common.c 74.7 KB
Newer Older
1 2 3
/*
 * security/tomoyo/common.c
 *
T
Tetsuo Handa 已提交
4
 * Copyright (C) 2005-2011  NTT DATA CORPORATION
5 6 7
 */

#include <linux/uaccess.h>
8
#include <linux/slab.h>
9 10 11
#include <linux/security.h>
#include "common.h"

T
Tetsuo Handa 已提交
12 13 14 15 16 17
/* String table for operation mode. */
const char * const tomoyo_mode[TOMOYO_CONFIG_MAX_MODE] = {
	[TOMOYO_CONFIG_DISABLED]   = "disabled",
	[TOMOYO_CONFIG_LEARNING]   = "learning",
	[TOMOYO_CONFIG_PERMISSIVE] = "permissive",
	[TOMOYO_CONFIG_ENFORCING]  = "enforcing"
18 19
};

T
Tetsuo Handa 已提交
20
/* String table for /sys/kernel/security/tomoyo/profile */
T
Tetsuo Handa 已提交
21
const char * const tomoyo_mac_keywords[TOMOYO_MAX_MAC_INDEX
T
Tetsuo Handa 已提交
22
				       + TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
23
	/* CONFIG::file group */
T
Tetsuo Handa 已提交
24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46
	[TOMOYO_MAC_FILE_EXECUTE]    = "execute",
	[TOMOYO_MAC_FILE_OPEN]       = "open",
	[TOMOYO_MAC_FILE_CREATE]     = "create",
	[TOMOYO_MAC_FILE_UNLINK]     = "unlink",
	[TOMOYO_MAC_FILE_GETATTR]    = "getattr",
	[TOMOYO_MAC_FILE_MKDIR]      = "mkdir",
	[TOMOYO_MAC_FILE_RMDIR]      = "rmdir",
	[TOMOYO_MAC_FILE_MKFIFO]     = "mkfifo",
	[TOMOYO_MAC_FILE_MKSOCK]     = "mksock",
	[TOMOYO_MAC_FILE_TRUNCATE]   = "truncate",
	[TOMOYO_MAC_FILE_SYMLINK]    = "symlink",
	[TOMOYO_MAC_FILE_MKBLOCK]    = "mkblock",
	[TOMOYO_MAC_FILE_MKCHAR]     = "mkchar",
	[TOMOYO_MAC_FILE_LINK]       = "link",
	[TOMOYO_MAC_FILE_RENAME]     = "rename",
	[TOMOYO_MAC_FILE_CHMOD]      = "chmod",
	[TOMOYO_MAC_FILE_CHOWN]      = "chown",
	[TOMOYO_MAC_FILE_CHGRP]      = "chgrp",
	[TOMOYO_MAC_FILE_IOCTL]      = "ioctl",
	[TOMOYO_MAC_FILE_CHROOT]     = "chroot",
	[TOMOYO_MAC_FILE_MOUNT]      = "mount",
	[TOMOYO_MAC_FILE_UMOUNT]     = "unmount",
	[TOMOYO_MAC_FILE_PIVOT_ROOT] = "pivot_root",
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
	/* CONFIG::network group */
	[TOMOYO_MAC_NETWORK_INET_STREAM_BIND]       = "inet_stream_bind",
	[TOMOYO_MAC_NETWORK_INET_STREAM_LISTEN]     = "inet_stream_listen",
	[TOMOYO_MAC_NETWORK_INET_STREAM_CONNECT]    = "inet_stream_connect",
	[TOMOYO_MAC_NETWORK_INET_DGRAM_BIND]        = "inet_dgram_bind",
	[TOMOYO_MAC_NETWORK_INET_DGRAM_SEND]        = "inet_dgram_send",
	[TOMOYO_MAC_NETWORK_INET_RAW_BIND]          = "inet_raw_bind",
	[TOMOYO_MAC_NETWORK_INET_RAW_SEND]          = "inet_raw_send",
	[TOMOYO_MAC_NETWORK_UNIX_STREAM_BIND]       = "unix_stream_bind",
	[TOMOYO_MAC_NETWORK_UNIX_STREAM_LISTEN]     = "unix_stream_listen",
	[TOMOYO_MAC_NETWORK_UNIX_STREAM_CONNECT]    = "unix_stream_connect",
	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_BIND]        = "unix_dgram_bind",
	[TOMOYO_MAC_NETWORK_UNIX_DGRAM_SEND]        = "unix_dgram_send",
	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_BIND]    = "unix_seqpacket_bind",
	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_LISTEN]  = "unix_seqpacket_listen",
	[TOMOYO_MAC_NETWORK_UNIX_SEQPACKET_CONNECT] = "unix_seqpacket_connect",
63 64 65
	/* CONFIG::misc group */
	[TOMOYO_MAC_ENVIRON] = "env",
	/* CONFIG group */
T
Tetsuo Handa 已提交
66
	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_FILE] = "file",
67
	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_NETWORK] = "network",
68
	[TOMOYO_MAX_MAC_INDEX + TOMOYO_MAC_CATEGORY_MISC] = "misc",
69 70
};

71 72 73 74 75 76 77 78 79 80 81 82
/* String table for conditions. */
const char * const tomoyo_condition_keyword[TOMOYO_MAX_CONDITION_KEYWORD] = {
	[TOMOYO_TASK_UID]             = "task.uid",
	[TOMOYO_TASK_EUID]            = "task.euid",
	[TOMOYO_TASK_SUID]            = "task.suid",
	[TOMOYO_TASK_FSUID]           = "task.fsuid",
	[TOMOYO_TASK_GID]             = "task.gid",
	[TOMOYO_TASK_EGID]            = "task.egid",
	[TOMOYO_TASK_SGID]            = "task.sgid",
	[TOMOYO_TASK_FSGID]           = "task.fsgid",
	[TOMOYO_TASK_PID]             = "task.pid",
	[TOMOYO_TASK_PPID]            = "task.ppid",
83 84
	[TOMOYO_EXEC_ARGC]            = "exec.argc",
	[TOMOYO_EXEC_ENVC]            = "exec.envc",
85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103
	[TOMOYO_TYPE_IS_SOCKET]       = "socket",
	[TOMOYO_TYPE_IS_SYMLINK]      = "symlink",
	[TOMOYO_TYPE_IS_FILE]         = "file",
	[TOMOYO_TYPE_IS_BLOCK_DEV]    = "block",
	[TOMOYO_TYPE_IS_DIRECTORY]    = "directory",
	[TOMOYO_TYPE_IS_CHAR_DEV]     = "char",
	[TOMOYO_TYPE_IS_FIFO]         = "fifo",
	[TOMOYO_MODE_SETUID]          = "setuid",
	[TOMOYO_MODE_SETGID]          = "setgid",
	[TOMOYO_MODE_STICKY]          = "sticky",
	[TOMOYO_MODE_OWNER_READ]      = "owner_read",
	[TOMOYO_MODE_OWNER_WRITE]     = "owner_write",
	[TOMOYO_MODE_OWNER_EXECUTE]   = "owner_execute",
	[TOMOYO_MODE_GROUP_READ]      = "group_read",
	[TOMOYO_MODE_GROUP_WRITE]     = "group_write",
	[TOMOYO_MODE_GROUP_EXECUTE]   = "group_execute",
	[TOMOYO_MODE_OTHERS_READ]     = "others_read",
	[TOMOYO_MODE_OTHERS_WRITE]    = "others_write",
	[TOMOYO_MODE_OTHERS_EXECUTE]  = "others_execute",
104 105
	[TOMOYO_EXEC_REALPATH]        = "exec.realpath",
	[TOMOYO_SYMLINK_TARGET]       = "symlink.target",
106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131
	[TOMOYO_PATH1_UID]            = "path1.uid",
	[TOMOYO_PATH1_GID]            = "path1.gid",
	[TOMOYO_PATH1_INO]            = "path1.ino",
	[TOMOYO_PATH1_MAJOR]          = "path1.major",
	[TOMOYO_PATH1_MINOR]          = "path1.minor",
	[TOMOYO_PATH1_PERM]           = "path1.perm",
	[TOMOYO_PATH1_TYPE]           = "path1.type",
	[TOMOYO_PATH1_DEV_MAJOR]      = "path1.dev_major",
	[TOMOYO_PATH1_DEV_MINOR]      = "path1.dev_minor",
	[TOMOYO_PATH2_UID]            = "path2.uid",
	[TOMOYO_PATH2_GID]            = "path2.gid",
	[TOMOYO_PATH2_INO]            = "path2.ino",
	[TOMOYO_PATH2_MAJOR]          = "path2.major",
	[TOMOYO_PATH2_MINOR]          = "path2.minor",
	[TOMOYO_PATH2_PERM]           = "path2.perm",
	[TOMOYO_PATH2_TYPE]           = "path2.type",
	[TOMOYO_PATH2_DEV_MAJOR]      = "path2.dev_major",
	[TOMOYO_PATH2_DEV_MINOR]      = "path2.dev_minor",
	[TOMOYO_PATH1_PARENT_UID]     = "path1.parent.uid",
	[TOMOYO_PATH1_PARENT_GID]     = "path1.parent.gid",
	[TOMOYO_PATH1_PARENT_INO]     = "path1.parent.ino",
	[TOMOYO_PATH1_PARENT_PERM]    = "path1.parent.perm",
	[TOMOYO_PATH2_PARENT_UID]     = "path2.parent.uid",
	[TOMOYO_PATH2_PARENT_GID]     = "path2.parent.gid",
	[TOMOYO_PATH2_PARENT_INO]     = "path2.parent.ino",
	[TOMOYO_PATH2_PARENT_PERM]    = "path2.parent.perm",
132 133
};

134 135
/* String table for PREFERENCE keyword. */
static const char * const tomoyo_pref_keywords[TOMOYO_MAX_PREF] = {
T
Tetsuo Handa 已提交
136
	[TOMOYO_PREF_MAX_AUDIT_LOG]      = "max_audit_log",
137 138 139
	[TOMOYO_PREF_MAX_LEARNING_ENTRY] = "max_learning_entry",
};

T
Tetsuo Handa 已提交
140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
/* String table for path operation. */
const char * const tomoyo_path_keyword[TOMOYO_MAX_PATH_OPERATION] = {
	[TOMOYO_TYPE_EXECUTE]    = "execute",
	[TOMOYO_TYPE_READ]       = "read",
	[TOMOYO_TYPE_WRITE]      = "write",
	[TOMOYO_TYPE_APPEND]     = "append",
	[TOMOYO_TYPE_UNLINK]     = "unlink",
	[TOMOYO_TYPE_GETATTR]    = "getattr",
	[TOMOYO_TYPE_RMDIR]      = "rmdir",
	[TOMOYO_TYPE_TRUNCATE]   = "truncate",
	[TOMOYO_TYPE_SYMLINK]    = "symlink",
	[TOMOYO_TYPE_CHROOT]     = "chroot",
	[TOMOYO_TYPE_UMOUNT]     = "unmount",
};

155 156 157 158 159 160 161 162
/* String table for socket's operation. */
const char * const tomoyo_socket_keyword[TOMOYO_MAX_NETWORK_OPERATION] = {
	[TOMOYO_NETWORK_BIND]    = "bind",
	[TOMOYO_NETWORK_LISTEN]  = "listen",
	[TOMOYO_NETWORK_CONNECT] = "connect",
	[TOMOYO_NETWORK_SEND]    = "send",
};

T
Tetsuo Handa 已提交
163 164 165
/* String table for categories. */
static const char * const tomoyo_category_keywords
[TOMOYO_MAX_MAC_CATEGORY_INDEX] = {
166 167 168
	[TOMOYO_MAC_CATEGORY_FILE]    = "file",
	[TOMOYO_MAC_CATEGORY_NETWORK] = "network",
	[TOMOYO_MAC_CATEGORY_MISC]    = "misc",
T
Tetsuo Handa 已提交
169 170
};

171 172 173 174 175
/* Permit policy management by non-root user? */
static bool tomoyo_manage_by_non_root;

/* Utility functions. */

T
Tetsuo Handa 已提交
176 177 178 179 180
/**
 * tomoyo_yesno - Return "yes" or "no".
 *
 * @value: Bool value.
 */
T
Tetsuo Handa 已提交
181
const char *tomoyo_yesno(const unsigned int value)
T
Tetsuo Handa 已提交
182 183 184 185
{
	return value ? "yes" : "no";
}

186 187 188 189 190 191 192 193 194
/**
 * tomoyo_addprintf - strncat()-like-snprintf().
 *
 * @buffer: Buffer to write to. Must be '\0'-terminated.
 * @len:    Size of @buffer.
 * @fmt:    The printf()'s format string, followed by parameters.
 *
 * Returns nothing.
 */
195 196 197 198 199 200 201 202 203
static void tomoyo_addprintf(char *buffer, int len, const char *fmt, ...)
{
	va_list args;
	const int pos = strlen(buffer);
	va_start(args, fmt);
	vsnprintf(buffer + pos, len - pos - 1, fmt, args);
	va_end(args);
}

204
/**
205
 * tomoyo_flush - Flush queued string to userspace's buffer.
206
 *
207
 * @head:   Pointer to "struct tomoyo_io_buffer".
208
 *
209
 * Returns true if all data was flushed, false otherwise.
210
 */
211
static bool tomoyo_flush(struct tomoyo_io_buffer *head)
212
{
213 214
	while (head->r.w_pos) {
		const char *w = head->r.w[0];
T
Tetsuo Handa 已提交
215
		size_t len = strlen(w);
216 217 218 219 220 221 222 223 224 225 226
		if (len) {
			if (len > head->read_user_buf_avail)
				len = head->read_user_buf_avail;
			if (!len)
				return false;
			if (copy_to_user(head->read_user_buf, w, len))
				return false;
			head->read_user_buf_avail -= len;
			head->read_user_buf += len;
			w += len;
		}
227 228
		head->r.w[0] = w;
		if (*w)
229
			return false;
T
Tetsuo Handa 已提交
230
		/* Add '\0' for audit logs and query. */
231 232 233 234 235 236 237 238 239 240 241 242 243
		if (head->poll) {
			if (!head->read_user_buf_avail ||
			    copy_to_user(head->read_user_buf, "", 1))
				return false;
			head->read_user_buf_avail--;
			head->read_user_buf++;
		}
		head->r.w_pos--;
		for (len = 0; len < head->r.w_pos; len++)
			head->r.w[len] = head->r.w[len + 1];
	}
	head->r.avail = 0;
	return true;
244 245
}

