Blame view

security/tomoyo/common.c 75.1 KB
9590837b8   Kentaro Takeda   Common functions ...
1
2
3
  /*
   * security/tomoyo/common.c
   *
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
4
   * Copyright (C) 2005-2011  NTT DATA CORPORATION
9590837b8   Kentaro Takeda   Common functions ...
5
6
7
   */
  
  #include <linux/uaccess.h>
5a0e3ad6a   Tejun Heo   include cleanup: ...
8
  #include <linux/slab.h>
9590837b8   Kentaro Takeda   Common functions ...
9
  #include <linux/security.h>
9590837b8   Kentaro Takeda   Common functions ...
10
  #include "common.h"
9590837b8   Kentaro Takeda   Common functions ...
11

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
12
13
14
15
16
17
  /* String table for operation mode. */
  const char * const tomoyo_mode[TOMOYO_CONFIG_MAX_MODE] = {
  	[TOMOYO_CONFIG_DISABLED]   = "disabled",
  	[TOMOYO_CONFIG_LEARNING]   = "learning",
  	[TOMOYO_CONFIG_PERMISSIVE] = "permissive",
  	[TOMOYO_CONFIG_ENFORCING]  = "enforcing"
9590837b8   Kentaro Takeda   Common functions ...
18
  };
9590837b8   Kentaro Takeda   Common functions ...
19

57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
20
  /* String table for /sys/kernel/security/tomoyo/profile */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
21
  const char * const tomoyo_mac_keywords[TOMOYO_MAX_MAC_INDEX
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
22
  				       + TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
23
  	/* CONFIG::file group */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  	[TOMOYO_MAC_FILE_EXECUTE]    = "execute",
  	[TOMOYO_MAC_FILE_OPEN]       = "open",
  	[TOMOYO_MAC_FILE_CREATE]     = "create",
  	[TOMOYO_MAC_FILE_UNLINK]     = "unlink",
  	[TOMOYO_MAC_FILE_GETATTR]    = "getattr",
  	[TOMOYO_MAC_FILE_MKDIR]      = "mkdir",
  	[TOMOYO_MAC_FILE_RMDIR]      = "rmdir",
  	[TOMOYO_MAC_FILE_MKFIFO]     = "mkfifo",
  	[TOMOYO_MAC_FILE_MKSOCK]     = "mksock",
  	[TOMOYO_MAC_FILE_TRUNCATE]   = "truncate",
  	[TOMOYO_MAC_FILE_SYMLINK]    = "symlink",
  	[TOMOYO_MAC_FILE_MKBLOCK]    = "mkblock",
  	[TOMOYO_MAC_FILE_MKCHAR]     = "mkchar",
  	[TOMOYO_MAC_FILE_LINK]       = "link",
  	[TOMOYO_MAC_FILE_RENAME]     = "rename",
  	[TOMOYO_MAC_FILE_CHMOD]      = "chmod",
  	[TOMOYO_MAC_FILE_CHOWN]      = "chown",
  	[TOMOYO_MAC_FILE_CHGRP]      = "chgrp",
  	[TOMOYO_MAC_FILE_IOCTL]      = "ioctl",
  	[TOMOYO_MAC_FILE_CHROOT]     = "chroot",
  	[TOMOYO_MAC_FILE_MOUNT]      = "mount",
  	[TOMOYO_MAC_FILE_UMOUNT]     = "unmount",
  	[TOMOYO_MAC_FILE_PIVOT_ROOT] = "pivot_root",
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  	/* CONFIG::network group */
  	[TOMOYO_MAC_NETWORK_INET_STREAM_BIND]       = "inet_stream_bind",
  	[TOMOYO_MAC_NETWORK_INET_STREAM_LISTEN]     = "inet_stream_listen",
  	[TOMOYO_MAC_NETWORK_INET_STREAM_CONNECT]    = "inet_stream_connect",
  	[TOMOYO_MAC_NETWORK_INET_DGRAM_BIND]        = "inet_dgram_bind",
  	[TOMOYO_MAC_NETWORK_INET_DGRAM_SEND]        = "inet_dgram_send",
  	[TOMOYO_MAC_NETWORK_INET_RAW_BIND]          = "inet_raw_bind",
  	[TOMOYO_MAC_NETWORK_INET_RAW_SEND]          = "inet_raw_send",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_BIND]       = "unix_stream_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_LISTEN]     = "unix_stream_listen",
  	[TOMOYO_MAC_NETWORK_UNIX_STREAM_CONNECT]    = "unix_stream_connect",
  	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_BIND]        = "unix_dgram_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_SEND]        = "unix_dgram_send",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_BIND]    = "unix_seqpacket_bind",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_LISTEN]  = "unix_seqpacket_listen",
  	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_CONNECT] = "unix_seqpacket_connect",
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
63
64
65
  	/* CONFIG::misc group */
  	[TOMOYO_MAC_ENVIRON] = "env",
  	/* CONFIG group */
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
66
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_FILE] = "file",
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
67
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_NETWORK] = "network",
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
68
  	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_MISC] = "misc",
9590837b8   Kentaro Takeda   Common functions ...
69
  };
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
70
71
72
73
74
75
76
77
78
79
80
81
  /* String table for conditions. */
  const char * const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] = {
  	[TOMOYO_TASK_UID]             = "task.uid",
  	[TOMOYO_TASK_EUID]            = "task.euid",
  	[TOMOYO_TASK_SUID]            = "task.suid",
  	[TOMOYO_TASK_FSUID]           = "task.fsuid",
  	[TOMOYO_TASK_GID]             = "task.gid",
  	[TOMOYO_TASK_EGID]            = "task.egid",
  	[TOMOYO_TASK_SGID]            = "task.sgid",
  	[TOMOYO_TASK_FSGID]           = "task.fsgid",
  	[TOMOYO_TASK_PID]             = "task.pid",
  	[TOMOYO_TASK_PPID]            = "task.ppid",
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
82
83
  	[TOMOYO_EXEC_ARGC]            = "exec.argc",
  	[TOMOYO_EXEC_ENVC]            = "exec.envc",
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
  	[TOMOYO_TYPE_IS_SOCKET]       = "socket",
  	[TOMOYO_TYPE_IS_SYMLINK]      = "symlink",
  	[TOMOYO_TYPE_IS_FILE]         = "file",
  	[TOMOYO_TYPE_IS_BLOCK_DEV]    = "block",
  	[TOMOYO_TYPE_IS_DIRECTORY]    = "directory",
  	[TOMOYO_TYPE_IS_CHAR_DEV]     = "char",
  	[TOMOYO_TYPE_IS_FIFO]         = "fifo",
  	[TOMOYO_MODE_SETUID]          = "setuid",
  	[TOMOYO_MODE_SETGID]          = "setgid",
  	[TOMOYO_MODE_STICKY]          = "sticky",
  	[TOMOYO_MODE_OWNER_READ]      = "owner_read",
  	[TOMOYO_MODE_OWNER_WRITE]     = "owner_write",
  	[TOMOYO_MODE_OWNER_EXECUTE]   = "owner_execute",
  	[TOMOYO_MODE_GROUP_READ]      = "group_read",
  	[TOMOYO_MODE_GROUP_WRITE]     = "group_write",
  	[TOMOYO_MODE_GROUP_EXECUTE]   = "group_execute",
  	[TOMOYO_MODE_OTHERS_READ]     = "others_read",
  	[TOMOYO_MODE_OTHERS_WRITE]    = "others_write",
  	[TOMOYO_MODE_OTHERS_EXECUTE]  = "others_execute",
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
103
104
  	[TOMOYO_EXEC_REALPATH]        = "exec.realpath",
  	[TOMOYO_SYMLINK_TARGET]       = "symlink.target",
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
  	[TOMOYO_PATH1_UID]            = "path1.uid",
  	[TOMOYO_PATH1_GID]            = "path1.gid",
  	[TOMOYO_PATH1_INO]            = "path1.ino",
  	[TOMOYO_PATH1_MAJOR]          = "path1.major",
  	[TOMOYO_PATH1_MINOR]          = "path1.minor",
  	[TOMOYO_PATH1_PERM]           = "path1.perm",
  	[TOMOYO_PATH1_TYPE]           = "path1.type",
  	[TOMOYO_PATH1_DEV_MAJOR]      = "path1.dev_major",
  	[TOMOYO_PATH1_DEV_MINOR]      = "path1.dev_minor",
  	[TOMOYO_PATH2_UID]            = "path2.uid",
  	[TOMOYO_PATH2_GID]            = "path2.gid",
  	[TOMOYO_PATH2_INO]            = "path2.ino",
  	[TOMOYO_PATH2_MAJOR]          = "path2.major",
  	[TOMOYO_PATH2_MINOR]          = "path2.minor",
  	[TOMOYO_PATH2_PERM]           = "path2.perm",
  	[TOMOYO_PATH2_TYPE]           = "path2.type",
  	[TOMOYO_PATH2_DEV_MAJOR]      = "path2.dev_major",
  	[TOMOYO_PATH2_DEV_MINOR]      = "path2.dev_minor",
  	[TOMOYO_PATH1_PARENT_UID]     = "path1.parent.uid",
  	[TOMOYO_PATH1_PARENT_GID]     = "path1.parent.gid",
  	[TOMOYO_PATH1_PARENT_INO]     = "path1.parent.ino",
  	[TOMOYO_PATH1_PARENT_PERM]    = "path1.parent.perm",
  	[TOMOYO_PATH2_PARENT_UID]     = "path2.parent.uid",
  	[TOMOYO_PATH2_PARENT_GID]     = "path2.parent.gid",
  	[TOMOYO_PATH2_PARENT_INO]     = "path2.parent.ino",
  	[TOMOYO_PATH2_PARENT_PERM]    = "path2.parent.perm",
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
131
  };
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
132
133
  /* String table for PREFERENCE keyword. */
  static const char * const tomoyo_pref_keywords[TOMOYO_MAX_PREF] = {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
134
  	[TOMOYO_PREF_MAX_AUDIT_LOG]      = "max_audit_log",
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
135
136
  	[TOMOYO_PREF_MAX_LEARNING_ENTRY] = "max_learning_entry",
  };
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
137
138
139
140
141
142
143
144
145
146
147
148
149
150
  /* String table for path operation. */
  const char * const tomoyo_path_keyword[TOMOYO_MAX_PATH_OPERATION] = {
  	[TOMOYO_TYPE_EXECUTE]    = "execute",
  	[TOMOYO_TYPE_READ]       = "read",
  	[TOMOYO_TYPE_WRITE]      = "write",
  	[TOMOYO_TYPE_APPEND]     = "append",
  	[TOMOYO_TYPE_UNLINK]     = "unlink",
  	[TOMOYO_TYPE_GETATTR]    = "getattr",
  	[TOMOYO_TYPE_RMDIR]      = "rmdir",
  	[TOMOYO_TYPE_TRUNCATE]   = "truncate",
  	[TOMOYO_TYPE_SYMLINK]    = "symlink",
  	[TOMOYO_TYPE_CHROOT]     = "chroot",
  	[TOMOYO_TYPE_UMOUNT]     = "unmount",
  };
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
151
152
153
154
155
156
157
  /* String table for socket's operation. */
  const char * const tomoyo_socket_keyword[TOMOYO_MAX_NETWORK_OPERATION] = {
  	[TOMOYO_NETWORK_BIND]    = "bind",
  	[TOMOYO_NETWORK_LISTEN]  = "listen",
  	[TOMOYO_NETWORK_CONNECT] = "connect",
  	[TOMOYO_NETWORK_SEND]    = "send",
  };
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
158
159
160
  /* String table for categories. */
  static const char * const tomoyo_category_keywords
  [TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
161
162
163
  	[TOMOYO_MAC_CATEGORY_FILE]    = "file",
  	[TOMOYO_MAC_CATEGORY_NETWORK] = "network",
  	[TOMOYO_MAC_CATEGORY_MISC]    = "misc",
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
164
  };
9590837b8   Kentaro Takeda   Common functions ...
165
166
167
168
  /* Permit policy management by non-root user? */
  static bool tomoyo_manage_by_non_root;
  
  /* Utility functions. */
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
169
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
170
171
172
173
   * tomoyo_yesno - Return "yes" or "no".
   *
   * @value: Bool value.
   */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
174
  const char *tomoyo_yesno(const unsigned int value)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
175
176
177
  {
  	return value ? "yes" : "no";
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
178
179
180
181
182
183
184
185
186
  /**
   * tomoyo_addprintf - strncat()-like-snprintf().
   *
   * @buffer: Buffer to write to. Must be '\0'-terminated.
   * @len:    Size of @buffer.
   * @fmt:    The printf()'s format string, followed by parameters.
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
187
188
189
190
191
192
193
194
  static void tomoyo_addprintf(char *buffer, int len, const char *fmt, ...)
  {
  	va_list args;
  	const int pos = strlen(buffer);
  	va_start(args, fmt);
  	vsnprintf(buffer + pos, len - pos - 1, fmt, args);
  	va_end(args);
  }
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
195
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
196
   * tomoyo_flush - Flush queued string to userspace's buffer.
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
197
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
198
   * @head:   Pointer to "struct tomoyo_io_buffer".
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
199
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
200
   * Returns true if all data was flushed, false otherwise.
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
201
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
202
  static bool tomoyo_flush(struct tomoyo_io_buffer *head)
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
203
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
204
205
  	while (head->r.w_pos) {
  		const char *w = head->r.w[0];
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
206
  		size_t len = strlen(w);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
207
208
209
210
211
212
213
214
215
216
217
  		if (len) {
  			if (len > head->read_user_buf_avail)
  				len = head->read_user_buf_avail;
  			if (!len)
  				return false;
  			if (copy_to_user(head->read_user_buf, w, len))
  				return false;
  			head->read_user_buf_avail -= len;
  			head->read_user_buf += len;
  			w += len;
  		}
c0fa797ae   Tetsuo Handa   TOMOYO: Fix infin...
218
219
  		head->r.w[0] = w;
  		if (*w)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
220
  			return false;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
221
  		/* Add '\0' for audit logs and query. */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
222
223
224
225
226
227
228
229
230
231
232
233
234
  		if (head->poll) {
  			if (!head->read_user_buf_avail ||
  			    copy_to_user(head->read_user_buf, "", 1))
  				return false;
  			head->read_user_buf_avail--;
  			head->read_user_buf++;
  		}
  		head->r.w_pos--;
  		for (len = 0; len < head->r.w_pos; len++)
  			head->r.w[len] = head->r.w[len + 1];
  	}
  	head->r.avail = 0;
  	return true;
7762fbfff   Tetsuo Handa   TOMOYO: Add pathn...
235
236
237
  }
  
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
238
   * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
239
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
240
241
   * @head:   Pointer to "struct tomoyo_io_buffer".
   * @string: String to print.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
242
   *
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
243
244
245
   * Note that @string has to be kept valid until @head is kfree()d.
   * This means that char[] allocated on stack memory cannot be passed to
   * this function. Use tomoyo_io_printf() for char[] allocated on stack memory.
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
246
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
247
  static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string)
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
248
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
249
250
251
252
253
  	if (head->r.w_pos < TOMOYO_MAX_IO_READ_QUEUE) {
  		head->r.w[head->r.w_pos++] = string;
  		tomoyo_flush(head);
  	} else
  		WARN_ON(1);
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
254
  }
778c4a4d6   Tetsuo Handa   TOMOYO: Fix make ...
255
256
  static void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt,
  			     ...) __printf(2, 3);
4c3e9e2de   Tetsuo Handa   TOMOYO: Add numer...
257
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
258
   * tomoyo_io_printf - printf() to "struct tomoyo_io_buffer" structure.
9590837b8   Kentaro Takeda   Common functions ...
259
260
261
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @fmt:  The printf()'s format string, followed by parameters.
9590837b8   Kentaro Takeda   Common functions ...
262
   */
778c4a4d6   Tetsuo Handa   TOMOYO: Fix make ...
263
264
  static void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt,
  			     ...)
9590837b8   Kentaro Takeda   Common functions ...
265
266
  {
  	va_list args;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
267
268
  	size_t len;
  	size_t pos = head->r.avail;
9590837b8   Kentaro Takeda   Common functions ...
269
  	int size = head->readbuf_size - pos;
9590837b8   Kentaro Takeda   Common functions ...
270
  	if (size <= 0)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
271
  		return;
9590837b8   Kentaro Takeda   Common functions ...
272
  	va_start(args, fmt);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
273
  	len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1;
9590837b8   Kentaro Takeda   Common functions ...
274
  	va_end(args);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
275
276
277
278
279
280
281
  	if (pos + len >= head->readbuf_size) {
  		WARN_ON(1);
  		return;
  	}
  	head->r.avail += len;
  	tomoyo_set_string(head, head->read_buf + pos);
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
282
283
284
285
286
287
288
  /**
   * tomoyo_set_space - Put a space to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
289
290
291
292
  static void tomoyo_set_space(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, " ");
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
293
294
295
296
297
298
299
  /**
   * tomoyo_set_lf - Put a line feed to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
300
301
302
303
304
305
306
307
  static bool tomoyo_set_lf(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, "
  ");
  	return !head->r.w_pos;
  }
  
  /**
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
308
309
310
311
312
313
314
315
316
317
   * tomoyo_set_slash - Put a shash to "struct tomoyo_io_buffer" structure.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_set_slash(struct tomoyo_io_buffer *head)
  {
  	tomoyo_set_string(head, "/");
  }
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
  /* List of namespaces. */
  LIST_HEAD(tomoyo_namespace_list);
  /* True if namespace other than tomoyo_kernel_namespace is defined. */
  static bool tomoyo_namespace_enabled;
  
  /**
   * tomoyo_init_policy_namespace - Initialize namespace.
   *
   * @ns: Pointer to "struct tomoyo_policy_namespace".
   *
   * Returns nothing.
   */
  void tomoyo_init_policy_namespace(struct tomoyo_policy_namespace *ns)
  {
  	unsigned int idx;
  	for (idx = 0; idx < TOMOYO_MAX_ACL_GROUPS; idx++)
  		INIT_LIST_HEAD(&ns->acl_group[idx]);
  	for (idx = 0; idx < TOMOYO_MAX_GROUP; idx++)
  		INIT_LIST_HEAD(&ns->group_list[idx]);
  	for (idx = 0; idx < TOMOYO_MAX_POLICY; idx++)
  		INIT_LIST_HEAD(&ns->policy_list[idx]);
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
339
  	ns->profile_version = 20110903;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
  	tomoyo_namespace_enabled = !list_empty(&tomoyo_namespace_list);
  	list_add_tail_rcu(&ns->namespace_list, &tomoyo_namespace_list);
  }
  
  /**
   * tomoyo_print_namespace - Print namespace header.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_print_namespace(struct tomoyo_io_buffer *head)
  {
  	if (!tomoyo_namespace_enabled)
  		return;
  	tomoyo_set_string(head,
  			  container_of(head->r.ns,
  				       struct tomoyo_policy_namespace,
  				       namespace_list)->name);
  	tomoyo_set_space(head);
  }
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
361
  /**
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
362
363
364
365
366
367
368
369
370
   * tomoyo_print_name_union - Print a tomoyo_name_union.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_name_union".
   */
  static void tomoyo_print_name_union(struct tomoyo_io_buffer *head,
  				    const struct tomoyo_name_union *ptr)
  {
  	tomoyo_set_space(head);
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
371
  	if (ptr->group) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
372
373
374
375
376
377
378
379
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		tomoyo_set_string(head, ptr->filename->name);
  	}
  }
  
  /**
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
   * tomoyo_print_name_union_quoted - Print a tomoyo_name_union with a quote.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_name_union".
   *
   * Returns nothing.
   */
  static void tomoyo_print_name_union_quoted(struct tomoyo_io_buffer *head,
  					   const struct tomoyo_name_union *ptr)
  {
  	if (ptr->group) {
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		tomoyo_set_string(head, "\"");
  		tomoyo_set_string(head, ptr->filename->name);
  		tomoyo_set_string(head, "\"");
  	}
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
401
   * tomoyo_print_number_union_nospace - Print a tomoyo_number_union without a space.
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
402
   *
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
403
404
405
406
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_number_union".
   *
   * Returns nothing.
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
407
   */
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
408
409
  static void tomoyo_print_number_union_nospace
  (struct tomoyo_io_buffer *head, const struct tomoyo_number_union *ptr)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
410
  {
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
411
  	if (ptr->group) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
412
413
414
415
416
417
  		tomoyo_set_string(head, "@");
  		tomoyo_set_string(head, ptr->group->group_name->name);
  	} else {
  		int i;
  		unsigned long min = ptr->values[0];
  		const unsigned long max = ptr->values[1];
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
418
419
  		u8 min_type = ptr->value_type[0];
  		const u8 max_type = ptr->value_type[1];
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
420
421
422
423
424
425
426
427
428
429
430
431
432
  		char buffer[128];
  		buffer[0] = '\0';
  		for (i = 0; i < 2; i++) {
  			switch (min_type) {
  			case TOMOYO_VALUE_TYPE_HEXADECIMAL:
  				tomoyo_addprintf(buffer, sizeof(buffer),
  						 "0x%lX", min);
  				break;
  			case TOMOYO_VALUE_TYPE_OCTAL:
  				tomoyo_addprintf(buffer, sizeof(buffer),
  						 "0%lo", min);
  				break;
  			default:
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
433
434
  				tomoyo_addprintf(buffer, sizeof(buffer), "%lu",
  						 min);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
435
436
437
438
439
440
441
442
443
444
  				break;
  			}
  			if (min == max && min_type == max_type)
  				break;
  			tomoyo_addprintf(buffer, sizeof(buffer), "-");
  			min_type = max_type;
  			min = max;
  		}
  		tomoyo_io_printf(head, "%s", buffer);
  	}
9590837b8   Kentaro Takeda   Common functions ...
445
446
447
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
   * tomoyo_print_number_union - Print a tomoyo_number_union.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @ptr:  Pointer to "struct tomoyo_number_union".
   *
   * Returns nothing.
   */
  static void tomoyo_print_number_union(struct tomoyo_io_buffer *head,
  				      const struct tomoyo_number_union *ptr)
  {
  	tomoyo_set_space(head);
  	tomoyo_print_number_union_nospace(head, ptr);
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
463
   * tomoyo_assign_profile - Create a new profile.
9590837b8   Kentaro Takeda   Common functions ...
464
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
465
   * @ns:      Pointer to "struct tomoyo_policy_namespace".
9590837b8   Kentaro Takeda   Common functions ...
466
467
468
469
   * @profile: Profile number to create.
   *
   * Returns pointer to "struct tomoyo_profile" on success, NULL otherwise.
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
470
471
  static struct tomoyo_profile *tomoyo_assign_profile
  (struct tomoyo_policy_namespace *ns, const unsigned int profile)
9590837b8   Kentaro Takeda   Common functions ...
472
  {
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
473
474
  	struct tomoyo_profile *ptr;
  	struct tomoyo_profile *entry;
9590837b8   Kentaro Takeda   Common functions ...
475
476
  	if (profile >= TOMOYO_MAX_PROFILES)
  		return NULL;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
477
  	ptr = ns->profile_ptr[profile];
9590837b8   Kentaro Takeda   Common functions ...
478
  	if (ptr)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
479
480
481
482
  		return ptr;
  	entry = kzalloc(sizeof(*entry), GFP_NOFS);
  	if (mutex_lock_interruptible(&tomoyo_policy_lock))
  		goto out;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
483
  	ptr = ns->profile_ptr[profile];
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
484
485
  	if (!ptr && tomoyo_memory_ok(entry)) {
  		ptr = entry;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
486
487
488
  		ptr->default_config = TOMOYO_CONFIG_DISABLED |
  			TOMOYO_CONFIG_WANT_GRANT_LOG |
  			TOMOYO_CONFIG_WANT_REJECT_LOG;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
489
490
  		memset(ptr->config, TOMOYO_CONFIG_USE_DEFAULT,
  		       sizeof(ptr->config));
6afcb3b73   Tetsuo Handa   TOMOYO: Fix unuse...
491
492
493
494
  		ptr->pref[TOMOYO_PREF_MAX_AUDIT_LOG] =
  			CONFIG_SECURITY_TOMOYO_MAX_AUDIT_LOG;
  		ptr->pref[TOMOYO_PREF_MAX_LEARNING_ENTRY] =
  			CONFIG_SECURITY_TOMOYO_MAX_ACCEPT_ENTRY;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
495
  		mb(); /* Avoid out-of-order execution. */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
496
  		ns->profile_ptr[profile] = ptr;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
497
  		entry = NULL;
cd7bec6ad   Tetsuo Handa   TOMOYO: Remove me...
498
  	}
292823814   Tetsuo Handa   TOMOYO: Use mutex...
499
  	mutex_unlock(&tomoyo_policy_lock);
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
500
501
   out:
  	kfree(entry);
9590837b8   Kentaro Takeda   Common functions ...
502
503
504
505
  	return ptr;
  }
  
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
506
507
   * tomoyo_profile - Find a profile.
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
508
   * @ns:      Pointer to "struct tomoyo_policy_namespace".
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
509
510
511
512
   * @profile: Profile number to find.
   *
   * Returns pointer to "struct tomoyo_profile".
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
513
514
  struct tomoyo_profile *tomoyo_profile(const struct tomoyo_policy_namespace *ns,
  				      const u8 profile)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
515
  {
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
516
  	static struct tomoyo_profile tomoyo_null_profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
517
  	struct tomoyo_profile *ptr = ns->profile_ptr[profile];
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
518
519
  	if (!ptr)
  		ptr = &tomoyo_null_profile;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
520
521
  	return ptr;
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
522
523
524
525
526
527
528
529
  /**
   * tomoyo_find_yesno - Find values for specified keyword.
   *
   * @string: String to check.
   * @find:   Name of keyword.
   *
   * Returns 1 if "@find=yes" was found, 0 if "@find=no" was found, -1 otherwise.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
530
531
532
533
534
535
536
537
538
539
540
541
  static s8 tomoyo_find_yesno(const char *string, const char *find)
  {
  	const char *cp = strstr(string, find);
  	if (cp) {
  		cp += strlen(find);
  		if (!strncmp(cp, "=yes", 4))
  			return 1;
  		else if (!strncmp(cp, "=no", 3))
  			return 0;
  	}
  	return -1;
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
542
543
544
545
546
547
548
549
550
  /**
   * tomoyo_set_uint - Set value for specified preference.
   *
   * @i:      Pointer to "unsigned int".
   * @string: String to check.
   * @find:   Name of keyword.
   *
   * Returns nothing.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
551
552
553
554
555
556
557
  static void tomoyo_set_uint(unsigned int *i, const char *string,
  			    const char *find)
  {
  	const char *cp = strstr(string, find);
  	if (cp)
  		sscanf(cp + strlen(find), "=%u", i);
  }
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
558
559
560
561
562
563
564
565
566
  /**
   * tomoyo_set_mode - Set mode for specified profile.
   *
   * @name:    Name of functionality.
   * @value:   Mode for @name.
   * @profile: Pointer to "struct tomoyo_profile".
   *
   * Returns 0 on success, negative value otherwise.
   */
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
567
  static int tomoyo_set_mode(char *name, const char *value,
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
568
569
570
571
572
573
574
575
576
577
578
  			   struct tomoyo_profile *profile)
  {
  	u8 i;
  	u8 config;
  	if (!strcmp(name, "CONFIG")) {
  		i = TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX;
  		config = profile->default_config;
  	} else if (tomoyo_str_starts(&name, "CONFIG::")) {
  		config = 0;
  		for (i = 0; i < TOMOYO_MAX_MAC_INDEX
  			     + TOMOYO_MAX_MAC_CATEGORY_INDEX; i++) {
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
579
580
581
582
583
584
585
586
587
588
589
  			int len = 0;
  			if (i < TOMOYO_MAX_MAC_INDEX) {
  				const u8 c = tomoyo_index2category[i];
  				const char *category =
  					tomoyo_category_keywords[c];
  				len = strlen(category);
  				if (strncmp(name, category, len) ||
  				    name[len++] != ':' || name[len++] != ':')
  					continue;
  			}
  			if (strcmp(name + len, tomoyo_mac_keywords[i]))
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
590
591
592
593
594
595
596
597
598
  				continue;
  			config = profile->config[i];
  			break;
  		}
  		if (i == TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
  			return -EINVAL;
  	} else {
  		return -EINVAL;
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
599
  	if (strstr(value, "use_default")) {
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
600
601
602
603
604
605
606
607
608
609
  		config = TOMOYO_CONFIG_USE_DEFAULT;
  	} else {
  		u8 mode;
  		for (mode = 0; mode < 4; mode++)
  			if (strstr(value, tomoyo_mode[mode]))
  				/*
  				 * Update lower 3 bits in order to distinguish
  				 * 'config' from 'TOMOYO_CONFIG_USE_DEAFULT'.
  				 */
  				config = (config & ~7) | mode;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
  		if (config != TOMOYO_CONFIG_USE_DEFAULT) {
  			switch (tomoyo_find_yesno(value, "grant_log")) {
  			case 1:
  				config |= TOMOYO_CONFIG_WANT_GRANT_LOG;
  				break;
  			case 0:
  				config &= ~TOMOYO_CONFIG_WANT_GRANT_LOG;
  				break;
  			}
  			switch (tomoyo_find_yesno(value, "reject_log")) {
  			case 1:
  				config |= TOMOYO_CONFIG_WANT_REJECT_LOG;
  				break;
  			case 0:
  				config &= ~TOMOYO_CONFIG_WANT_REJECT_LOG;
  				break;
  			}
  		}
8e5686874   Tetsuo Handa   TOMOYO: Small cle...
628
629
630
631
632
633
634
  	}
  	if (i < TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
  		profile->config[i] = config;
  	else if (config != TOMOYO_CONFIG_USE_DEFAULT)
  		profile->default_config = config;
  	return 0;
  }
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
635
636
  /**
   * tomoyo_write_profile - Write profile table.
9590837b8   Kentaro Takeda   Common functions ...
637
638
639
640
641
642
643
644
645
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
   */
  static int tomoyo_write_profile(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	unsigned int i;
9590837b8   Kentaro Takeda   Common functions ...
646
647
  	char *cp;
  	struct tomoyo_profile *profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
648
649
  	if (sscanf(data, "PROFILE_VERSION=%u", &head->w.ns->profile_version)
  	    == 1)
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
650
651
  		return 0;
  	i = simple_strtoul(data, &cp, 10);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
652
653
654
  	if (*cp != '-')
  		return -EINVAL;
  	data = cp + 1;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
655
  	profile = tomoyo_assign_profile(head->w.ns, i);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
656
657
  	if (!profile)
  		return -EINVAL;
9590837b8   Kentaro Takeda   Common functions ...
658
659
660
  	cp = strchr(data, '=');
  	if (!cp)
  		return -EINVAL;
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
661
  	*cp++ = '\0';
9590837b8   Kentaro Takeda   Common functions ...
662
  	if (!strcmp(data, "COMMENT")) {
2a086e5d3   Tetsuo Handa   TOMOYO: Fix race ...
663
664
665
666
667
668
669
670
671
672
  		static DEFINE_SPINLOCK(lock);
  		const struct tomoyo_path_info *new_comment
  			= tomoyo_get_name(cp);
  		const struct tomoyo_path_info *old_comment;
  		if (!new_comment)
  			return -ENOMEM;
  		spin_lock(&lock);
  		old_comment = profile->comment;
  		profile->comment = new_comment;
  		spin_unlock(&lock);
bf24fb016   Tetsuo Handa   TOMOYO: Add refco...
673
  		tomoyo_put_name(old_comment);
9590837b8   Kentaro Takeda   Common functions ...
674
675
  		return 0;
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
676
677
678
679
680
  	if (!strcmp(data, "PREFERENCE")) {
  		for (i = 0; i < TOMOYO_MAX_PREF; i++)
  			tomoyo_set_uint(&profile->pref[i], cp,
  					tomoyo_pref_keywords[i]);
  		return 0;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
681
  	}
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
682
  	return tomoyo_set_mode(data, cp, profile);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
683
  }
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
684
685
686
687
688
689
690
691
692
693
  /**
   * tomoyo_print_config - Print mode for specified functionality.
   *
   * @head:   Pointer to "struct tomoyo_io_buffer".
   * @config: Mode for that functionality.
   *
   * Returns nothing.
   *
   * Caller prints functionality's name.
   */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
694
695
  static void tomoyo_print_config(struct tomoyo_io_buffer *head, const u8 config)
  {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
696
697
698
699
700
  	tomoyo_io_printf(head, "={ mode=%s grant_log=%s reject_log=%s }
  ",
  			 tomoyo_mode[config & 3],
  			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_GRANT_LOG),
  			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_REJECT_LOG));
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
701
  }
9590837b8   Kentaro Takeda   Common functions ...
702
  /**
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
703
   * tomoyo_read_profile - Read profile table.
9590837b8   Kentaro Takeda   Common functions ...
704
705
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
706
707
   *
   * Returns nothing.
9590837b8   Kentaro Takeda   Common functions ...
708
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
709
  static void tomoyo_read_profile(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
710
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
711
  	u8 index;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
712
713
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
714
  	const struct tomoyo_profile *profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
715
716
  	if (head->r.eof)
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
717
718
   next:
  	index = head->r.index;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
719
  	profile = ns->profile_ptr[index];
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
720
721
  	switch (head->r.step) {
  	case 0:
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
722
723
724
725
  		tomoyo_print_namespace(head);
  		tomoyo_io_printf(head, "PROFILE_VERSION=%u
  ",
  				 ns->profile_version);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
726
727
728
729
730
  		head->r.step++;
  		break;
  	case 1:
  		for ( ; head->r.index < TOMOYO_MAX_PROFILES;
  		      head->r.index++)
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
731
  			if (ns->profile_ptr[head->r.index])
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
732
  				break;
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
733
734
  		if (head->r.index == TOMOYO_MAX_PROFILES) {
  			head->r.eof = true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
735
  			return;
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
736
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
737
738
739
740
  		head->r.step++;
  		break;
  	case 2:
  		{
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
741
  			u8 i;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
742
743
  			const struct tomoyo_path_info *comment =
  				profile->comment;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
744
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
745
746
747
  			tomoyo_io_printf(head, "%u-COMMENT=", index);
  			tomoyo_set_string(head, comment ? comment->name : "");
  			tomoyo_set_lf(head);
4d8189713   Tetsuo Handa   TOMOYO: Fix incom...
748
  			tomoyo_print_namespace(head);
d5ca1725a   Tetsuo Handa   TOMOYO: Simplify ...
749
750
751
752
753
754
755
  			tomoyo_io_printf(head, "%u-PREFERENCE={ ", index);
  			for (i = 0; i < TOMOYO_MAX_PREF; i++)
  				tomoyo_io_printf(head, "%s=%u ",
  						 tomoyo_pref_keywords[i],
  						 profile->pref[i]);
  			tomoyo_set_string(head, "}
  ");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
756
757
758
759
760
  			head->r.step++;
  		}
  		break;
  	case 3:
  		{
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
761
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
762
763
764
765
766
767
768
769
770
771
772
  			tomoyo_io_printf(head, "%u-%s", index, "CONFIG");
  			tomoyo_print_config(head, profile->default_config);
  			head->r.bit = 0;
  			head->r.step++;
  		}
  		break;
  	case 4:
  		for ( ; head->r.bit < TOMOYO_MAX_MAC_INDEX
  			      + TOMOYO_MAX_MAC_CATEGORY_INDEX; head->r.bit++) {
  			const u8 i = head->r.bit;
  			const u8 config = profile->config[i];
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
773
774
  			if (config == TOMOYO_CONFIG_USE_DEFAULT)
  				continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
775
  			tomoyo_print_namespace(head);
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
776
777
778
779
780
781
782
783
784
  			if (i < TOMOYO_MAX_MAC_INDEX)
  				tomoyo_io_printf(head, "%u-CONFIG::%s::%s",
  						 index,
  						 tomoyo_category_keywords
  						 [tomoyo_index2category[i]],
  						 tomoyo_mac_keywords[i]);
  			else
  				tomoyo_io_printf(head, "%u-CONFIG::%s", index,
  						 tomoyo_mac_keywords[i]);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
785
786
787
788
789
790
  			tomoyo_print_config(head, config);
  			head->r.bit++;
  			break;
  		}
  		if (head->r.bit == TOMOYO_MAX_MAC_INDEX
  		    + TOMOYO_MAX_MAC_CATEGORY_INDEX) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
791
792
  			head->r.index++;
  			head->r.step = 1;
9590837b8   Kentaro Takeda   Common functions ...
793
  		}
57c2590fb   Tetsuo Handa   TOMOYO: Update pr...
794
  		break;
9590837b8   Kentaro Takeda   Common functions ...
795
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
796
797
  	if (tomoyo_flush(head))
  		goto next;
9590837b8   Kentaro Takeda   Common functions ...
798
  }
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
799
800
801
802
803
804
805
806
  /**
   * tomoyo_same_manager - Check for duplicated "struct tomoyo_manager" entry.
   *
   * @a: Pointer to "struct tomoyo_acl_head".
   * @b: Pointer to "struct tomoyo_acl_head".
   *
   * Returns true if @a == @b, false otherwise.
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
807
808
  static bool tomoyo_same_manager(const struct tomoyo_acl_head *a,
  				const struct tomoyo_acl_head *b)
36f5e1ffb   Tetsuo Handa   TOMOYO: Use callb...
809
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
810
811
  	return container_of(a, struct tomoyo_manager, head)->manager ==
  		container_of(b, struct tomoyo_manager, head)->manager;
36f5e1ffb   Tetsuo Handa   TOMOYO: Use callb...
812
  }
9590837b8   Kentaro Takeda   Common functions ...
813
814
815
816
817
818
819
  /**
   * tomoyo_update_manager_entry - Add a manager entry.
   *
   * @manager:   The path to manager or the domainnamme.
   * @is_delete: True if it is a delete request.
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
820
821
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
822
823
824
825
   */
  static int tomoyo_update_manager_entry(const char *manager,
  				       const bool is_delete)
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
826
  	struct tomoyo_manager e = { };
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
827
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
828
  		/* .ns = &tomoyo_kernel_namespace, */
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
829
  		.is_delete = is_delete,
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
830
831
  		.list = &tomoyo_kernel_namespace.
  		policy_list[TOMOYO_ID_MANAGER],
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
832
833
  	};
  	int error = is_delete ? -ENOENT : -ENOMEM;
77b513dda   Tetsuo Handa   TOMOYO: Accept ma...
834
835
836
  	if (!tomoyo_correct_domain(manager) &&
  	    !tomoyo_correct_word(manager))
  		return -EINVAL;
9e4b50e93   Tetsuo Handa   TOMOYO: Use stack...
837
  	e.manager = tomoyo_get_name(manager);
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
838
839
840
841
842
  	if (e.manager) {
  		error = tomoyo_update_policy(&e.head, sizeof(e), &param,
  					     tomoyo_same_manager);
  		tomoyo_put_name(e.manager);
  	}
9590837b8   Kentaro Takeda   Common functions ...
843
844
845
846
  	return error;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
847
   * tomoyo_write_manager - Write manager policy.
9590837b8   Kentaro Takeda   Common functions ...
848
849
850
851
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
852
853
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
854
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
855
  static int tomoyo_write_manager(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
856
857
  {
  	char *data = head->write_buf;
9590837b8   Kentaro Takeda   Common functions ...
858
859
  
  	if (!strcmp(data, "manage_by_non_root")) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
860
  		tomoyo_manage_by_non_root = !head->w.is_delete;
9590837b8   Kentaro Takeda   Common functions ...
861
862
  		return 0;
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
863
  	return tomoyo_update_manager_entry(data, head->w.is_delete);
9590837b8   Kentaro Takeda   Common functions ...
864
865
866
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
867
   * tomoyo_read_manager - Read manager policy.
9590837b8   Kentaro Takeda   Common functions ...
868
869
870
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
871
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
872
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
873
  static void tomoyo_read_manager(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
874
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
875
  	if (head->r.eof)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
876
  		return;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
877
878
  	list_for_each_cookie(head->r.acl, &tomoyo_kernel_namespace.
  			     policy_list[TOMOYO_ID_MANAGER]) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
879
  		struct tomoyo_manager *ptr =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
880
  			list_entry(head->r.acl, typeof(*ptr), head.list);
82e0f001a   Tetsuo Handa   TOMOYO: Use commo...
881
  		if (ptr->head.is_deleted)
9590837b8   Kentaro Takeda   Common functions ...
882
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
883
884
885
886
  		if (!tomoyo_flush(head))
  			return;
  		tomoyo_set_string(head, ptr->manager->name);
  		tomoyo_set_lf(head);
9590837b8   Kentaro Takeda   Common functions ...
887
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
888
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
889
890
891
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
892
   * tomoyo_manager - Check whether the current process is a policy manager.
9590837b8   Kentaro Takeda   Common functions ...
893
894
895
   *
   * Returns true if the current process is permitted to modify policy
   * via /sys/kernel/security/tomoyo/ interface.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
896
897
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
898
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
899
  static bool tomoyo_manager(void)
9590837b8   Kentaro Takeda   Common functions ...
900
  {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
901
  	struct tomoyo_manager *ptr;
9590837b8   Kentaro Takeda   Common functions ...
902
903
904
905
906
907
908
  	const char *exe;
  	const struct task_struct *task = current;
  	const struct tomoyo_path_info *domainname = tomoyo_domain()->domainname;
  	bool found = false;
  
  	if (!tomoyo_policy_loaded)
  		return true;
609fcd1b3   Eric W. Biederman   userns: Convert t...
909
910
911
  	if (!tomoyo_manage_by_non_root &&
  	    (!uid_eq(task->cred->uid,  GLOBAL_ROOT_UID) ||
  	     !uid_eq(task->cred->euid, GLOBAL_ROOT_UID)))
9590837b8   Kentaro Takeda   Common functions ...
912
  		return false;
9590837b8   Kentaro Takeda   Common functions ...
913
914
915
  	exe = tomoyo_get_exe();
  	if (!exe)
  		return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
916
917
  	list_for_each_entry_rcu(ptr, &tomoyo_kernel_namespace.
  				policy_list[TOMOYO_ID_MANAGER], head.list) {
77b513dda   Tetsuo Handa   TOMOYO: Accept ma...
918
919
920
  		if (!ptr->head.is_deleted &&
  		    (!tomoyo_pathcmp(domainname, ptr->manager) ||
  		     !strcmp(exe, ptr->manager->name))) {
9590837b8   Kentaro Takeda   Common functions ...
921
922
923
924
  			found = true;
  			break;
  		}
  	}
9590837b8   Kentaro Takeda   Common functions ...
925
926
927
928
929
930
931
932
933
934
  	if (!found) { /* Reduce error messages. */
  		static pid_t last_pid;
  		const pid_t pid = current->pid;
  		if (last_pid != pid) {
  			printk(KERN_WARNING "%s ( %s ) is not permitted to "
  			       "update policies.
  ", domainname->name, exe);
  			last_pid = pid;
  		}
  	}
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
935
  	kfree(exe);
9590837b8   Kentaro Takeda   Common functions ...
936
937
  	return found;
  }
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
938
939
  static struct tomoyo_domain_info *tomoyo_find_domain_by_qid
  (unsigned int serial);
9590837b8   Kentaro Takeda   Common functions ...
940
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
941
   * tomoyo_select_domain - Parse select command.
9590837b8   Kentaro Takeda   Common functions ...
942
943
944
945
946
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @data: String to parse.
   *
   * Returns true on success, false otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
947
948
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
949
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
950
951
  static bool tomoyo_select_domain(struct tomoyo_io_buffer *head,
  				 const char *data)
9590837b8   Kentaro Takeda   Common functions ...
952
953
954
  {
  	unsigned int pid;
  	struct tomoyo_domain_info *domain = NULL;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
955
  	bool global_pid = false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
956
957
958
  	if (strncmp(data, "select ", 7))
  		return false;
  	data += 7;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
959
960
  	if (sscanf(data, "pid=%u", &pid) == 1 ||
  	    (global_pid = true, sscanf(data, "global-pid=%u", &pid) == 1)) {
9590837b8   Kentaro Takeda   Common functions ...
961
  		struct task_struct *p;
1fcdc7c52   Tetsuo Handa   TOMOYO: Protect f...
962
  		rcu_read_lock();
9b244373d   Tetsuo Handa   TOMOYO: Several f...
963
964
965
966
  		if (global_pid)
  			p = find_task_by_pid_ns(pid, &init_pid_ns);
  		else
  			p = find_task_by_vpid(pid);
9590837b8   Kentaro Takeda   Common functions ...
967
968
  		if (p)
  			domain = tomoyo_real_domain(p);
1fcdc7c52   Tetsuo Handa   TOMOYO: Protect f...
969
  		rcu_read_unlock();
9590837b8   Kentaro Takeda   Common functions ...
970
  	} else if (!strncmp(data, "domain=", 7)) {
75093152a   Tetsuo Handa   TOMOYO: Rename sy...
971
  		if (tomoyo_domain_def(data + 7))
9590837b8   Kentaro Takeda   Common functions ...
972
  			domain = tomoyo_find_domain(data + 7);
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
973
974
  	} else if (sscanf(data, "Q=%u", &pid) == 1) {
  		domain = tomoyo_find_domain_by_qid(pid);
9590837b8   Kentaro Takeda   Common functions ...
975
976
  	} else
  		return false;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
977
  	head->w.domain = domain;
9590837b8   Kentaro Takeda   Common functions ...
978
979
980
  	/* Accessing read_buf is safe because head->io_sem is held. */
  	if (!head->read_buf)
  		return true; /* Do nothing if open(O_WRONLY). */
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
981
982
  	memset(&head->r, 0, sizeof(head->r));
  	head->r.print_this_domain_only = true;
68eda8f59   Dan Carpenter   tomoyo: cleanup. ...
983
984
985
986
  	if (domain)
  		head->r.domain = &domain->list;
  	else
  		head->r.eof = 1;
9590837b8   Kentaro Takeda   Common functions ...
987
988
  	tomoyo_io_printf(head, "# select %s
  ", data);
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
989
990
991
  	if (domain && domain->is_deleted)
  		tomoyo_io_printf(head, "# This is a deleted domain.
  ");
9590837b8   Kentaro Takeda   Common functions ...
992
993
994
995
  	return true;
  }
  
  /**
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
   * tomoyo_same_task_acl - Check for duplicated "struct tomoyo_task_acl" entry.
   *
   * @a: Pointer to "struct tomoyo_acl_info".
   * @b: Pointer to "struct tomoyo_acl_info".
   *
   * Returns true if @a == @b, false otherwise.
   */
  static bool tomoyo_same_task_acl(const struct tomoyo_acl_info *a,
  			      const struct tomoyo_acl_info *b)
  {
  	const struct tomoyo_task_acl *p1 = container_of(a, typeof(*p1), head);
  	const struct tomoyo_task_acl *p2 = container_of(b, typeof(*p2), head);
  	return p1->domainname == p2->domainname;
  }
  
  /**
   * tomoyo_write_task - Update task related list.
   *
   * @param: Pointer to "struct tomoyo_acl_param".
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static int tomoyo_write_task(struct tomoyo_acl_param *param)
  {
  	int error = -EINVAL;
  	if (tomoyo_str_starts(&param->data, "manual_domain_transition ")) {
  		struct tomoyo_task_acl e = {
  			.head.type = TOMOYO_TYPE_MANUAL_TASK_ACL,
  			.domainname = tomoyo_get_domainname(param),
  		};
  		if (e.domainname)
  			error = tomoyo_update_domain(&e.head, sizeof(e), param,
  						     tomoyo_same_task_acl,
  						     NULL);
  		tomoyo_put_name(e.domainname);
  	}
  	return error;
  }
  
  /**
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1038
1039
1040
1041
   * tomoyo_delete_domain - Delete a domain.
   *
   * @domainname: The name of domain.
   *
7d7473dbd   Tetsuo Handa   TOMOYO: Return er...
1042
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1043
1044
   *
   * Caller holds tomoyo_read_lock().
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1045
1046
1047
1048
1049
1050
1051
1052
   */
  static int tomoyo_delete_domain(char *domainname)
  {
  	struct tomoyo_domain_info *domain;
  	struct tomoyo_path_info name;
  
  	name.name = domainname;
  	tomoyo_fill_path_info(&name);
292823814   Tetsuo Handa   TOMOYO: Use mutex...
1053
  	if (mutex_lock_interruptible(&tomoyo_policy_lock))
7d7473dbd   Tetsuo Handa   TOMOYO: Return er...
1054
  		return -EINTR;
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1055
  	/* Is there an active domain? */
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1056
  	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1057
1058
1059
1060
1061
1062
1063
1064
1065
  		/* Never delete tomoyo_kernel_domain */
  		if (domain == &tomoyo_kernel_domain)
  			continue;
  		if (domain->is_deleted ||
  		    tomoyo_pathcmp(domain->domainname, &name))
  			continue;
  		domain->is_deleted = true;
  		break;
  	}
f737d95dd   Tetsuo Handa   TOMOYO: Replace r...
1066
  	mutex_unlock(&tomoyo_policy_lock);
ccf135f50   Tetsuo Handa   TOMOYO: Move tomo...
1067
1068
1069
1070
  	return 0;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1071
   * tomoyo_write_domain2 - Write domain policy.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1072
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1073
   * @ns:        Pointer to "struct tomoyo_policy_namespace".
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1074
1075
1076
   * @list:      Pointer to "struct list_head".
   * @data:      Policy to be interpreted.
   * @is_delete: True if it is a delete request.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1077
1078
1079
1080
1081
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1082
1083
  static int tomoyo_write_domain2(struct tomoyo_policy_namespace *ns,
  				struct list_head *list, char *data,
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1084
  				const bool is_delete)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1085
  {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1086
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1087
  		.ns = ns,
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1088
1089
1090
1091
1092
1093
1094
  		.list = list,
  		.data = data,
  		.is_delete = is_delete,
  	};
  	static const struct {
  		const char *keyword;
  		int (*write) (struct tomoyo_acl_param *);
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1095
  	} tomoyo_callback[5] = {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1096
  		{ "file ", tomoyo_write_file },
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1097
1098
  		{ "network inet ", tomoyo_write_inet_network },
  		{ "network unix ", tomoyo_write_unix_network },
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1099
  		{ "misc ", tomoyo_write_misc },
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1100
  		{ "task ", tomoyo_write_task },
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1101
1102
  	};
  	u8 i;
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1103
1104
  
  	for (i = 0; i < ARRAY_SIZE(tomoyo_callback); i++) {
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1105
1106
1107
1108
1109
1110
  		if (!tomoyo_str_starts(&param.data,
  				       tomoyo_callback[i].keyword))
  			continue;
  		return tomoyo_callback[i].write(&param);
  	}
  	return -EINVAL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1111
  }
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1112
1113
1114
1115
1116
1117
1118
  /* String table for domain flags. */
  const char * const tomoyo_dif[TOMOYO_MAX_DOMAIN_INFO_FLAGS] = {
  	[TOMOYO_DIF_QUOTA_WARNED]      = "quota_exceeded
  ",
  	[TOMOYO_DIF_TRANSITION_FAILED] = "transition_failed
  ",
  };
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1119
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1120
   * tomoyo_write_domain - Write domain policy.
9590837b8   Kentaro Takeda   Common functions ...
1121
1122
1123
1124
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1125
1126
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1127
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1128
  static int tomoyo_write_domain(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1129
1130
  {
  	char *data = head->write_buf;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1131
  	struct tomoyo_policy_namespace *ns;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1132
  	struct tomoyo_domain_info *domain = head->w.domain;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1133
1134
  	const bool is_delete = head->w.is_delete;
  	bool is_select = !is_delete && tomoyo_str_starts(&data, "select ");
9590837b8   Kentaro Takeda   Common functions ...
1135
  	unsigned int profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1136
  	if (*data == '<') {
7d7473dbd   Tetsuo Handa   TOMOYO: Return er...
1137
  		int ret = 0;
9590837b8   Kentaro Takeda   Common functions ...
1138
1139
  		domain = NULL;
  		if (is_delete)
7d7473dbd   Tetsuo Handa   TOMOYO: Return er...
1140
  			ret = tomoyo_delete_domain(data);
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1141
  		else if (is_select)
9590837b8   Kentaro Takeda   Common functions ...
1142
  			domain = tomoyo_find_domain(data);
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1143
  		else
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1144
  			domain = tomoyo_assign_domain(data, false);
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1145
  		head->w.domain = domain;
7d7473dbd   Tetsuo Handa   TOMOYO: Return er...
1146
  		return ret;
9590837b8   Kentaro Takeda   Common functions ...
1147
1148
1149
  	}
  	if (!domain)
  		return -EINVAL;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1150
  	ns = domain->ns;
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1151
  	if (sscanf(data, "use_profile %u", &profile) == 1
9590837b8   Kentaro Takeda   Common functions ...
1152
  	    && profile < TOMOYO_MAX_PROFILES) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1153
  		if (!tomoyo_policy_loaded || ns->profile_ptr[profile])
9590837b8   Kentaro Takeda   Common functions ...
1154
1155
1156
  			domain->profile = (u8) profile;
  		return 0;
  	}
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1157
1158
1159
1160
1161
1162
1163
  	if (sscanf(data, "use_group %u
  ", &profile) == 1
  	    && profile < TOMOYO_MAX_ACL_GROUPS) {
  		if (!is_delete)
  			domain->group = (u8) profile;
  		return 0;
  	}
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1164
1165
1166
1167
1168
  	for (profile = 0; profile < TOMOYO_MAX_DOMAIN_INFO_FLAGS; profile++) {
  		const char *cp = tomoyo_dif[profile];
  		if (strncmp(data, cp, strlen(cp) - 1))
  			continue;
  		domain->flags[profile] = !is_delete;
9b244373d   Tetsuo Handa   TOMOYO: Several f...
1169
1170
  		return 0;
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1171
1172
  	return tomoyo_write_domain2(ns, &domain->acl_info_list, data,
  				    is_delete);
9590837b8   Kentaro Takeda   Common functions ...
1173
1174
1175
  }
  
  /**
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
   * tomoyo_print_condition - Print condition part.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @cond: Pointer to "struct tomoyo_condition".
   *
   * Returns true on success, false otherwise.
   */
  static bool tomoyo_print_condition(struct tomoyo_io_buffer *head,
  				   const struct tomoyo_condition *cond)
  {
  	switch (head->r.cond_step) {
  	case 0:
  		head->r.cond_index = 0;
  		head->r.cond_step++;
6bce98edc   Tetsuo Handa   TOMOYO: Allow spe...
1190
1191
1192
1193
  		if (cond->transit) {
  			tomoyo_set_space(head);
  			tomoyo_set_string(head, cond->transit->name);
  		}
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1194
1195
1196
1197
1198
1199
1200
1201
  		/* fall through */
  	case 1:
  		{
  			const u16 condc = cond->condc;
  			const struct tomoyo_condition_element *condp =
  				(typeof(condp)) (cond + 1);
  			const struct tomoyo_number_union *numbers_p =
  				(typeof(numbers_p)) (condp + condc);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1202
1203
1204
  			const struct tomoyo_name_union *names_p =
  				(typeof(names_p))
  				(numbers_p + cond->numbers_count);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1205
1206
1207
1208
  			const struct tomoyo_argv *argv =
  				(typeof(argv)) (names_p + cond->names_count);
  			const struct tomoyo_envp *envp =
  				(typeof(envp)) (argv + cond->argc);
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1209
1210
1211
1212
1213
1214
  			u16 skip;
  			for (skip = 0; skip < head->r.cond_index; skip++) {
  				const u8 left = condp->left;
  				const u8 right = condp->right;
  				condp++;
  				switch (left) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1215
1216
1217
1218
1219
1220
  				case TOMOYO_ARGV_ENTRY:
  					argv++;
  					continue;
  				case TOMOYO_ENVP_ENTRY:
  					envp++;
  					continue;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1221
1222
1223
1224
1225
  				case TOMOYO_NUMBER_UNION:
  					numbers_p++;
  					break;
  				}
  				switch (right) {
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1226
1227
1228
  				case TOMOYO_NAME_UNION:
  					names_p++;
  					break;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
  				case TOMOYO_NUMBER_UNION:
  					numbers_p++;
  					break;
  				}
  			}
  			while (head->r.cond_index < condc) {
  				const u8 match = condp->equals;
  				const u8 left = condp->left;
  				const u8 right = condp->right;
  				if (!tomoyo_flush(head))
  					return false;
  				condp++;
  				head->r.cond_index++;
  				tomoyo_set_space(head);
  				switch (left) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
  				case TOMOYO_ARGV_ENTRY:
  					tomoyo_io_printf(head,
  							 "exec.argv[%lu]%s=\"",
  							 argv->index, argv->
  							 is_not ? "!" : "");
  					tomoyo_set_string(head,
  							  argv->value->name);
  					tomoyo_set_string(head, "\"");
  					argv++;
  					continue;
  				case TOMOYO_ENVP_ENTRY:
  					tomoyo_set_string(head,
  							  "exec.envp[\"");
  					tomoyo_set_string(head,
  							  envp->name->name);
  					tomoyo_io_printf(head, "\"]%s=", envp->
  							 is_not ? "!" : "");
  					if (envp->value) {
  						tomoyo_set_string(head, "\"");
  						tomoyo_set_string(head, envp->
  								  value->name);
  						tomoyo_set_string(head, "\"");
  					} else {
  						tomoyo_set_string(head,
  								  "NULL");
  					}
  					envp++;
  					continue;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
  				case TOMOYO_NUMBER_UNION:
  					tomoyo_print_number_union_nospace
  						(head, numbers_p++);
  					break;
  				default:
  					tomoyo_set_string(head,
  					       tomoyo_condition_keyword[left]);
  					break;
  				}
  				tomoyo_set_string(head, match ? "=" : "!=");
  				switch (right) {
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1283
1284
1285
1286
  				case TOMOYO_NAME_UNION:
  					tomoyo_print_name_union_quoted
  						(head, names_p++);
  					break;
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
  				case TOMOYO_NUMBER_UNION:
  					tomoyo_print_number_union_nospace
  						(head, numbers_p++);
  					break;
  				default:
  					tomoyo_set_string(head,
  					  tomoyo_condition_keyword[right]);
  					break;
  				}
  			}
  		}
  		head->r.cond_step++;
  		/* fall through */
  	case 2:
  		if (!tomoyo_flush(head))
  			break;
  		head->r.cond_step++;
  		/* fall through */
  	case 3:
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
1306
1307
1308
1309
  		if (cond->grant_log != TOMOYO_GRANTLOG_AUTO)
  			tomoyo_io_printf(head, " grant_log=%s",
  					 tomoyo_yesno(cond->grant_log ==
  						      TOMOYO_GRANTLOG_YES));
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1310
1311
1312
1313
1314
1315
1316
  		tomoyo_set_lf(head);
  		return true;
  	}
  	return false;
  }
  
  /**
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1317
   * tomoyo_set_group - Print "acl_group " header keyword and category name.
9590837b8   Kentaro Takeda   Common functions ...
1318
   *
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1319
1320
   * @head:     Pointer to "struct tomoyo_io_buffer".
   * @category: Category name.
9590837b8   Kentaro Takeda   Common functions ...
1321
   *
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1322
   * Returns nothing.
9590837b8   Kentaro Takeda   Common functions ...
1323
   */
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1324
1325
  static void tomoyo_set_group(struct tomoyo_io_buffer *head,
  			     const char *category)
9590837b8   Kentaro Takeda   Common functions ...
1326
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1327
1328
  	if (head->type == TOMOYO_EXCEPTIONPOLICY) {
  		tomoyo_print_namespace(head);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1329
1330
  		tomoyo_io_printf(head, "acl_group %u ",
  				 head->r.acl_group_index);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1331
  	}
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1332
  	tomoyo_set_string(head, category);
9590837b8   Kentaro Takeda   Common functions ...
1333
1334
1335
  }
  
  /**
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1336
   * tomoyo_print_entry - Print an ACL entry.
9590837b8   Kentaro Takeda   Common functions ...
1337
1338
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1339
   * @acl:  Pointer to an ACL entry.
9590837b8   Kentaro Takeda   Common functions ...
1340
1341
1342
   *
   * Returns true on success, false otherwise.
   */
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1343
1344
  static bool tomoyo_print_entry(struct tomoyo_io_buffer *head,
  			       struct tomoyo_acl_info *acl)
9590837b8   Kentaro Takeda   Common functions ...
1345
  {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1346
  	const u8 acl_type = acl->type;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1347
  	bool first = true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1348
  	u8 bit;
9590837b8   Kentaro Takeda   Common functions ...
1349

2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1350
1351
  	if (head->r.print_cond_part)
  		goto print_cond_part;
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1352
1353
  	if (acl->is_deleted)
  		return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1354
1355
1356
  	if (!tomoyo_flush(head))
  		return false;
  	else if (acl_type == TOMOYO_TYPE_PATH_ACL) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1357
1358
1359
  		struct tomoyo_path_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u16 perm = ptr->perm;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1360
  		for (bit = 0; bit < TOMOYO_MAX_PATH_OPERATION; bit++) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1361
1362
  			if (!(perm & (1 << bit)))
  				continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1363
  			if (head->r.print_transition_related_only &&
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1364
1365
  			    bit != TOMOYO_TYPE_EXECUTE)
  				continue;
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1366
1367
1368
1369
1370
1371
1372
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_path_keyword[bit]);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1373
  		}
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1374
1375
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1376
  		tomoyo_print_name_union(head, &ptr->name);
731d37aa7   Tetsuo Handa   TOMOYO: Allow dom...
1377
1378
1379
1380
1381
1382
  	} else if (acl_type == TOMOYO_TYPE_MANUAL_TASK_ACL) {
  		struct tomoyo_task_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		tomoyo_set_group(head, "task ");
  		tomoyo_set_string(head, "manual_domain_transition ");
  		tomoyo_set_string(head, ptr->domainname->name);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1383
  	} else if (head->r.print_transition_related_only) {
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1384
1385
1386
1387
  		return true;
  	} else if (acl_type == TOMOYO_TYPE_PATH2_ACL) {
  		struct tomoyo_path2_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_PATH2_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pp2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1403
1404
  		tomoyo_print_name_union(head, &ptr->name1);
  		tomoyo_print_name_union(head, &ptr->name2);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1405
1406
1407
  	} else if (acl_type == TOMOYO_TYPE_PATH_NUMBER_ACL) {
  		struct tomoyo_path_number_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_PATH_NUMBER_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pn2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1423
1424
  		tomoyo_print_name_union(head, &ptr->name);
  		tomoyo_print_number_union(head, &ptr->number);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1425
1426
1427
  	} else if (acl_type == TOMOYO_TYPE_MKDEV_ACL) {
  		struct tomoyo_mkdev_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
  		const u8 perm = ptr->perm;
  		for (bit = 0; bit < TOMOYO_MAX_MKDEV_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "file ");
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_mac_keywords
  					  [tomoyo_pnnn2mac[bit]]);
  		}
  		if (first)
  			return true;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1443
1444
1445
1446
  		tomoyo_print_name_union(head, &ptr->name);
  		tomoyo_print_number_union(head, &ptr->mode);
  		tomoyo_print_number_union(head, &ptr->major);
  		tomoyo_print_number_union(head, &ptr->minor);
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
  	} else if (acl_type == TOMOYO_TYPE_INET_ACL) {
  		struct tomoyo_inet_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u8 perm = ptr->perm;
  
  		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "network inet ");
  				tomoyo_set_string(head, tomoyo_proto_keyword
  						  [ptr->protocol]);
  				tomoyo_set_space(head);
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
  		}
  		if (first)
  			return true;
  		tomoyo_set_space(head);
  		if (ptr->address.group) {
  			tomoyo_set_string(head, "@");
  			tomoyo_set_string(head, ptr->address.group->group_name
  					  ->name);
  		} else {
  			char buf[128];
  			tomoyo_print_ip(buf, sizeof(buf), &ptr->address);
  			tomoyo_io_printf(head, "%s", buf);
  		}
  		tomoyo_print_number_union(head, &ptr->port);
  	} else if (acl_type == TOMOYO_TYPE_UNIX_ACL) {
  		struct tomoyo_unix_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  		const u8 perm = ptr->perm;
  
  		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
  			if (!(perm & (1 << bit)))
  				continue;
  			if (first) {
  				tomoyo_set_group(head, "network unix ");
  				tomoyo_set_string(head, tomoyo_proto_keyword
  						  [ptr->protocol]);
  				tomoyo_set_space(head);
  				first = false;
  			} else {
  				tomoyo_set_slash(head);
  			}
  			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
  		}
  		if (first)
  			return true;
  		tomoyo_print_name_union(head, &ptr->name);
5db5a39b6   Tetsuo Handa   TOMOYO: Use commo...
1501
1502
1503
  	} else if (acl_type == TOMOYO_TYPE_MOUNT_ACL) {
  		struct tomoyo_mount_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1504
  		tomoyo_set_group(head, "file mount");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1505
1506
1507
1508
  		tomoyo_print_name_union(head, &ptr->dev_name);
  		tomoyo_print_name_union(head, &ptr->dir_name);
  		tomoyo_print_name_union(head, &ptr->fs_type);
  		tomoyo_print_number_union(head, &ptr->flags);
d58e0da85   Tetsuo Handa   TOMOYO: Add envir...
1509
1510
1511
1512
1513
1514
  	} else if (acl_type == TOMOYO_TYPE_ENV_ACL) {
  		struct tomoyo_env_acl *ptr =
  			container_of(acl, typeof(*ptr), head);
  
  		tomoyo_set_group(head, "misc env ");
  		tomoyo_set_string(head, ptr->env->name);
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1515
  	}
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
  	if (acl->cond) {
  		head->r.print_cond_part = true;
  		head->r.cond_step = 0;
  		if (!tomoyo_flush(head))
  			return false;
  print_cond_part:
  		if (!tomoyo_print_condition(head, acl->cond))
  			return false;
  		head->r.print_cond_part = false;
  	} else {
  		tomoyo_set_lf(head);
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1528
1529
1530
1531
1532
1533
  	return true;
  }
  
  /**
   * tomoyo_read_domain2 - Read domain policy.
   *
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1534
1535
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @list: Pointer to "struct list_head".
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1536
1537
1538
1539
1540
1541
   *
   * Caller holds tomoyo_read_lock().
   *
   * Returns true on success, false otherwise.
   */
  static bool tomoyo_read_domain2(struct tomoyo_io_buffer *head,
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1542
  				struct list_head *list)
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1543
  {
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1544
  	list_for_each_cookie(head->r.acl, list) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1545
1546
1547
1548
1549
1550
  		struct tomoyo_acl_info *ptr =
  			list_entry(head->r.acl, typeof(*ptr), list);
  		if (!tomoyo_print_entry(head, ptr))
  			return false;
  	}
  	head->r.acl = NULL;
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1551
  	return true;
a1f9bb6a3   Tetsuo Handa   TOMOYO: Split fil...
1552
1553
1554
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1555
   * tomoyo_read_domain - Read domain policy.
9590837b8   Kentaro Takeda   Common functions ...
1556
1557
1558
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1559
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1560
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1561
  static void tomoyo_read_domain(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1562
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1563
  	if (head->r.eof)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
1564
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1565
  	list_for_each_cookie(head->r.domain, &tomoyo_domain_list) {
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
1566
  		struct tomoyo_domain_info *domain =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1567
1568
  			list_entry(head->r.domain, typeof(*domain), list);
  		switch (head->r.step) {
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1569
  			u8 i;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1570
1571
1572
1573
1574
1575
1576
  		case 0:
  			if (domain->is_deleted &&
  			    !head->r.print_this_domain_only)
  				continue;
  			/* Print domainname and flags. */
  			tomoyo_set_string(head, domain->domainname->name);
  			tomoyo_set_lf(head);
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1577
1578
  			tomoyo_io_printf(head, "use_profile %u
  ",
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1579
  					 domain->profile);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1580
1581
1582
  			tomoyo_io_printf(head, "use_group %u
  ",
  					 domain->group);
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
1583
1584
1585
  			for (i = 0; i < TOMOYO_MAX_DOMAIN_INFO_FLAGS; i++)
  				if (domain->flags[i])
  					tomoyo_set_string(head, tomoyo_dif[i]);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1586
1587
1588
1589
  			head->r.step++;
  			tomoyo_set_lf(head);
  			/* fall through */
  		case 1:
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1590
  			if (!tomoyo_read_domain2(head, &domain->acl_info_list))
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1591
1592
1593
1594
1595
1596
1597
1598
1599
  				return;
  			head->r.step++;
  			if (!tomoyo_set_lf(head))
  				return;
  			/* fall through */
  		case 2:
  			head->r.step = 0;
  			if (head->r.print_this_domain_only)
  				goto done;
9590837b8   Kentaro Takeda   Common functions ...
1600
  		}
9590837b8   Kentaro Takeda   Common functions ...
1601
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1602
1603
   done:
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
1604
1605
1606
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
1607
1608
1609
1610
1611
1612
1613
1614
   * tomoyo_write_pid: Specify PID to obtain domainname.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0.
   */
  static int tomoyo_write_pid(struct tomoyo_io_buffer *head)
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1615
  	head->r.eof = false;
9590837b8   Kentaro Takeda   Common functions ...
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
  	return 0;
  }
  
  /**
   * tomoyo_read_pid - Get domainname of the specified PID.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns the domainname which the specified PID is in on success,
   * empty string otherwise.
   * The PID is specified by tomoyo_write_pid() so that the user can obtain
   * using read()/write() interface rather than sysctl() interface.
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
1629
  static void tomoyo_read_pid(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1630
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
  	char *buf = head->write_buf;
  	bool global_pid = false;
  	unsigned int pid;
  	struct task_struct *p;
  	struct tomoyo_domain_info *domain = NULL;
  
  	/* Accessing write_buf is safe because head->io_sem is held. */
  	if (!buf) {
  		head->r.eof = true;
  		return; /* Do nothing if open(O_RDONLY). */
9590837b8   Kentaro Takeda   Common functions ...
1641
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1642
1643
1644
1645
1646
1647
1648
  	if (head->r.w_pos || head->r.eof)
  		return;
  	head->r.eof = true;
  	if (tomoyo_str_starts(&buf, "global-pid "))
  		global_pid = true;
  	pid = (unsigned int) simple_strtoul(buf, NULL, 10);
  	rcu_read_lock();
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1649
1650
1651
1652
1653
1654
  	if (global_pid)
  		p = find_task_by_pid_ns(pid, &init_pid_ns);
  	else
  		p = find_task_by_vpid(pid);
  	if (p)
  		domain = tomoyo_real_domain(p);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1655
1656
1657
1658
1659
  	rcu_read_unlock();
  	if (!domain)
  		return;
  	tomoyo_io_printf(head, "%u %u ", pid, domain->profile);
  	tomoyo_set_string(head, domain->domainname->name);
9590837b8   Kentaro Takeda   Common functions ...
1660
  }
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
1661
  /* String table for domain transition control keywords. */
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1662
  static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1663
1664
1665
1666
1667
1668
  	[TOMOYO_TRANSITION_CONTROL_NO_RESET]      = "no_reset_domain ",
  	[TOMOYO_TRANSITION_CONTROL_RESET]         = "reset_domain ",
  	[TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE] = "no_initialize_domain ",
  	[TOMOYO_TRANSITION_CONTROL_INITIALIZE]    = "initialize_domain ",
  	[TOMOYO_TRANSITION_CONTROL_NO_KEEP]       = "no_keep_domain ",
  	[TOMOYO_TRANSITION_CONTROL_KEEP]          = "keep_domain ",
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1669
  };
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
1670
  /* String table for grouping keywords. */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1671
  static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = {
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1672
1673
1674
  	[TOMOYO_PATH_GROUP]    = "path_group ",
  	[TOMOYO_NUMBER_GROUP]  = "number_group ",
  	[TOMOYO_ADDRESS_GROUP] = "address_group ",
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1675
  };
9590837b8   Kentaro Takeda   Common functions ...
1676
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1677
   * tomoyo_write_exception - Write exception policy.
9590837b8   Kentaro Takeda   Common functions ...
1678
1679
1680
1681
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, negative value otherwise.
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1682
1683
   *
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1684
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1685
  static int tomoyo_write_exception(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
1686
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1687
  	const bool is_delete = head->w.is_delete;
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1688
  	struct tomoyo_acl_param param = {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1689
1690
  		.ns = head->w.ns,
  		.is_delete = is_delete,
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1691
  		.data = head->write_buf,
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1692
  	};
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1693
  	u8 i;
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1694
1695
  	if (tomoyo_str_starts(&param.data, "aggregator "))
  		return tomoyo_write_aggregator(&param);
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1696
  	for (i = 0; i < TOMOYO_MAX_TRANSITION_TYPE; i++)
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1697
1698
  		if (tomoyo_str_starts(&param.data, tomoyo_transition_type[i]))
  			return tomoyo_write_transition_control(&param, i);
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1699
  	for (i = 0; i < TOMOYO_MAX_GROUP; i++)
a238cf5b8   Tetsuo Handa   TOMOYO: Use struc...
1700
1701
  		if (tomoyo_str_starts(&param.data, tomoyo_group_name[i]))
  			return tomoyo_write_group(&param, i);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1702
1703
1704
1705
1706
  	if (tomoyo_str_starts(&param.data, "acl_group ")) {
  		unsigned int group;
  		char *data;
  		group = simple_strtoul(param.data, &data, 10);
  		if (group < TOMOYO_MAX_ACL_GROUPS && *data++ == ' ')
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1707
1708
1709
  			return tomoyo_write_domain2
  				(head->w.ns, &head->w.ns->acl_group[group],
  				 data, is_delete);
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1710
  	}
9590837b8   Kentaro Takeda   Common functions ...
1711
1712
1713
1714
  	return -EINVAL;
  }
  
  /**
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1715
   * tomoyo_read_group - Read "struct tomoyo_path_group"/"struct tomoyo_number_group"/"struct tomoyo_address_group" list.
9590837b8   Kentaro Takeda   Common functions ...
1716
1717
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1718
1719
1720
   * @idx:  Index number.
   *
   * Returns true on success, false otherwise.
9590837b8   Kentaro Takeda   Common functions ...
1721
   *
fdb8ebb72   Tetsuo Handa   TOMOYO: Use RCU p...
1722
   * Caller holds tomoyo_read_lock().
9590837b8   Kentaro Takeda   Common functions ...
1723
   */
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1724
  static bool tomoyo_read_group(struct tomoyo_io_buffer *head, const int idx)
9590837b8   Kentaro Takeda   Common functions ...
1725
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1726
1727
1728
1729
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
  	struct list_head *list = &ns->group_list[idx];
  	list_for_each_cookie(head->r.group, list) {
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1730
  		struct tomoyo_group *group =
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
1731
  			list_entry(head->r.group, typeof(*group), head.list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1732
  		list_for_each_cookie(head->r.acl, &group->member_list) {
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1733
  			struct tomoyo_acl_head *ptr =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1734
  				list_entry(head->r.acl, typeof(*ptr), list);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1735
1736
  			if (ptr->is_deleted)
  				continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1737
1738
  			if (!tomoyo_flush(head))
  				return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1739
  			tomoyo_print_namespace(head);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1740
1741
  			tomoyo_set_string(head, tomoyo_group_name[idx]);
  			tomoyo_set_string(head, group->group_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1742
  			if (idx == TOMOYO_PATH_GROUP) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1743
1744
1745
1746
  				tomoyo_set_space(head);
  				tomoyo_set_string(head, container_of
  					       (ptr, struct tomoyo_path_group,
  						head)->member_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1747
  			} else if (idx == TOMOYO_NUMBER_GROUP) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1748
1749
1750
1751
  				tomoyo_print_number_union(head, &container_of
  							  (ptr,
  						   struct tomoyo_number_group,
  							   head)->number);
059d84dbb   Tetsuo Handa   TOMOYO: Add socke...
1752
1753
1754
1755
1756
1757
1758
1759
1760
  			} else if (idx == TOMOYO_ADDRESS_GROUP) {
  				char buffer[128];
  
  				struct tomoyo_address_group *member =
  					container_of(ptr, typeof(*member),
  						     head);
  				tomoyo_print_ip(buffer, sizeof(buffer),
  						&member->address);
  				tomoyo_io_printf(head, " %s", buffer);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1761
  			}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1762
  			tomoyo_set_lf(head);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1763
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1764
  		head->r.acl = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1765
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1766
  	head->r.group = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
  	return true;
  }
  
  /**
   * tomoyo_read_policy - Read "struct tomoyo_..._entry" list.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   * @idx:  Index number.
   *
   * Returns true on success, false otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static bool tomoyo_read_policy(struct tomoyo_io_buffer *head, const int idx)
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1782
1783
1784
1785
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
  	struct list_head *list = &ns->policy_list[idx];
  	list_for_each_cookie(head->r.acl, list) {
475e6fa3d   Tetsuo Handa   TOMOYO: Change li...
1786
  		struct tomoyo_acl_head *acl =
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1787
  			container_of(head->r.acl, typeof(*acl), list);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1788
1789
  		if (acl->is_deleted)
  			continue;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1790
1791
  		if (!tomoyo_flush(head))
  			return false;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1792
  		switch (idx) {
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1793
  		case TOMOYO_ID_TRANSITION_CONTROL:
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1794
  			{
5448ec4f5   Tetsuo Handa   TOMOYO: Use commo...
1795
  				struct tomoyo_transition_control *ptr =
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1796
  					container_of(acl, typeof(*ptr), head);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1797
  				tomoyo_print_namespace(head);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1798
  				tomoyo_set_string(head, tomoyo_transition_type
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1799
  						  [ptr->type]);
0d2171d71   Tetsuo Handa   TOMOYO: Rename di...
1800
1801
1802
1803
1804
1805
  				tomoyo_set_string(head, ptr->program ?
  						  ptr->program->name : "any");
  				tomoyo_set_string(head, " from ");
  				tomoyo_set_string(head, ptr->domainname ?
  						  ptr->domainname->name :
  						  "any");
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1806
1807
  			}
  			break;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1808
1809
  		case TOMOYO_ID_AGGREGATOR:
  			{
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1810
  				struct tomoyo_aggregator *ptr =
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1811
  					container_of(acl, typeof(*ptr), head);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1812
  				tomoyo_print_namespace(head);
b5bc60b4c   Tetsuo Handa   TOMOYO: Cleanup p...
1813
  				tomoyo_set_string(head, "aggregator ");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1814
1815
1816
1817
1818
  				tomoyo_set_string(head,
  						  ptr->original_name->name);
  				tomoyo_set_space(head);
  				tomoyo_set_string(head,
  					       ptr->aggregated_name->name);
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1819
1820
  			}
  			break;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1821
1822
  		default:
  			continue;
9590837b8   Kentaro Takeda   Common functions ...
1823
  		}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1824
  		tomoyo_set_lf(head);
9590837b8   Kentaro Takeda   Common functions ...
1825
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1826
  	head->r.acl = NULL;
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1827
1828
1829
1830
  	return true;
  }
  
  /**
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1831
   * tomoyo_read_exception - Read exception policy.
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1832
1833
1834
1835
1836
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Caller holds tomoyo_read_lock().
   */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1837
  static void tomoyo_read_exception(struct tomoyo_io_buffer *head)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1838
  {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1839
1840
  	struct tomoyo_policy_namespace *ns =
  		container_of(head->r.ns, typeof(*ns), namespace_list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1841
  	if (head->r.eof)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1842
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1843
1844
1845
1846
  	while (head->r.step < TOMOYO_MAX_POLICY &&
  	       tomoyo_read_policy(head, head->r.step))
  		head->r.step++;
  	if (head->r.step < TOMOYO_MAX_POLICY)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1847
  		return;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1848
1849
1850
1851
  	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP &&
  	       tomoyo_read_group(head, head->r.step - TOMOYO_MAX_POLICY))
  		head->r.step++;
  	if (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP)
31845e8c6   Tetsuo Handa   TOMOYO: Aggregate...
1852
  		return;
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1853
1854
1855
1856
  	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP
  	       + TOMOYO_MAX_ACL_GROUPS) {
  		head->r.acl_group_index = head->r.step - TOMOYO_MAX_POLICY
  			- TOMOYO_MAX_GROUP;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
1857
  		if (!tomoyo_read_domain2(head, &ns->acl_group
32997144f   Tetsuo Handa   TOMOYO: Add ACL g...
1858
1859
1860
1861
  					 [head->r.acl_group_index]))
  			return;
  		head->r.step++;
  	}
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
1862
  	head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
1863
  }
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1864
  /* Wait queue for kernel -> userspace notification. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1865
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_query_wait);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1866
1867
  /* Wait queue for userspace -> kernel notification. */
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_answer_wait);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1868
1869
  
  /* Structure for query. */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1870
  struct tomoyo_query {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1871
  	struct list_head list;
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
1872
  	struct tomoyo_domain_info *domain;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1873
  	char *query;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1874
  	size_t query_len;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1875
  	unsigned int serial;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1876
1877
1878
  	u8 timer;
  	u8 answer;
  	u8 retry;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1879
  };
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
1880
  /* The list for "struct tomoyo_query". */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1881
  static LIST_HEAD(tomoyo_query_list);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1882
1883
  /* Lock for manipulating tomoyo_query_list. */
  static DEFINE_SPINLOCK(tomoyo_query_list_lock);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1884
1885
1886
1887
1888
1889
1890
  /*
   * Number of "struct file" referring /sys/kernel/security/tomoyo/query
   * interface.
   */
  static atomic_t tomoyo_query_observers = ATOMIC_INIT(0);
  
  /**
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
   * tomoyo_truncate - Truncate a line.
   *
   * @str: String to truncate.
   *
   * Returns length of truncated @str.
   */
  static int tomoyo_truncate(char *str)
  {
  	char *start = str;
  	while (*(unsigned char *) str > (unsigned char) ' ')
  		str++;
  	*str = '\0';
  	return strlen(start) + 1;
  }
  
  /**
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
   * tomoyo_add_entry - Add an ACL to current thread's domain. Used by learning mode.
   *
   * @domain: Pointer to "struct tomoyo_domain_info".
   * @header: Lines containing ACL.
   *
   * Returns nothing.
   */
  static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
  {
  	char *buffer;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1917
  	char *realpath = NULL;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1918
  	char *argv0 = NULL;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1919
  	char *symlink = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
  	char *cp = strchr(header, '
  ');
  	int len;
  	if (!cp)
  		return;
  	cp = strchr(cp + 1, '
  ');
  	if (!cp)
  		return;
  	*cp++ = '\0';
  	len = strlen(cp) + 1;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1931
1932
  	/* strstr() will return NULL if ordering is wrong. */
  	if (*cp == 'f') {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1933
1934
1935
1936
1937
  		argv0 = strstr(header, " argv[]={ \"");
  		if (argv0) {
  			argv0 += 10;
  			len += tomoyo_truncate(argv0) + 14;
  		}
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1938
1939
1940
1941
1942
1943
1944
1945
1946
  		realpath = strstr(header, " exec={ realpath=\"");
  		if (realpath) {
  			realpath += 8;
  			len += tomoyo_truncate(realpath) + 6;
  		}
  		symlink = strstr(header, " symlink.target=\"");
  		if (symlink)
  			len += tomoyo_truncate(symlink + 1) + 1;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1947
1948
1949
1950
  	buffer = kmalloc(len, GFP_NOFS);
  	if (!buffer)
  		return;
  	snprintf(buffer, len - 1, "%s", cp);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1951
1952
  	if (realpath)
  		tomoyo_addprintf(buffer, len, " exec.%s", realpath);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
1953
1954
  	if (argv0)
  		tomoyo_addprintf(buffer, len, " exec.argv[0]=%s", argv0);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
1955
1956
  	if (symlink)
  		tomoyo_addprintf(buffer, len, "%s", symlink);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1957
  	tomoyo_normalize_line(buffer);
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
1958
1959
1960
  	if (!tomoyo_write_domain2(domain->ns, &domain->acl_info_list, buffer,
  				  false))
  		tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1961
1962
1963
1964
  	kfree(buffer);
  }
  
  /**
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1965
1966
   * tomoyo_supervisor - Ask for the supervisor's decision.
   *
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1967
1968
   * @r:   Pointer to "struct tomoyo_request_info".
   * @fmt: The printf()'s format string, followed by parameters.
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1969
1970
1971
1972
1973
1974
1975
1976
1977
   *
   * Returns 0 if the supervisor decided to permit the access request which
   * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the
   * supervisor decided to retry the access request which violated the policy in
   * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise.
   */
  int tomoyo_supervisor(struct tomoyo_request_info *r, const char *fmt, ...)
  {
  	va_list args;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1978
  	int error;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1979
1980
  	int len;
  	static unsigned int tomoyo_serial;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1981
  	struct tomoyo_query entry = { };
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1982
  	bool quota_exceeded = false;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
  	va_start(args, fmt);
  	len = vsnprintf((char *) &len, 1, fmt, args) + 1;
  	va_end(args);
  	/* Write /sys/kernel/security/tomoyo/audit. */
  	va_start(args, fmt);
  	tomoyo_write_log2(r, len, fmt, args);
  	va_end(args);
  	/* Nothing more to do if granted. */
  	if (r->granted)
  		return 0;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
1993
1994
  	if (r->mode)
  		tomoyo_update_stat(r->mode);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
1995
  	switch (r->mode) {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1996
1997
1998
1999
2000
  	case TOMOYO_CONFIG_ENFORCING:
  		error = -EPERM;
  		if (atomic_read(&tomoyo_query_observers))
  			break;
  		goto out;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2001
  	case TOMOYO_CONFIG_LEARNING:
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2002
2003
2004
2005
  		error = 0;
  		/* Check max_learning_entry parameter. */
  		if (tomoyo_domain_quota_is_ok(r))
  			break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2006
  		/* fall through */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2007
  	default:
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2008
2009
  		return 0;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2010
  	/* Get message. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2011
  	va_start(args, fmt);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2012
  	entry.query = tomoyo_init_log(r, len, fmt, args);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2013
  	va_end(args);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2014
  	if (!entry.query)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2015
  		goto out;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2016
2017
2018
  	entry.query_len = strlen(entry.query) + 1;
  	if (!error) {
  		tomoyo_add_entry(r->domain, entry.query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2019
  		goto out;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2020
2021
  	}
  	len = tomoyo_round2(entry.query_len);
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
2022
  	entry.domain = r->domain;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2023
  	spin_lock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2024
2025
2026
  	if (tomoyo_memory_quota[TOMOYO_MEMORY_QUERY] &&
  	    tomoyo_memory_used[TOMOYO_MEMORY_QUERY] + len
  	    >= tomoyo_memory_quota[TOMOYO_MEMORY_QUERY]) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2027
2028
  		quota_exceeded = true;
  	} else {
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2029
2030
2031
2032
  		entry.serial = tomoyo_serial++;
  		entry.retry = r->retry;
  		tomoyo_memory_used[TOMOYO_MEMORY_QUERY] += len;
  		list_add_tail(&entry.list, &tomoyo_query_list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2033
2034
2035
2036
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (quota_exceeded)
  		goto out;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2037
  	/* Give 10 seconds for supervisor's opinion. */
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2038
2039
2040
2041
2042
  	while (entry.timer < 10) {
  		wake_up_all(&tomoyo_query_wait);
  		if (wait_event_interruptible_timeout
  		    (tomoyo_answer_wait, entry.answer ||
  		     !atomic_read(&tomoyo_query_observers), HZ))
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2043
  			break;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2044
2045
  		else
  			entry.timer++;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2046
2047
  	}
  	spin_lock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2048
2049
  	list_del(&entry.list);
  	tomoyo_memory_used[TOMOYO_MEMORY_QUERY] -= len;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2050
  	spin_unlock(&tomoyo_query_list_lock);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2051
  	switch (entry.answer) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2052
2053
2054
2055
2056
2057
2058
2059
  	case 3: /* Asked to retry by administrator. */
  		error = TOMOYO_RETRY_REQUEST;
  		r->retry++;
  		break;
  	case 1:
  		/* Granted by administrator. */
  		error = 0;
  		break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2060
  	default:
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2061
  		/* Timed out or rejected by administrator. */
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2062
2063
  		break;
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2064
2065
  out:
  	kfree(entry.query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2066
2067
2068
2069
  	return error;
  }
  
  /**
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
   * tomoyo_find_domain_by_qid - Get domain by query id.
   *
   * @serial: Query ID assigned by tomoyo_supervisor().
   *
   * Returns pointer to "struct tomoyo_domain_info" if found, NULL otherwise.
   */
  static struct tomoyo_domain_info *tomoyo_find_domain_by_qid
  (unsigned int serial)
  {
  	struct tomoyo_query *ptr;
  	struct tomoyo_domain_info *domain = NULL;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each_entry(ptr, &tomoyo_query_list, list) {
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2083
  		if (ptr->serial != serial)
59df3166e   Tetsuo Handa   TOMOYO: Fix inter...
2084
2085
2086
2087
2088
2089
2090
2091
2092
  			continue;
  		domain = ptr->domain;
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	return domain;
  }
  
  /**
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2093
2094
2095
2096
2097
2098
2099
2100
2101
   * tomoyo_poll_query - poll() for /sys/kernel/security/tomoyo/query.
   *
   * @file: Pointer to "struct file".
   * @wait: Pointer to "poll_table".
   *
   * Returns POLLIN | POLLRDNORM when ready to read, 0 otherwise.
   *
   * Waits for access requests which violated policy in enforcing mode.
   */
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2102
  static unsigned int tomoyo_poll_query(struct file *file, poll_table *wait)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2103
  {
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2104
2105
2106
2107
2108
  	if (!list_empty(&tomoyo_query_list))
  		return POLLIN | POLLRDNORM;
  	poll_wait(file, &tomoyo_query_wait, wait);
  	if (!list_empty(&tomoyo_query_list))
  		return POLLIN | POLLRDNORM;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2109
2110
2111
2112
2113
2114
2115
  	return 0;
  }
  
  /**
   * tomoyo_read_query - Read access requests which violated policy in enforcing mode.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2116
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2117
  static void tomoyo_read_query(struct tomoyo_io_buffer *head)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2118
2119
  {
  	struct list_head *tmp;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2120
2121
  	unsigned int pos = 0;
  	size_t len = 0;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2122
  	char *buf;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2123
  	if (head->r.w_pos)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2124
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2125
2126
2127
  	if (head->read_buf) {
  		kfree(head->read_buf);
  		head->read_buf = NULL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2128
2129
2130
  	}
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2131
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2132
  		if (pos++ != head->r.query_index)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2133
2134
2135
2136
2137
2138
  			continue;
  		len = ptr->query_len;
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (!len) {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2139
  		head->r.query_index = 0;
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2140
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2141
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2142
  	buf = kzalloc(len + 32, GFP_NOFS);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2143
  	if (!buf)
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2144
  		return;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2145
2146
2147
  	pos = 0;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2148
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2149
  		if (pos++ != head->r.query_index)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2150
2151
2152
2153
2154
2155
  			continue;
  		/*
  		 * Some query can be skipped because tomoyo_query_list
  		 * can change, but I don't care.
  		 */
  		if (len == ptr->query_len)
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2156
2157
2158
  			snprintf(buf, len + 31, "Q%u-%hu
  %s", ptr->serial,
  				 ptr->retry, ptr->query);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2159
2160
2161
2162
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (buf[0]) {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2163
  		head->read_buf = buf;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2164
2165
  		head->r.w[head->r.w_pos++] = buf;
  		head->r.query_index++;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2166
2167
2168
  	} else {
  		kfree(buf);
  	}
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
  }
  
  /**
   * tomoyo_write_answer - Write the supervisor's decision.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0 on success, -EINVAL otherwise.
   */
  static int tomoyo_write_answer(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	struct list_head *tmp;
  	unsigned int serial;
  	unsigned int answer;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2186
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2187
2188
2189
2190
2191
2192
2193
  		ptr->timer = 0;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	if (sscanf(data, "A%u=%u", &serial, &answer) != 2)
  		return -EINVAL;
  	spin_lock(&tomoyo_query_list_lock);
  	list_for_each(tmp, &tomoyo_query_list) {
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2194
  		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2195
2196
  		if (ptr->serial != serial)
  			continue;
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2197
2198
2199
2200
  		ptr->answer = answer;
  		/* Remove from tomoyo_query_list. */
  		if (ptr->answer)
  			list_del_init(&ptr->list);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2201
2202
2203
2204
2205
2206
2207
  		break;
  	}
  	spin_unlock(&tomoyo_query_list_lock);
  	return 0;
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2208
2209
2210
2211
2212
2213
   * tomoyo_read_version: Get version.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns version information.
   */
8fbe71f0e   Tetsuo Handa   TOMOYO: Make read...
2214
  static void tomoyo_read_version(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
2215
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2216
  	if (!head->r.eof) {
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2217
  		tomoyo_io_printf(head, "2.5.0");
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2218
  		head->r.eof = true;
9590837b8   Kentaro Takeda   Common functions ...
2219
  	}
9590837b8   Kentaro Takeda   Common functions ...
2220
  }
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
  /* String table for /sys/kernel/security/tomoyo/stat interface. */
  static const char * const tomoyo_policy_headers[TOMOYO_MAX_POLICY_STAT] = {
  	[TOMOYO_STAT_POLICY_UPDATES]    = "update:",
  	[TOMOYO_STAT_POLICY_LEARNING]   = "violation in learning mode:",
  	[TOMOYO_STAT_POLICY_PERMISSIVE] = "violation in permissive mode:",
  	[TOMOYO_STAT_POLICY_ENFORCING]  = "violation in enforcing mode:",
  };
  
  /* String table for /sys/kernel/security/tomoyo/stat interface. */
  static const char * const tomoyo_memory_headers[TOMOYO_MAX_MEMORY_STAT] = {
  	[TOMOYO_MEMORY_POLICY] = "policy:",
  	[TOMOYO_MEMORY_AUDIT]  = "audit log:",
  	[TOMOYO_MEMORY_QUERY]  = "query message:",
  };
  
  /* Timestamp counter for last updated. */
  static unsigned int tomoyo_stat_updated[TOMOYO_MAX_POLICY_STAT];
  /* Counter for number of updates. */
  static unsigned int tomoyo_stat_modified[TOMOYO_MAX_POLICY_STAT];
  
  /**
   * tomoyo_update_stat - Update statistic counters.
   *
   * @index: Index for policy type.
   *
   * Returns nothing.
   */
  void tomoyo_update_stat(const u8 index)
  {
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2250
2251
2252
2253
  	/*
  	 * I don't use atomic operations because race condition is not fatal.
  	 */
  	tomoyo_stat_updated[index]++;
77f4fa089   Thomas Gleixner   tomoyo: Use sensi...
2254
  	tomoyo_stat_modified[index] = get_seconds();
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
  }
  
  /**
   * tomoyo_read_stat - Read statistic data.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static void tomoyo_read_stat(struct tomoyo_io_buffer *head)
  {
  	u8 i;
  	unsigned int total = 0;
  	if (head->r.eof)
  		return;
  	for (i = 0; i < TOMOYO_MAX_POLICY_STAT; i++) {
  		tomoyo_io_printf(head, "Policy %-30s %10u",
  				 tomoyo_policy_headers[i],
  				 tomoyo_stat_updated[i]);
  		if (tomoyo_stat_modified[i]) {
  			struct tomoyo_time stamp;
  			tomoyo_convert_time(tomoyo_stat_modified[i], &stamp);
  			tomoyo_io_printf(head, " (Last: %04u/%02u/%02u "
  					 "%02u:%02u:%02u)",
  					 stamp.year, stamp.month, stamp.day,
  					 stamp.hour, stamp.min, stamp.sec);
  		}
  		tomoyo_set_lf(head);
  	}
  	for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++) {
  		unsigned int used = tomoyo_memory_used[i];
  		total += used;
  		tomoyo_io_printf(head, "Memory used by %-22s %10u",
  				 tomoyo_memory_headers[i], used);
  		used = tomoyo_memory_quota[i];
  		if (used)
  			tomoyo_io_printf(head, " (Quota: %10u)", used);
  		tomoyo_set_lf(head);
  	}
  	tomoyo_io_printf(head, "Total memory used:                    %10u
  ",
  			 total);
  	head->r.eof = true;
  }
  
  /**
   * tomoyo_write_stat - Set memory quota.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns 0.
   */
  static int tomoyo_write_stat(struct tomoyo_io_buffer *head)
  {
  	char *data = head->write_buf;
  	u8 i;
  	if (tomoyo_str_starts(&data, "Memory used by "))
  		for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++)
  			if (tomoyo_str_starts(&data, tomoyo_memory_headers[i]))
  				sscanf(data, "%u", &tomoyo_memory_quota[i]);
  	return 0;
  }
9590837b8   Kentaro Takeda   Common functions ...
2317
2318
2319
2320
2321
2322
  /**
   * tomoyo_open_control - open() for /sys/kernel/security/tomoyo/ interface.
   *
   * @type: Type of interface.
   * @file: Pointer to "struct file".
   *
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2323
   * Returns 0 on success, negative value otherwise.
9590837b8   Kentaro Takeda   Common functions ...
2324
   */
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2325
  int tomoyo_open_control(const u8 type, struct file *file)
9590837b8   Kentaro Takeda   Common functions ...
2326
  {
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2327
  	struct tomoyo_io_buffer *head = kzalloc(sizeof(*head), GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2328
2329
2330
2331
  
  	if (!head)
  		return -ENOMEM;
  	mutex_init(&head->io_sem);
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2332
  	head->type = type;
9590837b8   Kentaro Takeda   Common functions ...
2333
2334
2335
  	switch (type) {
  	case TOMOYO_DOMAINPOLICY:
  		/* /sys/kernel/security/tomoyo/domain_policy */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2336
2337
  		head->write = tomoyo_write_domain;
  		head->read = tomoyo_read_domain;
9590837b8   Kentaro Takeda   Common functions ...
2338
2339
2340
  		break;
  	case TOMOYO_EXCEPTIONPOLICY:
  		/* /sys/kernel/security/tomoyo/exception_policy */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2341
2342
  		head->write = tomoyo_write_exception;
  		head->read = tomoyo_read_exception;
9590837b8   Kentaro Takeda   Common functions ...
2343
  		break;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2344
2345
2346
2347
2348
  	case TOMOYO_AUDIT:
  		/* /sys/kernel/security/tomoyo/audit */
  		head->poll = tomoyo_poll_log;
  		head->read = tomoyo_read_log;
  		break;
9590837b8   Kentaro Takeda   Common functions ...
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
  	case TOMOYO_PROCESS_STATUS:
  		/* /sys/kernel/security/tomoyo/.process_status */
  		head->write = tomoyo_write_pid;
  		head->read = tomoyo_read_pid;
  		break;
  	case TOMOYO_VERSION:
  		/* /sys/kernel/security/tomoyo/version */
  		head->read = tomoyo_read_version;
  		head->readbuf_size = 128;
  		break;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2359
2360
2361
2362
2363
  	case TOMOYO_STAT:
  		/* /sys/kernel/security/tomoyo/stat */
  		head->write = tomoyo_write_stat;
  		head->read = tomoyo_read_stat;
  		head->readbuf_size = 1024;
9590837b8   Kentaro Takeda   Common functions ...
2364
2365
2366
2367
2368
2369
  		break;
  	case TOMOYO_PROFILE:
  		/* /sys/kernel/security/tomoyo/profile */
  		head->write = tomoyo_write_profile;
  		head->read = tomoyo_read_profile;
  		break;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2370
2371
2372
2373
2374
  	case TOMOYO_QUERY: /* /sys/kernel/security/tomoyo/query */
  		head->poll = tomoyo_poll_query;
  		head->write = tomoyo_write_answer;
  		head->read = tomoyo_read_query;
  		break;
9590837b8   Kentaro Takeda   Common functions ...
2375
2376
  	case TOMOYO_MANAGER:
  		/* /sys/kernel/security/tomoyo/manager */
e2bf69077   Tetsuo Handa   TOMOYO: Rename sy...
2377
2378
  		head->write = tomoyo_write_manager;
  		head->read = tomoyo_read_manager;
9590837b8   Kentaro Takeda   Common functions ...
2379
2380
2381
2382
2383
2384
2385
2386
  		break;
  	}
  	if (!(file->f_mode & FMODE_READ)) {
  		/*
  		 * No need to allocate read_buf since it is not opened
  		 * for reading.
  		 */
  		head->read = NULL;
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2387
2388
2389
  		head->poll = NULL;
  	} else if (!head->poll) {
  		/* Don't allocate read_buf for poll() access. */
9590837b8   Kentaro Takeda   Common functions ...
2390
2391
  		if (!head->readbuf_size)
  			head->readbuf_size = 4096 * 2;
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2392
  		head->read_buf = kzalloc(head->readbuf_size, GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2393
  		if (!head->read_buf) {
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
2394
  			kfree(head);
9590837b8   Kentaro Takeda   Common functions ...
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
  			return -ENOMEM;
  		}
  	}
  	if (!(file->f_mode & FMODE_WRITE)) {
  		/*
  		 * No need to allocate write_buf since it is not opened
  		 * for writing.
  		 */
  		head->write = NULL;
  	} else if (head->write) {
  		head->writebuf_size = 4096 * 2;
4e5d6f7ec   Tetsuo Handa   TOMOYO: Use GFP_N...
2406
  		head->write_buf = kzalloc(head->writebuf_size, GFP_NOFS);
9590837b8   Kentaro Takeda   Common functions ...
2407
  		if (!head->write_buf) {
8e2d39a16   Tetsuo Handa   TOMOYO: Remove us...
2408
2409
  			kfree(head->read_buf);
  			kfree(head);
9590837b8   Kentaro Takeda   Common functions ...
2410
2411
2412
  			return -ENOMEM;
  		}
  	}
9590837b8   Kentaro Takeda   Common functions ...
2413
  	/*
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2414
2415
2416
2417
2418
  	 * If the file is /sys/kernel/security/tomoyo/query , increment the
  	 * observer counter.
  	 * The obserber counter is used by tomoyo_supervisor() to see if
  	 * there is some process monitoring /sys/kernel/security/tomoyo/query.
  	 */
7c75964f4   Tetsuo Handa   TOMOYO: Cleanup p...
2419
  	if (type == TOMOYO_QUERY)
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2420
  		atomic_inc(&tomoyo_query_observers);
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2421
2422
  	file->private_data = head;
  	tomoyo_notify_gc(head, true);
9590837b8   Kentaro Takeda   Common functions ...
2423
2424
2425
2426
  	return 0;
  }
  
  /**
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2427
2428
2429
   * tomoyo_poll_control - poll() for /sys/kernel/security/tomoyo/ interface.
   *
   * @file: Pointer to "struct file".
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2430
   * @wait: Pointer to "poll_table". Maybe NULL.
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2431
   *
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2432
2433
   * Returns POLLIN | POLLRDNORM | POLLOUT | POLLWRNORM if ready to read/write,
   * POLLOUT | POLLWRNORM otherwise.
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2434
   */
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2435
  unsigned int tomoyo_poll_control(struct file *file, poll_table *wait)
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2436
2437
  {
  	struct tomoyo_io_buffer *head = file->private_data;
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
2438
2439
2440
  	if (head->poll)
  		return head->poll(file, wait) | POLLOUT | POLLWRNORM;
  	return POLLIN | POLLRDNORM | POLLOUT | POLLWRNORM;
0849e3ba5   Tetsuo Handa   TOMOYO: Add missi...
2441
2442
2443
  }
  
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
   * tomoyo_set_namespace_cursor - Set namespace to read.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  static inline void tomoyo_set_namespace_cursor(struct tomoyo_io_buffer *head)
  {
  	struct list_head *ns;
  	if (head->type != TOMOYO_EXCEPTIONPOLICY &&
  	    head->type != TOMOYO_PROFILE)
  		return;
  	/*
  	 * If this is the first read, or reading previous namespace finished
  	 * and has more namespaces to read, update the namespace cursor.
  	 */
  	ns = head->r.ns;
  	if (!ns || (head->r.eof && ns->next != &tomoyo_namespace_list)) {
  		/* Clearing is OK because tomoyo_flush() returned true. */
  		memset(&head->r, 0, sizeof(head->r));
  		head->r.ns = ns ? ns->next : tomoyo_namespace_list.next;
  	}
  }
  
  /**
   * tomoyo_has_more_namespace - Check for unread namespaces.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns true if we have more entries to print, false otherwise.
   */
  static inline bool tomoyo_has_more_namespace(struct tomoyo_io_buffer *head)
  {
  	return (head->type == TOMOYO_EXCEPTIONPOLICY ||
  		head->type == TOMOYO_PROFILE) && head->r.eof &&
  		head->r.ns->next != &tomoyo_namespace_list;
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2483
2484
   * tomoyo_read_control - read() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2485
   * @head:       Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2486
2487
2488
2489
2490
   * @buffer:     Poiner to buffer to write to.
   * @buffer_len: Size of @buffer.
   *
   * Returns bytes read on success, negative value otherwise.
   */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2491
2492
  ssize_t tomoyo_read_control(struct tomoyo_io_buffer *head, char __user *buffer,
  			    const int buffer_len)
9590837b8   Kentaro Takeda   Common functions ...
2493
  {
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2494
  	int len;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2495
  	int idx;
9590837b8   Kentaro Takeda   Common functions ...
2496
2497
2498
2499
2500
  
  	if (!head->read)
  		return -ENOSYS;
  	if (mutex_lock_interruptible(&head->io_sem))
  		return -EINTR;
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2501
2502
  	head->read_user_buf = buffer;
  	head->read_user_buf_avail = buffer_len;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2503
  	idx = tomoyo_read_lock();
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2504
2505
  	if (tomoyo_flush(head))
  		/* Call the policy handler. */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2506
2507
2508
2509
2510
  		do {
  			tomoyo_set_namespace_cursor(head);
  			head->read(head);
  		} while (tomoyo_flush(head) &&
  			 tomoyo_has_more_namespace(head));
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2511
  	tomoyo_read_unlock(idx);
f23571e86   Tetsuo Handa   TOMOYO: Copy dire...
2512
  	len = head->read_user_buf - buffer;
9590837b8   Kentaro Takeda   Common functions ...
2513
2514
2515
2516
2517
  	mutex_unlock(&head->io_sem);
  	return len;
  }
  
  /**
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
   * tomoyo_parse_policy - Parse a policy line.
   *
   * @head: Poiter to "struct tomoyo_io_buffer".
   * @line: Line to parse.
   *
   * Returns 0 on success, negative value otherwise.
   *
   * Caller holds tomoyo_read_lock().
   */
  static int tomoyo_parse_policy(struct tomoyo_io_buffer *head, char *line)
  {
  	/* Delete request? */
  	head->w.is_delete = !strncmp(line, "delete ", 7);
  	if (head->w.is_delete)
  		memmove(line, line + 7, strlen(line + 7) + 1);
  	/* Selecting namespace to update. */
  	if (head->type == TOMOYO_EXCEPTIONPOLICY ||
  	    head->type == TOMOYO_PROFILE) {
  		if (*line == '<') {
  			char *cp = strchr(line, ' ');
  			if (cp) {
  				*cp++ = '\0';
  				head->w.ns = tomoyo_assign_namespace(line);
  				memmove(line, cp, strlen(cp) + 1);
  			} else
  				head->w.ns = NULL;
  		} else
  			head->w.ns = &tomoyo_kernel_namespace;
  		/* Don't allow updating if namespace is invalid. */
  		if (!head->w.ns)
  			return -ENOENT;
  	}
  	/* Do the update. */
  	return head->write(head);
  }
  
  /**
9590837b8   Kentaro Takeda   Common functions ...
2555
2556
   * tomoyo_write_control - write() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2557
   * @head:       Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2558
2559
2560
2561
2562
   * @buffer:     Pointer to buffer to read from.
   * @buffer_len: Size of @buffer.
   *
   * Returns @buffer_len on success, negative value otherwise.
   */
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
2563
2564
  ssize_t tomoyo_write_control(struct tomoyo_io_buffer *head,
  			     const char __user *buffer, const int buffer_len)
9590837b8   Kentaro Takeda   Common functions ...
2565
  {
9590837b8   Kentaro Takeda   Common functions ...
2566
  	int error = buffer_len;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2567
  	size_t avail_len = buffer_len;
9590837b8   Kentaro Takeda   Common functions ...
2568
  	char *cp0 = head->write_buf;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2569
  	int idx;
9590837b8   Kentaro Takeda   Common functions ...
2570
2571
2572
2573
  	if (!head->write)
  		return -ENOSYS;
  	if (!access_ok(VERIFY_READ, buffer, buffer_len))
  		return -EFAULT;
9590837b8   Kentaro Takeda   Common functions ...
2574
2575
  	if (mutex_lock_interruptible(&head->io_sem))
  		return -EINTR;
e0b057b40   Tetsuo Handa   TOMOYO: Fix incom...
2576
  	head->read_user_buf_avail = 0;
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2577
  	idx = tomoyo_read_lock();
9590837b8   Kentaro Takeda   Common functions ...
2578
2579
2580
  	/* Read a line and dispatch it to the policy handler. */
  	while (avail_len > 0) {
  		char c;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2581
  		if (head->w.avail >= head->writebuf_size - 1) {
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
  			const int len = head->writebuf_size * 2;
  			char *cp = kzalloc(len, GFP_NOFS);
  			if (!cp) {
  				error = -ENOMEM;
  				break;
  			}
  			memmove(cp, cp0, head->w.avail);
  			kfree(cp0);
  			head->write_buf = cp;
  			cp0 = cp;
  			head->writebuf_size = len;
  		}
  		if (get_user(c, buffer)) {
9590837b8   Kentaro Takeda   Common functions ...
2595
2596
2597
2598
2599
  			error = -EFAULT;
  			break;
  		}
  		buffer++;
  		avail_len--;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2600
  		cp0[head->w.avail++] = c;
9590837b8   Kentaro Takeda   Common functions ...
2601
2602
2603
  		if (c != '
  ')
  			continue;
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2604
2605
  		cp0[head->w.avail - 1] = '\0';
  		head->w.avail = 0;
9590837b8   Kentaro Takeda   Common functions ...
2606
  		tomoyo_normalize_line(cp0);
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
  		if (!strcmp(cp0, "reset")) {
  			head->w.ns = &tomoyo_kernel_namespace;
  			head->w.domain = NULL;
  			memset(&head->r, 0, sizeof(head->r));
  			continue;
  		}
  		/* Don't allow updating policies by non manager programs. */
  		switch (head->type) {
  		case TOMOYO_PROCESS_STATUS:
  			/* This does not write anything. */
  			break;
  		case TOMOYO_DOMAINPOLICY:
  			if (tomoyo_select_domain(head, cp0))
  				continue;
  			/* fall through */
  		case TOMOYO_EXCEPTIONPOLICY:
  			if (!strcmp(cp0, "select transition_only")) {
  				head->r.print_transition_related_only = true;
  				continue;
  			}
  			/* fall through */
  		default:
  			if (!tomoyo_manager()) {
  				error = -EPERM;
  				goto out;
  			}
  		}
  		switch (tomoyo_parse_policy(head, cp0)) {
  		case -EPERM:
  			error = -EPERM;
  			goto out;
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2638
2639
2640
2641
  		case 0:
  			switch (head->type) {
  			case TOMOYO_DOMAINPOLICY:
  			case TOMOYO_EXCEPTIONPOLICY:
b22b8b9fd   Tetsuo Handa   TOMOYO: Rename me...
2642
2643
2644
2645
2646
2647
2648
2649
2650
  			case TOMOYO_STAT:
  			case TOMOYO_PROFILE:
  			case TOMOYO_MANAGER:
  				tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
  				break;
  			default:
  				break;
  			}
  			break;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2651
  		}
9590837b8   Kentaro Takeda   Common functions ...
2652
  	}
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2653
  out:
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2654
  	tomoyo_read_unlock(idx);
9590837b8   Kentaro Takeda   Common functions ...
2655
2656
2657
2658
2659
2660
2661
  	mutex_unlock(&head->io_sem);
  	return error;
  }
  
  /**
   * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface.
   *
0df7e8b8f   Tetsuo Handa   TOMOYO: Cleanup p...
2662
   * @head: Pointer to "struct tomoyo_io_buffer".
9590837b8   Kentaro Takeda   Common functions ...
2663
   */
e53cfda5d   Al Viro   tomoyo_close_cont...
2664
  void tomoyo_close_control(struct tomoyo_io_buffer *head)
9590837b8   Kentaro Takeda   Common functions ...
2665
  {
17fcfbd9d   Tetsuo Handa   TOMOYO: Add inter...
2666
2667
2668
2669
  	/*
  	 * If the file is /sys/kernel/security/tomoyo/query , decrement the
  	 * observer counter.
  	 */
2e503bbb4   Tetsuo Handa   TOMOYO: Fix lockd...
2670
2671
2672
2673
  	if (head->type == TOMOYO_QUERY &&
  	    atomic_dec_and_test(&tomoyo_query_observers))
  		wake_up_all(&tomoyo_answer_wait);
  	tomoyo_notify_gc(head, false);
9590837b8   Kentaro Takeda   Common functions ...
2674
2675
2676
  }
  
  /**
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2677
   * tomoyo_check_profile - Check all profiles currently assigned to domains are defined.
9590837b8   Kentaro Takeda   Common functions ...
2678
   */
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2679
  void tomoyo_check_profile(void)
9590837b8   Kentaro Takeda   Common functions ...
2680
  {
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2681
2682
2683
  	struct tomoyo_domain_info *domain;
  	const int idx = tomoyo_read_lock();
  	tomoyo_policy_loaded = true;
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2684
2685
  	printk(KERN_INFO "TOMOYO: 2.5.0
  ");
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2686
2687
  	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
  		const u8 profile = domain->profile;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2688
  		const struct tomoyo_policy_namespace *ns = domain->ns;
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2689
  		if (ns->profile_version != 20110903)
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
  			printk(KERN_ERR
  			       "Profile version %u is not supported.
  ",
  			       ns->profile_version);
  		else if (!ns->profile_ptr[profile])
  			printk(KERN_ERR
  			       "Profile %u (used by '%s') is not defined.
  ",
  			       profile, domain->domainname->name);
  		else
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2700
  			continue;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2701
  		printk(KERN_ERR
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2702
  		       "Userland tools for TOMOYO 2.5 must be installed and "
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2703
2704
  		       "policy must be initialized.
  ");
843d183cd   Tetsuo Handa   TOMOYO: Bump vers...
2705
  		printk(KERN_ERR "Please see http://tomoyo.sourceforge.jp/2.5/ "
9f1c1d426   Tetsuo Handa   TOMOYO: Print URL...
2706
2707
  		       "for more information.
  ");
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
2708
  		panic("STOP!");
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2709
2710
  	}
  	tomoyo_read_unlock(idx);
c3ef1500e   Tetsuo Handa   TOMOYO: Split fil...
2711
2712
  	printk(KERN_INFO "Mandatory Access Control activated.
  ");
9590837b8   Kentaro Takeda   Common functions ...
2713
  }
efe836ab2   Tetsuo Handa   TOMOYO: Add built...
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
  
  /**
   * tomoyo_load_builtin_policy - Load built-in policy.
   *
   * Returns nothing.
   */
  void __init tomoyo_load_builtin_policy(void)
  {
  	/*
  	 * This include file is manually created and contains built-in policy
  	 * named "tomoyo_builtin_profile", "tomoyo_builtin_exception_policy",
  	 * "tomoyo_builtin_domain_policy", "tomoyo_builtin_manager",
  	 * "tomoyo_builtin_stat" in the form of "static char [] __initdata".
  	 */
  #include "builtin-policy.h"
  	u8 i;
  	const int idx = tomoyo_read_lock();
  	for (i = 0; i < 5; i++) {
  		struct tomoyo_io_buffer head = { };
  		char *start = "";
  		switch (i) {
  		case 0:
  			start = tomoyo_builtin_profile;
  			head.type = TOMOYO_PROFILE;
  			head.write = tomoyo_write_profile;
  			break;
  		case 1:
  			start = tomoyo_builtin_exception_policy;
  			head.type = TOMOYO_EXCEPTIONPOLICY;
  			head.write = tomoyo_write_exception;
  			break;
  		case 2:
  			start = tomoyo_builtin_domain_policy;
  			head.type = TOMOYO_DOMAINPOLICY;
  			head.write = tomoyo_write_domain;
  			break;
  		case 3:
  			start = tomoyo_builtin_manager;
  			head.type = TOMOYO_MANAGER;
  			head.write = tomoyo_write_manager;
  			break;
  		case 4:
  			start = tomoyo_builtin_stat;
  			head.type = TOMOYO_STAT;
  			head.write = tomoyo_write_stat;
  			break;
  		}
  		while (1) {
  			char *end = strchr(start, '
  ');
  			if (!end)
  				break;
  			*end = '\0';
  			tomoyo_normalize_line(start);
  			head.write_buf = start;
  			tomoyo_parse_policy(&head, start);
  			start = end + 1;
  		}
  	}
  	tomoyo_read_unlock(idx);
0e4ae0e0d   Tetsuo Handa   TOMOYO: Make seve...
2774
2775
2776
  #ifdef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
  	tomoyo_check_profile();
  #endif
efe836ab2   Tetsuo Handa   TOMOYO: Add built...
2777
  }