aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>2010-06-16 03:20:24 -0400
committerJames Morris <jmorris@namei.org>2010-08-02 01:34:31 -0400
commit05336dee9f5a23c042e5938b42f996dd35e31ee6 (patch)
treec5dd4abb5bf15e06b399aa1b1e5db56bd848c762 /security
parent9ee0c823c18119914283358b35a1c3ebb14c2f90 (diff)
TOMOYO: Use common code for open and mkdir etc.
tomoyo_file_perm() and tomoyo_path_permission() are similar. We can embed tomoyo_file_perm() into tomoyo_path_permission(). Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security')
-rw-r--r--security/tomoyo/common.h2
-rw-r--r--security/tomoyo/domain.c2
-rw-r--r--security/tomoyo/file.c102
3 files changed, 22 insertions, 84 deletions
diff --git a/security/tomoyo/common.h b/security/tomoyo/common.h
index c8ab7553c48c..203454025410 100644
--- a/security/tomoyo/common.h
+++ b/security/tomoyo/common.h
@@ -880,7 +880,7 @@ int tomoyo_write_memory_quota(struct tomoyo_io_buffer *head);
880 880
881/* Initialize mm related code. */ 881/* Initialize mm related code. */
882void __init tomoyo_mm_init(void); 882void __init tomoyo_mm_init(void);
883int tomoyo_check_exec_perm(struct tomoyo_request_info *r, 883int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation,
884 const struct tomoyo_path_info *filename); 884 const struct tomoyo_path_info *filename);
885int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, 885int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
886 struct path *path, const int flag); 886 struct path *path, const int flag);
diff --git a/security/tomoyo/domain.c b/security/tomoyo/domain.c
index fe621af46c2e..35317e783f34 100644
--- a/security/tomoyo/domain.c
+++ b/security/tomoyo/domain.c
@@ -960,7 +960,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
960 } 960 }
961 961
962 /* Check execute permission. */ 962 /* Check execute permission. */
963 retval = tomoyo_check_exec_perm(&r, &rn); 963 retval = tomoyo_path_permission(&r, TOMOYO_TYPE_EXECUTE, &rn);
964 if (retval == TOMOYO_RETRY_REQUEST) 964 if (retval == TOMOYO_RETRY_REQUEST)
965 goto retry; 965 goto retry;
966 if (retval < 0) 966 if (retval < 0)
diff --git a/security/tomoyo/file.c b/security/tomoyo/file.c
index 8015719926d5..50875d7e8603 100644
--- a/security/tomoyo/file.c
+++ b/security/tomoyo/file.c
@@ -670,62 +670,6 @@ static int tomoyo_path_acl(const struct tomoyo_request_info *r,
670 return error; 670 return error;
671} 671}
672 672
673/**
674 * tomoyo_file_perm - Check permission for opening files.
675 *
676 * @r: Pointer to "struct tomoyo_request_info".
677 * @filename: Filename to check.
678 * @mode: Mode ("read" or "write" or "read/write" or "execute").
679 *
680 * Returns 0 on success, negative value otherwise.
681 *
682 * Caller holds tomoyo_read_lock().
683 */
684static int tomoyo_file_perm(struct tomoyo_request_info *r,
685 const struct tomoyo_path_info *filename,
686 const u8 mode)
687{
688 const char *msg = "<unknown>";
689 int error = 0;
690 u32 perm = 0;
691
692 if (!filename)
693 return 0;
694
695 if (mode == 6) {
696 msg = tomoyo_path2keyword(TOMOYO_TYPE_READ_WRITE);
697 perm = 1 << TOMOYO_TYPE_READ_WRITE;
698 } else if (mode == 4) {
699 msg = tomoyo_path2keyword(TOMOYO_TYPE_READ);
700 perm = 1 << TOMOYO_TYPE_READ;
701 } else if (mode == 2) {
702 msg = tomoyo_path2keyword(TOMOYO_TYPE_WRITE);
703 perm = 1 << TOMOYO_TYPE_WRITE;
704 } else if (mode == 1) {
705 msg = tomoyo_path2keyword(TOMOYO_TYPE_EXECUTE);
706 perm = 1 << TOMOYO_TYPE_EXECUTE;
707 } else
708 BUG();
709 do {
710 error = tomoyo_path_acl(r, filename, perm);
711 if (error && mode == 4 && !r->domain->ignore_global_allow_read
712 && tomoyo_is_globally_readable_file(filename))
713 error = 0;
714 if (!error)
715 break;
716 tomoyo_warn_log(r, "%s %s", msg, filename->name);
717 error = tomoyo_supervisor(r, "allow_%s %s\n", msg,
718 tomoyo_file_pattern(filename));
719 /*
720 * Do not retry for execute request, for alias may have
721 * changed.
722 */
723 } while (error == TOMOYO_RETRY_REQUEST && mode != 1);
724 if (r->mode != TOMOYO_CONFIG_ENFORCING)
725 error = 0;
726 return error;
727}
728
729static bool tomoyo_same_path_acl(const struct tomoyo_acl_info *a, 673static bool tomoyo_same_path_acl(const struct tomoyo_acl_info *a,
730 const struct tomoyo_acl_info *b) 674 const struct tomoyo_acl_info *b)
731{ 675{
@@ -1018,8 +962,8 @@ static int tomoyo_path2_acl(const struct tomoyo_request_info *r, const u8 type,
1018 * 962 *
1019 * Caller holds tomoyo_read_lock(). 963 * Caller holds tomoyo_read_lock().
