Blame view

security/tomoyo/common.c 75.7 KB
9590837b8   Kentaro Takeda   Common functions ...
1
2
3
  /*
   * security/tomoyo/common.c
   *
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
4
   * Copyright (C) 2005-2011  NTT DATA CORPORATION
9590837b8   Kentaro Takeda   Common functions ...
5
6
7
   */
  
  #include <linux/uaccess.h>
5a0e3ad6a   Tejun Heo   include cleanup: ...
8
  #include <linux/slab.h>
9590837b8   Kentaro Takeda   Common functions ...
9
  #include <linux/security.h>
9590837b8   Kentaro Takeda   Common functions ...
10
  #include "common.h"
9590837b8   Kentaro Takeda   Common functions ...
11

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
12
13
14
15
16
17
  /* String table for operation mode. */
  const char * const tomoyo_mode[TOMOYO_CONFIG_MAX_MODE] = {
  	[TOMOYO_CONFIG_DISABLED]   = "disabled",
  	[TOMOYO_CONFIG_LEARNING]   = "learning",
  	[TOMOYO_CONFIG_PERMISSIVE] = "permissive",
  	[TOMOYO_CONFIG_ENFORCING]  = "enforcing"
9590837b8   Kentaro Takeda   Common functions ...
18
  };
9590837b8   Kentaro Takeda   Common functions ...
19

57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
20
  /* String table for /sys/kernel/security/tomoyo/profile */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
21
  const char * const tomoyo_mac_keywords[TOMOYO_MAX_MAC_INDEX
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
22
  				       + TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
23
  	/* CONFIG::file group */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  	[TOMOYO_MAC_FILE_EXECUTE]    = "execute",
  	[TOMOYO_MAC_FILE_OPEN]       = "open",
  	[TOMOYO_MAC_FILE_CREATE]     = "create",
  	[TOMOYO_MAC_FILE_UNLINK]     = "unlink",
  	[TOMOYO_MAC_FILE_GETATTR]    = "getattr",
  	[TOMOYO_MAC_FILE_MKDIR]      = "mkdir",
  	[TOMOYO_MAC_FILE_RMDIR]      = "rmdir",
  	[TOMOYO_MAC_FILE_MKFIFO]     = "mkfifo",
  	[TOMOYO_MAC_FILE_MKSOCK]     = "mksock",
  	[TOMOYO_MAC_FILE_TRUNCATE]   = "truncate",
  	[TOMOYO_MAC_FILE_SYMLINK]    = "symlink",
  	[TOMOYO_MAC_FILE_MKBLOCK]    = "mkblock",
  	[TOMOYO_MAC_FILE_MKCHAR]     = "mkchar",
  	[TOMOYO_MAC_FILE_LINK]       = "link",
  	[TOMOYO_MAC_FILE_RENAME]     = "rename",
  	[TOMOYO_MAC_FILE_CHMOD]      = "chmod",
  	[TOMOYO_MAC_FILE_CHOWN]      = "chown",
  	[TOMOYO_MAC_FILE_CHGRP]      = "chgrp",
  	[TOMOYO_MAC_FILE_IOCTL]      = "ioctl",
  	[TOMOYO_MAC_FILE_CHROOT]     = "chroot",
  	[TOMOYO_MAC_FILE_MOUNT]      = "mount",
  	[TOMOYO_MAC_FILE_UMOUNT]     = "unmount",
  	[TOMOYO_MAC_FILE_PIVOT_ROOT] = "pivot_root",
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  	/* CONFIG::network group */
  	[TOMOYO_MAC_NETWORK_INET_STREAM_BIND]       = "inet_stream_bind",
  	[TOMOYO_MAC_NETWORK_INET_STREAM_LISTEN]     = "inet_stream_listen",
  	[TOMOYO_MAC_NETWORK_INET_STREAM_CONNECT]    = "inet_stream_connect",
  	[TOMOYO_MAC_NETWORK_INET_DGRAM_BIND]        = "inet_dgram_bind",
  	[TOMOYO_MAC_NETWORK_INET_DGRAM_SEND]        = "inet_dgram_send",
  	[TOMOYO_MAC_NETWORK_INET_RAW_BIND]          = "inet_raw_bind",
  	[TOMOYO_MAC_NETWORK_INET_RAW_SEND]          = "inet_raw_send",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_BIND]       = "unix_stream_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_LISTEN]     = "unix_stream_listen",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_CONNECT]    = "unix_stream_connect",
  	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_BIND]        = "unix_dgram_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_SEND]        = "unix_dgram_send",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_BIND]    = "unix_seqpacket_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_LISTEN]  = "unix_seqpacket_listen",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_CONNECT] = "unix_seqpacket_connect",
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
63
64
65
  	/* CONFIG::misc group */
  	[TOMOYO_MAC_ENVIRON] = "env",
  	/* CONFIG group */
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
66
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_FILE] = "file",
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
67
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_NETWORK] = "network",
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
68
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_MISC] = "misc",
9590837b8   Kentaro Takeda   Common functions ...
69
  };
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
70
71
72
73
74
75
76
77
78
79
80
81
  /* String table for conditions. */
  const char * const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] = {
  	[TOMOYO_TASK_UID]             = "task.uid",
  	[TOMOYO_TASK_EUID]            = "task.euid",
  	[TOMOYO_TASK_SUID]            = "task.suid",
  	[TOMOYO_TASK_FSUID]           = "task.fsuid",
  	[TOMOYO_TASK_GID]             = "task.gid",
  	[TOMOYO_TASK_EGID]            = "task.egid",
  	[TOMOYO_TASK_SGID]            = "task.sgid",
  	[TOMOYO_TASK_FSGID]           = "task.fsgid",
  	[TOMOYO_TASK_PID]             = "task.pid",
  	[TOMOYO_TASK_PPID]            = "task.ppid",
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
82
83
  	[TOMOYO_EXEC_ARGC]            = "exec.argc",
  	[TOMOYO_EXEC_ENVC]            = "exec.envc",
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
  	[TOMOYO_TYPE_IS_SOCKET]       = "socket",
  	[TOMOYO_TYPE_IS_SYMLINK]      = "symlink",
  	[TOMOYO_TYPE_IS_FILE]         = "file",
  	[TOMOYO_TYPE_IS_BLOCK_DEV]    = "block",
  	[TOMOYO_TYPE_IS_DIRECTORY]    = "directory",
  	[TOMOYO_TYPE_IS_CHAR_DEV]     = "char",
  	[TOMOYO_TYPE_IS_FIFO]         = "fifo",
  	[TOMOYO_MODE_SETUID]          = "setuid",
  	[TOMOYO_MODE_SETGID]          = "setgid",
  	[TOMOYO_MODE_STICKY]          = "sticky",
  	[TOMOYO_MODE_OWNER_READ]      = "owner_read",
  	[TOMOYO_MODE_OWNER_WRITE]     = "owner_write",
  	[TOMOYO_MODE_OWNER_EXECUTE]   = "owner_execute",
  	[TOMOYO_MODE_GROUP_READ]      = "group_read",
  	[TOMOYO_MODE_GROUP_WRITE]     = "group_write",
  	[TOMOYO_MODE_GROUP_EXECUTE]   = "group_execute",
  	[TOMOYO_MODE_OTHERS_READ]     = "others_read",
  	[TOMOYO_MODE_OTHERS_WRITE]    = "others_write",
  	[TOMOYO_MODE_OTHERS_EXECUTE]  = "others_execute",
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
103
104
  	[TOMOYO_EXEC_REALPATH]        = "exec.realpath",
  	[TOMOYO_SYMLINK_TARGET]       = "symlink.target",
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
  	[TOMOYO_PATH1_UID]            = "path1.uid",
  	[TOMOYO_PATH1_GID]            = "path1.gid",
  	[TOMOYO_PATH1_INO]            = "path1.ino",
  	[TOMOYO_PATH1_MAJOR]          = "path1.major",
  	[TOMOYO_PATH1_MINOR]          = "path1.minor",
  	[TOMOYO_PATH1_PERM]           = "path1.perm",
  	[TOMOYO_PATH1_TYPE]           = "path1.type",
  	[TOMOYO_PATH1_DEV_MAJOR]      = "path1.dev_major",
  	[TOMOYO_PATH1_DEV_MINOR]      = "path1.dev_minor",
  	[TOMOYO_PATH2_UID]            = "path2.uid",
  	[TOMOYO_PATH2_GID]            = "path2.gid",
  	[TOMOYO_PATH2_INO]            = "path2.ino",
  	[TOMOYO_PATH2_MAJOR]          = "path2.major",
  	[TOMOYO_PATH2_MINOR]          = "path2.minor",
  	[TOMOYO_PATH2_PERM]           = "path2.perm",
  	[TOMOYO_PATH2_TYPE]           = "path2.type",
  	[TOMOYO_PATH2_DEV_MAJOR]      = "path2.dev_major",
  	[TOMOYO_PATH2_DEV_MINOR]      = "path2.dev_minor",
  	[TOMOYO_PATH1_PARENT_UID]     = "path1.parent.uid",
  	[TOMOYO_PATH1_PARENT_GID]     = "path1.parent.gid",
  	[TOMOYO_PATH1_PARENT_INO]     = "path1.parent.ino",
  	[TOMOYO_PATH1_PARENT_PERM]    = "path1.parent.perm",
  	[TOMOYO_PATH2_PARENT_UID]     = "path2.parent.uid",
  	[TOMOYO_PATH2_PARENT_GID]     = "path2.parent.gid",
  	[TOMOYO_PATH2_PARENT_INO]     = "path2.parent.ino",
  	[TOMOYO_PATH2_PARENT_PERM]    = "path2.parent.perm",
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
131
  };
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
132
133
  /* String table for PREFERENCE keyword. */
  static const char * const tomoyo_pref_keywords[TOMOYO_MAX_PREF] = {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
134
  	[TOMOYO_PREF_MAX_AUDIT_LOG]      = "max_audit_log",
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
135
136
  	[TOMOYO_PREF_MAX_LEARNING_ENTRY] = "max_learning_entry",
  };
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
137
138
139
140
141
142
143
144
145
146
147
148
149
150
  /* String table for path operation. */
  const char * const tomoyo_path_keyword[TOMOYO_MAX_PATH_OPERATION] = {
  	[TOMOYO_TYPE_EXECUTE]    = "execute",
  	[TOMOYO_TYPE_READ]       = "read",
  	[TOMOYO_TYPE_WRITE]      = "write",
  	[TOMOYO_TYPE_APPEND]     = "append",
  	[TOMOYO_TYPE_UNLINK]     = "unlink",
  	[TOMOYO_TYPE_GETATTR]    = "getattr",
  	[TOMOYO_TYPE_RMDIR]      = "rmdir",
  	[TOMOYO_TYPE_TRUNCATE]   = "truncate",
  	[TOMOYO_TYPE_SYMLINK]    = "symlink",
  	[TOMOYO_TYPE_CHROOT]     = "chroot",
  	[TOMOYO_TYPE_UMOUNT]     = "unmount",
  };
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
151
152
153
154
155
156
157
  /* String table for socket's operation. */
  const char * const tomoyo_socket_keyword[TOMOYO_MAX_NETWORK_OPERATION] = {
  	[TOMOYO_NETWORK_BIND]    = "bind",
  	[TOMOYO_NETWORK_LISTEN]  = "listen",
  	[TOMOYO_NETWORK_CONNECT] = "connect",
  	[TOMOYO_NETWORK_SEND]    = "send",
  };
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
158
159
160
  /* String table for categories. */
  static const char * const tomoyo_category_keywords
  [TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
161
162
163
  	[TOMOYO_MAC_CATEGORY_FILE]    = "file",
  	[TOMOYO_MAC_CATEGORY_NETWORK] = "network",
  	[TOMOYO_MAC_CATEGORY_MISC]    = "misc",
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
164
  };
9590837b8   Kentaro Takeda   Common functions ...
165
166
167
168
  /* Permit policy management by non-root user? */
  static bool tomoyo_manage_by_non_root;
  
  /* Utility functions. */
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
169
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
170
171
172
173
   * tomoyo_yesno - Return "yes" or "no".
   *
   * @value: Bool value.
   */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
174
  const char *tomoyo_yesno(const unsigned int value)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
175
176
177
  {
  	return value ? "yes" : "no";
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
178
179
180
181
182
183
184
185
186
  /**
   * tomoyo_addprintf - strncat()-like-snprintf().
   *
   * @buffer: Buffer to write to. Must be '\0'-terminated.
   * @len:    Size of @buffer.
   * @fmt:    The printf()'s format string, followed by parameters.
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
187
188
189
190
191
192
193
194
  static void tomoyo_addprintf(char *buffer, int len, const char *fmt, ...)
  {
  	va_list args;
  	const int pos = strlen(buffer);
  	va_start(args, fmt);
  	vsnprintf(buffer + pos, len - pos - 1, fmt, args);
  	va_end(args);
  }
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
195
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
196
   * tomoyo_flush - Flush queued string to userspace's buffer.
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
197
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
198
   * @head:   Pointer to "struct tomoyo_io_buffer".
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
199
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
200
   * Returns true if all data was flushed, false otherwise.
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
201
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
202
  static bool tomoyo_flush(struct tomoyo_io_buffer *head)
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
203
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
204
205
  	while (head->r.w_pos) {
  		const char *w = head->r.w[0];
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
206
  		size_t len = strlen(w);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
207
208
209
210
211
212
213
214
215
216
217
  		if (len) {
  			if (len > head->read_user_buf_avail)
  				len = head->read_user_buf_avail;
  			if (!len)
  				return false;
  			if (copy_to_user(head->read_user_buf, w, len))
  				return false;
  			head->read_user_buf_avail -= len;
  			head->read_user_buf += len;
  			w += len;
  		}
c0fa797ae   Tetsuo Handa   TOMOYO: Fix infin...
218
219
  		head->r.w[0] = w;
  		if (*w)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
220
  			return false;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
221
  		/* Add '\0' for audit logs and query. */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
222
223
224
225
226
227
228
229
230
231
232
233
234
  		if (head->poll) {
  			if (!head->read_user_buf_avail ||
  			    copy_to_user(head->read_user_buf, "", 1))
  				return false;
  			head->read_user_buf_avail--;
  			head->read_user_buf++;
  		}
  		head->r.w_pos--;
  		for (len = 0; len < head->r.w_pos; len++)
  			head->r.w[len] = head->r.w[len + 1];
  	}
  	head->r.avail = 0;
  	return true;
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
235
236
237
  }
  
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
238
   * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
239
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
240
241
   * @head:   Pointer to "struct tomoyo_io_buffer".
   * @string: String to print.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
242
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
243
244
245
   * Note that @string has to be kept valid until @head is kfree()d.
   * This means that char[] allocated on stack memory cannot be passed to
   * this function. Use tomoyo_io_printf() for char[] allocated on stack memory.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
246
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
247
  static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string)
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
248
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
249
250
251
252
253
  	if (head->r.w_pos < TOMOYO_MAX_IO_READ_QUEUE) {
  		head->r.w[head->r.w_pos++] = string;
  		tomoyo_flush(head);
  	} else
  		WARN_ON(1);
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
254
  }
778c4a4d6   Tetsuo Handa   TOMOYO: Fix make ...
255
256
  static void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt,
  			     ...) __printf(2, 3);
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
257
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
258
   * tomoyo_io_printf - printf() to "struct tomoyo_io_buffer" structure.
9590837b8   Kentaro Takeda   Common functions ...
259
260
261
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @fmt:  The printf()'s format string, followed by parameters.
9590837b8   Kentaro Takeda   Common functions ...
262
   */
778c4a4d6   Tetsuo Handa   TOMOYO: Fix make ...
263
264
  static void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt,
  			     ...)
9590837b8   Kentaro Takeda   Common functions ...
265
266
  {
  	va_list args;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
267
268
  	size_t len;
  	size_t pos = head->r.avail;
9590837b8   Kentaro Takeda   Common functions ...
269
  	int size = head->readbuf_size - pos;
9590837b8   Kentaro Takeda   Common functions ...
270
  	if (size <= 0)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
271
  		return;
9590837b8   Kentaro Takeda   Common functions ...
272
  	va_start(args, fmt);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
273
  	len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1;
9590837b8   Kentaro Takeda   Common functions ...
274
  	va_end(args);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
275
276
277
278
279
280
281
  	if (pos + len >= head->readbuf_size) {
  		WARN_ON(1);
  		return;
  	}
  	head->r.avail += len;
  	tomoyo_set_string(head, head->read_buf + pos);
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
282
283
284
285
286
287
288
  /**
   * tomoyo_set_space - Put a space to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
289
290
291
292
  static void tomoyo_set_space(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, " ");
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
293
294
295
296
297
298
299
  /**
   * tomoyo_set_lf - Put a line feed to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
300
301
302
303
304
305
306
307
  static bool tomoyo_set_lf(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, "
  ");
  	return !head->r.w_pos;
  }
  
  /**
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
308
309
310
311
312
313
314
315
316
317
   * tomoyo_set_slash - Put a shash to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_set_slash(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, "/");
  }
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
  /* List of namespaces. */
  LIST_HEAD(tomoyo_namespace_list);
  /* True if namespace other than tomoyo_kernel_namespace is defined. */
  static bool tomoyo_namespace_enabled;
  
  /**
   * tomoyo_init_policy_namespace - Initialize namespace.
   *
   * @ns: Pointer to "struct tomoyo_policy_namespace".
   *
   * Returns nothing.
   */
  void tomoyo_init_policy_namespace(struct tomoyo_policy_namespace *ns)
  {
  	unsigned int idx;
  	for (idx = 0; idx < TOMOYO_MAX_ACL_GROUPS; idx++)
  		INIT_LIST_HEAD(&ns->acl_group[idx]);
  	for (idx = 0; idx < TOMOYO_MAX_GROUP; idx++)
  		INIT_LIST_HEAD(&ns->group_list[idx]);
  	for (idx = 0; idx < TOMOYO_MAX_POLICY; idx++)
  		INIT_LIST_HEAD(&ns->policy_list[idx]);
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
339
  	ns->profile_version = 20110903;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
  	tomoyo_namespace_enabled = !list_empty(&tomoyo_namespace_list);
  	list_add_tail_rcu(&ns->namespace_list, &tomoyo_namespace_list);
  }
  
  /**
   * tomoyo_print_namespace - Print namespace header.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_print_namespace(struct tomoyo_io_buffer *head)
  {
  	if (!tomoyo_namespace_enabled)
  		return;
  	tomoyo_set_string(head,
  			  container_of(head->r.ns,
  				       struct tomoyo_policy_namespace,
  				       namespace_list)->name);
  	tomoyo_set_space(head);
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
361
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
362
363
364
365
366
367
368
369
370
   * tomoyo_print_name_union - Print a tomoyo_name_union.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_name_union".
   */
  static void tomoyo_print_name_union(struct tomoyo_io_buffer *head,
  				    const struct tomoyo_name_union *ptr)
  {
  	tomoyo_set_space(head);
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
371
  	if (ptr->group) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
372
373
374
375
376
377
378
379
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		tomoyo_set_string(head, ptr->filename->name);
  	}
  }
  
  /**
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
   * tomoyo_print_name_union_quoted - Print a tomoyo_name_union with a quote.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_name_union".
   *
   * Returns nothing.
   */
  static void tomoyo_print_name_union_quoted(struct tomoyo_io_buffer *head,
  					   const struct tomoyo_name_union *ptr)
  {
  	if (ptr->group) {
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		tomoyo_set_string(head, "\"");
  		tomoyo_set_string(head, ptr->filename->name);
  		tomoyo_set_string(head, "\"");
  	}
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
401
   * tomoyo_print_number_union_nospace - Print a tomoyo_number_union without a space.
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
402
   *
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
403
404
405
406
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_number_union".
   *
   * Returns nothing.
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
407
   */
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
408
409
  static void tomoyo_print_number_union_nospace
  (struct tomoyo_io_buffer *head, const struct tomoyo_number_union *ptr)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
410
  {
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
411
  	if (ptr->group) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
412
413
414
415
416
417
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		int i;
  		unsigned long min = ptr->values[0];
  		const unsigned long max = ptr->values[1];
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
418
419
  		u8 min_type = ptr->value_type[0];
  		const u8 max_type = ptr->value_type[1];
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
420
421
422
423
424
425
426
427
428
429
430
431
432
  		char buffer[128];
  		buffer[0] = '\0';
  		for (i = 0; i < 2; i++) {
  			switch (min_type) {
  			case TOMOYO_VALUE_TYPE_HEXADECIMAL:
  				tomoyo_addprintf(buffer, sizeof(buffer),
  						 "0x%lX", min);
  				break;
  			case TOMOYO_VALUE_TYPE_OCTAL:
  				tomoyo_addprintf(buffer, sizeof(buffer),
  						 "0%lo", min);
  				break;
  			default:
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
433
434
  				tomoyo_addprintf(buffer, sizeof(buffer), "%lu",
  						 min);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
435
436
437
438
439
440
441
442
443
444
  				break;
  			}
  			if (min == max && min_type == max_type)
  				break;
  			tomoyo_addprintf(buffer, sizeof(buffer), "-");
  			min_type = max_type;
  			min = max;
  		}
  		tomoyo_io_printf(head, "%s", buffer);
  	}
9590837b8   Kentaro Takeda   Common functions ...
445
446
447
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
   * tomoyo_print_number_union - Print a tomoyo_number_union.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_number_union".
   *
   * Returns nothing.
   */
  static void tomoyo_print_number_union(struct tomoyo_io_buffer *head,
  				      const struct tomoyo_number_union *ptr)
  {
  	tomoyo_set_space(head);
  	tomoyo_print_number_union_nospace(head, ptr);
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
463
   * tomoyo_assign_profile - Create a new profile.
9590837b8   Kentaro Takeda   Common functions ...
464
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
465
   * @ns:      Pointer to "struct tomoyo_policy_namespace".
9590837b8   Kentaro Takeda   Common functions ...
466
467
468
469
   * @profile: Profile number to create.
   *
   * Returns pointer to "struct tomoyo_profile" on success, NULL otherwise.
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
470
471
  static struct tomoyo_profile *tomoyo_assign_profile
  (struct tomoyo_policy_namespace *ns, const unsigned int profile)
9590837b8   Kentaro Takeda   Common functions ...
472
  {
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
473
474
  	struct tomoyo_profile *ptr;
  	struct tomoyo_profile *entry;
9590837b8   Kentaro Takeda   Common functions ...
475
476
  	if (profile >= TOMOYO_MAX_PROFILES)
  		return NULL;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
477
  	ptr = ns->profile_ptr[profile];
9590837b8   Kentaro Takeda   Common functions ...
478
  	if (ptr)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
479
480
481
482
  		return ptr;
  	entry = kzalloc(sizeof(*entry), GFP_NOFS);
  	if (mutex_lock_interruptible(&tomoyo_policy_lock))
  		goto out;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
483
  	ptr = ns->profile_ptr[profile];
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
484
485
  	if (!ptr && tomoyo_memory_ok(entry)) {
  		ptr = entry;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
486
487
488
  		ptr->default_config = TOMOYO_CONFIG_DISABLED |
  			TOMOYO_CONFIG_WANT_GRANT_LOG |
  			TOMOYO_CONFIG_WANT_REJECT_LOG;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
489
490
  		memset(ptr->config, TOMOYO_CONFIG_USE_DEFAULT,
  		       sizeof(ptr->config));
6afcb3b73   Tetsuo Handa   TOMOYO: Fix unuse...
491
492
493
494
  		ptr->pref[TOMOYO_PREF_MAX_AUDIT_LOG] =
  			CONFIG_SECURITY_TOMOYO_MAX_AUDIT_LOG;
  		ptr->pref[TOMOYO_PREF_MAX_LEARNING_ENTRY] =
  			CONFIG_SECURITY_TOMOYO_MAX_ACCEPT_ENTRY;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
495
  		mb(); /* Avoid out-of-order execution. */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
496
  		ns->profile_ptr[profile] = ptr;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
497
  		entry = NULL;
cd7bec6ad   Tetsuo Handa   TOMOYO: Remove me...
498
  	}
292823814   Tetsuo Handa   TOMOYO: Use mutex...
499
  	mutex_unlock(&tomoyo_policy_lock);
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
500
501
   out:
  	kfree(entry);
9590837b8   Kentaro Takeda   Common functions ...
502
503
504
505
  	return ptr;
  }
  
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
506
507
   * tomoyo_profile - Find a profile.
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
508
   * @ns:      Pointer to "struct tomoyo_policy_namespace".
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
509
510
511
512
   * @profile: Profile number to find.
   *
   * Returns pointer to "struct tomoyo_profile".
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
513
514
  struct tomoyo_profile *tomoyo_profile(const struct tomoyo_policy_namespace *ns,
  				      const u8 profile)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
515
  {
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
516
  	static struct tomoyo_profile tomoyo_null_profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
517
  	struct tomoyo_profile *ptr = ns->profile_ptr[profile];
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
518
519
  	if (!ptr)
  		ptr = &tomoyo_null_profile;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
520
521
  	return ptr;
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
522
523
524
525
526
527
528
529
  /**
   * tomoyo_find_yesno - Find values for specified keyword.
   *
   * @string: String to check.
   * @find:   Name of keyword.
   *
   * Returns 1 if "@find=yes" was found, 0 if "@find=no" was found, -1 otherwise.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
530
531
532
533
534
535
536
537
538
539
540
541
  static s8 tomoyo_find_yesno(const char *string, const char *find)
  {
  	const char *cp = strstr(string, find);
  	if (cp) {
  		cp += strlen(find);
  		if (!strncmp(cp, "=yes", 4))
  			return 1;
  		else if (!strncmp(cp, "=no", 3))
  			return 0;
  	}
  	return -1;
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
542
543
544
545
546
547
548
549
550
  /**
   * tomoyo_set_uint - Set value for specified preference.
   *
   * @i:      Pointer to "unsigned int".
   * @string: String to check.
   * @find:   Name of keyword.
   *
   * Returns nothing.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
551
552
553
554
555
556
557
  static void tomoyo_set_uint(unsigned int *i, const char *string,
  			    const char *find)
  {
  	const char *cp = strstr(string, find);
  	if (cp)
  		sscanf(cp + strlen(find), "=%u", i);
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
558
559
560
561
562
563
564
565
566
  /**
   * tomoyo_set_mode - Set mode for specified profile.
   *
   * @name:    Name of functionality.
   * @value:   Mode for @name.
   * @profile: Pointer to "struct tomoyo_profile".
   *
   * Returns 0 on success, negative value otherwise.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
567
  static int tomoyo_set_mode(char *name, const char *value,
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
568
569
570
571
572
573
574
575
576
577
578
  			   struct tomoyo_profile *profile)
  {
  	u8 i;
  	u8 config;
  	if (!strcmp(name, "CONFIG")) {
  		i = TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX;
  		config = profile->default_config;
  	} else if (tomoyo_str_starts(&name, "CONFIG::")) {
  		config = 0;
  		for (i = 0; i < TOMOYO_MAX_MAC_INDEX
  			     + TOMOYO_MAX_MAC_CATEGORY_INDEX; i++) {
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
579
580
581
582
583
584
585
586
587
588
589
  			int len = 0;
  			if (i < TOMOYO_MAX_MAC_INDEX) {
  				const u8 c = tomoyo_index2category[i];
  				const char *category =
  					tomoyo_category_keywords[c];
  				len = strlen(category);
  				if (strncmp(name, category, len) ||
  				    name[len++] != ':' || name[len++] != ':')
  					continue;
  			}
  			if (strcmp(name + len, tomoyo_mac_keywords[i]))
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
590
591
592
593
594
595
596
597
598
  				continue;
  			config = profile->config[i];
  			break;
  		}
  		if (i == TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
  			return -EINVAL;
  	} else {
  		return -EINVAL;
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
599
  	if (strstr(value, "use_default")) {
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
600
601
602
603
604
605
606
607
608
609
  		config = TOMOYO_CONFIG_USE_DEFAULT;
  	} else {
  		u8 mode;
  		for (mode = 0; mode < 4; mode++)
  			if (strstr(value, tomoyo_mode[mode]))
  				/*
  				 * Update lower 3 bits in order to distinguish
  				 * 'config' from 'TOMOYO_CONFIG_USE_DEAFULT'.
  				 */
  				config = (config & ~7) | mode;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
  		if (config != TOMOYO_CONFIG_USE_DEFAULT) {
  			switch (tomoyo_find_yesno(value, "grant_log")) {
  			case 1:
  				config |= TOMOYO_CONFIG_WANT_GRANT_LOG;
  				break;
  			case 0:
  				config &= ~TOMOYO_CONFIG_WANT_GRANT_LOG;
  				break;
  			}
  			switch (tomoyo_find_yesno(value, "reject_log")) {
  			case 1:
  				config |= TOMOYO_CONFIG_WANT_REJECT_LOG;
  				break;
  			case 0:
  				config &= ~TOMOYO_CONFIG_WANT_REJECT_LOG;
  				break;
  			}
  		}
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
628
629
630
631
632
633
634
  	}
  	if (i < TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
  		profile->config[i] = config;
  	else if (config != TOMOYO_CONFIG_USE_DEFAULT)
  		profile->default_config = config;
  	return 0;
  }
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
635
636
  /**
   * tomoyo_write_profile - Write profile table.
9590837b8   Kentaro Takeda   Common functions ...
637
638
639
640
641
642
643
644
645
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
   */
  static int tomoyo_write_profile(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	unsigned int i;
9590837b8   Kentaro Takeda   Common functions ...
646
647
  	char *cp;
  	struct tomoyo_profile *profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
648
649
  	if (sscanf(data, "PROFILE_VERSION=%u", &head->w.ns->profile_version)
  	    == 1)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
650
651
  		return 0;
  	i = simple_strtoul(data, &cp, 10);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
652
653
654
  	if (*cp != '-')
  		return -EINVAL;
  	data = cp + 1;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
655
  	profile = tomoyo_assign_profile(head->w.ns, i);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
656
657
  	if (!profile)
  		return -EINVAL;
9590837b8   Kentaro Takeda   Common functions ...
658
659
660
  	cp = strchr(data, '=');
  	if (!cp)
  		return -EINVAL;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
661
  	*cp++ = '\0';
9590837b8   Kentaro Takeda   Common functions ...
662
  	if (!strcmp(data, "COMMENT")) {
2a086e5d3   Tetsuo Handa   TOMOYO: Fix race ...
663
664
665
666
667
668
669
670
671
672
  		static DEFINE_SPINLOCK(lock);
  		const struct tomoyo_path_info *new_comment
  			= tomoyo_get_name(cp);
  		const struct tomoyo_path_info *old_comment;
  		if (!new_comment)
  			return -ENOMEM;
  		spin_lock(&lock);
  		old_comment = profile->comment;
  		profile->comment = new_comment;
  		spin_unlock(&lock);
bf24fb016   Tetsuo Handa   TOMOYO: Add refco...
673
  		tomoyo_put_name(old_comment);
9590837b8   Kentaro Takeda   Common functions ...
674
675
  		return 0;
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
676
677
678
679
680
  	if (!strcmp(data, "PREFERENCE")) {
  		for (i = 0; i < TOMOYO_MAX_PREF; i++)
  			tomoyo_set_uint(&profile->pref[i], cp,
  					tomoyo_pref_keywords[i]);
  		return 0;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
681
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
682
  	return tomoyo_set_mode(data, cp, profile);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
683
  }
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
684
685
686
687
688
689
690
691
692
693
  /**
   * tomoyo_print_config - Print mode for specified functionality.
   *
   * @head:   Pointer to "struct tomoyo_io_buffer".
   * @config: Mode for that functionality.
   *
   * Returns nothing.
   *
   * Caller prints functionality's name.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
694
695
  static void tomoyo_print_config(struct tomoyo_io_buffer *head, const u8 config)
  {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
696
697
698
699
700
  	tomoyo_io_printf(head, "={ mode=%s grant_log=%s reject_log=%s }
  ",
  			 tomoyo_mode[config & 3],
  			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_GRANT_LOG),
  			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_REJECT_LOG));
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
701
  }
9590837b8   Kentaro Takeda   Common functions ...
702
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
703
   * tomoyo_read_profile - Read profile table.
9590837b8   Kentaro Takeda   Common functions ...
704
705
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
706
707
   *
   * Returns nothing.
9590837b8   Kentaro Takeda   Common functions ...
708
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
709
  static void tomoyo_read_profile(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
710
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
711
  	u8 index;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
712
713
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
714
  	const struct tomoyo_profile *profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
715
716
  	if (head->r.eof)
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
717
718
   next:
  	index = head->r.index;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
719
  	profile = ns->profile_ptr[index];
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
720
721
  	switch (head->r.step) {
  	case 0:
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
722
723
724
725
  		tomoyo_print_namespace(head);
  		tomoyo_io_printf(head, "PROFILE_VERSION=%u
  ",
  				 ns->profile_version);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
726
727
728
729
730
  		head->r.step++;
  		break;
  	case 1:
  		for ( ; head->r.index < TOMOYO_MAX_PROFILES;
  		      head->r.index++)
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
731
  			if (ns->profile_ptr[head->r.index])
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
732
  				break;
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
733
734
  		if (head->r.index == TOMOYO_MAX_PROFILES) {
  			head->r.eof = true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
735
  			return;
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
736
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
737
738
739
740
  		head->r.step++;
  		break;
  	case 2:
  		{
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
741
  			u8 i;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
742
743
  			const struct tomoyo_path_info *comment =
  				profile->comment;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
744
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
745
746
747
  			tomoyo_io_printf(head, "%u-COMMENT=", index);
  			tomoyo_set_string(head, comment ? comment->name : "");
  			tomoyo_set_lf(head);
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
748
  			tomoyo_print_namespace(head);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
749
750
751
752
753
754
755
  			tomoyo_io_printf(head, "%u-PREFERENCE={ ", index);
  			for (i = 0; i < TOMOYO_MAX_PREF; i++)
  				tomoyo_io_printf(head, "%s=%u ",
  						 tomoyo_pref_keywords[i],
  						 profile->pref[i]);
  			tomoyo_set_string(head, "}
  ");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
756
757
758
759
760
  			head->r.step++;
  		}
  		break;
  	case 3:
  		{
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
761
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
762
763
764
765
766
767
768
769
770
771
772
  			tomoyo_io_printf(head, "%u-%s", index, "CONFIG");
  			tomoyo_print_config(head, profile->default_config);
  			head->r.bit = 0;
  			head->r.step++;
  		}
  		break;
  	case 4:
  		for ( ; head->r.bit < TOMOYO_MAX_MAC_INDEX
  			      + TOMOYO_MAX_MAC_CATEGORY_INDEX; head->r.bit++) {
  			const u8 i = head->r.bit;
  			const u8 config = profile->config[i];
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
773
774
  			if (config == TOMOYO_CONFIG_USE_DEFAULT)
  				continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
775
  			tomoyo_print_namespace(head);
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
776
777
778
779
780
781
782
783
784
  			if (i < TOMOYO_MAX_MAC_INDEX)
  				tomoyo_io_printf(head, "%u-CONFIG::%s::%s",
  						 index,
  						 tomoyo_category_keywords
  						 [tomoyo_index2category[i]],
  						 tomoyo_mac_keywords[i]);
  			else
  				tomoyo_io_printf(head, "%u-CONFIG::%s", index,
  						 tomoyo_mac_keywords[i]);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
785
786
787
788
789
790
  			tomoyo_print_config(head, config);
  			head->r.bit++;
  			break;
  		}
  		if (head->r.bit == TOMOYO_MAX_MAC_INDEX
  		    + TOMOYO_MAX_MAC_CATEGORY_INDEX) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
791
792
  			head->r.index++;
  			head->r.step = 1;
9590837b8   Kentaro Takeda   Common functions ...
793
  		}
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
794
  		break;
9590837b8   Kentaro Takeda   Common functions ...
795
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
796
797
  	if (tomoyo_flush(head))
  		goto next;
9590837b8   Kentaro Takeda   Common functions ...
798
  }
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
799
800
801
802
803
804
805
806
  /**
   * tomoyo_same_manager - Check for duplicated "struct tomoyo_manager" entry.
   *
   * @a: Pointer to "struct tomoyo_acl_head".
   * @b: Pointer to "struct tomoyo_acl_head".
   *
   * Returns true if @a == @b, false otherwise.
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
807
808
  static bool tomoyo_same_manager(const struct tomoyo_acl_head *a,
  				const struct tomoyo_acl_head *b)
36f5e1ffb   Tetsuo Handa   TOMOYO: Use callb...
809
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
810
811
  	return container_of(a, struct tomoyo_manager, head)->manager ==
  		container_of(b, struct tomoyo_manager, head)->manager;
36f5e1ffb   Tetsuo Handa   TOMOYO: Use callb...
812
  }
9590837b8   Kentaro Takeda   Common functions ...
813
814
815
816
817
818
819
  /**
   * tomoyo_update_manager_entry - Add a manager entry.
   *
   * @manager:   The path to manager or the domainnamme.
   * @is_delete: True if it is a delete request.
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
820
821
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
822
823
824
825
   */
  static int tomoyo_update_manager_entry(const char *manager,
  				       const bool is_delete)
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
826
  	struct tomoyo_manager e = { };
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
827
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
828
  		/* .ns = &tomoyo_kernel_namespace, */
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
829
  		.is_delete = is_delete,
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
830
831
  		.list = &tomoyo_kernel_namespace.
  		policy_list[TOMOYO_ID_MANAGER],
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
832
833
  	};
  	int error = is_delete ? -ENOENT : -ENOMEM;
75093152a   Tetsuo Handa   TOMOYO: Rename sy...
834
835
  	if (tomoyo_domain_def(manager)) {
  		if (!tomoyo_correct_domain(manager))
9590837b8   Kentaro Takeda   Common functions ...
836
  			return -EINVAL;
9e4b50e93   Tetsuo Handa   TOMOYO: Use stack...
837
  		e.is_domain = true;
9590837b8   Kentaro Takeda   Common functions ...
838
  	} else {
75093152a   Tetsuo Handa   TOMOYO: Rename sy...
839
  		if (!tomoyo_correct_path(manager))
9590837b8   Kentaro Takeda   Common functions ...
840
841
  			return -EINVAL;
  	}
9e4b50e93   Tetsuo Handa   TOMOYO: Use stack...
842
  	e.manager = tomoyo_get_name(manager);
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
843
844
845
846
847
  	if (e.manager) {
  		error = tomoyo_update_policy(&e.head, sizeof(e), &param,
  					     tomoyo_same_manager);
  		tomoyo_put_name(e.manager);
  	}
9590837b8   Kentaro Takeda   Common functions ...
848
849
850
851
  	return error;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
852
   * tomoyo_write_manager - Write manager policy.
9590837b8   Kentaro Takeda   Common functions ...
853
854
855
856
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
857
858
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
859
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
860
  static int tomoyo_write_manager(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
861
862
  {
  	char *data = head->write_buf;
9590837b8   Kentaro Takeda   Common functions ...
863
864
  
  	if (!strcmp(data, "manage_by_non_root")) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
865
  		tomoyo_manage_by_non_root = !head->w.is_delete;
9590837b8   Kentaro Takeda   Common functions ...
866
867
  		return 0;
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
868
  	return tomoyo_update_manager_entry(data, head->w.is_delete);
9590837b8   Kentaro Takeda   Common functions ...
869
870
871
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
872
   * tomoyo_read_manager - Read manager policy.
9590837b8   Kentaro Takeda   Common functions ...
873
874
875
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
876
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
877
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
878
  static void tomoyo_read_manager(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
879
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
880
  	if (head->r.eof)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
881
  		return;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
882
883
  	list_for_each_cookie(head->r.acl, &tomoyo_kernel_namespace.
  			     policy_list[TOMOYO_ID_MANAGER]) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
884
  		struct tomoyo_manager *ptr =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
885
  			list_entry(head->r.acl, typeof(*ptr), head.list);
82e0f001a   Tetsuo Handa   TOMOYO: Use commo...
886
  		if (ptr->head.is_deleted)
9590837b8   Kentaro Takeda   Common functions ...
887
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
888
889
890
891
  		if (!tomoyo_flush(head))
  			return;
  		tomoyo_set_string(head, ptr->manager->name);
  		tomoyo_set_lf(head);
9590837b8   Kentaro Takeda   Common functions ...
892
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
893
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
894
895
896
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
897
   * tomoyo_manager - Check whether the current process is a policy manager.
9590837b8   Kentaro Takeda   Common functions ...
898
899
900
   *
   * Returns true if the current process is permitted to modify policy
   * via /sys/kernel/security/tomoyo/ interface.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
901
902
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
903
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
904
  static bool tomoyo_manager(void)
9590837b8   Kentaro Takeda   Common functions ...
905
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
906
  	struct tomoyo_manager *ptr;
9590837b8   Kentaro Takeda   Common functions ...
907
908
909
910
911
912
913
914
915
  	const char *exe;
  	const struct task_struct *task = current;
  	const struct tomoyo_path_info *domainname = tomoyo_domain()->domainname;
  	bool found = false;
  
  	if (!tomoyo_policy_loaded)
  		return true;
  	if (!tomoyo_manage_by_non_root && (task->cred->uid || task->cred->euid))
  		return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
916
917
  	list_for_each_entry_rcu(ptr, &tomoyo_kernel_namespace.
  				policy_list[TOMOYO_ID_MANAGER], head.list) {
82e0f001a   Tetsuo Handa   TOMOYO: Use commo...
918
  		if (!ptr->head.is_deleted && ptr->is_domain
9590837b8   Kentaro Takeda   Common functions ...
919
920
921
922
923
  		    && !tomoyo_pathcmp(domainname, ptr->manager)) {
  			found = true;
  			break;
  		}
  	}
9590837b8   Kentaro Takeda   Common functions ...
924
925
926
927
928
  	if (found)
  		return true;
  	exe = tomoyo_get_exe();
  	if (!exe)
  		return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
929
930
  	list_for_each_entry_rcu(ptr, &tomoyo_kernel_namespace.
  				policy_list[TOMOYO_ID_MANAGER], head.list) {
82e0f001a   Tetsuo Handa   TOMOYO: Use commo...
931
  		if (!ptr->head.is_deleted && !ptr->is_domain
9590837b8   Kentaro Takeda   Common functions ...
932
933
934
935
936
  		    && !strcmp(exe, ptr->manager->name)) {
  			found = true;
  			break;
  		}
  	}
9590837b8   Kentaro Takeda   Common functions ...
937
938
939
940
941
942
943
944
945
946
  	if (!found) { /* Reduce error messages. */
  		static pid_t last_pid;
  		const pid_t pid = current->pid;
  		if (last_pid != pid) {
  			printk(KERN_WARNING "%s ( %s ) is not permitted to "
  			       "update policies.
  ", domainname->name, exe);
  			last_pid = pid;
  		}
  	}
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
947
  	kfree(exe);
9590837b8   Kentaro Takeda   Common functions ...
948
949
  	return found;
  }
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
950
951
  static struct tomoyo_domain_info *tomoyo_find_domain_by_qid
  (unsigned int serial);
9590837b8   Kentaro Takeda   Common functions ...
952
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
953
   * tomoyo_select_domain - Parse select command.
9590837b8   Kentaro Takeda   Common functions ...
954
955
956
957
958
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @data: String to parse.
   *
   * Returns true on success, false otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
959
960
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
961
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
962
963
  static bool tomoyo_select_domain(struct tomoyo_io_buffer *head,
  				 const char *data)
9590837b8   Kentaro Takeda   Common functions ...
964
965
966
  {
  	unsigned int pid;
  	struct tomoyo_domain_info *domain = NULL;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
967
  	bool global_pid = false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
968
969
970
  	if (strncmp(data, "select ", 7))
  		return false;
  	data += 7;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
971
972
  	if (sscanf(data, "pid=%u", &pid) == 1 ||
  	    (global_pid = true, sscanf(data, "global-pid=%u", &pid) == 1)) {
9590837b8   Kentaro Takeda   Common functions ...
973
  		struct task_struct *p;
1fcdc7c52   Tetsuo Handa   TOMOYO: Protect f...
974
  		rcu_read_lock();
9b244373d   Tetsuo Handa   TOMOYO: Several f...
975
976
977
978
  		if (global_pid)
  			p = find_task_by_pid_ns(pid, &init_pid_ns);
  		else
  			p = find_task_by_vpid(pid);
9590837b8   Kentaro Takeda   Common functions ...
979
980
  		if (p)
  			domain = tomoyo_real_domain(p);
1fcdc7c52   Tetsuo Handa   TOMOYO: Protect f...
981
  		rcu_read_unlock();
9590837b8   Kentaro Takeda   Common functions ...
982
  	} else if (!strncmp(data, "domain=", 7)) {
75093152a   Tetsuo Handa   TOMOYO: Rename sy...
983
  		if (tomoyo_domain_def(data + 7))
9590837b8   Kentaro Takeda   Common functions ...
984
  			domain = tomoyo_find_domain(data + 7);
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
985
986
  	} else if (sscanf(data, "Q=%u", &pid) == 1) {
  		domain = tomoyo_find_domain_by_qid(pid);
9590837b8   Kentaro Takeda   Common functions ...
987
988
  	} else
  		return false;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
989
  	head->w.domain = domain;
9590837b8   Kentaro Takeda   Common functions ...
990
991
992
  	/* Accessing read_buf is safe because head->io_sem is held. */
  	if (!head->read_buf)
  		return true; /* Do nothing if open(O_WRONLY). */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
993
994
  	memset(&head->r, 0, sizeof(head->r));
  	head->r.print_this_domain_only = true;
68eda8f59   Dan Carpenter   tomoyo: cleanup. ...
995
996
997
998
  	if (domain)
  		head->r.domain = &domain->list;
  	else
  		head->r.eof = 1;
9590837b8   Kentaro Takeda   Common functions ...
999
1000
  	tomoyo_io_printf(head, "# select %s
  ", data);
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
1001
1002
1003
  	if (domain && domain->is_deleted)
  		tomoyo_io_printf(head, "# This is a deleted domain.
  ");
9590837b8   Kentaro Takeda   Common functions ...
1004
1005
1006
1007
  	return true;
  }
  
  /**
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
   * tomoyo_same_task_acl - Check for duplicated "struct tomoyo_task_acl" entry.
   *
   * @a: Pointer to "struct tomoyo_acl_info".
   * @b: Pointer to "struct tomoyo_acl_info".
   *
   * Returns true if @a == @b, false otherwise.
   */
  static bool tomoyo_same_task_acl(const struct tomoyo_acl_info *a,
  			      const struct tomoyo_acl_info *b)
  {
  	const struct tomoyo_task_acl *p1 = container_of(a, typeof(*p1), head);
  	const struct tomoyo_task_acl *p2 = container_of(b, typeof(*p2), head);
  	return p1->domainname == p2->domainname;
  }
  
  /**
   * tomoyo_write_task - Update task related list.
   *
   * @param: Pointer to "struct tomoyo_acl_param".
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static int tomoyo_write_task(struct tomoyo_acl_param *param)
  {
  	int error = -EINVAL;
  	if (tomoyo_str_starts(&param->data, "manual_domain_transition ")) {
  		struct tomoyo_task_acl e = {
  			.head.type = TOMOYO_TYPE_MANUAL_TASK_ACL,
  			.domainname = tomoyo_get_domainname(param),
  		};
  		if (e.domainname)
  			error = tomoyo_update_domain(&e.head, sizeof(e), param,
  						     tomoyo_same_task_acl,
  						     NULL);
  		tomoyo_put_name(e.domainname);
  	}
  	return error;
  }
  
  /**
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1050
1051
1052
1053
1054
   * tomoyo_delete_domain - Delete a domain.
   *
   * @domainname: The name of domain.
   *
   * Returns 0.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1055
1056
   *
   * Caller holds tomoyo_read_lock().
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1057
1058
1059
1060
1061
1062
1063
1064
   */
  static int tomoyo_delete_domain(char *domainname)
  {
  	struct tomoyo_domain_info *domain;
  	struct tomoyo_path_info name;
  
  	name.name = domainname;
  	tomoyo_fill_path_info(&name);
292823814   Tetsuo Handa   TOMOYO: Use mutex...
1065
1066
  	if (mutex_lock_interruptible(&tomoyo_policy_lock))
  		return 0;
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1067
  	/* Is there an active domain? */
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1068
  	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1069
1070
1071
1072
1073
1074
1075
1076
1077
  		/* Never delete tomoyo_kernel_domain */
  		if (domain == &tomoyo_kernel_domain)
  			continue;
  		if (domain->is_deleted ||
  		    tomoyo_pathcmp(domain->domainname, &name))
  			continue;
  		domain->is_deleted = true;
  		break;
  	}
f737d95dd   Tetsuo Handa   TOMOYO: Replace r...
1078
  	mutex_unlock(&tomoyo_policy_lock);
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1079
1080
1081
1082
  	return 0;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1083
   * tomoyo_write_domain2 - Write domain policy.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1084
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1085
   * @ns:        Pointer to "struct tomoyo_policy_namespace".
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1086
1087
1088
   * @list:      Pointer to "struct list_head".
   * @data:      Policy to be interpreted.
   * @is_delete: True if it is a delete request.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1089
1090
1091
1092
1093
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1094
1095
  static int tomoyo_write_domain2(struct tomoyo_policy_namespace *ns,
  				struct list_head *list, char *data,
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1096
  				const bool is_delete)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1097
  {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1098
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1099
  		.ns = ns,
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1100
1101
1102
1103
1104
1105
1106
  		.list = list,
  		.data = data,
  		.is_delete = is_delete,
  	};
  	static const struct {
  		const char *keyword;
  		int (*write) (struct tomoyo_acl_param *);
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1107
  	} tomoyo_callback[5] = {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1108
  		{ "file ", tomoyo_write_file },
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1109
1110
  		{ "network inet ", tomoyo_write_inet_network },
  		{ "network unix ", tomoyo_write_unix_network },
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1111
  		{ "misc ", tomoyo_write_misc },
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1112
  		{ "task ", tomoyo_write_task },
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1113
1114
  	};
  	u8 i;
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1115
1116
  
  	for (i = 0; i < ARRAY_SIZE(tomoyo_callback); i++) {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1117
1118
1119
1120
1121
1122
  		if (!tomoyo_str_starts(&param.data,
  				       tomoyo_callback[i].keyword))
  			continue;
  		return tomoyo_callback[i].write(&param);
  	}
  	return -EINVAL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1123
  }
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1124
1125
1126
1127
1128
1129
1130
  /* String table for domain flags. */
  const char * const tomoyo_dif[TOMOYO_MAX_DOMAIN_INFO_FLAGS] = {
  	[TOMOYO_DIF_QUOTA_WARNED]      = "quota_exceeded
  ",
  	[TOMOYO_DIF_TRANSITION_FAILED] = "transition_failed
  ",
  };
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1131
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1132
   * tomoyo_write_domain - Write domain policy.
9590837b8   Kentaro Takeda   Common functions ...
1133
1134
1135
1136
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1137
1138
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1139
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1140
  static int tomoyo_write_domain(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1141
1142
  {
  	char *data = head->write_buf;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1143
  	struct tomoyo_policy_namespace *ns;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1144
  	struct tomoyo_domain_info *domain = head->w.domain;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1145
1146
  	const bool is_delete = head->w.is_delete;
  	bool is_select = !is_delete && tomoyo_str_starts(&data, "select ");
9590837b8   Kentaro Takeda   Common functions ...
1147
  	unsigned int profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1148
  	if (*data == '<') {
9590837b8   Kentaro Takeda   Common functions ...
1149
1150
1151
  		domain = NULL;
  		if (is_delete)
  			tomoyo_delete_domain(data);
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1152
  		else if (is_select)
9590837b8   Kentaro Takeda   Common functions ...
1153
  			domain = tomoyo_find_domain(data);
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1154
  		else
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1155
  			domain = tomoyo_assign_domain(data, false);
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1156
  		head->w.domain = domain;
9590837b8   Kentaro Takeda   Common functions ...
1157
1158
1159
1160
  		return 0;
  	}
  	if (!domain)
  		return -EINVAL;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1161
  	ns = domain->ns;
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1162
  	if (sscanf(data, "use_profile %u", &profile) == 1
9590837b8   Kentaro Takeda   Common functions ...
1163
  	    && profile < TOMOYO_MAX_PROFILES) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1164
  		if (!tomoyo_policy_loaded || ns->profile_ptr[profile])
9590837b8   Kentaro Takeda   Common functions ...
1165
1166
1167
  			domain->profile = (u8) profile;
  		return 0;
  	}
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1168
1169
1170
1171
1172
1173
1174
  	if (sscanf(data, "use_group %u
  ", &profile) == 1
  	    && profile < TOMOYO_MAX_ACL_GROUPS) {
  		if (!is_delete)
  			domain->group = (u8) profile;
  		return 0;
  	}
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1175
1176
1177
1178
1179
  	for (profile = 0; profile < TOMOYO_MAX_DOMAIN_INFO_FLAGS; profile++) {
  		const char *cp = tomoyo_dif[profile];
  		if (strncmp(data, cp, strlen(cp) - 1))
  			continue;
  		domain->flags[profile] = !is_delete;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
1180
1181
  		return 0;
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1182
1183
  	return tomoyo_write_domain2(ns, &domain->acl_info_list, data,
  				    is_delete);
9590837b8   Kentaro Takeda   Common functions ...
1184
1185
1186
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
   * tomoyo_print_condition - Print condition part.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @cond: Pointer to "struct tomoyo_condition".
   *
   * Returns true on success, false otherwise.
   */
  static bool tomoyo_print_condition(struct tomoyo_io_buffer *head,
  				   const struct tomoyo_condition *cond)
  {
  	switch (head->r.cond_step) {
  	case 0:
  		head->r.cond_index = 0;
  		head->r.cond_step++;
6bce98edc   Tetsuo Handa   TOMOYO: Allow spe...
1201
1202
1203
1204
  		if (cond->transit) {
  			tomoyo_set_space(head);
  			tomoyo_set_string(head, cond->transit->name);
  		}
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1205
1206
1207
1208
1209
1210
1211
1212
  		/* fall through */
  	case 1:
  		{
  			const u16 condc = cond->condc;
  			const struct tomoyo_condition_element *condp =
  				(typeof(condp)) (cond + 1);
  			const struct tomoyo_number_union *numbers_p =
  				(typeof(numbers_p)) (condp + condc);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1213
1214
1215
  			const struct tomoyo_name_union *names_p =
  				(typeof(names_p))
  				(numbers_p + cond->numbers_count);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1216
1217
1218
1219
  			const struct tomoyo_argv *argv =
  				(typeof(argv)) (names_p + cond->names_count);
  			const struct tomoyo_envp *envp =
  				(typeof(envp)) (argv + cond->argc);
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1220
1221
1222
1223
1224
1225
  			u16 skip;
  			for (skip = 0; skip < head->r.cond_index; skip++) {
  				const u8 left = condp->left;
  				const u8 right = condp->right;
  				condp++;
  				switch (left) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1226
1227
1228
1229
1230
1231
  				case TOMOYO_ARGV_ENTRY:
  					argv++;
  					continue;
  				case TOMOYO_ENVP_ENTRY:
  					envp++;
  					continue;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1232
1233
1234
1235
1236
  				case TOMOYO_NUMBER_UNION:
  					numbers_p++;
  					break;
  				}
  				switch (right) {
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1237
1238
1239
  				case TOMOYO_NAME_UNION:
  					names_p++;
  					break;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
  				case TOMOYO_NUMBER_UNION:
  					numbers_p++;
  					break;
  				}
  			}
  			while (head->r.cond_index < condc) {
  				const u8 match = condp->equals;
  				const u8 left = condp->left;
  				const u8 right = condp->right;
  				if (!tomoyo_flush(head))
  					return false;
  				condp++;
  				head->r.cond_index++;
  				tomoyo_set_space(head);
  				switch (left) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
  				case TOMOYO_ARGV_ENTRY:
  					tomoyo_io_printf(head,
  							 "exec.argv[%lu]%s=\"",
  							 argv->index, argv->
  							 is_not ? "!" : "");
  					tomoyo_set_string(head,
  							  argv->value->name);
  					tomoyo_set_string(head, "\"");
  					argv++;
  					continue;
  				case TOMOYO_ENVP_ENTRY:
  					tomoyo_set_string(head,
  							  "exec.envp[\"");
  					tomoyo_set_string(head,
  							  envp->name->name);
  					tomoyo_io_printf(head, "\"]%s=", envp->
  							 is_not ? "!" : "");
  					if (envp->value) {
  						tomoyo_set_string(head, "\"");
  						tomoyo_set_string(head, envp->
  								  value->name);
  						tomoyo_set_string(head, "\"");
  					} else {
  						tomoyo_set_string(head,
  								  "NULL");
  					}
  					envp++;
  					continue;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
  				case TOMOYO_NUMBER_UNION:
  					tomoyo_print_number_union_nospace
  						(head, numbers_p++);
  					break;
  				default:
  					tomoyo_set_string(head,
  					       tomoyo_condition_keyword[left]);
  					break;
  				}
  				tomoyo_set_string(head, match ? "=" : "!=");
  				switch (right) {
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1294
1295
1296
1297
  				case TOMOYO_NAME_UNION:
  					tomoyo_print_name_union_quoted
  						(head, names_p++);
  					break;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
  				case TOMOYO_NUMBER_UNION:
  					tomoyo_print_number_union_nospace
  						(head, numbers_p++);
  					break;
  				default:
  					tomoyo_set_string(head,
  					  tomoyo_condition_keyword[right]);
  					break;
  				}
  			}
  		}
  		head->r.cond_step++;
  		/* fall through */
  	case 2:
  		if (!tomoyo_flush(head))
  			break;
  		head->r.cond_step++;
  		/* fall through */
  	case 3:
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
1317
1318
1319
1320
  		if (cond->grant_log != TOMOYO_GRANTLOG_AUTO)
  			tomoyo_io_printf(head, " grant_log=%s",
  					 tomoyo_yesno(cond->grant_log ==
  						      TOMOYO_GRANTLOG_YES));
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1321
1322
1323
1324
1325
1326
1327
  		tomoyo_set_lf(head);
  		return true;
  	}
  	return false;
  }
  
  /**
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1328
   * tomoyo_set_group - Print "acl_group " header keyword and category name.
9590837b8   Kentaro Takeda   Common functions ...
1329
   *
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1330
1331
   * @head:     Pointer to "struct tomoyo_io_buffer".
   * @category: Category name.
9590837b8   Kentaro Takeda   Common functions ...
1332
   *
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1333
   * Returns nothing.
9590837b8   Kentaro Takeda   Common functions ...
1334
   */
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1335
1336
  static void tomoyo_set_group(struct tomoyo_io_buffer *head,
  			     const char *category)
9590837b8   Kentaro Takeda   Common functions ...
1337
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1338
1339
  	if (head->type == TOMOYO_EXCEPTIONPOLICY) {
  		tomoyo_print_namespace(head);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1340
1341
  		tomoyo_io_printf(head, "acl_group %u ",
  				 head->r.acl_group_index);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1342
  	}
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1343
  	tomoyo_set_string(head, category);
9590837b8   Kentaro Takeda   Common functions ...
1344
1345
1346
  }
  
  /**
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1347
   * tomoyo_print_entry - Print an ACL entry.
9590837b8   Kentaro Takeda   Common functions ...
1348
1349
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1350
   * @acl:  Pointer to an ACL entry.
9590837b8   Kentaro Takeda   Common functions ...
1351
1352
1353
   *
   * Returns true on success, false otherwise.
   */
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1354
1355
  static bool tomoyo_print_entry(struct tomoyo_io_buffer *head,
  			       struct tomoyo_acl_info *acl)
9590837b8   Kentaro Takeda   Common functions ...
1356
  {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1357
  	const u8 acl_type = acl->type;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1358
  	bool first = true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1359
  	u8 bit;
9590837b8   Kentaro Takeda   Common functions ...
1360

2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1361
1362
  	if (head->r.print_cond_part)
  		goto print_cond_part;
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1363
1364
  	if (acl->is_deleted)
  		return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1365
1366
1367
  	if (!tomoyo_flush(head))
  		return false;
  	else if (acl_type == TOMOYO_TYPE_PATH_ACL) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1368
1369
1370
  		struct tomoyo_path_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u16 perm = ptr->perm;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1371
  		for (bit = 0; bit < TOMOYO_MAX_PATH_OPERATION; bit++) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1372
1373
  			if (!(perm & (1 << bit)))
  				continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1374
  			if (head->r.print_transition_related_only &&
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1375
1376
  			    bit != TOMOYO_TYPE_EXECUTE)
  				continue;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1377
1378
1379
1380
1381
1382
1383
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_path_keyword[bit]);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1384
  		}
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1385
1386
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1387
  		tomoyo_print_name_union(head, &ptr->name);
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1388
1389
1390
1391
1392
1393
  	} else if (acl_type == TOMOYO_TYPE_MANUAL_TASK_ACL) {
  		struct tomoyo_task_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		tomoyo_set_group(head, "task ");
  		tomoyo_set_string(head, "manual_domain_transition ");
  		tomoyo_set_string(head, ptr->domainname->name);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1394
  	} else if (head->r.print_transition_related_only) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1395
1396
1397
1398
  		return true;
  	} else if (acl_type == TOMOYO_TYPE_PATH2_ACL) {
  		struct tomoyo_path2_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_PATH2_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pp2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1414
1415
  		tomoyo_print_name_union(head, &ptr->name1);
  		tomoyo_print_name_union(head, &ptr->name2);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1416
1417
1418
  	} else if (acl_type == TOMOYO_TYPE_PATH_NUMBER_ACL) {
  		struct tomoyo_path_number_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_PATH_NUMBER_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pn2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1434
1435
  		tomoyo_print_name_union(head, &ptr->name);
  		tomoyo_print_number_union(head, &ptr->number);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1436
1437
1438
  	} else if (acl_type == TOMOYO_TYPE_MKDEV_ACL) {
  		struct tomoyo_mkdev_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_MKDEV_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pnnn2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1454
1455
1456
1457
  		tomoyo_print_name_union(head, &ptr->name);
  		tomoyo_print_number_union(head, &ptr->mode);
  		tomoyo_print_number_union(head, &ptr->major);
  		tomoyo_print_number_union(head, &ptr->minor);
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
  	} else if (acl_type == TOMOYO_TYPE_INET_ACL) {
  		struct tomoyo_inet_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u8 perm = ptr->perm;
  
  		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "network inet ");
  				tomoyo_set_string(head, tomoyo_proto_keyword
  						  [ptr->protocol]);
  				tomoyo_set_space(head);
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
  		}
  		if (first)
  			return true;
  		tomoyo_set_space(head);
  		if (ptr->address.group) {
  			tomoyo_set_string(head, "@");
  			tomoyo_set_string(head, ptr->address.group->group_name
  					  ->name);
  		} else {
  			char buf[128];
  			tomoyo_print_ip(buf, sizeof(buf), &ptr->address);
  			tomoyo_io_printf(head, "%s", buf);
  		}
  		tomoyo_print_number_union(head, &ptr->port);
  	} else if (acl_type == TOMOYO_TYPE_UNIX_ACL) {
  		struct tomoyo_unix_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u8 perm = ptr->perm;
  
  		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "network unix ");
  				tomoyo_set_string(head, tomoyo_proto_keyword
  						  [ptr->protocol]);
  				tomoyo_set_space(head);
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
  		}
  		if (first)
  			return true;
  		tomoyo_print_name_union(head, &ptr->name);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1512
1513
1514
  	} else if (acl_type == TOMOYO_TYPE_MOUNT_ACL) {
  		struct tomoyo_mount_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1515
  		tomoyo_set_group(head, "file mount");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1516
1517
1518
1519
  		tomoyo_print_name_union(head, &ptr->dev_name);
  		tomoyo_print_name_union(head, &ptr->dir_name);
  		tomoyo_print_name_union(head, &ptr->fs_type);
  		tomoyo_print_number_union(head, &ptr->flags);
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1520
1521
1522
1523
1524
1525
  	} else if (acl_type == TOMOYO_TYPE_ENV_ACL) {
  		struct tomoyo_env_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  
  		tomoyo_set_group(head, "misc env ");
  		tomoyo_set_string(head, ptr->env->name);
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1526
  	}
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
  	if (acl->cond) {
  		head->r.print_cond_part = true;
  		head->r.cond_step = 0;
  		if (!tomoyo_flush(head))
  			return false;
  print_cond_part:
  		if (!tomoyo_print_condition(head, acl->cond))
  			return false;
  		head->r.print_cond_part = false;
  	} else {
  		tomoyo_set_lf(head);
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1539
1540
1541
1542
1543
1544
  	return true;
  }
  
  /**
   * tomoyo_read_domain2 - Read domain policy.
   *
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1545
1546
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @list: Pointer to "struct list_head".
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1547
1548
1549
1550
1551
1552
   *
   * Caller holds tomoyo_read_lock().
   *
   * Returns true on success, false otherwise.
   */
  static bool tomoyo_read_domain2(struct tomoyo_io_buffer *head,
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1553
  				struct list_head *list)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1554
  {
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1555
  	list_for_each_cookie(head->r.acl, list) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1556
1557
1558
1559
1560
1561
  		struct tomoyo_acl_info *ptr =
  			list_entry(head->r.acl, typeof(*ptr), list);
  		if (!tomoyo_print_entry(head, ptr))
  			return false;
  	}
  	head->r.acl = NULL;
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1562
  	return true;
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1563
1564
1565
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1566
   * tomoyo_read_domain - Read domain policy.
9590837b8   Kentaro Takeda   Common functions ...
1567
1568
1569
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1570
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1571
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1572
  static void tomoyo_read_domain(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1573
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1574
  	if (head->r.eof)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
1575
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1576
  	list_for_each_cookie(head->r.domain, &tomoyo_domain_list) {
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
1577
  		struct tomoyo_domain_info *domain =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1578
1579
  			list_entry(head->r.domain, typeof(*domain), list);
  		switch (head->r.step) {
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1580
  			u8 i;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1581
1582
1583
1584
1585
1586
1587
  		case 0:
  			if (domain->is_deleted &&
  			    !head->r.print_this_domain_only)
  				continue;
  			/* Print domainname and flags. */
  			tomoyo_set_string(head, domain->domainname->name);
  			tomoyo_set_lf(head);
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1588
1589
  			tomoyo_io_printf(head, "use_profile %u
  ",
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1590
  					 domain->profile);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1591
1592
1593
  			tomoyo_io_printf(head, "use_group %u
  ",
  					 domain->group);
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1594
1595
1596
  			for (i = 0; i < TOMOYO_MAX_DOMAIN_INFO_FLAGS; i++)
  				if (domain->flags[i])
  					tomoyo_set_string(head, tomoyo_dif[i]);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1597
1598
1599
1600
  			head->r.step++;
  			tomoyo_set_lf(head);
  			/* fall through */
  		case 1:
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1601
  			if (!tomoyo_read_domain2(head, &domain->acl_info_list))
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1602
1603
1604
1605
1606
1607
1608
1609
1610
  				return;
  			head->r.step++;
  			if (!tomoyo_set_lf(head))
  				return;
  			/* fall through */
  		case 2:
  			head->r.step = 0;
  			if (head->r.print_this_domain_only)
  				goto done;
9590837b8   Kentaro Takeda   Common functions ...
1611
  		}
9590837b8   Kentaro Takeda   Common functions ...
1612
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1613
1614
   done:
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
1615
1616
1617
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
1618
1619
1620
1621
1622
1623
1624
1625
   * tomoyo_write_pid: Specify PID to obtain domainname.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0.
   */
  static int tomoyo_write_pid(struct tomoyo_io_buffer *head)
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1626
  	head->r.eof = false;
9590837b8   Kentaro Takeda   Common functions ...
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
  	return 0;
  }
  
  /**
   * tomoyo_read_pid - Get domainname of the specified PID.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns the domainname which the specified PID is in on success,
   * empty string otherwise.
   * The PID is specified by tomoyo_write_pid() so that the user can obtain
   * using read()/write() interface rather than sysctl() interface.
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
1640
  static void tomoyo_read_pid(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1641
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
  	char *buf = head->write_buf;
  	bool global_pid = false;
  	unsigned int pid;
  	struct task_struct *p;
  	struct tomoyo_domain_info *domain = NULL;
  
  	/* Accessing write_buf is safe because head->io_sem is held. */
  	if (!buf) {
  		head->r.eof = true;
  		return; /* Do nothing if open(O_RDONLY). */
9590837b8   Kentaro Takeda   Common functions ...
1652
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1653
1654
1655
1656
1657
1658
1659
  	if (head->r.w_pos || head->r.eof)
  		return;
  	head->r.eof = true;
  	if (tomoyo_str_starts(&buf, "global-pid "))
  		global_pid = true;
  	pid = (unsigned int) simple_strtoul(buf, NULL, 10);
  	rcu_read_lock();
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1660
1661
1662
1663
1664
1665
  	if (global_pid)
  		p = find_task_by_pid_ns(pid, &init_pid_ns);
  	else
  		p = find_task_by_vpid(pid);
  	if (p)
  		domain = tomoyo_real_domain(p);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1666
1667
1668
1669
1670
  	rcu_read_unlock();
  	if (!domain)
  		return;
  	tomoyo_io_printf(head, "%u %u ", pid, domain->profile);
  	tomoyo_set_string(head, domain->domainname->name);
9590837b8   Kentaro Takeda   Common functions ...
1671
  }
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
1672
  /* String table for domain transition control keywords. */
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1673
  static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1674
1675
1676
1677
1678
1679
  	[TOMOYO_TRANSITION_CONTROL_NO_RESET]      = "no_reset_domain ",
  	[TOMOYO_TRANSITION_CONTROL_RESET]         = "reset_domain ",
  	[TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE] = "no_initialize_domain ",
  	[TOMOYO_TRANSITION_CONTROL_INITIALIZE]    = "initialize_domain ",
  	[TOMOYO_TRANSITION_CONTROL_NO_KEEP]       = "no_keep_domain ",
  	[TOMOYO_TRANSITION_CONTROL_KEEP]          = "keep_domain ",
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1680
  };
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
1681
  /* String table for grouping keywords. */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1682
  static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = {
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1683
1684
1685
  	[TOMOYO_PATH_GROUP]    = "path_group ",
  	[TOMOYO_NUMBER_GROUP]  = "number_group ",
  	[TOMOYO_ADDRESS_GROUP] = "address_group ",
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1686
  };
9590837b8   Kentaro Takeda   Common functions ...
1687
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1688
   * tomoyo_write_exception - Write exception policy.
9590837b8   Kentaro Takeda   Common functions ...
1689
1690
1691
1692
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1693
1694
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1695
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1696
  static int tomoyo_write_exception(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1697
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1698
  	const bool is_delete = head->w.is_delete;
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1699
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1700
1701
  		.ns = head->w.ns,
  		.is_delete = is_delete,
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1702
  		.data = head->write_buf,
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1703
  	};
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1704
  	u8 i;
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1705
1706
  	if (tomoyo_str_starts(&param.data, "aggregator "))
  		return tomoyo_write_aggregator(&param);
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1707
  	for (i = 0; i < TOMOYO_MAX_TRANSITION_TYPE; i++)
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1708
1709
  		if (tomoyo_str_starts(&param.data, tomoyo_transition_type[i]))
  			return tomoyo_write_transition_control(&param, i);
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1710
  	for (i = 0; i < TOMOYO_MAX_GROUP; i++)
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1711
1712
  		if (tomoyo_str_starts(&param.data, tomoyo_group_name[i]))
  			return tomoyo_write_group(&param, i);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1713
1714
1715
1716
1717
  	if (tomoyo_str_starts(&param.data, "acl_group ")) {
  		unsigned int group;
  		char *data;
  		group = simple_strtoul(param.data, &data, 10);
  		if (group < TOMOYO_MAX_ACL_GROUPS && *data++ == ' ')
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1718
1719
1720
  			return tomoyo_write_domain2
  				(head->w.ns, &head->w.ns->acl_group[group],
  				 data, is_delete);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1721
  	}
9590837b8   Kentaro Takeda   Common functions ...
1722
1723
1724
1725
  	return -EINVAL;
  }
  
  /**
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1726
   * tomoyo_read_group - Read "struct tomoyo_path_group"/"struct tomoyo_number_group"/"struct tomoyo_address_group" list.
9590837b8   Kentaro Takeda   Common functions ...
1727
1728
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1729
1730
1731
   * @idx:  Index number.
   *
   * Returns true on success, false otherwise.
9590837b8   Kentaro Takeda   Common functions ...
1732
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1733
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1734
   */
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1735
  static bool tomoyo_read_group(struct tomoyo_io_buffer *head, const int idx)
9590837b8   Kentaro Takeda   Common functions ...
1736
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1737
1738
1739
1740
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
  	struct list_head *list = &ns->group_list[idx];
  	list_for_each_cookie(head->r.group, list) {
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1741
  		struct tomoyo_group *group =
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1742
  			list_entry(head->r.group, typeof(*group), head.list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1743
  		list_for_each_cookie(head->r.acl, &group->member_list) {
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1744
  			struct tomoyo_acl_head *ptr =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1745
  				list_entry(head->r.acl, typeof(*ptr), list);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1746
1747
  			if (ptr->is_deleted)
  				continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1748
1749
  			if (!tomoyo_flush(head))
  				return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1750
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1751
1752
  			tomoyo_set_string(head, tomoyo_group_name[idx]);
  			tomoyo_set_string(head, group->group_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1753
  			if (idx == TOMOYO_PATH_GROUP) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1754
1755
1756
1757
  				tomoyo_set_space(head);
  				tomoyo_set_string(head, container_of
  					       (ptr, struct tomoyo_path_group,
  						head)->member_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1758
  			} else if (idx == TOMOYO_NUMBER_GROUP) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1759
1760
1761
1762
  				tomoyo_print_number_union(head, &container_of
  							  (ptr,
  						   struct tomoyo_number_group,
  							   head)->number);
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1763
1764
1765
1766
1767
1768
1769
1770
1771
  			} else if (idx == TOMOYO_ADDRESS_GROUP) {
  				char buffer[128];
  
  				struct tomoyo_address_group *member =
  					container_of(ptr, typeof(*member),
  						     head);
  				tomoyo_print_ip(buffer, sizeof(buffer),
  						&member->address);
  				tomoyo_io_printf(head, " %s", buffer);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1772
  			}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1773
  			tomoyo_set_lf(head);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1774
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1775
  		head->r.acl = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1776
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1777
  	head->r.group = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
  	return true;
  }
  
  /**
   * tomoyo_read_policy - Read "struct tomoyo_..._entry" list.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @idx:  Index number.
   *
   * Returns true on success, false otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static bool tomoyo_read_policy(struct tomoyo_io_buffer *head, const int idx)
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1793
1794
1795
1796
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
  	struct list_head *list = &ns->policy_list[idx];
  	list_for_each_cookie(head->r.acl, list) {
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
1797
  		struct tomoyo_acl_head *acl =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1798
  			container_of(head->r.acl, typeof(*acl), list);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1799
1800
  		if (acl->is_deleted)
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1801
1802
  		if (!tomoyo_flush(head))
  			return false;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1803
  		switch (idx) {
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1804
  		case TOMOYO_ID_TRANSITION_CONTROL:
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1805
  			{
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1806
  				struct tomoyo_transition_control *ptr =
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1807
  					container_of(acl, typeof(*ptr), head);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1808
  				tomoyo_print_namespace(head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1809
  				tomoyo_set_string(head, tomoyo_transition_type
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1810
  						  [ptr->type]);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1811
1812
1813
1814
1815
1816
  				tomoyo_set_string(head, ptr->program ?
  						  ptr->program->name : "any");
  				tomoyo_set_string(head, " from ");
  				tomoyo_set_string(head, ptr->domainname ?
  						  ptr->domainname->name :
  						  "any");
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1817
1818
  			}
  			break;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1819
1820
  		case TOMOYO_ID_AGGREGATOR:
  			{
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1821
  				struct tomoyo_aggregator *ptr =
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1822
  					container_of(acl, typeof(*ptr), head);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1823
  				tomoyo_print_namespace(head);
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1824
  				tomoyo_set_string(head, "aggregator ");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1825
1826
1827
1828
1829
  				tomoyo_set_string(head,
  						  ptr->original_name->name);
  				tomoyo_set_space(head);
  				tomoyo_set_string(head,
  					       ptr->aggregated_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1830
1831
  			}
  			break;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1832
1833
  		default:
  			continue;
9590837b8   Kentaro Takeda   Common functions ...
1834
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1835
  		tomoyo_set_lf(head);
9590837b8   Kentaro Takeda   Common functions ...
1836
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1837
  	head->r.acl = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1838
1839
1840
1841
  	return true;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1842
   * tomoyo_read_exception - Read exception policy.
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1843
1844
1845
1846
1847
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Caller holds tomoyo_read_lock().
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1848
  static void tomoyo_read_exception(struct tomoyo_io_buffer *head)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1849
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1850
1851
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1852
  	if (head->r.eof)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1853
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1854
1855
1856
1857
  	while (head->r.step < TOMOYO_MAX_POLICY &&
  	       tomoyo_read_policy(head, head->r.step))
  		head->r.step++;
  	if (head->r.step < TOMOYO_MAX_POLICY)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1858
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1859
1860
1861
1862
  	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP &&
  	       tomoyo_read_group(head, head->r.step - TOMOYO_MAX_POLICY))
  		head->r.step++;
  	if (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1863
  		return;
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1864
1865
1866
1867
  	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP
  	       + TOMOYO_MAX_ACL_GROUPS) {
  		head->r.acl_group_index = head->r.step - TOMOYO_MAX_POLICY
  			- TOMOYO_MAX_GROUP;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1868
  		if (!tomoyo_read_domain2(head, &ns->acl_group
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1869
1870
1871
1872
  					 [head->r.acl_group_index]))
  			return;
  		head->r.step++;
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1873
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
1874
  }
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1875
  /* Wait queue for kernel -> userspace notification. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1876
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_query_wait);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1877
1878
  /* Wait queue for userspace -> kernel notification. */
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_answer_wait);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1879
1880
  
  /* Structure for query. */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1881
  struct tomoyo_query {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1882
  	struct list_head list;
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
1883
  	struct tomoyo_domain_info *domain;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1884
  	char *query;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1885
  	size_t query_len;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1886
  	unsigned int serial;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1887
1888
1889
  	u8 timer;
  	u8 answer;
  	u8 retry;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1890
  };
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1891
  /* The list for "struct tomoyo_query". */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1892
  static LIST_HEAD(tomoyo_query_list);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1893
1894
  /* Lock for manipulating tomoyo_query_list. */
  static DEFINE_SPINLOCK(tomoyo_query_list_lock);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1895
1896
1897
1898
1899
1900
1901
  /*
   * Number of "struct file" referring /sys/kernel/security/tomoyo/query
   * interface.
   */
  static atomic_t tomoyo_query_observers = ATOMIC_INIT(0);
  
  /**
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
   * tomoyo_truncate - Truncate a line.
   *
   * @str: String to truncate.
   *
   * Returns length of truncated @str.
   */
  static int tomoyo_truncate(char *str)
  {
  	char *start = str;
  	while (*(unsigned char *) str > (unsigned char) ' ')
  		str++;
  	*str = '\0';
  	return strlen(start) + 1;
  }
  
  /**
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
   * tomoyo_add_entry - Add an ACL to current thread's domain. Used by learning mode.
   *
   * @domain: Pointer to "struct tomoyo_domain_info".
   * @header: Lines containing ACL.
   *
   * Returns nothing.
   */
  static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
  {
  	char *buffer;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1928
  	char *realpath = NULL;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1929
  	char *argv0 = NULL;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1930
  	char *symlink = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
  	char *cp = strchr(header, '
  ');
  	int len;
  	if (!cp)
  		return;
  	cp = strchr(cp + 1, '
  ');
  	if (!cp)
  		return;
  	*cp++ = '\0';
  	len = strlen(cp) + 1;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1942
1943
  	/* strstr() will return NULL if ordering is wrong. */
  	if (*cp == 'f') {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1944
1945
1946
1947
1948
  		argv0 = strstr(header, " argv[]={ \"");
  		if (argv0) {
  			argv0 += 10;
  			len += tomoyo_truncate(argv0) + 14;
  		}
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1949
1950
1951
1952
1953
1954
1955
1956
1957
  		realpath = strstr(header, " exec={ realpath=\"");
  		if (realpath) {
  			realpath += 8;
  			len += tomoyo_truncate(realpath) + 6;
  		}
  		symlink = strstr(header, " symlink.target=\"");
  		if (symlink)
  			len += tomoyo_truncate(symlink + 1) + 1;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1958
1959
1960
1961
  	buffer = kmalloc(len, GFP_NOFS);
  	if (!buffer)
  		return;
  	snprintf(buffer, len - 1, "%s", cp);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1962
1963
  	if (realpath)
  		tomoyo_addprintf(buffer, len, " exec.%s", realpath);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1964
1965
  	if (argv0)
  		tomoyo_addprintf(buffer, len, " exec.argv[0]=%s", argv0);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1966
1967
  	if (symlink)
  		tomoyo_addprintf(buffer, len, "%s", symlink);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1968
  	tomoyo_normalize_line(buffer);
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
1969
1970
1971
  	if (!tomoyo_write_domain2(domain->ns, &domain->acl_info_list, buffer,
  				  false))
  		tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1972
1973
1974
1975
  	kfree(buffer);
  }
  
  /**
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1976
1977
   * tomoyo_supervisor - Ask for the supervisor's decision.
   *
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1978
1979
   * @r:   Pointer to "struct tomoyo_request_info".
   * @fmt: The printf()'s format string, followed by parameters.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1980
1981
1982
1983
1984
1985
1986
1987
1988
   *
   * Returns 0 if the supervisor decided to permit the access request which
   * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the
   * supervisor decided to retry the access request which violated the policy in
   * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise.
   */
  int tomoyo_supervisor(struct tomoyo_request_info *r, const char *fmt, ...)
  {
  	va_list args;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1989
  	int error;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1990
1991
  	int len;
  	static unsigned int tomoyo_serial;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1992
  	struct tomoyo_query entry = { };
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1993
  	bool quota_exceeded = false;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
  	va_start(args, fmt);
  	len = vsnprintf((char *) &len, 1, fmt, args) + 1;
  	va_end(args);
  	/* Write /sys/kernel/security/tomoyo/audit. */
  	va_start(args, fmt);
  	tomoyo_write_log2(r, len, fmt, args);
  	va_end(args);
  	/* Nothing more to do if granted. */
  	if (r->granted)
  		return 0;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2004
2005
  	if (r->mode)
  		tomoyo_update_stat(r->mode);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2006
  	switch (r->mode) {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2007
2008
2009
2010
2011
  	case TOMOYO_CONFIG_ENFORCING:
  		error = -EPERM;
  		if (atomic_read(&tomoyo_query_observers))
  			break;
  		goto out;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2012
  	case TOMOYO_CONFIG_LEARNING:
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2013
2014
2015
2016
  		error = 0;
  		/* Check max_learning_entry parameter. */
  		if (tomoyo_domain_quota_is_ok(r))
  			break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2017
  		/* fall through */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2018
  	default:
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2019
2020
  		return 0;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2021
  	/* Get message. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2022
  	va_start(args, fmt);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2023
  	entry.query = tomoyo_init_log(r, len, fmt, args);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2024
  	va_end(args);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2025
  	if (!entry.query)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2026
  		goto out;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2027
2028
2029
  	entry.query_len = strlen(entry.query) + 1;
  	if (!error) {
  		tomoyo_add_entry(r->domain, entry.query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2030
  		goto out;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2031
2032
  	}
  	len = tomoyo_round2(entry.query_len);
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
2033
  	entry.domain = r->domain;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2034
  	spin_lock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2035
2036
2037
  	if (tomoyo_memory_quota[TOMOYO_MEMORY_QUERY] &&
  	    tomoyo_memory_used[TOMOYO_MEMORY_QUERY] + len
  	    >= tomoyo_memory_quota[TOMOYO_MEMORY_QUERY]) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2038
2039
  		quota_exceeded = true;
  	} else {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2040
2041
2042
2043
  		entry.serial = tomoyo_serial++;
  		entry.retry = r->retry;
  		tomoyo_memory_used[TOMOYO_MEMORY_QUERY] += len;
  		list_add_tail(&entry.list, &tomoyo_query_list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2044
2045
2046
2047
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (quota_exceeded)
  		goto out;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2048
  	/* Give 10 seconds for supervisor's opinion. */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2049
2050
2051
2052
2053
  	while (entry.timer < 10) {
  		wake_up_all(&tomoyo_query_wait);
  		if (wait_event_interruptible_timeout
  		    (tomoyo_answer_wait, entry.answer ||
  		     !atomic_read(&tomoyo_query_observers), HZ))
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2054
  			break;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2055
2056
  		else
  			entry.timer++;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2057
2058
  	}
  	spin_lock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2059
2060
  	list_del(&entry.list);
  	tomoyo_memory_used[TOMOYO_MEMORY_QUERY] -= len;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2061
  	spin_unlock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2062
  	switch (entry.answer) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2063
2064
2065
2066
2067
2068
2069
2070
  	case 3: /* Asked to retry by administrator. */
  		error = TOMOYO_RETRY_REQUEST;
  		r->retry++;
  		break;
  	case 1:
  		/* Granted by administrator. */
  		error = 0;
  		break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2071
  	default:
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2072
  		/* Timed out or rejected by administrator. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2073
2074
  		break;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2075
2076
  out:
  	kfree(entry.query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2077
2078
2079
2080
  	return error;
  }
  
  /**
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
   * tomoyo_find_domain_by_qid - Get domain by query id.
   *
   * @serial: Query ID assigned by tomoyo_supervisor().
   *
   * Returns pointer to "struct tomoyo_domain_info" if found, NULL otherwise.
   */
  static struct tomoyo_domain_info *tomoyo_find_domain_by_qid
  (unsigned int serial)
  {
  	struct tomoyo_query *ptr;
  	struct tomoyo_domain_info *domain = NULL;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each_entry(ptr, &tomoyo_query_list, list) {
  		if (ptr->serial != serial || ptr->answer)
  			continue;
  		domain = ptr->domain;
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	return domain;
  }
  
  /**
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
   * tomoyo_poll_query - poll() for /sys/kernel/security/tomoyo/query.
   *
   * @file: Pointer to "struct file".
   * @wait: Pointer to "poll_table".
   *
   * Returns POLLIN | POLLRDNORM when ready to read, 0 otherwise.
   *
   * Waits for access requests which violated policy in enforcing mode.
   */
  static int tomoyo_poll_query(struct file *file, poll_table *wait)
  {
  	struct list_head *tmp;
  	bool found = false;
  	u8 i;
  	for (i = 0; i < 2; i++) {
  		spin_lock(&tomoyo_query_list_lock);
  		list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2121
2122
  			struct tomoyo_query *ptr =
  				list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
  			if (ptr->answer)
  				continue;
  			found = true;
  			break;
  		}
  		spin_unlock(&tomoyo_query_list_lock);
  		if (found)
  			return POLLIN | POLLRDNORM;
  		if (i)
  			break;
  		poll_wait(file, &tomoyo_query_wait, wait);
  	}
  	return 0;
  }
  
  /**
   * tomoyo_read_query - Read access requests which violated policy in enforcing mode.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2142
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2143
  static void tomoyo_read_query(struct tomoyo_io_buffer *head)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2144
2145
  {
  	struct list_head *tmp;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2146
2147
  	unsigned int pos = 0;
  	size_t len = 0;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2148
  	char *buf;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2149
  	if (head->r.w_pos)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2150
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2151
2152
2153
  	if (head->read_buf) {
  		kfree(head->read_buf);
  		head->read_buf = NULL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2154
2155
2156
  	}
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2157
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2158
2159
  		if (ptr->answer)
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2160
  		if (pos++ != head->r.query_index)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2161
2162
2163
2164
2165
2166
  			continue;
  		len = ptr->query_len;
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (!len) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2167
  		head->r.query_index = 0;
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2168
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2169
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2170
  	buf = kzalloc(len + 32, GFP_NOFS);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2171
  	if (!buf)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2172
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2173
2174
2175
  	pos = 0;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2176
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2177
2178
  		if (ptr->answer)
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2179
  		if (pos++ != head->r.query_index)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2180
2181
2182
2183
2184
2185
  			continue;
  		/*
  		 * Some query can be skipped because tomoyo_query_list
  		 * can change, but I don't care.
  		 */
  		if (len == ptr->query_len)
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2186
2187
2188
  			snprintf(buf, len + 31, "Q%u-%hu
  %s", ptr->serial,
  				 ptr->retry, ptr->query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2189
2190
2191
2192
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (buf[0]) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2193
  		head->read_buf = buf;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2194
2195
  		head->r.w[head->r.w_pos++] = buf;
  		head->r.query_index++;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2196
2197
2198
  	} else {
  		kfree(buf);
  	}
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
  }
  
  /**
   * tomoyo_write_answer - Write the supervisor's decision.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, -EINVAL otherwise.
   */
  static int tomoyo_write_answer(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	struct list_head *tmp;
  	unsigned int serial;
  	unsigned int answer;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2216
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2217
2218
2219
2220
2221
2222
2223
  		ptr->timer = 0;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (sscanf(data, "A%u=%u", &serial, &answer) != 2)
  		return -EINVAL;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2224
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
  		if (ptr->serial != serial)
  			continue;
  		if (!ptr->answer)
  			ptr->answer = answer;
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	return 0;
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2236
2237
2238
2239
2240
2241
   * tomoyo_read_version: Get version.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns version information.
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2242
  static void tomoyo_read_version(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
2243
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2244
  	if (!head->r.eof) {
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2245
  		tomoyo_io_printf(head, "2.5.0");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2246
  		head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
2247
  	}
9590837b8   Kentaro Takeda   Common functions ...
2248
  }
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
  /* String table for /sys/kernel/security/tomoyo/stat interface. */
  static const char * const tomoyo_policy_headers[TOMOYO_MAX_POLICY_STAT] = {
  	[TOMOYO_STAT_POLICY_UPDATES]    = "update:",
  	[TOMOYO_STAT_POLICY_LEARNING]   = "violation in learning mode:",
  	[TOMOYO_STAT_POLICY_PERMISSIVE] = "violation in permissive mode:",
  	[TOMOYO_STAT_POLICY_ENFORCING]  = "violation in enforcing mode:",
  };
  
  /* String table for /sys/kernel/security/tomoyo/stat interface. */
  static const char * const tomoyo_memory_headers[TOMOYO_MAX_MEMORY_STAT] = {
  	[TOMOYO_MEMORY_POLICY] = "policy:",
  	[TOMOYO_MEMORY_AUDIT]  = "audit log:",
  	[TOMOYO_MEMORY_QUERY]  = "query message:",
  };
  
  /* Timestamp counter for last updated. */
  static unsigned int tomoyo_stat_updated[TOMOYO_MAX_POLICY_STAT];
  /* Counter for number of updates. */
  static unsigned int tomoyo_stat_modified[TOMOYO_MAX_POLICY_STAT];
  
  /**
   * tomoyo_update_stat - Update statistic counters.
   *
   * @index: Index for policy type.
   *
   * Returns nothing.
   */
  void tomoyo_update_stat(const u8 index)
  {
  	struct timeval tv;
  	do_gettimeofday(&tv);
  	/*
  	 * I don't use atomic operations because race condition is not fatal.
  	 */
  	tomoyo_stat_updated[index]++;
  	tomoyo_stat_modified[index] = tv.tv_sec;
  }
  
  /**
   * tomoyo_read_stat - Read statistic data.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_read_stat(struct tomoyo_io_buffer *head)
  {
  	u8 i;
  	unsigned int total = 0;
  	if (head->r.eof)
  		return;
  	for (i = 0; i < TOMOYO_MAX_POLICY_STAT; i++) {
  		tomoyo_io_printf(head, "Policy %-30s %10u",
  				 tomoyo_policy_headers[i],
  				 tomoyo_stat_updated[i]);
  		if (tomoyo_stat_modified[i]) {
  			struct tomoyo_time stamp;
  			tomoyo_convert_time(tomoyo_stat_modified[i], &stamp);
  			tomoyo_io_printf(head, " (Last: %04u/%02u/%02u "
  					 "%02u:%02u:%02u)",
  					 stamp.year, stamp.month, stamp.day,
  					 stamp.hour, stamp.min, stamp.sec);
  		}
  		tomoyo_set_lf(head);
  	}
  	for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++) {
  		unsigned int used = tomoyo_memory_used[i];
  		total += used;
  		tomoyo_io_printf(head, "Memory used by %-22s %10u",
  				 tomoyo_memory_headers[i], used);
  		used = tomoyo_memory_quota[i];
  		if (used)
  			tomoyo_io_printf(head, " (Quota: %10u)", used);
  		tomoyo_set_lf(head);
  	}
  	tomoyo_io_printf(head, "Total memory used:                    %10u
  ",
  			 total);
  	head->r.eof = true;
  }
  
  /**
   * tomoyo_write_stat - Set memory quota.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0.
   */
  static int tomoyo_write_stat(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	u8 i;
  	if (tomoyo_str_starts(&data, "Memory used by "))
  		for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++)
  			if (tomoyo_str_starts(&data, tomoyo_memory_headers[i]))
  				sscanf(data, "%u", &tomoyo_memory_quota[i]);
  	return 0;
  }
9590837b8   Kentaro Takeda   Common functions ...
2347
2348
2349
2350
2351
2352
  /**
   * tomoyo_open_control - open() for /sys/kernel/security/tomoyo/ interface.
   *
   * @type: Type of interface.
   * @file: Pointer to "struct file".
   *
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2353
   * Returns 0 on success, negative value otherwise.
9590837b8   Kentaro Takeda   Common functions ...
2354
   */
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2355
  int tomoyo_open_control(const u8 type, struct file *file)
9590837b8   Kentaro Takeda   Common functions ...
2356
  {
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2357
  	struct tomoyo_io_buffer *head = kzalloc(sizeof(*head), GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2358
2359
2360
2361
  
  	if (!head)
  		return -ENOMEM;
  	mutex_init(&head->io_sem);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2362
  	head->type = type;
9590837b8   Kentaro Takeda   Common functions ...
2363
2364
2365
  	switch (type) {
  	case TOMOYO_DOMAINPOLICY:
  		/* /sys/kernel/security/tomoyo/domain_policy */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2366
2367
  		head->write = tomoyo_write_domain;
  		head->read = tomoyo_read_domain;
9590837b8   Kentaro Takeda   Common functions ...
2368
2369
2370
  		break;
  	case TOMOYO_EXCEPTIONPOLICY:
  		/* /sys/kernel/security/tomoyo/exception_policy */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2371
2372
  		head->write = tomoyo_write_exception;
  		head->read = tomoyo_read_exception;
9590837b8   Kentaro Takeda   Common functions ...
2373
  		break;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2374
2375
2376
2377
2378
  	case TOMOYO_AUDIT:
  		/* /sys/kernel/security/tomoyo/audit */
  		head->poll = tomoyo_poll_log;
  		head->read = tomoyo_read_log;
  		break;
9590837b8   Kentaro Takeda   Common functions ...
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
  	case TOMOYO_PROCESS_STATUS:
  		/* /sys/kernel/security/tomoyo/.process_status */
  		head->write = tomoyo_write_pid;
  		head->read = tomoyo_read_pid;
  		break;
  	case TOMOYO_VERSION:
  		/* /sys/kernel/security/tomoyo/version */
  		head->read = tomoyo_read_version;
  		head->readbuf_size = 128;
  		break;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2389
2390
2391
2392
2393
  	case TOMOYO_STAT:
  		/* /sys/kernel/security/tomoyo/stat */
  		head->write = tomoyo_write_stat;
  		head->read = tomoyo_read_stat;
  		head->readbuf_size = 1024;
9590837b8   Kentaro Takeda   Common functions ...
2394
2395
2396
2397
2398
2399
  		break;
  	case TOMOYO_PROFILE:
  		/* /sys/kernel/security/tomoyo/profile */
  		head->write = tomoyo_write_profile;
  		head->read = tomoyo_read_profile;
  		break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2400
2401
2402
2403
2404
  	case TOMOYO_QUERY: /* /sys/kernel/security/tomoyo/query */
  		head->poll = tomoyo_poll_query;
  		head->write = tomoyo_write_answer;
  		head->read = tomoyo_read_query;
  		break;
9590837b8   Kentaro Takeda   Common functions ...
2405
2406
  	case TOMOYO_MANAGER:
  		/* /sys/kernel/security/tomoyo/manager */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2407
2408
  		head->write = tomoyo_write_manager;
  		head->read = tomoyo_read_manager;
9590837b8   Kentaro Takeda   Common functions ...
2409
2410
2411
2412
2413
2414
2415
2416
  		break;
  	}
  	if (!(file->f_mode & FMODE_READ)) {
  		/*
  		 * No need to allocate read_buf since it is not opened
  		 * for reading.
  		 */
  		head->read = NULL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2417
2418
2419
  		head->poll = NULL;
  	} else if (!head->poll) {
  		/* Don't allocate read_buf for poll() access. */
9590837b8   Kentaro Takeda   Common functions ...
2420
2421
  		if (!head->readbuf_size)
  			head->readbuf_size = 4096 * 2;
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2422
  		head->read_buf = kzalloc(head->readbuf_size, GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2423
  		if (!head->read_buf) {
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
2424
  			kfree(head);
9590837b8   Kentaro Takeda   Common functions ...
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
  			return -ENOMEM;
  		}
  	}
  	if (!(file->f_mode & FMODE_WRITE)) {
  		/*
  		 * No need to allocate write_buf since it is not opened
  		 * for writing.
  		 */
  		head->write = NULL;
  	} else if (head->write) {
  		head->writebuf_size = 4096 * 2;
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2436
  		head->write_buf = kzalloc(head->writebuf_size, GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2437
  		if (!head->write_buf) {
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
2438
2439
  			kfree(head->read_buf);
  			kfree(head);
9590837b8   Kentaro Takeda   Common functions ...
2440
2441
2442
  			return -ENOMEM;
  		}
  	}
9590837b8   Kentaro Takeda   Common functions ...
2443
  	/*
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2444
2445
2446
2447
2448
  	 * If the file is /sys/kernel/security/tomoyo/query , increment the
  	 * observer counter.
  	 * The obserber counter is used by tomoyo_supervisor() to see if
  	 * there is some process monitoring /sys/kernel/security/tomoyo/query.
  	 */
7c75964f4   Tetsuo Handa   TOMOYO: Cleanup p...
2449
  	if (type == TOMOYO_QUERY)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2450
  		atomic_inc(&tomoyo_query_observers);
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2451
2452
  	file->private_data = head;
  	tomoyo_notify_gc(head, true);
9590837b8   Kentaro Takeda   Common functions ...
2453
2454
2455
2456
  	return 0;
  }
  
  /**
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2457
2458
2459
2460
2461
2462
   * tomoyo_poll_control - poll() for /sys/kernel/security/tomoyo/ interface.
   *
   * @file: Pointer to "struct file".
   * @wait: Pointer to "poll_table".
   *
   * Waits for read readiness.
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2463
2464
   * /sys/kernel/security/tomoyo/query is handled by /usr/sbin/tomoyo-queryd and
   * /sys/kernel/security/tomoyo/audit is handled by /usr/sbin/tomoyo-auditd.
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
   */
  int tomoyo_poll_control(struct file *file, poll_table *wait)
  {
  	struct tomoyo_io_buffer *head = file->private_data;
  	if (!head->poll)
  		return -ENOSYS;
  	return head->poll(file, wait);
  }
  
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
   * tomoyo_set_namespace_cursor - Set namespace to read.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static inline void tomoyo_set_namespace_cursor(struct tomoyo_io_buffer *head)
  {
  	struct list_head *ns;
  	if (head->type != TOMOYO_EXCEPTIONPOLICY &&
  	    head->type != TOMOYO_PROFILE)
  		return;
  	/*
  	 * If this is the first read, or reading previous namespace finished
  	 * and has more namespaces to read, update the namespace cursor.
  	 */
  	ns = head->r.ns;
  	if (!ns || (head->r.eof && ns->next != &tomoyo_namespace_list)) {
  		/* Clearing is OK because tomoyo_flush() returned true. */
  		memset(&head->r, 0, sizeof(head->r));
  		head->r.ns = ns ? ns->next : tomoyo_namespace_list.next;
  	}
  }
  
  /**
   * tomoyo_has_more_namespace - Check for unread namespaces.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns true if we have more entries to print, false otherwise.
   */
  static inline bool tomoyo_has_more_namespace(struct tomoyo_io_buffer *head)
  {
  	return (head->type == TOMOYO_EXCEPTIONPOLICY ||
  		head->type == TOMOYO_PROFILE) && head->r.eof &&
  		head->r.ns->next != &tomoyo_namespace_list;
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2514
2515
   * tomoyo_read_control - read() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2516
   * @head:       Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2517
2518
2519
2520
2521
   * @buffer:     Poiner to buffer to write to.
   * @buffer_len: Size of @buffer.
   *
   * Returns bytes read on success, negative value otherwise.
   */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2522
2523
  ssize_t tomoyo_read_control(struct tomoyo_io_buffer *head, char __user *buffer,
  			    const int buffer_len)
9590837b8   Kentaro Takeda   Common functions ...
2524
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2525
  	int len;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2526
  	int idx;
9590837b8   Kentaro Takeda   Common functions ...
2527
2528
2529
2530
2531
  
  	if (!head->read)
  		return -ENOSYS;
  	if (mutex_lock_interruptible(&head->io_sem))
  		return -EINTR;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2532
2533
  	head->read_user_buf = buffer;
  	head->read_user_buf_avail = buffer_len;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2534
  	idx = tomoyo_read_lock();
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2535
2536
  	if (tomoyo_flush(head))
  		/* Call the policy handler. */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2537
2538
2539
2540
2541
  		do {
  			tomoyo_set_namespace_cursor(head);
  			head->read(head);
  		} while (tomoyo_flush(head) &&
  			 tomoyo_has_more_namespace(head));
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2542
  	tomoyo_read_unlock(idx);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2543
  	len = head->read_user_buf - buffer;
9590837b8   Kentaro Takeda   Common functions ...
2544
2545
2546
2547
2548
  	mutex_unlock(&head->io_sem);
  	return len;
  }
  
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
   * tomoyo_parse_policy - Parse a policy line.
   *
   * @head: Poiter to "struct tomoyo_io_buffer".
   * @line: Line to parse.
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static int tomoyo_parse_policy(struct tomoyo_io_buffer *head, char *line)
  {
  	/* Delete request? */
  	head->w.is_delete = !strncmp(line, "delete ", 7);
  	if (head->w.is_delete)
  		memmove(line, line + 7, strlen(line + 7) + 1);
  	/* Selecting namespace to update. */
  	if (head->type == TOMOYO_EXCEPTIONPOLICY ||
  	    head->type == TOMOYO_PROFILE) {
  		if (*line == '<') {
  			char *cp = strchr(line, ' ');
  			if (cp) {
  				*cp++ = '\0';
  				head->w.ns = tomoyo_assign_namespace(line);
  				memmove(line, cp, strlen(cp) + 1);
  			} else
  				head->w.ns = NULL;
  		} else
  			head->w.ns = &tomoyo_kernel_namespace;
  		/* Don't allow updating if namespace is invalid. */
  		if (!head->w.ns)
  			return -ENOENT;
  	}
  	/* Do the update. */
  	return head->write(head);
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2586
2587
   * tomoyo_write_control - write() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2588
   * @head:       Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2589
2590
2591
2592
2593
   * @buffer:     Pointer to buffer to read from.
   * @buffer_len: Size of @buffer.
   *
   * Returns @buffer_len on success, negative value otherwise.
   */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2594
2595
  ssize_t tomoyo_write_control(struct tomoyo_io_buffer *head,
  			     const char __user *buffer, const int buffer_len)
9590837b8   Kentaro Takeda   Common functions ...
2596
  {
9590837b8   Kentaro Takeda   Common functions ...
2597
  	int error = buffer_len;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2598
  	size_t avail_len = buffer_len;
9590837b8   Kentaro Takeda   Common functions ...
2599
  	char *cp0 = head->write_buf;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2600
  	int idx;
9590837b8   Kentaro Takeda   Common functions ...
2601
2602
2603
2604
  	if (!head->write)
  		return -ENOSYS;
  	if (!access_ok(VERIFY_READ, buffer, buffer_len))
  		return -EFAULT;
9590837b8   Kentaro Takeda   Common functions ...
2605
2606
  	if (mutex_lock_interruptible(&head->io_sem))
  		return -EINTR;
e0b057b40   Tetsuo Handa   TOMOYO: Fix incom...
2607
  	head->read_user_buf_avail = 0;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2608
  	idx = tomoyo_read_lock();
9590837b8   Kentaro Takeda   Common functions ...
2609
2610
2611
  	/* Read a line and dispatch it to the policy handler. */
  	while (avail_len > 0) {
  		char c;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2612
  		if (head->w.avail >= head->writebuf_size - 1) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
  			const int len = head->writebuf_size * 2;
  			char *cp = kzalloc(len, GFP_NOFS);
  			if (!cp) {
  				error = -ENOMEM;
  				break;
  			}
  			memmove(cp, cp0, head->w.avail);
  			kfree(cp0);
  			head->write_buf = cp;
  			cp0 = cp;
  			head->writebuf_size = len;
  		}
  		if (get_user(c, buffer)) {
9590837b8   Kentaro Takeda   Common functions ...
2626
2627
2628
2629
2630
  			error = -EFAULT;
  			break;
  		}
  		buffer++;
  		avail_len--;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2631
  		cp0[head->w.avail++] = c;
9590837b8   Kentaro Takeda   Common functions ...
2632
2633
2634
  		if (c != '
  ')
  			continue;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2635
2636
  		cp0[head->w.avail - 1] = '\0';
  		head->w.avail = 0;
9590837b8   Kentaro Takeda   Common functions ...
2637
  		tomoyo_normalize_line(cp0);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
  		if (!strcmp(cp0, "reset")) {
  			head->w.ns = &tomoyo_kernel_namespace;
  			head->w.domain = NULL;
  			memset(&head->r, 0, sizeof(head->r));
  			continue;
  		}
  		/* Don't allow updating policies by non manager programs. */
  		switch (head->type) {
  		case TOMOYO_PROCESS_STATUS:
  			/* This does not write anything. */
  			break;
  		case TOMOYO_DOMAINPOLICY:
  			if (tomoyo_select_domain(head, cp0))
  				continue;
  			/* fall through */
  		case TOMOYO_EXCEPTIONPOLICY:
  			if (!strcmp(cp0, "select transition_only")) {
  				head->r.print_transition_related_only = true;
  				continue;
  			}
  			/* fall through */
  		default:
  			if (!tomoyo_manager()) {
  				error = -EPERM;
  				goto out;
  			}
  		}
  		switch (tomoyo_parse_policy(head, cp0)) {
  		case -EPERM:
  			error = -EPERM;
  			goto out;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2669
2670
2671
2672
  		case 0:
  			switch (head->type) {
  			case TOMOYO_DOMAINPOLICY:
  			case TOMOYO_EXCEPTIONPOLICY:
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2673
2674
2675
2676
2677
2678
2679
2680
2681
  			case TOMOYO_STAT:
  			case TOMOYO_PROFILE:
  			case TOMOYO_MANAGER:
  				tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
  				break;
  			default:
  				break;
  			}
  			break;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2682
  		}
9590837b8   Kentaro Takeda   Common functions ...
2683
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2684
  out:
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2685
  	tomoyo_read_unlock(idx);
9590837b8   Kentaro Takeda   Common functions ...
2686
2687
2688
2689
2690
2691
2692
  	mutex_unlock(&head->io_sem);
  	return error;
  }
  
  /**
   * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2693
   * @head: Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2694
   *
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2695
   * Returns 0.
9590837b8   Kentaro Takeda   Common functions ...
2696
   */
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2697
  int tomoyo_close_control(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
2698
  {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2699
2700
2701
2702
  	/*
  	 * If the file is /sys/kernel/security/tomoyo/query , decrement the
  	 * observer counter.
  	 */
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2703
2704
2705
2706
  	if (head->type == TOMOYO_QUERY &&
  	    atomic_dec_and_test(&tomoyo_query_observers))
  		wake_up_all(&tomoyo_answer_wait);
  	tomoyo_notify_gc(head, false);
9590837b8   Kentaro Takeda   Common functions ...
2707
2708
2709
2710
  	return 0;
  }
  
  /**
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2711
   * tomoyo_check_profile - Check all profiles currently assigned to domains are defined.
9590837b8   Kentaro Takeda   Common functions ...
2712
   */
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2713
  void tomoyo_check_profile(void)
9590837b8   Kentaro Takeda   Common functions ...
2714
  {
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2715
2716
2717
  	struct tomoyo_domain_info *domain;
  	const int idx = tomoyo_read_lock();
  	tomoyo_policy_loaded = true;
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2718
2719
  	printk(KERN_INFO "TOMOYO: 2.5.0
  ");
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2720
2721
  	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
  		const u8 profile = domain->profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2722
  		const struct tomoyo_policy_namespace *ns = domain->ns;
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2723
  		if (ns->profile_version != 20110903)
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
  			printk(KERN_ERR
  			       "Profile version %u is not supported.
  ",
  			       ns->profile_version);
  		else if (!ns->profile_ptr[profile])
  			printk(KERN_ERR
  			       "Profile %u (used by '%s') is not defined.
  ",
  			       profile, domain->domainname->name);
  		else
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2734
  			continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2735
  		printk(KERN_ERR
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2736
  		       "Userland tools for TOMOYO 2.5 must be installed and "
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2737
2738
  		       "policy must be initialized.
  ");
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2739
  		printk(KERN_ERR "Please see http://tomoyo.sourceforge.jp/2.5/ "
9f1c1d426   Tetsuo Handa   TOMOYO: Print URL...
2740
2741
  		       "for more information.
  ");
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2742
  		panic("STOP!");
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2743
2744
  	}
  	tomoyo_read_unlock(idx);
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2745
2746
  	printk(KERN_INFO "Mandatory Access Control activated.
  ");
9590837b8   Kentaro Takeda   Common functions ...
2747
  }
efe836ab2   Tetsuo Handa   TOMOYO: Add built...
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
  
  /**
   * tomoyo_load_builtin_policy - Load built-in policy.
   *
   * Returns nothing.
   */
  void __init tomoyo_load_builtin_policy(void)
  {
  	/*
  	 * This include file is manually created and contains built-in policy
  	 * named "tomoyo_builtin_profile", "tomoyo_builtin_exception_policy",
  	 * "tomoyo_builtin_domain_policy", "tomoyo_builtin_manager",
  	 * "tomoyo_builtin_stat" in the form of "static char [] __initdata".
  	 */
  #include "builtin-policy.h"
  	u8 i;
  	const int idx = tomoyo_read_lock();
  	for (i = 0; i < 5; i++) {
  		struct tomoyo_io_buffer head = { };
  		char *start = "";
  		switch (i) {
  		case 0:
  			start = tomoyo_builtin_profile;
  			head.type = TOMOYO_PROFILE;
  			head.write = tomoyo_write_profile;
  			break;
  		case 1:
  			start = tomoyo_builtin_exception_policy;
  			head.type = TOMOYO_EXCEPTIONPOLICY;
  			head.write = tomoyo_write_exception;
  			break;
  		case 2:
  			start = tomoyo_builtin_domain_policy;
  			head.type = TOMOYO_DOMAINPOLICY;
  			head.write = tomoyo_write_domain;
  			break;
  		case 3:
  			start = tomoyo_builtin_manager;
  			head.type = TOMOYO_MANAGER;
  			head.write = tomoyo_write_manager;
  			break;
  		case 4:
  			start = tomoyo_builtin_stat;
  			head.type = TOMOYO_STAT;
  			head.write = tomoyo_write_stat;
  			break;
  		}
  		while (1) {
  			char *end = strchr(start, '
  ');
  			if (!end)
  				break;
  			*end = '\0';
  			tomoyo_normalize_line(start);
  			head.write_buf = start;
  			tomoyo_parse_policy(&head, start);
  			start = end + 1;
  		}
  	}
  	tomoyo_read_unlock(idx);
0e4ae0e0d   Tetsuo Handa   TOMOYO: Make seve...
2808
2809
2810
  #ifdef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
  	tomoyo_check_profile();
  #endif
efe836ab2   Tetsuo Handa   TOMOYO: Add built...
2811
  }