2010-07-30 01:48:01 +04:00
/*
* AppArmor security module
*
* This file contains AppArmor dfa based regular expression matching engine
*
* Copyright ( C ) 1998 - 2008 Novell / SUSE
2013-02-19 04:08:34 +04:00
* Copyright 2009 - 2012 Canonical Ltd .
2010-07-30 01:48:01 +04:00
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation , version 2 of the
* License .
*/
# include <linux/errno.h>
# include <linux/kernel.h>
# include <linux/mm.h>
# include <linux/slab.h>
# include <linux/vmalloc.h>
# include <linux/err.h>
# include <linux/kref.h>
2017-01-16 11:42:13 +03:00
# include "include/lib.h"
2010-07-30 01:48:01 +04:00
# include "include/match.h"
2013-02-19 04:12:34 +04:00
# define base_idx(X) ((X) & 0xffffff)
2017-01-16 11:42:42 +03:00
static char nulldfa_src [ ] = {
# include "nulldfa.in"
} ;
struct aa_dfa * nulldfa ;
int aa_setup_dfa_engine ( void )
{
int error ;
nulldfa = aa_dfa_unpack ( nulldfa_src , sizeof ( nulldfa_src ) ,
TO_ACCEPT1_FLAG ( YYTD_DATA32 ) |
TO_ACCEPT2_FLAG ( YYTD_DATA32 ) ) ;
if ( ! IS_ERR ( nulldfa ) )
return 0 ;
error = PTR_ERR ( nulldfa ) ;
nulldfa = NULL ;
return error ;
}
void aa_teardown_dfa_engine ( void )
{
aa_put_dfa ( nulldfa ) ;
nulldfa = NULL ;
}
2010-07-30 01:48:01 +04:00
/**
* unpack_table - unpack a dfa table ( one of accept , default , base , next check )
* @ blob : data to unpack ( NOT NULL )
* @ bsize : size of blob
*
* Returns : pointer to table else NULL on failure
*
2013-02-19 04:04:34 +04:00
* NOTE : must be freed by kvfree ( not kfree )
2010-07-30 01:48:01 +04:00
*/
static struct table_header * unpack_table ( char * blob , size_t bsize )
{
struct table_header * table = NULL ;
struct table_header th ;
size_t tsize ;
if ( bsize < sizeof ( struct table_header ) )
goto out ;
/* loaded td_id's start at 1, subtract 1 now to avoid doing
* it every time we use td_id as an index
*/
2017-01-16 11:43:13 +03:00
th . td_id = be16_to_cpu ( * ( __be16 * ) ( blob ) ) - 1 ;
2016-06-02 12:37:02 +03:00
if ( th . td_id > YYTD_ID_MAX )
goto out ;
2017-01-16 11:43:13 +03:00
th . td_flags = be16_to_cpu ( * ( __be16 * ) ( blob + 2 ) ) ;
th . td_lolen = be32_to_cpu ( * ( __be32 * ) ( blob + 8 ) ) ;
2010-07-30 01:48:01 +04:00
blob + = sizeof ( struct table_header ) ;
if ( ! ( th . td_flags = = YYTD_DATA16 | | th . td_flags = = YYTD_DATA32 | |
th . td_flags = = YYTD_DATA8 ) )
goto out ;
tsize = table_size ( th . td_lolen , th . td_flags ) ;
if ( bsize < tsize )
goto out ;
2017-05-09 01:57:09 +03:00
table = kvzalloc ( tsize , GFP_KERNEL ) ;
2010-07-30 01:48:01 +04:00
if ( table ) {
2016-06-11 00:34:26 +03:00
table - > td_id = th . td_id ;
table - > td_flags = th . td_flags ;
table - > td_lolen = th . td_lolen ;
2010-07-30 01:48:01 +04:00
if ( th . td_flags = = YYTD_DATA8 )
UNPACK_ARRAY ( table - > td_data , blob , th . td_lolen ,
2017-01-16 11:43:13 +03:00
u8 , u8 , byte_to_byte ) ;
2010-07-30 01:48:01 +04:00
else if ( th . td_flags = = YYTD_DATA16 )
UNPACK_ARRAY ( table - > td_data , blob , th . td_lolen ,
2017-01-16 11:43:13 +03:00
u16 , __be16 , be16_to_cpu ) ;
2010-07-30 01:48:01 +04:00
else if ( th . td_flags = = YYTD_DATA32 )
UNPACK_ARRAY ( table - > td_data , blob , th . td_lolen ,
2017-01-16 11:43:13 +03:00
u32 , __be32 , be32_to_cpu ) ;
2010-07-30 01:48:01 +04:00
else
goto fail ;
2016-06-15 09:57:55 +03:00
/* if table was vmalloced make sure the page tables are synced
* before it is used , as it goes live to all cpus .
*/
if ( is_vmalloc_addr ( table ) )
vm_unmap_aliases ( ) ;
2010-07-30 01:48:01 +04:00
}
out :
return table ;
fail :
kvfree ( table ) ;
return NULL ;
}
/**
* verify_dfa - verify that transitions and states in the tables are in bounds .
* @ dfa : dfa to test ( NOT NULL )
* @ flags : flags controlling what type of accept table are acceptable
*
* Assumes dfa has gone through the first pass verification done by unpacking
* NOTE : this does not valid accept table values
*
* Returns : % 0 else error code on failure to verify
*/
static int verify_dfa ( struct aa_dfa * dfa , int flags )
{
size_t i , state_count , trans_count ;
int error = - EPROTO ;
/* check that required tables exist */
if ( ! ( dfa - > tables [ YYTD_ID_DEF ] & &
dfa - > tables [ YYTD_ID_BASE ] & &
dfa - > tables [ YYTD_ID_NXT ] & & dfa - > tables [ YYTD_ID_CHK ] ) )
goto out ;
/* accept.size == default.size == base.size */
state_count = dfa - > tables [ YYTD_ID_BASE ] - > td_lolen ;
if ( ACCEPT1_FLAGS ( flags ) ) {
if ( ! dfa - > tables [ YYTD_ID_ACCEPT ] )
goto out ;
if ( state_count ! = dfa - > tables [ YYTD_ID_ACCEPT ] - > td_lolen )
goto out ;
}
if ( ACCEPT2_FLAGS ( flags ) ) {
if ( ! dfa - > tables [ YYTD_ID_ACCEPT2 ] )
goto out ;
if ( state_count ! = dfa - > tables [ YYTD_ID_ACCEPT2 ] - > td_lolen )
goto out ;
}
if ( state_count ! = dfa - > tables [ YYTD_ID_DEF ] - > td_lolen )
goto out ;
/* next.size == chk.size */
trans_count = dfa - > tables [ YYTD_ID_NXT ] - > td_lolen ;
if ( trans_count ! = dfa - > tables [ YYTD_ID_CHK ] - > td_lolen )
goto out ;
/* if equivalence classes then its table size must be 256 */
if ( dfa - > tables [ YYTD_ID_EC ] & &
dfa - > tables [ YYTD_ID_EC ] - > td_lolen ! = 256 )
goto out ;
if ( flags & DFA_FLAG_VERIFY_STATES ) {
for ( i = 0 ; i < state_count ; i + + ) {
if ( DEFAULT_TABLE ( dfa ) [ i ] > = state_count )
goto out ;
2013-02-19 04:12:34 +04:00
if ( base_idx ( BASE_TABLE ( dfa ) [ i ] ) + 255 > = trans_count ) {
2010-07-30 01:48:01 +04:00
printk ( KERN_ERR " AppArmor DFA next/check upper "
" bounds error \n " ) ;
goto out ;
}
}
for ( i = 0 ; i < trans_count ; i + + ) {
if ( NEXT_TABLE ( dfa ) [ i ] > = state_count )
goto out ;
if ( CHECK_TABLE ( dfa ) [ i ] > = state_count )
goto out ;
}
}
error = 0 ;
out :
return error ;
}
/**
* dfa_free - free a dfa allocated by aa_dfa_unpack
* @ dfa : the dfa to free ( MAYBE NULL )
*
* Requires : reference count to dfa = = 0
*/
static void dfa_free ( struct aa_dfa * dfa )
{
if ( dfa ) {
int i ;
for ( i = 0 ; i < ARRAY_SIZE ( dfa - > tables ) ; i + + ) {
kvfree ( dfa - > tables [ i ] ) ;
dfa - > tables [ i ] = NULL ;
}
kfree ( dfa ) ;
}
}
/**
* aa_dfa_free_kref - free aa_dfa by kref ( called by aa_put_dfa )
* @ kr : kref callback for freeing of a dfa ( NOT NULL )
*/
void aa_dfa_free_kref ( struct kref * kref )
{
struct aa_dfa * dfa = container_of ( kref , struct aa_dfa , count ) ;
dfa_free ( dfa ) ;
}
/**
* aa_dfa_unpack - unpack the binary tables of a serialized dfa
* @ blob : aligned serialized stream of data to unpack ( NOT NULL )
* @ size : size of data to unpack
* @ flags : flags controlling what type of accept tables are acceptable
*
* Unpack a dfa that has been serialized . To find information on the dfa
2017-05-13 14:51:45 +03:00
* format look in Documentation / admin - guide / LSM / apparmor . rst
2011-03-31 05:57:33 +04:00
* Assumes the dfa @ blob stream has been aligned on a 8 byte boundary
2010-07-30 01:48:01 +04:00
*
* Returns : an unpacked dfa ready for matching or ERR_PTR on failure
*/
struct aa_dfa * aa_dfa_unpack ( void * blob , size_t size , int flags )
{
int hsize ;
int error = - ENOMEM ;
char * data = blob ;
struct table_header * table = NULL ;
struct aa_dfa * dfa = kzalloc ( sizeof ( struct aa_dfa ) , GFP_KERNEL ) ;
if ( ! dfa )
goto fail ;
kref_init ( & dfa - > count ) ;
error = - EPROTO ;
/* get dfa table set header */
if ( size < sizeof ( struct table_set_header ) )
goto fail ;
2017-01-16 11:43:13 +03:00
if ( ntohl ( * ( __be32 * ) data ) ! = YYTH_MAGIC )
2010-07-30 01:48:01 +04:00
goto fail ;
2017-01-16 11:43:13 +03:00
hsize = ntohl ( * ( __be32 * ) ( data + 4 ) ) ;
2010-07-30 01:48:01 +04:00
if ( size < hsize )
goto fail ;
2017-01-16 11:43:13 +03:00
dfa - > flags = ntohs ( * ( __be16 * ) ( data + 12 ) ) ;
2010-07-30 01:48:01 +04:00
data + = hsize ;
size - = hsize ;
while ( size > 0 ) {
table = unpack_table ( data , size ) ;
if ( ! table )
goto fail ;
switch ( table - > td_id ) {
case YYTD_ID_ACCEPT :
if ( ! ( table - > td_flags & ACCEPT1_FLAGS ( flags ) ) )
goto fail ;
break ;
case YYTD_ID_ACCEPT2 :
if ( ! ( table - > td_flags & ACCEPT2_FLAGS ( flags ) ) )
goto fail ;
break ;
case YYTD_ID_BASE :
if ( table - > td_flags ! = YYTD_DATA32 )
goto fail ;
break ;
case YYTD_ID_DEF :
case YYTD_ID_NXT :
case YYTD_ID_CHK :
if ( table - > td_flags ! = YYTD_DATA16 )
goto fail ;
break ;
case YYTD_ID_EC :
if ( table - > td_flags ! = YYTD_DATA8 )
goto fail ;
break ;
default :
goto fail ;
}
/* check for duplicate table entry */
if ( dfa - > tables [ table - > td_id ] )
goto fail ;
dfa - > tables [ table - > td_id ] = table ;
data + = table_size ( table - > td_lolen , table - > td_flags ) ;
size - = table_size ( table - > td_lolen , table - > td_flags ) ;
table = NULL ;
}
error = verify_dfa ( dfa , flags ) ;
if ( error )
goto fail ;
return dfa ;
fail :
kvfree ( table ) ;
dfa_free ( dfa ) ;
return ERR_PTR ( error ) ;
}
/**
* aa_dfa_match_len - traverse @ dfa to find state @ str stops at
* @ dfa : the dfa to match @ str against ( NOT NULL )
* @ start : the state of the dfa to start matching in
* @ str : the string of bytes to match against the dfa ( NOT NULL )
* @ len : length of the string of bytes to match
*
* aa_dfa_match_len will match @ str against the dfa and return the state it
* finished matching in . The final state can be used to look up the accepting
* label , or as the start state of a continuing match .
