diff options
Diffstat (limited to 'security/tomoyo/common.c')
| -rw-r--r-- | security/tomoyo/common.c | 2836 |
1 files changed, 1294 insertions, 1542 deletions
diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c index b5dbdc9ff73..ef43995119a 100644 --- a/security/tomoyo/common.c +++ b/security/tomoyo/common.c | |||
| @@ -3,974 +3,424 @@ | |||
| 3 | * | 3 | * |
| 4 | * Common functions for TOMOYO. | 4 | * Common functions for TOMOYO. |
| 5 | * | 5 | * |
| 6 | * Copyright (C) 2005-2009 NTT DATA CORPORATION | 6 | * Copyright (C) 2005-2010 NTT DATA CORPORATION |
| 7 | * | ||
| 8 | * Version: 2.2.0 2009/04/01 | ||
| 9 | * | ||
| 10 | */ | 7 | */ |
| 11 | 8 | ||
| 12 | #include <linux/uaccess.h> | 9 | #include <linux/uaccess.h> |
| 13 | #include <linux/slab.h> | 10 | #include <linux/slab.h> |
| 14 | #include <linux/security.h> | 11 | #include <linux/security.h> |
| 15 | #include <linux/hardirq.h> | ||
| 16 | #include "common.h" | 12 | #include "common.h" |
| 17 | 13 | ||
| 18 | /* Lock for protecting policy. */ | 14 | static struct tomoyo_profile tomoyo_default_profile = { |
| 19 | DEFINE_MUTEX(tomoyo_policy_lock); | 15 | .learning = &tomoyo_default_profile.preference, |
| 16 | .permissive = &tomoyo_default_profile.preference, | ||
| 17 | .enforcing = &tomoyo_default_profile.preference, | ||
| 18 | .preference.enforcing_verbose = true, | ||
| 19 | .preference.learning_max_entry = 2048, | ||
| 20 | .preference.learning_verbose = false, | ||
| 21 | .preference.permissive_verbose = true | ||
| 22 | }; | ||
| 23 | |||
| 24 | /* Profile version. Currently only 20090903 is defined. */ | ||
| 25 | static unsigned int tomoyo_profile_version; | ||
| 20 | 26 | ||
| 21 | /* Has loading policy done? */ | 27 | /* Profile table. Memory is allocated as needed. */ |
| 22 | bool tomoyo_policy_loaded; | 28 | static struct tomoyo_profile *tomoyo_profile_ptr[TOMOYO_MAX_PROFILES]; |
| 23 | 29 | ||
| 24 | /* String table for functionality that takes 4 modes. */ | 30 | /* String table for functionality that takes 4 modes. */ |
| 25 | static const char *tomoyo_mode_4[4] = { | 31 | static const char *tomoyo_mode[4] = { |
| 26 | "disabled", "learning", "permissive", "enforcing" | 32 | "disabled", "learning", "permissive", "enforcing" |
| 27 | }; | 33 | }; |
| 28 | /* String table for functionality that takes 2 modes. */ | ||
| 29 | static const char *tomoyo_mode_2[4] = { | ||
| 30 | "disabled", "enabled", "enabled", "enabled" | ||
| 31 | }; | ||
| 32 | 34 | ||
| 33 | /* | 35 | /* String table for /sys/kernel/security/tomoyo/profile */ |
| 34 | * tomoyo_control_array is a static data which contains | 36 | static const char *tomoyo_mac_keywords[TOMOYO_MAX_MAC_INDEX |
| 35 | * | 37 | + TOMOYO_MAX_MAC_CATEGORY_INDEX] = { |
| 36 | * (1) functionality name used by /sys/kernel/security/tomoyo/profile . | 38 | [TOMOYO_MAC_FILE_EXECUTE] = "file::execute", |
| 37 | * (2) initial values for "struct tomoyo_profile". | 39 | [TOMOYO_MAC_FILE_OPEN] = "file::open", |
| 38 | * (3) max values for "struct tomoyo_profile". | 40 | [TOMOYO_MAC_FILE_CREATE] = "file::create", |
| 39 | */ | 41 | [TOMOYO_MAC_FILE_UNLINK] = "file::unlink", |
| 40 | static struct { | 42 | [TOMOYO_MAC_FILE_MKDIR] = "file::mkdir", |
| 41 | const char *keyword; | 43 | [TOMOYO_MAC_FILE_RMDIR] = "file::rmdir", |
| 42 | unsigned int current_value; | 44 | [TOMOYO_MAC_FILE_MKFIFO] = "file::mkfifo", |
| 43 | const unsigned int max_value; | 45 | [TOMOYO_MAC_FILE_MKSOCK] = "file::mksock", |
| 44 | } tomoyo_control_array[TOMOYO_MAX_CONTROL_INDEX] = { | 46 | [TOMOYO_MAC_FILE_TRUNCATE] = "file::truncate", |
| 45 | [TOMOYO_MAC_FOR_FILE] = { "MAC_FOR_FILE", 0, 3 }, | 47 | [TOMOYO_MAC_FILE_SYMLINK] = "file::symlink", |
| 46 | [TOMOYO_MAX_ACCEPT_ENTRY] = { "MAX_ACCEPT_ENTRY", 2048, INT_MAX }, | 48 | [TOMOYO_MAC_FILE_REWRITE] = "file::rewrite", |
| 47 | [TOMOYO_VERBOSE] = { "TOMOYO_VERBOSE", 1, 1 }, | 49 | [TOMOYO_MAC_FILE_MKBLOCK] = "file::mkblock", |
| 50 | [TOMOYO_MAC_FILE_MKCHAR] = "file::mkchar", | ||
| 51 | [TOMOYO_MAC_FILE_LINK] = "file::link", | ||
| 52 | [TOMOYO_MAC_FILE_RENAME] = "file::rename", | ||
| 53 | [TOMOYO_MAC_FILE_CHMOD] = "file::chmod", | ||
| 54 | [TOMOYO_MAC_FILE_CHOWN] = "file::chown", | ||
| 55 | [TOMOYO_MAC_FILE_CHGRP] = "file::chgrp", | ||
| 56 | [TOMOYO_MAC_FILE_IOCTL] = "file::ioctl", | ||
| 57 | [TOMOYO_MAC_FILE_CHROOT] = "file::chroot", | ||
| 58 | [TOMOYO_MAC_FILE_MOUNT] = "file::mount", | ||
| 59 | [TOMOYO_MAC_FILE_UMOUNT] = "file::umount", | ||
| 60 | [TOMOYO_MAC_FILE_PIVOT_ROOT] = "file::pivot_root", | ||
| 61 | [TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_FILE] = "file", | ||
| 48 | }; | 62 | }; |
| 49 | 63 | ||
| 50 | /* | ||
| 51 | * tomoyo_profile is a structure which is used for holding the mode of access | ||
| 52 | * controls. TOMOYO has 4 modes: disabled, learning, permissive, enforcing. | ||
| 53 | * An administrator can define up to 256 profiles. | ||
| 54 | * The ->profile of "struct tomoyo_domain_info" is used for remembering | ||
| 55 | * the profile's number (0 - 255) assigned to that domain. | ||
| 56 | */ | ||
| 57 | static struct tomoyo_profile { | ||
| 58 | unsigned int value[TOMOYO_MAX_CONTROL_INDEX]; | ||
| 59 | const struct tomoyo_path_info *comment; | ||
| 60 | } *tomoyo_profile_ptr[TOMOYO_MAX_PROFILES]; | ||
| 61 | |||
| 62 | /* Permit policy management by non-root user? */ | 64 | /* Permit policy management by non-root user? */ |
| 63 | static bool tomoyo_manage_by_non_root; | 65 | static bool tomoyo_manage_by_non_root; |
| 64 | 66 | ||
| 65 | /* Utility functions. */ | 67 | /* Utility functions. */ |
| 66 | 68 | ||
| 67 | /* Open operation for /sys/kernel/security/tomoyo/ interface. */ | ||
| 68 | static int tomoyo_open_control(const u8 type, struct file *file); | ||
| 69 | /* Close /sys/kernel/security/tomoyo/ interface. */ | ||
| 70 | static int tomoyo_close_control(struct file *file); | ||
| 71 | /* Read operation for /sys/kernel/security/tomoyo/ interface. */ | ||
| 72 | static int tomoyo_read_control(struct file *file, char __user *buffer, | ||
| 73 | const int buffer_len); | ||
| 74 | /* Write operation for /sys/kernel/security/tomoyo/ interface. */ | ||
| 75 | static int tomoyo_write_control(struct file *file, const char __user *buffer, | ||
| 76 | const int buffer_len); | ||
| 77 | |||
| 78 | /** | 69 | /** |
| 79 | * tomoyo_parse_name_union - Parse a tomoyo_name_union. | 70 | * tomoyo_yesno - Return "yes" or "no". |
| 80 | * | 71 | * |
| 81 | * @filename: Name or name group. | 72 | * @value: Bool value. |
| 82 | * @ptr: Pointer to "struct tomoyo_name_union". | ||
| 83 | * | ||
| 84 | * Returns true on success, false otherwise. | ||
| 85 | */ | 73 | */ |
| 86 | bool tomoyo_parse_name_union(const char *filename, | 74 | static const char *tomoyo_yesno(const unsigned int value) |
| 87 | struct tomoyo_name_union *ptr) | ||
| 88 | { | 75 | { |
| 89 | if (!tomoyo_is_correct_path(filename, 0, 0, 0)) | 76 | return value ? "yes" : "no"; |
| 90 | return false; | ||
| 91 | if (filename[0] == '@') { | ||
| 92 | ptr->group = tomoyo_get_path_group(filename + 1); | ||
| 93 | ptr->is_group = true; | ||
| 94 | return ptr->group != NULL; | ||
| 95 | } | ||
| 96 | ptr->filename = tomoyo_get_name(filename); | ||
| 97 | ptr->is_group = false; | ||
| 98 | return ptr->filename != NULL; | ||
| 99 | } | 77 | } |
| 100 | 78 | ||
| 101 | /** | 79 | static void tomoyo_addprintf(char *buffer, int len, const char *fmt, ...) |
| 102 | * tomoyo_print_name_union - Print a tomoyo_name_union. | ||
| 103 | * | ||
| 104 | * @head: Pointer to "struct tomoyo_io_buffer". | ||
| 105 | * @ptr: Pointer to "struct tomoyo_name_union". | ||
| 106 | * | ||
| 107 | * Returns true on success, false otherwise. | ||
| 108 | */ | ||
| 109 | static bool tomoyo_print_name_union(struct tomoyo_io_buffer *head, | ||
| 110 | const struct tomoyo_name_union *ptr) | ||
| 111 | { | 80 | { |
| 112 | int pos = head->read_avail; | 81 | va_list args; |
| 113 | if (pos && head->read_buf[pos - 1] == ' ') | 82 | const int pos = strlen(buffer); |
| 114 | head->read_avail--; | 83 | va_start(args, fmt); |
| 115 | if (ptr->is_group) | 84 | vsnprintf(buffer + pos, len - pos - 1, fmt, args); |
| 116 | return tomoyo_io_printf(head, " @%s", | 85 | va_end(args); |
| 117 | ptr->group->group_name->name); | ||
| 118 | return tomoyo_io_printf(head, " %s", ptr->filename->name); | ||
| 119 | } | 86 | } |
| 120 | 87 | ||
| 121 | /** | 88 | /** |
| 122 | * tomoyo_is_byte_range - Check whether the string isa \ooo style octal value. | 89 | * tomoyo_flush - Flush queued string to userspace's buffer. |
| 123 | * | ||
| 124 | * @str: Pointer to the string. | ||
| 125 | * | 90 | * |
| 126 | * Returns true if @str is a \ooo style octal value, false otherwise. | 91 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 127 | * | 92 | * |
| 128 | * TOMOYO uses \ooo style representation for 0x01 - 0x20 and 0x7F - 0xFF. | 93 | * Returns true if all data was flushed, false otherwise. |
| 129 | * This function verifies that \ooo is in valid range. | ||
| 130 | */ | 94 | */ |
| 131 | static inline bool tomoyo_is_byte_range(const char *str) | 95 | static bool tomoyo_flush(struct tomoyo_io_buffer *head) |
| 132 | { | 96 | { |
| 133 | return *str >= '0' && *str++ <= '3' && | 97 | while (head->r.w_pos) { |
| 134 | *str >= '0' && *str++ <= '7' && | 98 | const char *w = head->r.w[0]; |
| 135 | *str >= '0' && *str <= '7'; | 99 | int len = strlen(w); |
| 100 | if (len) { | ||
| 101 | if (len > head->read_user_buf_avail) | ||
| 102 | len = head->read_user_buf_avail; | ||
| 103 | if (!len) | ||
| 104 | return false; | ||
| 105 | if (copy_to_user(head->read_user_buf, w, len)) | ||
| 106 | return false; | ||
| 107 | head->read_user_buf_avail -= len; | ||
| 108 | head->read_user_buf += len; | ||
| 109 | w += len; | ||
| 110 | } | ||
| 111 | if (*w) { | ||
| 112 | head->r.w[0] = w; | ||
| 113 | return false; | ||
| 114 | } | ||
| 115 | /* Add '\0' for query. */ | ||
| 116 | if (head->poll) { | ||
| 117 | if (!head->read_user_buf_avail || | ||
| 118 | copy_to_user(head->read_user_buf, "", 1)) | ||
| 119 | return false; | ||
| 120 | head->read_user_buf_avail--; | ||
| 121 | head->read_user_buf++; | ||
| 122 | } | ||
| 123 | head->r.w_pos--; | ||
| 124 | for (len = 0; len < head->r.w_pos; len++) | ||
| 125 | head->r.w[len] = head->r.w[len + 1]; | ||
| 126 | } | ||
| 127 | head->r.avail = 0; | ||
| 128 | return true; | ||
| 136 | } | 129 | } |
| 137 | 130 | ||
| 138 | /** | 131 | /** |
| 139 | * tomoyo_is_alphabet_char - Check whether the character is an alphabet. | 132 | * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure. |
| 140 | * | 133 | * |
| 141 | * @c: The character to check. | 134 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 135 | * @string: String to print. | ||
| 142 | * | 136 | * |
| 143 | * Returns true if @c is an alphabet character, false otherwise. | 137 | * Note that @string has to be kept valid until @head is kfree()d. |
| 138 | * This means that char[] allocated on stack memory cannot be passed to | ||
| 139 | * this function. Use tomoyo_io_printf() for char[] allocated on stack memory. | ||
| 144 | */ | 140 | */ |
| 145 | static inline bool tomoyo_is_alphabet_char(const char c) | 141 | static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string) |
| 146 | { | 142 | { |
| 147 | return (c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z'); | 143 | if (head->r.w_pos < TOMOYO_MAX_IO_READ_QUEUE) { |
| 144 | head->r.w[head->r.w_pos++] = string; | ||
| 145 | tomoyo_flush(head); | ||
| 146 | } else | ||
| 147 | WARN_ON(1); | ||
| 148 | } | 148 | } |
| 149 | 149 | ||
| 150 | /** | 150 | /** |
| 151 | * tomoyo_make_byte - Make byte value from three octal characters. | 151 | * tomoyo_io_printf - printf() to "struct tomoyo_io_buffer" structure. |
| 152 | * | 152 | * |
| 153 | * @c1: The first character. | 153 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 154 | * @c2: The second character. | 154 | * @fmt: The printf()'s format string, followed by parameters. |
| 155 | * @c3: The third character. | ||
| 156 | * | ||
| 157 | * Returns byte value. | ||
| 158 | */ | 155 | */ |
| 159 | static inline u8 tomoyo_make_byte(const u8 c1, const u8 c2, const u8 c3) | 156 | void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt, ...) |
| 160 | { | 157 | { |
| 161 | return ((c1 - '0') << 6) + ((c2 - '0') << 3) + (c3 - '0'); | 158 | va_list args; |
| 159 | int len; | ||
| 160 | int pos = head->r.avail; | ||
| 161 | int size = head->readbuf_size - pos; | ||
| 162 | if (size <= 0) | ||
| 163 | return; | ||
| 164 | va_start(args, fmt); | ||
| 165 | len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; | ||
| 166 | va_end(args); | ||
| 167 | if (pos + len >= head->readbuf_size) { | ||
| 168 | WARN_ON(1); | ||
| 169 | return; | ||
| 170 | } | ||
| 171 | head->r.avail += len; | ||
| 172 | tomoyo_set_string(head, head->read_buf + pos); | ||
| 162 | } | 173 | } |
| 163 | 174 | ||
| 164 | /** | 175 | static void tomoyo_set_space(struct tomoyo_io_buffer *head) |
| 165 | * tomoyo_str_starts - Check whether the given string starts with the given keyword. | ||
| 166 | * | ||
| 167 | * @src: Pointer to pointer to the string. | ||
| 168 | * @find: Pointer to the keyword. | ||
| 169 | * | ||
| 170 | * Returns true if @src starts with @find, false otherwise. | ||
| 171 | * | ||
| 172 | * The @src is updated to point the first character after the @find | ||
| 173 | * if @src starts with @find. | ||
| 174 | */ | ||
| 175 | static bool tomoyo_str_starts(char **src, const char *find) | ||
| 176 | { | 176 | { |
| 177 | const int len = strlen(find); | 177 | tomoyo_set_string(head, " "); |
| 178 | char *tmp = *src; | ||
| 179 | |||
| 180 | if (strncmp(tmp, find, len)) | ||
| 181 | return false; | ||
| 182 | tmp += len; | ||
| 183 | *src = tmp; | ||
| 184 | return true; | ||
| 185 | } | 178 | } |
| 186 | 179 | ||
| 187 | /** | 180 | static bool tomoyo_set_lf(struct tomoyo_io_buffer *head) |
| 188 | * tomoyo_normalize_line - Format string. | ||
| 189 | * | ||
| 190 | * @buffer: The line to normalize. | ||
| 191 | * | ||
| 192 | * Leading and trailing whitespaces are removed. | ||
| 193 | * Multiple whitespaces are packed into single space. | ||
| 194 | * | ||
| 195 | * Returns nothing. | ||
| 196 | */ | ||
| 197 | static void tomoyo_normalize_line(unsigned char *buffer) | ||
| 198 | { | 181 | { |
| 199 | unsigned char *sp = buffer; | 182 | tomoyo_set_string(head, "\n"); |
| 200 | unsigned char *dp = buffer; | 183 | return !head->r.w_pos; |
| 201 | bool first = true; | ||
| 202 | |||
| 203 | while (tomoyo_is_invalid(*sp)) | ||
| 204 | sp++; | ||
| 205 | while (*sp) { | ||
| 206 | if (!first) | ||
| 207 | *dp++ = ' '; | ||
| 208 | first = false; | ||
| 209 | while (tomoyo_is_valid(*sp)) | ||
| 210 | *dp++ = *sp++; | ||
| 211 | while (tomoyo_is_invalid(*sp)) | ||
| 212 | sp++; | ||
| 213 | } | ||
| 214 | *dp = '\0'; | ||
| 215 | } | 184 | } |
| 216 | 185 | ||
| 217 | /** | 186 | /** |
| 218 | * tomoyo_tokenize - Tokenize string. | 187 | * tomoyo_print_name_union - Print a tomoyo_name_union. |
| 219 | * | ||
| 220 | * @buffer: The line to tokenize. | ||
| 221 | * @w: Pointer to "char *". | ||
| 222 | * @size: Sizeof @w . | ||
| 223 | * | 188 | * |
| 224 | * Returns true on success, false otherwise. | 189 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 190 | * @ptr: Pointer to "struct tomoyo_name_union". | ||
| 225 | */ | 191 | */ |
| 226 | bool tomoyo_tokenize(char *buffer, char *w[], size_t size) | 192 | static void tomoyo_print_name_union(struct tomoyo_io_buffer *head, |
| 193 | const struct tomoyo_name_union *ptr) | ||
| 227 | { | 194 | { |
| 228 | int count = size / sizeof(char *); | 195 | tomoyo_set_space(head); |
| 229 | int i; | 196 | if (ptr->is_group) { |
| 230 | for (i = 0; i < count; i++) | 197 | tomoyo_set_string(head, "@"); |
| 231 | w[i] = ""; | 198 | tomoyo_set_string(head, ptr->group->group_name->name); |
| 232 | for (i = 0; i < count; i++) { | 199 | } else { |
| 233 | char *cp = strchr(buffer, ' '); | 200 | tomoyo_set_string(head, ptr->filename->name); |
| 234 | if (cp) | ||
| 235 | *cp = '\0'; | ||
| 236 | w[i] = buffer; | ||
| 237 | if (!cp) | ||
| 238 | break; | ||
| 239 | buffer = cp + 1; | ||
| 240 | } | 201 | } |
| 241 | return i < count || !*buffer; | ||
| 242 | } | 202 | } |
| 243 | 203 | ||
| 244 | /** | 204 | /** |
| 245 | * tomoyo_is_correct_path - Validate a pathname. | 205 | * tomoyo_print_number_union - Print a tomoyo_number_union. |
| 246 | * @filename: The pathname to check. | 206 | * |
| 247 | * @start_type: Should the pathname start with '/'? | 207 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 248 | * 1 = must / -1 = must not / 0 = don't care | 208 | * @ptr: Pointer to "struct tomoyo_number_union". |
| 249 | * @pattern_type: Can the pathname contain a wildcard? | ||
| 250 | * 1 = must / -1 = must not / 0 = don't care | ||
| 251 | * @end_type: Should the pathname end with '/'? | ||
| 252 | * 1 = must / -1 = must not / 0 = don't care | ||
| 253 | * | ||
| 254 | * Check whether the given filename follows the naming rules. | ||
| 255 | * Returns true if @filename follows the naming rules, false otherwise. | ||
| 256 | */ | 209 | */ |
| 257 | bool tomoyo_is_correct_path(const char *filename, const s8 start_type, | 210 | static void tomoyo_print_number_union(struct tomoyo_io_buffer *head, |
| 258 | const s8 pattern_type, const s8 end_type) | 211 | const struct tomoyo_number_union *ptr) |
| 259 | { | 212 | { |
