^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * A security context is a set of security attributes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * associated with each subject and object controlled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * by the security policy. Security contexts are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * externally represented as variable-length strings
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * that can be interpreted by a user or application
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * with an understanding of the security policy.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) * Internally, the security server uses a simple
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) * structure. This structure is private to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) * security server and can be changed without affecting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * clients of the security server.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) * Author : Stephen Smalley, <sds@tycho.nsa.gov>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #ifndef _SS_CONTEXT_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #define _SS_CONTEXT_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #include "ebitmap.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) #include "mls_types.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) #include "security.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) * A security context consists of an authenticated user
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) * identity, a role, a type and a MLS range.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) struct context {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) u32 user;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) u32 role;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) u32 type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) u32 len; /* length of string in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) struct mls_range range;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) char *str; /* string representation if context cannot be mapped. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) static inline void mls_context_init(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) memset(&c->range, 0, sizeof(c->range));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) static inline int mls_context_cpy(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) dst->range.level[0].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) dst->range.level[1].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) * Sets both levels in the MLS range of 'dst' to the low level of 'src'.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) static inline int mls_context_cpy_low(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) dst->range.level[0].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) dst->range.level[1].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) * Sets both levels in the MLS range of 'dst' to the high level of 'src'.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) static inline int mls_context_cpy_high(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) dst->range.level[0].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) dst->range.level[1].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) static inline int mls_context_glblub(struct context *dst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) struct mls_range *dr = &dst->range, *r1 = &c1->range, *r2 = &c2->range;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) int rc = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) if (r1->level[1].sens < r2->level[0].sens ||
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) r2->level[1].sens < r1->level[0].sens)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) /* These ranges have no common sensitivities */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) /* Take the greatest of the low */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) dr->level[0].sens = max(r1->level[0].sens, r2->level[0].sens);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) /* Take the least of the high */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) dr->level[1].sens = min(r1->level[1].sens, r2->level[1].sens);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) rc = ebitmap_and(&dr->level[0].cat,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) &r1->level[0].cat, &r2->level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) rc = ebitmap_and(&dr->level[1].cat,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) &r1->level[1].cat, &r2->level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) static inline int mls_context_cmp(struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) return ((c1->range.level[0].sens == c2->range.level[0].sens) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) ebitmap_cmp(&c1->range.level[0].cat, &c2->range.level[0].cat) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) (c1->range.level[1].sens == c2->range.level[1].sens) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) ebitmap_cmp(&c1->range.level[1].cat, &c2->range.level[1].cat));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) static inline void mls_context_destroy(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) ebitmap_destroy(&c->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) ebitmap_destroy(&c->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) mls_context_init(c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) static inline void context_init(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) memset(c, 0, sizeof(*c));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) static inline int context_cpy(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) dst->user = src->user;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) dst->role = src->role;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) dst->type = src->type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) if (src->str) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) dst->str = kstrdup(src->str, GFP_ATOMIC);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) if (!dst->str)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) return -ENOMEM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) dst->len = src->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) dst->str = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) dst->len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) rc = mls_context_cpy(dst, src);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) if (rc) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) kfree(dst->str);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) static inline void context_destroy(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) c->user = c->role = c->type = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) kfree(c->str);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) c->str = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) c->len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) mls_context_destroy(c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) static inline int context_cmp(struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) if (c1->len && c2->len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) return (c1->len == c2->len && !strcmp(c1->str, c2->str));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) if (c1->len || c2->len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) return ((c1->user == c2->user) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) (c1->role == c2->role) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) (c1->type == c2->type) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) mls_context_cmp(c1, c2));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) u32 context_compute_hash(const struct context *c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) #endif /* _SS_CONTEXT_H_ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198)