diff options
author | James Morris <james.l.morris@oracle.com> | 2013-05-12 07:28:38 -0400 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2013-05-12 07:28:38 -0400 |
commit | bd71164abc141ea696014e3e23c561b0d7f1b434 (patch) | |
tree | 3b9c64698800566197bf4ecec604ba8bb1228bd3 | |
parent | f722406faae2d073cc1d01063d1123c35425939e (diff) | |
parent | 2654bfbc2bd0e1e64f0b257c21da23f6cec32c6c (diff) |
Merge tag 'aa-3.10' of git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor into ra-next
-rw-r--r-- | security/apparmor/audit.c | 2 | ||||
-rw-r--r-- | security/apparmor/context.c | 44 | ||||
-rw-r--r-- | security/apparmor/domain.c | 26 | ||||
-rw-r--r-- | security/apparmor/include/apparmor.h | 12 | ||||
-rw-r--r-- | security/apparmor/include/context.h | 61 | ||||
-rw-r--r-- | security/apparmor/include/file.h | 14 | ||||
-rw-r--r-- | security/apparmor/include/match.h | 21 | ||||
-rw-r--r-- | security/apparmor/include/policy.h | 16 | ||||
-rw-r--r-- | security/apparmor/include/procattr.h | 1 | ||||
-rw-r--r-- | security/apparmor/include/sid.h | 4 | ||||
-rw-r--r-- | security/apparmor/ipc.c | 13 | ||||
-rw-r--r-- | security/apparmor/lib.c | 20 | ||||
-rw-r--r-- | security/apparmor/lsm.c | 69 | ||||
-rw-r--r-- | security/apparmor/match.c | 23 | ||||
-rw-r--r-- | security/apparmor/path.c | 2 | ||||
-rw-r--r-- | security/apparmor/policy.c | 181 | ||||
-rw-r--r-- | security/apparmor/policy_unpack.c | 4 | ||||
-rw-r--r-- | security/apparmor/procattr.c | 6 | ||||
-rw-r--r-- | security/apparmor/resource.c | 15 |
19 files changed, 286 insertions, 248 deletions
diff --git a/security/apparmor/audit.c b/security/apparmor/audit.c index 3ae28db5a64f..031d2d9dd695 100644 --- a/security/apparmor/audit.c +++ b/security/apparmor/audit.c | |||
@@ -88,7 +88,7 @@ static const char *const aa_audit_type[] = { | |||
88 | "HINT", | 88 | "HINT", |
89 | "STATUS", | 89 | "STATUS", |
90 | "ERROR", | 90 | "ERROR", |
91 | "KILLED" | 91 | "KILLED", |
92 | "AUTO" | 92 | "AUTO" |
93 | }; | 93 | }; |
94 | 94 | ||
diff --git a/security/apparmor/context.c b/security/apparmor/context.c index 8a9b5027c813..d5af1d15f26d 100644 --- a/security/apparmor/context.c +++ b/security/apparmor/context.c | |||
@@ -69,6 +69,23 @@ void aa_dup_task_context(struct aa_task_cxt *new, const struct aa_task_cxt *old) | |||
69 | } | 69 | } |
70 | 70 | ||
71 | /** | 71 | /** |
72 | * aa_get_task_profile - Get another task's profile | ||
73 | * @task: task to query (NOT NULL) | ||
74 | * | ||
75 | * Returns: counted reference to @task's profile | ||
76 | */ | ||
77 | struct aa_profile *aa_get_task_profile(struct task_struct *task) | ||
78 | { | ||
79 | struct aa_profile *p; | ||
80 | |||
81 | rcu_read_lock(); | ||
82 | p = aa_get_profile(__aa_task_profile(task)); | ||
83 | rcu_read_unlock(); | ||
84 | |||
85 | return p; | ||
86 | } | ||
87 | |||
88 | /** | ||
72 | * aa_replace_current_profile - replace the current tasks profiles | 89 | * aa_replace_current_profile - replace the current tasks profiles |
73 | * @profile: new profile (NOT NULL) | 90 | * @profile: new profile (NOT NULL) |
74 | * | 91 | * |
@@ -76,7 +93,7 @@ void aa_dup_task_context(struct aa_task_cxt *new, const struct aa_task_cxt *old) | |||
76 | */ | 93 | */ |
77 | int aa_replace_current_profile(struct aa_profile *profile) | 94 | int aa_replace_current_profile(struct aa_profile *profile) |
78 | { | 95 | { |
79 | struct aa_task_cxt *cxt = current_cred()->security; | 96 | struct aa_task_cxt *cxt = current_cxt(); |
80 | struct cred *new; | 97 | struct cred *new; |
81 | BUG_ON(!profile); | 98 | BUG_ON(!profile); |
82 | 99 | ||
@@ -87,17 +104,13 @@ int aa_replace_current_profile(struct aa_profile *profile) | |||
87 | if (!new) | 104 | if (!new) |
88 | return -ENOMEM; | 105 | return -ENOMEM; |
89 | 106 | ||
90 | cxt = new->security; | 107 | cxt = cred_cxt(new); |
91 | if (unconfined(profile) || (cxt->profile->ns != profile->ns)) { | 108 | if (unconfined(profile) || (cxt->profile->ns != profile->ns)) |
92 | /* if switching to unconfined or a different profile namespace | 109 | /* if switching to unconfined or a different profile namespace |
93 | * clear out context state | 110 | * clear out context state |
94 | */ | 111 | */ |
95 | aa_put_profile(cxt->previous); | 112 | aa_clear_task_cxt_trans(cxt); |
96 | aa_put_profile(cxt->onexec); | 113 | |
97 | cxt->previous = NULL; | ||
98 | cxt->onexec = NULL; | ||
99 | cxt->token = 0; | ||
100 | } | ||
101 | /* be careful switching cxt->profile, when racing replacement it | 114 | /* be careful switching cxt->profile, when racing replacement it |
102 | * is possible that cxt->profile->replacedby is the reference keeping | 115 | * is possible that cxt->profile->replacedby is the reference keeping |
103 | * @profile valid, so make sure to get its reference before dropping | 116 | * @profile valid, so make sure to get its reference before dropping |
@@ -123,7 +136,7 @@ int aa_set_current_onexec(struct aa_profile *profile) | |||
123 | if (!new) | 136 | if (!new) |
124 | return -ENOMEM; | 137 | return -ENOMEM; |
125 | 138 | ||
126 | cxt = new->security; | 139 | cxt = cred_cxt(new); |
127 | aa_get_profile(profile); | 140 | aa_get_profile(profile); |
128 | aa_put_profile(cxt->onexec); | 141 | aa_put_profile(cxt->onexec); |
129 | cxt->onexec = profile; | 142 | cxt->onexec = profile; |
@@ -150,7 +163,7 @@ int aa_set_current_hat(struct aa_profile *profile, u64 token) | |||
150 | return -ENOMEM; | 163 | return -ENOMEM; |
151 | BUG_ON(!profile); | 164 | BUG_ON(!profile); |
152 | 165 | ||
153 | cxt = new->security; | 166 | cxt = cred_cxt(new); |
154 | if (!cxt->previous) { | 167 | if (!cxt->previous) { |
155 | /* transfer refcount */ | 168 | /* transfer refcount */ |
156 | cxt->previous = cxt->profile; | 169 | cxt->previous = cxt->profile; |
@@ -187,7 +200,7 @@ int aa_restore_previous_profile(u64 token) | |||
187 | if (!new) | 200 | if (!new) |
188 | return -ENOMEM; | 201 | return -ENOMEM; |
189 | 202 | ||
190 | cxt = new->security; | 203 | cxt = cred_cxt(new); |
191 | if (cxt->token != token) { | 204 | if (cxt->token != token) { |
192 | abort_creds(new); | 205 | abort_creds(new); |
193 | return -EACCES; | 206 | return -EACCES; |
@@ -205,11 +218,10 @@ int aa_restore_previous_profile(u64 token) | |||
205 | aa_get_profile(cxt->profile); | 218 | aa_get_profile(cxt->profile); |
206 | aa_put_profile(cxt->previous); | 219 | aa_put_profile(cxt->previous); |
207 | } | 220 | } |
208 | /* clear exec && prev information when restoring to previous context */ | 221 | /* ref has been transfered so avoid putting ref in clear_task_cxt */ |
209 | cxt->previous = NULL; | 222 | cxt->previous = NULL; |
210 | cxt->token = 0; | 223 | /* clear exec && prev information when restoring to previous context */ |
211 | aa_put_profile(cxt->onexec); | 224 | aa_clear_task_cxt_trans(cxt); |
212 | cxt->onexec = NULL; | ||
213 | 225 | ||
214 | commit_creds(new); | 226 | commit_creds(new); |
215 | return 0; | 227 | return 0; |
diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c index 859abdaac1ea..01b7bd669a88 100644 --- a/security/apparmor/domain.c +++ b/security/apparmor/domain.c | |||
@@ -62,17 +62,14 @@ static int may_change_ptraced_domain(struct task_struct *task, | |||
62 | struct aa_profile *to_profile) | 62 | struct aa_profile *to_profile) |
63 | { | 63 | { |
64 | struct task_struct *tracer; | 64 | struct task_struct *tracer; |
65 | const struct cred *cred = NULL; | ||
66 | struct aa_profile *tracerp = NULL; | 65 | struct aa_profile *tracerp = NULL; |
67 | int error = 0; | 66 | int error = 0; |
68 | 67 | ||
69 | rcu_read_lock(); | 68 | rcu_read_lock(); |
70 | tracer = ptrace_parent(task); | 69 | tracer = ptrace_parent(task); |
71 | if (tracer) { | 70 | if (tracer) |
72 | /* released below */ | 71 | /* released below */ |
73 | cred = get_task_cred(tracer); | 72 | tracerp = aa_get_task_profile(tracer); |
74 | tracerp = aa_cred_profile(cred); | ||
75 | } | ||
76 | 73 | ||
77 | /* not ptraced */ | 74 | /* not ptraced */ |
78 | if (!tracer || unconfined(tracerp)) | 75 | if (!tracer || unconfined(tracerp)) |
@@ -82,8 +79,7 @@ static int may_change_ptraced_domain(struct task_struct *task, | |||
82 | 79 | ||
83 | out: | 80 | out: |
84 | rcu_read_unlock(); | 81 | rcu_read_unlock(); |
85 | if (cred) | 82 | aa_put_profile(tracerp); |
86 | put_cred(cred); | ||
87 | 83 | ||
88 | return error; | 84 | return error; |
89 | } | 85 | } |
@@ -360,7 +356,7 @@ int apparmor_bprm_set_creds(struct linux_binprm *bprm) | |||
360 | if (bprm->cred_prepared) | 356 | if (bprm->cred_prepared) |
361 | return 0; | 357 | return 0; |
362 | 358 | ||
363 | cxt = bprm->cred->security; | 359 | cxt = cred_cxt(bprm->cred); |
364 | BUG_ON(!cxt); | 360 | BUG_ON(!cxt); |
365 | 361 | ||
366 | profile = aa_get_profile(aa_newest_version(cxt->profile)); | 362 | profile = aa_get_profile(aa_newest_version(cxt->profile)); |
@@ -443,6 +439,8 @@ int apparmor_bprm_set_creds(struct linux_binprm *bprm) | |||
443 | } else { | 439 | } else { |
444 | error = -ENOENT; | 440 | error = -ENOENT; |
445 | info = "profile not found"; | 441 | info = "profile not found"; |
442 | /* remove MAY_EXEC to audit as failure */ | ||
443 | perms.allow &= ~MAY_EXEC; | ||
446 | } | 444 | } |
447 | } | 445 | } |
448 | } else if (COMPLAIN_MODE(profile)) { | 446 | } else if (COMPLAIN_MODE(profile)) { |
@@ -514,11 +512,7 @@ x_clear: | |||
514 | cxt->profile = new_profile; | 512 | cxt->profile = new_profile; |
515 | 513 | ||
516 | /* clear out all temporary/transitional state from the context */ | 514 | /* clear out all temporary/transitional state from the context */ |
517 | aa_put_profile(cxt->previous); | 515 | aa_clear_task_cxt_trans(cxt); |
518 | aa_put_profile(cxt->onexec); | ||
519 | cxt->previous = NULL; | ||
520 | cxt->onexec = NULL; | ||
521 | cxt->token = 0; | ||
522 | 516 | ||
523 | audit: | 517 | audit: |
524 | error = aa_audit_file(profile, &perms, GFP_KERNEL, OP_EXEC, MAY_EXEC, | 518 | error = aa_audit_file(profile, &perms, GFP_KERNEL, OP_EXEC, MAY_EXEC, |
@@ -557,7 +551,7 @@ int apparmor_bprm_secureexec(struct linux_binprm *bprm) | |||
557 | void apparmor_bprm_committing_creds(struct linux_binprm *bprm) | 551 | void apparmor_bprm_committing_creds(struct linux_binprm *bprm) |
558 | { | 552 | { |
559 | struct aa_profile *profile = __aa_current_profile(); | 553 | struct aa_profile *profile = __aa_current_profile(); |
560 | struct aa_task_cxt *new_cxt = bprm->cred->security; | 554 | struct aa_task_cxt *new_cxt = cred_cxt(bprm->cred); |
561 | 555 | ||
562 | /* bail out if unconfined or not changing profile */ | 556 | /* bail out if unconfined or not changing profile */ |
563 | if ((new_cxt->profile == profile) || | 557 | if ((new_cxt->profile == profile) || |
@@ -634,7 +628,7 @@ int aa_change_hat(const char *hats[], int count, u64 token, bool permtest) | |||
634 | 628 | ||
635 | /* released below */ | 629 | /* released below */ |
636 | cred = get_current_cred(); | 630 | cred = get_current_cred(); |
637 | cxt = cred->security; | 631 | cxt = cred_cxt(cred); |
638 | profile = aa_cred_profile(cred); | 632 | profile = aa_cred_profile(cred); |
639 | previous_profile = cxt->previous; | 633 | previous_profile = cxt->previous; |
640 | 634 | ||
@@ -750,7 +744,6 @@ int aa_change_profile(const char *ns_name, const char *hname, bool onexec, | |||
750 | bool permtest) | 744 | bool permtest) |
751 | { | 745 | { |
752 | const struct cred *cred; | 746 | const struct cred *cred; |
753 | struct aa_task_cxt *cxt; | ||
754 | struct aa_profile *profile, *target = NULL; | 747 | struct aa_profile *profile, *target = NULL; |
755 | struct aa_namespace *ns = NULL; | 748 | struct aa_namespace *ns = NULL; |
756 | struct file_perms perms = {}; | 749 | struct file_perms perms = {}; |
@@ -770,7 +763,6 @@ int aa_change_profile(const char *ns_name, const char *hname, bool onexec, | |||
770 | } | 763 | } |
771 | 764 | ||
772 | cred = get_current_cred(); | 765 | cred = get_current_cred(); |
773 | cxt = cred->security; | ||
774 | profile = aa_cred_profile(cred); | 766 | profile = aa_cred_profile(cred); |
775 | 767 | ||
776 | /* | 768 | /* |
diff --git a/security/apparmor/include/apparmor.h b/security/apparmor/include/apparmor.h index 40aedd9f73ea..1ba2ca56a6ef 100644 --- a/security/apparmor/include/apparmor.h +++ b/security/apparmor/include/apparmor.h | |||
@@ -15,6 +15,7 @@ | |||
15 | #ifndef __APPARMOR_H | 15 | #ifndef __APPARMOR_H |
16 | #define __APPARMOR_H | 16 | #define __APPARMOR_H |
17 | 17 | ||
18 | #include <linux/slab.h> | ||
18 | #include <linux/fs.h> | 19 | #include <linux/fs.h> |
19 | 20 | ||
20 | #include "match.h" | 21 | #include "match.h" |
@@ -64,9 +65,18 @@ extern int apparmor_initialized __initdata; | |||
64 | /* fn's in lib */ | 65 | /* fn's in lib */ |
65 | char *aa_split_fqname(char *args, char **ns_name); | 66 | char *aa_split_fqname(char *args, char **ns_name); |
66 | void aa_info_message(const char *str); | 67 | void aa_info_message(const char *str); |
67 | void *kvmalloc(size_t size); | 68 | void *__aa_kvmalloc(size_t size, gfp_t flags); |
68 | void kvfree(void *buffer); | 69 | void kvfree(void *buffer); |
69 | 70 | ||
71 | static inline void *kvmalloc(size_t size) | ||
72 | { | ||
73 | return __aa_kvmalloc(size, 0); | ||
74 | } | ||
75 | |||
76 | static inline void *kvzalloc(size_t size) | ||
77 | { | ||
78 | return __aa_kvmalloc(size, __GFP_ZERO); | ||
79 | } | ||
70 | 80 | ||
71 | /** | 81 | /** |
72 | * aa_strneq - compare null terminated @str to a non null terminated substring | 82 | * aa_strneq - compare null terminated @str to a non null terminated substring |
diff --git a/security/apparmor/include/context.h b/security/apparmor/include/context.h index a9cbee4d9e48..d44ba5802e3d 100644 --- a/security/apparmor/include/context.h +++ b/security/apparmor/include/context.h | |||
@@ -21,6 +21,9 @@ | |||
21 | 21 | ||
22 | #include "policy.h" | 22 | #include "policy.h" |
23 | 23 | ||
24 | #define cred_cxt(X) (X)->security | ||
25 | #define current_cxt() cred_cxt(current_cred()) | ||
26 | |||
24 | /* struct aa_file_cxt - the AppArmor context the file was opened in | 27 | /* struct aa_file_cxt - the AppArmor context the file was opened in |
25 | * @perms: the permission the file was opened with | 28 | * @perms: the permission the file was opened with |
26 | * | 29 | * |
@@ -80,23 +83,8 @@ int aa_replace_current_profile(struct aa_profile *profile); | |||
80 | int aa_set_current_onexec(struct aa_profile *profile); | 83 | int aa_set_current_onexec(struct aa_profile *profile); |
81 | int aa_set_current_hat(struct aa_profile *profile, u64 token); | 84 | int aa_set_current_hat(struct aa_profile *profile, u64 token); |
82 | int aa_restore_previous_profile(u64 cookie); | 85 | int aa_restore_previous_profile(u64 cookie); |
86 | struct aa_profile *aa_get_task_profile(struct task_struct *task); | ||
83 | 87 | ||
84 | /** | ||
85 | * __aa_task_is_confined - determine if @task has any confinement | ||
86 | * @task: task to check confinement of (NOT NULL) | ||
87 | * | ||
88 | * If @task != current needs to be called in RCU safe critical section | ||
89 | */ | ||
90 | static inline bool __aa_task_is_confined(struct task_struct *task) | ||
91 | { | ||
92 | struct aa_task_cxt *cxt = __task_cred(task)->security; | ||
93 | |||
94 | BUG_ON(!cxt || !cxt->profile); | ||
95 | if (unconfined(aa_newest_version(cxt->profile))) | ||
96 | return 0; | ||
97 | |||
98 | return 1; | ||
99 | } | ||
100 | 88 | ||
101 | /** | 89 | /** |
102 | * aa_cred_profile - obtain cred's profiles | 90 | * aa_cred_profile - obtain cred's profiles |
@@ -108,12 +96,36 @@ static inline bool __aa_task_is_confined(struct task_struct *task) | |||
108 | */ | 96 | */ |
109 | static inline struct aa_profile *aa_cred_profile(const struct cred *cred) | 97 | static inline struct aa_profile *aa_cred_profile(const struct cred *cred) |
110 | { | 98 | { |
111 | struct aa_task_cxt *cxt = cred->security; | 99 | struct aa_task_cxt *cxt = cred_cxt(cred); |
112 | BUG_ON(!cxt || !cxt->profile); | 100 | BUG_ON(!cxt || !cxt->profile); |
113 | return aa_newest_version(cxt->profile); | 101 | return aa_newest_version(cxt->profile); |
114 | } | 102 | } |
115 | 103 | ||
116 | /** | 104 | /** |
105 | * __aa_task_profile - retrieve another task's profile | ||
106 | * @task: task to query (NOT NULL) | ||
107 | * | ||
108 | * Returns: @task's profile without incrementing its ref count | ||
109 | * | ||
110 | * If @task != current needs to be called in RCU safe critical section | ||
111 | */ | ||
112 | static inline struct aa_profile *__aa_task_profile(struct task_struct *task) | ||
113 | { | ||
114 | return aa_cred_profile(__task_cred(task)); | ||
115 | } | ||
116 | |||
117 | /** | ||
118 | * __aa_task_is_confined - determine if @task has any confinement | ||
119 | * @task: task to check confinement of (NOT NULL) | ||
120 | * | ||
121 | * If @task != current needs to be called in RCU safe critical section | ||
122 | */ | ||
123 | static inline bool __aa_task_is_confined(struct task_struct *task) | ||
124 | { | ||
125 | return !unconfined(__aa_task_profile(task)); | ||
126 | } | ||
127 | |||
128 | /** | ||
117 | * __aa_current_profile - find the current tasks confining profile | 129 | * __aa_current_profile - find the current tasks confining profile |
118 | * | 130 | * |
119 | * Returns: up to date confining profile or the ns unconfined profile (NOT NULL) | 131 | * Returns: up to date confining profile or the ns unconfined profile (NOT NULL) |
@@ -136,7 +148,7 @@ static inline struct aa_profile *__aa_current_profile(void) | |||
136 | */ | 148 | */ |
137 | static inline struct aa_profile *aa_current_profile(void) | 149 | static inline struct aa_profile *aa_current_profile(void) |
138 | { | 150 | { |
139 | const struct aa_task_cxt *cxt = current_cred()->security; | 151 | const struct aa_task_cxt *cxt = current_cxt(); |
140 | struct aa_profile *profile; | 152 | struct aa_profile *profile; |
141 | BUG_ON(!cxt || !cxt->profile); | 153 | BUG_ON(!cxt || !cxt->profile); |
142 | 154 | ||
@@ -151,4 +163,17 @@ static inline struct aa_profile *aa_current_profile(void) | |||
151 | return profile; | 163 | return profile; |
152 | } | 164 | } |
153 | 165 | ||
166 | /** | ||
167 | * aa_clear_task_cxt_trans - clear transition tracking info from the cxt | ||
168 | * @cxt: task context to clear (NOT NULL) | ||
169 | */ | ||
170 | static inline void aa_clear_task_cxt_trans(struct aa_task_cxt *cxt) | ||
171 | { | ||
172 | aa_put_profile(cxt->previous); | ||
173 | aa_put_profile(cxt->onexec); | ||
174 | cxt->previous = NULL; | ||
175 | cxt->onexec = NULL; | ||
176 | cxt->token = 0; | ||
177 | } | ||
178 | |||
154 | #endif /* __AA_CONTEXT_H */ | 179 | #endif /* __AA_CONTEXT_H */ |
diff --git a/security/apparmor/include/file.h b/security/apparmor/include/file.h index 967b2deda376..2c922b86bd44 100644 --- a/security/apparmor/include/file.h +++ b/security/apparmor/include/file.h | |||
@@ -186,11 +186,6 @@ static inline void aa_free_file_rules(struct aa_file_rules *rules) | |||
186 | aa_free_domain_entries(&rules->trans); | 186 | aa_free_domain_entries(&rules->trans); |
187 | } | 187 | } |
188 | 188 | ||
189 | #define ACC_FMODE(x) (("\000\004\002\006"[(x)&O_ACCMODE]) | (((x) << 1) & 0x40)) | ||
190 | |||
191 | /* from namei.c */ | ||
192 | #define MAP_OPEN_FLAGS(x) ((((x) + 1) & O_ACCMODE) ? (x) + 1 : (x)) | ||
193 | |||
194 | /** | 189 | /** |
195 | * aa_map_file_perms - map file flags to AppArmor permissions | 190 | * aa_map_file_perms - map file flags to AppArmor permissions |
196 | * @file: open file to map flags to AppArmor permissions | 191 | * @file: open file to map flags to AppArmor permissions |
@@ -199,8 +194,13 @@ static inline void aa_free_file_rules(struct aa_file_rules *rules) | |||
199 | */ | 194 | */ |
200 | static inline u32 aa_map_file_to_perms(struct file *file) | 195 | static inline u32 aa_map_file_to_perms(struct file *file) |
201 | { | 196 | { |
202 | int flags = MAP_OPEN_FLAGS(file->f_flags); | 197 | int flags = file->f_flags; |
203 | u32 perms = ACC_FMODE(file->f_mode); | 198 | u32 perms = 0; |
199 | |||
200 | if (file->f_mode & FMODE_WRITE) | ||
201 | perms |= MAY_WRITE; | ||
202 | if (file->f_mode & FMODE_READ) | ||
203 | perms |= MAY_READ; | ||
204 | 204 | ||
205 | if ((flags & O_APPEND) && (perms & MAY_WRITE)) | 205 | if ((flags & O_APPEND) && (perms & MAY_WRITE)) |
206 | perms = (perms & ~MAY_WRITE) | MAY_APPEND; | 206 | perms = (perms & ~MAY_WRITE) | MAY_APPEND; |
diff --git a/security/apparmor/include/match.h b/security/apparmor/include/match.h index 775843e7f984..001c43aa0406 100644 --- a/security/apparmor/include/match.h +++ b/security/apparmor/include/match.h | |||
@@ -4,7 +4,7 @@ | |||
4 | * This file contains AppArmor policy dfa matching engine definitions. | 4 | * This file contains AppArmor policy dfa matching engine definitions. |
5 | * | 5 | * |
6 | * Copyright (C) 1998-2008 Novell/SUSE | 6 | * Copyright (C) 1998-2008 Novell/SUSE |
7 | * Copyright 2009-2010 Canonical Ltd. | 7 | * Copyright 2009-2012 Canonical Ltd. |
8 | * | 8 | * |
9 | * This program is free software; you can redistribute it and/or | 9 | * This program is free software; you can redistribute it and/or |
10 | * modify it under the terms of the GNU General Public License as | 10 | * modify it under the terms of the GNU General Public License as |
@@ -16,25 +16,30 @@ | |||
16 | #define __AA_MATCH_H | 16 | #define __AA_MATCH_H |
17 | 17 | ||
18 | #include <linux/kref.h> | 18 | #include <linux/kref.h> |
19 | #include <linux/workqueue.h> | ||
20 | 19 | ||
21 | #define DFA_NOMATCH 0 | 20 | #define DFA_NOMATCH 0 |
22 | #define DFA_START 1 | 21 | #define DFA_START 1 |
23 | 22 | ||
24 | #define DFA_VALID_PERM_MASK 0xffffffff | ||
25 | #define DFA_VALID_PERM2_MASK 0xffffffff | ||
26 | 23 | ||
27 | /** | 24 | /** |
28 | * The format used for transition tables is based on the GNU flex table | 25 | * The format used for transition tables is based on the GNU flex table |
29 | * file format (--tables-file option; see Table File Format in the flex | 26 | * file format (--tables-file option; see Table File Format in the flex |
30 | * info pages and the flex sources for documentation). The magic number | 27 | * info pages and the flex sources for documentation). The magic number |
31 | * used in the header is 0x1B5E783D instead of 0xF13C57B1 though, because | 28 | * used in the header is 0x1B5E783D instead of 0xF13C57B1 though, because |
32 | * the YY_ID_CHK (check) and YY_ID_DEF (default) tables are used | 29 | * new tables have been defined and others YY_ID_CHK (check) and YY_ID_DEF |
33 | * slightly differently (see the apparmor-parser package). | 30 | * (default) tables are used slightly differently (see the apparmor-parser |
31 | * package). | ||
32 | * | ||
33 | * | ||
34 | * The data in the packed dfa is stored in network byte order, and the tables | ||
35 | * are arranged for flexibility. We convert the table data to host native | ||
36 | * byte order. | ||
37 | * | ||
38 | * The dfa begins with a table set header, and is followed by the actual | ||
39 | * tables. | ||
34 | */ | 40 | */ |
35 | 41 | ||
36 | #define YYTH_MAGIC 0x1B5E783D | 42 | #define YYTH_MAGIC 0x1B5E783D |
37 | #define YYTH_DEF_RECURSE 0x1 /* DEF Table is recursive */ | ||
38 | 43 | ||
39 | struct table_set_header { | 44 | struct table_set_header { |
40 | u32 th_magic; /* YYTH_MAGIC */ | 45 | u32 th_magic; /* YYTH_MAGIC */ |
@@ -63,7 +68,7 @@ struct table_set_header { | |||
63 | #define YYTD_DATA32 4 | 68 | #define YYTD_DATA32 4 |
64 | #define YYTD_DATA64 8 | 69 | #define YYTD_DATA64 8 |
65 | 70 | ||
66 | /* Each ACCEPT2 table gets 6 dedicated flags, YYTD_DATAX define the | 71 | /* ACCEPT & ACCEPT2 tables gets 6 dedicated flags, YYTD_DATAX define the |
67 | * first flags | 72 | * first flags |
68 | */ | 73 | */ |
69 | #define ACCEPT1_FLAGS(X) ((X) & 0x3f) | 74 | #define ACCEPT1_FLAGS(X) ((X) & 0x3f) |
diff --git a/security/apparmor/include/policy.h b/security/apparmor/include/policy.h index bda4569fdd83..b25491a3046a 100644 --- a/security/apparmor/include/policy.h +++ b/security/apparmor/include/policy.h | |||
@@ -32,13 +32,13 @@ | |||
32 | extern const char *const profile_mode_names[]; | 32 | extern const char *const profile_mode_names[]; |
33 | #define APPARMOR_NAMES_MAX_INDEX 3 | 33 | #define APPARMOR_NAMES_MAX_INDEX 3 |
34 | 34 | ||
35 | #define COMPLAIN_MODE(_profile) \ | 35 | #define PROFILE_MODE(_profile, _mode) \ |
36 | ((aa_g_profile_mode == APPARMOR_COMPLAIN) || \ | 36 | ((aa_g_profile_mode == (_mode)) || \ |
37 | ((_profile)->mode == APPARMOR_COMPLAIN)) | 37 | ((_profile)->mode == (_mode))) |
38 | 38 | ||
39 | #define KILL_MODE(_profile) \ | 39 | #define COMPLAIN_MODE(_profile) PROFILE_MODE((_profile), APPARMOR_COMPLAIN) |
40 | ((aa_g_profile_mode == APPARMOR_KILL) || \ | 40 | |
41 | ((_profile)->mode == APPARMOR_KILL)) | 41 | #define KILL_MODE(_profile) PROFILE_MODE((_profile), APPARMOR_KILL) |
42 | 42 | ||
43 | #define PROFILE_IS_HAT(_profile) ((_profile)->flags & PFLAG_HAT) | 43 | #define PROFILE_IS_HAT(_profile) ((_profile)->flags & PFLAG_HAT) |
44 | 44 | ||
@@ -105,6 +105,7 @@ struct aa_ns_acct { | |||
105 | * @acct: accounting for the namespace | 105 | * @acct: accounting for the namespace |
106 | * @unconfined: special unconfined profile for the namespace | 106 | * @unconfined: special unconfined profile for the namespace |
107 | * @sub_ns: list of namespaces under the current namespace. | 107 | * @sub_ns: list of namespaces under the current namespace. |
108 | * @uniq_null: uniq value used for null learning profiles | ||
108 | * | 109 | * |
109 | * An aa_namespace defines the set profiles that are searched to determine | 110 | * An aa_namespace defines the set profiles that are searched to determine |
110 | * which profile to attach to a task. Profiles can not be shared between | 111 | * which profile to attach to a task. Profiles can not be shared between |
@@ -127,6 +128,7 @@ struct aa_namespace { | |||
127 | struct aa_ns_acct acct; | 128 | struct aa_ns_acct acct; |
128 | struct aa_profile *unconfined; | 129 | struct aa_profile *unconfined; |
129 | struct list_head sub_ns; | 130 | struct list_head sub_ns; |
131 | atomic_t uniq_null; | ||
130 | }; | 132 | }; |
131 | 133 | ||
132 | /* struct aa_policydb - match engine for a policy | 134 | /* struct aa_policydb - match engine for a policy |
@@ -148,7 +150,6 @@ struct aa_policydb { | |||
148 | * @rename: optional profile name that this profile renamed | 150 | * @rename: optional profile name that this profile renamed |
149 | * @xmatch: optional extended matching for unconfined executables names | 151 | * @xmatch: optional extended matching for unconfined executables names |
150 | * @xmatch_len: xmatch prefix len, used to determine xmatch priority | 152 | * @xmatch_len: xmatch prefix len, used to determine xmatch priority |
151 | * @sid: the unique security id number of this profile | ||
152 | * @audit: the auditing mode of the profile | 153 | * @audit: the auditing mode of the profile |
153 | * @mode: the enforcement mode of the profile | 154 | * @mode: the enforcement mode of the profile |
154 | * @flags: flags controlling profile behavior | 155 | * @flags: flags controlling profile behavior |
@@ -184,7 +185,6 @@ struct aa_profile { | |||
184 | 185 | ||
185 | struct aa_dfa *xmatch; | 186 | struct aa_dfa *xmatch; |
186 | int xmatch_len; | 187 | int xmatch_len; |
187 | u32 sid; | ||
188 | enum audit_mode audit; | 188 | enum audit_mode audit; |
189 | enum profile_mode mode; | 189 | enum profile_mode mode; |
190 | u32 flags; | 190 | u32 flags; |
diff --git a/security/apparmor/include/procattr.h b/security/apparmor/include/procattr.h index 544aa6b766a4..6bd5f33d9533 100644 --- a/security/apparmor/include/procattr.h +++ b/security/apparmor/include/procattr.h | |||
@@ -21,6 +21,5 @@ | |||
21 | int aa_getprocattr(struct aa_profile *profile, char **string); | 21 | int aa_getprocattr(struct aa_profile *profile, char **string); |
22 | int aa_setprocattr_changehat(char *args, size_t size, int test); | 22 | int aa_setprocattr_changehat(char *args, size_t size, int test); |
23 | int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test); | 23 | int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test); |
24 | int aa_setprocattr_permipc(char *fqname); | ||
25 | 24 | ||
26 | #endif /* __AA_PROCATTR_H */ | 25 | #endif /* __AA_PROCATTR_H */ |
diff --git a/security/apparmor/include/sid.h b/security/apparmor/include/sid.h index 020db35c3010..513ca0e48965 100644 --- a/security/apparmor/include/sid.h +++ b/security/apparmor/include/sid.h | |||
@@ -16,7 +16,9 @@ | |||
16 | 16 | ||
17 | #include <linux/types.h> | 17 | #include <linux/types.h> |
18 | 18 | ||
19 | struct aa_profile; | 19 | /* sid value that will not be allocated */ |
20 | #define AA_SID_INVALID 0 | ||
21 | #define AA_SID_ALLOC AA_SID_INVALID | ||
20 | 22 | ||
21 | u32 aa_alloc_sid(void); | 23 | u32 aa_alloc_sid(void); |
22 | void aa_free_sid(u32 sid); | 24 | void aa_free_sid(u32 sid); |
diff --git a/security/apparmor/ipc.c b/security/apparmor/ipc.c index cf1071b14232..c51d2266587e 100644 --- a/security/apparmor/ipc.c +++ b/security/apparmor/ipc.c | |||
@@ -95,23 +95,18 @@ int aa_ptrace(struct task_struct *tracer, struct task_struct *tracee, | |||
95 | * - tracer profile has CAP_SYS_PTRACE | 95 | * - tracer profile has CAP_SYS_PTRACE |
96 | */ | 96 | */ |
97 | 97 | ||
98 | struct aa_profile *tracer_p; | 98 | struct aa_profile *tracer_p = aa_get_task_profile(tracer); |
99 | /* cred released below */ | ||
100 | const struct cred *cred = get_task_cred(tracer); | ||
101 | int error = 0; | 99 | int error = 0; |
102 | tracer_p = aa_cred_profile(cred); | ||
103 | 100 | ||
104 | if (!unconfined(tracer_p)) { | 101 | if (!unconfined(tracer_p)) { |
105 | /* lcred released below */ | 102 | struct aa_profile *tracee_p = aa_get_task_profile(tracee); |
106 | const struct cred *lcred = get_task_cred(tracee); | ||
107 | struct aa_profile *tracee_p = aa_cred_profile(lcred); | ||
108 | 103 | ||
109 | error = aa_may_ptrace(tracer, tracer_p, tracee_p, mode); | 104 | error = aa_may_ptrace(tracer, tracer_p, tracee_p, mode); |
110 | error = aa_audit_ptrace(tracer_p, tracee_p, error); | 105 | error = aa_audit_ptrace(tracer_p, tracee_p, error); |
111 | 106 | ||
112 | put_cred(lcred); | 107 | aa_put_profile(tracee_p); |
113 | } | 108 | } |
114 | put_cred(cred); | 109 | aa_put_profile(tracer_p); |
115 | 110 | ||
116 | return error; | 111 | return error; |
117 | } | 112 | } |
diff --git a/security/apparmor/lib.c b/security/apparmor/lib.c index 7430298116d6..d40bc592180d 100644 --- a/security/apparmor/lib.c +++ b/security/apparmor/lib.c | |||
@@ -45,8 +45,10 @@ char *aa_split_fqname(char *fqname, char **ns_name) | |||
45 | *ns_name = skip_spaces(&name[1]); | 45 | *ns_name = skip_spaces(&name[1]); |
46 | if (split) { | 46 | if (split) { |
47 | /* overwrite ':' with \0 */ | 47 | /* overwrite ':' with \0 */ |
48 | *split = 0; | 48 | *split++ = 0; |
49 | name = skip_spaces(split + 1); | 49 | if (strncmp(split, "//", 2) == 0) |
50 | split += 2; | ||
51 | name = skip_spaces(split); | ||
50 | } else | 52 | } else |
51 | /* a ns name without a following profile is allowed */ | 53 | /* a ns name without a following profile is allowed */ |
52 | name = NULL; | 54 | name = NULL; |
@@ -75,15 +77,16 @@ void aa_info_message(const char *str) | |||
75 | } | 77 | } |
76 | 78 | ||
77 | /** | 79 | /** |
78 | * kvmalloc - do allocation preferring kmalloc but falling back to vmalloc | 80 | * __aa_kvmalloc - do allocation preferring kmalloc but falling back to vmalloc |
79 | * @size: size of allocation | 81 | * @size: how many bytes of memory are required |
82 | * @flags: the type of memory to allocate (see kmalloc). | ||
80 | * | 83 | * |
81 | * Return: allocated buffer or NULL if failed | 84 | * Return: allocated buffer or NULL if failed |
82 | * | 85 | * |
83 | * It is possible that policy being loaded from the user is larger than | 86 | * It is possible that policy being loaded from the user is larger than |
84 | * what can be allocated by kmalloc, in those cases fall back to vmalloc. | 87 | * what can be allocated by kmalloc, in those cases fall back to vmalloc. |
85 | */ | 88 | */ |
86 | void *kvmalloc(size_t size) | 89 | void *__aa_kvmalloc(size_t size, gfp_t flags) |
87 | { | 90 | { |
88 | void *buffer = NULL; | 91 | void *buffer = NULL; |
89 | 92 | ||
@@ -92,14 +95,17 @@ void *kvmalloc(size_t size) | |||
92 | 95 | ||
93 | /* do not attempt kmalloc if we need more than 16 pages at once */ | 96 | /* do not attempt kmalloc if we need more than 16 pages at once */ |
94 | if (size <= (16*PAGE_SIZE)) | 97 | if (size <= (16*PAGE_SIZE)) |
95 | buffer = kmalloc(size, GFP_NOIO | __GFP_NOWARN); | 98 | buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN); |
96 | if (!buffer) { | 99 | if (!buffer) { |
97 | /* see kvfree for why size must be at least work_struct size | 100 | /* see kvfree for why size must be at least work_struct size |
98 | * when allocated via vmalloc | 101 | * when allocated via vmalloc |
99 | */ | 102 | */ |
100 | if (size < sizeof(struct work_struct)) | 103 | if (size < sizeof(struct work_struct)) |
101 | size = sizeof(struct work_struct); | 104 | size = sizeof(struct work_struct); |
102 | buffer = vmalloc(size); | 105 | if (flags & __GFP_ZERO) |
106 | buffer = vzalloc(size); | ||
107 | else | ||
108 | buffer = vmalloc(size); | ||
103 | } | 109 | } |
104 | return buffer; | 110 | return buffer; |
105 | } | 111 | } |
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index b21830eced41..2e2a0dd4a73f 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c | |||
@@ -48,8 +48,8 @@ int apparmor_initialized __initdata; | |||
48 | */ | 48 | */ |
49 | static void apparmor_cred_free(struct cred *cred) | 49 | static void apparmor_cred_free(struct cred *cred) |
50 | { | 50 | { |
51 | aa_free_task_context(cred->security); | 51 | aa_free_task_context(cred_cxt(cred)); |
52 | cred->security = NULL; | 52 | cred_cxt(cred) = NULL; |
53 | } | 53 | } |
54 | 54 | ||
55 | /* | 55 | /* |
@@ -62,7 +62,7 @@ static int apparmor_cred_alloc_blank(struct cred *cred, gfp_t gfp) | |||
62 | if (!cxt) | 62 | if (!cxt) |
63 | return -ENOMEM; | 63 | return -ENOMEM; |
64 | 64 | ||
65 | cred->security = cxt; | 65 | cred_cxt(cred) = cxt; |
66 | return 0; | 66 | return 0; |
67 | } | 67 | } |
68 | 68 | ||
@@ -77,8 +77,8 @@ static int apparmor_cred_prepare(struct cred *new, const struct cred *old, | |||
77 | if (!cxt) | 77 | if (!cxt) |
78 | return -ENOMEM; | 78 | return -ENOMEM; |
79 | 79 | ||
80 | aa_dup_task_context(cxt, old->security); | 80 | aa_dup_task_context(cxt, cred_cxt(old)); |
81 | new->security = cxt; | 81 | cred_cxt(new) = cxt; |
82 | return 0; | 82 | return 0; |
83 | } | 83 | } |
84 | 84 | ||
@@ -87,8 +87,8 @@ static int apparmor_cred_prepare(struct cred *new, const struct cred *old, | |||
87 | */ | 87 | */ |
88 | static void apparmor_cred_transfer(struct cred *new, const struct cred *old) | 88 | static void apparmor_cred_transfer(struct cred *new, const struct cred *old) |
89 | { | 89 | { |
90 | const struct aa_task_cxt *old_cxt = old->security; | 90 | const struct aa_task_cxt *old_cxt = cred_cxt(old); |
91 | struct aa_task_cxt *new_cxt = new->security; | 91 | struct aa_task_cxt *new_cxt = cred_cxt(new); |
92 | 92 | ||
93 | aa_dup_task_context(new_cxt, old_cxt); | 93 | aa_dup_task_context(new_cxt, old_cxt); |
94 | } | 94 | } |
@@ -469,7 +469,6 @@ static int apparmor_file_lock(struct file *file, unsigned int cmd) | |||
469 | static int common_mmap(int op, struct file *file, unsigned long prot, | 469 | static int common_mmap(int op, struct file *file, unsigned long prot, |
470 | unsigned long flags) | 470 | unsigned long flags) |
471 | { | 471 | { |
472 | struct dentry *dentry; | ||
473 | int mask = 0; | 472 | int mask = 0; |
474 | 473 | ||
475 | if (!file || !file->f_security) | 474 | if (!file || !file->f_security) |
@@ -486,7 +485,6 @@ static int common_mmap(int op, struct file *file, unsigned long prot, | |||
486 | if (prot & PROT_EXEC) | 485 | if (prot & PROT_EXEC) |
487 | mask |= AA_EXEC_MMAP; | 486 | mask |= AA_EXEC_MMAP; |
488 | 487 | ||
489 | dentry = file->f_path.dentry; | ||
490 | return common_file_perm(op, file, mask); | 488 | return common_file_perm(op, file, mask); |
491 | } | 489 | } |
492 | 490 | ||
@@ -507,11 +505,9 @@ static int apparmor_getprocattr(struct task_struct *task, char *name, | |||
507 | char **value) | 505 | char **value) |
508 | { | 506 | { |
509 | int error = -ENOENT; | 507 | int error = -ENOENT; |
510 | struct aa_profile *profile; | ||
511 | /* released below */ | 508 | /* released below */ |
512 | const struct cred *cred = get_task_cred(task); | 509 | const struct cred *cred = get_task_cred(task); |
513 | struct aa_task_cxt *cxt = cred->security; | 510 | struct aa_task_cxt *cxt = cred_cxt(cred); |
514 | profile = aa_cred_profile(cred); | ||
515 | 511 | ||
516 | if (strcmp(name, "current") == 0) | 512 | if (strcmp(name, "current") == 0) |
517 | error = aa_getprocattr(aa_newest_version(cxt->profile), | 513 | error = aa_getprocattr(aa_newest_version(cxt->profile), |
@@ -533,6 +529,8 @@ static int apparmor_getprocattr(struct task_struct *task, char *name, | |||
533 | static int apparmor_setprocattr(struct task_struct *task, char *name, | 529 | static int apparmor_setprocattr(struct task_struct *task, char *name, |
534 | void *value, size_t size) | 530 | void *value, size_t size) |
535 | { | 531 | { |
532 | struct common_audit_data sa; | ||
533 | struct apparmor_audit_data aad = {0,}; | ||
536 | char *command, *args = value; | 534 | char *command, *args = value; |
537 | size_t arg_size; | 535 | size_t arg_size; |
538 | int error; | 536 | int error; |
@@ -576,30 +574,31 @@ static int apparmor_setprocattr(struct task_struct *task, char *name, | |||
576 | } else if (strcmp(command, "permprofile") == 0) { | 574 | } else if (strcmp(command, "permprofile") == 0) { |
577 | error = aa_setprocattr_changeprofile(args, !AA_ONEXEC, | 575 | error = aa_setprocattr_changeprofile(args, !AA_ONEXEC, |
578 | AA_DO_TEST); | 576 | AA_DO_TEST); |
579 | } else if (strcmp(command, "permipc") == 0) { | 577 | } else |
580 | error = aa_setprocattr_permipc(args); | 578 | goto fail; |
581 | } else { | ||
582 | struct common_audit_data sa; | ||
583 | struct apparmor_audit_data aad = {0,}; | ||
584 | sa.type = LSM_AUDIT_DATA_NONE; | ||
585 | sa.aad = &aad; | ||
586 | aad.op = OP_SETPROCATTR; | ||
587 | aad.info = name; | ||
588 | aad.error = -EINVAL; | ||
589 | return aa_audit(AUDIT_APPARMOR_DENIED, | ||
590 | __aa_current_profile(), GFP_KERNEL, | ||
591 | &sa, NULL); | ||
592 | } | ||
593 | } else if (strcmp(name, "exec") == 0) { | 579 | } else if (strcmp(name, "exec") == 0) { |
594 | error = aa_setprocattr_changeprofile(args, AA_ONEXEC, | 580 | if (strcmp(command, "exec") == 0) |
595 | !AA_DO_TEST); | 581 | error = aa_setprocattr_changeprofile(args, AA_ONEXEC, |
596 | } else { | 582 | !AA_DO_TEST); |
583 | else | ||
584 | goto fail; | ||
585 | } else | ||
597 | /* only support the "current" and "exec" process attributes */ | 586 | /* only support the "current" and "exec" process attributes */ |
598 | return -EINVAL; | 587 | return -EINVAL; |
599 | } | 588 | |
600 | if (!error) | 589 | if (!error) |
601 | error = size; | 590 | error = size; |
602 | return error; | 591 | return error; |
592 | |||
593 | fail: | ||
594 | sa.type = LSM_AUDIT_DATA_NONE; | ||
595 | sa.aad = &aad; | ||
596 | aad.profile = aa_current_profile(); | ||
597 | aad.op = OP_SETPROCATTR; | ||
598 | aad.info = name; | ||
599 | aad.error = -EINVAL; | ||
600 | aa_audit_msg(AUDIT_APPARMOR_DENIED, &sa, NULL); | ||
601 | return -EINVAL; | ||
603 | } | 602 | } |
604 | 603 | ||
605 | static int apparmor_task_setrlimit(struct task_struct *task, | 604 | static int apparmor_task_setrlimit(struct task_struct *task, |
@@ -886,7 +885,7 @@ static int __init set_init_cxt(void) | |||
886 | return -ENOMEM; | 885 | return -ENOMEM; |
887 | 886 | ||
888 | cxt->profile = aa_get_profile(root_ns->unconfined); | 887 | cxt->profile = aa_get_profile(root_ns->unconfined); |
889 | cred->security = cxt; | 888 | cred_cxt(cred) = cxt; |
890 | 889 | ||
891 | return 0; | 890 | return 0; |
892 | } | 891 | } |
@@ -915,8 +914,11 @@ static int __init apparmor_init(void) | |||
915 | 914 | ||
916 | error = register_security(&apparmor_ops); | 915 | error = register_security(&apparmor_ops); |
917 | if (error) { | 916 | if (error) { |
917 | struct cred *cred = (struct cred *)current->real_cred; | ||
918 | aa_free_task_context(cred_cxt(cred)); | ||
919 | cred_cxt(cred) = NULL; | ||
918 | AA_ERROR("Unable to register AppArmor\n"); | 920 | AA_ERROR("Unable to register AppArmor\n"); |
919 | goto set_init_cxt_out; | 921 | goto register_security_out; |
920 | } | 922 | } |
921 | 923 | ||
922 | /* Report that AppArmor successfully initialized */ | 924 | /* Report that AppArmor successfully initialized */ |
@@ -930,9 +932,6 @@ static int __init apparmor_init(void) | |||
930 | 932 | ||
931 | return error; | 933 | return error; |
932 | 934 | ||
933 | set_init_cxt_out: | ||
934 | aa_free_task_context(current->real_cred->security); | ||
935 | |||
936 | register_security_out: | 935 | register_security_out: |
937 | aa_free_root_ns(); | 936 | aa_free_root_ns(); |
938 | 937 | ||
diff --git a/security/apparmor/match.c b/security/apparmor/match.c index 90971a8c3789..727eb4200d5c 100644 --- a/security/apparmor/match.c +++ b/security/apparmor/match.c | |||
@@ -4,7 +4,7 @@ | |||
4 | * This file contains AppArmor dfa based regular expression matching engine | 4 | * This file contains AppArmor dfa based regular expression matching engine |
5 | * | 5 | * |
6 | * Copyright (C) 1998-2008 Novell/SUSE | 6 | * Copyright (C) 1998-2008 Novell/SUSE |
7 | * Copyright 2009-2010 Canonical Ltd. | 7 | * Copyright 2009-2012 Canonical Ltd. |
8 | * | 8 | * |
9 | * This program is free software; you can redistribute it and/or | 9 | * This program is free software; you can redistribute it and/or |
10 | * modify it under the terms of the GNU General Public License as | 10 | * modify it under the terms of the GNU General Public License as |
@@ -23,6 +23,8 @@ | |||
23 | #include "include/apparmor.h" | 23 | #include "include/apparmor.h" |
24 | #include "include/match.h" | 24 | #include "include/match.h" |
25 | 25 | ||
26 | #define base_idx(X) ((X) & 0xffffff) | ||
27 | |||
26 | /** | 28 | /** |
27 | * unpack_table - unpack a dfa table (one of accept, default, base, next check) | 29 | * unpack_table - unpack a dfa table (one of accept, default, base, next check) |
28 | * @blob: data to unpack (NOT NULL) | 30 | * @blob: data to unpack (NOT NULL) |
@@ -30,7 +32,7 @@ | |||
30 | * | 32 | * |
31 | * Returns: pointer to table else NULL on failure | 33 | * Returns: pointer to table else NULL on failure |
32 | * | 34 | * |
33 | * NOTE: must be freed by kvfree (not kmalloc) | 35 | * NOTE: must be freed by kvfree (not kfree) |
34 | */ | 36 | */ |
35 | static struct table_header *unpack_table(char *blob, size_t bsize) | 37 | static struct table_header *unpack_table(char *blob, size_t bsize) |
36 | { | 38 | { |
@@ -57,7 +59,7 @@ static struct table_header *unpack_table(char *blob, size_t bsize) | |||
57 | if (bsize < tsize) | 59 | if (bsize < tsize) |
58 | goto out; | 60 | goto out; |
59 | 61 | ||
60 | table = kvmalloc(tsize); | 62 | table = kvzalloc(tsize); |
61 | if (table) { | 63 | if (table) { |
62 | *table = th; | 64 | *table = th; |
63 | if (th.td_flags == YYTD_DATA8) | 65 | if (th.td_flags == YYTD_DATA8) |
@@ -137,8 +139,7 @@ static int verify_dfa(struct aa_dfa *dfa, int flags) | |||
137 | for (i = 0; i < state_count; i++) { | 139 | for (i = 0; i < state_count; i++) { |
138 | if (DEFAULT_TABLE(dfa)[i] >= state_count) | 140 | if (DEFAULT_TABLE(dfa)[i] >= state_count) |
139 | goto out; | 141 | goto out; |
140 | /* TODO: do check that DEF state recursion terminates */ | 142 | if (base_idx(BASE_TABLE(dfa)[i]) + 255 >= trans_count) { |
141 | if (BASE_TABLE(dfa)[i] + 255 >= trans_count) { | ||
142 | printk(KERN_ERR "AppArmor DFA next/check upper " | 143 | printk(KERN_ERR "AppArmor DFA next/check upper " |
143 | "bounds error\n"); | 144 | "bounds error\n"); |
144 | goto out; | 145 | goto out; |
@@ -314,7 +315,7 @@ unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, | |||
314 | u8 *equiv = EQUIV_TABLE(dfa); | 315 | u8 *equiv = EQUIV_TABLE(dfa); |
315 | /* default is direct to next state */ | 316 | /* default is direct to next state */ |
316 | for (; len; len--) { | 317 | for (; len; len--) { |
317 | pos = base[state] + equiv[(u8) *str++]; | 318 | pos = base_idx(base[state]) + equiv[(u8) *str++]; |
318 | if (check[pos] == state) | 319 | if (check[pos] == state) |
319 | state = next[pos]; | 320 | state = next[pos]; |
320 | else | 321 | else |
@@ -323,7 +324,7 @@ unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, | |||
323 | } else { | 324 | } else { |
324 | /* default is direct to next state */ | 325 | /* default is direct to next state */ |
325 | for (; len; len--) { | 326 | for (; len; len--) { |
326 | pos = base[state] + (u8) *str++; | 327 | pos = base_idx(base[state]) + (u8) *str++; |
327 | if (check[pos] == state) | 328 | if (check[pos] == state) |
328 | state = next[pos]; | 329 | state = next[pos]; |
329 | else | 330 | else |
@@ -364,7 +365,7 @@ unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, | |||
364 | u8 *equiv = EQUIV_TABLE(dfa); | 365 | u8 *equiv = EQUIV_TABLE(dfa); |
365 | /* default is direct to next state */ | 366 | /* default is direct to next state */ |
366 | while (*str) { | 367 | while (*str) { |
367 | pos = base[state] + equiv[(u8) *str++]; | 368 | pos = base_idx(base[state]) + equiv[(u8) *str++]; |
368 | if (check[pos] == state) | 369 | if (check[pos] == state) |
369 | state = next[pos]; | 370 | state = next[pos]; |
370 | else | 371 | else |
@@ -373,7 +374,7 @@ unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, | |||
373 | } else { | 374 | } else { |
374 | /* default is direct to next state */ | 375 | /* default is direct to next state */ |
375 | while (*str) { | 376 | while (*str) { |
376 | pos = base[state] + (u8) *str++; | 377 | pos = base_idx(base[state]) + (u8) *str++; |
377 | if (check[pos] == state) | 378 | if (check[pos] == state) |
378 | state = next[pos]; | 379 | state = next[pos]; |
379 | else | 380 | else |
@@ -409,14 +410,14 @@ unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state, | |||
409 | u8 *equiv = EQUIV_TABLE(dfa); | 410 | u8 *equiv = EQUIV_TABLE(dfa); |
410 | /* default is direct to next state */ | 411 | /* default is direct to next state */ |
411 | 412 | ||
412 | pos = base[state] + equiv[(u8) c]; | 413 | pos = base_idx(base[state]) + equiv[(u8) c]; |
413 | if (check[pos] == state) | 414 | if (check[pos] == state) |
414 | state = next[pos]; | 415 | state = next[pos]; |
415 | else | 416 | else |
416 | state = def[state]; | 417 | state = def[state]; |
417 | } else { | 418 | } else { |
418 | /* default is direct to next state */ | 419 | /* default is direct to next state */ |
419 | pos = base[state] + (u8) c; | 420 | pos = base_idx(base[state]) + (u8) c; |
420 | if (check[pos] == state) | 421 | if (check[pos] == state) |
421 | state = next[pos]; | 422 | state = next[pos]; |
422 | else | 423 | else |
diff --git a/security/apparmor/path.c b/security/apparmor/path.c index e91ffee80162..35b394a75d76 100644 --- a/security/apparmor/path.c +++ b/security/apparmor/path.c | |||
@@ -174,7 +174,7 @@ static int get_name_to_buffer(struct path *path, int flags, char *buffer, | |||
174 | if (info && error) { | 174 | if (info && error) { |
175 | if (error == -ENOENT) | 175 | if (error == -ENOENT) |
176 | *info = "Failed name lookup - deleted entry"; | 176 | *info = "Failed name lookup - deleted entry"; |
177 | else if (error == -ESTALE) | 177 | else if (error == -EACCES) |
178 | *info = "Failed name lookup - disconnected path"; | 178 | *info = "Failed name lookup - disconnected path"; |
179 | else if (error == -ENAMETOOLONG) | 179 | else if (error == -ENAMETOOLONG) |
180 | *info = "Failed name lookup - name too long"; | 180 | *info = "Failed name lookup - name too long"; |
diff --git a/security/apparmor/policy.c b/security/apparmor/policy.c index 813200384d97..0f345c4dee5f 100644 --- a/security/apparmor/policy.c +++ b/security/apparmor/policy.c | |||
@@ -87,7 +87,6 @@ | |||
87 | #include "include/policy.h" | 87 | #include "include/policy.h" |
88 | #include "include/policy_unpack.h" | 88 | #include "include/policy_unpack.h" |
89 | #include "include/resource.h" | 89 | #include "include/resource.h" |
90 | #include "include/sid.h" | ||
91 | 90 | ||
92 | 91 | ||
93 | /* root profile namespace */ | 92 | /* root profile namespace */ |
@@ -292,7 +291,6 @@ static struct aa_namespace *alloc_namespace(const char *prefix, | |||
292 | if (!ns->unconfined) | 291 | if (!ns->unconfined) |
293 | goto fail_unconfined; | 292 | goto fail_unconfined; |
294 | 293 | ||
295 | ns->unconfined->sid = aa_alloc_sid(); | ||
296 | ns->unconfined->flags = PFLAG_UNCONFINED | PFLAG_IX_ON_NAME_ERROR | | 294 | ns->unconfined->flags = PFLAG_UNCONFINED | PFLAG_IX_ON_NAME_ERROR | |
297 | PFLAG_IMMUTABLE; | 295 | PFLAG_IMMUTABLE; |
298 | 296 | ||
@@ -303,6 +301,8 @@ static struct aa_namespace *alloc_namespace(const char *prefix, | |||
303 | */ | 301 | */ |
304 | ns->unconfined->ns = aa_get_namespace(ns); | 302 | ns->unconfined->ns = aa_get_namespace(ns); |
305 | 303 | ||
304 | atomic_set(&ns->uniq_null, 0); | ||
305 | |||
306 | return ns; | 306 | return ns; |
307 | 307 | ||
308 | fail_unconfined: | 308 | fail_unconfined: |
@@ -497,7 +497,6 @@ static void __replace_profile(struct aa_profile *old, struct aa_profile *new) | |||
497 | /* released when @new is freed */ | 497 | /* released when @new is freed */ |
498 | new->parent = aa_get_profile(old->parent); | 498 | new->parent = aa_get_profile(old->parent); |
499 | new->ns = aa_get_namespace(old->ns); | 499 | new->ns = aa_get_namespace(old->ns); |
500 | new->sid = old->sid; | ||
501 | __list_add_profile(&policy->profiles, new); | 500 | __list_add_profile(&policy->profiles, new); |
502 | /* inherit children */ | 501 | /* inherit children */ |
503 | list_for_each_entry_safe(child, tmp, &old->base.profiles, base.list) { | 502 | list_for_each_entry_safe(child, tmp, &old->base.profiles, base.list) { |
@@ -636,83 +635,6 @@ void __init aa_free_root_ns(void) | |||
636 | } | 635 | } |
637 | 636 | ||
638 | /** | 637 | /** |
639 | * aa_alloc_profile - allocate, initialize and return a new profile | ||
640 | * @hname: name of the profile (NOT NULL) | ||
641 | * | ||
642 | * Returns: refcount profile or NULL on failure | ||
643 | */ | ||
644 | struct aa_profile *aa_alloc_profile(const char *hname) | ||
645 | { | ||
646 | struct aa_profile *profile; | ||
647 | |||
648 | /* freed by free_profile - usually through aa_put_profile */ | ||
649 | profile = kzalloc(sizeof(*profile), GFP_KERNEL); | ||
650 | if (!profile) | ||
651 | return NULL; | ||
652 | |||
653 | if (!policy_init(&profile->base, NULL, hname)) { | ||
654 | kzfree(profile); | ||
655 | return NULL; | ||
656 | } | ||
657 | |||
658 | /* refcount released by caller */ | ||
659 | return profile; | ||
660 | } | ||
661 | |||
662 | /** | ||
663 | * aa_new_null_profile - create a new null-X learning profile | ||
664 | * @parent: profile that caused this profile to be created (NOT NULL) | ||
665 | * @hat: true if the null- learning profile is a hat | ||
666 | * | ||
667 | * Create a null- complain mode profile used in learning mode. The name of | ||
668 | * the profile is unique and follows the format of parent//null-sid. | ||
669 | * | ||
670 | * null profiles are added to the profile list but the list does not | ||
671 | * hold a count on them so that they are automatically released when | ||
672 | * not in use. | ||
673 | * | ||
674 | * Returns: new refcounted profile else NULL on failure | ||
675 | */ | ||
676 | struct aa_profile *aa_new_null_profile(struct aa_profile *parent, int hat) | ||
677 | { | ||
678 | struct aa_profile *profile = NULL; | ||
679 | char *name; | ||
680 | u32 sid = aa_alloc_sid(); | ||
681 | |||
682 | /* freed below */ | ||
683 | name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, GFP_KERNEL); | ||
684 | if (!name) | ||
685 | goto fail; | ||
686 | sprintf(name, "%s//null-%x", parent->base.hname, sid); | ||
687 | |||
688 | profile = aa_alloc_profile(name); | ||
689 | kfree(name); | ||
690 | if (!profile) | ||
691 | goto fail; | ||
692 | |||
693 | profile->sid = sid; | ||
694 | profile->mode = APPARMOR_COMPLAIN; | ||
695 | profile->flags = PFLAG_NULL; | ||
696 | if (hat) | ||
697 | profile->flags |= PFLAG_HAT; | ||
698 | |||
699 | /* released on free_profile */ | ||
700 | profile->parent = aa_get_profile(parent); | ||
701 | profile->ns = aa_get_namespace(parent->ns); | ||
702 | |||
703 | write_lock(&profile->ns->lock); | ||
704 | __list_add_profile(&parent->base.profiles, profile); | ||
705 | write_unlock(&profile->ns->lock); | ||
706 | |||
707 | /* refcount released by caller */ | ||
708 | return profile; | ||
709 | |||
710 | fail: | ||
711 | aa_free_sid(sid); | ||
712 | return NULL; | ||
713 | } | ||
714 | |||
715 | /** | ||
716 | * free_profile - free a profile | 638 | * free_profile - free a profile |
717 | * @profile: the profile to free (MAYBE NULL) | 639 | * @profile: the profile to free (MAYBE NULL) |
718 | * | 640 | * |
@@ -749,7 +671,6 @@ static void free_profile(struct aa_profile *profile) | |||
749 | aa_free_cap_rules(&profile->caps); | 671 | aa_free_cap_rules(&profile->caps); |
750 | aa_free_rlimit_rules(&profile->rlimits); | 672 | aa_free_rlimit_rules(&profile->rlimits); |
751 | 673 | ||
752 | aa_free_sid(profile->sid); | ||
753 | aa_put_dfa(profile->xmatch); | 674 | aa_put_dfa(profile->xmatch); |
754 | aa_put_dfa(profile->policy.dfa); | 675 | aa_put_dfa(profile->policy.dfa); |
755 | 676 | ||
@@ -790,6 +711,81 @@ void aa_free_profile_kref(struct kref *kref) | |||
790 | free_profile(p); | 711 | free_profile(p); |
791 | } | 712 | } |
792 | 713 | ||
714 | /** | ||
715 | * aa_alloc_profile - allocate, initialize and return a new profile | ||
716 | * @hname: name of the profile (NOT NULL) | ||
717 | * | ||
718 | * Returns: refcount profile or NULL on failure | ||
719 | */ | ||
720 | struct aa_profile *aa_alloc_profile(const char *hname) | ||
721 | { | ||
722 | struct aa_profile *profile; | ||
723 | |||
724 | /* freed by free_profile - usually through aa_put_profile */ | ||
725 | profile = kzalloc(sizeof(*profile), GFP_KERNEL); | ||
726 | if (!profile) | ||
727 | return NULL; | ||
728 | |||
729 | if (!policy_init(&profile->base, NULL, hname)) { | ||
730 | kzfree(profile); | ||
731 | return NULL; | ||
732 | } | ||
733 | |||
734 | /* refcount released by caller */ | ||
735 | return profile; | ||
736 | } | ||
737 | |||
738 | /** | ||
739 | * aa_new_null_profile - create a new null-X learning profile | ||
740 | * @parent: profile that caused this profile to be created (NOT NULL) | ||
741 | * @hat: true if the null- learning profile is a hat | ||
742 | * | ||
743 | * Create a null- complain mode profile used in learning mode. The name of | ||
744 | * the profile is unique and follows the format of parent//null-<uniq>. | ||
745 | * | ||
746 | * null profiles are added to the profile list but the list does not | ||
747 | * hold a count on them so that they are automatically released when | ||
748 | * not in use. | ||
749 | * | ||
750 | * Returns: new refcounted profile else NULL on failure | ||
751 | */ | ||
752 | struct aa_profile *aa_new_null_profile(struct aa_profile *parent, int hat) | ||
753 | { | ||
754 | struct aa_profile *profile = NULL; | ||
755 | char *name; | ||
756 | int uniq = atomic_inc_return(&parent->ns->uniq_null); | ||
757 | |||
758 | /* freed below */ | ||
759 | name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, GFP_KERNEL); | ||
760 | if (!name) | ||
761 | goto fail; | ||
762 | sprintf(name, "%s//null-%x", parent->base.hname, uniq); | ||
763 | |||
764 | profile = aa_alloc_profile(name); | ||
765 | kfree(name); | ||
766 | if (!profile) | ||
767 | goto fail; | ||
768 | |||
769 | profile->mode = APPARMOR_COMPLAIN; | ||
770 | profile->flags = PFLAG_NULL; | ||
771 | if (hat) | ||
772 | profile->flags |= PFLAG_HAT; | ||
773 | |||
774 | /* released on free_profile */ | ||
775 | profile->parent = aa_get_profile(parent); | ||
776 | profile->ns = aa_get_namespace(parent->ns); | ||
777 | |||
778 | write_lock(&profile->ns->lock); | ||
779 | __list_add_profile(&parent->base.profiles, profile); | ||
780 | write_unlock(&profile->ns->lock); | ||
781 | |||
782 | /* refcount released by caller */ | ||
783 | return profile; | ||
784 | |||
785 | fail: | ||
786 | return NULL; | ||
787 | } | ||
788 | |||
793 | /* TODO: profile accounting - setup in remove */ | 789 | /* TODO: profile accounting - setup in remove */ |
794 | 790 | ||
795 | /** | 791 | /** |
@@ -972,7 +968,6 @@ static void __add_new_profile(struct aa_namespace *ns, struct aa_policy *policy, | |||
972 | profile->parent = aa_get_profile((struct aa_profile *) policy); | 968 | profile->parent = aa_get_profile((struct aa_profile *) policy); |
973 | __list_add_profile(&policy->profiles, profile); | 969 | __list_add_profile(&policy->profiles, profile); |
974 | /* released on free_profile */ | 970 | /* released on free_profile */ |
975 | profile->sid = aa_alloc_sid(); | ||
976 | profile->ns = aa_get_namespace(ns); | 971 | profile->ns = aa_get_namespace(ns); |
977 | } | 972 | } |
978 | 973 | ||
@@ -1110,14 +1105,8 @@ audit: | |||
1110 | if (!error) { | 1105 | if (!error) { |
1111 | if (rename_profile) | 1106 | if (rename_profile) |
1112 | __replace_profile(rename_profile, new_profile); | 1107 | __replace_profile(rename_profile, new_profile); |
1113 | if (old_profile) { | 1108 | if (old_profile) |
1114 | /* when there are both rename and old profiles | ||
1115 | * inherit old profiles sid | ||
1116 | */ | ||
1117 | if (rename_profile) | ||
1118 | aa_free_sid(new_profile->sid); | ||
1119 | __replace_profile(old_profile, new_profile); | 1109 | __replace_profile(old_profile, new_profile); |
1120 | } | ||
1121 | if (!(old_profile || rename_profile)) | 1110 | if (!(old_profile || rename_profile)) |
1122 | __add_new_profile(ns, policy, new_profile); | 1111 | __add_new_profile(ns, policy, new_profile); |
1123 | } | 1112 | } |
@@ -1167,14 +1156,12 @@ ssize_t aa_remove_profiles(char *fqname, size_t size) | |||
1167 | if (fqname[0] == ':') { | 1156 | if (fqname[0] == ':') { |
1168 | char *ns_name; | 1157 | char *ns_name; |
1169 | name = aa_split_fqname(fqname, &ns_name); | 1158 | name = aa_split_fqname(fqname, &ns_name); |
1170 | if (ns_name) { | 1159 | /* released below */ |
1171 | /* released below */ | 1160 | ns = aa_find_namespace(root, ns_name); |
1172 | ns = aa_find_namespace(root, ns_name); | 1161 | if (!ns) { |
1173 | if (!ns) { | 1162 | info = "namespace does not exist"; |
1174 | info = "namespace does not exist"; | 1163 | error = -ENOENT; |
1175 | error = -ENOENT; | 1164 | goto fail; |
1176 | goto fail; | ||
1177 | } | ||
1178 | } | 1165 | } |
1179 | } else | 1166 | } else |
1180 | /* released below */ | 1167 | /* released below */ |
diff --git a/security/apparmor/policy_unpack.c b/security/apparmor/policy_unpack.c index 329b1fd30749..6dac7d77cb4d 100644 --- a/security/apparmor/policy_unpack.c +++ b/security/apparmor/policy_unpack.c | |||
@@ -27,7 +27,6 @@ | |||
27 | #include "include/match.h" | 27 | #include "include/match.h" |
28 | #include "include/policy.h" | 28 | #include "include/policy.h" |
29 | #include "include/policy_unpack.h" | 29 | #include "include/policy_unpack.h" |
30 | #include "include/sid.h" | ||
31 | 30 | ||
32 | /* | 31 | /* |
33 | * The AppArmor interface treats data as a type byte followed by the | 32 | * The AppArmor interface treats data as a type byte followed by the |
@@ -290,6 +289,9 @@ static int unpack_strdup(struct aa_ext *e, char **string, const char *name) | |||
290 | return res; | 289 | return res; |
291 | } | 290 | } |
292 | 291 | ||
292 | #define DFA_VALID_PERM_MASK 0xffffffff | ||
293 | #define DFA_VALID_PERM2_MASK 0xffffffff | ||
294 | |||
293 | /** | 295 | /** |
294 | * verify_accept - verify the accept tables of a dfa | 296 | * verify_accept - verify the accept tables of a dfa |
295 | * @dfa: dfa to verify accept tables of (NOT NULL) | 297 | * @dfa: dfa to verify accept tables of (NOT NULL) |
diff --git a/security/apparmor/procattr.c b/security/apparmor/procattr.c index 1b41c542d376..6c9390179b89 100644 --- a/security/apparmor/procattr.c +++ b/security/apparmor/procattr.c | |||
@@ -163,9 +163,3 @@ int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test) | |||
163 | name = aa_split_fqname(fqname, &ns_name); | 163 | name = aa_split_fqname(fqname, &ns_name); |
164 | return aa_change_profile(ns_name, name, onexec, test); | 164 | return aa_change_profile(ns_name, name, onexec, test); |
165 | } | 165 | } |
166 | |||
167 | int aa_setprocattr_permipc(char *fqname) | ||
168 | { | ||
169 | /* TODO: add ipc permission querying */ | ||
170 | return -ENOTSUPP; | ||
171 | } | ||
diff --git a/security/apparmor/resource.c b/security/apparmor/resource.c index e1f3d7ef2c54..748bf0ca6c9f 100644 --- a/security/apparmor/resource.c +++ b/security/apparmor/resource.c | |||
@@ -15,6 +15,7 @@ | |||
15 | #include <linux/audit.h> | 15 | #include <linux/audit.h> |
16 | 16 | ||
17 | #include "include/audit.h" | 17 | #include "include/audit.h" |
18 | #include "include/context.h" | ||
18 | #include "include/resource.h" | 19 | #include "include/resource.h" |
19 | #include "include/policy.h" | 20 | #include "include/policy.h" |
20 | 21 | ||
@@ -90,17 +91,25 @@ int aa_map_resource(int resource) | |||
90 | int aa_task_setrlimit(struct aa_profile *profile, struct task_struct *task, | 91 | int aa_task_setrlimit(struct aa_profile *profile, struct task_struct *task, |
91 | unsigned int resource, struct rlimit *new_rlim) | 92 | unsigned int resource, struct rlimit *new_rlim) |
92 | { | 93 | { |
94 | struct aa_profile *task_profile; | ||
93 | int error = 0; | 95 | int error = 0; |
94 | 96 | ||
97 | rcu_read_lock(); | ||
98 | task_profile = aa_get_profile(aa_cred_profile(__task_cred(task))); | ||
99 | rcu_read_unlock(); | ||
100 | |||
95 | /* TODO: extend resource control to handle other (non current) | 101 | /* TODO: extend resource control to handle other (non current) |
96 | * processes. AppArmor rules currently have the implicit assumption | 102 | * profiles. AppArmor rules currently have the implicit assumption |
97 | * that the task is setting the resource of the current process | 103 | * that the task is setting the resource of a task confined with |
104 | * the same profile. | ||
98 | */ | 105 | */ |
99 | if ((task != current->group_leader) || | 106 | if (profile != task_profile || |
100 | (profile->rlimits.mask & (1 << resource) && | 107 | (profile->rlimits.mask & (1 << resource) && |
101 | new_rlim->rlim_max > profile->rlimits.limits[resource].rlim_max)) | 108 | new_rlim->rlim_max > profile->rlimits.limits[resource].rlim_max)) |
102 | error = -EACCES; | 109 | error = -EACCES; |
103 | 110 | ||
111 | aa_put_profile(task_profile); | ||
112 | |||
104 | return audit_resource(profile, resource, new_rlim->rlim_max, error); | 113 | return audit_resource(profile, resource, new_rlim->rlim_max, error); |
105 | } | 114 | } |
106 | 115 | ||