mirror of
https://github.com/S3NEO/android_kernel_samsung_msm8226.git
synced 2024-11-07 03:47:13 +00:00
Revert "SELinux: per-command whitelisting of ioctls"
This reverts commit bc84b4adb1469e3d05ad76c304a4c545feaf1f88. Bug: 22846070 Change-Id: Ib4cb130b2225ea2e22556ff852313e0de7dddcab Signed-off-by: Jeff Vander Stoep <jeffv@google.com> Signed-off-by: Kevin F. Haggerty <haggertk@lineageos.org>
This commit is contained in:
parent
e2ed20302b
commit
be068a2dfd
11 changed files with 64 additions and 812 deletions
|
@ -22,7 +22,6 @@
|
||||||
#include <linux/init.h>
|
#include <linux/init.h>
|
||||||
#include <linux/skbuff.h>
|
#include <linux/skbuff.h>
|
||||||
#include <linux/percpu.h>
|
#include <linux/percpu.h>
|
||||||
#include <linux/list.h>
|
|
||||||
#include <net/sock.h>
|
#include <net/sock.h>
|
||||||
#include <linux/un.h>
|
#include <linux/un.h>
|
||||||
#include <net/af_unix.h>
|
#include <net/af_unix.h>
|
||||||
|
@ -49,7 +48,6 @@ struct avc_entry {
|
||||||
u32 tsid;
|
u32 tsid;
|
||||||
u16 tclass;
|
u16 tclass;
|
||||||
struct av_decision avd;
|
struct av_decision avd;
|
||||||
struct avc_operation_node *ops_node;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct avc_node {
|
struct avc_node {
|
||||||
|
@ -58,16 +56,6 @@ struct avc_node {
|
||||||
struct rcu_head rhead;
|
struct rcu_head rhead;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct avc_operation_decision_node {
|
|
||||||
struct operation_decision od;
|
|
||||||
struct list_head od_list;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct avc_operation_node {
|
|
||||||
struct operation ops;
|
|
||||||
struct list_head od_head; /* list of operation_decision_node */
|
|
||||||
};
|
|
||||||
|
|
||||||
struct avc_cache {
|
struct avc_cache {
|
||||||
struct hlist_head slots[AVC_CACHE_SLOTS]; /* head for avc_node->list */
|
struct hlist_head slots[AVC_CACHE_SLOTS]; /* head for avc_node->list */
|
||||||
spinlock_t slots_lock[AVC_CACHE_SLOTS]; /* lock for writes */
|
spinlock_t slots_lock[AVC_CACHE_SLOTS]; /* lock for writes */
|
||||||
|
@ -98,9 +86,6 @@ DEFINE_PER_CPU(struct avc_cache_stats, avc_cache_stats) = { 0 };
|
||||||
static struct avc_cache avc_cache;
|
static struct avc_cache avc_cache;
|
||||||
static struct avc_callback_node *avc_callbacks;
|
static struct avc_callback_node *avc_callbacks;
|
||||||
static struct kmem_cache *avc_node_cachep;
|
static struct kmem_cache *avc_node_cachep;
|
||||||
static struct kmem_cache *avc_operation_decision_node_cachep;
|
|
||||||
static struct kmem_cache *avc_operation_node_cachep;
|
|
||||||
static struct kmem_cache *avc_operation_perm_cachep;
|
|
||||||
|
|
||||||
static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass)
|
static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass)
|
||||||
{
|
{
|
||||||
|
@ -192,16 +177,6 @@ void __init avc_init(void)
|
||||||
|
|
||||||
avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
|
avc_node_cachep = kmem_cache_create("avc_node", sizeof(struct avc_node),
|
||||||
0, SLAB_PANIC, NULL);
|
0, SLAB_PANIC, NULL);
|
||||||
avc_operation_node_cachep = kmem_cache_create("avc_operation_node",
|
|
||||||
sizeof(struct avc_operation_node),
|
|
||||||
0, SLAB_PANIC, NULL);
|
|
||||||
avc_operation_decision_node_cachep = kmem_cache_create(
|
|
||||||
"avc_operation_decision_node",
|
|
||||||
sizeof(struct avc_operation_decision_node),
|
|
||||||
0, SLAB_PANIC, NULL);
|
|
||||||
avc_operation_perm_cachep = kmem_cache_create("avc_operation_perm",
|
|
||||||
sizeof(struct operation_perm),
|
|
||||||
0, SLAB_PANIC, NULL);
|
|
||||||
|
|
||||||
audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n");
|
audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n");
|
||||||
}
|
}
|
||||||
|
@ -238,253 +213,9 @@ int avc_get_hash_stats(char *page)
|
||||||
slots_used, AVC_CACHE_SLOTS, max_chain_len);
|
slots_used, AVC_CACHE_SLOTS, max_chain_len);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* using a linked list for operation_decision lookup because the list is
|
|
||||||
* always small. i.e. less than 5, typically 1
|
|
||||||
*/
|
|
||||||
static struct operation_decision *avc_operation_lookup(u8 type,
|
|
||||||
struct avc_operation_node *ops_node)
|
|
||||||
{
|
|
||||||
struct avc_operation_decision_node *od_node;
|
|
||||||
struct operation_decision *od = NULL;
|
|
||||||
|
|
||||||
list_for_each_entry(od_node, &ops_node->od_head, od_list) {
|
|
||||||
if (od_node->od.type != type)
|
|
||||||
continue;
|
|
||||||
od = &od_node->od;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
return od;
|
|
||||||
}
|
|
||||||
|
|
||||||
static inline unsigned int avc_operation_has_perm(struct operation_decision *od,
|
|
||||||
u16 cmd, u8 specified)
|
|
||||||
{
|
|
||||||
unsigned int rc = 0;
|
|
||||||
u8 num = cmd & 0xff;
|
|
||||||
|
|
||||||
if ((specified == OPERATION_ALLOWED) &&
|
|
||||||
(od->specified & OPERATION_ALLOWED))
|
|
||||||
rc = security_operation_test(od->allowed->perms, num);
|
|
||||||
else if ((specified == OPERATION_AUDITALLOW) &&
|
|
||||||
(od->specified & OPERATION_AUDITALLOW))
|
|
||||||
rc = security_operation_test(od->auditallow->perms, num);
|
|
||||||
else if ((specified == OPERATION_DONTAUDIT) &&
|
|
||||||
(od->specified & OPERATION_DONTAUDIT))
|
|
||||||
rc = security_operation_test(od->dontaudit->perms, num);
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void avc_operation_allow_perm(struct avc_operation_node *node, u16 cmd)
|
|
||||||
{
|
|
||||||
struct operation_decision *od;
|
|
||||||
u8 type;
|
|
||||||
u8 num;
|
|
||||||
|
|
||||||
type = cmd >> 8;
|
|
||||||
num = cmd & 0xff;
|
|
||||||
security_operation_set(node->ops.type, type);
|
|
||||||
od = avc_operation_lookup(type, node);
|
|
||||||
if (od && od->allowed)
|
|
||||||
security_operation_set(od->allowed->perms, num);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void avc_operation_decision_free(
|
|
||||||
struct avc_operation_decision_node *od_node)
|
|
||||||
{
|
|
||||||
struct operation_decision *od;
|
|
||||||
|
|
||||||
od = &od_node->od;
|
|
||||||
if (od->allowed)
|
|
||||||
kmem_cache_free(avc_operation_perm_cachep, od->allowed);
|
|
||||||
if (od->auditallow)
|
|
||||||
kmem_cache_free(avc_operation_perm_cachep, od->auditallow);
|
|
||||||
if (od->dontaudit)
|
|
||||||
kmem_cache_free(avc_operation_perm_cachep, od->dontaudit);
|
|
||||||
kmem_cache_free(avc_operation_decision_node_cachep, od_node);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void avc_operation_free(struct avc_operation_node *ops_node)
|
|
||||||
{
|
|
||||||
struct avc_operation_decision_node *od_node;
|
|
||||||
|
|
||||||
if (!ops_node)
|
|
||||||
return;
|
|
||||||
|
|
||||||
list_for_each_entry(od_node, &ops_node->od_head, od_list)
|
|
||||||
avc_operation_decision_free(od_node);
|
|
||||||
kmem_cache_free(avc_operation_node_cachep, ops_node);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void avc_copy_operation_decision(struct operation_decision *dest,
|
|
||||||
struct operation_decision *src)
|
|
||||||
{
|
|
||||||
dest->type = src->type;
|
|
||||||
dest->specified = src->specified;
|
|
||||||
if (dest->specified & OPERATION_ALLOWED)
|
|
||||||
memcpy(dest->allowed->perms, src->allowed->perms,
|
|
||||||
sizeof(src->allowed->perms));
|
|
||||||
if (dest->specified & OPERATION_AUDITALLOW)
|
|
||||||
memcpy(dest->auditallow->perms, src->auditallow->perms,
|
|
||||||
sizeof(src->auditallow->perms));
|
|
||||||
if (dest->specified & OPERATION_DONTAUDIT)
|
|
||||||
memcpy(dest->dontaudit->perms, src->dontaudit->perms,
|
|
||||||
sizeof(src->dontaudit->perms));
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* similar to avc_copy_operation_decision, but only copy decision
|
|
||||||
* information relevant to this command
|
|
||||||
*/
|
|
||||||
static inline void avc_quick_copy_operation_decision(u16 cmd,
|
|
||||||
struct operation_decision *dest,
|
|
||||||
struct operation_decision *src)
|
|
||||||
{
|
|
||||||
/*
|
|
||||||
* compute index of the u32 of the 256 bits (8 u32s) that contain this
|
|
||||||
* command permission
|
|
||||||
*/
|
|
||||||
u8 i = (0xff & cmd) >> 5;
|
|
||||||
|
|
||||||
dest->specified = src->specified;
|
|
||||||
if (dest->specified & OPERATION_ALLOWED)
|
|
||||||
dest->allowed->perms[i] = src->allowed->perms[i];
|
|
||||||
if (dest->specified & OPERATION_AUDITALLOW)
