tomoyo.c 14.6 KB
Newer Older
K
Kentaro Takeda 已提交
1 2 3
/*
 * security/tomoyo/tomoyo.c
 *
T
Tetsuo Handa 已提交
4
 * Copyright (C) 2005-2011  NTT DATA CORPORATION
K
Kentaro Takeda 已提交
5 6
 */

C
Casey Schaufler 已提交
7
#include <linux/lsm_hooks.h>
K
Kentaro Takeda 已提交
8 9
#include "common.h"

T
Tetsuo Handa 已提交
10 11 12 13 14 15 16 17
/**
 * tomoyo_cred_alloc_blank - Target for security_cred_alloc_blank().
 *
 * @new: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
18 19 20 21 22 23
static int tomoyo_cred_alloc_blank(struct cred *new, gfp_t gfp)
{
	new->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
24 25 26 27 28 29 30 31 32
/**
 * tomoyo_cred_prepare - Target for security_prepare_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
33 34 35
static int tomoyo_cred_prepare(struct cred *new, const struct cred *old,
			       gfp_t gfp)
{
36 37 38 39
	struct tomoyo_domain_info *domain = old->security;
	new->security = domain;
	if (domain)
		atomic_inc(&domain->users);
K
Kentaro Takeda 已提交
40 41 42
	return 0;
}

T
Tetsuo Handa 已提交
43 44 45 46 47 48
/**
 * tomoyo_cred_transfer - Target for security_transfer_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 */
49 50
static void tomoyo_cred_transfer(struct cred *new, const struct cred *old)
{
51 52 53
	tomoyo_cred_prepare(new, old, 0);
}

T
Tetsuo Handa 已提交
54 55 56 57 58
/**
 * tomoyo_cred_free - Target for security_cred_free().
 *
 * @cred: Pointer to "struct cred".
 */
59 60 61 62 63
static void tomoyo_cred_free(struct cred *cred)
{
	struct tomoyo_domain_info *domain = cred->security;
	if (domain)
		atomic_dec(&domain->users);
64 65
}

T
Tetsuo Handa 已提交
66 67 68 69 70 71 72
/**
 * tomoyo_bprm_set_creds - Target for security_bprm_set_creds().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
73 74 75 76 77 78 79 80
static int tomoyo_bprm_set_creds(struct linux_binprm *bprm)
{
	/*
	 * Do only if this function is called for the first time of an execve
	 * operation.
	 */
	if (bprm->cred_prepared)
		return 0;
81
#ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
K
Kentaro Takeda 已提交
82 83 84 85 86 87
	/*
	 * Load policy if /sbin/tomoyo-init exists and /sbin/init is requested
	 * for the first time.
	 */
	if (!tomoyo_policy_loaded)
		tomoyo_load_policy(bprm->filename);
88
#endif
89 90 91 92 93 94 95 96
	/*
	 * Release reference to "struct tomoyo_domain_info" stored inside
	 * "bprm->cred->security". New reference to "struct tomoyo_domain_info"
	 * stored inside "bprm->cred->security" will be acquired later inside
	 * tomoyo_find_next_domain().
	 */
	atomic_dec(&((struct tomoyo_domain_info *)
		     bprm->cred->security)->users);
K
Kentaro Takeda 已提交
97 98 99 100 101 102 103 104
	/*
	 * Tell tomoyo_bprm_check_security() is called for the first time of an
	 * execve operation.
	 */
	bprm->cred->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
105 106 107 108 109 110 111
/**
 * tomoyo_bprm_check_security - Target for security_bprm_check().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
112 113 114 115 116 117 118 119
static int tomoyo_bprm_check_security(struct linux_binprm *bprm)
{
	struct tomoyo_domain_info *domain = bprm->cred->security;

	/*
	 * Execute permission is checked against pathname passed to do_execve()
	 * using current domain.
	 */
120 121 122 123 124 125
	if (!domain) {
		const int idx = tomoyo_read_lock();
		const int err = tomoyo_find_next_domain(bprm);
		tomoyo_read_unlock(idx);
		return err;
	}
K
Kentaro Takeda 已提交
126 127 128
	/*
	 * Read permission is checked against interpreters using next domain.
	 */
T
Tetsuo Handa 已提交
129 130
	return tomoyo_check_open_permission(domain, &bprm->file->f_path,
					    O_RDONLY);
K
Kentaro Takeda 已提交
131 132
}

T
Tetsuo Handa 已提交
133 134 135 136 137 138 139 140
/**
 * tomoyo_inode_getattr - Target for security_inode_getattr().
 *
 * @mnt:    Pointer to "struct vfsmount".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
141
static int tomoyo_inode_getattr(const struct path *path)
T
Tetsuo Handa 已提交
142
{
143
	return tomoyo_path_perm(TOMOYO_TYPE_GETATTR, path, NULL);
T
Tetsuo Handa 已提交
144 145
}

T
Tetsuo Handa 已提交
146 147 148 149 150 151 152
/**
 * tomoyo_path_truncate - Target for security_path_truncate().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
153
static int tomoyo_path_truncate(const struct path *path)
K
Kentaro Takeda 已提交
154
{
T
Tetsuo Handa 已提交
155
	return tomoyo_path_perm(TOMOYO_TYPE_TRUNCATE, path, NULL);
K
Kentaro Takeda 已提交
156 157
}

T
Tetsuo Handa 已提交
158 159 160 161 162 163 164 165
/**
 * tomoyo_path_unlink - Target for security_path_unlink().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
166 167 168
static int tomoyo_path_unlink(struct path *parent, struct dentry *dentry)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
169
	return tomoyo_path_perm(TOMOYO_TYPE_UNLINK, &path, NULL);
K
Kentaro Takeda 已提交
170 171
}

T
Tetsuo Handa 已提交
172 173 174 175 176 177 178 179 180
/**
 * tomoyo_path_mkdir - Target for security_path_mkdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
181
static int tomoyo_path_mkdir(struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
182
			     umode_t mode)
K
Kentaro Takeda 已提交
183 184
{
	struct path path = { parent->mnt, dentry };
185 186
	return tomoyo_path_number_perm(TOMOYO_TYPE_MKDIR, &path,
				       mode & S_IALLUGO);
K
Kentaro Takeda 已提交
187 188
}

T
Tetsuo Handa 已提交
189 190 191 192 193 194 195 196
/**
 * tomoyo_path_rmdir - Target for security_path_rmdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
197 198 199
static int tomoyo_path_rmdir(struct path *parent, struct dentry *dentry)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
200
	return tomoyo_path_perm(TOMOYO_TYPE_RMDIR, &path, NULL);
K
Kentaro Takeda 已提交
201 202
}

T
Tetsuo Handa 已提交
203 204 205 206 207 208 209 210 211
/**
 * tomoyo_path_symlink - Target for security_path_symlink().
 *
 * @parent:   Pointer to "struct path".
 * @dentry:   Pointer to "struct dentry".
 * @old_name: Symlink's content.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
212 213 214 215
static int tomoyo_path_symlink(struct path *parent, struct dentry *dentry,
			       const char *old_name)
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
216
	return tomoyo_path_perm(TOMOYO_TYPE_SYMLINK, &path, old_name);
K
Kentaro Takeda 已提交
217 218
}

T
Tetsuo Handa 已提交
219 220 221 222 223 224 225 226 227 228
/**
 * tomoyo_path_mknod - Target for security_path_mknod().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 * @dev:    Device attributes.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
229
static int tomoyo_path_mknod(struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
230
			     umode_t mode, unsigned int dev)
K
Kentaro Takeda 已提交
231 232
{
	struct path path = { parent->mnt, dentry };
T
Tetsuo Handa 已提交
233
	int type = TOMOYO_TYPE_CREATE;
234
	const unsigned int perm = mode & S_IALLUGO;
K
Kentaro Takeda 已提交
235 236 237

	switch (mode & S_IFMT) {
	case S_IFCHR:
T
Tetsuo Handa 已提交
238
		type = TOMOYO_TYPE_MKCHAR;
K
Kentaro Takeda 已提交
239 240
		break;
	case S_IFBLK:
T
Tetsuo Handa 已提交
241
		type = TOMOYO_TYPE_MKBLOCK;
K
Kentaro Takeda 已提交
242
		break;
243 244 245
	default:
		goto no_dev;
	}
T
Tetsuo Handa 已提交
246
	return tomoyo_mkdev_perm(type, &path, perm, dev);
247 248
 no_dev:
	switch (mode & S_IFMT) {
K
Kentaro Takeda 已提交
249
	case S_IFIFO:
T
Tetsuo Handa 已提交
250
		type = TOMOYO_TYPE_MKFIFO;
K
Kentaro Takeda 已提交
251 252
		break;
	case S_IFSOCK:
T
Tetsuo Handa 已提交
253
		type = TOMOYO_TYPE_MKSOCK;
K
Kentaro Takeda 已提交
254 255
		break;
	}
256
	return tomoyo_path_number_perm(type, &path, perm);
K
Kentaro Takeda 已提交
257 258
}

T
Tetsuo Handa 已提交
259 260 261 262 263 264 265 266 267
/**
 * tomoyo_path_link - Target for security_path_link().
 *
 * @old_dentry: Pointer to "struct dentry".
 * @new_dir:    Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
268 269 270 271 272
static int tomoyo_path_link(struct dentry *old_dentry, struct path *new_dir,
			    struct dentry *new_dentry)
{
	struct path path1 = { new_dir->mnt, old_dentry };
	struct path path2 = { new_dir->mnt, new_dentry };
273
	return tomoyo_path2_perm(TOMOYO_TYPE_LINK, &path1, &path2);
K
Kentaro Takeda 已提交
274 275
}

T
Tetsuo Handa 已提交
276 277 278 279 280 281 282 283 284 285
/**
 * tomoyo_path_rename - Target for security_path_rename().
 *
 * @old_parent: Pointer to "struct path".
 * @old_dentry: Pointer to "struct dentry".
 * @new_parent: Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
286 287 288 289 290 291 292
static int tomoyo_path_rename(struct path *old_parent,
			      struct dentry *old_dentry,
			      struct path *new_parent,
			      struct dentry *new_dentry)
{
	struct path path1 = { old_parent->mnt, old_dentry };
	struct path path2 = { new_parent->mnt, new_dentry };
293
	return tomoyo_path2_perm(TOMOYO_TYPE_RENAME, &path1, &path2);
K
Kentaro Takeda 已提交
294 295
}

T
Tetsuo Handa 已提交
296 297 298 299 300 301 302 303 304
/**
 * tomoyo_file_fcntl - Target for security_file_fcntl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for fcntl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
305 306 307
static int tomoyo_file_fcntl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
T
Tetsuo Handa 已提交
308 309 310 311
	if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND)))
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &file->f_path,
					    O_WRONLY | (arg & O_APPEND));
K
Kentaro Takeda 已提交
312 313
}

T
Tetsuo Handa 已提交
314
/**
315
 * tomoyo_file_open - Target for security_file_open().
T
Tetsuo Handa 已提交
316 317 318 319 320 321
 *
 * @f:    Pointer to "struct file".
 * @cred: Pointer to "struct cred".
 *
 * Returns 0 on success, negative value otherwise.
 */
322
static int tomoyo_file_open(struct file *f, const struct cred *cred)
K
Kentaro Takeda 已提交
323 324 325 326 327 328 329 330
{
	int flags = f->f_flags;
	/* Don't check read permission here if called from do_execve(). */
	if (current->in_execve)
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags);
}

T
Tetsuo Handa 已提交
331 332 333 334 335 336 337 338 339
/**
 * tomoyo_file_ioctl - Target for security_file_ioctl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for ioctl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
340 341 342
static int tomoyo_file_ioctl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
343
	return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd);
344 345
}

T
Tetsuo Handa 已提交
346 347 348
/**
 * tomoyo_path_chmod - Target for security_path_chmod().
 *
349 350
 * @path: Pointer to "struct path".
 * @mode: DAC permission mode.
T
Tetsuo Handa 已提交
351 352 353
 *
 * Returns 0 on success, negative value otherwise.
 */
354
static int tomoyo_path_chmod(struct path *path, umode_t mode)
355
{
356
	return tomoyo_path_number_perm(TOMOYO_TYPE_CHMOD, path,
357
				       mode & S_IALLUGO);
358 359
}

T
Tetsuo Handa 已提交
360 361 362 363 364 365 366 367 368
/**
 * tomoyo_path_chown - Target for security_path_chown().
 *
 * @path: Pointer to "struct path".
 * @uid:  Owner ID.
 * @gid:  Group ID.
 *
 * Returns 0 on success, negative value otherwise.
 */
369
static int tomoyo_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
370 371
{
	int error = 0;
372 373 374 375 376 377
	if (uid_valid(uid))
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path,
						from_kuid(&init_user_ns, uid));
	if (!error && gid_valid(gid))
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHGRP, path,
						from_kgid(&init_user_ns, gid));
378 379 380
	return error;
}

T
Tetsuo Handa 已提交
381 382 383 384 385 386 387
/**
 * tomoyo_path_chroot - Target for security_path_chroot().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
388 389
static int tomoyo_path_chroot(struct path *path)
{
T
Tetsuo Handa 已提交
390
	return tomoyo_path_perm(TOMOYO_TYPE_CHROOT, path, NULL);
391 392
}

T
Tetsuo Handa 已提交
393 394 395 396 397 398 399 400 401 402 403
/**
 * tomoyo_sb_mount - Target for security_sb_mount().
 *
 * @dev_name: Name of device file. Maybe NULL.
 * @path:     Pointer to "struct path".
 * @type:     Name of filesystem type. Maybe NULL.
 * @flags:    Mount options.
 * @data:     Optional data. Maybe NULL.
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
404
static int tomoyo_sb_mount(const char *dev_name, const struct path *path,
A
Al Viro 已提交
405
			   const char *type, unsigned long flags, void *data)
406
{
T
Tetsuo Handa 已提交
407
	return tomoyo_mount_permission(dev_name, path, type, flags, data);
408 409
}

T
Tetsuo Handa 已提交
410 411 412 413 414 415 416 417
/**
 * tomoyo_sb_umount - Target for security_sb_umount().
 *
 * @mnt:   Pointer to "struct vfsmount".
 * @flags: Unmount options.
 *
 * Returns 0 on success, negative value otherwise.
 */
418 419 420
static int tomoyo_sb_umount(struct vfsmount *mnt, int flags)
{
	struct path path = { mnt, mnt->mnt_root };
T
Tetsuo Handa 已提交
421
	return tomoyo_path_perm(TOMOYO_TYPE_UMOUNT, &path, NULL);
422 423
}

T
Tetsuo Handa 已提交
424 425 426 427 428 429 430 431
/**
 * tomoyo_sb_pivotroot - Target for security_sb_pivotroot().
 *
 * @old_path: Pointer to "struct path".
 * @new_path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
432 433
static int tomoyo_sb_pivotroot(struct path *old_path, struct path *new_path)
{
434
	return tomoyo_path2_perm(TOMOYO_TYPE_PIVOT_ROOT, new_path, old_path);
435 436
}

437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494
/**
 * tomoyo_socket_listen - Check permission for listen().
 *
 * @sock:    Pointer to "struct socket".
 * @backlog: Backlog parameter.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_listen(struct socket *sock, int backlog)
{
	return tomoyo_socket_listen_permission(sock);
}

/**
 * tomoyo_socket_connect - Check permission for connect().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_connect(struct socket *sock, struct sockaddr *addr,
				 int addr_len)
{
	return tomoyo_socket_connect_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_bind - Check permission for bind().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_bind(struct socket *sock, struct sockaddr *addr,
			      int addr_len)
{
	return tomoyo_socket_bind_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_sendmsg - Check permission for sendmsg().
 *
 * @sock: Pointer to "struct socket".
 * @msg:  Pointer to "struct msghdr".
 * @size: Size of message.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_sendmsg(struct socket *sock, struct msghdr *msg,
				 int size)
{
	return tomoyo_socket_sendmsg_permission(sock, msg, size);
}

495 496 497 498
/*
 * tomoyo_security_ops is a "struct security_operations" which is used for
 * registering TOMOYO.
 */
C
Casey Schaufler 已提交
499
static struct security_hook_list tomoyo_hooks[] = {
500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527
	LSM_HOOK_INIT(cred_alloc_blank, tomoyo_cred_alloc_blank),
	LSM_HOOK_INIT(cred_prepare, tomoyo_cred_prepare),
	LSM_HOOK_INIT(cred_transfer, tomoyo_cred_transfer),
	LSM_HOOK_INIT(cred_free, tomoyo_cred_free),
	LSM_HOOK_INIT(bprm_set_creds, tomoyo_bprm_set_creds),
	LSM_HOOK_INIT(bprm_check_security, tomoyo_bprm_check_security),
	LSM_HOOK_INIT(file_fcntl, tomoyo_file_fcntl),
	LSM_HOOK_INIT(file_open, tomoyo_file_open),
	LSM_HOOK_INIT(path_truncate, tomoyo_path_truncate),
	LSM_HOOK_INIT(path_unlink, tomoyo_path_unlink),
	LSM_HOOK_INIT(path_mkdir, tomoyo_path_mkdir),
	LSM_HOOK_INIT(path_rmdir, tomoyo_path_rmdir),
	LSM_HOOK_INIT(path_symlink, tomoyo_path_symlink),
	LSM_HOOK_INIT(path_mknod, tomoyo_path_mknod),
	LSM_HOOK_INIT(path_link, tomoyo_path_link),
	LSM_HOOK_INIT(path_rename, tomoyo_path_rename),
	LSM_HOOK_INIT(inode_getattr, tomoyo_inode_getattr),
	LSM_HOOK_INIT(file_ioctl, tomoyo_file_ioctl),
	LSM_HOOK_INIT(path_chmod, tomoyo_path_chmod),
	LSM_HOOK_INIT(path_chown, tomoyo_path_chown),
	LSM_HOOK_INIT(path_chroot, tomoyo_path_chroot),
	LSM_HOOK_INIT(sb_mount, tomoyo_sb_mount),
	LSM_HOOK_INIT(sb_umount, tomoyo_sb_umount),
	LSM_HOOK_INIT(sb_pivotroot, tomoyo_sb_pivotroot),
	LSM_HOOK_INIT(socket_bind, tomoyo_socket_bind),
	LSM_HOOK_INIT(socket_connect, tomoyo_socket_connect),
	LSM_HOOK_INIT(socket_listen, tomoyo_socket_listen),
	LSM_HOOK_INIT(socket_sendmsg, tomoyo_socket_sendmsg),
K
Kentaro Takeda 已提交
528 529
};

530
/* Lock for GC. */
531
DEFINE_SRCU(tomoyo_ss);
532

T
Tetsuo Handa 已提交
533 534 535 536 537
/**
 * tomoyo_init - Register TOMOYO Linux as a LSM module.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
538 539 540 541
static int __init tomoyo_init(void)
{
	struct cred *cred = (struct cred *) current_cred();

C
Casey Schaufler 已提交
542
	if (!security_module_enable("tomoyo"))
K
Kentaro Takeda 已提交
543 544
		return 0;
	/* register ourselves with the security framework */
C
Casey Schaufler 已提交
545
	security_add_hooks(tomoyo_hooks, ARRAY_SIZE(tomoyo_hooks));
K
Kentaro Takeda 已提交
546 547
	printk(KERN_INFO "TOMOYO Linux initialized\n");
	cred->security = &tomoyo_kernel_domain;
548
	tomoyo_mm_init();
K
Kentaro Takeda 已提交
549 550 551 552
	return 0;
}

security_initcall(tomoyo_init);