1020 */ 964 */
1021static int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation, 965int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation,
1022 const struct tomoyo_path_info *filename) 966 const struct tomoyo_path_info *filename)
1023{ 967{
1024 const char *msg; 968 const char *msg;
1025 int error; 969 int error;
@@ -1031,15 +975,22 @@ static int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation,
1031 return 0; 975 return 0;
1032 do { 976 do {
1033 error = tomoyo_path_acl(r, filename, 1 << operation); 977 error = tomoyo_path_acl(r, filename, 1 << operation);
978 if (error && operation == TOMOYO_TYPE_READ &&
979 !r->domain->ignore_global_allow_read &&
980 tomoyo_is_globally_readable_file(filename))
981 error = 0;
1034 if (!error) 982 if (!error)
1035 break; 983 break;
1036 msg = tomoyo_path2keyword(operation); 984 msg = tomoyo_path2keyword(operation);
1037 tomoyo_warn_log(r, "%s %s", msg, filename->name); 985 tomoyo_warn_log(r, "%s %s", msg, filename->name);
1038 error = tomoyo_supervisor(r, "allow_%s %s\n", msg, 986 error = tomoyo_supervisor(r, "allow_%s %s\n", msg,
1039 tomoyo_file_pattern(filename)); 987 tomoyo_file_pattern(filename));
1040 } while (error == TOMOYO_RETRY_REQUEST); 988 /*
1041 if (r->mode != TOMOYO_CONFIG_ENFORCING) 989 * Do not retry for execute request, for alias may have
1042 error = 0; 990 * changed.
991 */
992 } while (error == TOMOYO_RETRY_REQUEST &&
993 operation != TOMOYO_TYPE_EXECUTE);
1043 /* 994 /*
1044 * Since "allow_truncate" doesn't imply "allow_rewrite" permission, 995 * Since "allow_truncate" doesn't imply "allow_rewrite" permission,
1045 * we need to check "allow_rewrite" permission if the filename is 996 * we need to check "allow_rewrite" permission if the filename is
@@ -1202,8 +1153,6 @@ static int tomoyo_path_number_perm2(struct tomoyo_request_info *r,
1202 tomoyo_file_pattern(filename), 1153 tomoyo_file_pattern(filename),
1203 buffer); 1154 buffer);
1204 } while (error == TOMOYO_RETRY_REQUEST); 1155 } while (error == TOMOYO_RETRY_REQUEST);
1205 if (r->mode != TOMOYO_CONFIG_ENFORCING)
1206 error = 0;
1207 return error; 1156 return error;
1208} 1157}
1209 1158
@@ -1242,24 +1191,6 @@ int tomoyo_path_number_perm(const u8 type, struct path *path,
1242} 1191}
1243 1192
1244/** 1193/**
1245 * tomoyo_check_exec_perm - Check permission for "execute".
1246 *
1247 * @r: Pointer to "struct tomoyo_request_info".
1248 * @filename: Check permission for "execute".
1249 *
1250 * Returns 0 on success, negativevalue otherwise.
1251 *
1252 * Caller holds tomoyo_read_lock().
1253 */
1254int tomoyo_check_exec_perm(struct tomoyo_request_info *r,
1255 const struct tomoyo_path_info *filename)
1256{
1257 if (r->mode == TOMOYO_CONFIG_DISABLED)
1258 return 0;
1259 return tomoyo_file_perm(r, filename, 1);
1260}
1261
1262/**
1263 * tomoyo_check_open_permission - Check permission for "read" and "write". 1194 * tomoyo_check_open_permission - Check permission for "read" and "write".
1264 * 1195 *
1265 * @domain: Pointer to "struct tomoyo_domain_info". 1196 * @domain: Pointer to "struct tomoyo_domain_info".
@@ -1305,11 +1236,18 @@ int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
1305 if (!error && acc_mode && 1236 if (!error && acc_mode &&
1306 tomoyo_init_request_info(&r, domain, TOMOYO_MAC_FILE_OPEN) 1237 tomoyo_init_request_info(&r, domain, TOMOYO_MAC_FILE_OPEN)
1307 != TOMOYO_CONFIG_DISABLED) { 1238 != TOMOYO_CONFIG_DISABLED) {
1239 u8 operation;
1308 if (!buf.name && !tomoyo_get_realpath(&buf, path)) { 1240 if (!buf.name && !tomoyo_get_realpath(&buf, path)) {
1309 error = -ENOMEM; 1241 error = -ENOMEM;
1310 goto out; 1242 goto out;
1311 } 1243 }
1312 error = tomoyo_file_perm(&r, &buf, acc_mode); 1244 if (acc_mode == (MAY_READ | MAY_WRITE))
1245 operation = TOMOYO_TYPE_READ_WRITE;
1246 else if (acc_mode == MAY_READ)
1247 operation = TOMOYO_TYPE_READ;
1248 else
1249 operation = TOMOYO_TYPE_WRITE;
1250 error = tomoyo_path_permission(&r, operation, &buf);
1313 } 1251 }
1314 out: 1252 out:
1315 kfree(buf.name); 1253 kfree(buf.name);