|
|
||||||
dest->auditallow->perms[i] = src->auditallow->perms[i];
|
|
||||||
if (dest->specified & OPERATION_DONTAUDIT)
|
|
||||||
dest->dontaudit->perms[i] = src->dontaudit->perms[i];
|
|
||||||
}
|
|
||||||
|
|
||||||
static struct avc_operation_decision_node
|
|
||||||
*avc_operation_decision_alloc(u8 specified)
|
|
||||||
{
|
|
||||||
struct avc_operation_decision_node *node;
|
|
||||||
struct operation_decision *od;
|
|
||||||
|
|
||||||
node = kmem_cache_zalloc(avc_operation_decision_node_cachep,
|
|
||||||
GFP_ATOMIC | __GFP_NOMEMALLOC);
|
|
||||||
if (!node)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
od = &node->od;
|
|
||||||
if (specified & OPERATION_ALLOWED) {
|
|
||||||
od->allowed = kmem_cache_zalloc(avc_operation_perm_cachep,
|
|
||||||
GFP_ATOMIC | __GFP_NOMEMALLOC);
|
|
||||||
if (!od->allowed)
|
|
||||||
goto error;
|
|
||||||
}
|
|
||||||
if (specified & OPERATION_AUDITALLOW) {
|
|
||||||
od->auditallow = kmem_cache_zalloc(avc_operation_perm_cachep,
|
|
||||||
GFP_ATOMIC | __GFP_NOMEMALLOC);
|
|
||||||
if (!od->auditallow)
|
|
||||||
goto error;
|
|
||||||
}
|
|
||||||
if (specified & OPERATION_DONTAUDIT) {
|
|
||||||
od->dontaudit = kmem_cache_zalloc(avc_operation_perm_cachep,
|
|
||||||
GFP_ATOMIC | __GFP_NOMEMALLOC);
|
|
||||||
if (!od->dontaudit)
|
|
||||||
goto error;
|
|
||||||
}
|
|
||||||
return node;
|
|
||||||
error:
|
|
||||||
avc_operation_decision_free(node);
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int avc_add_operation(struct avc_node *node,
|
|
||||||
struct operation_decision *od)
|
|
||||||
{
|
|
||||||
struct avc_operation_decision_node *dest_od;
|
|
||||||
|
|
||||||
node->ae.ops_node->ops.len++;
|
|
||||||
dest_od = avc_operation_decision_alloc(od->specified);
|
|
||||||
if (!dest_od)
|
|
||||||
return -ENOMEM;
|
|
||||||
avc_copy_operation_decision(&dest_od->od, od);
|
|
||||||
list_add(&dest_od->od_list, &node->ae.ops_node->od_head);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
static struct avc_operation_node *avc_operation_alloc(void)
|
|
||||||
{
|
|
||||||
struct avc_operation_node *ops;
|
|
||||||
|
|
||||||
ops = kmem_cache_zalloc(avc_operation_node_cachep,
|
|
||||||
GFP_ATOMIC|__GFP_NOMEMALLOC);
|
|
||||||
if (!ops)
|
|
||||||
return ops;
|
|
||||||
INIT_LIST_HEAD(&ops->od_head);
|
|
||||||
return ops;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int avc_operation_populate(struct avc_node *node,
|
|
||||||
struct avc_operation_node *src)
|
|
||||||
{
|
|
||||||
struct avc_operation_node *dest;
|
|
||||||
struct avc_operation_decision_node *dest_od;
|
|
||||||
struct avc_operation_decision_node *src_od;
|
|
||||||
|
|
||||||
if (src->ops.len == 0)
|
|
||||||
return 0;
|
|
||||||
dest = avc_operation_alloc();
|
|
||||||
if (!dest)
|
|
||||||
return -ENOMEM;
|
|
||||||
|
|
||||||
memcpy(dest->ops.type, &src->ops.type, sizeof(dest->ops.type));
|
|
||||||
dest->ops.len = src->ops.len;
|
|
||||||
|
|
||||||
/* for each source od allocate a destination od and copy */
|
|
||||||
list_for_each_entry(src_od, &src->od_head, od_list) {
|
|
||||||
dest_od = avc_operation_decision_alloc(src_od->od.specified);
|
|
||||||
if (!dest_od)
|
|
||||||
goto error;
|
|
||||||
avc_copy_operation_decision(&dest_od->od, &src_od->od);
|
|
||||||
list_add(&dest_od->od_list, &dest->od_head);
|
|
||||||
}
|
|
||||||
node->ae.ops_node = dest;
|
|
||||||
return 0;
|
|
||||||
error:
|
|
||||||
avc_operation_free(dest);
|
|
||||||
return -ENOMEM;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
static inline u32 avc_operation_audit_required(u32 requested,
|
|
||||||
struct av_decision *avd,
|
|
||||||
struct operation_decision *od,
|
|
||||||
u16 cmd,
|
|
||||||
int result,
|
|
||||||
u32 *deniedp)
|
|
||||||
{
|
|
||||||
u32 denied, audited;
|
|
||||||
|
|
||||||
denied = requested & ~avd->allowed;
|
|
||||||
if (unlikely(denied)) {
|
|
||||||
audited = denied & avd->auditdeny;
|
|
||||||
if (audited && od) {
|
|
||||||
if (avc_operation_has_perm(od, cmd,
|
|
||||||
OPERATION_DONTAUDIT))
|
|
||||||
audited &= ~requested;
|
|
||||||
}
|
|
||||||
} else if (result) {
|
|
||||||
audited = denied = requested;
|
|
||||||
} else {
|
|
||||||
audited = requested & avd->auditallow;
|
|
||||||
if (audited && od) {
|
|
||||||
if (!avc_operation_has_perm(od, cmd,
|
|
||||||
OPERATION_AUDITALLOW))
|
|
||||||
audited &= ~requested;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
*deniedp = denied;
|
|
||||||
return audited;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void avc_node_free(struct rcu_head *rhead)
|
static void avc_node_free(struct rcu_head *rhead)
|
||||||
{
|
{
|
||||||
struct avc_node *node = container_of(rhead, struct avc_node, rhead);
|
struct avc_node *node = container_of(rhead, struct avc_node, rhead);
|
||||||
avc_operation_free(node->ae.ops_node);
|
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
kmem_cache_free(avc_node_cachep, node);
|
||||||
avc_cache_stats_incr(frees);
|
avc_cache_stats_incr(frees);
|
||||||
}
|
}
|
||||||
|
@ -498,7 +229,6 @@ static void avc_node_delete(struct avc_node *node)
|
||||||
|
|
||||||
static void avc_node_kill(struct avc_node *node)
|
static void avc_node_kill(struct avc_node *node)
|
||||||
{
|
{
|
||||||
avc_operation_free(node->ae.ops_node);
|
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
kmem_cache_free(avc_node_cachep, node);
|
||||||
avc_cache_stats_incr(frees);
|
avc_cache_stats_incr(frees);
|
||||||
atomic_dec(&avc_cache.active_nodes);
|
atomic_dec(&avc_cache.active_nodes);
|
||||||
|
@ -647,7 +377,6 @@ static int avc_latest_notif_update(int seqno, int is_insert)
|
||||||
* @tsid: target security identifier
|
* @tsid: target security identifier
|
||||||
* @tclass: target security class
|
* @tclass: target security class
|
||||||
* @avd: resulting av decision
|
* @avd: resulting av decision
|
||||||
* @ops: resulting operation decisions
|
|
||||||
*
|
*
|
||||||
* Insert an AVC entry for the SID pair
|
* Insert an AVC entry for the SID pair
|
||||||
* (@ssid, @tsid) and class @tclass.
|
* (@ssid, @tsid) and class @tclass.
|
||||||
|
@ -659,9 +388,7 @@ static int avc_latest_notif_update(int seqno, int is_insert)
|
||||||
* the access vectors into a cache entry, returns
|
* the access vectors into a cache entry, returns
|
||||||
* avc_node inserted. Otherwise, this function returns NULL.
|
* avc_node inserted. Otherwise, this function returns NULL.
|
||||||
*/
|
*/
|
||||||
static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
|
static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd)
|
||||||
struct av_decision *avd,
|
|
||||||
struct avc_operation_node *ops_node)
|
|
||||||
{
|
{
|
||||||
struct avc_node *pos, *node = NULL;
|
struct avc_node *pos, *node = NULL;
|
||||||
int hvalue;
|
int hvalue;
|
||||||
|
@ -675,15 +402,10 @@ static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass,
|
||||||
struct hlist_head *head;
|
struct hlist_head *head;
|
||||||
struct hlist_node *next;
|
struct hlist_node *next;
|
||||||
spinlock_t *lock;
|
spinlock_t *lock;
|
||||||
int rc = 0;
|
|
||||||
|
|
||||||
hvalue = avc_hash(ssid, tsid, tclass);
|
hvalue = avc_hash(ssid, tsid, tclass);
|
||||||
avc_node_populate(node, ssid, tsid, tclass, avd);
|
avc_node_populate(node, ssid, tsid, tclass, avd);
|
||||||
rc = avc_operation_populate(node, ops_node);
|
|
||||||
if (rc) {
|
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
head = &avc_cache.slots[hvalue];
|
head = &avc_cache.slots[hvalue];
|
||||||
lock = &avc_cache.slots_lock[hvalue];
|
lock = &avc_cache.slots_lock[hvalue];
|
||||||
|
|
||||||
|
@ -779,21 +501,6 @@ static noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline int avc_operation_audit(u32 ssid, u32 tsid, u16 tclass,
|
|
||||||
u32 requested, struct av_decision *avd,
|
|
||||||
struct operation_decision *od,
|
|
||||||
u16 cmd, int result,
|
|
||||||
struct common_audit_data *ad)
|
|
||||||
{
|
|
||||||
u32 audited, denied;
|
|
||||||
audited = avc_operation_audit_required(
|
|
||||||
requested, avd, od, cmd, result, &denied);
|
|
||||||
if (likely(!audited))
|
|
||||||
return 0;
|
|
||||||
return slow_avc_audit(ssid, tsid, tclass, requested,
|
|
||||||
audited, denied, result, ad, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* avc_audit - Audit the granting or denial of permissions.
|
* avc_audit - Audit the granting or denial of permissions.
|
||||||
* @ssid: source security identifier
|
* @ssid: source security identifier
|
||||||
|
@ -907,17 +614,14 @@ static inline int avc_sidcmp(u32 x, u32 y)
|
||||||
* @perms : Permission mask bits
|
* @perms : Permission mask bits
|
||||||
* @ssid,@tsid,@tclass : identifier of an AVC entry
|
* @ssid,@tsid,@tclass : identifier of an AVC entry
|
||||||
* @seqno : sequence number when decision was made
|
* @seqno : sequence number when decision was made
|
||||||
* @od: operation_decision to be added to the node
|
|
||||||
*
|
*
|
||||||
* if a valid AVC entry doesn't exist,this function returns -ENOENT.
|
* if a valid AVC entry doesn't exist,this function returns -ENOENT.
|
||||||
* if kmalloc() called internal returns NULL, this function returns -ENOMEM.
|
* if kmalloc() called internal returns NULL, this function returns -ENOMEM.
|
||||||
* otherwise, this function updates the AVC entry. The original AVC-entry object
|
* otherwise, this function updates the AVC entry. The original AVC-entry object
|
||||||
* will release later by RCU.
|
* will release later by RCU.
|
||||||
*/
|
*/
|
||||||
static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid,
|
static int avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass,
|
||||||
u16 tclass, u32 seqno,
|
u32 seqno)
|
||||||
struct operation_decision *od,
|
|
||||||
u32 flags)
|
|
||||||
{
|
{
|
||||||
int hvalue, rc = 0;
|
int hvalue, rc = 0;
|
||||||
unsigned long flag;
|
unsigned long flag;
|
||||||
|
@ -962,19 +666,9 @@ static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid,
|
||||||
|
|
||||||
avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
|
avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
|
||||||
|
|
||||||
if (orig->ae.ops_node) {
|
|
||||||
rc = avc_operation_populate(node, orig->ae.ops_node);
|
|
||||||
if (rc) {
|
|
||||||
kmem_cache_free(avc_node_cachep, node);
|
|
||||||
goto out_unlock;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (event) {
|
switch (event) {
|
||||||
case AVC_CALLBACK_GRANT:
|
case AVC_CALLBACK_GRANT:
|
||||||
node->ae.avd.allowed |= perms;
|
node->ae.avd.allowed |= perms;
|
||||||
if (node->ae.ops_node && (flags & AVC_OPERATION_CMD))
|
|
||||||
avc_operation_allow_perm(node->ae.ops_node, cmd);
|
|
||||||
break;
|
break;
|
||||||
case AVC_CALLBACK_TRY_REVOKE:
|
case AVC_CALLBACK_TRY_REVOKE:
|
||||||
case AVC_CALLBACK_REVOKE:
|
case AVC_CALLBACK_REVOKE:
|
||||||
|
@ -992,9 +686,6 @@ static int avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid,
|
||||||
case AVC_CALLBACK_AUDITDENY_DISABLE:
|
case AVC_CALLBACK_AUDITDENY_DISABLE:
|
||||||
node->ae.avd.auditdeny &= ~perms;
|
node->ae.avd.auditdeny &= ~perms;
|
||||||
break;
|
break;
|
||||||
case AVC_CALLBACK_ADD_OPERATION:
|
|
||||||
avc_add_operation(node, od);
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
avc_node_replace(node, orig);
|
avc_node_replace(node, orig);
|
||||||
out_unlock:
|
out_unlock:
|
||||||
|
@ -1068,19 +759,17 @@ int avc_ss_reset(u32 seqno)
|
||||||
* results in a bigger stack frame.
|
* results in a bigger stack frame.
|
||||||
*/
|
*/
|
||||||
static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid,
|
static noinline struct avc_node *avc_compute_av(u32 ssid, u32 tsid,
|
||||||
u16 tclass, struct av_decision *avd,
|
u16 tclass, struct av_decision *avd)
|
||||||
struct avc_operation_node *ops_node)
|
|
||||||
{
|
{
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
INIT_LIST_HEAD(&ops_node->od_head);
|
security_compute_av(ssid, tsid, tclass, avd);
|
||||||
security_compute_av(ssid, tsid, tclass, avd, &ops_node->ops);
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
return avc_insert(ssid, tsid, tclass, avd, ops_node);
|
return avc_insert(ssid, tsid, tclass, avd);
|
||||||
}
|
}
|
||||||
|
|
||||||
static noinline int avc_denied(u32 ssid, u32 tsid,
|
static noinline int avc_denied(u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
u16 cmd, unsigned flags,
|
unsigned flags,
|
||||||
struct av_decision *avd)
|
struct av_decision *avd)
|
||||||
{
|
{
|
||||||
if (flags & AVC_STRICT)
|
if (flags & AVC_STRICT)
|
||||||
|
@ -1092,92 +781,11 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
|
||||||
#endif
|
#endif
|
||||||
return -EACCES;
|
return -EACCES;
|
||||||
|
|
||||||
avc_update_node(AVC_CALLBACK_GRANT, requested, cmd, ssid,
|
avc_update_node(AVC_CALLBACK_GRANT, requested, ssid,
|
||||||
tsid, tclass, avd->seqno, NULL, flags);
|
tsid, tclass, avd->seqno);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* ioctl commands are comprised of four fields, direction, size, type, and
|
|
||||||
* number. The avc operation logic filters based on two of them:
|
|
||||||
*
|
|
||||||
* type: or code, typically unique to each driver
|
|
||||||
* number: or function
|
|
||||||
*
|
|
||||||
* For example, 0x89 is a socket type, and number 0x27 is the get hardware
|
|
||||||
* address function.
|
|
||||||
*/
|
|
||||||
int avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
|
||||||
u16 cmd, struct common_audit_data *ad)
|
|
||||||
{
|
|
||||||
struct avc_node *node;
|
|
||||||
struct av_decision avd;
|
|
||||||
u32 denied;
|
|
||||||
struct operation_decision *od = NULL;
|
|
||||||
struct operation_decision od_local;
|
|
||||||
struct operation_perm allowed;
|
|
||||||
struct operation_perm auditallow;
|
|
||||||
struct operation_perm dontaudit;
|
|
||||||
struct avc_operation_node local_ops_node;
|
|
||||||
struct avc_operation_node *ops_node;
|
|
||||||
u8 type = cmd >> 8;
|
|
||||||
int rc = 0, rc2;
|
|
||||||
|
|
||||||
ops_node = &local_ops_node;
|
|
||||||
BUG_ON(!requested);
|
|
||||||
|
|
||||||
rcu_read_lock();
|
|
||||||
|
|
||||||
node = avc_lookup(ssid, tsid, tclass);
|
|
||||||
if (unlikely(!node)) {
|
|
||||||
node = avc_compute_av(ssid, tsid, tclass, &avd, ops_node);
|
|
||||||
} else {
|
|
||||||
memcpy(&avd, &node->ae.avd, sizeof(avd));
|
|
||||||
ops_node = node->ae.ops_node;
|
|
||||||
}
|
|
||||||
/* if operations are not defined, only consider av_decision */
|
|
||||||
if (!ops_node || !ops_node->ops.len)
|
|
||||||
goto decision;
|
|
||||||
|
|
||||||
od_local.allowed = &allowed;
|
|
||||||
od_local.auditallow = &auditallow;
|
|
||||||
od_local.dontaudit = &dontaudit;
|
|
||||||
|
|
||||||
/* lookup operation decision */
|
|
||||||
od = avc_operation_lookup(type, ops_node);
|
|
||||||
if (unlikely(!od)) {
|
|
||||||
/* Compute operation decision if type is flagged */
|
|
||||||
if (!security_operation_test(ops_node->ops.type, type)) {
|
|
||||||
avd.allowed &= ~requested;
|
|
||||||
goto decision;
|
|
||||||
}
|
|
||||||
rcu_read_unlock();
|
|
||||||
security_compute_operation(ssid, tsid, tclass, type, &od_local);
|
|
||||||
rcu_read_lock();
|
|
||||||
avc_update_node(AVC_CALLBACK_ADD_OPERATION, requested, cmd,
|
|
||||||
ssid, tsid, tclass, avd.seqno, &od_local, 0);
|
|
||||||
} else {
|
|
||||||
avc_quick_copy_operation_decision(cmd, &od_local, od);
|
|
||||||
}
|
|
||||||
od = &od_local;
|
|
||||||
|
|
||||||
if (!avc_operation_has_perm(od, cmd, OPERATION_ALLOWED))
|
|
||||||
avd.allowed &= ~requested;
|
|
||||||
|
|
||||||
decision:
|
|
||||||
denied = requested & ~(avd.allowed);
|
|
||||||
if (unlikely(denied))
|
|
||||||
rc = avc_denied(ssid, tsid, tclass, requested, cmd,
|
|
||||||
AVC_OPERATION_CMD, &avd);
|
|
||||||
|
|
||||||
rcu_read_unlock();
|
|
||||||
|
|
||||||
rc2 = avc_operation_audit(ssid, tsid, tclass, requested,
|
|
||||||
&avd, od, cmd, rc, ad);
|
|
||||||
if (rc2)
|
|
||||||
return rc2;
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* avc_has_perm_noaudit - Check permissions but perform no auditing.
|
* avc_has_perm_noaudit - Check permissions but perform no auditing.
|
||||||
|
@ -1205,7 +813,6 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
||||||
struct av_decision *avd)
|
struct av_decision *avd)
|
||||||
{
|
{
|
||||||
struct avc_node *node;
|
struct avc_node *node;
|
||||||
struct avc_operation_node ops_node;
|
|
||||||
int rc = 0;
|
int rc = 0;
|
||||||
u32 denied;
|
u32 denied;
|
||||||
|
|
||||||
|
@ -1214,14 +821,16 @@ inline int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
|
|
||||||
node = avc_lookup(ssid, tsid, tclass);
|
node = avc_lookup(ssid, tsid, tclass);
|
||||||
if (unlikely(!node))
|
if (unlikely(!node)) {
|
||||||
node = avc_compute_av(ssid, tsid, tclass, avd, &ops_node);
|
node = avc_compute_av(ssid, tsid, tclass, avd);
|
||||||
else
|
} else {
|
||||||
memcpy(avd, &node->ae.avd, sizeof(*avd));
|
memcpy(avd, &node->ae.avd, sizeof(*avd));
|
||||||
|
avd = &node->ae.avd;
|
||||||
|
}
|
||||||
|
|
||||||
denied = requested & ~(avd->allowed);
|
denied = requested & ~(avd->allowed);
|
||||||
if (unlikely(denied))
|
if (unlikely(denied))
|
||||||
rc = avc_denied(ssid, tsid, tclass, requested, 0, flags, avd);
|
rc = avc_denied(ssid, tsid, tclass, requested, flags, avd);
|
||||||
|
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
return rc;
|
return rc;
|
||||||
|
|
|
@ -3145,46 +3145,6 @@ static void selinux_file_free_security(struct file *file)
|
||||||
file_free_security(file);
|
file_free_security(file);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* Check whether a task has the ioctl permission and cmd
|
|
||||||
* operation to an inode.
|
|
||||||
*/
|
|
||||||
int ioctl_has_perm(const struct cred *cred, struct file *file,
|
|
||||||
u32 requested, u16 cmd)
|
|
||||||
{
|
|
||||||
struct common_audit_data ad;
|
|
||||||
struct file_security_struct *fsec = file->f_security;
|
|
||||||
struct inode *inode = file->f_path.dentry->d_inode;
|
|
||||||
struct inode_security_struct *isec = inode->i_security;
|
|
||||||
struct lsm_ioctlop_audit ioctl;
|
|
||||||
u32 ssid = cred_sid(cred);
|
|
||||||
struct selinux_audit_data sad = {0,};
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
COMMON_AUDIT_DATA_INIT(&ad, IOCTL_OP);
|
|
||||||
ad.u.op = &ioctl;
|
|
||||||
ad.u.op->cmd = cmd;
|
|
||||||
ad.u.op->path = file->f_path;
|
|
||||||
ad.selinux_audit_data = &sad;
|
|
||||||
|
|
||||||
if (ssid != fsec->sid) {
|
|
||||||
rc = avc_has_perm(ssid, fsec->sid,
|
|
||||||
SECCLASS_FD,
|
|
||||||
FD__USE,
|
|
||||||
&ad);
|
|
||||||
if (rc)
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (unlikely(IS_PRIVATE(inode)))
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
rc = avc_has_operation(ssid, isec->sid, isec->sclass,
|
|
||||||
requested, cmd, &ad);
|
|
||||||
out:
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int selinux_file_ioctl(struct file *file, unsigned int cmd,
|
static int selinux_file_ioctl(struct file *file, unsigned int cmd,
|
||||||
unsigned long arg)
|
unsigned long arg)
|
||||||
{
|
{
|
||||||
|
@ -3227,7 +3187,7 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
|
||||||
* to the file's ioctl() function.
|
* to the file's ioctl() function.
|
||||||
*/
|
*/
|
||||||
default:
|
default:
|
||||||
error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd);
|
error = file_has_perm(cred, file, FILE__IOCTL);
|
||||||
}
|
}
|
||||||
return error;
|
return error;
|
||||||
}
|
}
|
||||||
|
|
|
@ -84,15 +84,11 @@ int avc_audit(u32 ssid, u32 tsid,
|
||||||
struct common_audit_data *a, unsigned flags);
|
struct common_audit_data *a, unsigned flags);
|
||||||
|
|
||||||
#define AVC_STRICT 1 /* Ignore permissive mode. */
|
#define AVC_STRICT 1 /* Ignore permissive mode. */
|
||||||
#define AVC_OPERATION_CMD 2 /* ignore command when updating operations */
|
|
||||||
int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
int avc_has_perm_noaudit(u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
unsigned flags,
|
unsigned flags,
|
||||||
struct av_decision *avd);
|
struct av_decision *avd);
|
||||||
|
|
||||||
int avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
|
||||||
u16 cmd, struct common_audit_data *ad);
|
|
||||||
|
|
||||||
int avc_has_perm_flags(u32 ssid, u32 tsid,
|
int avc_has_perm_flags(u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 requested,
|
u16 tclass, u32 requested,
|
||||||
struct common_audit_data *auditdata,
|
struct common_audit_data *auditdata,
|
||||||
|
@ -115,7 +111,6 @@ u32 avc_policy_seqno(void);
|
||||||
#define AVC_CALLBACK_AUDITALLOW_DISABLE 32
|
#define AVC_CALLBACK_AUDITALLOW_DISABLE 32
|
||||||
#define AVC_CALLBACK_AUDITDENY_ENABLE 64
|
#define AVC_CALLBACK_AUDITDENY_ENABLE 64
|
||||||
#define AVC_CALLBACK_AUDITDENY_DISABLE 128
|
#define AVC_CALLBACK_AUDITDENY_DISABLE 128
|
||||||
#define AVC_CALLBACK_ADD_OPERATION 256
|
|
||||||
|
|
||||||
int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid,
|
int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid,
|
||||||
u16 tclass, u32 perms,
|
u16 tclass, u32 perms,
|
||||||
|
|
|
@ -34,14 +34,13 @@
|
||||||
#define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS 27
|
#define POLICYDB_VERSION_NEW_OBJECT_DEFAULTS 27
|
||||||
#define POLICYDB_VERSION_DEFAULT_TYPE 28
|
#define POLICYDB_VERSION_DEFAULT_TYPE 28
|
||||||
#define POLICYDB_VERSION_CONSTRAINT_NAMES 29
|
#define POLICYDB_VERSION_CONSTRAINT_NAMES 29
|
||||||
#define POLICYDB_VERSION_IOCTL_OPERATIONS 30
|
|
||||||
|
|
||||||
/* Range of policy versions we understand*/
|
/* Range of policy versions we understand*/
|
||||||
#define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE
|
#define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE
|
||||||
#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
|
#ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX
|
||||||
#define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
|
#define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE
|
||||||
#else
|
#else
|
||||||
#define POLICYDB_VERSION_MAX POLICYDB_VERSION_IOCTL_OPERATIONS
|
#define POLICYDB_VERSION_MAX POLICYDB_VERSION_CONSTRAINT_NAMES
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* Mask for just the mount related flags */
|
/* Mask for just the mount related flags */
|
||||||
|
@ -104,31 +103,6 @@ struct av_decision {
|
||||||
u32 flags;
|
u32 flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
#define security_operation_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f))
|
|
||||||
#define security_operation_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f)))
|
|
||||||
|
|
||||||
struct operation_perm {
|
|
||||||
u32 perms[8];
|
|
||||||
};
|
|
||||||
|
|
||||||
struct operation_decision {
|
|
||||||
u8 type;
|
|
||||||
u8 specified;
|
|
||||||
struct operation_perm *allowed;
|
|
||||||
struct operation_perm *auditallow;
|
|
||||||
struct operation_perm *dontaudit;
|
|
||||||
};
|
|
||||||
|
|
||||||
#define OPERATION_ALLOWED 1
|
|
||||||
#define OPERATION_AUDITALLOW 2
|
|
||||||
#define OPERATION_DONTAUDIT 4
|
|
||||||
#define OPERATION_ALL (OPERATION_ALLOWED | OPERATION_AUDITALLOW |\
|
|
||||||
OPERATION_DONTAUDIT)
|
|
||||||
struct operation {
|
|
||||||
u16 len; /* length of operation decision chain */
|
|
||||||
u32 type[8]; /* 256 types */
|
|
||||||
};
|
|
||||||
|
|
||||||
/* definitions of av_decision.flags */
|
/* definitions of av_decision.flags */
|
||||||
// START_SEC_SELINUX_PORTING_COMMON
|
// START_SEC_SELINUX_PORTING_COMMON
|
||||||
#ifdef CONFIG_ALWAYS_ENFORCE
|
#ifdef CONFIG_ALWAYS_ENFORCE
|
||||||
|
@ -139,11 +113,7 @@ struct operation {
|
||||||
// END_SEC_SELINUX_PORTING_COMMON
|
// END_SEC_SELINUX_PORTING_COMMON
|
||||||
|
|
||||||
void security_compute_av(u32 ssid, u32 tsid,
|
void security_compute_av(u32 ssid, u32 tsid,
|
||||||
u16 tclass, struct av_decision *avd,
|
u16 tclass, struct av_decision *avd);
|
||||||
struct operation *ops);
|
|
||||||
|
|
||||||
void security_compute_operation(u32 ssid, u32 tsid, u16 tclass,
|
|
||||||
u8 type, struct operation_decision *od);
|
|
||||||
|
|
||||||
void security_compute_av_user(u32 ssid, u32 tsid,
|
void security_compute_av_user(u32 ssid, u32 tsid,
|
||||||
u16 tclass, struct av_decision *avd);
|
u16 tclass, struct av_decision *avd);
|
||||||
|
|
|
@ -24,7 +24,6 @@
|
||||||
#include "policydb.h"
|
#include "policydb.h"
|
||||||
|
|
||||||
static struct kmem_cache *avtab_node_cachep;
|
static struct kmem_cache *avtab_node_cachep;
|
||||||
static struct kmem_cache *avtab_operation_cachep;
|
|
||||||
|
|
||||||
static inline int avtab_hash(struct avtab_key *keyp, u16 mask)
|
static inline int avtab_hash(struct avtab_key *keyp, u16 mask)
|
||||||
{
|
{
|
||||||
|
@ -38,24 +37,11 @@ avtab_insert_node(struct avtab *h, int hvalue,
|
||||||
struct avtab_key *key, struct avtab_datum *datum)
|
struct avtab_key *key, struct avtab_datum *datum)
|
||||||
{
|
{
|
||||||
struct avtab_node *newnode;
|
struct avtab_node *newnode;
|
||||||
struct avtab_operation *ops;
|
|
||||||
newnode = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL);
|
newnode = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL);
|
||||||
if (newnode == NULL)
|
if (newnode == NULL)
|
||||||
return NULL;
|
return NULL;
|
||||||
newnode->key = *key;
|
newnode->key = *key;
|
||||||
|
newnode->datum = *datum;
|
||||||
if (key->specified & AVTAB_OP) {
|
|
||||||
ops = kmem_cache_zalloc(avtab_operation_cachep, GFP_KERNEL);
|
|
||||||
if (ops == NULL) {
|
|
||||||
kmem_cache_free(avtab_node_cachep, newnode);
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
*ops = *(datum->u.ops);
|
|
||||||
newnode->datum.u.ops = ops;
|
|
||||||
} else {
|
|
||||||
newnode->datum.u.data = datum->u.data;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (prev) {
|
if (prev) {
|
||||||
newnode->next = prev->next;
|
newnode->next = prev->next;
|
||||||
prev->next = newnode;
|
prev->next = newnode;
|
||||||
|
@ -84,11 +70,8 @@ static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_dat
|
||||||
if (key->source_type == cur->key.source_type &&
|
if (key->source_type == cur->key.source_type &&
|
||||||
key->target_type == cur->key.target_type &&
|
key->target_type == cur->key.target_type &&
|
||||||
key->target_class == cur->key.target_class &&
|
key->target_class == cur->key.target_class &&
|
||||||
(specified & cur->key.specified)) {
|
(specified & cur->key.specified))
|
||||||
if (specified & AVTAB_OPNUM)
|
|
||||||
break;
|
|
||||||
return -EEXIST;
|
return -EEXIST;
|
||||||
}
|
|
||||||
if (key->source_type < cur->key.source_type)
|
if (key->source_type < cur->key.source_type)
|
||||||
break;
|
break;
|
||||||
if (key->source_type == cur->key.source_type &&
|
if (key->source_type == cur->key.source_type &&
|
||||||
|
@ -249,9 +232,6 @@ void avtab_destroy(struct avtab *h)
|
||||||
while (cur) {
|
while (cur) {
|
||||||
temp = cur;
|
temp = cur;
|
||||||
cur = cur->next;
|
cur = cur->next;
|
||||||
if (temp->key.specified & AVTAB_OP)
|
|
||||||
kmem_cache_free(avtab_operation_cachep,
|
|
||||||
temp->datum.u.ops);
|
|
||||||
kmem_cache_free(avtab_node_cachep, temp);
|
kmem_cache_free(avtab_node_cachep, temp);
|
||||||
}
|
}
|
||||||
h->htable[i] = NULL;
|
h->htable[i] = NULL;
|
||||||
|
@ -340,13 +320,7 @@ static uint16_t spec_order[] = {
|
||||||
AVTAB_AUDITALLOW,
|
AVTAB_AUDITALLOW,
|
||||||
AVTAB_TRANSITION,
|
AVTAB_TRANSITION,
|
||||||
AVTAB_CHANGE,
|
AVTAB_CHANGE,
|
||||||
AVTAB_MEMBER,
|
AVTAB_MEMBER
|
||||||
AVTAB_OPNUM_ALLOWED,
|
|
||||||
AVTAB_OPNUM_AUDITALLOW,
|
|
||||||
AVTAB_OPNUM_DONTAUDIT,
|
|
||||||
AVTAB_OPTYPE_ALLOWED,
|
|
||||||
AVTAB_OPTYPE_AUDITALLOW,
|
|
||||||
AVTAB_OPTYPE_DONTAUDIT
|
|
||||||
};
|
};
|
||||||
|
|
||||||
int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
||||||
|
@ -356,11 +330,10 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
||||||
{
|
{
|
||||||
__le16 buf16[4];
|
__le16 buf16[4];
|
||||||
u16 enabled;
|
u16 enabled;
|
||||||
|
__le32 buf32[7];
|
||||||
u32 items, items2, val, vers = pol->policyvers;
|
u32 items, items2, val, vers = pol->policyvers;
|
||||||
struct avtab_key key;
|
struct avtab_key key;
|
||||||
struct avtab_datum datum;
|
struct avtab_datum datum;
|
||||||
struct avtab_operation ops;
|
|
||||||
__le32 buf32[ARRAY_SIZE(ops.op.perms)];
|
|
||||||
int i, rc;
|
int i, rc;
|
||||||
unsigned set;
|
unsigned set;
|
||||||
|
|
||||||
|
@ -417,15 +390,11 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
||||||
printk(KERN_ERR "SELinux: avtab: entry has both access vectors and types\n");
|
printk(KERN_ERR "SELinux: avtab: entry has both access vectors and types\n");
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
if (val & AVTAB_OP) {
|
|
||||||
printk(KERN_ERR "SELinux: avtab: entry has operations\n");
|
|
||||||
return -EINVAL;
|
|
||||||
}
|
|
||||||
|
|
||||||
for (i = 0; i < ARRAY_SIZE(spec_order); i++) {
|
for (i = 0; i < ARRAY_SIZE(spec_order); i++) {
|
||||||
if (val & spec_order[i]) {
|
if (val & spec_order[i]) {
|
||||||
key.specified = spec_order[i] | enabled;
|
key.specified = spec_order[i] | enabled;
|
||||||
datum.u.data = le32_to_cpu(buf32[items++]);
|
datum.data = le32_to_cpu(buf32[items++]);
|
||||||
rc = insertf(a, &key, &datum, p);
|
rc = insertf(a, &key, &datum, p);
|
||||||
if (rc)
|
if (rc)
|
||||||
return rc;
|
return rc;
|
||||||
|
@ -444,6 +413,7 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
||||||
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
items = 0;
|
items = 0;
|
||||||
key.source_type = le16_to_cpu(buf16[items++]);
|
key.source_type = le16_to_cpu(buf16[items++]);
|
||||||
key.target_type = le16_to_cpu(buf16[items++]);
|
key.target_type = le16_to_cpu(buf16[items++]);
|
||||||
|
@ -467,32 +437,14 @@ int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((vers < POLICYDB_VERSION_IOCTL_OPERATIONS)
|
|
||||||
|| !(key.specified & AVTAB_OP)) {
|
|
||||||
rc = next_entry(buf32, fp, sizeof(u32));
|
rc = next_entry(buf32, fp, sizeof(u32));
|
||||||
if (rc) {
|
if (rc) {
|
||||||
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
datum.u.data = le32_to_cpu(*buf32);
|
datum.data = le32_to_cpu(*buf32);
|
||||||
} else {
|
|
||||||
memset(&ops, 0, sizeof(struct avtab_operation));
|
|
||||||
rc = next_entry(&ops.type, fp, sizeof(u8));
|
|
||||||
if (rc) {
|
|
||||||
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
rc = next_entry(buf32, fp, sizeof(u32)*ARRAY_SIZE(ops.op.perms));
|
|
||||||
if (rc) {
|
|
||||||
printk(KERN_ERR "SELinux: avtab: truncated entry\n");
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
for (i = 0; i < ARRAY_SIZE(ops.op.perms); i++)
|
|
||||||
ops.op.perms[i] = le32_to_cpu(buf32[i]);
|
|
||||||
datum.u.ops = &ops;
|
|
||||||
}
|
|
||||||
if ((key.specified & AVTAB_TYPE) &&
|
if ((key.specified & AVTAB_TYPE) &&
|
||||||
!policydb_type_isvalid(pol, datum.u.data)) {
|
!policydb_type_isvalid(pol, datum.data)) {
|
||||||
printk(KERN_ERR "SELinux: avtab: invalid type\n");
|
printk(KERN_ERR "SELinux: avtab: invalid type\n");
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
|
@ -552,9 +504,8 @@ bad:
|
||||||
int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
|
int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
|
||||||
{
|
{
|
||||||
__le16 buf16[4];
|
__le16 buf16[4];
|
||||||
__le32 buf32[ARRAY_SIZE(cur->datum.u.ops->op.perms)];
|
__le32 buf32[1];
|
||||||
int rc;
|
int rc;
|
||||||
unsigned int i;
|
|
||||||
|
|
||||||
buf16[0] = cpu_to_le16(cur->key.source_type);
|
buf16[0] = cpu_to_le16(cur->key.source_type);
|
||||||
buf16[1] = cpu_to_le16(cur->key.target_type);
|
buf16[1] = cpu_to_le16(cur->key.target_type);
|
||||||
|
@ -563,16 +514,8 @@ int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
|
||||||
rc = put_entry(buf16, sizeof(u16), 4, fp);
|
rc = put_entry(buf16, sizeof(u16), 4, fp);
|
||||||
if (rc)
|
if (rc)
|
||||||
return rc;
|
return rc;
|
||||||
|
buf32[0] = cpu_to_le32(cur->datum.data);
|
||||||
if (cur->key.specified & AVTAB_OP) {
|
|
||||||
for (i = 0; i < ARRAY_SIZE(cur->datum.u.ops->op.perms); i++)
|
|
||||||
buf32[i] = cpu_to_le32(cur->datum.u.ops->op.perms[i]);
|
|
||||||
rc = put_entry(buf32, sizeof(u32),
|
|
||||||
ARRAY_SIZE(cur->datum.u.ops->op.perms), fp);
|
|
||||||
} else {
|
|
||||||
buf32[0] = cpu_to_le32(cur->datum.u.data);
|
|
||||||
rc = put_entry(buf32, sizeof(u32), 1, fp);
|
rc = put_entry(buf32, sizeof(u32), 1, fp);
|
||||||
}
|
|
||||||
if (rc)
|
if (rc)
|
||||||
return rc;
|
return rc;
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -605,13 +548,9 @@ void avtab_cache_init(void)
|
||||||
avtab_node_cachep = kmem_cache_create("avtab_node",
|
avtab_node_cachep = kmem_cache_create("avtab_node",
|
||||||
sizeof(struct avtab_node),
|
sizeof(struct avtab_node),
|
||||||
0, SLAB_PANIC, NULL);
|
0, SLAB_PANIC, NULL);
|
||||||
avtab_operation_cachep = kmem_cache_create("avtab_operation",
|
|
||||||
sizeof(struct avtab_operation),
|
|
||||||
0, SLAB_PANIC, NULL);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void avtab_cache_destroy(void)
|
void avtab_cache_destroy(void)
|
||||||
{
|
{
|
||||||
kmem_cache_destroy(avtab_node_cachep);
|
kmem_cache_destroy(avtab_node_cachep);
|
||||||
kmem_cache_destroy(avtab_operation_cachep);
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,8 +23,6 @@
|
||||||
#ifndef _SS_AVTAB_H_
|
#ifndef _SS_AVTAB_H_
|
||||||
#define _SS_AVTAB_H_
|
#define _SS_AVTAB_H_
|
||||||
|
|
||||||
#include "security.h"
|
|
||||||
|
|
||||||
struct avtab_key {
|
struct avtab_key {
|
||||||
u16 source_type; /* source type */
|
u16 source_type; /* source type */
|
||||||
u16 target_type; /* target type */
|
u16 target_type; /* target type */
|
||||||
|
@ -37,34 +35,13 @@ struct avtab_key {
|
||||||
#define AVTAB_MEMBER 0x0020
|
#define AVTAB_MEMBER 0x0020
|
||||||
#define AVTAB_CHANGE 0x0040
|
#define AVTAB_CHANGE 0x0040
|
||||||
#define AVTAB_TYPE (AVTAB_TRANSITION | AVTAB_MEMBER | AVTAB_CHANGE)
|
#define AVTAB_TYPE (AVTAB_TRANSITION | AVTAB_MEMBER | AVTAB_CHANGE)
|
||||||
#define AVTAB_OPNUM_ALLOWED 0x0100
|
|
||||||
#define AVTAB_OPNUM_AUDITALLOW 0x0200
|
|
||||||
#define AVTAB_OPNUM_DONTAUDIT 0x0400
|
|
||||||
#define AVTAB_OPNUM (AVTAB_OPNUM_ALLOWED | \
|
|
||||||
AVTAB_OPNUM_AUDITALLOW | \
|
|
||||||
AVTAB_OPNUM_DONTAUDIT)
|
|
||||||
#define AVTAB_OPTYPE_ALLOWED 0x1000
|
|
||||||
#define AVTAB_OPTYPE_AUDITALLOW 0x2000
|
|
||||||
#define AVTAB_OPTYPE_DONTAUDIT 0x4000
|
|
||||||
#define AVTAB_OPTYPE (AVTAB_OPTYPE_ALLOWED | \
|
|
||||||
AVTAB_OPTYPE_AUDITALLOW | \
|
|
||||||
AVTAB_OPTYPE_DONTAUDIT)
|
|
||||||
#define AVTAB_OP (AVTAB_OPNUM | AVTAB_OPTYPE)
|
|
||||||
#define AVTAB_ENABLED_OLD 0x80000000 /* reserved for used in cond_avtab */
|
#define AVTAB_ENABLED_OLD 0x80000000 /* reserved for used in cond_avtab */
|
||||||
#define AVTAB_ENABLED 0x8000 /* reserved for used in cond_avtab */
|
#define AVTAB_ENABLED 0x8000 /* reserved for used in cond_avtab */
|
||||||
u16 specified; /* what field is specified */
|
u16 specified; /* what field is specified */
|
||||||
};
|
};
|
||||||
|
|
||||||
struct avtab_operation {
|
|
||||||
u8 type;
|
|
||||||
struct operation_perm op;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct avtab_datum {
|
struct avtab_datum {
|
||||||
union {
|
|
||||||
u32 data; /* access vector or type value */
|
u32 data; /* access vector or type value */
|
||||||
struct avtab_operation *ops; /* ioctl operations */
|
|
||||||
} u;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct avtab_node {
|
struct avtab_node {
|
||||||
|
|
|
@ -15,7 +15,6 @@
|
||||||
|
|
||||||
#include "security.h"
|
#include "security.h"
|
||||||
#include "conditional.h"
|
#include "conditional.h"
|
||||||
#include "services.h"
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* cond_evaluate_expr evaluates a conditional expr
|
* cond_evaluate_expr evaluates a conditional expr
|
||||||
|
@ -618,39 +617,21 @@ int cond_write_list(struct policydb *p, struct cond_node *list, void *fp)
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void cond_compute_operation(struct avtab *ctab, struct avtab_key *key,
|
|
||||||
struct operation_decision *od)
|
|
||||||
{
|
|
||||||
struct avtab_node *node;
|
|
||||||
|
|
||||||
if (!ctab || !key || !od)
|
|
||||||
return;
|
|
||||||
|
|
||||||
for (node = avtab_search_node(ctab, key); node;
|
|
||||||
node = avtab_search_node_next(node, key->specified)) {
|
|
||||||
if (node->key.specified & AVTAB_ENABLED)
|
|
||||||
services_compute_operation_num(od, node);
|
|
||||||
}
|
|
||||||
return;
|
|
||||||
|
|
||||||
}
|
|
||||||
/* Determine whether additional permissions are granted by the conditional
|
/* Determine whether additional permissions are granted by the conditional
|
||||||
* av table, and if so, add them to the result
|
* av table, and if so, add them to the result
|
||||||
*/
|
*/
|
||||||
void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
|
void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd)
|
||||||
struct av_decision *avd, struct operation *ops)
|
|
||||||
{
|
{
|
||||||
struct avtab_node *node;
|
struct avtab_node *node;
|
||||||
|
|
||||||
if (!ctab || !key || !avd || !ops)
|
if (!ctab || !key || !avd)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
for (node = avtab_search_node(ctab, key); node;
|
for (node = avtab_search_node(ctab, key); node;
|
||||||
node = avtab_search_node_next(node, key->specified)) {
|
node = avtab_search_node_next(node, key->specified)) {
|
||||||
if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) ==
|
if ((u16)(AVTAB_ALLOWED|AVTAB_ENABLED) ==
|
||||||
(node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED)))
|
(node->key.specified & (AVTAB_ALLOWED|AVTAB_ENABLED)))
|
||||||
avd->allowed |= node->datum.u.data;
|
avd->allowed |= node->datum.data;
|
||||||
if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) ==
|
if ((u16)(AVTAB_AUDITDENY|AVTAB_ENABLED) ==
|
||||||
(node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED)))
|
(node->key.specified & (AVTAB_AUDITDENY|AVTAB_ENABLED)))
|
||||||
/* Since a '0' in an auditdeny mask represents a
|
/* Since a '0' in an auditdeny mask represents a
|
||||||
|
@ -658,13 +639,10 @@ void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
|
||||||
* the '&' operand to ensure that all '0's in the mask
|
* the '&' operand to ensure that all '0's in the mask
|
||||||
* are retained (much unlike the allow and auditallow cases).
|
* are retained (much unlike the allow and auditallow cases).
|
||||||
*/
|
*/
|
||||||
avd->auditdeny &= node->datum.u.data;
|
avd->auditdeny &= node->datum.data;
|
||||||
if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) ==
|
if ((u16)(AVTAB_AUDITALLOW|AVTAB_ENABLED) ==
|
||||||
(node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED)))
|
(node->key.specified & (AVTAB_AUDITALLOW|AVTAB_ENABLED)))
|
||||||
avd->auditallow |= node->datum.u.data;
|
avd->auditallow |= node->datum.data;
|
||||||
if ((node->key.specified & AVTAB_ENABLED) &&
|
|
||||||
(node->key.specified & AVTAB_OP))
|
|
||||||
services_compute_operation_type(ops, node);
|
|
||||||
}
|
}
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
|
@ -73,10 +73,8 @@ int cond_read_list(struct policydb *p, void *fp);
|
||||||
int cond_write_bool(void *key, void *datum, void *ptr);
|
int cond_write_bool(void *key, void *datum, void *ptr);
|
||||||
int cond_write_list(struct policydb *p, struct cond_node *list, void *fp);
|
int cond_write_list(struct policydb *p, struct cond_node *list, void *fp);
|
||||||
|
|
||||||
void cond_compute_av(struct avtab *ctab, struct avtab_key *key,
|
void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd);
|
||||||
struct av_decision *avd, struct operation *ops);
|
|
||||||
void cond_compute_operation(struct avtab *ctab, struct avtab_key *key,
|
|
||||||
struct operation_decision *od);
|
|
||||||
int evaluate_cond_node(struct policydb *p, struct cond_node *node);
|
int evaluate_cond_node(struct policydb *p, struct cond_node *node);
|
||||||
|
|
||||||
#endif /* _CONDITIONAL_H_ */
|
#endif /* _CONDITIONAL_H_ */
|
||||||
|
|
|
@ -148,11 +148,6 @@ static struct policydb_compat_info policydb_compat[] = {
|
||||||
.sym_num = SYM_NUM,
|
.sym_num = SYM_NUM,
|
||||||
.ocon_num = OCON_NUM,
|
.ocon_num = OCON_NUM,
|
||||||
},
|
},
|
||||||
{
|
|
||||||
.version = POLICYDB_VERSION_IOCTL_OPERATIONS,
|
|
||||||
.sym_num = SYM_NUM,
|
|
||||||
.ocon_num = OCON_NUM,
|
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
static struct policydb_compat_info *policydb_lookup_compat(int version)
|
static struct policydb_compat_info *policydb_lookup_compat(int version)
|
||||||
|
|
|
@ -94,8 +94,7 @@ static int context_struct_to_string(struct context *context, char **scontext,
|
||||||
static void context_struct_compute_av(struct context *scontext,
|
static void context_struct_compute_av(struct context *scontext,
|
||||||
struct context *tcontext,
|
struct context *tcontext,
|
||||||
u16 tclass,
|
u16 tclass,
|
||||||
struct av_decision *avd,
|
struct av_decision *avd);
|
||||||
struct operation *ops);
|
|
||||||
|
|
||||||
struct selinux_mapping {
|
struct selinux_mapping {
|
||||||
u16 value; /* policy value */
|
u16 value; /* policy value */
|
||||||
|
@ -565,8 +564,7 @@ static void type_attribute_bounds_av(struct context *scontext,
|
||||||
context_struct_compute_av(&lo_scontext,
|
context_struct_compute_av(&lo_scontext,
|
||||||
tcontext,
|
tcontext,
|
||||||
tclass,
|
tclass,
|
||||||
&lo_avd,
|
&lo_avd);
|
||||||
NULL);
|
|
||||||
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
||||||
return; /* no masked permission */
|
return; /* no masked permission */
|
||||||
masked = ~lo_avd.allowed & avd->allowed;
|
masked = ~lo_avd.allowed & avd->allowed;
|
||||||
|
@ -581,8 +579,7 @@ static void type_attribute_bounds_av(struct context *scontext,
|
||||||
context_struct_compute_av(scontext,
|
context_struct_compute_av(scontext,
|
||||||
&lo_tcontext,
|
&lo_tcontext,
|
||||||
tclass,
|
tclass,
|
||||||
&lo_avd,
|
&lo_avd);
|
||||||
NULL);
|
|
||||||
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
||||||
return; /* no masked permission */
|
return; /* no masked permission */
|
||||||
masked = ~lo_avd.allowed & avd->allowed;
|
masked = ~lo_avd.allowed & avd->allowed;
|
||||||
|
@ -598,8 +595,7 @@ static void type_attribute_bounds_av(struct context *scontext,
|
||||||
context_struct_compute_av(&lo_scontext,
|
context_struct_compute_av(&lo_scontext,
|
||||||
&lo_tcontext,
|
&lo_tcontext,
|
||||||
tclass,
|
tclass,
|
||||||
&lo_avd,
|
&lo_avd);
|
||||||
NULL);
|
|
||||||
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
if ((lo_avd.allowed & avd->allowed) == avd->allowed)
|
||||||
return; /* no masked permission */
|
return; /* no masked permission */
|
||||||
masked = ~lo_avd.allowed & avd->allowed;
|
masked = ~lo_avd.allowed & avd->allowed;
|
||||||
|
@ -615,39 +611,14 @@ static void type_attribute_bounds_av(struct context *scontext,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* flag ioctl types that have operation permissions */
|
|
||||||
void services_compute_operation_type(
|
|
||||||
struct operation *ops,
|
|
||||||
struct avtab_node *node)
|
|
||||||
{
|
|
||||||
u8 type;
|
|
||||||
unsigned int i;
|
|
||||||
|
|
||||||
if (node->key.specified & AVTAB_OPTYPE) {
|
|
||||||
/* if allowing one or more complete types */
|
|
||||||
for (i = 0; i < ARRAY_SIZE(ops->type); i++)
|
|
||||||
ops->type[i] |= node->datum.u.ops->op.perms[i];
|
|
||||||
} else {
|
|
||||||
/* if allowing operations within a type */
|
|
||||||
type = node->datum.u.ops->type;
|
|
||||||
security_operation_set(ops->type, type);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If no ioctl commands are allowed, ignore auditallow and auditdeny */
|
|
||||||
if (node->key.specified & AVTAB_OPTYPE_ALLOWED ||
|
|
||||||
node->key.specified & AVTAB_OPNUM_ALLOWED)
|
|
||||||
ops->len = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Compute access vectors and operations ranges based on a context
|
* Compute access vectors based on a context structure pair for
|
||||||
* structure pair for the permissions in a particular class.
|
* the permissions in a particular class.
|
||||||
*/
|
*/
|
||||||
static void context_struct_compute_av(struct context *scontext,
|
static void context_struct_compute_av(struct context *scontext,
|
||||||
struct context *tcontext,
|
struct context *tcontext,
|
||||||
u16 tclass,
|
u16 tclass,
|
||||||
struct av_decision *avd,
|
struct av_decision *avd)
|
||||||
struct operation *ops)
|
|
||||||
{
|
{
|
||||||
struct constraint_node *constraint;
|
struct constraint_node *constraint;
|
||||||
struct role_allow *ra;
|
struct role_allow *ra;
|
||||||
|
@ -661,10 +632,6 @@ static void context_struct_compute_av(struct context *scontext,
|
||||||
avd->allowed = 0;
|
avd->allowed = 0;
|
||||||
avd->auditallow = 0;
|
avd->auditallow = 0;
|
||||||
avd->auditdeny = 0xffffffff;
|
avd->auditdeny = 0xffffffff;
|
||||||
if (ops) {
|
|
||||||
memset(&ops->type, 0, sizeof(ops->type));
|
|
||||||
ops->len = 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
|
if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
|
||||||
if (printk_ratelimit())
|
if (printk_ratelimit())
|
||||||
|
@ -679,7 +646,7 @@ static void context_struct_compute_av(struct context *scontext,
|
||||||
* this permission check, then use it.
|
* this permission check, then use it.