| 260 | const char *const start = filename; | 213 | tomoyo_set_space(head); |
| 261 | bool in_repetition = false; | 214 | if (ptr->is_group) { |
| 262 | bool contains_pattern = false; | 215 | tomoyo_set_string(head, "@"); |
| 263 | unsigned char c; | 216 | tomoyo_set_string(head, ptr->group->group_name->name); |
| 264 | unsigned char d; | 217 | } else { |
| 265 | unsigned char e; | 218 | int i; |
| 266 | 219 | unsigned long min = ptr->values[0]; | |
| 267 | if (!filename) | 220 | const unsigned long max = ptr->values[1]; |
| 268 | goto out; | 221 | u8 min_type = ptr->min_type; |
| 269 | c = *filename; | 222 | const u8 max_type = ptr->max_type; |
| 270 | if (start_type == 1) { /* Must start with '/' */ | 223 | char buffer[128]; |
| 271 | if (c != '/') | 224 | buffer[0] = '\0'; |
| 272 | goto out; | 225 | for (i = 0; i < 2; i++) { |
| 273 | } else if (start_type == -1) { /* Must not start with '/' */ | 226 | switch (min_type) { |
| 274 | if (c == '/') | 227 | case TOMOYO_VALUE_TYPE_HEXADECIMAL: |
| 275 | goto out; | 228 | tomoyo_addprintf(buffer, sizeof(buffer), |
| 276 | } | 229 | "0x%lX", min); |
| 277 | if (c) | 230 | break; |
| 278 | c = *(filename + strlen(filename) - 1); | 231 | case TOMOYO_VALUE_TYPE_OCTAL: |
| 279 | if (end_type == 1) { /* Must end with '/' */ | 232 | tomoyo_addprintf(buffer, sizeof(buffer), |
| 280 | if (c != '/') | 233 | "0%lo", min); |
| 281 | goto out; | 234 | break; |
| 282 | } else if (end_type == -1) { /* Must not end with '/' */ | 235 | default: |
| 283 | if (c == '/') | 236 | tomoyo_addprintf(buffer, sizeof(buffer), |
| 284 | goto out; | 237 | "%lu", min); |
| 285 | } | 238 | break; |
| 286 | while (1) { | ||
| 287 | c = *filename++; | ||
| 288 | if (!c) | ||
| 289 | break; | ||
| 290 | if (c == '\\') { | ||
| 291 | c = *filename++; | ||
| 292 | switch (c) { | ||
| 293 | case '\\': /* "\\" */ | ||
| 294 | continue; | ||
| 295 | case '$': /* "\$" */ | ||
| 296 | case '+': /* "\+" */ | ||
| 297 | case '?': /* "\?" */ | ||
| 298 | case '*': /* "\*" */ | ||
| 299 | case '@': /* "\@" */ | ||
| 300 | case 'x': /* "\x" */ | ||
| 301 | case 'X': /* "\X" */ | ||
| 302 | case 'a': /* "\a" */ | ||
| 303 | case 'A': /* "\A" */ | ||
| 304 | case '-': /* "\-" */ | ||
| 305 | if (pattern_type == -1) | ||
| 306 | break; /* Must not contain pattern */ | ||
| 307 | contains_pattern = true; | ||
| 308 | continue; | ||
| 309 | case '{': /* "/\{" */ | ||
| 310 | if (filename - 3 < start || | ||
| 311 | *(filename - 3) != '/') | ||
| 312 | break; | ||
| 313 | if (pattern_type == -1) | ||
| 314 | break; /* Must not contain pattern */ | ||
| 315 | contains_pattern = true; | ||
| 316 | in_repetition = true; | ||
| 317 | continue; | ||
| 318 | case '}': /* "\}/" */ | ||
| 319 | if (*filename != '/') | ||
| 320 | break; | ||
| 321 | if (!in_repetition) | ||
| 322 | break; | ||
| 323 | in_repetition = false; | ||
| 324 | continue; | ||
| 325 | case '0': /* "\ooo" */ | ||
| 326 | case '1': | ||
| 327 | case '2': | ||
| 328 | case '3': | ||
| 329 | d = *filename++; | ||
| 330 | if (d < '0' || d > '7') | ||
| 331 | break; | ||
| 332 | e = *filename++; | ||
| 333 | if (e < '0' || e > '7') | ||
| 334 | break; | ||
| 335 | c = tomoyo_make_byte(c, d, e); | ||
| 336 | if (tomoyo_is_invalid(c)) | ||
| 337 | continue; /* pattern is not \000 */ | ||
| 338 | } | 239 | } |
| 339 | goto out; | 240 | if (min == max && min_type == max_type) |
| 340 | } else if (in_repetition && c == '/') { | 241 | break; |
| 341 | goto out; | 242 | tomoyo_addprintf(buffer, sizeof(buffer), "-"); |
| 342 | } else if (tomoyo_is_invalid(c)) { | 243 | min_type = max_type; |
| 343 | goto out; | 244 | min = max; |
| 344 | } | 245 | } |
| 246 | tomoyo_io_printf(head, "%s", buffer); | ||
| 345 | } | 247 | } |
| 346 | if (pattern_type == 1) { /* Must contain pattern */ | ||
| 347 | if (!contains_pattern) | ||
| 348 | goto out; | ||
| 349 | } | ||
| 350 | if (in_repetition) | ||
| 351 | goto out; | ||
| 352 | return true; | ||
| 353 | out: | ||
| 354 | return false; | ||
| 355 | } | 248 | } |
| 356 | 249 | ||
| 357 | /** | 250 | /** |
| 358 | * tomoyo_is_correct_domain - Check whether the given domainname follows the naming rules. | 251 | * tomoyo_assign_profile - Create a new profile. |
| 359 | * @domainname: The domainname to check. | ||
| 360 | * | 252 | * |
| 361 | * Returns true if @domainname follows the naming rules, false otherwise. | 253 | * @profile: Profile number to create. |
| 254 | * | ||
| 255 | * Returns pointer to "struct tomoyo_profile" on success, NULL otherwise. | ||
| 362 | */ | 256 | */ |
| 363 | bool tomoyo_is_correct_domain(const unsigned char *domainname) | 257 | static struct tomoyo_profile *tomoyo_assign_profile(const unsigned int profile) |
| 364 | { | 258 | { |
| 365 | unsigned char c; | 259 | struct tomoyo_profile *ptr; |
| 366 | unsigned char d; | 260 | struct tomoyo_profile *entry; |
| 367 | unsigned char e; | 261 | if (profile >= TOMOYO_MAX_PROFILES) |
| 368 | 262 | return NULL; | |
| 369 | if (!domainname || strncmp(domainname, TOMOYO_ROOT_NAME, | 263 | ptr = tomoyo_profile_ptr[profile]; |
| 370 | TOMOYO_ROOT_NAME_LEN)) | 264 | if (ptr) |
| 265 | return ptr; | ||
| 266 | entry = kzalloc(sizeof(*entry), GFP_NOFS); | ||
| 267 | if (mutex_lock_interruptible(&tomoyo_policy_lock)) | ||
| 371 | goto out; | 268 | goto out; |
| 372 | domainname += TOMOYO_ROOT_NAME_LEN; | 269 | ptr = tomoyo_profile_ptr[profile]; |
| 373 | if (!*domainname) | 270 | if (!ptr && tomoyo_memory_ok(entry)) { |
| 374 | return true; | 271 | ptr = entry; |
| 375 | do { | 272 | ptr->learning = &tomoyo_default_profile.preference; |
| 376 | if (*domainname++ != ' ') | 273 | ptr->permissive = &tomoyo_default_profile.preference; |
| 377 | goto out; | 274 | ptr->enforcing = &tomoyo_default_profile.preference; |
| 378 | if (*domainname++ != '/') | 275 | ptr->default_config = TOMOYO_CONFIG_DISABLED; |
| 379 | goto out; | 276 | memset(ptr->config, TOMOYO_CONFIG_USE_DEFAULT, |
| 380 | while ((c = *domainname) != '\0' && c != ' ') { | 277 | sizeof(ptr->config)); |
| 381 | domainname++; | 278 | mb(); /* Avoid out-of-order execution. */ |
| 382 | if (c == '\\') { | 279 | tomoyo_profile_ptr[profile] = ptr; |
| 383 | c = *domainname++; | 280 | entry = NULL; |
| 384 | switch ((c)) { | 281 | } |
| 385 | case '\\': /* "\\" */ | 282 | mutex_unlock(&tomoyo_policy_lock); |
| 386 | continue; | ||
| 387 | case '0': /* "\ooo" */ | ||
| 388 | case '1': | ||
| 389 | case '2': | ||
| 390 | case '3': | ||
| 391 | d = *domainname++; | ||
| 392 | if (d < '0' || d > '7') | ||
| 393 | break; | ||
| 394 | e = *domainname++; | ||
| 395 | if (e < '0' || e > '7') | ||
| 396 | break; | ||
| 397 | c = tomoyo_make_byte(c, d, e); | ||
| 398 | if (tomoyo_is_invalid(c)) | ||
| 399 | /* pattern is not \000 */ | ||
| 400 | continue; | ||
| 401 | } | ||
| 402 | goto out; | ||
| 403 | } else if (tomoyo_is_invalid(c)) { | ||
| 404 | goto out; | ||
| 405 | } | ||
| 406 | } | ||
| 407 | } while (*domainname); | ||
| 408 | return true; | ||
| 409 | out: | 283 | out: |
| 410 | return false; | 284 | kfree(entry); |
| 285 | return ptr; | ||
| 411 | } | 286 | } |
| 412 | 287 | ||
| 413 | /** | 288 | /** |
| 414 | * tomoyo_is_domain_def - Check whether the given token can be a domainname. | 289 | * tomoyo_profile - Find a profile. |
| 415 | * | 290 | * |
| 416 | * @buffer: The token to check. | 291 | * @profile: Profile number to find. |
| 417 | * | 292 | * |
| 418 | * Returns true if @buffer possibly be a domainname, false otherwise. | 293 | * Returns pointer to "struct tomoyo_profile". |
| 419 | */ | 294 | */ |
| 420 | bool tomoyo_is_domain_def(const unsigned char *buffer) | 295 | struct tomoyo_profile *tomoyo_profile(const u8 profile) |
| 421 | { | 296 | { |
| 422 | return !strncmp(buffer, TOMOYO_ROOT_NAME, TOMOYO_ROOT_NAME_LEN); | 297 | struct tomoyo_profile *ptr = tomoyo_profile_ptr[profile]; |
| 298 | if (!tomoyo_policy_loaded) | ||
| 299 | return &tomoyo_default_profile; | ||
| 300 | BUG_ON(!ptr); | ||
| 301 | return ptr; | ||
| 423 | } | 302 | } |
| 424 | 303 | ||
| 425 | /** | 304 | static s8 tomoyo_find_yesno(const char *string, const char *find) |
| 426 | * tomoyo_find_domain - Find a domain by the given name. | ||
| 427 | * | ||
| 428 | * @domainname: The domainname to find. | ||
| 429 | * | ||
| 430 | * Returns pointer to "struct tomoyo_domain_info" if found, NULL otherwise. | ||
| 431 | * | ||
| 432 | * Caller holds tomoyo_read_lock(). | ||
| 433 | */ | ||
| 434 | struct tomoyo_domain_info *tomoyo_find_domain(const char *domainname) | ||
| 435 | { | 305 | { |
| 436 | struct tomoyo_domain_info *domain; | 306 | const char *cp = strstr(string, find); |
| 437 | struct tomoyo_path_info name; | 307 | if (cp) { |
| 438 | 308 | cp += strlen(find); | |
| 439 | name.name = domainname; | 309 | if (!strncmp(cp, "=yes", 4)) |
| 440 | tomoyo_fill_path_info(&name); | 310 | return 1; |
| 441 | list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) { | 311 | else if (!strncmp(cp, "=no", 3)) |
| 442 | if (!domain->is_deleted && | 312 | return 0; |
| 443 | !tomoyo_pathcmp(&name, domain->domainname)) | ||
| 444 | return domain; | ||
| 445 | } | 313 | } |
| 446 | return NULL; | 314 | return -1; |
| 447 | } | 315 | } |
| 448 | 316 | ||
| 449 | /** | 317 | static void tomoyo_set_bool(bool *b, const char *string, const char *find) |
| 450 | * tomoyo_const_part_length - Evaluate the initial length without a pattern in a token. | ||
| 451 | * | ||
| 452 | * @filename: The string to evaluate. | ||
| 453 | * | ||
| 454 | * Returns the initial length without a pattern in @filename. | ||
| 455 | */ | ||
| 456 | static int tomoyo_const_part_length(const char *filename) | ||
| 457 | { | 318 | { |
| 458 | char c; | 319 | switch (tomoyo_find_yesno(string, find)) { |
| 459 | int len = 0; | 320 | case 1: |
| 460 | 321 | *b = true; | |
| 461 | if (!filename) | 322 | break; |
| 462 | return 0; | 323 | case 0: |
| 463 | while ((c = *filename++) != '\0') { | 324 | *b = false; |
| 464 | if (c != '\\') { | ||
| 465 | len++; | ||
| 466 | continue; | ||
| 467 | } | ||
| 468 | c = *filename++; | ||
| 469 | switch (c) { | ||
| 470 | case '\\': /* "\\" */ | ||
| 471 | len += 2; | ||
| 472 | continue; | ||
| 473 | case '0': /* "\ooo" */ | ||
| 474 | case '1': | ||
| 475 | case '2': | ||
| 476 | case '3': | ||
| 477 | c = *filename++; | ||
| 478 | if (c < '0' || c > '7') | ||
| 479 | break; | ||
| 480 | c = *filename++; | ||
| 481 | if (c < '0' || c > '7') | ||
| 482 | break; | ||
| 483 | len += 4; | ||
| 484 | continue; | ||
| 485 | } | ||
| 486 | break; | 325 | break; |
| 487 | } | 326 | } |
| 488 | return len; | ||
| 489 | } | 327 | } |
| 490 | 328 | ||
| 491 | /** | 329 | static void tomoyo_set_uint(unsigned int *i, const char *string, |
| 492 | * tomoyo_fill_path_info - Fill in "struct tomoyo_path_info" members. | 330 | const char *find) |
| 493 | * | ||
| 494 | * @ptr: Pointer to "struct tomoyo_path_info" to fill in. | ||
| 495 | * | ||
| 496 | * The caller sets "struct tomoyo_path_info"->name. | ||
| 497 | */ | ||
| 498 | void tomoyo_fill_path_info(struct tomoyo_path_info *ptr) | ||
| 499 | { | 331 | { |
| 500 | const char *name = ptr->name; | 332 | const char *cp = strstr(string, find); |
| 501 | const int len = strlen(name); | 333 | if (cp) |
| 502 | 334 | sscanf(cp + strlen(find), "=%u", i); | |
| 503 | ptr->const_len = tomoyo_const_part_length(name); | ||
| 504 | ptr->is_dir = len && (name[len - 1] == '/'); | ||
| 505 | ptr->is_patterned = (ptr->const_len < len); | ||
| 506 | ptr->hash = full_name_hash(name, len); | ||
| 507 | } | 335 | } |
| 508 | 336 | ||
| 509 | /** | 337 | static void tomoyo_set_pref(const char *name, const char *value, |
| 510 | * tomoyo_file_matches_pattern2 - Pattern matching without '/' character | 338 | const bool use_default, |
| 511 | * and "\-" pattern. | 339 | struct tomoyo_profile *profile) |
| 512 | * | ||
| 513 | * @filename: The start of string to check. | ||
| 514 | * @filename_end: The end of string to check. | ||
| 515 | * @pattern: The start of pattern to compare. | ||
| 516 | * @pattern_end: The end of pattern to compare. | ||
| 517 | * | ||
| 518 | * Returns true if @filename matches @pattern, false otherwise. | ||
| 519 | */ | ||
| 520 | static bool tomoyo_file_matches_pattern2(const char *filename, | ||
| 521 | const char *filename_end, | ||
| 522 | const char *pattern, | ||
| 523 | const char *pattern_end) | ||
| 524 | { | 340 | { |
| 525 | while (filename < filename_end && pattern < pattern_end) { | 341 | struct tomoyo_preference **pref; |
| 526 | char c; | 342 | bool *verbose; |
| 527 | if (*pattern != '\\') { | 343 | if (!strcmp(name, "enforcing")) { |
| 528 | if (*filename++ != *pattern++) | 344 | if (use_default) { |
| 529 | return false; | 345 | pref = &profile->enforcing; |
| 530 | continue; | 346 | goto set_default; |
| 531 | } | 347 | } |
| 532 | c = *filename; | 348 | profile->enforcing = &profile->preference; |
| 533 | pattern++; | 349 | verbose = &profile->preference.enforcing_verbose; |
| 534 | switch (*pattern) { | 350 | goto set_verbose; |
| 535 | int i; | ||
| 536 | int j; | ||
| 537 | case '?': | ||
| 538 | if (c == '/') { | ||
| 539 | return false; | ||
| 540 | } else if (c == '\\') { | ||
| 541 | if (filename[1] == '\\') | ||
| 542 | filename++; | ||
| 543 | else if (tomoyo_is_byte_range(filename + 1)) | ||
| 544 | filename += 3; | ||
| 545 | else | ||
| 546 | return false; | ||
| 547 | } | ||
| 548 | break; | ||
| 549 | case '\\': | ||
| 550 | if (c != '\\') | ||
| 551 | return false; | ||
| 552 | if (*++filename != '\\') | ||
| 553 | return false; | ||
| 554 | break; | ||
| 555 | case '+': | ||
| 556 | if (!isdigit(c)) | ||
| 557 | return false; | ||
| 558 | break; | ||
| 559 | case 'x': | ||
| 560 | if (!isxdigit(c)) | ||
| 561 | return false; | ||
| 562 | break; | ||
| 563 | case 'a': | ||
| 564 | if (!tomoyo_is_alphabet_char(c)) | ||
| 565 | return false; | ||
| 566 | break; | ||
| 567 | case '0': | ||
| 568 | case '1': | ||
| 569 | case '2': | ||
| 570 | case '3': | ||
| 571 | if (c == '\\' && tomoyo_is_byte_range(filename + 1) | ||
| 572 | && strncmp(filename + 1, pattern, 3) == 0) { | ||
| 573 | filename += 3; | ||
| 574 | pattern += 2; | ||
| 575 | break; | ||
| 576 | } | ||
| 577 | return false; /* Not matched. */ | ||
| 578 | case '*': | ||
| 579 | case '@': | ||
| 580 | for (i = 0; i <= filename_end - filename; i++) { | ||
| 581 | if (tomoyo_file_matches_pattern2( | ||
| 582 | filename + i, filename_end, | ||
| 583 | pattern + 1, pattern_end)) | ||
| 584 | return true; | ||
| 585 | c = filename[i]; | ||
| 586 | if (c == '.' && *pattern == '@') | ||
| 587 | break; | ||
| 588 | if (c != '\\') | ||
| 589 | continue; | ||
| 590 | if (filename[i + 1] == '\\') | ||
| 591 | i++; | ||
| 592 | else if (tomoyo_is_byte_range(filename + i + 1)) | ||
| 593 | i += 3; | ||
| 594 | else | ||
| 595 | break; /* Bad pattern. */ | ||
| 596 | } | ||
| 597 | return false; /* Not matched. */ | ||
| 598 | default: | ||
| 599 | j = 0; | ||
| 600 | c = *pattern; | ||
| 601 | if (c == '$') { | ||
| 602 | while (isdigit(filename[j])) | ||
| 603 | j++; | ||
| 604 | } else if (c == 'X') { | ||
| 605 | while (isxdigit(filename[j])) | ||
| 606 | j++; | ||
| 607 | } else if (c == 'A') { | ||
| 608 | while (tomoyo_is_alphabet_char(filename[j])) | ||
| 609 | j++; | ||
| 610 | } | ||
| 611 | for (i = 1; i <= j; i++) { | ||
| 612 | if (tomoyo_file_matches_pattern2( | ||
| 613 | filename + i, filename_end, | ||
| 614 | pattern + 1, pattern_end)) | ||
| 615 | return true; | ||
| 616 | } | ||
| 617 | return false; /* Not matched or bad pattern. */ | ||
| 618 | } | ||
| 619 | filename++; | ||
| 620 | pattern++; | ||
| 621 | } | ||
| 622 | while (*pattern == '\\' && | ||
| 623 | (*(pattern + 1) == '*' || *(pattern + 1) == '@')) | ||
| 624 | pattern += 2; | ||
| 625 | return filename == filename_end && pattern == pattern_end; | ||
| 626 | } | ||
| 627 | |||
| 628 | /** | ||
| 629 | * tomoyo_file_matches_pattern - Pattern matching without without '/' character. | ||
| 630 | * | ||
| 631 | * @filename: The start of string to check. | ||
| 632 | * @filename_end: The end of string to check. | ||
| 633 | * @pattern: The start of pattern to compare. | ||
| 634 | * @pattern_end: The end of pattern to compare. | ||
| 635 | * | ||
| 636 | * Returns true if @filename matches @pattern, false otherwise. | ||
| 637 | */ | ||
| 638 | static bool tomoyo_file_matches_pattern(const char *filename, | ||
| 639 | const char *filename_end, | ||
| 640 | const char *pattern, | ||
| 641 | const char *pattern_end) | ||
| 642 | { | ||
| 643 | const char *pattern_start = pattern; | ||
| 644 | bool first = true; | ||
| 645 | bool result; | ||
| 646 | |||
| 647 | while (pattern < pattern_end - 1) { | ||
| 648 | /* Split at "\-" pattern. */ | ||
| 649 | if (*pattern++ != '\\' || *pattern++ != '-') | ||
| 650 | continue; | ||
| 651 | result = tomoyo_file_matches_pattern2(filename, | ||
| 652 | filename_end, | ||
| 653 | pattern_start, | ||
| 654 | pattern - 2); | ||
| 655 | if (first) | ||
| 656 | result = !result; | ||
| 657 | if (result) | ||
| 658 | return false; | ||
| 659 | first = false; | ||
| 660 | pattern_start = pattern; | ||
| 661 | } | 351 | } |
| 662 | result = tomoyo_file_matches_pattern2(filename, filename_end, | 352 | if (!strcmp(name, "permissive")) { |
| 663 | pattern_start, pattern_end); | 353 | if (use_default) { |
| 664 | return first ? result : !result; | 354 | pref = &profile->permissive; |
