blob: a8fc7d08c144bb542ac65cfd8312945c00a1ef50 [file] [log] [blame]
John Johansencdff2642010-07-29 14:47:57 -07001/*
2 * AppArmor security module
3 *
4 * This file contains AppArmor function for pathnames
5 *
6 * Copyright (C) 1998-2008 Novell/SUSE
7 * Copyright 2009-2010 Canonical Ltd.
8 *
9 * This program is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU General Public License as
11 * published by the Free Software Foundation, version 2 of the
12 * License.
13 */
14
15#include <linux/magic.h>
John Johansencdff2642010-07-29 14:47:57 -070016#include <linux/mount.h>
17#include <linux/namei.h>
18#include <linux/nsproxy.h>
19#include <linux/path.h>
20#include <linux/sched.h>
21#include <linux/slab.h>
22#include <linux/fs_struct.h>
23
24#include "include/apparmor.h"
25#include "include/path.h"
26#include "include/policy.h"
27
John Johansencdff2642010-07-29 14:47:57 -070028/* modified from dcache.c */
29static int prepend(char **buffer, int buflen, const char *str, int namelen)
30{
31 buflen -= namelen;
32 if (buflen < 0)
33 return -ENAMETOOLONG;
34 *buffer -= namelen;
35 memcpy(*buffer, str, namelen);
36 return 0;
37}
38
39#define CHROOT_NSCONNECT (PATH_CHROOT_REL | PATH_CHROOT_NSCONNECT)
40
John Johansenbd35db82014-07-25 04:02:10 -070041/* If the path is not connected to the expected root,
42 * check if it is a sysctl and handle specially else remove any
43 * leading / that __d_path may have returned.
44 * Unless
45 * specifically directed to connect the path,
46 * OR
47 * if in a chroot and doing chroot relative paths and the path
48 * resolves to the namespace root (would be connected outside
49 * of chroot) and specifically directed to connect paths to
50 * namespace root.
51 */
52static int disconnect(const struct path *path, char *buf, char **name,
53 int flags)
54{
55 int error = 0;
56
57 if (!(flags & PATH_CONNECT_PATH) &&
58 !(((flags & CHROOT_NSCONNECT) == CHROOT_NSCONNECT) &&
59 our_mnt(path->mnt))) {
60 /* disconnected path, don't return pathname starting
61 * with '/'
62 */
63 error = -EACCES;
64 if (**name == '/')
65 *name = *name + 1;
66 } else if (**name != '/')
67 /* CONNECT_PATH with missing root */
68 error = prepend(name, *name - buf, "/", 1);
69
70 return error;
71}
72
John Johansencdff2642010-07-29 14:47:57 -070073/**
74 * d_namespace_path - lookup a name associated with a given path
75 * @path: path to lookup (NOT NULL)
76 * @buf: buffer to store path to (NOT NULL)
77 * @buflen: length of @buf
78 * @name: Returns - pointer for start of path name with in @buf (NOT NULL)
79 * @flags: flags controlling path lookup
80 *
81 * Handle path name lookup.
82 *
83 * Returns: %0 else error code if path lookup fails
84 * When no error the path name is returned in @name which points to
85 * to a position in @buf
86 */
Al Viro2c7661f2016-03-25 14:18:14 -040087static int d_namespace_path(const struct path *path, char *buf, int buflen,
John Johansencdff2642010-07-29 14:47:57 -070088 char **name, int flags)
89{
John Johansencdff2642010-07-29 14:47:57 -070090 char *res;
Al Viro02125a82011-12-05 08:43:34 -050091 int error = 0;
92 int connected = 1;
John Johansencdff2642010-07-29 14:47:57 -070093
Al Viro02125a82011-12-05 08:43:34 -050094 if (path->mnt->mnt_flags & MNT_INTERNAL) {
95 /* it's not mounted anywhere */
96 res = dentry_path(path->dentry, buf, buflen);
97 *name = res;
98 if (IS_ERR(res)) {
99 *name = buf;
100 return PTR_ERR(res);
101 }
102 if (path->dentry->d_sb->s_magic == PROC_SUPER_MAGIC &&
103 strncmp(*name, "/sys/", 5) == 0) {
104 /* TODO: convert over to using a per namespace
105 * control instead of hard coded /proc
106 */
107 return prepend(name, *name - buf, "/proc", 5);
John Johansenbd35db82014-07-25 04:02:10 -0700108 } else
109 return disconnect(path, buf, name, flags);
Al Viro02125a82011-12-05 08:43:34 -0500110 return 0;
John Johansencdff2642010-07-29 14:47:57 -0700111 }
112
Al Viro02125a82011-12-05 08:43:34 -0500113 /* resolve paths relative to chroot?*/
114 if (flags & PATH_CHROOT_REL) {
115 struct path root;
116 get_fs_root(current->fs, &root);
117 res = __d_path(path, &root, buf, buflen);
Al Viro02125a82011-12-05 08:43:34 -0500118 path_put(&root);
John Johansen3372b682012-02-16 06:32:47 -0800119 } else {
John Johansen28042fa2012-02-16 06:21:30 -0800120 res = d_absolute_path(path, buf, buflen);
John Johansen3372b682012-02-16 06:32:47 -0800121 if (!our_mnt(path->mnt))
122 connected = 0;
123 }
John Johansencdff2642010-07-29 14:47:57 -0700124
John Johansencdff2642010-07-29 14:47:57 -0700125 /* handle error conditions - and still allow a partial path to
126 * be returned.
127 */
John Johansen3372b682012-02-16 06:32:47 -0800128 if (!res || IS_ERR(res)) {
John Johansencffee162012-05-16 11:01:05 -0700129 if (PTR_ERR(res) == -ENAMETOOLONG)
130 return -ENAMETOOLONG;
John Johansen3372b682012-02-16 06:32:47 -0800131 connected = 0;
John Johansenfbba8d82012-02-16 06:28:50 -0800132 res = dentry_path_raw(path->dentry, buf, buflen);
133 if (IS_ERR(res)) {
134 error = PTR_ERR(res);
135 *name = buf;
136 goto out;
137 };
138 } else if (!our_mnt(path->mnt))
Al Viro02125a82011-12-05 08:43:34 -0500139 connected = 0;
John Johansencdff2642010-07-29 14:47:57 -0700140
John Johansenfbba8d82012-02-16 06:28:50 -0800141 *name = res;
142
John Johansene819ff52010-08-27 18:33:26 -0700143 /* Handle two cases:
144 * 1. A deleted dentry && profile is not allowing mediation of deleted
145 * 2. On some filesystems, newly allocated dentries appear to the
146 * security_path hooks as a deleted dentry except without an inode
147 * allocated.
148 */
David Howells729b8a32015-01-29 12:02:31 +0000149 if (d_unlinked(path->dentry) && d_is_positive(path->dentry) &&
John Johansene819ff52010-08-27 18:33:26 -0700150 !(flags & PATH_MEDIATE_DELETED)) {
John Johansencdff2642010-07-29 14:47:57 -0700151 error = -ENOENT;
152 goto out;
John Johansencdff2642010-07-29 14:47:57 -0700153 }
154
John Johansenbd35db82014-07-25 04:02:10 -0700155 if (!connected)
156 error = disconnect(path, buf, name, flags);
John Johansencdff2642010-07-29 14:47:57 -0700157
158out:
John Johansencdff2642010-07-29 14:47:57 -0700159 return error;
160}
161
162/**
163 * get_name_to_buffer - get the pathname to a buffer ensure dir / is appended
164 * @path: path to get name for (NOT NULL)
165 * @flags: flags controlling path lookup
166 * @buffer: buffer to put name in (NOT NULL)
167 * @size: size of buffer
168 * @name: Returns - contains position of path name in @buffer (NOT NULL)
169 *
170 * Returns: %0 else error on failure
171 */
Al Viro2c7661f2016-03-25 14:18:14 -0400172static int get_name_to_buffer(const struct path *path, int flags, char *buffer,
John Johansen57fa1e12012-02-16 06:20:33 -0800173 int size, char **name, const char **info)
John Johansencdff2642010-07-29 14:47:57 -0700174{
175 int adjust = (flags & PATH_IS_DIR) ? 1 : 0;
176 int error = d_namespace_path(path, buffer, size - adjust, name, flags);
177
178 if (!error && (flags & PATH_IS_DIR) && (*name)[1] != '\0')
179 /*
180 * Append "/" to the pathname. The root directory is a special
181 * case; it already ends in slash.
182 */
183 strcpy(&buffer[size - 2], "/");
184
John Johansen57fa1e12012-02-16 06:20:33 -0800185 if (info && error) {
186 if (error == -ENOENT)
187 *info = "Failed name lookup - deleted entry";
John Johansene573cc32013-02-18 16:02:34 -0800188 else if (error == -EACCES)
John Johansen57fa1e12012-02-16 06:20:33 -0800189 *info = "Failed name lookup - disconnected path";
190 else if (error == -ENAMETOOLONG)
191 *info = "Failed name lookup - name too long";
192 else
193 *info = "Failed name lookup";
194 }
195
John Johansencdff2642010-07-29 14:47:57 -0700196 return error;
197}
198
199/**
John Johansen57fa1e12012-02-16 06:20:33 -0800200 * aa_path_name - compute the pathname of a file
John Johansencdff2642010-07-29 14:47:57 -0700201 * @path: path the file (NOT NULL)
202 * @flags: flags controlling path name generation
203 * @buffer: buffer that aa_get_name() allocated (NOT NULL)
204 * @name: Returns - the generated path name if !error (NOT NULL)
John Johansen57fa1e12012-02-16 06:20:33 -0800205 * @info: Returns - information on why the path lookup failed (MAYBE NULL)
John Johansencdff2642010-07-29 14:47:57 -0700206 *
207 * @name is a pointer to the beginning of the pathname (which usually differs
208 * from the beginning of the buffer), or NULL. If there is an error @name
209 * may contain a partial or invalid name that can be used for audit purposes,
210 * but it can not be used for mediation.
211 *
212 * We need PATH_IS_DIR to indicate whether the file is a directory or not
213 * because the file may not yet exist, and so we cannot check the inode's
214 * file type.
215 *
216 * Returns: %0 else error code if could retrieve name
217 */
Al Viro2c7661f2016-03-25 14:18:14 -0400218int aa_path_name(const struct path *path, int flags, char **buffer,
219 const char **name, const char **info)
John Johansencdff2642010-07-29 14:47:57 -0700220{
221 char *buf, *str = NULL;
222 int size = 256;
223 int error;
224
225 *name = NULL;
226 *buffer = NULL;
227 for (;;) {
228 /* freed by caller */
229 buf = kmalloc(size, GFP_KERNEL);
230 if (!buf)
231 return -ENOMEM;
232
John Johansen57fa1e12012-02-16 06:20:33 -0800233 error = get_name_to_buffer(path, flags, buf, size, &str, info);
John Johansencdff2642010-07-29 14:47:57 -0700234 if (error != -ENAMETOOLONG)
235 break;
236
237 kfree(buf);
238 size <<= 1;
239 if (size > aa_g_path_max)
240 return -ENAMETOOLONG;
John Johansen57fa1e12012-02-16 06:20:33 -0800241 *info = NULL;
John Johansencdff2642010-07-29 14:47:57 -0700242 }
243 *buffer = buf;
244 *name = str;
245
246 return error;
247}