smack_access.c 13.5 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
 *
 *      This program is free software; you can redistribute it and/or modify
 *      it under the terms of the GNU General Public License as published by
 *      the Free Software Foundation, version 2.
 *
 * Author:
 *      Casey Schaufler <casey@schaufler-ca.com>
 *
 */

#include <linux/types.h>
14
#include <linux/slab.h>
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
#include <linux/fs.h>
#include <linux/sched.h>
#include "smack.h"

struct smack_known smack_known_huh = {
	.smk_known	= "?",
	.smk_secid	= 2,
};

struct smack_known smack_known_hat = {
	.smk_known	= "^",
	.smk_secid	= 3,
};

struct smack_known smack_known_star = {
	.smk_known	= "*",
	.smk_secid	= 4,
};

struct smack_known smack_known_floor = {
	.smk_known	= "_",
	.smk_secid	= 5,
};

struct smack_known smack_known_invalid = {
	.smk_known	= "",
	.smk_secid	= 6,
};

44 45 46 47 48
struct smack_known smack_known_web = {
	.smk_known	= "@",
	.smk_secid	= 7,
};

49
LIST_HEAD(smack_known_list);
50 51 52 53 54 55 56

/*
 * The initial value needs to be bigger than any of the
 * known values above.
 */
static u32 smack_next_secid = 10;

E
Etienne Basset 已提交
57 58 59 60 61 62
/*
 * what events do we log
 * can be overwritten at run-time by /smack/logging
 */
int log_policy = SMACK_AUDIT_DENIED;

63 64 65 66
/**
 * smk_access_entry - look up matching access rule
 * @subject_label: a pointer to the subject's Smack label
 * @object_label: a pointer to the object's Smack label
67
 * @rule_list: the list of rules to search
68 69
 *
 * This function looks up the subject/object pair in the
70 71
 * access rule list and returns the access mode. If no
 * entry is found returns -ENOENT.
72 73 74
 *
 * NOTE:
 *
75 76 77 78 79 80 81 82 83 84 85 86
 * Earlier versions of this function allowed for labels that
 * were not on the label list. This was done to allow for
 * labels to come over the network that had never been seen
 * before on this host. Unless the receiving socket has the
 * star label this will always result in a failure check. The
 * star labeled socket case is now handled in the networking
 * hooks so there is no case where the label is not on the
 * label list. Checking to see if the address of two labels
 * is the same is now a reliable test.
 *
 * Do the object check first because that is more
 * likely to differ.
87
 */
88 89
int smk_access_entry(char *subject_label, char *object_label,
			struct list_head *rule_list)
90
{
91
	int may = -ENOENT;
92 93
	struct smack_rule *srp;

94
	list_for_each_entry_rcu(srp, rule_list, list) {
95 96 97 98
		if (srp->smk_object == object_label &&
		    srp->smk_subject == subject_label) {
			may = srp->smk_access;
			break;
99 100 101 102 103 104
		}
	}

	return may;
}

105 106 107 108 109
/**
 * smk_access - determine if a subject has a specific access to an object
 * @subject_label: a pointer to the subject's Smack label
 * @object_label: a pointer to the object's Smack label
 * @request: the access requested, in "MAY" format
E
Etienne Basset 已提交
110
 * @a : a pointer to the audit data
111 112 113 114 115
 *
 * This function looks up the subject/object pair in the
 * access rule list and returns 0 if the access is permitted,
 * non zero otherwise.
 *
116
 * Smack labels are shared on smack_list
117
 */
E
Etienne Basset 已提交
118 119
int smk_access(char *subject_label, char *object_label, int request,
	       struct smk_audit_info *a)
120
{
121
	struct smack_known *skp;
122
	int may = MAY_NOT;
E
Etienne Basset 已提交
123
	int rc = 0;
124 125 126 127 128 129

	/*
	 * Hardcoded comparisons.
	 *
	 * A star subject can't access any object.
	 */
130
	if (subject_label == smack_known_star.smk_known) {
E
Etienne Basset 已提交
131 132 133
		rc = -EACCES;
		goto out_audit;
	}
134 135 136 137 138 139
	/*
	 * An internet object can be accessed by any subject.
	 * Tasks cannot be assigned the internet label.
	 * An internet subject can access any object.
	 */
	if (object_label == smack_known_web.smk_known ||
140
	    subject_label == smack_known_web.smk_known)
E
Etienne Basset 已提交
141
		goto out_audit;
142 143 144
	/*
	 * A star object can be accessed by any subject.
	 */
145
	if (object_label == smack_known_star.smk_known)
E
Etienne Basset 已提交
146
		goto out_audit;
147 148 149 150
	/*
	 * An object can be accessed in any way by a subject
	 * with the same label.
	 */
151
	if (subject_label == object_label)
E
Etienne Basset 已提交
152
		goto out_audit;
153 154 155 156 157
	/*
	 * A hat subject can read any object.
	 * A floor object can be read by any subject.
	 */
	if ((request & MAY_ANYREAD) == request) {
158
		if (object_label == smack_known_floor.smk_known)
E
Etienne Basset 已提交
159
			goto out_audit;
160
		if (subject_label == smack_known_hat.smk_known)
E
Etienne Basset 已提交
161
			goto out_audit;
162 163 164 165 166
	}
	/*
	 * Beyond here an explicit relationship is required.
	 * If the requested access is contained in the available
	 * access (e.g. read is included in readwrite) it's
167 168
	 * good. A negative response from smk_access_entry()
	 * indicates there is no entry for this pair.
169
	 */
170
	skp = smk_find_entry(subject_label);
171
	rcu_read_lock();
172
	may = smk_access_entry(subject_label, object_label, &skp->smk_rules);
173 174 175
	rcu_read_unlock();

	if (may > 0 && (request & may) == request)
E
Etienne Basset 已提交
176
		goto out_audit;
177

E
Etienne Basset 已提交
178 179 180 181 182 183 184
	rc = -EACCES;
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
		smack_log(subject_label, object_label, request, rc, a);
#endif
	return rc;
185 186 187 188
}

/**
 * smk_curacc - determine if current has a specific access to an object
189 190
 * @obj_label: a pointer to the object's Smack label
 * @mode: the access requested, in "MAY" format
E
Etienne Basset 已提交
191
 * @a : common audit data
192 193 194
 *
 * This function checks the current subject label/object label pair
 * in the access rule list and returns 0 if the access is permitted,
195
 * non zero otherwise. It allows that current may have the capability
196 197
 * to override the rules.
 */
E
Etienne Basset 已提交
198
int smk_curacc(char *obj_label, u32 mode, struct smk_audit_info *a)
199
{
200 201 202
	struct task_smack *tsp = current_security();
	char *sp = smk_of_task(tsp);
	int may;
203 204
	int rc;

205 206 207
	/*
	 * Check the global rule list
	 */
E
Etienne Basset 已提交
208
	rc = smk_access(sp, obj_label, mode, NULL);
209 210 211 212 213 214 215 216 217 218 219 220
	if (rc == 0) {
		/*
		 * If there is an entry in the task's rule list
		 * it can further restrict access.
		 */
		may = smk_access_entry(sp, obj_label, &tsp->smk_rules);
		if (may < 0)
			goto out_audit;
		if ((mode & may) == mode)
			goto out_audit;
		rc = -EACCES;
	}
221

222
	/*
223
	 * Allow for priviliged to override policy.
224
	 */
225
	if (rc != 0 && smack_privileged(CAP_MAC_OVERRIDE))
226
		rc = 0;
227

E
Etienne Basset 已提交
228 229 230 231 232
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
		smack_log(sp, obj_label, mode, rc, a);
#endif
233 234 235
	return rc;
}

E
Etienne Basset 已提交
236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254
#ifdef CONFIG_AUDIT
/**
 * smack_str_from_perm : helper to transalate an int to a
 * readable string
 * @string : the string to fill
 * @access : the int
 *
 */
static inline void smack_str_from_perm(char *string, int access)
{
	int i = 0;
	if (access & MAY_READ)
		string[i++] = 'r';
	if (access & MAY_WRITE)
		string[i++] = 'w';
	if (access & MAY_EXEC)
		string[i++] = 'x';
	if (access & MAY_APPEND)
		string[i++] = 'a';
255 256
	if (access & MAY_TRANSMUTE)
		string[i++] = 't';
E
Etienne Basset 已提交
257 258 259 260 261 262 263 264 265 266 267 268
	string[i] = '\0';
}
/**
 * smack_log_callback - SMACK specific information
 * will be called by generic audit code
 * @ab : the audit_buffer
 * @a  : audit_data
 *
 */
static void smack_log_callback(struct audit_buffer *ab, void *a)
{
	struct common_audit_data *ad = a;
269
	struct smack_audit_data *sad = ad->smack_audit_data;
270
	audit_log_format(ab, "lsm=SMACK fn=%s action=%s",
271
			 ad->smack_audit_data->function,
E
Etienne Basset 已提交
272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303
			 sad->result ? "denied" : "granted");
	audit_log_format(ab, " subject=");
	audit_log_untrustedstring(ab, sad->subject);
	audit_log_format(ab, " object=");
	audit_log_untrustedstring(ab, sad->object);
	audit_log_format(ab, " requested=%s", sad->request);
}

/**
 *  smack_log - Audit the granting or denial of permissions.
 *  @subject_label : smack label of the requester
 *  @object_label  : smack label of the object being accessed
 *  @request: requested permissions
 *  @result: result from smk_access
 *  @a:  auxiliary audit data
 *
 * Audit the granting or denial of permissions in accordance
 * with the policy.
 */
void smack_log(char *subject_label, char *object_label, int request,
	       int result, struct smk_audit_info *ad)
{
	char request_buffer[SMK_NUM_ACCESS_TYPE + 1];
	struct smack_audit_data *sad;
	struct common_audit_data *a = &ad->a;

	/* check if we have to log the current event */
	if (result != 0 && (log_policy & SMACK_AUDIT_DENIED) == 0)
		return;
	if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0)
		return;

304 305 306 307
	sad = a->smack_audit_data;

	if (sad->function == NULL)
		sad->function = "unknown";
E
Etienne Basset 已提交
308 309 310 311 312 313 314 315

	/* end preparing the audit data */
	smack_str_from_perm(request_buffer, request);
	sad->subject = subject_label;
	sad->object  = object_label;
	sad->request = request_buffer;
	sad->result  = result;

316
	common_lsm_audit(a, smack_log_callback, NULL);
E
Etienne Basset 已提交
317 318 319 320 321 322 323 324
}
#else /* #ifdef CONFIG_AUDIT */
void smack_log(char *subject_label, char *object_label, int request,
               int result, struct smk_audit_info *ad)
{
}
#endif

325
DEFINE_MUTEX(smack_known_lock);
326

327 328 329 330 331 332 333 334 335 336 337 338
/**
 * smk_find_entry - find a label on the list, return the list entry
 * @string: a text string that might be a Smack label
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string.
 */
struct smack_known *smk_find_entry(const char *string)
{
	struct smack_known *skp;

	list_for_each_entry_rcu(skp, &smack_known_list, list) {
339
		if (strcmp(skp->smk_known, string) == 0)
340 341 342 343 344 345
			return skp;
	}

	return NULL;
}

346
/**
347 348
 * smk_parse_smack - parse smack label from a text string
 * @string: a text string that might contain a Smack label
349
 * @len: the maximum size, or zero if it is NULL terminated.
350 351
 *
 * Returns a pointer to the clean label, or NULL
352
 */
353
char *smk_parse_smack(const char *string, int len)
354
{
355
	char *smack;
356 357
	int i;

358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
	if (len <= 0)
		len = strlen(string) + 1;

	/*
	 * Reserve a leading '-' as an indicator that
	 * this isn't a label, but an option to interfaces
	 * including /smack/cipso and /smack/cipso2
	 */
	if (string[0] == '-')
		return NULL;

	for (i = 0; i < len; i++)
		if (string[i] > '~' || string[i] <= ' ' || string[i] == '/' ||
		    string[i] == '"' || string[i] == '\\' || string[i] == '\'')
			break;

	if (i == 0 || i >= SMK_LONGLABEL)
		return NULL;

	smack = kzalloc(i + 1, GFP_KERNEL);
	if (smack != NULL) {
		strncpy(smack, string, i + 1);
		smack[i] = '\0';
381
	}
382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419
	return smack;
}

/**
 * smk_netlbl_mls - convert a catset to netlabel mls categories
 * @catset: the Smack categories
 * @sap: where to put the netlabel categories
 *
 * Allocates and fills attr.mls
 * Returns 0 on success, error code on failure.
 */
int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap,
			int len)
{
	unsigned char *cp;
	unsigned char m;
	int cat;
	int rc;
	int byte;

	sap->flags |= NETLBL_SECATTR_MLS_CAT;
	sap->attr.mls.lvl = level;
	sap->attr.mls.cat = netlbl_secattr_catmap_alloc(GFP_ATOMIC);
	sap->attr.mls.cat->startbit = 0;

	for (cat = 1, cp = catset, byte = 0; byte < len; cp++, byte++)
		for (m = 0x80; m != 0; m >>= 1, cat++) {
			if ((m & *cp) == 0)
				continue;
			rc = netlbl_secattr_catmap_setbit(sap->attr.mls.cat,
							  cat, GFP_ATOMIC);
			if (rc < 0) {
				netlbl_secattr_catmap_free(sap->attr.mls.cat);
				return rc;
			}
		}

	return 0;
420 421 422 423 424 425 426 427 428 429 430 431 432
}

/**
 * smk_import_entry - import a label, return the list entry
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string, adding it if necessary.
 */
struct smack_known *smk_import_entry(const char *string, int len)
{
	struct smack_known *skp;
433 434 435
	char *smack;
	int slen;
	int rc;
436

437 438
	smack = smk_parse_smack(string, len);
	if (smack == NULL)
439 440 441 442
		return NULL;

	mutex_lock(&smack_known_lock);

443
	skp = smk_find_entry(smack);
444 445
	if (skp != NULL)
		goto freeout;
446

447 448 449
	skp = kzalloc(sizeof(*skp), GFP_KERNEL);
	if (skp == NULL)
		goto freeout;
450

451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
	skp->smk_known = smack;
	skp->smk_secid = smack_next_secid++;
	skp->smk_netlabel.domain = skp->smk_known;
	skp->smk_netlabel.flags =
		NETLBL_SECATTR_DOMAIN | NETLBL_SECATTR_MLS_LVL;
	/*
	 * If direct labeling works use it.
	 * Otherwise use mapped labeling.
	 */
	slen = strlen(smack);
	if (slen < SMK_CIPSOLEN)
		rc = smk_netlbl_mls(smack_cipso_direct, skp->smk_known,
			       &skp->smk_netlabel, slen);
	else
		rc = smk_netlbl_mls(smack_cipso_mapped, (char *)&skp->smk_secid,
			       &skp->smk_netlabel, sizeof(skp->smk_secid));

	if (rc >= 0) {
		INIT_LIST_HEAD(&skp->smk_rules);
		mutex_init(&skp->smk_rules_lock);
		/*
		 * Make sure that the entry is actually
		 * filled before putting it on the list.
		 */
		list_add_rcu(&skp->list, &smack_known_list);
		goto unlockout;
	}
	/*
	 * smk_netlbl_mls failed.
	 */
	kfree(skp);
	skp = NULL;
freeout:
	kfree(smack);
unlockout:
486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502
	mutex_unlock(&smack_known_lock);

	return skp;
}

/**
 * smk_import - import a smack label
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the label in the label list that
 * matches the passed string, adding it if necessary.
 */
char *smk_import(const char *string, int len)
{
	struct smack_known *skp;

503 504 505
	/* labels cannot begin with a '-' */
	if (string[0] == '-')
		return NULL;
506 507 508 509 510 511 512 513 514 515
	skp = smk_import_entry(string, len);
	if (skp == NULL)
		return NULL;
	return skp->smk_known;
}

/**
 * smack_from_secid - find the Smack label associated with a secid
 * @secid: an integer that might be associated with a Smack label
 *
L
Lucas De Marchi 已提交
516
 * Returns a pointer to the appropriate Smack label if there is one,
517 518 519 520 521 522
 * otherwise a pointer to the invalid Smack label.
 */
char *smack_from_secid(const u32 secid)
{
	struct smack_known *skp;

523 524 525 526
	rcu_read_lock();
	list_for_each_entry_rcu(skp, &smack_known_list, list) {
		if (skp->smk_secid == secid) {
			rcu_read_unlock();
527
			return skp->smk_known;
528 529
		}
	}
530 531 532 533 534

	/*
	 * If we got this far someone asked for the translation
	 * of a secid that is not on the list.
	 */
535
	rcu_read_unlock();
536 537 538 539 540 541 542 543 544 545 546 547
	return smack_known_invalid.smk_known;
}

/**
 * smack_to_secid - find the secid associated with a Smack label
 * @smack: the Smack label
 *
 * Returns the appropriate secid if there is one,
 * otherwise 0
 */
u32 smack_to_secid(const char *smack)
{
548
	struct smack_known *skp = smk_find_entry(smack);
549

550 551 552
	if (skp == NULL)
		return 0;
	return skp->smk_secid;
553
}