| 665 | } | 355 | goto set_default; |
| 666 | 356 | } | |
| 667 | /** | 357 | profile->permissive = &profile->preference; |
| 668 | * tomoyo_path_matches_pattern2 - Do pathname pattern matching. | 358 | verbose = &profile->preference.permissive_verbose; |
| 669 | * | 359 | goto set_verbose; |
| 670 | * @f: The start of string to check. | ||
| 671 | * @p: The start of pattern to compare. | ||
| 672 | * | ||
| 673 | * Returns true if @f matches @p, false otherwise. | ||
| 674 | */ | ||
| 675 | static bool tomoyo_path_matches_pattern2(const char *f, const char *p) | ||
| 676 | { | ||
| 677 | const char *f_delimiter; | ||
| 678 | const char *p_delimiter; | ||
| 679 | |||
| 680 | while (*f && *p) { | ||
| 681 | f_delimiter = strchr(f, '/'); | ||
| 682 | if (!f_delimiter) | ||
| 683 | f_delimiter = f + strlen(f); | ||
| 684 | p_delimiter = strchr(p, '/'); | ||
| 685 | if (!p_delimiter) | ||
| 686 | p_delimiter = p + strlen(p); | ||
| 687 | if (*p == '\\' && *(p + 1) == '{') | ||
| 688 | goto recursive; | ||
| 689 | if (!tomoyo_file_matches_pattern(f, f_delimiter, p, | ||
| 690 | p_delimiter)) | ||
| 691 | return false; | ||
| 692 | f = f_delimiter; | ||
| 693 | if (*f) | ||
| 694 | f++; | ||
| 695 | p = p_delimiter; | ||
| 696 | if (*p) | ||
| 697 | p++; | ||
| 698 | } | 360 | } |
| 699 | /* Ignore trailing "\*" and "\@" in @pattern. */ | 361 | if (!strcmp(name, "learning")) { |
| 700 | while (*p == '\\' && | 362 | if (use_default) { |
| 701 | (*(p + 1) == '*' || *(p + 1) == '@')) | 363 | pref = &profile->learning; |
| 702 | p += 2; | 364 | goto set_default; |
| 703 | return !*f && !*p; | ||
| 704 | recursive: | ||
| 705 | /* | ||
| 706 | * The "\{" pattern is permitted only after '/' character. | ||
| 707 | * This guarantees that below "*(p - 1)" is safe. | ||
| 708 | * Also, the "\}" pattern is permitted only before '/' character | ||
| 709 | * so that "\{" + "\}" pair will not break the "\-" operator. | ||
| 710 | */ | ||
| 711 | if (*(p - 1) != '/' || p_delimiter <= p + 3 || *p_delimiter != '/' || | ||
| 712 | *(p_delimiter - 1) != '}' || *(p_delimiter - 2) != '\\') | ||
| 713 | return false; /* Bad pattern. */ | ||
| 714 | do { | ||
| 715 | /* Compare current component with pattern. */ | ||
| 716 | if (!tomoyo_file_matches_pattern(f, f_delimiter, p + 2, | ||
| 717 | p_delimiter - 2)) | ||
| 718 | break; | ||
| 719 | /* Proceed to next component. */ | ||
| 720 | f = f_delimiter; | ||
| 721 | if (!*f) | ||
| 722 | break; | ||
| 723 | f++; | ||
| 724 | /* Continue comparison. */ | ||
| 725 | if (tomoyo_path_matches_pattern2(f, p_delimiter + 1)) | ||
| 726 | return true; | ||
| 727 | f_delimiter = strchr(f, '/'); | ||
| 728 | } while (f_delimiter); | ||
| 729 | return false; /* Not matched. */ | ||
| 730 | } | ||
| 731 | |||
| 732 | /** | ||
| 733 | * tomoyo_path_matches_pattern - Check whether the given filename matches the given pattern. | ||
| 734 | * | ||
| 735 | * @filename: The filename to check. | ||
| 736 | * @pattern: The pattern to compare. | ||
| 737 | * | ||
| 738 | * Returns true if matches, false otherwise. | ||
| 739 | * | ||
| 740 | * The following patterns are available. | ||
| 741 | * \\ \ itself. | ||
| 742 | * \ooo Octal representation of a byte. | ||
| 743 | * \* Zero or more repetitions of characters other than '/'. | ||
| 744 | * \@ Zero or more repetitions of characters other than '/' or '.'. | ||
| 745 | * \? 1 byte character other than '/'. | ||
| 746 | * \$ One or more repetitions of decimal digits. | ||
| 747 | * \+ 1 decimal digit. | ||
| 748 | * \X One or more repetitions of hexadecimal digits. | ||
| 749 | * \x 1 hexadecimal digit. | ||
| 750 | * \A One or more repetitions of alphabet characters. | ||
| 751 | * \a 1 alphabet character. | ||
| 752 | * | ||
| 753 | * \- Subtraction operator. | ||
| 754 | * | ||
| 755 | * /\{dir\}/ '/' + 'One or more repetitions of dir/' (e.g. /dir/ /dir/dir/ | ||
| 756 | * /dir/dir/dir/ ). | ||
| 757 | */ | ||
| 758 | bool tomoyo_path_matches_pattern(const struct tomoyo_path_info *filename, | ||
| 759 | const struct tomoyo_path_info *pattern) | ||
| 760 | { | ||
| 761 | const char *f = filename->name; | ||
| 762 | const char *p = pattern->name; | ||
| 763 | const int len = pattern->const_len; | ||
| 764 | |||
| 765 | /* If @pattern doesn't contain pattern, I can use strcmp(). */ | ||
| 766 | if (!pattern->is_patterned) | ||
| 767 | return !tomoyo_pathcmp(filename, pattern); | ||
| 768 | /* Don't compare directory and non-directory. */ | ||
| 769 | if (filename->is_dir != pattern->is_dir) | ||
| 770 | return false; | ||
| 771 | /* Compare the initial length without patterns. */ | ||
| 772 | if (strncmp(f, p, len)) | ||
| 773 | return false; | ||
| 774 | f += len; | ||
| 775 | p += len; | ||
| 776 | return tomoyo_path_matches_pattern2(f, p); | ||
| 777 | } | ||
| 778 | |||
| 779 | /** | ||
| 780 | * tomoyo_io_printf - Transactional printf() to "struct tomoyo_io_buffer" structure. | ||
| 781 | * | ||
| 782 | * @head: Pointer to "struct tomoyo_io_buffer". | ||
| 783 | * @fmt: The printf()'s format string, followed by parameters. | ||
| 784 | * | ||
| 785 | * Returns true if output was written, false otherwise. | ||
| 786 | * | ||
| 787 | * The snprintf() will truncate, but tomoyo_io_printf() won't. | ||
| 788 | */ | ||
| 789 | bool tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt, ...) | ||
| 790 | { | ||
| 791 | va_list args; | ||
| 792 | int len; | ||
| 793 | int pos = head->read_avail; | ||
| 794 | int size = head->readbuf_size - pos; | ||
| 795 | |||
| 796 | if (size <= 0) | ||
| 797 | return false; | ||
| 798 | va_start(args, fmt); | ||
| 799 | len = vsnprintf(head->read_buf + pos, size, fmt, args); | ||
| 800 | va_end(args); | ||
| 801 | if (pos + len >= head->readbuf_size) | ||
| 802 | return false; | ||
| 803 | head->read_avail += len; | ||
| 804 | return true; | ||
| 805 | } | ||
| 806 | |||
| 807 | /** | ||
| 808 | * tomoyo_get_exe - Get tomoyo_realpath() of current process. | ||
| 809 | * | ||
| 810 | * Returns the tomoyo_realpath() of current process on success, NULL otherwise. | ||
| 811 | * | ||
| 812 | * This function uses kzalloc(), so the caller must call kfree() | ||
| 813 | * if this function didn't return NULL. | ||
| 814 | */ | ||
| 815 | static const char *tomoyo_get_exe(void) | ||
| 816 | { | ||
| 817 | struct mm_struct *mm = current->mm; | ||
| 818 | struct vm_area_struct *vma; | ||
| 819 | const char *cp = NULL; | ||
| 820 | |||
| 821 | if (!mm) | ||
| 822 | return NULL; | ||
| 823 | down_read(&mm->mmap_sem); | ||
| 824 | for (vma = mm->mmap; vma; vma = vma->vm_next) { | ||
| 825 | if ((vma->vm_flags & VM_EXECUTABLE) && vma->vm_file) { | ||
| 826 | cp = tomoyo_realpath_from_path(&vma->vm_file->f_path); | ||
| 827 | break; | ||
| 828 | } | 365 | } |
| 366 | profile->learning = &profile->preference; | ||
| 367 | tomoyo_set_uint(&profile->preference.learning_max_entry, value, | ||
| 368 | "max_entry"); | ||
| 369 | verbose = &profile->preference.learning_verbose; | ||
| 370 | goto set_verbose; | ||
| 829 | } | 371 | } |
| 830 | up_read(&mm->mmap_sem); | 372 | return; |
| 831 | return cp; | 373 | set_default: |
| 374 | *pref = &tomoyo_default_profile.preference; | ||
| 375 | return; | ||
| 376 | set_verbose: | ||
| 377 | tomoyo_set_bool(verbose, value, "verbose"); | ||
| 832 | } | 378 | } |
| 833 | 379 | ||
| 834 | /** | 380 | static int tomoyo_set_mode(char *name, const char *value, |
| 835 | * tomoyo_get_msg - Get warning message. | 381 | const bool use_default, |
| 836 | * | 382 | struct tomoyo_profile *profile) |
| 837 | * @is_enforce: Is it enforcing mode? | ||
| 838 | * | ||
| 839 | * Returns "ERROR" or "WARNING". | ||
| 840 | */ | ||
| 841 | const char *tomoyo_get_msg(const bool is_enforce) | ||
| 842 | { | 383 | { |
| 843 | if (is_enforce) | 384 | u8 i; |
| 844 | return "ERROR"; | 385 | u8 config; |
| 845 | else | 386 | if (!strcmp(name, "CONFIG")) { |
| 846 | return "WARNING"; | 387 | i = TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX; |
| 847 | } | 388 | config = profile->default_config; |
| 848 | 389 | } else if (tomoyo_str_starts(&name, "CONFIG::")) { | |
| 849 | /** | 390 | config = 0; |
| 850 | * tomoyo_check_flags - Check mode for specified functionality. | 391 | for (i = 0; i < TOMOYO_MAX_MAC_INDEX |
| 851 | * | 392 | + TOMOYO_MAX_MAC_CATEGORY_INDEX; i++) { |
| 852 | * @domain: Pointer to "struct tomoyo_domain_info". | 393 | if (strcmp(name, tomoyo_mac_keywords[i])) |
| 853 | * @index: The functionality to check mode. | 394 | continue; |
| 854 | * | 395 | config = profile->config[i]; |
| 855 | * TOMOYO checks only process context. | ||
| 856 | * This code disables TOMOYO's enforcement in case the function is called from | ||
| 857 | * interrupt context. | ||
| 858 | */ | ||
| 859 | unsigned int tomoyo_check_flags(const struct tomoyo_domain_info *domain, | ||
| 860 | const u8 index) | ||
| 861 | { | ||
| 862 | const u8 profile = domain->profile; | ||
| 863 | |||
| 864 | if (WARN_ON(in_interrupt())) | ||
| 865 | return 0; | ||
| 866 | return tomoyo_policy_loaded && index < TOMOYO_MAX_CONTROL_INDEX | ||
| 867 | #if TOMOYO_MAX_PROFILES != 256 | ||
| 868 | && profile < TOMOYO_MAX_PROFILES | ||
| 869 | #endif | ||
| 870 | && tomoyo_profile_ptr[profile] ? | ||
| 871 | tomoyo_profile_ptr[profile]->value[index] : 0; | ||
| 872 | } | ||
| 873 | |||
| 874 | /** | ||
| 875 | * tomoyo_verbose_mode - Check whether TOMOYO is verbose mode. | ||
| 876 | * | ||
| 877 | * @domain: Pointer to "struct tomoyo_domain_info". | ||
| 878 | * | ||
| 879 | * Returns true if domain policy violation warning should be printed to | ||
| 880 | * console. | ||
| 881 | */ | ||
| 882 | bool tomoyo_verbose_mode(const struct tomoyo_domain_info *domain) | ||
| 883 | { | ||
| 884 | return tomoyo_check_flags(domain, TOMOYO_VERBOSE) != 0; | ||
| 885 | } | ||
| 886 | |||
| 887 | /** | ||
| 888 | * tomoyo_domain_quota_is_ok - Check for domain's quota. | ||
| 889 | * | ||
| 890 | * @domain: Pointer to "struct tomoyo_domain_info". | ||
| 891 | * | ||
| 892 | * Returns true if the domain is not exceeded quota, false otherwise. | ||
| 893 | * | ||
| 894 | * Caller holds tomoyo_read_lock(). | ||
| 895 | */ | ||
| 896 | bool tomoyo_domain_quota_is_ok(struct tomoyo_domain_info * const domain) | ||
| 897 | { | ||
| 898 | unsigned int count = 0; | ||
| 899 | struct tomoyo_acl_info *ptr; | ||
| 900 | |||
| 901 | if (!domain) | ||
| 902 | return true; | ||
| 903 | list_for_each_entry_rcu(ptr, &domain->acl_info_list, list) { | ||
| 904 | switch (ptr->type) { | ||
| 905 | struct tomoyo_path_acl *acl; | ||
| 906 | u32 perm; | ||
| 907 | u8 i; | ||
| 908 | case TOMOYO_TYPE_PATH_ACL: | ||
| 909 | acl = container_of(ptr, struct tomoyo_path_acl, head); | ||
| 910 | perm = acl->perm | (((u32) acl->perm_high) << 16); | ||
| 911 | for (i = 0; i < TOMOYO_MAX_PATH_OPERATION; i++) | ||
| 912 | if (perm & (1 << i)) | ||
| 913 | count++; | ||
| 914 | if (perm & (1 << TOMOYO_TYPE_READ_WRITE)) | ||
| 915 | count -= 2; | ||
| 916 | break; | ||
| 917 | case TOMOYO_TYPE_PATH2_ACL: | ||
| 918 | perm = container_of(ptr, struct tomoyo_path2_acl, head) | ||
| 919 | ->perm; | ||
| 920 | for (i = 0; i < TOMOYO_MAX_PATH2_OPERATION; i++) | ||
| 921 | if (perm & (1 << i)) | ||
| 922 | count++; | ||
| 923 | break; | 396 | break; |
| 924 | } | 397 | } |
| 398 | if (i == TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX) | ||
| 399 | return -EINVAL; | ||
| 400 | } else { | ||
| 401 | return -EINVAL; | ||
| 925 | } | 402 | } |
| 926 | if (count < tomoyo_check_flags(domain, TOMOYO_MAX_ACCEPT_ENTRY)) | 403 | if (use_default) { |
| 927 | return true; | 404 | config = TOMOYO_CONFIG_USE_DEFAULT; |
| 928 | if (!domain->quota_warned) { | 405 | } else { |
| 929 | domain->quota_warned = true; | 406 | u8 mode; |
| 930 | printk(KERN_WARNING "TOMOYO-WARNING: " | 407 | for (mode = 0; mode < 4; mode++) |
| 931 | "Domain '%s' has so many ACLs to hold. " | 408 | if (strstr(value, tomoyo_mode[mode])) |
| 932 | "Stopped learning mode.\n", domain->domainname->name); | 409 | /* |
| 933 | } | 410 | * Update lower 3 bits in order to distinguish |
| 934 | return false; | 411 | * 'config' from 'TOMOYO_CONFIG_USE_DEAFULT'. |
| 935 | } | 412 | */ |
| 936 | 413 | config = (config & ~7) | mode; | |
| 937 | /** | ||
| 938 | * tomoyo_find_or_assign_new_profile - Create a new profile. | ||
| 939 | * | ||
| 940 | * @profile: Profile number to create. | ||
| 941 | * | ||
| 942 | * Returns pointer to "struct tomoyo_profile" on success, NULL otherwise. | ||
| 943 | */ | ||
| 944 | static struct tomoyo_profile *tomoyo_find_or_assign_new_profile(const unsigned | ||
| 945 | int profile) | ||
| 946 | { | ||
| 947 | struct tomoyo_profile *ptr = NULL; | ||
| 948 | int i; | ||
| 949 | |||
| 950 | if (profile >= TOMOYO_MAX_PROFILES) | ||
| 951 | return NULL; | ||
| 952 | if (mutex_lock_interruptible(&tomoyo_policy_lock)) | ||
| 953 | return NULL; | ||
| 954 | ptr = tomoyo_profile_ptr[profile]; | ||
| 955 | if (ptr) | ||
| 956 | goto ok; | ||
| 957 | ptr = kmalloc(sizeof(*ptr), GFP_NOFS); | ||
| 958 | if (!tomoyo_memory_ok(ptr)) { | ||
| 959 | kfree(ptr); | ||
| 960 | ptr = NULL; | ||
| 961 | goto ok; | ||
| 962 | } | 414 | } |
| 963 | for (i = 0; i < TOMOYO_MAX_CONTROL_INDEX; i++) | 415 | if (i < TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX) |
| 964 | ptr->value[i] = tomoyo_control_array[i].current_value; | 416 | profile->config[i] = config; |
| 965 | mb(); /* Avoid out-of-order execution. */ | 417 | else if (config != TOMOYO_CONFIG_USE_DEFAULT) |
| 966 | tomoyo_profile_ptr[profile] = ptr; | 418 | profile->default_config = config; |
| 967 | ok: | 419 | return 0; |
| 968 | mutex_unlock(&tomoyo_policy_lock); | ||
| 969 | return ptr; | ||
| 970 | } | 420 | } |
| 971 | 421 | ||
| 972 | /** | 422 | /** |
| 973 | * tomoyo_write_profile - Write to profile table. | 423 | * tomoyo_write_profile - Write profile table. |
| 974 | * | 424 | * |
| 975 | * @head: Pointer to "struct tomoyo_io_buffer". | 425 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 976 | * | 426 | * |
| @@ -980,153 +430,165 @@ static int tomoyo_write_profile(struct tomoyo_io_buffer *head) | |||
| 980 | { | 430 | { |
| 981 | char *data = head->write_buf; | 431 | char *data = head->write_buf; |
| 982 | unsigned int i; | 432 | unsigned int i; |
| 983 | unsigned int value; | 433 | bool use_default = false; |
| 984 | char *cp; | 434 | char *cp; |
| 985 | struct tomoyo_profile *profile; | 435 | struct tomoyo_profile *profile; |
| 986 | unsigned long num; | 436 | if (sscanf(data, "PROFILE_VERSION=%u", &tomoyo_profile_version) == 1) |
| 987 | 437 | return 0; | |
| 988 | cp = strchr(data, '-'); | 438 | i = simple_strtoul(data, &cp, 10); |
| 989 | if (cp) | 439 | if (data == cp) { |
| 990 | *cp = '\0'; | 440 | profile = &tomoyo_default_profile; |
| 991 | if (strict_strtoul(data, 10, &num)) | 441 | } else { |
| 992 | return -EINVAL; | 442 | if (*cp != '-') |
| 993 | if (cp) | 443 | return -EINVAL; |
| 994 | data = cp + 1; | 444 | data = cp + 1; |
| 995 | profile = tomoyo_find_or_assign_new_profile(num); | 445 | profile = tomoyo_assign_profile(i); |
| 996 | if (!profile) | 446 | if (!profile) |
| 997 | return -EINVAL; | 447 | return -EINVAL; |
| 448 | } | ||
| 998 | cp = strchr(data, '='); | 449 | cp = strchr(data, '='); |
| 999 | if (!cp) | 450 | if (!cp) |
| 1000 | return -EINVAL; | 451 | return -EINVAL; |
| 1001 | *cp = '\0'; | 452 | *cp++ = '\0'; |
| 453 | if (profile != &tomoyo_default_profile) | ||
| 454 | use_default = strstr(cp, "use_default") != NULL; | ||
| 455 | if (tomoyo_str_starts(&data, "PREFERENCE::")) { | ||
| 456 | tomoyo_set_pref(data, cp, use_default, profile); | ||
| 457 | return 0; | ||
| 458 | } | ||
| 459 | if (profile == &tomoyo_default_profile) | ||
| 460 | return -EINVAL; | ||
| 1002 | if (!strcmp(data, "COMMENT")) { | 461 | if (!strcmp(data, "COMMENT")) { |
| 1003 | const struct tomoyo_path_info *old_comment = profile->comment; | 462 | const struct tomoyo_path_info *old_comment = profile->comment; |
| 1004 | profile->comment = tomoyo_get_name(cp + 1); | 463 | profile->comment = tomoyo_get_name(cp); |
| 1005 | tomoyo_put_name(old_comment); | 464 | tomoyo_put_name(old_comment); |
| 1006 | return 0; | 465 | return 0; |
| 1007 | } | 466 | } |
| 1008 | for (i = 0; i < TOMOYO_MAX_CONTROL_INDEX; i++) { | 467 | return tomoyo_set_mode(data, cp, use_default, profile); |
| 1009 | if (strcmp(data, tomoyo_control_array[i].keyword)) | 468 | } |
| 1010 | continue; | 469 | |
| 1011 | if (sscanf(cp + 1, "%u", &value) != 1) { | 470 | static void tomoyo_print_preference(struct tomoyo_io_buffer *head, |
| 1012 | int j; | 471 | const int idx) |
| 1013 | const char **modes; | 472 | { |
| 1014 | switch (i) { | 473 | struct tomoyo_preference *pref = &tomoyo_default_profile.preference; |
| 1015 | case TOMOYO_VERBOSE: | 474 | const struct tomoyo_profile *profile = idx >= 0 ? |
| 1016 | modes = tomoyo_mode_2; | 475 | tomoyo_profile_ptr[idx] : NULL; |
| 1017 | break; | 476 | char buffer[16] = ""; |
| 1018 | default: | 477 | if (profile) { |
| 1019 | modes = tomoyo_mode_4; | 478 | buffer[sizeof(buffer) - 1] = '\0'; |
| 1020 | break; | 479 | snprintf(buffer, sizeof(buffer) - 1, "%u-", idx); |
| 1021 | } | ||
| 1022 | for (j = 0; j < 4; j++) { | ||
| 1023 | if (strcmp(cp + 1, modes[j])) | ||
| 1024 | continue; | ||
| 1025 | value = j; | ||
| 1026 | break; | ||
| 1027 | } | ||
| 1028 | if (j == 4) | ||
| 1029 | return -EINVAL; | ||
| 1030 | } else if (value > tomoyo_control_array[i].max_value) { | ||
