mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 16:35:02 +01:00
440 lines
10 KiB
C
440 lines
10 KiB
C
/*
|
|
* Copyright (C) 2005 Novell/SUSE
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation, version 2 of the
|
|
* License.
|
|
*
|
|
* AppArmor filesystem (part of securityfs)
|
|
*/
|
|
|
|
#include <linux/security.h>
|
|
#include <linux/vmalloc.h>
|
|
#include <linux/module.h>
|
|
#include <linux/seq_file.h>
|
|
#include <asm/uaccess.h>
|
|
|
|
#include "apparmor.h"
|
|
#include "inline.h"
|
|
#include "aamatch/match.h"
|
|
|
|
#define SECFS_SD "apparmor"
|
|
static struct dentry *sdfs_dentry = NULL;
|
|
|
|
/* profile */
|
|
extern struct seq_operations subdomainfs_profiles_op;
|
|
static int sd_prof_open(struct inode *inode, struct file *file);
|
|
static int sd_prof_release(struct inode *inode, struct file *file);
|
|
|
|
static struct file_operations subdomainfs_profiles_fops = {
|
|
.open = sd_prof_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = sd_prof_release,
|
|
};
|
|
|
|
/* version */
|
|
static ssize_t sd_version_read(struct file *file, char __user *buf,
|
|
size_t size, loff_t *ppos);
|
|
|
|
static struct file_operations subdomainfs_version_fops = {
|
|
.read = sd_version_read,
|
|
};
|
|
|
|
/* matching */
|
|
static ssize_t sd_matching_read(struct file *file, char __user *buf,
|
|
size_t size, loff_t *ppos);
|
|
|
|
static struct file_operations subdomainfs_matching_fops = {
|
|
.read = sd_matching_read,
|
|
};
|
|
|
|
|
|
/* interface */
|
|
extern ssize_t sd_file_prof_add(void *, size_t);
|
|
extern ssize_t sd_file_prof_repl(void *, size_t);
|
|
extern ssize_t sd_file_prof_remove(const char *, int);
|
|
|
|
static ssize_t sd_profile_load(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos);
|
|
static ssize_t sd_profile_replace(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos);
|
|
static ssize_t sd_profile_remove(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos);
|
|
|
|
static struct file_operations subdomainfs_profile_load = {
|
|
.write = sd_profile_load
|
|
};
|
|
|
|
static struct file_operations subdomainfs_profile_replace = {
|
|
.write = sd_profile_replace
|
|
};
|
|
|
|
static struct file_operations subdomainfs_profile_remove = {
|
|
.write = sd_profile_remove
|
|
};
|
|
|
|
|
|
/* control */
|
|
static u64 sd_control_get(void *data);
|
|
static void sd_control_set(void *data, u64 val);
|
|
|
|
DEFINE_SIMPLE_ATTRIBUTE(subdomainfs_control_fops, sd_control_get,
|
|
sd_control_set, "%lld\n");
|
|
|
|
|
|
|
|
/* table of static entries */
|
|
|
|
static struct root_entry {
|
|
const char *name;
|
|
int mode;
|
|
int access;
|
|
struct file_operations *fops;
|
|
void *data;
|
|
|
|
/* internal fields */
|
|
struct dentry *dentry;
|
|
int parent_index;
|
|
} root_entries[] = {
|
|
/* our root, normally /sys/kernel/security/subdomain */
|
|
{SECFS_SD, S_IFDIR, 0550}, /* DO NOT EDIT/MOVE */
|
|
|
|
/* interface for obtaining list of profiles currently loaded */
|
|
{"profiles", S_IFREG, 0440, &subdomainfs_profiles_fops,
|
|
NULL},
|
|
|
|
/* interface for obtaining version# of subdomain */
|
|
{"version", S_IFREG, 0440, &subdomainfs_version_fops,
|
|
NULL},
|
|
|
|
/* interface for obtaining matching features supported */
|
|
{"matching", S_IFREG, 0440, &subdomainfs_matching_fops,
|
|
NULL},
|
|
|
|
/* interface for loading/removing/replacing profiles */
|
|
{".load", S_IFREG, 0640, &subdomainfs_profile_load,
|
|
NULL},
|
|
{".replace", S_IFREG, 0640, &subdomainfs_profile_replace,
|
|
NULL},
|
|
{".remove", S_IFREG, 0640, &subdomainfs_profile_remove,
|
|
NULL},
|
|
|
|
/* interface for setting binary config values */
|
|
{"control", S_IFDIR, 0550},
|
|
