blob: 63c8cd7887ab9ea6d6ae664f1568da7cdc83b45b [file] [log] [blame]
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -07001/* Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -06002 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License version 2 and
5 * only version 2 as published by the Free Software Foundation.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 */
12
13#include <linux/module.h>
14#include <linux/types.h>
15#include <linux/net.h>
16#include <linux/socket.h>
17#include <linux/errno.h>
18#include <linux/mm.h>
19#include <linux/poll.h>
20#include <linux/fcntl.h>
21#include <linux/gfp.h>
22#include <linux/uaccess.h>
23#include <linux/kernel.h>
24#include <linux/msm_ipc.h>
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -060025#include <linux/rwsem.h>
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060026
27#include <asm/uaccess.h>
28
29#include <net/sock.h>
30#include "ipc_router.h"
31#include "msm_ipc_router_security.h"
32
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -070033#define IRSC_COMPLETION_TIMEOUT_MS 30000
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060034#define SEC_RULES_HASH_SZ 32
35struct security_rule {
36 struct list_head list;
37 uint32_t service_id;
38 uint32_t instance_id;
39 unsigned reserved;
40 int num_group_info;
Karthikeyan Ramasubramanian1c5707c2013-02-26 17:20:07 -070041 gid_t *group_id;
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060042};
43
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -060044static DECLARE_RWSEM(security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060045static struct list_head security_rules[SEC_RULES_HASH_SZ];
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -070046static DECLARE_COMPLETION(irsc_completion);
47
48/**
49 * wait_for_irsc_completion() - Wait for IPC Router Security Configuration
50 * (IRSC) to complete
51 */
52void wait_for_irsc_completion(void)
53{
54 unsigned long rem_jiffies;
55 do {
56 rem_jiffies = wait_for_completion_timeout(&irsc_completion,
57 msecs_to_jiffies(IRSC_COMPLETION_TIMEOUT_MS));
58 if (rem_jiffies)
59 return;
60 pr_err("%s: waiting for IPC Security Conf.\n", __func__);
61 } while (1);
62}
63
64/**
65 * signal_irsc_completion() - Signal the completion of IRSC
66 */
67void signal_irsc_completion(void)
68{
69 complete_all(&irsc_completion);
70}
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060071
72/**
73 * check_permisions() - Check whether the process has permissions to
74 * create an interface handle with IPC Router
75 *
76 * @return: true if the process has permissions, else false.
77 */
78int check_permissions(void)
79{
80 int rc = 0;
81 if (!current_euid() || in_egroup_p(AID_NET_RAW))
82 rc = 1;
83 return rc;
84}
85EXPORT_SYMBOL(check_permissions);
86
87/**
88 * msm_ipc_config_sec_rules() - Add a security rule to the database
89 * @arg: Pointer to the buffer containing the rule.
90 *
91 * @return: 0 if successfully added, < 0 for error.
92 *
93 * A security rule is defined using <Service_ID: Group_ID> tuple. The rule
94 * implies that a user-space process in order to send a QMI message to
95 * service Service_ID should belong to the Linux group Group_ID.
96 */
97int msm_ipc_config_sec_rules(void *arg)
98{
99 struct config_sec_rules_args sec_rules_arg;
100 struct security_rule *rule, *temp_rule;
101 int key;
Karthikeyan Ramasubramanian1c5707c2013-02-26 17:20:07 -0700102 int group_info_sz;
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600103 int ret;
104
105 if (current_euid())
106 return -EPERM;
107
108 ret = copy_from_user(&sec_rules_arg, (void *)arg,
109 sizeof(sec_rules_arg));
110 if (ret)
111 return -EFAULT;
112
113 if (sec_rules_arg.num_group_info <= 0)
114 return -EINVAL;
115
Karthikeyan Ramasubramanian1c5707c2013-02-26 17:20:07 -0700116 group_info_sz = sec_rules_arg.num_group_info * sizeof(gid_t);
117 if ((group_info_sz / sizeof(gid_t)) != sec_rules_arg.num_group_info) {
118 pr_err("%s: Integer Overflow %d * %d\n", __func__,
119 sizeof(gid_t), sec_rules_arg.num_group_info);
120 return -EINVAL;
121 }
122
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600123 rule = kzalloc(sizeof(struct security_rule), GFP_KERNEL);
124 if (!rule) {
125 pr_err("%s: security_rule alloc failed\n", __func__);
126 return -ENOMEM;
127 }
128
Karthikeyan Ramasubramanian1c5707c2013-02-26 17:20:07 -0700129 rule->group_id = kzalloc(group_info_sz, GFP_KERNEL);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600130 if (!rule->group_id) {
131 pr_err("%s: group_id alloc failed\n", __func__);
132 kfree(rule);
133 return -ENOMEM;
134 }
135
136 rule->service_id = sec_rules_arg.service_id;
137 rule->instance_id = sec_rules_arg.instance_id;
138 rule->reserved = sec_rules_arg.reserved;
139 rule->num_group_info = sec_rules_arg.num_group_info;
140 ret = copy_from_user(rule->group_id,
141 ((void *)(arg + sizeof(sec_rules_arg))),
Karthikeyan Ramasubramanian1c5707c2013-02-26 17:20:07 -0700142 group_info_sz);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600143 if (ret) {
144 kfree(rule->group_id);
145 kfree(rule);
146 return -EFAULT;
147 }
148
149 key = rule->service_id & (SEC_RULES_HASH_SZ - 1);
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600150 down_write(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600151 if (rule->service_id == ALL_SERVICE) {
152 temp_rule = list_first_entry(&security_rules[key],
153 struct security_rule, list);
154 list_del(&temp_rule->list);
155 kfree(temp_rule->group_id);
156 kfree(temp_rule);
157 }
158 list_add_tail(&rule->list, &security_rules[key]);
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600159 up_write(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600160
161 if (rule->service_id == ALL_SERVICE)
162 msm_ipc_sync_default_sec_rule((void *)rule);
163 else
164 msm_ipc_sync_sec_rule(rule->service_id, rule->instance_id,
165 (void *)rule);
166
167 return 0;
168}
169EXPORT_SYMBOL(msm_ipc_config_sec_rules);
170
171/**
172 * msm_ipc_add_default_rule() - Add default security rule
173 *
174 * @return: 0 on success, < 0 on error/
175 *
176 * This function is used to ensure the basic security, if there is no
177 * security rule defined for a service. It can be overwritten by the
178 * default security rule from user-space script.
179 */
180static int msm_ipc_add_default_rule(void)
181{
182 struct security_rule *rule;
183 int key;
184
185 rule = kzalloc(sizeof(struct security_rule), GFP_KERNEL);
186 if (!rule) {
187 pr_err("%s: security_rule alloc failed\n", __func__);
188 return -ENOMEM;
189 }
190
191 rule->group_id = kzalloc(sizeof(int), GFP_KERNEL);
192 if (!rule->group_id) {
193 pr_err("%s: group_id alloc failed\n", __func__);
194 kfree(rule);
195 return -ENOMEM;
196 }
197
198 rule->service_id = ALL_SERVICE;
199 rule->instance_id = ALL_INSTANCE;
200 rule->num_group_info = 1;
201 *(rule->group_id) = AID_NET_RAW;
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600202 down_write(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600203 key = (ALL_SERVICE & (SEC_RULES_HASH_SZ - 1));
204 list_add_tail(&rule->list, &security_rules[key]);
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600205 up_write(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600206 return 0;
207}
208
209/**
210 * msm_ipc_get_security_rule() - Get the security rule corresponding to a
211 * service
212 * @service_id: Service ID for which the rule has to be got.
213 * @instance_id: Instance ID for which the rule has to be got.
214 *
215 * @return: Returns the rule info on success, NULL on error.
216 *
217 * This function is used when the service comes up and gets registered with
218 * the IPC Router.
219 */
220void *msm_ipc_get_security_rule(uint32_t service_id, uint32_t instance_id)
221{
222 int key;
223 struct security_rule *rule;
224
225 key = (service_id & (SEC_RULES_HASH_SZ - 1));
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600226 down_read(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600227 /* Return the rule for a specific <service:instance>, if found. */
228 list_for_each_entry(rule, &security_rules[key], list) {
229 if ((rule->service_id == service_id) &&
230 (rule->instance_id == instance_id)) {
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600231 up_read(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600232 return (void *)rule;
233 }
234 }
235
236 /* Return the rule for a specific service, if found. */
237 list_for_each_entry(rule, &security_rules[key], list) {
238 if ((rule->service_id == service_id) &&
239 (rule->instance_id == ALL_INSTANCE)) {
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600240 up_read(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600241 return (void *)rule;
242 }
243 }
244
245 /* Return the default rule, if no rule defined for a service. */
246 key = (ALL_SERVICE & (SEC_RULES_HASH_SZ - 1));
247 list_for_each_entry(rule, &security_rules[key], list) {
248 if ((rule->service_id == ALL_SERVICE) &&
249 (rule->instance_id == ALL_INSTANCE)) {
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600250 up_read(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600251 return (void *)rule;
252 }
253 }
Karthikeyan Ramasubramanian4b88e5d2013-05-21 11:49:21 -0600254 up_read(&security_rules_lock_lha4);
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600255 return NULL;
256}
257EXPORT_SYMBOL(msm_ipc_get_security_rule);
258
259/**
260 * msm_ipc_check_send_permissions() - Check if the sendng process has
261 * permissions specified as per the rule
262 * @data: Security rule to be checked.
263 *
264 * @return: true if the process has permissions, else false.
265 *
266 * This function is used to check if the current executing process has
267 * permissions to send message to the remote entity. The security rule
268 * corresponding to the remote entity is specified by "data" parameter
269 */
270int msm_ipc_check_send_permissions(void *data)
271{
272 int i;
273 struct security_rule *rule = (struct security_rule *)data;
274
275 /* Source/Sender is Root user */
276 if (!current_euid())
277 return 1;
278
279 /* Destination has no rules defined, possibly a client. */
280 if (!rule)
281 return 1;
282
283 for (i = 0; i < rule->num_group_info; i++) {
284 if (in_egroup_p(rule->group_id[i]))
285 return 1;
286 }
287 return 0;
288}
289EXPORT_SYMBOL(msm_ipc_check_send_permissions);
290
291/**
292 * msm_ipc_router_security_init() - Initialize the security rule database
293 *
294 * @return: 0 if successful, < 0 for error.
295 */
296int msm_ipc_router_security_init(void)
297{
298 int i;
299
300 for (i = 0; i < SEC_RULES_HASH_SZ; i++)
301 INIT_LIST_HEAD(&security_rules[i]);
302
303 msm_ipc_add_default_rule();
304 return 0;
305}
306EXPORT_SYMBOL(msm_ipc_router_security_init);