| 1031 | value = tomoyo_control_array[i].max_value; | ||
| 1032 | } | ||
| 1033 | profile->value[i] = value; | ||
| 1034 | return 0; | ||
| 1035 | } | 480 | } |
| 1036 | return -EINVAL; | 481 | if (profile) { |
| 482 | pref = profile->learning; | ||
| 483 | if (pref == &tomoyo_default_profile.preference) | ||
| 484 | goto skip1; | ||
| 485 | } | ||
| 486 | tomoyo_io_printf(head, "%sPREFERENCE::%s={ " | ||
| 487 | "verbose=%s max_entry=%u }\n", | ||
| 488 | buffer, "learning", | ||
| 489 | tomoyo_yesno(pref->learning_verbose), | ||
| 490 | pref->learning_max_entry); | ||
| 491 | skip1: | ||
| 492 | if (profile) { | ||
| 493 | pref = profile->permissive; | ||
| 494 | if (pref == &tomoyo_default_profile.preference) | ||
| 495 | goto skip2; | ||
| 496 | } | ||
| 497 | tomoyo_io_printf(head, "%sPREFERENCE::%s={ verbose=%s }\n", | ||
| 498 | buffer, "permissive", | ||
| 499 | tomoyo_yesno(pref->permissive_verbose)); | ||
| 500 | skip2: | ||
| 501 | if (profile) { | ||
| 502 | pref = profile->enforcing; | ||
| 503 | if (pref == &tomoyo_default_profile.preference) | ||
| 504 | return; | ||
| 505 | } | ||
| 506 | tomoyo_io_printf(head, "%sPREFERENCE::%s={ verbose=%s }\n", | ||
| 507 | buffer, "enforcing", | ||
| 508 | tomoyo_yesno(pref->enforcing_verbose)); | ||
| 509 | } | ||
| 510 | |||
| 511 | static void tomoyo_print_config(struct tomoyo_io_buffer *head, const u8 config) | ||
| 512 | { | ||
| 513 | tomoyo_io_printf(head, "={ mode=%s }\n", tomoyo_mode[config & 3]); | ||
| 1037 | } | 514 | } |
| 1038 | 515 | ||
| 1039 | /** | 516 | /** |
| 1040 | * tomoyo_read_profile - Read from profile table. | 517 | * tomoyo_read_profile - Read profile table. |
| 1041 | * | 518 | * |
| 1042 | * @head: Pointer to "struct tomoyo_io_buffer". | 519 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1043 | * | ||
| 1044 | * Returns 0. | ||
| 1045 | */ | 520 | */ |
| 1046 | static int tomoyo_read_profile(struct tomoyo_io_buffer *head) | 521 | static void tomoyo_read_profile(struct tomoyo_io_buffer *head) |
| 1047 | { | 522 | { |
| 1048 | static const int total = TOMOYO_MAX_CONTROL_INDEX + 1; | 523 | u8 index; |
| 1049 | int step; | 524 | const struct tomoyo_profile *profile; |
| 1050 | 525 | next: | |
| 1051 | if (head->read_eof) | 526 | index = head->r.index; |
| 1052 | return 0; | 527 | profile = tomoyo_profile_ptr[index]; |
| 1053 | for (step = head->read_step; step < TOMOYO_MAX_PROFILES * total; | 528 | switch (head->r.step) { |
| 1054 | step++) { | 529 | case 0: |
| 1055 | const u8 index = step / total; | 530 | tomoyo_io_printf(head, "PROFILE_VERSION=%s\n", "20090903"); |
| 1056 | u8 type = step % total; | 531 | tomoyo_print_preference(head, -1); |
| 1057 | const struct tomoyo_profile *profile | 532 | head->r.step++; |
| 1058 | = tomoyo_profile_ptr[index]; | 533 | break; |
| 1059 | head->read_step = step; | 534 | case 1: |
| 1060 | if (!profile) | 535 | for ( ; head->r.index < TOMOYO_MAX_PROFILES; |
| 1061 | continue; | 536 | head->r.index++) |
| 1062 | if (!type) { /* Print profile' comment tag. */ | 537 | if (tomoyo_profile_ptr[head->r.index]) |
| 1063 | if (!tomoyo_io_printf(head, "%u-COMMENT=%s\n", | ||
| 1064 | index, profile->comment ? | ||
| 1065 | profile->comment->name : "")) | ||
| 1066 | break; | 538 | break; |
| 1067 | continue; | 539 | if (head->r.index == TOMOYO_MAX_PROFILES) |
| 540 | return; | ||
| 541 | head->r.step++; | ||
| 542 | break; | ||
| 543 | case 2: | ||
| 544 | { | ||
| 545 | const struct tomoyo_path_info *comment = | ||
| 546 | profile->comment; | ||
| 547 | tomoyo_io_printf(head, "%u-COMMENT=", index); | ||
| 548 | tomoyo_set_string(head, comment ? comment->name : ""); | ||
| 549 | tomoyo_set_lf(head); | ||
| 550 | head->r.step++; | ||
| 1068 | } | 551 | } |
| 1069 | type--; | 552 | break; |
| 1070 | if (type < TOMOYO_MAX_CONTROL_INDEX) { | 553 | case 3: |
| 1071 | const unsigned int value = profile->value[type]; | 554 | { |
| 1072 | const char **modes = NULL; | 555 | tomoyo_io_printf(head, "%u-%s", index, "CONFIG"); |
| 1073 | const char *keyword | 556 | tomoyo_print_config(head, profile->default_config); |
| 1074 | = tomoyo_control_array[type].keyword; | 557 | head->r.bit = 0; |
| 1075 | switch (tomoyo_control_array[type].max_value) { | 558 | head->r.step++; |
| 1076 | case 3: | 559 | } |
| 1077 | modes = tomoyo_mode_4; | 560 | break; |
| 1078 | break; | 561 | case 4: |
| 1079 | case 1: | 562 | for ( ; head->r.bit < TOMOYO_MAX_MAC_INDEX |
| 1080 | modes = tomoyo_mode_2; | 563 | + TOMOYO_MAX_MAC_CATEGORY_INDEX; head->r.bit++) { |
| 1081 | break; | 564 | const u8 i = head->r.bit; |
| 1082 | } | 565 | const u8 config = profile->config[i]; |
| 1083 | if (modes) { | 566 | if (config == TOMOYO_CONFIG_USE_DEFAULT) |
| 1084 | if (!tomoyo_io_printf(head, "%u-%s=%s\n", index, | 567 | continue; |
| 1085 | keyword, modes[value])) | 568 | tomoyo_io_printf(head, "%u-%s%s", index, "CONFIG::", |
| 1086 | break; | 569 | tomoyo_mac_keywords[i]); |
| 1087 | } else { | 570 | tomoyo_print_config(head, config); |
| 1088 | if (!tomoyo_io_printf(head, "%u-%s=%u\n", index, | 571 | head->r.bit++; |
| 1089 | keyword, value)) | 572 | break; |
| 1090 | break; | 573 | } |
| 1091 | } | 574 | if (head->r.bit == TOMOYO_MAX_MAC_INDEX |
| 575 | + TOMOYO_MAX_MAC_CATEGORY_INDEX) { | ||
| 576 | tomoyo_print_preference(head, index); | ||
| 577 | head->r.index++; | ||
| 578 | head->r.step = 1; | ||
| 1092 | } | 579 | } |
| 580 | break; | ||
| 1093 | } | 581 | } |
| 1094 | if (step == TOMOYO_MAX_PROFILES * total) | 582 | if (tomoyo_flush(head)) |
| 1095 | head->read_eof = true; | 583 | goto next; |
| 1096 | return 0; | ||
| 1097 | } | 584 | } |
| 1098 | 585 | ||
| 1099 | /* | 586 | static bool tomoyo_same_manager(const struct tomoyo_acl_head *a, |
| 1100 | * tomoyo_policy_manager_list is used for holding list of domainnames or | 587 | const struct tomoyo_acl_head *b) |
| 1101 | * programs which are permitted to modify configuration via | 588 | { |
| 1102 | * /sys/kernel/security/tomoyo/ interface. | 589 | return container_of(a, struct tomoyo_manager, head)->manager == |
| 1103 | * | 590 | container_of(b, struct tomoyo_manager, head)->manager; |
| 1104 | * An entry is added by | 591 | } |
| 1105 | * | ||
| 1106 | * # echo '<kernel> /sbin/mingetty /bin/login /bin/bash' > \ | ||
| 1107 | * /sys/kernel/security/tomoyo/manager | ||
| 1108 | * (if you want to specify by a domainname) | ||
| 1109 | * | ||
| 1110 | * or | ||
| 1111 | * | ||
| 1112 | * # echo '/usr/lib/ccs/editpolicy' > /sys/kernel/security/tomoyo/manager | ||
| 1113 | * (if you want to specify by a program's location) | ||
| 1114 | * | ||
| 1115 | * and is deleted by | ||
| 1116 | * | ||
| 1117 | * # echo 'delete <kernel> /sbin/mingetty /bin/login /bin/bash' > \ | ||
| 1118 | * /sys/kernel/security/tomoyo/manager | ||
| 1119 | * | ||
| 1120 | * or | ||
| 1121 | * | ||
| 1122 | * # echo 'delete /usr/lib/ccs/editpolicy' > \ | ||
| 1123 | * /sys/kernel/security/tomoyo/manager | ||
| 1124 | * | ||
| 1125 | * and all entries are retrieved by | ||
| 1126 | * | ||
| 1127 | * # cat /sys/kernel/security/tomoyo/manager | ||
| 1128 | */ | ||
| 1129 | LIST_HEAD(tomoyo_policy_manager_list); | ||
| 1130 | 592 | ||
| 1131 | /** | 593 | /** |
| 1132 | * tomoyo_update_manager_entry - Add a manager entry. | 594 | * tomoyo_update_manager_entry - Add a manager entry. |
| @@ -1141,47 +603,29 @@ LIST_HEAD(tomoyo_policy_manager_list); | |||
| 1141 | static int tomoyo_update_manager_entry(const char *manager, | 603 | static int tomoyo_update_manager_entry(const char *manager, |
| 1142 | const bool is_delete) | 604 | const bool is_delete) |
| 1143 | { | 605 | { |
| 1144 | struct tomoyo_policy_manager_entry *ptr; | 606 | struct tomoyo_manager e = { }; |
| 1145 | struct tomoyo_policy_manager_entry e = { }; | 607 | int error; |
| 1146 | int error = is_delete ? -ENOENT : -ENOMEM; | ||
| 1147 | 608 | ||
| 1148 | if (tomoyo_is_domain_def(manager)) { | 609 | if (tomoyo_domain_def(manager)) { |
| 1149 | if (!tomoyo_is_correct_domain(manager)) | 610 | if (!tomoyo_correct_domain(manager)) |
| 1150 | return -EINVAL; | 611 | return -EINVAL; |
| 1151 | e.is_domain = true; | 612 | e.is_domain = true; |
| 1152 | } else { | 613 | } else { |
| 1153 | if (!tomoyo_is_correct_path(manager, 1, -1, -1)) | 614 | if (!tomoyo_correct_path(manager)) |
| 1154 | return -EINVAL; | 615 | return -EINVAL; |
| 1155 | } | 616 | } |
| 1156 | e.manager = tomoyo_get_name(manager); | 617 | e.manager = tomoyo_get_name(manager); |
| 1157 | if (!e.manager) | 618 | if (!e.manager) |
| 1158 | return -ENOMEM; | 619 | return -ENOMEM; |
| 1159 | if (mutex_lock_interruptible(&tomoyo_policy_lock)) | 620 | error = tomoyo_update_policy(&e.head, sizeof(e), is_delete, |
| 1160 | goto out; | 621 | &tomoyo_policy_list[TOMOYO_ID_MANAGER], |
| 1161 | list_for_each_entry_rcu(ptr, &tomoyo_policy_manager_list, list) { | 622 | tomoyo_same_manager); |
| 1162 | if (ptr->manager != e.manager) | ||
| 1163 | continue; | ||
| 1164 | ptr->is_deleted = is_delete; | ||
| 1165 | error = 0; | ||
| 1166 | break; | ||
| 1167 | } | ||
| 1168 | if (!is_delete && error) { | ||
| 1169 | struct tomoyo_policy_manager_entry *entry = | ||
| 1170 | tomoyo_commit_ok(&e, sizeof(e)); | ||
| 1171 | if (entry) { | ||
| 1172 | list_add_tail_rcu(&entry->list, | ||
| 1173 | &tomoyo_policy_manager_list); | ||
| 1174 | error = 0; | ||
| 1175 | } | ||
| 1176 | } | ||
| 1177 | mutex_unlock(&tomoyo_policy_lock); | ||
| 1178 | out: | ||
| 1179 | tomoyo_put_name(e.manager); | 623 | tomoyo_put_name(e.manager); |
| 1180 | return error; | 624 | return error; |
| 1181 | } | 625 | } |
| 1182 | 626 | ||
| 1183 | /** | 627 | /** |
| 1184 | * tomoyo_write_manager_policy - Write manager policy. | 628 | * tomoyo_write_manager - Write manager policy. |
| 1185 | * | 629 | * |
| 1186 | * @head: Pointer to "struct tomoyo_io_buffer". | 630 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1187 | * | 631 | * |
| @@ -1189,7 +633,7 @@ static int tomoyo_update_manager_entry(const char *manager, | |||
| 1189 | * | 633 | * |
| 1190 | * Caller holds tomoyo_read_lock(). | 634 | * Caller holds tomoyo_read_lock(). |
| 1191 | */ | 635 | */ |
| 1192 | static int tomoyo_write_manager_policy(struct tomoyo_io_buffer *head) | 636 | static int tomoyo_write_manager(struct tomoyo_io_buffer *head) |
| 1193 | { | 637 | { |
| 1194 | char *data = head->write_buf; | 638 | char *data = head->write_buf; |
| 1195 | bool is_delete = tomoyo_str_starts(&data, TOMOYO_KEYWORD_DELETE); | 639 | bool is_delete = tomoyo_str_starts(&data, TOMOYO_KEYWORD_DELETE); |
| @@ -1202,47 +646,41 @@ static int tomoyo_write_manager_policy(struct tomoyo_io_buffer *head) | |||
| 1202 | } | 646 | } |
| 1203 | 647 | ||
| 1204 | /** | 648 | /** |
| 1205 | * tomoyo_read_manager_policy - Read manager policy. | 649 | * tomoyo_read_manager - Read manager policy. |
| 1206 | * | 650 | * |
| 1207 | * @head: Pointer to "struct tomoyo_io_buffer". | 651 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1208 | * | 652 | * |
| 1209 | * Returns 0. | ||
| 1210 | * | ||
| 1211 | * Caller holds tomoyo_read_lock(). | 653 | * Caller holds tomoyo_read_lock(). |
| 1212 | */ | 654 | */ |
| 1213 | static int tomoyo_read_manager_policy(struct tomoyo_io_buffer *head) | 655 | static void tomoyo_read_manager(struct tomoyo_io_buffer *head) |
| 1214 | { | 656 | { |
| 1215 | struct list_head *pos; | 657 | if (head->r.eof) |
| 1216 | bool done = true; | 658 | return; |
| 1217 | 659 | list_for_each_cookie(head->r.acl, | |
| 1218 | if (head->read_eof) | 660 | &tomoyo_policy_list[TOMOYO_ID_MANAGER]) { |
| 1219 | return 0; | 661 | struct tomoyo_manager *ptr = |
| 1220 | list_for_each_cookie(pos, head->read_var2, | 662 | list_entry(head->r.acl, typeof(*ptr), head.list); |
| 1221 | &tomoyo_policy_manager_list) { | 663 | if (ptr->head.is_deleted) |
| 1222 | struct tomoyo_policy_manager_entry *ptr; | ||
| 1223 | ptr = list_entry(pos, struct tomoyo_policy_manager_entry, | ||
| 1224 | list); | ||
| 1225 | if (ptr->is_deleted) | ||
| 1226 | continue; | 664 | continue; |
| 1227 | done = tomoyo_io_printf(head, "%s\n", ptr->manager->name); | 665 | if (!tomoyo_flush(head)) |
| 1228 | if (!done) | 666 | return; |
| 1229 | break; | 667 | tomoyo_set_string(head, ptr->manager->name); |
| 668 | tomoyo_set_lf(head); | ||
| 1230 | } | 669 | } |
| 1231 | head->read_eof = done; | 670 | head->r.eof = true; |
| 1232 | return 0; | ||
| 1233 | } | 671 | } |
| 1234 | 672 | ||
| 1235 | /** | 673 | /** |
| 1236 | * tomoyo_is_policy_manager - Check whether the current process is a policy manager. | 674 | * tomoyo_manager - Check whether the current process is a policy manager. |
| 1237 | * | 675 | * |
| 1238 | * Returns true if the current process is permitted to modify policy | 676 | * Returns true if the current process is permitted to modify policy |
| 1239 | * via /sys/kernel/security/tomoyo/ interface. | 677 | * via /sys/kernel/security/tomoyo/ interface. |
| 1240 | * | 678 | * |
| 1241 | * Caller holds tomoyo_read_lock(). | 679 | * Caller holds tomoyo_read_lock(). |
| 1242 | */ | 680 | */ |
| 1243 | static bool tomoyo_is_policy_manager(void) | 681 | static bool tomoyo_manager(void) |
| 1244 | { | 682 | { |
| 1245 | struct tomoyo_policy_manager_entry *ptr; | 683 | struct tomoyo_manager *ptr; |
| 1246 | const char *exe; | 684 | const char *exe; |
| 1247 | const struct task_struct *task = current; | 685 | const struct task_struct *task = current; |
| 1248 | const struct tomoyo_path_info *domainname = tomoyo_domain()->domainname; | 686 | const struct tomoyo_path_info *domainname = tomoyo_domain()->domainname; |
| @@ -1252,8 +690,9 @@ static bool tomoyo_is_policy_manager(void) | |||
| 1252 | return true; | 690 | return true; |
| 1253 | if (!tomoyo_manage_by_non_root && (task->cred->uid || task->cred->euid)) | 691 | if (!tomoyo_manage_by_non_root && (task->cred->uid || task->cred->euid)) |
| 1254 | return false; | 692 | return false; |
| 1255 | list_for_each_entry_rcu(ptr, &tomoyo_policy_manager_list, list) { | 693 | list_for_each_entry_rcu(ptr, &tomoyo_policy_list[TOMOYO_ID_MANAGER], |
| 1256 | if (!ptr->is_deleted && ptr->is_domain | 694 | head.list) { |
| 695 | if (!ptr->head.is_deleted && ptr->is_domain | ||
| 1257 | && !tomoyo_pathcmp(domainname, ptr->manager)) { | 696 | && !tomoyo_pathcmp(domainname, ptr->manager)) { |
| 1258 | found = true; | 697 | found = true; |
| 1259 | break; | 698 | break; |
| @@ -1264,8 +703,9 @@ static bool tomoyo_is_policy_manager(void) | |||
| 1264 | exe = tomoyo_get_exe(); | 703 | exe = tomoyo_get_exe(); |
| 1265 | if (!exe) | 704 | if (!exe) |
| 1266 | return false; | 705 | return false; |
| 1267 | list_for_each_entry_rcu(ptr, &tomoyo_policy_manager_list, list) { | 706 | list_for_each_entry_rcu(ptr, &tomoyo_policy_list[TOMOYO_ID_MANAGER], |
| 1268 | if (!ptr->is_deleted && !ptr->is_domain | 707 | head.list) { |
| 708 | if (!ptr->head.is_deleted && !ptr->is_domain | ||
| 1269 | && !strcmp(exe, ptr->manager->name)) { | 709 | && !strcmp(exe, ptr->manager->name)) { |
| 1270 | found = true; | 710 | found = true; |
| 1271 | break; | 711 | break; |
| @@ -1285,7 +725,7 @@ static bool tomoyo_is_policy_manager(void) | |||
| 1285 | } | 725 | } |
| 1286 | 726 | ||
| 1287 | /** | 727 | /** |
| 1288 | * tomoyo_is_select_one - Parse select command. | 728 | * tomoyo_select_one - Parse select command. |
| 1289 | * | 729 | * |
| 1290 | * @head: Pointer to "struct tomoyo_io_buffer". | 730 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1291 | * @data: String to parse. | 731 | * @data: String to parse. |
| @@ -1294,23 +734,31 @@ static bool tomoyo_is_policy_manager(void) | |||
| 1294 | * | 734 | * |
| 1295 | * Caller holds tomoyo_read_lock(). | 735 | * Caller holds tomoyo_read_lock(). |
| 1296 | */ | 736 | */ |
| 1297 | static bool tomoyo_is_select_one(struct tomoyo_io_buffer *head, | 737 | static bool tomoyo_select_one(struct tomoyo_io_buffer *head, const char *data) |
| 1298 | const char *data) | ||
| 1299 | { | 738 | { |
| 1300 | unsigned int pid; | 739 | unsigned int pid; |
| 1301 | struct tomoyo_domain_info *domain = NULL; | 740 | struct tomoyo_domain_info *domain = NULL; |
| 741 | bool global_pid = false; | ||
| 1302 | 742 | ||
| 1303 | if (sscanf(data, "pid=%u", &pid) == 1) { | 743 | if (!strcmp(data, "allow_execute")) { |
| 744 | head->r.print_execute_only = true; | ||
| 745 | return true; | ||
| 746 | } | ||
| 747 | if (sscanf(data, "pid=%u", &pid) == 1 || | ||
| 748 | (global_pid = true, sscanf(data, "global-pid=%u", &pid) == 1)) { | ||
| 1304 | struct task_struct *p; | 749 | struct task_struct *p; |
| 1305 | rcu_read_lock(); | 750 | rcu_read_lock(); |
| 1306 | read_lock(&tasklist_lock); | 751 | read_lock(&tasklist_lock); |
| 1307 | p = find_task_by_vpid(pid); | 752 | if (global_pid) |
| 753 | p = find_task_by_pid_ns(pid, &init_pid_ns); | ||
| 754 | else | ||
| 755 | p = find_task_by_vpid(pid); | ||
| 1308 | if (p) | 756 | if (p) |
| 1309 | domain = tomoyo_real_domain(p); | 757 | domain = tomoyo_real_domain(p); |
| 1310 | read_unlock(&tasklist_lock); | 758 | read_unlock(&tasklist_lock); |
| 1311 | rcu_read_unlock(); | 759 | rcu_read_unlock(); |
| 1312 | } else if (!strncmp(data, "domain=", 7)) { | 760 | } else if (!strncmp(data, "domain=", 7)) { |
| 1313 | if (tomoyo_is_domain_def(data + 7)) | 761 | if (tomoyo_domain_def(data + 7)) |
| 1314 | domain = tomoyo_find_domain(data + 7); | 762 | domain = tomoyo_find_domain(data + 7); |
| 1315 | } else | 763 | } else |
| 1316 | return false; | 764 | return false; |
| @@ -1318,24 +766,13 @@ static bool tomoyo_is_select_one(struct tomoyo_io_buffer *head, | |||
| 1318 | /* Accessing read_buf is safe because head->io_sem is held. */ | 766 | /* Accessing read_buf is safe because head->io_sem is held. */ |
| 1319 | if (!head->read_buf) | 767 | if (!head->read_buf) |
| 1320 | return true; /* Do nothing if open(O_WRONLY). */ | 768 | return true; /* Do nothing if open(O_WRONLY). */ |
| 1321 | head->read_avail = 0; | 769 | memset(&head->r, 0, sizeof(head->r)); |
| 770 | head->r.print_this_domain_only = true; | ||
| 771 | head->r.eof = !domain; | ||
| 772 | head->r.domain = &domain->list; | ||
| 1322 | tomoyo_io_printf(head, "# select %s\n", data); | 773 | tomoyo_io_printf(head, "# select %s\n", data); |
| 1323 | head->read_single_domain = true; | 774 | if (domain && domain->is_deleted) |
| 1324 | head->read_eof = !domain; | 775 | tomoyo_io_printf(head, "# This is a deleted domain.\n"); |
| 1325 | if (domain) { | ||
| 1326 | struct tomoyo_domain_info *d; | ||
| 1327 | head->read_var1 = NULL; | ||
| 1328 | list_for_each_entry_rcu(d, &tomoyo_domain_list, list) { | ||
| 1329 | if (d == domain) | ||
| 1330 | break; | ||
| 1331 | head->read_var1 = &d->list; | ||
| 1332 | } | ||
| 1333 | head->read_var2 = NULL; | ||
| 1334 | head->read_bit = 0; | ||
| 1335 | head->read_step = 0; | ||
| 1336 | if (domain->is_deleted) | ||
| 1337 | tomoyo_io_printf(head, "# This is a deleted domain.\n"); | ||
| 1338 | } | ||
| 1339 | return true; | 776 | return true; |
| 1340 | } | 777 | } |
| 1341 | 778 | ||
| @@ -1373,7 +810,7 @@ static int tomoyo_delete_domain(char *domainname) | |||
| 1373 | } | 810 | } |
| 1374 | 811 | ||
| 1375 | /** | 812 | /** |
| 1376 | * tomoyo_write_domain_policy - Write domain policy. | 813 | * tomoyo_write_domain2 - Write domain policy. |
| 1377 | * | 814 | * |
| 1378 | * @head: Pointer to "struct tomoyo_io_buffer". | 815 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1379 | * | 816 | * |
| @@ -1381,7 +818,24 @@ static int tomoyo_delete_domain(char *domainname) | |||
| 1381 | * | 818 | * |
| 1382 | * Caller holds tomoyo_read_lock(). | 819 | * Caller holds tomoyo_read_lock(). |
| 1383 | */ | 820 | */ |
| 1384 | static int tomoyo_write_domain_policy(struct tomoyo_io_buffer *head) | 821 | static int tomoyo_write_domain2(char *data, struct tomoyo_domain_info *domain, |
| 822 | const bool is_delete) | ||
| 823 | { | ||
| 824 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_ALLOW_MOUNT)) | ||
| 825 | return tomoyo_write_mount(data, domain, is_delete); | ||
| 826 | return tomoyo_write_file(data, domain, is_delete); | ||
| 827 | } | ||
| 828 | |||
| 829 | /** | ||
| 830 | * tomoyo_write_domain - Write domain policy. | ||
| 831 | * | ||
| 832 | * @head: Pointer to "struct tomoyo_io_buffer". | ||
| 833 | * | ||
| 834 | * Returns 0 on success, negative value otherwise. | ||
| 835 | * | ||
| 836 | * Caller holds tomoyo_read_lock(). | ||
| 837 | */ | ||
| 838 | static int tomoyo_write_domain(struct tomoyo_io_buffer *head) | ||
| 1385 | { | 839 | { |
| 1386 | char *data = head->write_buf; | 840 | char *data = head->write_buf; |
| 1387 | struct tomoyo_domain_info *domain = head->write_var1; | 841 | struct tomoyo_domain_info *domain = head->write_var1; |
| @@ -1393,19 +847,19 @@ static int tomoyo_write_domain_policy(struct tomoyo_io_buffer *head) | |||
| 1393 | is_delete = true; | 847 | is_delete = true; |
| 1394 | else if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_SELECT)) | 848 | else if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_SELECT)) |
| 1395 | is_select = true; | 849 | is_select = true; |
| 1396 | if (is_select && tomoyo_is_select_one(head, data)) | 850 | if (is_select && tomoyo_select_one(head, data)) |
| 1397 | return 0; | 851 | return 0; |
| 1398 | /* Don't allow updating policies by non manager programs. */ | 852 | /* Don't allow updating policies by non manager programs. */ |
| 1399 | if (!tomoyo_is_policy_manager()) | 853 | if (!tomoyo_manager()) |
| 1400 | return -EPERM; | 854 | return -EPERM; |
| 1401 | if (tomoyo_is_domain_def(data)) { | 855 | if (tomoyo_domain_def(data)) { |
| 1402 | domain = NULL; | 856 | domain = NULL; |
| 1403 | if (is_delete) | 857 | if (is_delete) |
| 1404 | tomoyo_delete_domain(data); | 858 | tomoyo_delete_domain(data); |
| 1405 | else if (is_select) | 859 | else if (is_select) |
| 1406 | domain = tomoyo_find_domain(data); | 860 | domain = tomoyo_find_domain(data); |
| 1407 | else | 861 | else |
| 1408 | domain = tomoyo_find_or_assign_new_domain(data, 0); | 862 | domain = tomoyo_assign_domain(data, 0); |
| 1409 | head->write_var1 = domain; | 863 | head->write_var1 = domain; |
| 1410 | return 0; | 864 | return 0; |
| 1411 | } | 865 | } |
| @@ -1422,179 +876,198 @@ static int tomoyo_write_domain_policy(struct tomoyo_io_buffer *head) | |||
| 1422 | domain->ignore_global_allow_read = !is_delete; | 876 | domain->ignore_global_allow_read = !is_delete; |
| 1423 | return 0; | 877 | return 0; |
| 1424 | } | 878 | } |
| 1425 | return tomoyo_write_file_policy(data, domain, is_delete); | 879 | if (!strcmp(data, TOMOYO_KEYWORD_QUOTA_EXCEEDED)) { |
| 880 | domain->quota_warned = !is_delete; | ||
| 881 | return 0; | ||
| 882 | } | ||
| 883 | if (!strcmp(data, TOMOYO_KEYWORD_TRANSITION_FAILED)) { | ||
| 884 | domain->transition_failed = !is_delete; | ||
| 885 | return 0; | ||
| 886 | } | ||
| 887 | return tomoyo_write_domain2(data, domain, is_delete); | ||
| 1426 | } | 888 | } |
| 1427 | 889 | ||
| 1428 | /** | 890 | /** |
| 1429 | * tomoyo_print_path_acl - Print a single path ACL entry. | 891 | * tomoyo_fns - Find next set bit. |
| 1430 | * | 892 | * |
| 1431 | * @head: Pointer to "struct tomoyo_io_buffer". | 893 | * @perm: 8 bits value. |
| 1432 | * @ptr: Pointer to "struct tomoyo_path_acl". | 894 | * @bit: First bit to find. |
| 1433 | * | 895 | * |
| 1434 | * Returns true on success, false otherwise. | 896 | * Returns next on-bit on success, 8 otherwise. |
| 1435 | */ | 897 | */ |
| 1436 | static bool tomoyo_print_path_acl(struct tomoyo_io_buffer *head, | 898 | static u8 tomoyo_fns(const u8 perm, u8 bit) |
| 1437 | struct tomoyo_path_acl *ptr) | ||
| 1438 | { | 899 | { |
| 1439 | int pos; | 900 | for ( ; bit < 8; bit++) |
| 1440 | u8 bit; | 901 | if (perm & (1 << bit)) |
| 1441 | const u32 perm = ptr->perm | (((u32) ptr->perm_high) << 16); | 902 | break; |
| 1442 | 903 | return bit; | |
| 1443 | for (bit = head->read_bit; bit < TOMOYO_MAX_PATH_OPERATION; bit++) { | ||
| 1444 | if (!(perm & (1 << bit))) | ||
| 1445 | continue; | ||
| 1446 | /* Print "read/write" instead of "read" and "write". */ | ||
| 1447 | if ((bit == TOMOYO_TYPE_READ || bit == TOMOYO_TYPE_WRITE) | ||
| 1448 | && (perm & (1 << TOMOYO_TYPE_READ_WRITE))) | ||
| 1449 | continue; | ||
| 1450 | pos = head->read_avail; | ||
| 1451 | if (!tomoyo_io_printf(head, "allow_%s ", | ||
| 1452 | tomoyo_path2keyword(bit)) || | ||
| 1453 | !tomoyo_print_name_union(head, &ptr->name) || | ||
| 1454 | !tomoyo_io_printf(head, "\n")) | ||
| 1455 | goto out; | ||
| 1456 | } | ||
| 1457 | head->read_bit = 0; | ||
| 1458 | return true; | ||
| 1459 | out: | ||
| 1460 | head->read_bit = bit; | ||
| 1461 | head->read_avail = pos; | ||
| 1462 | return false; | ||
| 1463 | } | 904 | } |
| 1464 | 905 | ||
| 1465 | /** | 906 | /** |
| 1466 | * tomoyo_print_path2_acl - Print a double path ACL entry. | 907 | * tomoyo_print_entry - Print an ACL entry. |
| 1467 | * | 908 | * |
| 1468 | * @head: Pointer to "struct tomoyo_io_buffer". | 909 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1469 | * @ptr: Pointer to "struct tomoyo_path2_acl". | 910 | * @acl: Pointer to an ACL entry. |
| 1470 | * | 911 | * |
| 1471 | * Returns true on success, false otherwise. | 912 | * Returns true on success, false otherwise. |
| 1472 | */ | 913 | */ |
| 1473 | static bool tomoyo_print_path2_acl(struct tomoyo_io_buffer *head, | 914 | static bool tomoyo_print_entry(struct tomoyo_io_buffer *head, |
| 1474 | struct tomoyo_path2_acl *ptr) | 915 | struct tomoyo_acl_info *acl) |
| 1475 | { | 916 | { |
| 1476 | int pos; | 917 | const u8 acl_type = acl->type; |
| 1477 | const u8 perm = ptr->perm; | ||
| 1478 | u8 bit; | 918 | u8 bit; |
| 1479 | 919 | ||
| 1480 | for (bit = head->read_bit; bit < TOMOYO_MAX_PATH2_OPERATION; bit++) { | 920 | if (acl->is_deleted) |
| 1481 | if (!(perm & (1 << bit))) | 921 | return true; |
| 1482 | continue; | 922 | next: |
| 1483 | pos = head->read_avail; | 923 | bit = head->r.bit; |
| 1484 | if (!tomoyo_io_printf(head, "allow_%s ", | 924 | if (!tomoyo_flush(head)) |
| 1485 | tomoyo_path22keyword(bit)) || | 925 | return false; |
| 1486 | !tomoyo_print_name_union(head, &ptr->name1) || | 926 | else if (acl_type == TOMOYO_TYPE_PATH_ACL) { |
| 1487 | !tomoyo_print_name_union(head, &ptr->name2) || | 927 | struct tomoyo_path_acl *ptr = |
| 1488 | !tomoyo_io_printf(head, "\n")) | 928 | container_of(acl, typeof(*ptr), head); |
| 1489 | goto out; | 929 | const u16 perm = ptr->perm; |
| 930 | for ( ; bit < TOMOYO_MAX_PATH_OPERATION; bit++) { | ||
| 931 | if (!(perm & (1 << bit))) | ||
| 932 | continue; | ||
| 933 | if (head->r.print_execute_only && | ||
| 934 | bit != TOMOYO_TYPE_EXECUTE) | ||
| 935 | continue; | ||
| 936 | /* Print "read/write" instead of "read" and "write". */ | ||
| 937 | if ((bit == TOMOYO_TYPE_READ || | ||
| 938 | bit == TOMOYO_TYPE_WRITE) | ||
| 939 | && (perm & (1 << TOMOYO_TYPE_READ_WRITE))) | ||
| 940 | continue; | ||
| 941 | break; | ||
| 942 | } | ||
| 943 | if (bit >= TOMOYO_MAX_PATH_OPERATION) | ||
| 944 | goto done; | ||
| 945 | tomoyo_io_printf(head, "allow_%s", tomoyo_path_keyword[bit]); | ||
| 946 | tomoyo_print_name_union(head, &ptr->name); | ||
| 947 | } else if (head->r.print_execute_only) { | ||
| 948 | return true; | ||
| 949 | } else if (acl_type == TOMOYO_TYPE_PATH2_ACL) { | ||
| 950 | struct tomoyo_path2_acl *ptr = | ||
| 951 | container_of(acl, typeof(*ptr), head); | ||
| 952 | bit = tomoyo_fns(ptr->perm, bit); | ||
| 953 | if (bit >= TOMOYO_MAX_PATH2_OPERATION) | ||
| 954 | goto done; | ||
| 955 | tomoyo_io_printf(head, "allow_%s", tomoyo_path2_keyword[bit]); | ||
| 956 | tomoyo_print_name_union(head, &ptr->name1); | ||
| 957 | tomoyo_print_name_union(head, &ptr->name2); | ||
| 958 | } else if (acl_type == TOMOYO_TYPE_PATH_NUMBER_ACL) { | ||
| 959 | struct tomoyo_path_number_acl *ptr = | ||
| 960 | container_of(acl, typeof(*ptr), head); | ||
| 961 | bit = tomoyo_fns(ptr->perm, bit); | ||
| 962 | if (bit >= TOMOYO_MAX_PATH_NUMBER_OPERATION) | ||
| 963 | goto done; | ||
| 964 | tomoyo_io_printf(head, "allow_%s", | ||
| 965 | tomoyo_path_number_keyword[bit]); | ||
| 966 | tomoyo_print_name_union(head, &ptr->name); | ||
| 967 | tomoyo_print_number_union(head, &ptr->number); | ||
| 968 | } else if (acl_type == TOMOYO_TYPE_MKDEV_ACL) { | ||
| 969 | struct tomoyo_mkdev_acl *ptr = | ||
| 970 | container_of(acl, typeof(*ptr), head); | ||
| 971 | bit = tomoyo_fns(ptr->perm, bit); | ||
| 972 | if (bit >= TOMOYO_MAX_MKDEV_OPERATION) | ||
| 973 | goto done; | ||
| 974 | tomoyo_io_printf(head, "allow_%s", tomoyo_mkdev_keyword[bit]); | ||
| 975 | tomoyo_print_name_union(head, &ptr->name); | ||
| 976 | tomoyo_print_number_union(head, &ptr->mode); | ||
| 977 | tomoyo_print_number_union(head, &ptr->major); | ||
| 978 | tomoyo_print_number_union(head, &ptr->minor); | ||
| 979 | } else if (acl_type == TOMOYO_TYPE_MOUNT_ACL) { | ||
| 980 | struct tomoyo_mount_acl *ptr = | ||
| 981 | container_of(acl, typeof(*ptr), head); | ||
| 982 | tomoyo_io_printf(head, "allow_mount"); | ||
| 983 | tomoyo_print_name_union(head, &ptr->dev_name); | ||
| 984 | tomoyo_print_name_union(head, &ptr->dir_name); | ||
| 985 | tomoyo_print_name_union(head, &ptr->fs_type); | ||
| 986 | tomoyo_print_number_union(head, &ptr->flags); | ||
| 1490 | } | 987 | } |
| 1491 | head->read_bit = 0; | 988 | head->r.bit = bit + 1; |
| 989 | tomoyo_io_printf(head, "\n"); | ||
| 990 | if (acl_type != TOMOYO_TYPE_MOUNT_ACL) | ||
| 991 | goto next; | ||
| 992 | done: | ||
| 993 | head->r.bit = 0; | ||
| 1492 | return true; | 994 | return true; |
| 1493 | out: | ||
| 1494 | head->read_bit = bit; | ||
| 1495 | head->read_avail = pos; | ||
| 1496 | return false; | ||
| 1497 | } | 995 | } |
| 1498 | 996 | ||
| 1499 | /** | 997 | /** |
| 1500 | * tomoyo_print_entry - Print an ACL entry. | 998 | * tomoyo_read_domain2 - Read domain policy. |
| 1501 | * | 999 | * |
| 1502 | * @head: Pointer to "struct tomoyo_io_buffer". | 1000 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1503 | * @ptr: Pointer to an ACL entry. | 1001 | * @domain: Pointer to "struct tomoyo_domain_info". |
| 1002 | * | ||
| 1003 | * Caller holds tomoyo_read_lock(). | ||
| 1504 | * | 1004 | * |
| 1505 | * Returns true on success, false otherwise. | 1005 | * Returns true on success, false otherwise. |
| 1506 | */ | 1006 | */ |
| 1507 | static bool tomoyo_print_entry(struct tomoyo_io_buffer *head, | 1007 | static bool tomoyo_read_domain2(struct tomoyo_io_buffer *head, |
| 1508 | struct tomoyo_acl_info *ptr) | 1008 | struct tomoyo_domain_info *domain) |
| 1509 | { | 1009 | { |
| 1510 | const u8 acl_type = ptr->type; | 1010 | list_for_each_cookie(head->r.acl, &domain->acl_info_list) { |
| 1511 | 1011 | struct tomoyo_acl_info *ptr = | |
| 1512 | if (acl_type == TOMOYO_TYPE_PATH_ACL) { | 1012 | list_entry(head->r.acl, typeof(*ptr), list); |
| 1513 | struct tomoyo_path_acl *acl | 1013 | if (!tomoyo_print_entry(head, ptr)) |
| 1514 | = container_of(ptr, struct tomoyo_path_acl, head); | 1014 | return false; |
| 1515 | return tomoyo_print_path_acl(head, acl); | ||
| 1516 | } | ||
| 1517 | if (acl_type == TOMOYO_TYPE_PATH2_ACL) { | ||
| 1518 | struct tomoyo_path2_acl *acl | ||
| 1519 | = container_of(ptr, struct tomoyo_path2_acl, head); | ||
| 1520 | return tomoyo_print_path2_acl(head, acl); | ||
| 1521 | } | 1015 | } |
| 1522 | BUG(); /* This must not happen. */ | 1016 | head->r.acl = NULL; |
| 1523 | return false; | 1017 | return true; |
| 1524 | } | 1018 | } |
| 1525 | 1019 | ||
| 1526 | /** | 1020 | /** |
| 1527 | * tomoyo_read_domain_policy - Read domain policy. | 1021 | * tomoyo_read_domain - Read domain policy. |
| 1528 | * | 1022 | * |
| 1529 | * @head: Pointer to "struct tomoyo_io_buffer". | 1023 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1530 | * | 1024 | * |
| 1531 | * Returns 0. | ||
| 1532 | * | ||
| 1533 | * Caller holds tomoyo_read_lock(). | 1025 | * Caller holds tomoyo_read_lock(). |
| 1534 | */ | 1026 | */ |
| 1535 | static int tomoyo_read_domain_policy(struct tomoyo_io_buffer *head) | 1027 | static void tomoyo_read_domain(struct tomoyo_io_buffer *head) |
| 1536 | { | 1028 | { |
| 1537 | struct list_head *dpos; | 1029 | if (head->r.eof) |
| 1538 | struct list_head *apos; | 1030 | return; |
| 1539 | bool done = true; | 1031 | list_for_each_cookie(head->r.domain, &tomoyo_domain_list) { |
| 1540 | 1032 | struct tomoyo_domain_info *domain = | |
| 1541 | if (head->read_eof) | 1033 | list_entry(head->r.domain, typeof(*domain), list); |
| 1542 | return 0; | 1034 | switch (head->r.step) { |
| 1543 | if (head->read_step == 0) | 1035 | case 0: |
| 1544 | head->read_step = 1; | 1036 | if (domain->is_deleted && |
| 1545 | list_for_each_cookie(dpos, head->read_var1, &tomoyo_domain_list) { | 1037 | !head->r.print_this_domain_only) |
| 1546 | struct tomoyo_domain_info *domain; | 1038 | continue; |
| 1547 | const char *quota_exceeded = ""; | 1039 | /* Print domainname and flags. */ |
| 1548 | const char *transition_failed = ""; | 1040 | tomoyo_set_string(head, domain->domainname->name); |
| 1549 | const char *ignore_global_allow_read = ""; | 1041 | tomoyo_set_lf(head); |
| 1550 | domain = list_entry(dpos, struct tomoyo_domain_info, list); | 1042 | tomoyo_io_printf(head, |
| 1551 | if (head->read_step != 1) | 1043 | TOMOYO_KEYWORD_USE_PROFILE "%u\n", |
| 1552 | goto acl_loop; | 1044 | domain->profile); |
| 1553 | if (domain->is_deleted && !head->read_single_domain) | 1045 | if (domain->quota_warned) |
| 1554 | continue; | 1046 | tomoyo_set_string(head, "quota_exceeded\n"); |
| 1555 | /* Print domainname and flags. */ | 1047 | if (domain->transition_failed) |
| 1556 | if (domain->quota_warned) | 1048 | tomoyo_set_string(head, "transition_failed\n"); |
| 1557 | quota_exceeded = "quota_exceeded\n"; | 1049 | if (domain->ignore_global_allow_read) |
| 1558 | if (domain->transition_failed) | 1050 | tomoyo_set_string(head, |
| 1559 | transition_failed = "transition_failed\n"; | 1051 | TOMOYO_KEYWORD_IGNORE_GLOBAL_ALLOW_READ |
| 1560 | if (domain->ignore_global_allow_read) | 1052 | "\n"); |
| 1561 | ignore_global_allow_read | 1053 | head->r.step++; |
| 1562 | = TOMOYO_KEYWORD_IGNORE_GLOBAL_ALLOW_READ "\n"; | 1054 | tomoyo_set_lf(head); |
| 1563 | done = tomoyo_io_printf(head, "%s\n" TOMOYO_KEYWORD_USE_PROFILE | 1055 | /* fall through */ |
| 1564 | "%u\n%s%s%s\n", | 1056 | case 1: |
| 1565 | domain->domainname->name, | 1057 | if (!tomoyo_read_domain2(head, domain)) |
| 1566 | domain->profile, quota_exceeded, | 1058 | return; |
| 1567 | transition_failed, | 1059 | head->r.step++; |
| 1568 | ignore_global_allow_read); | 1060 | if (!tomoyo_set_lf(head)) |
| 1569 | if (!done) | 1061 | return; |
| 1570 | break; | 1062 | /* fall through */ |
| 1571 | head->read_step = 2; | 1063 | case 2: |
| 1572 | acl_loop: | 1064 | head->r.step = 0; |
| 1573 | if (head->read_step == 3) | 1065 | if (head->r.print_this_domain_only) |
| 1574 | goto tail_mark; | 1066 | goto done; |
