conditional.c 11.1 KB
Newer Older
L
Linus Torvalds 已提交
1
/* Authors: Karl MacMillan <kmacmillan@tresys.com>
2
 *	    Frank Mayer <mayerf@tresys.com>
L
Linus Torvalds 已提交
3 4 5
 *
 * Copyright (C) 2003 - 2004 Tresys Technology, LLC
 *	This program is free software; you can redistribute it and/or modify
6
 *	it under the terms of the GNU General Public License as published by
L
Linus Torvalds 已提交
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
 *	the Free Software Foundation, version 2.
 */

#include <linux/kernel.h>
#include <linux/errno.h>
#include <linux/string.h>
#include <linux/spinlock.h>
#include <linux/slab.h>

#include "security.h"
#include "conditional.h"

/*
 * cond_evaluate_expr evaluates a conditional expr
 * in reverse polish notation. It returns true (1), false (0),
 * or undefined (-1). Undefined occurs when the expression
 * exceeds the stack depth of COND_EXPR_MAXDEPTH.
 */
static int cond_evaluate_expr(struct policydb *p, struct cond_expr *expr)
{

	struct cond_expr *cur;
	int s[COND_EXPR_MAXDEPTH];
	int sp = -1;

32
	for (cur = expr; cur; cur = cur->next) {
L
Linus Torvalds 已提交
33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
		switch (cur->expr_type) {
		case COND_BOOL:
			if (sp == (COND_EXPR_MAXDEPTH - 1))
				return -1;
			sp++;
			s[sp] = p->bool_val_to_struct[cur->bool - 1]->state;
			break;
		case COND_NOT:
			if (sp < 0)
				return -1;
			s[sp] = !s[sp];
			break;
		case COND_OR:
			if (sp < 1)
				return -1;
			sp--;
			s[sp] |= s[sp + 1];
			break;
		case COND_AND:
			if (sp < 1)
				return -1;
			sp--;
			s[sp] &= s[sp + 1];
			break;
		case COND_XOR:
			if (sp < 1)
				return -1;
			sp--;
			s[sp] ^= s[sp + 1];
			break;
		case COND_EQ:
			if (sp < 1)
				return -1;
			sp--;
			s[sp] = (s[sp] == s[sp + 1]);
			break;
		case COND_NEQ:
			if (sp < 1)
				return -1;
			sp--;
			s[sp] = (s[sp] != s[sp + 1]);
			break;
		default:
			return -1;
		}
	}
	return s[0];
}

/*
 * evaluate_cond_node evaluates the conditional stored in
 * a struct cond_node and if the result is different than the
 * current state of the node it sets the rules in the true/false
 * list appropriately. If the result of the expression is undefined
 * all of the rules are disabled for safety.
 */
int evaluate_cond_node(struct policydb *p, struct cond_node *node)
{
	int new_state;
92
	struct cond_av_list *cur;
L
Linus Torvalds 已提交
93 94 95 96 97

	new_state = cond_evaluate_expr(p, node->expr);
	if (new_state != node->cur_state) {
		node->cur_state = new_state;
		if (new_state == -1)
J
James Morris 已提交
98
			printk(KERN_ERR "SELinux: expression result was undefined - disabling all rules.\n");
L
Linus Torvalds 已提交
99
		/* turn the rules on or off */
100
		for (cur = node->true_list; cur; cur = cur->next) {
101
			if (new_state <= 0)
102
				cur->node->key.specified &= ~AVTAB_ENABLED;
103
			else
104
				cur->node->key.specified |= AVTAB_ENABLED;
L
Linus Torvalds 已提交
105 106
		}

107
		for (cur = node->false_list; cur; cur = cur->next) {
L
Linus Torvalds 已提交
108
			/* -1 or 1 */
109
			if (new_state)
110
				cur->node->key.specified &= ~AVTAB_ENABLED;
111
			else
112
				cur->node->key.specified |= AVTAB_ENABLED;
L
Linus Torvalds 已提交
113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130
		}
	}
	return 0;
}

int cond_policydb_init(struct policydb *p)
{
	p->bool_val_to_struct = NULL;
	p->cond_list = NULL;
	if (avtab_init(&p->te_cond_avtab))
		return -1;

	return 0;
}

static void cond_av_list_destroy(struct cond_av_list *list)
{
	struct cond_av_list *cur, *next;
131
	for (cur = list; cur; cur = next) {
L
Linus Torvalds 已提交
132 133 134 135 136 137 138 139 140 141
		next = cur->next;
		/* the avtab_ptr_t node is destroy by the avtab */
		kfree(cur);
	}
}

static void cond_node_destroy(struct cond_node *node)
{
	struct cond_expr *cur_expr, *next_expr;

