diff options
author | Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> | 2011-09-16 09:54:25 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2011-09-18 20:09:59 -0400 |
commit | 6bce98edc3365a8f780ff3944ac7992544c194fe (patch) | |
tree | ee10abf2345f651d65d7f10fd385c01e0dc891b3 /security/tomoyo/file.c | |
parent | cc100551b4d92f47abebfa7c7918b2be71263b4a (diff) |
TOMOYO: Allow specifying domain transition preference.
I got an opinion that it is difficult to use exception policy's domain
transition control directives because they need to match the pathname specified
to "file execute" directives. For example, if "file execute /bin/\*\-ls\-cat"
is given, corresponding domain transition control directive needs to be like
"no_keep_domain /bin/\*\-ls\-cat from any".
If we can specify like below, it will become more convenient.
file execute /bin/ls keep exec.realpath="/bin/ls" exec.argv[0]="ls"
file execute /bin/cat keep exec.realpath="/bin/cat" exec.argv[0]="cat"
file execute /bin/\*\-ls\-cat child
file execute /usr/sbin/httpd <apache> exec.realpath="/usr/sbin/httpd" exec.argv[0]="/usr/sbin/httpd"
In above examples, "keep" works as if keep_domain is specified, "child" works
as if "no_reset_domain" and "no_initialize_domain" and "no_keep_domain" are
specified, "<apache>" causes domain transition to <apache> domain upon
successful execve() operation.
Moreover, we can also allow transition to different domains based on conditions
like below example.
<kernel> /usr/sbin/sshd
file execute /bin/bash <kernel> /usr/sbin/sshd //batch-session exec.argc=2 exec.argv[1]="-c"
file execute /bin/bash <kernel> /usr/sbin/sshd //root-session task.uid=0
file execute /bin/bash <kernel> /usr/sbin/sshd //nonroot-session task.uid!=0
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/tomoyo/file.c')
-rw-r--r-- | security/tomoyo/file.c | 38 |
1 files changed, 32 insertions, 6 deletions
diff --git a/security/tomoyo/file.c b/security/tomoyo/file.c index 743c35f5084a..b280c1bd652d 100644 --- a/security/tomoyo/file.c +++ b/security/tomoyo/file.c | |||
@@ -570,16 +570,42 @@ int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation, | |||
570 | do { | 570 | do { |
571 | tomoyo_check_acl(r, tomoyo_check_path_acl); | 571 | tomoyo_check_acl(r, tomoyo_check_path_acl); |
572 | error = tomoyo_audit_path_log(r); | 572 | error = tomoyo_audit_path_log(r); |
573 | /* | 573 | } while (error == TOMOYO_RETRY_REQUEST); |
574 | * Do not retry for execute request, for alias may have | ||
575 | * changed. | ||
576 | */ | ||
577 | } while (error == TOMOYO_RETRY_REQUEST && | ||
578 | operation != TOMOYO_TYPE_EXECUTE); | ||
579 | return error; | 574 | return error; |
580 | } | 575 | } |
581 | 576 | ||
582 | /** | 577 | /** |
578 | * tomoyo_execute_permission - Check permission for execute operation. | ||
579 | * | ||
580 | * @r: Pointer to "struct tomoyo_request_info". | ||
581 | * @filename: Filename to check. | ||
582 | * | ||
583 | * Returns 0 on success, negative value otherwise. | ||
584 | * | ||
585 | * Caller holds tomoyo_read_lock(). | ||
586 | */ | ||
587 | int tomoyo_execute_permission(struct tomoyo_request_info *r, | ||
588 | const struct tomoyo_path_info *filename) | ||
589 | { | ||
590 | /* | ||
591 | * Unlike other permission checks, this check is done regardless of | ||
592 | * profile mode settings in order to check for domain transition | ||
593 | * preference. | ||
594 | */ | ||
595 | r->type = TOMOYO_MAC_FILE_EXECUTE; | ||
596 | r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); | ||
597 | r->param_type = TOMOYO_TYPE_PATH_ACL; | ||
598 | r->param.path.filename = filename; | ||
599 | r->param.path.operation = TOMOYO_TYPE_EXECUTE; | ||
600 | tomoyo_check_acl(r, tomoyo_check_path_acl); | ||
601 | r->ee->transition = r->matched_acl && r->matched_acl->cond ? | ||
602 | r->matched_acl->cond->transit : NULL; | ||
603 | if (r->mode != TOMOYO_CONFIG_DISABLED) | ||
604 | return tomoyo_audit_path_log(r); | ||
605 | return 0; | ||
606 | } | ||
607 | |||
608 | /** | ||
583 | * tomoyo_same_path_number_acl - Check for duplicated "struct tomoyo_path_number_acl" entry. | 609 | * tomoyo_same_path_number_acl - Check for duplicated "struct tomoyo_path_number_acl" entry. |
584 | * | 610 | * |
585 | * @a: Pointer to "struct tomoyo_acl_info". | 611 | * @a: Pointer to "struct tomoyo_acl_info". |