{"complain", S_IFREG, 0640, &subdomainfs_control_fops,
|
|
&subdomain_complain},
|
|
{"audit", S_IFREG, 0640, &subdomainfs_control_fops,
|
|
&subdomain_audit},
|
|
{"debug", S_IFREG, 0640, &subdomainfs_control_fops,
|
|
&subdomain_debug},
|
|
{"logsyscall", S_IFREG, 0640, &subdomainfs_control_fops,
|
|
&subdomain_logsyscall},
|
|
{NULL, S_IFDIR, 0},
|
|
|
|
/* root end */
|
|
{NULL, S_IFDIR, 0}
|
|
};
|
|
|
|
#define SDFS_DENTRY root_entries[0].dentry
|
|
|
|
static const unsigned int num_entries =
|
|
sizeof(root_entries) / sizeof(struct root_entry);
|
|
|
|
|
|
|
|
static int sd_prof_open(struct inode *inode, struct file *file)
|
|
{
|
|
return seq_open(file, &subdomainfs_profiles_op);
|
|
}
|
|
|
|
|
|
static int sd_prof_release(struct inode *inode, struct file *file)
|
|
{
|
|
return seq_release(inode, file);
|
|
}
|
|
|
|
static ssize_t sd_version_read(struct file *file, char __user *buf,
|
|
size_t size, loff_t *ppos)
|
|
{
|
|
const char *version = apparmor_version_nl();
|
|
|
|
return simple_read_from_buffer(buf, size, ppos, version,
|
|
strlen(version));
|
|
}
|
|
|
|
static ssize_t sd_matching_read(struct file *file, char __user *buf,
|
|
size_t size, loff_t *ppos)
|
|
{
|
|
const char *matching = sdmatch_features();
|
|
|
|
return simple_read_from_buffer(buf, size, ppos, matching,
|
|
strlen(matching));
|
|
}
|
|
|
|
static char *sd_simple_write_to_buffer(const char __user *userbuf,
|
|
size_t alloc_size, size_t copy_size,
|
|
loff_t *pos, const char *msg)
|
|
{
|
|
char *data;
|
|
|
|
if (*pos != 0) {
|
|
/* only writes from pos 0, that is complete writes */
|
|
data = ERR_PTR(-ESPIPE);
|
|
goto out;
|
|
}
|
|
|
|
/* Don't allow confined processes to load/replace/remove profiles.
|
|
* No sane person would add rules allowing this to a profile
|
|
* but we enforce the restriction anyways.
|
|
*/
|
|
if (sd_is_confined()) {
|
|
struct subdomain *sd = SD_SUBDOMAIN(current->security);
|
|
|
|
SD_WARN("REJECTING access to profile %s (%s(%d) "
|
|
"profile %s active %s)\n",
|
|
msg, current->comm, current->pid,
|
|
sd->profile->name, sd->active->name);
|
|
|
|
data = ERR_PTR(-EPERM);
|
|
goto out;
|
|
}
|
|
|
|
data = vmalloc(alloc_size);
|
|
if (data == NULL) {
|
|
data = ERR_PTR(-ENOMEM);
|
|
goto out;
|
|
}
|
|
|
|
if (copy_from_user(data, userbuf, copy_size)) {
|
|
vfree(data);
|
|
data = ERR_PTR(-EFAULT);
|
|
goto out;
|
|
}
|
|
|
|
out:
|
|
return data;
|
|
}
|
|
|
|
static ssize_t sd_profile_load(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos)
|
|
{
|
|
char *data;
|
|
ssize_t error;
|
|
|
|
data = sd_simple_write_to_buffer(buf, size, size, pos, "load");
|
|
|
|
if (!IS_ERR(data)) {
|
|
error = sd_file_prof_add(data, size);
|
|
vfree(data);
|
|
} else {
|
|
error = PTR_ERR(data);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
static ssize_t sd_profile_replace(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos)
|
|
{
|
|
char *data;
|
|
ssize_t error;
|
|
|
|
data = sd_simple_write_to_buffer(buf, size, size, pos, "replacement");
|
|
|
|
if (!IS_ERR(data)) {
|
|
error = sd_file_prof_repl(data, size);
|
|
vfree(data);
|
|
} else {
|
|
error = PTR_ERR(data);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
static ssize_t sd_profile_remove(struct file *f, const char __user *buf,
|
|
size_t size, loff_t *pos)
|
|
{
|
|
char *data;
|
|
ssize_t error;
|
|
|
|
/* sd_file_prof_remove needs a null terminated string so 1 extra
|
|
* byte is allocated and null the copied data is then null terminated
|
|
*/
|
|
data = sd_simple_write_to_buffer(buf, size+1, size, pos, "removal");
|
|
|
|
if (!IS_ERR(data)) {
|
|
data[size] = 0;
|
|
error = sd_file_prof_remove(data, size);
|
|
vfree(data);
|
|
} else {
|
|