142
	for (cur_expr = node->expr; cur_expr; cur_expr = next_expr) {
L
Linus Torvalds 已提交
143 144 145 146 147 148 149 150 151 152 153 154 155 156 157
		next_expr = cur_expr->next;
		kfree(cur_expr);
	}
	cond_av_list_destroy(node->true_list);
	cond_av_list_destroy(node->false_list);
	kfree(node);
}

static void cond_list_destroy(struct cond_node *list)
{
	struct cond_node *next, *cur;

	if (list == NULL)
		return;

158
	for (cur = list; cur; cur = next) {
L
Linus Torvalds 已提交
159 160 161 162 163 164 165
		next = cur->next;
		cond_node_destroy(cur);
	}
}

void cond_policydb_destroy(struct policydb *p)
{
J
Jesper Juhl 已提交
166
	kfree(p->bool_val_to_struct);
L
Linus Torvalds 已提交
167 168 169 170 171 172
	avtab_destroy(&p->te_cond_avtab);
	cond_list_destroy(p->cond_list);
}

int cond_init_bool_indexes(struct policydb *p)
{
J
Jesper Juhl 已提交
173
	kfree(p->bool_val_to_struct);
174 175
	p->bool_val_to_struct = (struct cond_bool_datum **)
		kmalloc(p->p_bools.nprim * sizeof(struct cond_bool_datum *), GFP_KERNEL);
L
Linus Torvalds 已提交
176 177 178 179 180 181 182
	if (!p->bool_val_to_struct)
		return -1;
	return 0;
}

int cond_destroy_bool(void *key, void *datum, void *p)
{
J
Jesper Juhl 已提交
183
	kfree(key);
L
Linus Torvalds 已提交
184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199
	kfree(datum);
	return 0;
}

int cond_index_bool(void *key, void *datum, void *datap)
{
	struct policydb *p;
	struct cond_bool_datum *booldatum;

	booldatum = datum;
	p = datap;

	if (!booldatum->value || booldatum->value > p->p_bools.nprim)
		return -EINVAL;

	p->p_bool_val_to_name[booldatum->value - 1] = key;
200
	p->bool_val_to_struct[booldatum->value - 1] = booldatum;
L
Linus Torvalds 已提交
201 202 203 204 205 206 207 208 209 210 211 212 213 214 215

	return 0;
}

static int bool_isvalid(struct cond_bool_datum *b)
{
	if (!(b->state == 0 || b->state == 1))
		return 0;
	return 1;
}

int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp)
{
	char *key = NULL;
	struct cond_bool_datum *booldatum;
216 217
	__le32 buf[3];
	u32 len;
L
Linus Torvalds 已提交
218 219
	int rc;

J
James Morris 已提交
220
	booldatum = kzalloc(sizeof(struct cond_bool_datum), GFP_KERNEL);
L
Linus Torvalds 已提交
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241
	if (!booldatum)
		return -1;

	rc = next_entry(buf, fp, sizeof buf);
	if (rc < 0)
		goto err;

	booldatum->value = le32_to_cpu(buf[0]);
	booldatum->state = le32_to_cpu(buf[1]);

	if (!bool_isvalid(booldatum))
		goto err;

	len = le32_to_cpu(buf[2]);

	key = kmalloc(len + 1, GFP_KERNEL);
	if (!key)
		goto err;
	rc = next_entry(key, fp, len);
	if (rc < 0)
		goto err;
242
	key[len] = '\0';
L
Linus Torvalds 已提交
243 244 245 246 247 248 249 250 251
	if (hashtab_insert(h, key, booldatum))
		goto err;

	return 0;
err:
	cond_destroy_bool(key, booldatum, NULL);
	return -1;
}

252
struct cond_insertf_data {
253 254 255 256 257 258 259 260 261 262 263
	struct policydb *p;
	struct cond_av_list *other;
	struct cond_av_list *head;
	struct cond_av_list *tail;
};

static int cond_insertf(struct avtab *a, struct avtab_key *k, struct avtab_datum *d, void *ptr)
{
	struct cond_insertf_data *data = ptr;
	struct policydb *p = data->p;
	struct cond_av_list *other = data->other, *list, *cur;
L
Linus Torvalds 已提交
264 265
	struct avtab_node *node_ptr;
	u8 found;
266
	int rc = -EINVAL;
L
Linus Torvalds 已提交
267

268 269 270 271 272 273 274
	/*
	 * For type rules we have to make certain there aren't any
	 * conflicting rules by searching the te_avtab and the
	 * cond_te_avtab.
	 */
	if (k->specified & AVTAB_TYPE) {
		if (avtab_search(&p->te_avtab, k)) {
E
Eric Paris 已提交
275
			printk(KERN_ERR "SELinux: type rule already exists outside of a conditional.\n");
L
Linus Torvalds 已提交
276
			goto err;
277
		}
L
Linus Torvalds 已提交
278
		/*
279 280 281 282 283 284
		 * If we are reading the false list other will be a pointer to
		 * the true list. We can have duplicate entries if there is only
		 * 1 other entry and it is in our true list.
		 *
		 * If we are reading the true list (other == NULL) there shouldn't
		 * be any other entries.
L
Linus Torvalds 已提交
285
		 */
286 287 288 289
		if (other) {
			node_ptr = avtab_search_node(&p->te_cond_avtab, k);
			if (node_ptr) {
				if (avtab_search_node_next(node_ptr, k->specified)) {
E
Eric Paris 已提交
290
					printk(KERN_ERR "SELinux: too many conflicting type rules.\n");
291 292 293
					goto err;
				}
				found = 0;
294
				for (cur = other; cur; cur = cur->next) {
295 296 297
					if (cur->node == node_ptr) {
						found = 1;
						break;
L
Linus Torvalds 已提交
298 299
					}
				}
300
				if (!found) {
E
Eric Paris 已提交
301
					printk(KERN_ERR "SELinux: conflicting type rules.\n");
L
Linus Torvalds 已提交
302 303 304
					goto err;
				}
			}
305 306
		} else {
			if (avtab_search(&p->te_cond_avtab, k)) {
E
Eric Paris 已提交
307
				printk(KERN_ERR "SELinux: conflicting type rules when adding type rule for true.\n");
308 309
				goto err;
			}
L
Linus Torvalds 已提交
310
		}
311
	}
L
Linus Torvalds 已提交
312

313 314
	node_ptr = avtab_insert_nonunique(&p->te_cond_avtab, k, d);
	if (!node_ptr) {
E
Eric Paris 已提交
315
		printk(KERN_ERR "SELinux: could not insert rule.\n");
316
		rc = -ENOMEM;
317
		goto err;
L
Linus Torvalds 已提交
318 319
	}

J
James Morris 已提交
320
	list = kzalloc(sizeof(struct cond_av_list), GFP_KERNEL);
321 322
	if (!list) {
		rc = -ENOMEM;
323
		goto err;
324
	}
325 326 327 328 329 330 331

	list->node = node_ptr;
	if (!data->head)
		data->head = list;
	else
		data->tail->next = list;
	data->tail = list;
L
Linus Torvalds 已提交
332
	return 0;
333

L
Linus Torvalds 已提交
334
err:
335 336
	cond_av_list_destroy(data->head);
	data->head = NULL;
337
	return rc;
L
Linus Torvalds 已提交
338 339
}

340 341 342
static int cond_read_av_list(struct policydb *p, void *fp, struct cond_av_list **ret_list, struct cond_av_list *other)
{
	int i, rc;
343 344
	__le32 buf[1];
	u32 len;
345 346 347 348 349 350
	struct cond_insertf_data data;

	*ret_list = NULL;

	len = 0;
	rc = next_entry(buf, fp, sizeof(u32));
351 352
	if (rc)
		return rc;
353 354

	len = le32_to_cpu(buf[0]);
355
	if (len == 0)
356 357 358 359 360 361 362
		return 0;

	data.p = p;
	data.other = other;
	data.head = NULL;
	data.tail = NULL;
	for (i = 0; i < len; i++) {
363 364
		rc = avtab_read_item(&p->te_cond_avtab, fp, p, cond_insertf,
				     &data);
365 366 367 368 369 370 371 372
		if (rc)
			return rc;
	}

	*ret_list = data.head;
	return 0;
}

L
Linus Torvalds 已提交
373 374 375
static int expr_isvalid(struct policydb *p, struct cond_expr *expr)
{
	if (expr->expr_type <= 0 || expr->expr_type > COND_LAST) {
E
Eric Paris 已提交
376
		printk(KERN_ERR "SELinux: conditional expressions uses unknown operator.\n");
L
Linus Torvalds 已提交
377 378 379 380
		return 0;
	}

	if (expr->bool > p->p_bools.nprim) {
E
Eric Paris 已提交
381
		printk(KERN_ERR "SELinux: conditional expressions uses unknown bool.\n");
L
Linus Torvalds 已提交
382 383 384 385 386 387 388
		return 0;
	}
	return 1;
}

static int cond_read_node(struct policydb *p, struct cond_node *node, void *fp)
{
389 390
	__le32 buf[2];
	u32 len, i;
L
Linus Torvalds 已提交
391 392 393 394
	int rc;
	struct cond_expr *expr = NULL, *last = NULL;

	rc = next_entry(buf, fp, sizeof(u32));
395 396
	if (rc)
		return rc;
L
Linus Torvalds 已提交
397 398 399 400 401

	node->cur_state = le32_to_cpu(buf[0]);

	len = 0;
	rc = next_entry(buf, fp, sizeof(u32));
402 403
	if (rc)
		return rc;
L
Linus Torvalds 已提交
404 405 406 407

