Revert "SELinux: per-command whitelisting of ioctls"

This reverts commit bc84b4adb1469e3d05ad76c304a4c545feaf1f88.

Bug: 22846070
Change-Id: Ib4cb130b2225ea2e22556ff852313e0de7dddcab
Signed-off-by: Jeff Vander Stoep <jeffv@google.com>
Signed-off-by: Kevin F. Haggerty <haggertk@lineageos.org>
This commit is contained in:
Jeff Vander Stoep 2015-07-29 18:36:41 -07:00 committed by Francescodario Cuzzocrea
parent e2ed20302b
commit be068a2dfd
11 changed files with 64 additions and 812 deletions

View file

@ -22,7 +22,6 @@
#include <linux/init.h> #include <linux/init.h>
#include <linux/skbuff.h> #include <linux/skbuff.h>
#include <linux/percpu.h> #include <linux/percpu.h>
#include <linux/list.h>
#include <net/sock.h> #include <net/sock.h>
#include <linux/un.h> #include <linux/un.h>
#include <net/af_unix.h> #include <net/af_unix.h>
@ -49,7 +48,6 @@ struct avc_entry {
u32 tsid; u32 tsid;
u16 tclass; u16 tclass;
struct av_decision avd; struct av_decision avd;
struct avc_operation_node *ops_node;
}; };
struct avc_node { struct avc_node {
@ -58,16 +56,6 @@ struct avc_node {
struct rcu_head rhead; struct rcu_head rhead;
}; };
struct avc_operation_decision_node {
struct operation_decision od;
struct list_head od_list;
};
struct avc_operation_node {
struct operation ops;
struct list_head od_head; /* list of operation_decision_node */
};
struct avc_cache { struct avc_cache {
struct hlist_head slots[AVC_CACHE_SLOTS]; /* head for avc_node->list */ struct hlist_head slots[AVC_CACHE_SLOTS]; /* head for avc_node->list */
spinlock_t slots_lock[AVC_CACHE_SLOTS]; /* lock for writes */ spinlock_t slots_lock[AVC_CACHE_SLOTS]; /* lock for writes */
@ -98,9 +86,6 @@ DEFINE_PER_CPU(struct avc_cache_stats, avc_cache_stats) = { 0 };
static struct avc_cache avc_cache; static struct avc_cache avc_cache;
static struct avc_callback_node *avc_callbacks; static struct avc_callback_node *avc_callbacks;
static struct kmem_cache *avc_node_cachep; static struct kmem_cache *avc_node_cachep;
static struct kmem_cache *avc_operation_decision_node_cachep;
static struct kmem_cache *avc_operation_node_cachep;
static struct kmem_cache *avc_operation_perm_cachep;
static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass)
{ {
@ -192,16 +177,6 @@ void __init avc_init(void)
avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node), avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
0, SLAB_PANIC, NULL); 0, SLAB_PANIC, NULL);
avc_operation_node_cachep = kmem_cache_create("avc_operation_node",
sizeof(struct avc_operation_node),
0, SLAB_PANIC, NULL);
avc_operation_decision_node_cachep = kmem_cache_create(
"avc_operation_decision_node",
sizeof(struct avc_operation_decision_node),
0, SLAB_PANIC, NULL);
avc_operation_perm_cachep = kmem_cache_create("avc_operation_perm",
sizeof(struct operation_perm),
0, SLAB_PANIC, NULL);
audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n"); audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n");
} }
@ -238,253 +213,9 @@ int avc_get_hash_stats(char *page)
slots_used, AVC_CACHE_SLOTS, max_chain_len); slots_used, AVC_CACHE_SLOTS, max_chain_len);
} }
/*
* using a linked list for operation_decision lookup because the list is
* always small. i.e. less than 5, typically 1
*/
static struct operation_decision *avc_operation_lookup(u8 type,
struct avc_operation_node *ops_node)
{
struct avc_operation_decision_node *od_node;
struct operation_decision *od = NULL;
list_for_each_entry(od_node, &ops_node->od_head, od_list) {
if (od_node->od.type != type)
continue;
od = &od_node->od;
break;
}
return od;
}
static inline unsigned int avc_operation_has_perm(struct operation_decision *od,
u16 cmd, u8 specified)
{
unsigned int rc = 0;
u8 num = cmd & 0xff;
if ((specified == OPERATION_ALLOWED) &&
(od->specified & OPERATION_ALLOWED))
rc = security_operation_test(od->allowed->perms, num);
else if ((specified == OPERATION_AUDITALLOW) &&
(od->specified & OPERATION_AUDITALLOW))
rc = security_operation_test(od->auditallow->perms, num);
else if ((specified == OPERATION_DONTAUDIT) &&
(od->specified & OPERATION_DONTAUDIT))
rc = security_operation_test(od->dontaudit->perms, num);
return rc;
}
static void avc_operation_allow_perm(struct avc_operation_node *node, u16 cmd)
{
struct operation_decision *od;
u8 type;
u8 num;
type = cmd >> 8;
num = cmd & 0xff;
security_operation_set(node->ops.type, type);
od = avc_operation_lookup(type, node);
if (od && od->allowed)
security_operation_set(od->allowed->perms, num);
}
static void avc_operation_decision_free(
struct avc_operation_decision_node *od_node)
{
struct operation_decision *od;
od = &od_node->od;
if (od->allowed)
kmem_cache_free(avc_operation_perm_cachep, od->allowed);
if (od->auditallow)
kmem_cache_free(avc_operation_perm_cachep, od->auditallow);
if (od->dontaudit)
kmem_cache_free(avc_operation_perm_cachep, od->dontaudit);
kmem_cache_free(avc_operation_decision_node_cachep, od_node);
}
static void avc_operation_free(struct avc_operation_node *ops_node)
{
struct avc_operation_decision_node *od_node;
if (!ops_node)
return;
list_for_each_entry(od_node, &ops_node->od_head, od_list)
avc_operation_decision_free(od_node);
kmem_cache_free(avc_operation_node_cachep, ops_node);
}
static void avc_copy_operation_decision(struct operation_decision *dest,
struct operation_decision *src)
{
dest->type = src->type;
dest->specified = src->specified;
if (dest->specified & OPERATION_ALLOWED)
memcpy(dest->allowed->perms, src->allowed->perms,
sizeof(src->allowed->perms));
if (dest->specified & OPERATION_AUDITALLOW)
memcpy(dest->auditallow->perms, src->auditallow->perms,
sizeof(src->auditallow->perms));
if (dest->specified & OPERATION_DONTAUDIT)
memcpy(dest->dontaudit->perms, src->dontaudit->perms,
sizeof(src->dontaudit->perms));
}
/*
* similar to avc_copy_operation_decision, but only copy decision
* information relevant to this command
*/
static inline void avc_quick_copy_operation_decision(u16 cmd,
struct operation_decision *dest,
struct operation_decision *src)
{
/*
* compute index of the u32 of the 256 bits (8 u32s) that contain this
* command permission
*/
u8 i = (0xff & cmd) >> 5;
dest->specified = src->specified;
if (dest->specified & OPERATION_ALLOWED)
dest->allowed->perms[i] = src->allowed->perms[i];
if (dest->specified & OPERATION_AUDITALLOW)
dest->auditallow->perms[i] = src->auditallow->perms[i];
if (dest->specified & OPERATION_DONTAUDIT)
dest->dontaudit->perms[i] = src->dontaudit->perms[i];
}
static struct avc_operation_decision_node
*avc_operation_decision_alloc(u8 specified)
{
struct avc_operation_decision_node *node;
struct operation_decision *od;
node = kmem_cache_zalloc(avc_operation_decision_node_cachep,
GFP_ATOMIC | __GFP_NOMEMALLOC);
if (!node)
return NULL;
od = &node->od;
if (specified & OPERATION_ALLOWED) {
od->allowed = kmem_cache_zalloc(avc_operation_perm_cachep,
GFP_ATOMIC | __GFP_NOMEMALLOC);
if (!od->allowed)
goto error;
}
if (specified & OPERATION_AUDITALLOW) {
od->auditallow = kmem_cache_zalloc(avc_operation_perm_cachep,
GFP_ATOMIC | __GFP_NOMEMALLOC);
if (!od->auditallow)
goto error;
}
if (specified & OPERATION_DONTAUDIT) {
od->dontaudit = kmem_cache_zalloc(avc_operation_perm_cachep,
GFP_ATOMIC | __GFP_NOMEMALLOC);
if (!od->dontaudit)
goto error;
}
return node;
error:
avc_operation_decision_free(node);
return NULL;
}
static int avc_add_operation(struct avc_node *node,
struct operation_decision *od)
{
struct avc_operation_decision_node *dest_od;
node->ae.ops_node->ops.len++;
dest_od = avc_operation_decision_alloc(od->specified);
if (!dest_od)
return -ENOMEM;
avc_copy_operation_decision(&dest_od->od, od);
list_add(&dest_od->od_list, &node->ae.ops_node->od_head);
return 0;
}
static struct avc_operation_node *avc_operation_alloc(void)
{
struct avc_operation_node *ops;
ops = kmem_cache_zalloc(avc_operation_node_cachep,
GFP_ATOMIC|__GFP_NOMEMALLOC);
if (!ops)
return ops;
INIT_LIST_HEAD(&ops->od_head);
return ops;
}
static int avc_operation_populate(struct avc_node *node,
struct avc_operation_node *src)
{
struct avc_operation_node *dest;
struct avc_operation_decision_node *dest_od;
struct avc_operation_decision_node *src_od;
if (src->ops.len == 0)
return 0;
dest = avc_operation_alloc();
if (!dest)
return -ENOMEM;
memcpy(dest->ops.type, &src->ops.type, sizeof(dest->ops.type));
dest->ops.len = src->ops.len;
/* for each source od allocate a destination od and copy */
list_for_each_entry(src_od, &src->od_head, od_list) {
dest_od = avc_operation_decision_alloc(src_od->od.specified);
if (!dest_od)
goto error;
avc_copy_operation_decision(&dest_od->od, &src_od->od);
list_add(&dest_od->od_list, &dest->od_head);
}
node->ae.ops_node = dest;
return 0;
error:
avc_operation_free(dest);
return -ENOMEM;
}
static inline u32 avc_operation_audit_required(u32 requested,
struct av_decision *avd,
struct operation_decision *od,
u16 cmd,
int result,
u32 *deniedp)
{
u32 denied, audited;
denied = requested & ~avd->allowed;
if (unlikely(denied)) {
audited = denied & avd->auditdeny;
if (audited && od) {
if (avc_operation_has_perm(od, cmd,
OPERATION_DONTAUDIT))
audited &= ~requested;
}
} else if (result) {
audited = denied = requested;
} else {
audited = requested & avd->auditallow;
if (audited && od) {
if (!avc_operation_has_perm(od, cmd,
OPERATION_AUDITALLOW))
audited &= ~requested;
}
}
*deniedp = denied;
return audited;
}
static void avc_node_free(struct rcu_head *rhead) static void avc_node_free(struct rcu_head *rhead)
{ {
struct avc_node *node = container_of(rhead, struct avc_node, rhead); struct avc_node *node = container_of(rhead, struct avc_node, rhead);
avc_operation_free(node->ae.ops_node);
kmem_cache_free(avc_node_cachep, node); kmem_cache_free(avc_node_cachep, node);
avc_cache_stats_incr(frees); avc_cache_stats_incr(frees);
} }
@ -498,7 +229,6 @@ static void avc_node_delete(struct avc_node *node)
static void avc_node_kill(struct avc_node *node) static void avc_node_kill(struct avc_node *node)
{ {
avc_operation_free(node->ae.ops_node);
kmem_cache_free(avc_node_cachep, node); kmem_cache_free(avc_node_cachep, node);
avc_cache_stats_incr(frees); avc_cache_stats_incr(frees);
atomic_dec(&avc_cache.active_nodes); atomic_dec(&avc_cache.active_nodes);
@ -647,7 +377,6 @@ static int avc_latest_notif_update(int seqno, int is_insert)
* @tsid: target security identifier * @tsid: target security identifier
* @tclass: target security class * @tclass: target security class
* @avd: resulting av decision * @avd: resulting av decision
* @ops: resulting operation decisions
* *
* Insert an AVC entry for the SID pair * Insert an AVC entry for the SID pair
* (@ssid, @tsid) and class @tclass. * (@ssid, @tsid) and class @tclass.
@ -659,9 +388,7 @@ static int avc_latest_notif_update(int seqno, int is_insert)
* the access vectors into a cache entry, returns * the access vectors into a cache entry, returns
* avc_node inserted. Otherwise, this function returns NULL. * avc_node inserted. Otherwise, this function returns NULL.
*/ */
static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd)
struct av_decision *avd,
struct avc_operation_node *ops_node)
{ {
struct avc_node *pos, *node = NULL; struct avc_node *pos, *node = NULL;
int hvalue; int hvalue;
@ -675,15 +402,10 @@ static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
struct hlist_head *head; struct hlist_head *head;
struct hlist_node *next; struct hlist_node *next;
spinlock_t *lock; spinlock_t *lock;
int rc = 0;
hvalue = avc_hash(ssid, tsid, tclass); hvalue = avc_hash(ssid, tsid, tclass);
avc_node_populate(node, ssid, tsid, tclass, avd); avc_node_populate(node, ssid, tsid, tclass, avd);
rc = avc_operation_populate(node, ops_node);
if (rc) {
kmem_cache_free(avc_node_cachep, node);
return NULL;
}
head = &avc_cache.slots[hvalue]; head = &avc_cache.slots[hvalue];
lock = &avc_cache.slots_lock[hvalue]; lock = &avc_cache.slots_lock[hvalue];
@ -779,21 +501,6 @@ static noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
return 0; return 0;
} }
static inline int avc_operation_audit(u32 ssid, u32 tsid, u16 tclass,
u32 requested, struct av_decision *avd,
struct operation_decision *od,
u16 cmd, int result,
struct common_audit_data *ad)
{
u32 audited, denied;
audited = avc_operation_audit_required(
requested, avd, od, cmd, result, &denied);
if (likely(!audited))
return 0;
return slow_avc_audit(ssid, tsid, tclass, requested,
audited, denied, result, ad, 0);
}
/** /**
* avc_audit - Audit the granting or denial of permissions. * avc_audit - Audit the granting or denial of permissions.
* @ssid: source security identifier * @ssid: source security identifier
@ -907,17 +614,14 @@ static inline int avc_sidcmp(u32 x, u32 y)
* @perms : Permission mask bits * @perms : Permission mask bits
* @ssid,@tsid,@tclass : identifier of an AVC entry * @ssid,@tsid,@tclass : identifier of an AVC entry
* @seqno : sequence number when decision was made * @seqno : sequence number when decision was made
* @od: operation_decision to be added to the node
* *
* if a valid AVC entry doesn't exist,this function returns -ENOENT. * if a valid AVC entry doesn't exist,this function returns -ENOENT.
* if kmalloc() called internal returns NULL, this function returns -ENOMEM. * if kmalloc() called internal returns NULL, this function returns -ENOMEM.
* otherwise, this function updates the AVC entry. The original AVC-entry object * otherwise, this function updates the AVC entry. The original AVC-entry object
* will release later by RCU. * will release later by RCU.
*/ */
static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid, static int avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass,
u16 tclass, u32 seqno, u32 seqno)
struct operation_decision *od,
u32 flags)
{ {
int hvalue, rc = 0; int hvalue, rc = 0;
unsigned long flag; unsigned long flag;
@ -962,19 +666,9 @@ static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid,
avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd); avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
if (orig->ae.ops_node) {
rc = avc_operation_populate(node, orig->ae.ops_node);
if (rc) {
kmem_cache_free(avc_node_cachep, node);
goto out_unlock;
}
}
switch (event) { switch (event) {
case AVC_CALLBACK_GRANT: case AVC_CALLBACK_GRANT:
node->ae.avd.allowed |= perms; node->ae.avd.allowed |= perms;
if (node->ae.ops_node && (flags & AVC_OPERATION_CMD))
avc_operation_allow_perm(node->ae.ops_node, cmd);
break; break;
case AVC_CALLBACK_TRY_REVOKE: case AVC_CALLBACK_TRY_REVOKE:
case AVC_CALLBACK_REVOKE: case AVC_CALLBACK_REVOKE:
@ -992,9 +686,6 @@ static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid,
case AVC_CALLBACK_AUDITDENY_DISABLE: case AVC_CALLBACK_AUDITDENY_DISABLE:
node->ae.avd.auditdeny &= ~perms; node->ae.avd.auditdeny &= ~perms;
break; break;
case AVC_CALLBACK_ADD_OPERATION:
avc_add_operation(node, od);
break;
} }
avc_node_replace(node, orig); avc_node_replace(node, orig);
out_unlock: out_unlock:
@ -1068,19 +759,17 @@ int avc_ss_reset(u32 seqno)
* results in a bigger stack frame. * results in a bigger stack frame.
*/ */
static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid, static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid,
u16 tclass, struct av_decision *avd, u16 tclass, struct av_decision *avd)
struct avc_operation_node *ops_node)
{ {
rcu_read_unlock(); rcu_read_unlock();
INIT_LIST_HEAD(&ops_node->od_head); security_compute_av(ssid, tsid, tclass, avd);
security_compute_av(ssid, tsid, tclass, avd, &ops_node->ops);
rcu_read_lock(); rcu_read_lock();
return avc_insert(ssid, tsid, tclass, avd, ops_node); return avc_insert(ssid, tsid, tclass, avd);
} }
static noinline int avc_denied(u32 ssid, u32 tsid, static noinline int avc_denied(u32 ssid, u32 tsid,
u16 tclass, u32 requested, u16 tclass, u32 requested,
u16 cmd, unsigned flags, unsigned flags,
struct av_decision *avd) struct av_decision *avd)
{ {
if (flags & AVC_STRICT) if (flags & AVC_STRICT)
@ -1092,92 +781,11 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
#endif #endif
return -EACCES; return -EACCES;
avc_update_node(AVC_CALLBACK_GRANT, requested, cmd, ssid, avc_update_node(AVC_CALLBACK_GRANT, requested, ssid,
tsid, tclass, avd->seqno, NULL, flags); tsid, tclass, avd->seqno);
return 0; return 0;
} }
/*
* ioctl commands are comprised of four fields, direction, size, type, and
* number. The avc operation logic filters based on two of them:
*
* type: or code, typically unique to each driver
* number: or function
*
* For example, 0x89 is a socket type, and number 0x27 is the get hardware
* address function.
*/
int avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested,
u16 cmd, struct common_audit_data *ad)
{
struct avc_node *node;
struct av_decision avd;
u32 denied;
struct operation_decision *od = NULL;
struct operation_decision od_local;
struct operation_perm allowed;
struct operation_perm auditallow;
struct operation_perm dontaudit;
struct avc_operation_node local_ops_node;
struct avc_operation_node *ops_node;
u8 type = cmd >> 8;
int rc = 0, rc2;
ops_node = &local_ops_node;
BUG_ON(!requested);
rcu_read_lock();
node = avc_lookup(ssid, tsid, tclass);
if (unlikely(!node)) {
node = avc_compute_av(ssid, tsid, tclass, &avd, ops_node);
} else {
memcpy(&avd, &node->ae.avd, sizeof(avd));
ops_node = node->ae.ops_node;
}
/* if operations are not defined, only consider av_decision */
if (!ops_node || !ops_node->ops.len)
goto decision;
od_local.allowed = &allowed;
od_local.auditallow = &auditallow;
od_local.dontaudit = &dontaudit;
/* lookup operation decision */
od = avc_operation_lookup(type, ops_node);
if (unlikely(!od)) {
/* Compute operation decision if type is flagged */
if (!security_operation_test(ops_node->ops.type, type)) {
avd.allowed &= ~requested;
goto decision;
}
rcu_read_unlock();
security_compute_operation(ssid, tsid, tclass, type, &od_local);
rcu_read_lock();
avc_update_node(AVC_CALLBACK_ADD_OPERATION, requested, cmd,
ssid, tsid, tclass, avd.seqno, &od_local, 0);
} else {
avc_quick_copy_operation_decision(cmd, &od_local, od);
}
od = &od_local;
if (!avc_operation_has_perm(od, cmd, OPERATION_ALLOWED))
avd.allowed &= ~requested;
decision:
denied = requested & ~(avd.allowed);
if (unlikely(denied))
rc = avc_denied(ssid, tsid, tclass, requested, cmd,
AVC_OPERATION_CMD, &avd);
rcu_read_unlock();
rc2 = avc_operation_audit(ssid, tsid, tclass, requested,
&avd, od, cmd, rc, ad);
if (rc2)
return rc2;
return rc;
}
/** /**
* avc_has_perm_noaudit - Check permissions but perform no auditing. * avc_has_perm_noaudit - Check permissions but perform no auditing.
@ -1205,7 +813,6 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
struct av_decision *avd) struct av_decision *avd)
{ {
struct avc_node *node; struct avc_node *node;
struct avc_operation_node ops_node;
int rc = 0; int rc = 0;
u32 denied; u32 denied;
@ -1214,14 +821,16 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
rcu_read_lock(); rcu_read_lock();
node = avc_lookup(ssid, tsid, tclass); node = avc_lookup(ssid, tsid, tclass);
if (unlikely(!node)) if (unlikely(!node)) {
node = avc_compute_av(ssid, tsid, tclass, avd, &ops_node); node = avc_compute_av(ssid, tsid, tclass, avd);
else } else {
memcpy(avd, &node->ae.avd, sizeof(*avd)); memcpy(avd, &node->ae.avd, sizeof(*avd));
avd = &node->ae.avd;
}
denied = requested & ~(avd->allowed); denied = requested & ~(avd->allowed);
if (unlikely(denied)) if (unlikely(denied))
rc = avc_denied(ssid, tsid, tclass, requested, 0, flags, avd); rc = avc_denied(ssid, tsid, tclass, requested, flags, avd);
rcu_read_unlock(); rcu_read_unlock();
return rc; return rc;

View file

@ -3145,46 +3145,6 @@ static void selinux_file_free_security(struct file *file)
file_free_security(file); file_free_security(file);
} }
/*
* Check whether a task has the ioctl permission and cmd
* operation to an inode.
*/
int ioctl_has_perm(const struct cred *cred, struct file *file,
u32 requested, u16 cmd)
{
struct common_audit_data ad;
struct file_security_struct *fsec = file->f_security;
struct inode *inode = file->f_path.dentry->d_inode;
struct inode_security_struct *isec = inode->i_security;
struct lsm_ioctlop_audit ioctl;
u32 ssid = cred_sid(cred);
struct selinux_audit_data sad = {0,};
int rc;
COMMON_AUDIT_DATA_INIT(&ad, IOCTL_OP);
ad.u.op = &ioctl;
ad.u.op->cmd = cmd;
ad.u.op->path = file->f_path;
ad.selinux_audit_data = &sad;
if (ssid != fsec->sid) {
rc = avc_has_perm(ssid, fsec->sid,
SECCLASS_FD,
FD__USE,
&ad);
if (rc)
goto out;
}
if (unlikely(IS_PRIVATE(inode)))
return 0;
rc = avc_has_operation(ssid, isec->sid, isec->sclass,
requested, cmd, &ad);
out:
return rc;
}
static int selinux_file_ioctl(struct file *file, unsigned int cmd, static int selinux_file_ioctl(struct file *file, unsigned int cmd,
unsigned long arg) unsigned long arg)
{ {
@ -3227,7 +3187,7 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
* to the file's ioctl() function. * to the file's ioctl() function.
*/ */
default: default:
error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); error = file_has_perm(cred, file, FILE__IOCTL);
} }
return error; return error;
} }

View file

@ -84,15 +84,11 @@ int avc_audit(u32 ssid, u32 tsid,
struct common_audit_data *a, unsigned flags); struct common_audit_data *a, unsigned flags);
#define AVC_STRICT 1 /* Ignore permissive mode. */ #define AVC_STRICT 1 /* Ignore permissive mode. */
#define AVC_OPERATION_CMD 2 /* ignore command when updating operations */
int avc_has_perm_noaudit(u32 ssid, u32 tsid, int avc_has_perm_noaudit(u32 ssid, u32 tsid,
u16 tclass, u32 requested, u16 tclass, u32 requested,
unsigned flags, unsigned flags,
struct av_decision *avd); struct av_decision *avd);
int avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested,
u16 cmd, struct common_audit_data *ad);
int avc_has_perm_flags(u32 ssid, u32 tsid, int avc_has_perm_flags(u32 ssid, u32 tsid,
u16 tclass, u32 requested, u16 tclass, u32 requested,
struct common_audit_data *auditdata, struct common_audit_data *auditdata,
@ -115,7 +111,6 @@ u32 avc_policy_seqno(void);
#define AVC_CALLBACK_AUDITALLOW_DISABLE 32 #define AVC_CALLBACK_AUDITALLOW_DISABLE 32
#define AVC_CALLBACK_AUDITDENY_ENABLE 64 #define AVC_CALLBACK_AUDITDENY_ENABLE 64
#define AVC_CALLBACK_AUDITDENY_DISABLE 128 #define AVC_CALLBACK_AUDITDENY_DISABLE 128
#define AVC_CALLBACK_ADD_OPERATION 256
int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid, int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid,
u16 tclass, u32 perms, u16 tclass, u32 perms,

View file

@ -34,14 +34,13 @@
#define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS 27 #define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS 27
#define POLICYDB_VERSION_DEFAULT_TYPE 28 #define POLICYDB_VERSION_DEFAULT_TYPE 28
#define POLICYDB_VERSION_CONSTRAINT_NAMES 29 #define POLICYDB_VERSION_CONSTRAINT_NAMES 29
#define POLICYDB_VERSION_IOCTL_OPERATIONS 30
/* Range of policy versions we understand*/ /* Range of policy versions we understand*/
#define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE #define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE
#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX #ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
#define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE #define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
#else #else
#define POLICYDB_VERSION_MAX POLICYDB_VERSION_IOCTL_OPERATIONS #define POLICYDB_VERSION_MAX POLICYDB_VERSION_CONSTRAINT_NAMES
#endif #endif
/* Mask for just the mount related flags */ /* Mask for just the mount related flags */
@ -104,31 +103,6 @@ struct av_decision {
u32 flags; u32 flags;
}; };
#define security_operation_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f))
#define security_operation_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f)))
struct operation_perm {
u32 perms[8];
};
struct operation_decision {
u8 type;
u8 specified;
struct operation_perm *allowed;
struct operation_perm *auditallow;
struct operation_perm *dontaudit;
};
#define OPERATION_ALLOWED 1
#define OPERATION_AUDITALLOW 2
#define OPERATION_DONTAUDIT 4
#define OPERATION_ALL (OPERATION_ALLOWED | OPERATION_AUDITALLOW |\
OPERATION_DONTAUDIT)
struct operation {
u16 len; /* length of operation decision chain */
u32 type[8]; /* 256 types */
};
/* definitions of av_decision.flags */ /* definitions of av_decision.flags */
// START_SEC_SELINUX_PORTING_COMMON // START_SEC_SELINUX_PORTING_COMMON
#ifdef CONFIG_ALWAYS_ENFORCE #ifdef CONFIG_ALWAYS_ENFORCE
@ -139,11 +113,7 @@ struct operation {
// END_SEC_SELINUX_PORTING_COMMON // END_SEC_SELINUX_PORTING_COMMON
void security_compute_av(u32 ssid, u32 tsid, void security_compute_av(u32 ssid, u32 tsid,
u16 tclass, struct av_decision *avd, u16 tclass, struct av_decision *avd);
struct operation *ops);
void security_compute_operation(u32 ssid, u32 tsid, u16 tclass,
u8 type, struct operation_decision *od);
void security_compute_av_user(u32 ssid, u32 tsid, void security_compute_av_user(u32 ssid, u32 tsid,
u16 tclass, struct av_decision *avd); u16 tclass, struct av_decision *avd);

View file

@ -24,7 +24,6 @@
#include "policydb.h" #include "policydb.h"
static struct kmem_cache *avtab_node_cachep; static struct kmem_cache *avtab_node_cachep;
static struct kmem_cache *avtab_operation_cachep;
static inline int avtab_hash(struct avtab_key *keyp, u16 mask) static inline int avtab_hash(struct avtab_key *keyp, u16 mask)
{ {
@ -38,24 +37,11 @@ avtab_insert_node(struct avtab *h, int hvalue,
struct avtab_key *key, struct avtab_datum *datum) struct avtab_key *key, struct avtab_datum *datum)
{ {
struct avtab_node *newnode; struct avtab_node *newnode;
struct avtab_operation *ops;
newnode = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL); newnode = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL);
if (newnode == NULL) if (newnode == NULL)
return NULL; return NULL;
newnode->key = *key; newnode->key = *key;
newnode->datum = *datum;
if (key->specified & AVTAB_OP) {
ops = kmem_cache_zalloc(avtab_operation_cachep, GFP_KERNEL);
if (ops == NULL) {
kmem_cache_free(avtab_node_cachep, newnode);
return NULL;
}
*ops = *(datum->u.ops);
newnode->datum.u.ops = ops;
} else {
newnode->datum.u.data = datum->u.data;
}
if (prev) { if (prev) {
newnode->next = prev->next; newnode->next = prev->next;
prev->next = newnode; prev->next = newnode;
@ -84,11 +70,8 @@ static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_dat
if (key->source_type == cur->key.source_type && if (key->source_type == cur->key.source_type &&
key->target_type == cur->key.target_type && key->target_type == cur->key.target_type &&
key->target_class == cur->key.target_class && key->target_class == cur->key.target_class &&
(specified & cur->key.specified)) { (specified & cur->key.specified))
if (specified & AVTAB_OPNUM)
break;
return -EEXIST; return -EEXIST;
}
if (key->source_type < cur->key.source_type) if (key->source_type < cur->key.source_type)
break; break;
if (key->source_type == cur->key.source_type && if (key->source_type == cur->key.source_type &&
@ -249,9 +232,6 @@ void avtab_destroy(struct avtab *h)
while (cur) { while (cur) {
temp = cur; temp = cur;
cur = cur->next; cur = cur->next;
if (temp->key.specified & AVTAB_OP)
kmem_cache_free(avtab_operation_cachep,
temp->datum.u.ops);
kmem_cache_free(avtab_node_cachep, temp); kmem_cache_free(avtab_node_cachep, temp);
} }
h->htable[i] = NULL; h->htable[i] = NULL;
@ -340,13 +320,7 @@ static uint16_t spec_order[] = {
AVTAB_AUDITALLOW, AVTAB_AUDITALLOW,
AVTAB_TRANSITION, AVTAB_TRANSITION,
AVTAB_CHANGE, AVTAB_CHANGE,
AVTAB_MEMBER, AVTAB_MEMBER
AVTAB_OPNUM_ALLOWED,
AVTAB_OPNUM_AUDITALLOW,
AVTAB_OPNUM_DONTAUDIT,
AVTAB_OPTYPE_ALLOWED,
AVTAB_OPTYPE_AUDITALLOW,
AVTAB_OPTYPE_DONTAUDIT
}; };
int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol, int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
@ -356,11 +330,10 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
{ {
__le16 buf16[4]; __le16 buf16[4];
u16 enabled; u16 enabled;
__le32 buf32[7];
u32 items, items2, val, vers = pol->policyvers; u32 items, items2, val, vers = pol->policyvers;
struct avtab_key key; struct avtab_key key;
struct avtab_datum datum; struct avtab_datum datum;
struct avtab_operation ops;
__le32 buf32[ARRAY_SIZE(ops.op.perms)];
int i, rc; int i, rc;
unsigned set; unsigned set;
@ -417,15 +390,11 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
printk(KERN_ERR "SELinux: avtab: entry has both access vectors and types\n"); printk(KERN_ERR "SELinux: avtab: entry has both access vectors and types\n");
return -EINVAL; return -EINVAL;
} }
if (val & AVTAB_OP) {
printk(KERN_ERR "SELinux: avtab: entry has operations\n");
return -EINVAL;
}
for (i = 0; i < ARRAY_SIZE(spec_order); i++) { for (i = 0; i < ARRAY_SIZE(spec_order); i++) {
if (val & spec_order[i]) { if (val & spec_order[i]) {
key.specified = spec_order[i] | enabled; key.specified = spec_order[i] | enabled;
datum.u.data = le32_to_cpu(buf32[items++]); datum.data = le32_to_cpu(buf32[items++]);
rc = insertf(a, &key, &datum, p); rc = insertf(a, &key, &datum, p);
if (rc) if (rc)
return rc; return rc;
@ -444,6 +413,7 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
printk(KERN_ERR "SELinux: avtab: truncated entry\n"); printk(KERN_ERR "SELinux: avtab: truncated entry\n");
return rc; return rc;
} }
items = 0; items = 0;
key.source_type = le16_to_cpu(buf16[items++]); key.source_type = le16_to_cpu(buf16[items++]);
key.target_type = le16_to_cpu(buf16[items++]); key.target_type = le16_to_cpu(buf16[items++]);
@ -467,32 +437,14 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
return -EINVAL; return -EINVAL;
} }
if ((vers < POLICYDB_VERSION_IOCTL_OPERATIONS)
|| !(key.specified & AVTAB_OP)) {
rc = next_entry(buf32, fp, sizeof(u32)); rc = next_entry(buf32, fp, sizeof(u32));
if (rc) { if (rc) {
printk(KERN_ERR "SELinux: avtab: truncated entry\n"); printk(KERN_ERR "SELinux: avtab: truncated entry\n");
return rc; return rc;
} }
datum.u.data = le32_to_cpu(*buf32); datum.data = le32_to_cpu(*buf32);
} else {
memset(&ops, 0, sizeof(struct avtab_operation));
rc = next_entry(&ops.type, fp, sizeof(u8));
if (rc) {
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
return rc;
}
rc = next_entry(buf32, fp, sizeof(u32)*ARRAY_SIZE(ops.op.perms));
if (rc) {
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
return rc;
}
for (i = 0; i < ARRAY_SIZE(ops.op.perms); i++)
ops.op.perms[i] = le32_to_cpu(buf32[i]);
datum.u.ops = &ops;
}
if ((key.specified & AVTAB_TYPE) && if ((key.specified & AVTAB_TYPE) &&
!policydb_type_isvalid(pol, datum.u.data)) { !policydb_type_isvalid(pol, datum.data)) {
printk(KERN_ERR "SELinux: avtab: invalid type\n"); printk(KERN_ERR "SELinux: avtab: invalid type\n");
return -EINVAL; return -EINVAL;
} }
@ -552,9 +504,8 @@ bad:
int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp) int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
{ {
__le16 buf16[4]; __le16 buf16[4];
__le32 buf32[ARRAY_SIZE(cur->datum.u.ops->op.perms)]; __le32 buf32[1];
int rc; int rc;
unsigned int i;
buf16[0] = cpu_to_le16(cur->key.source_type); buf16[0] = cpu_to_le16(cur->key.source_type);
buf16[1] = cpu_to_le16(cur->key.target_type); buf16[1] = cpu_to_le16(cur->key.target_type);
@ -563,16 +514,8 @@ int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
rc = put_entry(buf16, sizeof(u16), 4, fp); rc = put_entry(buf16, sizeof(u16), 4, fp);
if (rc) if (rc)
return rc; return rc;
buf32[0] = cpu_to_le32(cur->datum.data);
if (cur->key.specified & AVTAB_OP) {
for (i = 0; i < ARRAY_SIZE(cur->datum.u.ops->op.perms); i++)
buf32[i] = cpu_to_le32(cur->datum.u.ops->op.perms[i]);
rc = put_entry(buf32, sizeof(u32),
ARRAY_SIZE(cur->datum.u.ops->op.perms), fp);
} else {
buf32[0] = cpu_to_le32(cur->datum.u.data);
rc = put_entry(buf32, sizeof(u32), 1, fp); rc = put_entry(buf32, sizeof(u32), 1, fp);
}
if (rc) if (rc)
return rc; return rc;
return 0; return 0;
@ -605,13 +548,9 @@ void avtab_cache_init(void)
avtab_node_cachep = kmem_cache_create("avtab_node", avtab_node_cachep = kmem_cache_create("avtab_node",
sizeof(struct avtab_node), sizeof(struct avtab_node),
0, SLAB_PANIC, NULL); 0, SLAB_PANIC, NULL);
avtab_operation_cachep = kmem_cache_create("avtab_operation",
sizeof(struct avtab_operation),
0, SLAB_PANIC, NULL);
} }
void avtab_cache_destroy(void) void avtab_cache_destroy(void)
{ {
kmem_cache_destroy(avtab_node_cachep); kmem_cache_destroy(avtab_node_cachep);
kmem_cache_destroy(avtab_operation_cachep);
} }

View file

@ -23,8 +23,6 @@
#ifndef _SS_AVTAB_H_ #ifndef _SS_AVTAB_H_
#define _SS_AVTAB_H_ #define _SS_AVTAB_H_
#include "security.h"
struct avtab_key { struct avtab_key {
u16 source_type; /* source type */ u16 source_type; /* source type */
u16 target_type; /* target type */ u16 target_type; /* target type */
@ -37,34 +35,13 @@ struct avtab_key {
#define AVTAB_MEMBER 0x0020 #define AVTAB_MEMBER 0x0020
#define AVTAB_CHANGE 0x0040 #define AVTAB_CHANGE 0x0040
#define AVTAB_TYPE (AVTAB_TRANSITION | AVTAB_MEMBER | AVTAB_CHANGE) #define AVTAB_TYPE (AVTAB_TRANSITION | AVTAB_MEMBER | AVTAB_CHANGE)
#define AVTAB_OPNUM_ALLOWED 0x0100
#define AVTAB_OPNUM_AUDITALLOW 0x0200
#define AVTAB_OPNUM_DONTAUDIT 0x0400
#define AVTAB_OPNUM (AVTAB_OPNUM_ALLOWED | \
AVTAB_OPNUM_AUDITALLOW | \
AVTAB_OPNUM_DONTAUDIT)
#define AVTAB_OPTYPE_ALLOWED 0x1000
#define AVTAB_OPTYPE_AUDITALLOW 0x2000
#define AVTAB_OPTYPE_DONTAUDIT 0x4000
#define AVTAB_OPTYPE (AVTAB_OPTYPE_ALLOWED | \
AVTAB_OPTYPE_AUDITALLOW | \
AVTAB_OPTYPE_DONTAUDIT)
#define AVTAB_OP (AVTAB_OPNUM | AVTAB_OPTYPE)
#define AVTAB_ENABLED_OLD 0x80000000 /* reserved for used in cond_avtab */ #define AVTAB_ENABLED_OLD 0x80000000 /* reserved for used in cond_avtab */
#define AVTAB_ENABLED 0x8000 /* reserved for used in cond_avtab */ #define AVTAB_ENABLED 0x8000 /* reserved for used in cond_avtab */
u16 specified; /* what field is specified */ u16 specified; /* what field is specified */
}; };
struct avtab_operation {
u8 type;
struct operation_perm op;
};
struct avtab_datum { struct avtab_datum {
union {
u32 data; /* access vector or type value */ u32 data; /* access vector or type value */
struct avtab_operation *ops; /* ioctl operations */
} u;
}; };
struct avtab_node { struct avtab_node {

View file

@ -15,7 +15,6 @@
#include "security.h" #include "security.h"
#include "conditional.h" #include "conditional.h"
#include "services.h"
/* /*
* cond_evaluate_expr evaluates a conditional expr * cond_evaluate_expr evaluates a conditional expr
@ -618,39 +617,21 @@ int cond_write_list(struct policydb *p, struct cond_node *list, void *fp)
return 0; return 0;
} }
void cond_compute_operation(struct avtab *ctab, struct avtab_key *key,
struct operation_decision *od)
{
struct avtab_node *node;
if (!ctab || !key || !od)
return;
for (node = avtab_search_node(ctab, key); node;
node = avtab_search_node_next(node, key->specified)) {
if (node->key.specified & AVTAB_ENABLED)
services_compute_operation_num(od, node);
}
return;
}
/* Determine whether additional permissions are granted by the conditional /* Determine whether additional permissions are granted by the conditional
* av table, and if so, add them to the result * av table, and if so, add them to the result
*/ */
void cond_compute_av(struct avtab *ctab, struct avtab_key *key, void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd)
struct av_decision *avd, struct operation *ops)
{ {
struct avtab_node *node; struct avtab_node *node;
if (!ctab || !key || !avd || !ops) if (!ctab || !key || !avd)
return; return;
for (node = avtab_search_node(ctab, key); node; for (node = avtab_search_node(ctab, key); node;
node = avtab_search_node_next(node, key->specified)) { node = avtab_search_node_next(node, key->specified)) {
if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) == if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) ==
(node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED))) (node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED)))
avd->allowed |= node->datum.u.data; avd->allowed |= node->datum.data;
if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) == if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) ==
(node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED))) (node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED)))
/* Since a '0' in an auditdeny mask represents a /* Since a '0' in an auditdeny mask represents a
@ -658,13 +639,10 @@ void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
* the '&' operand to ensure that all '0's in the mask * the '&' operand to ensure that all '0's in the mask
* are retained (much unlike the allow and auditallow cases). * are retained (much unlike the allow and auditallow cases).
*/ */
avd->auditdeny &= node->datum.u.data; avd->auditdeny &= node->datum.data;
if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) == if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) ==
(node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED))) (node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED)))
avd->auditallow |= node->datum.u.data; avd->auditallow |= node->datum.data;
if ((node->key.specified & AVTAB_ENABLED) &&
(node->key.specified & AVTAB_OP))
services_compute_operation_type(ops, node);
} }
return; return;
} }

View file

@ -73,10 +73,8 @@ int cond_read_list(struct policydb *p, void *fp);
int cond_write_bool(void *key, void *datum, void *ptr); int cond_write_bool(void *key, void *datum, void *ptr);
int cond_write_list(struct policydb *p, struct cond_node *list, void *fp); int cond_write_list(struct policydb *p, struct cond_node *list, void *fp);
void cond_compute_av(struct avtab *ctab, struct avtab_key *key, void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd);
struct av_decision *avd, struct operation *ops);
void cond_compute_operation(struct avtab *ctab, struct avtab_key *key,
struct operation_decision *od);
int evaluate_cond_node(struct policydb *p, struct cond_node *node); int evaluate_cond_node(struct policydb *p, struct cond_node *node);
#endif /* _CONDITIONAL_H_ */ #endif /* _CONDITIONAL_H_ */

View file

@ -148,11 +148,6 @@ static struct policydb_compat_info policydb_compat[] = {
.sym_num = SYM_NUM, .sym_num = SYM_NUM,
.ocon_num = OCON_NUM, .ocon_num = OCON_NUM,
}, },
{
.version = POLICYDB_VERSION_IOCTL_OPERATIONS,
.sym_num = SYM_NUM,
.ocon_num = OCON_NUM,
},
}; };
static struct policydb_compat_info *policydb_lookup_compat(int version) static struct policydb_compat_info *policydb_lookup_compat(int version)

View file

@ -94,8 +94,7 @@ static int context_struct_to_string(struct context *context, char **scontext,
static void context_struct_compute_av(struct context *scontext, static void context_struct_compute_av(struct context *scontext,
struct context *tcontext, struct context *tcontext,
u16 tclass, u16 tclass,
struct av_decision *avd, struct av_decision *avd);
struct operation *ops);
struct selinux_mapping { struct selinux_mapping {
u16 value; /* policy value */ u16 value; /* policy value */
@ -565,8 +564,7 @@ static void type_attribute_bounds_av(struct context *scontext,
context_struct_compute_av(&lo_scontext, context_struct_compute_av(&lo_scontext,
tcontext, tcontext,
tclass, tclass,
&lo_avd, &lo_avd);
NULL);
if ((lo_avd.allowed & avd->allowed) == avd->allowed) if ((lo_avd.allowed & avd->allowed) == avd->allowed)
return; /* no masked permission */ return; /* no masked permission */
masked = ~lo_avd.allowed & avd->allowed; masked = ~lo_avd.allowed & avd->allowed;
@ -581,8 +579,7 @@ static void type_attribute_bounds_av(struct context *scontext,
context_struct_compute_av(scontext, context_struct_compute_av(scontext,
&lo_tcontext, &lo_tcontext,
tclass, tclass,
&lo_avd, &lo_avd);
NULL);
if ((lo_avd.allowed & avd->allowed) == avd->allowed) if ((lo_avd.allowed & avd->allowed) == avd->allowed)
return; /* no masked permission */ return; /* no masked permission */
masked = ~lo_avd.allowed & avd->allowed; masked = ~lo_avd.allowed & avd->allowed;
@ -598,8 +595,7 @@ static void type_attribute_bounds_av(struct context *scontext,
context_struct_compute_av(&lo_scontext, context_struct_compute_av(&lo_scontext,
&lo_tcontext, &lo_tcontext,
tclass, tclass,
&lo_avd, &lo_avd);
NULL);
if ((lo_avd.allowed & avd->allowed) == avd->allowed) if ((lo_avd.allowed & avd->allowed) == avd->allowed)
return; /* no masked permission */ return; /* no masked permission */
masked = ~lo_avd.allowed & avd->allowed; masked = ~lo_avd.allowed & avd->allowed;
@ -615,39 +611,14 @@ static void type_attribute_bounds_av(struct context *scontext,
} }
} }
/* flag ioctl types that have operation permissions */
void services_compute_operation_type(
struct operation *ops,
struct avtab_node *node)
{
u8 type;
unsigned int i;
if (node->key.specified & AVTAB_OPTYPE) {
/* if allowing one or more complete types */
for (i = 0; i < ARRAY_SIZE(ops->type); i++)
ops->type[i] |= node->datum.u.ops->op.perms[i];
} else {
/* if allowing operations within a type */
type = node->datum.u.ops->type;
security_operation_set(ops->type, type);
}
/* If no ioctl commands are allowed, ignore auditallow and auditdeny */
if (node->key.specified & AVTAB_OPTYPE_ALLOWED ||
node->key.specified & AVTAB_OPNUM_ALLOWED)
ops->len = 1;
}
/* /*
* Compute access vectors and operations ranges based on a context * Compute access vectors based on a context structure pair for
* structure pair for the permissions in a particular class. * the permissions in a particular class.
*/ */
static void context_struct_compute_av(struct context *scontext, static void context_struct_compute_av(struct context *scontext,
struct context *tcontext, struct context *tcontext,
u16 tclass, u16 tclass,
struct av_decision *avd, struct av_decision *avd)
struct operation *ops)
{ {
struct constraint_node *constraint; struct constraint_node *constraint;
struct role_allow *ra; struct role_allow *ra;
@ -661,10 +632,6 @@ static void context_struct_compute_av(struct context *scontext,
avd->allowed = 0; avd->allowed = 0;
avd->auditallow = 0; avd->auditallow = 0;
avd->auditdeny = 0xffffffff; avd->auditdeny = 0xffffffff;
if (ops) {
memset(&ops->type, 0, sizeof(ops->type));
ops->len = 0;
}
if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) { if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
if (printk_ratelimit()) if (printk_ratelimit())
@ -679,7 +646,7 @@ static void context_struct_compute_av(struct context *scontext,
* this permission check, then use it. * this permission check, then use it.
*/ */
avkey.target_class = tclass; avkey.target_class = tclass;
avkey.specified = AVTAB_AV | AVTAB_OP; avkey.specified = AVTAB_AV;
sattr = flex_array_get(policydb.type_attr_map_array, scontext->type - 1); sattr = flex_array_get(policydb.type_attr_map_array, scontext->type - 1);
BUG_ON(!sattr); BUG_ON(!sattr);
tattr = flex_array_get(policydb.type_attr_map_array, tcontext->type - 1); tattr = flex_array_get(policydb.type_attr_map_array, tcontext->type - 1);
@ -692,17 +659,15 @@ static void context_struct_compute_av(struct context *scontext,
node; node;
node = avtab_search_node_next(node, avkey.specified)) { node = avtab_search_node_next(node, avkey.specified)) {
if (node->key.specified == AVTAB_ALLOWED) if (node->key.specified == AVTAB_ALLOWED)
avd->allowed |= node->datum.u.data; avd->allowed |= node->datum.data;
else if (node->key.specified == AVTAB_AUDITALLOW) else if (node->key.specified == AVTAB_AUDITALLOW)
avd->auditallow |= node->datum.u.data; avd->auditallow |= node->datum.data;
else if (node->key.specified == AVTAB_AUDITDENY) else if (node->key.specified == AVTAB_AUDITDENY)
avd->auditdeny &= node->datum.u.data; avd->auditdeny &= node->datum.data;
else if (ops && (node->key.specified & AVTAB_OP))
services_compute_operation_type(ops, node);
} }
/* Check conditional av table for additional permissions */ /* Check conditional av table for additional permissions */
cond_compute_av(&policydb.te_cond_avtab, &avkey, avd, ops); cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);
} }
} }
@ -936,139 +901,13 @@ static void avd_init(struct av_decision *avd)
avd->flags = 0; avd->flags = 0;
} }
void services_compute_operation_num(struct operation_decision *od,
struct avtab_node *node)
{
unsigned int i;
if (node->key.specified & AVTAB_OPNUM) {
if (od->type != node->datum.u.ops->type)
return;
} else {
if (!security_operation_test(node->datum.u.ops->op.perms,
od->type))
return;
}
if (node->key.specified == AVTAB_OPTYPE_ALLOWED) {
od->specified |= OPERATION_ALLOWED;
memset(od->allowed->perms, 0xff,
sizeof(od->allowed->perms));
} else if (node->key.specified == AVTAB_OPTYPE_AUDITALLOW) {
od->specified |= OPERATION_AUDITALLOW;
memset(od->auditallow->perms, 0xff,
sizeof(od->auditallow->perms));
} else if (node->key.specified == AVTAB_OPTYPE_DONTAUDIT) {
od->specified |= OPERATION_DONTAUDIT;
memset(od->dontaudit->perms, 0xff,
sizeof(od->dontaudit->perms));
} else if (node->key.specified == AVTAB_OPNUM_ALLOWED) {
od->specified |= OPERATION_ALLOWED;
for (i = 0; i < ARRAY_SIZE(od->allowed->perms); i++)
od->allowed->perms[i] |=
node->datum.u.ops->op.perms[i];
} else if (node->key.specified == AVTAB_OPNUM_AUDITALLOW) {
od->specified |= OPERATION_AUDITALLOW;
for (i = 0; i < ARRAY_SIZE(od->auditallow->perms); i++)
od->auditallow->perms[i] |=
node->datum.u.ops->op.perms[i];
} else if (node->key.specified == AVTAB_OPNUM_DONTAUDIT) {
od->specified |= OPERATION_DONTAUDIT;
for (i = 0; i < ARRAY_SIZE(od->dontaudit->perms); i++)
od->dontaudit->perms[i] |=
node->datum.u.ops->op.perms[i];
} else {
BUG();
}
}
void security_compute_operation(u32 ssid,
u32 tsid,
u16 orig_tclass,
u8 type,
struct operation_decision *od)
{
u16 tclass;
struct context *scontext, *tcontext;
struct avtab_key avkey;
struct avtab_node *node;
struct ebitmap *sattr, *tattr;
struct ebitmap_node *snode, *tnode;
unsigned int i, j;
od->type = type;
od->specified = 0;
memset(od->allowed->perms, 0, sizeof(od->allowed->perms));
memset(od->auditallow->perms, 0, sizeof(od->auditallow->perms));
memset(od->dontaudit->perms, 0, sizeof(od->dontaudit->perms));
read_lock(&policy_rwlock);
if (!ss_initialized)
goto allow;
scontext = sidtab_search(&sidtab, ssid);
if (!scontext) {
printk(KERN_ERR "SELinux: %s: unrecognized SID %d\n",
__func__, ssid);
goto out;
}
tcontext = sidtab_search(&sidtab, tsid);
if (!tcontext) {
printk(KERN_ERR "SELinux: %s: unrecognized SID %d\n",
__func__, tsid);
goto out;
}
tclass = unmap_class(orig_tclass);
if (unlikely(orig_tclass && !tclass)) {
if (policydb.allow_unknown)
goto allow;
goto out;
}
if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
if (printk_ratelimit())
printk(KERN_WARNING "SELinux: Invalid class %hu\n", tclass);
goto out;
}
avkey.target_class = tclass;
avkey.specified = AVTAB_OP;
sattr = flex_array_get(policydb.type_attr_map_array,
scontext->type - 1);
BUG_ON(!sattr);
tattr = flex_array_get(policydb.type_attr_map_array,
tcontext->type - 1);
BUG_ON(!tattr);
ebitmap_for_each_positive_bit(sattr, snode, i) {
ebitmap_for_each_positive_bit(tattr, tnode, j) {
avkey.source_type = i + 1;
avkey.target_type = j + 1;
for (node = avtab_search_node(&policydb.te_avtab, &avkey);
node;
node = avtab_search_node_next(node, avkey.specified))
services_compute_operation_num(od, node);
cond_compute_operation(&policydb.te_cond_avtab,
&avkey, od);
}
}
out:
read_unlock(&policy_rwlock);
return;
allow:
memset(od->allowed->perms, 0xff, sizeof(od->allowed->perms));
goto out;
}
/** /**
* security_compute_av - Compute access vector decisions. * security_compute_av - Compute access vector decisions.
* @ssid: source security identifier * @ssid: source security identifier
* @tsid: target security identifier * @tsid: target security identifier
* @tclass: target security class * @tclass: target security class
* @avd: access vector decisions * @avd: access vector decisions
* @od: operation decisions
* *
* Compute a set of access vector decisions based on the * Compute a set of access vector decisions based on the
* SID pair (@ssid, @tsid) for the permissions in @tclass. * SID pair (@ssid, @tsid) for the permissions in @tclass.
@ -1076,15 +915,13 @@ allow:
void security_compute_av(u32 ssid, void security_compute_av(u32 ssid,
u32 tsid, u32 tsid,
u16 orig_tclass, u16 orig_tclass,
struct av_decision *avd, struct av_decision *avd)
struct operation *ops)
{ {
u16 tclass; u16 tclass;
struct context *scontext = NULL, *tcontext = NULL; struct context *scontext = NULL, *tcontext = NULL;
read_lock(&policy_rwlock); read_lock(&policy_rwlock);
avd_init(avd); avd_init(avd);
ops->len = 0;
if (!ss_initialized) if (!ss_initialized)
goto allow; goto allow;
@ -1112,7 +949,7 @@ void security_compute_av(u32 ssid,
goto allow; goto allow;
goto out; goto out;
} }
context_struct_compute_av(scontext, tcontext, tclass, avd, ops); context_struct_compute_av(scontext, tcontext, tclass, avd);
map_decision(orig_tclass, avd, policydb.allow_unknown); map_decision(orig_tclass, avd, policydb.allow_unknown);
out: out:
read_unlock(&policy_rwlock); read_unlock(&policy_rwlock);
@ -1158,7 +995,7 @@ void security_compute_av_user(u32 ssid,
goto out; goto out;
} }
context_struct_compute_av(scontext, tcontext, tclass, avd, NULL); context_struct_compute_av(scontext, tcontext, tclass, avd);
out: out:
read_unlock(&policy_rwlock); read_unlock(&policy_rwlock);
return; return;
@ -1679,7 +1516,7 @@ static int security_compute_sid(u32 ssid,
if (avdatum) { if (avdatum) {
/* Use the type from the type transition/member/change rule. */ /* Use the type from the type transition/member/change rule. */
newcontext.type = avdatum->u.data; newcontext.type = avdatum->data;
} }
/* if we have a objname this is a file trans check so check those rules */ /* if we have a objname this is a file trans check so check those rules */

View file

@ -11,11 +11,5 @@
extern struct policydb policydb; extern struct policydb policydb;
void services_compute_operation_type(struct operation *ops,
struct avtab_node *node);
void services_compute_operation_num(struct operation_decision *od,
struct avtab_node *node);
#endif /* _SS_SERVICES_H_ */ #endif /* _SS_SERVICES_H_ */