| 1575 | /* Print ACL entries in the domain. */ | ||
| 1576 | list_for_each_cookie(apos, head->read_var2, | ||
| 1577 | &domain->acl_info_list) { | ||
| 1578 | struct tomoyo_acl_info *ptr | ||
| 1579 | = list_entry(apos, struct tomoyo_acl_info, | ||
| 1580 | list); | ||
| 1581 | done = tomoyo_print_entry(head, ptr); | ||
| 1582 | if (!done) | ||
| 1583 | break; | ||
| 1584 | } | 1067 | } |
| 1585 | if (!done) | ||
| 1586 | break; | ||
| 1587 | head->read_step = 3; | ||
| 1588 | tail_mark: | ||
| 1589 | done = tomoyo_io_printf(head, "\n"); | ||
| 1590 | if (!done) | ||
| 1591 | break; | ||
| 1592 | head->read_step = 1; | ||
| 1593 | if (head->read_single_domain) | ||
| 1594 | break; | ||
| 1595 | } | 1068 | } |
| 1596 | head->read_eof = done; | 1069 | done: |
| 1597 | return 0; | 1070 | head->r.eof = true; |
| 1598 | } | 1071 | } |
| 1599 | 1072 | ||
| 1600 | /** | 1073 | /** |
| @@ -1607,7 +1080,7 @@ tail_mark: | |||
| 1607 | * This is equivalent to doing | 1080 | * This is equivalent to doing |
| 1608 | * | 1081 | * |
| 1609 | * ( echo "select " $domainname; echo "use_profile " $profile ) | | 1082 | * ( echo "select " $domainname; echo "use_profile " $profile ) | |
| 1610 | * /usr/lib/ccs/loadpolicy -d | 1083 | * /usr/sbin/tomoyo-loadpolicy -d |
| 1611 | * | 1084 | * |
| 1612 | * Caller holds tomoyo_read_lock(). | 1085 | * Caller holds tomoyo_read_lock(). |
| 1613 | */ | 1086 | */ |
| @@ -1646,25 +1119,22 @@ static int tomoyo_write_domain_profile(struct tomoyo_io_buffer *head) | |||
| 1646 | * | 1119 | * |
| 1647 | * Caller holds tomoyo_read_lock(). | 1120 | * Caller holds tomoyo_read_lock(). |
| 1648 | */ | 1121 | */ |
| 1649 | static int tomoyo_read_domain_profile(struct tomoyo_io_buffer *head) | 1122 | static void tomoyo_read_domain_profile(struct tomoyo_io_buffer *head) |
| 1650 | { | 1123 | { |
| 1651 | struct list_head *pos; | 1124 | if (head->r.eof) |
| 1652 | bool done = true; | 1125 | return; |
| 1653 | 1126 | list_for_each_cookie(head->r.domain, &tomoyo_domain_list) { | |
| 1654 | if (head->read_eof) | 1127 | struct tomoyo_domain_info *domain = |
| 1655 | return 0; | 1128 | list_entry(head->r.domain, typeof(*domain), list); |
| 1656 | list_for_each_cookie(pos, head->read_var1, &tomoyo_domain_list) { | ||
| 1657 | struct tomoyo_domain_info *domain; | ||
| 1658 | domain = list_entry(pos, struct tomoyo_domain_info, list); | ||
| 1659 | if (domain->is_deleted) | 1129 | if (domain->is_deleted) |
| 1660 | continue; | 1130 | continue; |
| 1661 | done = tomoyo_io_printf(head, "%u %s\n", domain->profile, | 1131 | if (!tomoyo_flush(head)) |
| 1662 | domain->domainname->name); | 1132 | return; |
| 1663 | if (!done) | 1133 | tomoyo_io_printf(head, "%u ", domain->profile); |
| 1664 | break; | 1134 | tomoyo_set_string(head, domain->domainname->name); |
| 1135 | tomoyo_set_lf(head); | ||
| 1665 | } | 1136 | } |
| 1666 | head->read_eof = done; | 1137 | head->r.eof = true; |
| 1667 | return 0; | ||
| 1668 | } | 1138 | } |
| 1669 | 1139 | ||
| 1670 | /** | 1140 | /** |
| @@ -1676,11 +1146,7 @@ static int tomoyo_read_domain_profile(struct tomoyo_io_buffer *head) | |||
| 1676 | */ | 1146 | */ |
| 1677 | static int tomoyo_write_pid(struct tomoyo_io_buffer *head) | 1147 | static int tomoyo_write_pid(struct tomoyo_io_buffer *head) |
| 1678 | { | 1148 | { |
| 1679 | unsigned long pid; | 1149 | head->r.eof = false; |
| 1680 | /* No error check. */ | ||
| 1681 | strict_strtoul(head->write_buf, 10, &pid); | ||
| 1682 | head->read_step = (int) pid; | ||
| 1683 | head->read_eof = false; | ||
| 1684 | return 0; | 1150 | return 0; |
| 1685 | } | 1151 | } |
| 1686 | 1152 | ||
| @@ -1694,29 +1160,57 @@ static int tomoyo_write_pid(struct tomoyo_io_buffer *head) | |||
| 1694 | * The PID is specified by tomoyo_write_pid() so that the user can obtain | 1160 | * The PID is specified by tomoyo_write_pid() so that the user can obtain |
| 1695 | * using read()/write() interface rather than sysctl() interface. | 1161 | * using read()/write() interface rather than sysctl() interface. |
| 1696 | */ | 1162 | */ |
| 1697 | static int tomoyo_read_pid(struct tomoyo_io_buffer *head) | 1163 | static void tomoyo_read_pid(struct tomoyo_io_buffer *head) |
| 1698 | { | 1164 | { |
| 1699 | if (head->read_avail == 0 && !head->read_eof) { | 1165 | char *buf = head->write_buf; |
| 1700 | const int pid = head->read_step; | 1166 | bool global_pid = false; |
| 1701 | struct task_struct *p; | 1167 | unsigned int pid; |
| 1702 | struct tomoyo_domain_info *domain = NULL; | 1168 | struct task_struct *p; |
| 1703 | rcu_read_lock(); | 1169 | struct tomoyo_domain_info *domain = NULL; |
| 1704 | read_lock(&tasklist_lock); | 1170 | |
| 1705 | p = find_task_by_vpid(pid); | 1171 | /* Accessing write_buf is safe because head->io_sem is held. */ |
| 1706 | if (p) | 1172 | if (!buf) { |
| 1707 | domain = tomoyo_real_domain(p); | 1173 | head->r.eof = true; |
| 1708 | read_unlock(&tasklist_lock); | 1174 | return; /* Do nothing if open(O_RDONLY). */ |
| 1709 | rcu_read_unlock(); | ||
| 1710 | if (domain) | ||
| 1711 | tomoyo_io_printf(head, "%d %u %s", pid, domain->profile, | ||
| 1712 | domain->domainname->name); | ||
| 1713 | head->read_eof = true; | ||
| 1714 | } | 1175 | } |
| 1715 | return 0; | 1176 | if (head->r.w_pos || head->r.eof) |
| 1177 | return; | ||
| 1178 | head->r.eof = true; | ||
| 1179 | if (tomoyo_str_starts(&buf, "global-pid ")) | ||
| 1180 | global_pid = true; | ||
| 1181 | pid = (unsigned int) simple_strtoul(buf, NULL, 10); | ||
| 1182 | rcu_read_lock(); | ||
| 1183 | read_lock(&tasklist_lock); | ||
| 1184 | if (global_pid) | ||
| 1185 | p = find_task_by_pid_ns(pid, &init_pid_ns); | ||
| 1186 | else | ||
| 1187 | p = find_task_by_vpid(pid); | ||
| 1188 | if (p) | ||
| 1189 | domain = tomoyo_real_domain(p); | ||
| 1190 | read_unlock(&tasklist_lock); | ||
| 1191 | rcu_read_unlock(); | ||
| 1192 | if (!domain) | ||
| 1193 | return; | ||
| 1194 | tomoyo_io_printf(head, "%u %u ", pid, domain->profile); | ||
| 1195 | tomoyo_set_string(head, domain->domainname->name); | ||
| 1716 | } | 1196 | } |
| 1717 | 1197 | ||
| 1198 | static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = { | ||
| 1199 | [TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE] | ||
| 1200 | = TOMOYO_KEYWORD_NO_INITIALIZE_DOMAIN, | ||
| 1201 | [TOMOYO_TRANSITION_CONTROL_INITIALIZE] | ||
| 1202 | = TOMOYO_KEYWORD_INITIALIZE_DOMAIN, | ||
| 1203 | [TOMOYO_TRANSITION_CONTROL_NO_KEEP] = TOMOYO_KEYWORD_NO_KEEP_DOMAIN, | ||
| 1204 | [TOMOYO_TRANSITION_CONTROL_KEEP] = TOMOYO_KEYWORD_KEEP_DOMAIN | ||
| 1205 | }; | ||
| 1206 | |||
| 1207 | static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = { | ||
| 1208 | [TOMOYO_PATH_GROUP] = TOMOYO_KEYWORD_PATH_GROUP, | ||
| 1209 | [TOMOYO_NUMBER_GROUP] = TOMOYO_KEYWORD_NUMBER_GROUP | ||
| 1210 | }; | ||
| 1211 | |||
| 1718 | /** | 1212 | /** |
| 1719 | * tomoyo_write_exception_policy - Write exception policy. | 1213 | * tomoyo_write_exception - Write exception policy. |
| 1720 | * | 1214 | * |
| 1721 | * @head: Pointer to "struct tomoyo_io_buffer". | 1215 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1722 | * | 1216 | * |
| @@ -1724,186 +1218,523 @@ static int tomoyo_read_pid(struct tomoyo_io_buffer *head) | |||
| 1724 | * | 1218 | * |
| 1725 | * Caller holds tomoyo_read_lock(). | 1219 | * Caller holds tomoyo_read_lock(). |
| 1726 | */ | 1220 | */ |
| 1727 | static int tomoyo_write_exception_policy(struct tomoyo_io_buffer *head) | 1221 | static int tomoyo_write_exception(struct tomoyo_io_buffer *head) |
| 1728 | { | 1222 | { |
| 1729 | char *data = head->write_buf; | 1223 | char *data = head->write_buf; |
| 1730 | bool is_delete = tomoyo_str_starts(&data, TOMOYO_KEYWORD_DELETE); | 1224 | bool is_delete = tomoyo_str_starts(&data, TOMOYO_KEYWORD_DELETE); |
| 1731 | 1225 | u8 i; | |
| 1732 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_KEEP_DOMAIN)) | 1226 | static const struct { |
| 1733 | return tomoyo_write_domain_keeper_policy(data, false, | 1227 | const char *keyword; |
| 1734 | is_delete); | 1228 | int (*write) (char *, const bool); |
| 1735 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_NO_KEEP_DOMAIN)) | 1229 | } tomoyo_callback[4] = { |
| 1736 | return tomoyo_write_domain_keeper_policy(data, true, is_delete); | 1230 | { TOMOYO_KEYWORD_AGGREGATOR, tomoyo_write_aggregator }, |
| 1737 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_INITIALIZE_DOMAIN)) | 1231 | { TOMOYO_KEYWORD_FILE_PATTERN, tomoyo_write_pattern }, |
| 1738 | return tomoyo_write_domain_initializer_policy(data, false, | 1232 | { TOMOYO_KEYWORD_DENY_REWRITE, tomoyo_write_no_rewrite }, |
| 1739 | is_delete); | 1233 | { TOMOYO_KEYWORD_ALLOW_READ, tomoyo_write_globally_readable }, |
| 1740 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_NO_INITIALIZE_DOMAIN)) | 1234 | }; |
| 1741 | return tomoyo_write_domain_initializer_policy(data, true, | 1235 | |
| 1742 | is_delete); | 1236 | for (i = 0; i < TOMOYO_MAX_TRANSITION_TYPE; i++) |
| 1743 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_ALIAS)) | 1237 | if (tomoyo_str_starts(&data, tomoyo_transition_type[i])) |
| 1744 | return tomoyo_write_alias_policy(data, is_delete); | 1238 | return tomoyo_write_transition_control(data, is_delete, |
| 1745 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_ALLOW_READ)) | 1239 | i); |
| 1746 | return tomoyo_write_globally_readable_policy(data, is_delete); | 1240 | for (i = 0; i < 4; i++) |
| 1747 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_FILE_PATTERN)) | 1241 | if (tomoyo_str_starts(&data, tomoyo_callback[i].keyword)) |
| 1748 | return tomoyo_write_pattern_policy(data, is_delete); | 1242 | return tomoyo_callback[i].write(data, is_delete); |
| 1749 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_DENY_REWRITE)) | 1243 | for (i = 0; i < TOMOYO_MAX_GROUP; i++) |
| 1750 | return tomoyo_write_no_rewrite_policy(data, is_delete); | 1244 | if (tomoyo_str_starts(&data, tomoyo_group_name[i])) |
| 1751 | if (tomoyo_str_starts(&data, TOMOYO_KEYWORD_PATH_GROUP)) | 1245 | return tomoyo_write_group(data, is_delete, i); |
| 1752 | return tomoyo_write_path_group_policy(data, is_delete); | ||
| 1753 | return -EINVAL; | 1246 | return -EINVAL; |
| 1754 | } | 1247 | } |
| 1755 | 1248 | ||
| 1756 | /** | 1249 | /** |
| 1757 | * tomoyo_read_exception_policy - Read exception policy. | 1250 | * tomoyo_read_group - Read "struct tomoyo_path_group"/"struct tomoyo_number_group" list. |
| 1758 | * | 1251 | * |
| 1759 | * @head: Pointer to "struct tomoyo_io_buffer". | 1252 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1253 | * @idx: Index number. | ||
| 1760 | * | 1254 | * |
| 1761 | * Returns 0 on success, -EINVAL otherwise. | 1255 | * Returns true on success, false otherwise. |
| 1762 | * | 1256 | * |
| 1763 | * Caller holds tomoyo_read_lock(). | 1257 | * Caller holds tomoyo_read_lock(). |
| 1764 | */ | 1258 | */ |
| 1765 | static int tomoyo_read_exception_policy(struct tomoyo_io_buffer *head) | 1259 | static bool tomoyo_read_group(struct tomoyo_io_buffer *head, const int idx) |
| 1766 | { | 1260 | { |
| 1767 | if (!head->read_eof) { | 1261 | list_for_each_cookie(head->r.group, &tomoyo_group_list[idx]) { |
| 1768 | switch (head->read_step) { | 1262 | struct tomoyo_group *group = |
| 1769 | case 0: | 1263 | list_entry(head->r.group, typeof(*group), list); |
| 1770 | head->read_var2 = NULL; | 1264 | list_for_each_cookie(head->r.acl, &group->member_list) { |
| 1771 | head->read_step = 1; | 1265 | struct tomoyo_acl_head *ptr = |
| 1772 | case 1: | 1266 | list_entry(head->r.acl, typeof(*ptr), list); |
| 1773 | if (!tomoyo_read_domain_keeper_policy(head)) | 1267 | if (ptr->is_deleted) |
| 1774 | break; | 1268 | continue; |
| 1775 | head->read_var2 = NULL; | 1269 | if (!tomoyo_flush(head)) |
| 1776 | head->read_step = 2; | 1270 | return false; |
| 1777 | case 2: | 1271 | tomoyo_set_string(head, tomoyo_group_name[idx]); |
| 1778 | if (!tomoyo_read_globally_readable_policy(head)) | 1272 | tomoyo_set_string(head, group->group_name->name); |
| 1779 | break; | 1273 | if (idx == TOMOYO_PATH_GROUP) { |
| 1780 | head->read_var2 = NULL; | 1274 | tomoyo_set_space(head); |
| 1781 | head->read_step = 3; | 1275 | tomoyo_set_string(head, container_of |
| 1782 | case 3: | 1276 | (ptr, struct tomoyo_path_group, |
| 1783 | head->read_var2 = NULL; | 1277 | head)->member_name->name); |
| 1784 | head->read_step = 4; | 1278 | } else if (idx == TOMOYO_NUMBER_GROUP) { |
| 1785 | case 4: | 1279 | tomoyo_print_number_union(head, &container_of |
| 1786 | if (!tomoyo_read_domain_initializer_policy(head)) | 1280 | (ptr, |
| 1787 | break; | 1281 | struct tomoyo_number_group, |
| 1788 | head->read_var2 = NULL; | 1282 | head)->number); |
| 1789 | head->read_step = 5; | 1283 | } |
| 1790 | case 5: | 1284 | tomoyo_set_lf(head); |
| 1791 | if (!tomoyo_read_alias_policy(head)) | 1285 | } |
| 1792 | break; | 1286 | head->r.acl = NULL; |
| 1793 | head->read_var2 = NULL; | 1287 | } |
| 1794 | head->read_step = 6; | 1288 | head->r.group = NULL; |
| 1795 | case 6: | 1289 | return true; |
| 1796 | head->read_var2 = NULL; | 1290 | } |
| 1797 | head->read_step = 7; | 1291 | |
| 1798 | case 7: | 1292 | /** |
| 1799 | if (!tomoyo_read_file_pattern(head)) | 1293 | * tomoyo_read_policy - Read "struct tomoyo_..._entry" list. |
| 1800 | break; | 1294 | * |
| 1801 | head->read_var2 = NULL; | 1295 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1802 | head->read_step = 8; | 1296 | * @idx: Index number. |
| 1803 | case 8: | 1297 | * |
| 1804 | if (!tomoyo_read_no_rewrite_policy(head)) | 1298 | * Returns true on success, false otherwise. |
| 1805 | break; | 1299 | * |
| 1806 | head->read_var2 = NULL; | 1300 | * Caller holds tomoyo_read_lock(). |
| 1807 | head->read_step = 9; | 1301 | */ |
| 1808 | case 9: | 1302 | static bool tomoyo_read_policy(struct tomoyo_io_buffer *head, const int idx) |
| 1809 | if (!tomoyo_read_path_group_policy(head)) | 1303 | { |
| 1810 | break; | 1304 | list_for_each_cookie(head->r.acl, &tomoyo_policy_list[idx]) { |
| 1811 | head->read_var1 = NULL; | 1305 | struct tomoyo_acl_head *acl = |
| 1812 | head->read_var2 = NULL; | 1306 | container_of(head->r.acl, typeof(*acl), list); |
| 1813 | head->read_step = 10; | 1307 | if (acl->is_deleted) |
| 1814 | case 10: | 1308 | continue; |
| 1815 | head->read_eof = true; | 1309 | if (!tomoyo_flush(head)) |
| 1310 | return false; | ||
| 1311 | switch (idx) { | ||
| 1312 | case TOMOYO_ID_TRANSITION_CONTROL: | ||
| 1313 | { | ||
| 1314 | struct tomoyo_transition_control *ptr = | ||
| 1315 | container_of(acl, typeof(*ptr), head); | ||
| 1316 | tomoyo_set_string(head, | ||
| 1317 | tomoyo_transition_type | ||
| 1318 | [ptr->type]); | ||
| 1319 | if (ptr->program) | ||
| 1320 | tomoyo_set_string(head, | ||
| 1321 | ptr->program->name); | ||
| 1322 | if (ptr->program && ptr->domainname) | ||
| 1323 | tomoyo_set_string(head, " from "); | ||
| 1324 | if (ptr->domainname) | ||
| 1325 | tomoyo_set_string(head, | ||
| 1326 | ptr->domainname-> | ||
| 1327 | name); | ||
| 1328 | } | ||
| 1329 | break; | ||
| 1330 | case TOMOYO_ID_GLOBALLY_READABLE: | ||
| 1331 | { | ||
| 1332 | struct tomoyo_readable_file *ptr = | ||
| 1333 | container_of(acl, typeof(*ptr), head); | ||
| 1334 | tomoyo_set_string(head, | ||
| 1335 | TOMOYO_KEYWORD_ALLOW_READ); | ||
| 1336 | tomoyo_set_string(head, ptr->filename->name); | ||
| 1337 | } | ||
| 1338 | break; | ||
| 1339 | case TOMOYO_ID_AGGREGATOR: | ||
| 1340 | { | ||
| 1341 | struct tomoyo_aggregator *ptr = | ||
| 1342 | container_of(acl, typeof(*ptr), head); | ||
| 1343 | tomoyo_set_string(head, | ||
| 1344 | TOMOYO_KEYWORD_AGGREGATOR); | ||
| 1345 | tomoyo_set_string(head, | ||
| 1346 | ptr->original_name->name); | ||
| 1347 | tomoyo_set_space(head); | ||
| 1348 | tomoyo_set_string(head, | ||
| 1349 | ptr->aggregated_name->name); | ||
| 1350 | } | ||
| 1351 | break; | ||
| 1352 | case TOMOYO_ID_PATTERN: | ||
| 1353 | { | ||
| 1354 | struct tomoyo_no_pattern *ptr = | ||
| 1355 | container_of(acl, typeof(*ptr), head); | ||
| 1356 | tomoyo_set_string(head, | ||
| 1357 | TOMOYO_KEYWORD_FILE_PATTERN); | ||
| 1358 | tomoyo_set_string(head, ptr->pattern->name); | ||
| 1359 | } | ||
| 1360 | break; | ||
| 1361 | case TOMOYO_ID_NO_REWRITE: | ||
| 1362 | { | ||
| 1363 | struct tomoyo_no_rewrite *ptr = | ||
| 1364 | container_of(acl, typeof(*ptr), head); | ||
| 1365 | tomoyo_set_string(head, | ||
| 1366 | TOMOYO_KEYWORD_DENY_REWRITE); | ||
| 1367 | tomoyo_set_string(head, ptr->pattern->name); | ||
| 1368 | } | ||
| 1816 | break; | 1369 | break; |
| 1817 | default: | 1370 | default: |
| 1818 | return -EINVAL; | 1371 | continue; |
| 1819 | } | 1372 | } |
| 1373 | tomoyo_set_lf(head); | ||
| 1820 | } | 1374 | } |
| 1821 | return 0; | 1375 | head->r.acl = NULL; |
| 1376 | return true; | ||
| 1822 | } | 1377 | } |
| 1823 | 1378 | ||
| 1824 | /* path to policy loader */ | 1379 | /** |
| 1825 | static const char *tomoyo_loader = "/sbin/tomoyo-init"; | 1380 | * tomoyo_read_exception - Read exception policy. |
| 1381 | * | ||
| 1382 | * @head: Pointer to "struct tomoyo_io_buffer". | ||
| 1383 | * | ||
| 1384 | * Caller holds tomoyo_read_lock(). | ||
| 1385 | */ | ||
| 1386 | static void tomoyo_read_exception(struct tomoyo_io_buffer *head) | ||
| 1387 | { | ||
| 1388 | if (head->r.eof) | ||
| 1389 | return; | ||
| 1390 | while (head->r.step < TOMOYO_MAX_POLICY && | ||
| 1391 | tomoyo_read_policy(head, head->r.step)) | ||
| 1392 | head->r.step++; | ||
| 1393 | if (head->r.step < TOMOYO_MAX_POLICY) | ||
| 1394 | return; | ||
| 1395 | while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP && | ||
| 1396 | tomoyo_read_group(head, head->r.step - TOMOYO_MAX_POLICY)) | ||
| 1397 | head->r.step++; | ||
| 1398 | if (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP) | ||
| 1399 | return; | ||
| 1400 | head->r.eof = true; | ||
| 1401 | } | ||
| 1826 | 1402 | ||
| 1827 | /** | 1403 | /** |
| 1828 | * tomoyo_policy_loader_exists - Check whether /sbin/tomoyo-init exists. | 1404 | * tomoyo_print_header - Get header line of audit log. |
| 1405 | * | ||
| 1406 | * @r: Pointer to "struct tomoyo_request_info". | ||
| 1829 | * | 1407 | * |
| 1830 | * Returns true if /sbin/tomoyo-init exists, false otherwise. | 1408 | * Returns string representation. |
| 1409 | * | ||
| 1410 | * This function uses kmalloc(), so caller must kfree() if this function | ||
| 1411 | * didn't return NULL. | ||
| 1831 | */ | 1412 | */ |
| 1832 | static bool tomoyo_policy_loader_exists(void) | 1413 | static char *tomoyo_print_header(struct tomoyo_request_info *r) |
| 1833 | { | 1414 | { |
| 1834 | /* | 1415 | struct timeval tv; |
| 1835 | * Don't activate MAC if the policy loader doesn't exist. | 1416 | const pid_t gpid = task_pid_nr(current); |
| 1836 | * If the initrd includes /sbin/init but real-root-dev has not | 1417 | static const int tomoyo_buffer_len = 4096; |
| 1837 | * mounted on / yet, activating MAC will block the system since | 1418 | char *buffer = kmalloc(tomoyo_buffer_len, GFP_NOFS); |
| 1838 | * policies are not loaded yet. | 1419 | if (!buffer) |
| 1839 | * Thus, let do_execve() call this function everytime. | 1420 | return NULL; |
| 1840 | */ | 1421 | do_gettimeofday(&tv); |
| 1841 | struct path path; | 1422 | snprintf(buffer, tomoyo_buffer_len - 1, |
| 1423 | "#timestamp=%lu profile=%u mode=%s (global-pid=%u)" | ||
| 1424 | " task={ pid=%u ppid=%u uid=%u gid=%u euid=%u" | ||
| 1425 | " egid=%u suid=%u sgid=%u fsuid=%u fsgid=%u }", | ||
| 1426 | tv.tv_sec, r->profile, tomoyo_mode[r->mode], gpid, | ||
| 1427 | (pid_t) sys_getpid(), (pid_t) sys_getppid(), | ||
| 1428 | current_uid(), current_gid(), current_euid(), | ||
| 1429 | current_egid(), current_suid(), current_sgid(), | ||
| 1430 | current_fsuid(), current_fsgid()); | ||
| 1431 | return buffer; | ||
| 1432 | } | ||
| 1842 | 1433 | ||
| 1843 | if (kern_path(tomoyo_loader, LOOKUP_FOLLOW, &path)) { | 1434 | /** |
| 1844 | printk(KERN_INFO "Not activating Mandatory Access Control now " | 1435 | * tomoyo_init_audit_log - Allocate buffer for audit logs. |
| 1845 | "since %s doesn't exist.\n", tomoyo_loader); | 1436 | * |
| 1846 | return false; | 1437 | * @len: Required size. |
| 1438 | * @r: Pointer to "struct tomoyo_request_info". | ||
| 1439 | * | ||
| 1440 | * Returns pointer to allocated memory. | ||
| 1441 | * | ||
| 1442 | * The @len is updated to add the header lines' size on success. | ||
| 1443 | * | ||
| 1444 | * This function uses kzalloc(), so caller must kfree() if this function | ||
| 1445 | * didn't return NULL. | ||
| 1446 | */ | ||
| 1447 | static char *tomoyo_init_audit_log(int *len, struct tomoyo_request_info *r) | ||
| 1448 | { | ||
| 1449 | char *buf = NULL; | ||
| 1450 | const char *header; | ||
| 1451 | const char *domainname; | ||
| 1452 | if (!r->domain) | ||
| 1453 | r->domain = tomoyo_domain(); | ||
| 1454 | domainname = r->domain->domainname->name; | ||
| 1455 | header = tomoyo_print_header(r); | ||
| 1456 | if (!header) | ||
| 1457 | return NULL; | ||
| 1458 | *len += strlen(domainname) + strlen(header) + 10; | ||
| 1459 | buf = kzalloc(*len, GFP_NOFS); | ||
| 1460 | if (buf) | ||
| 1461 | snprintf(buf, (*len) - 1, "%s\n%s\n", header, domainname); | ||
| 1462 | kfree(header); | ||
| 1463 | return buf; | ||
| 1464 | } | ||
| 1465 | |||
| 1466 | /* Wait queue for tomoyo_query_list. */ | ||
| 1467 | static DECLARE_WAIT_QUEUE_HEAD(tomoyo_query_wait); | ||
| 1468 | |||
| 1469 | /* Lock for manipulating tomoyo_query_list. */ | ||
| 1470 | static DEFINE_SPINLOCK(tomoyo_query_list_lock); | ||
| 1471 | |||
| 1472 | /* Structure for query. */ | ||
| 1473 | struct tomoyo_query { | ||
| 1474 | struct list_head list; | ||
| 1475 | char *query; | ||
| 1476 | int query_len; | ||
| 1477 | unsigned int serial; | ||
| 1478 | int timer; | ||
| 1479 | int answer; | ||
| 1480 | }; | ||
| 1481 | |||
| 1482 | /* The list for "struct tomoyo_query". */ | ||
| 1483 | static LIST_HEAD(tomoyo_query_list); | ||
| 1484 | |||
| 1485 | /* | ||
| 1486 | * Number of "struct file" referring /sys/kernel/security/tomoyo/query | ||
| 1487 | * interface. | ||
| 1488 | */ | ||
| 1489 | static atomic_t tomoyo_query_observers = ATOMIC_INIT(0); | ||
| 1490 | |||
| 1491 | /** | ||
| 1492 | * tomoyo_supervisor - Ask for the supervisor's decision. | ||
| 1493 | * | ||
| 1494 | * @r: Pointer to "struct tomoyo_request_info". | ||
| 1495 | * @fmt: The printf()'s format string, followed by parameters. | ||
| 1496 | * | ||
| 1497 | * Returns 0 if the supervisor decided to permit the access request which | ||
| 1498 | * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the | ||
| 1499 | * supervisor decided to retry the access request which violated the policy in | ||
| 1500 | * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise. | ||
| 1501 | */ | ||
| 1502 | int tomoyo_supervisor(struct tomoyo_request_info *r, const char *fmt, ...) | ||
| 1503 | { | ||
| 1504 | va_list args; | ||
| 1505 | int error = -EPERM; | ||
| 1506 | int pos; | ||
| 1507 | int len; | ||
| 1508 | static unsigned int tomoyo_serial; | ||
| 1509 | struct tomoyo_query *entry = NULL; | ||
| 1510 | bool quota_exceeded = false; | ||
| 1511 | char *header; | ||
| 1512 | switch (r->mode) { | ||
| 1513 | char *buffer; | ||
| 1514 | case TOMOYO_CONFIG_LEARNING: | ||
| 1515 | if (!tomoyo_domain_quota_is_ok(r)) | ||
| 1516 | return 0; | ||
| 1517 | va_start(args, fmt); | ||
| 1518 | len = vsnprintf((char *) &pos, sizeof(pos) - 1, fmt, args) + 4; | ||
| 1519 | va_end(args); | ||
| 1520 | buffer = kmalloc(len, GFP_NOFS); | ||
| 1521 | if (!buffer) | ||
| 1522 | return 0; | ||
| 1523 | va_start(args, fmt); | ||
| 1524 | vsnprintf(buffer, len - 1, fmt, args); | ||
| 1525 | va_end(args); | ||
| 1526 | tomoyo_normalize_line(buffer); | ||
| 1527 | tomoyo_write_domain2(buffer, r->domain, false); | ||
| 1528 | kfree(buffer); | ||
| 1529 | /* fall through */ | ||
| 1530 | case TOMOYO_CONFIG_PERMISSIVE: | ||
| 1531 | return 0; | ||
| 1847 | } | 1532 | } |
| 1848 | path_put(&path); | 1533 | if (!r->domain) |
| 1849 | return true; | 1534 | r->domain = tomoyo_domain(); |
| 1535 | if (!atomic_read(&tomoyo_query_observers)) | ||
| 1536 | return -EPERM; | ||
| 1537 | va_start(args, fmt); | ||
| 1538 | len = vsnprintf((char *) &pos, sizeof(pos) - 1, fmt, args) + 32; | ||
| 1539 | va_end(args); | ||
| 1540 | header = tomoyo_init_audit_log(&len, r); | ||
| 1541 | if (!header) | ||
| 1542 | goto out; | ||
| 1543 | entry = kzalloc(sizeof(*entry), GFP_NOFS); | ||
| 1544 | if (!entry) | ||
| 1545 | goto out; | ||
| 1546 | entry->query = kzalloc(len, GFP_NOFS); | ||
| 1547 | if (!entry->query) | ||
| 1548 | goto out; | ||
| 1549 | len = ksize(entry->query); | ||
| 1550 | spin_lock(&tomoyo_query_list_lock); | ||
| 1551 | if (tomoyo_quota_for_query && tomoyo_query_memory_size + len + | ||
| 1552 | sizeof(*entry) >= tomoyo_quota_for_query) { | ||
| 1553 | quota_exceeded = true; | ||
| 1554 | } else { | ||
| 1555 | tomoyo_query_memory_size += len + sizeof(*entry); | ||
| 1556 | entry->serial = tomoyo_serial++; | ||
| 1557 | } | ||
| 1558 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1559 | if (quota_exceeded) | ||
| 1560 | goto out; | ||
| 1561 | pos = snprintf(entry->query, len - 1, "Q%u-%hu\n%s", | ||
| 1562 | entry->serial, r->retry, header); | ||
| 1563 | kfree(header); | ||
| 1564 | header = NULL; | ||
| 1565 | va_start(args, fmt); | ||
| 1566 | vsnprintf(entry->query + pos, len - 1 - pos, fmt, args); | ||
| 1567 | entry->query_len = strlen(entry->query) + 1; | ||
| 1568 | va_end(args); | ||
| 1569 | spin_lock(&tomoyo_query_list_lock); | ||
| 1570 | list_add_tail(&entry->list, &tomoyo_query_list); | ||
| 1571 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1572 | /* Give 10 seconds for supervisor's opinion. */ | ||
| 1573 | for (entry->timer = 0; | ||
| 1574 | atomic_read(&tomoyo_query_observers) && entry->timer < 100; | ||
| 1575 | entry->timer++) { | ||
| 1576 | wake_up(&tomoyo_query_wait); | ||
| 1577 | set_current_state(TASK_INTERRUPTIBLE); | ||
| 1578 | schedule_timeout(HZ / 10); | ||
| 1579 | if (entry->answer) | ||
| 1580 | break; | ||
| 1581 | } | ||
| 1582 | spin_lock(&tomoyo_query_list_lock); | ||
| 1583 | list_del(&entry->list); | ||
| 1584 | tomoyo_query_memory_size -= len + sizeof(*entry); | ||
| 1585 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1586 | switch (entry->answer) { | ||
| 1587 | case 3: /* Asked to retry by administrator. */ | ||
| 1588 | error = TOMOYO_RETRY_REQUEST; | ||
| 1589 | r->retry++; | ||
| 1590 | break; | ||
| 1591 | case 1: | ||
| 1592 | /* Granted by administrator. */ | ||
| 1593 | error = 0; | ||
| 1594 | break; | ||
| 1595 | case 0: | ||
| 1596 | /* Timed out. */ | ||
| 1597 | break; | ||
| 1598 | default: | ||
| 1599 | /* Rejected by administrator. */ | ||
| 1600 | break; | ||
| 1601 | } | ||
| 1602 | out: | ||
| 1603 | if (entry) | ||
| 1604 | kfree(entry->query); | ||
| 1605 | kfree(entry); | ||
| 1606 | kfree(header); | ||
| 1607 | return error; | ||
| 1850 | } | 1608 | } |
| 1851 | 1609 | ||
| 1852 | /** | 1610 | /** |
| 1853 | * tomoyo_load_policy - Run external policy loader to load policy. | 1611 | * tomoyo_poll_query - poll() for /sys/kernel/security/tomoyo/query. |
| 1854 | * | 1612 | * |
| 1855 | * @filename: The program about to start. | 1613 | * @file: Pointer to "struct file". |
| 1614 | * @wait: Pointer to "poll_table". | ||
| 1856 | * | 1615 | * |
| 1857 | * This function checks whether @filename is /sbin/init , and if so | 1616 | * Returns POLLIN | POLLRDNORM when ready to read, 0 otherwise. |
| 1858 | * invoke /sbin/tomoyo-init and wait for the termination of /sbin/tomoyo-init | ||
| 1859 | * and then continues invocation of /sbin/init. | ||
| 1860 | * /sbin/tomoyo-init reads policy files in /etc/tomoyo/ directory and | ||
| 1861 | * writes to /sys/kernel/security/tomoyo/ interfaces. | ||
| 1862 | * | 1617 | * |
| 1863 | * Returns nothing. | 1618 | * Waits for access requests which violated policy in enforcing mode. |
| 1864 | */ | 1619 | */ |
| 1865 | void tomoyo_load_policy(const char *filename) | 1620 | static int tomoyo_poll_query(struct file *file, poll_table *wait) |
| 1866 | { | 1621 | { |
| 1867 | char *argv[2]; | 1622 | struct list_head *tmp; |
| 1868 | char *envp[3]; | 1623 | bool found = false; |
| 1624 | u8 i; | ||
| 1625 | for (i = 0; i < 2; i++) { | ||
| 1626 | spin_lock(&tomoyo_query_list_lock); | ||
| 1627 | list_for_each(tmp, &tomoyo_query_list) { | ||
| 1628 | struct tomoyo_query *ptr = | ||
| 1629 | list_entry(tmp, typeof(*ptr), list); | ||
| 1630 | if (ptr->answer) | ||
| 1631 | continue; | ||
| 1632 | found = true; | ||
| 1633 | break; | ||
| 1634 | } | ||
| 1635 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1636 | if (found) | ||
| 1637 | return POLLIN | POLLRDNORM; | ||
| 1638 | if (i) | ||
| 1639 | break; | ||
| 1640 | poll_wait(file, &tomoyo_query_wait, wait); | ||
| 1641 | } | ||
| 1642 | return 0; | ||
| 1643 | } | ||
| 1869 | 1644 | ||
| 1870 | if (tomoyo_policy_loaded) | 1645 | /** |
| 1646 | * tomoyo_read_query - Read access requests which violated policy in enforcing mode. | ||
| 1647 | * | ||
| 1648 | * @head: Pointer to "struct tomoyo_io_buffer". | ||
| 1649 | */ | ||
| 1650 | static void tomoyo_read_query(struct tomoyo_io_buffer *head) | ||
| 1651 | { | ||
| 1652 | struct list_head *tmp; | ||
| 1653 | int pos = 0; | ||
| 1654 | int len = 0; | ||
| 1655 | char *buf; | ||
| 1656 | if (head->r.w_pos) | ||
| 1871 | return; | 1657 | return; |
| 1872 | /* | 1658 | if (head->read_buf) { |
| 1873 | * Check filename is /sbin/init or /sbin/tomoyo-start. | 1659 | kfree(head->read_buf); |
| 1874 | * /sbin/tomoyo-start is a dummy filename in case where /sbin/init can't | 1660 | head->read_buf = NULL; |
| 1875 | * be passed. | 1661 | } |
| 1876 | * You can create /sbin/tomoyo-start by | 1662 | spin_lock(&tomoyo_query_list_lock); |
| 1877 | * "ln -s /bin/true /sbin/tomoyo-start". | 1663 | list_for_each(tmp, &tomoyo_query_list) { |
| 1878 | */ | 1664 | struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); |
| 1879 | if (strcmp(filename, "/sbin/init") && | 1665 | if (ptr->answer) |
| 1880 | strcmp(filename, "/sbin/tomoyo-start")) | 1666 | continue; |
| 1667 | if (pos++ != head->r.query_index) | ||
| 1668 | continue; | ||
| 1669 | len = ptr->query_len; | ||
| 1670 | break; | ||
| 1671 | } | ||
| 1672 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1673 | if (!len) { | ||
| 1674 | head->r.query_index = 0; | ||
| 1881 | return; | 1675 | return; |
| 1882 | if (!tomoyo_policy_loader_exists()) | 1676 | } |
| 1677 | buf = kzalloc(len, GFP_NOFS); | ||
| 1678 | if (!buf) | ||
| 1883 | return; | 1679 | return; |
| 1680 | pos = 0; | ||
| 1681 | spin_lock(&tomoyo_query_list_lock); | ||
| 1682 | list_for_each(tmp, &tomoyo_query_list) { | ||
| 1683 | struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); | ||
| 1684 | if (ptr->answer) | ||
| 1685 | continue; | ||
| 1686 | if (pos++ != head->r.query_index) | ||
| 1687 | continue; | ||
| 1688 | /* | ||
| 1689 | * Some query can be skipped because tomoyo_query_list | ||
| 1690 | * can change, but I don't care. | ||
| 1691 | */ | ||
| 1692 | if (len == ptr->query_len) | ||
| 1693 | memmove(buf, ptr->query, len); | ||
| 1694 | break; | ||
| 1695 | } | ||
| 1696 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1697 | if (buf[0]) { | ||
| 1698 | head->read_buf = buf; | ||
| 1699 | head->r.w[head->r.w_pos++] = buf; | ||
| 1700 | head->r.query_index++; | ||
| 1701 | } else { | ||
| 1702 | kfree(buf); | ||
| 1703 | } | ||
| 1704 | } | ||
| 1884 | 1705 | ||
| 1885 | printk(KERN_INFO "Calling %s to load policy. Please wait.\n", | 1706 | /** |
| 1886 | tomoyo_loader); | 1707 | * tomoyo_write_answer - Write the supervisor's decision. |
| 1887 | argv[0] = (char *) tomoyo_loader; | 1708 | * |
| 1888 | argv[1] = NULL; | 1709 | * @head: Pointer to "struct tomoyo_io_buffer". |
| 1889 | envp[0] = "HOME=/"; | 1710 | * |
| 1890 | envp[1] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin"; | 1711 | * Returns 0 on success, -EINVAL otherwise. |
| 1891 | envp[2] = NULL; | 1712 | */ |
| 1892 | call_usermodehelper(argv[0], argv, envp, 1); | 1713 | static int tomoyo_write_answer(struct tomoyo_io_buffer *head) |
| 1893 | 1714 | { | |
| 1894 | printk(KERN_INFO "TOMOYO: 2.2.0 2009/04/01\n"); | 1715 | char *data = head->write_buf; |
| 1895 | printk(KERN_INFO "Mandatory Access Control activated.\n"); | 1716 | struct list_head *tmp; |
| 1896 | tomoyo_policy_loaded = true; | 1717 | unsigned int serial; |
| 1897 | { /* Check all profiles currently assigned to domains are defined. */ | 1718 | unsigned int answer; |
| 1898 | struct tomoyo_domain_info *domain; | 1719 | spin_lock(&tomoyo_query_list_lock); |
| 1899 | list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) { | 1720 | list_for_each(tmp, &tomoyo_query_list) { |
| 1900 | const u8 profile = domain->profile; | 1721 | struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); |
| 1901 | if (tomoyo_profile_ptr[profile]) | 1722 | ptr->timer = 0; |
| 1902 | continue; | 1723 | } |
| 1903 | panic("Profile %u (used by '%s') not defined.\n", | 1724 | spin_unlock(&tomoyo_query_list_lock); |
| 1904 | profile, domain->domainname->name); | 1725 | if (sscanf(data, "A%u=%u", &serial, &answer) != 2) |
| 1905 | } | 1726 | return -EINVAL; |
| 1727 | spin_lock(&tomoyo_query_list_lock); | ||
| 1728 | list_for_each(tmp, &tomoyo_query_list) { | ||
| 1729 | struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); | ||
| 1730 | if (ptr->serial != serial) | ||
| 1731 | continue; | ||
| 1732 | if (!ptr->answer) | ||
| 1733 | ptr->answer = answer; | ||
| 1734 | break; | ||
| 1906 | } | 1735 | } |
| 1736 | spin_unlock(&tomoyo_query_list_lock); | ||
| 1737 | return 0; | ||
| 1907 | } | 1738 | } |
| 1908 | 1739 | ||
| 1909 | /** | 1740 | /** |
| @@ -1913,13 +1744,12 @@ void tomoyo_load_policy(const char *filename) | |||
| 1913 | * | 1744 | * |
| 1914 | * Returns version information. | 1745 | * Returns version information. |
| 1915 | */ | 1746 | */ |
| 1916 | static int tomoyo_read_version(struct tomoyo_io_buffer *head) | 1747 | static void tomoyo_read_version(struct tomoyo_io_buffer *head) |
| 1917 | { | 1748 | { |
| 1918 | if (!head->read_eof) { | 1749 | if (!head->r.eof) { |
| 1919 | tomoyo_io_printf(head, "2.2.0"); | 1750 | tomoyo_io_printf(head, "2.3.0"); |
| 1920 | head->read_eof = true; | 1751 | head->r.eof = true; |
| 1921 | } | 1752 | } |
| 1922 | return 0; | ||
| 1923 | } | 1753 | } |
| 1924 | 1754 | ||
| 1925 | /** | 1755 | /** |
| @@ -1929,18 +1759,17 @@ static int tomoyo_read_version(struct tomoyo_io_buffer *head) | |||
| 1929 | * | 1759 | * |
| 1930 | * Returns the current process's domainname. | 1760 | * Returns the current process's domainname. |
| 1931 | */ | 1761 | */ |
| 1932 | static int tomoyo_read_self_domain(struct tomoyo_io_buffer *head) | 1762 | static void tomoyo_read_self_domain(struct tomoyo_io_buffer *head) |
| 1933 | { | 1763 | { |
| 1934 | if (!head->read_eof) { | 1764 | if (!head->r.eof) { |
| 1935 | /* | 1765 | /* |
| 1936 | * tomoyo_domain()->domainname != NULL | 1766 | * tomoyo_domain()->domainname != NULL |
| 1937 | * because every process belongs to a domain and | 1767 | * because every process belongs to a domain and |
| 1938 | * the domain's name cannot be NULL. | 1768 | * the domain's name cannot be NULL. |
| 1939 | */ | 1769 | */ |
| 1940 | tomoyo_io_printf(head, "%s", tomoyo_domain()->domainname->name); | 1770 | tomoyo_io_printf(head, "%s", tomoyo_domain()->domainname->name); |
| 1941 | head->read_eof = true; | 1771 | head->r.eof = true; |
| 1942 | } | 1772 | } |
| 1943 | return 0; | ||
| 1944 | } | 1773 | } |
| 1945 | 1774 | ||
| 1946 | /** | 1775 | /** |
| @@ -1953,23 +1782,24 @@ static int tomoyo_read_self_domain(struct tomoyo_io_buffer *head) | |||
| 1953 | * | 1782 | * |
| 1954 | * Caller acquires tomoyo_read_lock(). | 1783 | * Caller acquires tomoyo_read_lock(). |
| 1955 | */ | 1784 | */ |
| 1956 | static int tomoyo_open_control(const u8 type, struct file *file) | 1785 | int tomoyo_open_control(const u8 type, struct file *file) |
| 1957 | { | 1786 | { |
| 1958 | struct tomoyo_io_buffer *head = kzalloc(sizeof(*head), GFP_NOFS); | 1787 | struct tomoyo_io_buffer *head = kzalloc(sizeof(*head), GFP_NOFS); |
| 1959 | 1788 | ||
| 1960 | if (!head) | 1789 | if (!head) |
| 1961 | return -ENOMEM; | 1790 | return -ENOMEM; |
| 1962 | mutex_init(&head->io_sem); | 1791 | mutex_init(&head->io_sem); |
| 1792 | head->type = type; | ||
| 1963 | switch (type) { | 1793 | switch (type) { |
| 1964 | case TOMOYO_DOMAINPOLICY: | 1794 | case TOMOYO_DOMAINPOLICY: |
| 1965 | /* /sys/kernel/security/tomoyo/domain_policy */ | 1795 | /* /sys/kernel/security/tomoyo/domain_policy */ |
| 1966 | head->write = tomoyo_write_domain_policy; | 1796 | head->write = tomoyo_write_domain; |
| 1967 | head->read = tomoyo_read_domain_policy; | 1797 | head->read = tomoyo_read_domain; |
| 1968 | break; | 1798 | break; |
| 1969 | case TOMOYO_EXCEPTIONPOLICY: | 1799 | case TOMOYO_EXCEPTIONPOLICY: |
| 1970 | /* /sys/kernel/security/tomoyo/exception_policy */ | 1800 | /* /sys/kernel/security/tomoyo/exception_policy */ |
| 1971 | head->write = tomoyo_write_exception_policy; | 1801 | head->write = tomoyo_write_exception; |
| 1972 | head->read = tomoyo_read_exception_policy; | 1802 | head->read = tomoyo_read_exception; |
| 1973 | break; | 1803 | break; |
| 1974 | case TOMOYO_SELFDOMAIN: | 1804 | case TOMOYO_SELFDOMAIN: |
| 1975 | /* /sys/kernel/security/tomoyo/self_domain */ | 1805 | /* /sys/kernel/security/tomoyo/self_domain */ |
| @@ -2001,10 +1831,15 @@ static int tomoyo_open_control(const u8 type, struct file *file) | |||
| 2001 | head->write = tomoyo_write_profile; | 1831 | head->write = tomoyo_write_profile; |
| 2002 | head->read = tomoyo_read_profile; | 1832 | head->read = tomoyo_read_profile; |
| 2003 | break; | 1833 | break; |
| 1834 | case TOMOYO_QUERY: /* /sys/kernel/security/tomoyo/query */ | ||
| 1835 | head->poll = tomoyo_poll_query; | ||
| 1836 | head->write = tomoyo_write_answer; | ||
| 1837 | head->read = tomoyo_read_query; | ||
| 1838 | break; | ||
| 2004 | case TOMOYO_MANAGER: | 1839 | case TOMOYO_MANAGER: |
| 2005 | /* /sys/kernel/security/tomoyo/manager */ | 1840 | /* /sys/kernel/security/tomoyo/manager */ |
| 2006 | head->write = tomoyo_write_manager_policy; | 1841 | head->write = tomoyo_write_manager; |
| 2007 | head->read = tomoyo_read_manager_policy; | 1842 | head->read = tomoyo_read_manager; |
| 2008 | break; | 1843 | break; |
| 2009 | } | 1844 | } |
| 2010 | if (!(file->f_mode & FMODE_READ)) { | 1845 | if (!(file->f_mode & FMODE_READ)) { |
| @@ -2013,7 +1848,9 @@ static int tomoyo_open_control(const u8 type, struct file *file) | |||
| 2013 | * for reading. | 1848 | * for reading. |
| 2014 | */ | 1849 | */ |
| 2015 | head->read = NULL; | 1850 | head->read = NULL; |
| 2016 | } else { | 1851 | head->poll = NULL; |
| 1852 | } else if (!head->poll) { | ||
| 1853 | /* Don't allocate read_buf for poll() access. */ | ||
| 2017 | if (!head->readbuf_size) | 1854 | if (!head->readbuf_size) |
| 2018 | head->readbuf_size = 4096 * 2; | 1855 | head->readbuf_size = 4096 * 2; |
| 2019 | head->read_buf = kzalloc(head->readbuf_size, GFP_NOFS); | 1856 | head->read_buf = kzalloc(head->readbuf_size, GFP_NOFS); |
| @@ -2037,7 +1874,8 @@ static int tomoyo_open_control(const u8 type, struct file *file) | |||
| 2037 | return -ENOMEM; | 1874 | return -ENOMEM; |
| 2038 | } | 1875 | } |
| 2039 | } | 1876 | } |
| 2040 | head->reader_idx = tomoyo_read_lock(); | 1877 | if (type != TOMOYO_QUERY) |
| 1878 | head->reader_idx = tomoyo_read_lock(); | ||
| 2041 | file->private_data = head; | 1879 | file->private_data = head; |
| 2042 | /* | 1880 | /* |
| 2043 | * Call the handler now if the file is | 1881 | * Call the handler now if the file is |
| @@ -2048,10 +1886,35 @@ static int tomoyo_open_control(const u8 type, struct file *file) | |||
| 2048 | */ | 1886 | */ |
| 2049 | if (type == TOMOYO_SELFDOMAIN) | 1887 | if (type == TOMOYO_SELFDOMAIN) |
| 2050 | tomoyo_read_control(file, NULL, 0); | 1888 | tomoyo_read_control(file, NULL, 0); |
| 1889 | /* | ||
| 1890 | * If the file is /sys/kernel/security/tomoyo/query , increment the | ||
| 1891 | * observer counter. | ||
| 1892 | * The obserber counter is used by tomoyo_supervisor() to see if | ||
| 1893 | * there is some process monitoring /sys/kernel/security/tomoyo/query. | ||
| 1894 | */ | ||
| 1895 | else if (type == TOMOYO_QUERY) | ||
| 1896 | atomic_inc(&tomoyo_query_observers); | ||
| 2051 | return 0; | 1897 | return 0; |
| 2052 | } | 1898 | } |
| 2053 | 1899 | ||
| 2054 | /** | 1900 | /** |
| 1901 | * tomoyo_poll_control - poll() for /sys/kernel/security/tomoyo/ interface. | ||
| 1902 | * | ||
| 1903 | * @file: Pointer to "struct file". | ||
| 1904 | * @wait: Pointer to "poll_table". | ||
| 1905 | * | ||
| 1906 | * Waits for read readiness. | ||
| 1907 | * /sys/kernel/security/tomoyo/query is handled by /usr/sbin/tomoyo-queryd . | ||
| 1908 | */ | ||
| 1909 | int tomoyo_poll_control(struct file *file, poll_table *wait) | ||
| 1910 | { | ||
| 1911 | struct tomoyo_io_buffer *head = file->private_data; | ||
| 1912 | if (!head->poll) | ||
| 1913 | return -ENOSYS; | ||
| 1914 | return head->poll(file, wait); | ||
| 1915 | } | ||
| 1916 | |||
| 1917 | /** | ||
| 2055 | * tomoyo_read_control - read() for /sys/kernel/security/tomoyo/ interface. | 1918 | * tomoyo_read_control - read() for /sys/kernel/security/tomoyo/ interface. |
| 2056 | * | 1919 | * |
| 2057 | * @file: Pointer to "struct file". | 1920 | * @file: Pointer to "struct file". |
| @@ -2062,36 +1925,23 @@ static int tomoyo_open_control(const u8 type, struct file *file) | |||
| 2062 | * | 1925 | * |
| 2063 | * Caller holds tomoyo_read_lock(). | 1926 | * Caller holds tomoyo_read_lock(). |
| 2064 | */ | 1927 | */ |
| 2065 | static int tomoyo_read_control(struct file *file, char __user *buffer, | 1928 | int tomoyo_read_control(struct file *file, char __user *buffer, |
| 2066 | const int buffer_len) | 1929 | const int buffer_len) |
| 2067 | { | 1930 | { |
| 2068 | int len = 0; | 1931 | int len; |
| 2069 | struct tomoyo_io_buffer *head = file->private_data; | 1932 | struct tomoyo_io_buffer *head = file->private_data; |
| 2070 | char *cp; | ||
| 2071 | 1933 | ||
| 2072 | if (!head->read) | 1934 | if (!head->read) |
| 2073 | return -ENOSYS; | 1935 | return -ENOSYS; |
| 2074 | if (mutex_lock_interruptible(&head->io_sem)) | 1936 | if (mutex_lock_interruptible(&head->io_sem)) |
| 2075 | return -EINTR; | 1937 | return -EINTR; |
| 2076 | /* Call the policy handler. */ | 1938 | head->read_user_buf = buffer; |
| 2077 | len = head->read(head); | 1939 | head->read_user_buf_avail = buffer_len; |
| 2078 | if (len < 0) | 1940 | if (tomoyo_flush(head)) |
| 2079 | goto out; | 1941 | /* Call the policy handler. */ |
| 2080 | /* Write to buffer. */ | 1942 | head->read(head); |
| 2081 | len = head->read_avail; | 1943 | tomoyo_flush(head); |
| 2082 | if (len > buffer_len) | 1944 | len = head->read_user_buf - buffer; |
| 2083 | len = buffer_len; | ||
| 2084 | if (!len) | ||
| 2085 | goto out; | ||
| 2086 | /* head->read_buf changes by some functions. */ | ||
| 2087 | cp = head->read_buf; | ||
| 2088 | if (copy_to_user(buffer, cp, len)) { | ||
| 2089 | len = -EFAULT; | ||
| 2090 | goto out; | ||
| 2091 | } | ||
| 2092 | head->read_avail -= len; | ||
| 2093 | memmove(cp, cp + len, head->read_avail); | ||
| 2094 | out: | ||
| 2095 | mutex_unlock(&head->io_sem); | 1945 | mutex_unlock(&head->io_sem); |
| 2096 | return len; | 1946 | return len; |
| 2097 | } | 1947 | } |
| @@ -2107,8 +1957,8 @@ static int tomoyo_read_control(struct file *file, char __user *buffer, | |||
| 2107 | * | 1957 | * |
| 2108 | * Caller holds tomoyo_read_lock(). | 1958 | * Caller holds tomoyo_read_lock(). |
| 2109 | */ | 1959 | */ |
| 2110 | static int tomoyo_write_control(struct file *file, const char __user *buffer, | 1960 | int tomoyo_write_control(struct file *file, const char __user *buffer, |
| 2111 | const int buffer_len) | 1961 | const int buffer_len) |
| 2112 | { | 1962 | { |
| 2113 | struct tomoyo_io_buffer *head = file->private_data; | 1963 | struct tomoyo_io_buffer *head = file->private_data; |
| 2114 | int error = buffer_len; | 1964 | int error = buffer_len; |
| @@ -2121,8 +1971,7 @@ static int tomoyo_write_control(struct file *file, const char __user *buffer, | |||
| 2121 | return -EFAULT; | 1971 | return -EFAULT; |
| 2122 | /* Don't allow updating policies by non manager programs. */ | 1972 | /* Don't allow updating policies by non manager programs. */ |
| 2123 | if (head->write != tomoyo_write_pid && | 1973 | if (head->write != tomoyo_write_pid && |
| 2124 | head->write != tomoyo_write_domain_policy && | 1974 | head->write != tomoyo_write_domain && !tomoyo_manager()) |
| 2125 | !tomoyo_is_policy_manager()) | ||
| 2126 | return -EPERM; | 1975 | return -EPERM; |
| 2127 | if (mutex_lock_interruptible(&head->io_sem)) | 1976 | if (mutex_lock_interruptible(&head->io_sem)) |
| 2128 | return -EINTR; | 1977 | return -EINTR; |
| @@ -2159,12 +2008,19 @@ static int tomoyo_write_control(struct file *file, const char __user *buffer, | |||
| 2159 | * | 2008 | * |
| 2160 | * Caller looses tomoyo_read_lock(). | 2009 | * Caller looses tomoyo_read_lock(). |
| 2161 | */ | 2010 | */ |
| 2162 | static int tomoyo_close_control(struct file *file) | 2011 | int tomoyo_close_control(struct file *file) |
| 2163 | { | 2012 | { |
| 2164 | struct tomoyo_io_buffer *head = file->private_data; | 2013 | struct tomoyo_io_buffer *head = file->private_data; |
| 2165 | const bool is_write = !!head->write_buf; | 2014 | const bool is_write = !!head->write_buf; |
| 2166 | 2015 | ||
| 2167 | tomoyo_read_unlock(head->reader_idx); | 2016 | /* |
| 2017 | * If the file is /sys/kernel/security/tomoyo/query , decrement the | ||
| 2018 | * observer counter. | ||
| 2019 | */ | ||
| 2020 | if (head->type == TOMOYO_QUERY) | ||
| 2021 | atomic_dec(&tomoyo_query_observers); | ||
| 2022 | else | ||
| 2023 | tomoyo_read_unlock(head->reader_idx); | ||
| 2168 | /* Release memory used for policy I/O. */ | 2024 | /* Release memory used for policy I/O. */ |
| 2169 | kfree(head->read_buf); | 2025 | kfree(head->read_buf); |
| 2170 | head->read_buf = NULL; | 2026 | head->read_buf = NULL; |
| @@ -2179,129 +2035,25 @@ static int tomoyo_close_control(struct file *file) | |||
| 2179 | } | 2035 | } |
| 2180 | 2036 | ||
| 2181 | /** | 2037 | /** |
| 2182 | * tomoyo_open - open() for /sys/kernel/security/tomoyo/ interface. | 2038 | * tomoyo_check_profile - Check all profiles currently assigned to domains are defined. |
| 2183 | * | ||
| 2184 | * @inode: Pointer to "struct inode". | ||
| 2185 | * @file: Pointer to "struct file". | ||
| 2186 | * | ||
| 2187 | * Returns 0 on success, negative value otherwise. | ||
| 2188 | */ | ||
| 2189 | static int tomoyo_open(struct inode *inode, struct file *file) | ||
| 2190 | { | ||
| 2191 | const int key = ((u8 *) file->f_path.dentry->d_inode->i_private) | ||
| 2192 | - ((u8 *) NULL); | ||
| 2193 | return tomoyo_open_control(key, file); | ||
| 2194 | } | ||
| 2195 | |||
| 2196 | /** | ||
| 2197 | * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. | ||
| 2198 | * | ||
| 2199 | * @inode: Pointer to "struct inode". | ||
| 2200 | * @file: Pointer to "struct file". | ||
| 2201 | * | ||
| 2202 | * Returns 0 on success, negative value otherwise. | ||
| 2203 | */ | ||
| 2204 | static int tomoyo_release(struct inode *inode, struct file *file) | ||
| 2205 | { | ||
| 2206 | return tomoyo_close_control(file); | ||
| 2207 | } | ||
| 2208 | |||
| 2209 | /** | ||
| 2210 | * tomoyo_read - read() for /sys/kernel/security/tomoyo/ interface. | ||
| 2211 | * | ||
| 2212 | * @file: Pointer to "struct file". | ||
| 2213 | * @buf: Pointer to buffer. | ||
| 2214 | * @count: Size of @buf. | ||
| 2215 | * @ppos: Unused. | ||
| 2216 | * | ||
| 2217 | * Returns bytes read on success, negative value otherwise. | ||
| 2218 | */ | 2039 | */ |
| 2219 | static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, | 2040 | void tomoyo_check_profile(void) |
| 2220 | loff_t *ppos) | ||
| 2221 | { | 2041 | { |
| 2222 | return tomoyo_read_control(file, buf, count); | 2042 | struct tomoyo_domain_info *domain; |
| 2223 | } | 2043 | const int idx = tomoyo_read_lock(); |
| 2224 | 2044 | tomoyo_policy_loaded = true; | |
| 2225 | /** | 2045 | /* Check all profiles currently assigned to domains are defined. */ |
| 2226 | * tomoyo_write - write() for /sys/kernel/security/tomoyo/ interface. | 2046 | list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) { |
| 2227 | * | 2047 | const u8 profile = domain->profile; |
| 2228 | * @file: Pointer to "struct file". | 2048 | if (tomoyo_profile_ptr[profile]) |
| 2229 | * @buf: Pointer to buffer. | 2049 | continue; |
| 2230 | * @count: Size of @buf. | 2050 | panic("Profile %u (used by '%s') not defined.\n", |
| 2231 | * @ppos: Unused. | 2051 | profile, domain->domainname->name); |
| 2232 | * | 2052 | } |
| 2233 | * Returns @count on success, negative value otherwise. | 2053 | tomoyo_read_unlock(idx); |
| 2234 | */ | 2054 | if (tomoyo_profile_version != 20090903) |
| 2235 | static ssize_t tomoyo_write(struct file *file, const char __user *buf, | 2055 | panic("Profile version %u is not supported.\n", |
| 2236 | size_t count, loff_t *ppos) | 2056 | tomoyo_profile_version); |
| 2237 | { | 2057 | printk(KERN_INFO "TOMOYO: 2.3.0\n"); |
| 2238 | return tomoyo_write_control(file, buf, count); | 2058 | printk(KERN_INFO "Mandatory Access Control activated.\n"); |
| 2239 | } | ||
| 2240 | |||
| 2241 | /* | ||
| 2242 | * tomoyo_operations is a "struct file_operations" which is used for handling | ||
| 2243 | * /sys/kernel/security/tomoyo/ interface. | ||
| 2244 | * | ||
| 2245 | * Some files under /sys/kernel/security/tomoyo/ directory accept open(O_RDWR). | ||
| 2246 | * See tomoyo_io_buffer for internals. | ||
| 2247 | */ | ||
| 2248 | static const struct file_operations tomoyo_operations = { | ||
| 2249 | .open = tomoyo_open, | ||
| 2250 | .release = tomoyo_release, | ||
| 2251 | .read = tomoyo_read, | ||
| 2252 | .write = tomoyo_write, | ||
| 2253 | }; | ||
| 2254 | |||
| 2255 | /** | ||
| 2256 | * tomoyo_create_entry - Create interface files under /sys/kernel/security/tomoyo/ directory. | ||
| 2257 | * | ||
| 2258 | * @name: The name of the interface file. | ||
| 2259 | * @mode: The permission of the interface file. | ||
| 2260 | * @parent: The parent directory. | ||
| 2261 | * @key: Type of interface. | ||
| 2262 | * | ||
| 2263 | * Returns nothing. | ||
| 2264 | */ | ||
| 2265 | static void __init tomoyo_create_entry(const char *name, const mode_t mode, | ||
| 2266 | struct dentry *parent, const u8 key) | ||
| 2267 | { | ||
| 2268 | securityfs_create_file(name, mode, parent, ((u8 *) NULL) + key, | ||
| 2269 | &tomoyo_operations); | ||
| 2270 | } | ||
| 2271 | |||
| 2272 | /** | ||
| 2273 | * tomoyo_initerface_init - Initialize /sys/kernel/security/tomoyo/ interface. | ||
| 2274 | * | ||
| 2275 | * Returns 0. | ||
| 2276 | */ | ||
| 2277 | static int __init tomoyo_initerface_init(void) | ||
| 2278 | { | ||
| 2279 | struct dentry *tomoyo_dir; | ||
| 2280 | |||
| 2281 | /* Don't create securityfs entries unless registered. */ | ||
| 2282 | if (current_cred()->security != &tomoyo_kernel_domain) | ||
| 2283 | return 0; | ||
| 2284 | |||
| 2285 | tomoyo_dir = securityfs_create_dir("tomoyo", NULL); | ||
| 2286 | tomoyo_create_entry("domain_policy", 0600, tomoyo_dir, | ||
| 2287 | TOMOYO_DOMAINPOLICY); | ||
| 2288 | tomoyo_create_entry("exception_policy", 0600, tomoyo_dir, | ||
| 2289 | TOMOYO_EXCEPTIONPOLICY); | ||
| 2290 | tomoyo_create_entry("self_domain", 0400, tomoyo_dir, | ||
| 2291 | TOMOYO_SELFDOMAIN); | ||
| 2292 | tomoyo_create_entry(".domain_status", 0600, tomoyo_dir, | ||
| 2293 | TOMOYO_DOMAIN_STATUS); | ||
| 2294 | tomoyo_create_entry(".process_status", 0600, tomoyo_dir, | ||
| 2295 | TOMOYO_PROCESS_STATUS); | ||
| 2296 | tomoyo_create_entry("meminfo", 0600, tomoyo_dir, | ||
| 2297 | TOMOYO_MEMINFO); | ||
| 2298 | tomoyo_create_entry("profile", 0600, tomoyo_dir, | ||
| 2299 | TOMOYO_PROFILE); | ||
| 2300 | tomoyo_create_entry("manager", 0600, tomoyo_dir, | ||
| 2301 | TOMOYO_MANAGER); | ||
| 2302 | tomoyo_create_entry("version", 0400, tomoyo_dir, | ||
| 2303 | TOMOYO_VERSION); | ||
| 2304 | return 0; | ||
| 2305 | } | 2059 | } |
| 2306 | |||
| 2307 | fs_initcall(tomoyo_initerface_init); | ||
