Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  * A security context is a set of security attributes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  * associated with each subject and object controlled
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5)  * by the security policy.  Security contexts are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6)   * externally represented as variable-length strings
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7)  * that can be interpreted by a user or application
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8)  * with an understanding of the security policy.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9)  * Internally, the security server uses a simple
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10)  * structure.  This structure is private to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11)  * security server and can be changed without affecting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12)  * clients of the security server.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14)  * Author : Stephen Smalley, <sds@tycho.nsa.gov>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) #ifndef _SS_CONTEXT_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) #define _SS_CONTEXT_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) #include "ebitmap.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) #include "mls_types.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) #include "security.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24)  * A security context consists of an authenticated user
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25)  * identity, a role, a type and a MLS range.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) struct context {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) 	u32 user;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) 	u32 role;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 	u32 type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 	u32 len;        /* length of string in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	struct mls_range range;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) 	char *str;	/* string representation if context cannot be mapped. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) static inline void mls_context_init(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) 	memset(&c->range, 0, sizeof(c->range));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) static inline int mls_context_cpy(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) 	int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) 	dst->range.level[0].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 	rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 	dst->range.level[1].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 	rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) 		ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) 	return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59)  * Sets both levels in the MLS range of 'dst' to the low level of 'src'.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) static inline int mls_context_cpy_low(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 	int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) 	dst->range.level[0].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 	rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 	dst->range.level[1].sens = src->range.level[0].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 	rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 		ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 	return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79)  * Sets both levels in the MLS range of 'dst' to the high level of 'src'.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) static inline int mls_context_cpy_high(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) 	int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 	dst->range.level[0].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) 	rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) 	dst->range.level[1].sens = src->range.level[1].sens;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) 	rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) 		ebitmap_destroy(&dst->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) 	return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) static inline int mls_context_glblub(struct context *dst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 				     struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) 	struct mls_range *dr = &dst->range, *r1 = &c1->range, *r2 = &c2->range;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) 	int rc = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) 	if (r1->level[1].sens < r2->level[0].sens ||
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 	    r2->level[1].sens < r1->level[0].sens)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) 		/* These ranges have no common sensitivities */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 	/* Take the greatest of the low */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) 	dr->level[0].sens = max(r1->level[0].sens, r2->level[0].sens);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) 	/* Take the least of the high */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 	dr->level[1].sens = min(r1->level[1].sens, r2->level[1].sens);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) 	rc = ebitmap_and(&dr->level[0].cat,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) 			 &r1->level[0].cat, &r2->level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) 	rc = ebitmap_and(&dr->level[1].cat,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 			 &r1->level[1].cat, &r2->level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) 	if (rc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) 	return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) static inline int mls_context_cmp(struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) 	return ((c1->range.level[0].sens == c2->range.level[0].sens) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) 		ebitmap_cmp(&c1->range.level[0].cat, &c2->range.level[0].cat) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) 		(c1->range.level[1].sens == c2->range.level[1].sens) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) 		ebitmap_cmp(&c1->range.level[1].cat, &c2->range.level[1].cat));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) static inline void mls_context_destroy(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) 	ebitmap_destroy(&c->range.level[0].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) 	ebitmap_destroy(&c->range.level[1].cat);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) 	mls_context_init(c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) static inline void context_init(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) 	memset(c, 0, sizeof(*c));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) static inline int context_cpy(struct context *dst, struct context *src)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) 	int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) 	dst->user = src->user;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) 	dst->role = src->role;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) 	dst->type = src->type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) 	if (src->str) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) 		dst->str = kstrdup(src->str, GFP_ATOMIC);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) 		if (!dst->str)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) 			return -ENOMEM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) 		dst->len = src->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) 		dst->str = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) 		dst->len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) 	rc = mls_context_cpy(dst, src);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) 	if (rc) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) 		kfree(dst->str);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) 		return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) static inline void context_destroy(struct context *c)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) 	c->user = c->role = c->type = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) 	kfree(c->str);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) 	c->str = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) 	c->len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) 	mls_context_destroy(c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) static inline int context_cmp(struct context *c1, struct context *c2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) 	if (c1->len && c2->len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) 		return (c1->len == c2->len && !strcmp(c1->str, c2->str));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) 	if (c1->len || c2->len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) 	return ((c1->user == c2->user) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) 		(c1->role == c2->role) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) 		(c1->type == c2->type) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) 		mls_context_cmp(c1, c2));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) u32 context_compute_hash(const struct context *c);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) #endif	/* _SS_CONTEXT_H_ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198)