2010-07-30 01:47:59 +04:00
/*
* AppArmor security module
*
2017-10-08 10:43:02 +03:00
* This file contains AppArmor task related definitions and mediation
2010-07-30 01:47:59 +04:00
*
2017-10-08 10:43:02 +03:00
* Copyright 2017 Canonical Ltd .
2010-07-30 01:47:59 +04:00
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation , version 2 of the
* License .
*
* TODO
* If a task uses change_hat it currently does not return to the old
* cred or task context but instead creates a new one . Ideally the task
* should return to the previous cred if it has not been modified .
*/
2017-10-11 11:04:48 +03:00
# include "include/cred.h"
2017-10-08 10:43:02 +03:00
# include "include/task.h"
2010-07-30 01:47:59 +04:00
2013-02-19 04:03:34 +04:00
/**
2017-06-09 18:14:28 +03:00
* aa_get_task_label - Get another task ' s label
2013-02-19 04:03:34 +04:00
* @ task : task to query ( NOT NULL )
*
2017-06-09 18:14:28 +03:00
* Returns : counted reference to @ task ' s label
2013-02-19 04:03:34 +04:00
*/
2017-06-09 18:14:28 +03:00
struct aa_label * aa_get_task_label ( struct task_struct * task )
2013-02-19 04:03:34 +04:00
{
2017-06-09 18:14:28 +03:00
struct aa_label * p ;
2013-02-19 04:03:34 +04:00
rcu_read_lock ( ) ;
2017-06-09 18:14:28 +03:00
p = aa_get_newest_label ( __aa_task_raw_label ( task ) ) ;
2013-02-19 04:03:34 +04:00
rcu_read_unlock ( ) ;
return p ;
}
2010-07-30 01:47:59 +04:00
/**
2017-06-09 18:14:28 +03:00
* aa_replace_current_label - replace the current tasks label
* @ label : new label ( NOT NULL )
2010-07-30 01:47:59 +04:00
*
* Returns : 0 or error on failure
*/
2017-06-09 18:14:28 +03:00
int aa_replace_current_label ( struct aa_label * label )
2010-07-30 01:47:59 +04:00
{
2017-01-27 14:53:53 +03:00
struct aa_label * old = aa_current_raw_label ( ) ;
2017-10-09 04:26:19 +03:00
struct aa_task_ctx * ctx = task_ctx ( current ) ;
2010-07-30 01:47:59 +04:00
struct cred * new ;
2017-01-27 14:53:53 +03:00
2017-06-09 18:14:28 +03:00
AA_BUG ( ! label ) ;
2010-07-30 01:47:59 +04:00
2017-01-27 14:53:53 +03:00
if ( old = = label )
2010-07-30 01:47:59 +04:00
return 0 ;
2017-01-16 11:42:59 +03:00
if ( current_cred ( ) ! = current_real_cred ( ) )
return - EBUSY ;
2010-07-30 01:47:59 +04:00
new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2017-10-09 04:26:19 +03:00
if ( ctx - > nnp & & label_is_stale ( ctx - > nnp ) ) {
struct aa_label * tmp = ctx - > nnp ;
ctx - > nnp = aa_get_newest_label ( tmp ) ;
aa_put_label ( tmp ) ;
}
2017-01-27 14:53:53 +03:00
if ( unconfined ( label ) | | ( labels_ns ( old ) ! = labels_ns ( label ) ) )
/*
* if switching to unconfined or a different label namespace
2010-07-30 01:47:59 +04:00
* clear out context state
*/
2017-10-08 10:43:02 +03:00
aa_clear_task_ctx_trans ( task_ctx ( current ) ) ;
2013-02-19 04:05:34 +04:00
2017-01-16 11:43:00 +03:00
/*
2017-01-27 14:53:53 +03:00
* be careful switching cred label , when racing replacement it
* is possible that the cred labels ' s - > proxy - > label is the reference
* keeping @ label valid , so make sure to get its reference before
* dropping the reference on the cred ' s label
2017-01-16 11:43:00 +03:00
*/
2017-06-09 18:14:28 +03:00
aa_get_label ( label ) ;
2017-01-27 14:53:53 +03:00
aa_put_label ( cred_label ( new ) ) ;
cred_label ( new ) = label ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}
2017-10-08 10:43:02 +03:00
2010-07-30 01:47:59 +04:00
/**
* aa_set_current_onexec - set the tasks change_profile to happen onexec
2017-06-09 18:14:28 +03:00
* @ label : system label to set at exec ( MAYBE NULL to clear value )
* @ stack : whether stacking should be done
2010-07-30 01:47:59 +04:00
* Returns : 0 or error on failure
*/
2017-06-09 18:14:28 +03:00
int aa_set_current_onexec ( struct aa_label * label , bool stack )
2010-07-30 01:47:59 +04:00
{
2017-10-08 10:43:02 +03:00
struct aa_task_ctx * ctx = task_ctx ( current ) ;
2010-07-30 01:47:59 +04:00
2017-06-09 18:14:28 +03:00
aa_get_label ( label ) ;
2017-01-20 12:59:25 +03:00
aa_put_label ( ctx - > onexec ) ;
2017-06-09 18:14:28 +03:00
ctx - > onexec = label ;
ctx - > token = stack ;
2010-07-30 01:47:59 +04:00
return 0 ;
}
/**
* aa_set_current_hat - set the current tasks hat
2017-06-09 18:14:28 +03:00
* @ label : label to set as the current hat ( NOT NULL )
2010-07-30 01:47:59 +04:00
* @ token : token value that must be specified to change from the hat
*
* Do switch of tasks hat . If the task is currently in a hat
* validate the token to match .
*
* Returns : 0 or error on failure
*/
2017-06-09 18:14:28 +03:00
int aa_set_current_hat ( struct aa_label * label , u64 token )
2010-07-30 01:47:59 +04:00
{
2017-10-08 10:43:02 +03:00
struct aa_task_ctx * ctx = task_ctx ( current ) ;
2017-01-27 14:53:53 +03:00
struct cred * new ;
2017-01-20 12:59:25 +03:00
2017-01-27 14:53:53 +03:00
new = prepare_creds ( ) ;
2010-07-30 01:47:59 +04:00
if ( ! new )
return - ENOMEM ;
2017-06-09 18:14:28 +03:00
AA_BUG ( ! label ) ;
2010-07-30 01:47:59 +04:00
2017-01-27 15:09:40 +03:00
if ( ! ctx - > previous ) {
2010-07-30 01:47:59 +04:00
/* transfer refcount */
2017-01-27 15:09:40 +03:00
ctx - > previous = cred_label ( new ) ;
ctx - > token = token ;
} else if ( ctx - > token = = token ) {
2017-01-27 14:53:53 +03:00
aa_put_label ( cred_label ( new ) ) ;
2010-07-30 01:47:59 +04:00
} else {
2017-01-16 11:43:00 +03:00
/* previous_profile && ctx->token != token */
2010-07-30 01:47:59 +04:00
abort_creds ( new ) ;
return - EACCES ;
}
2017-01-20 12:59:25 +03:00
2017-01-27 14:53:53 +03:00
cred_label ( new ) = aa_get_newest_label ( label ) ;
2010-07-30 01:47:59 +04:00
/* clear exec on switching context */
2017-01-27 15:09:40 +03:00
aa_put_label ( ctx - > onexec ) ;
ctx - > onexec = NULL ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}
/**
2017-06-09 18:14:28 +03:00
* aa_restore_previous_label - exit from hat context restoring previous label
2010-07-30 01:47:59 +04:00
* @ token : the token that must be matched to exit hat context
*
2017-06-09 18:14:28 +03:00
* Attempt to return out of a hat to the previous label . The token
2010-07-30 01:47:59 +04:00
* must match the stored token value .
*
* Returns : 0 or error of failure
*/
2017-06-09 18:14:28 +03:00
int aa_restore_previous_label ( u64 token )
2010-07-30 01:47:59 +04:00
{
2017-10-08 10:43:02 +03:00
struct aa_task_ctx * ctx = task_ctx ( current ) ;
2017-01-20 12:59:25 +03:00
struct cred * new ;
2010-07-30 01:47:59 +04:00
2017-01-27 15:09:40 +03:00
if ( ctx - > token ! = token )
2010-07-30 01:47:59 +04:00
return - EACCES ;
2017-06-09 18:14:28 +03:00
/* ignore restores when there is no saved label */
2017-01-27 15:09:40 +03:00
if ( ! ctx - > previous )
2010-07-30 01:47:59 +04:00
return 0 ;
2017-01-20 12:59:25 +03:00
new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2010-07-30 01:47:59 +04:00
2017-01-27 14:53:53 +03:00
aa_put_label ( cred_label ( new ) ) ;
2017-01-27 15:09:40 +03:00
cred_label ( new ) = aa_get_newest_label ( ctx - > previous ) ;
2017-01-27 14:53:53 +03:00
AA_BUG ( ! cred_label ( new ) ) ;
2013-02-19 04:05:34 +04:00
/* clear exec && prev information when restoring to previous context */
2017-01-27 15:09:40 +03:00
aa_clear_task_ctx_trans ( ctx ) ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
2017-01-20 12:59:25 +03:00
2010-07-30 01:47:59 +04:00
return 0 ;
}