Commit 5b636857 authored by Tetsuo Handa's avatar Tetsuo Handa Committed by James Morris

TOMOYO: Allow using argv[]/envp[] of execve() as conditions.

This patch adds support for permission checks using argv[]/envp[] of execve()
request. Hooks are in the last patch of this pathset.
Signed-off-by: default avatarTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent 2ca9bf45
...@@ -9,6 +9,104 @@ ...@@ -9,6 +9,104 @@
#include "common.h" #include "common.h"
#include <linux/slab.h> #include <linux/slab.h>
/**
* tomoyo_print_bprm - Print "struct linux_binprm" for auditing.
*
* @bprm: Pointer to "struct linux_binprm".
* @dump: Pointer to "struct tomoyo_page_dump".
*
* Returns the contents of @bprm on success, NULL otherwise.
*
* This function uses kzalloc(), so caller must kfree() if this function
* didn't return NULL.
*/
static char *tomoyo_print_bprm(struct linux_binprm *bprm,
struct tomoyo_page_dump *dump)
{
static const int tomoyo_buffer_len = 4096 * 2;
char *buffer = kzalloc(tomoyo_buffer_len, GFP_NOFS);
char *cp;
char *last_start;
int len;
unsigned long pos = bprm->p;
int offset = pos % PAGE_SIZE;
int argv_count = bprm->argc;
int envp_count = bprm->envc;
bool truncated = false;
if (!buffer)
return NULL;
len = snprintf(buffer, tomoyo_buffer_len - 1, "argv[]={ ");
cp = buffer + len;
if (!argv_count) {
memmove(cp, "} envp[]={ ", 11);
cp += 11;
}
last_start = cp;
while (argv_count || envp_count) {
if (!tomoyo_dump_page(bprm, pos, dump))
goto out;
pos += PAGE_SIZE - offset;
/* Read. */
while (offset < PAGE_SIZE) {
const char *kaddr = dump->data;
const unsigned char c = kaddr[offset++];
if (cp == last_start)
*cp++ = '"';
if (cp >= buffer + tomoyo_buffer_len - 32) {
/* Reserve some room for "..." string. */
truncated = true;
} else if (c == '\\') {
*cp++ = '\\';
*cp++ = '\\';
} else if (c > ' ' && c < 127) {
*cp++ = c;
} else if (!c) {
*cp++ = '"';
*cp++ = ' ';
last_start = cp;
} else {
*cp++ = '\\';
*cp++ = (c >> 6) + '0';
*cp++ = ((c >> 3) & 7) + '0';
*cp++ = (c & 7) + '0';
}
if (c)
continue;
if (argv_count) {
if (--argv_count == 0) {
if (truncated) {
cp = last_start;
memmove(cp, "... ", 4);
cp += 4;
}
memmove(cp, "} envp[]={ ", 11);
cp += 11;
last_start = cp;
truncated = false;
}
} else if (envp_count) {
if (--envp_count == 0) {
if (truncated) {
cp = last_start;
memmove(cp, "... ", 4);
cp += 4;
}
}
}
if (!argv_count && !envp_count)
break;
}
offset = 0;
}
*cp++ = '}';
*cp = '\0';
return buffer;
out:
snprintf(buffer, tomoyo_buffer_len - 1,
"argv[]={ ... } envp[]= { ... }");
return buffer;
}
/** /**
* tomoyo_filetype - Get string representation of file type. * tomoyo_filetype - Get string representation of file type.
* *
...@@ -139,6 +237,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -139,6 +237,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
va_list args) va_list args)
{ {
char *buf = NULL; char *buf = NULL;
char *bprm_info = NULL;
const char *header = NULL; const char *header = NULL;
char *realpath = NULL; char *realpath = NULL;
const char *symlink = NULL; const char *symlink = NULL;
...@@ -152,10 +251,11 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -152,10 +251,11 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
if (r->ee) { if (r->ee) {
struct file *file = r->ee->bprm->file; struct file *file = r->ee->bprm->file;
realpath = tomoyo_realpath_from_path(&file->f_path); realpath = tomoyo_realpath_from_path(&file->f_path);
if (!realpath) bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump);
if (!realpath || !bprm_info)
goto out; goto out;
/* +80 is for " exec={ realpath=\"%s\" }" */ /* +80 is for " exec={ realpath=\"%s\" argc=%d envc=%d %s }" */
len += strlen(realpath) + 80; len += strlen(realpath) + 80 + strlen(bprm_info);
} else if (r->obj && r->obj->symlink_target) { } else if (r->obj && r->obj->symlink_target) {
symlink = r->obj->symlink_target->name; symlink = r->obj->symlink_target->name;
/* +18 is for " symlink.target=\"%s\"" */ /* +18 is for " symlink.target=\"%s\"" */
...@@ -168,8 +268,10 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -168,8 +268,10 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
len--; len--;
pos = snprintf(buf, len, "%s", header); pos = snprintf(buf, len, "%s", header);
if (realpath) { if (realpath) {
struct linux_binprm *bprm = r->ee->bprm;
pos += snprintf(buf + pos, len - pos, pos += snprintf(buf + pos, len - pos,
" exec={ realpath=\"%s\" }", realpath); " exec={ realpath=\"%s\" argc=%d envc=%d %s }",
realpath, bprm->argc, bprm->envc, bprm_info);
} else if (symlink) } else if (symlink)
pos += snprintf(buf + pos, len - pos, " symlink.target=\"%s\"", pos += snprintf(buf + pos, len - pos, " symlink.target=\"%s\"",
symlink); symlink);
...@@ -177,6 +279,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -177,6 +279,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
vsnprintf(buf + pos, len - pos, fmt, args); vsnprintf(buf + pos, len - pos, fmt, args);
out: out:
kfree(realpath); kfree(realpath);
kfree(bprm_info);
kfree(header); kfree(header);
return buf; return buf;
} }
......
...@@ -60,6 +60,8 @@ const char * const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] = { ...@@ -60,6 +60,8 @@ const char * const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] = {
[TOMOYO_TASK_FSGID] = "task.fsgid", [TOMOYO_TASK_FSGID] = "task.fsgid",
[TOMOYO_TASK_PID] = "task.pid", [TOMOYO_TASK_PID] = "task.pid",
[TOMOYO_TASK_PPID] = "task.ppid", [TOMOYO_TASK_PPID] = "task.ppid",
[TOMOYO_EXEC_ARGC] = "exec.argc",
[TOMOYO_EXEC_ENVC] = "exec.envc",
[TOMOYO_TYPE_IS_SOCKET] = "socket", [TOMOYO_TYPE_IS_SOCKET] = "socket",
[TOMOYO_TYPE_IS_SYMLINK] = "symlink", [TOMOYO_TYPE_IS_SYMLINK] = "symlink",
[TOMOYO_TYPE_IS_FILE] = "file", [TOMOYO_TYPE_IS_FILE] = "file",
...@@ -1127,12 +1129,22 @@ static bool tomoyo_print_condition(struct tomoyo_io_buffer *head, ...@@ -1127,12 +1129,22 @@ static bool tomoyo_print_condition(struct tomoyo_io_buffer *head,
const struct tomoyo_name_union *names_p = const struct tomoyo_name_union *names_p =
(typeof(names_p)) (typeof(names_p))
(numbers_p + cond->numbers_count); (numbers_p + cond->numbers_count);
const struct tomoyo_argv *argv =
(typeof(argv)) (names_p + cond->names_count);
const struct tomoyo_envp *envp =
(typeof(envp)) (argv + cond->argc);
u16 skip; u16 skip;
for (skip = 0; skip < head->r.cond_index; skip++) { for (skip = 0; skip < head->r.cond_index; skip++) {
const u8 left = condp->left; const u8 left = condp->left;
const u8 right = condp->right; const u8 right = condp->right;
condp++; condp++;
switch (left) { switch (left) {
case TOMOYO_ARGV_ENTRY:
argv++;
continue;
case TOMOYO_ENVP_ENTRY:
envp++;
continue;
case TOMOYO_NUMBER_UNION: case TOMOYO_NUMBER_UNION:
numbers_p++; numbers_p++;
break; break;
...@@ -1156,6 +1168,34 @@ static bool tomoyo_print_condition(struct tomoyo_io_buffer *head, ...@@ -1156,6 +1168,34 @@ static bool tomoyo_print_condition(struct tomoyo_io_buffer *head,
head->r.cond_index++; head->r.cond_index++;
tomoyo_set_space(head); tomoyo_set_space(head);
switch (left) { switch (left) {
case TOMOYO_ARGV_ENTRY:
tomoyo_io_printf(head,
"exec.argv[%lu]%s=\"",
argv->index, argv->
is_not ? "!" : "");
tomoyo_set_string(head,
argv->value->name);
tomoyo_set_string(head, "\"");
argv++;
continue;
case TOMOYO_ENVP_ENTRY:
tomoyo_set_string(head,
"exec.envp[\"");
tomoyo_set_string(head,
envp->name->name);
tomoyo_io_printf(head, "\"]%s=", envp->
is_not ? "!" : "");
if (envp->value) {
tomoyo_set_string(head, "\"");
tomoyo_set_string(head, envp->
value->name);
tomoyo_set_string(head, "\"");
} else {
tomoyo_set_string(head,
"NULL");
}
envp++;
continue;
case TOMOYO_NUMBER_UNION: case TOMOYO_NUMBER_UNION:
tomoyo_print_number_union_nospace tomoyo_print_number_union_nospace
(head, numbers_p++); (head, numbers_p++);
...@@ -1726,6 +1766,7 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header) ...@@ -1726,6 +1766,7 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
{ {
char *buffer; char *buffer;
char *realpath = NULL; char *realpath = NULL;
char *argv0 = NULL;
char *symlink = NULL; char *symlink = NULL;
char *cp = strchr(header, '\n'); char *cp = strchr(header, '\n');
int len; int len;
...@@ -1738,6 +1779,11 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header) ...@@ -1738,6 +1779,11 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
len = strlen(cp) + 1; len = strlen(cp) + 1;
/* strstr() will return NULL if ordering is wrong. */ /* strstr() will return NULL if ordering is wrong. */
if (*cp == 'f') { if (*cp == 'f') {
argv0 = strstr(header, " argv[]={ \"");
if (argv0) {
argv0 += 10;
len += tomoyo_truncate(argv0) + 14;
}
realpath = strstr(header, " exec={ realpath=\""); realpath = strstr(header, " exec={ realpath=\"");
if (realpath) { if (realpath) {
realpath += 8; realpath += 8;
...@@ -1753,6 +1799,8 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header) ...@@ -1753,6 +1799,8 @@ static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
snprintf(buffer, len - 1, "%s", cp); snprintf(buffer, len - 1, "%s", cp);
if (realpath) if (realpath)
tomoyo_addprintf(buffer, len, " exec.%s", realpath); tomoyo_addprintf(buffer, len, " exec.%s", realpath);
if (argv0)
tomoyo_addprintf(buffer, len, " exec.argv[0]=%s", argv0);
if (symlink) if (symlink)
tomoyo_addprintf(buffer, len, "%s", symlink); tomoyo_addprintf(buffer, len, "%s", symlink);
tomoyo_normalize_line(buffer); tomoyo_normalize_line(buffer);
......
...@@ -54,6 +54,8 @@ enum tomoyo_conditions_index { ...@@ -54,6 +54,8 @@ enum tomoyo_conditions_index {
TOMOYO_TASK_FSGID, /* current_fsgid() */ TOMOYO_TASK_FSGID, /* current_fsgid() */
TOMOYO_TASK_PID, /* sys_getpid() */ TOMOYO_TASK_PID, /* sys_getpid() */
TOMOYO_TASK_PPID, /* sys_getppid() */ TOMOYO_TASK_PPID, /* sys_getppid() */
TOMOYO_EXEC_ARGC, /* "struct linux_binprm *"->argc */
TOMOYO_EXEC_ENVC, /* "struct linux_binprm *"->envc */
TOMOYO_TYPE_IS_SOCKET, /* S_IFSOCK */ TOMOYO_TYPE_IS_SOCKET, /* S_IFSOCK */
TOMOYO_TYPE_IS_SYMLINK, /* S_IFLNK */ TOMOYO_TYPE_IS_SYMLINK, /* S_IFLNK */
TOMOYO_TYPE_IS_FILE, /* S_IFREG */ TOMOYO_TYPE_IS_FILE, /* S_IFREG */
...@@ -104,6 +106,8 @@ enum tomoyo_conditions_index { ...@@ -104,6 +106,8 @@ enum tomoyo_conditions_index {
TOMOYO_MAX_CONDITION_KEYWORD, TOMOYO_MAX_CONDITION_KEYWORD,
TOMOYO_NUMBER_UNION, TOMOYO_NUMBER_UNION,
TOMOYO_NAME_UNION, TOMOYO_NAME_UNION,
TOMOYO_ARGV_ENTRY,
TOMOYO_ENVP_ENTRY,
}; };
...@@ -467,6 +471,12 @@ struct tomoyo_mini_stat { ...@@ -467,6 +471,12 @@ struct tomoyo_mini_stat {
dev_t rdev; dev_t rdev;
}; };
/* Structure for dumping argv[] and envp[] of "struct linux_binprm". */
struct tomoyo_page_dump {
struct page *page; /* Previously dumped page. */
char *data; /* Contents of "page". Size is PAGE_SIZE. */
};
/* Structure for attribute checks in addition to pathname checks. */ /* Structure for attribute checks in addition to pathname checks. */
struct tomoyo_obj_info { struct tomoyo_obj_info {
/* /*
...@@ -491,20 +501,45 @@ struct tomoyo_obj_info { ...@@ -491,20 +501,45 @@ struct tomoyo_obj_info {
struct tomoyo_path_info *symlink_target; struct tomoyo_path_info *symlink_target;
}; };
/* Structure for argv[]. */
struct tomoyo_argv {
unsigned long index;
const struct tomoyo_path_info *value;
bool is_not;
};
/* Structure for envp[]. */
struct tomoyo_envp {
const struct tomoyo_path_info *name;
const struct tomoyo_path_info *value;
bool is_not;
};
/* Structure for execve() operation. */ /* Structure for execve() operation. */
struct tomoyo_execve { struct tomoyo_execve {
struct tomoyo_request_info r; struct tomoyo_request_info r;
struct tomoyo_obj_info obj; struct tomoyo_obj_info obj;
struct linux_binprm *bprm; struct linux_binprm *bprm;
/* For dumping argv[] and envp[]. */
struct tomoyo_page_dump dump;
/* For temporary use. */ /* For temporary use. */
char *tmp; /* Size is TOMOYO_EXEC_TMPSIZE bytes */ char *tmp; /* Size is TOMOYO_EXEC_TMPSIZE bytes */
}; };
/* Structure for entries which follows "struct tomoyo_condition". */ /* Structure for entries which follows "struct tomoyo_condition". */
struct tomoyo_condition_element { struct tomoyo_condition_element {
/* Left hand operand. */ /*
* Left hand operand. A "struct tomoyo_argv" for TOMOYO_ARGV_ENTRY, a
* "struct tomoyo_envp" for TOMOYO_ENVP_ENTRY is attached to the tail
* of the array of this struct.
*/
u8 left; u8 left;
/* Right hand operand. */ /*
* Right hand operand. A "struct tomoyo_number_union" for
* TOMOYO_NUMBER_UNION, a "struct tomoyo_name_union" for
* TOMOYO_NAME_UNION is attached to the tail of the array of this
* struct.
*/
u8 right; u8 right;
/* Equation operator. True if equals or overlaps, false otherwise. */ /* Equation operator. True if equals or overlaps, false otherwise. */
bool equals; bool equals;
...@@ -517,10 +552,14 @@ struct tomoyo_condition { ...@@ -517,10 +552,14 @@ struct tomoyo_condition {
u16 condc; /* Number of conditions in this struct. */ u16 condc; /* Number of conditions in this struct. */
u16 numbers_count; /* Number of "struct tomoyo_number_union values". */ u16 numbers_count; /* Number of "struct tomoyo_number_union values". */
u16 names_count; /* Number of "struct tomoyo_name_union names". */ u16 names_count; /* Number of "struct tomoyo_name_union names". */
u16 argc; /* Number of "struct tomoyo_argv". */
u16 envc; /* Number of "struct tomoyo_envp". */
/* /*
* struct tomoyo_condition_element condition[condc]; * struct tomoyo_condition_element condition[condc];
* struct tomoyo_number_union values[numbers_count]; * struct tomoyo_number_union values[numbers_count];
* struct tomoyo_name_union names[names_count]; * struct tomoyo_name_union names[names_count];
* struct tomoyo_argv argv[argc];
* struct tomoyo_envp envp[envc];
*/ */
}; };
...@@ -751,6 +790,8 @@ bool tomoyo_correct_path(const char *filename); ...@@ -751,6 +790,8 @@ bool tomoyo_correct_path(const char *filename);
bool tomoyo_correct_word(const char *string); bool tomoyo_correct_word(const char *string);
bool tomoyo_domain_def(const unsigned char *buffer); bool tomoyo_domain_def(const unsigned char *buffer);
bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r); bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r);
bool tomoyo_dump_page(struct linux_binprm *bprm, unsigned long pos,
struct tomoyo_page_dump *dump);
bool tomoyo_memory_ok(void *ptr); bool tomoyo_memory_ok(void *ptr);
bool tomoyo_number_matches_group(const unsigned long min, bool tomoyo_number_matches_group(const unsigned long min,
const unsigned long max, const unsigned long max,
......
This diff is collapsed.
...@@ -713,3 +713,49 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -713,3 +713,49 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
kfree(tmp); kfree(tmp);
return retval; return retval;
} }
/**
* tomoyo_dump_page - Dump a page to buffer.
*
* @bprm: Pointer to "struct linux_binprm".
* @pos: Location to dump.
* @dump: Poiner to "struct tomoyo_page_dump".
*
* Returns true on success, false otherwise.
*/
bool tomoyo_dump_page(struct linux_binprm *bprm, unsigned long pos,
struct tomoyo_page_dump *dump)
{
struct page *page;
/* dump->data is released by tomoyo_finish_execve(). */
if (!dump->data) {
dump->data = kzalloc(PAGE_SIZE, GFP_NOFS);
if (!dump->data)
return false;
}
/* Same with get_arg_page(bprm, pos, 0) in fs/exec.c */
#ifdef CONFIG_MMU
if (get_user_pages(current, bprm->mm, pos, 1, 0, 1, &page, NULL) <= 0)
return false;
#else
page = bprm->page[pos / PAGE_SIZE];
#endif
if (page != dump->page) {
const unsigned int offset = pos % PAGE_SIZE;
/*
* Maybe kmap()/kunmap() should be used here.
* But remove_arg_zero() uses kmap_atomic()/kunmap_atomic().
* So do I.
*/
char *kaddr = kmap_atomic(page, KM_USER0);
dump->page = page;
memcpy(dump->data + offset, kaddr + offset,
PAGE_SIZE - offset);
kunmap_atomic(kaddr, KM_USER0);
}
/* Same with put_arg_page(page) in fs/exec.c */
#ifdef CONFIG_MMU
put_page(page);
#endif
return true;
}
...@@ -358,6 +358,8 @@ void tomoyo_del_condition(struct list_head *element) ...@@ -358,6 +358,8 @@ void tomoyo_del_condition(struct list_head *element)
const u16 condc = cond->condc; const u16 condc = cond->condc;
const u16 numbers_count = cond->numbers_count; const u16 numbers_count = cond->numbers_count;
const u16 names_count = cond->names_count; const u16 names_count = cond->names_count;
const u16 argc = cond->argc;
const u16 envc = cond->envc;
unsigned int i; unsigned int i;
const struct tomoyo_condition_element *condp const struct tomoyo_condition_element *condp
= (const struct tomoyo_condition_element *) (cond + 1); = (const struct tomoyo_condition_element *) (cond + 1);
...@@ -365,10 +367,20 @@ void tomoyo_del_condition(struct list_head *element) ...@@ -365,10 +367,20 @@ void tomoyo_del_condition(struct list_head *element)
= (struct tomoyo_number_union *) (condp + condc); = (struct tomoyo_number_union *) (condp + condc);
struct tomoyo_name_union *names_p struct tomoyo_name_union *names_p
= (struct tomoyo_name_union *) (numbers_p + numbers_count); = (struct tomoyo_name_union *) (numbers_p + numbers_count);
const struct tomoyo_argv *argv
= (const struct tomoyo_argv *) (names_p + names_count);
const struct tomoyo_envp *envp
= (const struct tomoyo_envp *) (argv + argc);
for (i = 0; i < numbers_count; i++) for (i = 0; i < numbers_count; i++)
tomoyo_put_number_union(numbers_p++); tomoyo_put_number_union(numbers_p++);
for (i = 0; i < names_count; i++) for (i = 0; i < names_count; i++)
tomoyo_put_name_union(names_p++); tomoyo_put_name_union(names_p++);
for (i = 0; i < argc; argv++, i++)
tomoyo_put_name(argv->value);
for (i = 0; i < envc; envp++, i++) {
tomoyo_put_name(envp->name);
tomoyo_put_name(envp->value);
}
} }
/** /**
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment