mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 12:28:41 +08:00
a238cf5b89
Use structure for passing ACL line, in preparation for supporting policy namespace and conditional parameters. Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Signed-off-by: James Morris <jmorris@namei.org>
525 lines
14 KiB
C
525 lines
14 KiB
C
/*
|
|
* security/tomoyo/domain.c
|
|
*
|
|
* Domain transition functions for TOMOYO.
|
|
*
|
|
* Copyright (C) 2005-2010 NTT DATA CORPORATION
|
|
*/
|
|
|
|
#include "common.h"
|
|
#include <linux/binfmts.h>
|
|
#include <linux/slab.h>
|
|
|
|
/* Variables definitions.*/
|
|
|
|
/* The initial domain. */
|
|
struct tomoyo_domain_info tomoyo_kernel_domain;
|
|
|
|
/**
|
|
* tomoyo_update_policy - Update an entry for exception policy.
|
|
*
|
|
* @new_entry: Pointer to "struct tomoyo_acl_info".
|
|
* @size: Size of @new_entry in bytes.
|
|
* @param: Pointer to "struct tomoyo_acl_param".
|
|
* @check_duplicate: Callback function to find duplicated entry.
|
|
*
|
|
* Returns 0 on success, negative value otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
int tomoyo_update_policy(struct tomoyo_acl_head *new_entry, const int size,
|
|
struct tomoyo_acl_param *param,
|
|
bool (*check_duplicate) (const struct tomoyo_acl_head
|
|
*,
|
|
const struct tomoyo_acl_head
|
|
*))
|
|
{
|
|
int error = param->is_delete ? -ENOENT : -ENOMEM;
|
|
struct tomoyo_acl_head *entry;
|
|
struct list_head *list = param->list;
|
|
|
|
if (mutex_lock_interruptible(&tomoyo_policy_lock))
|
|
return -ENOMEM;
|
|
list_for_each_entry_rcu(entry, list, list) {
|
|
if (!check_duplicate(entry, new_entry))
|
|
continue;
|
|
entry->is_deleted = param->is_delete;
|
|
error = 0;
|
|
break;
|
|
}
|
|
if (error && !param->is_delete) {
|
|
entry = tomoyo_commit_ok(new_entry, size);
|
|
if (entry) {
|
|
list_add_tail_rcu(&entry->list, list);
|
|
error = 0;
|
|
}
|
|
}
|
|
mutex_unlock(&tomoyo_policy_lock);
|
|
return error;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_same_acl_head - Check for duplicated "struct tomoyo_acl_info" entry.
|
|
*
|
|
* @a: Pointer to "struct tomoyo_acl_info".
|
|
* @b: Pointer to "struct tomoyo_acl_info".
|
|
*
|
|
* Returns true if @a == @b, false otherwise.
|
|
*/
|
|
static inline bool tomoyo_same_acl_head(const struct tomoyo_acl_info *a,
|
|
const struct tomoyo_acl_info *b)
|
|
{
|
|
return a->type == b->type;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_update_domain - Update an entry for domain policy.
|
|
*
|
|
* @new_entry: Pointer to "struct tomoyo_acl_info".
|
|
* @size: Size of @new_entry in bytes.
|
|
* @param: Pointer to "struct tomoyo_acl_param".
|
|
* @check_duplicate: Callback function to find duplicated entry.
|
|
* @merge_duplicate: Callback function to merge duplicated entry.
|
|
*
|
|
* Returns 0 on success, negative value otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size,
|
|
struct tomoyo_acl_param *param,
|
|
bool (*check_duplicate) (const struct tomoyo_acl_info
|
|
*,
|
|
const struct tomoyo_acl_info
|
|
*),
|
|
bool (*merge_duplicate) (struct tomoyo_acl_info *,
|
|
struct tomoyo_acl_info *,
|
|
const bool))
|
|
{
|
|
const bool is_delete = param->is_delete;
|
|
int error = is_delete ? -ENOENT : -ENOMEM;
|
|
struct tomoyo_acl_info *entry;
|
|
struct list_head * const list = param->list;
|
|
|
|
if (mutex_lock_interruptible(&tomoyo_policy_lock))
|
|
return error;
|
|
list_for_each_entry_rcu(entry, list, list) {
|
|
if (!tomoyo_same_acl_head(entry, new_entry) ||
|
|
!check_duplicate(entry, new_entry))
|
|
continue;
|
|
if (merge_duplicate)
|
|
entry->is_deleted = merge_duplicate(entry, new_entry,
|
|
is_delete);
|
|
else
|
|
entry->is_deleted = is_delete;
|
|
error = 0;
|
|
break;
|
|
}
|
|
if (error && !is_delete) {
|
|
entry = tomoyo_commit_ok(new_entry, size);
|
|
if (entry) {
|
|
list_add_tail_rcu(&entry->list, list);
|
|
error = 0;
|
|
}
|
|
}
|
|
mutex_unlock(&tomoyo_policy_lock);
|
|
return error;
|
|
}
|
|
|
|
void tomoyo_check_acl(struct tomoyo_request_info *r,
|
|
bool (*check_entry) (struct tomoyo_request_info *,
|
|
const struct tomoyo_acl_info *))
|
|
{
|
|
const struct tomoyo_domain_info *domain = r->domain;
|
|
struct tomoyo_acl_info *ptr;
|
|
|
|
list_for_each_entry_rcu(ptr, &domain->acl_info_list, list) {
|
|
if (ptr->is_deleted || ptr->type != r->param_type)
|
|
continue;
|
|
if (check_entry(r, ptr)) {
|
|
r->granted = true;
|
|
return;
|
|
}
|
|
}
|
|
r->granted = false;
|
|
}
|
|
|
|
/* The list for "struct tomoyo_domain_info". */
|
|
LIST_HEAD(tomoyo_domain_list);
|
|
|
|
struct list_head tomoyo_policy_list[TOMOYO_MAX_POLICY];
|
|
struct list_head tomoyo_group_list[TOMOYO_MAX_GROUP];
|
|
|
|
/**
|
|
* tomoyo_last_word - Get last component of a domainname.
|
|
*
|
|
* @domainname: Domainname to check.
|
|
*
|
|
* Returns the last word of @domainname.
|
|
*/
|
|
static const char *tomoyo_last_word(const char *name)
|
|
{
|
|
const char *cp = strrchr(name, ' ');
|
|
if (cp)
|
|
return cp + 1;
|
|
return name;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_same_transition_control - Check for duplicated "struct tomoyo_transition_control" entry.
|
|
*
|
|
* @a: Pointer to "struct tomoyo_acl_head".
|
|
* @b: Pointer to "struct tomoyo_acl_head".
|
|
*
|
|
* Returns true if @a == @b, false otherwise.
|
|
*/
|
|
static bool tomoyo_same_transition_control(const struct tomoyo_acl_head *a,
|
|
const struct tomoyo_acl_head *b)
|
|
{
|
|
const struct tomoyo_transition_control *p1 = container_of(a,
|
|
typeof(*p1),
|
|
head);
|
|
const struct tomoyo_transition_control *p2 = container_of(b,
|
|
typeof(*p2),
|
|
head);
|
|
return p1->type == p2->type && p1->is_last_name == p2->is_last_name
|
|
&& p1->domainname == p2->domainname
|
|
&& p1->program == p2->program;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_write_transition_control - Write "struct tomoyo_transition_control" list.
|
|
*
|
|
* @param: Pointer to "struct tomoyo_acl_param".
|
|
* @type: Type of this entry.
|
|
*
|
|
* Returns 0 on success, negative value otherwise.
|
|
*/
|
|
int tomoyo_write_transition_control(struct tomoyo_acl_param *param,
|
|
const u8 type)
|
|
{
|
|
struct tomoyo_transition_control e = { .type = type };
|
|
int error = param->is_delete ? -ENOENT : -ENOMEM;
|
|
char *program = param->data;
|
|
char *domainname = strstr(program, " from ");
|
|
if (domainname) {
|
|
*domainname = '\0';
|
|
domainname += 6;
|
|
} else if (type == TOMOYO_TRANSITION_CONTROL_NO_KEEP ||
|
|
type == TOMOYO_TRANSITION_CONTROL_KEEP) {
|
|
domainname = program;
|
|
program = NULL;
|
|
}
|
|
if (program) {
|
|
if (!tomoyo_correct_path(program))
|
|
return -EINVAL;
|
|
e.program = tomoyo_get_name(program);
|
|
if (!e.program)
|
|
goto out;
|
|
}
|
|
if (domainname) {
|
|
if (!tomoyo_correct_domain(domainname)) {
|
|
if (!tomoyo_correct_path(domainname))
|
|
goto out;
|
|
e.is_last_name = true;
|
|
}
|
|
e.domainname = tomoyo_get_name(domainname);
|
|
if (!e.domainname)
|
|
goto out;
|
|
}
|
|
param->list = &tomoyo_policy_list[TOMOYO_ID_TRANSITION_CONTROL];
|
|
error = tomoyo_update_policy(&e.head, sizeof(e), param,
|
|
tomoyo_same_transition_control);
|
|
out:
|
|
tomoyo_put_name(e.domainname);
|
|
tomoyo_put_name(e.program);
|
|
return error;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_transition_type - Get domain transition type.
|
|
*
|
|
* @domainname: The name of domain.
|
|
* @program: The name of program.
|
|
*
|
|
* Returns TOMOYO_TRANSITION_CONTROL_INITIALIZE if executing @program
|
|
* reinitializes domain transition, TOMOYO_TRANSITION_CONTROL_KEEP if executing
|
|
* @program suppresses domain transition, others otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
static u8 tomoyo_transition_type(const struct tomoyo_path_info *domainname,
|
|
const struct tomoyo_path_info *program)
|
|
{
|
|
const struct tomoyo_transition_control *ptr;
|
|
const char *last_name = tomoyo_last_word(domainname->name);
|
|
u8 type;
|
|
for (type = 0; type < TOMOYO_MAX_TRANSITION_TYPE; type++) {
|
|
next:
|
|
list_for_each_entry_rcu(ptr, &tomoyo_policy_list
|
|
[TOMOYO_ID_TRANSITION_CONTROL],
|
|
head.list) {
|
|
if (ptr->head.is_deleted || ptr->type != type)
|
|
continue;
|
|
if (ptr->domainname) {
|
|
if (!ptr->is_last_name) {
|
|
if (ptr->domainname != domainname)
|
|
continue;
|
|
} else {
|
|
/*
|
|
* Use direct strcmp() since this is
|
|
* unlikely used.
|
|
*/
|
|
if (strcmp(ptr->domainname->name,
|
|
last_name))
|
|
continue;
|
|
}
|
|
}
|
|
if (ptr->program &&
|
|
tomoyo_pathcmp(ptr->program, program))
|
|
continue;
|
|
if (type == TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE) {
|
|
/*
|
|
* Do not check for initialize_domain if
|
|
* no_initialize_domain matched.
|
|
*/
|
|
type = TOMOYO_TRANSITION_CONTROL_NO_KEEP;
|
|
goto next;
|
|
}
|
|
goto done;
|
|
}
|
|
}
|
|
done:
|
|
return type;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_same_aggregator - Check for duplicated "struct tomoyo_aggregator" entry.
|
|
*
|
|
* @a: Pointer to "struct tomoyo_acl_head".
|
|
* @b: Pointer to "struct tomoyo_acl_head".
|
|
*
|
|
* Returns true if @a == @b, false otherwise.
|
|
*/
|
|
static bool tomoyo_same_aggregator(const struct tomoyo_acl_head *a,
|
|
const struct tomoyo_acl_head *b)
|
|
{
|
|
const struct tomoyo_aggregator *p1 = container_of(a, typeof(*p1),
|
|
head);
|
|
const struct tomoyo_aggregator *p2 = container_of(b, typeof(*p2),
|
|
head);
|
|
return p1->original_name == p2->original_name &&
|
|
p1->aggregated_name == p2->aggregated_name;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_write_aggregator - Write "struct tomoyo_aggregator" list.
|
|
*
|
|
* @param: Pointer to "struct tomoyo_acl_param".
|
|
*
|
|
* Returns 0 on success, negative value otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
int tomoyo_write_aggregator(struct tomoyo_acl_param *param)
|
|
{
|
|
struct tomoyo_aggregator e = { };
|
|
int error = param->is_delete ? -ENOENT : -ENOMEM;
|
|
const char *original_name = tomoyo_read_token(param);
|
|
const char *aggregated_name = tomoyo_read_token(param);
|
|
if (!tomoyo_correct_word(original_name) ||
|
|
!tomoyo_correct_path(aggregated_name))
|
|
return -EINVAL;
|
|
e.original_name = tomoyo_get_name(original_name);
|
|
e.aggregated_name = tomoyo_get_name(aggregated_name);
|
|
if (!e.original_name || !e.aggregated_name ||
|
|
e.aggregated_name->is_patterned) /* No patterns allowed. */
|
|
goto out;
|
|
param->list = &tomoyo_policy_list[TOMOYO_ID_AGGREGATOR];
|
|
error = tomoyo_update_policy(&e.head, sizeof(e), param,
|
|
tomoyo_same_aggregator);
|
|
out:
|
|
tomoyo_put_name(e.original_name);
|
|
tomoyo_put_name(e.aggregated_name);
|
|
return error;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_assign_domain - Create a domain.
|
|
*
|
|
* @domainname: The name of domain.
|
|
* @profile: Profile number to assign if the domain was newly created.
|
|
*
|
|
* Returns pointer to "struct tomoyo_domain_info" on success, NULL otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname,
|
|
const u8 profile)
|
|
{
|
|
struct tomoyo_domain_info *entry;
|
|
struct tomoyo_domain_info *domain = NULL;
|
|
const struct tomoyo_path_info *saved_domainname;
|
|
bool found = false;
|
|
|
|
if (!tomoyo_correct_domain(domainname))
|
|
return NULL;
|
|
saved_domainname = tomoyo_get_name(domainname);
|
|
if (!saved_domainname)
|
|
return NULL;
|
|
entry = kzalloc(sizeof(*entry), GFP_NOFS);
|
|
if (mutex_lock_interruptible(&tomoyo_policy_lock))
|
|
goto out;
|
|
list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
|
|
if (domain->is_deleted ||
|
|
tomoyo_pathcmp(saved_domainname, domain->domainname))
|
|
continue;
|
|
found = true;
|
|
break;
|
|
}
|
|
if (!found && tomoyo_memory_ok(entry)) {
|
|
INIT_LIST_HEAD(&entry->acl_info_list);
|
|
entry->domainname = saved_domainname;
|
|
saved_domainname = NULL;
|
|
entry->profile = profile;
|
|
list_add_tail_rcu(&entry->list, &tomoyo_domain_list);
|
|
domain = entry;
|
|
entry = NULL;
|
|
found = true;
|
|
}
|
|
mutex_unlock(&tomoyo_policy_lock);
|
|
out:
|
|
tomoyo_put_name(saved_domainname);
|
|
kfree(entry);
|
|
return found ? domain : NULL;
|
|
}
|
|
|
|
/**
|
|
* tomoyo_find_next_domain - Find a domain.
|
|
*
|
|
* @bprm: Pointer to "struct linux_binprm".
|
|
*
|
|
* Returns 0 on success, negative value otherwise.
|
|
*
|
|
* Caller holds tomoyo_read_lock().
