1 /* 2 * AppArmor security module 3 * 4 * This file contains AppArmor policy attachment and domain transitions 5 * 6 * Copyright (C) 2002-2008 Novell/SUSE 7 * Copyright 2009-2010 Canonical Ltd. 8 * 9 * This program is free software; you can redistribute it and/or 10 * modify it under the terms of the GNU General Public License as 11 * published by the Free Software Foundation, version 2 of the 12 * License. 13 */ 14 15 #include <linux/errno.h> 16 #include <linux/fdtable.h> 17 #include <linux/file.h> 18 #include <linux/mount.h> 19 #include <linux/syscalls.h> 20 #include <linux/tracehook.h> 21 #include <linux/personality.h> 22 #include <linux/xattr.h> 23 24 #include "include/audit.h" 25 #include "include/apparmorfs.h" 26 #include "include/cred.h" 27 #include "include/domain.h" 28 #include "include/file.h" 29 #include "include/ipc.h" 30 #include "include/match.h" 31 #include "include/path.h" 32 #include "include/policy.h" 33 #include "include/policy_ns.h" 34 35 /** 36 * aa_free_domain_entries - free entries in a domain table 37 * @domain: the domain table to free (MAYBE NULL) 38 */ 39 void aa_free_domain_entries(struct aa_domain *domain) 40 { 41 int i; 42 if (domain) { 43 if (!domain->table) 44 return; 45 46 for (i = 0; i < domain->size; i++) 47 kzfree(domain->table[i]); 48 kzfree(domain->table); 49 domain->table = NULL; 50 } 51 } 52 53 /** 54 * may_change_ptraced_domain - check if can change profile on ptraced task 55 * @to_label: profile to change to (NOT NULL) 56 * @info: message if there is an error 57 * 58 * Check if current is ptraced and if so if the tracing task is allowed 59 * to trace the new domain 60 * 61 * Returns: %0 or error if change not allowed 62 */ 63 static int may_change_ptraced_domain(struct aa_label *to_label, 64 const char **info) 65 { 66 struct task_struct *tracer; 67 struct aa_label *tracerl = NULL; 68 int error = 0; 69 70 rcu_read_lock(); 71 tracer = ptrace_parent(current); 72 if (tracer) 73 /* released below */ 74 tracerl = aa_get_task_label(tracer); 75 76 /* not ptraced */ 77 if (!tracer || unconfined(tracerl)) 78 goto out; 79 80 error = aa_may_ptrace(tracerl, to_label, PTRACE_MODE_ATTACH); 81 82 out: 83 rcu_read_unlock(); 84 aa_put_label(tracerl); 85 86 if (error) 87 *info = "ptrace prevents transition"; 88 return error; 89 } 90 91 /**** TODO: dedup to aa_label_match - needs perm and dfa, merging 92 * specifically this is an exact copy of aa_label_match except 93 * aa_compute_perms is replaced with aa_compute_fperms 94 * and policy.dfa with file.dfa 95 ****/ 96 /* match a profile and its associated ns component if needed 97 * Assumes visibility test has already been done. 98 * If a subns profile is not to be matched should be prescreened with 99 * visibility test. 100 */ 101 static inline unsigned int match_component(struct aa_profile *profile, 102 struct aa_profile *tp, 103 bool stack, unsigned int state) 104 { 105 const char *ns_name; 106 107 if (stack) 108 state = aa_dfa_match(profile->file.dfa, state, "&"); 109 if (profile->ns == tp->ns) 110 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); 111 112 /* try matching with namespace name and then profile */ 113 ns_name = aa_ns_name(profile->ns, tp->ns, true); 114 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); 115 state = aa_dfa_match(profile->file.dfa, state, ns_name); 116 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); 117 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); 118 } 119 120 /** 121 * label_compound_match - find perms for full compound label 122 * @profile: profile to find perms for 123 * @label: label to check access permissions for 124 * @stack: whether this is a stacking request 125 * @start: state to start match in 126 * @subns: whether to do permission checks on components in a subns 127 * @request: permissions to request 128 * @perms: perms struct to set 129 * 130 * Returns: 0 on success else ERROR 131 * 132 * For the label A//&B//&C this does the perm match for A//&B//&C 133 * @perms should be preinitialized with allperms OR a previous permission 134 * check to be stacked. 135 */ 136 static int label_compound_match(struct aa_profile *profile, 137 struct aa_label *label, bool stack, 138 unsigned int state, bool subns, u32 request, 139 struct aa_perms *perms) 140 { 141 struct aa_profile *tp; 142 struct label_it i; 143 struct path_cond cond = { }; 144 145 /* find first subcomponent that is visible */ 146 label_for_each(i, label, tp) { 147 if (!aa_ns_visible(profile->ns, tp->ns, subns)) 148 continue; 149 state = match_component(profile, tp, stack, state); 150 if (!state) 151 goto fail; 152 goto next; 153 } 154 155 /* no component visible */ 156 *perms = allperms; 157 return 0; 158 159 next: 160 label_for_each_cont(i, label, tp) { 161 if (!aa_ns_visible(profile->ns, tp->ns, subns)) 162 continue; 163 state = aa_dfa_match(profile->file.dfa, state, "//&"); 164 state = match_component(profile, tp, false, state); 165 if (!state) 166 goto fail; 167 } 168 *perms = aa_compute_fperms(profile->file.dfa, state, &cond); 169 aa_apply_modes_to_perms(profile, perms); 170 if ((perms->allow & request) != request) 171 return -EACCES; 172 173 return 0; 174 175 fail: 176 *perms = nullperms; 177 return -EACCES; 178 } 179 180 /** 181 * label_components_match - find perms for all subcomponents of a label 182 * @profile: profile to find perms for 183 * @label: label to check access permissions for 184 * @stack: whether this is a stacking request 185 * @start: state to start match in 186 * @subns: whether to do permission checks on components in a subns 187 * @request: permissions to request 188 * @perms: an initialized perms struct to add accumulation to 189 * 190 * Returns: 0 on success else ERROR 191 * 192 * For the label A//&B//&C this does the perm match for each of A and B and C 193 * @perms should be preinitialized with allperms OR a previous permission 194 * check to be stacked. 