tomoyo.c 14.6 KB
Newer Older
K
Kentaro Takeda 已提交
1 2 3
/*
 * security/tomoyo/tomoyo.c
 *
T
Tetsuo Handa 已提交
4
 * Copyright (C) 2005-2011  NTT DATA CORPORATION
K
Kentaro Takeda 已提交
5 6 7 8 9
 */

#include <linux/security.h>
#include "common.h"

T
Tetsuo Handa 已提交
10 11 12 13 14 15 16 17
/**
 * tomoyo_cred_alloc_blank - Target for security_cred_alloc_blank().
 *
 * @new: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
18 19 20 21 22 23
static int tomoyo_cred_alloc_blank(struct cred *new, gfp_t gfp)
{
	new->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
24 25 26 27 28 29 30 31 32
/**
 * tomoyo_cred_prepare - Target for security_prepare_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
33 34 35
static int tomoyo_cred_prepare(struct cred *new, const struct cred *old,
			       gfp_t gfp)
{
36 37 38 39
	struct tomoyo_domain_info *domain = old->security;
	new->security = domain;
	if (domain)
		atomic_inc(&domain->users);
K
Kentaro Takeda 已提交
40 41 42
	return 0;
}

T
Tetsuo Handa 已提交
43 44 45 46 47 48
/**
 * tomoyo_cred_transfer - Target for security_transfer_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 */
49 50
static void tomoyo_cred_transfer(struct cred *new, const struct cred *old)
{
51 52 53
	tomoyo_cred_prepare(new, old, 0);
}

T
Tetsuo Handa 已提交
54 55 56 57 58
/**
 * tomoyo_cred_free - Target for security_cred_free().
 *
 * @cred: Pointer to "struct cred".
 */
59 60 61 62 63
static void tomoyo_cred_free(struct cred *cred)
{
	struct tomoyo_domain_info *domain = cred->security;
	if (domain)
		atomic_dec(&domain->users);
64 65
}

T
Tetsuo Handa 已提交
66 67 68 69 70 71 72
/**
 * tomoyo_bprm_set_creds - Target for security_bprm_set_creds().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
73 74
static int tomoyo_bprm_set_creds(struct linux_binprm *bprm)
{
75 76 77 78 79 80
	int rc;

	rc = cap_bprm_set_creds(bprm);
	if (rc)
		return rc;

K
Kentaro Takeda 已提交
81 82 83 84 85 86
	/*
	 * Do only if this function is called for the first time of an execve
	 * operation.
	 */
	if (bprm->cred_prepared)
		return 0;
87
#ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
K
Kentaro Takeda 已提交
88 89 90 91 92 93
	/*
	 * Load policy if /sbin/tomoyo-init exists and /sbin/init is requested
	 * for the first time.
	 */
	if (!tomoyo_policy_loaded)
		tomoyo_load_policy(bprm->filename);
94
#endif
95 96 97 98 99 100 101 102
	/*
	 * Release reference to "struct tomoyo_domain_info" stored inside
	 * "bprm->cred->security". New reference to "struct tomoyo_domain_info"
	 * stored inside "bprm->cred->security" will be acquired later inside
	 * tomoyo_find_next_domain().
	 */
	atomic_dec(&((struct tomoyo_domain_info *)
		     bprm->cred->security)->users);
K
Kentaro Takeda 已提交
103 104 105 106 107 108 109 110
	/*
	 * Tell tomoyo_bprm_check_security() is called for the first time of an
	 * execve operation.
	 */
	bprm->cred->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
111 112 113 114 115 116 117
/**
 * tomoyo_bprm_check_security - Target for security_bprm_check().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
118 119 120 121 122 123 124 125
static int tomoyo_bprm_check_security(struct linux_binprm *bprm)
{
	struct tomoyo_domain_info *domain = bprm->cred->security;

	/*
	 * Execute permission is checked against pathname passed to do_execve()
	 * using current domain.
	 */
126 127 128 129 130 131
	if (!domain) {
		const int idx = tomoyo_read_lock();
		const int err = tomoyo_find_next_domain(bprm);
		tomoyo_read_unlock(idx);
		return err;
	}
K
Kentaro Takeda 已提交
132 133 134
	/*
	 * Read permission is checked against interpreters using next domain.
	 */
T
Tetsuo Handa 已提交
135 136
	return tomoyo_check_open_permission(domain, &bprm->file->f_path,
					    O_RDONLY);
K
Kentaro Takeda 已提交
137 138
}

T
Tetsuo Handa 已提交
139 140 141 142 143 144 145 146
/**
 * tomoyo_inode_getattr - Target for security_inode_getattr().
 *
 * @mnt:    Pointer to "struct vfsmount".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
T
Tetsuo Handa 已提交
147 148 149
static int tomoyo_inode_getattr(struct vfsmount *mnt, struct dentry *dentry)
{
	struct path path = { mnt, dentry };
T
Tetsuo Handa 已提交
150
	return tomoyo_path_perm(TOMOYO_TYPE_GETATTR, &path, NULL);
T
Tetsuo Handa 已提交
151 152
}

T
Tetsuo Handa 已提交
153 154 155 156 157 158 159
/**
 * tomoyo_path_truncate - Target for security_path_truncate().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
160
static int tomoyo_path_truncate(struct path *path)
K
Kentaro Takeda 已提交
161
{
T
Tetsuo Handa 已提交
162
	return tomoyo_path_perm(TOMOYO_TYPE_TRUNCATE, path, NULL);
K
Kentaro Takeda 已提交
163 164
}

T
Tetsuo Handa 已提交
165 166 167 168 169 170 171 172
/**
 * tomoyo_path_unlink - Target for security_path_unlink().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
173 174 175
static int tomoyo_path_unlink(struct path *parent, struct dentry *dentry)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
176
	return tomoyo_path_perm(TOMOYO_TYPE_UNLINK, &path, NULL);
K
Kentaro Takeda 已提交
177 178
}

T
Tetsuo Handa 已提交
179 180 181 182 183 184 185 186 187
/**
 * tomoyo_path_mkdir - Target for security_path_mkdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
188
static int tomoyo_path_mkdir(struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
189
			     umode_t mode)
K
Kentaro Takeda 已提交
190 191
{
	struct path path = { parent->mnt, dentry };
192 193
	return tomoyo_path_number_perm(TOMOYO_TYPE_MKDIR, &path,
				       mode & S_IALLUGO);
K
Kentaro Takeda 已提交
194 195
}

T
Tetsuo Handa 已提交
196 197 198 199 200 201 202 203
/**
 * tomoyo_path_rmdir - Target for security_path_rmdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
204 205 206
static int tomoyo_path_rmdir(struct path *parent, struct dentry *dentry)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
207
	return tomoyo_path_perm(TOMOYO_TYPE_RMDIR, &path, NULL);
K
Kentaro Takeda 已提交
208 209
}

T
Tetsuo Handa 已提交
210 211 212 213 214 215 216 217 218
/**
 * tomoyo_path_symlink - Target for security_path_symlink().
 *
 * @parent:   Pointer to "struct path".
 * @dentry:   Pointer to "struct dentry".
 * @old_name: Symlink's content.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
219 220 221 222
static int tomoyo_path_symlink(struct path *parent, struct dentry *dentry,
			       const char *old_name)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
223
	return tomoyo_path_perm(TOMOYO_TYPE_SYMLINK, &path, old_name);
K
Kentaro Takeda 已提交
224 225
}

T
Tetsuo Handa 已提交
226 227 228 229 230 231 232 233 234 235
/**
 * tomoyo_path_mknod - Target for security_path_mknod().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 * @dev:    Device attributes.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
236
static int tomoyo_path_mknod(struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
237
			     umode_t mode, unsigned int dev)
K
Kentaro Takeda 已提交
238 239
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
240
	int type = TOMOYO_TYPE_CREATE;
241
	const unsigned int perm = mode & S_IALLUGO;
K
Kentaro Takeda 已提交
242 243 244

	switch (mode & S_IFMT) {
	case S_IFCHR:
T
Tetsuo Handa 已提交
245
		type = TOMOYO_TYPE_MKCHAR;
K
Kentaro Takeda 已提交
246 247
		break;
	case S_IFBLK:
T
Tetsuo Handa 已提交
248
		type = TOMOYO_TYPE_MKBLOCK;
K
Kentaro Takeda 已提交
249
		break;
250 251 252
	default:
		goto no_dev;
	}
T
Tetsuo Handa 已提交
253
	return tomoyo_mkdev_perm(type, &path, perm, dev);
254 255
 no_dev:
	switch (mode & S_IFMT) {
K
Kentaro Takeda 已提交
256
	case S_IFIFO:
T
Tetsuo Handa 已提交
257
		type = TOMOYO_TYPE_MKFIFO;
K
Kentaro Takeda 已提交
258 259
		break;
	case S_IFSOCK:
T
Tetsuo Handa 已提交
260
		type = TOMOYO_TYPE_MKSOCK;
K
Kentaro Takeda 已提交
261 262
		break;
	}
263
	return tomoyo_path_number_perm(type, &path, perm);
K
Kentaro Takeda 已提交
264 265
}

T
Tetsuo Handa 已提交
266 267 268 269 270 271 272 273 274
/**
 * tomoyo_path_link - Target for security_path_link().
 *
 * @old_dentry: Pointer to "struct dentry".
 * @new_dir:    Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
275 276 277 278 279
static int tomoyo_path_link(struct dentry *old_dentry, struct path *new_dir,
			    struct dentry *new_dentry)
{
	struct path path1 = { new_dir->mnt, old_dentry };
	struct path path2 = { new_dir->mnt, new_dentry };
280
	return tomoyo_path2_perm(TOMOYO_TYPE_LINK, &path1, &path2);
K
Kentaro Takeda 已提交
281 282
}

T
Tetsuo Handa 已提交
283 284 285 286 287 288 289 290 291 292
/**
 * tomoyo_path_rename - Target for security_path_rename().
 *
 * @old_parent: Pointer to "struct path".
 * @old_dentry: Pointer to "struct dentry".
 * @new_parent: Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
293 294 295 296 297 298 299
static int tomoyo_path_rename(struct path *old_parent,
			      struct dentry *old_dentry,
			      struct path *new_parent,
			      struct dentry *new_dentry)
{
	struct path path1 = { old_parent->mnt, old_dentry };
	struct path path2 = { new_parent->mnt, new_dentry };
300
	return tomoyo_path2_perm(TOMOYO_TYPE_RENAME, &path1, &path2);
K
Kentaro Takeda 已提交
301 302
}

T
Tetsuo Handa 已提交
303 304 305 306 307 308 309 310 311
/**
 * tomoyo_file_fcntl - Target for security_file_fcntl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for fcntl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
312 313 314
static int tomoyo_file_fcntl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
T
Tetsuo Handa 已提交
315 316 317 318
	if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND)))
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &file->f_path,
					    O_WRONLY | (arg & O_APPEND));
K
Kentaro Takeda 已提交
319 320
}

T
Tetsuo Handa 已提交
321 322 323 324 325 326 327 328
/**
 * tomoyo_dentry_open - Target for security_dentry_open().
 *
 * @f:    Pointer to "struct file".
 * @cred: Pointer to "struct cred".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
329 330 331 332 333 334 335 336 337
static int tomoyo_dentry_open(struct file *f, const struct cred *cred)
{
	int flags = f->f_flags;
	/* Don't check read permission here if called from do_execve(). */
	if (current->in_execve)
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags);
}

T
Tetsuo Handa 已提交
338 339 340 341 342 343 344 345 346
/**
 * tomoyo_file_ioctl - Target for security_file_ioctl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for ioctl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
347 348 349
static int tomoyo_file_ioctl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
350
	return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd);
351 352
}

T
Tetsuo Handa 已提交
353 354 355
/**
 * tomoyo_path_chmod - Target for security_path_chmod().
 *
356 357
 * @path: Pointer to "struct path".
 * @mode: DAC permission mode.
T
Tetsuo Handa 已提交
358 359 360
 *
 * Returns 0 on success, negative value otherwise.
 */
361
static int tomoyo_path_chmod(struct path *path, umode_t mode)
362
{
363
	return tomoyo_path_number_perm(TOMOYO_TYPE_CHMOD, path,
364
				       mode & S_IALLUGO);
365 366
}

T
Tetsuo Handa 已提交
367 368 369 370 371 372 373 374 375
/**
 * tomoyo_path_chown - Target for security_path_chown().
 *
 * @path: Pointer to "struct path".
 * @uid:  Owner ID.
 * @gid:  Group ID.
 *
 * Returns 0 on success, negative value otherwise.
 */
376 377 378 379
static int tomoyo_path_chown(struct path *path, uid_t uid, gid_t gid)
{
	int error = 0;
	if (uid != (uid_t) -1)
380
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path, uid);
381
	if (!error && gid != (gid_t) -1)
382
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHGRP, path, gid);
383 384 385
	return error;
}

T
Tetsuo Handa 已提交
386 387 388 389 390 391 392
/**
 * tomoyo_path_chroot - Target for security_path_chroot().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
393 394
static int tomoyo_path_chroot(struct path *path)
{
T
Tetsuo Handa 已提交
395
	return tomoyo_path_perm(TOMOYO_TYPE_CHROOT, path, NULL);
396 397
}

T
Tetsuo Handa 已提交
398 399 400 401 402 403 404 405 406 407 408
/**
 * tomoyo_sb_mount - Target for security_sb_mount().
 *
 * @dev_name: Name of device file. Maybe NULL.
 * @path:     Pointer to "struct path".
 * @type:     Name of filesystem type. Maybe NULL.
 * @flags:    Mount options.
 * @data:     Optional data. Maybe NULL.
 *
 * Returns 0 on success, negative value otherwise.
 */
409 410 411
static int tomoyo_sb_mount(char *dev_name, struct path *path,
			   char *type, unsigned long flags, void *data)
{
T
Tetsuo Handa 已提交
412
	return tomoyo_mount_permission(dev_name, path, type, flags, data);
413 414
}

T
Tetsuo Handa 已提交
415 416 417 418 419 420 421 422
/**
 * tomoyo_sb_umount - Target for security_sb_umount().
 *
 * @mnt:   Pointer to "struct vfsmount".
 * @flags: Unmount options.
 *
 * Returns 0 on success, negative value otherwise.
 */
423 424 425
static int tomoyo_sb_umount(struct vfsmount *mnt, int flags)
{
	struct path path = { mnt, mnt->mnt_root };
T
Tetsuo Handa 已提交
426
	return tomoyo_path_perm(TOMOYO_TYPE_UMOUNT, &path, NULL);
427 428
}

T
Tetsuo Handa 已提交
429 430 431 432 433 434 435 436
/**
 * tomoyo_sb_pivotroot - Target for security_sb_pivotroot().
 *
 * @old_path: Pointer to "struct path".
 * @new_path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
437 438
static int tomoyo_sb_pivotroot(struct path *old_path, struct path *new_path)
{
439
	return tomoyo_path2_perm(TOMOYO_TYPE_PIVOT_ROOT, new_path, old_path);
440 441
}

442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499
/**
 * tomoyo_socket_listen - Check permission for listen().
 *
 * @sock:    Pointer to "struct socket".
 * @backlog: Backlog parameter.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_listen(struct socket *sock, int backlog)
{
	return tomoyo_socket_listen_permission(sock);
}

/**
 * tomoyo_socket_connect - Check permission for connect().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_connect(struct socket *sock, struct sockaddr *addr,
				 int addr_len)
{
	return tomoyo_socket_connect_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_bind - Check permission for bind().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_bind(struct socket *sock, struct sockaddr *addr,
			      int addr_len)
{
	return tomoyo_socket_bind_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_sendmsg - Check permission for sendmsg().
 *
 * @sock: Pointer to "struct socket".
 * @msg:  Pointer to "struct msghdr".
 * @size: Size of message.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_sendmsg(struct socket *sock, struct msghdr *msg,
				 int size)
{
	return tomoyo_socket_sendmsg_permission(sock, msg, size);
}

500 501 502 503
/*
 * tomoyo_security_ops is a "struct security_operations" which is used for
 * registering TOMOYO.
 */
K
Kentaro Takeda 已提交
504 505
static struct security_operations tomoyo_security_ops = {
	.name                = "tomoyo",
506
	.cred_alloc_blank    = tomoyo_cred_alloc_blank,
K
Kentaro Takeda 已提交
507
	.cred_prepare        = tomoyo_cred_prepare,
508
	.cred_transfer	     = tomoyo_cred_transfer,
509
	.cred_free           = tomoyo_cred_free,
K
Kentaro Takeda 已提交
510 511 512 513 514 515 516 517 518 519 520 521
	.bprm_set_creds      = tomoyo_bprm_set_creds,
	.bprm_check_security = tomoyo_bprm_check_security,
	.file_fcntl          = tomoyo_file_fcntl,
	.dentry_open         = tomoyo_dentry_open,
	.path_truncate       = tomoyo_path_truncate,
	.path_unlink         = tomoyo_path_unlink,
	.path_mkdir          = tomoyo_path_mkdir,
	.path_rmdir          = tomoyo_path_rmdir,
	.path_symlink        = tomoyo_path_symlink,
	.path_mknod          = tomoyo_path_mknod,
	.path_link           = tomoyo_path_link,
	.path_rename         = tomoyo_path_rename,
T
Tetsuo Handa 已提交
522
	.inode_getattr       = tomoyo_inode_getattr,
523 524 525 526 527 528 529
	.file_ioctl          = tomoyo_file_ioctl,
	.path_chmod          = tomoyo_path_chmod,
	.path_chown          = tomoyo_path_chown,
	.path_chroot         = tomoyo_path_chroot,
	.sb_mount            = tomoyo_sb_mount,
	.sb_umount           = tomoyo_sb_umount,
	.sb_pivotroot        = tomoyo_sb_pivotroot,
530 531 532 533
	.socket_bind         = tomoyo_socket_bind,
	.socket_connect      = tomoyo_socket_connect,
	.socket_listen       = tomoyo_socket_listen,
	.socket_sendmsg      = tomoyo_socket_sendmsg,
K
Kentaro Takeda 已提交
534 535
};

536 537 538
/* Lock for GC. */
struct srcu_struct tomoyo_ss;

T
Tetsuo Handa 已提交
539 540 541 542 543
/**
 * tomoyo_init - Register TOMOYO Linux as a LSM module.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
544 545 546 547 548 549 550
static int __init tomoyo_init(void)
{
	struct cred *cred = (struct cred *) current_cred();

	if (!security_module_enable(&tomoyo_security_ops))
		return 0;
	/* register ourselves with the security framework */
551 552
	if (register_security(&tomoyo_security_ops) ||
	    init_srcu_struct(&tomoyo_ss))
K
Kentaro Takeda 已提交
553 554 555
		panic("Failure registering TOMOYO Linux");
	printk(KERN_INFO "TOMOYO Linux initialized\n");
	cred->security = &tomoyo_kernel_domain;
556
	tomoyo_mm_init();
K
Kentaro Takeda 已提交
557 558 559 560
	return 0;
}

security_initcall(tomoyo_init);