os/ossrv/ofdbus/dbus/bus/selinux.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*-
sl@0
     2
 * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
sl@0
     3
 * selinux.c  SELinux security checks for D-Bus
sl@0
     4
 *
sl@0
     5
 * Author: Matthew Rickard <mjricka@epoch.ncsc.mil>
sl@0
     6
 *
sl@0
     7
 * Licensed under the Academic Free License version 2.1
sl@0
     8
 * 
sl@0
     9
 * This program is free software; you can redistribute it and/or modify
sl@0
    10
 * it under the terms of the GNU General Public License as published by
sl@0
    11
 * the Free Software Foundation; either version 2 of the License, or
sl@0
    12
 * (at your option) any later version.
sl@0
    13
 *
sl@0
    14
 * This program is distributed in the hope that it will be useful,
sl@0
    15
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
sl@0
    16
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
sl@0
    17
 * GNU General Public License for more details.
sl@0
    18
 * 
sl@0
    19
 * You should have received a copy of the GNU General Public License
sl@0
    20
 * along with this program; if not, write to the Free Software
sl@0
    21
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
sl@0
    22
 *
sl@0
    23
 */
sl@0
    24
#ifndef __SYMBIAN32__
sl@0
    25
#include <dbus/dbus-internals.h>
sl@0
    26
#include <dbus/dbus-string.h>
sl@0
    27
#else
sl@0
    28
#include "dbus-internals.h"
sl@0
    29
#include "dbus-string.h"
sl@0
    30
#endif //__SYMBIAN32__
sl@0
    31
#include "selinux.h"
sl@0
    32
#include "services.h"
sl@0
    33
#include "policy.h"
sl@0
    34
#include "utils.h"
sl@0
    35
#include "config-parser.h"
sl@0
    36
sl@0
    37
#ifdef HAVE_SELINUX
sl@0
    38
#include <errno.h>
sl@0
    39
#include <pthread.h>
sl@0
    40
#include <syslog.h>
sl@0
    41
#include <selinux/selinux.h>
sl@0
    42
#include <selinux/avc.h>
sl@0
    43
#include <selinux/av_permissions.h>
sl@0
    44
#include <selinux/flask.h>
sl@0
    45
#include <signal.h>
sl@0
    46
#include <stdarg.h>
sl@0
    47
#endif /* HAVE_SELINUX */
sl@0
    48
sl@0
    49
#define BUS_SID_FROM_SELINUX(sid)  ((BusSELinuxID*) (sid))
sl@0
    50
#define SELINUX_SID_FROM_BUS(sid)  ((security_id_t) (sid))
sl@0
    51
sl@0
    52
#ifdef HAVE_SELINUX
sl@0
    53
/* Store the value telling us if SELinux is enabled in the kernel. */
sl@0
    54
static dbus_bool_t selinux_enabled = FALSE;
sl@0
    55
sl@0
    56
/* Store an avc_entry_ref to speed AVC decisions. */
sl@0
    57
static struct avc_entry_ref aeref;
sl@0
    58
sl@0
    59
/* Store the SID of the bus itself to use as the default. */
sl@0
    60
static security_id_t bus_sid = SECSID_WILD;
sl@0
    61
sl@0
    62
/* Thread to listen for SELinux status changes via netlink. */
sl@0
    63
static pthread_t avc_notify_thread;
sl@0
    64
sl@0
    65
/* Prototypes for AVC callback functions.  */
sl@0
    66
static void log_callback (const char *fmt, ...);
sl@0
    67
static void log_audit_callback (void *data, security_class_t class, char *buf, size_t bufleft);
sl@0
    68
static void *avc_create_thread (void (*run) (void));
sl@0
    69
static void avc_stop_thread (void *thread);
sl@0
    70
static void *avc_alloc_lock (void);
sl@0
    71
static void avc_get_lock (void *lock);
sl@0
    72
static void avc_release_lock (void *lock);
sl@0
    73
static void avc_free_lock (void *lock);
sl@0
    74
sl@0
    75
/* AVC callback structures for use in avc_init.  */
sl@0
    76
static const struct avc_memory_callback mem_cb =
sl@0
    77
{
sl@0
    78
  .func_malloc = dbus_malloc,
sl@0
    79
  .func_free = dbus_free
sl@0
    80
};
sl@0
    81
static const struct avc_log_callback log_cb =
sl@0
    82
{
sl@0
    83
  .func_log = log_callback,
sl@0
    84
  .func_audit = log_audit_callback
sl@0
    85
};
sl@0
    86
static const struct avc_thread_callback thread_cb =
sl@0
    87
{
sl@0
    88
  .func_create_thread = avc_create_thread,
sl@0
    89
  .func_stop_thread = avc_stop_thread
sl@0
    90
};
sl@0
    91
static const struct avc_lock_callback lock_cb =
sl@0
    92
{
sl@0
    93
  .func_alloc_lock = avc_alloc_lock,
sl@0
    94
  .func_get_lock = avc_get_lock,
sl@0
    95
  .func_release_lock = avc_release_lock,
sl@0
    96
  .func_free_lock = avc_free_lock
sl@0
    97
};
sl@0
    98
#endif /* HAVE_SELINUX */
sl@0
    99
sl@0
   100
/**
sl@0
   101
 * Log callback to log denial messages from the AVC.
sl@0
   102
 * This is used in avc_init.  Logs to both standard
sl@0
   103
 * error and syslogd.
sl@0
   104
 *
sl@0
   105
 * @param fmt the format string
sl@0
   106
 * @param variable argument list
sl@0
   107
 */
sl@0
   108
#ifdef HAVE_SELINUX
sl@0
   109
static void 
sl@0
   110
log_callback (const char *fmt, ...) 
sl@0
   111
{
sl@0
   112
  va_list ap;
sl@0
   113
  va_start(ap, fmt);
sl@0
   114
  vsyslog (LOG_INFO, fmt, ap);
sl@0
   115
  va_end(ap);
sl@0
   116
}
sl@0
   117
sl@0
   118
/**
sl@0
   119
 * On a policy reload we need to reparse the SELinux configuration file, since
sl@0
   120
 * this could have changed.  Send a SIGHUP to reload all configs.
sl@0
   121
 */
sl@0
   122
static int
sl@0
   123
policy_reload_callback (u_int32_t event, security_id_t ssid, 
sl@0
   124
                        security_id_t tsid, security_class_t tclass, 
sl@0
   125
                        access_vector_t perms, access_vector_t *out_retained)
sl@0
   126
{
sl@0
   127
  if (event == AVC_CALLBACK_RESET)
sl@0
   128
    return raise (SIGHUP);
sl@0
   129
  
sl@0
   130
  return 0;
sl@0
   131
}
sl@0
   132
sl@0
   133
/**
sl@0
   134
 * Log any auxiliary data 
sl@0
   135
 */
sl@0
   136
static void
sl@0
   137
log_audit_callback (void *data, security_class_t class, char *buf, size_t bufleft)
sl@0
   138
{
sl@0
   139
  DBusString *audmsg = data;
sl@0
   140
  _dbus_string_copy_to_buffer (audmsg, buf, bufleft);
sl@0
   141
}
sl@0
   142
sl@0
   143
/**
sl@0
   144
 * Create thread to notify the AVC of enforcing and policy reload
sl@0
   145
 * changes via netlink.
sl@0
   146
 *
sl@0
   147
 * @param run the thread run function
sl@0
   148
 * @return pointer to the thread
sl@0
   149
 */
sl@0
   150
static void *
sl@0
   151
avc_create_thread (void (*run) (void))
sl@0
   152
{
sl@0
   153
  int rc;
sl@0
   154
sl@0
   155
  rc = pthread_create (&avc_notify_thread, NULL, (void *(*) (void *)) run, NULL);
sl@0
   156
  if (rc != 0)
sl@0
   157
    {
sl@0
   158
      _dbus_warn ("Failed to start AVC thread: %s\n", _dbus_strerror (rc));
sl@0
   159
      exit (1);
sl@0
   160
    }
sl@0
   161
  return &avc_notify_thread;
sl@0
   162
}
sl@0
   163
sl@0
   164
/* Stop AVC netlink thread.  */
sl@0
   165
static void
sl@0
   166
avc_stop_thread (void *thread)
sl@0
   167
{
sl@0
   168
  pthread_cancel (*(pthread_t *) thread);
sl@0
   169
}
sl@0
   170
sl@0
   171
/* Allocate a new AVC lock.  */
sl@0
   172
static void *
sl@0
   173
avc_alloc_lock (void)
sl@0
   174
{
sl@0
   175
  pthread_mutex_t *avc_mutex;
sl@0
   176
sl@0
   177
  avc_mutex = dbus_new (pthread_mutex_t, 1);
sl@0
   178
  if (avc_mutex == NULL)
sl@0
   179
    {
sl@0
   180
      _dbus_warn ("Could not create mutex: %s\n", _dbus_strerror (errno));
sl@0
   181
      exit (1);
sl@0
   182
    }
sl@0
   183
  pthread_mutex_init (avc_mutex, NULL);
sl@0
   184
sl@0
   185
  return avc_mutex;
sl@0
   186
}
sl@0
   187
sl@0
   188
/* Acquire an AVC lock.  */
sl@0
   189
static void
sl@0
   190
avc_get_lock (void *lock)
sl@0
   191
{
sl@0
   192
  pthread_mutex_lock (lock);
sl@0
   193
}
sl@0
   194
sl@0
   195
/* Release an AVC lock.  */
sl@0
   196
static void
sl@0
   197
avc_release_lock (void *lock)
sl@0
   198
{
sl@0
   199
  pthread_mutex_unlock (lock);
sl@0
   200
}
sl@0
   201
sl@0
   202
/* Free an AVC lock.  */
sl@0
   203
static void
sl@0
   204
avc_free_lock (void *lock)
sl@0
   205
{
sl@0
   206
  pthread_mutex_destroy (lock);
sl@0
   207
  dbus_free (lock);
sl@0
   208
}
sl@0
   209
#endif /* HAVE_SELINUX */
sl@0
   210
sl@0
   211
/**
sl@0
   212
 * Return whether or not SELinux is enabled; must be
sl@0
   213
 * called after bus_selinux_init.
sl@0
   214
 */
sl@0
   215
dbus_bool_t
sl@0
   216
bus_selinux_enabled (void)
sl@0
   217
{
sl@0
   218
#ifdef HAVE_SELINUX
sl@0
   219
  return selinux_enabled;
sl@0
   220
#else
sl@0
   221
  return FALSE;
sl@0
   222
#endif /* HAVE_SELINUX */
sl@0
   223
}
sl@0
   224
sl@0
   225
/**
sl@0
   226
 * Do early initialization; determine whether SELinux is enabled.
sl@0
   227
 */
sl@0
   228
dbus_bool_t
sl@0
   229
bus_selinux_pre_init (void)
sl@0
   230
{
sl@0
   231
#ifdef HAVE_SELINUX
sl@0
   232
  int r;
sl@0
   233
  _dbus_assert (bus_sid == SECSID_WILD);
sl@0
   234
  
