||
#include <linux/fdtable.h>
|
||||
#include <linux/file.h>
|
||||
|
||||
#include "include/apparmor.h"
|
||||
#include "include/audit.h"
|
||||
#include "include/context.h"
|
||||
#include "include/file.h"
|
||||
#include "include/match.h"
|
||||
#include "include/path.h"
|
||||
#include "include/policy.h"
|
||||
#include "include/label.h"
|
||||
|
||||
struct file_perms nullperms;
|
||||
static u32 map_mask_to_chr_mask(u32 mask)
|
||||
{
|
||||
u32 m = mask & PERMS_CHRS_MASK;
|
||||
|
||||
if (mask & AA_MAY_GETATTR)
|
||||
m |= MAY_READ;
|
||||
if (mask & (AA_MAY_SETATTR | AA_MAY_CHMOD | AA_MAY_CHOWN))
|
||||
m |= MAY_WRITE;
|
||||
|
||||
return m;
|
||||
}
|
||||
|
||||
/**
|
||||
* audit_file_mask - convert mask to permission string
|
||||
|
@ -31,29 +46,7 @@ static void audit_file_mask(struct audit_buffer *ab, u32 mask)
|
|||
{
|
||||
char str[10];
|
||||
|
||||
char *m = str;
|
||||
|
||||
if (mask & AA_EXEC_MMAP)
|
||||
*m++ = 'm';
|
||||
if (mask & (MAY_READ | AA_MAY_META_READ))
|
||||
*m++ = 'r';
|
||||
if (mask & (MAY_WRITE | AA_MAY_META_WRITE | AA_MAY_CHMOD |
|
||||
AA_MAY_CHOWN))
|
||||
*m++ = 'w';
|
||||
else if (mask & MAY_APPEND)
|
||||
*m++ = 'a';
|
||||
if (mask & AA_MAY_CREATE)
|
||||
*m++ = 'c';
|
||||
if (mask & AA_MAY_DELETE)
|
||||
*m++ = 'd';
|
||||
if (mask & AA_MAY_LINK)
|
||||
*m++ = 'l';
|
||||
if (mask & AA_MAY_LOCK)
|
||||
*m++ = 'k';
|
||||
if (mask & MAY_EXEC)
|
||||
*m++ = 'x';
|
||||
*m = '\0';
|
||||
|
||||
aa_perm_mask_to_str(str, aa_file_perm_chrs, map_mask_to_chr_mask(mask));
|
||||
audit_log_string(ab, str);
|
||||
}
|
||||
|
||||
|
@ -67,22 +60,26 @@ static void file_audit_cb(struct audit_buffer *ab, void *va)
|
|||
struct common_audit_data *sa = va;
|
||||
kuid_t fsuid = current_fsuid();
|
||||
|
||||
if (aad(sa)->fs.request & AA_AUDIT_FILE_MASK) {
|
||||
if (aad(sa)->request & AA_AUDIT_FILE_MASK) {
|
||||
audit_log_format(ab, " requested_mask=");
|
||||
audit_file_mask(ab, aad(sa)->fs.request);
|
||||
audit_file_mask(ab, aad(sa)->request);
|
||||
}
|
||||
if (aad(sa)->fs.denied & AA_AUDIT_FILE_MASK) {
|
||||
if (aad(sa)->denied & AA_AUDIT_FILE_MASK) {
|
||||
audit_log_format(ab, " denied_mask=");
|
||||
audit_file_mask(ab, aad(sa)->fs.denied);
|
||||
audit_file_mask(ab, aad(sa)->denied);
|
||||
}
|
||||
if (aad(sa)->fs.request & AA_AUDIT_FILE_MASK) {
|
||||
if (aad(sa)->request & AA_AUDIT_FILE_MASK) {
|
||||
audit_log_format(ab, " fsuid=%d",
|
||||
from_kuid(&init_user_ns, fsuid));
|
||||
audit_log_format(ab, " ouid=%d",
|
||||
from_kuid(&init_user_ns, aad(sa)->fs.ouid));
|
||||
}
|
||||
|
||||
if (aad(sa)->fs.target) {
|
||||
if (aad(sa)->peer) {
|
||||
audit_log_format(ab, " target=");
|
||||
aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
|
||||
FLAG_VIEW_SUBNS, GFP_ATOMIC);
|
||||
} else if (aad(sa)->fs.target) {
|
||||
audit_log_format(ab, " target=");
|
||||
audit_log_untrustedstring(ab, aad(sa)->fs.target);
|
||||
}
|
||||
|
@ -92,28 +89,30 @@ static void file_audit_cb(struct audit_buffer *ab, void *va)
|
|||
* aa_audit_file - handle the auditing of file operations
|
||||
* @profile: the profile being enforced (NOT NULL)
|
||||
* @perms: the permissions computed for the request (NOT NULL)
|
||||
* @gfp: allocation flags
|
||||
* @op: operation being mediated
|
||||
* @request: permissions requested
|
||||
* @name: name of object being mediated (MAYBE NULL)
|
||||
* @target: name of target (MAYBE NULL)
|
||||
* @tlabel: target label (MAY BE NULL)
|
||||
* @ouid: object uid
|
||||
* @info: extra information message (MAYBE NULL)
|
||||
* @error: 0 if operation allowed else failure error code
|
||||
*
|
||||
* Returns: %0 or error on failure
|
||||
*/
|
||||
int aa_audit_file(struct aa_profile *profile, struct file_perms *perms,
|
||||
int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms,
|
||||
const char *op, u32 request, const char *name,
|
||||
const char *target, kuid_t ouid, const char *info, int error)
|
||||
const char *target, struct aa_label *tlabel,
|
||||
kuid_t ouid, const char *info, int error)
|
||||
{
|
||||
int type = AUDIT_APPARMOR_AUTO;
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_TASK, op);
|
||||
|
||||
sa.u.tsk = NULL;
|
||||
aad(&sa)->fs.request = request;
|
||||
aad(&sa)->request = request;
|
||||
aad(&sa)->name = name;
|
||||
aad(&sa)->fs.target = target;
|
||||
aad(&sa)->peer = tlabel;
|
||||
aad(&sa)->fs.ouid = ouid;
|
||||
aad(&sa)->info = info;
|
||||
aad(&sa)->error = error;
|
||||
|
@ -126,33 +125,66 @@ int aa_audit_file(struct aa_profile *profile, struct file_perms *perms,
|
|||
mask = 0xffff;
|
||||
|
||||
/* mask off perms that are not being force audited */
|
||||
aad(&sa)->fs.request &= mask;
|
||||
aad(&sa)->request &= mask;
|
||||
|
||||
if (likely(!aad(&sa)->fs.request))
|
||||
if (likely(!aad(&sa)->request))
|
||||
return 0;
|
||||
type = AUDIT_APPARMOR_AUDIT;
|
||||
} else {
|
||||
/* only report permissions that were denied */
|
||||
aad(&sa)->fs.request = aad(&sa)->fs.request & ~perms->allow;
|
||||
AA_BUG(!aad(&sa)->fs.request);
|
||||
aad(&sa)->request = aad(&sa)->request & ~perms->allow;
|
||||
AA_BUG(!aad(&sa)->request);
|
||||
|
||||
if (aad(&sa)->fs.request & perms->kill)
|
||||
if (aad(&sa)->request & perms->kill)
|
||||
type = AUDIT_APPARMOR_KILL;
|
||||
|
||||
/* quiet known rejects, assumes quiet and kill do not overlap */
|
||||
if ((aad(&sa)->fs.request & perms->quiet) &&
|
||||
if ((aad(&sa)->request & perms->quiet) &&
|
||||
AUDIT_MODE(profile) != AUDIT_NOQUIET &&
|
||||
AUDIT_MODE(profile) != AUDIT_ALL)
|
||||
aad(&sa)->fs.request &= ~perms->quiet;
|
||||
aad(&sa)->request &= ~perms->quiet;
|
||||
|
||||
if (!aad(&sa)->fs.request)
|
||||
return COMPLAIN_MODE(profile) ? 0 : aad(&sa)->error;
|
||||
if (!aad(&sa)->request)
|
||||
return aad(&sa)->error;
|
||||
}
|
||||
|
||||
aad(&sa)->fs.denied = aad(&sa)->fs.request & ~perms->allow;
|
||||
aad(&sa)->denied = aad(&sa)->request & ~perms->allow;
|
||||
return aa_audit(type, profile, &sa, file_audit_cb);
|
||||
}
|
||||
|
||||
/**
|
||||
* is_deleted - test if a file has been completely unlinked
|
||||
* @dentry: dentry of file to test for deletion (NOT NULL)
|
||||
*
|
||||
* Returns: %1 if deleted else %0
|
||||
*/
|
||||
static inline bool is_deleted(struct dentry *dentry)
|
||||
{
|
||||
if (d_unlinked(dentry) && d_backing_inode(dentry)->i_nlink == 0)
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int path_name(const char *op, struct aa_label *label,
|
||||
const struct path *path, int flags, char *buffer,
|
||||
const char **name, struct path_cond *cond, u32 request)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
const char *info = NULL;
|
||||
int error;
|
||||
|
||||
error = aa_path_name(path, flags, buffer, name, &info,
|
||||
labels_profile(label)->disconnected);
|
||||
if (error) {
|
||||
fn_for_each_confined(label, profile,
|
||||
aa_audit_file(profile, &nullperms, op, request, *name,
|
||||
NULL, NULL, cond->uid, info, error));
|
||||
return error;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* map_old_perms - map old file perms layout to the new layout
|
||||
* @old: permission set in old mapping
|
||||
|
@ -163,10 +195,10 @@ static u32 map_old_perms(u32 old)
|
|||
{
|
||||
u32 new = old & 0xf;
|
||||
if (old & MAY_READ)
|
||||
new |= AA_MAY_META_READ;
|
||||
new |= AA_MAY_GETATTR | AA_MAY_OPEN;
|
||||
if (old & MAY_WRITE)
|
||||
new |= AA_MAY_META_WRITE | AA_MAY_CREATE | AA_MAY_DELETE |
|
||||
AA_MAY_CHMOD | AA_MAY_CHOWN;
|
||||
new |= AA_MAY_SETATTR | AA_MAY_CREATE | AA_MAY_DELETE |
|
||||
AA_MAY_CHMOD | AA_MAY_CHOWN | AA_MAY_OPEN;
|
||||
if (old & 0x10)
|
||||
new |= AA_MAY_LINK;
|
||||
/* the old mapping lock and link_subset flags where overlaid
|
||||
|
@ -181,7 +213,7 @@ static u32 map_old_perms(u32 old)
|
|||
}
|
||||
|
||||
/**
|
||||
* compute_perms - convert dfa compressed perms to internal perms
|
||||
* aa_compute_fperms - convert dfa compressed perms to internal perms
|
||||
* @dfa: dfa to compute perms for (NOT NULL)
|
||||
* @state: state in dfa
|
||||
* @cond: conditions to consider (NOT NULL)
|
||||
|
@ -191,17 +223,21 @@ static u32 map_old_perms(u32 old)
|
|||
*
|
||||
* Returns: computed permission set
|
||||
*/
|
||||
static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state,
|
||||
struct path_cond *cond)
|
||||
struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state,
|
||||
struct path_cond *cond)
|
||||
{
|
||||
struct file_perms perms;
|
||||
struct aa_perms perms;
|
||||
|
||||
/* FIXME: change over to new dfa format
|
||||
* currently file perms are encoded in the dfa, new format
|
||||
* splits the permissions from the dfa. This mapping can be
|
||||
* done at profile load
|
||||
*/
|
||||
perms.kill = 0;
|
||||
perms.deny = 0;
|
||||
perms.kill = perms.stop = 0;
|
||||
perms.complain = perms.cond = 0;
|
||||
perms.hide = 0;
|
||||
perms.prompt = 0;
|
||||
|
||||
if (uid_eq(current_fsuid(), cond->uid)) {
|
||||
perms.allow = map_old_perms(dfa_user_allow(dfa, state));
|
||||
|
@ -214,7 +250,7 @@ static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state,
|
|||
perms.quiet = map_old_perms(dfa_other_quiet(dfa, state));
|
||||
perms.xindex = dfa_other_xindex(dfa, state);
|
||||
}
|
||||
perms.allow |= AA_MAY_META_READ;
|
||||
perms.allow |= AA_MAY_GETATTR;
|
||||
|
||||
/* change_profile wasn't determined by ownership in old mapping */
|
||||
if (ACCEPT_TABLE(dfa)[state] & 0x80000000)
|
||||
|
@ -237,37 +273,55 @@ static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state,
|
|||
*/
|
||||
unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
|
||||
const char *name, struct path_cond *cond,
|
||||
struct file_perms *perms)
|
||||
struct aa_perms *perms)
|
||||
{
|
||||
unsigned int state;
|
||||
if (!dfa) {
|
||||
*perms = nullperms;
|
||||
return DFA_NOMATCH;
|
||||
}
|
||||
|
||||
state = aa_dfa_match(dfa, start, name);
|
||||
*perms = compute_perms(dfa, state, cond);
|
||||
*perms = aa_compute_fperms(dfa, state, cond);
|
||||
|
||||
return state;
|
||||
}
|
||||
|
||||
/**
|
||||
* is_deleted - test if a file has been completely unlinked
|
||||
* @dentry: dentry of file to test for deletion (NOT NULL)
|
||||
*
|
||||
* Returns: %1 if deleted else %0
|
||||
*/
|
||||
static inline bool is_deleted(struct dentry *dentry)
|
||||
int __aa_path_perm(const char *op, struct aa_profile *profile, const char *name,
|
||||
u32 request, struct path_cond *cond, int flags,
|
||||
struct aa_perms *perms)
|
||||
{
|
||||
if (d_unlinked(dentry) && d_backing_inode(dentry)->i_nlink == 0)
|
||||
return 1;
|
||||
return 0;
|
||||
int e = 0;
|
||||
|
||||
if (profile_unconfined(profile))
|
||||
return 0;
|
||||
aa_str_perms(profile->file.dfa, profile->file.start, name, cond, perms);
|
||||
if (request & ~perms->allow)
|
||||
e = -EACCES;
|
||||
return aa_audit_file(profile, perms, op, request, name, NULL, NULL,
|
||||
cond->uid, NULL, e);
|
||||
}
|
||||
|
||||
|
||||
static int profile_path_perm(const char *op, struct aa_profile *profile,
|
||||
const struct path *path, char *buffer, u32 request,
|
||||
struct path_cond *cond, int flags,
|
||||
struct aa_perms *perms)
|
||||
{
|
||||
const char *name;
|
||||
int error;
|
||||
|
||||
if (profile_unconfined(profile))
|
||||
return 0;
|
||||
|
||||
error = path_name(op, &profile->label, path,
|
||||
flags | profile->path_flags, buffer, &name, cond,
|
||||
request);
|
||||
if (error)
|
||||
return error;
|
||||
return __aa_path_perm(op, profile, name, request, cond, flags,
|
||||
perms);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_path_perm - do permissions check & audit for @path
|
||||
* @op: operation being checked
|
||||
* @profile: profile being enforced (NOT NULL)
|
||||
* @label: profile being enforced (NOT NULL)
|
||||
* @path: path to check permissions of (NOT NULL)
|
||||
* @flags: any additional path flags beyond what the profile specifies
|
||||
* @request: requested permissions
|
||||
|
@ -275,35 +329,23 @@ static inline bool is_deleted(struct dentry *dentry)
|
|||
*
|
||||
* Returns: %0 else error if access denied or other error
|
||||
*/
|
||||
int aa_path_perm(const char *op, struct aa_profile *profile,
|
||||
int aa_path_perm(const char *op, struct aa_label *label,
|
||||
const struct path *path, int flags, u32 request,
|
||||
struct path_cond *cond)
|
||||
{
|
||||
struct aa_perms perms = {};
|
||||
struct aa_profile *profile;
|
||||
char *buffer = NULL;
|
||||
struct file_perms perms = {};
|
||||
const char *name, *info = NULL;
|
||||
int error;
|
||||
|
||||
flags |= profile->path_flags | (S_ISDIR(cond->mode) ? PATH_IS_DIR : 0);
|
||||
error = aa_path_name(path, flags, &buffer, &name, &info);
|
||||
if (error) {
|
||||
if (error == -ENOENT && is_deleted(path->dentry)) {
|
||||
/* Access to open files that are deleted are
|
||||
* give a pass (implicit delegation)
|
||||
*/
|
||||
error = 0;
|
||||
info = NULL;
|
||||
perms.allow = request;
|
||||
}
|
||||
} else {
|
||||
aa_str_perms(profile->file.dfa, profile->file.start, name, cond,
|
||||
&perms);
|
||||
if (request & ~perms.allow)
|
||||
error = -EACCES;
|
||||
}
|
||||
error = aa_audit_file(profile, &perms, op, request, name, NULL,
|
||||
cond->uid, info, error);
|
||||
kfree(buffer);
|
||||
flags |= PATH_DELEGATE_DELETED | (S_ISDIR(cond->mode) ? PATH_IS_DIR :
|
||||
0);
|
||||
get_buffers(buffer);
|
||||
error = fn_for_each_confined(label, profile,
|
||||
profile_path_perm(op, profile, path, buffer, request,
|
||||
cond, flags, &perms));
|
||||
|
||||
put_buffers(buffer);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
@ -328,65 +370,40 @@ static inline bool xindex_is_subset(u32 link, u32 target)
|
|||
return 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_path_link - Handle hard link permission check
|
||||
* @profile: the profile being enforced (NOT NULL)
|
||||
* @old_dentry: the target dentry (NOT NULL)
|
||||
* @new_dir: directory the new link will be created in (NOT NULL)
|
||||
* @new_dentry: the link being created (NOT NULL)
|
||||
*
|
||||
* Handle the permission test for a link & target pair. Permission
|
||||
* is encoded as a pair where the link permission is determined
|
||||
* first, and if allowed, the target is tested. The target test
|
||||
* is done from the point of the link match (not start of DFA)
|
||||
* making the target permission dependent on the link permission match.
|
||||
*
|
||||
* The subset test if required forces that permissions granted
|
||||
* on link are a subset of the permission granted to target.
|
||||
*
|
||||
* Returns: %0 if allowed else error
|
||||
*/
|
||||
int aa_path_link(struct aa_profile *profile, struct dentry *old_dentry,
|
||||
const struct path *new_dir, struct dentry *new_dentry)
|
||||
static int profile_path_link(struct aa_profile *profile,
|
||||
const struct path *link, char *buffer,
|
||||
const struct path *target, char *buffer2,
|
||||
struct path_cond *cond)
|
||||
{
|
||||
struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry };
|
||||
struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry };
|
||||
struct path_cond cond = {
|
||||
d_backing_inode(old_dentry)->i_uid,
|
||||
d_backing_inode(old_dentry)->i_mode
|
||||
};
|
||||
char *buffer = NULL, *buffer2 = NULL;
|
||||
const char *lname, *tname = NULL, *info = NULL;
|
||||
struct file_perms lperms, perms;
|
||||
const char *lname, *tname = NULL;
|
||||
struct aa_perms lperms = {}, perms;
|
||||
const char *info = NULL;
|
||||
u32 request = AA_MAY_LINK;
|
||||
unsigned int state;
|
||||
int error;
|
||||
|
||||
lperms = nullperms;
|
||||
|
||||
/* buffer freed below, lname is pointer in buffer */
|
||||
error = aa_path_name(&link, profile->path_flags, &buffer, &lname,
|
||||
&info);
|
||||
error = path_name(OP_LINK, &profile->label, link, profile->path_flags,
|
||||
buffer, &lname, cond, AA_MAY_LINK);
|
||||
if (error)
|
||||
goto audit;
|
||||
|
||||
/* buffer2 freed below, tname is pointer in buffer2 */
|
||||
error = aa_path_name(&target, profile->path_flags, &buffer2, &tname,
|
||||
&info);
|
||||
error = path_name(OP_LINK, &profile->label, target, profile->path_flags,
|
||||
buffer2, &tname, cond, AA_MAY_LINK);
|
||||
if (error)
|
||||
goto audit;
|
||||
|
||||
error = -EACCES;
|
||||
/* aa_str_perms - handles the case of the dfa being NULL */
|
||||
state = aa_str_perms(profile->file.dfa, profile->file.start, lname,
|
||||
&cond, &lperms);
|
||||
cond, &lperms);
|
||||
|
||||
if (!(lperms.allow & AA_MAY_LINK))
|
||||
goto audit;
|
||||
|
||||
/* test to see if target can be paired with link */
|
||||
state = aa_dfa_null_transition(profile->file.dfa, state);
|
||||
aa_str_perms(profile->file.dfa, state, tname, &cond, &perms);
|
||||
aa_str_perms(profile->file.dfa, state, tname, cond, &perms);
|
||||
|
||||
/* force audit/quiet masks for link are stored in the second entry
|
||||
* in the link pair.
|
||||
|
@ -397,6 +414,7 @@ int aa_path_link(struct aa_profile *profile, struct dentry *old_dentry,
|
|||
|
||||
if (!(perms.allow & AA_MAY_LINK)) {
|
||||
info = "target restricted";
|
||||
lperms = perms;
|
||||
goto audit;
|
||||
}
|
||||
|
||||
|
@ -404,10 +422,10 @@ int aa_path_link(struct aa_profile *profile, struct dentry *old_dentry,
|
|||
if (!(perms.allow & AA_LINK_SUBSET))
|
||||
goto done_tests;
|
||||
|
||||
/* Do link perm subset test requiring allowed permission on link are a
|
||||
* subset of the allowed permissions on target.
|
||||
/* Do link perm subset test requiring allowed permission on link are
|
||||
* a subset of the allowed permissions on target.
|
||||
*/
|
||||
aa_str_perms(profile->file.dfa, profile->file.start, tname, &cond,
|
||||
aa_str_perms(profile->file.dfa, profile->file.start, tname, cond,
|
||||
&perms);
|
||||
|
||||
/* AA_MAY_LINK is not considered in the subset test */
|
||||
|
@ -429,10 +447,121 @@ done_tests:
|
|||
error = 0;
|
||||
|
||||
audit:
|
||||
error = aa_audit_file(profile, &lperms, OP_LINK, request,
|
||||
lname, tname, cond.uid, info, error);
|
||||
kfree(buffer);
|
||||
kfree(buffer2);
|
||||
return aa_audit_file(profile, &lperms, OP_LINK, request, lname, tname,
|
||||
NULL, cond->uid, info, error);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_path_link - Handle hard link permission check
|
||||
* @label: the label being enforced (NOT NULL)
|
||||
* @old_dentry: the target dentry (NOT NULL)
|
||||
* @new_dir: directory the new link will be created in (NOT NULL)
|
||||
* @new_dentry: the link being created (NOT NULL)
|
||||
*
|
||||
* Handle the permission test for a link & target pair. Permission
|
||||
* is encoded as a pair where the link permission is determined
|
||||
* first, and if allowed, the target is tested. The target test
|
||||
* is done from the point of the link match (not start of DFA)
|
||||
* making the target permission dependent on the link permission match.
|
||||
*
|
||||
* The subset test if required forces that permissions granted
|
||||
* on link are a subset of the permission granted to target.
|
||||
*
|
||||
* Returns: %0 if allowed else error
|
||||
*/
|
||||
int aa_path_link(struct aa_label *label, struct dentry *old_dentry,
|
||||
const struct path *new_dir, struct dentry *new_dentry)
|
||||
{
|
||||
struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry };
|
||||
struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry };
|
||||
struct path_cond cond = {
|
||||
d_backing_inode(old_dentry)->i_uid,
|
||||
d_backing_inode(old_dentry)->i_mode
|
||||
};
|
||||
char *buffer = NULL, *buffer2 = NULL;
|
||||
struct aa_profile *profile;
|
||||
int error;
|
||||
|
||||
/* buffer freed below, lname is pointer in buffer */
|
||||
get_buffers(buffer, buffer2);
|
||||
error = fn_for_each_confined(label, profile,
|
||||
profile_path_link(profile, &link, buffer, &target,
|
||||
buffer2, &cond));
|
||||
put_buffers(buffer, buffer2);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static void update_file_ctx(struct aa_file_ctx *fctx, struct aa_label *label,
|
||||
u32 request)
|
||||
{
|
||||
struct aa_label *l, *old;
|
||||
|
||||
/* update caching of label on file_ctx */
|
||||
spin_lock(&fctx->lock);
|
||||
old = rcu_dereference_protected(fctx->label,
|
||||
spin_is_locked(&fctx->lock));
|
||||
l = aa_label_merge(old, label, GFP_ATOMIC);
|
||||
if (l) {
|
||||
if (l != old) {
|
||||
rcu_assign_pointer(fctx->label, l);
|
||||
aa_put_label(old);
|
||||
} else
|
||||
aa_put_label(l);
|
||||
fctx->allow |= request;
|
||||
}
|
||||
spin_unlock(&fctx->lock);
|
||||
}
|
||||
|
||||
static int __file_path_perm(const char *op, struct aa_label *label,
|
||||
struct aa_label *flabel, struct file *file,
|
||||
u32 request, u32 denied)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_perms perms = {};
|
||||
struct path_cond cond = {
|
||||
.uid = file_inode(file)->i_uid,
|
||||
.mode = file_inode(file)->i_mode
|
||||
};
|
||||
char *buffer;
|
||||
int flags, error;
|
||||
|
||||
/* revalidation due to label out of date. No revocation at this time */
|
||||
if (!denied && aa_label_is_subset(flabel, label))
|
||||
/* TODO: check for revocation on stale profiles */
|
||||
return 0;
|
||||
|
||||
flags = PATH_DELEGATE_DELETED | (S_ISDIR(cond.mode) ? PATH_IS_DIR : 0);
|
||||
get_buffers(buffer);
|
||||
|
||||
/* check every profile in task label not in current cache */
|
||||
error = fn_for_each_not_in_set(flabel, label, profile,
|
||||
profile_path_perm(op, profile, &file->f_path, buffer,
|
||||
request, &cond, flags, &perms));
|
||||
if (denied && !error) {
|
||||
/*
|
||||
* check every profile in file label that was not tested
|
||||
* in the initial check above.
|
||||
*
|
||||
* TODO: cache full perms so this only happens because of
|
||||
* conditionals
|
||||
* TODO: don't audit here
|
||||
*/
|
||||
if (label == flabel)
|
||||
error = fn_for_each(label, profile,
|
||||
profile_path_perm(op, profile, &file->f_path,
|
||||
buffer, request, &cond, flags,
|
||||
&perms));
|
||||
else
|
||||
error = fn_for_each_not_in_set(label, flabel, profile,
|
||||
profile_path_perm(op, profile, &file->f_path,
|
||||
buffer, request, &cond, flags,
|
||||
&perms));
|
||||
}
|
||||
if (!error)
|
||||
update_file_ctx(file_ctx(file), label, request);
|
||||
|
||||
put_buffers(buffer);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
@ -440,20 +569,114 @@ audit:
|
|||
/**
|
||||
* aa_file_perm - do permission revalidation check & audit for @file
|
||||
* @op: operation being checked
|
||||
* @profile: profile being enforced (NOT NULL)
|
||||
* @label: label being enforced (NOT NULL)
|
||||
* @file: file to revalidate access permissions on (NOT NULL)
|
||||
* @request: requested permissions
|
||||
*
|
||||
* Returns: %0 if access allowed else error
|
||||
*/
|
||||
int aa_file_perm(const char *op, struct aa_profile *profile, struct file *file,
|
||||
int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
|
||||
u32 request)
|
||||
{
|
||||
struct path_cond cond = {
|
||||
.uid = file_inode(file)->i_uid,
|
||||
.mode = file_inode(file)->i_mode
|
||||
};
|
||||
struct aa_file_ctx *fctx;
|
||||
struct aa_label *flabel;
|
||||
u32 denied;
|
||||
int error = 0;
|
||||
|
||||
return aa_path_perm(op, profile, &file->f_path, PATH_DELEGATE_DELETED,
|
||||
request, &cond);
|
||||
AA_BUG(!label);
|
||||
AA_BUG(!file);
|
||||
|
||||
fctx = file_ctx(file);
|
||||
|
||||
rcu_read_lock();
|
||||
flabel = rcu_dereference(fctx->label);
|
||||
AA_BUG(!flabel);
|
||||
|
||||
/* revalidate access, if task is unconfined, or the cached cred
|
||||
* doesn't match or if the request is for more permissions than
|
||||
* was granted.
|
||||
*
|
||||
* Note: the test for !unconfined(flabel) is to handle file
|
||||
* delegation from unconfined tasks
|
||||
*/
|
||||
denied = request & ~fctx->allow;
|
||||
if (unconfined(label) || unconfined(flabel) ||
|
||||
(!denied && aa_label_is_subset(flabel, label)))
|
||||
goto done;
|
||||
|
||||
/* TODO: label cross check */
|
||||
|
||||
if (file->f_path.mnt && path_mediated_fs(file->f_path.dentry))
|
||||
error = __file_path_perm(op, label, flabel, file, request,
|
||||
denied);
|
||||
|
||||
done:
|
||||
rcu_read_unlock();
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static void revalidate_tty(struct aa_label *label)
|
||||
{
|
||||
struct tty_struct *tty;
|
||||
int drop_tty = 0;
|
||||
|
||||
tty = get_current_tty();
|
||||
if (!tty)
|
||||
return;
|
||||
|
||||
spin_lock(&tty->files_lock);
|
||||
if (!list_empty(&tty->tty_files)) {
|
||||
struct tty_file_private *file_priv;
|
||||
struct file *file;
|
||||
/* TODO: Revalidate access to controlling tty. */
|
||||
file_priv = list_first_entry(&tty->tty_files,
|
||||
struct tty_file_private, list);
|
||||
file = file_priv->file;
|
||||
|
||||
if (aa_file_perm(OP_INHERIT, label, file, MAY_READ | MAY_WRITE))
|
||||
drop_tty = 1;
|
||||
}
|
||||
spin_unlock(&tty->files_lock);
|
||||
tty_kref_put(tty);
|
||||
|
||||
if (drop_tty)
|
||||
no_tty();
|
||||
}
|
||||
|
||||
static int match_file(const void *p, struct file *file, unsigned int fd)
|
||||
{
|
||||
struct aa_label *label = (struct aa_label *)p;
|
||||
|
||||
if (aa_file_perm(OP_INHERIT, label, file, aa_map_file_to_perms(file)))
|
||||
return fd + 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* based on selinux's flush_unauthorized_files */
|
||||
void aa_inherit_files(const struct cred *cred, struct files_struct *files)
|
||||
{
|
||||
struct aa_label *label = aa_get_newest_cred_label(cred);
|
||||
struct file *devnull = NULL;
|
||||
unsigned int n;
|
||||
|
||||
revalidate_tty(label);
|
||||
|
||||
/* Revalidate access to inherited open files. */
|
||||
n = iterate_fd(files, 0, match_file, label);
|
||||
if (!n) /* none found? */
|
||||
goto out;
|
||||
|
||||
devnull = dentry_open(&aa_null, O_RDWR, cred);
|
||||
if (IS_ERR(devnull))
|
||||
devnull = NULL;
|
||||
/* replace all the matching ones with this */
|
||||
do {
|
||||
replace_fd(n - 1, devnull, 0);
|
||||
} while ((n = iterate_fd(files, n, match_file, label)) != 0);
|
||||
if (devnull)
|
||||
fput(devnull);
|
||||
out:
|
||||
aa_put_label(label);
|
||||
}
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
* This file contains AppArmor basic global
|
||||
*
|
||||
* Copyright (C) 1998-2008 Novell/SUSE
|
||||
* Copyright 2009-2010 Canonical Ltd.
|
||||
* Copyright 2009-2017 Canonical Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
|
@ -27,8 +27,10 @@
|
|||
#define AA_CLASS_NET 4
|
||||
#define AA_CLASS_RLIMITS 5
|
||||
#define AA_CLASS_DOMAIN 6
|
||||
#define AA_CLASS_PTRACE 9
|
||||
#define AA_CLASS_LABEL 16
|
||||
|
||||
#define AA_CLASS_LAST AA_CLASS_DOMAIN
|
||||
#define AA_CLASS_LAST AA_CLASS_LABEL
|
||||
|
||||
/* Control parameters settable through module/boot flags */
|
||||
extern enum audit_mode aa_g_audit;
|
||||
|
|
|
@ -17,49 +17,49 @@
|
|||
|
||||
extern struct path aa_null;
|
||||
|
||||
enum aa_fs_type {
|
||||
AA_FS_TYPE_BOOLEAN,
|
||||
AA_FS_TYPE_STRING,
|
||||
AA_FS_TYPE_U64,
|
||||
AA_FS_TYPE_FOPS,
|
||||
AA_FS_TYPE_DIR,
|
||||
enum aa_sfs_type {
|
||||
AA_SFS_TYPE_BOOLEAN,
|
||||
AA_SFS_TYPE_STRING,
|
||||
AA_SFS_TYPE_U64,
|
||||
AA_SFS_TYPE_FOPS,
|
||||
AA_SFS_TYPE_DIR,
|
||||
};
|
||||
|
||||
struct aa_fs_entry;
|
||||
struct aa_sfs_entry;
|
||||
|
||||
struct aa_fs_entry {
|
||||
struct aa_sfs_entry {
|
||||
const char *name;
|
||||
struct dentry *dentry;
|
||||
umode_t mode;
|
||||
enum aa_fs_type v_type;
|
||||
enum aa_sfs_type v_type;
|
||||
union {
|
||||
bool boolean;
|
||||
char *string;
|
||||
unsigned long u64;
|
||||
struct aa_fs_entry *files;
|
||||
struct aa_sfs_entry *files;
|
||||
} v;
|
||||
const struct file_operations *file_ops;
|
||||
};
|
||||
|
||||
extern const struct file_operations aa_fs_seq_file_ops;
|
||||
extern const struct file_operations aa_sfs_seq_file_ops;
|
||||
|
||||
#define AA_FS_FILE_BOOLEAN(_name, _value) \
|
||||
#define AA_SFS_FILE_BOOLEAN(_name, _value) \
|
||||
{ .name = (_name), .mode = 0444, \
|
||||
.v_type = AA_FS_TYPE_BOOLEAN, .v.boolean = (_value), \
|
||||
.file_ops = &aa_fs_seq_file_ops }
|
||||
#define AA_FS_FILE_STRING(_name, _value) \
|
||||
.v_type = AA_SFS_TYPE_BOOLEAN, .v.boolean = (_value), \
|
||||
.file_ops = &aa_sfs_seq_file_ops }
|
||||
#define AA_SFS_FILE_STRING(_name, _value) \
|
||||
{ .name = (_name), .mode = 0444, \
|
||||
.v_type = AA_FS_TYPE_STRING, .v.string = (_value), \
|
||||
.file_ops = &aa_fs_seq_file_ops }
|
||||
#define AA_FS_FILE_U64(_name, _value) \
|
||||
.v_type = AA_SFS_TYPE_STRING, .v.string = (_value), \
|
||||
.file_ops = &aa_sfs_seq_file_ops }
|
||||
#define AA_SFS_FILE_U64(_name, _value) \
|
||||
{ .name = (_name), .mode = 0444, \
|
||||
.v_type = AA_FS_TYPE_U64, .v.u64 = (_value), \
|
||||
.file_ops = &aa_fs_seq_file_ops }
|
||||
#define AA_FS_FILE_FOPS(_name, _mode, _fops) \
|
||||
{ .name = (_name), .v_type = AA_FS_TYPE_FOPS, \
|
||||
.v_type = AA_SFS_TYPE_U64, .v.u64 = (_value), \
|
||||
.file_ops = &aa_sfs_seq_file_ops }
|
||||
#define AA_SFS_FILE_FOPS(_name, _mode, _fops) \
|
||||
{ .name = (_name), .v_type = AA_SFS_TYPE_FOPS, \
|
||||
.mode = (_mode), .file_ops = (_fops) }
|
||||
#define AA_FS_DIR(_name, _value) \
|
||||
{ .name = (_name), .v_type = AA_FS_TYPE_DIR, .v.files = (_value) }
|
||||
#define AA_SFS_DIR(_name, _value) \
|
||||
{ .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) }
|
||||
|
||||
extern void __init aa_destroy_aafs(void);
|
||||
|
||||
|
@ -74,6 +74,7 @@ enum aafs_ns_type {
|
|||
AAFS_NS_LOAD,
|
||||
AAFS_NS_REPLACE,
|
||||
AAFS_NS_REMOVE,
|
||||
AAFS_NS_REVISION,
|
||||
AAFS_NS_COUNT,
|
||||
AAFS_NS_MAX_COUNT,
|
||||
AAFS_NS_SIZE,
|
||||
|
@ -102,16 +103,22 @@ enum aafs_prof_type {
|
|||
#define ns_subload(X) ((X)->dents[AAFS_NS_LOAD])
|
||||
#define ns_subreplace(X) ((X)->dents[AAFS_NS_REPLACE])
|
||||
#define ns_subremove(X) ((X)->dents[AAFS_NS_REMOVE])
|
||||
#define ns_subrevision(X) ((X)->dents[AAFS_NS_REVISION])
|
||||
|
||||
#define prof_dir(X) ((X)->dents[AAFS_PROF_DIR])
|
||||
#define prof_child_dir(X) ((X)->dents[AAFS_PROF_PROFS])
|
||||
|
||||
void __aa_fs_profile_rmdir(struct aa_profile *profile);
|
||||
void __aa_fs_profile_migrate_dents(struct aa_profile *old,
|
||||
void __aa_bump_ns_revision(struct aa_ns *ns);
|
||||
void __aafs_profile_rmdir(struct aa_profile *profile);
|
||||
void __aafs_profile_migrate_dents(struct aa_profile *old,
|
||||
struct aa_profile *new);
|
||||
int __aa_fs_profile_mkdir(struct aa_profile *profile, struct dentry *parent);
|
||||
void __aa_fs_ns_rmdir(struct aa_ns *ns);
|
||||
int __aa_fs_ns_mkdir(struct aa_ns *ns, struct dentry *parent,
|
||||
const char *name);
|
||||
int __aafs_profile_mkdir(struct aa_profile *profile, struct dentry *parent);
|
||||
void __aafs_ns_rmdir(struct aa_ns *ns);
|
||||
int __aafs_ns_mkdir(struct aa_ns *ns, struct dentry *parent, const char *name,
|
||||
struct dentry *dent);
|
||||
|
||||
struct aa_loaddata;
|
||||
void __aa_fs_remove_rawdata(struct aa_loaddata *rawdata);
|
||||
int __aa_fs_create_rawdata(struct aa_ns *ns, struct aa_loaddata *rawdata);
|
||||
|
||||
#endif /* __AA_APPARMORFS_H */
|
||||
|
|
|
@ -22,8 +22,7 @@
|
|||
#include <linux/slab.h>
|
||||
|
||||
#include "file.h"
|
||||
|
||||
struct aa_profile;
|
||||
#include "label.h"
|
||||
|
||||
extern const char *const audit_mode_names[];
|
||||
#define AUDIT_MAX_INDEX 5
|
||||
|
@ -65,10 +64,12 @@ enum audit_type {
|
|||
#define OP_GETATTR "getattr"
|
||||
#define OP_OPEN "open"
|
||||
|
||||
#define OP_FRECEIVE "file_receive"
|
||||
#define OP_FPERM "file_perm"
|
||||
#define OP_FLOCK "file_lock"
|
||||
#define OP_FMMAP "file_mmap"
|
||||
#define OP_FMPROT "file_mprotect"
|
||||
#define OP_INHERIT "file_inherit"
|
||||
|
||||
#define OP_CREATE "create"
|
||||
#define OP_POST_CREATE "post_create"
|
||||
|
@ -91,6 +92,8 @@ enum audit_type {
|
|||
#define OP_CHANGE_HAT "change_hat"
|
||||
#define OP_CHANGE_PROFILE "change_profile"
|
||||
#define OP_CHANGE_ONEXEC "change_onexec"
|
||||
#define OP_STACK "stack"
|
||||
#define OP_STACK_ONEXEC "stack_onexec"
|
||||
|
||||
#define OP_SETPROCATTR "setprocattr"
|
||||
#define OP_SETRLIMIT "setrlimit"
|
||||
|
@ -102,19 +105,19 @@ enum audit_type {
|
|||
|
||||
struct apparmor_audit_data {
|
||||
int error;
|
||||
const char *op;
|
||||
int type;
|
||||
void *profile;
|
||||
const char *op;
|
||||
struct aa_label *label;
|
||||
const char *name;
|
||||
const char *info;
|
||||
u32 request;
|
||||
u32 denied;
|
||||
union {
|
||||
/* these entries require a custom callback fn */
|
||||
struct {
|
||||
struct aa_profile *peer;
|
||||
struct aa_label *peer;
|
||||
struct {
|
||||
const char *target;
|
||||
u32 request;
|
||||
u32 denied;
|
||||
kuid_t ouid;
|
||||
} fs;
|
||||
};
|
||||
|
|
|
@ -19,11 +19,12 @@
|
|||
|
||||
#include "apparmorfs.h"
|
||||
|
||||
struct aa_profile;
|
||||
struct aa_label;
|
||||
|
||||
/* aa_caps - confinement data for capabilities
|
||||
* @allowed: capabilities mask
|
||||
* @audit: caps that are to be audited
|
||||
* @denied: caps that are explicitly denied
|
||||
* @quiet: caps that should not be audited
|
||||
* @kill: caps that when requested will result in the task being killed
|
||||
* @extended: caps that are subject finer grained mediation
|
||||
|
@ -31,14 +32,15 @@ struct aa_profile;
|
|||
struct aa_caps {
|
||||
kernel_cap_t allow;
|
||||
kernel_cap_t audit;
|
||||
kernel_cap_t denied;
|
||||
kernel_cap_t quiet;
|
||||
kernel_cap_t kill;
|
||||
kernel_cap_t extended;
|
||||
};
|
||||
|
||||
extern struct aa_fs_entry aa_fs_entry_caps[];
|
||||
extern struct aa_sfs_entry aa_sfs_entry_caps[];
|
||||
|
||||
int aa_capable(struct aa_profile *profile, int cap, int audit);
|
||||
int aa_capable(struct aa_label *label, int cap, int audit);
|
||||
|
||||
static inline void aa_free_cap_rules(struct aa_caps *caps)
|
||||
{
|
||||
|
|
|
@ -19,60 +19,28 @@
|
|||
#include <linux/slab.h>
|
||||
#include <linux/sched.h>
|
||||
|
||||
#include "policy.h"
|
||||
#include "label.h"
|
||||
#include "policy_ns.h"
|
||||
|
||||
#define cred_ctx(X) ((X)->security)
|
||||
#define current_ctx() cred_ctx(current_cred())
|
||||
|
||||
/* struct aa_file_ctx - the AppArmor context the file was opened in
|
||||
* @perms: the permission the file was opened with
|
||||
*
|
||||
* The file_ctx could currently be directly stored in file->f_security
|
||||
* as the profile reference is now stored in the f_cred. However the
|
||||
* ctx struct will expand in the future so we keep the struct.
|
||||
*/
|
||||
struct aa_file_ctx {
|
||||
u16 allow;
|
||||
};
|
||||
|
||||
/**
|
||||
* aa_alloc_file_context - allocate file_ctx
|
||||
* @gfp: gfp flags for allocation
|
||||
*
|
||||
* Returns: file_ctx or NULL on failure
|
||||
*/
|
||||
static inline struct aa_file_ctx *aa_alloc_file_context(gfp_t gfp)
|
||||
{
|
||||
return kzalloc(sizeof(struct aa_file_ctx), gfp);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_free_file_context - free a file_ctx
|
||||
* @ctx: file_ctx to free (MAYBE_NULL)
|
||||
*/
|
||||
static inline void aa_free_file_context(struct aa_file_ctx *ctx)
|
||||
{
|
||||
if (ctx)
|
||||
kzfree(ctx);
|
||||
}
|
||||
|
||||
/**
|
||||
* struct aa_task_ctx - primary label for confined tasks
|
||||
* @profile: the current profile (NOT NULL)
|
||||
* @exec: profile to transition to on next exec (MAYBE NULL)
|
||||
* @previous: profile the task may return to (MAYBE NULL)
|
||||
* @token: magic value the task must know for returning to @previous_profile
|
||||
* @label: the current label (NOT NULL)
|
||||
* @exec: label to transition to on next exec (MAYBE NULL)
|
||||
* @previous: label the task may return to (MAYBE NULL)
|
||||
* @token: magic value the task must know for returning to @previous
|
||||
*
|
||||
* Contains the task's current profile (which could change due to
|
||||
* Contains the task's current label (which could change due to
|
||||
* change_hat). Plus the hat_magic needed during change_hat.
|
||||
*
|
||||
* TODO: make so a task can be confined by a stack of contexts
|
||||
*/
|
||||
struct aa_task_ctx {
|
||||
struct aa_profile *profile;
|
||||
struct aa_profile *onexec;
|
||||
struct aa_profile *previous;
|
||||
struct aa_label *label;
|
||||
struct aa_label *onexec;
|
||||
struct aa_label *previous;
|
||||
u64 token;
|
||||
};
|
||||
|
||||
|
@ -80,40 +48,51 @@ struct aa_task_ctx *aa_alloc_task_context(gfp_t flags);
|
|||
void aa_free_task_context(struct aa_task_ctx *ctx);
|
||||
void aa_dup_task_context(struct aa_task_ctx *new,
|
||||
const struct aa_task_ctx *old);
|
||||
int aa_replace_current_profile(struct aa_profile *profile);
|
||||
int aa_set_current_onexec(struct aa_profile *profile);
|
||||
int aa_set_current_hat(struct aa_profile *profile, u64 token);
|
||||
int aa_restore_previous_profile(u64 cookie);
|
||||
struct aa_profile *aa_get_task_profile(struct task_struct *task);
|
||||
int aa_replace_current_label(struct aa_label *label);
|
||||
int aa_set_current_onexec(struct aa_label *label, bool stack);
|
||||
int aa_set_current_hat(struct aa_label *label, u64 token);
|
||||
int aa_restore_previous_label(u64 cookie);
|
||||
struct aa_label *aa_get_task_label(struct task_struct *task);
|
||||
|
||||
|
||||
/**
|
||||
* aa_cred_profile - obtain cred's profiles
|
||||
* @cred: cred to obtain profiles from (NOT NULL)
|
||||
* aa_cred_raw_label - obtain cred's label
|
||||
* @cred: cred to obtain label from (NOT NULL)
|
||||
*
|
||||
* Returns: confining profile
|
||||
* Returns: confining label
|
||||
*
|
||||
* does NOT increment reference count
|
||||
*/
|
||||
static inline struct aa_profile *aa_cred_profile(const struct cred *cred)
|
||||
static inline struct aa_label *aa_cred_raw_label(const struct cred *cred)
|
||||
{
|
||||
struct aa_task_ctx *ctx = cred_ctx(cred);
|
||||
|
||||
AA_BUG(!ctx || !ctx->profile);
|
||||
return ctx->profile;
|
||||
AA_BUG(!ctx || !ctx->label);
|
||||
return ctx->label;
|
||||
}
|
||||
|
||||
/**
|
||||
* __aa_task_profile - retrieve another task's profile
|
||||
* aa_get_newest_cred_label - obtain the newest label on a cred
|
||||
* @cred: cred to obtain label from (NOT NULL)
|
||||
*
|
||||
* Returns: newest version of confining label
|
||||
*/
|
||||
static inline struct aa_label *aa_get_newest_cred_label(const struct cred *cred)
|
||||
{
|
||||
return aa_get_newest_label(aa_cred_raw_label(cred));
|
||||
}
|
||||
|
||||
/**
|
||||
* __aa_task_raw_label - retrieve another task's label
|
||||
* @task: task to query (NOT NULL)
|
||||
*
|
||||
* Returns: @task's profile without incrementing its ref count
|
||||
* Returns: @task's label without incrementing its ref count
|
||||
*
|
||||
* If @task != current needs to be called in RCU safe critical section
|
||||
*/
|
||||
static inline struct aa_profile *__aa_task_profile(struct task_struct *task)
|
||||
static inline struct aa_label *__aa_task_raw_label(struct task_struct *task)
|
||||
{
|
||||
return aa_cred_profile(__task_cred(task));
|
||||
return aa_cred_raw_label(__task_cred(task));
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -124,50 +103,114 @@ static inline struct aa_profile *__aa_task_profile(struct task_struct *task)
|
|||
*/
|
||||
static inline bool __aa_task_is_confined(struct task_struct *task)
|
||||
{
|
||||
return !unconfined(__aa_task_profile(task));
|
||||
return !unconfined(__aa_task_raw_label(task));
|
||||
}
|
||||
|
||||
/**
|
||||
* __aa_current_profile - find the current tasks confining profile
|
||||
* aa_current_raw_label - find the current tasks confining label
|
||||
*
|
||||
* Returns: up to date confining profile or the ns unconfined profile (NOT NULL)
|
||||
* Returns: up to date confining label or the ns unconfined label (NOT NULL)
|
||||
*
|
||||
* This fn will not update the tasks cred to the most up to date version
|
||||
* of the profile so it is safe to call when inside of locks.
|
||||
* of the label so it is safe to call when inside of locks.
|
||||
*/
|
||||
static inline struct aa_profile *__aa_current_profile(void)
|
||||
static inline struct aa_label *aa_current_raw_label(void)
|
||||
{
|
||||
return aa_cred_profile(current_cred());
|
||||
return aa_cred_raw_label(current_cred());
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_current_profile - find the current tasks confining profile and do updates
|
||||
* aa_get_current_label - get the newest version of the current tasks label
|
||||
*
|
||||
* Returns: up to date confining profile or the ns unconfined profile (NOT NULL)
|
||||
* Returns: newest version of confining label (NOT NULL)
|
||||
*
|
||||
* This fn will update the tasks cred structure if the profile has been
|
||||
* replaced. Not safe to call inside locks
|
||||
* This fn will not update the tasks cred, so it is safe inside of locks
|
||||
*
|
||||
* The returned reference must be put with aa_put_label()
|
||||
*/
|
||||
static inline struct aa_profile *aa_current_profile(void)
|
||||
static inline struct aa_label *aa_get_current_label(void)
|
||||
{
|
||||
const struct aa_task_ctx *ctx = current_ctx();
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *l = aa_current_raw_label();
|
||||
|
||||
AA_BUG(!ctx || !ctx->profile);
|
||||
if (label_is_stale(l))
|
||||
return aa_get_newest_label(l);
|
||||
return aa_get_label(l);
|
||||
}
|
||||
|
||||
if (profile_is_stale(ctx->profile)) {
|
||||
profile = aa_get_newest_profile(ctx->profile);
|
||||
aa_replace_current_profile(profile);
|
||||
aa_put_profile(profile);
|
||||
ctx = current_ctx();
|
||||
#define __end_current_label_crit_section(X) end_current_label_crit_section(X)
|
||||
|
||||
/**
|
||||
* end_label_crit_section - put a reference found with begin_current_label..
|
||||
* @label: label reference to put
|
||||
*
|
||||
* Should only be used with a reference obtained with
|
||||
* begin_current_label_crit_section and never used in situations where the
|
||||
* task cred may be updated
|
||||
*/
|
||||
static inline void end_current_label_crit_section(struct aa_label *label)
|
||||
{
|
||||
if (label != aa_current_raw_label())
|
||||
aa_put_label(label);
|
||||
}
|
||||
|
||||
/**
|
||||
* __begin_current_label_crit_section - current's confining label
|
||||
*
|
||||
* Returns: up to date confining label or the ns unconfined label (NOT NULL)
|
||||
*
|
||||
* safe to call inside locks
|
||||
*
|
||||
* The returned reference must be put with __end_current_label_crit_section()
|
||||
* This must NOT be used if the task cred could be updated within the
|
||||
* critical section between __begin_current_label_crit_section() ..
|
||||
* __end_current_label_crit_section()
|
||||
*/
|
||||
static inline struct aa_label *__begin_current_label_crit_section(void)
|
||||
{
|
||||
struct aa_label *label = aa_current_raw_label();
|
||||
|
||||
if (label_is_stale(label))
|
||||
label = aa_get_newest_label(label);
|
||||
|
||||
return label;
|
||||
}
|
||||
|
||||
/**
|
||||
* begin_current_label_crit_section - current's confining label and update it
|
||||
*
|
||||
* Returns: up to date confining label or the ns unconfined label (NOT NULL)
|
||||
*
|
||||
* Not safe to call inside locks
|
||||
*
|
||||
* The returned reference must be put with end_current_label_crit_section()
|
||||
* This must NOT be used if the task cred could be updated within the
|
||||
* critical section between begin_current_label_crit_section() ..
|
||||
* end_current_label_crit_section()
|
||||
*/
|
||||
static inline struct aa_label *begin_current_label_crit_section(void)
|
||||
{
|
||||
struct aa_label *label = aa_current_raw_label();
|
||||
|
||||
if (label_is_stale(label)) {
|
||||
label = aa_get_newest_label(label);
|
||||
if (aa_replace_current_label(label) == 0)
|
||||
/* task cred will keep the reference */
|
||||
aa_put_label(label);
|
||||
}
|
||||
|
||||
return ctx->profile;
|
||||
return label;
|
||||
}
|
||||
|
||||
static inline struct aa_ns *aa_get_current_ns(void)
|
||||
{
|
||||
return aa_get_ns(__aa_current_profile()->ns);
|
||||
struct aa_label *label;
|
||||
struct aa_ns *ns;
|
||||
|
||||
label = __begin_current_label_crit_section();
|
||||
ns = aa_get_ns(labels_ns(label));
|
||||
__end_current_label_crit_section(label);
|
||||
|
||||
return ns;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -176,8 +219,8 @@ static inline struct aa_ns *aa_get_current_ns(void)
|
|||
*/
|
||||
static inline void aa_clear_task_ctx_trans(struct aa_task_ctx *ctx)
|
||||
{
|
||||
aa_put_profile(ctx->previous);
|
||||
aa_put_profile(ctx->onexec);
|
||||
aa_put_label(ctx->previous);
|
||||
aa_put_label(ctx->onexec);
|
||||
ctx->previous = NULL;
|
||||
ctx->onexec = NULL;
|
||||
ctx->token = 0;
|
||||
|
|
|
@ -23,14 +23,17 @@ struct aa_domain {
|
|||
char **table;
|
||||
};
|
||||
|
||||
#define AA_CHANGE_NOFLAGS 0
|
||||
#define AA_CHANGE_TEST 1
|
||||
#define AA_CHANGE_CHILD 2
|
||||
#define AA_CHANGE_ONEXEC 4
|
||||
#define AA_CHANGE_STACK 8
|
||||
|
||||
int apparmor_bprm_set_creds(struct linux_binprm *bprm);
|
||||
int apparmor_bprm_secureexec(struct linux_binprm *bprm);
|
||||
void apparmor_bprm_committing_creds(struct linux_binprm *bprm);
|
||||
void apparmor_bprm_committed_creds(struct linux_binprm *bprm);
|
||||
|
||||
void aa_free_domain_entries(struct aa_domain *domain);
|
||||
int aa_change_hat(const char *hats[], int count, u64 token, bool permtest);
|
||||
int aa_change_profile(const char *fqname, bool onexec, bool permtest,
|
||||
bool stack);
|
||||
int aa_change_hat(const char *hats[], int count, u64 token, int flags);
|
||||
int aa_change_profile(const char *fqname, int flags);
|
||||
|
||||
#endif /* __AA_DOMAIN_H */
|
||||
|
|
|
@ -15,38 +15,73 @@
|
|||
#ifndef __AA_FILE_H
|
||||
#define __AA_FILE_H
|
||||
|
||||
#include <linux/spinlock.h>
|
||||
|
||||
#include "domain.h"
|
||||
#include "match.h"
|
||||
#include "perms.h"
|
||||
|
||||
struct aa_profile;
|
||||
struct path;
|
||||
|
||||
/*
|
||||
* We use MAY_EXEC, MAY_WRITE, MAY_READ, MAY_APPEND and the following flags
|
||||
* for profile permissions
|
||||
*/
|
||||
#define AA_MAY_CREATE 0x0010
|
||||
#define AA_MAY_DELETE 0x0020
|
||||
#define AA_MAY_META_WRITE 0x0040
|
||||
#define AA_MAY_META_READ 0x0080
|
||||
|
||||
#define AA_MAY_CHMOD 0x0100
|
||||
#define AA_MAY_CHOWN 0x0200
|
||||
#define AA_MAY_LOCK 0x0400
|
||||
#define AA_EXEC_MMAP 0x0800
|
||||
|
||||
#define AA_MAY_LINK 0x1000
|
||||
#define AA_LINK_SUBSET AA_MAY_LOCK /* overlaid */
|
||||
#define AA_MAY_ONEXEC 0x40000000 /* exec allows onexec */
|
||||
#define AA_MAY_CHANGE_PROFILE 0x80000000
|
||||
#define AA_MAY_CHANGEHAT 0x80000000 /* ctrl auditing only */
|
||||
#define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND))
|
||||
|
||||
#define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
||||
AA_MAY_CREATE | AA_MAY_DELETE | \
|
||||
AA_MAY_META_READ | AA_MAY_META_WRITE | \
|
||||
AA_MAY_GETATTR | AA_MAY_SETATTR | \
|
||||
AA_MAY_CHMOD | AA_MAY_CHOWN | AA_MAY_LOCK | \
|
||||
AA_EXEC_MMAP | AA_MAY_LINK)
|
||||
|
||||
#define file_ctx(X) ((struct aa_file_ctx *)(X)->f_security)
|
||||
|
||||
/* struct aa_file_ctx - the AppArmor context the file was opened in
|
||||
* @lock: lock to update the ctx
|
||||
* @label: label currently cached on the ctx
|
||||
* @perms: the permission the file was opened with
|
||||
*/
|
||||
struct aa_file_ctx {
|
||||
spinlock_t lock;
|
||||
struct aa_label __rcu *label;
|
||||
u32 allow;
|
||||
};
|
||||
|
||||
/**
|
||||
* aa_alloc_file_ctx - allocate file_ctx
|
||||
* @label: initial label of task creating the file
|
||||
* @gfp: gfp flags for allocation
|
||||
*
|
||||
* Returns: file_ctx or NULL on failure
|
||||
*/
|
||||
static inline struct aa_file_ctx *aa_alloc_file_ctx(struct aa_label *label,
|
||||
gfp_t gfp)
|
||||
{
|
||||
struct aa_file_ctx *ctx;
|
||||
|
||||
ctx = kzalloc(sizeof(struct aa_file_ctx), gfp);
|
||||
if (ctx) {
|
||||
spin_lock_init(&ctx->lock);
|
||||
rcu_assign_pointer(ctx->label, aa_get_label(label));
|
||||
}
|
||||
return ctx;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_free_file_ctx - free a file_ctx
|
||||
* @ctx: file_ctx to free (MAYBE_NULL)
|
||||
*/
|
||||
static inline void aa_free_file_ctx(struct aa_file_ctx *ctx)
|
||||
{
|
||||
if (ctx) {
|
||||
aa_put_label(rcu_access_pointer(ctx->label));
|
||||
kzfree(ctx);
|
||||
}
|
||||
}
|
||||
|
||||
static inline struct aa_label *aa_get_file_label(struct aa_file_ctx *ctx)
|
||||
{
|
||||
return aa_get_label_rcu(&ctx->label);
|
||||
}
|
||||
|
||||
/*
|
||||
* The xindex is broken into 3 parts
|
||||
* - index - an index into either the exec name table or the variable table
|
||||
|
@ -75,25 +110,6 @@ struct path_cond {
|
|||
umode_t mode;
|
||||
};
|
||||
|
||||
/* struct file_perms - file permission
|
||||
* @allow: mask of permissions that are allowed
|
||||
* @audit: mask of permissions to force an audit message for
|
||||
* @quiet: mask of permissions to quiet audit messages for
|
||||
* @kill: mask of permissions that when matched will kill the task
|
||||
* @xindex: exec transition index if @allow contains MAY_EXEC
|
||||
*
|
||||
* The @audit and @queit mask should be mutually exclusive.
|
||||
*/
|
||||
struct file_perms {
|
||||
u32 allow;
|
||||
u32 audit;
|
||||
u32 quiet;
|
||||
u32 kill;
|
||||
u16 xindex;
|
||||
};
|
||||
|
||||
extern struct file_perms nullperms;
|
||||
|
||||
#define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
||||
|
||||
/* FIXME: split perms from dfa and match this to description
|
||||
|
@ -144,9 +160,10 @@ static inline u16 dfa_map_xindex(u16 mask)
|
|||
#define dfa_other_xindex(dfa, state) \
|
||||
dfa_map_xindex((ACCEPT_TABLE(dfa)[state] >> 14) & 0x3fff)
|
||||
|
||||
int aa_audit_file(struct aa_profile *profile, struct file_perms *perms,
|
||||
int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms,
|
||||
const char *op, u32 request, const char *name,
|
||||
const char *target, kuid_t ouid, const char *info, int error);
|
||||
const char *target, struct aa_label *tlabel, kuid_t ouid,
|
||||
const char *info, int error);
|
||||
|
||||
/**
|
||||
* struct aa_file_rules - components used for file rule permissions
|
||||
|
@ -167,20 +184,27 @@ struct aa_file_rules {
|
|||
/* TODO: add delegate table */
|
||||
};
|
||||
|
||||
struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state,
|
||||
struct path_cond *cond);
|
||||
unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
|
||||
const char *name, struct path_cond *cond,
|
||||
struct file_perms *perms);
|
||||
struct aa_perms *perms);
|
||||
|
||||
int aa_path_perm(const char *op, struct aa_profile *profile,
|
||||
int __aa_path_perm(const char *op, struct aa_profile *profile,
|
||||
const char *name, u32 request, struct path_cond *cond,
|
||||
int flags, struct aa_perms *perms);
|
||||
int aa_path_perm(const char *op, struct aa_label *label,
|
||||
const struct path *path, int flags, u32 request,
|
||||
struct path_cond *cond);
|
||||
|
||||
int aa_path_link(struct aa_profile *profile, struct dentry *old_dentry,
|
||||
int aa_path_link(struct aa_label *label, struct dentry *old_dentry,
|
||||
const struct path *new_dir, struct dentry *new_dentry);
|
||||
|
||||
int aa_file_perm(const char *op, struct aa_profile *profile, struct file *file,
|
||||
int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
|
||||
u32 request);
|
||||
|
||||
void aa_inherit_files(const struct cred *cred, struct files_struct *files);
|
||||
|
||||
static inline void aa_free_file_rules(struct aa_file_rules *rules)
|
||||
{
|
||||
aa_put_dfa(rules->dfa);
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
* This file contains AppArmor ipc mediation function definitions.
|
||||
*
|
||||
* Copyright (C) 1998-2008 Novell/SUSE
|
||||
* Copyright 2009-2010 Canonical Ltd.
|
||||
* Copyright 2009-2017 Canonical Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
|
@ -19,10 +19,16 @@
|
|||
|
||||
struct aa_profile;
|
||||
|
||||
int aa_may_ptrace(struct aa_profile *tracer, struct aa_profile *tracee,
|
||||
unsigned int mode);
|
||||
#define AA_PTRACE_TRACE MAY_WRITE
|
||||
#define AA_PTRACE_READ MAY_READ
|
||||
#define AA_MAY_BE_TRACED AA_MAY_APPEND
|
||||
#define AA_MAY_BE_READ AA_MAY_CREATE
|
||||
#define PTRACE_PERM_SHIFT 2
|
||||
|
||||
int aa_ptrace(struct task_struct *tracer, struct task_struct *tracee,
|
||||
unsigned int mode);
|
||||
#define AA_PTRACE_PERM_MASK (AA_PTRACE_READ | AA_PTRACE_TRACE | \
|
||||
AA_MAY_BE_READ | AA_MAY_BE_TRACED)
|
||||
|
||||
int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
|
||||
u32 request);
|
||||
|
||||
#endif /* __AA_IPC_H */
|
||||
|
|
441
security/apparmor/include/label.h
Normal file
441
security/apparmor/include/label.h
Normal file
|
@ -0,0 +1,441 @@
|
|||
/*
|
||||
* AppArmor security module
|
||||
*
|
||||
* This file contains AppArmor label definitions
|
||||
*
|
||||
* Copyright 2017 Canonical Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
* published by the Free Software Foundation, version 2 of the
|
||||
* License.
|
||||
*/
|
||||
|
||||
#ifndef __AA_LABEL_H
|
||||
#define __AA_LABEL_H
|
||||
|
||||
#include <linux/atomic.h>
|
||||
#include <linux/audit.h>
|
||||
#include <linux/rbtree.h>
|
||||
#include <linux/rcupdate.h>
|
||||
|
||||
#include "apparmor.h"
|
||||
#include "lib.h"
|
||||
|
||||
struct aa_ns;
|
||||
|
||||
#define LOCAL_VEC_ENTRIES 8
|
||||
#define DEFINE_VEC(T, V) \
|
||||
struct aa_ ## T *(_ ## V ## _localtmp)[LOCAL_VEC_ENTRIES]; \
|
||||
struct aa_ ## T **(V)
|
||||
|
||||
#define vec_setup(T, V, N, GFP) \
|
||||
({ \
|
||||
if ((N) <= LOCAL_VEC_ENTRIES) { \
|
||||
typeof(N) i; \
|
||||
(V) = (_ ## V ## _localtmp); \
|
||||
for (i = 0; i < (N); i++) \
|
||||
(V)[i] = NULL; \
|
||||
} else \
|
||||
(V) = kzalloc(sizeof(struct aa_ ## T *) * (N), (GFP)); \
|
||||
(V) ? 0 : -ENOMEM; \
|
||||
})
|
||||
|
||||
#define vec_cleanup(T, V, N) \
|
||||
do { \
|
||||
int i; \
|
||||
for (i = 0; i < (N); i++) { \
|
||||
if (!IS_ERR_OR_NULL((V)[i])) \
|
||||
aa_put_ ## T((V)[i]); \
|
||||
} \
|
||||
if ((V) != _ ## V ## _localtmp) \
|
||||
kfree(V); \
|
||||
} while (0)
|
||||
|
||||
#define vec_last(VEC, SIZE) ((VEC)[(SIZE) - 1])
|
||||
#define vec_ns(VEC, SIZE) (vec_last((VEC), (SIZE))->ns)
|
||||
#define vec_labelset(VEC, SIZE) (&vec_ns((VEC), (SIZE))->labels)
|
||||
#define cleanup_domain_vec(V, L) cleanup_label_vec((V), (L)->size)
|
||||
|
||||
struct aa_profile;
|
||||
#define VEC_FLAG_TERMINATE 1
|
||||
int aa_vec_unique(struct aa_profile **vec, int n, int flags);
|
||||
struct aa_label *aa_vec_find_or_create_label(struct aa_profile **vec, int len,
|
||||
gfp_t gfp);
|
||||
#define aa_sort_and_merge_vec(N, V) \
|
||||
aa_sort_and_merge_profiles((N), (struct aa_profile **)(V))
|
||||
|
||||
|
||||
/* struct aa_labelset - set of labels for a namespace
|
||||
*
|
||||
* Labels are reference counted; aa_labelset does not contribute to label
|
||||
* reference counts. Once a label's last refcount is put it is removed from
|
||||
* the set.
|
||||
*/
|
||||
struct aa_labelset {
|
||||
rwlock_t lock;
|
||||
|
||||
struct rb_root root;
|
||||
};
|
||||
|
||||
#define __labelset_for_each(LS, N) \
|
||||
for ((N) = rb_first(&(LS)->root); (N); (N) = rb_next(N))
|
||||
|
||||
void aa_labelset_destroy(struct aa_labelset *ls);
|
||||
void aa_labelset_init(struct aa_labelset *ls);
|
||||
|
||||
|
||||
enum label_flags {
|
||||
FLAG_HAT = 1, /* profile is a hat */
|
||||
FLAG_UNCONFINED = 2, /* label unconfined only if all */
|
||||
FLAG_NULL = 4, /* profile is null learning profile */
|
||||
FLAG_IX_ON_NAME_ERROR = 8, /* fallback to ix on name lookup fail */
|
||||
FLAG_IMMUTIBLE = 0x10, /* don't allow changes/replacement */
|
||||
FLAG_USER_DEFINED = 0x20, /* user based profile - lower privs */
|
||||
FLAG_NO_LIST_REF = 0x40, /* list doesn't keep profile ref */
|
||||
FLAG_NS_COUNT = 0x80, /* carries NS ref count */
|
||||
FLAG_IN_TREE = 0x100, /* label is in tree */
|
||||
FLAG_PROFILE = 0x200, /* label is a profile */
|
||||
FLAG_EXPLICIT = 0x400, /* explicit static label */
|
||||
FLAG_STALE = 0x800, /* replaced/removed */
|
||||
FLAG_RENAMED = 0x1000, /* label has renaming in it */
|
||||
FLAG_REVOKED = 0x2000, /* label has revocation in it */
|
||||
|
||||
/* These flags must correspond with PATH_flags */
|
||||
/* TODO: add new path flags */
|
||||
};
|
||||
|
||||
struct aa_label;
|
||||
struct aa_proxy {
|
||||
struct kref count;
|
||||
struct aa_label __rcu *label;
|
||||
};
|
||||
|
||||
struct label_it {
|
||||
int i, j;
|
||||
};
|
||||
|
||||
/* struct aa_label - lazy labeling struct
|
||||
* @count: ref count of active users
|
||||
* @node: rbtree position
|
||||
* @rcu: rcu callback struct
|
||||
* @proxy: is set to the label that replaced this label
|
||||
* @hname: text representation of the label (MAYBE_NULL)
|
||||
* @flags: stale and other flags - values may change under label set lock
|
||||
* @secid: secid that references this label
|
||||
* @size: number of entries in @ent[]
|
||||
* @ent: set of profiles for label, actual size determined by @size
|
||||
*/
|
||||
struct aa_label {
|
||||
struct kref count;
|
||||
struct rb_node node;
|
||||
struct rcu_head rcu;
|
||||
struct aa_proxy *proxy;
|
||||
__counted char *hname;
|
||||
long flags;
|
||||
u32 secid;
|
||||
int size;
|
||||
struct aa_profile *vec[];
|
||||
};
|
||||
|
||||
#define last_error(E, FN) \
|
||||
do { \
|
||||
int __subE = (FN); \
|
||||
if (__subE) \
|
||||
(E) = __subE; \
|
||||
} while (0)
|
||||
|
||||
#define label_isprofile(X) ((X)->flags & FLAG_PROFILE)
|
||||
#define label_unconfined(X) ((X)->flags & FLAG_UNCONFINED)
|
||||
#define unconfined(X) label_unconfined(X)
|
||||
#define label_is_stale(X) ((X)->flags & FLAG_STALE)
|
||||
#define __label_make_stale(X) ((X)->flags |= FLAG_STALE)
|
||||
#define labels_ns(X) (vec_ns(&((X)->vec[0]), (X)->size))
|
||||
#define labels_set(X) (&labels_ns(X)->labels)
|
||||
#define labels_profile(X) ((X)->vec[(X)->size - 1])
|
||||
|
||||
|
||||
int aa_label_next_confined(struct aa_label *l, int i);
|
||||
|
||||
/* for each profile in a label */
|
||||
#define label_for_each(I, L, P) \
|
||||
for ((I).i = 0; ((P) = (L)->vec[(I).i]); ++((I).i))
|
||||
|
||||
/* assumes break/goto ended label_for_each */
|
||||
#define label_for_each_cont(I, L, P) \
|
||||
for (++((I).i); ((P) = (L)->vec[(I).i]); ++((I).i))
|
||||
|
||||
#define next_comb(I, L1, L2) \
|
||||
do { \
|
||||
(I).j++; \
|
||||
if ((I).j >= (L2)->size) { \
|
||||
(I).i++; \
|
||||
(I).j = 0; \
|
||||
} \
|
||||
} while (0)
|
||||
|
||||
|
||||
/* for each combination of P1 in L1, and P2 in L2 */
|
||||
#define label_for_each_comb(I, L1, L2, P1, P2) \
|
||||
for ((I).i = (I).j = 0; \
|
||||
((P1) = (L1)->vec[(I).i]) && ((P2) = (L2)->vec[(I).j]); \
|
||||
(I) = next_comb(I, L1, L2))
|
||||
|
||||
#define fn_for_each_comb(L1, L2, P1, P2, FN) \
|
||||
({ \
|
||||
struct label_it i; \
|
||||
int __E = 0; \
|
||||
label_for_each_comb(i, (L1), (L2), (P1), (P2)) { \
|
||||
last_error(__E, (FN)); \
|
||||
} \
|
||||
__E; \
|
||||
})
|
||||
|
||||
/* for each profile that is enforcing confinement in a label */
|
||||
#define label_for_each_confined(I, L, P) \
|
||||
for ((I).i = aa_label_next_confined((L), 0); \
|
||||
((P) = (L)->vec[(I).i]); \
|
||||
(I).i = aa_label_next_confined((L), (I).i + 1))
|
||||
|
||||
#define label_for_each_in_merge(I, A, B, P) \
|
||||
for ((I).i = (I).j = 0; \
|
||||
((P) = aa_label_next_in_merge(&(I), (A), (B))); \
|
||||
)
|
||||
|
||||
#define label_for_each_not_in_set(I, SET, SUB, P) \
|
||||
for ((I).i = (I).j = 0; \
|
||||
((P) = __aa_label_next_not_in_set(&(I), (SET), (SUB))); \
|
||||
)
|
||||
|
||||
#define next_in_ns(i, NS, L) \
|
||||
({ \
|
||||
typeof(i) ___i = (i); \
|
||||
while ((L)->vec[___i] && (L)->vec[___i]->ns != (NS)) \
|
||||
(___i)++; \
|
||||
(___i); \
|
||||
})
|
||||
|
||||
#define label_for_each_in_ns(I, NS, L, P) \
|
||||
for ((I).i = next_in_ns(0, (NS), (L)); \
|
||||
((P) = (L)->vec[(I).i]); \
|
||||
(I).i = next_in_ns((I).i + 1, (NS), (L)))
|
||||
|
||||
#define fn_for_each_in_ns(L, P, FN) \
|
||||
({ \
|
||||
struct label_it __i; \
|
||||
struct aa_ns *__ns = labels_ns(L); \
|
||||
int __E = 0; \
|
||||
label_for_each_in_ns(__i, __ns, (L), (P)) { \
|
||||
last_error(__E, (FN)); \
|
||||
} \
|
||||
__E; \
|
||||
})
|
||||
|
||||
|
||||
#define fn_for_each_XXX(L, P, FN, ...) \
|
||||
({ \
|
||||
struct label_it i; \
|
||||
int __E = 0; \
|
||||
label_for_each ## __VA_ARGS__(i, (L), (P)) { \
|
||||
last_error(__E, (FN)); \
|
||||
} \
|
||||
__E; \
|
||||
})
|
||||
|
||||
#define fn_for_each(L, P, FN) fn_for_each_XXX(L, P, FN)
|
||||
#define fn_for_each_confined(L, P, FN) fn_for_each_XXX(L, P, FN, _confined)
|
||||
|
||||
#define fn_for_each2_XXX(L1, L2, P, FN, ...) \
|
||||
({ \
|
||||
struct label_it i; \
|
||||
int __E = 0; \
|
||||
label_for_each ## __VA_ARGS__(i, (L1), (L2), (P)) { \
|
||||
last_error(__E, (FN)); \
|
||||
} \
|
||||
__E; \
|
||||
})
|
||||
|
||||
#define fn_for_each_in_merge(L1, L2, P, FN) \
|
||||
fn_for_each2_XXX((L1), (L2), P, FN, _in_merge)
|
||||
#define fn_for_each_not_in_set(L1, L2, P, FN) \
|
||||
fn_for_each2_XXX((L1), (L2), P, FN, _not_in_set)
|
||||
|
||||
#define LABEL_MEDIATES(L, C) \
|
||||
({ \
|
||||
struct aa_profile *profile; \
|
||||
struct label_it i; \
|
||||
int ret = 0; \
|
||||
label_for_each(i, (L), profile) { \
|
||||
if (PROFILE_MEDIATES(profile, (C))) { \
|
||||
ret = 1; \
|
||||
break; \
|
||||
} \
|
||||
} \
|
||||
ret; \
|
||||
})
|
||||
|
||||
|
||||
void aa_labelset_destroy(struct aa_labelset *ls);
|
||||
void aa_labelset_init(struct aa_labelset *ls);
|
||||
void __aa_labelset_update_subtree(struct aa_ns *ns);
|
||||
|
||||
void aa_label_free(struct aa_label *label);
|
||||
void aa_label_kref(struct kref *kref);
|
||||
bool aa_label_init(struct aa_label *label, int size);
|
||||
struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp);
|
||||
|
||||
bool aa_label_is_subset(struct aa_label *set, struct aa_label *sub);
|
||||
struct aa_profile *__aa_label_next_not_in_set(struct label_it *I,
|
||||
struct aa_label *set,
|
||||
struct aa_label *sub);
|
||||
bool aa_label_remove(struct aa_label *label);
|
||||
struct aa_label *aa_label_insert(struct aa_labelset *ls, struct aa_label *l);
|
||||
bool aa_label_replace(struct aa_label *old, struct aa_label *new);
|
||||
bool aa_label_make_newest(struct aa_labelset *ls, struct aa_label *old,
|
||||
struct aa_label *new);
|
||||
|
||||
struct aa_label *aa_label_find(struct aa_label *l);
|
||||
|
||||
struct aa_profile *aa_label_next_in_merge(struct label_it *I,
|
||||
struct aa_label *a,
|
||||
struct aa_label *b);
|
||||
struct aa_label *aa_label_find_merge(struct aa_label *a, struct aa_label *b);
|
||||
struct aa_label *aa_label_merge(struct aa_label *a, struct aa_label *b,
|
||||
gfp_t gfp);
|
||||
|
||||
|
||||
bool aa_update_label_name(struct aa_ns *ns, struct aa_label *label, gfp_t gfp);
|
||||
|
||||
#define FLAGS_NONE 0
|
||||
#define FLAG_SHOW_MODE 1
|
||||
#define FLAG_VIEW_SUBNS 2
|
||||
#define FLAG_HIDDEN_UNCONFINED 4
|
||||
int aa_label_snxprint(char *str, size_t size, struct aa_ns *view,
|
||||
struct aa_label *label, int flags);
|
||||
int aa_label_asxprint(char **strp, struct aa_ns *ns, struct aa_label *label,
|
||||
int flags, gfp_t gfp);
|
||||
int aa_label_acntsxprint(char __counted **strp, struct aa_ns *ns,
|
||||
struct aa_label *label, int flags, gfp_t gfp);
|
||||
void aa_label_xaudit(struct audit_buffer *ab, struct aa_ns *ns,
|
||||
struct aa_label *label, int flags, gfp_t gfp);
|
||||
void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns,
|
||||
struct aa_label *label, int flags, gfp_t gfp);
|
||||
void aa_label_xprintk(struct aa_ns *ns, struct aa_label *label, int flags,
|
||||
gfp_t gfp);
|
||||
void aa_label_audit(struct audit_buffer *ab, struct aa_label *label, gfp_t gfp);
|
||||
void aa_label_seq_print(struct seq_file *f, struct aa_label *label, gfp_t gfp);
|
||||
void aa_label_printk(struct aa_label *label, gfp_t gfp);
|
||||
|
||||
struct aa_label *aa_label_parse(struct aa_label *base, const char *str,
|
||||
gfp_t gfp, bool create, bool force_stack);
|
||||
|
||||
|
||||
struct aa_perms;
|
||||
int aa_label_match(struct aa_profile *profile, struct aa_label *label,
|
||||
unsigned int state, bool subns, u32 request,
|
||||
struct aa_perms *perms);
|
||||
|
||||
|
||||
/**
|
||||
* __aa_get_label - get a reference count to uncounted label reference
|
||||
* @l: reference to get a count on
|
||||
*
|
||||
* Returns: pointer to reference OR NULL if race is lost and reference is
|
||||
* being repeated.
|
||||
* Requires: lock held, and the return code MUST be checked
|
||||
*/
|
||||
static inline struct aa_label *__aa_get_label(struct aa_label *l)
|
||||
{
|
||||
if (l && kref_get_unless_zero(&l->count))
|
||||
return l;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static inline struct aa_label *aa_get_label(struct aa_label *l)
|
||||
{
|
||||
if (l)
|
||||
kref_get(&(l->count));
|
||||
|
||||
return l;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* aa_get_label_rcu - increment refcount on a label that can be replaced
|
||||
* @l: pointer to label that can be replaced (NOT NULL)
|
||||
*
|
||||
* Returns: pointer to a refcounted label.
|
||||
* else NULL if no label
|
||||
*/
|
||||
static inline struct aa_label *aa_get_label_rcu(struct aa_label __rcu **l)
|
||||
{
|
||||
struct aa_label *c;
|
||||
|
||||
rcu_read_lock();
|
||||
do {
|
||||
c = rcu_dereference(*l);
|
||||
} while (c && !kref_get_unless_zero(&c->count));
|
||||
rcu_read_unlock();
|
||||
|
||||
return c;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_get_newest_label - find the newest version of @l
|
||||
* @l: the label to check for newer versions of
|
||||
*
|
||||
* Returns: refcounted newest version of @l taking into account
|
||||
* replacement, renames and removals
|
||||
* return @l.
|
||||
*/
|
||||
static inline struct aa_label *aa_get_newest_label(struct aa_label *l)
|
||||
{
|
||||
if (!l)
|
||||
return NULL;
|
||||
|
||||
if (label_is_stale(l)) {
|
||||
struct aa_label *tmp;
|
||||
|
||||
AA_BUG(!l->proxy);
|
||||
AA_BUG(!l->proxy->label);
|
||||
/* BUG: only way this can happen is @l ref count and its
|
||||
* replacement count have gone to 0 and are on their way
|
||||
* to destruction. ie. we have a refcounting error
|
||||
*/
|
||||
tmp = aa_get_label_rcu(&l->proxy->label);
|
||||
AA_BUG(!tmp);
|
||||
|
||||
return tmp;
|
||||
}
|
||||
|
||||
return aa_get_label(l);
|
||||
}
|
||||
|
||||
static inline void aa_put_label(struct aa_label *l)
|
||||
{
|
||||
if (l)
|
||||
kref_put(&l->count, aa_label_kref);
|
||||
}
|
||||
|
||||
|
||||
struct aa_proxy *aa_alloc_proxy(struct aa_label *l, gfp_t gfp);
|
||||
void aa_proxy_kref(struct kref *kref);
|
||||
|
||||
static inline struct aa_proxy *aa_get_proxy(struct aa_proxy *proxy)
|
||||
{
|
||||
if (proxy)
|
||||
kref_get(&(proxy->count));
|
||||
|
||||
return proxy;
|
||||
}
|
||||
|
||||
static inline void aa_put_proxy(struct aa_proxy *proxy)
|
||||
{
|
||||
if (proxy)
|
||||
kref_put(&proxy->count, aa_proxy_kref);
|
||||
}
|
||||
|
||||
void __aa_proxy_redirect(struct aa_label *orig, struct aa_label *new);
|
||||
|
||||
#endif /* __AA_LABEL_H */
|
|
@ -60,6 +60,7 @@
|
|||
extern int apparmor_initialized;
|
||||
|
||||
/* fn's in lib */
|
||||
const char *skipn_spaces(const char *str, size_t n);
|
||||
char *aa_split_fqname(char *args, char **ns_name);
|
||||
const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name,
|
||||
size_t *ns_len);
|
||||
|
@ -99,6 +100,36 @@ static inline bool path_mediated_fs(struct dentry *dentry)
|
|||
return !(dentry->d_sb->s_flags & MS_NOUSER);
|
||||
}
|
||||
|
||||
|
||||
struct counted_str {
|
||||
struct kref count;
|
||||
char name[];
|
||||
};
|
||||
|
||||
#define str_to_counted(str) \
|
||||
((struct counted_str *)(str - offsetof(struct counted_str, name)))
|
||||
|
||||
#define __counted /* atm just a notation */
|
||||
|
||||
void aa_str_kref(struct kref *kref);
|
||||
char *aa_str_alloc(int size, gfp_t gfp);
|
||||
|
||||
|
||||
static inline __counted char *aa_get_str(__counted char *str)
|
||||
{
|
||||
if (str)
|
||||
kref_get(&(str_to_counted(str)->count));
|
||||
|
||||
return str;
|
||||
}
|
||||
|
||||
static inline void aa_put_str(__counted char *str)
|
||||
{
|
||||
if (str)
|
||||
kref_put(&str_to_counted(str)->count, aa_str_kref);
|
||||
}
|
||||
|
||||
|
||||
/* struct aa_policy - common part of both namespaces and profiles
|
||||
* @name: name of the object
|
||||
* @hname - The hierarchical name
|
||||
|
@ -107,7 +138,7 @@ static inline bool path_mediated_fs(struct dentry *dentry)
|
|||
*/
|
||||
struct aa_policy {
|
||||
const char *name;
|
||||
const char *hname;
|
||||
__counted char *hname;
|
||||
struct list_head list;
|
||||
struct list_head profiles;
|
||||
};
|
||||
|
@ -180,4 +211,89 @@ bool aa_policy_init(struct aa_policy *policy, const char *prefix,
|
|||
const char *name, gfp_t gfp);
|
||||
void aa_policy_destroy(struct aa_policy *policy);
|
||||
|
||||
#endif /* AA_LIB_H */
|
||||
|
||||
/*
|
||||
* fn_label_build - abstract out the build of a label transition
|
||||
* @L: label the transition is being computed for
|
||||
* @P: profile parameter derived from L by this macro, can be passed to FN
|
||||
* @GFP: memory allocation type to use
|
||||
* @FN: fn to call for each profile transition. @P is set to the profile
|
||||
*
|
||||
* Returns: new label on success
|
||||
* ERR_PTR if build @FN fails
|
||||
* NULL if label_build fails due to low memory conditions
|
||||
*
|
||||
* @FN must return a label or ERR_PTR on failure. NULL is not allowed
|
||||
*/
|
||||
#define fn_label_build(L, P, GFP, FN) \
|
||||
({ \
|
||||
__label__ __cleanup, __done; \
|
||||
struct aa_label *__new_; \
|
||||
\
|
||||
if ((L)->size > 1) { \
|
||||
/* TODO: add cache of transitions already done */ \
|
||||
struct label_it __i; \
|
||||
int __j, __k, __count; \
|
||||
DEFINE_VEC(label, __lvec); \
|
||||
DEFINE_VEC(profile, __pvec); \
|
||||
if (vec_setup(label, __lvec, (L)->size, (GFP))) { \
|
||||
__new_ = NULL; \
|
||||
goto __done; \
|
||||
} \
|
||||
__j = 0; \
|
||||
label_for_each(__i, (L), (P)) { \
|
||||
__new_ = (FN); \
|
||||
AA_BUG(!__new_); \
|
||||
if (IS_ERR(__new_)) \
|
||||
goto __cleanup; \
|
||||
__lvec[__j++] = __new_; \
|
||||
} \
|
||||
for (__j = __count = 0; __j < (L)->size; __j++) \
|
||||
__count += __lvec[__j]->size; \
|
||||
if (!vec_setup(profile, __pvec, __count, (GFP))) { \
|
||||
for (__j = __k = 0; __j < (L)->size; __j++) { \
|
||||
label_for_each(__i, __lvec[__j], (P)) \
|
||||
__pvec[__k++] = aa_get_profile(P); \
|
||||
} \
|
||||
__count -= aa_vec_unique(__pvec, __count, 0); \
|
||||
if (__count > 1) { \
|
||||
__new_ = aa_vec_find_or_create_label(__pvec,\
|
||||
__count, (GFP)); \
|
||||
/* only fails if out of Mem */ \
|
||||
if (!__new_) \
|
||||
__new_ = NULL; \
|
||||
} else \
|
||||
__new_ = aa_get_label(&__pvec[0]->label); \
|
||||
vec_cleanup(profile, __pvec, __count); \
|
||||
} else \
|
||||
__new_ = NULL; \
|
||||
__cleanup: \
|
||||
vec_cleanup(label, __lvec, (L)->size); \
|
||||
} else { \
|
||||
(P) = labels_profile(L); \
|
||||
__new_ = (FN); \
|
||||
} \
|
||||
__done: \
|
||||
if (!__new_) \
|
||||
AA_DEBUG("label build failed\n"); \
|
||||
(__new_); \
|
||||
})
|
||||
|
||||
|
||||
#define __fn_build_in_ns(NS, P, NS_FN, OTHER_FN) \
|
||||
({ \
|
||||
struct aa_label *__new; \
|
||||
if ((P)->ns != (NS)) \
|
||||
__new = (OTHER_FN); \
|
||||
else \
|
||||
__new = (NS_FN); \
|
||||
(__new); \
|
||||
})
|
||||
|
||||
#define fn_label_build_in_ns(L, P, GFP, NS_FN, OTHER_FN) \
|
||||
({ \
|
||||
fn_label_build((L), (P), (GFP), \
|
||||
__fn_build_in_ns(labels_ns(L), (P), (NS_FN), (OTHER_FN))); \
|
||||
})
|
||||
|
||||
#endif /* __AA_LIB_H */
|
||||
|
|
|
@ -23,11 +23,12 @@ enum path_flags {
|
|||
PATH_CHROOT_NSCONNECT = 0x10, /* connect paths that are at ns root */
|
||||
|
||||
PATH_DELEGATE_DELETED = 0x08000, /* delegate deleted files */
|
||||
PATH_MEDIATE_DELETED = 0x10000, /* mediate deleted paths */
|
||||
PATH_MEDIATE_DELETED = 0x10000, /* mediate deleted paths */
|
||||
};
|
||||
|
||||
int aa_path_name(const struct path *path, int flags, char **buffer,
|
||||
const char **name, const char **info);
|
||||
int aa_path_name(const struct path *path, int flags, char *buffer,
|
||||
const char **name, const char **info,
|
||||
const char *disconnected);
|
||||
|
||||
#define MAX_PATH_BUFFERS 2
|
||||
|
||||
|
|
155
security/apparmor/include/perms.h
Normal file
155
security/apparmor/include/perms.h
Normal file
|
@ -0,0 +1,155 @@
|
|||
/*
|
||||
* AppArmor security module
|
||||
*
|
||||
* This file contains AppArmor basic permission sets definitions.
|
||||
*
|
||||
* Copyright 2017 Canonical Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
* published by the Free Software Foundation, version 2 of the
|
||||
* License.
|
||||
*/
|
||||
|
||||
#ifndef __AA_PERM_H
|
||||
#define __AA_PERM_H
|
||||
|
||||
#include <linux/fs.h>
|
||||
#include "label.h"
|
||||
|
||||
#define AA_MAY_EXEC MAY_EXEC
|
||||
#define AA_MAY_WRITE MAY_WRITE
|
||||
#define AA_MAY_READ MAY_READ
|
||||
#define AA_MAY_APPEND MAY_APPEND
|
||||
|
||||
#define AA_MAY_CREATE 0x0010
|
||||
#define AA_MAY_DELETE 0x0020
|
||||
#define AA_MAY_OPEN 0x0040
|
||||
#define AA_MAY_RENAME 0x0080 /* pair */
|
||||
|
||||
#define AA_MAY_SETATTR 0x0100 /* meta write */
|
||||
#define AA_MAY_GETATTR 0x0200 /* meta read */
|
||||
#define AA_MAY_SETCRED 0x0400 /* security cred/attr */
|
||||
#define AA_MAY_GETCRED 0x0800
|
||||
|
||||
#define AA_MAY_CHMOD 0x1000 /* pair */
|
||||
#define AA_MAY_CHOWN 0x2000 /* pair */
|
||||
#define AA_MAY_CHGRP 0x4000 /* pair */
|
||||
#define AA_MAY_LOCK 0x8000 /* LINK_SUBSET overlaid */
|
||||
|
||||
#define AA_EXEC_MMAP 0x00010000
|
||||
#define AA_MAY_MPROT 0x00020000 /* extend conditions */
|
||||
#define AA_MAY_LINK 0x00040000 /* pair */
|
||||
#define AA_MAY_SNAPSHOT 0x00080000 /* pair */
|
||||
|
||||
#define AA_MAY_DELEGATE
|
||||
#define AA_CONT_MATCH 0x08000000
|
||||
|
||||
#define AA_MAY_STACK 0x10000000
|
||||
#define AA_MAY_ONEXEC 0x20000000 /* either stack or change_profile */
|
||||
#define AA_MAY_CHANGE_PROFILE 0x40000000
|
||||
#define AA_MAY_CHANGEHAT 0x80000000
|
||||
|
||||
#define AA_LINK_SUBSET AA_MAY_LOCK /* overlaid */
|
||||
|
||||
|
||||
#define PERMS_CHRS_MASK (MAY_READ | MAY_WRITE | AA_MAY_CREATE | \
|
||||
AA_MAY_DELETE | AA_MAY_LINK | AA_MAY_LOCK | \
|
||||
AA_MAY_EXEC | AA_EXEC_MMAP | AA_MAY_APPEND)
|
||||
|
||||
#define PERMS_NAMES_MASK (PERMS_CHRS_MASK | AA_MAY_OPEN | AA_MAY_RENAME | \
|
||||
AA_MAY_SETATTR | AA_MAY_GETATTR | AA_MAY_SETCRED | \
|
||||
AA_MAY_GETCRED | AA_MAY_CHMOD | AA_MAY_CHOWN | \
|
||||
AA_MAY_CHGRP | AA_MAY_MPROT | AA_MAY_SNAPSHOT | \
|
||||
AA_MAY_STACK | AA_MAY_ONEXEC | \
|
||||
AA_MAY_CHANGE_PROFILE | AA_MAY_CHANGEHAT)
|
||||
|
||||
extern const char aa_file_perm_chrs[];
|
||||
extern const char *aa_file_perm_names[];
|
||||
|
||||
struct aa_perms {
|
||||
u32 allow;
|
||||
u32 audit; /* set only when allow is set */
|
||||
|
||||
u32 deny; /* explicit deny, or conflict if allow also set */
|
||||
u32 quiet; /* set only when ~allow | deny */
|
||||
u32 kill; /* set only when ~allow | deny */
|
||||
u32 stop; /* set only when ~allow | deny */
|
||||
|
||||
u32 complain; /* accumulates only used when ~allow & ~deny */
|
||||
u32 cond; /* set only when ~allow and ~deny */
|
||||
|
||||
u32 hide; /* set only when ~allow | deny */
|
||||
u32 prompt; /* accumulates only used when ~allow & ~deny */
|
||||
|
||||
/* Reserved:
|
||||
* u32 subtree; / * set only when allow is set * /
|
||||
*/
|
||||
u16 xindex;
|
||||
};
|
||||
|
||||
#define ALL_PERMS_MASK 0xffffffff
|
||||
extern struct aa_perms nullperms;
|
||||
extern struct aa_perms allperms;
|
||||
|
||||
|
||||
#define xcheck(FN1, FN2) \
|
||||
({ \
|
||||
int e, error = FN1; \
|
||||
e = FN2; \
|
||||
if (e) \
|
||||
error = e; \
|
||||
error; \
|
||||
})
|
||||
|
||||
|
||||
/*
|
||||
* TODO: update for labels pointing to labels instead of profiles
|
||||
* TODO: optimize the walk, currently does subwalk of L2 for each P in L1
|
||||
* gah this doesn't allow for label compound check!!!!
|
||||
*/
|
||||
#define xcheck_ns_profile_profile(P1, P2, FN, args...) \
|
||||
({ \
|
||||
int ____e = 0; \
|
||||
if (P1->ns == P2->ns) \
|
||||
____e = FN((P1), (P2), args); \
|
||||
(____e); \
|
||||
})
|
||||
|
||||
#define xcheck_ns_profile_label(P, L, FN, args...) \
|
||||
({ \
|
||||
struct aa_profile *__p2; \
|
||||
fn_for_each((L), __p2, \
|
||||
xcheck_ns_profile_profile((P), __p2, (FN), args)); \
|
||||
})
|
||||
|
||||
#define xcheck_ns_labels(L1, L2, FN, args...) \
|
||||
({ \
|
||||
struct aa_profile *__p1; \
|
||||
fn_for_each((L1), __p1, FN(__p1, (L2), args)); \
|
||||
})
|
||||
|
||||
/* Do the cross check but applying FN at the profiles level */
|
||||
#define xcheck_labels_profiles(L1, L2, FN, args...) \
|
||||
xcheck_ns_labels((L1), (L2), xcheck_ns_profile_label, (FN), args)
|
||||
|
||||
|
||||
void aa_perm_mask_to_str(char *str, const char *chrs, u32 mask);
|
||||
void aa_audit_perm_names(struct audit_buffer *ab, const char **names, u32 mask);
|
||||
void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs,
|
||||
u32 chrsmask, const char **names, u32 namesmask);
|
||||
void aa_apply_modes_to_perms(struct aa_profile *profile,
|
||||
struct aa_perms *perms);
|
||||
void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
|
||||
struct aa_perms *perms);
|
||||
void aa_perms_accum(struct aa_perms *accum, struct aa_perms *addend);
|
||||
void aa_perms_accum_raw(struct aa_perms *accum, struct aa_perms *addend);
|
||||
void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label,
|
||||
int type, u32 request, struct aa_perms *perms);
|
||||
int aa_profile_label_perm(struct aa_profile *profile, struct aa_profile *target,
|
||||
u32 request, int type, u32 *deny,
|
||||
struct common_audit_data *sa);
|
||||
int aa_check_perms(struct aa_profile *profile, struct aa_perms *perms,
|
||||
u32 request, struct common_audit_data *sa,
|
||||
void (*cb)(struct audit_buffer *, void *));
|
||||
#endif /* __AA_PERM_H */
|
|
@ -29,6 +29,8 @@
|
|||
#include "domain.h"
|
||||
#include "file.h"
|
||||
#include "lib.h"
|
||||
#include "label.h"
|
||||
#include "perms.h"
|
||||
#include "resource.h"
|
||||
|
||||
|
||||
|
@ -47,9 +49,9 @@ extern const char *const aa_profile_mode_names[];
|
|||
|
||||
#define KILL_MODE(_profile) PROFILE_MODE((_profile), APPARMOR_KILL)
|
||||
|
||||
#define PROFILE_IS_HAT(_profile) ((_profile)->flags & PFLAG_HAT)
|
||||
#define PROFILE_IS_HAT(_profile) ((_profile)->label.flags & FLAG_HAT)
|
||||
|
||||
#define profile_is_stale(_profile) ((_profile)->flags & PFLAG_STALE)
|
||||
#define profile_is_stale(_profile) (label_is_stale(&(_profile)->label))
|
||||
|
||||
#define on_list_rcu(X) (!list_empty(X) && (X)->prev != LIST_POISON2)
|
||||
|
||||
|
@ -66,22 +68,6 @@ enum profile_mode {
|
|||
APPARMOR_UNCONFINED, /* profile set to unconfined */
|
||||
};
|
||||
|
||||
enum profile_flags {
|
||||
PFLAG_HAT = 1, /* profile is a hat */
|
||||
PFLAG_NULL = 4, /* profile is null learning profile */
|
||||
PFLAG_IX_ON_NAME_ERROR = 8, /* fallback to ix on name lookup fail */
|
||||
PFLAG_IMMUTABLE = 0x10, /* don't allow changes/replacement */
|
||||
PFLAG_USER_DEFINED = 0x20, /* user based profile - lower privs */
|
||||
PFLAG_NO_LIST_REF = 0x40, /* list doesn't keep profile ref */
|
||||
PFLAG_OLD_NULL_TRANS = 0x100, /* use // as the null transition */
|
||||
PFLAG_STALE = 0x200, /* profile replaced/removed */
|
||||
PFLAG_NS_COUNT = 0x400, /* carries NS ref count */
|
||||
|
||||
/* These flags must correspond with PATH_flags */
|
||||
PFLAG_MEDIATE_DELETED = 0x10000, /* mediate instead delegate deleted */
|
||||
};
|
||||
|
||||
struct aa_profile;
|
||||
|
||||
/* struct aa_policydb - match engine for a policy
|
||||
* dfa: dfa pattern match
|
||||
|
@ -94,11 +80,6 @@ struct aa_policydb {
|
|||
|
||||
};
|
||||
|
||||
struct aa_proxy {
|
||||
struct kref count;
|
||||
struct aa_profile __rcu *profile;
|
||||
};
|
||||
|
||||
/* struct aa_data - generic data structure
|
||||
* key: name for retrieving this data
|
||||
* size: size of data in bytes
|
||||
|
@ -115,19 +96,17 @@ struct aa_data {
|
|||
|
||||
/* struct aa_profile - basic confinement data
|
||||
* @base - base components of the profile (name, refcount, lists, lock ...)
|
||||
* @count: reference count of the obj
|
||||
* @rcu: rcu head used when removing from @list
|
||||
* @label - label this profile is an extension of
|
||||
* @parent: parent of profile
|
||||
* @ns: namespace the profile is in
|
||||
* @proxy: is set to the profile that replaced this profile
|
||||
* @rename: optional profile name that this profile renamed
|
||||
* @attach: human readable attachment string
|
||||
* @xmatch: optional extended matching for unconfined executables names
|
||||
* @xmatch_len: xmatch prefix len, used to determine xmatch priority
|
||||
* @audit: the auditing mode of the profile
|
||||
* @mode: the enforcement mode of the profile
|
||||
* @flags: flags controlling profile behavior
|
||||
* @path_flags: flags controlling path generation behavior
|
||||
* @disconnected: what to prepend if attach_disconnected is specified
|
||||
* @size: the memory consumed by this profiles rules
|
||||
* @policy: general match rules governing policy
|
||||
* @file: The set of rules governing basic file access and domain transitions
|
||||
|
@ -143,8 +122,6 @@ struct aa_data {
|
|||
* used to determine profile attachment against unconfined tasks. All other
|
||||
* attachments are determined by profile X transition rules.
|
||||
*
|
||||
* The @proxy struct is write protected by the profile lock.
|
||||
*
|
||||
* Profiles have a hierarchy where hats and children profiles keep
|
||||
* a reference to their parent.
|
||||
*
|
||||
|
@ -154,12 +131,9 @@ struct aa_data {
|
|||
*/
|
||||
struct aa_profile {
|
||||
struct aa_policy base;
|
||||
struct kref count;
|
||||
struct rcu_head rcu;
|
||||
struct aa_profile __rcu *parent;
|
||||
|
||||
struct aa_ns *ns;
|
||||
struct aa_proxy *proxy;
|
||||
const char *rename;
|
||||
|
||||
const char *attach;
|
||||
|
@ -167,8 +141,8 @@ struct aa_profile {
|
|||
int xmatch_len;
|
||||
enum audit_mode audit;
|
||||
long mode;
|
||||
long flags;
|
||||
u32 path_flags;
|
||||
const char *disconnected;
|
||||
int size;
|
||||
|
||||
struct aa_policydb policy;
|
||||
|
@ -181,17 +155,24 @@ struct aa_profile {
|
|||
char *dirname;
|
||||
struct dentry *dents[AAFS_PROF_SIZEOF];
|
||||
struct rhashtable *data;
|
||||
struct aa_label label;
|
||||
};
|
||||
|
||||
extern enum profile_mode aa_g_profile_mode;
|
||||
|
||||
void __aa_update_proxy(struct aa_profile *orig, struct aa_profile *new);
|
||||
#define AA_MAY_LOAD_POLICY AA_MAY_APPEND
|
||||
#define AA_MAY_REPLACE_POLICY AA_MAY_WRITE
|
||||
#define AA_MAY_REMOVE_POLICY AA_MAY_DELETE
|
||||
|
||||
#define profiles_ns(P) ((P)->ns)
|
||||
#define name_is_shared(A, B) ((A)->hname && (A)->hname == (B)->hname)
|
||||
|
||||
void aa_add_profile(struct aa_policy *common, struct aa_profile *profile);
|
||||
|
||||
|
||||
void aa_free_proxy_kref(struct kref *kref);
|
||||
struct aa_profile *aa_alloc_profile(const char *name, gfp_t gfp);
|
||||
struct aa_profile *aa_alloc_profile(const char *name, struct aa_proxy *proxy,
|
||||
gfp_t gfp);
|
||||
struct aa_profile *aa_new_null_profile(struct aa_profile *parent, bool hat,
|
||||
const char *base, gfp_t gfp);
|
||||
void aa_free_profile(struct aa_profile *profile);
|
||||
|
@ -200,21 +181,44 @@ struct aa_profile *aa_find_child(struct aa_profile *parent, const char *name);
|
|||
struct aa_profile *aa_lookupn_profile(struct aa_ns *ns, const char *hname,
|
||||
size_t n);
|
||||
struct aa_profile *aa_lookup_profile(struct aa_ns *ns, const char *name);
|
||||
struct aa_profile *aa_fqlookupn_profile(struct aa_profile *base,
|
||||
struct aa_profile *aa_fqlookupn_profile(struct aa_label *base,
|
||||
const char *fqname, size_t n);
|
||||
struct aa_profile *aa_match_profile(struct aa_ns *ns, const char *name);
|
||||
|
||||
ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
||||
bool noreplace, struct aa_loaddata *udata);
|
||||
ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_profile *profile,
|
||||
char *name, size_t size);
|
||||
ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_label *label,
|
||||
u32 mask, struct aa_loaddata *udata);
|
||||
ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_label *label,
|
||||
char *name, size_t size);
|
||||
void __aa_profile_list_release(struct list_head *head);
|
||||
|
||||
#define PROF_ADD 1
|
||||
#define PROF_REPLACE 0
|
||||
|
||||
#define unconfined(X) ((X)->mode == APPARMOR_UNCONFINED)
|
||||
#define profile_unconfined(X) ((X)->mode == APPARMOR_UNCONFINED)
|
||||
|
||||
/**
|
||||
* aa_get_newest_profile - simple wrapper fn to wrap the label version
|
||||
* @p: profile (NOT NULL)
|
||||
*
|
||||
* Returns refcount to newest version of the profile (maybe @p)
|
||||
*
|
||||
* Requires: @p must be held with a valid refcount
|
||||
*/
|
||||
static inline struct aa_profile *aa_get_newest_profile(struct aa_profile *p)
|
||||
{
|
||||
return labels_profile(aa_get_newest_label(&p->label));
|
||||
}
|
||||
|
||||
#define PROFILE_MEDIATES(P, T) ((P)->policy.start[(T)])
|
||||
/* safe version of POLICY_MEDIATES for full range input */
|
||||
static inline unsigned int PROFILE_MEDIATES_SAFE(struct aa_profile *profile,
|
||||
unsigned char class)
|
||||
{
|
||||
if (profile->policy.dfa)
|
||||
return aa_dfa_match_len(profile->policy.dfa,
|
||||
profile->policy.start[0], &class, 1);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_get_profile - increment refcount on profile @p
|
||||
|
@ -226,7 +230,7 @@ void __aa_profile_list_release(struct list_head *head);
|
|||
static inline struct aa_profile *aa_get_profile(struct aa_profile *p)
|
||||
{
|
||||
if (p)
|
||||
kref_get(&(p->count));
|
||||
kref_get(&(p->label.count));
|
||||
|
||||
return p;
|
||||
}
|
||||
|
@ -240,7 +244,7 @@ static inline struct aa_profile *aa_get_profile(struct aa_profile *p)
|
|||
*/
|
||||
static inline struct aa_profile *aa_get_profile_not0(struct aa_profile *p)
|
||||
{
|
||||
if (p && kref_get_unless_zero(&p->count))
|
||||
if (p && kref_get_unless_zero(&p->label.count))
|
||||
return p;
|
||||
|
||||
return NULL;
|
||||
|
@ -260,31 +264,12 @@ static inline struct aa_profile *aa_get_profile_rcu(struct aa_profile __rcu **p)
|
|||
rcu_read_lock();
|
||||
do {
|
||||
c = rcu_dereference(*p);
|
||||
} while (c && !kref_get_unless_zero(&c->count));
|
||||
} while (c && !kref_get_unless_zero(&c->label.count));
|
||||
rcu_read_unlock();
|
||||
|
||||
return c;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_get_newest_profile - find the newest version of @profile
|
||||
* @profile: the profile to check for newer versions of
|
||||
*
|
||||
* Returns: refcounted newest version of @profile taking into account
|
||||
* replacement, renames and removals
|
||||
* return @profile.
|
||||
*/
|
||||
static inline struct aa_profile *aa_get_newest_profile(struct aa_profile *p)
|
||||
{
|
||||
if (!p)
|
||||
return NULL;
|
||||
|
||||
if (profile_is_stale(p))
|
||||
return aa_get_profile_rcu(&p->proxy->profile);
|
||||
|
||||
return aa_get_profile(p);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_put_profile - decrement refcount on profile @p
|
||||
* @p: profile (MAYBE NULL)
|
||||
|
@ -292,21 +277,7 @@ static inline struct aa_profile *aa_get_newest_profile(struct aa_profile *p)
|
|||
static inline void aa_put_profile(struct aa_profile *p)
|
||||
{
|
||||
if (p)
|
||||
kref_put(&p->count, aa_free_profile_kref);
|
||||
}
|
||||
|
||||
static inline struct aa_proxy *aa_get_proxy(struct aa_proxy *p)
|
||||
{
|
||||
if (p)
|
||||
kref_get(&(p->count));
|
||||
|
||||
return p;
|
||||
}
|
||||
|
||||
static inline void aa_put_proxy(struct aa_proxy *p)
|
||||
{
|
||||
if (p)
|
||||
kref_put(&p->count, aa_free_proxy_kref);
|
||||
kref_put(&p->label.count, aa_label_kref);
|
||||
}
|
||||
|
||||
static inline int AUDIT_MODE(struct aa_profile *profile)
|
||||
|
@ -319,7 +290,7 @@ static inline int AUDIT_MODE(struct aa_profile *profile)
|
|||
|
||||
bool policy_view_capable(struct aa_ns *ns);
|
||||
bool policy_admin_capable(struct aa_ns *ns);
|
||||
int aa_may_manage_policy(struct aa_profile *profile, struct aa_ns *ns,
|
||||
const char *op);
|
||||
int aa_may_manage_policy(struct aa_label *label, struct aa_ns *ns,
|
||||
u32 mask);
|
||||
|
||||
#endif /* __AA_POLICY_H */
|
||||
|
|
|
@ -19,6 +19,7 @@
|
|||
|
||||
#include "apparmor.h"
|
||||
#include "apparmorfs.h"
|
||||
#include "label.h"
|
||||
#include "policy.h"
|
||||
|
||||
|
||||
|
@ -68,6 +69,11 @@ struct aa_ns {
|
|||
atomic_t uniq_null;
|
||||
long uniq_id;
|
||||
int level;
|
||||
long revision;
|
||||
wait_queue_head_t wait;
|
||||
|
||||
struct aa_labelset labels;
|
||||
struct list_head rawdata_list;
|
||||
|
||||
struct dentry *dents[AAFS_NS_SIZEOF];
|
||||
};
|
||||
|
@ -76,6 +82,8 @@ extern struct aa_ns *root_ns;
|
|||
|
||||
extern const char *aa_hidden_ns_name;
|
||||
|
||||
#define ns_unconfined(NS) (&(NS)->unconfined->label)
|
||||
|
||||
bool aa_ns_visible(struct aa_ns *curr, struct aa_ns *view, bool subns);
|
||||
const char *aa_ns_name(struct aa_ns *parent, struct aa_ns *child, bool subns);
|
||||
void aa_free_ns(struct aa_ns *ns);
|
||||
|
@ -85,6 +93,8 @@ void aa_free_ns_kref(struct kref *kref);
|
|||
|
||||
struct aa_ns *aa_find_ns(struct aa_ns *root, const char *name);
|
||||
struct aa_ns *aa_findn_ns(struct aa_ns *root, const char *name, size_t n);
|
||||
struct aa_ns *__aa_lookupn_ns(struct aa_ns *view, const char *hname, size_t n);
|
||||
struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n);
|
||||
struct aa_ns *__aa_find_or_create_ns(struct aa_ns *parent, const char *name,
|
||||
struct dentry *dir);
|
||||
struct aa_ns *aa_prepare_ns(struct aa_ns *root, const char *name);
|
||||
|
@ -144,4 +154,15 @@ static inline struct aa_ns *__aa_find_ns(struct list_head *head,
|
|||
return __aa_findn_ns(head, name, strlen(name));
|
||||
}
|
||||
|
||||
static inline struct aa_ns *__aa_lookup_ns(struct aa_ns *base,
|
||||
const char *hname)
|
||||
{
|
||||
return __aa_lookupn_ns(base, hname, strlen(hname));
|
||||
}
|
||||
|
||||
static inline struct aa_ns *aa_lookup_ns(struct aa_ns *view, const char *name)
|
||||
{
|
||||
return aa_lookupn_ns(view, name, strlen(name));
|
||||
}
|
||||
|
||||
#endif /* AA_NAMESPACE_H */
|
||||
|
|
|
@ -17,6 +17,8 @@
|
|||
|
||||
#include <linux/list.h>
|
||||
#include <linux/kref.h>
|
||||
#include <linux/dcache.h>
|
||||
#include <linux/workqueue.h>
|
||||
|
||||
struct aa_load_ent {
|
||||
struct list_head list;
|
||||
|
@ -36,26 +38,84 @@ struct aa_load_ent *aa_load_ent_alloc(void);
|
|||
#define PACKED_MODE_KILL 2
|
||||
#define PACKED_MODE_UNCONFINED 3
|
||||
|
||||
/* struct aa_loaddata - buffer of policy load data set */
|
||||
struct aa_ns;
|
||||
|
||||
enum {
|
||||
AAFS_LOADDATA_ABI = 0,
|
||||
AAFS_LOADDATA_REVISION,
|
||||
AAFS_LOADDATA_HASH,
|
||||
AAFS_LOADDATA_DATA,
|
||||
AAFS_LOADDATA_DIR, /* must be last actual entry */
|
||||
AAFS_LOADDATA_NDENTS /* count of entries */
|
||||
};
|
||||
|
||||
/*
|
||||
* struct aa_loaddata - buffer of policy raw_data set
|
||||
*
|
||||
* there is no loaddata ref for being on ns list, nor a ref from
|
||||
* d_inode(@dentry) when grab a ref from these, @ns->lock must be held
|
||||
* && __aa_get_loaddata() needs to be used, and the return value
|
||||
* checked, if NULL the loaddata is already being reaped and should be
|
||||
* considered dead.
|
||||
*/
|
||||
struct aa_loaddata {
|
||||
struct kref count;
|
||||
struct list_head list;
|
||||
struct work_struct work;
|
||||
struct dentry *dents[AAFS_LOADDATA_NDENTS];
|
||||
struct aa_ns *ns;
|
||||
char *name;
|
||||
size_t size;
|
||||
long revision; /* the ns policy revision this caused */
|
||||
int abi;
|
||||
unsigned char *hash;
|
||||
|
||||
char data[];
|
||||
};
|
||||
|
||||
int aa_unpack(struct aa_loaddata *udata, struct list_head *lh, const char **ns);
|
||||
|
||||
/**
|
||||
* __aa_get_loaddata - get a reference count to uncounted data reference
|
||||
* @data: reference to get a count on
|
||||
*
|
||||
* Returns: pointer to reference OR NULL if race is lost and reference is
|
||||
* being repeated.
|
||||
* Requires: @data->ns->lock held, and the return code MUST be checked
|
||||
*
|
||||
* Use only from inode->i_private and @data->list found references
|
||||
*/
|
||||
static inline struct aa_loaddata *
|
||||
__aa_get_loaddata(struct aa_loaddata *data)
|
||||
{
|
||||
if (data && kref_get_unless_zero(&(data->count)))
|
||||
return data;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_get_loaddata - get a reference count from a counted data reference
|
||||
* @data: reference to get a count on
|
||||
*
|
||||
* Returns: point to reference
|
||||
* Requires: @data to have a valid reference count on it. It is a bug
|
||||
* if the race to reap can be encountered when it is used.
|
||||
*/
|
||||
static inline struct aa_loaddata *
|
||||
aa_get_loaddata(struct aa_loaddata *data)
|
||||
{
|
||||
if (data)
|
||||
kref_get(&(data->count));
|
||||
return data;
|
||||
struct aa_loaddata *tmp = __aa_get_loaddata(data);
|
||||
|
||||
AA_BUG(data && !tmp);
|
||||
|
||||
return tmp;
|
||||
}
|
||||
|
||||
void __aa_loaddata_update(struct aa_loaddata *data, long revision);
|
||||
bool aa_rawdata_eq(struct aa_loaddata *l, struct aa_loaddata *r);
|
||||
void aa_loaddata_kref(struct kref *kref);
|
||||
struct aa_loaddata *aa_loaddata_alloc(size_t size);
|
||||
static inline void aa_put_loaddata(struct aa_loaddata *data)
|
||||
{
|
||||
if (data)
|
||||
|
|
|
@ -15,11 +15,7 @@
|
|||
#ifndef __AA_PROCATTR_H
|
||||
#define __AA_PROCATTR_H
|
||||
|
||||
#define AA_DO_TEST 1
|
||||
#define AA_ONEXEC 1
|
||||
|
||||
int aa_getprocattr(struct aa_profile *profile, char **string);
|
||||
int aa_setprocattr_changehat(char *args, size_t size, int test);
|
||||
int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test);
|
||||
int aa_getprocattr(struct aa_label *label, char **string);
|
||||
int aa_setprocattr_changehat(char *args, size_t size, int flags);
|
||||
|
||||
#endif /* __AA_PROCATTR_H */
|
||||
|
|
|
@ -34,13 +34,13 @@ struct aa_rlimit {
|
|||
struct rlimit limits[RLIM_NLIMITS];
|
||||
};
|
||||
|
||||
extern struct aa_fs_entry aa_fs_entry_rlimit[];
|
||||
extern struct aa_sfs_entry aa_sfs_entry_rlimit[];
|
||||
|
||||
int aa_map_resource(int resource);
|
||||
int aa_task_setrlimit(struct aa_profile *profile, struct task_struct *,
|
||||
int aa_task_setrlimit(struct aa_label *label, struct task_struct *task,
|
||||
unsigned int resource, struct rlimit *new_rlim);
|
||||
|
||||
void __aa_transition_rlimits(struct aa_profile *old, struct aa_profile *new);
|
||||
void __aa_transition_rlimits(struct aa_label *old, struct aa_label *new);
|
||||
|
||||
static inline void aa_free_rlimit_rules(struct aa_rlimit *rlims)
|
||||
{
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
* This file contains AppArmor ipc mediation
|
||||
*
|
||||
* Copyright (C) 1998-2008 Novell/SUSE
|
||||
* Copyright 2009-2010 Canonical Ltd.
|
||||
* Copyright 2009-2017 Canonical Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
|
@ -21,87 +21,103 @@
|
|||
#include "include/policy.h"
|
||||
#include "include/ipc.h"
|
||||
|
||||
/* call back to audit ptrace fields */
|
||||
static void audit_cb(struct audit_buffer *ab, void *va)
|
||||
/**
|
||||
* audit_ptrace_mask - convert mask to permission string
|
||||
* @buffer: buffer to write string to (NOT NULL)
|
||||
* @mask: permission mask to convert
|
||||
*/
|
||||
static void audit_ptrace_mask(struct audit_buffer *ab, u32 mask)
|
||||
{
|
||||
struct common_audit_data *sa = va;
|
||||
audit_log_format(ab, " peer=");
|
||||
audit_log_untrustedstring(ab, aad(sa)->peer->base.hname);
|
||||
switch (mask) {
|
||||
case MAY_READ:
|
||||
audit_log_string(ab, "read");
|
||||
break;
|
||||
case MAY_WRITE:
|
||||
audit_log_string(ab, "trace");
|
||||
break;
|
||||
case AA_MAY_BE_READ:
|
||||
audit_log_string(ab, "readby");
|
||||
break;
|
||||
case AA_MAY_BE_TRACED:
|
||||
audit_log_string(ab, "tracedby");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_audit_ptrace - do auditing for ptrace
|
||||
* @profile: profile being enforced (NOT NULL)
|
||||
* @target: profile being traced (NOT NULL)
|
||||
* @error: error condition
|
||||
*
|
||||
* Returns: %0 or error code
|
||||
*/
|
||||
static int aa_audit_ptrace(struct aa_profile *profile,
|
||||
struct aa_profile *target, int error)
|
||||
/* call back to audit ptrace fields */
|
||||
static void audit_ptrace_cb(struct audit_buffer *ab, void *va)
|
||||
{
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_PTRACE);
|
||||
struct common_audit_data *sa = va;
|
||||
|
||||
aad(&sa)->peer = target;
|
||||
aad(&sa)->error = error;
|
||||
if (aad(sa)->request & AA_PTRACE_PERM_MASK) {
|
||||
audit_log_format(ab, " requested_mask=");
|
||||
audit_ptrace_mask(ab, aad(sa)->request);
|
||||
|
||||
return aa_audit(AUDIT_APPARMOR_AUTO, profile, &sa, audit_cb);
|
||||
if (aad(sa)->denied & AA_PTRACE_PERM_MASK) {
|
||||
audit_log_format(ab, " denied_mask=");
|
||||
audit_ptrace_mask(ab, aad(sa)->denied);
|
||||
}
|
||||
}
|
||||
audit_log_format(ab, " peer=");
|
||||
aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
|
||||
FLAGS_NONE, GFP_ATOMIC);
|
||||
}
|
||||
|
||||
/* TODO: conditionals */
|
||||
static int profile_ptrace_perm(struct aa_profile *profile,
|
||||
struct aa_profile *peer, u32 request,
|
||||
struct common_audit_data *sa)
|
||||
{
|
||||
struct aa_perms perms = { };
|
||||
|
||||
/* need because of peer in cross check */
|
||||
if (profile_unconfined(profile) ||
|
||||
!PROFILE_MEDIATES(profile, AA_CLASS_PTRACE))
|
||||
return 0;
|
||||
|
||||
aad(sa)->peer = &peer->label;
|
||||
aa_profile_match_label(profile, &peer->label, AA_CLASS_PTRACE, request,
|
||||
&perms);
|
||||
aa_apply_modes_to_perms(profile, &perms);
|
||||
return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb);
|
||||
}
|
||||
|
||||
static int cross_ptrace_perm(struct aa_profile *tracer,
|
||||
struct aa_profile *tracee, u32 request,
|
||||
struct common_audit_data *sa)
|
||||
{
|
||||
if (PROFILE_MEDIATES(tracer, AA_CLASS_PTRACE))
|
||||
return xcheck(profile_ptrace_perm(tracer, tracee, request, sa),
|
||||
profile_ptrace_perm(tracee, tracer,
|
||||
request << PTRACE_PERM_SHIFT,
|
||||
sa));
|
||||
/* policy uses the old style capability check for ptrace */
|
||||
if (profile_unconfined(tracer) || tracer == tracee)
|
||||
return 0;
|
||||
|
||||
aad(sa)->label = &tracer->label;
|
||||
aad(sa)->peer = &tracee->label;
|
||||
aad(sa)->request = 0;
|
||||
aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, 1);
|
||||
|
||||
return aa_audit(AUDIT_APPARMOR_AUTO, tracer, sa, audit_ptrace_cb);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_may_ptrace - test if tracer task can trace the tracee
|
||||
* @tracer: profile of the task doing the tracing (NOT NULL)
|
||||
* @tracee: task to be traced
|
||||
* @mode: whether PTRACE_MODE_READ || PTRACE_MODE_ATTACH
|
||||
* @tracer: label of the task doing the tracing (NOT NULL)
|
||||
* @tracee: task label to be traced
|
||||
* @request: permission request
|
||||
*
|
||||
* Returns: %0 else error code if permission denied or error
|
||||
*/
|
||||
int aa_may_ptrace(struct aa_profile *tracer, struct aa_profile *tracee,
|
||||
unsigned int mode)
|
||||
int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
|
||||
u32 request)
|
||||
{
|
||||
/* TODO: currently only based on capability, not extended ptrace
|
||||
* rules,
|
||||
* Test mode for PTRACE_MODE_READ || PTRACE_MODE_ATTACH
|
||||
*/
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_PTRACE);
|
||||
|
||||
if (unconfined(tracer) || tracer == tracee)
|
||||
return 0;
|
||||
/* log this capability request */
|
||||
return aa_capable(tracer, CAP_SYS_PTRACE, 1);
|
||||
return xcheck_labels_profiles(tracer, tracee, cross_ptrace_perm,
|
||||
request, &sa);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_ptrace - do ptrace permission check and auditing
|
||||
* @tracer: task doing the tracing (NOT NULL)
|
||||
* @tracee: task being traced (NOT NULL)
|
||||
* @mode: ptrace mode either PTRACE_MODE_READ || PTRACE_MODE_ATTACH
|
||||
*
|
||||
* Returns: %0 else error code if permission denied or error
|
||||
*/
|
||||
int aa_ptrace(struct task_struct *tracer, struct task_struct *tracee,
|
||||
unsigned int mode)
|
||||
{
|
||||
/*
|
||||
* tracer can ptrace tracee when
|
||||
* - tracer is unconfined ||
|
||||
* - tracer is in complain mode
|
||||
* - tracer has rules allowing it to trace tracee currently this is:
|
||||
* - confined by the same profile ||
|
||||
* - tracer profile has CAP_SYS_PTRACE
|
||||
*/
|
||||
|
||||
struct aa_profile *tracer_p = aa_get_task_profile(tracer);
|
||||
int error = 0;
|
||||
|
||||
if (!unconfined(tracer_p)) {
|
||||
struct aa_profile *tracee_p = aa_get_task_profile(tracee);
|
||||
|
||||
error = aa_may_ptrace(tracer_p, tracee_p, mode);
|
||||
error = aa_audit_ptrace(tracer_p, tracee_p, error);
|
||||
|
||||
aa_put_profile(tracee_p);
|
||||
}
|
||||
aa_put_profile(tracer_p);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
|
2120
security/apparmor/label.c
Normal file
2120
security/apparmor/label.c
Normal file
File diff suppressed because it is too large
Load diff
|
@ -21,8 +21,14 @@
|
|||
#include "include/audit.h"
|
||||
#include "include/apparmor.h"
|
||||
#include "include/lib.h"
|
||||
#include "include/perms.h"
|
||||
#include "include/policy.h"
|
||||
|
||||
struct aa_perms nullperms;
|
||||
struct aa_perms allperms = { .allow = ALL_PERMS_MASK,
|
||||
.quiet = ALL_PERMS_MASK,
|
||||
.hide = ALL_PERMS_MASK };
|
||||
|
||||
/**
|
||||
* aa_split_fqname - split a fqname into a profile and namespace name
|
||||
* @fqname: a full qualified name in namespace profile format (NOT NULL)
|
||||
|
@ -69,7 +75,7 @@ char *aa_split_fqname(char *fqname, char **ns_name)
|
|||
* if all whitespace will return NULL
|
||||
*/
|
||||
|
||||
static const char *skipn_spaces(const char *str, size_t n)
|
||||
const char *skipn_spaces(const char *str, size_t n)
|
||||
{
|
||||
for (; n && isspace(*str); --n)
|
||||
++str;
|
||||
|
@ -128,11 +134,350 @@ void aa_info_message(const char *str)
|
|||
printk(KERN_INFO "AppArmor: %s\n", str);
|
||||
}
|
||||
|
||||
__counted char *aa_str_alloc(int size, gfp_t gfp)
|
||||
{
|
||||
struct counted_str *str;
|
||||
|
||||
str = kmalloc(sizeof(struct counted_str) + size, gfp);
|
||||
if (!str)
|
||||
return NULL;
|
||||
|
||||
kref_init(&str->count);
|
||||
return str->name;
|
||||
}
|
||||
|
||||
void aa_str_kref(struct kref *kref)
|
||||
{
|
||||
kfree(container_of(kref, struct counted_str, count));
|
||||
}
|
||||
|
||||
|
||||
const char aa_file_perm_chrs[] = "xwracd km l ";
|
||||
const char *aa_file_perm_names[] = {
|
||||
"exec",
|
||||
"write",
|
||||
"read",
|
||||
"append",
|
||||
|
||||
"create",
|
||||
"delete",
|
||||
"open",
|
||||
"rename",
|
||||
|
||||
"setattr",
|
||||
"getattr",
|
||||
"setcred",
|
||||
"getcred",
|
||||
|
||||
"chmod",
|
||||
"chown",
|
||||
"chgrp",
|
||||
"lock",
|
||||
|
||||
"mmap",
|
||||
"mprot",
|
||||
"link",
|
||||
"snapshot",
|
||||
|
||||
"unknown",
|
||||
"unknown",
|
||||
"unknown",
|
||||
"unknown",
|
||||
|
||||
"unknown",
|
||||
"unknown",
|
||||
"unknown",
|
||||
"unknown",
|
||||
|
||||
"stack",
|
||||
"change_onexec",
|
||||
"change_profile",
|
||||
"change_hat",
|
||||
};
|
||||
|
||||
/**
|
||||
* aa_perm_mask_to_str - convert a perm mask to its short string
|
||||
* @str: character buffer to store string in (at least 10 characters)
|
||||
* @mask: permission mask to convert
|
||||
*/
|
||||
void aa_perm_mask_to_str(char *str, const char *chrs, u32 mask)
|
||||
{
|
||||
unsigned int i, perm = 1;
|
||||
|
||||
for (i = 0; i < 32; perm <<= 1, i++) {
|
||||
if (mask & perm)
|
||||
*str++ = chrs[i];
|
||||
}
|
||||
*str = '\0';
|
||||
}
|
||||
|
||||
void aa_audit_perm_names(struct audit_buffer *ab, const char **names, u32 mask)
|
||||
{
|
||||
const char *fmt = "%s";
|
||||
unsigned int i, perm = 1;
|
||||
bool prev = false;
|
||||
|
||||
for (i = 0; i < 32; perm <<= 1, i++) {
|
||||
if (mask & perm) {
|
||||
audit_log_format(ab, fmt, names[i]);
|
||||
if (!prev) {
|
||||
prev = true;
|
||||
fmt = " %s";
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs,
|
||||
u32 chrsmask, const char **names, u32 namesmask)
|
||||
{
|
||||
char str[33];
|
||||
|
||||
audit_log_format(ab, "\"");
|
||||
if ((mask & chrsmask) && chrs) {
|
||||
aa_perm_mask_to_str(str, chrs, mask & chrsmask);
|
||||
mask &= ~chrsmask;
|
||||
audit_log_format(ab, "%s", str);
|
||||
if (mask & namesmask)
|
||||
audit_log_format(ab, " ");
|
||||
}
|
||||
if ((mask & namesmask) && names)
|
||||
aa_audit_perm_names(ab, names, mask & namesmask);
|
||||
audit_log_format(ab, "\"");
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_audit_perms_cb - generic callback fn for auditing perms
|
||||
* @ab: audit buffer (NOT NULL)
|
||||
* @va: audit struct to audit values of (NOT NULL)
|
||||
*/
|
||||
static void aa_audit_perms_cb(struct audit_buffer *ab, void *va)
|
||||
{
|
||||
struct common_audit_data *sa = va;
|
||||
|
||||
if (aad(sa)->request) {
|
||||
audit_log_format(ab, " requested_mask=");
|
||||
aa_audit_perm_mask(ab, aad(sa)->request, aa_file_perm_chrs,
|
||||
PERMS_CHRS_MASK, aa_file_perm_names,
|
||||
PERMS_NAMES_MASK);
|
||||
}
|
||||
if (aad(sa)->denied) {
|
||||
audit_log_format(ab, "denied_mask=");
|
||||
aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs,
|
||||
PERMS_CHRS_MASK, aa_file_perm_names,
|
||||
PERMS_NAMES_MASK);
|
||||
}
|
||||
audit_log_format(ab, " peer=");
|
||||
aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
|
||||
FLAGS_NONE, GFP_ATOMIC);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_apply_modes_to_perms - apply namespace and profile flags to perms
|
||||
* @profile: that perms where computed from
|
||||
* @perms: perms to apply mode modifiers to
|
||||
*
|
||||
* TODO: split into profile and ns based flags for when accumulating perms
|
||||
*/
|
||||
void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms)
|
||||
{
|
||||
switch (AUDIT_MODE(profile)) {
|
||||
case AUDIT_ALL:
|
||||
perms->audit = ALL_PERMS_MASK;
|
||||
/* fall through */
|
||||
case AUDIT_NOQUIET:
|
||||
perms->quiet = 0;
|
||||
break;
|
||||
case AUDIT_QUIET:
|
||||
perms->audit = 0;
|
||||
/* fall through */
|
||||
case AUDIT_QUIET_DENIED:
|
||||
perms->quiet = ALL_PERMS_MASK;
|
||||
break;
|
||||
}
|
||||
|
||||
if (KILL_MODE(profile))
|
||||
perms->kill = ALL_PERMS_MASK;
|
||||
else if (COMPLAIN_MODE(profile))
|
||||
perms->complain = ALL_PERMS_MASK;
|
||||
/*
|
||||
* TODO:
|
||||
* else if (PROMPT_MODE(profile))
|
||||
* perms->prompt = ALL_PERMS_MASK;
|
||||
*/
|
||||
}
|
||||
|
||||
static u32 map_other(u32 x)
|
||||
{
|
||||
return ((x & 0x3) << 8) | /* SETATTR/GETATTR */
|
||||
((x & 0x1c) << 18) | /* ACCEPT/BIND/LISTEN */
|
||||
((x & 0x60) << 19); /* SETOPT/GETOPT */
|
||||
}
|
||||
|
||||
void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
|
||||
struct aa_perms *perms)
|
||||
{
|
||||
perms->deny = 0;
|
||||
perms->kill = perms->stop = 0;
|
||||
perms->complain = perms->cond = 0;
|
||||
perms->hide = 0;
|
||||
perms->prompt = 0;
|
||||
perms->allow = dfa_user_allow(dfa, state);
|
||||
perms->audit = dfa_user_audit(dfa, state);
|
||||
perms->quiet = dfa_user_quiet(dfa, state);
|
||||
|
||||
/* for v5 perm mapping in the policydb, the other set is used
|
||||
* to extend the general perm set
|
||||
*/
|
||||
perms->allow |= map_other(dfa_other_allow(dfa, state));
|
||||
perms->audit |= map_other(dfa_other_audit(dfa, state));
|
||||
perms->quiet |= map_other(dfa_other_quiet(dfa, state));
|
||||
// perms->xindex = dfa_user_xindex(dfa, state);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_perms_accum_raw - accumulate perms with out masking off overlapping perms
|
||||
* @accum - perms struct to accumulate into
|
||||
* @addend - perms struct to add to @accum
|
||||
*/
|
||||
void aa_perms_accum_raw(struct aa_perms *accum, struct aa_perms *addend)
|
||||
{
|
||||
accum->deny |= addend->deny;
|
||||
accum->allow &= addend->allow & ~addend->deny;
|
||||
accum->audit |= addend->audit & addend->allow;
|
||||
accum->quiet &= addend->quiet & ~addend->allow;
|
||||
accum->kill |= addend->kill & ~addend->allow;
|
||||
accum->stop |= addend->stop & ~addend->allow;
|
||||
accum->complain |= addend->complain & ~addend->allow & ~addend->deny;
|
||||
accum->cond |= addend->cond & ~addend->allow & ~addend->deny;
|
||||
accum->hide &= addend->hide & ~addend->allow;
|
||||
accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_perms_accum - accumulate perms, masking off overlapping perms
|
||||
* @accum - perms struct to accumulate into
|
||||
* @addend - perms struct to add to @accum
|
||||
*/
|
||||
void aa_perms_accum(struct aa_perms *accum, struct aa_perms *addend)
|
||||
{
|
||||
accum->deny |= addend->deny;
|
||||
accum->allow &= addend->allow & ~accum->deny;
|
||||
accum->audit |= addend->audit & accum->allow;
|
||||
accum->quiet &= addend->quiet & ~accum->allow;
|
||||
accum->kill |= addend->kill & ~accum->allow;
|
||||
accum->stop |= addend->stop & ~accum->allow;
|
||||
accum->complain |= addend->complain & ~accum->allow & ~accum->deny;
|
||||
accum->cond |= addend->cond & ~accum->allow & ~accum->deny;
|
||||
accum->hide &= addend->hide & ~accum->allow;
|
||||
accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny;
|
||||
}
|
||||
|
||||
void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label,
|
||||
int type, u32 request, struct aa_perms *perms)
|
||||
{
|
||||
/* TODO: doesn't yet handle extended types */
|
||||
unsigned int state;
|
||||
|
||||
state = aa_dfa_next(profile->policy.dfa,
|
||||
profile->policy.start[AA_CLASS_LABEL],
|
||||
type);
|
||||
aa_label_match(profile, label, state, false, request, perms);
|
||||
}
|
||||
|
||||
|
||||
/* currently unused */
|
||||
int aa_profile_label_perm(struct aa_profile *profile, struct aa_profile *target,
|
||||
u32 request, int type, u32 *deny,
|
||||
struct common_audit_data *sa)
|
||||
{
|
||||
struct aa_perms perms;
|
||||
|
||||
aad(sa)->label = &profile->label;
|
||||
aad(sa)->peer = &target->label;
|
||||
aad(sa)->request = request;
|
||||
|
||||
aa_profile_match_label(profile, &target->label, type, request, &perms);
|
||||
aa_apply_modes_to_perms(profile, &perms);
|
||||
*deny |= request & perms.deny;
|
||||
return aa_check_perms(profile, &perms, request, sa, aa_audit_perms_cb);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_check_perms - do audit mode selection based on perms set
|
||||
* @profile: profile being checked
|
||||
* @perms: perms computed for the request
|
||||
* @request: requested perms
|
||||
* @deny: Returns: explicit deny set
|
||||
* @sa: initialized audit structure (MAY BE NULL if not auditing)
|
||||
* @cb: callback fn for tpye specific fields (MAY BE NULL)
|
||||
*
|
||||
* Returns: 0 if permission else error code
|
||||
*
|
||||
* Note: profile audit modes need to be set before calling by setting the
|
||||
* perm masks appropriately.
|
||||
*
|
||||
* If not auditing then complain mode is not enabled and the
|
||||
* error code will indicate whether there was an explicit deny
|
||||
* with a positive value.
|
||||
*/
|
||||
int aa_check_perms(struct aa_profile *profile, struct aa_perms *perms,
|
||||
u32 request, struct common_audit_data *sa,
|
||||
void (*cb)(struct audit_buffer *, void *))
|
||||
{
|
||||
int type, error;
|
||||
bool stop = false;
|
||||
u32 denied = request & (~perms->allow | perms->deny);
|
||||
|
||||
if (likely(!denied)) {
|
||||
/* mask off perms that are not being force audited */
|
||||
request &= perms->audit;
|
||||
if (!request || !sa)
|
||||
return 0;
|
||||
|
||||
type = AUDIT_APPARMOR_AUDIT;
|
||||
error = 0;
|
||||
} else {
|
||||
error = -EACCES;
|
||||
|
||||
if (denied & perms->kill)
|
||||
type = AUDIT_APPARMOR_KILL;
|
||||
else if (denied == (denied & perms->complain))
|
||||
type = AUDIT_APPARMOR_ALLOWED;
|
||||
else
|
||||
type = AUDIT_APPARMOR_DENIED;
|
||||
|
||||
if (denied & perms->stop)
|
||||
stop = true;
|
||||
if (denied == (denied & perms->hide))
|
||||
error = -ENOENT;
|
||||
|
||||
denied &= ~perms->quiet;
|
||||
if (!sa || !denied)
|
||||
return error;
|
||||
}
|
||||
|
||||
if (sa) {
|
||||
aad(sa)->label = &profile->label;
|
||||
aad(sa)->request = request;
|
||||
aad(sa)->denied = denied;
|
||||
aad(sa)->error = error;
|
||||
aa_audit_msg(type, sa, cb);
|
||||
}
|
||||
|
||||
if (type == AUDIT_APPARMOR_ALLOWED)
|
||||
error = 0;
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* aa_policy_init - initialize a policy structure
|
||||
* @policy: policy to initialize (NOT NULL)
|
||||
* @prefix: prefix name if any is required. (MAYBE NULL)
|
||||
* @name: name of the policy, init will make a copy of it (NOT NULL)
|
||||
* @gfp: allocation mode
|
||||
*
|
||||
* Note: this fn creates a copy of strings passed in
|
||||
*
|
||||
|
@ -141,16 +486,21 @@ void aa_info_message(const char *str)
|
|||
bool aa_policy_init(struct aa_policy *policy, const char *prefix,
|
||||
const char *name, gfp_t gfp)
|
||||
{
|
||||
char *hname;
|
||||
|
||||
/* freed by policy_free */
|
||||
if (prefix) {
|
||||
policy->hname = kmalloc(strlen(prefix) + strlen(name) + 3,
|
||||
gfp);
|
||||
if (policy->hname)
|
||||
sprintf((char *)policy->hname, "%s//%s", prefix, name);
|
||||
} else
|
||||
policy->hname = kstrdup(name, gfp);
|
||||
if (!policy->hname)
|
||||
hname = aa_str_alloc(strlen(prefix) + strlen(name) + 3, gfp);
|
||||
if (hname)
|
||||
sprintf(hname, "%s//%s", prefix, name);
|
||||
} else {
|
||||
hname = aa_str_alloc(strlen(name) + 1, gfp);
|
||||
if (hname)
|
||||
strcpy(hname, name);
|
||||
}
|
||||
if (!hname)
|
||||
return false;
|
||||
policy->hname = hname;
|
||||
/* base.name is a substring of fqname */
|
||||
policy->name = basename(policy->hname);
|
||||
INIT_LIST_HEAD(&policy->list);
|
||||
|
@ -169,5 +519,5 @@ void aa_policy_destroy(struct aa_policy *policy)
|
|||
AA_BUG(on_list_rcu(&policy->list));
|
||||
|
||||
/* don't free name as its a subset of hname */
|
||||
kzfree(policy->hname);
|
||||
aa_put_str(policy->hname);
|
||||
}
|
||||
|
|
|
@ -34,6 +34,7 @@
|
|||
#include "include/file.h"
|
||||
#include "include/ipc.h"
|
||||
#include "include/path.h"
|
||||
#include "include/label.h"
|
||||
#include "include/policy.h"
|
||||
#include "include/policy_ns.h"
|
||||
#include "include/procattr.h"
|
||||
|
@ -49,7 +50,7 @@ DEFINE_PER_CPU(struct aa_buffers, aa_buffers);
|
|||
*/
|
||||
|
||||
/*
|
||||
* free the associated aa_task_ctx and put its profiles
|
||||
* free the associated aa_task_ctx and put its labels
|
||||
*/
|
||||
static void apparmor_cred_free(struct cred *cred)
|
||||
{
|
||||
|
@ -103,34 +104,63 @@ static void apparmor_cred_transfer(struct cred *new, const struct cred *old)
|
|||
static int apparmor_ptrace_access_check(struct task_struct *child,
|
||||
unsigned int mode)
|
||||
{
|
||||
return aa_ptrace(current, child, mode);
|
||||
struct aa_label *tracer, *tracee;
|
||||
int error;
|
||||
|
||||
tracer = begin_current_label_crit_section();
|
||||
tracee = aa_get_task_label(child);
|
||||
error = aa_may_ptrace(tracer, tracee,
|
||||
mode == PTRACE_MODE_READ ? AA_PTRACE_READ : AA_PTRACE_TRACE);
|
||||
aa_put_label(tracee);
|
||||
end_current_label_crit_section(tracer);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int apparmor_ptrace_traceme(struct task_struct *parent)
|
||||
{
|
||||
return aa_ptrace(parent, current, PTRACE_MODE_ATTACH);
|
||||
struct aa_label *tracer, *tracee;
|
||||
int error;
|
||||
|
||||
tracee = begin_current_label_crit_section();
|
||||
tracer = aa_get_task_label(parent);
|
||||
error = aa_may_ptrace(tracer, tracee, AA_PTRACE_TRACE);
|
||||
aa_put_label(tracer);
|
||||
end_current_label_crit_section(tracee);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
/* Derived from security/commoncap.c:cap_capget */
|
||||
static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective,
|
||||
kernel_cap_t *inheritable, kernel_cap_t *permitted)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *label;
|
||||
const struct cred *cred;
|
||||
|
||||
rcu_read_lock();
|
||||
cred = __task_cred(target);
|
||||
profile = aa_cred_profile(cred);
|
||||
label = aa_get_newest_cred_label(cred);
|
||||
|
||||
/*
|
||||
* cap_capget is stacked ahead of this and will
|
||||
* initialize effective and permitted.
|
||||
*/
|
||||
if (!unconfined(profile) && !COMPLAIN_MODE(profile)) {
|
||||
*effective = cap_intersect(*effective, profile->caps.allow);
|
||||
*permitted = cap_intersect(*permitted, profile->caps.allow);
|
||||
if (!unconfined(label)) {
|
||||
struct aa_profile *profile;
|
||||
struct label_it i;
|
||||
|
||||
label_for_each_confined(i, label, profile) {
|
||||
if (COMPLAIN_MODE(profile))
|
||||
continue;
|
||||
*effective = cap_intersect(*effective,
|
||||
profile->caps.allow);
|
||||
*permitted = cap_intersect(*permitted,
|
||||
profile->caps.allow);
|
||||
}
|
||||
}
|
||||
rcu_read_unlock();
|
||||
aa_put_label(label);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -138,12 +168,14 @@ static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective,
|
|||
static int apparmor_capable(const struct cred *cred, struct user_namespace *ns,
|
||||
int cap, int audit)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
profile = aa_cred_profile(cred);
|
||||
if (!unconfined(profile))
|
||||
error = aa_capable(profile, cap, audit);
|
||||
label = aa_get_newest_cred_label(cred);
|
||||
if (!unconfined(label))
|
||||
error = aa_capable(label, cap, audit);
|
||||
aa_put_label(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
|
@ -159,12 +191,13 @@ static int apparmor_capable(const struct cred *cred, struct user_namespace *ns,
|
|||
static int common_perm(const char *op, const struct path *path, u32 mask,
|
||||
struct path_cond *cond)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
profile = __aa_current_profile();
|
||||
if (!unconfined(profile))
|
||||
error = aa_path_perm(op, profile, path, 0, mask, cond);
|
||||
label = __begin_current_label_crit_section();
|
||||
if (!unconfined(label))
|
||||
error = aa_path_perm(op, label, path, 0, mask, cond);
|
||||
__end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
@ -278,7 +311,7 @@ static int apparmor_path_mknod(const struct path *dir, struct dentry *dentry,
|
|||
|
||||
static int apparmor_path_truncate(const struct path *path)
|
||||
{
|
||||
return common_perm_cond(OP_TRUNC, path, MAY_WRITE | AA_MAY_META_WRITE);
|
||||
return common_perm_cond(OP_TRUNC, path, MAY_WRITE | AA_MAY_SETATTR);
|
||||
}
|
||||
|
||||
static int apparmor_path_symlink(const struct path *dir, struct dentry *dentry,
|
||||
|
@ -291,29 +324,31 @@ static int apparmor_path_symlink(const struct path *dir, struct dentry *dentry,
|
|||
static int apparmor_path_link(struct dentry *old_dentry, const struct path *new_dir,
|
||||
struct dentry *new_dentry)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
if (!path_mediated_fs(old_dentry))
|
||||
return 0;
|
||||
|
||||
profile = aa_current_profile();
|
||||
if (!unconfined(profile))
|
||||
error = aa_path_link(profile, old_dentry, new_dir, new_dentry);
|
||||
label = begin_current_label_crit_section();
|
||||
if (!unconfined(label))
|
||||
error = aa_path_link(label, old_dentry, new_dir, new_dentry);
|
||||
end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int apparmor_path_rename(const struct path *old_dir, struct dentry *old_dentry,
|
||||
const struct path *new_dir, struct dentry *new_dentry)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
if (!path_mediated_fs(old_dentry))
|
||||
return 0;
|
||||
|
||||
profile = aa_current_profile();
|
||||
if (!unconfined(profile)) {
|
||||
label = begin_current_label_crit_section();
|
||||
if (!unconfined(label)) {
|
||||
struct path old_path = { .mnt = old_dir->mnt,
|
||||
.dentry = old_dentry };
|
||||
struct path new_path = { .mnt = new_dir->mnt,
|
||||
|
@ -322,16 +357,18 @@ static int apparmor_path_rename(const struct path *old_dir, struct dentry *old_d
|
|||
d_backing_inode(old_dentry)->i_mode
|
||||
};
|
||||
|
||||
error = aa_path_perm(OP_RENAME_SRC, profile, &old_path, 0,
|
||||
MAY_READ | AA_MAY_META_READ | MAY_WRITE |
|
||||
AA_MAY_META_WRITE | AA_MAY_DELETE,
|
||||
error = aa_path_perm(OP_RENAME_SRC, label, &old_path, 0,
|
||||
MAY_READ | AA_MAY_GETATTR | MAY_WRITE |
|
||||
AA_MAY_SETATTR | AA_MAY_DELETE,
|
||||
&cond);
|
||||
if (!error)
|
||||
error = aa_path_perm(OP_RENAME_DEST, profile, &new_path,
|
||||
0, MAY_WRITE | AA_MAY_META_WRITE |
|
||||
error = aa_path_perm(OP_RENAME_DEST, label, &new_path,
|
||||
0, MAY_WRITE | AA_MAY_SETATTR |
|
||||
AA_MAY_CREATE, &cond);
|
||||
|
||||
}
|
||||
end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
|
@ -347,13 +384,13 @@ static int apparmor_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
|
|||
|
||||
static int apparmor_inode_getattr(const struct path *path)
|
||||
{
|
||||
return common_perm_cond(OP_GETATTR, path, AA_MAY_META_READ);
|
||||
return common_perm_cond(OP_GETATTR, path, AA_MAY_GETATTR);
|
||||
}
|
||||
|
||||
static int apparmor_file_open(struct file *file, const struct cred *cred)
|
||||
{
|
||||
struct aa_file_ctx *fctx = file->f_security;
|
||||
struct aa_profile *profile;
|
||||
struct aa_file_ctx *fctx = file_ctx(file);
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
if (!path_mediated_fs(file->f_path.dentry))
|
||||
|
@ -369,65 +406,61 @@ static int apparmor_file_open(struct file *file, const struct cred *cred)
|
|||
return 0;
|
||||
}
|
||||
|
||||
profile = aa_cred_profile(cred);
|
||||
if (!unconfined(profile)) {
|
||||
label = aa_get_newest_cred_label(cred);
|
||||
if (!unconfined(label)) {
|
||||
struct inode *inode = file_inode(file);
|
||||
struct path_cond cond = { inode->i_uid, inode->i_mode };
|
||||
|
||||
error = aa_path_perm(OP_OPEN, profile, &file->f_path, 0,
|
||||
error = aa_path_perm(OP_OPEN, label, &file->f_path, 0,
|
||||
aa_map_file_to_perms(file), &cond);
|
||||
/* todo cache full allowed permissions set and state */
|
||||
fctx->allow = aa_map_file_to_perms(file);
|
||||
}
|
||||
aa_put_label(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int apparmor_file_alloc_security(struct file *file)
|
||||
{
|
||||
/* freed by apparmor_file_free_security */
|
||||
file->f_security = aa_alloc_file_context(GFP_KERNEL);
|
||||
if (!file->f_security)
|
||||
return -ENOMEM;
|
||||
return 0;
|
||||
int error = 0;
|
||||
|
||||
/* freed by apparmor_file_free_security */
|
||||
struct aa_label *label = begin_current_label_crit_section();
|
||||
file->f_security = aa_alloc_file_ctx(label, GFP_KERNEL);
|
||||
if (!file_ctx(file))
|
||||
error = -ENOMEM;
|
||||
end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static void apparmor_file_free_security(struct file *file)
|
||||
{
|
||||
struct aa_file_ctx *ctx = file->f_security;
|
||||
|
||||
aa_free_file_context(ctx);
|
||||
aa_free_file_ctx(file_ctx(file));
|
||||
}
|
||||
|
||||
static int common_file_perm(const char *op, struct file *file, u32 mask)
|
||||
{
|
||||
struct aa_file_ctx *fctx = file->f_security;
|
||||
struct aa_profile *profile, *fprofile = aa_cred_profile(file->f_cred);
|
||||
struct aa_label *label;
|
||||
int error = 0;
|
||||
|
||||
AA_BUG(!fprofile);
|
||||
/* don't reaudit files closed during inheritance */
|
||||
if (file->f_path.dentry == aa_null.dentry)
|
||||
return -EACCES;
|
||||
|
||||
if (!file->f_path.mnt ||
|
||||
!path_mediated_fs(file->f_path.dentry))
|
||||
return 0;
|
||||
|
||||
profile = __aa_current_profile();
|
||||
|
||||
/* revalidate access, if task is unconfined, or the cached cred
|
||||
* doesn't match or if the request is for more permissions than
|
||||
* was granted.
|
||||
*
|
||||
* Note: the test for !unconfined(fprofile) is to handle file
|
||||
* delegation from unconfined tasks
|
||||
*/
|
||||
if (!unconfined(profile) && !unconfined(fprofile) &&
|
||||
((fprofile != profile) || (mask & ~fctx->allow)))
|
||||
error = aa_file_perm(op, profile, file, mask);
|
||||
label = __begin_current_label_crit_section();
|
||||
error = aa_file_perm(op, label, file, mask);
|
||||
__end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int apparmor_file_receive(struct file *file)
|
||||
{
|
||||
return common_file_perm(OP_FRECEIVE, file, aa_map_file_to_perms(file));
|
||||
}
|
||||
|
||||
static int apparmor_file_permission(struct file *file, int mask)
|
||||
{
|
||||
return common_file_perm(OP_FPERM, file, mask);
|
||||
|
@ -448,7 +481,7 @@ static int common_mmap(const char *op, struct file *file, unsigned long prot,
|
|||
{
|
||||
int mask = 0;
|
||||
|
||||
if (!file || !file->f_security)
|
||||
if (!file || !file_ctx(file))
|
||||
return 0;
|
||||
|
||||
if (prot & PROT_READ)
|
||||
|
@ -485,21 +518,21 @@ static int apparmor_getprocattr(struct task_struct *task, char *name,
|
|||
/* released below */
|
||||
const struct cred *cred = get_task_cred(task);
|
||||
struct aa_task_ctx *ctx = cred_ctx(cred);
|
||||
struct aa_profile *profile = NULL;
|
||||
struct aa_label *label = NULL;
|
||||
|
||||
if (strcmp(name, "current") == 0)
|
||||
profile = aa_get_newest_profile(ctx->profile);
|
||||
label = aa_get_newest_label(ctx->label);
|
||||
else if (strcmp(name, "prev") == 0 && ctx->previous)
|
||||
profile = aa_get_newest_profile(ctx->previous);
|
||||
label = aa_get_newest_label(ctx->previous);
|
||||
else if (strcmp(name, "exec") == 0 && ctx->onexec)
|
||||
profile = aa_get_newest_profile(ctx->onexec);
|
||||
label = aa_get_newest_label(ctx->onexec);
|
||||
else
|
||||
error = -EINVAL;
|
||||
|
||||
if (profile)
|
||||
error = aa_getprocattr(profile, value);
|
||||
if (label)
|
||||
error = aa_getprocattr(label, value);
|
||||
|
||||
aa_put_profile(profile);
|
||||
aa_put_label(label);
|
||||
put_cred(cred);
|
||||
|
||||
return error;
|
||||
|
@ -539,22 +572,24 @@ static int apparmor_setprocattr(const char *name, void *value,
|
|||
if (strcmp(name, "current") == 0) {
|
||||
if (strcmp(command, "changehat") == 0) {
|
||||
error = aa_setprocattr_changehat(args, arg_size,
|
||||
!AA_DO_TEST);
|
||||
AA_CHANGE_NOFLAGS);
|
||||
} else if (strcmp(command, "permhat") == 0) {
|
||||
error = aa_setprocattr_changehat(args, arg_size,
|
||||
AA_DO_TEST);
|
||||
AA_CHANGE_TEST);
|
||||
} else if (strcmp(command, "changeprofile") == 0) {
|
||||
error = aa_change_profile(args, !AA_ONEXEC,
|
||||
!AA_DO_TEST, false);
|
||||
error = aa_change_profile(args, AA_CHANGE_NOFLAGS);
|
||||
} else if (strcmp(command, "permprofile") == 0) {
|
||||
error = aa_change_profile(args, !AA_ONEXEC, AA_DO_TEST,
|
||||
false);
|
||||
error = aa_change_profile(args, AA_CHANGE_TEST);
|
||||
} else if (strcmp(command, "stack") == 0) {
|
||||
error = aa_change_profile(args, AA_CHANGE_STACK);
|
||||
} else
|
||||
goto fail;
|
||||
} else if (strcmp(name, "exec") == 0) {
|
||||
if (strcmp(command, "exec") == 0)
|
||||
error = aa_change_profile(args, AA_ONEXEC, !AA_DO_TEST,
|
||||
false);
|
||||
error = aa_change_profile(args, AA_CHANGE_ONEXEC);
|
||||
else if (strcmp(command, "stack") == 0)
|
||||
error = aa_change_profile(args, (AA_CHANGE_ONEXEC |
|
||||
AA_CHANGE_STACK));
|
||||
else
|
||||
goto fail;
|
||||
} else
|
||||
|
@ -568,21 +603,55 @@ out:
|
|||
return error;
|
||||
|
||||
fail:
|
||||
aad(&sa)->profile = aa_current_profile();
|
||||
aad(&sa)->label = begin_current_label_crit_section();
|
||||
aad(&sa)->info = name;
|
||||
aad(&sa)->error = error = -EINVAL;
|
||||
aa_audit_msg(AUDIT_APPARMOR_DENIED, &sa, NULL);
|
||||
end_current_label_crit_section(aad(&sa)->label);
|
||||
goto out;
|
||||
}
|
||||
|
||||
/**
|
||||
* apparmor_bprm_committing_creds - do task cleanup on committing new creds
|
||||
* @bprm: binprm for the exec (NOT NULL)
|
||||
*/
|
||||
static void apparmor_bprm_committing_creds(struct linux_binprm *bprm)
|
||||
{
|
||||
struct aa_label *label = aa_current_raw_label();
|
||||
struct aa_task_ctx *new_ctx = cred_ctx(bprm->cred);
|
||||
|
||||
/* bail out if unconfined or not changing profile */
|
||||
if ((new_ctx->label->proxy == label->proxy) ||
|
||||
(unconfined(new_ctx->label)))
|
||||
return;
|
||||
|
||||
aa_inherit_files(bprm->cred, current->files);
|
||||
|
||||
current->pdeath_signal = 0;
|
||||
|
||||
/* reset soft limits and set hard limits for the new label */
|
||||
__aa_transition_rlimits(label, new_ctx->label);
|
||||
}
|
||||
|
||||
/**
|
||||
* apparmor_bprm_committed_cred - do cleanup after new creds committed
|
||||
* @bprm: binprm for the exec (NOT NULL)
|
||||
*/
|
||||
static void apparmor_bprm_committed_creds(struct linux_binprm *bprm)
|
||||
{
|
||||
/* TODO: cleanup signals - ipc mediation */
|
||||
return;
|
||||
}
|
||||
|
||||
static int apparmor_task_setrlimit(struct task_struct *task,
|
||||
unsigned int resource, struct rlimit *new_rlim)
|
||||
{
|
||||
struct aa_profile *profile = __aa_current_profile();
|
||||
struct aa_label *label = __begin_current_label_crit_section();
|
||||
int error = 0;
|
||||
|
||||
if (!unconfined(profile))
|
||||
error = aa_task_setrlimit(profile, task, resource, new_rlim);
|
||||
if (!unconfined(label))
|
||||
error = aa_task_setrlimit(label, task, resource, new_rlim);
|
||||
__end_current_label_crit_section(label);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
@ -606,6 +675,7 @@ static struct security_hook_list apparmor_hooks[] __lsm_ro_after_init = {
|
|||
LSM_HOOK_INIT(inode_getattr, apparmor_inode_getattr),
|
||||
|
||||
LSM_HOOK_INIT(file_open, apparmor_file_open),
|
||||
LSM_HOOK_INIT(file_receive, apparmor_file_receive),
|
||||
LSM_HOOK_INIT(file_permission, apparmor_file_permission),
|
||||
LSM_HOOK_INIT(file_alloc_security, apparmor_file_alloc_security),
|
||||
LSM_HOOK_INIT(file_free_security, apparmor_file_free_security),
|
||||
|
@ -774,11 +844,18 @@ static int param_get_aabool(char *buffer, const struct kernel_param *kp)
|
|||
|
||||
static int param_set_aauint(const char *val, const struct kernel_param *kp)
|
||||
{
|
||||
int error;
|
||||
|
||||
if (!apparmor_enabled)
|
||||
return -EINVAL;
|
||||
if (apparmor_initialized && !policy_admin_capable(NULL))
|
||||
/* file is ro but enforce 2nd line check */
|
||||
if (apparmor_initialized)
|
||||
return -EPERM;
|
||||
return param_set_uint(val, kp);
|
||||
|
||||
error = param_set_uint(val, kp);
|
||||
pr_info("AppArmor: buffer size set to %d bytes\n", aa_g_path_max);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int param_get_aauint(char *buffer, const struct kernel_param *kp)
|
||||
|
@ -869,7 +946,7 @@ static int __init set_init_ctx(void)
|
|||
if (!ctx)
|
||||
return -ENOMEM;
|
||||
|
||||
ctx->profile = aa_get_profile(root_ns->unconfined);
|
||||
ctx->label = aa_get_label(ns_unconfined(root_ns));
|
||||
cred_ctx(cred) = ctx;
|
||||
|
||||
return 0;
|
||||
|
|
|
@ -50,7 +50,7 @@ static int prepend(char **buffer, int buflen, const char *str, int namelen)
|
|||
* namespace root.
|
||||
*/
|
||||
static int disconnect(const struct path *path, char *buf, char **name,
|
||||
int flags)
|
||||
int flags, const char *disconnected)
|
||||
{
|
||||
int error = 0;
|
||||
|
||||
|
@ -63,9 +63,14 @@ static int disconnect(const struct path *path, char *buf, char **name,
|
|||
error = -EACCES;
|
||||
if (**name == '/')
|
||||
*name = *name + 1;
|
||||
} else if (**name != '/')
|
||||
/* CONNECT_PATH with missing root */
|
||||
error = prepend(name, *name - buf, "/", 1);
|
||||
} else {
|
||||
if (**name != '/')
|
||||
/* CONNECT_PATH with missing root */
|
||||
error = prepend(name, *name - buf, "/", 1);
|
||||
if (!error && disconnected)
|
||||
error = prepend(name, *name - buf, disconnected,
|
||||
strlen(disconnected));
|
||||
}
|
||||
|
||||
return error;
|
||||
}
|
||||
|
@ -74,9 +79,9 @@ static int disconnect(const struct path *path, char *buf, char **name,
|
|||
* d_namespace_path - lookup a name associated with a given path
|
||||
* @path: path to lookup (NOT NULL)
|
||||
* @buf: buffer to store path to (NOT NULL)
|
||||
* @buflen: length of @buf
|
||||
* @name: Returns - pointer for start of path name with in @buf (NOT NULL)
|
||||
* @flags: flags controlling path lookup
|
||||
* @disconnected: string to prefix to disconnected paths
|
||||
*
|
||||
* Handle path name lookup.
|
||||
*
|
||||
|
@ -84,12 +89,14 @@ static int disconnect(const struct path *path, char *buf, char **name,
|
|||
* When no error the path name is returned in @name which points to
|
||||
* to a position in @buf
|
||||
*/
|
||||
static int d_namespace_path(const struct path *path, char *buf, int buflen,
|
||||
char **name, int flags)
|
||||
static int d_namespace_path(const struct path *path, char *buf, char **name,
|
||||
int flags, const char *disconnected)
|
||||
{
|
||||
char *res;
|
||||
int error = 0;
|
||||
int connected = 1;
|
||||
int isdir = (flags & PATH_IS_DIR) ? 1 : 0;
|
||||
int buflen = aa_g_path_max - isdir;
|
||||
|
||||
if (path->mnt->mnt_flags & MNT_INTERNAL) {
|
||||
/* it's not mounted anywhere */
|
||||
|
@ -104,10 +111,12 @@ static int d_namespace_path(const struct path *path, char *buf, int buflen,
|
|||
/* TODO: convert over to using a per namespace
|
||||
* control instead of hard coded /proc
|
||||
*/
|
||||
return prepend(name, *name - buf, "/proc", 5);
|
||||
error = prepend(name, *name - buf, "/proc", 5);
|
||||
goto out;
|
||||
} else
|
||||
return disconnect(path, buf, name, flags);
|
||||
return 0;
|
||||
error = disconnect(path, buf, name, flags,
|
||||
disconnected);
|
||||
goto out;
|
||||
}
|
||||
|
||||
/* resolve paths relative to chroot?*/
|
||||
|
@ -126,8 +135,11 @@ static int d_namespace_path(const struct path *path, char *buf, int buflen,
|
|||
* be returned.
|
||||
*/
|
||||
if (!res || IS_ERR(res)) {
|
||||
if (PTR_ERR(res) == -ENAMETOOLONG)
|
||||
return -ENAMETOOLONG;
|
||||
if (PTR_ERR(res) == -ENAMETOOLONG) {
|
||||
error = -ENAMETOOLONG;
|
||||
*name = buf;
|
||||
goto out;
|
||||
}
|
||||
connected = 0;
|
||||
res = dentry_path_raw(path->dentry, buf, buflen);
|
||||
if (IS_ERR(res)) {
|
||||
|
@ -140,6 +152,9 @@ static int d_namespace_path(const struct path *path, char *buf, int buflen,
|
|||
|
||||
*name = res;
|
||||
|
||||
if (!connected)
|
||||
error = disconnect(path, buf, name, flags, disconnected);
|
||||
|
||||
/* Handle two cases:
|
||||
* 1. A deleted dentry && profile is not allowing mediation of deleted
|
||||
* 2. On some filesystems, newly allocated dentries appear to the
|
||||
|
@ -147,62 +162,30 @@ static int d_namespace_path(const struct path *path, char *buf, int buflen,
|
|||
* allocated.
|
||||
*/
|
||||
if (d_unlinked(path->dentry) && d_is_positive(path->dentry) &&
|
||||
!(flags & PATH_MEDIATE_DELETED)) {
|
||||
!(flags & (PATH_MEDIATE_DELETED | PATH_DELEGATE_DELETED))) {
|
||||
error = -ENOENT;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!connected)
|
||||
error = disconnect(path, buf, name, flags);
|
||||
|
||||
out:
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
* get_name_to_buffer - get the pathname to a buffer ensure dir / is appended
|
||||
* @path: path to get name for (NOT NULL)
|
||||
* @flags: flags controlling path lookup
|
||||
* @buffer: buffer to put name in (NOT NULL)
|
||||
* @size: size of buffer
|
||||
* @name: Returns - contains position of path name in @buffer (NOT NULL)
|
||||
*
|
||||
* Returns: %0 else error on failure
|
||||
*/
|
||||
static int get_name_to_buffer(const struct path *path, int flags, char *buffer,
|
||||
int size, char **name, const char **info)
|
||||
{
|
||||
int adjust = (flags & PATH_IS_DIR) ? 1 : 0;
|
||||
int error = d_namespace_path(path, buffer, size - adjust, name, flags);
|
||||
|
||||
if (!error && (flags & PATH_IS_DIR) && (*name)[1] != '\0')
|
||||
/*
|
||||
* Append "/" to the pathname. The root directory is a special
|
||||
* case; it already ends in slash.
|
||||
*/
|
||||
strcpy(&buffer[size - 2], "/");
|
||||
|
||||
if (info && error) {
|
||||
if (error == -ENOENT)
|
||||
*info = "Failed name lookup - deleted entry";
|
||||
else if (error == -EACCES)
|
||||
*info = "Failed name lookup - disconnected path";
|
||||
else if (error == -ENAMETOOLONG)
|
||||
*info = "Failed name lookup - name too long";
|
||||
else
|
||||
*info = "Failed name lookup";
|
||||
}
|
||||
/*
|
||||
* Append "/" to the pathname. The root directory is a special
|
||||
* case; it already ends in slash.
|
||||
*/
|
||||
if (!error && isdir && ((*name)[1] != '\0' || (*name)[0] != '/'))
|
||||
strcpy(&buf[aa_g_path_max - 2], "/");
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_path_name - compute the pathname of a file
|
||||
* aa_path_name - get the pathname to a buffer ensure dir / is appended
|
||||
* @path: path the file (NOT NULL)
|
||||
* @flags: flags controlling path name generation
|
||||
* @buffer: buffer that aa_get_name() allocated (NOT NULL)
|
||||
* @buffer: buffer to put name in (NOT NULL)
|
||||
* @name: Returns - the generated path name if !error (NOT NULL)
|
||||
* @info: Returns - information on why the path lookup failed (MAYBE NULL)
|
||||
* @disconnected: string to prepend to disconnected paths
|
||||
*
|
||||
* @name is a pointer to the beginning of the pathname (which usually differs
|
||||
* from the beginning of the buffer), or NULL. If there is an error @name
|
||||
|
@ -215,32 +198,23 @@ static int get_name_to_buffer(const struct path *path, int flags, char *buffer,
|
|||
*
|
||||
* Returns: %0 else error code if could retrieve name
|
||||
*/
|
||||
int aa_path_name(const struct path *path, int flags, char **buffer,
|
||||
const char **name, const char **info)
|
||||
int aa_path_name(const struct path *path, int flags, char *buffer,
|
||||
const char **name, const char **info, const char *disconnected)
|
||||
{
|
||||
char *buf, *str = NULL;
|
||||
int size = 256;
|
||||
int error;
|
||||
char *str = NULL;
|
||||
int error = d_namespace_path(path, buffer, &str, flags, disconnected);
|
||||
|
||||
*name = NULL;
|
||||
*buffer = NULL;
|
||||
for (;;) {
|
||||
/* freed by caller */
|
||||
buf = kmalloc(size, GFP_KERNEL);
|
||||
if (!buf)
|
||||
return -ENOMEM;
|
||||
|
||||
error = get_name_to_buffer(path, flags, buf, size, &str, info);
|
||||
if (error != -ENAMETOOLONG)
|
||||
break;
|
||||
|
||||
kfree(buf);
|
||||
size <<= 1;
|
||||
if (size > aa_g_path_max)
|
||||
return -ENAMETOOLONG;
|
||||
*info = NULL;
|
||||
if (info && error) {
|
||||
if (error == -ENOENT)
|
||||
*info = "Failed name lookup - deleted entry";
|
||||
else if (error == -EACCES)
|
||||
*info = "Failed name lookup - disconnected path";
|
||||
else if (error == -ENAMETOOLONG)
|
||||
*info = "Failed name lookup - name too long";
|
||||
else
|
||||
*info = "Failed name lookup";
|
||||
}
|
||||
*buffer = buf;
|
||||
|
||||
*name = str;
|
||||
|
||||
return error;
|
||||
|
|
|
@ -101,20 +101,9 @@ const char *const aa_profile_mode_names[] = {
|
|||
"unconfined",
|
||||
};
|
||||
|
||||
/* requires profile list write lock held */
|
||||
void __aa_update_proxy(struct aa_profile *orig, struct aa_profile *new)
|
||||
{
|
||||
struct aa_profile *tmp;
|
||||
|
||||
tmp = rcu_dereference_protected(orig->proxy->profile,
|
||||
mutex_is_locked(&orig->ns->lock));
|
||||
rcu_assign_pointer(orig->proxy->profile, aa_get_profile(new));
|
||||
orig->flags |= PFLAG_STALE;
|
||||
aa_put_profile(tmp);
|
||||
}
|
||||
|
||||
/**
|
||||
* __list_add_profile - add a profile to a list
|
||||
* __add_profile - add a profiles to list and label tree
|
||||
* @list: list to add it to (NOT NULL)
|
||||
* @profile: the profile to add (NOT NULL)
|
||||
*
|
||||
|
@ -122,12 +111,21 @@ void __aa_update_proxy(struct aa_profile *orig, struct aa_profile *new)
|
|||
*
|
||||
* Requires: namespace lock be held, or list not be shared
|
||||
*/
|
||||
static void __list_add_profile(struct list_head *list,
|
||||
struct aa_profile *profile)
|
||||
static void __add_profile(struct list_head *list, struct aa_profile *profile)
|
||||
{
|
||||
struct aa_label *l;
|
||||
|
||||
AA_BUG(!list);
|
||||
AA_BUG(!profile);
|
||||
AA_BUG(!profile->ns);
|
||||
AA_BUG(!mutex_is_locked(&profile->ns->lock));
|
||||
|
||||
list_add_rcu(&profile->base.list, list);
|
||||
/* get list reference */
|
||||
aa_get_profile(profile);
|
||||
l = aa_label_insert(&profile->ns->labels, &profile->label);
|
||||
AA_BUG(l != &profile->label);
|
||||
aa_put_label(l);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -144,6 +142,10 @@ static void __list_add_profile(struct list_head *list,
|
|||
*/
|
||||
static void __list_remove_profile(struct aa_profile *profile)
|
||||
{
|
||||
AA_BUG(!profile);
|
||||
AA_BUG(!profile->ns);
|
||||
AA_BUG(!mutex_is_locked(&profile->ns->lock));
|
||||
|
||||
list_del_rcu(&profile->base.list);
|
||||
aa_put_profile(profile);
|
||||
}
|
||||
|
@ -156,11 +158,15 @@ static void __list_remove_profile(struct aa_profile *profile)
|
|||
*/
|
||||
static void __remove_profile(struct aa_profile *profile)
|
||||
{
|
||||
AA_BUG(!profile);
|
||||
AA_BUG(!profile->ns);
|
||||
AA_BUG(!mutex_is_locked(&profile->ns->lock));
|
||||
|
||||
/* release any children lists first */
|
||||
__aa_profile_list_release(&profile->base.profiles);
|
||||
/* released by free_profile */
|
||||
__aa_update_proxy(profile, profile->ns->unconfined);
|
||||
__aa_fs_profile_rmdir(profile);
|
||||
aa_label_remove(&profile->label);
|
||||
__aafs_profile_rmdir(profile);
|
||||
__list_remove_profile(profile);
|
||||
}
|
||||
|
||||
|
@ -177,24 +183,6 @@ void __aa_profile_list_release(struct list_head *head)
|
|||
__remove_profile(profile);
|
||||
}
|
||||
|
||||
|
||||
static void free_proxy(struct aa_proxy *p)
|
||||
{
|
||||
if (p) {
|
||||
/* r->profile will not be updated any more as r is dead */
|
||||
aa_put_profile(rcu_dereference_protected(p->profile, true));
|
||||
kzfree(p);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
void aa_free_proxy_kref(struct kref *kref)
|
||||
{
|
||||
struct aa_proxy *p = container_of(kref, struct aa_proxy, count);
|
||||
|
||||
free_proxy(p);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_free_data - free a data blob
|
||||
* @ptr: data to free
|
||||
|
@ -242,7 +230,6 @@ void aa_free_profile(struct aa_profile *profile)
|
|||
kzfree(profile->dirname);
|
||||
aa_put_dfa(profile->xmatch);
|
||||
aa_put_dfa(profile->policy.dfa);
|
||||
aa_put_proxy(profile->proxy);
|
||||
|
||||
if (profile->data) {
|
||||
rht = profile->data;
|
||||
|
@ -253,32 +240,10 @@ void aa_free_profile(struct aa_profile *profile)
|
|||
|
||||
kzfree(profile->hash);
|
||||
aa_put_loaddata(profile->rawdata);
|
||||
|
||||
kzfree(profile);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_free_profile_rcu - free aa_profile by rcu (called by aa_free_profile_kref)
|
||||
* @head: rcu_head callback for freeing of a profile (NOT NULL)
|
||||
*/
|
||||
static void aa_free_profile_rcu(struct rcu_head *head)
|
||||
{
|
||||
struct aa_profile *p = container_of(head, struct aa_profile, rcu);
|
||||
if (p->flags & PFLAG_NS_COUNT)
|
||||
aa_free_ns(p->ns);
|
||||
else
|
||||
aa_free_profile(p);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_free_profile_kref - free aa_profile by kref (called by aa_put_profile)
|
||||
* @kr: kref callback for freeing of a profile (NOT NULL)
|
||||
*/
|
||||
void aa_free_profile_kref(struct kref *kref)
|
||||
{
|
||||
struct aa_profile *p = container_of(kref, struct aa_profile, count);
|
||||
call_rcu(&p->rcu, aa_free_profile_rcu);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_alloc_profile - allocate, initialize and return a new profile
|
||||
* @hname: name of the profile (NOT NULL)
|
||||
|
@ -286,30 +251,40 @@ void aa_free_profile_kref(struct kref *kref)
|
|||
*
|
||||
* Returns: refcount profile or NULL on failure
|
||||
*/
|
||||
struct aa_profile *aa_alloc_profile(const char *hname, gfp_t gfp)
|
||||
struct aa_profile *aa_alloc_profile(const char *hname, struct aa_proxy *proxy,
|
||||
gfp_t gfp)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
|
||||
/* freed by free_profile - usually through aa_put_profile */
|
||||
profile = kzalloc(sizeof(*profile), gfp);
|
||||
profile = kzalloc(sizeof(*profile) + sizeof(struct aa_profile *) * 2,
|
||||
gfp);
|
||||
if (!profile)
|
||||
return NULL;
|
||||
|
||||
profile->proxy = kzalloc(sizeof(struct aa_proxy), gfp);
|
||||
if (!profile->proxy)
|
||||
goto fail;
|
||||
kref_init(&profile->proxy->count);
|
||||
|
||||
if (!aa_policy_init(&profile->base, NULL, hname, gfp))
|
||||
goto fail;
|
||||
kref_init(&profile->count);
|
||||
if (!aa_label_init(&profile->label, 1))
|
||||
goto fail;
|
||||
|
||||
/* update being set needed by fs interface */
|
||||
if (!proxy) {
|
||||
proxy = aa_alloc_proxy(&profile->label, gfp);
|
||||
if (!proxy)
|
||||
goto fail;
|
||||
} else
|
||||
aa_get_proxy(proxy);
|
||||
profile->label.proxy = proxy;
|
||||
|
||||
profile->label.hname = profile->base.hname;
|
||||
profile->label.flags |= FLAG_PROFILE;
|
||||
profile->label.vec[0] = profile;
|
||||
|
||||
/* refcount released by caller */
|
||||
return profile;
|
||||
|
||||
fail:
|
||||
kzfree(profile->proxy);
|
||||
kzfree(profile);
|
||||
aa_free_profile(profile);
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
@ -362,14 +337,14 @@ name:
|
|||
if (profile)
|
||||
goto out;
|
||||
|
||||
profile = aa_alloc_profile(name, gfp);
|
||||
profile = aa_alloc_profile(name, NULL, gfp);
|
||||
if (!profile)
|
||||
goto fail;
|
||||
|
||||
profile->mode = APPARMOR_COMPLAIN;
|
||||
profile->flags |= PFLAG_NULL;
|
||||
profile->label.flags |= FLAG_NULL;
|
||||
if (hat)
|
||||
profile->flags |= PFLAG_HAT;
|
||||
profile->label.flags |= FLAG_HAT;
|
||||
profile->path_flags = parent->path_flags;
|
||||
|
||||
/* released on free_profile */
|
||||
|
@ -379,7 +354,7 @@ name:
|
|||
profile->policy.dfa = aa_get_dfa(nulldfa);
|
||||
|
||||
mutex_lock(&profile->ns->lock);
|
||||
__list_add_profile(&parent->base.profiles, profile);
|
||||
__add_profile(&parent->base.profiles, profile);
|
||||
mutex_unlock(&profile->ns->lock);
|
||||
|
||||
/* refcount released by caller */
|
||||
|
@ -389,27 +364,12 @@ out:
|
|||
return profile;
|
||||
|
||||
fail:
|
||||
kfree(name);
|
||||
aa_free_profile(profile);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* TODO: profile accounting - setup in remove */
|
||||
|
||||
/**
|
||||
* __find_child - find a profile on @head list with a name matching @name
|
||||
* @head: list to search (NOT NULL)
|
||||
* @name: name of profile (NOT NULL)
|
||||
*
|
||||
* Requires: rcu_read_lock be held
|
||||
*
|
||||
* Returns: unrefcounted profile ptr, or NULL if not found
|
||||
*/
|
||||
static struct aa_profile *__find_child(struct list_head *head, const char *name)
|
||||
{
|
||||
return (struct aa_profile *)__policy_find(head, name);
|
||||
}
|
||||
|
||||
/**
|
||||
* __strn_find_child - find a profile on @head list using substring of @name
|
||||
* @head: list to search (NOT NULL)
|
||||
|
@ -426,6 +386,20 @@ static struct aa_profile *__strn_find_child(struct list_head *head,
|
|||
return (struct aa_profile *)__policy_strn_find(head, name, len);
|
||||
}
|
||||
|
||||
/**
|
||||
* __find_child - find a profile on @head list with a name matching @name
|
||||
* @head: list to search (NOT NULL)
|
||||
* @name: name of profile (NOT NULL)
|
||||
*
|
||||
* Requires: rcu_read_lock be held
|
||||
*
|
||||
* Returns: unrefcounted profile ptr, or NULL if not found
|
||||
*/
|
||||
static struct aa_profile *__find_child(struct list_head *head, const char *name)
|
||||
{
|
||||
return __strn_find_child(head, name, strlen(name));
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_find_child - find a profile by @name in @parent
|
||||
* @parent: profile to search (NOT NULL)
|
||||
|
@ -556,7 +530,7 @@ struct aa_profile *aa_lookup_profile(struct aa_ns *ns, const char *hname)
|
|||
return aa_lookupn_profile(ns, hname, strlen(hname));
|
||||
}
|
||||
|
||||
struct aa_profile *aa_fqlookupn_profile(struct aa_profile *base,
|
||||
struct aa_profile *aa_fqlookupn_profile(struct aa_label *base,
|
||||
const char *fqname, size_t n)
|
||||
{
|
||||
struct aa_profile *profile;
|
||||
|
@ -566,11 +540,11 @@ struct aa_profile *aa_fqlookupn_profile(struct aa_profile *base,
|
|||
|
||||
name = aa_splitn_fqname(fqname, n, &ns_name, &ns_len);
|
||||
if (ns_name) {
|
||||
ns = aa_findn_ns(base->ns, ns_name, ns_len);
|
||||
ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len);
|
||||
if (!ns)
|
||||
return NULL;
|
||||
} else
|
||||
ns = aa_get_ns(base->ns);
|
||||
ns = aa_get_ns(labels_ns(base));
|
||||
|
||||
if (name)
|
||||
profile = aa_lookupn_profile(ns, name, n - (name - fqname));
|
||||
|
@ -596,7 +570,7 @@ static int replacement_allowed(struct aa_profile *profile, int noreplace,
|
|||
const char **info)
|
||||
{
|
||||
if (profile) {
|
||||
if (profile->flags & PFLAG_IMMUTABLE) {
|
||||
if (profile->label.flags & FLAG_IMMUTIBLE) {
|
||||
*info = "cannot replace immutible profile";
|
||||
return -EPERM;
|
||||
} else if (noreplace) {
|
||||
|
@ -619,29 +593,31 @@ static void audit_cb(struct audit_buffer *ab, void *va)
|
|||
}
|
||||
|
||||
/**
|
||||
* aa_audit_policy - Do auditing of policy changes
|
||||
* @profile: profile to check if it can manage policy
|
||||
* audit_policy - Do auditing of policy changes
|
||||
* @label: label to check if it can manage policy
|
||||
* @op: policy operation being performed
|
||||
* @gfp: memory allocation flags
|
||||
* @nsname: name of the ns being manipulated (MAY BE NULL)
|
||||
* @ns_name: name of namespace being manipulated
|
||||
* @name: name of profile being manipulated (NOT NULL)
|
||||
* @info: any extra information to be audited (MAYBE NULL)
|
||||
* @error: error code
|
||||
*
|
||||
* Returns: the error to be returned after audit is done
|
||||
*/
|
||||
static int audit_policy(struct aa_profile *profile, const char *op,
|
||||
const char *nsname, const char *name,
|
||||
static int audit_policy(struct aa_label *label, const char *op,
|
||||
const char *ns_name, const char *name,
|
||||
const char *info, int error)
|
||||
{
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, op);
|
||||
|
||||
aad(&sa)->iface.ns = nsname;
|
||||
aad(&sa)->iface.ns = ns_name;
|
||||
aad(&sa)->name = name;
|
||||
aad(&sa)->info = info;
|
||||
aad(&sa)->error = error;
|
||||
aad(&sa)->label = label;
|
||||
|
||||
return aa_audit(AUDIT_APPARMOR_STATUS, profile, &sa, audit_cb);
|
||||
aa_audit_msg(AUDIT_APPARMOR_STATUS, &sa, audit_cb);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -685,22 +661,30 @@ bool policy_admin_capable(struct aa_ns *ns)
|
|||
|
||||
/**
|
||||
* aa_may_manage_policy - can the current task manage policy
|
||||
* @profile: profile to check if it can manage policy
|
||||
* @label: label to check if it can manage policy
|
||||
* @op: the policy manipulation operation being done
|
||||
*
|
||||
* Returns: 0 if the task is allowed to manipulate policy else error
|
||||
*/
|
||||
int aa_may_manage_policy(struct aa_profile *profile, struct aa_ns *ns,
|
||||
const char *op)
|
||||
int aa_may_manage_policy(struct aa_label *label, struct aa_ns *ns, u32 mask)
|
||||
{
|
||||
const char *op;
|
||||
|
||||
if (mask & AA_MAY_REMOVE_POLICY)
|
||||
op = OP_PROF_RM;
|
||||
else if (mask & AA_MAY_REPLACE_POLICY)
|
||||
op = OP_PROF_REPL;
|
||||
else
|
||||
op = OP_PROF_LOAD;
|
||||
|
||||
/* check if loading policy is locked out */
|
||||
if (aa_g_lock_policy)
|
||||
return audit_policy(profile, op, NULL, NULL,
|
||||
"policy_locked", -EACCES);
|
||||
return audit_policy(label, op, NULL, NULL, "policy_locked",
|
||||
-EACCES);
|
||||
|
||||
if (!policy_admin_capable(ns))
|
||||
return audit_policy(profile, op, NULL, NULL,
|
||||
"not policy admin", -EACCES);
|
||||
return audit_policy(label, op, NULL, NULL, "not policy admin",
|
||||
-EACCES);
|
||||
|
||||
/* TODO: add fine grained mediation of policy loads */
|
||||
return 0;
|
||||
|
@ -742,8 +726,7 @@ static struct aa_profile *__list_lookup_parent(struct list_head *lh,
|
|||
*
|
||||
* Requires: namespace list lock be held, or list not be shared
|
||||
*/
|
||||
static void __replace_profile(struct aa_profile *old, struct aa_profile *new,
|
||||
bool share_proxy)
|
||||
static void __replace_profile(struct aa_profile *old, struct aa_profile *new)
|
||||
{
|
||||
struct aa_profile *child, *tmp;
|
||||
|
||||
|
@ -758,7 +741,7 @@ static void __replace_profile(struct aa_profile *old, struct aa_profile *new,
|
|||
p = __find_child(&new->base.profiles, child->base.name);
|
||||
if (p) {
|
||||
/* @p replaces @child */
|
||||
__replace_profile(child, p, share_proxy);
|
||||
__replace_profile(child, p);
|
||||
continue;
|
||||
}
|
||||
|
||||
|
@ -776,15 +759,9 @@ static void __replace_profile(struct aa_profile *old, struct aa_profile *new,
|
|||
struct aa_profile *parent = aa_deref_parent(old);
|
||||
rcu_assign_pointer(new->parent, aa_get_profile(parent));
|
||||
}
|
||||
__aa_update_proxy(old, new);
|
||||
if (share_proxy) {
|
||||
aa_put_proxy(new->proxy);
|
||||
new->proxy = aa_get_proxy(old->proxy);
|
||||
} else if (!rcu_access_pointer(new->proxy->profile))
|
||||
/* aafs interface uses proxy */
|
||||
rcu_assign_pointer(new->proxy->profile,
|
||||
aa_get_profile(new));
|
||||
__aa_fs_profile_migrate_dents(old, new);
|
||||
aa_label_replace(&old->label, &new->label);
|
||||
/* migrate dents must come after label replacement b/c update */
|
||||
__aafs_profile_migrate_dents(old, new);
|
||||
|
||||
if (list_empty(&new->base.list)) {
|
||||
/* new is not on a list already */
|
||||
|
@ -821,11 +798,41 @@ static int __lookup_replace(struct aa_ns *ns, const char *hname,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static void share_name(struct aa_profile *old, struct aa_profile *new)
|
||||
{
|
||||
aa_put_str(new->base.hname);
|
||||
aa_get_str(old->base.hname);
|
||||
new->base.hname = old->base.hname;
|
||||
new->base.name = old->base.name;
|
||||
new->label.hname = old->label.hname;
|
||||
}
|
||||
|
||||
/* Update to newest version of parent after previous replacements
|
||||
* Returns: unrefcount newest version of parent
|
||||
*/
|
||||
static struct aa_profile *update_to_newest_parent(struct aa_profile *new)
|
||||
{
|
||||
struct aa_profile *parent, *newest;
|
||||
|
||||
parent = rcu_dereference_protected(new->parent,
|
||||
mutex_is_locked(&new->ns->lock));
|
||||
newest = aa_get_newest_profile(parent);
|
||||
|
||||
/* parent replaced in this atomic set? */
|
||||
if (newest != parent) {
|
||||
aa_put_profile(parent);
|
||||
rcu_assign_pointer(new->parent, newest);
|
||||
} else
|
||||
aa_put_profile(newest);
|
||||
|
||||
return newest;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_replace_profiles - replace profile(s) on the profile list
|
||||
* @view: namespace load is viewed from
|
||||
* @policy_ns: namespace load is occurring on
|
||||
* @label: label that is attempting to load/replace policy
|
||||
* @noreplace: true if only doing addition, no replacement allowed
|
||||
* @mask: permission mask
|
||||
* @udata: serialized data stream (NOT NULL)
|
||||
*
|
||||
* unpack and replace a profile on the profile list and uses of that profile
|
||||
|
@ -834,16 +841,19 @@ static int __lookup_replace(struct aa_ns *ns, const char *hname,
|
|||
*
|
||||
* Returns: size of data consumed else error code on failure.
|
||||
*/
|
||||
ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
||||
bool noreplace, struct aa_loaddata *udata)
|
||||
ssize_t aa_replace_profiles(struct aa_ns *policy_ns, struct aa_label *label,
|
||||
u32 mask, struct aa_loaddata *udata)
|
||||
{
|
||||
const char *ns_name, *info = NULL;
|
||||
struct aa_ns *ns = NULL;
|
||||
struct aa_load_ent *ent, *tmp;
|
||||
const char *op = OP_PROF_REPL;
|
||||
struct aa_loaddata *rawdata_ent;
|
||||
const char *op;
|
||||
ssize_t count, error;
|
||||
LIST_HEAD(lh);
|
||||
|
||||
op = mask & AA_MAY_REPLACE_POLICY ? OP_PROF_REPL : OP_PROF_LOAD;
|
||||
aa_get_loaddata(udata);
|
||||
/* released below */
|
||||
error = aa_unpack(udata, &lh, &ns_name);
|
||||
if (error)
|
||||
|
@ -874,7 +884,8 @@ ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
|||
count++;
|
||||
}
|
||||
if (ns_name) {
|
||||
ns = aa_prepare_ns(view, ns_name);
|
||||
ns = aa_prepare_ns(policy_ns ? policy_ns : labels_ns(label),
|
||||
ns_name);
|
||||
if (IS_ERR(ns)) {
|
||||
op = OP_PROF_LOAD;
|
||||
info = "failed to prepare namespace";
|
||||
|
@ -884,22 +895,38 @@ ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
|||
goto fail;
|
||||
}
|
||||
} else
|
||||
ns = aa_get_ns(view);
|
||||
ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(label));
|
||||
|
||||
mutex_lock(&ns->lock);
|
||||
/* check for duplicate rawdata blobs: space and file dedup */
|
||||
list_for_each_entry(rawdata_ent, &ns->rawdata_list, list) {
|
||||
if (aa_rawdata_eq(rawdata_ent, udata)) {
|
||||
struct aa_loaddata *tmp;
|
||||
|
||||
tmp = __aa_get_loaddata(rawdata_ent);
|
||||
/* check we didn't fail the race */
|
||||
if (tmp) {
|
||||
aa_put_loaddata(udata);
|
||||
udata = tmp;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
/* setup parent and ns info */
|
||||
list_for_each_entry(ent, &lh, list) {
|
||||
struct aa_policy *policy;
|
||||
|
||||
ent->new->rawdata = aa_get_loaddata(udata);
|
||||
error = __lookup_replace(ns, ent->new->base.hname, noreplace,
|
||||
error = __lookup_replace(ns, ent->new->base.hname,
|
||||
!(mask & AA_MAY_REPLACE_POLICY),
|
||||
&ent->old, &info);
|
||||
if (error)
|
||||
goto fail_lock;
|
||||
|
||||
if (ent->new->rename) {
|
||||
error = __lookup_replace(ns, ent->new->rename,
|
||||
noreplace, &ent->rename,
|
||||
&info);
|
||||
!(mask & AA_MAY_REPLACE_POLICY),
|
||||
&ent->rename, &info);
|
||||
if (error)
|
||||
goto fail_lock;
|
||||
}
|
||||
|
@ -929,15 +956,16 @@ ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
|||
}
|
||||
|
||||
/* create new fs entries for introspection if needed */
|
||||
if (!udata->dents[AAFS_LOADDATA_DIR]) {
|
||||
error = __aa_fs_create_rawdata(ns, udata);
|
||||
if (error) {
|
||||
info = "failed to create raw_data dir and files";
|
||||
ent = NULL;
|
||||
goto fail_lock;
|
||||
}
|
||||
}
|
||||
list_for_each_entry(ent, &lh, list) {
|
||||
if (ent->old) {
|
||||
/* inherit old interface files */
|
||||
|
||||
/* if (ent->rename)
|
||||
TODO: support rename */
|
||||
/* } else if (ent->rename) {
|
||||
TODO: support rename */
|
||||
} else {
|
||||
if (!ent->old) {
|
||||
struct dentry *parent;
|
||||
if (rcu_access_pointer(ent->new->parent)) {
|
||||
struct aa_profile *p;
|
||||
|
@ -945,65 +973,61 @@ ssize_t aa_replace_profiles(struct aa_ns *view, struct aa_profile *profile,
|
|||
parent = prof_child_dir(p);
|
||||
} else
|
||||
parent = ns_subprofs_dir(ent->new->ns);
|
||||
error = __aa_fs_profile_mkdir(ent->new, parent);
|
||||
error = __aafs_profile_mkdir(ent->new, parent);
|
||||
}
|
||||
|
||||
if (error) {
|
||||
info = "failed to create ";
|
||||
info = "failed to create";
|
||||
goto fail_lock;
|
||||
}
|
||||
}
|
||||
|
||||
/* Done with checks that may fail - do actual replacement */
|
||||
__aa_bump_ns_revision(ns);
|
||||
__aa_loaddata_update(udata, ns->revision);
|
||||
list_for_each_entry_safe(ent, tmp, &lh, list) {
|
||||
list_del_init(&ent->list);
|
||||
op = (!ent->old && !ent->rename) ? OP_PROF_LOAD : OP_PROF_REPL;
|
||||
|
||||
audit_policy(profile, op, NULL, ent->new->base.hname,
|
||||
NULL, error);
|
||||
if (ent->old && ent->old->rawdata == ent->new->rawdata) {
|
||||
/* dedup actual profile replacement */
|
||||
audit_policy(label, op, ns_name, ent->new->base.hname,
|
||||
"same as current profile, skipping",
|
||||
error);
|
||||
goto skip;
|
||||
}
|
||||
|
||||
/*
|
||||
* TODO: finer dedup based on profile range in data. Load set
|
||||
* can differ but profile may remain unchanged
|
||||
*/
|
||||
audit_policy(label, op, ns_name, ent->new->base.hname, NULL,
|
||||
error);
|
||||
|
||||
if (ent->old) {
|
||||
__replace_profile(ent->old, ent->new, 1);
|
||||
if (ent->rename) {
|
||||
/* aafs interface uses proxy */
|
||||
struct aa_proxy *r = ent->new->proxy;
|
||||
rcu_assign_pointer(r->profile,
|
||||
aa_get_profile(ent->new));
|
||||
__replace_profile(ent->rename, ent->new, 0);
|
||||
}
|
||||
} else if (ent->rename) {
|
||||
/* aafs interface uses proxy */
|
||||
rcu_assign_pointer(ent->new->proxy->profile,
|
||||
aa_get_profile(ent->new));
|
||||
__replace_profile(ent->rename, ent->new, 0);
|
||||
} else if (ent->new->parent) {
|
||||
struct aa_profile *parent, *newest;
|
||||
parent = aa_deref_parent(ent->new);
|
||||
newest = aa_get_newest_profile(parent);
|
||||
|
||||
/* parent replaced in this atomic set? */
|
||||
if (newest != parent) {
|
||||
aa_get_profile(newest);
|
||||
rcu_assign_pointer(ent->new->parent, newest);
|
||||
aa_put_profile(parent);
|
||||
}
|
||||
/* aafs interface uses proxy */
|
||||
rcu_assign_pointer(ent->new->proxy->profile,
|
||||
aa_get_profile(ent->new));
|
||||
__list_add_profile(&newest->base.profiles, ent->new);
|
||||
aa_put_profile(newest);
|
||||
share_name(ent->old, ent->new);
|
||||
__replace_profile(ent->old, ent->new);
|
||||
} else {
|
||||
/* aafs interface uses proxy */
|
||||
rcu_assign_pointer(ent->new->proxy->profile,
|
||||
aa_get_profile(ent->new));
|
||||
__list_add_profile(&ns->base.profiles, ent->new);
|
||||
struct list_head *lh;
|
||||
|
||||
if (rcu_access_pointer(ent->new->parent)) {
|
||||
struct aa_profile *parent;
|
||||
|
||||
parent = update_to_newest_parent(ent->new);
|
||||
lh = &parent->base.profiles;
|
||||
} else
|
||||
lh = &ns->base.profiles;
|
||||
__add_profile(lh, ent->new);
|
||||
}
|
||||
skip:
|
||||
aa_load_ent_free(ent);
|
||||
}
|
||||
__aa_labelset_update_subtree(ns);
|
||||
mutex_unlock(&ns->lock);
|
||||
|
||||
out:
|
||||
aa_put_ns(ns);
|
||||
aa_put_loaddata(udata);
|
||||
|
||||
if (error)
|
||||
return error;
|
||||
|
@ -1013,10 +1037,10 @@ fail_lock:
|
|||
mutex_unlock(&ns->lock);
|
||||
|
||||
/* audit cause of failure */
|
||||
op = (!ent->old) ? OP_PROF_LOAD : OP_PROF_REPL;
|
||||
op = (ent && !ent->old) ? OP_PROF_LOAD : OP_PROF_REPL;
|
||||
fail:
|
||||
audit_policy(profile, op, ns_name, ent ? ent->new->base.hname : NULL,
|
||||
info, error);
|
||||
audit_policy(label, op, ns_name, ent ? ent->new->base.hname : NULL,
|
||||
info, error);
|
||||
/* audit status that rest of profiles in the atomic set failed too */
|
||||
info = "valid profile in failed atomic policy load";
|
||||
list_for_each_entry(tmp, &lh, list) {
|
||||
|
@ -1026,8 +1050,8 @@ fail:
|
|||
continue;
|
||||
}
|
||||
op = (!tmp->old) ? OP_PROF_LOAD : OP_PROF_REPL;
|
||||
audit_policy(profile, op, ns_name,
|
||||
tmp->new->base.hname, info, error);
|
||||
audit_policy(label, op, ns_name, tmp->new->base.hname, info,
|
||||
error);
|
||||
}
|
||||
list_for_each_entry_safe(ent, tmp, &lh, list) {
|
||||
list_del_init(&ent->list);
|
||||
|
@ -1039,8 +1063,8 @@ fail:
|
|||
|
||||
/**
|
||||
* aa_remove_profiles - remove profile(s) from the system
|
||||
* @view: namespace the remove is being done from
|
||||
* @subj: profile attempting to remove policy
|
||||
* @policy_ns: namespace the remove is being done from
|
||||
* @subj: label attempting to remove policy
|
||||
* @fqname: name of the profile or namespace to remove (NOT NULL)
|
||||
* @size: size of the name
|
||||
*
|
||||
|
@ -1051,13 +1075,13 @@ fail:
|
|||
*
|
||||
* Returns: size of data consume else error code if fails
|
||||
*/
|
||||
ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_profile *subj,
|
||||
ssize_t aa_remove_profiles(struct aa_ns *policy_ns, struct aa_label *subj,
|
||||
char *fqname, size_t size)
|
||||
{
|
||||
struct aa_ns *root = NULL, *ns = NULL;
|
||||
struct aa_ns *ns = NULL;
|
||||
struct aa_profile *profile = NULL;
|
||||
const char *name = fqname, *info = NULL;
|
||||
char *ns_name = NULL;
|
||||
const char *ns_name = NULL;
|
||||
ssize_t error = 0;
|
||||
|
||||
if (*fqname == 0) {
|
||||
|
@ -1066,12 +1090,13 @@ ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_profile *subj,
|
|||
goto fail;
|
||||
}
|
||||
|
||||
root = view;
|
||||
|
||||
if (fqname[0] == ':') {
|
||||
name = aa_split_fqname(fqname, &ns_name);
|
||||
size_t ns_len;
|
||||
|
||||
name = aa_splitn_fqname(fqname, size, &ns_name, &ns_len);
|
||||
/* released below */
|
||||
ns = aa_find_ns(root, ns_name);
|
||||
ns = aa_lookupn_ns(policy_ns ? policy_ns : labels_ns(subj),
|
||||
ns_name, ns_len);
|
||||
if (!ns) {
|
||||
info = "namespace does not exist";
|
||||
error = -ENOENT;
|
||||
|
@ -1079,12 +1104,13 @@ ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_profile *subj,
|
|||
}
|
||||
} else
|
||||
/* released below */
|
||||
ns = aa_get_ns(root);
|
||||
ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(subj));
|
||||
|
||||
if (!name) {
|
||||
/* remove namespace - can only happen if fqname[0] == ':' */
|
||||
mutex_lock(&ns->parent->lock);
|
||||
__aa_remove_ns(ns);
|
||||
__aa_bump_ns_revision(ns);
|
||||
mutex_unlock(&ns->parent->lock);
|
||||
} else {
|
||||
/* remove profile */
|
||||
|
@ -1097,6 +1123,8 @@ ssize_t aa_remove_profiles(struct aa_ns *view, struct aa_profile *subj,
|
|||
}
|
||||
name = profile->base.hname;
|
||||
__remove_profile(profile);
|
||||
__aa_labelset_update_subtree(ns);
|
||||
__aa_bump_ns_revision(ns);
|
||||
mutex_unlock(&ns->lock);
|
||||
}
|
||||
|
||||
|
|
|
@ -23,6 +23,7 @@
|
|||
#include "include/apparmor.h"
|
||||
#include "include/context.h"
|
||||
#include "include/policy_ns.h"
|
||||
#include "include/label.h"
|
||||
#include "include/policy.h"
|
||||
|
||||
/* root profile namespace */
|
||||
|
@ -99,15 +100,17 @@ static struct aa_ns *alloc_ns(const char *prefix, const char *name)
|
|||
goto fail_ns;
|
||||
|
||||
INIT_LIST_HEAD(&ns->sub_ns);
|
||||
INIT_LIST_HEAD(&ns->rawdata_list);
|
||||
mutex_init(&ns->lock);
|
||||
init_waitqueue_head(&ns->wait);
|
||||
|
||||
/* released by aa_free_ns() */
|
||||
ns->unconfined = aa_alloc_profile("unconfined", GFP_KERNEL);
|
||||
ns->unconfined = aa_alloc_profile("unconfined", NULL, GFP_KERNEL);
|
||||
if (!ns->unconfined)
|
||||
goto fail_unconfined;
|
||||
|
||||
ns->unconfined->flags = PFLAG_IX_ON_NAME_ERROR |
|
||||
PFLAG_IMMUTABLE | PFLAG_NS_COUNT;
|
||||
ns->unconfined->label.flags |= FLAG_IX_ON_NAME_ERROR |
|
||||
FLAG_IMMUTIBLE | FLAG_NS_COUNT | FLAG_UNCONFINED;
|
||||
ns->unconfined->mode = APPARMOR_UNCONFINED;
|
||||
|
||||
/* ns and ns->unconfined share ns->unconfined refcount */
|
||||
|
@ -115,6 +118,8 @@ static struct aa_ns *alloc_ns(const char *prefix, const char *name)
|
|||
|
||||
atomic_set(&ns->uniq_null, 0);
|
||||
|
||||
aa_labelset_init(&ns->labels);
|
||||
|
||||
return ns;
|
||||
|
||||
fail_unconfined:
|
||||
|
@ -137,6 +142,7 @@ void aa_free_ns(struct aa_ns *ns)
|
|||
return;
|
||||
|
||||
aa_policy_destroy(&ns->base);
|
||||
aa_labelset_destroy(&ns->labels);
|
||||
aa_put_ns(ns->parent);
|
||||
|
||||
ns->unconfined->ns = NULL;
|
||||
|
@ -181,6 +187,60 @@ struct aa_ns *aa_find_ns(struct aa_ns *root, const char *name)
|
|||
return aa_findn_ns(root, name, strlen(name));
|
||||
}
|
||||
|
||||
/**
|
||||
* __aa_lookupn_ns - lookup the namespace matching @hname
|
||||
* @base: base list to start looking up profile name from (NOT NULL)
|
||||
* @hname: hierarchical ns name (NOT NULL)
|
||||
* @n: length of @hname
|
||||
*
|
||||
* Requires: rcu_read_lock be held
|
||||
*
|
||||
* Returns: unrefcounted ns pointer or NULL if not found
|
||||
*
|
||||
* Do a relative name lookup, recursing through profile tree.
|
||||
*/
|
||||
struct aa_ns *__aa_lookupn_ns(struct aa_ns *view, const char *hname, size_t n)
|
||||
{
|
||||
struct aa_ns *ns = view;
|
||||
const char *split;
|
||||
|
||||
for (split = strnstr(hname, "//", n); split;
|
||||
split = strnstr(hname, "//", n)) {
|
||||
ns = __aa_findn_ns(&ns->sub_ns, hname, split - hname);
|
||||
if (!ns)
|
||||
return NULL;
|
||||
|
||||
n -= split + 2 - hname;
|
||||
hname = split + 2;
|
||||
}
|
||||
|
||||
if (n)
|
||||
return __aa_findn_ns(&ns->sub_ns, hname, n);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_lookupn_ns - look up a policy namespace relative to @view
|
||||
* @view: namespace to search in (NOT NULL)
|
||||
* @name: name of namespace to find (NOT NULL)
|
||||
* @n: length of @name
|
||||
*
|
||||
* Returns: a refcounted namespace on the list, or NULL if no namespace
|
||||
* called @name exists.
|
||||
*
|
||||
* refcount released by caller
|
||||
*/
|
||||
struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n)
|
||||
{
|
||||
struct aa_ns *ns = NULL;
|
||||
|
||||
rcu_read_lock();
|
||||
ns = aa_get_ns(__aa_lookupn_ns(view, name, n));
|
||||
rcu_read_unlock();
|
||||
|
||||
return ns;
|
||||
}
|
||||
|
||||
static struct aa_ns *__aa_create_ns(struct aa_ns *parent, const char *name,
|
||||
struct dentry *dir)
|
||||
{
|
||||
|
@ -195,7 +255,7 @@ static struct aa_ns *__aa_create_ns(struct aa_ns *parent, const char *name,
|
|||
if (!ns)
|
||||
return NULL;
|
||||
mutex_lock(&ns->lock);
|
||||
error = __aa_fs_ns_mkdir(ns, ns_subns_dir(parent), name);
|
||||
error = __aafs_ns_mkdir(ns, ns_subns_dir(parent), name, dir);
|
||||
if (error) {
|
||||
AA_ERROR("Failed to create interface for ns %s\n",
|
||||
ns->base.name);
|
||||
|
@ -281,9 +341,15 @@ static void destroy_ns(struct aa_ns *ns)
|
|||
/* release all sub namespaces */
|
||||
__ns_list_release(&ns->sub_ns);
|
||||
|
||||
if (ns->parent)
|
||||
__aa_update_proxy(ns->unconfined, ns->parent->unconfined);
|
||||
__aa_fs_ns_rmdir(ns);
|
||||
if (ns->parent) {
|
||||
unsigned long flags;
|
||||
|
||||
write_lock_irqsave(&ns->labels.lock, flags);
|
||||
__aa_proxy_redirect(ns_unconfined(ns),
|
||||
ns_unconfined(ns->parent));
|
||||
write_unlock_irqrestore(&ns->labels.lock, flags);
|
||||
}
|
||||
__aafs_ns_rmdir(ns);
|
||||
mutex_unlock(&ns->lock);
|
||||
}
|
||||
|
||||
|
|
|
@ -26,6 +26,7 @@
|
|||
#include "include/context.h"
|
||||
#include "include/crypto.h"
|
||||
#include "include/match.h"
|
||||
#include "include/path.h"
|
||||
#include "include/policy.h"
|
||||
#include "include/policy_unpack.h"
|
||||
|
||||
|
@ -107,7 +108,7 @@ static int audit_iface(struct aa_profile *new, const char *ns_name,
|
|||
const char *name, const char *info, struct aa_ext *e,
|
||||
int error)
|
||||
{
|
||||
struct aa_profile *profile = __aa_current_profile();
|
||||
struct aa_profile *profile = labels_profile(aa_current_raw_label());
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, NULL);
|
||||
if (e)
|
||||
aad(&sa)->iface.pos = e->pos - e->start;
|
||||
|
@ -122,16 +123,73 @@ static int audit_iface(struct aa_profile *new, const char *ns_name,
|
|||
return aa_audit(AUDIT_APPARMOR_STATUS, profile, &sa, audit_cb);
|
||||
}
|
||||
|
||||
void __aa_loaddata_update(struct aa_loaddata *data, long revision)
|
||||
{
|
||||
AA_BUG(!data);
|
||||
AA_BUG(!data->ns);
|
||||
AA_BUG(!data->dents[AAFS_LOADDATA_REVISION]);
|
||||
AA_BUG(!mutex_is_locked(&data->ns->lock));
|
||||
AA_BUG(data->revision > revision);
|
||||
|
||||
data->revision = revision;
|
||||
d_inode(data->dents[AAFS_LOADDATA_DIR])->i_mtime =
|
||||
current_time(d_inode(data->dents[AAFS_LOADDATA_DIR]));
|
||||
d_inode(data->dents[AAFS_LOADDATA_REVISION])->i_mtime =
|
||||
current_time(d_inode(data->dents[AAFS_LOADDATA_REVISION]));
|
||||
}
|
||||
|
||||
bool aa_rawdata_eq(struct aa_loaddata *l, struct aa_loaddata *r)
|
||||
{
|
||||
if (l->size != r->size)
|
||||
return false;
|
||||
if (aa_g_hash_policy && memcmp(l->hash, r->hash, aa_hash_size()) != 0)
|
||||
return false;
|
||||
return memcmp(l->data, r->data, r->size) == 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* need to take the ns mutex lock which is NOT safe most places that
|
||||
* put_loaddata is called, so we have to delay freeing it
|
||||
*/
|
||||
static void do_loaddata_free(struct work_struct *work)
|
||||
{
|
||||
struct aa_loaddata *d = container_of(work, struct aa_loaddata, work);
|
||||
struct aa_ns *ns = aa_get_ns(d->ns);
|
||||
|
||||
if (ns) {
|
||||
mutex_lock(&ns->lock);
|
||||
__aa_fs_remove_rawdata(d);
|
||||
mutex_unlock(&ns->lock);
|
||||
aa_put_ns(ns);
|
||||
}
|
||||
|
||||
kzfree(d->hash);
|
||||
kfree(d->name);
|
||||
kvfree(d);
|
||||
}
|
||||
|
||||
void aa_loaddata_kref(struct kref *kref)
|
||||
{
|
||||
struct aa_loaddata *d = container_of(kref, struct aa_loaddata, count);
|
||||
|
||||
if (d) {
|
||||
kzfree(d->hash);
|
||||
kvfree(d);
|
||||
INIT_WORK(&d->work, do_loaddata_free);
|
||||
schedule_work(&d->work);
|
||||
}
|
||||
}
|
||||
|
||||
struct aa_loaddata *aa_loaddata_alloc(size_t size)
|
||||
{
|
||||
struct aa_loaddata *d = kvzalloc(sizeof(*d) + size, GFP_KERNEL);
|
||||
|
||||
if (d == NULL)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
kref_init(&d->count);
|
||||
INIT_LIST_HEAD(&d->list);
|
||||
|
||||
return d;
|
||||
}
|
||||
|
||||
/* test if read will be in packed data bounds */
|
||||
static bool inbounds(struct aa_ext *e, size_t size)
|
||||
{
|
||||
|
@ -408,7 +466,7 @@ static bool unpack_trans_table(struct aa_ext *e, struct aa_profile *profile)
|
|||
profile->file.trans.size = size;
|
||||
for (i = 0; i < size; i++) {
|
||||
char *str;
|
||||
int c, j, size2 = unpack_strdup(e, &str, NULL);
|
||||
int c, j, pos, size2 = unpack_strdup(e, &str, NULL);
|
||||
/* unpack_strdup verifies that the last character is
|
||||
* null termination byte.
|
||||
*/
|
||||
|
@ -420,19 +478,25 @@ static bool unpack_trans_table(struct aa_ext *e, struct aa_profile *profile)
|
|||
goto fail;
|
||||
|
||||
/* count internal # of internal \0 */
|
||||
for (c = j = 0; j < size2 - 2; j++) {
|
||||
if (!str[j])
|
||||
for (c = j = 0; j < size2 - 1; j++) {
|
||||
if (!str[j]) {
|
||||
pos = j;
|
||||
c++;
|
||||
}
|
||||
}
|
||||
if (*str == ':') {
|
||||
/* first character after : must be valid */
|
||||
if (!str[1])
|
||||
goto fail;
|
||||
/* beginning with : requires an embedded \0,
|
||||
* verify that exactly 1 internal \0 exists
|
||||
* trailing \0 already verified by unpack_strdup
|
||||
*
|
||||
* convert \0 back to : for label_parse
|
||||
*/
|
||||
if (c != 1)
|
||||
goto fail;
|
||||
/* first character after : must be valid */
|
||||
if (!str[1])
|
||||
if (c == 1)
|
||||
str[pos] = ':';
|
||||
else if (c > 1)
|
||||
goto fail;
|
||||
} else if (c)
|
||||
/* fail - all other cases with embedded \0 */
|
||||
|
@ -545,7 +609,7 @@ static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name)
|
|||
name = tmpname;
|
||||
}
|
||||
|
||||
profile = aa_alloc_profile(name, GFP_KERNEL);
|
||||
profile = aa_alloc_profile(name, NULL, GFP_KERNEL);
|
||||
if (!profile)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
|
@ -569,13 +633,16 @@ static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name)
|
|||
profile->xmatch_len = tmp;
|
||||
}
|
||||
|
||||
/* disconnected attachment string is optional */
|
||||
(void) unpack_str(e, &profile->disconnected, "disconnected");
|
||||
|
||||
/* per profile debug flags (complain, audit) */
|
||||
if (!unpack_nameX(e, AA_STRUCT, "flags"))
|
||||
goto fail;
|
||||
if (!unpack_u32(e, &tmp, NULL))
|
||||
goto fail;
|
||||
if (tmp & PACKED_FLAG_HAT)
|
||||
profile->flags |= PFLAG_HAT;
|
||||
profile->label.flags |= FLAG_HAT;
|
||||
if (!unpack_u32(e, &tmp, NULL))
|
||||
goto fail;
|
||||
if (tmp == PACKED_MODE_COMPLAIN || (e->version & FORCE_COMPLAIN_FLAG))
|
||||
|
@ -594,10 +661,11 @@ static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name)
|
|||
|
||||
/* path_flags is optional */
|
||||
if (unpack_u32(e, &profile->path_flags, "path_flags"))
|
||||
profile->path_flags |= profile->flags & PFLAG_MEDIATE_DELETED;
|
||||
profile->path_flags |= profile->label.flags &
|
||||
PATH_MEDIATE_DELETED;
|
||||
else
|
||||
/* set a default value if path_flags field is not present */
|
||||
profile->path_flags = PFLAG_MEDIATE_DELETED;
|
||||
profile->path_flags = PATH_MEDIATE_DELETED;
|
||||
|
||||
if (!unpack_u32(e, &(profile->caps.allow.cap[0]), NULL))
|
||||
goto fail;
|
||||
|
|
|
@ -34,50 +34,41 @@
|
|||
*
|
||||
* Returns: size of string placed in @string else error code on failure
|
||||
*/
|
||||
int aa_getprocattr(struct aa_profile *profile, char **string)
|
||||
int aa_getprocattr(struct aa_label *label, char **string)
|
||||
{
|
||||
char *str;
|
||||
int len = 0, mode_len = 0, ns_len = 0, name_len;
|
||||
const char *mode_str = aa_profile_mode_names[profile->mode];
|
||||
const char *ns_name = NULL;
|
||||
struct aa_ns *ns = profile->ns;
|
||||
struct aa_ns *current_ns = __aa_current_profile()->ns;
|
||||
char *s;
|
||||
struct aa_ns *ns = labels_ns(label);
|
||||
struct aa_ns *current_ns = aa_get_current_ns();
|
||||
int len;
|
||||
|
||||
if (!aa_ns_visible(current_ns, ns, true))
|
||||
if (!aa_ns_visible(current_ns, ns, true)) {
|
||||
aa_put_ns(current_ns);
|
||||
return -EACCES;
|
||||
|
||||
ns_name = aa_ns_name(current_ns, ns, true);
|
||||
ns_len = strlen(ns_name);
|
||||
|
||||
/* if the visible ns_name is > 0 increase size for : :// seperator */
|
||||
if (ns_len)
|
||||
ns_len += 4;
|
||||
|
||||
/* unconfined profiles don't have a mode string appended */
|
||||
if (!unconfined(profile))
|
||||
mode_len = strlen(mode_str) + 3; /* + 3 for _() */
|
||||
|
||||
name_len = strlen(profile->base.hname);
|
||||
len = mode_len + ns_len + name_len + 1; /* + 1 for \n */
|
||||
s = str = kmalloc(len + 1, GFP_KERNEL); /* + 1 \0 */
|
||||
if (!str)
|
||||
return -ENOMEM;
|
||||
|
||||
if (ns_len) {
|
||||
/* skip over prefix current_ns->base.hname and separating // */
|
||||
sprintf(s, ":%s://", ns_name);
|
||||
s += ns_len;
|
||||
}
|
||||
if (unconfined(profile))
|
||||
/* mode string not being appended */
|
||||
sprintf(s, "%s\n", profile->base.hname);
|
||||
else
|
||||
sprintf(s, "%s (%s)\n", profile->base.hname, mode_str);
|
||||
*string = str;
|
||||
|
||||
/* NOTE: len does not include \0 of string, not saved as part of file */
|
||||
return len;
|
||||
len = aa_label_snxprint(NULL, 0, current_ns, label,
|
||||
FLAG_SHOW_MODE | FLAG_VIEW_SUBNS |
|
||||
FLAG_HIDDEN_UNCONFINED);
|
||||
AA_BUG(len < 0);
|
||||
|
||||
*string = kmalloc(len + 2, GFP_KERNEL);
|
||||
if (!*string) {
|
||||
aa_put_ns(current_ns);
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
len = aa_label_snxprint(*string, len + 2, current_ns, label,
|
||||
FLAG_SHOW_MODE | FLAG_VIEW_SUBNS |
|
||||
FLAG_HIDDEN_UNCONFINED);
|
||||
if (len < 0) {
|
||||
aa_put_ns(current_ns);
|
||||
return len;
|
||||
}
|
||||
|
||||
(*string)[len] = '\n';
|
||||
(*string)[len + 1] = 0;
|
||||
|
||||
aa_put_ns(current_ns);
|
||||
return len + 1;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -108,11 +99,11 @@ static char *split_token_from_name(const char *op, char *args, u64 *token)
|
|||
* aa_setprocattr_chagnehat - handle procattr interface to change_hat
|
||||
* @args: args received from writing to /proc/<pid>/attr/current (NOT NULL)
|
||||
* @size: size of the args
|
||||
* @test: true if this is a test of change_hat permissions
|
||||
* @flags: set of flags governing behavior
|
||||
*
|
||||
* Returns: %0 or error code if change_hat fails
|
||||
*/
|
||||
int aa_setprocattr_changehat(char *args, size_t size, int test)
|
||||
int aa_setprocattr_changehat(char *args, size_t size, int flags)
|
||||
{
|
||||
char *hat;
|
||||
u64 token;
|
||||
|
@ -147,5 +138,5 @@ int aa_setprocattr_changehat(char *args, size_t size, int test)
|
|||
AA_DEBUG("%s: (pid %d) Magic 0x%llx count %d Hat '%s'\n",
|
||||
__func__, current->pid, token, count, "<NULL>");
|
||||
|
||||
return aa_change_hat(hats, count, token, test);
|
||||
return aa_change_hat(hats, count, token, flags);
|
||||
}
|
||||
|
|
|
@ -13,6 +13,7 @@
|
|||
*/
|
||||
|
||||
#include <linux/audit.h>
|
||||
#include <linux/security.h>
|
||||
|
||||
#include "include/audit.h"
|
||||
#include "include/context.h"
|
||||
|
@ -24,8 +25,8 @@
|
|||
*/
|
||||
#include "rlim_names.h"
|
||||
|
||||
struct aa_fs_entry aa_fs_entry_rlimit[] = {
|
||||
AA_FS_FILE_STRING("mask", AA_FS_RLIMIT_MASK),
|
||||
struct aa_sfs_entry aa_sfs_entry_rlimit[] = {
|
||||
AA_SFS_FILE_STRING("mask", AA_SFS_RLIMIT_MASK),
|
||||
{ }
|
||||
};
|
||||
|
||||
|
@ -36,6 +37,11 @@ static void audit_cb(struct audit_buffer *ab, void *va)
|
|||
|
||||
audit_log_format(ab, " rlimit=%s value=%lu",
|
||||
rlim_names[aad(sa)->rlim.rlim], aad(sa)->rlim.max);
|
||||
if (aad(sa)->peer) {
|
||||
audit_log_format(ab, " peer=");
|
||||
aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
|
||||
FLAGS_NONE, GFP_ATOMIC);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -48,13 +54,17 @@ static void audit_cb(struct audit_buffer *ab, void *va)
|
|||
* Returns: 0 or sa->error else other error code on failure
|
||||
*/
|
||||
static int audit_resource(struct aa_profile *profile, unsigned int resource,
|
||||
unsigned long value, int error)
|
||||
unsigned long value, struct aa_label *peer,
|
||||
const char *info, int error)
|
||||
{
|
||||
DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_SETRLIMIT);
|
||||
|
||||
aad(&sa)->rlim.rlim = resource;
|
||||
aad(&sa)->rlim.max = value;
|
||||
aad(&sa)->peer = peer;
|
||||
aad(&sa)->info = info;
|
||||
aad(&sa)->error = error;
|
||||
|
||||
return aa_audit(AUDIT_APPARMOR_AUTO, profile, &sa, audit_cb);
|
||||
}
|
||||
|
||||
|
@ -72,9 +82,21 @@ int aa_map_resource(int resource)
|
|||
return rlim_map[resource];
|
||||
}
|
||||
|
||||
static int profile_setrlimit(struct aa_profile *profile, unsigned int resource,
|
||||
struct rlimit *new_rlim)
|
||||
{
|
||||
int e = 0;
|
||||
|
||||
if (profile->rlimits.mask & (1 << resource) && new_rlim->rlim_max >
|
||||
profile->rlimits.limits[resource].rlim_max)
|
||||
e = -EACCES;
|
||||
return audit_resource(profile, resource, new_rlim->rlim_max, NULL, NULL,
|
||||
e);
|
||||
}
|
||||
|
||||
/**
|
||||
* aa_task_setrlimit - test permission to set an rlimit
|
||||
* @profile - profile confining the task (NOT NULL)
|
||||
* @label - label confining the task (NOT NULL)
|
||||
* @task - task the resource is being set on
|
||||
* @resource - the resource being set
|
||||
* @new_rlim - the new resource limit (NOT NULL)
|
||||
|
@ -83,14 +105,15 @@ int aa_map_resource(int resource)
|
|||
*
|
||||
* Returns: 0 or error code if setting resource failed
|
||||
*/
|
||||
int aa_task_setrlimit(struct aa_profile *profile, struct task_struct *task,
|
||||
int aa_task_setrlimit(struct aa_label *label, struct task_struct *task,
|
||||
unsigned int resource, struct rlimit *new_rlim)
|
||||
{
|
||||
struct aa_profile *task_profile;
|
||||
struct aa_profile *profile;
|
||||
struct aa_label *peer;
|
||||
int error = 0;
|
||||
|
||||
rcu_read_lock();
|
||||
task_profile = aa_get_profile(aa_cred_profile(__task_cred(task)));
|
||||
peer = aa_get_newest_cred_label(__task_cred(task));
|
||||
rcu_read_unlock();
|
||||
|
||||
/* TODO: extend resource control to handle other (non current)
|
||||
|
@ -99,53 +122,70 @@ int aa_task_setrlimit(struct aa_profile *profile, struct task_struct *task,
|
|||
* the same profile or that the task setting the resource of another
|
||||
* task has CAP_SYS_RESOURCE.
|
||||
*/
|
||||
if ((profile != task_profile &&
|
||||
aa_capable(profile, CAP_SYS_RESOURCE, 1)) ||
|
||||
(profile->rlimits.mask & (1 << resource) &&
|
||||
new_rlim->rlim_max > profile->rlimits.limits[resource].rlim_max))
|
||||
error = -EACCES;
|
||||
|
||||
aa_put_profile(task_profile);
|
||||
if (label != peer &&
|
||||
!aa_capable(label, CAP_SYS_RESOURCE, SECURITY_CAP_NOAUDIT))
|
||||
error = fn_for_each(label, profile,
|
||||
audit_resource(profile, resource,
|
||||
new_rlim->rlim_max, peer,
|
||||
"cap_sys_resoure", -EACCES));
|
||||
else
|
||||
error = fn_for_each_confined(label, profile,
|
||||
profile_setrlimit(profile, resource, new_rlim));
|
||||
aa_put_label(peer);
|
||||
|
||||
return audit_resource(profile, resource, new_rlim->rlim_max, error);
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
* __aa_transition_rlimits - apply new profile rlimits
|
||||
* @old: old profile on task (NOT NULL)
|
||||
* @new: new profile with rlimits to apply (NOT NULL)
|
||||
* @old_l: old label on task (NOT NULL)
|
||||
* @new_l: new label with rlimits to apply (NOT NULL)
|
||||
*/
|
||||
void __aa_transition_rlimits(struct aa_profile *old, struct aa_profile *new)
|
||||
void __aa_transition_rlimits(struct aa_label *old_l, struct aa_label *new_l)
|
||||
{
|
||||
unsigned int mask = 0;
|
||||
struct rlimit *rlim, *initrlim;
|
||||
int i;
|
||||
struct aa_profile *old, *new;
|
||||
struct label_it i;
|
||||
|
||||
/* for any rlimits the profile controlled reset the soft limit
|
||||
* to the less of the tasks hard limit and the init tasks soft limit
|
||||
old = labels_profile(old_l);
|
||||
new = labels_profile(new_l);
|
||||
|
||||
/* for any rlimits the profile controlled, reset the soft limit
|
||||
* to the lesser of the tasks hard limit and the init tasks soft limit
|
||||
*/
|
||||
if (old->rlimits.mask) {
|
||||
for (i = 0, mask = 1; i < RLIM_NLIMITS; i++, mask <<= 1) {
|
||||
if (old->rlimits.mask & mask) {
|
||||
rlim = current->signal->rlim + i;
|
||||
initrlim = init_task.signal->rlim + i;
|
||||
rlim->rlim_cur = min(rlim->rlim_max,
|
||||
initrlim->rlim_cur);
|
||||
label_for_each_confined(i, old_l, old) {
|
||||
if (old->rlimits.mask) {
|
||||
int j;
|
||||
|
||||
for (j = 0, mask = 1; j < RLIM_NLIMITS; j++,
|
||||
mask <<= 1) {
|
||||
if (old->rlimits.mask & mask) {
|
||||
rlim = current->signal->rlim + j;
|
||||
initrlim = init_task.signal->rlim + j;
|
||||
rlim->rlim_cur = min(rlim->rlim_max,
|
||||
initrlim->rlim_cur);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* set any new hard limits as dictated by the new profile */
|
||||
if (!new->rlimits.mask)
|
||||
return;
|
||||
for (i = 0, mask = 1; i < RLIM_NLIMITS; i++, mask <<= 1) {
|
||||
if (!(new->rlimits.mask & mask))
|
||||
continue;
|
||||
label_for_each_confined(i, new_l, new) {
|
||||
int j;
|
||||
|
||||
rlim = current->signal->rlim + i;
|
||||
rlim->rlim_max = min(rlim->rlim_max,
|
||||
new->rlimits.limits[i].rlim_max);
|
||||
/* soft limit should not exceed hard limit */
|
||||
rlim->rlim_cur = min(rlim->rlim_cur, rlim->rlim_max);
|
||||
if (!new->rlimits.mask)
|
||||
continue;
|
||||
for (j = 0, mask = 1; j < RLIM_NLIMITS; j++, mask <<= 1) {
|
||||
if (!(new->rlimits.mask & mask))
|
||||
continue;
|
||||
|
||||
rlim = current->signal->rlim + j;
|
||||
rlim->rlim_max = min(rlim->rlim_max,
|
||||
new->rlimits.limits[j].rlim_max);
|
||||
/* soft limit should not exceed hard limit */
|
||||
rlim->rlim_cur = min(rlim->rlim_cur, rlim->rlim_max);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
144
security/inode.c
144
security/inode.c
|
@ -26,11 +26,31 @@
|
|||
static struct vfsmount *mount;
|
||||
static int mount_count;
|
||||
|
||||
static void securityfs_evict_inode(struct inode *inode)
|
||||
{
|
||||
truncate_inode_pages_final(&inode->i_data);
|
||||
clear_inode(inode);
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
kfree(inode->i_link);
|
||||
}
|
||||
|
||||
static const struct super_operations securityfs_super_operations = {
|
||||
.statfs = simple_statfs,
|
||||
.evict_inode = securityfs_evict_inode,
|
||||
};
|
||||
|
||||
static int fill_super(struct super_block *sb, void *data, int silent)
|
||||
{
|
||||
static const struct tree_descr files[] = {{""}};
|
||||
int error;
|
||||
|
||||
return simple_fill_super(sb, SECURITYFS_MAGIC, files);
|
||||
error = simple_fill_super(sb, SECURITYFS_MAGIC, files);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
sb->s_op = &securityfs_super_operations;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct dentry *get_sb(struct file_system_type *fs_type,
|
||||
|
@ -48,7 +68,7 @@ static struct file_system_type fs_type = {
|
|||
};
|
||||
|
||||
/**
|
||||
* securityfs_create_file - create a file in the securityfs filesystem
|
||||
* securityfs_create_dentry - create a dentry in the securityfs filesystem
|
||||
*
|
||||
* @name: a pointer to a string containing the name of the file to create.
|
||||
* @mode: the permission that the file should have
|
||||
|
@ -60,34 +80,35 @@ static struct file_system_type fs_type = {
|
|||
* the open() call.
|
||||
* @fops: a pointer to a struct file_operations that should be used for
|
||||
* this file.
|
||||
* @iops: a point to a struct of inode_operations that should be used for
|
||||
* this file/dir
|
||||
*
|
||||
* This is the basic "create a file" function for securityfs. It allows for a
|
||||
* wide range of flexibility in creating a file, or a directory (if you
|
||||
* want to create a directory, the securityfs_create_dir() function is
|
||||
* recommended to be used instead).
|
||||
* This is the basic "create a file/dir/symlink" function for
|
||||
* securityfs. It allows for a wide range of flexibility in creating
|
||||
* a file, or a directory (if you want to create a directory, the
|
||||
* securityfs_create_dir() function is recommended to be used
|
||||
* instead).
|
||||
*
|
||||
* This function returns a pointer to a dentry if it succeeds. This
|
||||
* pointer must be passed to the securityfs_remove() function when the file is
|
||||
* to be removed (no automatic cleanup happens if your module is unloaded,
|
||||
* you are responsible here). If an error occurs, the function will return
|
||||
* the error value (via ERR_PTR).
|
||||
* pointer must be passed to the securityfs_remove() function when the
|
||||
* file is to be removed (no automatic cleanup happens if your module
|
||||
* is unloaded, you are responsible here). If an error occurs, the
|
||||
* function will return the error value (via ERR_PTR).
|
||||
*
|
||||
* If securityfs is not enabled in the kernel, the value %-ENODEV is
|
||||
* returned.
|
||||
*/
|
||||
struct dentry *securityfs_create_file(const char *name, umode_t mode,
|
||||
struct dentry *parent, void *data,
|
||||
const struct file_operations *fops)
|
||||
static struct dentry *securityfs_create_dentry(const char *name, umode_t mode,
|
||||
struct dentry *parent, void *data,
|
||||
const struct file_operations *fops,
|
||||
const struct inode_operations *iops)
|
||||
{
|
||||
struct dentry *dentry;
|
||||
int is_dir = S_ISDIR(mode);
|
||||
struct inode *dir, *inode;
|
||||
int error;
|
||||
|
||||
if (!is_dir) {
|
||||
BUG_ON(!fops);
|
||||
if (!(mode & S_IFMT))
|
||||
mode = (mode & S_IALLUGO) | S_IFREG;
|
||||
}
|
||||
|
||||
pr_debug("securityfs: creating file '%s'\n",name);
|
||||
|
||||
|
@ -120,11 +141,14 @@ struct dentry *securityfs_create_file(const char *name, umode_t mode,
|
|||
inode->i_mode = mode;
|
||||
inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode);
|
||||
inode->i_private = data;
|
||||
if (is_dir) {
|
||||
if (S_ISDIR(mode)) {
|
||||
inode->i_op = &simple_dir_inode_operations;
|
||||
inode->i_fop = &simple_dir_operations;
|
||||
inc_nlink(inode);
|
||||
inc_nlink(dir);
|
||||
} else if (S_ISLNK(mode)) {
|
||||
inode->i_op = iops ? iops : &simple_symlink_inode_operations;
|
||||
inode->i_link = data;
|
||||
} else {
|
||||
inode->i_fop = fops;
|
||||
}
|
||||
|
@ -141,6 +165,38 @@ out:
|
|||
simple_release_fs(&mount, &mount_count);
|
||||
return dentry;
|
||||
}
|
||||
|
||||
/**
|
||||
* securityfs_create_file - create a file in the securityfs filesystem
|
||||
*
|
||||
* @name: a pointer to a string containing the name of the file to create.
|
||||
* @mode: the permission that the file should have
|
||||
* @parent: a pointer to the parent dentry for this file. This should be a
|
||||
* directory dentry if set. If this parameter is %NULL, then the
|
||||
* file will be created in the root of the securityfs filesystem.
|
||||
* @data: a pointer to something that the caller will want to get to later
|
||||
* on. The inode.i_private pointer will point to this value on
|
||||
* the open() call.
|
||||
* @fops: a pointer to a struct file_operations that should be used for
|
||||
* this file.
|
||||
*
|
||||
* This function creates a file in securityfs with the given @name.
|
||||
*
|
||||
* This function returns a pointer to a dentry if it succeeds. This
|
||||
* pointer must be passed to the securityfs_remove() function when the file is
|
||||
* to be removed (no automatic cleanup happens if your module is unloaded,
|
||||
* you are responsible here). If an error occurs, the function will return
|
||||
* the error value (via ERR_PTR).
|
||||
*
|
||||
* If securityfs is not enabled in the kernel, the value %-ENODEV is
|
||||
* returned.
|
||||
*/
|
||||
struct dentry *securityfs_create_file(const char *name, umode_t mode,
|
||||
struct dentry *parent, void *data,
|
||||
const struct file_operations *fops)
|
||||
{
|
||||
return securityfs_create_dentry(name, mode, parent, data, fops, NULL);
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(securityfs_create_file);
|
||||
|
||||
/**
|
||||
|
@ -165,12 +221,58 @@ EXPORT_SYMBOL_GPL(securityfs_create_file);
|
|||
*/
|
||||
struct dentry *securityfs_create_dir(const char *name, struct dentry *parent)
|
||||
{
|
||||
return securityfs_create_file(name,
|
||||
S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO,
|
||||
parent, NULL, NULL);
|
||||
return securityfs_create_file(name, S_IFDIR | 0755, parent, NULL, NULL);
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(securityfs_create_dir);
|
||||
|
||||
/**
|
||||
* securityfs_create_symlink - create a symlink in the securityfs filesystem
|
||||
*
|
||||
* @name: a pointer to a string containing the name of the symlink to
|
||||
* create.
|
||||
* @parent: a pointer to the parent dentry for the symlink. This should be a
|
||||
* directory dentry if set. If this parameter is %NULL, then the
|
||||
* directory will be created in the root of the securityfs filesystem.
|
||||
* @target: a pointer to a string containing the name of the symlink's target.
|
||||
* If this parameter is %NULL, then the @iops parameter needs to be
|
||||
* setup to handle .readlink and .get_link inode_operations.
|
||||
* @iops: a pointer to the struct inode_operations to use for the symlink. If
|
||||
* this parameter is %NULL, then the default simple_symlink_inode
|
||||
* operations will be used.
|
||||
*
|
||||
* This function creates a symlink in securityfs with the given @name.
|
||||
*
|
||||
* This function returns a pointer to a dentry if it succeeds. This
|
||||
* pointer must be passed to the securityfs_remove() function when the file is
|
||||
* to be removed (no automatic cleanup happens if your module is unloaded,
|
||||
* you are responsible here). If an error occurs, the function will return
|
||||
* the error value (via ERR_PTR).
|
||||
*
|
||||
* If securityfs is not enabled in the kernel, the value %-ENODEV is
|
||||
* returned.
|
||||
*/
|
||||
struct dentry *securityfs_create_symlink(const char *name,
|
||||
struct dentry *parent,
|
||||
const char *target,
|
||||
const struct inode_operations *iops)
|
||||
{
|
||||
struct dentry *dent;
|
||||
char *link = NULL;
|
||||
|
||||
if (target) {
|
||||
link = kstrdup(target, GFP_KERNEL);
|
||||
if (!link)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
}
|
||||
dent = securityfs_create_dentry(name, S_IFLNK | 0444, parent,
|
||||
link, NULL, iops);
|
||||
if (IS_ERR(dent))
|
||||
kfree(link);
|
||||
|
||||
return dent;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(securityfs_create_symlink);
|
||||
|
||||
/**
|
||||
* securityfs_remove - removes a file or directory from the securityfs filesystem
|
||||
*
|
||||
|
|
|
@ -92,13 +92,13 @@ int asymmetric_verify(struct key *keyring, const char *sig,
|
|||
|
||||
siglen -= sizeof(*hdr);
|
||||
|
||||
if (siglen != __be16_to_cpu(hdr->sig_size))
|
||||
if (siglen != be16_to_cpu(hdr->sig_size))
|
||||
return -EBADMSG;
|
||||
|
||||
if (hdr->hash_algo >= HASH_ALGO__LAST)
|
||||
return -ENOPKG;
|
||||
|
||||
key = request_asymmetric_key(keyring, __be32_to_cpu(hdr->keyid));
|
||||
key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid));
|
||||
if (IS_ERR(key))
|
||||
return PTR_ERR(key);
|
||||
|
||||
|
|
|
@ -182,7 +182,7 @@ security_initcall(integrity_iintcache_init);
|
|||
*
|
||||
*/
|
||||
int integrity_kernel_read(struct file *file, loff_t offset,
|
||||
char *addr, unsigned long count)
|
||||
void *addr, unsigned long count)
|
||||
{
|
||||
mm_segment_t old_fs;
|
||||
char __user *buf = (char __user *)addr;
|
||||
|
|
|
@ -96,19 +96,19 @@ choice
|
|||
|
||||
config IMA_DEFAULT_HASH_SHA1
|
||||
bool "SHA1 (default)"
|
||||
depends on CRYPTO_SHA1
|
||||
depends on CRYPTO_SHA1=y
|
||||
|
||||
config IMA_DEFAULT_HASH_SHA256
|
||||
bool "SHA256"
|
||||
depends on CRYPTO_SHA256 && !IMA_TEMPLATE
|
||||
depends on CRYPTO_SHA256=y && !IMA_TEMPLATE
|
||||
|
||||
config IMA_DEFAULT_HASH_SHA512
|
||||
bool "SHA512"
|
||||
depends on CRYPTO_SHA512 && !IMA_TEMPLATE
|
||||
depends on CRYPTO_SHA512=y && !IMA_TEMPLATE
|
||||
|
||||
config IMA_DEFAULT_HASH_WP512
|
||||
bool "WP512"
|
||||
depends on CRYPTO_WP512 && !IMA_TEMPLATE
|
||||
depends on CRYPTO_WP512=y && !IMA_TEMPLATE
|
||||
endchoice
|
||||
|
||||
config IMA_DEFAULT_HASH
|
||||
|
@ -155,6 +155,14 @@ config IMA_APPRAISE
|
|||
<http://linux-ima.sourceforge.net>
|
||||
If unsure, say N.
|
||||
|
||||
config IMA_APPRAISE_BOOTPARAM
|
||||
bool "ima_appraise boot parameter"
|
||||
depends on IMA_APPRAISE
|
||||
default y
|
||||
help
|
||||
This option enables the different "ima_appraise=" modes
|
||||
(eg. fix, log) from the boot command line.
|
||||
|
||||
config IMA_TRUSTED_KEYRING
|
||||
bool "Require all keys on the .ima keyring be signed (deprecated)"
|
||||
depends on IMA_APPRAISE && SYSTEM_TRUSTED_KEYRING
|
||||
|
|
|
@ -172,17 +172,22 @@ static inline unsigned long ima_hash_key(u8 *digest)
|
|||
return hash_long(*digest, IMA_HASH_BITS);
|
||||
}
|
||||
|
||||
#define __ima_hooks(hook) \
|
||||
hook(NONE) \
|
||||
hook(FILE_CHECK) \
|
||||
hook(MMAP_CHECK) \
|
||||
hook(BPRM_CHECK) \
|
||||
hook(POST_SETATTR) \
|
||||
hook(MODULE_CHECK) \
|
||||
hook(FIRMWARE_CHECK) \
|
||||
hook(KEXEC_KERNEL_CHECK) \
|
||||
hook(KEXEC_INITRAMFS_CHECK) \
|
||||
hook(POLICY_CHECK) \
|
||||
hook(MAX_CHECK)
|
||||
#define __ima_hook_enumify(ENUM) ENUM,
|
||||
|
||||
enum ima_hooks {
|
||||
FILE_CHECK = 1,
|
||||
MMAP_CHECK,
|
||||
BPRM_CHECK,
|
||||
POST_SETATTR,
|
||||
MODULE_CHECK,
|
||||
FIRMWARE_CHECK,
|
||||
KEXEC_KERNEL_CHECK,
|
||||
KEXEC_INITRAMFS_CHECK,
|
||||
POLICY_CHECK,
|
||||
MAX_CHECK
|
||||
__ima_hooks(__ima_hook_enumify)
|
||||
};
|
||||
|
||||
/* LIM API function definitions */
|
||||
|
@ -284,7 +289,7 @@ static inline int ima_read_xattr(struct dentry *dentry,
|
|||
return 0;
|
||||
}
|
||||
|
||||
#endif
|
||||
#endif /* CONFIG_IMA_APPRAISE */
|
||||
|
||||
/* LSM based policy rules require audit */
|
||||
#ifdef CONFIG_IMA_LSM_RULES
|
||||
|
@ -306,12 +311,12 @@ static inline int security_filter_rule_match(u32 secid, u32 field, u32 op,
|
|||
{
|
||||
return -EINVAL;
|
||||
}
|
||||
#endif /* CONFIG_IMA_TRUSTED_KEYRING */
|
||||
#endif /* CONFIG_IMA_LSM_RULES */
|
||||
|
||||
#ifdef CONFIG_IMA_READ_POLICY
|
||||
#define POLICY_FILE_FLAGS (S_IWUSR | S_IRUSR)
|
||||
#else
|
||||
#define POLICY_FILE_FLAGS S_IWUSR
|
||||
#endif /* CONFIG_IMA_WRITE_POLICY */
|
||||
#endif /* CONFIG_IMA_READ_POLICY */
|
||||
|
||||
#endif /* __LINUX_IMA_H */
|
||||
|
|
|
@ -20,17 +20,29 @@
|
|||
|
||||
static int __init default_appraise_setup(char *str)
|
||||
{
|
||||
#ifdef CONFIG_IMA_APPRAISE_BOOTPARAM
|
||||
if (strncmp(str, "off", 3) == 0)
|
||||
ima_appraise = 0;
|
||||
else if (strncmp(str, "log", 3) == 0)
|
||||
ima_appraise = IMA_APPRAISE_LOG;
|
||||
else if (strncmp(str, "fix", 3) == 0)
|
||||
ima_appraise = IMA_APPRAISE_FIX;
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
__setup("ima_appraise=", default_appraise_setup);
|
||||
|
||||
/*
|
||||
* is_ima_appraise_enabled - return appraise status
|
||||
*
|
||||
* Only return enabled, if not in ima_appraise="fix" or "log" modes.
|
||||
*/
|
||||
bool is_ima_appraise_enabled(void)
|
||||
{
|
||||
return (ima_appraise & IMA_APPRAISE_ENFORCE) ? 1 : 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* ima_must_appraise - set appraise flag
|
||||
*
|
||||
|
@ -205,7 +217,8 @@ int ima_appraise_measurement(enum ima_hooks func,
|
|||
if (rc && rc != -ENODATA)
|
||||
goto out;
|
||||
|
||||
cause = "missing-hash";
|
||||
cause = iint->flags & IMA_DIGSIG_REQUIRED ?
|
||||
"IMA-signature-required" : "missing-hash";
|
||||
status = INTEGRITY_NOLABEL;
|
||||
if (opened & FILE_CREATED)
|
||||
iint->flags |= IMA_NEW_FILE;
|
||||
|
@ -228,6 +241,7 @@ int ima_appraise_measurement(enum ima_hooks func,
|
|||
case IMA_XATTR_DIGEST_NG:
|
||||
/* first byte contains algorithm id */
|
||||
hash_start = 1;
|
||||
/* fall through */
|
||||
case IMA_XATTR_DIGEST:
|
||||
if (iint->flags & IMA_DIGSIG_REQUIRED) {
|
||||
cause = "IMA-signature-required";
|
||||
|
|
|
@ -323,16 +323,11 @@ static ssize_t ima_write_policy(struct file *file, const char __user *buf,
|
|||
if (*ppos != 0)
|
||||
goto out;
|
||||
|
||||
result = -ENOMEM;
|
||||
data = kmalloc(datalen + 1, GFP_KERNEL);
|
||||
if (!data)
|
||||
data = memdup_user_nul(buf, datalen);
|
||||
if (IS_ERR(data)) {
|
||||
result = PTR_ERR(data);
|
||||
goto out;
|
||||
|
||||
*(data + datalen) = '\0';
|
||||
|
||||
result = -EFAULT;
|
||||
if (copy_from_user(data, buf, datalen))
|
||||
goto out_free;
|
||||
}
|
||||
|
||||
result = mutex_lock_interruptible(&ima_write_mutex);
|
||||
if (result < 0)
|
||||
|
|
|
@ -96,6 +96,8 @@ static struct ima_rule_entry dont_measure_rules[] __ro_after_init = {
|
|||
{.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
|
||||
{.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC,
|
||||
.flags = IMA_FSMAGIC},
|
||||
{.action = DONT_MEASURE, .fsmagic = CGROUP2_SUPER_MAGIC,
|
||||
.flags = IMA_FSMAGIC},
|
||||
{.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}
|
||||
};
|
||||
|
||||
|
@ -139,6 +141,7 @@ static struct ima_rule_entry default_appraise_rules[] __ro_after_init = {
|
|||
{.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
|
||||
{.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
|
||||
{.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
|
||||
{.action = DONT_APPRAISE, .fsmagic = CGROUP2_SUPER_MAGIC, .flags = IMA_FSMAGIC},
|
||||
#ifdef CONFIG_IMA_WRITE_POLICY
|
||||
{.action = APPRAISE, .func = POLICY_CHECK,
|
||||
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
||||
|
@ -153,6 +156,17 @@ static struct ima_rule_entry default_appraise_rules[] __ro_after_init = {
|
|||
#endif
|
||||
};
|
||||
|
||||
static struct ima_rule_entry secure_boot_rules[] __ro_after_init = {
|
||||
{.action = APPRAISE, .func = MODULE_CHECK,
|
||||
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
||||
{.action = APPRAISE, .func = FIRMWARE_CHECK,
|
||||
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
||||
{.action = APPRAISE, .func = KEXEC_KERNEL_CHECK,
|
||||
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
||||
{.action = APPRAISE, .func = POLICY_CHECK,
|
||||
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
||||
};
|
||||
|
||||
static LIST_HEAD(ima_default_rules);
|
||||
static LIST_HEAD(ima_policy_rules);
|
||||
static LIST_HEAD(ima_temp_rules);
|
||||
|
@ -170,19 +184,27 @@ static int __init default_measure_policy_setup(char *str)
|
|||
}
|
||||
__setup("ima_tcb", default_measure_policy_setup);
|
||||
|
||||
static bool ima_use_appraise_tcb __initdata;
|
||||
static bool ima_use_secure_boot __initdata;
|
||||
static int __init policy_setup(char *str)
|
||||
{
|
||||
if (ima_policy)
|
||||
return 1;
|
||||
char *p;
|
||||
|
||||
if (strcmp(str, "tcb") == 0)
|
||||
ima_policy = DEFAULT_TCB;
|
||||
while ((p = strsep(&str, " |\n")) != NULL) {
|
||||
if (*p == ' ')
|
||||
continue;
|
||||
if ((strcmp(p, "tcb") == 0) && !ima_policy)
|
||||
ima_policy = DEFAULT_TCB;
|
||||
else if (strcmp(p, "appraise_tcb") == 0)
|
||||
ima_use_appraise_tcb = 1;
|
||||
else if (strcmp(p, "secure_boot") == 0)
|
||||
ima_use_secure_boot = 1;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
__setup("ima_policy=", policy_setup);
|
||||
|
||||
static bool ima_use_appraise_tcb __initdata;
|
||||
static int __init default_appraise_policy_setup(char *str)
|
||||
{
|
||||
ima_use_appraise_tcb = 1;
|
||||
|
@ -405,12 +427,14 @@ void ima_update_policy_flag(void)
|
|||
*/
|
||||
void __init ima_init_policy(void)
|
||||
{
|
||||
int i, measure_entries, appraise_entries;
|
||||
int i, measure_entries, appraise_entries, secure_boot_entries;
|
||||
|
||||
/* if !ima_policy set entries = 0 so we load NO default rules */
|
||||
measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0;
|
||||
appraise_entries = ima_use_appraise_tcb ?
|
||||
ARRAY_SIZE(default_appraise_rules) : 0;
|
||||
secure_boot_entries = ima_use_secure_boot ?
|
||||
ARRAY_SIZE(secure_boot_rules) : 0;
|
||||
|
||||
for (i = 0; i < measure_entries; i++)
|
||||
list_add_tail(&dont_measure_rules[i].list, &ima_default_rules);
|
||||
|
@ -429,6 +453,14 @@ void __init ima_init_policy(void)
|
|||
break;
|
||||
}
|
||||
|
||||
/*
|
||||
* Insert the appraise rules requiring file signatures, prior to
|
||||
* any other appraise rules.
|
||||
*/
|
||||
for (i = 0; i < secure_boot_entries; i++)
|
||||
list_add_tail(&secure_boot_rules[i].list,
|
||||
&ima_default_rules);
|
||||
|
||||
for (i = 0; i < appraise_entries; i++) {
|
||||
list_add_tail(&default_appraise_rules[i].list,
|
||||
&ima_default_rules);
|
||||
|
@ -931,30 +963,17 @@ enum {
|
|||
mask_exec = 0, mask_write, mask_read, mask_append
|
||||
};
|
||||
|
||||
static char *mask_tokens[] = {
|
||||
static const char *const mask_tokens[] = {
|
||||
"MAY_EXEC",
|
||||
"MAY_WRITE",
|
||||
"MAY_READ",
|
||||
"MAY_APPEND"
|
||||
};
|
||||
|
||||
enum {
|
||||
func_file = 0, func_mmap, func_bprm,
|
||||
func_module, func_firmware, func_post,
|
||||
func_kexec_kernel, func_kexec_initramfs,
|
||||
func_policy
|
||||
};
|
||||
#define __ima_hook_stringify(str) (#str),
|
||||
|
||||
static char *func_tokens[] = {
|
||||
"FILE_CHECK",
|
||||
"MMAP_CHECK",
|
||||
"BPRM_CHECK",
|
||||
"MODULE_CHECK",
|
||||
"FIRMWARE_CHECK",
|
||||
"POST_SETATTR",
|
||||
"KEXEC_KERNEL_CHECK",
|
||||
"KEXEC_INITRAMFS_CHECK",
|
||||
"POLICY_CHECK"
|
||||
static const char *const func_tokens[] = {
|
||||
__ima_hooks(__ima_hook_stringify)
|
||||
};
|
||||
|
||||
void *ima_policy_start(struct seq_file *m, loff_t *pos)
|
||||
|
@ -991,49 +1010,16 @@ void ima_policy_stop(struct seq_file *m, void *v)
|
|||
|
||||
#define pt(token) policy_tokens[token + Opt_err].pattern
|
||||
#define mt(token) mask_tokens[token]
|
||||
#define ft(token) func_tokens[token]
|
||||
|
||||
/*
|
||||
* policy_func_show - display the ima_hooks policy rule
|
||||
*/
|
||||
static void policy_func_show(struct seq_file *m, enum ima_hooks func)
|
||||
{
|
||||
char tbuf[64] = {0,};
|
||||
|
||||
switch (func) {
|
||||
case FILE_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_file));
|
||||
break;
|
||||
case MMAP_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_mmap));
|
||||
break;
|
||||
case BPRM_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_bprm));
|
||||
break;
|
||||
case MODULE_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_module));
|
||||
break;
|
||||
case FIRMWARE_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_firmware));
|
||||
break;
|
||||
case POST_SETATTR:
|
||||
seq_printf(m, pt(Opt_func), ft(func_post));
|
||||
break;
|
||||
case KEXEC_KERNEL_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_kexec_kernel));
|
||||
break;
|
||||
case KEXEC_INITRAMFS_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_kexec_initramfs));
|
||||
break;
|
||||
case POLICY_CHECK:
|
||||
seq_printf(m, pt(Opt_func), ft(func_policy));
|
||||
break;
|
||||
default:
|
||||
snprintf(tbuf, sizeof(tbuf), "%d", func);
|
||||
seq_printf(m, pt(Opt_func), tbuf);
|
||||
break;
|
||||
}
|
||||
seq_puts(m, " ");
|
||||
if (func > 0 && func < MAX_CHECK)
|
||||
seq_printf(m, "func=%s ", func_tokens[func]);
|
||||
else
|
||||
seq_printf(m, "func=%d ", func);
|
||||
}
|
||||
|
||||
int ima_policy_show(struct seq_file *m, void *v)
|
||||
|
|
|
@ -81,7 +81,7 @@ static int get_binary_runtime_size(struct ima_template_entry *entry)
|
|||
size += sizeof(u32); /* pcr */
|
||||
size += sizeof(entry->digest);
|
||||
size += sizeof(int); /* template name size field */
|
||||
size += strlen(entry->template_desc->name) + 1;
|
||||
size += strlen(entry->template_desc->name);
|
||||
size += sizeof(entry->template_data_len);
|
||||
size += entry->template_data_len;
|
||||
return size;
|
||||
|
|
|
@ -19,6 +19,9 @@
|
|||
#include "ima.h"
|
||||
#include "ima_template_lib.h"
|
||||
|
||||
enum header_fields { HDR_PCR, HDR_DIGEST, HDR_TEMPLATE_NAME,
|
||||
HDR_TEMPLATE_DATA, HDR__LAST };
|
||||
|
||||
static struct ima_template_desc builtin_templates[] = {
|
||||
{.name = IMA_TEMPLATE_IMA_NAME, .fmt = IMA_TEMPLATE_IMA_FMT},
|
||||
{.name = "ima-ng", .fmt = "d-ng|n-ng"},
|
||||
|
@ -274,13 +277,6 @@ static int ima_restore_template_data(struct ima_template_desc *template_desc,
|
|||
int template_data_size,
|
||||
struct ima_template_entry **entry)
|
||||
{
|
||||
struct binary_field_data {
|
||||
u32 len;
|
||||
u8 data[0];
|
||||
} __packed;
|
||||
|
||||
struct binary_field_data *field_data;
|
||||
int offset = 0;
|
||||
int ret = 0;
|
||||
int i;
|
||||
|
||||
|
@ -290,30 +286,19 @@ static int ima_restore_template_data(struct ima_template_desc *template_desc,
|
|||
if (!*entry)
|
||||
return -ENOMEM;
|
||||
|
||||
ret = ima_parse_buf(template_data, template_data + template_data_size,
|
||||
NULL, template_desc->num_fields,
|
||||
(*entry)->template_data, NULL, NULL,
|
||||
ENFORCE_FIELDS | ENFORCE_BUFEND, "template data");
|
||||
if (ret < 0) {
|
||||
kfree(*entry);
|
||||
return ret;
|
||||
}
|
||||
|
||||
(*entry)->template_desc = template_desc;
|
||||
for (i = 0; i < template_desc->num_fields; i++) {
|
||||
field_data = template_data + offset;
|
||||
|
||||
/* Each field of the template data is prefixed with a length. */
|
||||
if (offset > (template_data_size - sizeof(*field_data))) {
|
||||
pr_err("Restoring the template field failed\n");
|
||||
ret = -EINVAL;
|
||||
break;
|
||||
}
|
||||
offset += sizeof(*field_data);
|
||||
|
||||
if (ima_canonical_fmt)
|
||||
field_data->len = le32_to_cpu(field_data->len);
|
||||
|
||||
if (offset > (template_data_size - field_data->len)) {
|
||||
pr_err("Restoring the template field data failed\n");
|
||||
ret = -EINVAL;
|
||||
break;
|
||||
}
|
||||
offset += field_data->len;
|
||||
|
||||
(*entry)->template_data[i].len = field_data->len;
|
||||
(*entry)->template_data_len += sizeof(field_data->len);
|
||||
struct ima_field_data *field_data = &(*entry)->template_data[i];
|
||||
u8 *data = field_data->data;
|
||||
|
||||
(*entry)->template_data[i].data =
|
||||
kzalloc(field_data->len + 1, GFP_KERNEL);
|
||||
|
@ -321,8 +306,8 @@ static int ima_restore_template_data(struct ima_template_desc *template_desc,
|
|||
ret = -ENOMEM;
|
||||
break;
|
||||
}
|
||||
memcpy((*entry)->template_data[i].data, field_data->data,
|
||||
field_data->len);
|
||||
memcpy((*entry)->template_data[i].data, data, field_data->len);
|
||||
(*entry)->template_data_len += sizeof(field_data->len);
|
||||
(*entry)->template_data_len += field_data->len;
|
||||
}
|
||||
|
||||
|
@ -337,27 +322,19 @@ static int ima_restore_template_data(struct ima_template_desc *template_desc,
|
|||
/* Restore the serialized binary measurement list without extending PCRs. */
|
||||
int ima_restore_measurement_list(loff_t size, void *buf)
|
||||
{
|
||||
struct binary_hdr_v1 {
|
||||
u32 pcr;
|
||||
u8 digest[TPM_DIGEST_SIZE];
|
||||
u32 template_name_len;
|
||||
char template_name[0];
|
||||
} __packed;
|
||||
char template_name[MAX_TEMPLATE_NAME_LEN];
|
||||
|
||||
struct binary_data_v1 {
|
||||
u32 template_data_size;
|
||||
char template_data[0];
|
||||
} __packed;
|
||||
|
||||
struct ima_kexec_hdr *khdr = buf;
|
||||
struct binary_hdr_v1 *hdr_v1;
|
||||
struct binary_data_v1 *data_v1;
|
||||
struct ima_field_data hdr[HDR__LAST] = {
|
||||
[HDR_PCR] = {.len = sizeof(u32)},
|
||||
[HDR_DIGEST] = {.len = TPM_DIGEST_SIZE},
|
||||
};
|
||||
|
||||
void *bufp = buf + sizeof(*khdr);
|
||||
void *bufendp;
|
||||
struct ima_template_entry *entry;
|
||||
struct ima_template_desc *template_desc;
|
||||
DECLARE_BITMAP(hdr_mask, HDR__LAST);
|
||||
unsigned long count = 0;
|
||||
int ret = 0;
|
||||
|
||||
|
@ -380,6 +357,10 @@ int ima_restore_measurement_list(loff_t size, void *buf)
|
|||
return -EINVAL;
|
||||
}
|
||||
|
||||
bitmap_zero(hdr_mask, HDR__LAST);
|
||||
bitmap_set(hdr_mask, HDR_PCR, 1);
|
||||
bitmap_set(hdr_mask, HDR_DIGEST, 1);
|
||||
|
||||
/*
|
||||
* ima kexec buffer prefix: version, buffer size, count
|
||||
* v1 format: pcr, digest, template-name-len, template-name,
|
||||
|
@ -387,31 +368,25 @@ int ima_restore_measurement_list(loff_t size, void *buf)
|
|||
*/
|
||||
bufendp = buf + khdr->buffer_size;
|
||||
while ((bufp < bufendp) && (count++ < khdr->count)) {
|
||||
hdr_v1 = bufp;
|
||||
if (bufp > (bufendp - sizeof(*hdr_v1))) {
|
||||
pr_err("attempting to restore partial measurement\n");
|
||||
ret = -EINVAL;
|
||||
int enforce_mask = ENFORCE_FIELDS;
|
||||
|
||||
enforce_mask |= (count == khdr->count) ? ENFORCE_BUFEND : 0;
|
||||
ret = ima_parse_buf(bufp, bufendp, &bufp, HDR__LAST, hdr, NULL,
|
||||
hdr_mask, enforce_mask, "entry header");
|
||||
if (ret < 0)
|
||||
break;
|
||||
}
|
||||
bufp += sizeof(*hdr_v1);
|
||||
|
||||
if (ima_canonical_fmt)
|
||||
hdr_v1->template_name_len =
|
||||
le32_to_cpu(hdr_v1->template_name_len);
|
||||
|
||||
if ((hdr_v1->template_name_len >= MAX_TEMPLATE_NAME_LEN) ||
|
||||
(bufp > (bufendp - hdr_v1->template_name_len))) {
|
||||
if (hdr[HDR_TEMPLATE_NAME].len >= MAX_TEMPLATE_NAME_LEN) {
|
||||
pr_err("attempting to restore a template name \
|
||||
that is too long\n");
|
||||
ret = -EINVAL;
|
||||
break;
|
||||
}
|
||||
data_v1 = bufp += (u_int8_t)hdr_v1->template_name_len;
|
||||
|
||||
/* template name is not null terminated */
|
||||
memcpy(template_name, hdr_v1->template_name,
|
||||
hdr_v1->template_name_len);
|
||||
template_name[hdr_v1->template_name_len] = 0;
|
||||
memcpy(template_name, hdr[HDR_TEMPLATE_NAME].data,
|
||||
hdr[HDR_TEMPLATE_NAME].len);
|
||||
template_name[hdr[HDR_TEMPLATE_NAME].len] = 0;
|
||||
|
||||
if (strcmp(template_name, "ima") == 0) {
|
||||
pr_err("attempting to restore an unsupported \
|
||||
|
@ -441,34 +416,17 @@ int ima_restore_measurement_list(loff_t size, void *buf)
|
|||
break;
|
||||
}
|
||||
|
||||
if (bufp > (bufendp - sizeof(data_v1->template_data_size))) {
|
||||
pr_err("restoring the template data size failed\n");
|
||||
ret = -EINVAL;
|
||||
break;
|
||||
}
|
||||
bufp += (u_int8_t) sizeof(data_v1->template_data_size);
|
||||
|
||||
if (ima_canonical_fmt)
|
||||
data_v1->template_data_size =
|
||||
le32_to_cpu(data_v1->template_data_size);
|
||||
|
||||
if (bufp > (bufendp - data_v1->template_data_size)) {
|
||||
pr_err("restoring the template data failed\n");
|
||||
ret = -EINVAL;
|
||||
break;
|
||||
}
|
||||
bufp += data_v1->template_data_size;
|
||||
|
||||
ret = ima_restore_template_data(template_desc,
|
||||
data_v1->template_data,
|
||||
data_v1->template_data_size,
|
||||
hdr[HDR_TEMPLATE_DATA].data,
|
||||
hdr[HDR_TEMPLATE_DATA].len,
|
||||
&entry);
|
||||
if (ret < 0)
|
||||
break;
|
||||
|
||||
memcpy(entry->digest, hdr_v1->digest, TPM_DIGEST_SIZE);
|
||||
entry->pcr =
|
||||
!ima_canonical_fmt ? hdr_v1->pcr : le32_to_cpu(hdr_v1->pcr);
|
||||
memcpy(entry->digest, hdr[HDR_DIGEST].data,
|
||||
hdr[HDR_DIGEST].len);
|
||||
entry->pcr = !ima_canonical_fmt ? *(hdr[HDR_PCR].data) :
|
||||
le32_to_cpu(*(hdr[HDR_PCR].data));
|
||||
ret = ima_restore_measurement_entry(entry);
|
||||
if (ret < 0)
|
||||
break;
|
||||
|
|
|
@ -159,6 +159,67 @@ void ima_show_template_sig(struct seq_file *m, enum ima_show_type show,
|
|||
ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data);
|
||||
}
|
||||
|
||||
/**
|
||||
* ima_parse_buf() - Parses lengths and data from an input buffer
|
||||
* @bufstartp: Buffer start address.
|
||||
* @bufendp: Buffer end address.
|
||||
* @bufcurp: Pointer to remaining (non-parsed) data.
|
||||
* @maxfields: Length of fields array.
|
||||
* @fields: Array containing lengths and pointers of parsed data.
|
||||
* @curfields: Number of array items containing parsed data.
|
||||
* @len_mask: Bitmap (if bit is set, data length should not be parsed).
|
||||
* @enforce_mask: Check if curfields == maxfields and/or bufcurp == bufendp.
|
||||
* @bufname: String identifier of the input buffer.
|
||||
*
|
||||
* Return: 0 on success, -EINVAL on error.
|
||||
*/
|
||||
int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp,
|
||||
int maxfields, struct ima_field_data *fields, int *curfields,
|
||||
unsigned long *len_mask, int enforce_mask, char *bufname)
|
||||
{
|
||||
void *bufp = bufstartp;
|
||||
int i;
|
||||
|
||||
for (i = 0; i < maxfields; i++) {
|
||||
if (len_mask == NULL || !test_bit(i, len_mask)) {
|
||||
if (bufp > (bufendp - sizeof(u32)))
|
||||
break;
|
||||
|
||||
fields[i].len = *(u32 *)bufp;
|
||||
if (ima_canonical_fmt)
|
||||
fields[i].len = le32_to_cpu(fields[i].len);
|
||||
|
||||
bufp += sizeof(u32);
|
||||
}
|
||||
|
||||
if (bufp > (bufendp - fields[i].len))
|
||||
break;
|
||||
|
||||
fields[i].data = bufp;
|
||||
bufp += fields[i].len;
|
||||
}
|
||||
|
||||
if ((enforce_mask & ENFORCE_FIELDS) && i != maxfields) {
|
||||
pr_err("%s: nr of fields mismatch: expected: %d, current: %d\n",
|
||||
bufname, maxfields, i);
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if ((enforce_mask & ENFORCE_BUFEND) && bufp != bufendp) {
|
||||
pr_err("%s: buf end mismatch: expected: %p, current: %p\n",
|
||||
bufname, bufendp, bufp);
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (curfields)
|
||||
*curfields = i;
|
||||
|
||||
if (bufcurp)
|
||||
*bufcurp = bufp;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ima_eventdigest_init_common(u8 *digest, u32 digestsize, u8 hash_algo,
|
||||
struct ima_field_data *field_data)
|
||||
{
|
||||
|
|
|
@ -18,6 +18,9 @@
|
|||
#include <linux/seq_file.h>
|
||||
#include "ima.h"
|
||||
|
||||
#define ENFORCE_FIELDS 0x00000001
|
||||
#define ENFORCE_BUFEND 0x00000002
|
||||
|
||||
void ima_show_template_digest(struct seq_file *m, enum ima_show_type show,
|
||||
struct ima_field_data *field_data);
|
||||
void ima_show_template_digest_ng(struct seq_file *m, enum ima_show_type show,
|
||||
|
@ -26,6 +29,9 @@ void ima_show_template_string(struct seq_file *m, enum ima_show_type show,
|
|||
struct ima_field_data *field_data);
|
||||
void ima_show_template_sig(struct seq_file *m, enum ima_show_type show,
|
||||
struct ima_field_data *field_data);
|
||||
int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp,
|
||||
int maxfields, struct ima_field_data *fields, int *curfields,
|
||||
unsigned long *len_mask, int enforce_mask, char *bufname);
|
||||
int ima_eventdigest_init(struct ima_event_data *event_data,
|
||||
struct ima_field_data *field_data);
|
||||
int ima_eventname_init(struct ima_event_data *event_data,
|
||||
|
|
|
@ -92,8 +92,8 @@ struct signature_v2_hdr {
|
|||
uint8_t type; /* xattr type */
|
||||
uint8_t version; /* signature format version */
|
||||
uint8_t hash_algo; /* Digest algorithm [enum hash_algo] */
|
||||
uint32_t keyid; /* IMA key identifier - not X509/PGP specific */
|
||||
uint16_t sig_size; /* signature size */
|
||||
__be32 keyid; /* IMA key identifier - not X509/PGP specific */
|
||||
__be16 sig_size; /* signature size */
|
||||
uint8_t sig[0]; /* signature payload */
|
||||
} __packed;
|
||||
|
||||
|
@ -118,7 +118,8 @@ struct integrity_iint_cache {
|
|||
struct integrity_iint_cache *integrity_iint_find(struct inode *inode);
|
||||
|
||||
int integrity_kernel_read(struct file *file, loff_t offset,
|
||||
char *addr, unsigned long count);
|
||||
void *addr, unsigned long count);
|
||||
|
||||
int __init integrity_read_file(const char *path, char **data);
|
||||
|
||||
#define INTEGRITY_KEYRING_EVM 0
|
||||
|
|
|
@ -410,6 +410,22 @@ static void dump_common_audit_data(struct audit_buffer *ab,
|
|||
audit_log_format(ab, " kmod=");
|
||||
audit_log_untrustedstring(ab, a->u.kmod_name);
|
||||
break;
|
||||
case LSM_AUDIT_DATA_IBPKEY: {
|
||||
struct in6_addr sbn_pfx;
|
||||
|
||||
memset(&sbn_pfx.s6_addr, 0,
|
||||
sizeof(sbn_pfx.s6_addr));
|
||||
memcpy(&sbn_pfx.s6_addr, &a->u.ibpkey->subnet_prefix,
|
||||
sizeof(a->u.ibpkey->subnet_prefix));
|
||||
audit_log_format(ab, " pkey=0x%x subnet_prefix=%pI6c",
|
||||
a->u.ibpkey->pkey, &sbn_pfx);
|
||||
break;
|
||||
}
|
||||
case LSM_AUDIT_DATA_IBENDPORT:
|
||||
audit_log_format(ab, " device=%s port_num=%u",
|
||||
a->u.ibendport->dev_name,
|
||||
a->u.ibendport->port);
|
||||
break;
|
||||
} /* switch (a->type) */
|
||||
}
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@
|
|||
* Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com>
|
||||
* Copyright (C) 2001-2002 Greg Kroah-Hartman <greg@kroah.com>
|
||||
* Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com>
|
||||
* Copyright (C) 2016 Mellanox Technologies
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -25,6 +26,7 @@
|
|||
#include <linux/mount.h>
|
||||
#include <linux/personality.h>
|
||||
#include <linux/backing-dev.h>
|
||||
#include <linux/string.h>
|
||||
#include <net/flow.h>
|
||||
|
||||
#define MAX_LSM_EVM_XATTR 2
|
||||
|
@ -33,6 +35,8 @@
|
|||
#define SECURITY_NAME_MAX 10
|
||||
|
||||
struct security_hook_heads security_hook_heads __lsm_ro_after_init;
|
||||
static ATOMIC_NOTIFIER_HEAD(lsm_notifier_chain);
|
||||
|
||||
char *lsm_names;
|
||||
/* Boot-time LSM user choice */
|
||||
static __initdata char chosen_lsm[SECURITY_NAME_MAX + 1] =
|
||||
|
@ -86,6 +90,21 @@ static int __init choose_lsm(char *str)
|
|||
}
|
||||
__setup("security=", choose_lsm);
|
||||
|
||||
static bool match_last_lsm(const char *list, const char *lsm)
|
||||
{
|
||||
const char *last;
|
||||
|
||||
if (WARN_ON(!list || !lsm))
|
||||
return false;
|
||||
last = strrchr(list, ',');
|
||||
if (last)
|
||||
/* Pass the comma, strcmp() will check for '\0' */
|
||||
last++;
|
||||
else
|
||||
last = list;
|
||||
return !strcmp(last, lsm);
|
||||
}
|
||||
|
||||
static int lsm_append(char *new, char **result)
|
||||
{
|
||||
char *cp;
|
||||
|
@ -93,6 +112,9 @@ static int lsm_append(char *new, char **result)
|
|||
if (*result == NULL) {
|
||||
*result = kstrdup(new, GFP_KERNEL);
|
||||
} else {
|
||||
/* Check if it is the last registered name */
|
||||
if (match_last_lsm(*result, new))
|
||||
return 0;
|
||||
cp = kasprintf(GFP_KERNEL, "%s,%s", *result, new);
|
||||
if (cp == NULL)
|
||||
return -ENOMEM;
|
||||
|
@ -146,6 +168,24 @@ void __init security_add_hooks(struct security_hook_list *hooks, int count,
|
|||
panic("%s - Cannot get early memory.\n", __func__);
|
||||
}
|
||||
|
||||
int call_lsm_notifier(enum lsm_event event, void *data)
|
||||
{
|
||||
return atomic_notifier_call_chain(&lsm_notifier_chain, event, data);
|
||||
}
|
||||
EXPORT_SYMBOL(call_lsm_notifier);
|
||||
|
||||
int register_lsm_notifier(struct notifier_block *nb)
|
||||
{
|
||||
return atomic_notifier_chain_register(&lsm_notifier_chain, nb);
|
||||
}
|
||||
EXPORT_SYMBOL(register_lsm_notifier);
|
||||
|
||||
int unregister_lsm_notifier(struct notifier_block *nb)
|
||||
{
|
||||
return atomic_notifier_chain_unregister(&lsm_notifier_chain, nb);
|
||||
}
|
||||
EXPORT_SYMBOL(unregister_lsm_notifier);
|
||||
|
||||
/*
|
||||
* Hook list operation macros.
|
||||
*
|
||||
|
@ -380,9 +420,12 @@ int security_sb_set_mnt_opts(struct super_block *sb,
|
|||
EXPORT_SYMBOL(security_sb_set_mnt_opts);
|
||||
|
||||
int security_sb_clone_mnt_opts(const struct super_block *oldsb,
|
||||
struct super_block *newsb)
|
||||
struct super_block *newsb,
|
||||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags)
|
||||
{
|
||||
return call_int_hook(sb_clone_mnt_opts, 0, oldsb, newsb);
|
||||
return call_int_hook(sb_clone_mnt_opts, 0, oldsb, newsb,
|
||||
kern_flags, set_kern_flags);
|
||||
}
|
||||
EXPORT_SYMBOL(security_sb_clone_mnt_opts);
|
||||
|
||||
|
@ -1496,6 +1539,33 @@ EXPORT_SYMBOL(security_tun_dev_open);
|
|||
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
|
||||
int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey)
|
||||
{
|
||||
return call_int_hook(ib_pkey_access, 0, sec, subnet_prefix, pkey);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_pkey_access);
|
||||
|
||||
int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num)
|
||||
{
|
||||
return call_int_hook(ib_endport_manage_subnet, 0, sec, dev_name, port_num);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_endport_manage_subnet);
|
||||
|
||||
int security_ib_alloc_security(void **sec)
|
||||
{
|
||||
return call_int_hook(ib_alloc_security, 0, sec);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_alloc_security);
|
||||
|
||||
void security_ib_free_security(void *sec)
|
||||
{
|
||||
call_void_hook(ib_free_security, sec);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_free_security);
|
||||
#endif /* CONFIG_SECURITY_INFINIBAND */
|
||||
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
|
||||
int security_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
obj-$(CONFIG_SECURITY_SELINUX) := selinux.o
|
||||
|
||||
selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \
|
||||
netnode.o netport.o exports.o \
|
||||
netnode.o netport.o ibpkey.o exports.o \
|
||||
ss/ebitmap.o ss/hashtab.o ss/symtab.o ss/sidtab.o ss/avtab.o \
|
||||
ss/policydb.o ss/services.o ss/conditional.o ss/mls.o ss/status.o
|
||||
|
||||
|
|
|
@ -17,6 +17,7 @@
|
|||
* Paul Moore <paul@paul-moore.com>
|
||||
* Copyright (C) 2007 Hitachi Software Engineering Co., Ltd.
|
||||
* Yuichi Nakamura <ynakam@hitachisoft.jp>
|
||||
* Copyright (C) 2016 Mellanox Technologies
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2,
|
||||
|
@ -90,6 +91,7 @@
|
|||
#include "netif.h"
|
||||
#include "netnode.h"
|
||||
#include "netport.h"
|
||||
#include "ibpkey.h"
|
||||
#include "xfrm.h"
|
||||
#include "netlabel.h"
|
||||
#include "audit.h"
|
||||
|
@ -171,6 +173,16 @@ static int selinux_netcache_avc_callback(u32 event)
|
|||
return 0;
|
||||
}
|
||||
|
||||
static int selinux_lsm_notifier_avc_callback(u32 event)
|
||||
{
|
||||
if (event == AVC_CALLBACK_RESET) {
|
||||
sel_ib_pkey_flush();
|
||||
call_lsm_notifier(LSM_POLICY_CHANGE, NULL);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* initialise the security for the init task
|
||||
*/
|
||||
|
@ -398,18 +410,6 @@ static void superblock_free_security(struct super_block *sb)
|
|||
kfree(sbsec);
|
||||
}
|
||||
|
||||
/* The file system's label must be initialized prior to use. */
|
||||
|
||||
static const char *labeling_behaviors[7] = {
|
||||
"uses xattr",
|
||||
"uses transition SIDs",
|
||||
"uses task SIDs",
|
||||
"uses genfs_contexts",
|
||||
"not configured for labeling",
|
||||
"uses mountpoint labeling",
|
||||
"uses native labeling",
|
||||
};
|
||||
|
||||
static inline int inode_doinit(struct inode *inode)
|
||||
{
|
||||
return inode_doinit_with_dentry(inode, NULL);
|
||||
|
@ -524,13 +524,17 @@ static int sb_finish_set_opts(struct super_block *sb)
|
|||
}
|
||||
}
|
||||
|
||||
if (sbsec->behavior > ARRAY_SIZE(labeling_behaviors))
|
||||
printk(KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n",
|
||||
sb->s_id, sb->s_type->name);
|
||||
|
||||
sbsec->flags |= SE_SBINITIALIZED;
|
||||
|
||||
/*
|
||||
* Explicitly set or clear SBLABEL_MNT. It's not sufficient to simply
|
||||
* leave the flag untouched because sb_clone_mnt_opts might be handing
|
||||
* us a superblock that needs the flag to be cleared.
|
||||
*/
|
||||
if (selinux_is_sblabel_mnt(sb))
|
||||
sbsec->flags |= SBLABEL_MNT;
|
||||
else
|
||||
sbsec->flags &= ~SBLABEL_MNT;
|
||||
|
||||
/* Initialize the root inode. */
|
||||
rc = inode_doinit_with_dentry(root_inode, root);
|
||||
|
@ -809,6 +813,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
|
|||
sbsec->flags |= SE_SBPROC | SE_SBGENFS;
|
||||
|
||||
if (!strcmp(sb->s_type->name, "debugfs") ||
|
||||
!strcmp(sb->s_type->name, "tracefs") ||
|
||||
!strcmp(sb->s_type->name, "sysfs") ||
|
||||
!strcmp(sb->s_type->name, "pstore"))
|
||||
sbsec->flags |= SE_SBGENFS;
|
||||
|
@ -963,8 +968,11 @@ mismatch:
|
|||
}
|
||||
|
||||
static int selinux_sb_clone_mnt_opts(const struct super_block *oldsb,
|
||||
struct super_block *newsb)
|
||||
struct super_block *newsb,
|
||||
unsigned long kern_flags,
|
||||
unsigned long *set_kern_flags)
|
||||
{
|
||||
int rc = 0;
|
||||
const struct superblock_security_struct *oldsbsec = oldsb->s_security;
|
||||
struct superblock_security_struct *newsbsec = newsb->s_security;
|
||||
|
||||
|
@ -979,6 +987,13 @@ static int selinux_sb_clone_mnt_opts(const struct super_block *oldsb,
|
|||
if (!ss_initialized)
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Specifying internal flags without providing a place to
|
||||
* place the results is not allowed.
|
||||
*/
|
||||
if (kern_flags && !set_kern_flags)
|
||||
return -EINVAL;
|
||||
|
||||
/* how can we clone if the old one wasn't set up?? */
|
||||
BUG_ON(!(oldsbsec->flags & SE_SBINITIALIZED));
|
||||
|
||||
|
@ -994,6 +1009,18 @@ static int selinux_sb_clone_mnt_opts(const struct super_block *oldsb,
|
|||
newsbsec->def_sid = oldsbsec->def_sid;
|
||||
newsbsec->behavior = oldsbsec->behavior;
|
||||
|
||||
if (newsbsec->behavior == SECURITY_FS_USE_NATIVE &&
|
||||
!(kern_flags & SECURITY_LSM_NATIVE_LABELS) && !set_context) {
|
||||
rc = security_fs_use(newsb);
|
||||
if (rc)
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (kern_flags & SECURITY_LSM_NATIVE_LABELS && !set_context) {
|
||||
newsbsec->behavior = SECURITY_FS_USE_NATIVE;
|
||||
*set_kern_flags |= SECURITY_LSM_NATIVE_LABELS;
|
||||
}
|
||||
|
||||
if (set_context) {
|
||||
u32 sid = oldsbsec->mntpoint_sid;
|
||||
|
||||
|
@ -1013,8 +1040,9 @@ static int selinux_sb_clone_mnt_opts(const struct super_block *oldsb,
|
|||
}
|
||||
|
||||
sb_finish_set_opts(newsb);
|
||||
out:
|
||||
mutex_unlock(&newsbsec->lock);
|
||||
return 0;
|
||||
return rc;
|
||||
}
|
||||
|
||||
static int selinux_parse_opts_str(char *options,
|
||||
|
@ -2062,8 +2090,9 @@ static inline u32 file_to_av(struct file *file)
|
|||
static inline u32 open_file_to_av(struct file *file)
|
||||
{
|
||||
u32 av = file_to_av(file);
|
||||
struct inode *inode = file_inode(file);
|
||||
|
||||
if (selinux_policycap_openperm)
|
||||
if (selinux_policycap_openperm && inode->i_sb->s_magic != SOCKFS_MAGIC)
|
||||
av |= FILE__OPEN;
|
||||
|
||||
return av;
|
||||
|
@ -3058,6 +3087,7 @@ static int selinux_inode_permission(struct inode *inode, int mask)
|
|||
static int selinux_inode_setattr(struct dentry *dentry, struct iattr *iattr)
|
||||
{
|
||||
const struct cred *cred = current_cred();
|
||||
struct inode *inode = d_backing_inode(dentry);
|
||||
unsigned int ia_valid = iattr->ia_valid;
|
||||
__u32 av = FILE__WRITE;
|
||||
|
||||
|
@ -3073,8 +3103,10 @@ static int selinux_inode_setattr(struct dentry *dentry, struct iattr *iattr)
|
|||
ATTR_ATIME_SET | ATTR_MTIME_SET | ATTR_TIMES_SET))
|
||||
return dentry_has_perm(cred, dentry, FILE__SETATTR);
|
||||
|
||||
if (selinux_policycap_openperm && (ia_valid & ATTR_SIZE)
|
||||
&& !(ia_valid & ATTR_FILE))
|
||||
if (selinux_policycap_openperm &&
|
||||
inode->i_sb->s_magic != SOCKFS_MAGIC &&
|
||||
(ia_valid & ATTR_SIZE) &&
|
||||
!(ia_valid & ATTR_FILE))
|
||||
av |= FILE__OPEN;
|
||||
|
||||
return dentry_has_perm(cred, dentry, av);
|
||||
|
@ -3106,6 +3138,18 @@ static int selinux_inode_setotherxattr(struct dentry *dentry, const char *name)
|
|||
return dentry_has_perm(cred, dentry, FILE__SETATTR);
|
||||
}
|
||||
|
||||
static bool has_cap_mac_admin(bool audit)
|
||||
{
|
||||
const struct cred *cred = current_cred();
|
||||
int cap_audit = audit ? SECURITY_CAP_AUDIT : SECURITY_CAP_NOAUDIT;
|
||||
|
||||
if (cap_capable(cred, &init_user_ns, CAP_MAC_ADMIN, cap_audit))
|
||||
return false;
|
||||
if (cred_has_capability(cred, CAP_MAC_ADMIN, cap_audit, true))
|
||||
return false;
|
||||
return true;
|
||||
}
|
||||
|
||||
static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags)
|
||||
{
|
||||
|
@ -3137,7 +3181,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
|
|||
|
||||
rc = security_context_to_sid(value, size, &newsid, GFP_KERNEL);
|
||||
if (rc == -EINVAL) {
|
||||
if (!capable(CAP_MAC_ADMIN)) {
|
||||
if (!has_cap_mac_admin(true)) {
|
||||
struct audit_buffer *ab;
|
||||
size_t audit_size;
|
||||
const char *str;
|
||||
|
@ -3263,13 +3307,8 @@ static int selinux_inode_getsecurity(struct inode *inode, const char *name, void
|
|||
* and lack of permission just means that we fall back to the
|
||||
* in-core context value, not a denial.
|
||||
*/
|
||||
error = cap_capable(current_cred(), &init_user_ns, CAP_MAC_ADMIN,
|
||||
SECURITY_CAP_NOAUDIT);
|
||||
if (!error)
|
||||
error = cred_has_capability(current_cred(), CAP_MAC_ADMIN,
|
||||
SECURITY_CAP_NOAUDIT, true);
|
||||
isec = inode_security(inode);
|
||||
if (!error)
|
||||
if (has_cap_mac_admin(false))
|
||||
error = security_sid_to_context_force(isec->sid, &context,
|
||||
&size);
|
||||
else
|
||||
|
@ -3549,6 +3588,18 @@ static int selinux_mmap_addr(unsigned long addr)
|
|||
static int selinux_mmap_file(struct file *file, unsigned long reqprot,
|
||||
unsigned long prot, unsigned long flags)
|
||||
{
|
||||
struct common_audit_data ad;
|
||||
int rc;
|
||||
|
||||
if (file) {
|
||||
ad.type = LSM_AUDIT_DATA_FILE;
|
||||
ad.u.file = file;
|
||||
rc = inode_has_perm(current_cred(), file_inode(file),
|
||||
FILE__MAP, &ad);
|
||||
if (rc)
|
||||
return rc;
|
||||
}
|
||||
|
||||
if (selinux_checkreqprot)
|
||||
prot = reqprot;
|
||||
|
||||
|
@ -3709,7 +3760,8 @@ static int selinux_file_open(struct file *file, const struct cred *cred)
|
|||
|
||||
/* task security operations */
|
||||
|
||||
static int selinux_task_create(unsigned long clone_flags)
|
||||
static int selinux_task_alloc(struct task_struct *task,
|
||||
unsigned long clone_flags)
|
||||
{
|
||||
u32 sid = current_sid();
|
||||
|
||||
|
@ -5917,7 +5969,7 @@ static int selinux_setprocattr(const char *name, void *value, size_t size)
|
|||
}
|
||||
error = security_context_to_sid(value, size, &sid, GFP_KERNEL);
|
||||
if (error == -EINVAL && !strcmp(name, "fscreate")) {
|
||||
if (!capable(CAP_MAC_ADMIN)) {
|
||||
if (!has_cap_mac_admin(true)) {
|
||||
struct audit_buffer *ab;
|
||||
size_t audit_size;
|
||||
|
||||
|
@ -6127,7 +6179,70 @@ static int selinux_key_getsecurity(struct key *key, char **_buffer)
|
|||
*_buffer = context;
|
||||
return rc;
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
static int selinux_ib_pkey_access(void *ib_sec, u64 subnet_prefix, u16 pkey_val)
|
||||
{
|
||||
struct common_audit_data ad;
|
||||
int err;
|
||||
u32 sid = 0;
|
||||
struct ib_security_struct *sec = ib_sec;
|
||||
struct lsm_ibpkey_audit ibpkey;
|
||||
|
||||
err = sel_ib_pkey_sid(subnet_prefix, pkey_val, &sid);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
ad.type = LSM_AUDIT_DATA_IBPKEY;
|
||||
ibpkey.subnet_prefix = subnet_prefix;
|
||||
ibpkey.pkey = pkey_val;
|
||||
ad.u.ibpkey = &ibpkey;
|
||||
return avc_has_perm(sec->sid, sid,
|
||||
SECCLASS_INFINIBAND_PKEY,
|
||||
INFINIBAND_PKEY__ACCESS, &ad);
|
||||
}
|
||||
|
||||
static int selinux_ib_endport_manage_subnet(void *ib_sec, const char *dev_name,
|
||||
u8 port_num)
|
||||
{
|
||||
struct common_audit_data ad;
|
||||
int err;
|
||||
u32 sid = 0;
|
||||
struct ib_security_struct *sec = ib_sec;
|
||||
struct lsm_ibendport_audit ibendport;
|
||||
|
||||
err = security_ib_endport_sid(dev_name, port_num, &sid);
|
||||
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
ad.type = LSM_AUDIT_DATA_IBENDPORT;
|
||||
strncpy(ibendport.dev_name, dev_name, sizeof(ibendport.dev_name));
|
||||
ibendport.port = port_num;
|
||||
ad.u.ibendport = &ibendport;
|
||||
return avc_has_perm(sec->sid, sid,
|
||||
SECCLASS_INFINIBAND_ENDPORT,
|
||||
INFINIBAND_ENDPORT__MANAGE_SUBNET, &ad);
|
||||
}
|
||||
|
||||
static int selinux_ib_alloc_security(void **ib_sec)
|
||||
{
|
||||
struct ib_security_struct *sec;
|
||||
|
||||
sec = kzalloc(sizeof(*sec), GFP_KERNEL);
|
||||
if (!sec)
|
||||
return -ENOMEM;
|
||||
sec->sid = current_sid();
|
||||
|
||||
*ib_sec = sec;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void selinux_ib_free_security(void *ib_sec)
|
||||
{
|
||||
kfree(ib_sec);
|
||||
}
|
||||
#endif
|
||||
|
||||
static struct security_hook_list selinux_hooks[] __lsm_ro_after_init = {
|
||||
|
@ -6212,7 +6327,7 @@ static struct security_hook_list selinux_hooks[] __lsm_ro_after_init = {
|
|||
|
||||
LSM_HOOK_INIT(file_open, selinux_file_open),
|
||||
|
||||
LSM_HOOK_INIT(task_create, selinux_task_create),
|
||||
LSM_HOOK_INIT(task_alloc, selinux_task_alloc),
|
||||
LSM_HOOK_INIT(cred_alloc_blank, selinux_cred_alloc_blank),
|
||||
LSM_HOOK_INIT(cred_free, selinux_cred_free),
|
||||
LSM_HOOK_INIT(cred_prepare, selinux_cred_prepare),
|
||||
|
@ -6314,7 +6429,13 @@ static struct security_hook_list selinux_hooks[] __lsm_ro_after_init = {
|
|||
LSM_HOOK_INIT(tun_dev_attach_queue, selinux_tun_dev_attach_queue),
|
||||
LSM_HOOK_INIT(tun_dev_attach, selinux_tun_dev_attach),
|
||||
LSM_HOOK_INIT(tun_dev_open, selinux_tun_dev_open),
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
LSM_HOOK_INIT(ib_pkey_access, selinux_ib_pkey_access),
|
||||
LSM_HOOK_INIT(ib_endport_manage_subnet,
|
||||
selinux_ib_endport_manage_subnet),
|
||||
LSM_HOOK_INIT(ib_alloc_security, selinux_ib_alloc_security),
|
||||
LSM_HOOK_INIT(ib_free_security, selinux_ib_free_security),
|
||||
#endif
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
LSM_HOOK_INIT(xfrm_policy_alloc_security, selinux_xfrm_policy_alloc),
|
||||
LSM_HOOK_INIT(xfrm_policy_clone_security, selinux_xfrm_policy_clone),
|
||||
|
@ -6378,6 +6499,9 @@ static __init int selinux_init(void)
|
|||
if (avc_add_callback(selinux_netcache_avc_callback, AVC_CALLBACK_RESET))
|
||||
panic("SELinux: Unable to register AVC netcache callback\n");
|
||||
|
||||
if (avc_add_callback(selinux_lsm_notifier_avc_callback, AVC_CALLBACK_RESET))
|
||||
panic("SELinux: Unable to register AVC LSM notifier callback\n");
|
||||
|
||||
if (selinux_enforcing)
|
||||
printk(KERN_DEBUG "SELinux: Starting in enforcing mode\n");
|
||||
else
|
||||
|
@ -6447,6 +6571,23 @@ static struct nf_hook_ops selinux_nf_ops[] = {
|
|||
#endif /* IPV6 */
|
||||
};
|
||||
|
||||
static int __net_init selinux_nf_register(struct net *net)
|
||||
{
|
||||
return nf_register_net_hooks(net, selinux_nf_ops,
|
||||
ARRAY_SIZE(selinux_nf_ops));
|
||||
}
|
||||
|
||||
static void __net_exit selinux_nf_unregister(struct net *net)
|
||||
{
|
||||
nf_unregister_net_hooks(net, selinux_nf_ops,
|
||||
ARRAY_SIZE(selinux_nf_ops));
|
||||
}
|
||||
|
||||
static struct pernet_operations selinux_net_ops = {
|
||||
.init = selinux_nf_register,
|
||||
.exit = selinux_nf_unregister,
|
||||
};
|
||||
|
||||
static int __init selinux_nf_ip_init(void)
|
||||
{
|
||||
int err;
|
||||
|
@ -6456,13 +6597,12 @@ static int __init selinux_nf_ip_init(void)
|
|||
|
||||
printk(KERN_DEBUG "SELinux: Registering netfilter hooks\n");
|
||||
|
||||
err = nf_register_hooks(selinux_nf_ops, ARRAY_SIZE(selinux_nf_ops));
|
||||
err = register_pernet_subsys(&selinux_net_ops);
|
||||
if (err)
|
||||
panic("SELinux: nf_register_hooks: error %d\n", err);
|
||||
panic("SELinux: register_pernet_subsys: error %d\n", err);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
__initcall(selinux_nf_ip_init);
|
||||
|
||||
#ifdef CONFIG_SECURITY_SELINUX_DISABLE
|
||||
|
@ -6470,7 +6610,7 @@ static void selinux_nf_ip_exit(void)
|
|||
{
|
||||
printk(KERN_DEBUG "SELinux: Unregistering netfilter hooks\n");
|
||||
|
||||
nf_unregister_hooks(selinux_nf_ops, ARRAY_SIZE(selinux_nf_ops));
|
||||
unregister_pernet_subsys(&selinux_net_ops);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
|
245
security/selinux/ibpkey.c
Normal file
245
security/selinux/ibpkey.c
Normal file
|
@ -0,0 +1,245 @@
|
|||
/*
|
||||
* Pkey table
|
||||
*
|
||||
* SELinux must keep a mapping of Infinband PKEYs to labels/SIDs. This
|
||||
* mapping is maintained as part of the normal policy but a fast cache is
|
||||
* needed to reduce the lookup overhead.
|
||||
*
|
||||
* This code is heavily based on the "netif" and "netport" concept originally
|
||||
* developed by
|
||||
* James Morris <jmorris@redhat.com> and
|
||||
* Paul Moore <paul@paul-moore.com>
|
||||
* (see security/selinux/netif.c and security/selinux/netport.c for more
|
||||
* information)
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* (c) Mellanox Technologies, 2016
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of version 2 of the GNU General Public License as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
*/
|
||||
|
||||
#include <linux/types.h>
|
||||
#include <linux/rcupdate.h>
|
||||
#include <linux/list.h>
|
||||
#include <linux/spinlock.h>
|
||||
|
||||
#include "ibpkey.h"
|
||||
#include "objsec.h"
|
||||
|
||||
#define SEL_PKEY_HASH_SIZE 256
|
||||
#define SEL_PKEY_HASH_BKT_LIMIT 16
|
||||
|
||||
struct sel_ib_pkey_bkt {
|
||||
int size;
|
||||
struct list_head list;
|
||||
};
|
||||
|
||||
struct sel_ib_pkey {
|
||||
struct pkey_security_struct psec;
|
||||
struct list_head list;
|
||||
struct rcu_head rcu;
|
||||
};
|
||||
|
||||
static LIST_HEAD(sel_ib_pkey_list);
|
||||
static DEFINE_SPINLOCK(sel_ib_pkey_lock);
|
||||
static struct sel_ib_pkey_bkt sel_ib_pkey_hash[SEL_PKEY_HASH_SIZE];
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_hashfn - Hashing function for the pkey table
|
||||
* @pkey: pkey number
|
||||
*
|
||||
* Description:
|
||||
* This is the hashing function for the pkey table, it returns the bucket
|
||||
* number for the given pkey.
|
||||
*
|
||||
*/
|
||||
static unsigned int sel_ib_pkey_hashfn(u16 pkey)
|
||||
{
|
||||
return (pkey & (SEL_PKEY_HASH_SIZE - 1));
|
||||
}
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_find - Search for a pkey record
|
||||
* @subnet_prefix: subnet_prefix
|
||||
* @pkey_num: pkey_num
|
||||
*
|
||||
* Description:
|
||||
* Search the pkey table and return the matching record. If an entry
|
||||
* can not be found in the table return NULL.
|
||||
*
|
||||
*/
|
||||
static struct sel_ib_pkey *sel_ib_pkey_find(u64 subnet_prefix, u16 pkey_num)
|
||||
{
|
||||
unsigned int idx;
|
||||
struct sel_ib_pkey *pkey;
|
||||
|
||||
idx = sel_ib_pkey_hashfn(pkey_num);
|
||||
list_for_each_entry_rcu(pkey, &sel_ib_pkey_hash[idx].list, list) {
|
||||
if (pkey->psec.pkey == pkey_num &&
|
||||
pkey->psec.subnet_prefix == subnet_prefix)
|
||||
return pkey;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_insert - Insert a new pkey into the table
|
||||
* @pkey: the new pkey record
|
||||
*
|
||||
* Description:
|
||||
* Add a new pkey record to the hash table.
|
||||
*
|
||||
*/
|
||||
static void sel_ib_pkey_insert(struct sel_ib_pkey *pkey)
|
||||
{
|
||||
unsigned int idx;
|
||||
|
||||
/* we need to impose a limit on the growth of the hash table so check
|
||||
* this bucket to make sure it is within the specified bounds
|
||||
*/
|
||||
idx = sel_ib_pkey_hashfn(pkey->psec.pkey);
|
||||
list_add_rcu(&pkey->list, &sel_ib_pkey_hash[idx].list);
|
||||
if (sel_ib_pkey_hash[idx].size == SEL_PKEY_HASH_BKT_LIMIT) {
|
||||
struct sel_ib_pkey *tail;
|
||||
|
||||
tail = list_entry(
|
||||
rcu_dereference_protected(
|
||||
sel_ib_pkey_hash[idx].list.prev,
|
||||
lockdep_is_held(&sel_ib_pkey_lock)),
|
||||
struct sel_ib_pkey, list);
|
||||
list_del_rcu(&tail->list);
|
||||
kfree_rcu(tail, rcu);
|
||||
} else {
|
||||
sel_ib_pkey_hash[idx].size++;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_sid_slow - Lookup the SID of a pkey using the policy
|
||||
* @subnet_prefix: subnet prefix
|
||||
* @pkey_num: pkey number
|
||||
* @sid: pkey SID
|
||||
*
|
||||
* Description:
|
||||
* This function determines the SID of a pkey by querying the security
|
||||
* policy. The result is added to the pkey table to speedup future
|
||||
* queries. Returns zero on success, negative values on failure.
|
||||
*
|
||||
*/
|
||||
static int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid)
|
||||
{
|
||||
int ret;
|
||||
struct sel_ib_pkey *pkey;
|
||||
struct sel_ib_pkey *new = NULL;
|
||||
unsigned long flags;
|
||||
|
||||
spin_lock_irqsave(&sel_ib_pkey_lock, flags);
|
||||
pkey = sel_ib_pkey_find(subnet_prefix, pkey_num);
|
||||
if (pkey) {
|
||||
*sid = pkey->psec.sid;
|
||||
spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
|
||||
return 0;
|
||||
}
|
||||
|
||||
ret = security_ib_pkey_sid(subnet_prefix, pkey_num, sid);
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
/* If this memory allocation fails still return 0. The SID
|
||||
* is valid, it just won't be added to the cache.
|
||||
*/
|
||||
new = kzalloc(sizeof(*new), GFP_ATOMIC);
|
||||
if (!new)
|
||||
goto out;
|
||||
|
||||
new->psec.subnet_prefix = subnet_prefix;
|
||||
new->psec.pkey = pkey_num;
|
||||
new->psec.sid = *sid;
|
||||
sel_ib_pkey_insert(new);
|
||||
|
||||
out:
|
||||
spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_sid - Lookup the SID of a PKEY
|
||||
* @subnet_prefix: subnet_prefix
|
||||
* @pkey_num: pkey number
|
||||
* @sid: pkey SID
|
||||
*
|
||||
* Description:
|
||||
* This function determines the SID of a PKEY using the fastest method
|
||||
* possible. First the pkey table is queried, but if an entry can't be found
|
||||
* then the policy is queried and the result is added to the table to speedup
|
||||
* future queries. Returns zero on success, negative values on failure.
|
||||
*
|
||||
*/
|
||||
int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid)
|
||||
{
|
||||
struct sel_ib_pkey *pkey;
|
||||
|
||||
rcu_read_lock();
|
||||
pkey = sel_ib_pkey_find(subnet_prefix, pkey_num);
|
||||
if (pkey) {
|
||||
*sid = pkey->psec.sid;
|
||||
rcu_read_unlock();
|
||||
return 0;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
|
||||
return sel_ib_pkey_sid_slow(subnet_prefix, pkey_num, sid);
|
||||
}
|
||||
|
||||
/**
|
||||
* sel_ib_pkey_flush - Flush the entire pkey table
|
||||
*
|
||||
* Description:
|
||||
* Remove all entries from the pkey table
|
||||
*
|
||||
*/
|
||||
void sel_ib_pkey_flush(void)
|
||||
{
|
||||
unsigned int idx;
|
||||
struct sel_ib_pkey *pkey, *pkey_tmp;
|
||||
unsigned long flags;
|
||||
|
||||
spin_lock_irqsave(&sel_ib_pkey_lock, flags);
|
||||
for (idx = 0; idx < SEL_PKEY_HASH_SIZE; idx++) {
|
||||
list_for_each_entry_safe(pkey, pkey_tmp,
|
||||
&sel_ib_pkey_hash[idx].list, list) {
|
||||
list_del_rcu(&pkey->list);
|
||||
kfree_rcu(pkey, rcu);
|
||||
}
|
||||
sel_ib_pkey_hash[idx].size = 0;
|
||||
}
|
||||
spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
|
||||
}
|
||||
|
||||
static __init int sel_ib_pkey_init(void)
|
||||
{
|
||||
int iter;
|
||||
|
||||
if (!selinux_enabled)
|
||||
return 0;
|
||||
|
||||
for (iter = 0; iter < SEL_PKEY_HASH_SIZE; iter++) {
|
||||
INIT_LIST_HEAD(&sel_ib_pkey_hash[iter].list);
|
||||
sel_ib_pkey_hash[iter].size = 0;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
subsys_initcall(sel_ib_pkey_init);
|
|
@ -1,7 +1,7 @@
|
|||
#include <linux/capability.h>
|
||||
|
||||
#define COMMON_FILE_SOCK_PERMS "ioctl", "read", "write", "create", \
|
||||
"getattr", "setattr", "lock", "relabelfrom", "relabelto", "append"
|
||||
"getattr", "setattr", "lock", "relabelfrom", "relabelto", "append", "map"
|
||||
|
||||
#define COMMON_FILE_PERMS COMMON_FILE_SOCK_PERMS, "unlink", "link", \
|
||||
"rename", "execute", "quotaon", "mounton", "audit_access", \
|
||||
|
@ -231,6 +231,10 @@ struct security_class_mapping secclass_map[] = {
|
|||
{ COMMON_SOCK_PERMS, NULL } },
|
||||
{ "smc_socket",
|
||||
{ COMMON_SOCK_PERMS, NULL } },
|
||||
{ "infiniband_pkey",
|
||||
{ "access", NULL } },
|
||||
{ "infiniband_endport",
|
||||
{ "manage_subnet", NULL } },
|
||||
{ NULL }
|
||||
};
|
||||
|
||||
|
|
31
security/selinux/include/ibpkey.h
Normal file
31
security/selinux/include/ibpkey.h
Normal file
|
@ -0,0 +1,31 @@
|
|||
/*
|
||||
* pkey table
|
||||
*
|
||||
* SELinux must keep a mapping of pkeys to labels/SIDs. This
|
||||
* mapping is maintained as part of the normal policy but a fast cache is
|
||||
* needed to reduce the lookup overhead.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* (c) Mellanox Technologies, 2016
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of version 2 of the GNU General Public License as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef _SELINUX_IB_PKEY_H
|
||||
#define _SELINUX_IB_PKEY_H
|
||||
|
||||
void sel_ib_pkey_flush(void);
|
||||
|
||||
int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid);
|
||||
|
||||
#endif
|
|
@ -10,6 +10,7 @@
|
|||
*
|
||||
* Copyright (C) 2001,2002 Networks Associates Technology, Inc.
|
||||
* Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
|
||||
* Copyright (C) 2016 Mellanox Technologies
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2,
|
||||
|
@ -139,6 +140,16 @@ struct key_security_struct {
|
|||
u32 sid; /* SID of key */
|
||||
};
|
||||
|
||||
struct ib_security_struct {
|
||||
u32 sid; /* SID of the queue pair or MAD agent */
|
||||
};
|
||||
|
||||
struct pkey_security_struct {
|
||||
u64 subnet_prefix; /* Port subnet prefix */
|
||||
u16 pkey; /* PKey number */
|
||||
u32 sid; /* SID of pkey */
|
||||
};
|
||||
|
||||
extern unsigned int selinux_checkreqprot;
|
||||
|
||||
#endif /* _SELINUX_OBJSEC_H_ */
|
||||
|
|
|
@ -36,10 +36,11 @@
|
|||
#define POLICYDB_VERSION_DEFAULT_TYPE 28
|
||||
#define POLICYDB_VERSION_CONSTRAINT_NAMES 29
|
||||
#define POLICYDB_VERSION_XPERMS_IOCTL 30
|
||||
#define POLICYDB_VERSION_INFINIBAND 31
|
||||
|
||||
/* Range of policy versions we understand*/
|
||||
#define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE
|
||||
#define POLICYDB_VERSION_MAX POLICYDB_VERSION_XPERMS_IOCTL
|
||||
#define POLICYDB_VERSION_MAX POLICYDB_VERSION_INFINIBAND
|
||||
|
||||
/* Mask for just the mount related flags */
|
||||
#define SE_MNTMASK 0x0f
|
||||
|
@ -76,6 +77,8 @@ enum {
|
|||
};
|
||||
#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
|
||||
|
||||
extern char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
|
||||
|
||||
extern int selinux_policycap_netpeer;
|
||||
extern int selinux_policycap_openperm;
|
||||
extern int selinux_policycap_extsockclass;
|
||||
|
@ -178,6 +181,10 @@ int security_get_user_sids(u32 callsid, char *username,
|
|||
|
||||
int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
|
||||
|
||||
int security_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
|
||||
|
||||
int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid);
|
||||
|
||||
int security_netif_sid(char *name, u32 *if_sid);
|
||||
|
||||
int security_node_sid(u16 domain, void *addr, u32 addrlen,
|
||||
|
|
|
@ -41,15 +41,6 @@
|
|||
#include "objsec.h"
|
||||
#include "conditional.h"
|
||||
|
||||
/* Policy capability filenames */
|
||||
static char *policycap_names[] = {
|
||||
"network_peer_controls",
|
||||
"open_perms",
|
||||
"extended_socket_class",
|
||||
"always_check_network",
|
||||
"cgroup_seclabel"
|
||||
};
|
||||
|
||||
unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
|
||||
|
||||
static int __init checkreqprot_setup(char *str)
|
||||
|
@ -163,6 +154,8 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
|
|||
avc_ss_reset(0);
|
||||
selnl_notify_setenforce(selinux_enforcing);
|
||||
selinux_status_update_setenforce(selinux_enforcing);
|
||||
if (!selinux_enforcing)
|
||||
call_lsm_notifier(LSM_POLICY_CHANGE, NULL);
|
||||
}
|
||||
length = count;
|
||||
out:
|
||||
|
@ -1750,9 +1743,9 @@ static int sel_make_policycap(void)
|
|||
sel_remove_entries(policycap_dir);
|
||||
|
||||
for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
|
||||
if (iter < ARRAY_SIZE(policycap_names))
|
||||
if (iter < ARRAY_SIZE(selinux_policycap_names))
|
||||
dentry = d_alloc_name(policycap_dir,
|
||||
policycap_names[iter]);
|
||||
selinux_policycap_names[iter]);
|
||||
else
|
||||
dentry = d_alloc_name(policycap_dir, "unknown");
|
||||
|
||||
|
|
|
@ -24,6 +24,8 @@
|
|||
|
||||
#define BITS_PER_U64 (sizeof(u64) * 8)
|
||||
|
||||
static struct kmem_cache *ebitmap_node_cachep;
|
||||
|
||||
int ebitmap_cmp(struct ebitmap *e1, struct ebitmap *e2)
|
||||
{
|
||||
struct ebitmap_node *n1, *n2;
|
||||
|
@ -54,7 +56,7 @@ int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src)
|
|||
n = src->node;
|
||||
prev = NULL;
|
||||
while (n) {
|
||||
new = kzalloc(sizeof(*new), GFP_ATOMIC);
|
||||
new = kmem_cache_zalloc(ebitmap_node_cachep, GFP_ATOMIC);
|
||||
if (!new) {
|
||||
ebitmap_destroy(dst);
|
||||
return -ENOMEM;
|
||||
|
@ -162,7 +164,7 @@ int ebitmap_netlbl_import(struct ebitmap *ebmap,
|
|||
if (e_iter == NULL ||
|
||||
offset >= e_iter->startbit + EBITMAP_SIZE) {
|
||||
e_prev = e_iter;
|
||||
e_iter = kzalloc(sizeof(*e_iter), GFP_ATOMIC);
|
||||
e_iter = kmem_cache_zalloc(ebitmap_node_cachep, GFP_ATOMIC);
|
||||
if (e_iter == NULL)
|
||||
goto netlbl_import_failure;
|
||||
e_iter->startbit = offset - (offset % EBITMAP_SIZE);
|
||||
|
@ -288,7 +290,7 @@ int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value)
|
|||
prev->next = n->next;
|
||||
else
|
||||
e->node = n->next;
|
||||
kfree(n);
|
||||
kmem_cache_free(ebitmap_node_cachep, n);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
@ -299,7 +301,7 @@ int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value)
|
|||
if (!value)
|
||||
return 0;
|
||||
|
||||
new = kzalloc(sizeof(*new), GFP_ATOMIC);
|
||||
new = kmem_cache_zalloc(ebitmap_node_cachep, GFP_ATOMIC);
|
||||
if (!new)
|
||||
return -ENOMEM;
|
||||
|
||||
|
@ -332,7 +334,7 @@ void ebitmap_destroy(struct ebitmap *e)
|
|||
while (n) {
|
||||
temp = n;
|
||||
n = n->next;
|
||||
kfree(temp);
|
||||
kmem_cache_free(ebitmap_node_cachep, temp);
|
||||
}
|
||||
|
||||
e->highbit = 0;
|
||||
|
@ -400,7 +402,7 @@ int ebitmap_read(struct ebitmap *e, void *fp)
|
|||
|
||||
if (!n || startbit >= n->startbit + EBITMAP_SIZE) {
|
||||
struct ebitmap_node *tmp;
|
||||
tmp = kzalloc(sizeof(*tmp), GFP_KERNEL);
|
||||
tmp = kmem_cache_zalloc(ebitmap_node_cachep, GFP_KERNEL);
|
||||
if (!tmp) {
|
||||
printk(KERN_ERR
|
||||
"SELinux: ebitmap: out of memory\n");
|
||||
|
@ -519,3 +521,15 @@ int ebitmap_write(struct ebitmap *e, void *fp)
|
|||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
void ebitmap_cache_init(void)
|
||||
{
|
||||
ebitmap_node_cachep = kmem_cache_create("ebitmap_node",
|
||||
sizeof(struct ebitmap_node),
|
||||
0, SLAB_PANIC, NULL);
|
||||
}
|
||||
|
||||
void ebitmap_cache_destroy(void)
|
||||
{
|
||||
kmem_cache_destroy(ebitmap_node_cachep);
|
||||
}
|
||||
|
|
|
@ -130,6 +130,9 @@ void ebitmap_destroy(struct ebitmap *e);
|
|||
int ebitmap_read(struct ebitmap *e, void *fp);
|
||||
int ebitmap_write(struct ebitmap *e, void *fp);
|
||||
|
||||
void ebitmap_cache_init(void);
|
||||
void ebitmap_cache_destroy(void);
|
||||
|
||||
#ifdef CONFIG_NETLABEL
|
||||
int ebitmap_netlbl_export(struct ebitmap *ebmap,
|
||||
struct netlbl_lsm_catmap **catmap);
|
||||
|
|
|
@ -17,6 +17,11 @@
|
|||
*
|
||||
* Added support for the policy capability bitmap
|
||||
*
|
||||
* Update: Mellanox Techonologies
|
||||
*
|
||||
* Added Infiniband support
|
||||
*
|
||||
* Copyright (C) 2016 Mellanox Techonologies
|
||||
* Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
|
||||
* Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
|
||||
* Copyright (C) 2003 - 2004 Tresys Technology, LLC
|
||||
|
@ -76,81 +81,86 @@ static struct policydb_compat_info policydb_compat[] = {
|
|||
{
|
||||
.version = POLICYDB_VERSION_BASE,
|
||||
.sym_num = SYM_NUM - 3,
|
||||
.ocon_num = OCON_NUM - 1,
|
||||
.ocon_num = OCON_NUM - 3,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_BOOL,
|
||||
.sym_num = SYM_NUM - 2,
|
||||
.ocon_num = OCON_NUM - 1,
|
||||
.ocon_num = OCON_NUM - 3,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_IPV6,
|
||||
.sym_num = SYM_NUM - 2,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_NLCLASS,
|
||||
.sym_num = SYM_NUM - 2,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_MLS,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_AVTAB,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_RANGETRANS,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_POLCAP,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_PERMISSIVE,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_BOUNDARY,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_FILENAME_TRANS,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_ROLETRANS,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_NEW_OBJECT_DEFAULTS,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_DEFAULT_TYPE,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_CONSTRAINT_NAMES,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_XPERMS_IOCTL,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM - 2,
|
||||
},
|
||||
{
|
||||
.version = POLICYDB_VERSION_INFINIBAND,
|
||||
.sym_num = SYM_NUM,
|
||||
.ocon_num = OCON_NUM,
|
||||
},
|
||||
};
|
||||
|
@ -538,34 +548,30 @@ static int policydb_index(struct policydb *p)
|
|||
symtab_hash_eval(p->symtab);
|
||||
#endif
|
||||
|
||||
rc = -ENOMEM;
|
||||
p->class_val_to_struct = kcalloc(p->p_classes.nprim,
|
||||
sizeof(*p->class_val_to_struct),
|
||||
GFP_KERNEL);
|
||||
if (!p->class_val_to_struct)
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
|
||||
rc = -ENOMEM;
|
||||
p->role_val_to_struct = kcalloc(p->p_roles.nprim,
|
||||
sizeof(*p->role_val_to_struct),
|
||||
GFP_KERNEL);
|
||||
if (!p->role_val_to_struct)
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
|
||||
rc = -ENOMEM;
|
||||
p->user_val_to_struct = kcalloc(p->p_users.nprim,
|
||||
sizeof(*p->user_val_to_struct),
|
||||
GFP_KERNEL);
|
||||
if (!p->user_val_to_struct)
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
|
||||
/* Yes, I want the sizeof the pointer, not the structure */
|
||||
rc = -ENOMEM;
|
||||
p->type_val_to_struct_array = flex_array_alloc(sizeof(struct type_datum *),
|
||||
p->p_types.nprim,
|
||||
GFP_KERNEL | __GFP_ZERO);
|
||||
if (!p->type_val_to_struct_array)
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
|
||||
rc = flex_array_prealloc(p->type_val_to_struct_array, 0,
|
||||
p->p_types.nprim, GFP_KERNEL | __GFP_ZERO);
|
||||
|
@ -577,12 +583,11 @@ static int policydb_index(struct policydb *p)
|
|||
goto out;
|
||||
|
||||
for (i = 0; i < SYM_NUM; i++) {
|
||||
rc = -ENOMEM;
|
||||
p->sym_val_to_name[i] = flex_array_alloc(sizeof(char *),
|
||||
p->symtab[i].nprim,
|
||||
GFP_KERNEL | __GFP_ZERO);
|
||||
if (!p->sym_val_to_name[i])
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
|
||||
rc = flex_array_prealloc(p->sym_val_to_name[i],
|
||||
0, p->symtab[i].nprim,
|
||||
|
@ -2211,6 +2216,51 @@ static int ocontext_read(struct policydb *p, struct policydb_compat_info *info,
|
|||
goto out;
|
||||
break;
|
||||
}
|
||||
case OCON_IBPKEY:
|
||||
rc = next_entry(nodebuf, fp, sizeof(u32) * 4);
|
||||
if (rc)
|
||||
goto out;
|
||||
|
||||
c->u.ibpkey.subnet_prefix = be64_to_cpu(*((__be64 *)nodebuf));
|
||||
|
||||
if (nodebuf[2] > 0xffff ||
|
||||
nodebuf[3] > 0xffff) {
|
||||
rc = -EINVAL;
|
||||
goto out;
|
||||
}
|
||||
|
||||
c->u.ibpkey.low_pkey = le32_to_cpu(nodebuf[2]);
|
||||
c->u.ibpkey.high_pkey = le32_to_cpu(nodebuf[3]);
|
||||
|
||||
rc = context_read_and_validate(&c->context[0],
|
||||
p,
|
||||
fp);
|
||||
if (rc)
|
||||
goto out;
|
||||
break;
|
||||
case OCON_IBENDPORT:
|
||||
rc = next_entry(buf, fp, sizeof(u32) * 2);
|
||||
if (rc)
|
||||
goto out;
|
||||
len = le32_to_cpu(buf[0]);
|
||||
|
||||
rc = str_read(&c->u.ibendport.dev_name, GFP_KERNEL, fp, len);
|
||||
if (rc)
|
||||
goto out;
|
||||
|
||||
if (buf[1] > 0xff || buf[1] == 0) {
|
||||
rc = -EINVAL;
|
||||
goto out;
|
||||
}
|
||||
|
||||
c->u.ibendport.port = le32_to_cpu(buf[1]);
|
||||
|
||||
rc = context_read_and_validate(&c->context[0],
|
||||
p,
|
||||
fp);
|
||||
if (rc)
|
||||
goto out;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -3140,6 +3190,33 @@ static int ocontext_write(struct policydb *p, struct policydb_compat_info *info,
|
|||
if (rc)
|
||||
return rc;
|
||||
break;
|
||||
case OCON_IBPKEY:
|
||||
*((__be64 *)nodebuf) = cpu_to_be64(c->u.ibpkey.subnet_prefix);
|
||||
|
||||
nodebuf[2] = cpu_to_le32(c->u.ibpkey.low_pkey);
|
||||
nodebuf[3] = cpu_to_le32(c->u.ibpkey.high_pkey);
|
||||
|
||||
rc = put_entry(nodebuf, sizeof(u32), 4, fp);
|
||||
if (rc)
|
||||
return rc;
|
||||
rc = context_write(p, &c->context[0], fp);
|
||||
if (rc)
|
||||
return rc;
|
||||
break;
|
||||
case OCON_IBENDPORT:
|
||||
len = strlen(c->u.ibendport.dev_name);
|
||||
buf[0] = cpu_to_le32(len);
|
||||
buf[1] = cpu_to_le32(c->u.ibendport.port);
|
||||
rc = put_entry(buf, sizeof(u32), 2, fp);
|
||||
if (rc)
|
||||
return rc;
|
||||
rc = put_entry(c->u.ibendport.dev_name, 1, len, fp);
|
||||
if (rc)
|
||||
return rc;
|
||||
rc = context_write(p, &c->context[0], fp);
|
||||
if (rc)
|
||||
return rc;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -187,6 +187,15 @@ struct ocontext {
|
|||
u32 addr[4];
|
||||
u32 mask[4];
|
||||
} node6; /* IPv6 node information */
|
||||
struct {
|
||||
u64 subnet_prefix;
|
||||
u16 low_pkey;
|
||||
u16 high_pkey;
|
||||
} ibpkey;
|
||||
struct {
|
||||
char *dev_name;
|
||||
u8 port;
|
||||
} ibendport;
|
||||
} u;
|
||||
union {
|
||||
u32 sclass; /* security class for genfs */
|
||||
|
@ -215,14 +224,16 @@ struct genfs {
|
|||
#define SYM_NUM 8
|
||||
|
||||
/* object context array indices */
|
||||
#define OCON_ISID 0 /* initial SIDs */
|
||||
#define OCON_FS 1 /* unlabeled file systems */
|
||||
#define OCON_PORT 2 /* TCP and UDP port numbers */
|
||||
#define OCON_NETIF 3 /* network interfaces */
|
||||
#define OCON_NODE 4 /* nodes */
|
||||
#define OCON_FSUSE 5 /* fs_use */
|
||||
#define OCON_NODE6 6 /* IPv6 nodes */
|
||||
#define OCON_NUM 7
|
||||
#define OCON_ISID 0 /* initial SIDs */
|
||||
#define OCON_FS 1 /* unlabeled file systems */
|
||||
#define OCON_PORT 2 /* TCP and UDP port numbers */
|
||||
#define OCON_NETIF 3 /* network interfaces */
|
||||
#define OCON_NODE 4 /* nodes */
|
||||
#define OCON_FSUSE 5 /* fs_use */
|
||||
#define OCON_NODE6 6 /* IPv6 nodes */
|
||||
#define OCON_IBPKEY 7 /* Infiniband PKeys */
|
||||
#define OCON_IBENDPORT 8 /* Infiniband end ports */
|
||||
#define OCON_NUM 9
|
||||
|
||||
/* The policy database */
|
||||
struct policydb {
|
||||
|
|
|
@ -70,6 +70,15 @@
|
|||
#include "ebitmap.h"
|
||||
#include "audit.h"
|
||||
|
||||
/* Policy capability names */
|
||||
char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
|
||||
"network_peer_controls",
|
||||
"open_perms",
|
||||
"extended_socket_class",
|
||||
"always_check_network",
|
||||
"cgroup_seclabel"
|
||||
};
|
||||
|
||||
int selinux_policycap_netpeer;
|
||||
int selinux_policycap_openperm;
|
||||
int selinux_policycap_extsockclass;
|
||||
|
@ -1986,6 +1995,9 @@ bad:
|
|||
|
||||
static void security_load_policycaps(void)
|
||||
{
|
||||
unsigned int i;
|
||||
struct ebitmap_node *node;
|
||||
|
||||
selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps,
|
||||
POLICYDB_CAPABILITY_NETPEER);
|
||||
selinux_policycap_openperm = ebitmap_get_bit(&policydb.policycaps,
|
||||
|
@ -1997,6 +2009,17 @@ static void security_load_policycaps(void)
|
|||
selinux_policycap_cgroupseclabel =
|
||||
ebitmap_get_bit(&policydb.policycaps,
|
||||
POLICYDB_CAPABILITY_CGROUPSECLABEL);
|
||||
|
||||
for (i = 0; i < ARRAY_SIZE(selinux_policycap_names); i++)
|
||||
pr_info("SELinux: policy capability %s=%d\n",
|
||||
selinux_policycap_names[i],
|
||||
ebitmap_get_bit(&policydb.policycaps, i));
|
||||
|
||||
ebitmap_for_each_positive_bit(&policydb.policycaps, node, i) {
|
||||
if (i >= ARRAY_SIZE(selinux_policycap_names))
|
||||
pr_info("SELinux: unknown policy capability %u\n",
|
||||
i);
|
||||
}
|
||||
}
|
||||
|
||||
static int security_preserve_bools(struct policydb *p);
|
||||
|
@ -2031,9 +2054,11 @@ int security_load_policy(void *data, size_t len)
|
|||
|
||||
if (!ss_initialized) {
|
||||
avtab_cache_init();
|
||||
ebitmap_cache_init();
|
||||
rc = policydb_read(&policydb, fp);
|
||||
if (rc) {
|
||||
avtab_cache_destroy();
|
||||
ebitmap_cache_destroy();
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
@ -2044,6 +2069,7 @@ int security_load_policy(void *data, size_t len)
|
|||
if (rc) {
|
||||
policydb_destroy(&policydb);
|
||||
avtab_cache_destroy();
|
||||
ebitmap_cache_destroy();
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
@ -2051,6 +2077,7 @@ int security_load_policy(void *data, size_t len)
|
|||
if (rc) {
|
||||
policydb_destroy(&policydb);
|
||||
avtab_cache_destroy();
|
||||
ebitmap_cache_destroy();
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
@ -2209,6 +2236,87 @@ out:
|
|||
return rc;
|
||||
}
|
||||
|
||||
/**
|
||||
* security_pkey_sid - Obtain the SID for a pkey.
|
||||
* @subnet_prefix: Subnet Prefix
|
||||
* @pkey_num: pkey number
|
||||
* @out_sid: security identifier
|
||||
*/
|
||||
int security_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid)
|
||||
{
|
||||
struct ocontext *c;
|
||||
int rc = 0;
|
||||
|
||||
read_lock(&policy_rwlock);
|
||||
|
||||
c = policydb.ocontexts[OCON_IBPKEY];
|
||||
while (c) {
|
||||
if (c->u.ibpkey.low_pkey <= pkey_num &&
|
||||
c->u.ibpkey.high_pkey >= pkey_num &&
|
||||
c->u.ibpkey.subnet_prefix == subnet_prefix)
|
||||
break;
|
||||
|
||||
c = c->next;
|
||||
}
|
||||
|
||||
if (c) {
|
||||
if (!c->sid[0]) {
|
||||
rc = sidtab_context_to_sid(&sidtab,
|
||||
&c->context[0],
|
||||
&c->sid[0]);
|
||||
if (rc)
|
||||
goto out;
|
||||
}
|
||||
*out_sid = c->sid[0];
|
||||
} else
|
||||
*out_sid = SECINITSID_UNLABELED;
|
||||
|
||||
out:
|
||||
read_unlock(&policy_rwlock);
|
||||
return rc;
|
||||
}
|
||||
|
||||
/**
|
||||
* security_ib_endport_sid - Obtain the SID for a subnet management interface.
|
||||
* @dev_name: device name
|
||||
* @port: port number
|
||||
* @out_sid: security identifier
|
||||
*/
|
||||
int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid)
|
||||
{
|
||||
struct ocontext *c;
|
||||
int rc = 0;
|
||||
|
||||
read_lock(&policy_rwlock);
|
||||
|
||||
c = policydb.ocontexts[OCON_IBENDPORT];
|
||||
while (c) {
|
||||
if (c->u.ibendport.port == port_num &&
|
||||
!strncmp(c->u.ibendport.dev_name,
|
||||
dev_name,
|
||||
IB_DEVICE_NAME_MAX))
|
||||
break;
|
||||
|
||||
c = c->next;
|
||||
}
|
||||
|
||||
if (c) {
|
||||
if (!c->sid[0]) {
|
||||
rc = sidtab_context_to_sid(&sidtab,
|
||||
&c->context[0],
|
||||
&c->sid[0]);
|
||||
if (rc)
|
||||
goto out;
|
||||
}
|
||||
*out_sid = c->sid[0];
|
||||
} else
|
||||
*out_sid = SECINITSID_UNLABELED;
|
||||
|
||||
out:
|
||||
read_unlock(&policy_rwlock);
|
||||
return rc;
|
||||
}
|
||||
|
||||
/**
|
||||
* security_netif_sid - Obtain the SID for a network interface.
|
||||
* @name: interface name
|
||||
|
|
|
@ -32,13 +32,11 @@ int sidtab_init(struct sidtab *s)
|
|||
|
||||
int sidtab_insert(struct sidtab *s, u32 sid, struct context *context)
|
||||
{
|
||||
int hvalue, rc = 0;
|
||||
int hvalue;
|
||||
struct sidtab_node *prev, *cur, *newnode;
|
||||
|
||||
if (!s) {
|
||||
rc = -ENOMEM;
|
||||
goto out;
|
||||
}
|
||||
if (!s)
|
||||
return -ENOMEM;
|
||||
|
||||
hvalue = SIDTAB_HASH(sid);
|
||||
prev = NULL;
|
||||
|
@ -48,21 +46,17 @@ int sidtab_insert(struct sidtab *s, u32 sid, struct context *context)
|
|||
cur = cur->next;
|
||||
}
|
||||
|
||||
if (cur && sid == cur->sid) {
|
||||
rc = -EEXIST;
|
||||
goto out;
|
||||
}
|
||||
if (cur && sid == cur->sid)
|
||||
return -EEXIST;
|
||||
|
||||
newnode = kmalloc(sizeof(*newnode), GFP_ATOMIC);
|
||||
if (!newnode) {
|
||||
rc = -ENOMEM;
|
||||
goto out;
|
||||
}
|
||||
if (!newnode)
|
||||
return -ENOMEM;
|
||||
|
||||
newnode->sid = sid;
|
||||
if (context_cpy(&newnode->context, context)) {
|
||||
kfree(newnode);
|
||||
rc = -ENOMEM;
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
if (prev) {
|
||||
|
@ -78,8 +72,7 @@ int sidtab_insert(struct sidtab *s, u32 sid, struct context *context)
|
|||
s->nel++;
|
||||
if (sid >= s->next_sid)
|
||||
s->next_sid = sid + 1;
|
||||
out:
|
||||
return rc;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct context *sidtab_search_core(struct sidtab *s, u32 sid, int force)
|
||||
|
|
|
@ -320,7 +320,7 @@ int smk_netlbl_mls(int, char *, struct netlbl_lsm_secattr *, int);
|
|||
struct smack_known *smk_import_entry(const char *, int);
|
||||
void smk_insert_entry(struct smack_known *skp);
|
||||
struct smack_known *smk_find_entry(const char *);
|
||||
int smack_privileged(int cap);
|
||||
bool smack_privileged(int cap);
|
||||
void smk_destroy_label_list(struct list_head *list);
|
||||
|
||||
/*
|
||||
|
|
|
@ -627,35 +627,38 @@ DEFINE_MUTEX(smack_onlycap_lock);
|
|||
* Is the task privileged and allowed to be privileged
|
||||
* by the onlycap rule.
|
||||
*
|
||||
* Returns 1 if the task is allowed to be privileged, 0 if it's not.
|
||||
* Returns true if the task is allowed to be privileged, false if it's not.
|
||||
*/
|
||||
int smack_privileged(int cap)
|
||||
bool smack_privileged(int cap)
|
||||
{
|
||||
struct smack_known *skp = smk_of_current();
|
||||
struct smack_known_list_elem *sklep;
|
||||
int rc;
|
||||
|
||||
/*
|
||||
* All kernel tasks are privileged
|
||||
*/
|
||||
if (unlikely(current->flags & PF_KTHREAD))
|
||||
return 1;
|
||||
return true;
|
||||
|
||||
if (!capable(cap))
|
||||
return 0;
|
||||
rc = cap_capable(current_cred(), &init_user_ns, cap,
|
||||
SECURITY_CAP_AUDIT);
|
||||
if (rc)
|
||||
return false;
|
||||
|
||||
rcu_read_lock();
|
||||
if (list_empty(&smack_onlycap_list)) {
|
||||
rcu_read_unlock();
|
||||
return 1;
|
||||
return true;
|
||||
}
|
||||
|
||||
list_for_each_entry_rcu(sklep, &smack_onlycap_list, list) {
|
||||
if (sklep->smk_label == skp) {
|
||||
rcu_read_unlock();
|
||||
return 1;
|
||||
return true;
|
||||
}
|
||||
}
|
||||
rcu_read_unlock();
|
||||
|
||||
return 0;
|
||||
return false;
|
||||
}
|
||||
|
|
|
@ -1915,7 +1915,7 @@ static int smack_file_receive(struct file *file)
|
|||
smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_PATH);
|
||||
smk_ad_setfield_u_fs_path(&ad, file->f_path);
|
||||
|
||||
if (S_ISSOCK(inode->i_mode)) {
|
||||
if (inode->i_sb->s_magic == SOCKFS_MAGIC) {
|
||||
sock = SOCKET_I(inode);
|
||||
ssp = sock->sk->sk_security;
|
||||
tsp = current_security();
|
||||
|
|
|
@ -18,6 +18,7 @@
|
|||
#include <linux/netfilter_ipv6.h>
|
||||
#include <linux/netdevice.h>
|
||||
#include <net/inet_sock.h>
|
||||
#include <net/net_namespace.h>
|
||||
#include "smack.h"
|
||||
|
||||
#if IS_ENABLED(CONFIG_IPV6)
|
||||
|
@ -74,20 +75,29 @@ static struct nf_hook_ops smack_nf_ops[] = {
|
|||
#endif /* IPV6 */
|
||||
};
|
||||
|
||||
static int __net_init smack_nf_register(struct net *net)
|
||||
{
|
||||
return nf_register_net_hooks(net, smack_nf_ops,
|
||||
ARRAY_SIZE(smack_nf_ops));
|
||||
}
|
||||
|
||||
static void __net_exit smack_nf_unregister(struct net *net)
|
||||
{
|
||||
nf_unregister_net_hooks(net, smack_nf_ops, ARRAY_SIZE(smack_nf_ops));
|
||||
}
|
||||
|
||||
static struct pernet_operations smack_net_ops = {
|
||||
.init = smack_nf_register,
|
||||
.exit = smack_nf_unregister,
|
||||
};
|
||||
|
||||
static int __init smack_nf_ip_init(void)
|
||||
{
|
||||
int err;
|
||||
|
||||
if (smack_enabled == 0)
|
||||
return 0;
|
||||
|
||||
printk(KERN_DEBUG "Smack: Registering netfilter hooks\n");
|
||||
|
||||
err = nf_register_hooks(smack_nf_ops, ARRAY_SIZE(smack_nf_ops));
|
||||
if (err)
|
||||
pr_info("Smack: nf_register_hooks: error %d\n", err);
|
||||
|
||||
return 0;
|
||||
return register_pernet_subsys(&smack_net_ops);
|
||||
}
|
||||
|
||||
__initcall(smack_nf_ip_init);
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue