Karthikeyan Ramasubramanian | f7a4b6e | 2013-01-16 09:00:28 -0700 | [diff] [blame] | 1 | /* Copyright (c) 2012-2013, The Linux Foundation. All rights reserved. |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 2 | * |
| 3 | * This program is free software; you can redistribute it and/or modify |
| 4 | * it under the terms of the GNU General Public License version 2 and |
| 5 | * only version 2 as published by the Free Software Foundation. |
| 6 | * |
| 7 | * This program is distributed in the hope that it will be useful, |
| 8 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 9 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 10 | * GNU General Public License for more details. |
| 11 | */ |
| 12 | |
| 13 | #include <linux/module.h> |
| 14 | #include <linux/types.h> |
| 15 | #include <linux/net.h> |
| 16 | #include <linux/socket.h> |
| 17 | #include <linux/errno.h> |
| 18 | #include <linux/mm.h> |
| 19 | #include <linux/poll.h> |
| 20 | #include <linux/fcntl.h> |
| 21 | #include <linux/gfp.h> |
| 22 | #include <linux/uaccess.h> |
| 23 | #include <linux/kernel.h> |
| 24 | #include <linux/msm_ipc.h> |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 25 | #include <linux/rwsem.h> |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 26 | |
| 27 | #include <asm/uaccess.h> |
| 28 | |
| 29 | #include <net/sock.h> |
| 30 | #include "ipc_router.h" |
| 31 | #include "msm_ipc_router_security.h" |
| 32 | |
Karthikeyan Ramasubramanian | f7a4b6e | 2013-01-16 09:00:28 -0700 | [diff] [blame] | 33 | #define IRSC_COMPLETION_TIMEOUT_MS 30000 |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 34 | #define SEC_RULES_HASH_SZ 32 |
| 35 | struct security_rule { |
| 36 | struct list_head list; |
| 37 | uint32_t service_id; |
| 38 | uint32_t instance_id; |
| 39 | unsigned reserved; |
| 40 | int num_group_info; |
Karthikeyan Ramasubramanian | 1c5707c | 2013-02-26 17:20:07 -0700 | [diff] [blame] | 41 | gid_t *group_id; |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 42 | }; |
| 43 | |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 44 | static DECLARE_RWSEM(security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 45 | static struct list_head security_rules[SEC_RULES_HASH_SZ]; |
Karthikeyan Ramasubramanian | f7a4b6e | 2013-01-16 09:00:28 -0700 | [diff] [blame] | 46 | static DECLARE_COMPLETION(irsc_completion); |
| 47 | |
| 48 | /** |
| 49 | * wait_for_irsc_completion() - Wait for IPC Router Security Configuration |
| 50 | * (IRSC) to complete |
| 51 | */ |
| 52 | void wait_for_irsc_completion(void) |
| 53 | { |
| 54 | unsigned long rem_jiffies; |
| 55 | do { |
| 56 | rem_jiffies = wait_for_completion_timeout(&irsc_completion, |
| 57 | msecs_to_jiffies(IRSC_COMPLETION_TIMEOUT_MS)); |
| 58 | if (rem_jiffies) |
| 59 | return; |
| 60 | pr_err("%s: waiting for IPC Security Conf.\n", __func__); |
| 61 | } while (1); |
| 62 | } |
| 63 | |
| 64 | /** |
| 65 | * signal_irsc_completion() - Signal the completion of IRSC |
| 66 | */ |
| 67 | void signal_irsc_completion(void) |
| 68 | { |
| 69 | complete_all(&irsc_completion); |
| 70 | } |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 71 | |
| 72 | /** |
| 73 | * check_permisions() - Check whether the process has permissions to |
| 74 | * create an interface handle with IPC Router |
| 75 | * |
| 76 | * @return: true if the process has permissions, else false. |
| 77 | */ |
| 78 | int check_permissions(void) |
| 79 | { |
| 80 | int rc = 0; |
| 81 | if (!current_euid() || in_egroup_p(AID_NET_RAW)) |
| 82 | rc = 1; |
| 83 | return rc; |
| 84 | } |
| 85 | EXPORT_SYMBOL(check_permissions); |
| 86 | |
| 87 | /** |
| 88 | * msm_ipc_config_sec_rules() - Add a security rule to the database |
| 89 | * @arg: Pointer to the buffer containing the rule. |
| 90 | * |
| 91 | * @return: 0 if successfully added, < 0 for error. |
| 92 | * |
| 93 | * A security rule is defined using <Service_ID: Group_ID> tuple. The rule |
| 94 | * implies that a user-space process in order to send a QMI message to |
| 95 | * service Service_ID should belong to the Linux group Group_ID. |
| 96 | */ |
| 97 | int msm_ipc_config_sec_rules(void *arg) |
| 98 | { |
| 99 | struct config_sec_rules_args sec_rules_arg; |
| 100 | struct security_rule *rule, *temp_rule; |
| 101 | int key; |
Karthikeyan Ramasubramanian | 1c5707c | 2013-02-26 17:20:07 -0700 | [diff] [blame] | 102 | int group_info_sz; |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 103 | int ret; |
| 104 | |
| 105 | if (current_euid()) |
| 106 | return -EPERM; |
| 107 | |
| 108 | ret = copy_from_user(&sec_rules_arg, (void *)arg, |
| 109 | sizeof(sec_rules_arg)); |
| 110 | if (ret) |
| 111 | return -EFAULT; |
| 112 | |
| 113 | if (sec_rules_arg.num_group_info <= 0) |
| 114 | return -EINVAL; |
| 115 | |
Karthikeyan Ramasubramanian | 1c5707c | 2013-02-26 17:20:07 -0700 | [diff] [blame] | 116 | group_info_sz = sec_rules_arg.num_group_info * sizeof(gid_t); |
| 117 | if ((group_info_sz / sizeof(gid_t)) != sec_rules_arg.num_group_info) { |
| 118 | pr_err("%s: Integer Overflow %d * %d\n", __func__, |
| 119 | sizeof(gid_t), sec_rules_arg.num_group_info); |
| 120 | return -EINVAL; |
| 121 | } |
| 122 | |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 123 | rule = kzalloc(sizeof(struct security_rule), GFP_KERNEL); |
| 124 | if (!rule) { |
| 125 | pr_err("%s: security_rule alloc failed\n", __func__); |
| 126 | return -ENOMEM; |
| 127 | } |
| 128 | |
Karthikeyan Ramasubramanian | 1c5707c | 2013-02-26 17:20:07 -0700 | [diff] [blame] | 129 | rule->group_id = kzalloc(group_info_sz, GFP_KERNEL); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 130 | if (!rule->group_id) { |
| 131 | pr_err("%s: group_id alloc failed\n", __func__); |
| 132 | kfree(rule); |
| 133 | return -ENOMEM; |
| 134 | } |
| 135 | |
| 136 | rule->service_id = sec_rules_arg.service_id; |
| 137 | rule->instance_id = sec_rules_arg.instance_id; |
| 138 | rule->reserved = sec_rules_arg.reserved; |
| 139 | rule->num_group_info = sec_rules_arg.num_group_info; |
| 140 | ret = copy_from_user(rule->group_id, |
| 141 | ((void *)(arg + sizeof(sec_rules_arg))), |
Karthikeyan Ramasubramanian | 1c5707c | 2013-02-26 17:20:07 -0700 | [diff] [blame] | 142 | group_info_sz); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 143 | if (ret) { |
| 144 | kfree(rule->group_id); |
| 145 | kfree(rule); |
| 146 | return -EFAULT; |
| 147 | } |
| 148 | |
| 149 | key = rule->service_id & (SEC_RULES_HASH_SZ - 1); |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 150 | down_write(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 151 | if (rule->service_id == ALL_SERVICE) { |
| 152 | temp_rule = list_first_entry(&security_rules[key], |
| 153 | struct security_rule, list); |
| 154 | list_del(&temp_rule->list); |
| 155 | kfree(temp_rule->group_id); |
| 156 | kfree(temp_rule); |
| 157 | } |
| 158 | list_add_tail(&rule->list, &security_rules[key]); |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 159 | up_write(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 160 | |
| 161 | if (rule->service_id == ALL_SERVICE) |
| 162 | msm_ipc_sync_default_sec_rule((void *)rule); |
| 163 | else |
| 164 | msm_ipc_sync_sec_rule(rule->service_id, rule->instance_id, |
| 165 | (void *)rule); |
| 166 | |
| 167 | return 0; |
| 168 | } |
| 169 | EXPORT_SYMBOL(msm_ipc_config_sec_rules); |
| 170 | |
| 171 | /** |
| 172 | * msm_ipc_add_default_rule() - Add default security rule |
| 173 | * |
| 174 | * @return: 0 on success, < 0 on error/ |
| 175 | * |
| 176 | * This function is used to ensure the basic security, if there is no |
| 177 | * security rule defined for a service. It can be overwritten by the |
| 178 | * default security rule from user-space script. |
| 179 | */ |
| 180 | static int msm_ipc_add_default_rule(void) |
| 181 | { |
| 182 | struct security_rule *rule; |
| 183 | int key; |
| 184 | |
| 185 | rule = kzalloc(sizeof(struct security_rule), GFP_KERNEL); |
| 186 | if (!rule) { |
| 187 | pr_err("%s: security_rule alloc failed\n", __func__); |
| 188 | return -ENOMEM; |
| 189 | } |
| 190 | |
| 191 | rule->group_id = kzalloc(sizeof(int), GFP_KERNEL); |
| 192 | if (!rule->group_id) { |
| 193 | pr_err("%s: group_id alloc failed\n", __func__); |
| 194 | kfree(rule); |
| 195 | return -ENOMEM; |
| 196 | } |
| 197 | |
| 198 | rule->service_id = ALL_SERVICE; |
| 199 | rule->instance_id = ALL_INSTANCE; |
| 200 | rule->num_group_info = 1; |
| 201 | *(rule->group_id) = AID_NET_RAW; |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 202 | down_write(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 203 | key = (ALL_SERVICE & (SEC_RULES_HASH_SZ - 1)); |
| 204 | list_add_tail(&rule->list, &security_rules[key]); |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 205 | up_write(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 206 | return 0; |
| 207 | } |
| 208 | |
| 209 | /** |
| 210 | * msm_ipc_get_security_rule() - Get the security rule corresponding to a |
| 211 | * service |
| 212 | * @service_id: Service ID for which the rule has to be got. |
| 213 | * @instance_id: Instance ID for which the rule has to be got. |
| 214 | * |
| 215 | * @return: Returns the rule info on success, NULL on error. |
| 216 | * |
| 217 | * This function is used when the service comes up and gets registered with |
| 218 | * the IPC Router. |
| 219 | */ |
| 220 | void *msm_ipc_get_security_rule(uint32_t service_id, uint32_t instance_id) |
| 221 | { |
| 222 | int key; |
| 223 | struct security_rule *rule; |
| 224 | |
| 225 | key = (service_id & (SEC_RULES_HASH_SZ - 1)); |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 226 | down_read(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 227 | /* Return the rule for a specific <service:instance>, if found. */ |
| 228 | list_for_each_entry(rule, &security_rules[key], list) { |
| 229 | if ((rule->service_id == service_id) && |
| 230 | (rule->instance_id == instance_id)) { |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 231 | up_read(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 232 | return (void *)rule; |
| 233 | } |
| 234 | } |
| 235 | |
| 236 | /* Return the rule for a specific service, if found. */ |
| 237 | list_for_each_entry(rule, &security_rules[key], list) { |
| 238 | if ((rule->service_id == service_id) && |
| 239 | (rule->instance_id == ALL_INSTANCE)) { |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 240 | up_read(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 241 | return (void *)rule; |
| 242 | } |
| 243 | } |
| 244 | |
| 245 | /* Return the default rule, if no rule defined for a service. */ |
| 246 | key = (ALL_SERVICE & (SEC_RULES_HASH_SZ - 1)); |
| 247 | list_for_each_entry(rule, &security_rules[key], list) { |
| 248 | if ((rule->service_id == ALL_SERVICE) && |
| 249 | (rule->instance_id == ALL_INSTANCE)) { |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 250 | up_read(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 251 | return (void *)rule; |
| 252 | } |
| 253 | } |
Karthikeyan Ramasubramanian | 4b88e5d | 2013-05-21 11:49:21 -0600 | [diff] [blame] | 254 | up_read(&security_rules_lock_lha4); |
Karthikeyan Ramasubramanian | 5b502d364 | 2012-09-23 22:23:36 -0600 | [diff] [blame] | 255 | return NULL; |
| 256 | } |
| 257 | EXPORT_SYMBOL(msm_ipc_get_security_rule); |
| 258 | |
| 259 | /** |
| 260 | * msm_ipc_check_send_permissions() - Check if the sendng process has |
| 261 | * permissions specified as per the rule |
| 262 | * @data: Security rule to be checked. |
| 263 | * |
| 264 | * @return: true if the process has permissions, else false. |
| 265 | * |
| 266 | * This function is used to check if the current executing process has |
| 267 | * permissions to send message to the remote entity. The security rule |
| 268 | * corresponding to the remote entity is specified by "data" parameter |
| 269 | */ |
| 270 | int msm_ipc_check_send_permissions(void *data) |
| 271 | { |
| 272 | int i; |
| 273 | struct security_rule *rule = (struct security_rule *)data; |
| 274 | |
| 275 | /* Source/Sender is Root user */ |
| 276 | if (!current_euid()) |
| 277 | return 1; |
| 278 | |
| 279 | /* Destination has no rules defined, possibly a client. */ |
| 280 | if (!rule) |
| 281 | return 1; |
| 282 | |
| 283 | for (i = 0; i < rule->num_group_info; i++) { |
| 284 | if (in_egroup_p(rule->group_id[i])) |
| 285 | return 1; |
| 286 | } |
| 287 | return 0; |
| 288 | } |
| 289 | EXPORT_SYMBOL(msm_ipc_check_send_permissions); |
| 290 | |
| 291 | /** |
| 292 | * msm_ipc_router_security_init() - Initialize the security rule database |
| 293 | * |
| 294 | * @return: 0 if successful, < 0 for error. |
| 295 | */ |
| 296 | int msm_ipc_router_security_init(void) |
| 297 | { |
| 298 | int i; |
| 299 | |
| 300 | for (i = 0; i < SEC_RULES_HASH_SZ; i++) |
| 301 | INIT_LIST_HEAD(&security_rules[i]); |
| 302 | |
| 303 | msm_ipc_add_default_rule(); |
| 304 | return 0; |
| 305 | } |
| 306 | EXPORT_SYMBOL(msm_ipc_router_security_init); |