*
* This function will happily match again the 0 byte and only finishes
* when @ len input is consumed .
*
* Returns : final state reached after input is consumed
*/
unsigned int aa_dfa_match_len ( struct aa_dfa * dfa , unsigned int start ,
const char * str , int len )
{
u16 * def = DEFAULT_TABLE ( dfa ) ;
u32 * base = BASE_TABLE ( dfa ) ;
u16 * next = NEXT_TABLE ( dfa ) ;
u16 * check = CHECK_TABLE ( dfa ) ;
unsigned int state = start , pos ;
if ( state = = 0 )
return 0 ;
/* current state is <state>, matching character *str */
if ( dfa - > tables [ YYTD_ID_EC ] ) {
/* Equivalence class table defined */
u8 * equiv = EQUIV_TABLE ( dfa ) ;
/* default is direct to next state */
for ( ; len ; len - - ) {
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + equiv [ ( u8 ) * str + + ] ;
2010-07-30 01:48:01 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
}
} else {
/* default is direct to next state */
for ( ; len ; len - - ) {
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + ( u8 ) * str + + ;
2010-07-30 01:48:01 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
}
}
return state ;
}
/**
2012-02-16 18:20:26 +04:00
* aa_dfa_match - traverse @ dfa to find state @ str stops at
2010-07-30 01:48:01 +04:00
* @ dfa : the dfa to match @ str against ( NOT NULL )
* @ start : the state of the dfa to start matching in
* @ str : the null terminated string of bytes to match against the dfa ( NOT NULL )
*
2012-02-16 18:20:26 +04:00
* aa_dfa_match will match @ str against the dfa and return the state it
2010-07-30 01:48:01 +04:00
* finished matching in . The final state can be used to look up the accepting
* label , or as the start state of a continuing match .
*
* Returns : final state reached after input is consumed
*/
unsigned int aa_dfa_match ( struct aa_dfa * dfa , unsigned int start ,
const char * str )
{
2012-02-16 18:20:26 +04:00
u16 * def = DEFAULT_TABLE ( dfa ) ;
u32 * base = BASE_TABLE ( dfa ) ;
u16 * next = NEXT_TABLE ( dfa ) ;
u16 * check = CHECK_TABLE ( dfa ) ;
unsigned int state = start , pos ;
if ( state = = 0 )
return 0 ;
/* current state is <state>, matching character *str */
if ( dfa - > tables [ YYTD_ID_EC ] ) {
/* Equivalence class table defined */
u8 * equiv = EQUIV_TABLE ( dfa ) ;
/* default is direct to next state */
while ( * str ) {
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + equiv [ ( u8 ) * str + + ] ;
2012-02-16 18:20:26 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
}
} else {
/* default is direct to next state */
while ( * str ) {
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + ( u8 ) * str + + ;
2012-02-16 18:20:26 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
}
}
return state ;
}
/**
* aa_dfa_next - step one character to the next state in the dfa
* @ dfa : the dfa to tranverse ( NOT NULL )
* @ state : the state to start in
* @ c : the input character to transition on
*
* aa_dfa_match will step through the dfa by one input character @ c
*
* Returns : state reach after input @ c
*/
unsigned int aa_dfa_next ( struct aa_dfa * dfa , unsigned int state ,
const char c )
{
u16 * def = DEFAULT_TABLE ( dfa ) ;
u32 * base = BASE_TABLE ( dfa ) ;
u16 * next = NEXT_TABLE ( dfa ) ;
u16 * check = CHECK_TABLE ( dfa ) ;
unsigned int pos ;
/* current state is <state>, matching character *str */
if ( dfa - > tables [ YYTD_ID_EC ] ) {
/* Equivalence class table defined */
u8 * equiv = EQUIV_TABLE ( dfa ) ;
/* default is direct to next state */
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + equiv [ ( u8 ) c ] ;
2012-02-16 18:20:26 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
} else {
/* default is direct to next state */
2013-02-19 04:12:34 +04:00
pos = base_idx ( base [ state ] ) + ( u8 ) c ;
2012-02-16 18:20:26 +04:00
if ( check [ pos ] = = state )
state = next [ pos ] ;
else
state = def [ state ] ;
}
return state ;
2010-07-30 01:48:01 +04:00
}