blob: 1cecdd7975971224683fc5f660eaf5e29d2fdacf [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Tetsuo Handa7c2ea222010-06-17 16:55:58 +09002/*
3 * security/tomoyo/group.c
4 *
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +09005 * Copyright (C) 2005-2011 NTT DATA CORPORATION
Tetsuo Handa7c2ea222010-06-17 16:55:58 +09006 */
7
8#include <linux/slab.h>
Ingo Molnarb2d09102017-02-04 01:27:20 +01009#include <linux/rculist.h>
10
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090011#include "common.h"
12
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +090013/**
14 * tomoyo_same_path_group - Check for duplicated "struct tomoyo_path_group" entry.
15 *
16 * @a: Pointer to "struct tomoyo_acl_head".
17 * @b: Pointer to "struct tomoyo_acl_head".
18 *
19 * Returns true if @a == @b, false otherwise.
20 */
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090021static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a,
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +090022 const struct tomoyo_acl_head *b)
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090023{
24 return container_of(a, struct tomoyo_path_group, head)->member_name ==
25 container_of(b, struct tomoyo_path_group, head)->member_name;
26}
27
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +090028/**
29 * tomoyo_same_number_group - Check for duplicated "struct tomoyo_number_group" entry.
30 *
31 * @a: Pointer to "struct tomoyo_acl_head".
32 * @b: Pointer to "struct tomoyo_acl_head".
33 *
34 * Returns true if @a == @b, false otherwise.
35 */
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090036static bool tomoyo_same_number_group(const struct tomoyo_acl_head *a,
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +090037 const struct tomoyo_acl_head *b)
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090038{
39 return !memcmp(&container_of(a, struct tomoyo_number_group, head)
40 ->number,
41 &container_of(b, struct tomoyo_number_group, head)
42 ->number,
43 sizeof(container_of(a, struct tomoyo_number_group, head)
44 ->number));
45}
46
47/**
Tetsuo Handa059d84d2011-09-10 15:23:54 +090048 * tomoyo_same_address_group - Check for duplicated "struct tomoyo_address_group" entry.
49 *
50 * @a: Pointer to "struct tomoyo_acl_head".
51 * @b: Pointer to "struct tomoyo_acl_head".
52 *
53 * Returns true if @a == @b, false otherwise.
54 */
55static bool tomoyo_same_address_group(const struct tomoyo_acl_head *a,
56 const struct tomoyo_acl_head *b)
57{
58 const struct tomoyo_address_group *p1 = container_of(a, typeof(*p1),
59 head);
60 const struct tomoyo_address_group *p2 = container_of(b, typeof(*p2),
61 head);
62
63 return tomoyo_same_ipaddr_union(&p1->address, &p2->address);
64}
65
66/**
67 * tomoyo_write_group - Write "struct tomoyo_path_group"/"struct tomoyo_number_group"/"struct tomoyo_address_group" list.
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090068 *
Tetsuo Handaa238cf52011-06-26 23:17:10 +090069 * @param: Pointer to "struct tomoyo_acl_param".
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +090070 * @type: Type of this group.
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090071 *
72 * Returns 0 on success, negative value otherwise.
73 */
Tetsuo Handaa238cf52011-06-26 23:17:10 +090074int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type)
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090075{
Tetsuo Handaa238cf52011-06-26 23:17:10 +090076 struct tomoyo_group *group = tomoyo_get_group(param, type);
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090077 int error = -EINVAL;
Tetsuo Handacdcf6722019-01-24 18:37:35 +090078
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090079 if (!group)
80 return -ENOMEM;
Tetsuo Handaa238cf52011-06-26 23:17:10 +090081 param->list = &group->member_list;
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090082 if (type == TOMOYO_PATH_GROUP) {
83 struct tomoyo_path_group e = { };
Tetsuo Handacdcf6722019-01-24 18:37:35 +090084
Tetsuo Handaa238cf52011-06-26 23:17:10 +090085 e.member_name = tomoyo_get_name(tomoyo_read_token(param));
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090086 if (!e.member_name) {
87 error = -ENOMEM;
88 goto out;
89 }
Tetsuo Handaa238cf52011-06-26 23:17:10 +090090 error = tomoyo_update_policy(&e.head, sizeof(e), param,
91 tomoyo_same_path_group);
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090092 tomoyo_put_name(e.member_name);
93 } else if (type == TOMOYO_NUMBER_GROUP) {
94 struct tomoyo_number_group e = { };
Tetsuo Handacdcf6722019-01-24 18:37:35 +090095
Tetsuo Handaa238cf52011-06-26 23:17:10 +090096 if (param->data[0] == '@' ||
97 !tomoyo_parse_number_union(param, &e.number))
Tetsuo Handa7c2ea222010-06-17 16:55:58 +090098 goto out;
Tetsuo Handaa238cf52011-06-26 23:17:10 +090099 error = tomoyo_update_policy(&e.head, sizeof(e), param,
100 tomoyo_same_number_group);
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900101 /*
102 * tomoyo_put_number_union() is not needed because
Tetsuo Handaa238cf52011-06-26 23:17:10 +0900103 * param->data[0] != '@'.
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900104 */
Tetsuo Handa059d84d2011-09-10 15:23:54 +0900105 } else {
106 struct tomoyo_address_group e = { };
107
108 if (param->data[0] == '@' ||
109 !tomoyo_parse_ipaddr_union(param, &e.address))
110 goto out;
111 error = tomoyo_update_policy(&e.head, sizeof(e), param,
112 tomoyo_same_address_group);
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900113 }
Tetsuo Handaa238cf52011-06-26 23:17:10 +0900114out:
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900115 tomoyo_put_group(group);
116 return error;
117}
118
119/**
120 * tomoyo_path_matches_group - Check whether the given pathname matches members of the given pathname group.
121 *
Tetsuo Handa0f2a55d2011-07-14 14:46:51 +0900122 * @pathname: The name of pathname.
123 * @group: Pointer to "struct tomoyo_path_group".
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900124 *
Tetsuo Handa484ca792010-07-29 14:29:55 +0900125 * Returns matched member's pathname if @pathname matches pathnames in @group,
126 * NULL otherwise.
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900127 *
128 * Caller holds tomoyo_read_lock().
129 */
Tetsuo Handa484ca792010-07-29 14:29:55 +0900130const struct tomoyo_path_info *
131tomoyo_path_matches_group(const struct tomoyo_path_info *pathname,
132 const struct tomoyo_group *group)
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900133{
134 struct tomoyo_path_group *member;
Tetsuo Handacdcf6722019-01-24 18:37:35 +0900135
Tetsuo Handa6bd5ce62019-12-16 19:16:48 +0900136 list_for_each_entry_rcu(member, &group->member_list, head.list,
137 srcu_read_lock_held(&tomoyo_ss)) {
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900138 if (member->head.is_deleted)
139 continue;
140 if (!tomoyo_path_matches_pattern(pathname, member->member_name))
141 continue;
Tetsuo Handa484ca792010-07-29 14:29:55 +0900142 return member->member_name;
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900143 }
Tetsuo Handa484ca792010-07-29 14:29:55 +0900144 return NULL;
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900145}
146
147/**
148 * tomoyo_number_matches_group - Check whether the given number matches members of the given number group.
149 *
150 * @min: Min number.
151 * @max: Max number.
152 * @group: Pointer to "struct tomoyo_number_group".
153 *
154 * Returns true if @min and @max partially overlaps @group, false otherwise.
155 *
156 * Caller holds tomoyo_read_lock().
157 */
158bool tomoyo_number_matches_group(const unsigned long min,
159 const unsigned long max,
160 const struct tomoyo_group *group)
161{
162 struct tomoyo_number_group *member;
163 bool matched = false;
Tetsuo Handacdcf6722019-01-24 18:37:35 +0900164
Tetsuo Handa6bd5ce62019-12-16 19:16:48 +0900165 list_for_each_entry_rcu(member, &group->member_list, head.list,
166 srcu_read_lock_held(&tomoyo_ss)) {
Tetsuo Handa7c2ea222010-06-17 16:55:58 +0900167 if (member->head.is_deleted)
168 continue;
169 if (min > member->number.values[1] ||
170 max < member->number.values[0])
171 continue;
172 matched = true;
173 break;
174 }
175 return matched;
176}
Tetsuo Handa059d84d2011-09-10 15:23:54 +0900177
178/**
179 * tomoyo_address_matches_group - Check whether the given address matches members of the given address group.
180 *
181 * @is_ipv6: True if @address is an IPv6 address.
182 * @address: An IPv4 or IPv6 address.
183 * @group: Pointer to "struct tomoyo_address_group".
184 *
185 * Returns true if @address matches addresses in @group group, false otherwise.
186 *
187 * Caller holds tomoyo_read_lock().
188 */
189bool tomoyo_address_matches_group(const bool is_ipv6, const __be32 *address,
190 const struct tomoyo_group *group)
191{
192 struct tomoyo_address_group *member;
193 bool matched = false;
194 const u8 size = is_ipv6 ? 16 : 4;
195
Tetsuo Handa6bd5ce62019-12-16 19:16:48 +0900196 list_for_each_entry_rcu(member, &group->member_list, head.list,
197 srcu_read_lock_held(&tomoyo_ss)) {
Tetsuo Handa059d84d2011-09-10 15:23:54 +0900198 if (member->head.is_deleted)
199 continue;
200 if (member->address.is_ipv6 != is_ipv6)
201 continue;
202 if (memcmp(&member->address.ip[0], address, size) > 0 ||
203 memcmp(address, &member->address.ip[1], size) > 0)
204 continue;
205 matched = true;
206 break;
207 }
208 return matched;
209}