|
|
*/
|
|
int tomoyo_find_next_domain(struct linux_binprm *bprm)
|
|
{
|
|
struct tomoyo_request_info r;
|
|
char *tmp = kzalloc(TOMOYO_EXEC_TMPSIZE, GFP_NOFS);
|
|
struct tomoyo_domain_info *old_domain = tomoyo_domain();
|
|
struct tomoyo_domain_info *domain = NULL;
|
|
const char *original_name = bprm->filename;
|
|
u8 mode;
|
|
bool is_enforce;
|
|
int retval = -ENOMEM;
|
|
bool need_kfree = false;
|
|
struct tomoyo_path_info rn = { }; /* real name */
|
|
|
|
mode = tomoyo_init_request_info(&r, NULL, TOMOYO_MAC_FILE_EXECUTE);
|
|
is_enforce = (mode == TOMOYO_CONFIG_ENFORCING);
|
|
if (!tmp)
|
|
goto out;
|
|
|
|
retry:
|
|
if (need_kfree) {
|
|
kfree(rn.name);
|
|
need_kfree = false;
|
|
}
|
|
/* Get symlink's pathname of program. */
|
|
retval = -ENOENT;
|
|
rn.name = tomoyo_realpath_nofollow(original_name);
|
|
if (!rn.name)
|
|
goto out;
|
|
tomoyo_fill_path_info(&rn);
|
|
need_kfree = true;
|
|
|
|
/* Check 'aggregator' directive. */
|
|
{
|
|
struct tomoyo_aggregator *ptr;
|
|
list_for_each_entry_rcu(ptr, &tomoyo_policy_list
|
|
[TOMOYO_ID_AGGREGATOR], head.list) {
|
|
if (ptr->head.is_deleted ||
|
|
!tomoyo_path_matches_pattern(&rn,
|
|
ptr->original_name))
|
|
continue;
|
|
kfree(rn.name);
|
|
need_kfree = false;
|
|
/* This is OK because it is read only. */
|
|
rn = *ptr->aggregated_name;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Check execute permission. */
|
|
retval = tomoyo_path_permission(&r, TOMOYO_TYPE_EXECUTE, &rn);
|
|
if (retval == TOMOYO_RETRY_REQUEST)
|
|
goto retry;
|
|
if (retval < 0)
|
|
goto out;
|
|
/*
|
|
* To be able to specify domainnames with wildcards, use the
|
|
* pathname specified in the policy (which may contain
|
|
* wildcard) rather than the pathname passed to execve()
|
|
* (which never contains wildcard).
|
|
*/
|
|
if (r.param.path.matched_path) {
|
|
if (need_kfree)
|
|
kfree(rn.name);
|
|
need_kfree = false;
|
|
/* This is OK because it is read only. */
|
|
rn = *r.param.path.matched_path;
|
|
}
|
|
|
|
/* Calculate domain to transit to. */
|
|
switch (tomoyo_transition_type(old_domain->domainname, &rn)) {
|
|
case TOMOYO_TRANSITION_CONTROL_INITIALIZE:
|
|
/* Transit to the child of tomoyo_kernel_domain domain. */
|
|
snprintf(tmp, TOMOYO_EXEC_TMPSIZE - 1, TOMOYO_ROOT_NAME " "
|
|
"%s", rn.name);
|
|
break;
|
|
case TOMOYO_TRANSITION_CONTROL_KEEP:
|
|
/* Keep current domain. */
|
|
domain = old_domain;
|
|
break;
|
|
default:
|
|
if (old_domain == &tomoyo_kernel_domain &&
|
|
!tomoyo_policy_loaded) {
|
|
/*
|
|
* Needn't to transit from kernel domain before
|
|
* starting /sbin/init. But transit from kernel domain
|
|
* if executing initializers because they might start
|
|
* before /sbin/init.
|
|
*/
|
|
domain = old_domain;
|
|
} else {
|
|
/* Normal domain transition. */
|
|
snprintf(tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s",
|
|
old_domain->domainname->name, rn.name);
|
|
}
|
|
break;
|
|
}
|
|
if (domain || strlen(tmp) >= TOMOYO_EXEC_TMPSIZE - 10)
|
|
goto done;
|
|
domain = tomoyo_find_domain(tmp);
|
|
if (!domain)
|
|
domain = tomoyo_assign_domain(tmp, old_domain->profile);
|
|
done:
|
|
if (domain)
|
|
goto out;
|
|
printk(KERN_WARNING "TOMOYO-ERROR: Domain '%s' not defined.\n", tmp);
|
|
if (is_enforce)
|
|
retval = -EPERM;
|
|
else
|
|
old_domain->transition_failed = true;
|
|
out:
|
|
if (!domain)
|
|
domain = old_domain;
|
|
/* Update reference count on "struct tomoyo_domain_info". */
|
|
atomic_inc(&domain->users);
|
|
bprm->cred->security = domain;
|
|
if (need_kfree)
|
|
kfree(rn.name);
|
|
kfree(tmp);
|
|
return retval;
|
|
}
|