Commit cdcf6723 authored by Tetsuo Handa's avatar Tetsuo Handa Committed by James Morris

tomoyo: Coding style fix.

Follow many of recommendations by scripts/checkpatch.pl, and follow
"lift switch variables out of switches" by Kees Cook.
This patch makes no functional change.
Signed-off-by: default avatarTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: default avatarJames Morris <james.morris@microsoft.com>
parent 8c6cb983
...@@ -32,6 +32,7 @@ static char *tomoyo_print_bprm(struct linux_binprm *bprm, ...@@ -32,6 +32,7 @@ static char *tomoyo_print_bprm(struct linux_binprm *bprm,
int argv_count = bprm->argc; int argv_count = bprm->argc;
int envp_count = bprm->envc; int envp_count = bprm->envc;
bool truncated = false; bool truncated = false;
if (!buffer) if (!buffer)
return NULL; return NULL;
len = snprintf(buffer, tomoyo_buffer_len - 1, "argv[]={ "); len = snprintf(buffer, tomoyo_buffer_len - 1, "argv[]={ ");
...@@ -49,6 +50,7 @@ static char *tomoyo_print_bprm(struct linux_binprm *bprm, ...@@ -49,6 +50,7 @@ static char *tomoyo_print_bprm(struct linux_binprm *bprm,
while (offset < PAGE_SIZE) { while (offset < PAGE_SIZE) {
const char *kaddr = dump->data; const char *kaddr = dump->data;
const unsigned char c = kaddr[offset++]; const unsigned char c = kaddr[offset++];
if (cp == last_start) if (cp == last_start)
*cp++ = '"'; *cp++ = '"';
if (cp >= buffer + tomoyo_buffer_len - 32) { if (cp >= buffer + tomoyo_buffer_len - 32) {
...@@ -154,19 +156,18 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r) ...@@ -154,19 +156,18 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r)
char *buffer = kmalloc(tomoyo_buffer_len, GFP_NOFS); char *buffer = kmalloc(tomoyo_buffer_len, GFP_NOFS);
int pos; int pos;
u8 i; u8 i;
if (!buffer) if (!buffer)
return NULL; return NULL;
tomoyo_convert_time(ktime_get_real_seconds(), &stamp); tomoyo_convert_time(ktime_get_real_seconds(), &stamp);
pos = snprintf(buffer, tomoyo_buffer_len - 1, pos = snprintf(buffer, tomoyo_buffer_len - 1,
"#%04u/%02u/%02u %02u:%02u:%02u# profile=%u mode=%s " "#%04u/%02u/%02u %02u:%02u:%02u# profile=%u mode=%s granted=%s (global-pid=%u) task={ pid=%u ppid=%u uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u fsuid=%u fsgid=%u }",
"granted=%s (global-pid=%u) task={ pid=%u ppid=%u " stamp.year, stamp.month, stamp.day, stamp.hour,
"uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u " stamp.min, stamp.sec, r->profile, tomoyo_mode[r->mode],
"fsuid=%u fsgid=%u }", stamp.year, stamp.month, tomoyo_yesno(r->granted), gpid, tomoyo_sys_getpid(),
stamp.day, stamp.hour, stamp.min, stamp.sec, r->profile, tomoyo_sys_getppid(),
tomoyo_mode[r->mode], tomoyo_yesno(r->granted), gpid,
tomoyo_sys_getpid(), tomoyo_sys_getppid(),
from_kuid(&init_user_ns, current_uid()), from_kuid(&init_user_ns, current_uid()),
from_kgid(&init_user_ns, current_gid()), from_kgid(&init_user_ns, current_gid()),
from_kuid(&init_user_ns, current_euid()), from_kuid(&init_user_ns, current_euid()),
...@@ -185,6 +186,7 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r) ...@@ -185,6 +186,7 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r)
struct tomoyo_mini_stat *stat; struct tomoyo_mini_stat *stat;
unsigned int dev; unsigned int dev;
umode_t mode; umode_t mode;
if (!obj->stat_valid[i]) if (!obj->stat_valid[i])
continue; continue;
stat = &obj->stat[i]; stat = &obj->stat[i];
...@@ -193,8 +195,8 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r) ...@@ -193,8 +195,8 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r)
if (i & 1) { if (i & 1) {
pos += snprintf(buffer + pos, pos += snprintf(buffer + pos,
tomoyo_buffer_len - 1 - pos, tomoyo_buffer_len - 1 - pos,
" path%u.parent={ uid=%u gid=%u " " path%u.parent={ uid=%u gid=%u ino=%lu perm=0%o }",
"ino=%lu perm=0%o }", (i >> 1) + 1, (i >> 1) + 1,
from_kuid(&init_user_ns, stat->uid), from_kuid(&init_user_ns, stat->uid),
from_kgid(&init_user_ns, stat->gid), from_kgid(&init_user_ns, stat->gid),
(unsigned long)stat->ino, (unsigned long)stat->ino,
...@@ -202,8 +204,8 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r) ...@@ -202,8 +204,8 @@ static char *tomoyo_print_header(struct tomoyo_request_info *r)
continue; continue;
} }
pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos, pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos,
" path%u={ uid=%u gid=%u ino=%lu major=%u" " path%u={ uid=%u gid=%u ino=%lu major=%u minor=%u perm=0%o type=%s",
" minor=%u perm=0%o type=%s", (i >> 1) + 1, (i >> 1) + 1,
from_kuid(&init_user_ns, stat->uid), from_kuid(&init_user_ns, stat->uid),
from_kgid(&init_user_ns, stat->gid), from_kgid(&init_user_ns, stat->gid),
(unsigned long)stat->ino, (unsigned long)stat->ino,
...@@ -249,6 +251,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -249,6 +251,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
const char *symlink = NULL; const char *symlink = NULL;
int pos; int pos;
const char *domainname = r->domain->domainname->name; const char *domainname = r->domain->domainname->name;
header = tomoyo_print_header(r); header = tomoyo_print_header(r);
if (!header) if (!header)
return NULL; return NULL;
...@@ -256,6 +259,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -256,6 +259,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
len += strlen(domainname) + strlen(header) + 10; len += strlen(domainname) + strlen(header) + 10;
if (r->ee) { if (r->ee) {
struct file *file = r->ee->bprm->file; struct file *file = r->ee->bprm->file;
realpath = tomoyo_realpath_from_path(&file->f_path); realpath = tomoyo_realpath_from_path(&file->f_path);
bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump); bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump);
if (!realpath || !bprm_info) if (!realpath || !bprm_info)
...@@ -275,6 +279,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -275,6 +279,7 @@ char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
pos = snprintf(buf, len, "%s", header); pos = snprintf(buf, len, "%s", header);
if (realpath) { if (realpath) {
struct linux_binprm *bprm = r->ee->bprm; struct linux_binprm *bprm = r->ee->bprm;
pos += snprintf(buf + pos, len - pos, pos += snprintf(buf + pos, len - pos,
" exec={ realpath=\"%s\" argc=%d envc=%d %s }", " exec={ realpath=\"%s\" argc=%d envc=%d %s }",
realpath, bprm->argc, bprm->envc, bprm_info); realpath, bprm->argc, bprm->envc, bprm_info);
...@@ -328,6 +333,7 @@ static bool tomoyo_get_audit(const struct tomoyo_policy_namespace *ns, ...@@ -328,6 +333,7 @@ static bool tomoyo_get_audit(const struct tomoyo_policy_namespace *ns,
const u8 category = tomoyo_index2category[index] + const u8 category = tomoyo_index2category[index] +
TOMOYO_MAX_MAC_INDEX; TOMOYO_MAX_MAC_INDEX;
struct tomoyo_profile *p; struct tomoyo_profile *p;
if (!tomoyo_policy_loaded) if (!tomoyo_policy_loaded)
return false; return false;
p = tomoyo_profile(ns, profile); p = tomoyo_profile(ns, profile);
...@@ -362,6 +368,7 @@ void tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt, ...@@ -362,6 +368,7 @@ void tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt,
char *buf; char *buf;
struct tomoyo_log *entry; struct tomoyo_log *entry;
bool quota_exceeded = false; bool quota_exceeded = false;
if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type, if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type,
r->matched_acl, r->granted)) r->matched_acl, r->granted))
goto out; goto out;
...@@ -413,6 +420,7 @@ void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...) ...@@ -413,6 +420,7 @@ void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...)
{ {
va_list args; va_list args;
int len; int len;
va_start(args, fmt); va_start(args, fmt);
len = vsnprintf((char *) &len, 1, fmt, args) + 1; len = vsnprintf((char *) &len, 1, fmt, args) + 1;
va_end(args); va_end(args);
...@@ -431,6 +439,7 @@ void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...) ...@@ -431,6 +439,7 @@ void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...)
void tomoyo_read_log(struct tomoyo_io_buffer *head) void tomoyo_read_log(struct tomoyo_io_buffer *head)
{ {
struct tomoyo_log *ptr = NULL; struct tomoyo_log *ptr = NULL;
if (head->r.w_pos) if (head->r.w_pos)
return; return;
kfree(head->read_buf); kfree(head->read_buf);
......
This diff is collapsed.
...@@ -10,6 +10,8 @@ ...@@ -10,6 +10,8 @@
#ifndef _SECURITY_TOMOYO_COMMON_H #ifndef _SECURITY_TOMOYO_COMMON_H
#define _SECURITY_TOMOYO_COMMON_H #define _SECURITY_TOMOYO_COMMON_H
#define pr_fmt(fmt) fmt
#include <linux/ctype.h> #include <linux/ctype.h>
#include <linux/string.h> #include <linux/string.h>
#include <linux/mm.h> #include <linux/mm.h>
...@@ -788,9 +790,9 @@ struct tomoyo_acl_param { ...@@ -788,9 +790,9 @@ struct tomoyo_acl_param {
* interfaces. * interfaces.
*/ */
struct tomoyo_io_buffer { struct tomoyo_io_buffer {
void (*read) (struct tomoyo_io_buffer *); void (*read)(struct tomoyo_io_buffer *head);
int (*write) (struct tomoyo_io_buffer *); int (*write)(struct tomoyo_io_buffer *head);
__poll_t (*poll) (struct file *file, poll_table *wait); __poll_t (*poll)(struct file *file, poll_table *wait);
/* Exclusive lock for this structure. */ /* Exclusive lock for this structure. */
struct mutex io_sem; struct mutex io_sem;
char __user *read_user_buf; char __user *read_user_buf;
...@@ -1042,7 +1044,7 @@ void *tomoyo_commit_ok(void *data, const unsigned int size); ...@@ -1042,7 +1044,7 @@ void *tomoyo_commit_ok(void *data, const unsigned int size);
void __init tomoyo_load_builtin_policy(void); void __init tomoyo_load_builtin_policy(void);
void __init tomoyo_mm_init(void); void __init tomoyo_mm_init(void);
void tomoyo_check_acl(struct tomoyo_request_info *r, void tomoyo_check_acl(struct tomoyo_request_info *r,
bool (*check_entry) (struct tomoyo_request_info *, bool (*check_entry)(struct tomoyo_request_info *,
const struct tomoyo_acl_info *)); const struct tomoyo_acl_info *));
void tomoyo_check_profile(void); void tomoyo_check_profile(void);
void tomoyo_convert_time(time64_t time, struct tomoyo_time *stamp); void tomoyo_convert_time(time64_t time, struct tomoyo_time *stamp);
...@@ -1131,6 +1133,7 @@ static inline void tomoyo_read_unlock(int idx) ...@@ -1131,6 +1133,7 @@ static inline void tomoyo_read_unlock(int idx)
static inline pid_t tomoyo_sys_getppid(void) static inline pid_t tomoyo_sys_getppid(void)
{ {
pid_t pid; pid_t pid;
rcu_read_lock(); rcu_read_lock();
pid = task_tgid_vnr(rcu_dereference(current->real_parent)); pid = task_tgid_vnr(rcu_dereference(current->real_parent));
rcu_read_unlock(); rcu_read_unlock();
......
...@@ -28,9 +28,11 @@ static bool tomoyo_argv(const unsigned int index, const char *arg_ptr, ...@@ -28,9 +28,11 @@ static bool tomoyo_argv(const unsigned int index, const char *arg_ptr,
{ {
int i; int i;
struct tomoyo_path_info arg; struct tomoyo_path_info arg;
arg.name = arg_ptr; arg.name = arg_ptr;
for (i = 0; i < argc; argv++, checked++, i++) { for (i = 0; i < argc; argv++, checked++, i++) {
bool result; bool result;
if (index != argv->index) if (index != argv->index)
continue; continue;
*checked = 1; *checked = 1;
...@@ -62,12 +64,14 @@ static bool tomoyo_envp(const char *env_name, const char *env_value, ...@@ -62,12 +64,14 @@ static bool tomoyo_envp(const char *env_name, const char *env_value,
int i; int i;
struct tomoyo_path_info name; struct tomoyo_path_info name;
struct tomoyo_path_info value; struct tomoyo_path_info value;
name.name = env_name; name.name = env_name;
tomoyo_fill_path_info(&name); tomoyo_fill_path_info(&name);
value.name = env_value; value.name = env_value;
tomoyo_fill_path_info(&value); tomoyo_fill_path_info(&value);
for (i = 0; i < envc; envp++, checked++, i++) { for (i = 0; i < envc; envp++, checked++, i++) {
bool result; bool result;
if (!tomoyo_path_matches_pattern(&name, envp->name)) if (!tomoyo_path_matches_pattern(&name, envp->name))
continue; continue;
*checked = 1; *checked = 1;
...@@ -113,6 +117,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee, ...@@ -113,6 +117,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee,
bool result = true; bool result = true;
u8 local_checked[32]; u8 local_checked[32];
u8 *checked; u8 *checked;
if (argc + envc <= sizeof(local_checked)) { if (argc + envc <= sizeof(local_checked)) {
checked = local_checked; checked = local_checked;
memset(local_checked, 0, sizeof(local_checked)); memset(local_checked, 0, sizeof(local_checked));
...@@ -131,6 +136,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee, ...@@ -131,6 +136,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee,
/* Read. */ /* Read. */
const char *kaddr = dump->data; const char *kaddr = dump->data;
const unsigned char c = kaddr[offset++]; const unsigned char c = kaddr[offset++];
if (c && arg_len < TOMOYO_EXEC_TMPSIZE - 10) { if (c && arg_len < TOMOYO_EXEC_TMPSIZE - 10) {
if (c == '\\') { if (c == '\\') {
arg_ptr[arg_len++] = '\\'; arg_ptr[arg_len++] = '\\';
...@@ -160,6 +166,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee, ...@@ -160,6 +166,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee,
argv_count--; argv_count--;
} else if (envp_count) { } else if (envp_count) {
char *cp = strchr(arg_ptr, '='); char *cp = strchr(arg_ptr, '=');
if (cp) { if (cp) {
*cp = '\0'; *cp = '\0';
if (!tomoyo_envp(arg_ptr, cp + 1, if (!tomoyo_envp(arg_ptr, cp + 1,
...@@ -182,6 +189,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee, ...@@ -182,6 +189,7 @@ static bool tomoyo_scan_bprm(struct tomoyo_execve *ee,
out: out:
if (result) { if (result) {
int i; int i;
/* Check not-yet-checked entries. */ /* Check not-yet-checked entries. */
for (i = 0; i < argc; i++) { for (i = 0; i < argc; i++) {
if (checked[i]) if (checked[i])
...@@ -229,6 +237,7 @@ static bool tomoyo_scan_exec_realpath(struct file *file, ...@@ -229,6 +237,7 @@ static bool tomoyo_scan_exec_realpath(struct file *file,
{ {
bool result; bool result;
struct tomoyo_path_info exe; struct tomoyo_path_info exe;
if (!file) if (!file)
return false; return false;
exe.name = tomoyo_realpath_from_path(&file->f_path); exe.name = tomoyo_realpath_from_path(&file->f_path);
...@@ -250,6 +259,7 @@ static bool tomoyo_scan_exec_realpath(struct file *file, ...@@ -250,6 +259,7 @@ static bool tomoyo_scan_exec_realpath(struct file *file,
static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) static const struct tomoyo_path_info *tomoyo_get_dqword(char *start)
{ {
char *cp = start + strlen(start) - 1; char *cp = start + strlen(start) - 1;
if (cp == start || *start++ != '"' || *cp != '"') if (cp == start || *start++ != '"' || *cp != '"')
return NULL; return NULL;
*cp = '\0'; *cp = '\0';
...@@ -270,6 +280,7 @@ static bool tomoyo_parse_name_union_quoted(struct tomoyo_acl_param *param, ...@@ -270,6 +280,7 @@ static bool tomoyo_parse_name_union_quoted(struct tomoyo_acl_param *param,
struct tomoyo_name_union *ptr) struct tomoyo_name_union *ptr)
{ {
char *filename = param->data; char *filename = param->data;
if (*filename == '@') if (*filename == '@')
return tomoyo_parse_name_union(param, ptr); return tomoyo_parse_name_union(param, ptr);
ptr->filename = tomoyo_get_dqword(filename); ptr->filename = tomoyo_get_dqword(filename);
...@@ -310,6 +321,7 @@ static bool tomoyo_parse_envp(char *left, char *right, ...@@ -310,6 +321,7 @@ static bool tomoyo_parse_envp(char *left, char *right,
const struct tomoyo_path_info *name; const struct tomoyo_path_info *name;
const struct tomoyo_path_info *value; const struct tomoyo_path_info *value;
char *cp = left + strlen(left) - 1; char *cp = left + strlen(left) - 1;
if (*cp-- != ']' || *cp != '"') if (*cp-- != ']' || *cp != '"')
goto out; goto out;
*cp = '\0'; *cp = '\0';
...@@ -364,6 +376,7 @@ static inline bool tomoyo_same_condition(const struct tomoyo_condition *a, ...@@ -364,6 +376,7 @@ static inline bool tomoyo_same_condition(const struct tomoyo_condition *a,
static u8 tomoyo_condition_type(const char *word) static u8 tomoyo_condition_type(const char *word)
{ {
u8 i; u8 i;
for (i = 0; i < TOMOYO_MAX_CONDITION_KEYWORD; i++) { for (i = 0; i < TOMOYO_MAX_CONDITION_KEYWORD; i++) {
if (!strcmp(word, tomoyo_condition_keyword[i])) if (!strcmp(word, tomoyo_condition_keyword[i]))
break; break;
...@@ -395,6 +408,7 @@ static struct tomoyo_condition *tomoyo_commit_condition ...@@ -395,6 +408,7 @@ static struct tomoyo_condition *tomoyo_commit_condition
{ {
struct tomoyo_condition *ptr; struct tomoyo_condition *ptr;
bool found = false; bool found = false;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) { if (mutex_lock_interruptible(&tomoyo_policy_lock)) {
dprintk(KERN_WARNING "%u: %s failed\n", __LINE__, __func__); dprintk(KERN_WARNING "%u: %s failed\n", __LINE__, __func__);
ptr = NULL; ptr = NULL;
...@@ -442,12 +456,14 @@ static char *tomoyo_get_transit_preference(struct tomoyo_acl_param *param, ...@@ -442,12 +456,14 @@ static char *tomoyo_get_transit_preference(struct tomoyo_acl_param *param,
{ {
char * const pos = param->data; char * const pos = param->data;
bool flag; bool flag;
if (*pos == '<') { if (*pos == '<') {
e->transit = tomoyo_get_domainname(param); e->transit = tomoyo_get_domainname(param);
goto done; goto done;
} }
{ {
char *cp = strchr(pos, ' '); char *cp = strchr(pos, ' ');
if (cp) if (cp)
*cp = '\0'; *cp = '\0';
flag = tomoyo_correct_path(pos) || !strcmp(pos, "keep") || flag = tomoyo_correct_path(pos) || !strcmp(pos, "keep") ||
...@@ -489,6 +505,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param) ...@@ -489,6 +505,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param)
tomoyo_get_transit_preference(param, &e); tomoyo_get_transit_preference(param, &e);
char * const end_of_string = start_of_string + strlen(start_of_string); char * const end_of_string = start_of_string + strlen(start_of_string);
char *pos; char *pos;
rerun: rerun:
pos = start_of_string; pos = start_of_string;
while (1) { while (1) {
...@@ -498,6 +515,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param) ...@@ -498,6 +515,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param)
char *cp; char *cp;
char *right_word; char *right_word;
bool is_not; bool is_not;
if (!*left_word) if (!*left_word)
break; break;
/* /*
...@@ -622,8 +640,8 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param) ...@@ -622,8 +640,8 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param)
} }
store_value: store_value:
if (!condp) { if (!condp) {
dprintk(KERN_WARNING "%u: dry_run left=%u right=%u " dprintk(KERN_WARNING "%u: dry_run left=%u right=%u match=%u\n",
"match=%u\n", __LINE__, left, right, !is_not); __LINE__, left, right, !is_not);
continue; continue;
} }
condp->left = left; condp->left = left;
...@@ -660,6 +678,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param) ...@@ -660,6 +678,7 @@ struct tomoyo_condition *tomoyo_get_condition(struct tomoyo_acl_param *param)
envp = (struct tomoyo_envp *) (argv + e.argc); envp = (struct tomoyo_envp *) (argv + e.argc);
{ {
bool flag = false; bool flag = false;
for (pos = start_of_string; pos < end_of_string; pos++) { for (pos = start_of_string; pos < end_of_string; pos++) {
if (*pos) if (*pos)
continue; continue;
...@@ -698,6 +717,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj) ...@@ -698,6 +717,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj)
for (i = 0; i < TOMOYO_MAX_PATH_STAT; i++) { for (i = 0; i < TOMOYO_MAX_PATH_STAT; i++) {
struct inode *inode; struct inode *inode;
switch (i) { switch (i) {
case TOMOYO_PATH1: case TOMOYO_PATH1:
dentry = obj->path1.dentry; dentry = obj->path1.dentry;
...@@ -718,6 +738,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj) ...@@ -718,6 +738,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj)
inode = d_backing_inode(dentry); inode = d_backing_inode(dentry);
if (inode) { if (inode) {
struct tomoyo_mini_stat *stat = &obj->stat[i]; struct tomoyo_mini_stat *stat = &obj->stat[i];
stat->uid = inode->i_uid; stat->uid = inode->i_uid;
stat->gid = inode->i_gid; stat->gid = inode->i_gid;
stat->ino = inode->i_ino; stat->ino = inode->i_ino;
...@@ -726,8 +747,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj) ...@@ -726,8 +747,7 @@ void tomoyo_get_attributes(struct tomoyo_obj_info *obj)
stat->rdev = inode->i_rdev; stat->rdev = inode->i_rdev;
obj->stat_valid[i] = true; obj->stat_valid[i] = true;
} }
if (i & 1) /* i == TOMOYO_PATH1_PARENT || if (i & 1) /* TOMOYO_PATH1_PARENT or TOMOYO_PATH2_PARENT */
i == TOMOYO_PATH2_PARENT */
dput(dentry); dput(dentry);
} }
} }
...@@ -758,6 +778,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -758,6 +778,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
u16 argc; u16 argc;
u16 envc; u16 envc;
struct linux_binprm *bprm = NULL; struct linux_binprm *bprm = NULL;
if (!cond) if (!cond)
return true; return true;
condc = cond->condc; condc = cond->condc;
...@@ -780,6 +801,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -780,6 +801,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
const u8 right = condp->right; const u8 right = condp->right;
bool is_bitop[2] = { false, false }; bool is_bitop[2] = { false, false };
u8 j; u8 j;
condp++; condp++;
/* Check argv[] and envp[] later. */ /* Check argv[] and envp[] later. */
if (left == TOMOYO_ARGV_ENTRY || left == TOMOYO_ENVP_ENTRY) if (left == TOMOYO_ARGV_ENTRY || left == TOMOYO_ENVP_ENTRY)
...@@ -787,10 +809,11 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -787,10 +809,11 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
/* Check string expressions. */ /* Check string expressions. */
if (right == TOMOYO_NAME_UNION) { if (right == TOMOYO_NAME_UNION) {
const struct tomoyo_name_union *ptr = names_p++; const struct tomoyo_name_union *ptr = names_p++;
switch (left) {
struct tomoyo_path_info *symlink; struct tomoyo_path_info *symlink;
struct tomoyo_execve *ee; struct tomoyo_execve *ee;
struct file *file; struct file *file;
switch (left) {
case TOMOYO_SYMLINK_TARGET: case TOMOYO_SYMLINK_TARGET:
symlink = obj ? obj->symlink_target : NULL; symlink = obj ? obj->symlink_target : NULL;
if (!symlink || if (!symlink ||
...@@ -812,6 +835,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -812,6 +835,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
for (j = 0; j < 2; j++) { for (j = 0; j < 2; j++) {
const u8 index = j ? right : left; const u8 index = j ? right : left;
unsigned long value = 0; unsigned long value = 0;
switch (index) { switch (index) {
case TOMOYO_TASK_UID: case TOMOYO_TASK_UID:
value = from_kuid(&init_user_ns, current_uid()); value = from_kuid(&init_user_ns, current_uid());
...@@ -874,31 +898,31 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -874,31 +898,31 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
value = S_ISVTX; value = S_ISVTX;
break; break;
case TOMOYO_MODE_OWNER_READ: case TOMOYO_MODE_OWNER_READ:
value = S_IRUSR; value = 0400;
break; break;
case TOMOYO_MODE_OWNER_WRITE: case TOMOYO_MODE_OWNER_WRITE:
value = S_IWUSR; value = 0200;
break; break;
case TOMOYO_MODE_OWNER_EXECUTE: case TOMOYO_MODE_OWNER_EXECUTE:
value = S_IXUSR; value = 0100;
break; break;
case TOMOYO_MODE_GROUP_READ: case TOMOYO_MODE_GROUP_READ:
value = S_IRGRP; value = 0040;
break; break;
case TOMOYO_MODE_GROUP_WRITE: case TOMOYO_MODE_GROUP_WRITE:
value = S_IWGRP; value = 0020;
break; break;
case TOMOYO_MODE_GROUP_EXECUTE: case TOMOYO_MODE_GROUP_EXECUTE:
value = S_IXGRP; value = 0010;
break; break;
case TOMOYO_MODE_OTHERS_READ: case TOMOYO_MODE_OTHERS_READ:
value = S_IROTH; value = 0004;
break; break;
case TOMOYO_MODE_OTHERS_WRITE: case TOMOYO_MODE_OTHERS_WRITE:
value = S_IWOTH; value = 0002;
break; break;
case TOMOYO_MODE_OTHERS_EXECUTE: case TOMOYO_MODE_OTHERS_EXECUTE:
value = S_IXOTH; value = 0001;
break; break;
case TOMOYO_EXEC_ARGC: case TOMOYO_EXEC_ARGC:
if (!bprm) if (!bprm)
...@@ -923,6 +947,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -923,6 +947,7 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
{ {
u8 stat_index; u8 stat_index;
struct tomoyo_mini_stat *stat; struct tomoyo_mini_stat *stat;
switch (index) { switch (index) {
case TOMOYO_PATH1_UID: case TOMOYO_PATH1_UID:
case TOMOYO_PATH1_GID: case TOMOYO_PATH1_GID:
...@@ -1036,12 +1061,14 @@ bool tomoyo_condition(struct tomoyo_request_info *r, ...@@ -1036,12 +1061,14 @@ bool tomoyo_condition(struct tomoyo_request_info *r,
if (left == TOMOYO_NUMBER_UNION) { if (left == TOMOYO_NUMBER_UNION) {
/* Fetch values now. */ /* Fetch values now. */
const struct tomoyo_number_union *ptr = numbers_p++; const struct tomoyo_number_union *ptr = numbers_p++;
min_v[0] = ptr->values[0]; min_v[0] = ptr->values[0];
max_v[0] = ptr->values[1]; max_v[0] = ptr->values[1];
} }
if (right == TOMOYO_NUMBER_UNION) { if (right == TOMOYO_NUMBER_UNION) {
/* Fetch values now. */ /* Fetch values now. */
const struct tomoyo_number_union *ptr = numbers_p++; const struct tomoyo_number_union *ptr = numbers_p++;
if (ptr->group) { if (ptr->group) {
if (tomoyo_number_matches_group(min_v[0], if (tomoyo_number_matches_group(min_v[0],
max_v[0], max_v[0],
......
...@@ -30,7 +30,7 @@ struct tomoyo_domain_info tomoyo_kernel_domain; ...@@ -30,7 +30,7 @@ struct tomoyo_domain_info tomoyo_kernel_domain;
*/ */
int tomoyo_update_policy(struct tomoyo_acl_head *new_entry, const int size, int tomoyo_update_policy(struct tomoyo_acl_head *new_entry, const int size,
struct tomoyo_acl_param *param, struct tomoyo_acl_param *param,
bool (*check_duplicate) (const struct tomoyo_acl_head bool (*check_duplicate)(const struct tomoyo_acl_head
*, *,
const struct tomoyo_acl_head const struct tomoyo_acl_head
*)) *))
...@@ -90,11 +90,11 @@ static inline bool tomoyo_same_acl_head(const struct tomoyo_acl_info *a, ...@@ -90,11 +90,11 @@ static inline bool tomoyo_same_acl_head(const struct tomoyo_acl_info *a,
*/ */
int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size, int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size,
struct tomoyo_acl_param *param, struct tomoyo_acl_param *param,
bool (*check_duplicate) (const struct tomoyo_acl_info bool (*check_duplicate)(const struct tomoyo_acl_info
*, *,
const struct tomoyo_acl_info const struct tomoyo_acl_info
*), *),
bool (*merge_duplicate) (struct tomoyo_acl_info *, bool (*merge_duplicate)(struct tomoyo_acl_info *,
struct tomoyo_acl_info *, struct tomoyo_acl_info *,
const bool)) const bool))
{ {
...@@ -157,7 +157,7 @@ int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size, ...@@ -157,7 +157,7 @@ int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size,
* Caller holds tomoyo_read_lock(). * Caller holds tomoyo_read_lock().
*/ */
void tomoyo_check_acl(struct tomoyo_request_info *r, void tomoyo_check_acl(struct tomoyo_request_info *r,
bool (*check_entry) (struct tomoyo_request_info *, bool (*check_entry)(struct tomoyo_request_info *,
const struct tomoyo_acl_info *)) const struct tomoyo_acl_info *))
{ {
const struct tomoyo_domain_info *domain = r->domain; const struct tomoyo_domain_info *domain = r->domain;
...@@ -198,6 +198,7 @@ LIST_HEAD(tomoyo_domain_list); ...@@ -198,6 +198,7 @@ LIST_HEAD(tomoyo_domain_list);
static const char *tomoyo_last_word(const char *name) static const char *tomoyo_last_word(const char *name)
{ {
const char *cp = strrchr(name, ' '); const char *cp = strrchr(name, ' ');
if (cp) if (cp)
return cp + 1; return cp + 1;
return name; return name;
...@@ -220,6 +221,7 @@ static bool tomoyo_same_transition_control(const struct tomoyo_acl_head *a, ...@@ -220,6 +221,7 @@ static bool tomoyo_same_transition_control(const struct tomoyo_acl_head *a,
const struct tomoyo_transition_control *p2 = container_of(b, const struct tomoyo_transition_control *p2 = container_of(b,
typeof(*p2), typeof(*p2),
head); head);
return p1->type == p2->type && p1->is_last_name == p2->is_last_name return p1->type == p2->type && p1->is_last_name == p2->is_last_name
&& p1->domainname == p2->domainname && p1->domainname == p2->domainname
&& p1->program == p2->program; && p1->program == p2->program;
...@@ -240,6 +242,7 @@ int tomoyo_write_transition_control(struct tomoyo_acl_param *param, ...@@ -240,6 +242,7 @@ int tomoyo_write_transition_control(struct tomoyo_acl_param *param,
int error = param->is_delete ? -ENOENT : -ENOMEM; int error = param->is_delete ? -ENOENT : -ENOMEM;
char *program = param->data; char *program = param->data;
char *domainname = strstr(program, " from "); char *domainname = strstr(program, " from ");
if (domainname) { if (domainname) {
*domainname = '\0'; *domainname = '\0';
domainname += 6; domainname += 6;
...@@ -293,6 +296,7 @@ static inline bool tomoyo_scan_transition ...@@ -293,6 +296,7 @@ static inline bool tomoyo_scan_transition
const enum tomoyo_transition_type type) const enum tomoyo_transition_type type)
{ {
const struct tomoyo_transition_control *ptr; const struct tomoyo_transition_control *ptr;
list_for_each_entry_rcu(ptr, list, head.list) { list_for_each_entry_rcu(ptr, list, head.list) {
if (ptr->head.is_deleted || ptr->type != type) if (ptr->head.is_deleted || ptr->type != type)
continue; continue;
...@@ -338,9 +342,11 @@ static enum tomoyo_transition_type tomoyo_transition_type ...@@ -338,9 +342,11 @@ static enum tomoyo_transition_type tomoyo_transition_type
{ {
const char *last_name = tomoyo_last_word(domainname->name); const char *last_name = tomoyo_last_word(domainname->name);
enum tomoyo_transition_type type = TOMOYO_TRANSITION_CONTROL_NO_RESET; enum tomoyo_transition_type type = TOMOYO_TRANSITION_CONTROL_NO_RESET;
while (type < TOMOYO_MAX_TRANSITION_TYPE) { while (type < TOMOYO_MAX_TRANSITION_TYPE) {
const struct list_head * const list = const struct list_head * const list =
&ns->policy_list[TOMOYO_ID_TRANSITION_CONTROL]; &ns->policy_list[TOMOYO_ID_TRANSITION_CONTROL];
if (!tomoyo_scan_transition(list, domainname, program, if (!tomoyo_scan_transition(list, domainname, program,
last_name, type)) { last_name, type)) {
type++; type++;
...@@ -375,6 +381,7 @@ static bool tomoyo_same_aggregator(const struct tomoyo_acl_head *a, ...@@ -375,6 +381,7 @@ static bool tomoyo_same_aggregator(const struct tomoyo_acl_head *a,
head); head);
const struct tomoyo_aggregator *p2 = container_of(b, typeof(*p2), const struct tomoyo_aggregator *p2 = container_of(b, typeof(*p2),
head); head);
return p1->original_name == p2->original_name && return p1->original_name == p2->original_name &&
p1->aggregated_name == p2->aggregated_name; p1->aggregated_name == p2->aggregated_name;
} }
...@@ -394,6 +401,7 @@ int tomoyo_write_aggregator(struct tomoyo_acl_param *param) ...@@ -394,6 +401,7 @@ int tomoyo_write_aggregator(struct tomoyo_acl_param *param)
int error = param->is_delete ? -ENOENT : -ENOMEM; int error = param->is_delete ? -ENOENT : -ENOMEM;
const char *original_name = tomoyo_read_token(param); const char *original_name = tomoyo_read_token(param);
const char *aggregated_name = tomoyo_read_token(param); const char *aggregated_name = tomoyo_read_token(param);
if (!tomoyo_correct_word(original_name) || if (!tomoyo_correct_word(original_name) ||
!tomoyo_correct_path(aggregated_name)) !tomoyo_correct_path(aggregated_name))
return -EINVAL; return -EINVAL;
...@@ -426,6 +434,7 @@ static struct tomoyo_policy_namespace *tomoyo_find_namespace ...@@ -426,6 +434,7 @@ static struct tomoyo_policy_namespace *tomoyo_find_namespace
(const char *name, const unsigned int len) (const char *name, const unsigned int len)
{ {
struct tomoyo_policy_namespace *ns; struct tomoyo_policy_namespace *ns;
list_for_each_entry(ns, &tomoyo_namespace_list, namespace_list) { list_for_each_entry(ns, &tomoyo_namespace_list, namespace_list) {
if (strncmp(name, ns->name, len) || if (strncmp(name, ns->name, len) ||
(name[len] && name[len] != ' ')) (name[len] && name[len] != ' '))
...@@ -451,6 +460,7 @@ struct tomoyo_policy_namespace *tomoyo_assign_namespace(const char *domainname) ...@@ -451,6 +460,7 @@ struct tomoyo_policy_namespace *tomoyo_assign_namespace(const char *domainname)
struct tomoyo_policy_namespace *entry; struct tomoyo_policy_namespace *entry;
const char *cp = domainname; const char *cp = domainname;
unsigned int len = 0; unsigned int len = 0;
while (*cp && *cp++ != ' ') while (*cp && *cp++ != ' ')
len++; len++;
ptr = tomoyo_find_namespace(domainname, len); ptr = tomoyo_find_namespace(domainname, len);
...@@ -466,6 +476,7 @@ struct tomoyo_policy_namespace *tomoyo_assign_namespace(const char *domainname) ...@@ -466,6 +476,7 @@ struct tomoyo_policy_namespace *tomoyo_assign_namespace(const char *domainname)
ptr = tomoyo_find_namespace(domainname, len); ptr = tomoyo_find_namespace(domainname, len);
if (!ptr && tomoyo_memory_ok(entry)) { if (!ptr && tomoyo_memory_ok(entry)) {
char *name = (char *) (entry + 1); char *name = (char *) (entry + 1);
ptr = entry; ptr = entry;
memmove(name, domainname, len); memmove(name, domainname, len);
name[len] = '\0'; name[len] = '\0';
...@@ -490,6 +501,7 @@ static bool tomoyo_namespace_jump(const char *domainname) ...@@ -490,6 +501,7 @@ static bool tomoyo_namespace_jump(const char *domainname)
{ {
const char *namespace = tomoyo_current_namespace()->name; const char *namespace = tomoyo_current_namespace()->name;
const int len = strlen(namespace); const int len = strlen(namespace);
return strncmp(domainname, namespace, len) || return strncmp(domainname, namespace, len) ||
(domainname[len] && domainname[len] != ' '); (domainname[len] && domainname[len] != ' ');
} }
...@@ -510,6 +522,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname, ...@@ -510,6 +522,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname,
struct tomoyo_domain_info e = { }; struct tomoyo_domain_info e = { };
struct tomoyo_domain_info *entry = tomoyo_find_domain(domainname); struct tomoyo_domain_info *entry = tomoyo_find_domain(domainname);
bool created = false; bool created = false;
if (entry) { if (entry) {
if (transit) { if (transit) {
/* /*
...@@ -546,6 +559,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname, ...@@ -546,6 +559,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname,
*/ */
if (transit) { if (transit) {
const struct tomoyo_domain_info *domain = tomoyo_domain(); const struct tomoyo_domain_info *domain = tomoyo_domain();
e.profile = domain->profile; e.profile = domain->profile;
e.group = domain->group; e.group = domain->group;
} }
...@@ -569,6 +583,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname, ...@@ -569,6 +583,7 @@ struct tomoyo_domain_info *tomoyo_assign_domain(const char *domainname,
if (entry && transit) { if (entry && transit) {
if (created) { if (created) {
struct tomoyo_request_info r; struct tomoyo_request_info r;
tomoyo_init_request_info(&r, entry, tomoyo_init_request_info(&r, entry,
TOMOYO_MAC_FILE_EXECUTE); TOMOYO_MAC_FILE_EXECUTE);
r.granted = false; r.granted = false;
...@@ -712,6 +727,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -712,6 +727,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
struct tomoyo_aggregator *ptr; struct tomoyo_aggregator *ptr;
struct list_head *list = struct list_head *list =
&old_domain->ns->policy_list[TOMOYO_ID_AGGREGATOR]; &old_domain->ns->policy_list[TOMOYO_ID_AGGREGATOR];
/* Check 'aggregator' directive. */ /* Check 'aggregator' directive. */
candidate = &exename; candidate = &exename;
list_for_each_entry_rcu(ptr, list, head.list) { list_for_each_entry_rcu(ptr, list, head.list) {
...@@ -747,6 +763,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -747,6 +763,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
*/ */
if (ee->transition) { if (ee->transition) {
const char *domainname = ee->transition->name; const char *domainname = ee->transition->name;
reject_on_transition_failure = true; reject_on_transition_failure = true;
if (!strcmp(domainname, "keep")) if (!strcmp(domainname, "keep"))
goto force_keep_domain; goto force_keep_domain;
...@@ -758,6 +775,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -758,6 +775,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
goto force_initialize_domain; goto force_initialize_domain;
if (!strcmp(domainname, "parent")) { if (!strcmp(domainname, "parent")) {
char *cp; char *cp;
strncpy(ee->tmp, old_domain->domainname->name, strncpy(ee->tmp, old_domain->domainname->name,
TOMOYO_EXEC_TMPSIZE - 1); TOMOYO_EXEC_TMPSIZE - 1);
cp = strrchr(ee->tmp, ' '); cp = strrchr(ee->tmp, ' ');
...@@ -822,8 +840,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -822,8 +840,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
if (domain) if (domain)
retval = 0; retval = 0;
else if (reject_on_transition_failure) { else if (reject_on_transition_failure) {
printk(KERN_WARNING "ERROR: Domain '%s' not ready.\n", pr_warn("ERROR: Domain '%s' not ready.\n", ee->tmp);
ee->tmp);
retval = -ENOMEM; retval = -ENOMEM;
} else if (ee->r.mode == TOMOYO_CONFIG_ENFORCING) } else if (ee->r.mode == TOMOYO_CONFIG_ENFORCING)
retval = -ENOMEM; retval = -ENOMEM;
...@@ -834,8 +851,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm) ...@@ -834,8 +851,7 @@ int tomoyo_find_next_domain(struct linux_binprm *bprm)
ee->r.granted = false; ee->r.granted = false;
tomoyo_write_log(&ee->r, "%s", tomoyo_dif tomoyo_write_log(&ee->r, "%s", tomoyo_dif
[TOMOYO_DIF_TRANSITION_FAILED]); [TOMOYO_DIF_TRANSITION_FAILED]);
printk(KERN_WARNING pr_warn("ERROR: Domain '%s' not defined.\n", ee->tmp);
"ERROR: Domain '%s' not defined.\n", ee->tmp);
} }
} }
out: out:
......
...@@ -214,6 +214,7 @@ static int tomoyo_audit_path_number_log(struct tomoyo_request_info *r) ...@@ -214,6 +214,7 @@ static int tomoyo_audit_path_number_log(struct tomoyo_request_info *r)
const u8 type = r->param.path_number.operation; const u8 type = r->param.path_number.operation;
u8 radix; u8 radix;
char buffer[64]; char buffer[64];
switch (type) { switch (type) {
case TOMOYO_TYPE_CREATE: case TOMOYO_TYPE_CREATE:
case TOMOYO_TYPE_MKDIR: case TOMOYO_TYPE_MKDIR:
...@@ -253,6 +254,7 @@ static bool tomoyo_check_path_acl(struct tomoyo_request_info *r, ...@@ -253,6 +254,7 @@ static bool tomoyo_check_path_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_path_acl *acl = container_of(ptr, typeof(*acl), const struct tomoyo_path_acl *acl = container_of(ptr, typeof(*acl),
head); head);
if (acl->perm & (1 << r->param.path.operation)) { if (acl->perm & (1 << r->param.path.operation)) {
r->param.path.matched_path = r->param.path.matched_path =
tomoyo_compare_name_union(r->param.path.filename, tomoyo_compare_name_union(r->param.path.filename,
...@@ -275,6 +277,7 @@ static bool tomoyo_check_path_number_acl(struct tomoyo_request_info *r, ...@@ -275,6 +277,7 @@ static bool tomoyo_check_path_number_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_path_number_acl *acl = const struct tomoyo_path_number_acl *acl =
container_of(ptr, typeof(*acl), head); container_of(ptr, typeof(*acl), head);
return (acl->perm & (1 << r->param.path_number.operation)) && return (acl->perm & (1 << r->param.path_number.operation)) &&
tomoyo_compare_number_union(r->param.path_number.number, tomoyo_compare_number_union(r->param.path_number.number,
&acl->number) && &acl->number) &&
...@@ -295,6 +298,7 @@ static bool tomoyo_check_path2_acl(struct tomoyo_request_info *r, ...@@ -295,6 +298,7 @@ static bool tomoyo_check_path2_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_path2_acl *acl = const struct tomoyo_path2_acl *acl =
container_of(ptr, typeof(*acl), head); container_of(ptr, typeof(*acl), head);
return (acl->perm & (1 << r->param.path2.operation)) && return (acl->perm & (1 << r->param.path2.operation)) &&
tomoyo_compare_name_union(r->param.path2.filename1, &acl->name1) tomoyo_compare_name_union(r->param.path2.filename1, &acl->name1)
&& tomoyo_compare_name_union(r->param.path2.filename2, && tomoyo_compare_name_union(r->param.path2.filename2,
...@@ -314,6 +318,7 @@ static bool tomoyo_check_mkdev_acl(struct tomoyo_request_info *r, ...@@ -314,6 +318,7 @@ static bool tomoyo_check_mkdev_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_mkdev_acl *acl = const struct tomoyo_mkdev_acl *acl =
container_of(ptr, typeof(*acl), head); container_of(ptr, typeof(*acl), head);
return (acl->perm & (1 << r->param.mkdev.operation)) && return (acl->perm & (1 << r->param.mkdev.operation)) &&
tomoyo_compare_number_union(r->param.mkdev.mode, tomoyo_compare_number_union(r->param.mkdev.mode,
&acl->mode) && &acl->mode) &&
...@@ -338,6 +343,7 @@ static bool tomoyo_same_path_acl(const struct tomoyo_acl_info *a, ...@@ -338,6 +343,7 @@ static bool tomoyo_same_path_acl(const struct tomoyo_acl_info *a,
{ {
const struct tomoyo_path_acl *p1 = container_of(a, typeof(*p1), head); const struct tomoyo_path_acl *p1 = container_of(a, typeof(*p1), head);
const struct tomoyo_path_acl *p2 = container_of(b, typeof(*p2), head); const struct tomoyo_path_acl *p2 = container_of(b, typeof(*p2), head);
return tomoyo_same_name_union(&p1->name, &p2->name); return tomoyo_same_name_union(&p1->name, &p2->name);
} }
...@@ -358,6 +364,7 @@ static bool tomoyo_merge_path_acl(struct tomoyo_acl_info *a, ...@@ -358,6 +364,7 @@ static bool tomoyo_merge_path_acl(struct tomoyo_acl_info *a,
->perm; ->perm;
u16 perm = *a_perm; u16 perm = *a_perm;
const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm;
if (is_delete) if (is_delete)
perm &= ~b_perm; perm &= ~b_perm;
else else
...@@ -384,6 +391,7 @@ static int tomoyo_update_path_acl(const u16 perm, ...@@ -384,6 +391,7 @@ static int tomoyo_update_path_acl(const u16 perm,
.perm = perm .perm = perm
}; };
int error; int error;
if (!tomoyo_parse_name_union(param, &e.name)) if (!tomoyo_parse_name_union(param, &e.name))
error = -EINVAL; error = -EINVAL;
else else
...@@ -407,6 +415,7 @@ static bool tomoyo_same_mkdev_acl(const struct tomoyo_acl_info *a, ...@@ -407,6 +415,7 @@ static bool tomoyo_same_mkdev_acl(const struct tomoyo_acl_info *a,
{ {
const struct tomoyo_mkdev_acl *p1 = container_of(a, typeof(*p1), head); const struct tomoyo_mkdev_acl *p1 = container_of(a, typeof(*p1), head);
const struct tomoyo_mkdev_acl *p2 = container_of(b, typeof(*p2), head); const struct tomoyo_mkdev_acl *p2 = container_of(b, typeof(*p2), head);
return tomoyo_same_name_union(&p1->name, &p2->name) && return tomoyo_same_name_union(&p1->name, &p2->name) &&
tomoyo_same_number_union(&p1->mode, &p2->mode) && tomoyo_same_number_union(&p1->mode, &p2->mode) &&
tomoyo_same_number_union(&p1->major, &p2->major) && tomoyo_same_number_union(&p1->major, &p2->major) &&
...@@ -431,6 +440,7 @@ static bool tomoyo_merge_mkdev_acl(struct tomoyo_acl_info *a, ...@@ -431,6 +440,7 @@ static bool tomoyo_merge_mkdev_acl(struct tomoyo_acl_info *a,
u8 perm = *a_perm; u8 perm = *a_perm;
const u8 b_perm = container_of(b, struct tomoyo_mkdev_acl, head) const u8 b_perm = container_of(b, struct tomoyo_mkdev_acl, head)
->perm; ->perm;
if (is_delete) if (is_delete)
perm &= ~b_perm; perm &= ~b_perm;
else else
...@@ -457,6 +467,7 @@ static int tomoyo_update_mkdev_acl(const u8 perm, ...@@ -457,6 +467,7 @@ static int tomoyo_update_mkdev_acl(const u8 perm,
.perm = perm .perm = perm
}; };
int error; int error;
if (!tomoyo_parse_name_union(param, &e.name) || if (!tomoyo_parse_name_union(param, &e.name) ||
!tomoyo_parse_number_union(param, &e.mode) || !tomoyo_parse_number_union(param, &e.mode) ||
!tomoyo_parse_number_union(param, &e.major) || !tomoyo_parse_number_union(param, &e.major) ||
...@@ -486,6 +497,7 @@ static bool tomoyo_same_path2_acl(const struct tomoyo_acl_info *a, ...@@ -486,6 +497,7 @@ static bool tomoyo_same_path2_acl(const struct tomoyo_acl_info *a,
{ {
const struct tomoyo_path2_acl *p1 = container_of(a, typeof(*p1), head); const struct tomoyo_path2_acl *p1 = container_of(a, typeof(*p1), head);
const struct tomoyo_path2_acl *p2 = container_of(b, typeof(*p2), head); const struct tomoyo_path2_acl *p2 = container_of(b, typeof(*p2), head);
return tomoyo_same_name_union(&p1->name1, &p2->name1) && return tomoyo_same_name_union(&p1->name1, &p2->name1) &&
tomoyo_same_name_union(&p1->name2, &p2->name2); tomoyo_same_name_union(&p1->name2, &p2->name2);
} }
...@@ -507,6 +519,7 @@ static bool tomoyo_merge_path2_acl(struct tomoyo_acl_info *a, ...@@ -507,6 +519,7 @@ static bool tomoyo_merge_path2_acl(struct tomoyo_acl_info *a,
->perm; ->perm;
u8 perm = *a_perm; u8 perm = *a_perm;
const u8 b_perm = container_of(b, struct tomoyo_path2_acl, head)->perm; const u8 b_perm = container_of(b, struct tomoyo_path2_acl, head)->perm;
if (is_delete) if (is_delete)
perm &= ~b_perm; perm &= ~b_perm;
else else
...@@ -533,6 +546,7 @@ static int tomoyo_update_path2_acl(const u8 perm, ...@@ -533,6 +546,7 @@ static int tomoyo_update_path2_acl(const u8 perm,
.perm = perm .perm = perm
}; };
int error; int error;
if (!tomoyo_parse_name_union(param, &e.name1) || if (!tomoyo_parse_name_union(param, &e.name1) ||
!tomoyo_parse_name_union(param, &e.name2)) !tomoyo_parse_name_union(param, &e.name2))
error = -EINVAL; error = -EINVAL;
...@@ -621,6 +635,7 @@ static bool tomoyo_same_path_number_acl(const struct tomoyo_acl_info *a, ...@@ -621,6 +635,7 @@ static bool tomoyo_same_path_number_acl(const struct tomoyo_acl_info *a,
head); head);
const struct tomoyo_path_number_acl *p2 = container_of(b, typeof(*p2), const struct tomoyo_path_number_acl *p2 = container_of(b, typeof(*p2),
head); head);
return tomoyo_same_name_union(&p1->name, &p2->name) && return tomoyo_same_name_union(&p1->name, &p2->name) &&
tomoyo_same_number_union(&p1->number, &p2->number); tomoyo_same_number_union(&p1->number, &p2->number);
} }
...@@ -643,6 +658,7 @@ static bool tomoyo_merge_path_number_acl(struct tomoyo_acl_info *a, ...@@ -643,6 +658,7 @@ static bool tomoyo_merge_path_number_acl(struct tomoyo_acl_info *a,
u8 perm = *a_perm; u8 perm = *a_perm;
const u8 b_perm = container_of(b, struct tomoyo_path_number_acl, head) const u8 b_perm = container_of(b, struct tomoyo_path_number_acl, head)
->perm; ->perm;
if (is_delete) if (is_delete)
perm &= ~b_perm; perm &= ~b_perm;
else else
...@@ -667,6 +683,7 @@ static int tomoyo_update_path_number_acl(const u8 perm, ...@@ -667,6 +683,7 @@ static int tomoyo_update_path_number_acl(const u8 perm,
.perm = perm .perm = perm
}; };
int error; int error;
if (!tomoyo_parse_name_union(param, &e.name) || if (!tomoyo_parse_name_union(param, &e.name) ||
!tomoyo_parse_number_union(param, &e.number)) !tomoyo_parse_number_union(param, &e.number))
error = -EINVAL; error = -EINVAL;
...@@ -947,6 +964,7 @@ static bool tomoyo_same_mount_acl(const struct tomoyo_acl_info *a, ...@@ -947,6 +964,7 @@ static bool tomoyo_same_mount_acl(const struct tomoyo_acl_info *a,
{ {
const struct tomoyo_mount_acl *p1 = container_of(a, typeof(*p1), head); const struct tomoyo_mount_acl *p1 = container_of(a, typeof(*p1), head);
const struct tomoyo_mount_acl *p2 = container_of(b, typeof(*p2), head); const struct tomoyo_mount_acl *p2 = container_of(b, typeof(*p2), head);
return tomoyo_same_name_union(&p1->dev_name, &p2->dev_name) && return tomoyo_same_name_union(&p1->dev_name, &p2->dev_name) &&
tomoyo_same_name_union(&p1->dir_name, &p2->dir_name) && tomoyo_same_name_union(&p1->dir_name, &p2->dir_name) &&
tomoyo_same_name_union(&p1->fs_type, &p2->fs_type) && tomoyo_same_name_union(&p1->fs_type, &p2->fs_type) &&
...@@ -966,6 +984,7 @@ static int tomoyo_update_mount_acl(struct tomoyo_acl_param *param) ...@@ -966,6 +984,7 @@ static int tomoyo_update_mount_acl(struct tomoyo_acl_param *param)
{ {
struct tomoyo_mount_acl e = { .head.type = TOMOYO_TYPE_MOUNT_ACL }; struct tomoyo_mount_acl e = { .head.type = TOMOYO_TYPE_MOUNT_ACL };
int error; int error;
if (!tomoyo_parse_name_union(param, &e.dev_name) || if (!tomoyo_parse_name_union(param, &e.dev_name) ||
!tomoyo_parse_name_union(param, &e.dir_name) || !tomoyo_parse_name_union(param, &e.dir_name) ||
!tomoyo_parse_name_union(param, &e.fs_type) || !tomoyo_parse_name_union(param, &e.fs_type) ||
...@@ -995,6 +1014,7 @@ int tomoyo_write_file(struct tomoyo_acl_param *param) ...@@ -995,6 +1014,7 @@ int tomoyo_write_file(struct tomoyo_acl_param *param)
u16 perm = 0; u16 perm = 0;
u8 type; u8 type;
const char *operation = tomoyo_read_token(param); const char *operation = tomoyo_read_token(param);
for (type = 0; type < TOMOYO_MAX_PATH_OPERATION; type++) for (type = 0; type < TOMOYO_MAX_PATH_OPERATION; type++)
if (tomoyo_permstr(operation, tomoyo_path_keyword[type])) if (tomoyo_permstr(operation, tomoyo_path_keyword[type]))
perm |= 1 << type; perm |= 1 << type;
......
...@@ -77,11 +77,13 @@ static bool tomoyo_name_used_by_io_buffer(const char *string) ...@@ -77,11 +77,13 @@ static bool tomoyo_name_used_by_io_buffer(const char *string)
spin_lock(&tomoyo_io_buffer_list_lock); spin_lock(&tomoyo_io_buffer_list_lock);
list_for_each_entry(head, &tomoyo_io_buffer_list, list) { list_for_each_entry(head, &tomoyo_io_buffer_list, list) {
int i; int i;
head->users++; head->users++;
spin_unlock(&tomoyo_io_buffer_list_lock); spin_unlock(&tomoyo_io_buffer_list_lock);
mutex_lock(&head->io_sem); mutex_lock(&head->io_sem);
for (i = 0; i < TOMOYO_MAX_IO_READ_QUEUE; i++) { for (i = 0; i < TOMOYO_MAX_IO_READ_QUEUE; i++) {
const char *w = head->r.w[i]; const char *w = head->r.w[i];
if (w < string || w > string + size) if (w < string || w > string + size)
continue; continue;
in_use = true; in_use = true;
...@@ -108,6 +110,7 @@ static inline void tomoyo_del_transition_control(struct list_head *element) ...@@ -108,6 +110,7 @@ static inline void tomoyo_del_transition_control(struct list_head *element)
{ {
struct tomoyo_transition_control *ptr = struct tomoyo_transition_control *ptr =
container_of(element, typeof(*ptr), head.list); container_of(element, typeof(*ptr), head.list);
tomoyo_put_name(ptr->domainname); tomoyo_put_name(ptr->domainname);
tomoyo_put_name(ptr->program); tomoyo_put_name(ptr->program);
} }
...@@ -123,6 +126,7 @@ static inline void tomoyo_del_aggregator(struct list_head *element) ...@@ -123,6 +126,7 @@ static inline void tomoyo_del_aggregator(struct list_head *element)
{ {
struct tomoyo_aggregator *ptr = struct tomoyo_aggregator *ptr =
container_of(element, typeof(*ptr), head.list); container_of(element, typeof(*ptr), head.list);
tomoyo_put_name(ptr->original_name); tomoyo_put_name(ptr->original_name);
tomoyo_put_name(ptr->aggregated_name); tomoyo_put_name(ptr->aggregated_name);
} }
...@@ -138,6 +142,7 @@ static inline void tomoyo_del_manager(struct list_head *element) ...@@ -138,6 +142,7 @@ static inline void tomoyo_del_manager(struct list_head *element)
{ {
struct tomoyo_manager *ptr = struct tomoyo_manager *ptr =
container_of(element, typeof(*ptr), head.list); container_of(element, typeof(*ptr), head.list);
tomoyo_put_name(ptr->manager); tomoyo_put_name(ptr->manager);
} }
...@@ -152,6 +157,7 @@ static void tomoyo_del_acl(struct list_head *element) ...@@ -152,6 +157,7 @@ static void tomoyo_del_acl(struct list_head *element)
{ {
struct tomoyo_acl_info *acl = struct tomoyo_acl_info *acl =
container_of(element, typeof(*acl), list); container_of(element, typeof(*acl), list);
tomoyo_put_condition(acl->cond); tomoyo_put_condition(acl->cond);
switch (acl->type) { switch (acl->type) {
case TOMOYO_TYPE_PATH_ACL: case TOMOYO_TYPE_PATH_ACL:
...@@ -226,6 +232,7 @@ static void tomoyo_del_acl(struct list_head *element) ...@@ -226,6 +232,7 @@ static void tomoyo_del_acl(struct list_head *element)
{ {
struct tomoyo_task_acl *entry = struct tomoyo_task_acl *entry =
container_of(acl, typeof(*entry), head); container_of(acl, typeof(*entry), head);
tomoyo_put_name(entry->domainname); tomoyo_put_name(entry->domainname);
} }
break; break;
...@@ -247,6 +254,7 @@ static inline void tomoyo_del_domain(struct list_head *element) ...@@ -247,6 +254,7 @@ static inline void tomoyo_del_domain(struct list_head *element)
container_of(element, typeof(*domain), list); container_of(element, typeof(*domain), list);
struct tomoyo_acl_info *acl; struct tomoyo_acl_info *acl;
struct tomoyo_acl_info *tmp; struct tomoyo_acl_info *tmp;
/* /*
* Since this domain is referenced from neither * Since this domain is referenced from neither
* "struct tomoyo_io_buffer" nor "struct cred"->security, we can delete * "struct tomoyo_io_buffer" nor "struct cred"->security, we can delete
...@@ -286,6 +294,7 @@ void tomoyo_del_condition(struct list_head *element) ...@@ -286,6 +294,7 @@ void tomoyo_del_condition(struct list_head *element)
= (const struct tomoyo_argv *) (names_p + names_count); = (const struct tomoyo_argv *) (names_p + names_count);
const struct tomoyo_envp *envp const struct tomoyo_envp *envp
= (const struct tomoyo_envp *) (argv + argc); = (const struct tomoyo_envp *) (argv + argc);
for (i = 0; i < numbers_count; i++) for (i = 0; i < numbers_count; i++)
tomoyo_put_number_union(numbers_p++); tomoyo_put_number_union(numbers_p++);
for (i = 0; i < names_count; i++) for (i = 0; i < names_count; i++)
...@@ -321,6 +330,7 @@ static inline void tomoyo_del_path_group(struct list_head *element) ...@@ -321,6 +330,7 @@ static inline void tomoyo_del_path_group(struct list_head *element)
{ {
struct tomoyo_path_group *member = struct tomoyo_path_group *member =
container_of(element, typeof(*member), head.list); container_of(element, typeof(*member), head.list);
tomoyo_put_name(member->member_name); tomoyo_put_name(member->member_name);
} }
...@@ -335,6 +345,7 @@ static inline void tomoyo_del_group(struct list_head *element) ...@@ -335,6 +345,7 @@ static inline void tomoyo_del_group(struct list_head *element)
{ {
struct tomoyo_group *group = struct tomoyo_group *group =
container_of(element, typeof(*group), head.list); container_of(element, typeof(*group), head.list);
tomoyo_put_name(group->group_name); tomoyo_put_name(group->group_name);
} }
...@@ -476,6 +487,7 @@ static void tomoyo_collect_member(const enum tomoyo_policy_id id, ...@@ -476,6 +487,7 @@ static void tomoyo_collect_member(const enum tomoyo_policy_id id,
{ {
struct tomoyo_acl_head *member; struct tomoyo_acl_head *member;
struct tomoyo_acl_head *tmp; struct tomoyo_acl_head *tmp;
list_for_each_entry_safe(member, tmp, member_list, list) { list_for_each_entry_safe(member, tmp, member_list, list) {
if (!member->is_deleted) if (!member->is_deleted)
continue; continue;
...@@ -495,6 +507,7 @@ static void tomoyo_collect_acl(struct list_head *list) ...@@ -495,6 +507,7 @@ static void tomoyo_collect_acl(struct list_head *list)
{ {
struct tomoyo_acl_info *acl; struct tomoyo_acl_info *acl;
struct tomoyo_acl_info *tmp; struct tomoyo_acl_info *tmp;
list_for_each_entry_safe(acl, tmp, list, list) { list_for_each_entry_safe(acl, tmp, list, list) {
if (!acl->is_deleted) if (!acl->is_deleted)
continue; continue;
...@@ -513,10 +526,12 @@ static void tomoyo_collect_entry(void) ...@@ -513,10 +526,12 @@ static void tomoyo_collect_entry(void)
int i; int i;
enum tomoyo_policy_id id; enum tomoyo_policy_id id;
struct tomoyo_policy_namespace *ns; struct tomoyo_policy_namespace *ns;
mutex_lock(&tomoyo_policy_lock); mutex_lock(&tomoyo_policy_lock);
{ {
struct tomoyo_domain_info *domain; struct tomoyo_domain_info *domain;
struct tomoyo_domain_info *tmp; struct tomoyo_domain_info *tmp;
list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list, list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list,
list) { list) {
tomoyo_collect_acl(&domain->acl_info_list); tomoyo_collect_acl(&domain->acl_info_list);
...@@ -534,6 +549,7 @@ static void tomoyo_collect_entry(void) ...@@ -534,6 +549,7 @@ static void tomoyo_collect_entry(void)
{ {
struct tomoyo_shared_acl_head *ptr; struct tomoyo_shared_acl_head *ptr;
struct tomoyo_shared_acl_head *tmp; struct tomoyo_shared_acl_head *tmp;
list_for_each_entry_safe(ptr, tmp, &tomoyo_condition_list, list_for_each_entry_safe(ptr, tmp, &tomoyo_condition_list,
list) { list) {
if (atomic_read(&ptr->users) > 0) if (atomic_read(&ptr->users) > 0)
...@@ -547,6 +563,7 @@ static void tomoyo_collect_entry(void) ...@@ -547,6 +563,7 @@ static void tomoyo_collect_entry(void)
struct list_head *list = &ns->group_list[i]; struct list_head *list = &ns->group_list[i];
struct tomoyo_group *group; struct tomoyo_group *group;
struct tomoyo_group *tmp; struct tomoyo_group *tmp;
switch (i) { switch (i) {
case 0: case 0:
id = TOMOYO_ID_PATH_GROUP; id = TOMOYO_ID_PATH_GROUP;
...@@ -574,6 +591,7 @@ static void tomoyo_collect_entry(void) ...@@ -574,6 +591,7 @@ static void tomoyo_collect_entry(void)
struct list_head *list = &tomoyo_name_list[i]; struct list_head *list = &tomoyo_name_list[i];
struct tomoyo_shared_acl_head *ptr; struct tomoyo_shared_acl_head *ptr;
struct tomoyo_shared_acl_head *tmp; struct tomoyo_shared_acl_head *tmp;
list_for_each_entry_safe(ptr, tmp, list, list) { list_for_each_entry_safe(ptr, tmp, list, list) {
if (atomic_read(&ptr->users) > 0) if (atomic_read(&ptr->users) > 0)
continue; continue;
...@@ -595,6 +613,7 @@ static int tomoyo_gc_thread(void *unused) ...@@ -595,6 +613,7 @@ static int tomoyo_gc_thread(void *unused)
{ {
/* Garbage collector thread is exclusive. */ /* Garbage collector thread is exclusive. */
static DEFINE_MUTEX(tomoyo_gc_mutex); static DEFINE_MUTEX(tomoyo_gc_mutex);
if (!mutex_trylock(&tomoyo_gc_mutex)) if (!mutex_trylock(&tomoyo_gc_mutex))
goto out; goto out;
tomoyo_collect_entry(); tomoyo_collect_entry();
......
...@@ -75,11 +75,13 @@ int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type) ...@@ -75,11 +75,13 @@ int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type)
{ {
struct tomoyo_group *group = tomoyo_get_group(param, type); struct tomoyo_group *group = tomoyo_get_group(param, type);
int error = -EINVAL; int error = -EINVAL;
if (!group) if (!group)
return -ENOMEM; return -ENOMEM;
param->list = &group->member_list; param->list = &group->member_list;
if (type == TOMOYO_PATH_GROUP) { if (type == TOMOYO_PATH_GROUP) {
struct tomoyo_path_group e = { }; struct tomoyo_path_group e = { };
e.member_name = tomoyo_get_name(tomoyo_read_token(param)); e.member_name = tomoyo_get_name(tomoyo_read_token(param));
if (!e.member_name) { if (!e.member_name) {
error = -ENOMEM; error = -ENOMEM;
...@@ -90,6 +92,7 @@ int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type) ...@@ -90,6 +92,7 @@ int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type)
tomoyo_put_name(e.member_name); tomoyo_put_name(e.member_name);
} else if (type == TOMOYO_NUMBER_GROUP) { } else if (type == TOMOYO_NUMBER_GROUP) {
struct tomoyo_number_group e = { }; struct tomoyo_number_group e = { };
if (param->data[0] == '@' || if (param->data[0] == '@' ||
!tomoyo_parse_number_union(param, &e.number)) !tomoyo_parse_number_union(param, &e.number))
goto out; goto out;
...@@ -129,6 +132,7 @@ tomoyo_path_matches_group(const struct tomoyo_path_info *pathname, ...@@ -129,6 +132,7 @@ tomoyo_path_matches_group(const struct tomoyo_path_info *pathname,
const struct tomoyo_group *group) const struct tomoyo_group *group)
{ {
struct tomoyo_path_group *member; struct tomoyo_path_group *member;
list_for_each_entry_rcu(member, &group->member_list, head.list) { list_for_each_entry_rcu(member, &group->member_list, head.list) {
if (member->head.is_deleted) if (member->head.is_deleted)
continue; continue;
...@@ -156,6 +160,7 @@ bool tomoyo_number_matches_group(const unsigned long min, ...@@ -156,6 +160,7 @@ bool tomoyo_number_matches_group(const unsigned long min,
{ {
struct tomoyo_number_group *member; struct tomoyo_number_group *member;
bool matched = false; bool matched = false;
list_for_each_entry_rcu(member, &group->member_list, head.list) { list_for_each_entry_rcu(member, &group->member_list, head.list) {
if (member->head.is_deleted) if (member->head.is_deleted)
continue; continue;
......
...@@ -37,11 +37,12 @@ __setup("TOMOYO_loader=", tomoyo_loader_setup); ...@@ -37,11 +37,12 @@ __setup("TOMOYO_loader=", tomoyo_loader_setup);
static bool tomoyo_policy_loader_exists(void) static bool tomoyo_policy_loader_exists(void)
{ {
struct path path; struct path path;
if (!tomoyo_loader) if (!tomoyo_loader)
tomoyo_loader = CONFIG_SECURITY_TOMOYO_POLICY_LOADER; tomoyo_loader = CONFIG_SECURITY_TOMOYO_POLICY_LOADER;
if (kern_path(tomoyo_loader, LOOKUP_FOLLOW, &path)) { if (kern_path(tomoyo_loader, LOOKUP_FOLLOW, &path)) {
printk(KERN_INFO "Not activating Mandatory Access Control " pr_info("Not activating Mandatory Access Control as %s does not exist.\n",
"as %s does not exist.\n", tomoyo_loader); tomoyo_loader);
return false; return false;
} }
path_put(&path); path_put(&path);
...@@ -96,8 +97,7 @@ void tomoyo_load_policy(const char *filename) ...@@ -96,8 +97,7 @@ void tomoyo_load_policy(const char *filename)
if (!tomoyo_policy_loader_exists()) if (!tomoyo_policy_loader_exists())
return; return;
done = true; done = true;
printk(KERN_INFO "Calling %s to load policy. Please wait.\n", pr_info("Calling %s to load policy. Please wait.\n", tomoyo_loader);
tomoyo_loader);
argv[0] = (char *) tomoyo_loader; argv[0] = (char *) tomoyo_loader;
argv[1] = NULL; argv[1] = NULL;
envp[0] = "HOME=/"; envp[0] = "HOME=/";
......
...@@ -19,9 +19,9 @@ void tomoyo_warn_oom(const char *function) ...@@ -19,9 +19,9 @@ void tomoyo_warn_oom(const char *function)
/* Reduce error messages. */ /* Reduce error messages. */
static pid_t tomoyo_last_pid; static pid_t tomoyo_last_pid;
const pid_t pid = current->pid; const pid_t pid = current->pid;
if (tomoyo_last_pid != pid) { if (tomoyo_last_pid != pid) {
printk(KERN_WARNING "ERROR: Out of memory at %s.\n", pr_warn("ERROR: Out of memory at %s.\n", function);
function);
tomoyo_last_pid = pid; tomoyo_last_pid = pid;
} }
if (!tomoyo_policy_loaded) if (!tomoyo_policy_loaded)
...@@ -48,6 +48,7 @@ bool tomoyo_memory_ok(void *ptr) ...@@ -48,6 +48,7 @@ bool tomoyo_memory_ok(void *ptr)
{ {
if (ptr) { if (ptr) {
const size_t s = ksize(ptr); const size_t s = ksize(ptr);
tomoyo_memory_used[TOMOYO_MEMORY_POLICY] += s; tomoyo_memory_used[TOMOYO_MEMORY_POLICY] += s;
if (!tomoyo_memory_quota[TOMOYO_MEMORY_POLICY] || if (!tomoyo_memory_quota[TOMOYO_MEMORY_POLICY] ||
tomoyo_memory_used[TOMOYO_MEMORY_POLICY] <= tomoyo_memory_used[TOMOYO_MEMORY_POLICY] <=
...@@ -73,6 +74,7 @@ bool tomoyo_memory_ok(void *ptr) ...@@ -73,6 +74,7 @@ bool tomoyo_memory_ok(void *ptr)
void *tomoyo_commit_ok(void *data, const unsigned int size) void *tomoyo_commit_ok(void *data, const unsigned int size)
{ {
void *ptr = kzalloc(size, GFP_NOFS); void *ptr = kzalloc(size, GFP_NOFS);
if (tomoyo_memory_ok(ptr)) { if (tomoyo_memory_ok(ptr)) {
memmove(ptr, data, size); memmove(ptr, data, size);
memset(data, 0, size); memset(data, 0, size);
...@@ -98,6 +100,7 @@ struct tomoyo_group *tomoyo_get_group(struct tomoyo_acl_param *param, ...@@ -98,6 +100,7 @@ struct tomoyo_group *tomoyo_get_group(struct tomoyo_acl_param *param,
struct list_head *list; struct list_head *list;
const char *group_name = tomoyo_read_token(param); const char *group_name = tomoyo_read_token(param);
bool found = false; bool found = false;
if (!tomoyo_correct_word(group_name) || idx >= TOMOYO_MAX_GROUP) if (!tomoyo_correct_word(group_name) || idx >= TOMOYO_MAX_GROUP)
return NULL; return NULL;
e.group_name = tomoyo_get_name(group_name); e.group_name = tomoyo_get_name(group_name);
...@@ -116,6 +119,7 @@ struct tomoyo_group *tomoyo_get_group(struct tomoyo_acl_param *param, ...@@ -116,6 +119,7 @@ struct tomoyo_group *tomoyo_get_group(struct tomoyo_acl_param *param,
} }
if (!found) { if (!found) {
struct tomoyo_group *entry = tomoyo_commit_ok(&e, sizeof(e)); struct tomoyo_group *entry = tomoyo_commit_ok(&e, sizeof(e));
if (entry) { if (entry) {
INIT_LIST_HEAD(&entry->member_list); INIT_LIST_HEAD(&entry->member_list);
atomic_set(&entry->head.users, 1); atomic_set(&entry->head.users, 1);
...@@ -191,6 +195,7 @@ struct tomoyo_policy_namespace tomoyo_kernel_namespace; ...@@ -191,6 +195,7 @@ struct tomoyo_policy_namespace tomoyo_kernel_namespace;
void __init tomoyo_mm_init(void) void __init tomoyo_mm_init(void)
{ {
int idx; int idx;
for (idx = 0; idx < TOMOYO_MAX_HASH; idx++) for (idx = 0; idx < TOMOYO_MAX_HASH; idx++)
INIT_LIST_HEAD(&tomoyo_name_list[idx]); INIT_LIST_HEAD(&tomoyo_name_list[idx]);
tomoyo_kernel_namespace.name = "<kernel>"; tomoyo_kernel_namespace.name = "<kernel>";
......
...@@ -49,6 +49,7 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r, ...@@ -49,6 +49,7 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_mount_acl *acl = const struct tomoyo_mount_acl *acl =
container_of(ptr, typeof(*acl), head); container_of(ptr, typeof(*acl), head);
return tomoyo_compare_number_union(r->param.mount.flags, return tomoyo_compare_number_union(r->param.mount.flags,
&acl->flags) && &acl->flags) &&
tomoyo_compare_name_union(r->param.mount.type, tomoyo_compare_name_union(r->param.mount.type,
...@@ -89,6 +90,7 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r, ...@@ -89,6 +90,7 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r,
struct tomoyo_path_info rdir; struct tomoyo_path_info rdir;
int need_dev = 0; int need_dev = 0;
int error = -ENOMEM; int error = -ENOMEM;
r->obj = &obj; r->obj = &obj;
/* Get fstype. */ /* Get fstype. */
......
...@@ -94,11 +94,13 @@ static char *tomoyo_get_absolute_path(const struct path *path, char * const buff ...@@ -94,11 +94,13 @@ static char *tomoyo_get_absolute_path(const struct path *path, char * const buff
const int buflen) const int buflen)
{ {
char *pos = ERR_PTR(-ENOMEM); char *pos = ERR_PTR(-ENOMEM);
if (buflen >= 256) { if (buflen >= 256) {
/* go to whatever namespace root we are under */ /* go to whatever namespace root we are under */
pos = d_absolute_path(path, buffer, buflen - 1); pos = d_absolute_path(path, buffer, buflen - 1);
if (!IS_ERR(pos) && *pos == '/' && pos[1]) { if (!IS_ERR(pos) && *pos == '/' && pos[1]) {
struct inode *inode = d_backing_inode(path->dentry); struct inode *inode = d_backing_inode(path->dentry);
if (inode && S_ISDIR(inode->i_mode)) { if (inode && S_ISDIR(inode->i_mode)) {
buffer[buflen - 2] = '/'; buffer[buflen - 2] = '/';
buffer[buflen - 1] = '\0'; buffer[buflen - 1] = '\0';
...@@ -123,10 +125,12 @@ static char *tomoyo_get_dentry_path(struct dentry *dentry, char * const buffer, ...@@ -123,10 +125,12 @@ static char *tomoyo_get_dentry_path(struct dentry *dentry, char * const buffer,
const int buflen) const int buflen)
{ {
char *pos = ERR_PTR(-ENOMEM); char *pos = ERR_PTR(-ENOMEM);
if (buflen >= 256) { if (buflen >= 256) {
pos = dentry_path_raw(dentry, buffer, buflen - 1); pos = dentry_path_raw(dentry, buffer, buflen - 1);
if (!IS_ERR(pos) && *pos == '/' && pos[1]) { if (!IS_ERR(pos) && *pos == '/' && pos[1]) {
struct inode *inode = d_backing_inode(dentry); struct inode *inode = d_backing_inode(dentry);
if (inode && S_ISDIR(inode->i_mode)) { if (inode && S_ISDIR(inode->i_mode)) {
buffer[buflen - 2] = '/'; buffer[buflen - 2] = '/';
buffer[buflen - 1] = '\0'; buffer[buflen - 1] = '\0';
...@@ -150,12 +154,14 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer, ...@@ -150,12 +154,14 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer,
{ {
struct super_block *sb = dentry->d_sb; struct super_block *sb = dentry->d_sb;
char *pos = tomoyo_get_dentry_path(dentry, buffer, buflen); char *pos = tomoyo_get_dentry_path(dentry, buffer, buflen);
if (IS_ERR(pos)) if (IS_ERR(pos))
return pos; return pos;
/* Convert from $PID to self if $PID is current thread. */ /* Convert from $PID to self if $PID is current thread. */
if (sb->s_magic == PROC_SUPER_MAGIC && *pos == '/') { if (sb->s_magic == PROC_SUPER_MAGIC && *pos == '/') {
char *ep; char *ep;
const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10); const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10);
if (*ep == '/' && pid && pid == if (*ep == '/' && pid && pid ==
task_tgid_nr_ns(current, sb->s_fs_info)) { task_tgid_nr_ns(current, sb->s_fs_info)) {
pos = ep - 5; pos = ep - 5;
...@@ -170,6 +176,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer, ...@@ -170,6 +176,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer,
goto prepend_filesystem_name; goto prepend_filesystem_name;
{ {
struct inode *inode = d_backing_inode(sb->s_root); struct inode *inode = d_backing_inode(sb->s_root);
/* /*
* Use filesystem name if filesystem does not support rename() * Use filesystem name if filesystem does not support rename()
* operation. * operation.
...@@ -182,6 +189,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer, ...@@ -182,6 +189,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer,
char name[64]; char name[64];
int name_len; int name_len;
const dev_t dev = sb->s_dev; const dev_t dev = sb->s_dev;
name[sizeof(name) - 1] = '\0'; name[sizeof(name) - 1] = '\0';
snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev), snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev),
MINOR(dev)); MINOR(dev));
...@@ -197,6 +205,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer, ...@@ -197,6 +205,7 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer,
{ {
const char *name = sb->s_type->name; const char *name = sb->s_type->name;
const int name_len = strlen(name); const int name_len = strlen(name);
pos -= name_len + 1; pos -= name_len + 1;
if (pos < buffer) if (pos < buffer)
goto out; goto out;
...@@ -223,10 +232,10 @@ static char *tomoyo_get_socket_name(const struct path *path, char * const buffer ...@@ -223,10 +232,10 @@ static char *tomoyo_get_socket_name(const struct path *path, char * const buffer
struct inode *inode = d_backing_inode(path->dentry); struct inode *inode = d_backing_inode(path->dentry);
struct socket *sock = inode ? SOCKET_I(inode) : NULL; struct socket *sock = inode ? SOCKET_I(inode) : NULL;
struct sock *sk = sock ? sock->sk : NULL; struct sock *sk = sock ? sock->sk : NULL;
if (sk) { if (sk) {
snprintf(buffer, buflen, "socket:[family=%u:type=%u:" snprintf(buffer, buflen, "socket:[family=%u:type=%u:protocol=%u]",
"protocol=%u]", sk->sk_family, sk->sk_type, sk->sk_family, sk->sk_type, sk->sk_protocol);
sk->sk_protocol);
} else { } else {
snprintf(buffer, buflen, "socket:[unknown]"); snprintf(buffer, buflen, "socket:[unknown]");
} }
...@@ -255,12 +264,14 @@ char *tomoyo_realpath_from_path(const struct path *path) ...@@ -255,12 +264,14 @@ char *tomoyo_realpath_from_path(const struct path *path)
unsigned int buf_len = PAGE_SIZE / 2; unsigned int buf_len = PAGE_SIZE / 2;
struct dentry *dentry = path->dentry; struct dentry *dentry = path->dentry;
struct super_block *sb; struct super_block *sb;
if (!dentry) if (!dentry)
return NULL; return NULL;
sb = dentry->d_sb; sb = dentry->d_sb;
while (1) { while (1) {
char *pos; char *pos;
struct inode *inode; struct inode *inode;
buf_len <<= 1; buf_len <<= 1;
kfree(buf); kfree(buf);
buf = kmalloc(buf_len, GFP_NOFS); buf = kmalloc(buf_len, GFP_NOFS);
...@@ -323,6 +334,7 @@ char *tomoyo_realpath_nofollow(const char *pathname) ...@@ -323,6 +334,7 @@ char *tomoyo_realpath_nofollow(const char *pathname)
if (pathname && kern_path(pathname, 0, &path) == 0) { if (pathname && kern_path(pathname, 0, &path) == 0) {
char *buf = tomoyo_realpath_from_path(&path); char *buf = tomoyo_realpath_from_path(&path);
path_put(&path); path_put(&path);
return buf; return buf;
} }
......
...@@ -21,6 +21,7 @@ static bool tomoyo_check_task_acl(struct tomoyo_request_info *r, ...@@ -21,6 +21,7 @@ static bool tomoyo_check_task_acl(struct tomoyo_request_info *r,
{ {
const struct tomoyo_task_acl *acl = container_of(ptr, typeof(*acl), const struct tomoyo_task_acl *acl = container_of(ptr, typeof(*acl),
head); head);
return !tomoyo_pathcmp(r->param.task.domainname, acl->domainname); return !tomoyo_pathcmp(r->param.task.domainname, acl->domainname);
} }
...@@ -42,6 +43,7 @@ static ssize_t tomoyo_write_self(struct file *file, const char __user *buf, ...@@ -42,6 +43,7 @@ static ssize_t tomoyo_write_self(struct file *file, const char __user *buf,
{ {
char *data; char *data;
int error; int error;
if (!count || count >= TOMOYO_EXEC_TMPSIZE - 10) if (!count || count >= TOMOYO_EXEC_TMPSIZE - 10)
return -ENOMEM; return -ENOMEM;
data = memdup_user_nul(buf, count); data = memdup_user_nul(buf, count);
...@@ -52,6 +54,7 @@ static ssize_t tomoyo_write_self(struct file *file, const char __user *buf, ...@@ -52,6 +54,7 @@ static ssize_t tomoyo_write_self(struct file *file, const char __user *buf,
const int idx = tomoyo_read_lock(); const int idx = tomoyo_read_lock();
struct tomoyo_path_info name; struct tomoyo_path_info name;
struct tomoyo_request_info r; struct tomoyo_request_info r;
name.name = data; name.name = data;
tomoyo_fill_path_info(&name); tomoyo_fill_path_info(&name);
/* Check "task manual_domain_transition" permission. */ /* Check "task manual_domain_transition" permission. */
...@@ -100,6 +103,7 @@ static ssize_t tomoyo_read_self(struct file *file, char __user *buf, ...@@ -100,6 +103,7 @@ static ssize_t tomoyo_read_self(struct file *file, char __user *buf,
const char *domain = tomoyo_domain()->domainname->name; const char *domain = tomoyo_domain()->domainname->name;
loff_t len = strlen(domain); loff_t len = strlen(domain);
loff_t pos = *ppos; loff_t pos = *ppos;
if (pos >= len || !count) if (pos >= len || !count)
return 0; return 0;
len -= pos; len -= pos;
......
...@@ -105,6 +105,7 @@ static int tomoyo_bprm_check_security(struct linux_binprm *bprm) ...@@ -105,6 +105,7 @@ static int tomoyo_bprm_check_security(struct linux_binprm *bprm)
if (!s->old_domain_info) { if (!s->old_domain_info) {
const int idx = tomoyo_read_lock(); const int idx = tomoyo_read_lock();
const int err = tomoyo_find_next_domain(bprm); const int err = tomoyo_find_next_domain(bprm);
tomoyo_read_unlock(idx); tomoyo_read_unlock(idx);
return err; return err;
} }
...@@ -151,6 +152,7 @@ static int tomoyo_path_truncate(const struct path *path) ...@@ -151,6 +152,7 @@ static int tomoyo_path_truncate(const struct path *path)
static int tomoyo_path_unlink(const struct path *parent, struct dentry *dentry) static int tomoyo_path_unlink(const struct path *parent, struct dentry *dentry)
{ {
struct path path = { .mnt = parent->mnt, .dentry = dentry }; struct path path = { .mnt = parent->mnt, .dentry = dentry };
return tomoyo_path_perm(TOMOYO_TYPE_UNLINK, &path, NULL); return tomoyo_path_perm(TOMOYO_TYPE_UNLINK, &path, NULL);
} }
...@@ -167,6 +169,7 @@ static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry, ...@@ -167,6 +169,7 @@ static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry,
umode_t mode) umode_t mode)
{ {
struct path path = { .mnt = parent->mnt, .dentry = dentry }; struct path path = { .mnt = parent->mnt, .dentry = dentry };
return tomoyo_path_number_perm(TOMOYO_TYPE_MKDIR, &path, return tomoyo_path_number_perm(TOMOYO_TYPE_MKDIR, &path,
mode & S_IALLUGO); mode & S_IALLUGO);
} }
...@@ -182,6 +185,7 @@ static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry, ...@@ -182,6 +185,7 @@ static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry,
static int tomoyo_path_rmdir(const struct path *parent, struct dentry *dentry) static int tomoyo_path_rmdir(const struct path *parent, struct dentry *dentry)
{ {
struct path path = { .mnt = parent->mnt, .dentry = dentry }; struct path path = { .mnt = parent->mnt, .dentry = dentry };
return tomoyo_path_perm(TOMOYO_TYPE_RMDIR, &path, NULL); return tomoyo_path_perm(TOMOYO_TYPE_RMDIR, &path, NULL);
} }
...@@ -198,6 +202,7 @@ static int tomoyo_path_symlink(const struct path *parent, struct dentry *dentry, ...@@ -198,6 +202,7 @@ static int tomoyo_path_symlink(const struct path *parent, struct dentry *dentry,
const char *old_name) const char *old_name)
{ {
struct path path = { .mnt = parent->mnt, .dentry = dentry }; struct path path = { .mnt = parent->mnt, .dentry = dentry };
return tomoyo_path_perm(TOMOYO_TYPE_SYMLINK, &path, old_name); return tomoyo_path_perm(TOMOYO_TYPE_SYMLINK, &path, old_name);
} }
...@@ -255,6 +260,7 @@ static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_di ...@@ -255,6 +260,7 @@ static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_di
{ {
struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry };
struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry }; struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry };
return tomoyo_path2_perm(TOMOYO_TYPE_LINK, &path1, &path2); return tomoyo_path2_perm(TOMOYO_TYPE_LINK, &path1, &path2);
} }
...@@ -275,6 +281,7 @@ static int tomoyo_path_rename(const struct path *old_parent, ...@@ -275,6 +281,7 @@ static int tomoyo_path_rename(const struct path *old_parent,
{ {
struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry };
struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry }; struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry };
return tomoyo_path2_perm(TOMOYO_TYPE_RENAME, &path1, &path2); return tomoyo_path2_perm(TOMOYO_TYPE_RENAME, &path1, &path2);
} }
...@@ -306,11 +313,11 @@ static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, ...@@ -306,11 +313,11 @@ static int tomoyo_file_fcntl(struct file *file, unsigned int cmd,
*/ */
static int tomoyo_file_open(struct file *f) static int tomoyo_file_open(struct file *f)
{ {
int flags = f->f_flags;
/* Don't check read permission here if called from do_execve(). */ /* Don't check read permission here if called from do_execve(). */
if (current->in_execve) if (current->in_execve)
return 0; return 0;
return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags); return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path,
f->f_flags);
} }
/** /**
...@@ -354,6 +361,7 @@ static int tomoyo_path_chmod(const struct path *path, umode_t mode) ...@@ -354,6 +361,7 @@ static int tomoyo_path_chmod(const struct path *path, umode_t mode)
static int tomoyo_path_chown(const struct path *path, kuid_t uid, kgid_t gid) static int tomoyo_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
{ {
int error = 0; int error = 0;
if (uid_valid(uid)) if (uid_valid(uid))
error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path, error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path,
from_kuid(&init_user_ns, uid)); from_kuid(&init_user_ns, uid));
...@@ -403,6 +411,7 @@ static int tomoyo_sb_mount(const char *dev_name, const struct path *path, ...@@ -403,6 +411,7 @@ static int tomoyo_sb_mount(const char *dev_name, const struct path *path,
static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) static int tomoyo_sb_umount(struct vfsmount *mnt, int flags)
{ {
struct path path = { .mnt = mnt, .dentry = mnt->mnt_root }; struct path path = { .mnt = mnt, .dentry = mnt->mnt_root };
return tomoyo_path_perm(TOMOYO_TYPE_UMOUNT, &path, NULL); return tomoyo_path_perm(TOMOYO_TYPE_UMOUNT, &path, NULL);
} }
...@@ -573,7 +582,7 @@ static int __init tomoyo_init(void) ...@@ -573,7 +582,7 @@ static int __init tomoyo_init(void)
/* register ourselves with the security framework */ /* register ourselves with the security framework */
security_add_hooks(tomoyo_hooks, ARRAY_SIZE(tomoyo_hooks), "tomoyo"); security_add_hooks(tomoyo_hooks, ARRAY_SIZE(tomoyo_hooks), "tomoyo");
printk(KERN_INFO "TOMOYO Linux initialized\n"); pr_info("TOMOYO Linux initialized\n");
s->domain_info = &tomoyo_kernel_domain; s->domain_info = &tomoyo_kernel_domain;
atomic_inc(&tomoyo_kernel_domain.users); atomic_inc(&tomoyo_kernel_domain.users);
s->old_domain_info = NULL; s->old_domain_info = NULL;
......
...@@ -91,6 +91,7 @@ const u8 tomoyo_index2category[TOMOYO_MAX_MAC_INDEX] = { ...@@ -91,6 +91,7 @@ const u8 tomoyo_index2category[TOMOYO_MAX_MAC_INDEX] = {
void tomoyo_convert_time(time64_t time64, struct tomoyo_time *stamp) void tomoyo_convert_time(time64_t time64, struct tomoyo_time *stamp)
{ {
struct tm tm; struct tm tm;
time64_to_tm(time64, 0, &tm); time64_to_tm(time64, 0, &tm);
stamp->sec = tm.tm_sec; stamp->sec = tm.tm_sec;
stamp->min = tm.tm_min; stamp->min = tm.tm_min;
...@@ -113,6 +114,7 @@ void tomoyo_convert_time(time64_t time64, struct tomoyo_time *stamp) ...@@ -113,6 +114,7 @@ void tomoyo_convert_time(time64_t time64, struct tomoyo_time *stamp)
bool tomoyo_permstr(const char *string, const char *keyword) bool tomoyo_permstr(const char *string, const char *keyword)
{ {
const char *cp = strstr(string, keyword); const char *cp = strstr(string, keyword);
if (cp) if (cp)
return cp == string || *(cp - 1) == '/'; return cp == string || *(cp - 1) == '/';
return false; return false;
...@@ -132,6 +134,7 @@ char *tomoyo_read_token(struct tomoyo_acl_param *param) ...@@ -132,6 +134,7 @@ char *tomoyo_read_token(struct tomoyo_acl_param *param)
{ {
char *pos = param->data; char *pos = param->data;
char *del = strchr(pos, ' '); char *del = strchr(pos, ' ');
if (del) if (del)
*del++ = '\0'; *del++ = '\0';
else else
...@@ -152,6 +155,7 @@ const struct tomoyo_path_info *tomoyo_get_domainname ...@@ -152,6 +155,7 @@ const struct tomoyo_path_info *tomoyo_get_domainname
{ {
char *start = param->data; char *start = param->data;
char *pos = start; char *pos = start;
while (*pos) { while (*pos) {
if (*pos++ != ' ' || *pos++ == '/') if (*pos++ != ' ' || *pos++ == '/')
continue; continue;
...@@ -181,8 +185,10 @@ u8 tomoyo_parse_ulong(unsigned long *result, char **str) ...@@ -181,8 +185,10 @@ u8 tomoyo_parse_ulong(unsigned long *result, char **str)
const char *cp = *str; const char *cp = *str;
char *ep; char *ep;
int base = 10; int base = 10;
if (*cp == '0') { if (*cp == '0') {
char c = *(cp + 1); char c = *(cp + 1);
if (c == 'x' || c == 'X') { if (c == 'x' || c == 'X') {
base = 16; base = 16;
cp += 2; cp += 2;
...@@ -240,6 +246,7 @@ bool tomoyo_parse_name_union(struct tomoyo_acl_param *param, ...@@ -240,6 +246,7 @@ bool tomoyo_parse_name_union(struct tomoyo_acl_param *param,
struct tomoyo_name_union *ptr) struct tomoyo_name_union *ptr)
{ {
char *filename; char *filename;
if (param->data[0] == '@') { if (param->data[0] == '@') {
param->data++; param->data++;
ptr->group = tomoyo_get_group(param, TOMOYO_PATH_GROUP); ptr->group = tomoyo_get_group(param, TOMOYO_PATH_GROUP);
...@@ -266,6 +273,7 @@ bool tomoyo_parse_number_union(struct tomoyo_acl_param *param, ...@@ -266,6 +273,7 @@ bool tomoyo_parse_number_union(struct tomoyo_acl_param *param,
char *data; char *data;
u8 type; u8 type;
unsigned long v; unsigned long v;
memset(ptr, 0, sizeof(*ptr)); memset(ptr, 0, sizeof(*ptr));
if (param->data[0] == '@') { if (param->data[0] == '@') {
param->data++; param->data++;
...@@ -429,6 +437,7 @@ static bool tomoyo_correct_word2(const char *string, size_t len) ...@@ -429,6 +437,7 @@ static bool tomoyo_correct_word2(const char *string, size_t len)
unsigned char c; unsigned char c;
unsigned char d; unsigned char d;
unsigned char e; unsigned char e;
if (!len) if (!len)
goto out; goto out;
while (len--) { while (len--) {
...@@ -533,6 +542,7 @@ bool tomoyo_correct_domain(const unsigned char *domainname) ...@@ -533,6 +542,7 @@ bool tomoyo_correct_domain(const unsigned char *domainname)
return true; return true;
while (1) { while (1) {
const unsigned char *cp = strchr(domainname, ' '); const unsigned char *cp = strchr(domainname, ' ');
if (!cp) if (!cp)
break; break;
if (*domainname != '/' || if (*domainname != '/' ||
...@@ -554,6 +564,7 @@ bool tomoyo_domain_def(const unsigned char *buffer) ...@@ -554,6 +564,7 @@ bool tomoyo_domain_def(const unsigned char *buffer)
{ {
const unsigned char *cp; const unsigned char *cp;
int len; int len;
if (*buffer != '<') if (*buffer != '<')
return false; return false;
cp = strchr(buffer, ' '); cp = strchr(buffer, ' ');
...@@ -668,6 +679,9 @@ static bool tomoyo_file_matches_pattern2(const char *filename, ...@@ -668,6 +679,9 @@ static bool tomoyo_file_matches_pattern2(const char *filename,
{ {
while (filename < filename_end && pattern < pattern_end) { while (filename < filename_end && pattern < pattern_end) {
char c; char c;
int i;
int j;
if (*pattern != '\\') { if (*pattern != '\\') {
if (*filename++ != *pattern++) if (*filename++ != *pattern++)
return false; return false;
...@@ -676,8 +690,6 @@ static bool tomoyo_file_matches_pattern2(const char *filename, ...@@ -676,8 +690,6 @@ static bool tomoyo_file_matches_pattern2(const char *filename,
c = *filename; c = *filename;
pattern++; pattern++;
switch (*pattern) { switch (*pattern) {
int i;
int j;
case '?': case '?':
if (c == '/') { if (c == '/') {
return false; return false;
...@@ -985,6 +997,7 @@ int tomoyo_init_request_info(struct tomoyo_request_info *r, ...@@ -985,6 +997,7 @@ int tomoyo_init_request_info(struct tomoyo_request_info *r,
struct tomoyo_domain_info *domain, const u8 index) struct tomoyo_domain_info *domain, const u8 index)
{ {
u8 profile; u8 profile;
memset(r, 0, sizeof(*r)); memset(r, 0, sizeof(*r));
if (!domain) if (!domain)
domain = tomoyo_domain(); domain = tomoyo_domain();
...@@ -1018,6 +1031,7 @@ bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r) ...@@ -1018,6 +1031,7 @@ bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r)
list_for_each_entry_rcu(ptr, &domain->acl_info_list, list) { list_for_each_entry_rcu(ptr, &domain->acl_info_list, list) {
u16 perm; u16 perm;
u8 i; u8 i;
if (ptr->is_deleted) if (ptr->is_deleted)
continue; continue;
switch (ptr->type) { switch (ptr->type) {
...@@ -1062,9 +1076,8 @@ bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r) ...@@ -1062,9 +1076,8 @@ bool tomoyo_domain_quota_is_ok(struct tomoyo_request_info *r)
domain->flags[TOMOYO_DIF_QUOTA_WARNED] = true; domain->flags[TOMOYO_DIF_QUOTA_WARNED] = true;
/* r->granted = false; */ /* r->granted = false; */
tomoyo_write_log(r, "%s", tomoyo_dif[TOMOYO_DIF_QUOTA_WARNED]); tomoyo_write_log(r, "%s", tomoyo_dif[TOMOYO_DIF_QUOTA_WARNED]);
printk(KERN_WARNING "WARNING: " pr_warn("WARNING: Domain '%s' has too many ACLs to hold. Stopped learning mode.\n",
"Domain '%s' has too many ACLs to hold. " domain->domainname->name);
"Stopped learning mode.\n", domain->domainname->name);
} }
return false; return false;
} }
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment