smack_access.c 13.4 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
 *
 *      This program is free software; you can redistribute it and/or modify
 *      it under the terms of the GNU General Public License as published by
 *      the Free Software Foundation, version 2.
 *
 * Author:
 *      Casey Schaufler <casey@schaufler-ca.com>
 *
 */

#include <linux/types.h>
14
#include <linux/slab.h>
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
#include <linux/fs.h>
#include <linux/sched.h>
#include "smack.h"

struct smack_known smack_known_huh = {
	.smk_known	= "?",
	.smk_secid	= 2,
};

struct smack_known smack_known_hat = {
	.smk_known	= "^",
	.smk_secid	= 3,
};

struct smack_known smack_known_star = {
	.smk_known	= "*",
	.smk_secid	= 4,
};

struct smack_known smack_known_floor = {
	.smk_known	= "_",
	.smk_secid	= 5,
};

struct smack_known smack_known_invalid = {
	.smk_known	= "",
	.smk_secid	= 6,
};

44 45 46 47 48
struct smack_known smack_known_web = {
	.smk_known	= "@",
	.smk_secid	= 7,
};

49
LIST_HEAD(smack_known_list);
50 51 52 53 54 55 56

/*
 * The initial value needs to be bigger than any of the
 * known values above.
 */
static u32 smack_next_secid = 10;

E
Etienne Basset 已提交
57 58 59 60 61 62
/*
 * what events do we log
 * can be overwritten at run-time by /smack/logging
 */
int log_policy = SMACK_AUDIT_DENIED;

63 64 65 66
/**
 * smk_access_entry - look up matching access rule
 * @subject_label: a pointer to the subject's Smack label
 * @object_label: a pointer to the object's Smack label
67
 * @rule_list: the list of rules to search
68 69
 *
 * This function looks up the subject/object pair in the
70 71
 * access rule list and returns the access mode. If no
 * entry is found returns -ENOENT.
72 73 74
 *
 * NOTE:
 *
75 76 77 78 79 80 81 82 83 84 85 86
 * Earlier versions of this function allowed for labels that
 * were not on the label list. This was done to allow for
 * labels to come over the network that had never been seen
 * before on this host. Unless the receiving socket has the
 * star label this will always result in a failure check. The
 * star labeled socket case is now handled in the networking
 * hooks so there is no case where the label is not on the
 * label list. Checking to see if the address of two labels
 * is the same is now a reliable test.
 *
 * Do the object check first because that is more
 * likely to differ.
87
 */
88 89
int smk_access_entry(char *subject_label, char *object_label,
			struct list_head *rule_list)
90
{
91
	int may = -ENOENT;
92 93
	struct smack_rule *srp;

94
	list_for_each_entry_rcu(srp, rule_list, list) {
95 96 97 98
		if (srp->smk_object == object_label &&
		    srp->smk_subject == subject_label) {
			may = srp->smk_access;
			break;
99 100 101 102 103 104
		}
	}

	return may;
}

105 106 107 108 109
/**
 * smk_access - determine if a subject has a specific access to an object
 * @subject_label: a pointer to the subject's Smack label
 * @object_label: a pointer to the object's Smack label
 * @request: the access requested, in "MAY" format
E
Etienne Basset 已提交
110
 * @a : a pointer to the audit data
111 112 113 114 115
 *
 * This function looks up the subject/object pair in the
 * access rule list and returns 0 if the access is permitted,
 * non zero otherwise.
 *
116
 * Smack labels are shared on smack_list
117
 */
E
Etienne Basset 已提交
118 119
int smk_access(char *subject_label, char *object_label, int request,
	       struct smk_audit_info *a)
120
{
121
	struct smack_known *skp;
122
	int may = MAY_NOT;
E
Etienne Basset 已提交
123
	int rc = 0;
124 125 126 127 128 129

	/*
	 * Hardcoded comparisons.
	 *
	 * A star subject can't access any object.
	 */
130
	if (subject_label == smack_known_star.smk_known) {
E
Etienne Basset 已提交
131 132 133
		rc = -EACCES;
		goto out_audit;
	}
134 135 136 137 138 139
	/*
	 * An internet object can be accessed by any subject.
	 * Tasks cannot be assigned the internet label.
	 * An internet subject can access any object.
	 */
	if (object_label == smack_known_web.smk_known ||
140
	    subject_label == smack_known_web.smk_known)
E
Etienne Basset 已提交
141
		goto out_audit;
142 143 144
	/*
	 * A star object can be accessed by any subject.
	 */
145
	if (object_label == smack_known_star.smk_known)
E
Etienne Basset 已提交
146
		goto out_audit;
147 148 149 150
	/*
	 * An object can be accessed in any way by a subject
	 * with the same label.
	 */
151
	if (subject_label == object_label)
E
Etienne Basset 已提交
152
		goto out_audit;
153 154 155 156 157
	/*
	 * A hat subject can read any object.
	 * A floor object can be read by any subject.
	 */
	if ((request & MAY_ANYREAD) == request) {
158
		if (object_label == smack_known_floor.smk_known)
E
Etienne Basset 已提交
159
			goto out_audit;
160
		if (subject_label == smack_known_hat.smk_known)
E
Etienne Basset 已提交
161
			goto out_audit;
162 163 164 165 166
	}
	/*
	 * Beyond here an explicit relationship is required.
	 * If the requested access is contained in the available
	 * access (e.g. read is included in readwrite) it's
167 168
	 * good. A negative response from smk_access_entry()
	 * indicates there is no entry for this pair.
169
	 */
170
	skp = smk_find_entry(subject_label);
171
	rcu_read_lock();
172
	may = smk_access_entry(subject_label, object_label, &skp->smk_rules);
173 174 175
	rcu_read_unlock();

	if (may > 0 && (request & may) == request)
E
Etienne Basset 已提交
176
		goto out_audit;
177

E
Etienne Basset 已提交
178 179 180 181 182 183 184
	rc = -EACCES;
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
		smack_log(subject_label, object_label, request, rc, a);
#endif
	return rc;
185 186 187 188
}

/**
 * smk_curacc - determine if current has a specific access to an object
189 190
 * @obj_label: a pointer to the object's Smack label
 * @mode: the access requested, in "MAY" format
E
Etienne Basset 已提交
191
 * @a : common audit data
192 193 194
 *
 * This function checks the current subject label/object label pair
 * in the access rule list and returns 0 if the access is permitted,
195
 * non zero otherwise. It allows that current may have the capability
196 197
 * to override the rules.
 */
E
Etienne Basset 已提交
198
int smk_curacc(char *obj_label, u32 mode, struct smk_audit_info *a)
199
{
200 201 202
	struct task_smack *tsp = current_security();
	char *sp = smk_of_task(tsp);
	int may;
203 204
	int rc;

205 206 207
	/*
	 * Check the global rule list
	 */
E
Etienne Basset 已提交
208
	rc = smk_access(sp, obj_label, mode, NULL);
209 210 211 212 213 214 215 216 217 218 219 220
	if (rc == 0) {
		/*
		 * If there is an entry in the task's rule list
		 * it can further restrict access.
		 */
		may = smk_access_entry(sp, obj_label, &tsp->smk_rules);
		if (may < 0)
			goto out_audit;
		if ((mode & may) == mode)
			goto out_audit;
		rc = -EACCES;
	}
221

222
	/*
223
	 * Allow for priviliged to override policy.
224
	 */
225
	if (rc != 0 && smack_privileged(CAP_MAC_OVERRIDE))
226
		rc = 0;
227

E
Etienne Basset 已提交
228 229 230 231 232
out_audit:
#ifdef CONFIG_AUDIT
	if (a)
		smack_log(sp, obj_label, mode, rc, a);
#endif
233 234 235
	return rc;
}

E
Etienne Basset 已提交
236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266
#ifdef CONFIG_AUDIT
/**
 * smack_str_from_perm : helper to transalate an int to a
 * readable string
 * @string : the string to fill
 * @access : the int
 *
 */
static inline void smack_str_from_perm(char *string, int access)
{
	int i = 0;
	if (access & MAY_READ)
		string[i++] = 'r';
	if (access & MAY_WRITE)
		string[i++] = 'w';
	if (access & MAY_EXEC)
		string[i++] = 'x';
	if (access & MAY_APPEND)
		string[i++] = 'a';
	string[i] = '\0';
}
/**
 * smack_log_callback - SMACK specific information
 * will be called by generic audit code
 * @ab : the audit_buffer
 * @a  : audit_data
 *
 */
static void smack_log_callback(struct audit_buffer *ab, void *a)
{
	struct common_audit_data *ad = a;
267
	struct smack_audit_data *sad = ad->smack_audit_data;
268
	audit_log_format(ab, "lsm=SMACK fn=%s action=%s",
269
			 ad->smack_audit_data->function,
E
Etienne Basset 已提交
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301
			 sad->result ? "denied" : "granted");
	audit_log_format(ab, " subject=");
	audit_log_untrustedstring(ab, sad->subject);
	audit_log_format(ab, " object=");
	audit_log_untrustedstring(ab, sad->object);
	audit_log_format(ab, " requested=%s", sad->request);
}

/**
 *  smack_log - Audit the granting or denial of permissions.
 *  @subject_label : smack label of the requester
 *  @object_label  : smack label of the object being accessed
 *  @request: requested permissions
 *  @result: result from smk_access
 *  @a:  auxiliary audit data
 *
 * Audit the granting or denial of permissions in accordance
 * with the policy.
 */
void smack_log(char *subject_label, char *object_label, int request,
	       int result, struct smk_audit_info *ad)
{
	char request_buffer[SMK_NUM_ACCESS_TYPE + 1];
	struct smack_audit_data *sad;
	struct common_audit_data *a = &ad->a;

	/* check if we have to log the current event */
	if (result != 0 && (log_policy & SMACK_AUDIT_DENIED) == 0)
		return;
	if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0)
		return;

302 303 304 305
	sad = a->smack_audit_data;

	if (sad->function == NULL)
		sad->function = "unknown";
E
Etienne Basset 已提交
306 307 308 309 310 311 312 313

	/* end preparing the audit data */
	smack_str_from_perm(request_buffer, request);
	sad->subject = subject_label;
	sad->object  = object_label;
	sad->request = request_buffer;
	sad->result  = result;

314
	common_lsm_audit(a, smack_log_callback, NULL);
E
Etienne Basset 已提交
315 316 317 318 319 320 321 322
}
#else /* #ifdef CONFIG_AUDIT */
void smack_log(char *subject_label, char *object_label, int request,
               int result, struct smk_audit_info *ad)
{
}
#endif

323
DEFINE_MUTEX(smack_known_lock);
324

325 326 327 328 329 330 331 332 333 334 335 336
/**
 * smk_find_entry - find a label on the list, return the list entry
 * @string: a text string that might be a Smack label
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string.
 */
struct smack_known *smk_find_entry(const char *string)
{
	struct smack_known *skp;

	list_for_each_entry_rcu(skp, &smack_known_list, list) {
337
		if (strcmp(skp->smk_known, string) == 0)
338 339 340 341 342 343
			return skp;
	}

	return NULL;
}

344
/**
345 346
 * smk_parse_smack - parse smack label from a text string
 * @string: a text string that might contain a Smack label
347
 * @len: the maximum size, or zero if it is NULL terminated.
348 349
 *
 * Returns a pointer to the clean label, or NULL
350
 */
351
char *smk_parse_smack(const char *string, int len)
352
{
353
	char *smack;
354 355
	int i;

356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378
	if (len <= 0)
		len = strlen(string) + 1;

	/*
	 * Reserve a leading '-' as an indicator that
	 * this isn't a label, but an option to interfaces
	 * including /smack/cipso and /smack/cipso2
	 */
	if (string[0] == '-')
		return NULL;

	for (i = 0; i < len; i++)
		if (string[i] > '~' || string[i] <= ' ' || string[i] == '/' ||
		    string[i] == '"' || string[i] == '\\' || string[i] == '\'')
			break;

	if (i == 0 || i >= SMK_LONGLABEL)
		return NULL;

	smack = kzalloc(i + 1, GFP_KERNEL);
	if (smack != NULL) {
		strncpy(smack, string, i + 1);
		smack[i] = '\0';
379
	}
380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417
	return smack;
}

/**
 * smk_netlbl_mls - convert a catset to netlabel mls categories
 * @catset: the Smack categories
 * @sap: where to put the netlabel categories
 *
 * Allocates and fills attr.mls
 * Returns 0 on success, error code on failure.
 */
int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap,
			int len)
{
	unsigned char *cp;
	unsigned char m;
	int cat;
	int rc;
	int byte;

	sap->flags |= NETLBL_SECATTR_MLS_CAT;
	sap->attr.mls.lvl = level;
	sap->attr.mls.cat = netlbl_secattr_catmap_alloc(GFP_ATOMIC);
	sap->attr.mls.cat->startbit = 0;

	for (cat = 1, cp = catset, byte = 0; byte < len; cp++, byte++)
		for (m = 0x80; m != 0; m >>= 1, cat++) {
			if ((m & *cp) == 0)
				continue;
			rc = netlbl_secattr_catmap_setbit(sap->attr.mls.cat,
							  cat, GFP_ATOMIC);
			if (rc < 0) {
				netlbl_secattr_catmap_free(sap->attr.mls.cat);
				return rc;
			}
		}

	return 0;
418 419 420 421 422 423 424 425 426 427 428 429 430
}

/**
 * smk_import_entry - import a label, return the list entry
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the entry in the label list that
 * matches the passed string, adding it if necessary.
 */
struct smack_known *smk_import_entry(const char *string, int len)
{
	struct smack_known *skp;
431 432 433
	char *smack;
	int slen;
	int rc;
434

435 436
	smack = smk_parse_smack(string, len);
	if (smack == NULL)
437 438 439 440
		return NULL;

	mutex_lock(&smack_known_lock);

441
	skp = smk_find_entry(smack);
442 443
	if (skp != NULL)
		goto freeout;
444

445 446 447
	skp = kzalloc(sizeof(*skp), GFP_KERNEL);
	if (skp == NULL)
		goto freeout;
448

449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483
	skp->smk_known = smack;
	skp->smk_secid = smack_next_secid++;
	skp->smk_netlabel.domain = skp->smk_known;
	skp->smk_netlabel.flags =
		NETLBL_SECATTR_DOMAIN | NETLBL_SECATTR_MLS_LVL;
	/*
	 * If direct labeling works use it.
	 * Otherwise use mapped labeling.
	 */
	slen = strlen(smack);
	if (slen < SMK_CIPSOLEN)
		rc = smk_netlbl_mls(smack_cipso_direct, skp->smk_known,
			       &skp->smk_netlabel, slen);
	else
		rc = smk_netlbl_mls(smack_cipso_mapped, (char *)&skp->smk_secid,
			       &skp->smk_netlabel, sizeof(skp->smk_secid));

	if (rc >= 0) {
		INIT_LIST_HEAD(&skp->smk_rules);
		mutex_init(&skp->smk_rules_lock);
		/*
		 * Make sure that the entry is actually
		 * filled before putting it on the list.
		 */
		list_add_rcu(&skp->list, &smack_known_list);
		goto unlockout;
	}
	/*
	 * smk_netlbl_mls failed.
	 */
	kfree(skp);
	skp = NULL;
freeout:
	kfree(smack);
unlockout:
484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500
	mutex_unlock(&smack_known_lock);

	return skp;
}

/**
 * smk_import - import a smack label
 * @string: a text string that might be a Smack label
 * @len: the maximum size, or zero if it is NULL terminated.
 *
 * Returns a pointer to the label in the label list that
 * matches the passed string, adding it if necessary.
 */
char *smk_import(const char *string, int len)
{
	struct smack_known *skp;

501 502 503
	/* labels cannot begin with a '-' */
	if (string[0] == '-')
		return NULL;
504 505 506 507 508 509 510 511 512 513
	skp = smk_import_entry(string, len);
	if (skp == NULL)
		return NULL;
	return skp->smk_known;
}

/**
 * smack_from_secid - find the Smack label associated with a secid
 * @secid: an integer that might be associated with a Smack label
 *
L
Lucas De Marchi 已提交
514
 * Returns a pointer to the appropriate Smack label if there is one,
515 516 517 518 519 520
 * otherwise a pointer to the invalid Smack label.
 */
char *smack_from_secid(const u32 secid)
{
	struct smack_known *skp;

521 522 523 524
	rcu_read_lock();
	list_for_each_entry_rcu(skp, &smack_known_list, list) {
		if (skp->smk_secid == secid) {
			rcu_read_unlock();
525
			return skp->smk_known;
526 527
		}
	}
528 529 530 531 532

	/*
	 * If we got this far someone asked for the translation
	 * of a secid that is not on the list.
	 */
533
	rcu_read_unlock();
534 535 536 537 538 539 540 541 542 543 544 545
	return smack_known_invalid.smk_known;
}

/**
 * smack_to_secid - find the secid associated with a Smack label
 * @smack: the Smack label
 *
 * Returns the appropriate secid if there is one,
 * otherwise 0
 */
u32 smack_to_secid(const char *smack)
{
546
	struct smack_known *skp = smk_find_entry(smack);
547

548 549 550
	if (skp == NULL)
		return 0;
	return skp->smk_secid;
551
}