smack_access.c 14.3 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
 *
 *      This program is free software; you can redistribute it and/or modify
 *      it under the terms of the GNU General Public License as published by
 *      the Free Software Foundation, version 2.
 *
 * Author:
 *      Casey Schaufler <casey@schaufler-ca.com>
 *
 */

#include <linux/types.h>
14
#include <linux/slab.h>
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
#include <linux/fs.h>
#include <linux/sched.h>
#include "smack.h"

struct smack_known smack_known_huh = {
	.smk_known	= "?",
	.smk_secid	= 2,
};

struct smack_known smack_known_hat = {
	.smk_known	= "^",
	.smk_secid	= 3,
};

struct smack_known smack_known_star = {
	.smk_known	= "*",
	.smk_secid	= 4,
};

struct smack_known smack_known_floor = {
	.smk_known	= "_",
	.smk_secid	= 5,
};

struct smack_known smack_known_invalid = {
	.smk_known	= "",
	.smk_secid	= 6,
};

44 45 46 47 48
struct smack_known smack_known_web = {
	.smk_known	= "@",
	.smk_secid	= 7,
};

49
LIST_HEAD(smack_known_list);
50 51 52 53 54 55 56

/*
 * The initial value needs to be bigger than any of the
 * known values above.
 */
static u32 smack_next_secid = 10;

E
Etienne Basset 已提交
57 58 59 60 61 62
/*
 * what events do we log
 * can be overwritten at run-time by /smack/logging
 */
int log_policy = SMACK_AUDIT_DENIED;

63 64 65 66
/**
 * smk_access_entry - look up matching access rule
 * @subject_label: a pointer to the subject's Smack label
 * @object_label: a pointer to the object's Smack label
67
 * @rule_list: the list of rules to search
68 69
 *
 * This function looks up the subject/object pair in the
70 71
 * access rule list and returns the access mode. If no
 * entry is found returns -ENOENT.
72 73 74
 *
 * NOTE:
 *
75 76 77 78 79 80 81 82 83 84 85 86
 * Earlier versions of this function allowed for labels that
 * were not on the label list. This was done to allow for
 * labels to come over the network that had never been seen
 * before on this host. Unless the receiving socket has the
 * star label this will always result in a failure check. The
 * star labeled socket case is now handled in the networking
 * hooks so there is no case where the label is not on the
 * label list. Checking to see if the address of two labels
 * is the same is now a reliable test.
 *
 * Do the object check first because that is more
 * likely to differ.
87 88
 *
 * Allowing write access implies allowing locking.
89
 */
90 91
int smk_access_entry(char *subject_label, char *object_label,
			struct list_head *rule_list)
92
{
93
	int may = -ENOENT;
94 95
	struct smack_rule *srp;

96
	list_for_each_entry_rcu(srp, rule_list, list) {
97
		if (srp->smk_object == object_label &&
98
		    srp->smk_subject->smk_known == subject_label) {
99 100
			may = srp->smk_access;
			break;
101 102 103
		}
	}

104 105 106 107 108
	/*
	 * MAY_WRITE implies MAY_LOCK.
	 */
	if ((may & MAY_WRITE) == MAY_WRITE)
		may |= MAY_LOCK;
109 110 111
	return may;
}

112 113
/**
 * smk_access - determine if a subject has a specific access to an object
114
 * @subject_known: a pointer to the subject's Smack label entry
115 116
 * @object_label: a pointer to the object's Smack label
 * @request: the access requested, in "MAY" format
E
Etienne Basset 已提交
117
 * @a : a pointer to the audit data
118 119 120 121 122
 *
 * This function looks up the subject/object pair in the
 * access rule list and returns 0 if the access is permitted,
 * non zero otherwise.
 *
123
 * Smack labels are shared on smack_list
124
 */
125 126
int smk_access(struct smack_known *subject_known, char *object_label,
		int request, struct smk_audit_info *a)
127
{
128
	int may = MAY_NOT;
E
Etienne Basset 已提交
129
	int rc = 0;
130 131 132 133 134 135

