Home | History | Annotate | Line # | Download | only in extensions
      1  1.1  riastrad /*	$NetBSD: secmodel_extensions_vfs.c,v 1.1 2023/04/22 13:54:19 riastradh Exp $	*/
      2  1.1  riastrad 
      3  1.1  riastrad /*-
      4  1.1  riastrad  * Copyright (c) 2011 Elad Efrat <elad (at) NetBSD.org>
      5  1.1  riastrad  * All rights reserved.
      6  1.1  riastrad  *
      7  1.1  riastrad  * Redistribution and use in source and binary forms, with or without
      8  1.1  riastrad  * modification, are permitted provided that the following conditions
      9  1.1  riastrad  * are met:
     10  1.1  riastrad  * 1. Redistributions of source code must retain the above copyright
     11  1.1  riastrad  *    notice, this list of conditions and the following disclaimer.
     12  1.1  riastrad  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  riastrad  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  riastrad  *    documentation and/or other materials provided with the distribution.
     15  1.1  riastrad  * 3. The name of the author may not be used to endorse or promote products
     16  1.1  riastrad  *    derived from this software without specific prior written permission.
     17  1.1  riastrad  *
     18  1.1  riastrad  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     19  1.1  riastrad  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     20  1.1  riastrad  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     21  1.1  riastrad  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     22  1.1  riastrad  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     23  1.1  riastrad  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     24  1.1  riastrad  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     25  1.1  riastrad  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     26  1.1  riastrad  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     27  1.1  riastrad  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     28  1.1  riastrad  */
     29  1.1  riastrad 
     30  1.1  riastrad #include <sys/cdefs.h>
     31  1.1  riastrad __KERNEL_RCSID(0, "$NetBSD: secmodel_extensions_vfs.c,v 1.1 2023/04/22 13:54:19 riastradh Exp $");
     32  1.1  riastrad 
     33  1.1  riastrad #include <sys/types.h>
     34  1.1  riastrad #include <sys/param.h>
     35  1.1  riastrad 
     36  1.1  riastrad #include <sys/kauth.h>
     37  1.1  riastrad #include <sys/vnode.h>
     38  1.1  riastrad 
     39  1.1  riastrad #include <secmodel/secmodel.h>
     40  1.1  riastrad #include <secmodel/extensions/extensions.h>
     41  1.1  riastrad #include <secmodel/extensions/extensions_impl.h>
     42  1.1  riastrad 
     43  1.1  riastrad static int dovfsusermount;
     44  1.1  riastrad static int hardlink_check_uid;
     45  1.1  riastrad static int hardlink_check_gid;
     46  1.1  riastrad 
     47  1.1  riastrad static kauth_listener_t l_system, l_vnode;
     48  1.1  riastrad 
     49  1.1  riastrad static int secmodel_extensions_system_cb(kauth_cred_t, kauth_action_t,
     50  1.1  riastrad     void *, void *, void *, void *, void *);
     51  1.1  riastrad static int secmodel_extensions_vnode_cb(kauth_cred_t, kauth_action_t,
     52  1.1  riastrad     void *, void *, void *, void *, void *);
     53  1.1  riastrad 
     54  1.1  riastrad void
     55  1.1  riastrad secmodel_extensions_vfs_start(void)
     56  1.1  riastrad {
     57  1.1  riastrad 
     58  1.1  riastrad 	l_system = kauth_listen_scope(KAUTH_SCOPE_SYSTEM,
     59  1.1  riastrad 	    secmodel_extensions_system_cb, NULL);
     60  1.1  riastrad 	l_vnode = kauth_listen_scope(KAUTH_SCOPE_VNODE,
     61  1.1  riastrad 	    secmodel_extensions_vnode_cb, NULL);
     62  1.1  riastrad }
     63  1.1  riastrad 
     64  1.1  riastrad void
     65  1.1  riastrad secmodel_extensions_vfs_stop(void)
     66  1.1  riastrad {
     67  1.1  riastrad 
     68  1.1  riastrad 	kauth_unlisten_scope(l_system);
     69  1.1  riastrad 	kauth_unlisten_scope(l_vnode);
     70  1.1  riastrad }
     71  1.1  riastrad 
     72  1.1  riastrad void
     73  1.1  riastrad secmodel_extensions_vfs_sysctl(struct sysctllog **clog,
     74  1.1  riastrad     const struct sysctlnode *rnode)
     75  1.1  riastrad {
     76  1.1  riastrad 
     77  1.1  riastrad 	sysctl_createv(clog, 0, &rnode, NULL,
     78  1.1  riastrad 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
     79  1.1  riastrad 		       CTLTYPE_INT, "usermount",
     80  1.1  riastrad 		       SYSCTL_DESCR("Whether unprivileged users may mount "
     81  1.1  riastrad 				    "filesystems"),
     82  1.1  riastrad 		       sysctl_extensions_user_handler, 0, &dovfsusermount, 0,
     83  1.1  riastrad 		       CTL_CREATE, CTL_EOL);
     84  1.1  riastrad 
     85  1.1  riastrad 	sysctl_createv(clog, 0, &rnode, NULL,
     86  1.1  riastrad 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
     87  1.1  riastrad 		       CTLTYPE_INT, "hardlink_check_uid",
     88  1.1  riastrad 		       SYSCTL_DESCR("Whether unprivileged users can hardlink "\
     89  1.1  riastrad 			    "to files they don't own"),
     90  1.1  riastrad 		       sysctl_extensions_user_handler, 0,
     91  1.1  riastrad 		       &hardlink_check_uid, 0,
     92  1.1  riastrad 		       CTL_CREATE, CTL_EOL);
     93  1.1  riastrad 
     94  1.1  riastrad 	sysctl_createv(clog, 0, &rnode, NULL,
     95  1.1  riastrad 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
     96  1.1  riastrad 		       CTLTYPE_INT, "hardlink_check_gid",
     97  1.1  riastrad 		       SYSCTL_DESCR("Whether unprivileged users can hardlink "\
     98  1.1  riastrad 			    "to files that are not in their " \
     99  1.1  riastrad 			    "group membership"),
    100  1.1  riastrad 		       sysctl_extensions_user_handler, 0,
    101  1.1  riastrad 		       &hardlink_check_gid, 0,
    102  1.1  riastrad 		       CTL_CREATE, CTL_EOL);
    103  1.1  riastrad 
    104  1.1  riastrad 	/* Compatibility: vfs.generic.usermount */
    105  1.1  riastrad 	sysctl_createv(clog, 0, NULL, NULL,
    106  1.1  riastrad 		       CTLFLAG_PERMANENT,
    107  1.1  riastrad 		       CTLTYPE_NODE, "generic",
    108  1.1  riastrad 		       SYSCTL_DESCR("Non-specific vfs related information"),
    109  1.1  riastrad 		       NULL, 0, NULL, 0,
    110  1.1  riastrad 		       CTL_VFS, VFS_GENERIC, CTL_EOL);
    111  1.1  riastrad 
    112  1.1  riastrad 	sysctl_createv(clog, 0, NULL, NULL,
    113  1.1  riastrad 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
    114  1.1  riastrad 		       CTLTYPE_INT, "usermount",
    115  1.1  riastrad 		       SYSCTL_DESCR("Whether unprivileged users may mount "
    116  1.1  riastrad 				    "filesystems"),
    117  1.1  riastrad 		       sysctl_extensions_user_handler, 0, &dovfsusermount, 0,
    118  1.1  riastrad 		       CTL_VFS, VFS_GENERIC, VFS_USERMOUNT, CTL_EOL);
    119  1.1  riastrad }
    120  1.1  riastrad 
    121  1.1  riastrad static int
    122  1.1  riastrad secmodel_extensions_system_cb(kauth_cred_t cred, kauth_action_t action,
    123  1.1  riastrad     void *cookie, void *arg0, void *arg1, void *arg2, void *arg3)
    124  1.1  riastrad {
    125  1.1  riastrad 	vnode_t *vp;
    126  1.1  riastrad 	struct vattr va;
    127  1.1  riastrad 	struct mount *mp;
    128  1.1  riastrad 	u_long flags;
    129  1.1  riastrad 	int result;
    130  1.1  riastrad 	enum kauth_system_req req;
    131  1.1  riastrad 	int error;
    132  1.1  riastrad 
    133  1.1  riastrad 	req = (enum kauth_system_req)(uintptr_t)arg0;
    134  1.1  riastrad 	result = KAUTH_RESULT_DEFER;
    135  1.1  riastrad 
    136  1.1  riastrad 	switch (action) {
    137  1.1  riastrad 	case KAUTH_SYSTEM_MOUNT:
    138  1.1  riastrad 		if (dovfsusermount == 0)
    139  1.1  riastrad 			break;
    140  1.1  riastrad 		switch (req) {
    141  1.1  riastrad 		case KAUTH_REQ_SYSTEM_MOUNT_NEW:
    142  1.1  riastrad 			vp = (vnode_t *)arg1;
    143  1.1  riastrad 			mp = vp->v_mount;
    144  1.1  riastrad 			flags = (u_long)arg2;
    145  1.1  riastrad 
    146  1.1  riastrad 			/*
    147  1.1  riastrad 			 * Ensure that the user owns the directory onto which
    148  1.1  riastrad 			 * the mount is attempted.
    149  1.1  riastrad 			 */
    150  1.1  riastrad 			vn_lock(vp, LK_SHARED | LK_RETRY);
    151  1.1  riastrad 			error = VOP_GETATTR(vp, &va, cred);
    152  1.1  riastrad 			VOP_UNLOCK(vp);
    153  1.1  riastrad 			if (error)
    154  1.1  riastrad 				break;
    155  1.1  riastrad 
    156  1.1  riastrad 			if (va.va_uid != kauth_cred_geteuid(cred))
    157  1.1  riastrad 				break;
    158  1.1  riastrad 
    159  1.1  riastrad 			error = usermount_common_policy(mp, flags);
    160  1.1  riastrad 			if (error)
    161  1.1  riastrad 				break;
    162  1.1  riastrad 
    163  1.1  riastrad 			result = KAUTH_RESULT_ALLOW;
    164  1.1  riastrad 
    165  1.1  riastrad 			break;
    166  1.1  riastrad 
    167  1.1  riastrad 		case KAUTH_REQ_SYSTEM_MOUNT_UNMOUNT:
    168  1.1  riastrad 			mp = arg1;
    169  1.1  riastrad 
    170  1.1  riastrad 			/* Must own the mount. */
    171  1.1  riastrad 			if (mp->mnt_stat.f_owner == kauth_cred_geteuid(cred))
    172  1.1  riastrad 				result = KAUTH_RESULT_ALLOW;
    173  1.1  riastrad 
    174  1.1  riastrad 			break;
    175  1.1  riastrad 
    176  1.1  riastrad 		case KAUTH_REQ_SYSTEM_MOUNT_UPDATE:
    177  1.1  riastrad 			mp = arg1;
    178  1.1  riastrad 			flags = (u_long)arg2;
    179  1.1  riastrad 
    180  1.1  riastrad 			/* Must own the mount. */
    181  1.1  riastrad 			if (mp->mnt_stat.f_owner == kauth_cred_geteuid(cred) &&
    182  1.1  riastrad 				usermount_common_policy(mp, flags) == 0)
    183  1.1  riastrad 				result = KAUTH_RESULT_ALLOW;
    184  1.1  riastrad 
    185  1.1  riastrad 			break;
    186  1.1  riastrad 
    187  1.1  riastrad 		default:
    188  1.1  riastrad 			break;
    189  1.1  riastrad 		}
    190  1.1  riastrad 		break;
    191  1.1  riastrad 
    192  1.1  riastrad 	default:
    193  1.1  riastrad 		break;
    194  1.1  riastrad 	}
    195  1.1  riastrad 
    196  1.1  riastrad 	return (result);
    197  1.1  riastrad }
    198  1.1  riastrad 
    199  1.1  riastrad static int
    200  1.1  riastrad secmodel_extensions_vnode_cb(kauth_cred_t cred, kauth_action_t action,
    201  1.1  riastrad     void *cookie, void *arg0, void *arg1, void *arg2, void *arg3)
    202  1.1  riastrad {
    203  1.1  riastrad 	int error;
    204  1.1  riastrad 	bool isroot;
    205  1.1  riastrad 	struct vattr va;
    206  1.1  riastrad 
    207  1.1  riastrad 	if ((action & KAUTH_VNODE_ADD_LINK) == 0)
    208  1.1  riastrad 		return KAUTH_RESULT_DEFER;
    209  1.1  riastrad 
    210  1.1  riastrad 	error = VOP_GETATTR((vnode_t *)arg0, &va, cred);
    211  1.1  riastrad 	if (error)
    212  1.1  riastrad 		goto checkroot;
    213  1.1  riastrad 
    214  1.1  riastrad 	if (hardlink_check_uid && kauth_cred_geteuid(cred) != va.va_uid)
    215  1.1  riastrad 		goto checkroot;
    216  1.1  riastrad 
    217  1.1  riastrad 	if (hardlink_check_gid && kauth_cred_groupmember(cred, va.va_gid) != 0)
    218  1.1  riastrad 		goto checkroot;
    219  1.1  riastrad 
    220  1.1  riastrad 	return KAUTH_RESULT_DEFER;
    221  1.1  riastrad checkroot:
    222  1.1  riastrad 	error = secmodel_eval("org.netbsd.secmodel.suser", "is-root",
    223  1.1  riastrad 	    cred, &isroot);
    224  1.1  riastrad 	if (error || !isroot)
    225  1.1  riastrad 		return KAUTH_RESULT_DENY;
    226  1.1  riastrad 
    227  1.1  riastrad 	return KAUTH_RESULT_DEFER;
    228  1.1  riastrad }
    229  1.1  riastrad 
    230