sl@0
   235
  /* Determine if we are running an SELinux kernel. */
sl@0
   236
  r = is_selinux_enabled ();
sl@0
   237
  if (r < 0)
sl@0
   238
    {
sl@0
   239
      _dbus_warn ("Could not tell if SELinux is enabled: %s\n",
sl@0
   240
                  _dbus_strerror (errno));
sl@0
   241
      return FALSE;
sl@0
   242
    }
sl@0
   243
sl@0
   244
  selinux_enabled = r != 0;
sl@0
   245
  return TRUE;
sl@0
   246
#else
sl@0
   247
  return TRUE;
sl@0
   248
#endif
sl@0
   249
}
sl@0
   250
sl@0
   251
/**
sl@0
   252
 * Initialize the user space access vector cache (AVC) for D-Bus and set up
sl@0
   253
 * logging callbacks.
sl@0
   254
 */
sl@0
   255
dbus_bool_t
sl@0
   256
bus_selinux_full_init (void)
sl@0
   257
{
sl@0
   258
#ifdef HAVE_SELINUX
sl@0
   259
  char *bus_context;
sl@0
   260
sl@0
   261
  _dbus_assert (bus_sid == SECSID_WILD);
sl@0
   262
  
sl@0
   263
  if (!selinux_enabled)
sl@0
   264
    {
sl@0
   265
      _dbus_verbose ("SELinux not enabled in this kernel.\n");
sl@0
   266
      return TRUE;
sl@0
   267
    }
sl@0
   268
sl@0
   269
  _dbus_verbose ("SELinux is enabled in this kernel.\n");
sl@0
   270
sl@0
   271
  avc_entry_ref_init (&aeref);
sl@0
   272
  if (avc_init ("avc", &mem_cb, &log_cb, &thread_cb, &lock_cb) < 0)
sl@0
   273
    {
sl@0
   274
      _dbus_warn ("Failed to start Access Vector Cache (AVC).\n");
sl@0
   275
      return FALSE;
sl@0
   276
    }
sl@0
   277
  else
sl@0
   278
    {
sl@0
   279
      openlog ("dbus", LOG_PERROR, LOG_USER);
sl@0
   280
      _dbus_verbose ("Access Vector Cache (AVC) started.\n");
sl@0
   281
    }
sl@0
   282
sl@0
   283
  if (avc_add_callback (policy_reload_callback, AVC_CALLBACK_RESET,
sl@0
   284
                       NULL, NULL, 0, 0) < 0)
sl@0
   285
    {
sl@0
   286
      _dbus_warn ("Failed to add policy reload callback: %s\n",
sl@0
   287
                  _dbus_strerror (errno));
sl@0
   288
      avc_destroy ();
sl@0
   289
      return FALSE;
sl@0
   290
    }
sl@0
   291
sl@0
   292
  bus_context = NULL;
sl@0
   293
  bus_sid = SECSID_WILD;
sl@0
   294
sl@0
   295
  if (getcon (&bus_context) < 0)
sl@0
   296
    {
sl@0
   297
      _dbus_verbose ("Error getting context of bus: %s\n",
sl@0
   298
                     _dbus_strerror (errno));
sl@0
   299
      return FALSE;
sl@0
   300
    }
sl@0
   301
      
sl@0
   302
  if (avc_context_to_sid (bus_context, &bus_sid) < 0)
sl@0
   303
    {
sl@0
   304
      _dbus_verbose ("Error getting SID from bus context: %s\n",
sl@0
   305
                     _dbus_strerror (errno));
sl@0
   306
      freecon (bus_context);
sl@0
   307
      return FALSE;
sl@0
   308
    }
sl@0
   309
sl@0
   310
  freecon (bus_context);
sl@0
   311
  
sl@0
   312
  return TRUE;
sl@0
   313
#else
sl@0
   314
  return TRUE;
sl@0
   315
#endif /* HAVE_SELINUX */
sl@0
   316
}
sl@0
   317
sl@0
   318
/**
sl@0
   319
 * Decrement SID reference count.
sl@0
   320
 * 
sl@0
   321
 * @param sid the SID to decrement
sl@0
   322
 */
sl@0
   323
void
sl@0
   324
bus_selinux_id_unref (BusSELinuxID *sid)
sl@0
   325
{
sl@0
   326
#ifdef HAVE_SELINUX
sl@0
   327
  if (!selinux_enabled)
sl@0
   328
    return;
sl@0
   329
sl@0
   330
  _dbus_assert (sid != NULL);
sl@0
   331
  
sl@0
   332
  sidput (SELINUX_SID_FROM_BUS (sid));
sl@0
   333
#endif /* HAVE_SELINUX */
sl@0
   334
}
sl@0
   335
sl@0
   336
void
sl@0
   337
bus_selinux_id_ref (BusSELinuxID *sid)
sl@0
   338
{
sl@0
   339
#ifdef HAVE_SELINUX
sl@0
   340
  if (!selinux_enabled)
sl@0
   341
    return;
sl@0
   342
sl@0
   343
  _dbus_assert (sid != NULL);
sl@0
   344
  
sl@0
   345
  sidget (SELINUX_SID_FROM_BUS (sid));
sl@0
   346
#endif /* HAVE_SELINUX */
sl@0
   347
}
sl@0
   348
sl@0
   349
/**
sl@0
   350
 * Determine if the SELinux security policy allows the given sender
sl@0
   351
 * security context to go to the given recipient security context.
sl@0
   352
 * This function determines if the requested permissions are to be
sl@0
   353
 * granted from the connection to the message bus or to another
sl@0
   354
 * optionally supplied security identifier (e.g. for a service
sl@0
   355
 * context).  Currently these permissions are either send_msg or
sl@0
   356
 * acquire_svc in the dbus class.
sl@0
   357
 *
sl@0
   358
 * @param sender_sid source security context
sl@0
   359
 * @param override_sid is the target security context.  If SECSID_WILD this will
sl@0
   360
 *        use the context of the bus itself (e.g. the default).
sl@0
   361
 * @param target_class is the target security class.
sl@0
   362
 * @param requested is the requested permissions.
sl@0
   363
 * @returns #TRUE if security policy allows the send.
sl@0
   364
 */
sl@0
   365
#ifdef HAVE_SELINUX
sl@0
   366
static dbus_bool_t
sl@0
   367
bus_selinux_check (BusSELinuxID        *sender_sid,
sl@0
   368
                   BusSELinuxID        *override_sid,
sl@0
   369
                   security_class_t     target_class,
sl@0
   370
                   access_vector_t      requested,
sl@0
   371
		   DBusString          *auxdata)
sl@0
   372
{
sl@0
   373
  if (!selinux_enabled)
sl@0
   374
    return TRUE;
sl@0
   375
sl@0
   376
  /* Make the security check.  AVC checks enforcing mode here as well. */
sl@0
   377
  if (avc_has_perm (SELINUX_SID_FROM_BUS (sender_sid),
sl@0
   378
                    override_sid ?
sl@0
   379
                    SELINUX_SID_FROM_BUS (override_sid) :
sl@0
   380
                    SELINUX_SID_FROM_BUS (bus_sid), 
sl@0
   381
                    target_class, requested, &aeref, auxdata) < 0)
sl@0
   382
    {
sl@0
   383
      _dbus_verbose ("SELinux denying due to security policy.\n");
sl@0
   384
      return FALSE;
sl@0
   385
    }
sl@0
   386
  else
sl@0
   387
    return TRUE;
sl@0
   388
}
sl@0
   389
#endif /* HAVE_SELINUX */
sl@0
   390
sl@0
   391
/**
sl@0
   392
 * Returns true if the given connection can acquire a service,
sl@0
   393
 * assuming the given security ID is needed for that service.
sl@0
   394
 *
sl@0
   395
 * @param connection connection that wants to own the service
sl@0
   396
 * @param service_sid the SID of the service from the table
sl@0
   397
 * @returns #TRUE if acquire is permitted.
sl@0
   398
 */
sl@0
   399
dbus_bool_t
sl@0
   400
bus_selinux_allows_acquire_service (DBusConnection     *connection,
sl@0
   401
                                    BusSELinuxID       *service_sid,
sl@0
   402
				    const char         *service_name,
sl@0
   403
				    DBusError          *error)
sl@0
   404
{
sl@0
   405
#ifdef HAVE_SELINUX
sl@0
   406
  BusSELinuxID *connection_sid;
sl@0
   407
  unsigned long spid;
sl@0
   408
  DBusString auxdata;
sl@0
   409
  dbus_bool_t ret;
sl@0
   410
  
sl@0
   411
  if (!selinux_enabled)
sl@0
   412
    return TRUE;
sl@0
   413
  
sl@0
   414
  connection_sid = bus_connection_get_selinux_id (connection);
sl@0
   415
  if (!dbus_connection_get_unix_process_id (connection, &spid))
sl@0
   416
    spid = 0;
sl@0
   417
sl@0
   418
  if (!_dbus_string_init (&auxdata))
sl@0
   419
    goto oom;
sl@0
   420
 
sl@0
   421
  if (!_dbus_string_append (&auxdata, "service="))
sl@0
   422
    goto oom;
sl@0
   423
sl@0
   424
  if (!_dbus_string_append (&auxdata, service_name))
sl@0
   425
    goto oom;
sl@0
   426
sl@0
   427
  if (spid)
sl@0
   428
    {
sl@0
   429
      if (!_dbus_string_append (&auxdata, " spid="))
sl@0
   430
	goto oom;
sl@0
   431
sl@0
   432
      if (!_dbus_string_append_uint (&auxdata, spid))
sl@0
   433
	goto oom;
sl@0
   434
    }
sl@0
   435
  
sl@0
   436
  ret = bus_selinux_check (connection_sid,
sl@0
   437
			   service_sid,
sl@0
   438
			   SECCLASS_DBUS,
sl@0
   439
			   DBUS__ACQUIRE_SVC,
sl@0
   440
			   &auxdata);
sl@0
   441
sl@0
   442
  _dbus_string_free (&auxdata);
sl@0
   443
  return ret;
sl@0
   444
sl@0
   445
 oom:
sl@0
   446
  _dbus_string_free (&auxdata);
sl@0
   447
  BUS_SET_OOM (error);
sl@0
   448
  return FALSE;
sl@0
   449
sl@0
   450
#else
sl@0
   451
  return TRUE;
sl@0
   452
#endif /* HAVE_SELINUX */
sl@0
   453
}
sl@0
   454
sl@0
   455
/**
sl@0
   456
 * Check if SELinux security controls allow the message to be sent to a
sl@0
   457
 * particular connection based on the security context of the sender and
sl@0
   458
 * that of the receiver. The destination connection need not be the
sl@0
   459
 * addressed recipient, it could be an "eavesdropper"
sl@0
   460
 *
sl@0
   461
 * @param sender the sender of the message.
sl@0
   462
 * @param proposed_recipient the connection the message is to be sent to.
sl@0
   463
 * @returns whether to allow the send
sl@0
   464
 */
sl@0
   465
dbus_bool_t
sl@0
   466
bus_selinux_allows_send (DBusConnection     *sender,
sl@0
   467
                         DBusConnection     *proposed_recipient,
sl@0
   468
			 const char         *msgtype,
sl@0
   469
			 const char         *interface,
sl@0
   470
			 const char         *member,
sl@0
   471
			 const char         *error_name,
sl@0
   472
			 const char         *destination,
sl@0
   473
			 DBusError          *error)
sl@0
   474
{
sl@0
   475
#ifdef HAVE_SELINUX
sl@0
   476
  BusSELinuxID *recipient_sid;
sl@0
   477
  BusSELinuxID *sender_sid;
sl@0
   478
  unsigned long spid, tpid;
sl@0
   479
  DBusString auxdata;
sl@0
   480
  dbus_bool_t ret;
sl@0
   481
  dbus_bool_t string_alloced;
sl@0
   482
sl@0
   483
  if (!selinux_enabled)
sl@0
   484
    return TRUE;
sl@0
   485
sl@0
   486
  if (!sender || !dbus_connection_get_unix_process_id (sender, &spid))
sl@0
   487
    spid = 0;
sl@0
   488
  if (!proposed_recipient || !dbus_connection_get_unix_process_id (proposed_recipient, &tpid))
sl@0
   489
    tpid = 0;
sl@0
   490
sl@0
   491
  string_alloced = FALSE;
sl@0
   492
  if (!_dbus_string_init (&auxdata))
sl@0
   493
    goto oom;
sl@0
   494
  string_alloced = TRUE;
sl@0
   495
sl@0
   496
  if (!_dbus_string_append (&auxdata, "msgtype="))
sl@0
   497
    goto oom;
sl@0
   498
sl@0
   499
  if (!_dbus_string_append (&auxdata, msgtype))
sl@0
   500
    goto oom;
sl@0
   501
sl@0
   502
  if (interface)
sl@0
   503
    {
sl@0
   504
      if (!_dbus_string_append (&auxdata, " interface="))
sl@0
   505
	goto oom;
sl@0
   506
      if (!_dbus_string_append (&auxdata, interface))
sl@0
   507
	goto oom;
sl@0
   508
    }
sl@0
   509
sl@0
   510
  if (member)
sl@0
   511
    {
sl@0
   512
      if (!_dbus_string_append (&auxdata, " member="))
sl@0
   513
	goto oom;
sl@0
   514
      if (!_dbus_string_append (&auxdata, member))
sl@0
   515
	goto oom;
sl@0
   516
    }
sl@0
   517
sl@0
   518
  if (error_name)
sl@0
   519
    {
sl@0
   520
      if (!_dbus_string_append (&auxdata, " error_name="))
sl@0
   521
	goto oom;
sl@0
   522
      if (!_dbus_string_append (&auxdata, error_name))
sl@0
   523
	goto oom;
sl@0
   524
    }
sl@0
   525
sl@0
   526
  if (destination)
sl@0
   527
    {
sl@0
   528
      if (!_dbus_string_append (&auxdata, " dest="))
sl@0
   529
	goto oom;
sl@0
   530
      if (!_dbus_string_append (&auxdata, destination))
sl@0
   531
	goto oom;
sl@0
   532
    }
sl@0
   533
sl@0
   534
  if (spid)
sl@0
   535
    {
sl@0
   536
      if (!_dbus_string_append (&auxdata, " spid="))
sl@0
   537
	goto oom;
sl@0
   538
sl@0
   539
      if (!_dbus_string_append_uint (&auxdata, spid))
sl@0
   540
	goto oom;
sl@0
   541
    }
sl@0
   542
sl@0
   543
  if (tpid)
sl@0
   544
    {
sl@0
   545
      if (!_dbus_string_append (&auxdata, " tpid="))
sl@0
   546
	goto oom;
sl@0
   547
sl@0
   548
      if (!_dbus_string_append_uint (&auxdata, tpid))
sl@0
   549
	goto oom;
sl@0
   550
    }
sl@0
   551
sl@0
   552
  sender_sid = bus_connection_get_selinux_id (sender);
sl@0
   553
  /* A NULL proposed_recipient means the bus itself. */
sl@0
   554
  if (proposed_recipient)
sl@0
   555
    recipient_sid = bus_connection_get_selinux_id (proposed_recipient);
sl@0
   556
  else
sl@0
   557
    recipient_sid = BUS_SID_FROM_SELINUX (bus_sid);
sl@0
   558
sl@0
   559
  ret = bus_selinux_check (sender_sid, 
sl@0
   560
			   recipient_sid,
sl@0
   561
			   SECCLASS_DBUS, 
sl@0
   562
			   DBUS__SEND_MSG,
sl@0
   563
			   &auxdata);
sl@0
   564
sl@0
   565
  _dbus_string_free (&auxdata);
sl@0
   566
sl@0
   567
  return ret;
sl@0
   568
sl@0
   569
 oom:
sl@0
   570
  if (string_alloced)
sl@0
   571
    _dbus_string_free (&auxdata);
sl@0
   572
  BUS_SET_OOM (error);
sl@0
   573
  return FALSE;
sl@0
   574
  
sl@0
   575
#else
sl@0
   576
  return TRUE;
sl@0
   577
#endif /* HAVE_SELINUX */
sl@0
   578
}
sl@0
   579
sl@0
   580
dbus_bool_t
sl@0
   581
bus_selinux_append_context (DBusMessage    *message,
sl@0
   582
			    BusSELinuxID   *sid,
sl@0
   583
			    DBusError      *error)
sl@0
   584
{
sl@0
   585
#ifdef HAVE_SELINUX
sl@0
   586
  char *context;
sl@0
   587
sl@0
   588
  if (avc_sid_to_context (SELINUX_SID_FROM_BUS (sid), &context) < 0)
sl@0
   589
    {
sl@0
   590
      if (errno == ENOMEM)
sl@0
   591
        BUS_SET_OOM (error);
sl@0
   592
      else
sl@0
   593
        dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   594
                        "Error getting context from SID: %s\n",
sl@0
   595
			_dbus_strerror (errno));
sl@0
   596
      return FALSE;
sl@0
   597
    }
sl@0
   598
  if (!dbus_message_append_args (message,
sl@0
   599
				 DBUS_TYPE_ARRAY,
sl@0
   600
				 DBUS_TYPE_BYTE,
sl@0
   601
				 &context,
sl@0
   602
				 strlen (context),
sl@0
   603
				 DBUS_TYPE_INVALID))
sl@0
   604
    {
sl@0
   605
      _DBUS_SET_OOM (error);
sl@0
   606
      return FALSE;
sl@0
   607
    }
sl@0
   608
  freecon (context);
sl@0
   609
  return TRUE;
sl@0
   610
#else
sl@0
   611
  return TRUE;
sl@0
   612
#endif
sl@0
   613
}
sl@0
   614
sl@0
   615
/**
sl@0
   616
 * Gets the security context of a connection to the bus. It is up to
sl@0
   617
 * the caller to freecon() when they are done. 
sl@0
   618
 *
sl@0
   619
 * @param connection the connection to get the context of.
sl@0
   620
 * @param con the location to store the security context.
sl@0
   621
 * @returns #TRUE if context is successfully obtained.
sl@0
   622
 */
sl@0
   623
#ifdef HAVE_SELINUX
sl@0
   624
static dbus_bool_t
sl@0
   625
bus_connection_read_selinux_context (DBusConnection     *connection,
sl@0
   626
                                     char              **con)
sl@0
   627
{
sl@0
   628
  int fd;
sl@0
   629
sl@0
   630
  if (!selinux_enabled)
sl@0
   631
    return FALSE;
sl@0
   632
sl@0
   633
  _dbus_assert (connection != NULL);
sl@0
   634
  
sl@0
   635
  if (!dbus_connection_get_unix_fd (connection, &fd))
sl@0
   636
    {
sl@0
   637
      _dbus_verbose ("Failed to get file descriptor of socket.\n");
sl@0
   638
      return FALSE;
sl@0
   639
    }
sl@0
   640
  
sl@0
   641
  if (getpeercon (fd, con) < 0)
sl@0
   642
    {
sl@0
   643
      _dbus_verbose ("Error getting context of socket peer: %s\n",
sl@0
   644
                     _dbus_strerror (errno));
sl@0
   645
      return FALSE;
sl@0
   646
    }
sl@0
   647
  
sl@0
   648
  _dbus_verbose ("Successfully read connection context.\n");
sl@0
   649
  return TRUE;
sl@0
   650
}
sl@0
   651
#endif /* HAVE_SELINUX */
sl@0
   652
sl@0
   653
/**
sl@0
   654
 * Read the SELinux ID from the connection.
sl@0
   655
 *
sl@0
   656
 * @param connection the connection to read from
sl@0
   657
 * @returns the SID if successfully determined, #NULL otherwise.
sl@0
   658
 */
sl@0
   659
BusSELinuxID*
sl@0
   660
bus_selinux_init_connection_id (DBusConnection *connection,
sl@0
   661
                                DBusError      *error)
sl@0
   662
{
sl@0
   663
#ifdef HAVE_SELINUX
sl@0
   664
  char *con;
sl@0
   665
  security_id_t sid;
sl@0
   666
  
sl@0
   667
  if (!selinux_enabled)
sl@0
   668
    return NULL;
sl@0
   669
sl@0
   670
  if (!bus_connection_read_selinux_context (connection, &con))
sl@0
   671
    {
sl@0
   672
      dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   673
                      "Failed to read an SELinux context from connection");
sl@0
   674
      _dbus_verbose ("Error getting peer context.\n");
sl@0
   675
      return NULL;
sl@0
   676
    }
sl@0
   677
sl@0
   678
  _dbus_verbose ("Converting context to SID to store on connection\n");
sl@0
   679
sl@0
   680
  if (avc_context_to_sid (con, &sid) < 0)
sl@0
   681
    {
sl@0
   682
      if (errno == ENOMEM)
sl@0
   683
        BUS_SET_OOM (error);
sl@0
   684
      else
sl@0
   685
        dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   686
                        "Error getting SID from context \"%s\": %s\n",
sl@0
   687
			con, _dbus_strerror (errno));
sl@0
   688
      
sl@0
   689
      _dbus_warn ("Error getting SID from context \"%s\": %s\n",
sl@0
   690
		  con, _dbus_strerror (errno));
sl@0
   691
      
sl@0
   692
      freecon (con);
sl@0
   693
      return NULL;
sl@0
   694
    }
sl@0
   695
 
sl@0
   696
  freecon (con); 
sl@0
   697
  return BUS_SID_FROM_SELINUX (sid);
sl@0
   698
#else
sl@0
   699
  return NULL;
sl@0
   700
#endif /* HAVE_SELINUX */
sl@0
   701
}
sl@0
   702
sl@0
   703
sl@0
   704
/**
sl@0
   705
 * Function for freeing hash table data.  These SIDs
sl@0
   706
 * should no longer be referenced.
sl@0
   707
 */
sl@0
   708
static void
sl@0
   709
bus_selinux_id_table_free_value (BusSELinuxID *sid)
sl@0
   710
{
sl@0
   711
#ifdef HAVE_SELINUX
sl@0
   712
  /* NULL sometimes due to how DBusHashTable works */
sl@0
   713
  if (sid)
sl@0
   714
    bus_selinux_id_unref (sid);
sl@0
   715
#endif /* HAVE_SELINUX */
sl@0
   716
}
sl@0
   717
sl@0
   718
/**
sl@0
   719
 * Creates a new table mapping service names to security ID.
sl@0
   720
 * A security ID is a "compiled" security context, a security
sl@0
   721
 * context is just a string.
sl@0
   722
 *
sl@0
   723
 * @returns the new table or #NULL if no memory
sl@0
   724
 */
sl@0
   725
DBusHashTable*
sl@0
   726
bus_selinux_id_table_new (void)
sl@0
   727
{
sl@0
   728
  return _dbus_hash_table_new (DBUS_HASH_STRING,
sl@0
   729
                               (DBusFreeFunction) dbus_free,
sl@0
   730
                               (DBusFreeFunction) bus_selinux_id_table_free_value);
sl@0
   731
}
sl@0
   732
sl@0
   733
/** 
sl@0
   734
 * Hashes a service name and service context into the service SID
sl@0
   735
 * table as a string and a SID.
sl@0
   736
 *
sl@0
   737
 * @param service_name is the name of the service.
sl@0
   738
 * @param service_context is the context of the service.
sl@0
   739
 * @param service_table is the table to hash them into.
sl@0
   740
 * @return #FALSE if not enough memory
sl@0
   741
 */
sl@0
   742
dbus_bool_t
sl@0
   743
bus_selinux_id_table_insert (DBusHashTable *service_table,
sl@0
   744
                             const char    *service_name,
sl@0
   745
                             const char    *service_context)
sl@0
   746
{
sl@0
   747
#ifdef HAVE_SELINUX
sl@0
   748
  dbus_bool_t retval;
sl@0
   749
  security_id_t sid;
sl@0
   750
  char *key;
sl@0
   751
sl@0
   752
  if (!selinux_enabled)
sl@0
   753
    return TRUE;
sl@0
   754
sl@0
   755
  sid = SECSID_WILD;
sl@0
   756
  retval = FALSE;
sl@0
   757
sl@0
   758
  key = _dbus_strdup (service_name);
sl@0
   759
  if (key == NULL)
sl@0
   760
    return retval;
sl@0
   761
  
sl@0
   762
  if (avc_context_to_sid ((char *) service_context, &sid) < 0)
sl@0
   763
    {
sl@0
   764
      if (errno == ENOMEM)
sl@0
   765
        {
sl@0
   766
	  dbus_free (key);
sl@0
   767
          return FALSE;
sl@0
   768
	}
sl@0
   769
sl@0
   770
      _dbus_warn ("Error getting SID from context \"%s\": %s\n",
sl@0
   771
		  (char *) service_context,
sl@0
   772
                  _dbus_strerror (errno));
sl@0
   773
      goto out;
sl@0
   774
    }
sl@0
   775
sl@0
   776
  if (!_dbus_hash_table_insert_string (service_table,
sl@0
   777
                                       key,
sl@0
   778
                                       BUS_SID_FROM_SELINUX (sid)))
sl@0
   779
    goto out;
sl@0
   780
sl@0
   781
  _dbus_verbose ("Parsed \tservice: %s \n\t\tcontext: %s\n",
sl@0
   782
                  key, 
sl@0
   783
                  sid->ctx);
sl@0
   784
sl@0
   785
  /* These are owned by the hash, so clear them to avoid unref */
sl@0
   786
  key = NULL;
sl@0
   787
  sid = SECSID_WILD;
sl@0
   788
sl@0
   789
  retval = TRUE;
sl@0
   790
  
sl@0
   791
 out:
sl@0
   792
  if (sid != SECSID_WILD)
sl@0
   793
    sidput (sid);
sl@0
   794
sl@0
   795
  if (key)
sl@0
   796
    dbus_free (key);
sl@0
   797
sl@0
   798
  return retval;
sl@0
   799
#else
sl@0
   800
  return TRUE;
sl@0
   801
#endif /* HAVE_SELINUX */
sl@0
   802
}
sl@0
   803
sl@0
   804
sl@0
   805
/**
sl@0
   806
 * Find the security identifier associated with a particular service
sl@0
   807
 * name.  Return a pointer to this SID, or #NULL/SECSID_WILD if the
sl@0
   808
 * service is not found in the hash table.  This should be nearly a
sl@0
   809
 * constant time operation.  If SELinux support is not available,
sl@0
   810
 * always return NULL.
sl@0
   811
 *
sl@0
   812
 * @param service_table the hash table to check for service name.
sl@0
   813
 * @param service_name the name of the service to look for.
sl@0
   814
 * @returns the SELinux ID associated with the service
sl@0
   815
 */
sl@0
   816
BusSELinuxID*
sl@0
   817
bus_selinux_id_table_lookup (DBusHashTable    *service_table,
sl@0
   818
                             const DBusString *service_name)
sl@0
   819
{
sl@0
   820
#ifdef HAVE_SELINUX
sl@0
   821
  security_id_t sid;
sl@0
   822
sl@0
   823
  sid = SECSID_WILD;     /* default context */
sl@0
   824
sl@0
   825
  if (!selinux_enabled)
sl@0
   826
    return NULL;
sl@0
   827
  
sl@0
   828
  _dbus_verbose ("Looking up service SID for %s\n",
sl@0
   829
                 _dbus_string_get_const_data (service_name));
sl@0
   830
sl@0
   831
  sid = _dbus_hash_table_lookup_string (service_table,
sl@0
   832
                                        _dbus_string_get_const_data (service_name));
sl@0
   833
sl@0
   834
  if (sid == SECSID_WILD)
sl@0
   835
    _dbus_verbose ("Service %s not found\n", 
sl@0
   836
                   _dbus_string_get_const_data (service_name));
sl@0
   837
  else
sl@0
   838
    _dbus_verbose ("Service %s found\n", 
sl@0
   839
                   _dbus_string_get_const_data (service_name));
sl@0
   840
sl@0
   841
  return BUS_SID_FROM_SELINUX (sid);
sl@0
   842
#endif /* HAVE_SELINUX */
sl@0
   843
  return NULL;
sl@0
   844
}
sl@0
   845
sl@0
   846
/**
sl@0
   847
 * Get the SELinux policy root.  This is used to find the D-Bus
sl@0
   848
 * specific config file within the policy.
sl@0
   849
 */
sl@0
   850
const char *
sl@0
   851
bus_selinux_get_policy_root (void)
sl@0
   852
{
sl@0
   853
#ifdef HAVE_SELINUX
sl@0
   854
  return selinux_policy_root ();
sl@0
   855
#else
sl@0
   856
  return NULL;
sl@0
   857
#endif /* HAVE_SELINUX */
sl@0
   858
} 
sl@0
   859
sl@0
   860
/**
sl@0
   861
 * For debugging:  Print out the current hash table of service SIDs.
sl@0
   862
 */
sl@0
   863
void
sl@0
   864
bus_selinux_id_table_print (DBusHashTable *service_table)
sl@0
   865
{
sl@0
   866
#ifdef DBUS_ENABLE_VERBOSE_MODE
sl@0
   867
#ifdef HAVE_SELINUX
sl@0
   868
  DBusHashIter iter;
sl@0
   869
sl@0
   870
  if (!selinux_enabled)
sl@0
   871
    return;
sl@0
   872
  
sl@0
   873
  _dbus_verbose ("Service SID Table:\n");
sl@0
   874
  _dbus_hash_iter_init (service_table, &iter);
sl@0
   875
  while (_dbus_hash_iter_next (&iter))
sl@0
   876
    {
sl@0
   877
      const char *key = _dbus_hash_iter_get_string_key (&iter);
sl@0
   878
      security_id_t sid = _dbus_hash_iter_get_value (&iter);
sl@0
   879
      _dbus_verbose ("The key is %s\n", key);
sl@0
   880
      _dbus_verbose ("The context is %s\n", sid->ctx);
sl@0
   881
      _dbus_verbose ("The refcount is %d\n", sid->refcnt);
sl@0
   882
    }
sl@0
   883
#endif /* HAVE_SELINUX */
sl@0
   884
#endif /* DBUS_ENABLE_VERBOSE_MODE */
sl@0
   885
}
sl@0
   886
sl@0
   887
sl@0
   888
#ifdef DBUS_ENABLE_VERBOSE_MODE
sl@0
   889
#ifdef HAVE_SELINUX
sl@0
   890
/**
sl@0
   891
 * Print out some AVC statistics.
sl@0
   892
 */
sl@0
   893
static void
sl@0
   894
bus_avc_print_stats (void)
sl@0
   895
{
sl@0
   896
  struct avc_cache_stats cstats;
sl@0
   897
sl@0
   898
  if (!selinux_enabled)
sl@0
   899
    return;
sl@0
   900
  
sl@0
   901
  _dbus_verbose ("AVC Statistics:\n");
sl@0
   902
  avc_cache_stats (&cstats);
sl@0
   903
  avc_av_stats ();
sl@0
   904
  _dbus_verbose ("AVC Cache Statistics:\n");
sl@0
   905
  _dbus_verbose ("Entry lookups: %d\n", cstats.entry_lookups);
sl@0
   906
  _dbus_verbose ("Entry hits: %d\n", cstats.entry_hits);
sl@0
   907
  _dbus_verbose ("Entry misses %d\n", cstats.entry_misses);
sl@0
   908
  _dbus_verbose ("Entry discards: %d\n", cstats.entry_discards);
sl@0
   909
  _dbus_verbose ("CAV lookups: %d\n", cstats.cav_lookups);
sl@0
   910
  _dbus_verbose ("CAV hits: %d\n", cstats.cav_hits);
sl@0
   911
  _dbus_verbose ("CAV probes: %d\n", cstats.cav_probes);
sl@0
   912
  _dbus_verbose ("CAV misses: %d\n", cstats.cav_misses);
sl@0
   913
}
sl@0
   914
#endif /* HAVE_SELINUX */
sl@0
   915
#endif /* DBUS_ENABLE_VERBOSE_MODE */
sl@0
   916
sl@0
   917
sl@0
   918
/**
sl@0
   919
 * Destroy the AVC before we terminate.
sl@0
   920
 */
sl@0
   921
void
sl@0
   922
bus_selinux_shutdown (void)
sl@0
   923
{
sl@0
   924
#ifdef HAVE_SELINUX
sl@0
   925
  if (!selinux_enabled)
sl@0
   926
    return;
sl@0
   927
sl@0
   928
  _dbus_verbose ("AVC shutdown\n");
sl@0
   929
sl@0
   930
  if (bus_sid != SECSID_WILD)
sl@0
   931
    {
sl@0
   932
      sidput (bus_sid);
sl@0
   933
      bus_sid = SECSID_WILD;
sl@0
   934
      
sl@0
   935
#ifdef DBUS_ENABLE_VERBOSE_MODE
sl@0
   936
      bus_avc_print_stats ();
sl@0
   937
#endif /* DBUS_ENABLE_VERBOSE_MODE */
sl@0
   938
sl@0
   939
      avc_destroy ();
sl@0
   940
    }
sl@0
   941
#endif /* HAVE_SELINUX */
sl@0
   942
}
sl@0
   943