	/* expr */
	len = le32_to_cpu(buf[0]);

408
	for (i = 0; i < len; i++) {
L
Linus Torvalds 已提交
409
		rc = next_entry(buf, fp, sizeof(u32) * 2);
410
		if (rc)
L
Linus Torvalds 已提交
411 412
			goto err;

413
		rc = -ENOMEM;
J
James Morris 已提交
414
		expr = kzalloc(sizeof(struct cond_expr), GFP_KERNEL);
415
		if (!expr)
L
Linus Torvalds 已提交
416 417 418 419 420 421
			goto err;

		expr->expr_type = le32_to_cpu(buf[0]);
		expr->bool = le32_to_cpu(buf[1]);

		if (!expr_isvalid(p, expr)) {
422
			rc = -EINVAL;
L
Linus Torvalds 已提交
423 424 425 426
			kfree(expr);
			goto err;
		}

427
		if (i == 0)
L
Linus Torvalds 已提交
428
			node->expr = expr;
429
		else
L
Linus Torvalds 已提交
430 431 432 433
			last->next = expr;
		last = expr;
	}

434 435
	rc = cond_read_av_list(p, fp, &node->true_list, NULL);
	if (rc)
L
Linus Torvalds 已提交
436
		goto err;
437 438
	rc = cond_read_av_list(p, fp, &node->false_list, node->true_list);
	if (rc)
L
Linus Torvalds 已提交
439 440 441 442
		goto err;
	return 0;
err:
	cond_node_destroy(node);
443
	return rc;
L
Linus Torvalds 已提交
444 445 446 447 448
}

int cond_read_list(struct policydb *p, void *fp)
{
	struct cond_node *node, *last = NULL;
449 450
	__le32 buf[1];
	u32 i, len;
L
Linus Torvalds 已提交
451 452 453
	int rc;

	rc = next_entry(buf, fp, sizeof buf);
454 455
	if (rc)
		return rc;
L
Linus Torvalds 已提交
456 457 458

	len = le32_to_cpu(buf[0]);

459 460 461 462
	rc = avtab_alloc(&(p->te_cond_avtab), p->te_avtab.nel);
	if (rc)
		goto err;

L
Linus Torvalds 已提交
463
	for (i = 0; i < len; i++) {
464
		rc = -ENOMEM;
J
James Morris 已提交
465
		node = kzalloc(sizeof(struct cond_node), GFP_KERNEL);
L
Linus Torvalds 已提交
466 467 468
		if (!node)
			goto err;

469 470
		rc = cond_read_node(p, node, fp);
		if (rc)
L
Linus Torvalds 已提交
471 472
			goto err;

473
		if (i == 0)
L
Linus Torvalds 已提交
474
			p->cond_list = node;
475
		else
L
Linus Torvalds 已提交
476 477 478 479 480 481
			last->next = node;
		last = node;
	}
	return 0;
err:
	cond_list_destroy(p->cond_list);
482
	p->cond_list = NULL;
483
	return rc;
L
Linus Torvalds 已提交
484 485 486 487 488 489 490 491 492
}

/* Determine whether additional permissions are granted by the conditional
 * av table, and if so, add them to the result
 */
void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd)
{
	struct avtab_node *node;

493
	if (!ctab || !key || !avd)
L
Linus Torvalds 已提交
494 495
		return;

496
	for (node = avtab_search_node(ctab, key); node;
497
				node = avtab_search_node_next(node, key->specified)) {
498 499
		if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) ==
		    (node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED)))
500
			avd->allowed |= node->datum.data;
501 502
		if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) ==
		    (node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED)))
L
Linus Torvalds 已提交
503 504 505 506 507
			/* Since a '0' in an auditdeny mask represents a
			 * permission we do NOT want to audit (dontaudit), we use
			 * the '&' operand to ensure that all '0's in the mask
			 * are retained (much unlike the allow and auditallow cases).
			 */
508
			avd->auditdeny &= node->datum.data;
509 510
		if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) ==
		    (node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED)))
511
			avd->auditallow |= node->datum.data;
L
Linus Torvalds 已提交
512 513 514
	}
	return;
}