xref: /netbsd-src/sys/kern/sysv_ipc.c (revision 6cf6fe02a981b55727c49c3d37b0d8191a98c0ee)
1 /*	$NetBSD: sysv_ipc.c,v 1.25 2014/02/25 18:30:11 pooka Exp $	*/
2 
3 /*-
4  * Copyright (c) 1998, 2007 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Charles M. Hannum.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: sysv_ipc.c,v 1.25 2014/02/25 18:30:11 pooka Exp $");
34 
35 #include "opt_sysv.h"
36 #include "opt_compat_netbsd.h"
37 #include <sys/param.h>
38 #include <sys/kernel.h>
39 #include <sys/proc.h>
40 #include <sys/ipc.h>
41 #ifdef SYSVMSG
42 #include <sys/msg.h>
43 #endif
44 #ifdef SYSVSEM
45 #include <sys/sem.h>
46 #endif
47 #ifdef SYSVSHM
48 #include <sys/shm.h>
49 #endif
50 #include <sys/systm.h>
51 #include <sys/kmem.h>
52 #include <sys/mount.h>
53 #include <sys/vnode.h>
54 #include <sys/stat.h>
55 #include <sys/sysctl.h>
56 #include <sys/kauth.h>
57 
58 #ifdef COMPAT_50
59 #include <compat/sys/ipc.h>
60 #endif
61 
62 static kauth_listener_t sysvipc_listener = NULL;
63 
64 static int
65 sysvipc_listener_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
66     void *arg0, void *arg1, void *arg2, void *arg3)
67 {
68 	mode_t mask;
69 	int ismember = 0;
70 	struct ipc_perm *perm;
71 	int mode;
72 	enum kauth_system_req req;
73 
74 	req = (enum kauth_system_req)arg0;
75 
76 	if (!(action == KAUTH_SYSTEM_SYSVIPC &&
77 	      req == KAUTH_REQ_SYSTEM_SYSVIPC_BYPASS))
78 		return KAUTH_RESULT_DEFER;
79 
80 	perm = arg1;
81 	mode = (int)(uintptr_t)arg2;
82 
83 	if (mode == IPC_M) {
84 		if (kauth_cred_geteuid(cred) == perm->uid ||
85 		    kauth_cred_geteuid(cred) == perm->cuid)
86 			return (KAUTH_RESULT_ALLOW);
87 		return (KAUTH_RESULT_DEFER); /* EPERM */
88 	}
89 
90 	mask = 0;
91 
92 	if (kauth_cred_geteuid(cred) == perm->uid ||
93 	    kauth_cred_geteuid(cred) == perm->cuid) {
94 		if (mode & IPC_R)
95 			mask |= S_IRUSR;
96 		if (mode & IPC_W)
97 			mask |= S_IWUSR;
98 		return ((perm->mode & mask) == mask ? KAUTH_RESULT_ALLOW : KAUTH_RESULT_DEFER /* EACCES */);
99 	}
100 
101 	if (kauth_cred_getegid(cred) == perm->gid ||
102 	    (kauth_cred_ismember_gid(cred, perm->gid, &ismember) == 0 && ismember) ||
103 	    kauth_cred_getegid(cred) == perm->cgid ||
104 	    (kauth_cred_ismember_gid(cred, perm->cgid, &ismember) == 0 && ismember)) {
105 		if (mode & IPC_R)
106 			mask |= S_IRGRP;
107 		if (mode & IPC_W)
108 			mask |= S_IWGRP;
109 		return ((perm->mode & mask) == mask ? KAUTH_RESULT_ALLOW : KAUTH_RESULT_DEFER /* EACCES */);
110 	}
111 
112 	if (mode & IPC_R)
113 		mask |= S_IROTH;
114 	if (mode & IPC_W)
115 		mask |= S_IWOTH;
116 	return ((perm->mode & mask) == mask ? KAUTH_RESULT_ALLOW : KAUTH_RESULT_DEFER /* EACCES */);
117 }
118 
119 /*
120  * Check for ipc permission
121  */
122 
123 int
124 ipcperm(kauth_cred_t cred, struct ipc_perm *perm, int mode)
125 {
126 	int error;
127 
128 	error = kauth_authorize_system(cred, KAUTH_SYSTEM_SYSVIPC,
129 	    KAUTH_REQ_SYSTEM_SYSVIPC_BYPASS, perm, KAUTH_ARG(mode), NULL);
130 	if (error == 0)
131 		return (0);
132 
133 	/* Adjust EPERM and EACCES errors until there's a better way to do this. */
134 	if (mode != IPC_M)
135 		error = EACCES;
136 
137 	return error;
138 }
139 
140 void
141 sysvipcinit(void)
142 {
143 
144 	if (sysvipc_listener != NULL)
145 		return;
146 
147 	sysvipc_listener = kauth_listen_scope(KAUTH_SCOPE_SYSTEM,
148 	    sysvipc_listener_cb, NULL);
149 }
150 
151 static int
152 sysctl_kern_sysvipc(SYSCTLFN_ARGS)
153 {
154 	void *where = oldp;
155 	size_t sz, *sizep = oldlenp;
156 #ifdef SYSVMSG
157 	struct msg_sysctl_info *msgsi = NULL;
158 #endif
159 #ifdef SYSVSEM
160 	struct sem_sysctl_info *semsi = NULL;
161 #endif
162 #ifdef SYSVSHM
163 	struct shm_sysctl_info *shmsi = NULL;
164 #endif
165 	size_t infosize, dssize, tsize, buflen;
166 	void *bf = NULL;
167 	char *start;
168 	int32_t nds;
169 	int i, error, ret;
170 
171 #ifdef COMPAT_50
172 	switch ((error = sysctl_kern_sysvipc50(SYSCTLFN_CALL(rnode)))) {
173 	case 0:
174 		return 0;
175 	case EPASSTHROUGH:
176 		break;
177 	default:
178 		return error;
179 	}
180 #endif
181 	if (namelen != 1)
182 		return EINVAL;
183 
184 	start = where;
185 	buflen = *sizep;
186 
187 	switch (*name) {
188 	case KERN_SYSVIPC_MSG_INFO:
189 #ifdef SYSVMSG
190 		infosize = sizeof(msgsi->msginfo);
191 		nds = msginfo.msgmni;
192 		dssize = sizeof(msgsi->msgids[0]);
193 		break;
194 #else
195 		return EINVAL;
196 #endif
197 	case KERN_SYSVIPC_SEM_INFO:
198 #ifdef SYSVSEM
199 		infosize = sizeof(semsi->seminfo);
200 		nds = seminfo.semmni;
201 		dssize = sizeof(semsi->semids[0]);
202 		break;
203 #else
204 		return EINVAL;
205 #endif
206 	case KERN_SYSVIPC_SHM_INFO:
207 #ifdef SYSVSHM
208 		infosize = sizeof(shmsi->shminfo);
209 		nds = shminfo.shmmni;
210 		dssize = sizeof(shmsi->shmids[0]);
211 		break;
212 #else
213 		return EINVAL;
214 #endif
215 	default:
216 		return EINVAL;
217 	}
218 	/*
219 	 * Round infosize to 64 bit boundary if requesting more than just
220 	 * the info structure or getting the total data size.
221 	 */
222 	if (where == NULL || *sizep > infosize)
223 		infosize = roundup(infosize, sizeof(quad_t));
224 	tsize = infosize + nds * dssize;
225 
226 	/* Return just the total size required. */
227 	if (where == NULL) {
228 		*sizep = tsize;
229 		return 0;
230 	}
231 
232 	/* Not enough room for even the info struct. */
233 	if (buflen < infosize) {
234 		*sizep = 0;
235 		return ENOMEM;
236 	}
237 	sz = min(tsize, buflen);
238 	bf = kmem_zalloc(sz, KM_SLEEP);
239 
240 	switch (*name) {
241 #ifdef SYSVMSG
242 	case KERN_SYSVIPC_MSG_INFO:
243 		msgsi = (struct msg_sysctl_info *)bf;
244 		msgsi->msginfo = msginfo;
245 		break;
246 #endif
247 #ifdef SYSVSEM
248 	case KERN_SYSVIPC_SEM_INFO:
249 		semsi = (struct sem_sysctl_info *)bf;
250 		semsi->seminfo = seminfo;
251 		break;
252 #endif
253 #ifdef SYSVSHM
254 	case KERN_SYSVIPC_SHM_INFO:
255 		shmsi = (struct shm_sysctl_info *)bf;
256 		shmsi->shminfo = shminfo;
257 		break;
258 #endif
259 	}
260 	buflen -= infosize;
261 
262 	ret = 0;
263 	if (buflen > 0) {
264 		/* Fill in the IPC data structures.  */
265 		for (i = 0; i < nds; i++) {
266 			if (buflen < dssize) {
267 				ret = ENOMEM;
268 				break;
269 			}
270 			switch (*name) {
271 #ifdef SYSVMSG
272 			case KERN_SYSVIPC_MSG_INFO:
273 				mutex_enter(&msgmutex);
274 				SYSCTL_FILL_MSG(msqs[i].msq_u, msgsi->msgids[i]);
275 				mutex_exit(&msgmutex);
276 				break;
277 #endif
278 #ifdef SYSVSEM
279 			case KERN_SYSVIPC_SEM_INFO:
280 				SYSCTL_FILL_SEM(sema[i], semsi->semids[i]);
281 				break;
282 #endif
283 #ifdef SYSVSHM
284 			case KERN_SYSVIPC_SHM_INFO:
285 				SYSCTL_FILL_SHM(shmsegs[i], shmsi->shmids[i]);
286 				break;
287 #endif
288 			}
289 			buflen -= dssize;
290 		}
291 	}
292 	*sizep -= buflen;
293 	error = copyout(bf, start, *sizep);
294 	/* If copyout succeeded, use return code set earlier. */
295 	if (error == 0)
296 		error = ret;
297 	if (bf)
298 		kmem_free(bf, sz);
299 	return error;
300 }
301 
302 SYSCTL_SETUP(sysctl_ipc_setup, "sysctl kern.ipc subtree setup")
303 {
304 
305 	sysctl_createv(clog, 0, NULL, NULL,
306 		CTLFLAG_PERMANENT,
307 		CTLTYPE_NODE, "ipc",
308 		SYSCTL_DESCR("SysV IPC options"),
309 		NULL, 0, NULL, 0,
310 		CTL_KERN, KERN_SYSVIPC, CTL_EOL);
311 
312 	sysctl_createv(clog, 0, NULL, NULL,
313 		CTLFLAG_PERMANENT,
314 		CTLTYPE_STRUCT, "sysvipc_info",
315 		SYSCTL_DESCR("System V style IPC information"),
316 		sysctl_kern_sysvipc, 0, NULL, 0,
317 		CTL_KERN, KERN_SYSVIPC, KERN_SYSVIPC_INFO, CTL_EOL);
318 }
319