xref: /linux/security/apparmor/include/task.h (revision c532de5a67a70f8533d495f8f2aaa9a0491c3ad0)
1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /*
3  * AppArmor security module
4  *
5  * This file contains AppArmor task related definitions and mediation
6  *
7  * Copyright 2017 Canonical Ltd.
8  */
9 
10 #ifndef __AA_TASK_H
11 #define __AA_TASK_H
12 
13 static inline struct aa_task_ctx *task_ctx(struct task_struct *task)
14 {
15 	return task->security + apparmor_blob_sizes.lbs_task;
16 }
17 
18 /*
19  * struct aa_task_ctx - information for current task label change
20  * @nnp: snapshot of label at time of no_new_privs
21  * @onexec: profile to transition to on next exec  (MAY BE NULL)
22  * @previous: profile the task may return to     (MAY BE NULL)
23  * @token: magic value the task must know for returning to @previous_profile
24  */
25 struct aa_task_ctx {
26 	struct aa_label *nnp;
27 	struct aa_label *onexec;
28 	struct aa_label *previous;
29 	u64 token;
30 };
31 
32 int aa_replace_current_label(struct aa_label *label);
33 void aa_set_current_onexec(struct aa_label *label, bool stack);
34 int aa_set_current_hat(struct aa_label *label, u64 token);
35 int aa_restore_previous_label(u64 cookie);
36 struct aa_label *aa_get_task_label(struct task_struct *task);
37 
38 /**
39  * aa_free_task_ctx - free a task_ctx
40  * @ctx: task_ctx to free (MAYBE NULL)
41  */
42 static inline void aa_free_task_ctx(struct aa_task_ctx *ctx)
43 {
44 	if (ctx) {
45 		aa_put_label(ctx->nnp);
46 		aa_put_label(ctx->previous);
47 		aa_put_label(ctx->onexec);
48 	}
49 }
50 
51 /**
52  * aa_dup_task_ctx - duplicate a task context, incrementing reference counts
53  * @new: a blank task context      (NOT NULL)
54  * @old: the task context to copy  (NOT NULL)
55  */
56 static inline void aa_dup_task_ctx(struct aa_task_ctx *new,
57 				   const struct aa_task_ctx *old)
58 {
59 	*new = *old;
60 	aa_get_label(new->nnp);
61 	aa_get_label(new->previous);
62 	aa_get_label(new->onexec);
63 }
64 
65 /**
66  * aa_clear_task_ctx_trans - clear transition tracking info from the ctx
67  * @ctx: task context to clear (NOT NULL)
68  */
69 static inline void aa_clear_task_ctx_trans(struct aa_task_ctx *ctx)
70 {
71 	AA_BUG(!ctx);
72 
73 	aa_put_label(ctx->previous);
74 	aa_put_label(ctx->onexec);
75 	ctx->previous = NULL;
76 	ctx->onexec = NULL;
77 	ctx->token = 0;
78 }
79 
80 #define AA_PTRACE_TRACE		MAY_WRITE
81 #define AA_PTRACE_READ		MAY_READ
82 #define AA_MAY_BE_TRACED	AA_MAY_APPEND
83 #define AA_MAY_BE_READ		AA_MAY_CREATE
84 #define PTRACE_PERM_SHIFT	2
85 
86 #define AA_PTRACE_PERM_MASK (AA_PTRACE_READ | AA_PTRACE_TRACE | \
87 			     AA_MAY_BE_READ | AA_MAY_BE_TRACED)
88 #define AA_SIGNAL_PERM_MASK (MAY_READ | MAY_WRITE)
89 
90 #define AA_SFS_SIG_MASK "hup int quit ill trap abrt bus fpe kill usr1 " \
91 	"segv usr2 pipe alrm term stkflt chld cont stop stp ttin ttou urg " \
92 	"xcpu xfsz vtalrm prof winch io pwr sys emt lost"
93 
94 int aa_may_ptrace(const struct cred *tracer_cred, struct aa_label *tracer,
95 		  const struct cred *tracee_cred, struct aa_label *tracee,
96 		  u32 request);
97 
98 
99 
100 #define AA_USERNS_CREATE	8
101 
102 int aa_profile_ns_perm(struct aa_profile *profile,
103 		       struct apparmor_audit_data *ad, u32 request);
104 
105 #endif /* __AA_TASK_H */
106