|
||||||
*/
|
*/
|
||||||
avkey.target_class = tclass;
|
avkey.target_class = tclass;
|
||||||
avkey.specified = AVTAB_AV | AVTAB_OP;
|
avkey.specified = AVTAB_AV;
|
||||||
sattr = flex_array_get(policydb.type_attr_map_array, scontext->type - 1);
|
sattr = flex_array_get(policydb.type_attr_map_array, scontext->type - 1);
|
||||||
BUG_ON(!sattr);
|
BUG_ON(!sattr);
|
||||||
tattr = flex_array_get(policydb.type_attr_map_array, tcontext->type - 1);
|
tattr = flex_array_get(policydb.type_attr_map_array, tcontext->type - 1);
|
||||||
|
@ -692,17 +659,15 @@ static void context_struct_compute_av(struct context *scontext,
|
||||||
node;
|
node;
|
||||||
node = avtab_search_node_next(node, avkey.specified)) {
|
node = avtab_search_node_next(node, avkey.specified)) {
|
||||||
if (node->key.specified == AVTAB_ALLOWED)
|
if (node->key.specified == AVTAB_ALLOWED)
|
||||||
avd->allowed |= node->datum.u.data;
|
avd->allowed |= node->datum.data;
|
||||||
else if (node->key.specified == AVTAB_AUDITALLOW)
|
else if (node->key.specified == AVTAB_AUDITALLOW)
|
||||||
avd->auditallow |= node->datum.u.data;
|
avd->auditallow |= node->datum.data;
|
||||||
else if (node->key.specified == AVTAB_AUDITDENY)
|
else if (node->key.specified == AVTAB_AUDITDENY)
|
||||||
avd->auditdeny &= node->datum.u.data;
|
avd->auditdeny &= node->datum.data;
|
||||||
else if (ops && (node->key.specified & AVTAB_OP))
|
|
||||||
services_compute_operation_type(ops, node);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Check conditional av table for additional permissions */
|
/* Check conditional av table for additional permissions */
|
||||||
cond_compute_av(&policydb.te_cond_avtab, &avkey, avd, ops);
|
cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -936,139 +901,13 @@ static void avd_init(struct av_decision *avd)
|
||||||
avd->flags = 0;
|
avd->flags = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void services_compute_operation_num(struct operation_decision *od,
|
|
||||||
struct avtab_node *node)
|
|
||||||
{
|
|
||||||
unsigned int i;
|
|
||||||
|
|
||||||
if (node->key.specified & AVTAB_OPNUM) {
|
|
||||||
if (od->type != node->datum.u.ops->type)
|
|
||||||
return;
|
|
||||||
} else {
|
|
||||||
if (!security_operation_test(node->datum.u.ops->op.perms,
|
|
||||||
od->type))
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (node->key.specified == AVTAB_OPTYPE_ALLOWED) {
|
|
||||||
od->specified |= OPERATION_ALLOWED;
|
|
||||||
memset(od->allowed->perms, 0xff,
|
|
||||||
sizeof(od->allowed->perms));
|
|
||||||
} else if (node->key.specified == AVTAB_OPTYPE_AUDITALLOW) {
|
|
||||||
od->specified |= OPERATION_AUDITALLOW;
|
|
||||||
memset(od->auditallow->perms, 0xff,
|
|
||||||
sizeof(od->auditallow->perms));
|
|
||||||
} else if (node->key.specified == AVTAB_OPTYPE_DONTAUDIT) {
|
|
||||||
od->specified |= OPERATION_DONTAUDIT;
|
|
||||||
memset(od->dontaudit->perms, 0xff,
|
|
||||||
sizeof(od->dontaudit->perms));
|
|
||||||
} else if (node->key.specified == AVTAB_OPNUM_ALLOWED) {
|
|
||||||
od->specified |= OPERATION_ALLOWED;
|
|
||||||
for (i = 0; i < ARRAY_SIZE(od->allowed->perms); i++)
|
|
||||||
od->allowed->perms[i] |=
|
|
||||||
node->datum.u.ops->op.perms[i];
|
|
||||||
} else if (node->key.specified == AVTAB_OPNUM_AUDITALLOW) {
|
|
||||||
od->specified |= OPERATION_AUDITALLOW;
|
|
||||||
for (i = 0; i < ARRAY_SIZE(od->auditallow->perms); i++)
|
|
||||||
od->auditallow->perms[i] |=
|
|
||||||
node->datum.u.ops->op.perms[i];
|
|
||||||
} else if (node->key.specified == AVTAB_OPNUM_DONTAUDIT) {
|
|
||||||
od->specified |= OPERATION_DONTAUDIT;
|
|
||||||
for (i = 0; i < ARRAY_SIZE(od->dontaudit->perms); i++)
|
|
||||||
od->dontaudit->perms[i] |=
|
|
||||||
node->datum.u.ops->op.perms[i];
|
|
||||||
} else {
|
|
||||||
BUG();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
void security_compute_operation(u32 ssid,
|
|
||||||
u32 tsid,
|
|
||||||
u16 orig_tclass,
|
|
||||||
u8 type,
|
|
||||||
struct operation_decision *od)
|
|
||||||
{
|
|
||||||
u16 tclass;
|
|
||||||
struct context *scontext, *tcontext;
|
|
||||||
struct avtab_key avkey;
|
|
||||||
struct avtab_node *node;
|
|
||||||
struct ebitmap *sattr, *tattr;
|
|
||||||
struct ebitmap_node *snode, *tnode;
|
|
||||||
unsigned int i, j;
|
|
||||||
|
|
||||||
od->type = type;
|
|
||||||
od->specified = 0;
|
|
||||||
memset(od->allowed->perms, 0, sizeof(od->allowed->perms));
|
|
||||||
memset(od->auditallow->perms, 0, sizeof(od->auditallow->perms));
|
|
||||||
memset(od->dontaudit->perms, 0, sizeof(od->dontaudit->perms));
|
|
||||||
|
|
||||||
read_lock(&policy_rwlock);
|
|
||||||
if (!ss_initialized)
|
|
||||||
goto allow;
|
|
||||||
|
|
||||||
scontext = sidtab_search(&sidtab, ssid);
|
|
||||||
if (!scontext) {
|
|
||||||
printk(KERN_ERR "SELinux: %s: unrecognized SID %d\n",
|
|
||||||
__func__, ssid);
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
tcontext = sidtab_search(&sidtab, tsid);
|
|
||||||
if (!tcontext) {
|
|
||||||
printk(KERN_ERR "SELinux: %s: unrecognized SID %d\n",
|
|
||||||
__func__, tsid);
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
tclass = unmap_class(orig_tclass);
|
|
||||||
if (unlikely(orig_tclass && !tclass)) {
|
|
||||||
if (policydb.allow_unknown)
|
|
||||||
goto allow;
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) {
|
|
||||||
if (printk_ratelimit())
|
|
||||||
printk(KERN_WARNING "SELinux: Invalid class %hu\n", tclass);
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
|
|
||||||
avkey.target_class = tclass;
|
|
||||||
avkey.specified = AVTAB_OP;
|
|
||||||
sattr = flex_array_get(policydb.type_attr_map_array,
|
|
||||||
scontext->type - 1);
|
|
||||||
BUG_ON(!sattr);
|
|
||||||
tattr = flex_array_get(policydb.type_attr_map_array,
|
|
||||||
tcontext->type - 1);
|
|
||||||
BUG_ON(!tattr);
|
|
||||||
ebitmap_for_each_positive_bit(sattr, snode, i) {
|
|
||||||
ebitmap_for_each_positive_bit(tattr, tnode, j) {
|
|
||||||
avkey.source_type = i + 1;
|
|
||||||
avkey.target_type = j + 1;
|
|
||||||
for (node = avtab_search_node(&policydb.te_avtab, &avkey);
|
|
||||||
node;
|
|
||||||
node = avtab_search_node_next(node, avkey.specified))
|
|
||||||
services_compute_operation_num(od, node);
|
|
||||||
|
|
||||||
cond_compute_operation(&policydb.te_cond_avtab,
|
|
||||||
&avkey, od);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
out:
|
|
||||||
read_unlock(&policy_rwlock);
|
|
||||||
return;
|
|
||||||
allow:
|
|
||||||
memset(od->allowed->perms, 0xff, sizeof(od->allowed->perms));
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
/**
|
/**
|
||||||
* security_compute_av - Compute access vector decisions.
|
* security_compute_av - Compute access vector decisions.
|
||||||
* @ssid: source security identifier
|
* @ssid: source security identifier
|
||||||
* @tsid: target security identifier
|
* @tsid: target security identifier
|
||||||
* @tclass: target security class
|
* @tclass: target security class
|
||||||
* @avd: access vector decisions
|
* @avd: access vector decisions
|
||||||
* @od: operation decisions
|
|
||||||
*
|
*
|
||||||
* Compute a set of access vector decisions based on the
|
* Compute a set of access vector decisions based on the
|
||||||
* SID pair (@ssid, @tsid) for the permissions in @tclass.
|
* SID pair (@ssid, @tsid) for the permissions in @tclass.
|
||||||
|
@ -1076,15 +915,13 @@ allow:
|
||||||
void security_compute_av(u32 ssid,
|
void security_compute_av(u32 ssid,
|
||||||
u32 tsid,
|
u32 tsid,
|
||||||
u16 orig_tclass,
|
u16 orig_tclass,
|
||||||
struct av_decision *avd,
|
struct av_decision *avd)
|
||||||
struct operation *ops)
|
|
||||||
{
|
{
|
||||||
u16 tclass;
|
u16 tclass;
|
||||||
struct context *scontext = NULL, *tcontext = NULL;
|
struct context *scontext = NULL, *tcontext = NULL;
|
||||||
|
|
||||||
read_lock(&policy_rwlock);
|
read_lock(&policy_rwlock);
|
||||||
avd_init(avd);
|
avd_init(avd);
|
||||||
ops->len = 0;
|
|
||||||
if (!ss_initialized)
|
if (!ss_initialized)
|
||||||
goto allow;
|
goto allow;
|
||||||
|
|
||||||
|
@ -1112,7 +949,7 @@ void security_compute_av(u32 ssid,
|
||||||
goto allow;
|
goto allow;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
context_struct_compute_av(scontext, tcontext, tclass, avd, ops);
|
context_struct_compute_av(scontext, tcontext, tclass, avd);
|
||||||
map_decision(orig_tclass, avd, policydb.allow_unknown);
|
map_decision(orig_tclass, avd, policydb.allow_unknown);
|
||||||
out:
|
out:
|
||||||
read_unlock(&policy_rwlock);
|
read_unlock(&policy_rwlock);
|
||||||
|
@ -1158,7 +995,7 @@ void security_compute_av_user(u32 ssid,
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
context_struct_compute_av(scontext, tcontext, tclass, avd, NULL);
|
context_struct_compute_av(scontext, tcontext, tclass, avd);
|
||||||
out:
|
out:
|
||||||
read_unlock(&policy_rwlock);
|
read_unlock(&policy_rwlock);
|
||||||
return;
|
return;
|
||||||
|
@ -1679,7 +1516,7 @@ static int security_compute_sid(u32 ssid,
|
||||||
|
|
||||||
if (avdatum) {
|
if (avdatum) {
|
||||||
/* Use the type from the type transition/member/change rule. */
|
/* Use the type from the type transition/member/change rule. */
|
||||||
newcontext.type = avdatum->u.data;
|
newcontext.type = avdatum->data;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* if we have a objname this is a file trans check so check those rules */
|
/* if we have a objname this is a file trans check so check those rules */
|
||||||
|
|
|
@ -11,11 +11,5 @@
|
||||||
|
|
||||||
extern struct policydb policydb;
|
extern struct policydb policydb;
|
||||||
|
|
||||||
void services_compute_operation_type(struct operation *ops,
|
|
||||||
struct avtab_node *node);
|
|
||||||
|
|
||||||
void services_compute_operation_num(struct operation_decision *od,
|
|
||||||
struct avtab_node *node);
|
|
||||||
|
|
||||||
#endif /* _SS_SERVICES_H_ */
|
#endif /* _SS_SERVICES_H_ */
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue