Thomas Gleixner | b886d83c | 2019-06-01 10:08:55 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 2 | /* |
| 3 | * AppArmor security module |
| 4 | * |
| 5 | * This file contains AppArmor ipc mediation |
| 6 | * |
| 7 | * Copyright (C) 1998-2008 Novell/SUSE |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 8 | * Copyright 2009-2017 Canonical Ltd. |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #include <linux/gfp.h> |
| 12 | #include <linux/ptrace.h> |
| 13 | |
| 14 | #include "include/audit.h" |
| 15 | #include "include/capability.h" |
John Johansen | d8889d4 | 2017-10-11 01:04:48 -0700 | [diff] [blame] | 16 | #include "include/cred.h" |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 17 | #include "include/policy.h" |
James Morris | 33f8bf5 | 2011-08-29 10:40:54 +1000 | [diff] [blame] | 18 | #include "include/ipc.h" |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 19 | #include "include/sig_names.h" |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 20 | |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 21 | /** |
| 22 | * audit_ptrace_mask - convert mask to permission string |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 23 | * @mask: permission mask to convert |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 24 | * |
| 25 | * Returns: pointer to static string |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 26 | */ |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 27 | static const char *audit_ptrace_mask(u32 mask) |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 28 | { |
| 29 | switch (mask) { |
| 30 | case MAY_READ: |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 31 | return "read"; |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 32 | case MAY_WRITE: |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 33 | return "trace"; |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 34 | case AA_MAY_BE_READ: |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 35 | return "readby"; |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 36 | case AA_MAY_BE_TRACED: |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 37 | return "tracedby"; |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 38 | } |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 39 | return ""; |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 40 | } |
| 41 | |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 42 | /* call back to audit ptrace fields */ |
John Johansen | 637f688 | 2017-06-09 08:14:28 -0700 | [diff] [blame] | 43 | static void audit_ptrace_cb(struct audit_buffer *ab, void *va) |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 44 | { |
| 45 | struct common_audit_data *sa = va; |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 46 | |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 47 | if (aad(sa)->request & AA_PTRACE_PERM_MASK) { |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 48 | audit_log_format(ab, " requested_mask=\"%s\"", |
| 49 | audit_ptrace_mask(aad(sa)->request)); |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 50 | |
| 51 | if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 52 | audit_log_format(ab, " denied_mask=\"%s\"", |
| 53 | audit_ptrace_mask(aad(sa)->denied)); |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 54 | } |
| 55 | } |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 56 | audit_log_format(ab, " peer="); |
John Johansen | 637f688 | 2017-06-09 08:14:28 -0700 | [diff] [blame] | 57 | aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, |
| 58 | FLAGS_NONE, GFP_ATOMIC); |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 59 | } |
| 60 | |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 61 | /* assumes check for PROFILE_MEDIATES is already done */ |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 62 | /* TODO: conditionals */ |
| 63 | static int profile_ptrace_perm(struct aa_profile *profile, |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 64 | struct aa_label *peer, u32 request, |
| 65 | struct common_audit_data *sa) |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 66 | { |
| 67 | struct aa_perms perms = { }; |
| 68 | |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 69 | aad(sa)->peer = peer; |
| 70 | aa_profile_match_label(profile, peer, AA_CLASS_PTRACE, request, |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 71 | &perms); |
| 72 | aa_apply_modes_to_perms(profile, &perms); |
| 73 | return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb); |
| 74 | } |
| 75 | |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 76 | static int profile_tracee_perm(struct aa_profile *tracee, |
| 77 | struct aa_label *tracer, u32 request, |
| 78 | struct common_audit_data *sa) |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 79 | { |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 80 | if (profile_unconfined(tracee) || unconfined(tracer) || |
| 81 | !PROFILE_MEDIATES(tracee, AA_CLASS_PTRACE)) |
| 82 | return 0; |
| 83 | |
| 84 | return profile_ptrace_perm(tracee, tracer, request, sa); |
| 85 | } |
| 86 | |
| 87 | static int profile_tracer_perm(struct aa_profile *tracer, |
| 88 | struct aa_label *tracee, u32 request, |
| 89 | struct common_audit_data *sa) |
| 90 | { |
| 91 | if (profile_unconfined(tracer)) |
| 92 | return 0; |
| 93 | |
John Johansen | 290f458 | 2017-06-09 14:38:35 -0700 | [diff] [blame] | 94 | if (PROFILE_MEDIATES(tracer, AA_CLASS_PTRACE)) |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 95 | return profile_ptrace_perm(tracer, tracee, request, sa); |
| 96 | |
| 97 | /* profile uses the old style capability check for ptrace */ |
| 98 | if (&tracer->label == tracee) |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 99 | return 0; |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 100 | |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 101 | aad(sa)->label = &tracer->label; |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 102 | aad(sa)->peer = tracee; |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 103 | aad(sa)->request = 0; |
Micah Morton | c1a85a0 | 2019-01-07 16:10:53 -0800 | [diff] [blame] | 104 | aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, |
| 105 | CAP_OPT_NONE); |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 106 | |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 107 | return aa_audit(AUDIT_APPARMOR_AUTO, tracer, sa, audit_ptrace_cb); |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 108 | } |
| 109 | |
| 110 | /** |
| 111 | * aa_may_ptrace - test if tracer task can trace the tracee |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 112 | * @tracer: label of the task doing the tracing (NOT NULL) |
| 113 | * @tracee: task label to be traced |
| 114 | * @request: permission request |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 115 | * |
| 116 | * Returns: %0 else error code if permission denied or error |
| 117 | */ |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 118 | int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee, |
| 119 | u32 request) |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 120 | { |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 121 | struct aa_profile *profile; |
| 122 | u32 xrequest = request << PTRACE_PERM_SHIFT; |
John Johansen | b2d09ae | 2017-06-09 14:22:14 -0700 | [diff] [blame] | 123 | DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_PTRACE); |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 124 | |
John Johansen | 0dda0b3 | 2017-12-08 17:43:18 -0800 | [diff] [blame] | 125 | return xcheck_labels(tracer, tracee, profile, |
| 126 | profile_tracer_perm(profile, tracee, request, &sa), |
| 127 | profile_tracee_perm(profile, tracer, xrequest, &sa)); |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 128 | } |
| 129 | |
John Johansen | 0ed3b28 | 2010-07-29 14:48:05 -0700 | [diff] [blame] | 130 | |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 131 | static inline int map_signal_num(int sig) |
| 132 | { |
| 133 | if (sig > SIGRTMAX) |
| 134 | return SIGUNKNOWN; |
| 135 | else if (sig >= SIGRTMIN) |
John Johansen | 3acfd5f | 2018-02-01 12:32:02 +0100 | [diff] [blame] | 136 | return sig - SIGRTMIN + SIGRT_BASE; |
John Johansen | f7dc4c9 | 2017-11-08 08:09:52 -0800 | [diff] [blame] | 137 | else if (sig < MAXMAPPED_SIG) |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 138 | return sig_map[sig]; |
| 139 | return SIGUNKNOWN; |
| 140 | } |
| 141 | |
| 142 | /** |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 143 | * audit_signal_mask - convert mask to permission string |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 144 | * @mask: permission mask to convert |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 145 | * |
| 146 | * Returns: pointer to static string |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 147 | */ |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 148 | static const char *audit_signal_mask(u32 mask) |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 149 | { |
| 150 | if (mask & MAY_READ) |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 151 | return "receive"; |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 152 | if (mask & MAY_WRITE) |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 153 | return "send"; |
| 154 | return ""; |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 155 | } |
| 156 | |
| 157 | /** |
| 158 | * audit_cb - call back for signal specific audit fields |
| 159 | * @ab: audit_buffer (NOT NULL) |
| 160 | * @va: audit struct to audit values of (NOT NULL) |
| 161 | */ |
| 162 | static void audit_signal_cb(struct audit_buffer *ab, void *va) |
| 163 | { |
| 164 | struct common_audit_data *sa = va; |
| 165 | |
| 166 | if (aad(sa)->request & AA_SIGNAL_PERM_MASK) { |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 167 | audit_log_format(ab, " requested_mask=\"%s\"", |
| 168 | audit_signal_mask(aad(sa)->request)); |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 169 | if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { |
Richard Guy Briggs | f1d9b23 | 2020-07-13 15:51:59 -0400 | [diff] [blame] | 170 | audit_log_format(ab, " denied_mask=\"%s\"", |
| 171 | audit_signal_mask(aad(sa)->denied)); |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 172 | } |
| 173 | } |
John Johansen | 3acfd5f | 2018-02-01 12:32:02 +0100 | [diff] [blame] | 174 | if (aad(sa)->signal == SIGUNKNOWN) |
| 175 | audit_log_format(ab, "signal=unknown(%d)", |
| 176 | aad(sa)->unmappedsig); |
| 177 | else if (aad(sa)->signal < MAXMAPPED_SIGNAME) |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 178 | audit_log_format(ab, " signal=%s", sig_names[aad(sa)->signal]); |
| 179 | else |
| 180 | audit_log_format(ab, " signal=rtmin+%d", |
John Johansen | 3acfd5f | 2018-02-01 12:32:02 +0100 | [diff] [blame] | 181 | aad(sa)->signal - SIGRT_BASE); |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 182 | audit_log_format(ab, " peer="); |
| 183 | aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, |
| 184 | FLAGS_NONE, GFP_ATOMIC); |
| 185 | } |
| 186 | |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 187 | static int profile_signal_perm(struct aa_profile *profile, |
John Johansen | 3dc6b1c | 2017-12-12 01:02:13 -0800 | [diff] [blame] | 188 | struct aa_label *peer, u32 request, |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 189 | struct common_audit_data *sa) |
| 190 | { |
| 191 | struct aa_perms perms; |
John Johansen | 3dc6b1c | 2017-12-12 01:02:13 -0800 | [diff] [blame] | 192 | unsigned int state; |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 193 | |
| 194 | if (profile_unconfined(profile) || |
| 195 | !PROFILE_MEDIATES(profile, AA_CLASS_SIGNAL)) |
| 196 | return 0; |
| 197 | |
John Johansen | 3dc6b1c | 2017-12-12 01:02:13 -0800 | [diff] [blame] | 198 | aad(sa)->peer = peer; |
| 199 | /* TODO: secondary cache check <profile, profile, perm> */ |
| 200 | state = aa_dfa_next(profile->policy.dfa, |
| 201 | profile->policy.start[AA_CLASS_SIGNAL], |
| 202 | aad(sa)->signal); |
| 203 | aa_label_match(profile, peer, state, false, request, &perms); |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 204 | aa_apply_modes_to_perms(profile, &perms); |
| 205 | return aa_check_perms(profile, &perms, request, sa, audit_signal_cb); |
| 206 | } |
| 207 | |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 208 | int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig) |
| 209 | { |
John Johansen | 3dc6b1c | 2017-12-12 01:02:13 -0800 | [diff] [blame] | 210 | struct aa_profile *profile; |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 211 | DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_SIGNAL); |
| 212 | |
| 213 | aad(&sa)->signal = map_signal_num(sig); |
John Johansen | 3acfd5f | 2018-02-01 12:32:02 +0100 | [diff] [blame] | 214 | aad(&sa)->unmappedsig = sig; |
John Johansen | 3dc6b1c | 2017-12-12 01:02:13 -0800 | [diff] [blame] | 215 | return xcheck_labels(sender, target, profile, |
| 216 | profile_signal_perm(profile, target, MAY_WRITE, &sa), |
| 217 | profile_signal_perm(profile, sender, MAY_READ, &sa)); |
John Johansen | cd1dbf7 | 2017-07-18 22:56:22 -0700 | [diff] [blame] | 218 | } |