xref: /openbmc/linux/security/tomoyo/group.c (revision 6bd5ce60)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * security/tomoyo/group.c
4  *
5  * Copyright (C) 2005-2011  NTT DATA CORPORATION
6  */
7 
8 #include <linux/slab.h>
9 #include <linux/rculist.h>
10 
11 #include "common.h"
12 
13 /**
14  * tomoyo_same_path_group - Check for duplicated "struct tomoyo_path_group" entry.
15  *
16  * @a: Pointer to "struct tomoyo_acl_head".
17  * @b: Pointer to "struct tomoyo_acl_head".
18  *
19  * Returns true if @a == @b, false otherwise.
20  */
tomoyo_same_path_group(const struct tomoyo_acl_head * a,const struct tomoyo_acl_head * b)21 static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a,
22 				   const struct tomoyo_acl_head *b)
23 {
24 	return container_of(a, struct tomoyo_path_group, head)->member_name ==
25 		container_of(b, struct tomoyo_path_group, head)->member_name;
26 }
27 
28 /**
29  * tomoyo_same_number_group - Check for duplicated "struct tomoyo_number_group" entry.
30  *
31  * @a: Pointer to "struct tomoyo_acl_head".
32  * @b: Pointer to "struct tomoyo_acl_head".
33  *
34  * Returns true if @a == @b, false otherwise.
35  */
tomoyo_same_number_group(const struct tomoyo_acl_head * a,const struct tomoyo_acl_head * b)36 static bool tomoyo_same_number_group(const struct tomoyo_acl_head *a,
37 				     const struct tomoyo_acl_head *b)
38 {
39 	return !memcmp(&container_of(a, struct tomoyo_number_group, head)
40 		       ->number,
41 		       &container_of(b, struct tomoyo_number_group, head)
42 		       ->number,
43 		       sizeof(container_of(a, struct tomoyo_number_group, head)
44 			      ->number));
45 }
46 
47 /**
48  * tomoyo_same_address_group - Check for duplicated "struct tomoyo_address_group" entry.
49  *
50  * @a: Pointer to "struct tomoyo_acl_head".
51  * @b: Pointer to "struct tomoyo_acl_head".
52  *
53  * Returns true if @a == @b, false otherwise.
54  */
tomoyo_same_address_group(const struct tomoyo_acl_head * a,const struct tomoyo_acl_head * b)55 static bool tomoyo_same_address_group(const struct tomoyo_acl_head *a,
56 				      const struct tomoyo_acl_head *b)
57 {
58 	const struct tomoyo_address_group *p1 = container_of(a, typeof(*p1),
59 							     head);
60 	const struct tomoyo_address_group *p2 = container_of(b, typeof(*p2),
61 							     head);
62 
63 	return tomoyo_same_ipaddr_union(&p1->address, &p2->address);
64 }
65 
66 /**
67  * tomoyo_write_group - Write "struct tomoyo_path_group"/"struct tomoyo_number_group"/"struct tomoyo_address_group" list.
68  *
69  * @param: Pointer to "struct tomoyo_acl_param".
70  * @type:  Type of this group.
71  *
72  * Returns 0 on success, negative value otherwise.
73  */
tomoyo_write_group(struct tomoyo_acl_param * param,const u8 type)74 int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type)
75 {
76 	struct tomoyo_group *group = tomoyo_get_group(param, type);
77 	int error = -EINVAL;
78 
79 	if (!group)
80 		return -ENOMEM;
81 	param->list = &group->member_list;
82 	if (type == TOMOYO_PATH_GROUP) {
83 		struct tomoyo_path_group e = { };
84 
85 		e.member_name = tomoyo_get_name(tomoyo_read_token(param));
86 		if (!e.member_name) {
87 			error = -ENOMEM;
88 			goto out;
89 		}
90 		error = tomoyo_update_policy(&e.head, sizeof(e), param,
91 					  tomoyo_same_path_group);
92 		tomoyo_put_name(e.member_name);
93 	} else if (type == TOMOYO_NUMBER_GROUP) {
94 		struct tomoyo_number_group e = { };
95 
96 		if (param->data[0] == '@' ||
97 		    !tomoyo_parse_number_union(param, &e.number))
98 			goto out;
99 		error = tomoyo_update_policy(&e.head, sizeof(e), param,
100 					  tomoyo_same_number_group);
101 		/*
102 		 * tomoyo_put_number_union() is not needed because
103 		 * param->data[0] != '@'.
104 		 */
105 	} else {
106 		struct tomoyo_address_group e = { };
107 
108 		if (param->data[0] == '@' ||
109 		    !tomoyo_parse_ipaddr_union(param, &e.address))
110 			goto out;
111 		error = tomoyo_update_policy(&e.head, sizeof(e), param,
112 					     tomoyo_same_address_group);
113 	}
114 out:
115 	tomoyo_put_group(group);
116 	return error;
117 }
118 
119 /**
120  * tomoyo_path_matches_group - Check whether the given pathname matches members of the given pathname group.
121  *
122  * @pathname: The name of pathname.
123  * @group:    Pointer to "struct tomoyo_path_group".
124  *
125  * Returns matched member's pathname if @pathname matches pathnames in @group,
126  * NULL otherwise.
127  *
128  * Caller holds tomoyo_read_lock().
129  */
130 const struct tomoyo_path_info *
tomoyo_path_matches_group(const struct tomoyo_path_info * pathname,const struct tomoyo_group * group)131 tomoyo_path_matches_group(const struct tomoyo_path_info *pathname,
132 			  const struct tomoyo_group *group)
133 {
134 	struct tomoyo_path_group *member;
135 
136 	list_for_each_entry_rcu(member, &group->member_list, head.list,
137 				srcu_read_lock_held(&tomoyo_ss)) {
138 		if (member->head.is_deleted)
139 			continue;
140 		if (!tomoyo_path_matches_pattern(pathname, member->member_name))
141 			continue;
142 		return member->member_name;
143 	}
144 	return NULL;
145 }
146 
147 /**
148  * tomoyo_number_matches_group - Check whether the given number matches members of the given number group.
149  *
150  * @min:   Min number.
151  * @max:   Max number.
152  * @group: Pointer to "struct tomoyo_number_group".
153  *
154  * Returns true if @min and @max partially overlaps @group, false otherwise.
155  *
156  * Caller holds tomoyo_read_lock().
157  */
tomoyo_number_matches_group(const unsigned long min,const unsigned long max,const struct tomoyo_group * group)158 bool tomoyo_number_matches_group(const unsigned long min,
159 				 const unsigned long max,
160 				 const struct tomoyo_group *group)
161 {
162 	struct tomoyo_number_group *member;
163 	bool matched = false;
164 
165 	list_for_each_entry_rcu(member, &group->member_list, head.list,
166 				srcu_read_lock_held(&tomoyo_ss)) {
167 		if (member->head.is_deleted)
168 			continue;
169 		if (min > member->number.values[1] ||
170 		    max < member->number.values[0])
171 			continue;
172 		matched = true;
173 		break;
174 	}
175 	return matched;
176 }
177 
178 /**
179  * tomoyo_address_matches_group - Check whether the given address matches members of the given address group.
180  *
181  * @is_ipv6: True if @address is an IPv6 address.
182  * @address: An IPv4 or IPv6 address.
183  * @group:   Pointer to "struct tomoyo_address_group".
184  *
185  * Returns true if @address matches addresses in @group group, false otherwise.
186  *
187  * Caller holds tomoyo_read_lock().
188  */
tomoyo_address_matches_group(const bool is_ipv6,const __be32 * address,const struct tomoyo_group * group)189 bool tomoyo_address_matches_group(const bool is_ipv6, const __be32 *address,
190 				  const struct tomoyo_group *group)
191 {
192 	struct tomoyo_address_group *member;
193 	bool matched = false;
194 	const u8 size = is_ipv6 ? 16 : 4;
195 
196 	list_for_each_entry_rcu(member, &group->member_list, head.list,
197 				srcu_read_lock_held(&tomoyo_ss)) {
198 		if (member->head.is_deleted)
199 			continue;
200 		if (member->address.is_ipv6 != is_ipv6)
201 			continue;
202 		if (memcmp(&member->address.ip[0], address, size) > 0 ||
203 		    memcmp(address, &member->address.ip[1], size) > 0)
204 			continue;
205 		matched = true;
206 		break;
207 	}
208 	return matched;
209 }
210