mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-08-31 06:16:03 +00:00
parser: add parser support for io_uring mediation
io_uring rules have the following format: io_uring [<access_mode>] [<label>], access_mode := 'sqpoll'|'override_creds' label := 'label' '=' <target label> Signed-off-by: Georgia Garcia <georgia.garcia@canonical.com>
This commit is contained in:
141
parser/io_uring.cc
Normal file
141
parser/io_uring.cc
Normal file
@@ -0,0 +1,141 @@
|
||||
/*
|
||||
* Copyright (c) 2023
|
||||
* Canonical Ltd. (All rights reserved)
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of version 2 of the GNU General Public
|
||||
* License published by the Free Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, contact or Canonical Ltd.
|
||||
*/
|
||||
|
||||
#include "parser.h"
|
||||
#include "profile.h"
|
||||
#include "io_uring.h"
|
||||
|
||||
#include <iomanip>
|
||||
#include <string>
|
||||
#include <iostream>
|
||||
#include <sstream>
|
||||
|
||||
void io_uring_rule::move_conditionals(struct cond_entry *conds)
|
||||
{
|
||||
struct cond_entry *cond_ent;
|
||||
|
||||
list_for_each(conds, cond_ent) {
|
||||
/* disallow keyword 'in' (list) */
|
||||
if (!cond_ent->eq)
|
||||
yyerror("keyword \"in\" is not allowed in io_uring rules\n");
|
||||
|
||||
if (list_len(cond_ent->vals) > 1)
|
||||
yyerror("io_uring conditional \"%s\" only supports a single value\n",
|
||||
cond_ent->name);
|
||||
|
||||
if (strcmp(cond_ent->name, "label") == 0) {
|
||||
move_conditional_value("io_uring", &label, cond_ent);
|
||||
} else {
|
||||
yyerror("invalid io_uring conditional \"%s\"\n",
|
||||
cond_ent->name);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
io_uring_rule::io_uring_rule(perms_t perms_p, struct cond_entry *conds, struct cond_entry *ring_conds):
|
||||
perms_rule_t(AA_CLASS_IO_URING), label(NULL)
|
||||
{
|
||||
if (perms_p) {
|
||||
if (perms_p & ~AA_VALID_IO_URING_PERMS) {
|
||||
yyerror("perms contains invalid permissions for io_uring\n");
|
||||
}
|
||||
perms = perms_p;
|
||||
|
||||
} else {
|
||||
/* default to all perms */
|
||||
perms = AA_VALID_IO_URING_PERMS;
|
||||
}
|
||||
move_conditionals(conds);
|
||||
move_conditionals(ring_conds);
|
||||
free_cond_list(conds);
|
||||
free_cond_list(ring_conds);
|
||||
}
|
||||
|
||||
ostream &io_uring_rule::dump(ostream &os)
|
||||
{
|
||||
class_rule_t::dump(os);
|
||||
|
||||
if (perms != AA_VALID_IO_URING_PERMS) {
|
||||
os << " ( ";
|
||||
|
||||
if (perms & AA_IO_URING_OVERRIDE_CREDS)
|
||||
os << "override_creds ";
|
||||
if (perms & AA_IO_URING_SQPOLL)
|
||||
os << " sqpoll ";
|
||||
|
||||
os << ")";
|
||||
}
|
||||
|
||||
if (label)
|
||||
os << " label=" << label;
|
||||
|
||||
os << ",\n";
|
||||
|
||||
return os;
|
||||
}
|
||||
|
||||
|
||||
int io_uring_rule::expand_variables(void)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
void io_uring_rule::warn_once(const char *name)
|
||||
{
|
||||
rule_t::warn_once(name, "io_uring rules not enforced");
|
||||
}
|
||||
|
||||
int io_uring_rule::gen_policy_re(Profile &prof)
|
||||
{
|
||||
std::ostringstream buffer;
|
||||
std::string buf, labelbuf;
|
||||
|
||||
if (!features_supports_io_uring) {
|
||||
warn_once(prof.name);
|
||||
return RULE_NOT_SUPPORTED;
|
||||
}
|
||||
|
||||
buffer << "\\x" << std::setfill('0') << std::setw(2) << std::hex << AA_CLASS_IO_URING;
|
||||
buf = buffer.str();
|
||||
|
||||
if (label) {
|
||||
if (!convert_entry(labelbuf, label))
|
||||
goto fail;
|
||||
buffer << labelbuf;
|
||||
} else {
|
||||
buffer << default_match_pattern;
|
||||
}
|
||||
|
||||
if (perms & AA_VALID_IO_URING_PERMS) {
|
||||
if (!prof.policy.rules->add_rule(buf.c_str(), rule_mode == RULE_DENY, perms,
|
||||
audit == AUDIT_FORCE ? perms : 0,
|
||||
dfaflags))
|
||||
goto fail;
|
||||
|
||||
if (perms & AA_IO_URING_OVERRIDE_CREDS) {
|
||||
buf = buffer.str(); /* update buf to have label */
|
||||
if (!prof.policy.rules->add_rule(buf.c_str(), rule_mode == RULE_DENY,
|
||||
perms, audit == AUDIT_FORCE ? perms : 0,
|
||||
dfaflags))
|
||||
goto fail;
|
||||
}
|
||||
|
||||
}
|
||||
return RULE_OK;
|
||||
fail:
|
||||
return RULE_ERROR;
|
||||
}
|
Reference in New Issue
Block a user