2 * Implementation of the access vector table type.
4 * Author : Stephen Smalley, <sds@epoch.ncsc.mil>
7 /* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>
9 * Added conditional policy language extensions
11 * Copyright (C) 2003 Tresys Technology, LLC
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation, version 2.
16 * Updated: Yuichi Nakamura <ynakam@hitachisoft.jp>
17 * Tuned number of hash slots for avtab to reduce memory usage
20 #include <linux/kernel.h>
21 #include <linux/slab.h>
22 #include <linux/errno.h>
26 static struct kmem_cache
*avtab_node_cachep
;
27 static struct kmem_cache
*avtab_xperms_cachep
;
29 /* Based on MurmurHash3, written by Austin Appleby and placed in the
32 static inline int avtab_hash(struct avtab_key
*keyp
, u32 mask
)
34 static const u32 c1
= 0xcc9e2d51;
35 static const u32 c2
= 0x1b873593;
36 static const u32 r1
= 15;
37 static const u32 r2
= 13;
38 static const u32 m
= 5;
39 static const u32 n
= 0xe6546b64;
43 #define mix(input) { \
46 v = (v << r1) | (v >> (32 - r1)); \
49 hash = (hash << r2) | (hash >> (32 - r2)); \
50 hash = hash * m + n; \
53 mix(keyp
->target_class
);
54 mix(keyp
->target_type
);
55 mix(keyp
->source_type
);
68 static struct avtab_node
*
69 avtab_insert_node(struct avtab
*h
, int hvalue
,
70 struct avtab_node
*prev
, struct avtab_node
*cur
,
71 struct avtab_key
*key
, struct avtab_datum
*datum
)
73 struct avtab_node
*newnode
;
74 struct avtab_extended_perms
*xperms
;
75 newnode
= kmem_cache_zalloc(avtab_node_cachep
, GFP_KERNEL
);
80 if (key
->specified
& AVTAB_XPERMS
) {
81 xperms
= kmem_cache_zalloc(avtab_xperms_cachep
, GFP_KERNEL
);
83 kmem_cache_free(avtab_node_cachep
, newnode
);
86 *xperms
= *(datum
->u
.xperms
);
87 newnode
->datum
.u
.xperms
= xperms
;
89 newnode
->datum
.u
.data
= datum
->u
.data
;
93 newnode
->next
= prev
->next
;
96 newnode
->next
= flex_array_get_ptr(h
->htable
, hvalue
);
97 if (flex_array_put_ptr(h
->htable
, hvalue
, newnode
,
98 GFP_KERNEL
|__GFP_ZERO
)) {
99 kmem_cache_free(avtab_node_cachep
, newnode
);
108 static int avtab_insert(struct avtab
*h
, struct avtab_key
*key
, struct avtab_datum
*datum
)
111 struct avtab_node
*prev
, *cur
, *newnode
;
112 u16 specified
= key
->specified
& ~(AVTAB_ENABLED
|AVTAB_ENABLED_OLD
);
114 if (!h
|| !h
->htable
)
117 hvalue
= avtab_hash(key
, h
->mask
);
118 for (prev
= NULL
, cur
= flex_array_get_ptr(h
->htable
, hvalue
);
120 prev
= cur
, cur
= cur
->next
) {
121 if (key
->source_type
== cur
->key
.source_type
&&
122 key
->target_type
== cur
->key
.target_type
&&
123 key
->target_class
== cur
->key
.target_class
&&
124 (specified
& cur
->key
.specified
)) {
125 /* extended perms may not be unique */
126 if (specified
& AVTAB_XPERMS
)
130 if (key
->source_type
< cur
->key
.source_type
)
132 if (key
->source_type
== cur
->key
.source_type
&&
133 key
->target_type
< cur
->key
.target_type
)
135 if (key
->source_type
== cur
->key
.source_type
&&
136 key
->target_type
== cur
->key
.target_type
&&
137 key
->target_class
< cur
->key
.target_class
)
141 newnode
= avtab_insert_node(h
, hvalue
, prev
, cur
, key
, datum
);
148 /* Unlike avtab_insert(), this function allow multiple insertions of the same
149 * key/specified mask into the table, as needed by the conditional avtab.
150 * It also returns a pointer to the node inserted.
153 avtab_insert_nonunique(struct avtab
*h
, struct avtab_key
*key
, struct avtab_datum
*datum
)
156 struct avtab_node
*prev
, *cur
;
157 u16 specified
= key
->specified
& ~(AVTAB_ENABLED
|AVTAB_ENABLED_OLD
);
159 if (!h
|| !h
->htable
)
161 hvalue
= avtab_hash(key
, h
->mask
);
162 for (prev
= NULL
, cur
= flex_array_get_ptr(h
->htable
, hvalue
);
164 prev
= cur
, cur
= cur
->next
) {
165 if (key
->source_type
== cur
->key
.source_type
&&
166 key
->target_type
== cur
->key
.target_type
&&
167 key
->target_class
== cur
->key
.target_class
&&
168 (specified
& cur
->key
.specified
))
170 if (key
->source_type
< cur
->key
.source_type
)
172 if (key
->source_type
== cur
->key
.source_type
&&
173 key
->target_type
< cur
->key
.target_type
)
175 if (key
->source_type
== cur
->key
.source_type
&&
176 key
->target_type
== cur
->key
.target_type
&&
177 key
->target_class
< cur
->key
.target_class
)
180 return avtab_insert_node(h
, hvalue
, prev
, cur
, key
, datum
);
183 struct avtab_datum
*avtab_search(struct avtab
*h
, struct avtab_key
*key
)
186 struct avtab_node
*cur
;
187 u16 specified
= key
->specified
& ~(AVTAB_ENABLED
|AVTAB_ENABLED_OLD
);
189 if (!h
|| !h
->htable
)
192 hvalue
= avtab_hash(key
, h
->mask
);
193 for (cur
= flex_array_get_ptr(h
->htable
, hvalue
); cur
;
195 if (key
->source_type
== cur
->key
.source_type
&&
196 key
->target_type
== cur
->key
.target_type
&&
197 key
->target_class
== cur
->key
.target_class
&&
198 (specified
& cur
->key
.specified
))
201 if (key
->source_type
< cur
->key
.source_type
)
203 if (key
->source_type
== cur
->key
.source_type
&&
204 key
->target_type
< cur
->key
.target_type
)
206 if (key
->source_type
== cur
->key
.source_type
&&
207 key
->target_type
== cur
->key
.target_type
&&
208 key
->target_class
< cur
->key
.target_class
)
215 /* This search function returns a node pointer, and can be used in
216 * conjunction with avtab_search_next_node()
219 avtab_search_node(struct avtab
*h
, struct avtab_key
*key
)
222 struct avtab_node
*cur
;
223 u16 specified
= key
->specified
& ~(AVTAB_ENABLED
|AVTAB_ENABLED_OLD
);
225 if (!h
|| !h
->htable
)
228 hvalue
= avtab_hash(key
, h
->mask
);
229 for (cur
= flex_array_get_ptr(h
->htable
, hvalue
); cur
;
231 if (key
->source_type
== cur
->key
.source_type
&&
232 key
->target_type
== cur
->key
.target_type
&&
233 key
->target_class
== cur
->key
.target_class
&&
234 (specified
& cur
->key
.specified
))
237 if (key
->source_type
< cur
->key
.source_type
)
239 if (key
->source_type
== cur
->key
.source_type
&&
240 key
->target_type
< cur
->key
.target_type
)
242 if (key
->source_type
== cur
->key
.source_type
&&
243 key
->target_type
== cur
->key
.target_type
&&
244 key
->target_class
< cur
->key
.target_class
)
251 avtab_search_node_next(struct avtab_node
*node
, int specified
)
253 struct avtab_node
*cur
