2 * AppArmor security module
4 * This file contains AppArmor function for pathnames
6 * Copyright (C) 1998-2008 Novell/SUSE
7 * Copyright 2009-2010 Canonical Ltd.
9 * This program is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU General Public License as
11 * published by the Free Software Foundation, version 2 of the
15 #include <linux/magic.h>
16 #include <linux/mount.h>
17 #include <linux/namei.h>
18 #include <linux/nsproxy.h>
19 #include <linux/path.h>
20 #include <linux/sched.h>
21 #include <linux/slab.h>
22 #include <linux/fs_struct.h>
24 #include "include/apparmor.h"
25 #include "include/path.h"
26 #include "include/policy.h"
28 /* modified from dcache.c */
29 static int prepend(char **buffer
, int buflen
, const char *str
, int namelen
)
35 memcpy(*buffer
, str
, namelen
);
39 #define CHROOT_NSCONNECT (PATH_CHROOT_REL | PATH_CHROOT_NSCONNECT)
41 /* If the path is not connected to the expected root,
42 * check if it is a sysctl and handle specially else remove any
43 * leading / that __d_path may have returned.
45 * specifically directed to connect the path,
47 * if in a chroot and doing chroot relative paths and the path
48 * resolves to the namespace root (would be connected outside
49 * of chroot) and specifically directed to connect paths to
52 static int disconnect(const struct path
*path
, char *buf
, char **name
,
57 if (!(flags
& PATH_CONNECT_PATH
) &&
58 !(((flags
& CHROOT_NSCONNECT
) == CHROOT_NSCONNECT
) &&
59 our_mnt(path
->mnt
))) {
60 /* disconnected path, don't return pathname starting
66 } else if (**name
!= '/')
67 /* CONNECT_PATH with missing root */
68 error
= prepend(name
, *name
- buf
, "/", 1);
74 * d_namespace_path - lookup a name associated with a given path
75 * @path: path to lookup (NOT NULL)
76 * @buf: buffer to store path to (NOT NULL)
77 * @buflen: length of @buf
78 * @name: Returns - pointer for start of path name with in @buf (NOT NULL)
79 * @flags: flags controlling path lookup
81 * Handle path name lookup.
83 * Returns: %0 else error code if path lookup fails
84 * When no error the path name is returned in @name which points to
85 * to a position in @buf
87 static int d_namespace_path(const struct path
*path
, char *buf
, int buflen
,
88 char **name
, int flags
)
94 if (path
->mnt
->mnt_flags
& MNT_INTERNAL
) {
95 /* it's not mounted anywhere */
96 res
= dentry_path(path
->dentry
, buf
, buflen
);
102 if (path
->dentry
->d_sb
->s_magic
== PROC_SUPER_MAGIC
&&
103 strncmp(*name
, "/sys/", 5) == 0) {
104 /* TODO: convert over to using a per namespace
105 * control instead of hard coded /proc
107 return prepend(name
, *name
- buf
, "/proc", 5);
109 return disconnect(path
, buf
, name
, flags
);
113 /* resolve paths relative to chroot?*/
114 if (flags
& PATH_CHROOT_REL
) {
116 get_fs_root(current
->fs
, &root
);
117 res
= __d_path(path
, &root
, buf
, buflen
);
120 res
= d_absolute_path(path
, buf
, buflen
);
121 if (!our_mnt(path
->mnt
))
125 /* handle error conditions - and still allow a partial path to
128 if (!res
|| IS_ERR(res
)) {
129 if (PTR_ERR(res
) == -ENAMETOOLONG
)
130 return -ENAMETOOLONG
;
132 res
= dentry_path_raw(path
->dentry
, buf
, buflen
);
134 error
= PTR_ERR(res
);
138 } else if (!our_mnt(path
->mnt
))
144 * 1. A deleted dentry && profile is not allowing mediation of deleted
145 * 2. On some filesystems, newly allocated dentries appear to the
146 * security_path hooks as a deleted dentry except without an inode
149 if (d_unlinked(path
->dentry
) && d_is_positive(path
->dentry
) &&
150 !(flags
& PATH_MEDIATE_DELETED
)) {
156 error
= disconnect(path
, buf
, name
, flags
);
163 * get_name_to_buffer - get the pathname to a buffer ensure dir / is appended
164 * @path: path to get name for (NOT NULL)
165 * @flags: flags controlling path lookup
166 * @buffer: buffer to put name in (NOT NULL)
167 * @size: size of buffer
168 * @name: Returns - contains position of path name in @buffer (NOT NULL)
170 * Returns: %0 else error on failure
172 static int get_name_to_buffer(const struct path
*path
, int flags
, char *buffer
,
173 int size
, char **name
, const char **info
)
175 int adjust
= (flags
& PATH_IS_DIR
) ? 1 : 0;
176 int error
= d_namespace_path(path
, buffer
, size
- adjust
, name
, flags
);
178 if (!error
&& (flags
& PATH_IS_DIR
) && (*name
)[1] != '\0')
180 * Append "/" to the pathname. The root directory is a special
181 * case; it already ends in slash.
183 strcpy(&buffer
[size
- 2], "/");
186 if (error
== -ENOENT
)
187 *info
= "Failed name lookup - deleted entry";
188 else if (error
== -EACCES
)
189 *info
= "Failed name lookup - disconnected path";
190 else if (error
== -ENAMETOOLONG
)
191 *info
= "Failed name lookup - name too long";
193 *info
= "Failed name lookup";
200 * aa_path_name - compute the pathname of a file
201 * @path: path the file (NOT NULL)
202 * @flags: flags controlling path name generation
203 * @buffer: buffer that aa_get_name() allocated (NOT NULL)
204 * @name: Returns - the generated path name if !error (NOT NULL)
205 * @info: Returns - information on why the path lookup failed (MAYBE NULL)
207 * @name is a pointer to the beginning of the pathname (which usually differs
208 * from the beginning of the buffer), or NULL. If there is an error @name
209 * may contain a partial or invalid name that can be used for audit purposes,
210 * but it can not be used for mediation.
212 * We need PATH_IS_DIR to indicate whether the file is a directory or not
213 * because the file may not yet exist, and so we cannot check the inode's
216 * Returns: %0 else error code if could retrieve name
218 int aa_path_name(const struct path
*path
, int flags
, char **buffer
,
219 const char **name
, const char **info
)
221 char *buf
, *str
= NULL
;
228 /* freed by caller */
229 buf
= kmalloc(size
, GFP_KERNEL
);
233 error
= get_name_to_buffer(path
, flags
, buf
, size
, &str
, info
);
234 if (error
!= -ENAMETOOLONG
)
239 if (size
> aa_g_path_max
)
240 return -ENAMETOOLONG
;