246
/**
247
 * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure.
248
 *
249 250
 * @head:   Pointer to "struct tomoyo_io_buffer".
 * @string: String to print.
251
 *
252 253 254
 * Note that @string has to be kept valid until @head is kfree()d.
 * This means that char[] allocated on stack memory cannot be passed to
 * this function. Use tomoyo_io_printf() for char[] allocated on stack memory.
255
 */
256
static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string)
257
{
258 259 260 261 262
	if (head->r.w_pos < TOMOYO_MAX_IO_READ_QUEUE) {
		head->r.w[head->r.w_pos++] = string;
		tomoyo_flush(head);
	} else
		WARN_ON(1);
263 264
}

265
/**
266
 * tomoyo_io_printf - printf() to "struct tomoyo_io_buffer" structure.
267 268 269 270
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @fmt:  The printf()'s format string, followed by parameters.
 */
271
void tomoyo_io_printf(struct tomoyo_io_buffer *head, const char *fmt, ...)
272 273
{
	va_list args;
T
Tetsuo Handa 已提交
274 275
	size_t len;
	size_t pos = head->r.avail;
276 277
	int size = head->readbuf_size - pos;
	if (size <= 0)
278
		return;
279
	va_start(args, fmt);
280
	len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1;
281
	va_end(args);
282 283 284 285 286 287 288 289
	if (pos + len >= head->readbuf_size) {
		WARN_ON(1);
		return;
	}
	head->r.avail += len;
	tomoyo_set_string(head, head->read_buf + pos);
}

T
Tetsuo Handa 已提交
290 291 292 293 294 295 296
/**
 * tomoyo_set_space - Put a space to "struct tomoyo_io_buffer" structure.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
297 298 299 300 301
static void tomoyo_set_space(struct tomoyo_io_buffer *head)
{
	tomoyo_set_string(head, " ");
}

T
Tetsuo Handa 已提交
302 303 304 305 306 307 308
/**
 * tomoyo_set_lf - Put a line feed to "struct tomoyo_io_buffer" structure.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
309 310 311 312 313 314
static bool tomoyo_set_lf(struct tomoyo_io_buffer *head)
{
	tomoyo_set_string(head, "\n");
	return !head->r.w_pos;
}

T
Tetsuo Handa 已提交
315 316 317 318 319 320 321 322 323 324 325 326
/**
 * tomoyo_set_slash - Put a shash to "struct tomoyo_io_buffer" structure.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
static void tomoyo_set_slash(struct tomoyo_io_buffer *head)
{
	tomoyo_set_string(head, "/");
}

327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
/* List of namespaces. */
LIST_HEAD(tomoyo_namespace_list);
/* True if namespace other than tomoyo_kernel_namespace is defined. */
static bool tomoyo_namespace_enabled;

/**
 * tomoyo_init_policy_namespace - Initialize namespace.
 *
 * @ns: Pointer to "struct tomoyo_policy_namespace".
 *
 * Returns nothing.
 */
void tomoyo_init_policy_namespace(struct tomoyo_policy_namespace *ns)
{
	unsigned int idx;
	for (idx = 0; idx < TOMOYO_MAX_ACL_GROUPS; idx++)
		INIT_LIST_HEAD(&ns->acl_group[idx]);
	for (idx = 0; idx < TOMOYO_MAX_GROUP; idx++)
		INIT_LIST_HEAD(&ns->group_list[idx]);
	for (idx = 0; idx < TOMOYO_MAX_POLICY; idx++)
		INIT_LIST_HEAD(&ns->policy_list[idx]);
T
Tetsuo Handa 已提交
348
	ns->profile_version = 20110903;
349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370
	tomoyo_namespace_enabled = !list_empty(&tomoyo_namespace_list);
	list_add_tail_rcu(&ns->namespace_list, &tomoyo_namespace_list);
}

/**
 * tomoyo_print_namespace - Print namespace header.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
static void tomoyo_print_namespace(struct tomoyo_io_buffer *head)
{
	if (!tomoyo_namespace_enabled)
		return;
	tomoyo_set_string(head,
			  container_of(head->r.ns,
				       struct tomoyo_policy_namespace,
				       namespace_list)->name);
	tomoyo_set_space(head);
}

371 372 373 374 375 376 377 378 379 380
/**
 * tomoyo_print_name_union - Print a tomoyo_name_union.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @ptr:  Pointer to "struct tomoyo_name_union".
 */
static void tomoyo_print_name_union(struct tomoyo_io_buffer *head,
				    const struct tomoyo_name_union *ptr)
{
	tomoyo_set_space(head);
T
Tetsuo Handa 已提交
381
	if (ptr->group) {
382 383 384 385 386 387 388
		tomoyo_set_string(head, "@");
		tomoyo_set_string(head, ptr->group->group_name->name);
	} else {
		tomoyo_set_string(head, ptr->filename->name);
	}
}

389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409
/**
 * tomoyo_print_name_union_quoted - Print a tomoyo_name_union with a quote.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @ptr:  Pointer to "struct tomoyo_name_union".
 *
 * Returns nothing.
 */
static void tomoyo_print_name_union_quoted(struct tomoyo_io_buffer *head,
					   const struct tomoyo_name_union *ptr)
{
	if (ptr->group) {
		tomoyo_set_string(head, "@");
		tomoyo_set_string(head, ptr->group->group_name->name);
	} else {
		tomoyo_set_string(head, "\"");
		tomoyo_set_string(head, ptr->filename->name);
		tomoyo_set_string(head, "\"");
	}
}

410
/**
411
 * tomoyo_print_number_union_nospace - Print a tomoyo_number_union without a space.
412
 *
413 414 415 416
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @ptr:  Pointer to "struct tomoyo_number_union".
 *
 * Returns nothing.
417
 */
418 419
static void tomoyo_print_number_union_nospace
(struct tomoyo_io_buffer *head, const struct tomoyo_number_union *ptr)
420
{
T
Tetsuo Handa 已提交
421
	if (ptr->group) {
422 423 424 425 426 427
		tomoyo_set_string(head, "@");
		tomoyo_set_string(head, ptr->group->group_name->name);
	} else {
		int i;
		unsigned long min = ptr->values[0];
		const unsigned long max = ptr->values[1];
T
Tetsuo Handa 已提交
428 429
		u8 min_type = ptr->value_type[0];
		const u8 max_type = ptr->value_type[1];
430 431 432 433 434 435 436 437 438 439 440 441 442
		char buffer[128];
		buffer[0] = '\0';
		for (i = 0; i < 2; i++) {
			switch (min_type) {
			case TOMOYO_VALUE_TYPE_HEXADECIMAL:
				tomoyo_addprintf(buffer, sizeof(buffer),
						 "0x%lX", min);
				break;
			case TOMOYO_VALUE_TYPE_OCTAL:
				tomoyo_addprintf(buffer, sizeof(buffer),
						 "0%lo", min);
				break;
			default:
443 444
				tomoyo_addprintf(buffer, sizeof(buffer), "%lu",
						 min);
445 446 447 448 449 450 451 452 453 454
				break;
			}
			if (min == max && min_type == max_type)
				break;
			tomoyo_addprintf(buffer, sizeof(buffer), "-");
			min_type = max_type;
			min = max;
		}
		tomoyo_io_printf(head, "%s", buffer);
	}
455 456
}

457 458 459 460 461 462 463 464 465 466 467 468 469 470 471
/**
 * tomoyo_print_number_union - Print a tomoyo_number_union.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @ptr:  Pointer to "struct tomoyo_number_union".
 *
 * Returns nothing.
 */
static void tomoyo_print_number_union(struct tomoyo_io_buffer *head,
				      const struct tomoyo_number_union *ptr)
{
	tomoyo_set_space(head);
	tomoyo_print_number_union_nospace(head, ptr);
}

472
/**
T
Tetsuo Handa 已提交
473
 * tomoyo_assign_profile - Create a new profile.
474
 *
475
 * @ns:      Pointer to "struct tomoyo_policy_namespace".
476 477 478 479
 * @profile: Profile number to create.
 *
 * Returns pointer to "struct tomoyo_profile" on success, NULL otherwise.
 */
480 481
static struct tomoyo_profile *tomoyo_assign_profile
(struct tomoyo_policy_namespace *ns, const unsigned int profile)
482
{
T
Tetsuo Handa 已提交
483 484
	struct tomoyo_profile *ptr;
	struct tomoyo_profile *entry;
485 486
	if (profile >= TOMOYO_MAX_PROFILES)
		return NULL;
487
	ptr = ns->profile_ptr[profile];
488
	if (ptr)
T
Tetsuo Handa 已提交
489 490 491 492
		return ptr;
	entry = kzalloc(sizeof(*entry), GFP_NOFS);
	if (mutex_lock_interruptible(&tomoyo_policy_lock))
		goto out;
493
	ptr = ns->profile_ptr[profile];
T
Tetsuo Handa 已提交
494 495
	if (!ptr && tomoyo_memory_ok(entry)) {
		ptr = entry;
T
Tetsuo Handa 已提交
496 497 498
		ptr->default_config = TOMOYO_CONFIG_DISABLED |
			TOMOYO_CONFIG_WANT_GRANT_LOG |
			TOMOYO_CONFIG_WANT_REJECT_LOG;
T
Tetsuo Handa 已提交
499 500
		memset(ptr->config, TOMOYO_CONFIG_USE_DEFAULT,
		       sizeof(ptr->config));
T
Tetsuo Handa 已提交
501
		ptr->pref[TOMOYO_PREF_MAX_AUDIT_LOG] = 1024;
502
		ptr->pref[TOMOYO_PREF_MAX_LEARNING_ENTRY] = 2048;
T
Tetsuo Handa 已提交
503
		mb(); /* Avoid out-of-order execution. */
504
		ns->profile_ptr[profile] = ptr;
T
Tetsuo Handa 已提交
505
		entry = NULL;
506
	}
507
	mutex_unlock(&tomoyo_policy_lock);
T
Tetsuo Handa 已提交
508 509
 out:
	kfree(entry);
510 511 512 513
	return ptr;
}

/**
T
Tetsuo Handa 已提交
514 515
 * tomoyo_profile - Find a profile.
 *
516
 * @ns:      Pointer to "struct tomoyo_policy_namespace".
T
Tetsuo Handa 已提交
517 518 519 520
 * @profile: Profile number to find.
 *
 * Returns pointer to "struct tomoyo_profile".
 */
521 522
struct tomoyo_profile *tomoyo_profile(const struct tomoyo_policy_namespace *ns,
				      const u8 profile)
T
Tetsuo Handa 已提交
523
{
524
	static struct tomoyo_profile tomoyo_null_profile;
525
	struct tomoyo_profile *ptr = ns->profile_ptr[profile];
526 527
	if (!ptr)
		ptr = &tomoyo_null_profile;
T
Tetsuo Handa 已提交
528 529 530
	return ptr;
}

531 532 533 534 535 536 537 538
/**
 * tomoyo_find_yesno - Find values for specified keyword.
 *
 * @string: String to check.
 * @find:   Name of keyword.
 *
 * Returns 1 if "@find=yes" was found, 0 if "@find=no" was found, -1 otherwise.
 */
T
Tetsuo Handa 已提交
539 540 541 542 543 544 545 546 547 548 549 550 551
static s8 tomoyo_find_yesno(const char *string, const char *find)
{
	const char *cp = strstr(string, find);
	if (cp) {
		cp += strlen(find);
		if (!strncmp(cp, "=yes", 4))
			return 1;
		else if (!strncmp(cp, "=no", 3))
			return 0;
	}
	return -1;
}

552 553 554 555 556 557 558 559 560
/**
 * tomoyo_set_uint - Set value for specified preference.
 *
 * @i:      Pointer to "unsigned int".
 * @string: String to check.
 * @find:   Name of keyword.
 *
 * Returns nothing.
 */
T
Tetsuo Handa 已提交
561 562 563 564 565 566 567 568
static void tomoyo_set_uint(unsigned int *i, const char *string,
			    const char *find)
{
	const char *cp = strstr(string, find);
	if (cp)
		sscanf(cp + strlen(find), "=%u", i);
}

569 570 571 572 573 574 575 576 577
/**
 * tomoyo_set_mode - Set mode for specified profile.
 *
 * @name:    Name of functionality.
 * @value:   Mode for @name.
 * @profile: Pointer to "struct tomoyo_profile".
 *
 * Returns 0 on success, negative value otherwise.
 */
T
Tetsuo Handa 已提交
578 579 580 581 582 583 584 585 586 587 588 589
static int tomoyo_set_mode(char *name, const char *value,
			   struct tomoyo_profile *profile)
{
	u8 i;
	u8 config;
	if (!strcmp(name, "CONFIG")) {
		i = TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX;
		config = profile->default_config;
	} else if (tomoyo_str_starts(&name, "CONFIG::")) {
		config = 0;
		for (i = 0; i < TOMOYO_MAX_MAC_INDEX
			     + TOMOYO_MAX_MAC_CATEGORY_INDEX; i++) {
T
Tetsuo Handa 已提交
590 591 592 593 594 595 596 597 598 599 600
			int len = 0;
			if (i < TOMOYO_MAX_MAC_INDEX) {
				const u8 c = tomoyo_index2category[i];
				const char *category =
					tomoyo_category_keywords[c];
				len = strlen(category);
				if (strncmp(name, category, len) ||
				    name[len++] != ':' || name[len++] != ':')
					continue;
			}
			if (strcmp(name + len, tomoyo_mac_keywords[i]))
T
Tetsuo Handa 已提交
601 602 603 604 605 606 607 608 609
				continue;
			config = profile->config[i];
			break;
		}
		if (i == TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
			return -EINVAL;
	} else {
		return -EINVAL;
	}
610
	if (strstr(value, "use_default")) {
T
Tetsuo Handa 已提交
611 612 613 614 615 616 617 618 619 620
		config = TOMOYO_CONFIG_USE_DEFAULT;
	} else {
		u8 mode;
		for (mode = 0; mode < 4; mode++)
			if (strstr(value, tomoyo_mode[mode]))
				/*
				 * Update lower 3 bits in order to distinguish
				 * 'config' from 'TOMOYO_CONFIG_USE_DEAFULT'.
				 */
				config = (config & ~7) | mode;
T
Tetsuo Handa 已提交
621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638
		if (config != TOMOYO_CONFIG_USE_DEFAULT) {
			switch (tomoyo_find_yesno(value, "grant_log")) {
			case 1:
				config |= TOMOYO_CONFIG_WANT_GRANT_LOG;
				break;
			case 0:
				config &= ~TOMOYO_CONFIG_WANT_GRANT_LOG;
				break;
			}
			switch (tomoyo_find_yesno(value, "reject_log")) {
			case 1:
				config |= TOMOYO_CONFIG_WANT_REJECT_LOG;
				break;
			case 0:
				config &= ~TOMOYO_CONFIG_WANT_REJECT_LOG;
				break;
			}
		}
T
Tetsuo Handa 已提交
639 640 641 642 643 644 645 646
	}
	if (i < TOMOYO_MAX_MAC_INDEX + TOMOYO_MAX_MAC_CATEGORY_INDEX)
		profile->config[i] = config;
	else if (config != TOMOYO_CONFIG_USE_DEFAULT)
		profile->default_config = config;
	return 0;
}

T
Tetsuo Handa 已提交
647 648
/**
 * tomoyo_write_profile - Write profile table.
649 650 651 652 653 654 655 656 657 658 659
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_write_profile(struct tomoyo_io_buffer *head)
{
	char *data = head->write_buf;
	unsigned int i;
	char *cp;
	struct tomoyo_profile *profile;
660 661
	if (sscanf(data, "PROFILE_VERSION=%u", &head->w.ns->profile_version)
	    == 1)
T
Tetsuo Handa 已提交
662 663
		return 0;
	i = simple_strtoul(data, &cp, 10);
664 665 666
	if (*cp != '-')
		return -EINVAL;
	data = cp + 1;
667
	profile = tomoyo_assign_profile(head->w.ns, i);
668 669
	if (!profile)
		return -EINVAL;
670 671 672
	cp = strchr(data, '=');
	if (!cp)
		return -EINVAL;
T
Tetsuo Handa 已提交
673
	*cp++ = '\0';
674
	if (!strcmp(data, "COMMENT")) {
675 676 677 678 679 680 681 682 683 684
		static DEFINE_SPINLOCK(lock);
		const struct tomoyo_path_info *new_comment
			= tomoyo_get_name(cp);
		const struct tomoyo_path_info *old_comment;
		if (!new_comment)
			return -ENOMEM;
		spin_lock(&lock);
		old_comment = profile->comment;
		profile->comment = new_comment;
		spin_unlock(&lock);
685
		tomoyo_put_name(old_comment);
686 687
		return 0;
	}
688 689 690 691 692
	if (!strcmp(data, "PREFERENCE")) {
		for (i = 0; i < TOMOYO_MAX_PREF; i++)
			tomoyo_set_uint(&profile->pref[i], cp,
					tomoyo_pref_keywords[i]);
		return 0;
693
	}
694
	return tomoyo_set_mode(data, cp, profile);
695 696
}

T
Tetsuo Handa 已提交
697 698 699 700 701 702 703 704 705 706
/**
 * tomoyo_print_config - Print mode for specified functionality.
 *
 * @head:   Pointer to "struct tomoyo_io_buffer".
 * @config: Mode for that functionality.
 *
 * Returns nothing.
 *
 * Caller prints functionality's name.
 */
707 708
static void tomoyo_print_config(struct tomoyo_io_buffer *head, const u8 config)
{
T
Tetsuo Handa 已提交
709 710 711 712
	tomoyo_io_printf(head, "={ mode=%s grant_log=%s reject_log=%s }\n",
			 tomoyo_mode[config & 3],
			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_GRANT_LOG),
			 tomoyo_yesno(config & TOMOYO_CONFIG_WANT_REJECT_LOG));
713 714
}

715
/**
T
Tetsuo Handa 已提交
716
 * tomoyo_read_profile - Read profile table.
717 718
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
T
Tetsuo Handa 已提交
719 720
 *
 * Returns nothing.
721
 */
722
static void tomoyo_read_profile(struct tomoyo_io_buffer *head)
723
{
724
	u8 index;
725 726
	struct tomoyo_policy_namespace *ns =
		container_of(head->r.ns, typeof(*ns), namespace_list);
727
	const struct tomoyo_profile *profile;
728 729
	if (head->r.eof)
		return;
730 731
 next:
	index = head->r.index;
732
	profile = ns->profile_ptr[index];
733 734
	switch (head->r.step) {
	case 0:
735 736 737
		tomoyo_print_namespace(head);
		tomoyo_io_printf(head, "PROFILE_VERSION=%u\n",
				 ns->profile_version);
738 739 740 741 742
		head->r.step++;
		break;
	case 1:
		for ( ; head->r.index < TOMOYO_MAX_PROFILES;
		      head->r.index++)
743
			if (ns->profile_ptr[head->r.index])
744 745 746 747 748 749 750
				break;
		if (head->r.index == TOMOYO_MAX_PROFILES)
			return;
		head->r.step++;
		break;
	case 2:
		{
751
			u8 i;
752 753
			const struct tomoyo_path_info *comment =
				profile->comment;
754
			tomoyo_print_namespace(head);
755 756 757
			tomoyo_io_printf(head, "%u-COMMENT=", index);
			tomoyo_set_string(head, comment ? comment->name : "");
			tomoyo_set_lf(head);
758 759 760 761 762 763
			tomoyo_io_printf(head, "%u-PREFERENCE={ ", index);
			for (i = 0; i < TOMOYO_MAX_PREF; i++)
				tomoyo_io_printf(head, "%s=%u ",
						 tomoyo_pref_keywords[i],
						 profile->pref[i]);
			tomoyo_set_string(head, "}\n");
764 765 766 767 768
			head->r.step++;
		}
		break;
	case 3:
		{
769
			tomoyo_print_namespace(head);
770 771 772 773 774 775 776 777 778 779 780
			tomoyo_io_printf(head, "%u-%s", index, "CONFIG");
			tomoyo_print_config(head, profile->default_config);
			head->r.bit = 0;
			head->r.step++;
		}
		break;
	case 4:
		for ( ; head->r.bit < TOMOYO_MAX_MAC_INDEX
			      + TOMOYO_MAX_MAC_CATEGORY_INDEX; head->r.bit++) {
			const u8 i = head->r.bit;
			const u8 config = profile->config[i];
T
Tetsuo Handa 已提交
781 782
			if (config == TOMOYO_CONFIG_USE_DEFAULT)
				continue;
783
			tomoyo_print_namespace(head);
T
Tetsuo Handa 已提交
784 785 786 787 788 789 790 791 792
			if (i < TOMOYO_MAX_MAC_INDEX)
				tomoyo_io_printf(head, "%u-CONFIG::%s::%s",
						 index,
						 tomoyo_category_keywords
						 [tomoyo_index2category[i]],
						 tomoyo_mac_keywords[i]);
			else
				tomoyo_io_printf(head, "%u-CONFIG::%s", index,
						 tomoyo_mac_keywords[i]);
793 794 795 796 797 798 799 800
			tomoyo_print_config(head, config);
			head->r.bit++;
			break;
		}
		if (head->r.bit == TOMOYO_MAX_MAC_INDEX
		    + TOMOYO_MAX_MAC_CATEGORY_INDEX) {
			head->r.index++;
			head->r.step = 1;
801
		}
T
Tetsuo Handa 已提交
802
		break;
803
	}
804 805
	if (tomoyo_flush(head))
		goto next;
806 807
}

T
Tetsuo Handa 已提交
808 809 810 811 812 813 814 815
/**
 * tomoyo_same_manager - Check for duplicated "struct tomoyo_manager" entry.
 *
 * @a: Pointer to "struct tomoyo_acl_head".
 * @b: Pointer to "struct tomoyo_acl_head".
 *
 * Returns true if @a == @b, false otherwise.
 */
T
Tetsuo Handa 已提交
816 817
static bool tomoyo_same_manager(const struct tomoyo_acl_head *a,
				const struct tomoyo_acl_head *b)
818
{
T
Tetsuo Handa 已提交
819 820
	return container_of(a, struct tomoyo_manager, head)->manager ==
		container_of(b, struct tomoyo_manager, head)->manager;
821 822
}

823 824 825 826 827 828 829
/**
 * tomoyo_update_manager_entry - Add a manager entry.
 *
 * @manager:   The path to manager or the domainnamme.
 * @is_delete: True if it is a delete request.
 *
 * Returns 0 on success, negative value otherwise.
830 831
 *
 * Caller holds tomoyo_read_lock().
832 833 834 835
 */
static int tomoyo_update_manager_entry(const char *manager,
				       const bool is_delete)
{
T
Tetsuo Handa 已提交
836
	struct tomoyo_manager e = { };
837
	struct tomoyo_acl_param param = {
838
		/* .ns = &tomoyo_kernel_namespace, */
839
		.is_delete = is_delete,
840 841
		.list = &tomoyo_kernel_namespace.
		policy_list[TOMOYO_ID_MANAGER],
842 843
	};
	int error = is_delete ? -ENOENT : -ENOMEM;
T
Tetsuo Handa 已提交
844 845
	if (tomoyo_domain_def(manager)) {
		if (!tomoyo_correct_domain(manager))
846
			return -EINVAL;
847
		e.is_domain = true;
848
	} else {
T
Tetsuo Handa 已提交
849
		if (!tomoyo_correct_path(manager))
850 851
			return -EINVAL;
	}
852
	e.manager = tomoyo_get_name(manager);
853 854 855 856 857
	if (e.manager) {
		error = tomoyo_update_policy(&e.head, sizeof(e), &param,
					     tomoyo_same_manager);
		tomoyo_put_name(e.manager);
	}
858 859 860 861
	return error;
}

/**
T
Tetsuo Handa 已提交
862
 * tomoyo_write_manager - Write manager policy.
863 864 865 866
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0 on success, negative value otherwise.
867 868
 *
 * Caller holds tomoyo_read_lock().
869
 */
T
Tetsuo Handa 已提交
870
static int tomoyo_write_manager(struct tomoyo_io_buffer *head)
871 872 873 874
{
	char *data = head->write_buf;

	if (!strcmp(data, "manage_by_non_root")) {
875
		tomoyo_manage_by_non_root = !head->w.is_delete;
876 877
		return 0;
	}
878
	return tomoyo_update_manager_entry(data, head->w.is_delete);
879 880 881
}

/**
T
Tetsuo Handa 已提交
882
 * tomoyo_read_manager - Read manager policy.
883 884 885
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
886
 * Caller holds tomoyo_read_lock().
887
 */
T
Tetsuo Handa 已提交
888
static void tomoyo_read_manager(struct tomoyo_io_buffer *head)
889
{
890
	if (head->r.eof)
891
		return;
892 893
	list_for_each_cookie(head->r.acl, &tomoyo_kernel_namespace.
			     policy_list[TOMOYO_ID_MANAGER]) {
T
Tetsuo Handa 已提交
894
		struct tomoyo_manager *ptr =
895
			list_entry(head->r.acl, typeof(*ptr), head.list);
896
		if (ptr->head.is_deleted)
897
			continue;
898 899 900 901
		if (!tomoyo_flush(head))
			return;
		tomoyo_set_string(head, ptr->manager->name);
		tomoyo_set_lf(head);
902
	}
903
	head->r.eof = true;
904 905 906
}

/**
T
Tetsuo Handa 已提交
907
 * tomoyo_manager - Check whether the current process is a policy manager.
908 909 910
 *
 * Returns true if the current process is permitted to modify policy
 * via /sys/kernel/security/tomoyo/ interface.
911 912
 *
 * Caller holds tomoyo_read_lock().
913
 */
T
Tetsuo Handa 已提交
914
static bool tomoyo_manager(void)
915
{
T
Tetsuo Handa 已提交
916
	struct tomoyo_manager *ptr;
917 918 919 920 921 922 923 924 925
	const char *exe;
	const struct task_struct *task = current;
	const struct tomoyo_path_info *domainname = tomoyo_domain()->domainname;
	bool found = false;

	if (!tomoyo_policy_loaded)
		return true;
	if (!tomoyo_manage_by_non_root && (task->cred->uid || task->cred->euid))
		return false;
926 927
	list_for_each_entry_rcu(ptr, &tomoyo_kernel_namespace.
				policy_list[TOMOYO_ID_MANAGER], head.list) {
928
		if (!ptr->head.is_deleted && ptr->is_domain
929 930 931 932 933 934 935 936 937 938
		    && !tomoyo_pathcmp(domainname, ptr->manager)) {
			found = true;
			break;
		}
	}
	if (found)
		return true;
	exe = tomoyo_get_exe();
	if (!exe)
		return false;
939 940
	list_for_each_entry_rcu(ptr, &tomoyo_kernel_namespace.
				policy_list[TOMOYO_ID_MANAGER], head.list) {
941
		if (!ptr->head.is_deleted && !ptr->is_domain
942 943 944 945 946 947 948 949 950 951 952 953 954 955
		    && !strcmp(exe, ptr->manager->name)) {
			found = true;
			break;
		}
	}
	if (!found) { /* Reduce error messages. */
		static pid_t last_pid;
		const pid_t pid = current->pid;
		if (last_pid != pid) {
			printk(KERN_WARNING "%s ( %s ) is not permitted to "
			       "update policies.\n", domainname->name, exe);
			last_pid = pid;
		}
	}
956
	kfree(exe);
957 958 959 960
	return found;
}

/**
961
 * tomoyo_select_domain - Parse select command.
962 963 964 965 966
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @data: String to parse.
 *
 * Returns true on success, false otherwise.
967 968
 *
 * Caller holds tomoyo_read_lock().
969
 */
970 971
static bool tomoyo_select_domain(struct tomoyo_io_buffer *head,
				 const char *data)
972 973 974
{
	unsigned int pid;
	struct tomoyo_domain_info *domain = NULL;
975
	bool global_pid = false;
976 977 978
	if (strncmp(data, "select ", 7))
		return false;
	data += 7;
979 980
	if (sscanf(data, "pid=%u", &pid) == 1 ||
	    (global_pid = true, sscanf(data, "global-pid=%u", &pid) == 1)) {
981
		struct task_struct *p;
982
		rcu_read_lock();
983
		read_lock(&tasklist_lock);
984 985 986 987
		if (global_pid)
			p = find_task_by_pid_ns(pid, &init_pid_ns);
		else
			p = find_task_by_vpid(pid);
988 989 990
		if (p)
			domain = tomoyo_real_domain(p);
		read_unlock(&tasklist_lock);
991
		rcu_read_unlock();
992
	} else if (!strncmp(data, "domain=", 7)) {
T
Tetsuo Handa 已提交
993
		if (tomoyo_domain_def(data + 7))
994 995 996
			domain = tomoyo_find_domain(data + 7);
	} else
		return false;
T
Tetsuo Handa 已提交
997
	head->w.domain = domain;
998 999 1000
	/* Accessing read_buf is safe because head->io_sem is held. */
	if (!head->read_buf)
		return true; /* Do nothing if open(O_WRONLY). */
1001 1002
	memset(&head->r, 0, sizeof(head->r));
	head->r.print_this_domain_only = true;
1003 1004 1005 1006
	if (domain)
		head->r.domain = &domain->list;
	else
		head->r.eof = 1;
1007
	tomoyo_io_printf(head, "# select %s\n", data);
T
Tetsuo Handa 已提交
1008 1009
	if (domain && domain->is_deleted)
		tomoyo_io_printf(head, "# This is a deleted domain.\n");
1010 1011 1012
	return true;
}

1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054
/**
 * tomoyo_same_task_acl - Check for duplicated "struct tomoyo_task_acl" entry.
 *
 * @a: Pointer to "struct tomoyo_acl_info".
 * @b: Pointer to "struct tomoyo_acl_info".
 *
 * Returns true if @a == @b, false otherwise.
 */
static bool tomoyo_same_task_acl(const struct tomoyo_acl_info *a,
			      const struct tomoyo_acl_info *b)
{
	const struct tomoyo_task_acl *p1 = container_of(a, typeof(*p1), head);
	const struct tomoyo_task_acl *p2 = container_of(b, typeof(*p2), head);
	return p1->domainname == p2->domainname;
}

/**
 * tomoyo_write_task - Update task related list.
 *
 * @param: Pointer to "struct tomoyo_acl_param".
 *
 * Returns 0 on success, negative value otherwise.
 *
 * Caller holds tomoyo_read_lock().
 */
static int tomoyo_write_task(struct tomoyo_acl_param *param)
{
	int error = -EINVAL;
	if (tomoyo_str_starts(&param->data, "manual_domain_transition ")) {
		struct tomoyo_task_acl e = {
			.head.type = TOMOYO_TYPE_MANUAL_TASK_ACL,
			.domainname = tomoyo_get_domainname(param),
		};
		if (e.domainname)
			error = tomoyo_update_domain(&e.head, sizeof(e), param,
						     tomoyo_same_task_acl,
						     NULL);
		tomoyo_put_name(e.domainname);
	}
	return error;
}

1055 1056 1057 1058 1059 1060
/**
 * tomoyo_delete_domain - Delete a domain.
 *
 * @domainname: The name of domain.
 *
 * Returns 0.
1061 1062
 *
 * Caller holds tomoyo_read_lock().
1063 1064 1065 1066 1067 1068 1069 1070
 */
static int tomoyo_delete_domain(char *domainname)
{
	struct tomoyo_domain_info *domain;
	struct tomoyo_path_info name;

	name.name = domainname;
	tomoyo_fill_path_info(&name);
1071 1072
	if (mutex_lock_interruptible(&tomoyo_policy_lock))
		return 0;
1073
	/* Is there an active domain? */
1074
	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
1075 1076 1077 1078 1079 1080 1081 1082 1083
		/* Never delete tomoyo_kernel_domain */
		if (domain == &tomoyo_kernel_domain)
			continue;
		if (domain->is_deleted ||
		    tomoyo_pathcmp(domain->domainname, &name))
			continue;
		domain->is_deleted = true;
		break;
	}
1084
	mutex_unlock(&tomoyo_policy_lock);
1085 1086 1087
	return 0;
}

1088
/**
T
Tetsuo Handa 已提交
1089
 * tomoyo_write_domain2 - Write domain policy.
1090
 *
1091
 * @ns:        Pointer to "struct tomoyo_policy_namespace".
1092 1093 1094
 * @list:      Pointer to "struct list_head".
 * @data:      Policy to be interpreted.
 * @is_delete: True if it is a delete request.
1095 1096 1097 1098 1099
 *
 * Returns 0 on success, negative value otherwise.
 *
 * Caller holds tomoyo_read_lock().
 */
1100 1101
static int tomoyo_write_domain2(struct tomoyo_policy_namespace *ns,
				struct list_head *list, char *data,
T
Tetsuo Handa 已提交
1102
				const bool is_delete)
1103
{
1104
	struct tomoyo_acl_param param = {
1105
		.ns = ns,
1106 1107 1108 1109 1110 1111 1112
		.list = list,
		.data = data,
		.is_delete = is_delete,
	};
	static const struct {
		const char *keyword;
		int (*write) (struct tomoyo_acl_param *);
1113
	} tomoyo_callback[5] = {
1114
		{ "file ", tomoyo_write_file },
1115 1116
		{ "network inet ", tomoyo_write_inet_network },
		{ "network unix ", tomoyo_write_unix_network },
1117
		{ "misc ", tomoyo_write_misc },
1118
		{ "task ", tomoyo_write_task },
1119 1120
	};
	u8 i;
1121 1122

	for (i = 0; i < ARRAY_SIZE(tomoyo_callback); i++) {
1123 1124 1125 1126 1127 1128
		if (!tomoyo_str_starts(&param.data,
				       tomoyo_callback[i].keyword))
			continue;
		return tomoyo_callback[i].write(&param);
	}
	return -EINVAL;
1129 1130
}

T
Tetsuo Handa 已提交
1131 1132 1133 1134 1135 1136
/* String table for domain flags. */
const char * const tomoyo_dif[TOMOYO_MAX_DOMAIN_INFO_FLAGS] = {
	[TOMOYO_DIF_QUOTA_WARNED]      = "quota_exceeded\n",
	[TOMOYO_DIF_TRANSITION_FAILED] = "transition_failed\n",
};

1137
/**
T
Tetsuo Handa 已提交
1138
 * tomoyo_write_domain - Write domain policy.
1139 1140 1141 1142
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0 on success, negative value otherwise.
1143 1144
 *
 * Caller holds tomoyo_read_lock().
1145
 */
T
Tetsuo Handa 已提交
1146
static int tomoyo_write_domain(struct tomoyo_io_buffer *head)
1147 1148
{
	char *data = head->write_buf;
1149
	struct tomoyo_policy_namespace *ns;
T
Tetsuo Handa 已提交
1150
	struct tomoyo_domain_info *domain = head->w.domain;
1151 1152
	const bool is_delete = head->w.is_delete;
	bool is_select = !is_delete && tomoyo_str_starts(&data, "select ");
1153
	unsigned int profile;
1154
	if (*data == '<') {
1155 1156 1157
		domain = NULL;
		if (is_delete)
			tomoyo_delete_domain(data);
1158
		else if (is_select)
1159
			domain = tomoyo_find_domain(data);
1160
		else
1161
			domain = tomoyo_assign_domain(data, false);
T
Tetsuo Handa 已提交
1162
		head->w.domain = domain;
1163 1164 1165 1166
		return 0;
	}
	if (!domain)
		return -EINVAL;
1167
	ns = domain->ns;
T
Tetsuo Handa 已提交
1168
	if (sscanf(data, "use_profile %u", &profile) == 1
1169
	    && profile < TOMOYO_MAX_PROFILES) {
1170
		if (!tomoyo_policy_loaded || ns->profile_ptr[profile])
1171 1172 1173
			domain->profile = (u8) profile;
		return 0;
	}
T
Tetsuo Handa 已提交
1174 1175 1176 1177 1178 1179
	if (sscanf(data, "use_group %u\n", &profile) == 1
	    && profile < TOMOYO_MAX_ACL_GROUPS) {
		if (!is_delete)
			domain->group = (u8) profile;
		return 0;
	}
T
Tetsuo Handa 已提交
1180 1181 1182 1183 1184
	for (profile = 0; profile < TOMOYO_MAX_DOMAIN_INFO_FLAGS; profile++) {
		const char *cp = tomoyo_dif[profile];
		if (strncmp(data, cp, strlen(cp) - 1))
			continue;
		domain->flags[profile] = !is_delete;
1185 1186
		return 0;
	}
1187 1188
	return tomoyo_write_domain2(ns, &domain->acl_info_list, data,
				    is_delete);
1189 1190
}

1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205
/**
 * tomoyo_print_condition - Print condition part.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @cond: Pointer to "struct tomoyo_condition".
 *
 * Returns true on success, false otherwise.
 */
static bool tomoyo_print_condition(struct tomoyo_io_buffer *head,
				   const struct tomoyo_condition *cond)
{
	switch (head->r.cond_step) {
	case 0:
		head->r.cond_index = 0;
		head->r.cond_step++;
1206 1207 1208 1209
		if (cond->transit) {
			tomoyo_set_space(head);
			tomoyo_set_string(head, cond->transit->name);
		}
1210 1211 1212 1213 1214 1215 1216 1217
		/* fall through */
	case 1:
		{
			const u16 condc = cond->condc;
			const struct tomoyo_condition_element *condp =
				(typeof(condp)) (cond + 1);
			const struct tomoyo_number_union *numbers_p =
				(typeof(numbers_p)) (condp + condc);
1218 1219 1220
			const struct tomoyo_name_union *names_p =
				(typeof(names_p))
				(numbers_p + cond->numbers_count);
1221 1222 1223 1224
			const struct tomoyo_argv *argv =
				(typeof(argv)) (names_p + cond->names_count);
			const struct tomoyo_envp *envp =
				(typeof(envp)) (argv + cond->argc);
1225 1226 1227 1228 1229 1230
			u16 skip;
			for (skip = 0; skip < head->r.cond_index; skip++) {
				const u8 left = condp->left;
				const u8 right = condp->right;
				condp++;
				switch (left) {
1231 1232 1233 1234 1235 1236
				case TOMOYO_ARGV_ENTRY:
					argv++;
					continue;
				case TOMOYO_ENVP_ENTRY:
					envp++;
					continue;
1237 1238 1239 1240 1241
				case TOMOYO_NUMBER_UNION:
					numbers_p++;
					break;
				}
				switch (right) {
1242 1243 1244
				case TOMOYO_NAME_UNION:
					names_p++;
					break;
1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259
				case TOMOYO_NUMBER_UNION:
					numbers_p++;
					break;
				}
			}
			while (head->r.cond_index < condc) {
				const u8 match = condp->equals;
				const u8 left = condp->left;
				const u8 right = condp->right;
				if (!tomoyo_flush(head))
					return false;
				condp++;
				head->r.cond_index++;
				tomoyo_set_space(head);
				switch (left) {
1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287
				case TOMOYO_ARGV_ENTRY:
					tomoyo_io_printf(head,
							 "exec.argv[%lu]%s=\"",
							 argv->index, argv->
							 is_not ? "!" : "");
					tomoyo_set_string(head,
							  argv->value->name);
					tomoyo_set_string(head, "\"");
					argv++;
					continue;
				case TOMOYO_ENVP_ENTRY:
					tomoyo_set_string(head,
							  "exec.envp[\"");
					tomoyo_set_string(head,
							  envp->name->name);
					tomoyo_io_printf(head, "\"]%s=", envp->
							 is_not ? "!" : "");
					if (envp->value) {
						tomoyo_set_string(head, "\"");
						tomoyo_set_string(head, envp->
								  value->name);
						tomoyo_set_string(head, "\"");
					} else {
						tomoyo_set_string(head,
								  "NULL");
					}
					envp++;
					continue;
1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298
				case TOMOYO_NUMBER_UNION:
					tomoyo_print_number_union_nospace
						(head, numbers_p++);
					break;
				default:
					tomoyo_set_string(head,
					       tomoyo_condition_keyword[left]);
					break;
				}
				tomoyo_set_string(head, match ? "=" : "!=");
				switch (right) {
1299 1300 1301 1302
				case TOMOYO_NAME_UNION:
					tomoyo_print_name_union_quoted
						(head, names_p++);
					break;
1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321
				case TOMOYO_NUMBER_UNION:
					tomoyo_print_number_union_nospace
						(head, numbers_p++);
					break;
				default:
					tomoyo_set_string(head,
					  tomoyo_condition_keyword[right]);
					break;
				}
			}
		}
		head->r.cond_step++;
		/* fall through */
	case 2:
		if (!tomoyo_flush(head))
			break;
		head->r.cond_step++;
		/* fall through */
	case 3:
1322 1323 1324 1325
		if (cond->grant_log != TOMOYO_GRANTLOG_AUTO)
			tomoyo_io_printf(head, " grant_log=%s",
					 tomoyo_yesno(cond->grant_log ==
						      TOMOYO_GRANTLOG_YES));
1326 1327 1328 1329 1330 1331
		tomoyo_set_lf(head);
		return true;
	}
	return false;
}

1332
/**
T
Tetsuo Handa 已提交
1333
 * tomoyo_set_group - Print "acl_group " header keyword and category name.
1334
 *
T
Tetsuo Handa 已提交
1335 1336
 * @head:     Pointer to "struct tomoyo_io_buffer".
 * @category: Category name.
1337
 *
T
Tetsuo Handa 已提交
1338
 * Returns nothing.
1339
 */
T
Tetsuo Handa 已提交
1340 1341
static void tomoyo_set_group(struct tomoyo_io_buffer *head,
			     const char *category)
1342
{
1343 1344
	if (head->type == TOMOYO_EXCEPTIONPOLICY) {
		tomoyo_print_namespace(head);
T
Tetsuo Handa 已提交
1345 1346
		tomoyo_io_printf(head, "acl_group %u ",
				 head->r.acl_group_index);
1347
	}
T
Tetsuo Handa 已提交
1348
	tomoyo_set_string(head, category);
1349 1350 1351
}

/**
1352
 * tomoyo_print_entry - Print an ACL entry.
1353 1354
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
1355
 * @acl:  Pointer to an ACL entry.
1356 1357 1358
 *
 * Returns true on success, false otherwise.
 */
1359 1360
static bool tomoyo_print_entry(struct tomoyo_io_buffer *head,
			       struct tomoyo_acl_info *acl)
1361
{
1362
	const u8 acl_type = acl->type;
T
Tetsuo Handa 已提交
1363
	bool first = true;
1364
	u8 bit;
1365

1366 1367
	if (head->r.print_cond_part)
		goto print_cond_part;
1368 1369
	if (acl->is_deleted)
		return true;
1370 1371 1372
	if (!tomoyo_flush(head))
		return false;
	else if (acl_type == TOMOYO_TYPE_PATH_ACL) {
1373 1374 1375
		struct tomoyo_path_acl *ptr =
			container_of(acl, typeof(*ptr), head);
		const u16 perm = ptr->perm;
T
Tetsuo Handa 已提交
1376
		for (bit = 0; bit < TOMOYO_MAX_PATH_OPERATION; bit++) {
1377 1378
			if (!(perm & (1 << bit)))
				continue;
1379
			if (head->r.print_transition_related_only &&
1380 1381
			    bit != TOMOYO_TYPE_EXECUTE)
				continue;
T
Tetsuo Handa 已提交
1382 1383 1384 1385 1386 1387 1388
			if (first) {
				tomoyo_set_group(head, "file ");
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_path_keyword[bit]);
1389
		}
T
Tetsuo Handa 已提交
1390 1391
		if (first)
			return true;
1392
		tomoyo_print_name_union(head, &ptr->name);
1393 1394 1395 1396 1397 1398
	} else if (acl_type == TOMOYO_TYPE_MANUAL_TASK_ACL) {
		struct tomoyo_task_acl *ptr =
			container_of(acl, typeof(*ptr), head);
		tomoyo_set_group(head, "task ");
		tomoyo_set_string(head, "manual_domain_transition ");
		tomoyo_set_string(head, ptr->domainname->name);
1399
	} else if (head->r.print_transition_related_only) {
1400 1401 1402 1403
		return true;
	} else if (acl_type == TOMOYO_TYPE_PATH2_ACL) {
		struct tomoyo_path2_acl *ptr =
			container_of(acl, typeof(*ptr), head);
T
Tetsuo Handa 已提交
1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418
		const u8 perm = ptr->perm;
		for (bit = 0; bit < TOMOYO_MAX_PATH2_OPERATION; bit++) {
			if (!(perm & (1 << bit)))
				continue;
			if (first) {
				tomoyo_set_group(head, "file ");
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_mac_keywords
					  [tomoyo_pp2mac[bit]]);
		}
		if (first)
			return true;
1419 1420
		tomoyo_print_name_union(head, &ptr->name1);
		tomoyo_print_name_union(head, &ptr->name2);
1421 1422 1423
	} else if (acl_type == TOMOYO_TYPE_PATH_NUMBER_ACL) {
		struct tomoyo_path_number_acl *ptr =
			container_of(acl, typeof(*ptr), head);
T
Tetsuo Handa 已提交
1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438
		const u8 perm = ptr->perm;
		for (bit = 0; bit < TOMOYO_MAX_PATH_NUMBER_OPERATION; bit++) {
			if (!(perm & (1 << bit)))
				continue;
			if (first) {
				tomoyo_set_group(head, "file ");
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_mac_keywords
					  [tomoyo_pn2mac[bit]]);
		}
		if (first)
			return true;
1439 1440
		tomoyo_print_name_union(head, &ptr->name);
		tomoyo_print_number_union(head, &ptr->number);
1441 1442 1443
	} else if (acl_type == TOMOYO_TYPE_MKDEV_ACL) {
		struct tomoyo_mkdev_acl *ptr =
			container_of(acl, typeof(*ptr), head);
T
Tetsuo Handa 已提交
1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458
		const u8 perm = ptr->perm;
		for (bit = 0; bit < TOMOYO_MAX_MKDEV_OPERATION; bit++) {
			if (!(perm & (1 << bit)))
				continue;
			if (first) {
				tomoyo_set_group(head, "file ");
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_mac_keywords
					  [tomoyo_pnnn2mac[bit]]);
		}
		if (first)
			return true;
1459 1460 1461 1462
		tomoyo_print_name_union(head, &ptr->name);
		tomoyo_print_number_union(head, &ptr->mode);
		tomoyo_print_number_union(head, &ptr->major);
		tomoyo_print_number_union(head, &ptr->minor);
1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516
	} else if (acl_type == TOMOYO_TYPE_INET_ACL) {
		struct tomoyo_inet_acl *ptr =
			container_of(acl, typeof(*ptr), head);
		const u8 perm = ptr->perm;

		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
			if (!(perm & (1 << bit)))
				continue;
			if (first) {
				tomoyo_set_group(head, "network inet ");
				tomoyo_set_string(head, tomoyo_proto_keyword
						  [ptr->protocol]);
				tomoyo_set_space(head);
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
		}
		if (first)
			return true;
		tomoyo_set_space(head);
		if (ptr->address.group) {
			tomoyo_set_string(head, "@");
			tomoyo_set_string(head, ptr->address.group->group_name
					  ->name);
		} else {
			char buf[128];
			tomoyo_print_ip(buf, sizeof(buf), &ptr->address);
			tomoyo_io_printf(head, "%s", buf);
		}
		tomoyo_print_number_union(head, &ptr->port);
	} else if (acl_type == TOMOYO_TYPE_UNIX_ACL) {
		struct tomoyo_unix_acl *ptr =
			container_of(acl, typeof(*ptr), head);
		const u8 perm = ptr->perm;

		for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) {
			if (!(perm & (1 << bit)))
				continue;
			if (first) {
				tomoyo_set_group(head, "network unix ");
				tomoyo_set_string(head, tomoyo_proto_keyword
						  [ptr->protocol]);
				tomoyo_set_space(head);
				first = false;
			} else {
				tomoyo_set_slash(head);
			}
			tomoyo_set_string(head, tomoyo_socket_keyword[bit]);
		}
		if (first)
			return true;
		tomoyo_print_name_union(head, &ptr->name);
1517 1518 1519
	} else if (acl_type == TOMOYO_TYPE_MOUNT_ACL) {
		struct tomoyo_mount_acl *ptr =
			container_of(acl, typeof(*ptr), head);
T
Tetsuo Handa 已提交
1520
		tomoyo_set_group(head, "file mount");
1521 1522 1523 1524
		tomoyo_print_name_union(head, &ptr->dev_name);
		tomoyo_print_name_union(head, &ptr->dir_name);
		tomoyo_print_name_union(head, &ptr->fs_type);
		tomoyo_print_number_union(head, &ptr->flags);
1525 1526 1527 1528 1529 1530
	} else if (acl_type == TOMOYO_TYPE_ENV_ACL) {
		struct tomoyo_env_acl *ptr =
			container_of(acl, typeof(*ptr), head);

		tomoyo_set_group(head, "misc env ");
		tomoyo_set_string(head, ptr->env->name);
1531
	}
1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543
	if (acl->cond) {
		head->r.print_cond_part = true;
		head->r.cond_step = 0;
		if (!tomoyo_flush(head))
			return false;
print_cond_part:
		if (!tomoyo_print_condition(head, acl->cond))
			return false;
		head->r.print_cond_part = false;
	} else {
		tomoyo_set_lf(head);
	}
1544 1545 1546 1547 1548 1549
	return true;
}

/**
 * tomoyo_read_domain2 - Read domain policy.
 *
T
Tetsuo Handa 已提交
1550 1551
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @list: Pointer to "struct list_head".
1552 1553 1554 1555 1556 1557
 *
 * Caller holds tomoyo_read_lock().
 *
 * Returns true on success, false otherwise.
 */
static bool tomoyo_read_domain2(struct tomoyo_io_buffer *head,
T
Tetsuo Handa 已提交
1558
				struct list_head *list)
1559
{
T
Tetsuo Handa 已提交
1560
	list_for_each_cookie(head->r.acl, list) {
1561 1562 1563 1564 1565 1566
		struct tomoyo_acl_info *ptr =
			list_entry(head->r.acl, typeof(*ptr), list);
		if (!tomoyo_print_entry(head, ptr))
			return false;
	}
	head->r.acl = NULL;
1567 1568 1569
	return true;
}

1570
/**
T
Tetsuo Handa 已提交
1571
 * tomoyo_read_domain - Read domain policy.
1572 1573 1574
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
1575
 * Caller holds tomoyo_read_lock().
1576
 */
T
Tetsuo Handa 已提交
1577
static void tomoyo_read_domain(struct tomoyo_io_buffer *head)
1578
{
1579
	if (head->r.eof)
1580
		return;
1581
	list_for_each_cookie(head->r.domain, &tomoyo_domain_list) {
T
Tetsuo Handa 已提交
1582
		struct tomoyo_domain_info *domain =
1583 1584
			list_entry(head->r.domain, typeof(*domain), list);
		switch (head->r.step) {
T
Tetsuo Handa 已提交
1585
			u8 i;
1586 1587 1588 1589 1590 1591 1592
		case 0:
			if (domain->is_deleted &&
			    !head->r.print_this_domain_only)
				continue;
			/* Print domainname and flags. */
			tomoyo_set_string(head, domain->domainname->name);
			tomoyo_set_lf(head);
T
Tetsuo Handa 已提交
1593
			tomoyo_io_printf(head, "use_profile %u\n",
1594
					 domain->profile);
T
Tetsuo Handa 已提交
1595 1596
			tomoyo_io_printf(head, "use_group %u\n",
					 domain->group);
T
Tetsuo Handa 已提交
1597 1598 1599
			for (i = 0; i < TOMOYO_MAX_DOMAIN_INFO_FLAGS; i++)
				if (domain->flags[i])
					tomoyo_set_string(head, tomoyo_dif[i]);
1600 1601 1602 1603
			head->r.step++;
			tomoyo_set_lf(head);
			/* fall through */
		case 1:
T
Tetsuo Handa 已提交
1604
			if (!tomoyo_read_domain2(head, &domain->acl_info_list))
1605 1606 1607 1608 1609 1610 1611 1612 1613
				return;
			head->r.step++;
			if (!tomoyo_set_lf(head))
				return;
			/* fall through */
		case 2:
			head->r.step = 0;
			if (head->r.print_this_domain_only)
				goto done;
1614 1615
		}
	}
1616 1617
 done:
	head->r.eof = true;
1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628
}

/**
 * tomoyo_write_pid: Specify PID to obtain domainname.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0.
 */
static int tomoyo_write_pid(struct tomoyo_io_buffer *head)
{
1629
	head->r.eof = false;
1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642
	return 0;
}

/**
 * tomoyo_read_pid - Get domainname of the specified PID.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns the domainname which the specified PID is in on success,
 * empty string otherwise.
 * The PID is specified by tomoyo_write_pid() so that the user can obtain
 * using read()/write() interface rather than sysctl() interface.
 */
1643
static void tomoyo_read_pid(struct tomoyo_io_buffer *head)
1644
{
1645 1646 1647 1648 1649 1650 1651 1652 1653 1654
	char *buf = head->write_buf;
	bool global_pid = false;
	unsigned int pid;
	struct task_struct *p;
	struct tomoyo_domain_info *domain = NULL;

	/* Accessing write_buf is safe because head->io_sem is held. */
	if (!buf) {
		head->r.eof = true;
		return; /* Do nothing if open(O_RDONLY). */
1655
	}
1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675
	if (head->r.w_pos || head->r.eof)
		return;
	head->r.eof = true;
	if (tomoyo_str_starts(&buf, "global-pid "))
		global_pid = true;
	pid = (unsigned int) simple_strtoul(buf, NULL, 10);
	rcu_read_lock();
	read_lock(&tasklist_lock);
	if (global_pid)
		p = find_task_by_pid_ns(pid, &init_pid_ns);
	else
		p = find_task_by_vpid(pid);
	if (p)
		domain = tomoyo_real_domain(p);
	read_unlock(&tasklist_lock);
	rcu_read_unlock();
	if (!domain)
		return;
	tomoyo_io_printf(head, "%u %u ", pid, domain->profile);
	tomoyo_set_string(head, domain->domainname->name);
1676 1677
}

T
Tetsuo Handa 已提交
1678
/* String table for domain transition control keywords. */
1679
static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = {
1680 1681 1682 1683 1684 1685
	[TOMOYO_TRANSITION_CONTROL_NO_RESET]      = "no_reset_domain ",
	[TOMOYO_TRANSITION_CONTROL_RESET]         = "reset_domain ",
	[TOMOYO_TRANSITION_CONTROL_NO_INITIALIZE] = "no_initialize_domain ",
	[TOMOYO_TRANSITION_CONTROL_INITIALIZE]    = "initialize_domain ",
	[TOMOYO_TRANSITION_CONTROL_NO_KEEP]       = "no_keep_domain ",
	[TOMOYO_TRANSITION_CONTROL_KEEP]          = "keep_domain ",
1686 1687
};

T
Tetsuo Handa 已提交
1688
/* String table for grouping keywords. */
T
Tetsuo Handa 已提交
1689
static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = {
1690 1691 1692
	[TOMOYO_PATH_GROUP]    = "path_group ",
	[TOMOYO_NUMBER_GROUP]  = "number_group ",
	[TOMOYO_ADDRESS_GROUP] = "address_group ",
T
Tetsuo Handa 已提交
1693 1694
};

1695
/**
T
Tetsuo Handa 已提交
1696
 * tomoyo_write_exception - Write exception policy.
1697 1698 1699 1700
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0 on success, negative value otherwise.
1701 1702
 *
 * Caller holds tomoyo_read_lock().
1703
 */
T
Tetsuo Handa 已提交
1704
static int tomoyo_write_exception(struct tomoyo_io_buffer *head)
1705
{
1706
	const bool is_delete = head->w.is_delete;
1707
	struct tomoyo_acl_param param = {
1708 1709
		.ns = head->w.ns,
		.is_delete = is_delete,
1710
		.data = head->write_buf,
T
Tetsuo Handa 已提交
1711
	};
1712 1713 1714
	u8 i;
	if (tomoyo_str_starts(&param.data, "aggregator "))
		return tomoyo_write_aggregator(&param);
T
Tetsuo Handa 已提交
1715
	for (i = 0; i < TOMOYO_MAX_TRANSITION_TYPE; i++)
1716 1717
		if (tomoyo_str_starts(&param.data, tomoyo_transition_type[i]))
			return tomoyo_write_transition_control(&param, i);
T
Tetsuo Handa 已提交
1718
	for (i = 0; i < TOMOYO_MAX_GROUP; i++)
1719 1720
		if (tomoyo_str_starts(&param.data, tomoyo_group_name[i]))
			return tomoyo_write_group(&param, i);
T
Tetsuo Handa 已提交
1721 1722 1723 1724 1725
	if (tomoyo_str_starts(&param.data, "acl_group ")) {
		unsigned int group;
		char *data;
		group = simple_strtoul(param.data, &data, 10);
		if (group < TOMOYO_MAX_ACL_GROUPS && *data++ == ' ')
1726 1727 1728
			return tomoyo_write_domain2
				(head->w.ns, &head->w.ns->acl_group[group],
				 data, is_delete);
T
Tetsuo Handa 已提交
1729
	}
1730 1731 1732 1733
	return -EINVAL;
}

/**
1734
 * tomoyo_read_group - Read "struct tomoyo_path_group"/"struct tomoyo_number_group"/"struct tomoyo_address_group" list.
1735 1736
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
1737 1738 1739
 * @idx:  Index number.
 *
 * Returns true on success, false otherwise.
1740
 *
1741
 * Caller holds tomoyo_read_lock().
1742
 */
1743
static bool tomoyo_read_group(struct tomoyo_io_buffer *head, const int idx)
1744
{
1745 1746 1747 1748
	struct tomoyo_policy_namespace *ns =
		container_of(head->r.ns, typeof(*ns), namespace_list);
	struct list_head *list = &ns->group_list[idx];
	list_for_each_cookie(head->r.group, list) {
1749
		struct tomoyo_group *group =
T
Tetsuo Handa 已提交
1750
			list_entry(head->r.group, typeof(*group), head.list);
1751
		list_for_each_cookie(head->r.acl, &group->member_list) {
1752
			struct tomoyo_acl_head *ptr =
1753
				list_entry(head->r.acl, typeof(*ptr), list);
1754 1755
			if (ptr->is_deleted)
				continue;
1756 1757
			if (!tomoyo_flush(head))
				return false;
1758
			tomoyo_print_namespace(head);
1759 1760
			tomoyo_set_string(head, tomoyo_group_name[idx]);
			tomoyo_set_string(head, group->group_name->name);
1761
			if (idx == TOMOYO_PATH_GROUP) {
1762 1763 1764 1765
				tomoyo_set_space(head);
				tomoyo_set_string(head, container_of
					       (ptr, struct tomoyo_path_group,
						head)->member_name->name);
1766
			} else if (idx == TOMOYO_NUMBER_GROUP) {
1767 1768 1769 1770
				tomoyo_print_number_union(head, &container_of
							  (ptr,
						   struct tomoyo_number_group,
							   head)->number);
1771 1772 1773 1774 1775 1776 1777 1778 1779
			} else if (idx == TOMOYO_ADDRESS_GROUP) {
				char buffer[128];

				struct tomoyo_address_group *member =
					container_of(ptr, typeof(*member),
						     head);
				tomoyo_print_ip(buffer, sizeof(buffer),
						&member->address);
				tomoyo_io_printf(head, " %s", buffer);
1780
			}
1781
			tomoyo_set_lf(head);
1782
		}
1783
		head->r.acl = NULL;
1784
	}
1785
	head->r.group = NULL;
1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800
	return true;
}

/**
 * tomoyo_read_policy - Read "struct tomoyo_..._entry" list.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 * @idx:  Index number.
 *
 * Returns true on success, false otherwise.
 *
 * Caller holds tomoyo_read_lock().
 */
static bool tomoyo_read_policy(struct tomoyo_io_buffer *head, const int idx)
{
1801 1802 1803 1804
	struct tomoyo_policy_namespace *ns =
		container_of(head->r.ns, typeof(*ns), namespace_list);
	struct list_head *list = &ns->policy_list[idx];
	list_for_each_cookie(head->r.acl, list) {
T
Tetsuo Handa 已提交
1805
		struct tomoyo_acl_head *acl =
1806
			container_of(head->r.acl, typeof(*acl), list);
1807 1808
		if (acl->is_deleted)
			continue;
1809 1810
		if (!tomoyo_flush(head))
			return false;
1811
		switch (idx) {
1812
		case TOMOYO_ID_TRANSITION_CONTROL:
1813
			{
1814
				struct tomoyo_transition_control *ptr =
1815
					container_of(acl, typeof(*ptr), head);
1816
				tomoyo_print_namespace(head);
T
Tetsuo Handa 已提交
1817
				tomoyo_set_string(head, tomoyo_transition_type
1818
						  [ptr->type]);
T
Tetsuo Handa 已提交
1819 1820 1821 1822 1823 1824
				tomoyo_set_string(head, ptr->program ?
						  ptr->program->name : "any");
				tomoyo_set_string(head, " from ");
				tomoyo_set_string(head, ptr->domainname ?
						  ptr->domainname->name :
						  "any");
1825 1826 1827 1828
			}
			break;
		case TOMOYO_ID_AGGREGATOR:
			{
T
Tetsuo Handa 已提交
1829
				struct tomoyo_aggregator *ptr =
1830
					container_of(acl, typeof(*ptr), head);
1831
				tomoyo_print_namespace(head);
T
Tetsuo Handa 已提交
1832
				tomoyo_set_string(head, "aggregator ");
1833 1834 1835 1836 1837
				tomoyo_set_string(head,
						  ptr->original_name->name);
				tomoyo_set_space(head);
				tomoyo_set_string(head,
					       ptr->aggregated_name->name);
1838 1839 1840 1841
			}
			break;
		default:
			continue;
1842
		}
1843
		tomoyo_set_lf(head);
1844
	}
1845
	head->r.acl = NULL;
1846 1847 1848 1849
	return true;
}

/**
T
Tetsuo Handa 已提交
1850
 * tomoyo_read_exception - Read exception policy.
1851 1852 1853 1854 1855
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Caller holds tomoyo_read_lock().
 */
T
Tetsuo Handa 已提交
1856
static void tomoyo_read_exception(struct tomoyo_io_buffer *head)
1857
{
1858 1859
	struct tomoyo_policy_namespace *ns =
		container_of(head->r.ns, typeof(*ns), namespace_list);
1860
	if (head->r.eof)
1861
		return;
1862 1863 1864 1865
	while (head->r.step < TOMOYO_MAX_POLICY &&
	       tomoyo_read_policy(head, head->r.step))
		head->r.step++;
	if (head->r.step < TOMOYO_MAX_POLICY)
1866
		return;
1867 1868 1869 1870
	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP &&
	       tomoyo_read_group(head, head->r.step - TOMOYO_MAX_POLICY))
		head->r.step++;
	if (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP)
1871
		return;
T
Tetsuo Handa 已提交
1872 1873 1874 1875
	while (head->r.step < TOMOYO_MAX_POLICY + TOMOYO_MAX_GROUP
	       + TOMOYO_MAX_ACL_GROUPS) {
		head->r.acl_group_index = head->r.step - TOMOYO_MAX_POLICY
			- TOMOYO_MAX_GROUP;
1876
		if (!tomoyo_read_domain2(head, &ns->acl_group
T
Tetsuo Handa 已提交
1877 1878 1879 1880
					 [head->r.acl_group_index]))
			return;
		head->r.step++;
	}
1881
	head->r.eof = true;
1882 1883
}

T
Tetsuo Handa 已提交
1884
/* Wait queue for kernel -> userspace notification. */
1885
static DECLARE_WAIT_QUEUE_HEAD(tomoyo_query_wait);
T
Tetsuo Handa 已提交
1886 1887
/* Wait queue for userspace -> kernel notification. */
static DECLARE_WAIT_QUEUE_HEAD(tomoyo_answer_wait);
1888 1889

/* Structure for query. */
T
Tetsuo Handa 已提交
1890
struct tomoyo_query {
1891 1892
	struct list_head list;
	char *query;
T
Tetsuo Handa 已提交
1893
	size_t query_len;
1894
	unsigned int serial;
T
Tetsuo Handa 已提交
1895 1896 1897
	u8 timer;
	u8 answer;
	u8 retry;
1898 1899
};

T
Tetsuo Handa 已提交
1900
/* The list for "struct tomoyo_query". */
1901 1902
static LIST_HEAD(tomoyo_query_list);

T
Tetsuo Handa 已提交
1903 1904 1905
/* Lock for manipulating tomoyo_query_list. */
static DEFINE_SPINLOCK(tomoyo_query_list_lock);

1906 1907 1908 1909 1910 1911
/*
 * Number of "struct file" referring /sys/kernel/security/tomoyo/query
 * interface.
 */
static atomic_t tomoyo_query_observers = ATOMIC_INIT(0);

1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927
/**
 * tomoyo_truncate - Truncate a line.
 *
 * @str: String to truncate.
 *
 * Returns length of truncated @str.
 */
static int tomoyo_truncate(char *str)
{
	char *start = str;
	while (*(unsigned char *) str > (unsigned char) ' ')
		str++;
	*str = '\0';
	return strlen(start) + 1;
}

T
Tetsuo Handa 已提交
1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938
/**
 * tomoyo_add_entry - Add an ACL to current thread's domain. Used by learning mode.
 *
 * @domain: Pointer to "struct tomoyo_domain_info".
 * @header: Lines containing ACL.
 *
 * Returns nothing.
 */
static void tomoyo_add_entry(struct tomoyo_domain_info *domain, char *header)
{
	char *buffer;
1939
	char *realpath = NULL;
1940
	char *argv0 = NULL;
1941
	char *symlink = NULL;
T
Tetsuo Handa 已提交
1942 1943 1944 1945 1946 1947 1948 1949 1950
	char *cp = strchr(header, '\n');
	int len;
	if (!cp)
		return;
	cp = strchr(cp + 1, '\n');
	if (!cp)
		return;
	*cp++ = '\0';
	len = strlen(cp) + 1;
1951 1952
	/* strstr() will return NULL if ordering is wrong. */
	if (*cp == 'f') {
1953 1954 1955 1956 1957
		argv0 = strstr(header, " argv[]={ \"");
		if (argv0) {
			argv0 += 10;
			len += tomoyo_truncate(argv0) + 14;
		}
1958 1959 1960 1961 1962 1963 1964 1965 1966
		realpath = strstr(header, " exec={ realpath=\"");
		if (realpath) {
			realpath += 8;
			len += tomoyo_truncate(realpath) + 6;
		}
		symlink = strstr(header, " symlink.target=\"");
		if (symlink)
			len += tomoyo_truncate(symlink + 1) + 1;
	}
T
Tetsuo Handa 已提交
1967 1968 1969 1970
	buffer = kmalloc(len, GFP_NOFS);
	if (!buffer)
		return;
	snprintf(buffer, len - 1, "%s", cp);
1971 1972
	if (realpath)
		tomoyo_addprintf(buffer, len, " exec.%s", realpath);
1973 1974
	if (argv0)
		tomoyo_addprintf(buffer, len, " exec.argv[0]=%s", argv0);
1975 1976
	if (symlink)
		tomoyo_addprintf(buffer, len, "%s", symlink);
T
Tetsuo Handa 已提交
1977
	tomoyo_normalize_line(buffer);
1978 1979 1980
	if (!tomoyo_write_domain2(domain->ns, &domain->acl_info_list, buffer,
				  false))
		tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
T
Tetsuo Handa 已提交
1981 1982 1983
	kfree(buffer);
}

1984 1985 1986
/**
 * tomoyo_supervisor - Ask for the supervisor's decision.
 *
T
Tetsuo Handa 已提交
1987 1988
 * @r:   Pointer to "struct tomoyo_request_info".
 * @fmt: The printf()'s format string, followed by parameters.
1989 1990 1991 1992 1993 1994 1995 1996 1997
 *
 * Returns 0 if the supervisor decided to permit the access request which
 * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the
 * supervisor decided to retry the access request which violated the policy in
 * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise.
 */
int tomoyo_supervisor(struct tomoyo_request_info *r, const char *fmt, ...)
{
	va_list args;
T
Tetsuo Handa 已提交
1998
	int error;
1999 2000
	int len;
	static unsigned int tomoyo_serial;
T
Tetsuo Handa 已提交
2001
	struct tomoyo_query entry = { };
2002
	bool quota_exceeded = false;
T
Tetsuo Handa 已提交
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
	va_start(args, fmt);
	len = vsnprintf((char *) &len, 1, fmt, args) + 1;
	va_end(args);
	/* Write /sys/kernel/security/tomoyo/audit. */
	va_start(args, fmt);
	tomoyo_write_log2(r, len, fmt, args);
	va_end(args);
	/* Nothing more to do if granted. */
	if (r->granted)
		return 0;
2013 2014
	if (r->mode)
		tomoyo_update_stat(r->mode);
2015
	switch (r->mode) {
T
Tetsuo Handa 已提交
2016 2017 2018 2019 2020
	case TOMOYO_CONFIG_ENFORCING:
		error = -EPERM;
		if (atomic_read(&tomoyo_query_observers))
			break;
		goto out;
2021
	case TOMOYO_CONFIG_LEARNING:
T
Tetsuo Handa 已提交
2022 2023 2024 2025
		error = 0;
		/* Check max_learning_entry parameter. */
		if (tomoyo_domain_quota_is_ok(r))
			break;
2026
		/* fall through */
T
Tetsuo Handa 已提交
2027
	default:
2028 2029
		return 0;
	}
T
Tetsuo Handa 已提交
2030
	/* Get message. */
2031
	va_start(args, fmt);
T
Tetsuo Handa 已提交
2032
	entry.query = tomoyo_init_log(r, len, fmt, args);
2033
	va_end(args);
T
Tetsuo Handa 已提交
2034
	if (!entry.query)
2035
		goto out;
T
Tetsuo Handa 已提交
2036 2037 2038
	entry.query_len = strlen(entry.query) + 1;
	if (!error) {
		tomoyo_add_entry(r->domain, entry.query);
2039
		goto out;
T
Tetsuo Handa 已提交
2040 2041
	}
	len = tomoyo_round2(entry.query_len);
2042
	spin_lock(&tomoyo_query_list_lock);
T
Tetsuo Handa 已提交
2043 2044 2045
	if (tomoyo_memory_quota[TOMOYO_MEMORY_QUERY] &&
	    tomoyo_memory_used[TOMOYO_MEMORY_QUERY] + len
	    >= tomoyo_memory_quota[TOMOYO_MEMORY_QUERY]) {
2046 2047
		quota_exceeded = true;
	} else {
T
Tetsuo Handa 已提交
2048 2049 2050 2051
		entry.serial = tomoyo_serial++;
		entry.retry = r->retry;
		tomoyo_memory_used[TOMOYO_MEMORY_QUERY] += len;
		list_add_tail(&entry.list, &tomoyo_query_list);
2052 2053 2054 2055 2056
	}
	spin_unlock(&tomoyo_query_list_lock);
	if (quota_exceeded)
		goto out;
	/* Give 10 seconds for supervisor's opinion. */
T
Tetsuo Handa 已提交
2057 2058 2059 2060 2061
	while (entry.timer < 10) {
		wake_up_all(&tomoyo_query_wait);
		if (wait_event_interruptible_timeout
		    (tomoyo_answer_wait, entry.answer ||
		     !atomic_read(&tomoyo_query_observers), HZ))
2062
			break;
T
Tetsuo Handa 已提交
2063 2064
		else
			entry.timer++;
2065 2066
	}
	spin_lock(&tomoyo_query_list_lock);
T
Tetsuo Handa 已提交
2067 2068
	list_del(&entry.list);
	tomoyo_memory_used[TOMOYO_MEMORY_QUERY] -= len;
2069
	spin_unlock(&tomoyo_query_list_lock);
T
Tetsuo Handa 已提交
2070
	switch (entry.answer) {
2071 2072 2073 2074 2075 2076 2077 2078 2079
	case 3: /* Asked to retry by administrator. */
		error = TOMOYO_RETRY_REQUEST;
		r->retry++;
		break;
	case 1:
		/* Granted by administrator. */
		error = 0;
		break;
	default:
T
Tetsuo Handa 已提交
2080
		/* Timed out or rejected by administrator. */
2081 2082
		break;
	}
T
Tetsuo Handa 已提交
2083 2084
out:
	kfree(entry.query);
2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105
	return error;
}

/**
 * tomoyo_poll_query - poll() for /sys/kernel/security/tomoyo/query.
 *
 * @file: Pointer to "struct file".
 * @wait: Pointer to "poll_table".
 *
 * Returns POLLIN | POLLRDNORM when ready to read, 0 otherwise.
 *
 * Waits for access requests which violated policy in enforcing mode.
 */
static int tomoyo_poll_query(struct file *file, poll_table *wait)
{
	struct list_head *tmp;
	bool found = false;
	u8 i;
	for (i = 0; i < 2; i++) {
		spin_lock(&tomoyo_query_list_lock);
		list_for_each(tmp, &tomoyo_query_list) {
T
Tetsuo Handa 已提交
2106 2107
			struct tomoyo_query *ptr =
				list_entry(tmp, typeof(*ptr), list);
2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127
			if (ptr->answer)
				continue;
			found = true;
			break;
		}
		spin_unlock(&tomoyo_query_list_lock);
		if (found)
			return POLLIN | POLLRDNORM;
		if (i)
			break;
		poll_wait(file, &tomoyo_query_wait, wait);
	}
	return 0;
}

/**
 * tomoyo_read_query - Read access requests which violated policy in enforcing mode.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 */
2128
static void tomoyo_read_query(struct tomoyo_io_buffer *head)
2129 2130
{
	struct list_head *tmp;
T
Tetsuo Handa 已提交
2131 2132
	unsigned int pos = 0;
	size_t len = 0;
2133
	char *buf;
2134
	if (head->r.w_pos)
2135
		return;
2136 2137 2138 2139 2140 2141
	if (head->read_buf) {
		kfree(head->read_buf);
		head->read_buf = NULL;
	}
	spin_lock(&tomoyo_query_list_lock);
	list_for_each(tmp, &tomoyo_query_list) {
T
Tetsuo Handa 已提交
2142
		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
2143 2144
		if (ptr->answer)
			continue;
2145
		if (pos++ != head->r.query_index)
2146 2147 2148 2149 2150 2151
			continue;
		len = ptr->query_len;
		break;
	}
	spin_unlock(&tomoyo_query_list_lock);
	if (!len) {
2152
		head->r.query_index = 0;
2153
		return;
2154
	}
T
Tetsuo Handa 已提交
2155
	buf = kzalloc(len + 32, GFP_NOFS);
2156
	if (!buf)
2157
		return;
2158 2159 2160
	pos = 0;
	spin_lock(&tomoyo_query_list_lock);
	list_for_each(tmp, &tomoyo_query_list) {
T
Tetsuo Handa 已提交
2161
		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
2162 2163
		if (ptr->answer)
			continue;
2164
		if (pos++ != head->r.query_index)
2165 2166 2167 2168 2169 2170
			continue;
		/*
		 * Some query can be skipped because tomoyo_query_list
		 * can change, but I don't care.
		 */
		if (len == ptr->query_len)
T
Tetsuo Handa 已提交
2171 2172
			snprintf(buf, len + 31, "Q%u-%hu\n%s", ptr->serial,
				 ptr->retry, ptr->query);
2173 2174 2175 2176 2177
		break;
	}
	spin_unlock(&tomoyo_query_list_lock);
	if (buf[0]) {
		head->read_buf = buf;
2178 2179
		head->r.w[head->r.w_pos++] = buf;
		head->r.query_index++;
2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199
	} else {
		kfree(buf);
	}
}

/**
 * tomoyo_write_answer - Write the supervisor's decision.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0 on success, -EINVAL otherwise.
 */
static int tomoyo_write_answer(struct tomoyo_io_buffer *head)
{
	char *data = head->write_buf;
	struct list_head *tmp;
	unsigned int serial;
	unsigned int answer;
	spin_lock(&tomoyo_query_list_lock);
	list_for_each(tmp, &tomoyo_query_list) {
T
Tetsuo Handa 已提交
2200
		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
2201 2202 2203 2204 2205 2206 2207
		ptr->timer = 0;
	}
	spin_unlock(&tomoyo_query_list_lock);
	if (sscanf(data, "A%u=%u", &serial, &answer) != 2)
		return -EINVAL;
	spin_lock(&tomoyo_query_list_lock);
	list_for_each(tmp, &tomoyo_query_list) {
T
Tetsuo Handa 已提交
2208
		struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list);
2209 2210 2211 2212 2213 2214 2215 2216 2217 2218
		if (ptr->serial != serial)
			continue;
		if (!ptr->answer)
			ptr->answer = answer;
		break;
	}
	spin_unlock(&tomoyo_query_list_lock);
	return 0;
}

2219 2220 2221 2222 2223 2224 2225
/**
 * tomoyo_read_version: Get version.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns version information.
 */
2226
static void tomoyo_read_version(struct tomoyo_io_buffer *head)
2227
{
2228
	if (!head->r.eof) {
T
Tetsuo Handa 已提交
2229
		tomoyo_io_printf(head, "2.5.0");
2230
		head->r.eof = true;
2231 2232 2233
	}
}

2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331
/* String table for /sys/kernel/security/tomoyo/stat interface. */
static const char * const tomoyo_policy_headers[TOMOYO_MAX_POLICY_STAT] = {
	[TOMOYO_STAT_POLICY_UPDATES]    = "update:",
	[TOMOYO_STAT_POLICY_LEARNING]   = "violation in learning mode:",
	[TOMOYO_STAT_POLICY_PERMISSIVE] = "violation in permissive mode:",
	[TOMOYO_STAT_POLICY_ENFORCING]  = "violation in enforcing mode:",
};

/* String table for /sys/kernel/security/tomoyo/stat interface. */
static const char * const tomoyo_memory_headers[TOMOYO_MAX_MEMORY_STAT] = {
	[TOMOYO_MEMORY_POLICY] = "policy:",
	[TOMOYO_MEMORY_AUDIT]  = "audit log:",
	[TOMOYO_MEMORY_QUERY]  = "query message:",
};

/* Timestamp counter for last updated. */
static unsigned int tomoyo_stat_updated[TOMOYO_MAX_POLICY_STAT];
/* Counter for number of updates. */
static unsigned int tomoyo_stat_modified[TOMOYO_MAX_POLICY_STAT];

/**
 * tomoyo_update_stat - Update statistic counters.
 *
 * @index: Index for policy type.
 *
 * Returns nothing.
 */
void tomoyo_update_stat(const u8 index)
{
	struct timeval tv;
	do_gettimeofday(&tv);
	/*
	 * I don't use atomic operations because race condition is not fatal.
	 */
	tomoyo_stat_updated[index]++;
	tomoyo_stat_modified[index] = tv.tv_sec;
}

/**
 * tomoyo_read_stat - Read statistic data.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
static void tomoyo_read_stat(struct tomoyo_io_buffer *head)
{
	u8 i;
	unsigned int total = 0;
	if (head->r.eof)
		return;
	for (i = 0; i < TOMOYO_MAX_POLICY_STAT; i++) {
		tomoyo_io_printf(head, "Policy %-30s %10u",
				 tomoyo_policy_headers[i],
				 tomoyo_stat_updated[i]);
		if (tomoyo_stat_modified[i]) {
			struct tomoyo_time stamp;
			tomoyo_convert_time(tomoyo_stat_modified[i], &stamp);
			tomoyo_io_printf(head, " (Last: %04u/%02u/%02u "
					 "%02u:%02u:%02u)",
					 stamp.year, stamp.month, stamp.day,
					 stamp.hour, stamp.min, stamp.sec);
		}
		tomoyo_set_lf(head);
	}
	for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++) {
		unsigned int used = tomoyo_memory_used[i];
		total += used;
		tomoyo_io_printf(head, "Memory used by %-22s %10u",
				 tomoyo_memory_headers[i], used);
		used = tomoyo_memory_quota[i];
		if (used)
			tomoyo_io_printf(head, " (Quota: %10u)", used);
		tomoyo_set_lf(head);
	}
	tomoyo_io_printf(head, "Total memory used:                    %10u\n",
			 total);
	head->r.eof = true;
}

/**
 * tomoyo_write_stat - Set memory quota.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns 0.
 */
static int tomoyo_write_stat(struct tomoyo_io_buffer *head)
{
	char *data = head->write_buf;
	u8 i;
	if (tomoyo_str_starts(&data, "Memory used by "))
		for (i = 0; i < TOMOYO_MAX_MEMORY_STAT; i++)
			if (tomoyo_str_starts(&data, tomoyo_memory_headers[i]))
				sscanf(data, "%u", &tomoyo_memory_quota[i]);
	return 0;
}

2332 2333 2334 2335 2336 2337
/**
 * tomoyo_open_control - open() for /sys/kernel/security/tomoyo/ interface.
 *
 * @type: Type of interface.
 * @file: Pointer to "struct file".
 *
T
Tetsuo Handa 已提交
2338
 * Returns 0 on success, negative value otherwise.
2339
 */
2340
int tomoyo_open_control(const u8 type, struct file *file)
2341
{
2342
	struct tomoyo_io_buffer *head = kzalloc(sizeof(*head), GFP_NOFS);
2343 2344 2345 2346

	if (!head)
		return -ENOMEM;
	mutex_init(&head->io_sem);
2347
	head->type = type;
2348 2349 2350
	switch (type) {
	case TOMOYO_DOMAINPOLICY:
		/* /sys/kernel/security/tomoyo/domain_policy */
T
Tetsuo Handa 已提交
2351 2352
		head->write = tomoyo_write_domain;
		head->read = tomoyo_read_domain;
2353 2354 2355
		break;
	case TOMOYO_EXCEPTIONPOLICY:
		/* /sys/kernel/security/tomoyo/exception_policy */
T
Tetsuo Handa 已提交
2356 2357
		head->write = tomoyo_write_exception;
		head->read = tomoyo_read_exception;
2358
		break;
T
Tetsuo Handa 已提交
2359 2360 2361 2362 2363
	case TOMOYO_AUDIT:
		/* /sys/kernel/security/tomoyo/audit */
		head->poll = tomoyo_poll_log;
		head->read = tomoyo_read_log;
		break;
2364 2365 2366 2367 2368 2369 2370 2371 2372 2373
	case TOMOYO_PROCESS_STATUS:
		/* /sys/kernel/security/tomoyo/.process_status */
		head->write = tomoyo_write_pid;
		head->read = tomoyo_read_pid;
		break;
	case TOMOYO_VERSION:
		/* /sys/kernel/security/tomoyo/version */
		head->read = tomoyo_read_version;
		head->readbuf_size = 128;
		break;
2374 2375 2376 2377 2378
	case TOMOYO_STAT:
		/* /sys/kernel/security/tomoyo/stat */
		head->write = tomoyo_write_stat;
		head->read = tomoyo_read_stat;
		head->readbuf_size = 1024;
2379 2380 2381 2382 2383 2384
		break;
	case TOMOYO_PROFILE:
		/* /sys/kernel/security/tomoyo/profile */
		head->write = tomoyo_write_profile;
		head->read = tomoyo_read_profile;
		break;
2385 2386 2387 2388 2389
	case TOMOYO_QUERY: /* /sys/kernel/security/tomoyo/query */
		head->poll = tomoyo_poll_query;
		head->write = tomoyo_write_answer;
		head->read = tomoyo_read_query;
		break;
2390 2391
	case TOMOYO_MANAGER:
		/* /sys/kernel/security/tomoyo/manager */
T
Tetsuo Handa 已提交
2392 2393
		head->write = tomoyo_write_manager;
		head->read = tomoyo_read_manager;
2394 2395 2396 2397 2398 2399 2400 2401
		break;
	}
	if (!(file->f_mode & FMODE_READ)) {
		/*
		 * No need to allocate read_buf since it is not opened
		 * for reading.
		 */
		head->read = NULL;
2402 2403 2404
		head->poll = NULL;
	} else if (!head->poll) {
		/* Don't allocate read_buf for poll() access. */
2405 2406
		if (!head->readbuf_size)
			head->readbuf_size = 4096 * 2;
2407
		head->read_buf = kzalloc(head->readbuf_size, GFP_NOFS);
2408
		if (!head->read_buf) {
2409
			kfree(head);
2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420
			return -ENOMEM;
		}
	}
	if (!(file->f_mode & FMODE_WRITE)) {
		/*
		 * No need to allocate write_buf since it is not opened
		 * for writing.
		 */
		head->write = NULL;
	} else if (head->write) {
		head->writebuf_size = 4096 * 2;
2421
		head->write_buf = kzalloc(head->writebuf_size, GFP_NOFS);
2422
		if (!head->write_buf) {
2423 2424
			kfree(head->read_buf);
			kfree(head);
2425 2426 2427
			return -ENOMEM;
		}
	}
2428 2429 2430 2431 2432 2433
	/*
	 * If the file is /sys/kernel/security/tomoyo/query , increment the
	 * observer counter.
	 * The obserber counter is used by tomoyo_supervisor() to see if
	 * there is some process monitoring /sys/kernel/security/tomoyo/query.
	 */
T
Tetsuo Handa 已提交
2434
	if (type == TOMOYO_QUERY)
2435
		atomic_inc(&tomoyo_query_observers);
T
Tetsuo Handa 已提交
2436 2437
	file->private_data = head;
	tomoyo_notify_gc(head, true);
2438 2439 2440
	return 0;
}

T
Tetsuo Handa 已提交
2441 2442 2443 2444 2445 2446 2447
/**
 * tomoyo_poll_control - poll() for /sys/kernel/security/tomoyo/ interface.
 *
 * @file: Pointer to "struct file".
 * @wait: Pointer to "poll_table".
 *
 * Waits for read readiness.
T
Tetsuo Handa 已提交
2448 2449
 * /sys/kernel/security/tomoyo/query is handled by /usr/sbin/tomoyo-queryd and
 * /sys/kernel/security/tomoyo/audit is handled by /usr/sbin/tomoyo-auditd.
T
Tetsuo Handa 已提交
2450 2451 2452 2453 2454 2455 2456 2457 2458
 */
int tomoyo_poll_control(struct file *file, poll_table *wait)
{
	struct tomoyo_io_buffer *head = file->private_data;
	if (!head->poll)
		return -ENOSYS;
	return head->poll(file, wait);
}

2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497
/**
 * tomoyo_set_namespace_cursor - Set namespace to read.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns nothing.
 */
static inline void tomoyo_set_namespace_cursor(struct tomoyo_io_buffer *head)
{
	struct list_head *ns;
	if (head->type != TOMOYO_EXCEPTIONPOLICY &&
	    head->type != TOMOYO_PROFILE)
		return;
	/*
	 * If this is the first read, or reading previous namespace finished
	 * and has more namespaces to read, update the namespace cursor.
	 */
	ns = head->r.ns;
	if (!ns || (head->r.eof && ns->next != &tomoyo_namespace_list)) {
		/* Clearing is OK because tomoyo_flush() returned true. */
		memset(&head->r, 0, sizeof(head->r));
		head->r.ns = ns ? ns->next : tomoyo_namespace_list.next;
	}
}

/**
 * tomoyo_has_more_namespace - Check for unread namespaces.
 *
 * @head: Pointer to "struct tomoyo_io_buffer".
 *
 * Returns true if we have more entries to print, false otherwise.
 */
static inline bool tomoyo_has_more_namespace(struct tomoyo_io_buffer *head)
{
	return (head->type == TOMOYO_EXCEPTIONPOLICY ||
		head->type == TOMOYO_PROFILE) && head->r.eof &&
		head->r.ns->next != &tomoyo_namespace_list;
}

2498 2499 2500
/**
 * tomoyo_read_control - read() for /sys/kernel/security/tomoyo/ interface.
 *
T
Tetsuo Handa 已提交
2501
 * @head:       Pointer to "struct tomoyo_io_buffer".
2502 2503 2504 2505 2506
 * @buffer:     Poiner to buffer to write to.
 * @buffer_len: Size of @buffer.
 *
 * Returns bytes read on success, negative value otherwise.
 */
T
Tetsuo Handa 已提交
2507 2508
ssize_t tomoyo_read_control(struct tomoyo_io_buffer *head, char __user *buffer,
			    const int buffer_len)
2509
{
2510
	int len;
T
Tetsuo Handa 已提交
2511
	int idx;
2512 2513 2514 2515 2516

	if (!head->read)
		return -ENOSYS;
	if (mutex_lock_interruptible(&head->io_sem))
		return -EINTR;
2517 2518
	head->read_user_buf = buffer;
	head->read_user_buf_avail = buffer_len;
T
Tetsuo Handa 已提交
2519
	idx = tomoyo_read_lock();
2520 2521
	if (tomoyo_flush(head))
		/* Call the policy handler. */
2522 2523 2524 2525 2526
		do {
			tomoyo_set_namespace_cursor(head);
			head->read(head);
		} while (tomoyo_flush(head) &&
			 tomoyo_has_more_namespace(head));
T
Tetsuo Handa 已提交
2527
	tomoyo_read_unlock(idx);
2528
	len = head->read_user_buf - buffer;
2529 2530 2531 2532
	mutex_unlock(&head->io_sem);
	return len;
}

2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569
/**
 * tomoyo_parse_policy - Parse a policy line.
 *
 * @head: Poiter to "struct tomoyo_io_buffer".
 * @line: Line to parse.
 *
 * Returns 0 on success, negative value otherwise.
 *
 * Caller holds tomoyo_read_lock().
 */
static int tomoyo_parse_policy(struct tomoyo_io_buffer *head, char *line)
{
	/* Delete request? */
	head->w.is_delete = !strncmp(line, "delete ", 7);
	if (head->w.is_delete)
		memmove(line, line + 7, strlen(line + 7) + 1);
	/* Selecting namespace to update. */
	if (head->type == TOMOYO_EXCEPTIONPOLICY ||
	    head->type == TOMOYO_PROFILE) {
		if (*line == '<') {
			char *cp = strchr(line, ' ');
			if (cp) {
				*cp++ = '\0';
				head->w.ns = tomoyo_assign_namespace(line);
				memmove(line, cp, strlen(cp) + 1);
			} else
				head->w.ns = NULL;
		} else
			head->w.ns = &tomoyo_kernel_namespace;
		/* Don't allow updating if namespace is invalid. */
		if (!head->w.ns)
			return -ENOENT;
	}
	/* Do the update. */
	return head->write(head);
}

2570 2571 2572
/**
 * tomoyo_write_control - write() for /sys/kernel/security/tomoyo/ interface.
 *
T
Tetsuo Handa 已提交
2573
 * @head:       Pointer to "struct tomoyo_io_buffer".
2574 2575 2576 2577 2578
 * @buffer:     Pointer to buffer to read from.
 * @buffer_len: Size of @buffer.
 *
 * Returns @buffer_len on success, negative value otherwise.
 */
T
Tetsuo Handa 已提交
2579 2580
ssize_t tomoyo_write_control(struct tomoyo_io_buffer *head,
			     const char __user *buffer, const int buffer_len)
2581 2582
{
	int error = buffer_len;
2583
	size_t avail_len = buffer_len;
2584
	char *cp0 = head->write_buf;
T
Tetsuo Handa 已提交
2585
	int idx;
2586 2587 2588 2589 2590 2591
	if (!head->write)
		return -ENOSYS;
	if (!access_ok(VERIFY_READ, buffer, buffer_len))
		return -EFAULT;
	if (mutex_lock_interruptible(&head->io_sem))
		return -EINTR;
T
Tetsuo Handa 已提交
2592
	idx = tomoyo_read_lock();
2593 2594 2595
	/* Read a line and dispatch it to the policy handler. */
	while (avail_len > 0) {
		char c;
T
Tetsuo Handa 已提交
2596
		if (head->w.avail >= head->writebuf_size - 1) {
2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609
			const int len = head->writebuf_size * 2;
			char *cp = kzalloc(len, GFP_NOFS);
			if (!cp) {
				error = -ENOMEM;
				break;
			}
			memmove(cp, cp0, head->w.avail);
			kfree(cp0);
			head->write_buf = cp;
			cp0 = cp;
			head->writebuf_size = len;
		}
		if (get_user(c, buffer)) {
2610 2611 2612 2613 2614
			error = -EFAULT;
			break;
		}
		buffer++;
		avail_len--;
T
Tetsuo Handa 已提交
2615
		cp0[head->w.avail++] = c;
2616 2617
		if (c != '\n')
			continue;
T
Tetsuo Handa 已提交
2618 2619
		cp0[head->w.avail - 1] = '\0';
		head->w.avail = 0;
2620
		tomoyo_normalize_line(cp0);
2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651
		if (!strcmp(cp0, "reset")) {
			head->w.ns = &tomoyo_kernel_namespace;
			head->w.domain = NULL;
			memset(&head->r, 0, sizeof(head->r));
			continue;
		}
		/* Don't allow updating policies by non manager programs. */
		switch (head->type) {
		case TOMOYO_PROCESS_STATUS:
			/* This does not write anything. */
			break;
		case TOMOYO_DOMAINPOLICY:
			if (tomoyo_select_domain(head, cp0))
				continue;
			/* fall through */
		case TOMOYO_EXCEPTIONPOLICY:
			if (!strcmp(cp0, "select transition_only")) {
				head->r.print_transition_related_only = true;
				continue;
			}
			/* fall through */
		default:
			if (!tomoyo_manager()) {
				error = -EPERM;
				goto out;
			}
		}
		switch (tomoyo_parse_policy(head, cp0)) {
		case -EPERM:
			error = -EPERM;
			goto out;
2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664
		case 0:
			switch (head->type) {
			case TOMOYO_DOMAINPOLICY:
			case TOMOYO_EXCEPTIONPOLICY:
			case TOMOYO_STAT:
			case TOMOYO_PROFILE:
			case TOMOYO_MANAGER:
				tomoyo_update_stat(TOMOYO_STAT_POLICY_UPDATES);
				break;
			default:
				break;
			}
			break;
2665
		}
2666
	}
2667
out:
T
Tetsuo Handa 已提交
2668
	tomoyo_read_unlock(idx);
2669 2670 2671 2672 2673 2674 2675
	mutex_unlock(&head->io_sem);
	return error;
}

/**
 * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface.
 *
T
Tetsuo Handa 已提交
2676
 * @head: Pointer to "struct tomoyo_io_buffer".
2677
 *
T
Tetsuo Handa 已提交
2678
 * Returns 0.
2679
 */
T
Tetsuo Handa 已提交
2680
int tomoyo_close_control(struct tomoyo_io_buffer *head)
2681
{
2682 2683 2684 2685
	/*
	 * If the file is /sys/kernel/security/tomoyo/query , decrement the
	 * observer counter.
	 */
T
Tetsuo Handa 已提交
2686 2687 2688 2689
	if (head->type == TOMOYO_QUERY &&
	    atomic_dec_and_test(&tomoyo_query_observers))
		wake_up_all(&tomoyo_answer_wait);
	tomoyo_notify_gc(head, false);
2690 2691 2692 2693
	return 0;
}

/**
2694
 * tomoyo_check_profile - Check all profiles currently assigned to domains are defined.
2695
 */
2696
void tomoyo_check_profile(void)
2697
{
2698 2699 2700
	struct tomoyo_domain_info *domain;
	const int idx = tomoyo_read_lock();
	tomoyo_policy_loaded = true;
T
Tetsuo Handa 已提交
2701
	printk(KERN_INFO "TOMOYO: 2.5.0\n");
2702 2703
	list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
		const u8 profile = domain->profile;
2704
		const struct tomoyo_policy_namespace *ns = domain->ns;
T
Tetsuo Handa 已提交
2705
		if (ns->profile_version != 20110903)
2706 2707 2708 2709 2710 2711 2712 2713
			printk(KERN_ERR
			       "Profile version %u is not supported.\n",
			       ns->profile_version);
		else if (!ns->profile_ptr[profile])
			printk(KERN_ERR
			       "Profile %u (used by '%s') is not defined.\n",
			       profile, domain->domainname->name);
		else
2714
			continue;
2715
		printk(KERN_ERR
T
Tetsuo Handa 已提交
2716
		       "Userland tools for TOMOYO 2.5 must be installed and "
2717
		       "policy must be initialized.\n");
T
Tetsuo Handa 已提交
2718
		printk(KERN_ERR "Please see http://tomoyo.sourceforge.jp/2.5/ "
2719
		       "for more information.\n");
2720
		panic("STOP!");
2721 2722 2723
	}
	tomoyo_read_unlock(idx);
	printk(KERN_INFO "Mandatory Access Control activated.\n");
2724
}
2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783

/**
 * tomoyo_load_builtin_policy - Load built-in policy.
 *
 * Returns nothing.
 */
void __init tomoyo_load_builtin_policy(void)
{
	/*
	 * This include file is manually created and contains built-in policy
	 * named "tomoyo_builtin_profile", "tomoyo_builtin_exception_policy",
	 * "tomoyo_builtin_domain_policy", "tomoyo_builtin_manager",
	 * "tomoyo_builtin_stat" in the form of "static char [] __initdata".
	 */
#include "builtin-policy.h"
	u8 i;
	const int idx = tomoyo_read_lock();
	for (i = 0; i < 5; i++) {
		struct tomoyo_io_buffer head = { };
		char *start = "";
		switch (i) {
		case 0:
			start = tomoyo_builtin_profile;
			head.type = TOMOYO_PROFILE;
			head.write = tomoyo_write_profile;
			break;
		case 1:
			start = tomoyo_builtin_exception_policy;
			head.type = TOMOYO_EXCEPTIONPOLICY;
			head.write = tomoyo_write_exception;
			break;
		case 2:
			start = tomoyo_builtin_domain_policy;
			head.type = TOMOYO_DOMAINPOLICY;
			head.write = tomoyo_write_domain;
			break;
		case 3:
			start = tomoyo_builtin_manager;
			head.type = TOMOYO_MANAGER;
			head.write = tomoyo_write_manager;
			break;
		case 4:
			start = tomoyo_builtin_stat;
			head.type = TOMOYO_STAT;
			head.write = tomoyo_write_stat;
			break;
		}
		while (1) {
			char *end = strchr(start, '\n');
			if (!end)
				break;
			*end = '\0';
			tomoyo_normalize_line(start);
			head.write_buf = start;
			tomoyo_parse_policy(&head, start);
			start = end + 1;
		}
	}
	tomoyo_read_unlock(idx);
2784 2785 2786
#ifdef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
	tomoyo_check_profile();
#endif
2787
}