;
258 specified
&= ~(AVTAB_ENABLED
|AVTAB_ENABLED_OLD
);
259 for (cur
= node
->next
; cur
; cur
= cur
->next
) {
260 if (node
->key
.source_type
== cur
->key
.source_type
&&
261 node
->key
.target_type
== cur
->key
.target_type
&&
262 node
->key
.target_class
== cur
->key
.target_class
&&
263 (specified
& cur
->key
.specified
))
266 if (node
->key
.source_type
< cur
->key
.source_type
)
268 if (node
->key
.source_type
== cur
->key
.source_type
&&
269 node
->key
.target_type
< cur
->key
.target_type
)
271 if (node
->key
.source_type
== cur
->key
.source_type
&&
272 node
->key
.target_type
== cur
->key
.target_type
&&
273 node
->key
.target_class
< cur
->key
.target_class
)
279 void avtab_destroy(struct avtab
*h
)
282 struct avtab_node
*cur
, *temp
;
284 if (!h
|| !h
->htable
)
287 for (i
= 0; i
< h
->nslot
; i
++) {
288 cur
= flex_array_get_ptr(h
->htable
, i
);
292 if (temp
->key
.specified
& AVTAB_XPERMS
)
293 kmem_cache_free(avtab_xperms_cachep
,
294 temp
->datum
.u
.xperms
);
295 kmem_cache_free(avtab_node_cachep
, temp
);
298 flex_array_free(h
->htable
);
304 int avtab_init(struct avtab
*h
)
311 int avtab_alloc(struct avtab
*h
, u32 nrules
)
319 goto avtab_alloc_out
;
328 if (nslot
> MAX_AVTAB_HASH_BUCKETS
)
329 nslot
= MAX_AVTAB_HASH_BUCKETS
;
332 h
->htable
= flex_array_alloc(sizeof(struct avtab_node
*), nslot
,
333 GFP_KERNEL
| __GFP_ZERO
);
341 printk(KERN_DEBUG
"SELinux: %d avtab hash slots, %d rules.\n",
346 void avtab_hash_eval(struct avtab
*h
, char *tag
)
348 int i
, chain_len
, slots_used
, max_chain_len
;
349 unsigned long long chain2_len_sum
;
350 struct avtab_node
*cur
;
355 for (i
= 0; i
< h
->nslot
; i
++) {
356 cur
= flex_array_get_ptr(h
->htable
, i
);
365 if (chain_len
> max_chain_len
)
366 max_chain_len
= chain_len
;
367 chain2_len_sum
+= chain_len
* chain_len
;
371 printk(KERN_DEBUG
"SELinux: %s: %d entries and %d/%d buckets used, "
372 "longest chain length %d sum of chain length^2 %llu\n",
373 tag
, h
->nel
, slots_used
, h
->nslot
, max_chain_len
,
377 static uint16_t spec_order
[] = {
384 AVTAB_XPERMS_ALLOWED
,
385 AVTAB_XPERMS_AUDITALLOW
,
386 AVTAB_XPERMS_DONTAUDIT
389 int avtab_read_item(struct avtab
*a
, void *fp
, struct policydb
*pol
,
390 int (*insertf
)(struct avtab
*a
, struct avtab_key
*k
,
391 struct avtab_datum
*d
, void *p
),
396 u32 items
, items2
, val
, vers
= pol
->policyvers
;
397 struct avtab_key key
;
398 struct avtab_datum datum
;
399 struct avtab_extended_perms xperms
;
400 __le32 buf32
[ARRAY_SIZE(xperms
.perms
.p
)];
404 memset(&key
, 0, sizeof(struct avtab_key
));
405 memset(&datum
, 0, sizeof(struct avtab_datum
));
407 if (vers
< POLICYDB_VERSION_AVTAB
) {
408 rc
= next_entry(buf32
, fp
, sizeof(u32
));
410 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
413 items2
= le32_to_cpu(buf32
[0]);
414 if (items2
> ARRAY_SIZE(buf32
)) {
415 printk(KERN_ERR
"SELinux: avtab: entry overflow\n");
419 rc
= next_entry(buf32
, fp
, sizeof(u32
)*items2
);
421 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
426 val
= le32_to_cpu(buf32
[items
++]);
427 key
.source_type
= (u16
)val
;
428 if (key
.source_type
!= val
) {
429 printk(KERN_ERR
"SELinux: avtab: truncated source type\n");
432 val
= le32_to_cpu(buf32
[items
++]);
433 key
.target_type
= (u16
)val
;
434 if (key
.target_type
!= val
) {
435 printk(KERN_ERR
"SELinux: avtab: truncated target type\n");
438 val
= le32_to_cpu(buf32
[items
++]);
439 key
.target_class
= (u16
)val
;
440 if (key
.target_class
!= val
) {
441 printk(KERN_ERR
"SELinux: avtab: truncated target class\n");
445 val
= le32_to_cpu(buf32
[items
++]);
446 enabled
= (val
& AVTAB_ENABLED_OLD
) ? AVTAB_ENABLED
: 0;
448 if (!(val
& (AVTAB_AV
| AVTAB_TYPE
))) {
449 printk(KERN_ERR
"SELinux: avtab: null entry\n");
452 if ((val
& AVTAB_AV
) &&
453 (val
& AVTAB_TYPE
)) {
454 printk(KERN_ERR
"SELinux: avtab: entry has both access vectors and types\n");
457 if (val
& AVTAB_XPERMS
) {
458 printk(KERN_ERR
"SELinux: avtab: entry has extended permissions\n");
462 for (i
= 0; i
< ARRAY_SIZE(spec_order
); i
++) {
463 if (val
& spec_order
[i
]) {
464 key
.specified
= spec_order
[i
] | enabled
;
465 datum
.u
.data
= le32_to_cpu(buf32
[items
++]);
466 rc
= insertf(a
, &key
, &datum
, p
);
472 if (items
!= items2
) {
473 printk(KERN_ERR
"SELinux: avtab: entry only had %d items, expected %d\n", items2
, items
);
479 rc
= next_entry(buf16
, fp
, sizeof(u16
)*4);
481 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
486 key
.source_type
= le16_to_cpu(buf16
[items
++]);
487 key
.target_type
= le16_to_cpu(buf16
[items
++]);
488 key
.target_class
= le16_to_cpu(buf16
[items
++]);
489 key
.specified
= le16_to_cpu(buf16
[items
++]);
491 if (!policydb_type_isvalid(pol
, key
.source_type
) ||
492 !policydb_type_isvalid(pol
, key
.target_type
) ||
493 !policydb_class_isvalid(pol
, key
.target_class
)) {
494 printk(KERN_ERR
"SELinux: avtab: invalid type or class\n");
499 for (i
= 0; i
< ARRAY_SIZE(spec_order
); i
++) {
500 if (key
.specified
& spec_order
[i
])
503 if (!set
|| set
> 1) {
504 printk(KERN_ERR
"SELinux: avtab: more than one specifier\n");
508 if ((vers
< POLICYDB_VERSION_XPERMS_IOCTL
) &&
509 (key
.specified
& AVTAB_XPERMS
)) {
510 printk(KERN_ERR
"SELinux: avtab: policy version %u does not "
511 "support extended permissions rules and one "
512 "was specified\n", vers
);
514 } else if (key
.specified
& AVTAB_XPERMS
) {
515 memset(&xperms
, 0, sizeof(struct avtab_extended_perms
));
516 rc
= next_entry(&xperms
.specified
, fp
, sizeof(u8
));
518 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
521 rc
= next_entry(&xperms
.driver
, fp
, sizeof(u8
));
523 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
526 rc
= next_entry(buf32
, fp
, sizeof(u32
)*ARRAY_SIZE(xperms
.perms
.p
));
528 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
531 for (i
= 0; i
< ARRAY_SIZE(xperms
.perms
.p
); i
++)
532 xperms
.perms
.p
[i
] = le32_to_cpu(buf32
[i
]);
533 datum
.u
.xperms
= &xperms
;
535 rc
= next_entry(buf32
, fp
, sizeof(u32
));
537 printk(KERN_ERR
"SELinux: avtab: truncated entry\n");
540 datum
.u
.data
= le32_to_cpu(*buf32
);
542 if ((key
.specified
& AVTAB_TYPE
) &&
543 !policydb_type_isvalid(pol
, datum
.u
.data
)) {
544 printk(KERN_ERR
"SELinux: avtab: invalid type\n");
547 return insertf(a
, &key
, &datum
, p
);
550 static int avtab_insertf(struct avtab
*a
, struct avtab_key
*k
,
551 struct avtab_datum
*d
, void *p
)
553 return avtab_insert(a
, k
, d
);
556 int avtab_read(struct avtab
*a
, void *fp
, struct policydb
*pol
)
563 rc
= next_entry(buf
, fp
, sizeof(u32
));
565 printk(KERN_ERR
"SELinux: avtab: truncated table\n");
568 nel
= le32_to_cpu(buf
[0]);
570 printk(KERN_ERR
"SELinux: avtab: table is empty\n");
575 rc
= avtab_alloc(a
, nel
);
579 for (i
= 0; i
< nel
; i
++) {
580 rc
= avtab_read_item(a
, fp
, pol
, avtab_insertf
, NULL
);
583 printk(KERN_ERR
"SELinux: avtab: out of memory\n");
584 else if (rc
== -EEXIST
)
585 printk(KERN_ERR
"SELinux: avtab: duplicate entry\n");
600 int avtab_write_item(struct policydb
*p
, struct avtab_node
*cur
, void *fp
)
603 __le32 buf32
[ARRAY_SIZE(cur
->datum
.u
.xperms
->perms
.p
)];
607 buf16
[0] = cpu_to_le16(cur
->key
.source_type
);
608 buf16
[1] = cpu_to_le16(cur
->key
.target_type
);
609 buf16
[2] = cpu_to_le16(cur
->key
.target_class
);
610 buf16
[3] = cpu_to_le16(cur
->key
.specified
);
611 rc
= put_entry(buf16
, sizeof(u16
), 4, fp
);
615 if (cur
->key
.specified
& AVTAB_XPERMS
) {
616 rc
= put_entry(&cur
->datum
.u
.xperms
->specified
, sizeof(u8
), 1, fp
);
619 rc
= put_entry(&cur
->datum
.u
.xperms
->driver
, sizeof(u8
), 1, fp
);
622 for (i
= 0; i
< ARRAY_SIZE(cur
->datum
.u
.xperms
->perms
.p
); i
++)
623 buf32
[i
] = cpu_to_le32(cur
->datum
.u
.xperms
->perms
.p
[i
]);
624 rc
= put_entry(buf32
, sizeof(u32
),
625 ARRAY_SIZE(cur
->datum
.u
.xperms
->perms
.p
), fp
);
627 buf32
[0] = cpu_to_le32(cur
->datum
.u
.data
);
628 rc
= put_entry(buf32
, sizeof(u32
), 1, fp
);
635 int avtab_write(struct policydb
*p
, struct avtab
*a
, void *fp
)
639 struct avtab_node
*cur
;
642 buf
[0] = cpu_to_le32(a
->nel
);
643 rc
= put_entry(buf
, sizeof(u32
), 1, fp
);
647 for (i
= 0; i
< a
->nslot
; i
++) {
648 for (cur
= flex_array_get_ptr(a
->htable
, i
); cur
;
650 rc
= avtab_write_item(p
, cur
, fp
);
658 void avtab_cache_init(void)
660 avtab_node_cachep
= kmem_cache_create("avtab_node",
661 sizeof(struct avtab_node
),
662 0, SLAB_PANIC
, NULL
);
663 avtab_xperms_cachep
= kmem_cache_create("avtab_extended_perms",
664 sizeof(struct avtab_extended_perms
),
665 0, SLAB_PANIC
, NULL
);
668 void avtab_cache_destroy(void)
670 kmem_cache_destroy(avtab_node_cachep
);
671 kmem_cache_destroy(avtab_xperms_cachep
);