2010-07-30 01:47:59 +04:00
/*
* AppArmor security module
*
* This file contains AppArmor functions used to manipulate object security
* contexts .
*
* Copyright ( C ) 1998 - 2008 Novell / SUSE
* Copyright 2009 - 2010 Canonical Ltd .
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation , version 2 of the
* License .
*
*
2017-01-16 11:43:00 +03:00
* AppArmor sets confinement on every task , via the the aa_task_ctx and
* the aa_task_ctx . profile , both of which are required and are not allowed
* to be NULL . The aa_task_ctx is not reference counted and is unique
2010-07-30 01:47:59 +04:00
* to each cred ( which is reference count ) . The profile pointed to by
2017-01-16 11:43:00 +03:00
* the task_ctx is reference counted .
2010-07-30 01:47:59 +04:00
*
* TODO
* If a task uses change_hat it currently does not return to the old
* cred or task context but instead creates a new one . Ideally the task
* should return to the previous cred if it has not been modified .
*
*/
# include "include/context.h"
# include "include/policy.h"
/**
2017-01-16 11:43:00 +03:00
* aa_alloc_task_context - allocate a new task_ctx
2010-07-30 01:47:59 +04:00
* @ flags : gfp flags for allocation
*
* Returns : allocated buffer or NULL on failure
*/
2017-01-16 11:43:00 +03:00
struct aa_task_ctx * aa_alloc_task_context ( gfp_t flags )
2010-07-30 01:47:59 +04:00
{
2017-01-16 11:43:00 +03:00
return kzalloc ( sizeof ( struct aa_task_ctx ) , flags ) ;
2010-07-30 01:47:59 +04:00
}
/**
2017-01-16 11:43:00 +03:00
* aa_free_task_context - free a task_ctx
* @ ctx : task_ctx to free ( MAYBE NULL )
2010-07-30 01:47:59 +04:00
*/
2017-01-16 11:43:00 +03:00
void aa_free_task_context ( struct aa_task_ctx * ctx )
2010-07-30 01:47:59 +04:00
{
2017-01-16 11:43:00 +03:00
if ( ctx ) {
aa_put_profile ( ctx - > profile ) ;
aa_put_profile ( ctx - > previous ) ;
aa_put_profile ( ctx - > onexec ) ;
2010-07-30 01:47:59 +04:00
2017-01-16 11:43:00 +03:00
kzfree ( ctx ) ;
2010-07-30 01:47:59 +04:00
}
}
/**
* aa_dup_task_context - duplicate a task context , incrementing reference counts
* @ new : a blank task context ( NOT NULL )
* @ old : the task context to copy ( NOT NULL )
*/
2017-01-16 11:43:00 +03:00
void aa_dup_task_context ( struct aa_task_ctx * new , const struct aa_task_ctx * old )
2010-07-30 01:47:59 +04:00
{
* new = * old ;
aa_get_profile ( new - > profile ) ;
aa_get_profile ( new - > previous ) ;
aa_get_profile ( new - > onexec ) ;
}
2013-02-19 04:03:34 +04:00
/**
* aa_get_task_profile - Get another task ' s profile
* @ task : task to query ( NOT NULL )
*
* Returns : counted reference to @ task ' s profile
*/
struct aa_profile * aa_get_task_profile ( struct task_struct * task )
{
struct aa_profile * p ;
rcu_read_lock ( ) ;
2017-06-09 12:08:28 +03:00
p = aa_get_newest_profile ( __aa_task_raw_profile ( task ) ) ;
2013-02-19 04:03:34 +04:00
rcu_read_unlock ( ) ;
return p ;
}
2010-07-30 01:47:59 +04:00
/**
* aa_replace_current_profile - replace the current tasks profiles
* @ profile : new profile ( NOT NULL )
*
* Returns : 0 or error on failure
*/
int aa_replace_current_profile ( struct aa_profile * profile )
{
2017-01-16 11:43:00 +03:00
struct aa_task_ctx * ctx = current_ctx ( ) ;
2010-07-30 01:47:59 +04:00
struct cred * new ;
2017-01-16 11:43:15 +03:00
AA_BUG ( ! profile ) ;
2010-07-30 01:47:59 +04:00
2017-01-16 11:43:00 +03:00
if ( ctx - > profile = = profile )
2010-07-30 01:47:59 +04:00
return 0 ;
2017-01-16 11:42:59 +03:00
if ( current_cred ( ) ! = current_real_cred ( ) )
return - EBUSY ;
2010-07-30 01:47:59 +04:00
new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2017-01-16 11:43:00 +03:00
ctx = cred_ctx ( new ) ;
if ( unconfined ( profile ) | | ( ctx - > profile - > ns ! = profile - > ns ) )
2010-07-30 01:47:59 +04:00
/* if switching to unconfined or a different profile namespace
* clear out context state
*/
2017-01-16 11:43:00 +03:00
aa_clear_task_ctx_trans ( ctx ) ;
2013-02-19 04:05:34 +04:00
2017-01-16 11:43:00 +03:00
/*
* be careful switching ctx - > profile , when racing replacement it
* is possible that ctx - > profile - > proxy - > profile is the reference
2013-07-11 08:07:43 +04:00
* keeping @ profile valid , so make sure to get its reference before
2017-01-16 11:43:00 +03:00
* dropping the reference on ctx - > profile
*/
2010-07-30 01:47:59 +04:00
aa_get_profile ( profile ) ;
2017-01-16 11:43:00 +03:00
aa_put_profile ( ctx - > profile ) ;
ctx - > profile = profile ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}
/**
* aa_set_current_onexec - set the tasks change_profile to happen onexec
* @ profile : system profile to set at exec ( MAYBE NULL to clear value )
*
* Returns : 0 or error on failure
*/
int aa_set_current_onexec ( struct aa_profile * profile )
{
2017-01-16 11:43:00 +03:00
struct aa_task_ctx * ctx ;
2010-07-30 01:47:59 +04:00
struct cred * new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2017-01-16 11:43:00 +03:00
ctx = cred_ctx ( new ) ;
2010-07-30 01:47:59 +04:00
aa_get_profile ( profile ) ;
2017-01-16 11:43:00 +03:00
aa_put_profile ( ctx - > onexec ) ;
ctx - > onexec = profile ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}
/**
* aa_set_current_hat - set the current tasks hat
* @ profile : profile to set as the current hat ( NOT NULL )
* @ token : token value that must be specified to change from the hat
*
* Do switch of tasks hat . If the task is currently in a hat
* validate the token to match .
*
* Returns : 0 or error on failure
*/
int aa_set_current_hat ( struct aa_profile * profile , u64 token )
{
2017-01-16 11:43:00 +03:00
struct aa_task_ctx * ctx ;
2010-07-30 01:47:59 +04:00
struct cred * new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2017-01-16 11:43:15 +03:00
AA_BUG ( ! profile ) ;
2010-07-30 01:47:59 +04:00
2017-01-16 11:43:00 +03:00
ctx = cred_ctx ( new ) ;
if ( ! ctx - > previous ) {
2010-07-30 01:47:59 +04:00
/* transfer refcount */
2017-01-16 11:43:00 +03:00
ctx - > previous = ctx - > profile ;
ctx - > token = token ;
} else if ( ctx - > token = = token ) {
aa_put_profile ( ctx - > profile ) ;
2010-07-30 01:47:59 +04:00
} else {
2017-01-16 11:43:00 +03:00
/* previous_profile && ctx->token != token */
2010-07-30 01:47:59 +04:00
abort_creds ( new ) ;
return - EACCES ;
}
2017-01-16 11:43:00 +03:00
ctx - > profile = aa_get_newest_profile ( profile ) ;
2010-07-30 01:47:59 +04:00
/* clear exec on switching context */
2017-01-16 11:43:00 +03:00
aa_put_profile ( ctx - > onexec ) ;
ctx - > onexec = NULL ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}
/**
* aa_restore_previous_profile - exit from hat context restoring the profile
* @ token : the token that must be matched to exit hat context
*
* Attempt to return out of a hat to the previous profile . The token
* must match the stored token value .
*
* Returns : 0 or error of failure
*/
int aa_restore_previous_profile ( u64 token )
{
2017-01-16 11:43:00 +03:00
struct aa_task_ctx * ctx ;
2010-07-30 01:47:59 +04:00
struct cred * new = prepare_creds ( ) ;
if ( ! new )
return - ENOMEM ;
2017-01-16 11:43:00 +03:00
ctx = cred_ctx ( new ) ;
if ( ctx - > token ! = token ) {
2010-07-30 01:47:59 +04:00
abort_creds ( new ) ;
return - EACCES ;
}
/* ignore restores when there is no saved profile */
2017-01-16 11:43:00 +03:00
if ( ! ctx - > previous ) {
2010-07-30 01:47:59 +04:00
abort_creds ( new ) ;
return 0 ;
}
2017-01-16 11:43:00 +03:00
aa_put_profile ( ctx - > profile ) ;
ctx - > profile = aa_get_newest_profile ( ctx - > previous ) ;
AA_BUG ( ! ctx - > profile ) ;
2013-02-19 04:05:34 +04:00
/* clear exec && prev information when restoring to previous context */
2017-01-16 11:43:00 +03:00
aa_clear_task_ctx_trans ( ctx ) ;
2010-07-30 01:47:59 +04:00
commit_creds ( new ) ;
return 0 ;
}