195 */ 196 static int label_components_match(struct aa_profile *profile, 197 struct aa_label *label, bool stack, 198 unsigned int start, bool subns, u32 request, 199 struct aa_perms *perms) 200 { 201 struct aa_profile *tp; 202 struct label_it i; 203 struct aa_perms tmp; 204 struct path_cond cond = { }; 205 unsigned int state = 0; 206 207 /* find first subcomponent to test */ 208 label_for_each(i, label, tp) { 209 if (!aa_ns_visible(profile->ns, tp->ns, subns)) 210 continue; 211 state = match_component(profile, tp, stack, start); 212 if (!state) 213 goto fail; 214 goto next; 215 } 216 217 /* no subcomponents visible - no change in perms */ 218 return 0; 219 220 next: 221 tmp = aa_compute_fperms(profile->file.dfa, state, &cond); 222 aa_apply_modes_to_perms(profile, &tmp); 223 aa_perms_accum(perms, &tmp); 224 label_for_each_cont(i, label, tp) { 225 if (!aa_ns_visible(profile->ns, tp->ns, subns)) 226 continue; 227 state = match_component(profile, tp, stack, start); 228 if (!state) 229 goto fail; 230 tmp = aa_compute_fperms(profile->file.dfa, state, &cond); 231 aa_apply_modes_to_perms(profile, &tmp); 232 aa_perms_accum(perms, &tmp); 233 } 234 235 if ((perms->allow & request) != request) 236 return -EACCES; 237 238 return 0; 239 240 fail: 241 *perms = nullperms; 242 return -EACCES; 243 } 244 245 /** 246 * label_match - do a multi-component label match 247 * @profile: profile to match against (NOT NULL) 248 * @label: label to match (NOT NULL) 249 * @stack: whether this is a stacking request 250 * @state: state to start in 251 * @subns: whether to match subns components 252 * @request: permission request 253 * @perms: Returns computed perms (NOT NULL) 254 * 255 * Returns: the state the match finished in, may be the none matching state 256 */ 257 static int label_match(struct aa_profile *profile, struct aa_label *label, 258 bool stack, unsigned int state, bool subns, u32 request, 259 struct aa_perms *perms) 260 { 261 int error; 262 263 *perms = nullperms; 264 error = label_compound_match(profile, label, stack, state, subns, 265 request, perms); 266 if (!error) 267 return error; 268 269 *perms = allperms; 270 return label_components_match(profile, label, stack, state, subns, 271 request, perms); 272 } 273 274 /******* end TODO: dedup *****/ 275 276 /** 277 * change_profile_perms - find permissions for change_profile 278 * @profile: the current profile (NOT NULL) 279 * @target: label to transition to (NOT NULL) 280 * @stack: whether this is a stacking request 281 * @request: requested perms 282 * @start: state to start matching in 283 * 284 * 285 * Returns: permission set 286 * 287 * currently only matches full label A//&B//&C or individual components A, B, C 288 * not arbitrary combinations. Eg. A//&B, C 289 */ 290 static int change_profile_perms(struct aa_profile *profile, 291 struct aa_label *target, bool stack, 292 u32 request, unsigned int start, 293 struct aa_perms *perms) 294 { 295 if (profile_unconfined(profile)) { 296 perms->allow = AA_MAY_CHANGE_PROFILE | AA_MAY_ONEXEC; 297 perms->audit = perms->quiet = perms->kill = 0; 298 return 0; 299 } 300 301 /* TODO: add profile in ns screening */ 302 return label_match(profile, target, stack, start, true, request, perms); 303 } 304 305 /** 306 * aa_xattrs_match - check whether a file matches the xattrs defined in profile 307 * @bprm: binprm struct for the process to validate 308 * @profile: profile to match against (NOT NULL) 309 * @state: state to start match in 310 * 311 * Returns: number of extended attributes that matched, or < 0 on error 312 */ 313 static int aa_xattrs_match(const struct linux_binprm *bprm, 314 struct aa_profile *profile, unsigned int state) 315 { 316 int i; 317 ssize_t size; 318 struct dentry *d; 319 char *value = NULL; 320 int value_size = 0, ret = profile->xattr_count; 321 322 if (!bprm || !profile->xattr_count) 323 return 0; 324 325 /* transition from exec match to xattr set */ 326 state = aa_dfa_null_transition(profile->xmatch, state); 327 328 d = bprm->file->f_path.dentry; 329 330 for (i = 0; i < profile->xattr_count; i++) { 331 size = vfs_getxattr_alloc(d, profile->xattrs[i], &value, 332 value_size, GFP_KERNEL); 333 if (size >= 0) { 334 u32 perm; 335 336 /* Check the xattr value, not just presence */ 337 state = aa_dfa_match_len(profile->xmatch, state, value, 338 size); 339 perm = dfa_user_allow(profile->xmatch, state); 340 if (!(perm & MAY_EXEC)) { 341 ret = -EINVAL; 342 goto out; 343 } 344 } 345 /* transition to next element */ 346 state = aa_dfa_null_transition(profile->xmatch, state); 347 if (size < 0) { 348 /* 349 * No xattr match, so verify if transition to 350 * next element was valid. IFF so the xattr 351 * was optional. 352 */ 353 if (!state) { 354 ret = -EINVAL; 355 goto out; 356 } 357 /* don't count missing optional xattr as matched */ 358 ret--; 359 } 360 } 361 362 out: 363 kfree(value); 364 return ret; 365 } 366 367 /** 368 * __attach_match_ - find an attachment match 369 * @bprm - binprm structure of transitioning task 370 * @name - to match against (NOT NULL) 371 * @head - profile list to walk (NOT NULL) 372 * @info - info message if there was an error (NOT NULL) 373 * 374 * Do a linear search on the profiles in the list. There is a matching 375 * preference where an exact match is preferred over a name which uses 376 * expressions to match, and matching expressions with the greatest 377 * xmatch_len are preferred. 378 * 379 * Requires: @head not be shared or have appropriate locks held 380 * 381 * Returns: profile or NULL if no match found 382 */ 383 static struct aa_profile *__attach_match(const struct linux_binprm *bprm, 384 const char *name, 385 struct list_head *head, 386 const char **info) 387 { 388 int candidate_len = 0, candidate_xattrs = 0; 389 bool conflict = false; 390 struct aa_profile *profile, *candidate = NULL; 391 392 AA_BUG(!name); 393 AA_BUG(!head); 394 395 list_for_each_entry_rcu(profile, head, base.list) { 396 if (profile->label.flags & FLAG_NULL && 397 &profile->label == ns_unconfined(profile->ns)) 398 continue; 399 400 /* Find the "best" matching profile. Profiles must 401 * match the path and extended attributes (if any) 402 * associated with the file. A more specific path 403 * match will be preferred over a less specific one, 404 * and a match with more matching extended attributes 405 * will be preferred over one with fewer. If the best 406 * match has both the same level of path specificity 407 * and the same number of matching extended attributes 408 * as another profile, signal a conflict and refuse to 409 * match. 410 */ 411 if (profile->xmatch) { 412 unsigned int state, count; 413 u32 perm; 414 415 state = aa_dfa_leftmatch(profile->xmatch, DFA_START, 416 name, &count); 417 perm = dfa_user_allow(profile->xmatch, state); 418 /* any accepting state means a valid match. */ 419 if (perm & MAY_EXEC) { 420 int ret; 421 422 if (count < candidate_len) 423 continue; 424 425 ret = aa_xattrs_match(bprm, profile, state); 426 /* Fail matching if the xattrs don't match */ 427 if (ret < 0) 428 continue; 429 430 /* 431 * TODO: allow for more flexible best match 432 * 433 * The new match isn't more specific 434 * than the current best match 435 */ 436 if (count == candidate_len && 437 ret <= candidate_xattrs) { 438 /* Match is equivalent, so conflict */ 439 if (ret == candidate_xattrs) 440 conflict = true; 441 continue; 442 } 443 444 /* Either the same length with more matching 445 * xattrs, or a longer match 446 */ 447 candidate = profile; 448 candidate_len = profile->xmatch_len; 449 candidate_xattrs = ret; 450 conflict = false; 451 } 452 } else if (!strcmp(profile->base.name, name)) 453 /* 454 * old exact non-re match, without conditionals such 455 * as xattrs. no more searching required 456 */ 457 return profile; 458 } 459 460 if (conflict) { 461 *info = "conflicting profile attachments"; 462 return NULL; 463 } 464 465 return candidate; 466 } 467 468 /** 469 * find_attach - do attachment search for unconfined processes 470 * @bprm - binprm structure of transitioning task 471 * @ns: the current namespace (NOT NULL) 472 * @list: list to search (NOT NULL) 473 * @name: the executable name to match against (NOT NULL) 474 * @info: info message if there was an error 475 * 476 * Returns: label or NULL if no match found 477 */ 478 static struct aa_label *find_attach(const struct linux_binprm *bprm, 479 struct aa_ns *ns, struct list_head *list, 480 const char *name, const char **info) 481 { 482 struct aa_profile *profile; 483 484 rcu_read_lock(); 485 profile = aa_get_profile(__attach_match(bprm, name, list, info)); 486 rcu_read_unlock(); 487 488 return profile ? &profile->label : NULL; 489 } 490 491 static const char *next_name(int xtype, const char *name) 492 { 493 return NULL; 494 } 495 496 /** 497 * x_table_lookup - lookup an x transition name via transition table 498 * @profile: current profile (NOT NULL) 499 * @xindex: index into x transition table 500 * @name: returns: name tested to find label (NOT NULL) 501 * 502 * Returns: refcounted label, or NULL on failure (MAYBE NULL) 503 */ 504 struct aa_label *x_table_lookup(struct aa_profile *profile, u32 xindex, 505 const char **name) 506 { 507 struct aa_label *label = NULL; 508 u32 xtype = xindex & AA_X_TYPE_MASK; 509 int index = xindex & AA_X_INDEX_MASK; 510 511 AA_BUG(!name); 512 513 /* index is guaranteed to be in range, validated at load time */ 514 /* TODO: move lookup parsing to unpack time so this is a straight 515 * index into the resultant label 516 */ 517 for (*name = profile->file.trans.table[index]; !label && *name; 518 *name = next_name(xtype, *name)) { 519 if (xindex & AA_X_CHILD) { 520 struct aa_profile *new_profile; 521 /* release by caller */ 522 new_profile = aa_find_child(profile, *name); 523 if (new_profile) 524 label = &new_profile->label; 525 continue; 526 } 527 label = aa_label_parse(&profile->label, *name, GFP_ATOMIC, 528 true, false); 529 if (IS_ERR(label)) 530 label = NULL; 531 } 532 533 /* released by caller */ 534 535 return label; 536 } 537 538 /** 539 * x_to_label - get target label for a given xindex 540 * @profile: current profile (NOT NULL) 541 * @bprm: binprm structure of transitioning task 542 * @name: name to lookup (NOT NULL) 543 * @xindex: index into x transition table 544 * @lookupname: returns: name used in lookup if one was specified (NOT NULL) 545 * 546 * find label for a transition index 547 * 548 * Returns: refcounted label or NULL if not found available 549 */ 550 static struct aa_label *x_to_label(struct aa_profile *profile, 551 const struct linux_binprm *bprm, 552 const char *name, u32 xindex, 553 const char **lookupname, 554 const char **info) 555 { 556 struct aa_label *new = NULL; 557 struct aa_ns *ns = profile->ns; 558 u32 xtype = xindex & AA_X_TYPE_MASK; 559 const char *stack = NULL; 560 561 switch (xtype) { 562 case AA_X_NONE: 563 /* fail exec unless ix || ux fallback - handled by caller */ 564 *lookupname = NULL; 565 break; 566 case AA_X_TABLE: 567 /* TODO: fix when perm mapping done at unload */ 568 stack = profile->file.trans.table[xindex & AA_X_INDEX_MASK]; 569 if (*stack != '&') { 570 /* released by caller */ 571 new = x_table_lookup(profile, xindex, lookupname); 572 stack = NULL; 573 break; 574 } 575 /* fall through to X_NAME */ 576 case AA_X_NAME: 577 if (xindex & AA_X_CHILD) 578 /* released by caller */ 579 new = find_attach(bprm, ns, &profile->base.profiles, 580 name, info); 581 else 582 /* released by caller */ 583 new = find_attach(bprm, ns, &ns->base.profiles, 584 name, info); 585 *lookupname = name; 586 break; 587 } 588 589 if (!new) { 590 if (xindex & AA_X_INHERIT) { 591 /* (p|c|n)ix - don't change profile but do 592 * use the newest version 593 */ 594 *info = "ix fallback"; 595 /* no profile && no error */ 596 new = aa_get_newest_label(&profile->label); 597 } else if (xindex & AA_X_UNCONFINED) { 598 new = aa_get_newest_label(ns_unconfined(profile->ns)); 599 *info = "ux fallback"; 600 } 601 } 602 603 if (new && stack) { 604 /* base the stack on post domain transition */ 605 struct aa_label *base = new; 606 607 new = aa_label_parse(base, stack, GFP_ATOMIC, true, false); 608 if (IS_ERR(new)) 609 new = NULL; 610 aa_put_label(base); 611 } 612 613 /* released by caller */ 614 return new; 615 } 616 617 static struct aa_label *profile_transition(struct aa_profile *profile, 618 const struct linux_binprm *bprm, 619 char *buffer, struct path_cond *cond, 620 bool *secure_exec) 621 { 622 struct aa_label *new = NULL; 623 struct aa_profile *component; 624 struct label_it i; 625 const char *info = NULL, *name = NULL, *target = NULL; 626 unsigned int state = profile->file.start; 627 struct aa_perms perms = {}; 628 bool nonewprivs = false; 629 int error = 0; 630 631 AA_BUG(!profile); 632 AA_BUG(!bprm); 633 AA_BUG(!buffer); 634 635 error = aa_path_name(&bprm->file->f_path, profile->path_flags, buffer, 636 &name, &info, profile->disconnected); 637 if (error) { 638 if (profile_unconfined(profile) || 639 (profile->label.flags & FLAG_IX_ON_NAME_ERROR)) { 640 AA_DEBUG("name lookup ix on error"); 641 error = 0; 642 new = aa_get_newest_label(&profile->label); 643 } 644 name = bprm->filename; 645 goto audit; 646 } 647 648 if (profile_unconfined(profile)) { 649 new = find_attach(bprm, profile->ns, 650 &profile->ns->base.profiles, name, &info); 651 if (new) { 652 AA_DEBUG("unconfined attached to new label"); 653 return new; 654 } 655 AA_DEBUG("unconfined exec no attachment"); 656 return aa_get_newest_label(&profile->label); 657 } 658 659 /* find exec permissions for name */ 660 state = aa_str_perms(profile->file.dfa, state, name, cond, &perms); 661 if (perms.allow & MAY_EXEC) { 662 /* exec permission determine how to transition */ 663 new = x_to_label(profile, bprm, name, perms.xindex, &target, 664 &info); 665 if (new && new->proxy == profile->label.proxy && info) { 666 /* hack ix fallback - improve how this is detected */ 667 goto audit; 668 } else if (!new) { 669 error = -EACCES; 670 info = "profile transition not found"; 671 /* remove MAY_EXEC to audit as failure */ 672 perms.allow &= ~MAY_EXEC; 673 } else { 674 /* verify that each component's xattr requirements are 675 * met, and fail execution otherwise 676 */ 677 label_for_each(i, new, component) { 678 if (aa_xattrs_match(bprm, component, state) < 679 0) { 680 error = -EACCES; 681 info = "required xattrs not present"; 682 perms.allow &= ~MAY_EXEC; 683 aa_put_label(new); 684 new = NULL; 685 goto audit; 686 } 687 } 688 } 689 } else if (COMPLAIN_MODE(profile)) { 690 /* no exec permission - learning mode */ 691 struct aa_profile *new_profile = NULL; 692 char *n = kstrdup(name, GFP_ATOMIC); 693 694 if (n) { 695 /* name is ptr into buffer */ 696 long pos = name - buffer; 697 /* break per cpu buffer hold */ 698 put_buffers(buffer); 699 new_profile = aa_new_null_profile(profile, false, n, 700 GFP_KERNEL); 701 get_buffers(buffer); 702 name = buffer + pos; 703 strcpy((char *)name, n); 704 kfree(n); 705 } 706 if (!new_profile) { 707 error = -ENOMEM; 708 info = "could not create null profile"; 709 } else { 710 error = -EACCES; 711 new = &new_profile->label; 712 } 713 perms.xindex |= AA_X_UNSAFE; 714 } else 715 /* fail exec */ 716 error = -EACCES; 717 718 if (!new) 719 goto audit; 720 721 722 if (!(perms.xindex & AA_X_UNSAFE)) { 723 if (DEBUG_ON) { 724 dbg_printk("apparmor: scrubbing environment variables" 725 " for %s profile=", name); 726 aa_label_printk(new, GFP_ATOMIC); 727 dbg_printk("\n"); 728 } 729 *secure_exec = true; 730 } 731 732 audit: 733 aa_audit_file(profile, &perms, OP_EXEC, MAY_EXEC, name, target, new, 734 cond->uid, info, error); 735 if (!new || nonewprivs) { 736 aa_put_label(new); 737 return ERR_PTR(error); 738 } 739 740 return new; 741 } 742 743 static int profile_onexec(struct aa_profile *profile, struct aa_label *onexec, 744 bool stack, const struct linux_binprm *bprm, 745 char *buffer, struct path_cond *cond, 746 bool *secure_exec) 747 { 748 unsigned int state = profile->file.start; 749 struct aa_perms perms = {}; 750 const char *xname = NULL, *info = "change_profile onexec"; 751 int error = -EACCES; 752 753 AA_BUG(!profile); 754 AA_BUG(!onexec); 755 AA_BUG(!bprm); 756 AA_BUG(!buffer); 757 758 if (profile_unconfined(profile)) { 759 /* change_profile on exec already granted */ 760 /* 761 * NOTE: Domain transitions from unconfined are allowed 762 * even when no_new_privs is set because this aways results 763 * in a further reduction of permissions. 764 */ 765 return 0; 766 } 767 768 error = aa_path_name(&bprm->file->f_path, profile->path_flags, buffer, 769 &xname, &info, profile->disconnected); 770 if (error) { 771 if (profile_unconfined(profile) || 772 (profile->label.flags & FLAG_IX_ON_NAME_ERROR)) { 773 AA_DEBUG("name lookup ix on error"); 774 error = 0; 775 } 776 xname = bprm->filename; 777 goto audit; 778 } 779 780 /* find exec permissions for name */ 781 state = aa_str_perms(profile->file.dfa, state, xname, cond, &perms); 782 if (!(perms.allow & AA_MAY_ONEXEC)) { 783 info = "no change_onexec valid for executable"; 784 goto audit; 785 } 786 /* test if this exec can be paired with change_profile onexec. 787 * onexec permission is linked to exec with a standard pairing 788 * exec\0change_profile 789 */ 790 state = aa_dfa_null_transition(profile->file.dfa, state); 791 error = change_profile_perms(profile, onexec, stack, AA_MAY_ONEXEC, 792 state, &perms); 793 if (error) { 794 perms.allow &= ~AA_MAY_ONEXEC; 795 goto audit; 796 } 797 798 if (!(perms.xindex & AA_X_UNSAFE)) { 799 if (DEBUG_ON) { 800 dbg_printk("apparmor: scrubbing environment " 801 "variables for %s label=", xname); 802 aa_label_printk(onexec, GFP_ATOMIC); 803 dbg_printk("\n"); 804 } 805 *secure_exec = true; 806 } 807 808 audit: 809 return aa_audit_file(profile, &perms, OP_EXEC, AA_MAY_ONEXEC, xname, 810 NULL, onexec, cond->uid, info, error); 811 } 812 813 /* ensure none ns domain transitions are correctly applied with onexec */ 814 815 static struct aa_label *handle_onexec(struct aa_label *label, 816 struct aa_label *onexec, bool stack, 817 const struct linux_binprm *bprm, 818 char *buffer, struct path_cond *cond, 819 bool *unsafe) 820 { 821 struct aa_profile *profile; 822 struct aa_label *new; 823 int error; 824 825 AA_BUG(!label); 826 AA_BUG(!onexec); 827 AA_BUG(!bprm); 828 AA_BUG(!buffer); 829 830 if (!stack) { 831 error = fn_for_each_in_ns(label, profile, 832 profile_onexec(profile, onexec, stack, 833 bprm, buffer, cond, unsafe)); 834 if (error) 835 return ERR_PTR(error); 836 new = fn_label_build_in_ns(label, profile, GFP_ATOMIC, 837 aa_get_newest_label(onexec), 838 profile_transition(profile, bprm, buffer, 839 cond, unsafe)); 840 841 } else { 842 /* TODO: determine how much we want to loosen this */ 843 error = fn_for_each_in_ns(label, profile, 844 profile_onexec(profile, onexec, stack, bprm, 845 buffer, cond, unsafe)); 846 if (error) 847 return ERR_PTR(error); 848 new = fn_label_build_in_ns(label, profile, GFP_ATOMIC, 849 aa_label_merge(&profile->label, onexec, 850 GFP_ATOMIC), 851 profile_transition(profile, bprm, buffer, 852 cond, unsafe)); 853 } 854 855 if (new) 856 return new; 857 858 /* TODO: get rid of GLOBAL_ROOT_UID */ 859 error = fn_for_each_in_ns(label, profile, 860 aa_audit_file(profile, &nullperms, OP_CHANGE_ONEXEC, 861 AA_MAY_ONEXEC, bprm->filename, NULL, 862 onexec, GLOBAL_ROOT_UID, 863 "failed to build target label", -ENOMEM)); 864 return ERR_PTR(error); 865 } 866 867 /** 868 * apparmor_bprm_set_creds - set the new creds on the bprm struct 869 * @bprm: binprm for the exec (NOT NULL) 870 * 871 * Returns: %0 or error on failure 872 * 873 * TODO: once the other paths are done see if we can't refactor into a fn 874 */ 875 int apparmor_bprm_set_creds(struct linux_binprm *bprm) 876 { 877 struct aa_task_ctx *ctx; 878 struct aa_label *label, *new = NULL; 879 struct aa_profile *profile; 880 char *buffer = NULL; 881 const char *info = NULL; 882 int error = 0; 883 bool unsafe = false; 884 struct path_cond cond = { 885 file_inode(bprm->file)->i_uid, 886 file_inode(bprm->file)->i_mode 887 }; 888 889 if (bprm->called_set_creds) 890 return 0; 891 892 ctx = task_ctx(current); 893 AA_BUG(!cred_label(bprm->cred)); 894 AA_BUG(!ctx); 895 896 label = aa_get_newest_label(cred_label(bprm->cred)); 897 898 /* 899 * Detect no new privs being set, and store the label it 900 * occurred under. Ideally this would happen when nnp 901 * is set but there isn't a good way to do that yet. 902 * 903 * Testing for unconfined must be done before the subset test 904 */ 905 if ((bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) && !unconfined(label) && 906 !ctx->nnp) 907 ctx->nnp = aa_get_label(label); 908 909 /* buffer freed below, name is pointer into buffer */ 910 get_buffers(buffer); 911 /* Test for onexec first as onexec override other x transitions. */ 912 if (ctx->onexec) 913 new = handle_onexec(label, ctx->onexec, ctx->token, 914 bprm, buffer, &cond, &unsafe); 915 else 916 new = fn_label_build(label, profile, GFP_ATOMIC, 917 profile_transition(profile, bprm, buffer, 918 &cond, &unsafe)); 919 920 AA_BUG(!new); 921 if (IS_ERR(new)) { 922 error = PTR_ERR(new); 923 goto done; 924 } else if (!new) { 925 error = -ENOMEM; 926 goto done; 927 } 928 929 /* Policy has specified a domain transitions. If no_new_privs and 930 * confined ensure the transition is to confinement that is subset 931 * of the confinement when the task entered no new privs. 932 * 933 * NOTE: Domain transitions from unconfined and to stacked 934 * subsets are allowed even when no_new_privs is set because this 935 * aways results in a further reduction of permissions. 936 */ 937 if ((bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) && 938 !unconfined(label) && !aa_label_is_subset(new, ctx->nnp)) { 939 error = -EPERM; 940 info = "no new privs"; 941 goto audit; 942 } 943 944 if (bprm->unsafe & LSM_UNSAFE_SHARE) { 945 /* FIXME: currently don't mediate shared state */ 946 ; 947 } 948 949 if (bprm->unsafe & (LSM_UNSAFE_PTRACE)) { 950 /* TODO: test needs to be profile of label to new */ 951 error = may_change_ptraced_domain(new, &info); 952 if (error) 953 goto audit; 954 } 955 956 if (unsafe) { 957 if (DEBUG_ON) { 958 dbg_printk("scrubbing environment variables for %s " 959 "label=", bprm->filename); 960 aa_label_printk(new, GFP_ATOMIC); 961 dbg_printk("\n"); 962 } 963 bprm->secureexec = 1; 964 } 965 966 if (label->proxy != new->proxy) { 967 /* when transitioning clear unsafe personality bits */ 968 if (DEBUG_ON) { 969 dbg_printk("apparmor: clearing unsafe personality " 970 "bits. %s label=", bprm->filename); 971 aa_label_printk(new, GFP_ATOMIC); 972 dbg_printk("\n"); 973 } 974 bprm->per_clear |= PER_CLEAR_ON_SETID; 975 } 976 aa_put_label(cred_label(bprm->cred)); 977 /* transfer reference, released when cred is freed */ 978 cred_label(bprm->cred) = new; 979 980 done: 981 aa_put_label(label); 982 put_buffers(buffer); 983 984 return error; 985 986 audit: 987 error = fn_for_each(label, profile, 988 aa_audit_file(profile, &nullperms, OP_EXEC, MAY_EXEC, 989 bprm->filename, NULL, new, 990 file_inode(bprm->file)->i_uid, info, 991 error)); 992 aa_put_label(new); 993 goto done; 994 } 995 996 /* 997 * Functions for self directed profile change 998 */ 999 1000 1001 /* helper fn for change_hat 1002 * 1003 * Returns: label for hat transition OR ERR_PTR. Does NOT return NULL 1004 */ 1005 static struct aa_label *build_change_hat(struct aa_profile *profile, 1006 const char *name, bool sibling) 1007 { 1008 struct aa_profile *root, *hat = NULL; 1009 const char *info = NULL; 1010 int error = 0; 1011 1012 if (sibling && PROFILE_IS_HAT(profile)) { 1013 root = aa_get_profile_rcu(&profile->parent); 1014 } else if (!sibling && !PROFILE_IS_HAT(profile)) { 1015 root = aa_get_profile(profile); 1016 } else { 1017 info = "conflicting target types"; 1018 error = -EPERM; 1019 goto audit; 1020 } 1021 1022 hat = aa_find_child(root, name); 1023 if (!hat) { 1024 error = -ENOENT; 1025 if (COMPLAIN_MODE(profile)) { 1026 hat = aa_new_null_profile(profile, true, name, 1027 GFP_KERNEL); 1028 if (!hat) { 1029 info = "failed null profile create"; 1030 error = -ENOMEM; 1031 } 1032 } 1033 } 1034 aa_put_profile(root); 1035 1036 audit: 1037 aa_audit_file(profile, &nullperms, OP_CHANGE_HAT, AA_MAY_CHANGEHAT, 1038 name, hat ? hat->base.hname : NULL, 1039 hat ? &hat->label : NULL, GLOBAL_ROOT_UID, info, 1040 error); 1041 if (!hat || (error && error != -ENOENT)) 1042 return ERR_PTR(error); 1043 /* if hat && error - complain mode, already audited and we adjust for 1044 * complain mode allow by returning hat->label 1045 */ 1046 return &hat->label; 1047 } 1048 1049 /* helper fn for changing into a hat 1050 * 1051 * Returns: label for hat transition or ERR_PTR. Does not return NULL 1052 */ 1053 static struct aa_label *change_hat(struct aa_label *label, const char *hats[], 1054 int count, int flags) 1055 { 1056 struct aa_profile *profile, *root, *hat = NULL; 1057 struct aa_label *new; 1058 struct label_it it; 1059 bool sibling = false; 1060 const char *name, *info = NULL; 1061 int i, error; 1062 1063 AA_BUG(!label); 1064 AA_BUG(!hats); 1065 AA_BUG(count < 1); 1066 1067 if (PROFILE_IS_HAT(labels_profile(label))) 1068 sibling = true; 1069 1070 /*find first matching hat */ 1071 for (i = 0; i < count && !hat; i++) { 1072 name = hats[i]; 1073 label_for_each_in_ns(it, labels_ns(label), label, profile) { 1074 if (sibling && PROFILE_IS_HAT(profile)) { 1075 root = aa_get_profile_rcu(&profile->parent); 1076 } else if (!sibling && !PROFILE_IS_HAT(profile)) { 1077 root = aa_get_profile(profile); 1078 } else { /* conflicting change type */ 1079 info = "conflicting targets types"; 1080 error = -EPERM; 1081 goto fail; 1082 } 1083 hat = aa_find_child(root, name); 1084 aa_put_profile(root); 1085 if (!hat) { 1086 if (!COMPLAIN_MODE(profile)) 1087 goto outer_continue; 1088 /* complain mode succeed as if hat */ 1089 } else if (!PROFILE_IS_HAT(hat)) { 1090 info = "target not hat"; 1091 error = -EPERM; 1092 aa_put_profile(hat); 1093 goto fail; 1094 } 1095 aa_put_profile(hat); 1096 } 1097 /* found a hat for all profiles in ns */ 1098 goto build; 1099 outer_continue: 1100 ; 1101 } 1102 /* no hats that match, find appropriate error 1103 * 1104 * In complain mode audit of the failure is based off of the first 1105 * hat supplied. This is done due how userspace interacts with 1106 * change_hat. 1107 */ 1108 name = NULL; 1109 label_for_each_in_ns(it, labels_ns(label), label, profile) { 1110 if (!list_empty(&profile->base.profiles)) { 1111 info = "hat not found"; 1112 error = -ENOENT; 1113 goto fail; 1114 } 1115 } 1116 info = "no hats defined"; 1117 error = -ECHILD; 1118 1119 fail: 1120 label_for_each_in_ns(it, labels_ns(label), label, profile) { 1121 /* 1122 * no target as it has failed to be found or built 1123 * 1124 * change_hat uses probing and should not log failures 1125 * related to missing hats 1126 */ 1127 /* TODO: get rid of GLOBAL_ROOT_UID */ 1128 if (count > 1 || COMPLAIN_MODE(profile)) { 1129 aa_audit_file(profile, &nullperms, OP_CHANGE_HAT, 1130 AA_MAY_CHANGEHAT, name, NULL, NULL, 1131 GLOBAL_ROOT_UID, info, error); 1132 } 1133 } 1134 return ERR_PTR(error); 1135 1136 build: 1137 new = fn_label_build_in_ns(label, profile, GFP_KERNEL, 1138 build_change_hat(profile, name, sibling), 1139 aa_get_label(&profile->label)); 1140 if (!new) { 1141 info = "label build failed"; 1142 error = -ENOMEM; 1143 goto fail; 1144 } /* else if (IS_ERR) build_change_hat has logged error so return new */ 1145 1146 return new; 1147 } 1148 1149 /** 1150 * aa_change_hat - change hat to/from subprofile 1151 * @hats: vector of hat names to try changing into (MAYBE NULL if @count == 0) 1152 * @count: number of hat names in @hats 1153 * @token: magic value to validate the hat change 1154 * @flags: flags affecting behavior of the change 1155 * 1156 * Returns %0 on success, error otherwise. 1157 * 1158 * Change to the first profile specified in @hats that exists, and store 1159 * the @hat_magic in the current task context. If the count == 0 and the 1160 * @token matches that stored in the current task context, return to the 1161 * top level profile. 1162 * 1163 * change_hat only applies to profiles in the current ns, and each profile 1164 * in the ns must make the same transition otherwise change_hat will fail. 1165 */ 1166 int aa_change_hat(const char *hats[], int count, u64 token, int flags) 1167 { 1168 const struct cred *cred; 1169 struct aa_task_ctx *ctx = task_ctx(current); 1170 struct aa_label *label, *previous, *new = NULL, *target = NULL; 1171 struct aa_profile *profile; 1172 struct aa_perms perms = {}; 1173 const char *info = NULL; 1174 int error = 0; 1175 1176 /* released below */ 1177 cred = get_current_cred(); 1178 label = aa_get_newest_cred_label(cred); 1179 previous = aa_get_newest_label(ctx->previous); 1180 1181 /* 1182 * Detect no new privs being set, and store the label it 1183 * occurred under. Ideally this would happen when nnp 1184 * is set but there isn't a good way to do that yet. 1185 * 1186 * Testing for unconfined must be done before the subset test 1187 */ 1188 if (task_no_new_privs(current) && !unconfined(label) && !ctx->nnp) 1189 ctx->nnp = aa_get_label(label); 1190 1191 if (unconfined(label)) { 1192 info = "unconfined can not change_hat"; 1193 error = -EPERM; 1194 goto fail; 1195 } 1196 1197 if (count) { 1198 new = change_hat(label, hats, count, flags); 1199 AA_BUG(!new); 1200 if (IS_ERR(new)) { 1201 error = PTR_ERR(new); 1202 new = NULL; 1203 /* already audited */ 1204 goto out; 1205 } 1206 1207 error = may_change_ptraced_domain(new, &info); 1208 if (error) 1209 goto fail; 1210 1211 /* 1212 * no new privs prevents domain transitions that would 1213 * reduce restrictions. 1214 */ 1215 if (task_no_new_privs(current) && !unconfined(label) && 1216 !aa_label_is_subset(new, ctx->nnp)) { 1217 /* not an apparmor denial per se, so don't log it */ 1218 AA_DEBUG("no_new_privs - change_hat denied"); 1219 error = -EPERM; 1220 goto out; 1221 } 1222 1223 if (flags & AA_CHANGE_TEST) 1224 goto out; 1225 1226 target = new; 1227 error = aa_set_current_hat(new, token); 1228 if (error == -EACCES) 1229 /* kill task in case of brute force attacks */ 1230 goto kill; 1231 } else if (previous && !(flags & AA_CHANGE_TEST)) { 1232 /* 1233 * no new privs prevents domain transitions that would 1234 * reduce restrictions. 1235 */ 1236 if (task_no_new_privs(current) && !unconfined(label) && 1237 !aa_label_is_subset(previous, ctx->nnp)) { 1238 /* not an apparmor denial per se, so don't log it */ 1239 AA_DEBUG("no_new_privs - change_hat denied"); 1240 error = -EPERM; 1241 goto out; 1242 } 1243 1244 /* Return to saved label. Kill task if restore fails 1245 * to avoid brute force attacks 1246 */ 1247 target = previous; 1248 error = aa_restore_previous_label(token); 1249 if (error) { 1250 if (error == -EACCES) 1251 goto kill; 1252 goto fail; 1253 } 1254 } /* else ignore @flags && restores when there is no saved profile */ 1255 1256 out: 1257 aa_put_label(new); 1258 aa_put_label(previous); 1259 aa_put_label(label); 1260 put_cred(cred); 1261 1262 return error; 1263 1264 kill: 1265 info = "failed token match"; 1266 perms.kill = AA_MAY_CHANGEHAT; 1267 1268 fail: 1269 fn_for_each_in_ns(label, profile, 1270 aa_audit_file(profile, &perms, OP_CHANGE_HAT, 1271 AA_MAY_CHANGEHAT, NULL, NULL, target, 1272 GLOBAL_ROOT_UID, info, error)); 1273 1274 goto out; 1275 } 1276 1277 1278 static int change_profile_perms_wrapper(const char *op, const char *name, 1279 struct aa_profile *profile, 1280 struct aa_label *target, bool stack, 1281 u32 request, struct aa_perms *perms) 1282 { 1283 const char *info = NULL; 1284 int error = 0; 1285 1286 if (!error) 1287 error = change_profile_perms(profile, target, stack, request, 1288 profile->file.start, perms); 1289 if (error) 1290 error = aa_audit_file(profile, perms, op, request, name, 1291 NULL, target, GLOBAL_ROOT_UID, info, 1292 error); 1293 1294 return error; 1295 } 1296 1297 /** 1298 * aa_change_profile - perform a one-way profile transition 1299 * @fqname: name of profile may include namespace (NOT NULL) 1300 * @onexec: whether this transition is to take place immediately or at exec 1301 * @flags: flags affecting change behavior 1302 * 1303 * Change to new profile @name. Unlike with hats, there is no way 1304 * to change back. If @name isn't specified the current profile name is 1305 * used. 1306 * If @onexec then the transition is delayed until 1307 * the next exec. 1308 * 1309 * Returns %0 on success, error otherwise. 1310 */ 1311 int aa_change_profile(const char *fqname, int flags) 1312 { 1313 struct aa_label *label, *new = NULL, *target = NULL; 1314 struct aa_profile *profile; 1315 struct aa_perms perms = {}; 1316 const char *info = NULL; 1317 const char *auditname = fqname; /* retain leading & if stack */ 1318 bool stack = flags & AA_CHANGE_STACK; 1319 struct aa_task_ctx *ctx = task_ctx(current); 1320 int error = 0; 1321 char *op; 1322 u32 request; 1323 1324 label = aa_get_current_label(); 1325 1326 /* 1327 * Detect no new privs being set, and store the label it 1328 * occurred under. Ideally this would happen when nnp 1329 * is set but there isn't a good way to do that yet. 1330 * 1331 * Testing for unconfined must be done before the subset test 1332 */ 1333 if (task_no_new_privs(current) && !unconfined(label) && !ctx->nnp) 1334 ctx->nnp = aa_get_label(label); 1335 1336 if (!fqname || !*fqname) { 1337 AA_DEBUG("no profile name"); 1338 return -EINVAL; 1339 } 1340 1341 if (flags & AA_CHANGE_ONEXEC) { 1342 request = AA_MAY_ONEXEC; 1343 if (stack) 1344 op = OP_STACK_ONEXEC; 1345 else 1346 op = OP_CHANGE_ONEXEC; 1347 } else { 1348 request = AA_MAY_CHANGE_PROFILE; 1349 if (stack) 1350 op = OP_STACK; 1351 else 1352 op = OP_CHANGE_PROFILE; 1353 } 1354 1355 label = aa_get_current_label(); 1356 1357 if (*fqname == '&') { 1358 stack = true; 1359 /* don't have label_parse() do stacking */ 1360 fqname++; 1361 } 1362 target = aa_label_parse(label, fqname, GFP_KERNEL, true, false); 1363 if (IS_ERR(target)) { 1364 struct aa_profile *tprofile; 1365 1366 info = "label not found"; 1367 error = PTR_ERR(target); 1368 target = NULL; 1369 /* 1370 * TODO: fixme using labels_profile is not right - do profile 1371 * per complain profile 1372 */ 1373 if ((flags & AA_CHANGE_TEST) || 1374 !COMPLAIN_MODE(labels_profile(label))) 1375 goto audit; 1376 /* released below */ 1377 tprofile = aa_new_null_profile(labels_profile(label), false, 1378 fqname, GFP_KERNEL); 1379 if (!tprofile) { 1380 info = "failed null profile create"; 1381 error = -ENOMEM; 1382 goto audit; 1383 } 1384 target = &tprofile->label; 1385 goto check; 1386 } 1387 1388 /* 1389 * self directed transitions only apply to current policy ns 1390 * TODO: currently requiring perms for stacking and straight change 1391 * stacking doesn't strictly need this. Determine how much 1392 * we want to loosen this restriction for stacking 1393 * 1394 * if (!stack) { 1395 */ 1396 error = fn_for_each_in_ns(label, profile, 1397 change_profile_perms_wrapper(op, auditname, 1398 profile, target, stack, 1399 request, &perms)); 1400 if (error) 1401 /* auditing done in change_profile_perms_wrapper */ 1402 goto out; 1403 1404 /* } */ 1405 1406 check: 1407 /* check if tracing task is allowed to trace target domain */ 1408 error = may_change_ptraced_domain(target, &info); 1409 if (error && !fn_for_each_in_ns(label, profile, 1410 COMPLAIN_MODE(profile))) 1411 goto audit; 1412 1413 /* TODO: add permission check to allow this 1414 * if ((flags & AA_CHANGE_ONEXEC) && !current_is_single_threaded()) { 1415 * info = "not a single threaded task"; 1416 * error = -EACCES; 1417 * goto audit; 1418 * } 1419 */ 1420 if (flags & AA_CHANGE_TEST) 1421 goto out; 1422 1423 /* stacking is always a subset, so only check the nonstack case */ 1424 if (!stack) { 1425 new = fn_label_build_in_ns(label, profile, GFP_KERNEL, 1426 aa_get_label(target), 1427 aa_get_label(&profile->label)); 1428 /* 1429 * no new privs prevents domain transitions that would 1430 * reduce restrictions. 1431 */ 1432 if (task_no_new_privs(current) && !unconfined(label) && 1433 !aa_label_is_subset(new, ctx->nnp)) { 1434 /* not an apparmor denial per se, so don't log it */ 1435 AA_DEBUG("no_new_privs - change_hat denied"); 1436 error = -EPERM; 1437 goto out; 1438 } 1439 } 1440 1441 if (!(flags & AA_CHANGE_ONEXEC)) { 1442 /* only transition profiles in the current ns */ 1443 if (stack) 1444 new = aa_label_merge(label, target, GFP_KERNEL); 1445 if (IS_ERR_OR_NULL(new)) { 1446 info = "failed to build target label"; 1447 error = PTR_ERR(new); 1448 new = NULL; 1449 perms.allow = 0; 1450 goto audit; 1451 } 1452 error = aa_replace_current_label(new); 1453 } else { 1454 if (new) { 1455 aa_put_label(new); 1456 new = NULL; 1457 } 1458 1459 /* full transition will be built in exec path */ 1460 error = aa_set_current_onexec(target, stack); 1461 } 1462 1463 audit: 1464 error = fn_for_each_in_ns(label, profile, 1465 aa_audit_file(profile, &perms, op, request, auditname, 1466 NULL, new ? new : target, 1467 GLOBAL_ROOT_UID, info, error)); 1468 1469 out: 1470 aa_put_label(new); 1471 aa_put_label(target); 1472 aa_put_label(label); 1473 1474 return error; 1475 } 1476