error = PTR_ERR(data);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
static u64 sd_control_get(void *data)
|
|
{
|
|
return *(int *)data;
|
|
}
|
|
|
|
static void sd_control_set(void *data, u64 val)
|
|
{
|
|
if (val > 1)
|
|
val = 1;
|
|
|
|
*(int*)data = (int)val;
|
|
}
|
|
|
|
static void clear_subdomainfs(void)
|
|
{
|
|
unsigned int i;
|
|
|
|
for (i=0; i < num_entries;i++) {
|
|
unsigned int index;
|
|
|
|
if (root_entries[i].mode == S_IFDIR) {
|
|
if (root_entries[i].name)
|
|
/* defer dir free till all sub-entries freed */
|
|
continue;
|
|
else
|
|
/* cleanup parent */
|
|
index = root_entries[i].parent_index;
|
|
} else {
|
|
index = i;
|
|
}
|
|
|
|
if (root_entries[index].dentry) {
|
|
securityfs_remove(root_entries[index].dentry);
|
|
|
|
SD_DEBUG("%s: deleted subdomainfs entry name=%s "
|
|
"dentry=%p\n",
|
|
__FUNCTION__,
|
|
root_entries[index].name,
|
|
root_entries[index].dentry);
|
|
|
|
root_entries[index].dentry = NULL;
|
|
root_entries[index].parent_index = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int populate_subdomainfs(struct dentry *root)
|
|
{
|
|
unsigned int i, parent_index, depth;
|
|
|
|
#define ENT root_entries[i]
|
|
|
|
for (i = 0; i < num_entries; i++) {
|
|
root_entries[i].dentry = NULL;
|
|
root_entries[i].parent_index = 0;
|
|
}
|
|
|
|
/* 1. Verify entry 0 is valid [sanity check] */
|
|
if (num_entries == 0 ||
|
|
!root_entries[0].name ||
|
|
strcmp(root_entries[0].name, SECFS_SD) != 0 ||
|
|
root_entries[0].mode != S_IFDIR) {
|
|
SD_ERROR("%s: root entry 0 is not SECFS_SD/dir\n",
|
|
__FUNCTION__);
|
|
goto error;
|
|
}
|
|
|
|
/* 2. Verify table structure */
|
|
parent_index = 0;
|
|
depth = 1;
|
|
|
|
for (i = 1; i < num_entries; i++) {
|
|
ENT.parent_index = parent_index;
|
|
|
|
if (ENT.name && ENT.mode == S_IFDIR) {
|
|
depth++;
|
|
parent_index = i;
|
|
} else if (!ENT.name) {
|
|
if (ENT.mode != S_IFDIR || depth == 0) {
|
|
SD_ERROR("%s: root_entry %d invalid (%u %d)",
|
|
__FUNCTION__, i,
|
|
ENT.mode, ENT.parent_index);
|
|
goto error;
|
|
}
|
|
|
|
depth--;
|
|
parent_index = root_entries[parent_index].parent_index;
|
|
}
|
|
}
|
|
|
|
if (depth != 0) {
|
|
SD_ERROR("%s: root_entry table not correctly terminated\n",
|
|
__FUNCTION__);
|
|
goto error;
|
|
}
|
|
|
|
/* 3. Create root (parent=NULL) */
|
|
i=0;
|
|
|
|
ENT.dentry = securityfs_create_file(ENT.name,
|
|
ENT.mode | ENT.access,
|
|
NULL, NULL, NULL);
|
|
|
|
if (ENT.dentry)
|
|
SD_DEBUG("%s: created securityfs/subdomain [dentry=%p]\n",
|
|
__FUNCTION__, ENT.dentry);
|
|
else
|
|
goto error;
|
|
|
|
|
|
/* 4. create remaining nodes */
|
|
for (i = 1; i < num_entries; i++) {
|
|
struct dentry *parent;
|
|
|
|
/* end of directory ? */
|
|
if (!ENT.name)
|
|
continue;
|
|
|
|
parent = root_entries[ENT.parent_index].dentry;
|
|
|
|
ENT.dentry = securityfs_create_file(ENT.name,
|
|
ENT.mode | ENT.access,
|
|
parent,
|
|
ENT.mode != S_IFDIR ? ENT.data : NULL,
|
|
ENT.mode != S_IFDIR ? ENT.fops : NULL);
|
|
|
|
if (!ENT.dentry)
|
|
goto cleanup_error;
|
|
|
|
SD_DEBUG("%s: added subdomainfs entry "
|
|
"name=%s mode=%x dentry=%p [parent %p]\n",
|
|
__FUNCTION__, ENT.name, ENT.mode|ENT.access,
|
|
ENT.dentry, parent);
|
|
}
|
|
|
|
return 1;
|
|
|
|
cleanup_error:
|
|
clear_subdomainfs();
|
|
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
int create_subdomainfs(void)
|
|
{
|
|
if (SDFS_DENTRY)
|
|
SD_ERROR("%s: Subdomain securityfs already exists\n",
|
|
__FUNCTION__);
|
|
else if (!populate_subdomainfs(sdfs_dentry))
|
|
SD_ERROR("%s: Error populating Subdomain securityfs\n",
|
|
__FUNCTION__);
|
|
|
|
return (SDFS_DENTRY != NULL);
|
|
}
|
|
|
|
int destroy_subdomainfs(void)
|
|
{
|
|
if (SDFS_DENTRY)
|
|
clear_subdomainfs();
|
|
|
|
return 1;
|
|
}
|