	/*
	 * Hardcoded comparisons.
	 *
	 * A star subject can't access any object.
	 */
136
	if (subject_known == &smack_known_star) {
E
Etienne Basset 已提交
137 138 139
		rc = -EACCES;
		goto out_audit;
	}
140 141 142 143 144 145
	/*
	 * An internet object can be accessed by any subject.
	 * Tasks cannot be assigned the internet label.
	 * An internet subject can access any object.
	 */
	if (object_label == smack_known_web.smk_known ||
146
	    subject_known == &smack_known_web)
E
Etienne Basset 已提交
147
		goto out_audit;
148 149 150
	/*
	 * A star object can be accessed by any subject.
	 */
151
	if (object_label == smack_known_star.smk_known)
E
Etienne Basset 已提交
152
		goto out_audit;
153 154 155 156
	/*
	 * An object can be accessed in any way by a subject
	 * with the same label.
	 */
157
	if (subject_known->smk_known == object_label)
E
Etienne Basset 已提交
158
		goto out_audit;
159 160 161 162 163
	/*
	 * A hat subject can read any object.
	 * A floor object can be read by any subject.
	 */
	if ((request & MAY_ANYREAD) == request) {
164
		if (object_label == smack_known_floor.smk_known)
E
Etienne Basset 已提交
165
			goto out_audit;
166
		if (subject_known == &smack_known_hat)
E
Etienne Basset 已提交
167
			goto out_audit;
168 169 170 171 172
	}
	/*
	 * Beyond here an explicit relationship is required.
	 * If the requested access is contained in the available
	 * access (e.g. read is included in readwrite) it's
173 174
	 * good. A negative response from smk_access_entry()
	 * indicates there is no entry for this pair.
175
	 */
176
	rcu_read_lock();
177 178
	may = smk_access_entry(subject_known->smk_known, object_label,
				&subject_known->smk_rules);
179 180 181
	rcu_read_unlock();

	if (may > 0 && (request & may) == request)
E
Etienne Basset 已提交
182
		goto out_audit;
183

E
Etienne Basset 已提交
184 185 186 187
	rc = -EACCES;
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
188 189
		smack_log(subject_known->smk_known, object_label, request,
				rc, a);
E
Etienne Basset 已提交
190 191
#endif
	return rc;
192 193 194 195
}

/**
 * smk_curacc - determine if current has a specific access to an object
196 197
 * @obj_label: a pointer to the object's Smack label
 * @mode: the access requested, in "MAY" format
E
Etienne Basset 已提交
198
 * @a : common audit data
199 200 201
 *
 * This function checks the current subject label/object label pair
 * in the access rule list and returns 0 if the access is permitted,
202
 * non zero otherwise. It allows that current may have the capability
203 204
 * to override the rules.
 */
E
Etienne Basset 已提交
205
int smk_curacc(char *obj_label, u32 mode, struct smk_audit_info *a)
206
{
207
	struct task_smack *tsp = current_security();
208
	struct smack_known *skp = smk_of_task(tsp);
209
	int may;
210 211
	int rc;

212 213 214
	/*
	 * Check the global rule list
	 */
215
	rc = smk_access(skp, obj_label, mode, NULL);
216 217 218 219 220
	if (rc == 0) {
		/*
		 * If there is an entry in the task's rule list
		 * it can further restrict access.
		 */
221 222
		may = smk_access_entry(skp->smk_known, obj_label,
					&tsp->smk_rules);
223 224 225 226 227 228
		if (may < 0)
			goto out_audit;
		if ((mode & may) == mode)
			goto out_audit;
		rc = -EACCES;
	}
229

230
	/*
231
	 * Allow for priviliged to override policy.
232
	 */
233
	if (rc != 0 && smack_privileged(CAP_MAC_OVERRIDE))
234
		rc = 0;
235

E
Etienne Basset 已提交
236 237 238
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
239
		smack_log(skp->smk_known, obj_label, mode, rc, a);
E
Etienne Basset 已提交
240
#endif
241 242 243
	return rc;
}

E
Etienne Basset 已提交
244 245 246 247 248 249 250 251 252 253 254
#ifdef CONFIG_AUDIT
/**
 * smack_str_from_perm : helper to transalate an int to a
 * readable string
 * @string : the string to fill
 * @access : the int
 *
 */
static inline void smack_str_from_perm(char *string, int access)
{
	int i = 0;
255

E
Etienne Basset 已提交
256 257 258 259 260 261 262 263
	if (access & MAY_READ)
		string[i++] = 'r';
	if (access & MAY_WRITE)
		string[i++] = 'w';
	if (access & MAY_EXEC)
		string[i++] = 'x';
	if (access & MAY_APPEND)
		string[i++] = 'a';
264 265
	if (access & MAY_TRANSMUTE)
		string[i++] = 't';
266 267
	if (access & MAY_LOCK)
		string[i++] = 'l';
E
Etienne Basset 已提交
268 269 270 271 272 273 274 275 276 277 278 279
	string[i] = '\0';
}
/**
 * smack_log_callback - SMACK specific information
 * will be called by generic audit code
 * @ab : the audit_buffer
 * @a  : audit_data
 *
 */
static void smack_log_callback(struct audit_buffer *ab, void *a)
{
	struct common_audit_data *ad = a;
280
	struct smack_audit_data *sad = ad->smack_audit_data;
281
	audit_log_format(ab, "lsm=SMACK fn=%s action=%s",
282
			 ad->smack_audit_data->function,
E
Etienne Basset 已提交
283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314
			 sad->result ? "denied" : "granted");
	audit_log_format(ab, " subject=");
	audit_log_untrustedstring(ab, sad->subject);
	audit_log_format(ab, " object=");
	audit_log_untrustedstring(ab, sad->object);
	audit_log_format(ab, " requested=%s", sad->request);
}

/**
 *  smack_log - Audit the granting or denial of permissions.
 *  @subject_label : smack label of the requester
 *  @object_label  : smack label of the object being accessed
 *  @request: requested permissions
 *  @result: result from smk_access
 *  @a:  auxiliary audit data
 *
 * Audit the granting or denial of permissions in accordance
 * with the policy.
 */
void smack_log(char *subject_label, char *object_label, int request,
	       int result, struct smk_audit_info *ad)
{
	char request_buffer[SMK_NUM_ACCESS_TYPE + 1];
	struct smack_audit_data *sad;
	struct common_audit_data *a = &ad->a;

	/* check if we have to log the current event */
	if (result != 0 && (log_policy & SMACK_AUDIT_DENIED) == 0)
		return;
	if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0)
		return;

315 316 317 318
	sad = a->smack_audit_data;

	if (sad->function == NULL)
		sad->function = "unknown";
E
Etienne Basset 已提交
319 320 321 322 323 324 325 326

	/* end preparing the audit data */
	smack_str_from_perm(request_buffer, request);
	sad->subject = subject_label;
	sad->object  = object_label;
	sad->request = request_buffer;
	sad->result  = result;

327
	common_lsm_audit(a, smack_log_callback, NULL);
E
Etienne Basset 已提交
328 329 330 331 332 333 334 335
}
#else /* #ifdef CONFIG_AUDIT */
void smack_log(char *subject_label, char *object_label, int request,
               int result, struct smk_audit_info *ad)
{
}
#endif

336
DEFINE_MUTEX(smack_known_lock);
337

338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356
struct hlist_head smack_known_hash[SMACK_HASH_SLOTS];

/**
 * smk_insert_entry - insert a smack label into a hash map,
 *
 * this function must be called under smack_known_lock
 */
void smk_insert_entry(struct smack_known *skp)
{
	unsigned int hash;
	struct hlist_head *head;

	hash = full_name_hash(skp->smk_known, strlen(skp->smk_known));
	head = &smack_known_hash[hash & (SMACK_HASH_SLOTS - 1)];

	hlist_add_head_rcu(&skp->smk_hashed, head);
	list_add_rcu(&skp->list, &smack_known_list);
}

357 358 359 360 361 362 363 364 365
/**
 * smk_find_entry - find a label on the list, return the list entry
 * @string: a text string that might be a Smack label
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string.
 */
struct smack_known *smk_find_entry(const char *string)
{
366 367
	unsigned int hash;
	struct hlist_head *head;
368 369
	struct smack_known *skp;

370 371 372 373
	hash = full_name_hash(string, strlen(string));
	head = &smack_known_hash[hash & (SMACK_HASH_SLOTS - 1)];

	hlist_for_each_entry_rcu(skp, head, smk_hashed)
374
		if (strcmp(skp->smk_known, string) == 0)
375 376 377 378 379
			return skp;

	return NULL;
}

380
/**
381 382
 * smk_parse_smack - parse smack label from a text string
 * @string: a text string that might contain a Smack label
383
 * @len: the maximum size, or zero if it is NULL terminated.
384 385
 *
 * Returns a pointer to the clean label, or NULL
386
 */
387
char *smk_parse_smack(const char *string, int len)
388
{
389
	char *smack;
390 391
	int i;

392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414
	if (len <= 0)
		len = strlen(string) + 1;

	/*
	 * Reserve a leading '-' as an indicator that
	 * this isn't a label, but an option to interfaces
	 * including /smack/cipso and /smack/cipso2
	 */
	if (string[0] == '-')
		return NULL;

	for (i = 0; i < len; i++)
		if (string[i] > '~' || string[i] <= ' ' || string[i] == '/' ||
		    string[i] == '"' || string[i] == '\\' || string[i] == '\'')
			break;

	if (i == 0 || i >= SMK_LONGLABEL)
		return NULL;

	smack = kzalloc(i + 1, GFP_KERNEL);
	if (smack != NULL) {
		strncpy(smack, string, i + 1);
		smack[i] = '\0';
415
	}
416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438
	return smack;
}

/**
 * smk_netlbl_mls - convert a catset to netlabel mls categories
 * @catset: the Smack categories
 * @sap: where to put the netlabel categories
 *
 * Allocates and fills attr.mls
 * Returns 0 on success, error code on failure.
 */
int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap,
			int len)
{
	unsigned char *cp;
	unsigned char m;
	int cat;
	int rc;
	int byte;

	sap->flags |= NETLBL_SECATTR_MLS_CAT;
	sap->attr.mls.lvl = level;
	sap->attr.mls.cat = netlbl_secattr_catmap_alloc(GFP_ATOMIC);
439 440
	if (!sap->attr.mls.cat)
		return -ENOMEM;
441 442 443 444 445 446 447 448 449 450 451 452 453 454 455
	sap->attr.mls.cat->startbit = 0;

	for (cat = 1, cp = catset, byte = 0; byte < len; cp++, byte++)
		for (m = 0x80; m != 0; m >>= 1, cat++) {
			if ((m & *cp) == 0)
				continue;
			rc = netlbl_secattr_catmap_setbit(sap->attr.mls.cat,
							  cat, GFP_ATOMIC);
			if (rc < 0) {
				netlbl_secattr_catmap_free(sap->attr.mls.cat);
				return rc;
			}
		}

	return 0;
456 457 458 459 460 461 462 463 464 465 466 467 468
}

/**
 * smk_import_entry - import a label, return the list entry
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string, adding it if necessary.
 */
struct smack_known *smk_import_entry(const char *string, int len)
{
	struct smack_known *skp;
469 470 471
	char *smack;
	int slen;
	int rc;
472

473 474
	smack = smk_parse_smack(string, len);
	if (smack == NULL)
475 476 477 478
		return NULL;

	mutex_lock(&smack_known_lock);

479
	skp = smk_find_entry(smack);
480 481
	if (skp != NULL)
		goto freeout;
482

483 484 485
	skp = kzalloc(sizeof(*skp), GFP_KERNEL);
	if (skp == NULL)
		goto freeout;
486

487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510
	skp->smk_known = smack;
	skp->smk_secid = smack_next_secid++;
	skp->smk_netlabel.domain = skp->smk_known;
	skp->smk_netlabel.flags =
		NETLBL_SECATTR_DOMAIN | NETLBL_SECATTR_MLS_LVL;
	/*
	 * If direct labeling works use it.
	 * Otherwise use mapped labeling.
	 */
	slen = strlen(smack);
	if (slen < SMK_CIPSOLEN)
		rc = smk_netlbl_mls(smack_cipso_direct, skp->smk_known,
			       &skp->smk_netlabel, slen);
	else
		rc = smk_netlbl_mls(smack_cipso_mapped, (char *)&skp->smk_secid,
			       &skp->smk_netlabel, sizeof(skp->smk_secid));

	if (rc >= 0) {
		INIT_LIST_HEAD(&skp->smk_rules);
		mutex_init(&skp->smk_rules_lock);
		/*
		 * Make sure that the entry is actually
		 * filled before putting it on the list.
		 */
511
		smk_insert_entry(skp);
512 513 514 515 516 517 518 519 520 521
		goto unlockout;
	}
	/*
	 * smk_netlbl_mls failed.
	 */
	kfree(skp);
	skp = NULL;
freeout:
	kfree(smack);
unlockout:
522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538
	mutex_unlock(&smack_known_lock);

	return skp;
}

/**
 * smk_import - import a smack label
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the label in the label list that
 * matches the passed string, adding it if necessary.
 */
char *smk_import(const char *string, int len)
{
	struct smack_known *skp;

539 540 541
	/* labels cannot begin with a '-' */
	if (string[0] == '-')
		return NULL;
542 543 544 545 546 547 548 549 550 551
	skp = smk_import_entry(string, len);
	if (skp == NULL)
		return NULL;
	return skp->smk_known;
}

/**
 * smack_from_secid - find the Smack label associated with a secid
 * @secid: an integer that might be associated with a Smack label
 *
552
 * Returns a pointer to the appropriate Smack label entry if there is one,
553 554
 * otherwise a pointer to the invalid Smack label.
 */
555
struct smack_known *smack_from_secid(const u32 secid)
556 557 558
{
	struct smack_known *skp;

559 560 561 562
	rcu_read_lock();
	list_for_each_entry_rcu(skp, &smack_known_list, list) {
		if (skp->smk_secid == secid) {
			rcu_read_unlock();
563
			return skp;
564 565
		}
	}
566 567 568 569 570

	/*
	 * If we got this far someone asked for the translation
	 * of a secid that is not on the list.
	 */
571
	rcu_read_unlock();
572
	return &smack_known_invalid;
573 574 575 576 577 578 579 580 581 582 583
}

/**
 * smack_to_secid - find the secid associated with a Smack label
 * @smack: the Smack label
 *
 * Returns the appropriate secid if there is one,
 * otherwise 0
 */
u32 smack_to_secid(const char *smack)
{
584
	struct smack_known *skp = smk_find_entry(smack);
585

586 587 588
	if (skp == NULL)
		return 0;
	return skp->smk_secid;
589
}