mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	apparmor: move change_hat mediation to using labels
Signed-off-by: John Johansen <john.johansen@canonical.com>
This commit is contained in:
		
							parent
							
								
									93c98a484c
								
							
						
					
					
						commit
						89dbf1962a
					
				
					 1 changed files with 201 additions and 102 deletions
				
			
		| 
						 | 
					@ -884,19 +884,153 @@ int apparmor_bprm_secureexec(struct linux_binprm *bprm)
 | 
				
			||||||
 * Functions for self directed profile change
 | 
					 * Functions for self directed profile change
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					
 | 
				
			||||||
 * new_compound_name - create an hname with @n2 appended to @n1
 | 
					/* helper fn for change_hat
 | 
				
			||||||
 * @n1: base of hname  (NOT NULL)
 | 
					 | 
				
			||||||
 * @n2: name to append (NOT NULL)
 | 
					 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Returns: new name or NULL on error
 | 
					 * Returns: label for hat transition OR ERR_PTR.  Does NOT return NULL
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
static char *new_compound_name(const char *n1, const char *n2)
 | 
					static struct aa_label *build_change_hat(struct aa_profile *profile,
 | 
				
			||||||
 | 
										 const char *name, bool sibling)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	char *name = kmalloc(strlen(n1) + strlen(n2) + 3, GFP_KERNEL);
 | 
						struct aa_profile *root, *hat = NULL;
 | 
				
			||||||
	if (name)
 | 
						const char *info = NULL;
 | 
				
			||||||
		sprintf(name, "%s//%s", n1, n2);
 | 
						int error = 0;
 | 
				
			||||||
	return name;
 | 
					
 | 
				
			||||||
 | 
						if (sibling && PROFILE_IS_HAT(profile)) {
 | 
				
			||||||
 | 
							root = aa_get_profile_rcu(&profile->parent);
 | 
				
			||||||
 | 
						} else if (!sibling && !PROFILE_IS_HAT(profile)) {
 | 
				
			||||||
 | 
							root = aa_get_profile(profile);
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							info = "conflicting target types";
 | 
				
			||||||
 | 
							error = -EPERM;
 | 
				
			||||||
 | 
							goto audit;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						hat = aa_find_child(root, name);
 | 
				
			||||||
 | 
						if (!hat) {
 | 
				
			||||||
 | 
							error = -ENOENT;
 | 
				
			||||||
 | 
							if (COMPLAIN_MODE(profile)) {
 | 
				
			||||||
 | 
								hat = aa_new_null_profile(profile, true, name,
 | 
				
			||||||
 | 
											  GFP_KERNEL);
 | 
				
			||||||
 | 
								if (!hat) {
 | 
				
			||||||
 | 
									info = "failed null profile create";
 | 
				
			||||||
 | 
									error = -ENOMEM;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						aa_put_profile(root);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					audit:
 | 
				
			||||||
 | 
						aa_audit_file(profile, &nullperms, OP_CHANGE_HAT, AA_MAY_CHANGEHAT,
 | 
				
			||||||
 | 
							      name, hat ? hat->base.hname : NULL,
 | 
				
			||||||
 | 
							      hat ? &hat->label : NULL, GLOBAL_ROOT_UID, NULL,
 | 
				
			||||||
 | 
							      error);
 | 
				
			||||||
 | 
						if (!hat || (error && error != -ENOENT))
 | 
				
			||||||
 | 
							return ERR_PTR(error);
 | 
				
			||||||
 | 
						/* if hat && error - complain mode, already audited and we adjust for
 | 
				
			||||||
 | 
						 * complain mode allow by returning hat->label
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						return &hat->label;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* helper fn for changing into a hat
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Returns: label for hat transition or ERR_PTR. Does not return NULL
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					static struct aa_label *change_hat(struct aa_label *label, const char *hats[],
 | 
				
			||||||
 | 
									   int count, int flags)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						struct aa_profile *profile, *root, *hat = NULL;
 | 
				
			||||||
 | 
						struct aa_label *new;
 | 
				
			||||||
 | 
						struct label_it it;
 | 
				
			||||||
 | 
						bool sibling = false;
 | 
				
			||||||
 | 
						const char *name, *info = NULL;
 | 
				
			||||||
 | 
						int i, error;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						AA_BUG(!label);
 | 
				
			||||||
 | 
						AA_BUG(!hats);
 | 
				
			||||||
 | 
						AA_BUG(count < 1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (PROFILE_IS_HAT(labels_profile(label)))
 | 
				
			||||||
 | 
							sibling = true;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/*find first matching hat */
 | 
				
			||||||
 | 
						for (i = 0; i < count && !hat; i++) {
 | 
				
			||||||
 | 
							name = hats[i];
 | 
				
			||||||
 | 
							label_for_each_in_ns(it, labels_ns(label), label, profile) {
 | 
				
			||||||
 | 
								if (sibling && PROFILE_IS_HAT(profile)) {
 | 
				
			||||||
 | 
									root = aa_get_profile_rcu(&profile->parent);
 | 
				
			||||||
 | 
								} else if (!sibling && !PROFILE_IS_HAT(profile)) {
 | 
				
			||||||
 | 
									root = aa_get_profile(profile);
 | 
				
			||||||
 | 
								} else {	/* conflicting change type */
 | 
				
			||||||
 | 
									info = "conflicting targets types";
 | 
				
			||||||
 | 
									error = -EPERM;
 | 
				
			||||||
 | 
									goto fail;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								hat = aa_find_child(root, name);
 | 
				
			||||||
 | 
								aa_put_profile(root);
 | 
				
			||||||
 | 
								if (!hat) {
 | 
				
			||||||
 | 
									if (!COMPLAIN_MODE(profile))
 | 
				
			||||||
 | 
										goto outer_continue;
 | 
				
			||||||
 | 
									/* complain mode succeed as if hat */
 | 
				
			||||||
 | 
								} else if (!PROFILE_IS_HAT(hat)) {
 | 
				
			||||||
 | 
									info = "target not hat";
 | 
				
			||||||
 | 
									error = -EPERM;
 | 
				
			||||||
 | 
									aa_put_profile(hat);
 | 
				
			||||||
 | 
									goto fail;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								aa_put_profile(hat);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							/* found a hat for all profiles in ns */
 | 
				
			||||||
 | 
							goto build;
 | 
				
			||||||
 | 
					outer_continue:
 | 
				
			||||||
 | 
						;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						/* no hats that match, find appropriate error
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * In complain mode audit of the failure is based off of the first
 | 
				
			||||||
 | 
						 * hat supplied.  This is done due how userspace interacts with
 | 
				
			||||||
 | 
						 * change_hat.
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						name = NULL;
 | 
				
			||||||
 | 
						label_for_each_in_ns(it, labels_ns(label), label, profile) {
 | 
				
			||||||
 | 
							if (!list_empty(&profile->base.profiles)) {
 | 
				
			||||||
 | 
								info = "hat not found";
 | 
				
			||||||
 | 
								error = -ENOENT;
 | 
				
			||||||
 | 
								goto fail;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						info = "no hats defined";
 | 
				
			||||||
 | 
						error = -ECHILD;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					fail:
 | 
				
			||||||
 | 
						label_for_each_in_ns(it, labels_ns(label), label, profile) {
 | 
				
			||||||
 | 
							/*
 | 
				
			||||||
 | 
							 * no target as it has failed to be found or built
 | 
				
			||||||
 | 
							 *
 | 
				
			||||||
 | 
							 * change_hat uses probing and should not log failures
 | 
				
			||||||
 | 
							 * related to missing hats
 | 
				
			||||||
 | 
							 */
 | 
				
			||||||
 | 
							/* TODO: get rid of GLOBAL_ROOT_UID */
 | 
				
			||||||
 | 
							if (count > 1 || COMPLAIN_MODE(profile)) {
 | 
				
			||||||
 | 
								aa_audit_file(profile, &nullperms, OP_CHANGE_HAT,
 | 
				
			||||||
 | 
									      AA_MAY_CHANGEHAT, name, NULL, NULL,
 | 
				
			||||||
 | 
									      GLOBAL_ROOT_UID, info, error);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return ERR_PTR(error);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					build:
 | 
				
			||||||
 | 
						new = fn_label_build_in_ns(label, profile, GFP_KERNEL,
 | 
				
			||||||
 | 
									   build_change_hat(profile, name, sibling),
 | 
				
			||||||
 | 
									   aa_get_label(&profile->label));
 | 
				
			||||||
 | 
						if (!new) {
 | 
				
			||||||
 | 
							info = "label build failed";
 | 
				
			||||||
 | 
							error = -ENOMEM;
 | 
				
			||||||
 | 
							goto fail;
 | 
				
			||||||
 | 
						} /* else if (IS_ERR) build_change_hat has logged error so return new */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return new;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
| 
						 | 
					@ -906,23 +1040,24 @@ static char *new_compound_name(const char *n1, const char *n2)
 | 
				
			||||||
 * @token: magic value to validate the hat change
 | 
					 * @token: magic value to validate the hat change
 | 
				
			||||||
 * @flags: flags affecting behavior of the change
 | 
					 * @flags: flags affecting behavior of the change
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 | 
					 * Returns %0 on success, error otherwise.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 * Change to the first profile specified in @hats that exists, and store
 | 
					 * Change to the first profile specified in @hats that exists, and store
 | 
				
			||||||
 * the @hat_magic in the current task context.  If the count == 0 and the
 | 
					 * the @hat_magic in the current task context.  If the count == 0 and the
 | 
				
			||||||
 * @token matches that stored in the current task context, return to the
 | 
					 * @token matches that stored in the current task context, return to the
 | 
				
			||||||
 * top level profile.
 | 
					 * top level profile.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Returns %0 on success, error otherwise.
 | 
					 * change_hat only applies to profiles in the current ns, and each profile
 | 
				
			||||||
 | 
					 * in the ns must make the same transition otherwise change_hat will fail.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
int aa_change_hat(const char *hats[], int count, u64 token, int flags)
 | 
					int aa_change_hat(const char *hats[], int count, u64 token, int flags)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	const struct cred *cred;
 | 
						const struct cred *cred;
 | 
				
			||||||
	struct aa_task_ctx *ctx;
 | 
						struct aa_task_ctx *ctx;
 | 
				
			||||||
	struct aa_label *label, *previous_label;
 | 
						struct aa_label *label, *previous, *new = NULL, *target = NULL;
 | 
				
			||||||
	struct aa_profile *profile, *hat = NULL;
 | 
						struct aa_profile *profile;
 | 
				
			||||||
	char *name = NULL;
 | 
					 | 
				
			||||||
	int i;
 | 
					 | 
				
			||||||
	struct aa_perms perms = {};
 | 
						struct aa_perms perms = {};
 | 
				
			||||||
	const char *target = NULL, *info = NULL;
 | 
						const char *info = NULL;
 | 
				
			||||||
	int error = 0;
 | 
						int error = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/*
 | 
						/*
 | 
				
			||||||
| 
						 | 
					@ -930,118 +1065,82 @@ int aa_change_hat(const char *hats[], int count, u64 token, int flags)
 | 
				
			||||||
	 * There is no exception for unconfined as change_hat is not
 | 
						 * There is no exception for unconfined as change_hat is not
 | 
				
			||||||
	 * available.
 | 
						 * available.
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	if (task_no_new_privs(current))
 | 
						if (task_no_new_privs(current)) {
 | 
				
			||||||
 | 
							/* not an apparmor denial per se, so don't log it */
 | 
				
			||||||
 | 
							AA_DEBUG("no_new_privs - change_hat denied");
 | 
				
			||||||
		return -EPERM;
 | 
							return -EPERM;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* released below */
 | 
						/* released below */
 | 
				
			||||||
	cred = get_current_cred();
 | 
						cred = get_current_cred();
 | 
				
			||||||
	ctx = cred_ctx(cred);
 | 
						ctx = cred_ctx(cred);
 | 
				
			||||||
	label = aa_get_newest_cred_label(cred);
 | 
						label = aa_get_newest_cred_label(cred);
 | 
				
			||||||
	previous_label = aa_get_newest_label(ctx->previous);
 | 
						previous = aa_get_newest_label(ctx->previous);
 | 
				
			||||||
	profile = labels_profile(label);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (unconfined(label)) {
 | 
						if (unconfined(label)) {
 | 
				
			||||||
		info = "unconfined";
 | 
							info = "unconfined can not change_hat";
 | 
				
			||||||
		error = -EPERM;
 | 
							error = -EPERM;
 | 
				
			||||||
		goto audit;
 | 
							goto fail;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (count) {
 | 
						if (count) {
 | 
				
			||||||
		/* attempting to change into a new hat or switch to a sibling */
 | 
							new = change_hat(label, hats, count, flags);
 | 
				
			||||||
		struct aa_profile *root;
 | 
							AA_BUG(!new);
 | 
				
			||||||
		if (PROFILE_IS_HAT(profile))
 | 
							if (IS_ERR(new)) {
 | 
				
			||||||
			root = aa_get_profile_rcu(&profile->parent);
 | 
								error = PTR_ERR(new);
 | 
				
			||||||
		else
 | 
								new = NULL;
 | 
				
			||||||
			root = aa_get_profile(profile);
 | 
								/* already audited */
 | 
				
			||||||
 | 
					 | 
				
			||||||
		/* find first matching hat */
 | 
					 | 
				
			||||||
		for (i = 0; i < count && !hat; i++)
 | 
					 | 
				
			||||||
			/* released below */
 | 
					 | 
				
			||||||
			hat = aa_find_child(root, hats[i]);
 | 
					 | 
				
			||||||
		if (!hat) {
 | 
					 | 
				
			||||||
			if (!COMPLAIN_MODE(root) || (flags & AA_CHANGE_TEST)) {
 | 
					 | 
				
			||||||
				if (list_empty(&root->base.profiles))
 | 
					 | 
				
			||||||
					error = -ECHILD;
 | 
					 | 
				
			||||||
				else
 | 
					 | 
				
			||||||
					error = -ENOENT;
 | 
					 | 
				
			||||||
				aa_put_profile(root);
 | 
					 | 
				
			||||||
			goto out;
 | 
								goto out;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			/*
 | 
							error = may_change_ptraced_domain(new, &info);
 | 
				
			||||||
			 * In complain mode and failed to match any hats.
 | 
							if (error)
 | 
				
			||||||
			 * Audit the failure is based off of the first hat
 | 
								goto fail;
 | 
				
			||||||
			 * supplied.  This is done due how userspace
 | 
					 | 
				
			||||||
			 * interacts with change_hat.
 | 
					 | 
				
			||||||
			 *
 | 
					 | 
				
			||||||
			 * TODO: Add logging of all failed hats
 | 
					 | 
				
			||||||
			 */
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
			/* freed below */
 | 
							if (flags & AA_CHANGE_TEST)
 | 
				
			||||||
			name = new_compound_name(root->base.hname, hats[0]);
 | 
								goto out;
 | 
				
			||||||
			aa_put_profile(root);
 | 
					 | 
				
			||||||
			target = name;
 | 
					 | 
				
			||||||
			/* released below */
 | 
					 | 
				
			||||||
			hat = aa_new_null_profile(profile, true, hats[0],
 | 
					 | 
				
			||||||
						  GFP_KERNEL);
 | 
					 | 
				
			||||||
			if (!hat) {
 | 
					 | 
				
			||||||
				info = "failed null profile create";
 | 
					 | 
				
			||||||
				error = -ENOMEM;
 | 
					 | 
				
			||||||
				goto audit;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			aa_put_profile(root);
 | 
					 | 
				
			||||||
			target = hat->base.hname;
 | 
					 | 
				
			||||||
			if (!PROFILE_IS_HAT(hat)) {
 | 
					 | 
				
			||||||
				info = "target not hat";
 | 
					 | 
				
			||||||
				error = -EPERM;
 | 
					 | 
				
			||||||
				goto audit;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		error = may_change_ptraced_domain(&hat->label, &info);
 | 
							target = new;
 | 
				
			||||||
		if (error) {
 | 
							error = aa_set_current_hat(new, token);
 | 
				
			||||||
			info = "ptraced";
 | 
					 | 
				
			||||||
			error = -EPERM;
 | 
					 | 
				
			||||||
			goto audit;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (!(flags & AA_CHANGE_TEST)) {
 | 
					 | 
				
			||||||
			error = aa_set_current_hat(&hat->label, token);
 | 
					 | 
				
			||||||
		if (error == -EACCES)
 | 
							if (error == -EACCES)
 | 
				
			||||||
			/* kill task in case of brute force attacks */
 | 
								/* kill task in case of brute force attacks */
 | 
				
			||||||
				perms.kill = AA_MAY_CHANGEHAT;
 | 
								goto kill;
 | 
				
			||||||
			else if (name && !error)
 | 
						} else if (previous && !(flags & AA_CHANGE_TEST)) {
 | 
				
			||||||
				/* reset error for learning of new hats */
 | 
							/* Return to saved label.  Kill task if restore fails
 | 
				
			||||||
				error = -ENOENT;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	} else if (previous_label) {
 | 
					 | 
				
			||||||
		/* Return to saved profile.  Kill task if restore fails
 | 
					 | 
				
			||||||
		 * to avoid brute force attacks
 | 
							 * to avoid brute force attacks
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		target = previous_label->hname;
 | 
							target = previous;
 | 
				
			||||||
		error = aa_restore_previous_label(token);
 | 
							error = aa_restore_previous_label(token);
 | 
				
			||||||
		perms.kill = AA_MAY_CHANGEHAT;
 | 
							if (error) {
 | 
				
			||||||
	} else
 | 
								if (error == -EACCES)
 | 
				
			||||||
		/* ignore restores when there is no saved profile */
 | 
									goto kill;
 | 
				
			||||||
		goto out;
 | 
								goto fail;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
audit:
 | 
						} /* else ignore @flags && restores when there is no saved profile */
 | 
				
			||||||
	if (!(flags & AA_CHANGE_TEST))
 | 
					 | 
				
			||||||
		error = aa_audit_file(profile, &perms, OP_CHANGE_HAT,
 | 
					 | 
				
			||||||
				      AA_MAY_CHANGEHAT, NULL, target, NULL,
 | 
					 | 
				
			||||||
				      GLOBAL_ROOT_UID, info, error);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
out:
 | 
					out:
 | 
				
			||||||
	aa_put_profile(hat);
 | 
						aa_put_label(new);
 | 
				
			||||||
	kfree(name);
 | 
						aa_put_label(previous);
 | 
				
			||||||
	aa_put_label(label);
 | 
						aa_put_label(label);
 | 
				
			||||||
	aa_put_label(previous_label);
 | 
					 | 
				
			||||||
	put_cred(cred);
 | 
						put_cred(cred);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return error;
 | 
						return error;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					kill:
 | 
				
			||||||
 | 
						info = "failed token match";
 | 
				
			||||||
 | 
						perms.kill = AA_MAY_CHANGEHAT;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					fail:
 | 
				
			||||||
 | 
						fn_for_each_in_ns(label, profile,
 | 
				
			||||||
 | 
							aa_audit_file(profile, &perms, OP_CHANGE_HAT,
 | 
				
			||||||
 | 
								      AA_MAY_CHANGEHAT, NULL, NULL, target,
 | 
				
			||||||
 | 
								      GLOBAL_ROOT_UID, info, error));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						goto out;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * aa_change_profile - perform a one-way profile transition
 | 
					 * aa_change_profile - perform a one-way profile transition
 | 
				
			||||||
 * @fqname: name of profile may include namespace (NOT NULL)
 | 
					 * @fqname: name of profile may include namespace (NOT NULL)
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue