~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/ipe/hooks.c

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/ipe/hooks.c (Architecture i386) and /security/ipe/hooks.c (Architecture alpha)


  1 // SPDX-License-Identifier: GPL-2.0                 1 // SPDX-License-Identifier: GPL-2.0
  2 /*                                                  2 /*
  3  * Copyright (C) 2020-2024 Microsoft Corporati      3  * Copyright (C) 2020-2024 Microsoft Corporation. All rights reserved.
  4  */                                                 4  */
  5                                                     5 
  6 #include <linux/fs.h>                               6 #include <linux/fs.h>
  7 #include <linux/fs_struct.h>                        7 #include <linux/fs_struct.h>
  8 #include <linux/types.h>                            8 #include <linux/types.h>
  9 #include <linux/binfmts.h>                          9 #include <linux/binfmts.h>
 10 #include <linux/mman.h>                            10 #include <linux/mman.h>
 11 #include <linux/blk_types.h>                       11 #include <linux/blk_types.h>
 12                                                    12 
 13 #include "ipe.h"                                   13 #include "ipe.h"
 14 #include "hooks.h"                                 14 #include "hooks.h"
 15 #include "eval.h"                                  15 #include "eval.h"
 16 #include "digest.h"                                16 #include "digest.h"
 17                                                    17 
 18 /**                                                18 /**
 19  * ipe_bprm_check_security() - ipe security ho     19  * ipe_bprm_check_security() - ipe security hook function for bprm check.
 20  * @bprm: Supplies a pointer to a linux_binprm     20  * @bprm: Supplies a pointer to a linux_binprm structure to source the file
 21  *        being evaluated.                         21  *        being evaluated.
 22  *                                                 22  *
 23  * This LSM hook is called when a binary is lo     23  * This LSM hook is called when a binary is loaded through the exec
 24  * family of system calls.                         24  * family of system calls.
 25  *                                                 25  *
 26  * Return:                                         26  * Return:
 27  * * %0         - Success                          27  * * %0         - Success
 28  * * %-EACCES   - Did not pass IPE policy          28  * * %-EACCES   - Did not pass IPE policy
 29  */                                                29  */
 30 int ipe_bprm_check_security(struct linux_binpr     30 int ipe_bprm_check_security(struct linux_binprm *bprm)
 31 {                                                  31 {
 32         struct ipe_eval_ctx ctx = IPE_EVAL_CTX     32         struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
 33                                                    33 
 34         ipe_build_eval_ctx(&ctx, bprm->file, I     34         ipe_build_eval_ctx(&ctx, bprm->file, IPE_OP_EXEC, IPE_HOOK_BPRM_CHECK);
 35         return ipe_evaluate_event(&ctx);           35         return ipe_evaluate_event(&ctx);
 36 }                                                  36 }
 37                                                    37 
 38 /**                                                38 /**
 39  * ipe_mmap_file() - ipe security hook functio     39  * ipe_mmap_file() - ipe security hook function for mmap check.
 40  * @f: File being mmap'd. Can be NULL in the c     40  * @f: File being mmap'd. Can be NULL in the case of anonymous memory.
 41  * @reqprot: The requested protection on the m     41  * @reqprot: The requested protection on the mmap, passed from usermode.
 42  * @prot: The effective protection on the mmap     42  * @prot: The effective protection on the mmap, resolved from reqprot and
 43  *        system configuration.                    43  *        system configuration.
 44  * @flags: Unused.                                 44  * @flags: Unused.
 45  *                                                 45  *
 46  * This hook is called when a file is loaded t     46  * This hook is called when a file is loaded through the mmap
 47  * family of system calls.                         47  * family of system calls.
 48  *                                                 48  *
 49  * Return:                                         49  * Return:
 50  * * %0         - Success                          50  * * %0         - Success
 51  * * %-EACCES   - Did not pass IPE policy          51  * * %-EACCES   - Did not pass IPE policy
 52  */                                                52  */
 53 int ipe_mmap_file(struct file *f, unsigned lon     53 int ipe_mmap_file(struct file *f, unsigned long reqprot __always_unused,
 54                   unsigned long prot, unsigned     54                   unsigned long prot, unsigned long flags)
 55 {                                                  55 {
 56         struct ipe_eval_ctx ctx = IPE_EVAL_CTX     56         struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
 57                                                    57 
 58         if (prot & PROT_EXEC) {                    58         if (prot & PROT_EXEC) {
 59                 ipe_build_eval_ctx(&ctx, f, IP     59                 ipe_build_eval_ctx(&ctx, f, IPE_OP_EXEC, IPE_HOOK_MMAP);
 60                 return ipe_evaluate_event(&ctx     60                 return ipe_evaluate_event(&ctx);
 61         }                                          61         }
 62                                                    62 
 63         return 0;                                  63         return 0;
 64 }                                                  64 }
 65                                                    65 
 66 /**                                                66 /**
 67  * ipe_file_mprotect() - ipe security hook fun     67  * ipe_file_mprotect() - ipe security hook function for mprotect check.
 68  * @vma: Existing virtual memory area created      68  * @vma: Existing virtual memory area created by mmap or similar.
 69  * @reqprot: The requested protection on the m     69  * @reqprot: The requested protection on the mmap, passed from usermode.
 70  * @prot: The effective protection on the mmap     70  * @prot: The effective protection on the mmap, resolved from reqprot and
 71  *        system configuration.                    71  *        system configuration.
 72  *                                                 72  *
 73  * This LSM hook is called when a mmap'd regio     73  * This LSM hook is called when a mmap'd region of memory is changing
 74  * its protections via mprotect.                   74  * its protections via mprotect.
 75  *                                                 75  *
 76  * Return:                                         76  * Return:
 77  * * %0         - Success                          77  * * %0         - Success
 78  * * %-EACCES   - Did not pass IPE policy          78  * * %-EACCES   - Did not pass IPE policy
 79  */                                                79  */
 80 int ipe_file_mprotect(struct vm_area_struct *v     80 int ipe_file_mprotect(struct vm_area_struct *vma,
 81                       unsigned long reqprot __     81                       unsigned long reqprot __always_unused,
 82                       unsigned long prot)          82                       unsigned long prot)
 83 {                                                  83 {
 84         struct ipe_eval_ctx ctx = IPE_EVAL_CTX     84         struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
 85                                                    85 
 86         /* Already Executable */                   86         /* Already Executable */
 87         if (vma->vm_flags & VM_EXEC)               87         if (vma->vm_flags & VM_EXEC)
 88                 return 0;                          88                 return 0;
 89                                                    89 
 90         if (prot & PROT_EXEC) {                    90         if (prot & PROT_EXEC) {
 91                 ipe_build_eval_ctx(&ctx, vma->     91                 ipe_build_eval_ctx(&ctx, vma->vm_file, IPE_OP_EXEC, IPE_HOOK_MPROTECT);
 92                 return ipe_evaluate_event(&ctx     92                 return ipe_evaluate_event(&ctx);
 93         }                                          93         }
 94                                                    94 
 95         return 0;                                  95         return 0;
 96 }                                                  96 }
 97                                                    97 
 98 /**                                                98 /**
 99  * ipe_kernel_read_file() - ipe security hook      99  * ipe_kernel_read_file() - ipe security hook function for kernel read.
100  * @file: Supplies a pointer to the file struc    100  * @file: Supplies a pointer to the file structure being read in from disk.
101  * @id: Supplies the enumeration identifying t    101  * @id: Supplies the enumeration identifying the purpose of the read.
102  * @contents: Unused.                             102  * @contents: Unused.
103  *                                                103  *
104  * This LSM hook is called when a file is read    104  * This LSM hook is called when a file is read from disk in the kernel.
105  *                                                105  *
106  * Return:                                        106  * Return:
107  * * %0         - Success                         107  * * %0         - Success
108  * * %-EACCES   - Did not pass IPE policy         108  * * %-EACCES   - Did not pass IPE policy
109  */                                               109  */
110 int ipe_kernel_read_file(struct file *file, en    110 int ipe_kernel_read_file(struct file *file, enum kernel_read_file_id id,
111                          bool contents)           111                          bool contents)
112 {                                                 112 {
113         struct ipe_eval_ctx ctx = IPE_EVAL_CTX    113         struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
114         enum ipe_op_type op;                      114         enum ipe_op_type op;
115                                                   115 
116         switch (id) {                             116         switch (id) {
117         case READING_FIRMWARE:                    117         case READING_FIRMWARE:
118                 op = IPE_OP_FIRMWARE;             118                 op = IPE_OP_FIRMWARE;
119                 break;                            119                 break;
120         case READING_MODULE:                      120         case READING_MODULE:
121                 op = IPE_OP_KERNEL_MODULE;        121                 op = IPE_OP_KERNEL_MODULE;
122                 break;                            122                 break;
123         case READING_KEXEC_INITRAMFS:             123         case READING_KEXEC_INITRAMFS:
124                 op = IPE_OP_KEXEC_INITRAMFS;      124                 op = IPE_OP_KEXEC_INITRAMFS;
125                 break;                            125                 break;
126         case READING_KEXEC_IMAGE:                 126         case READING_KEXEC_IMAGE:
127                 op = IPE_OP_KEXEC_IMAGE;          127                 op = IPE_OP_KEXEC_IMAGE;
128                 break;                            128                 break;
129         case READING_POLICY:                      129         case READING_POLICY:
130                 op = IPE_OP_POLICY;               130                 op = IPE_OP_POLICY;
131                 break;                            131                 break;
132         case READING_X509_CERTIFICATE:            132         case READING_X509_CERTIFICATE:
133                 op = IPE_OP_X509;                 133                 op = IPE_OP_X509;
134                 break;                            134                 break;
135         default:                                  135         default:
136                 op = IPE_OP_INVALID;              136                 op = IPE_OP_INVALID;
137                 WARN(1, "no rule setup for ker    137                 WARN(1, "no rule setup for kernel_read_file enum %d", id);
138         }                                         138         }
139                                                   139 
140         ipe_build_eval_ctx(&ctx, file, op, IPE    140         ipe_build_eval_ctx(&ctx, file, op, IPE_HOOK_KERNEL_READ);
141         return ipe_evaluate_event(&ctx);          141         return ipe_evaluate_event(&ctx);
142 }                                                 142 }
143                                                   143 
144 /**                                               144 /**
145  * ipe_kernel_load_data() - ipe security hook     145  * ipe_kernel_load_data() - ipe security hook function for kernel load data.
146  * @id: Supplies the enumeration identifying t    146  * @id: Supplies the enumeration identifying the purpose of the load.
147  * @contents: Unused.                             147  * @contents: Unused.
148  *                                                148  *
149  * This LSM hook is called when a data buffer     149  * This LSM hook is called when a data buffer provided by userspace is loading
150  * into the kernel.                               150  * into the kernel.
151  *                                                151  *
152  * Return:                                        152  * Return:
153  * * %0         - Success                         153  * * %0         - Success
154  * * %-EACCES   - Did not pass IPE policy         154  * * %-EACCES   - Did not pass IPE policy
155  */                                               155  */
156 int ipe_kernel_load_data(enum kernel_load_data    156 int ipe_kernel_load_data(enum kernel_load_data_id id, bool contents)
157 {                                                 157 {
158         struct ipe_eval_ctx ctx = IPE_EVAL_CTX    158         struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
159         enum ipe_op_type op;                      159         enum ipe_op_type op;
160                                                   160 
161         switch (id) {                             161         switch (id) {
162         case LOADING_FIRMWARE:                    162         case LOADING_FIRMWARE:
163                 op = IPE_OP_FIRMWARE;             163                 op = IPE_OP_FIRMWARE;
164                 break;                            164                 break;
165         case LOADING_MODULE:                      165         case LOADING_MODULE:
166                 op = IPE_OP_KERNEL_MODULE;        166                 op = IPE_OP_KERNEL_MODULE;
167                 break;                            167                 break;
168         case LOADING_KEXEC_INITRAMFS:             168         case LOADING_KEXEC_INITRAMFS:
169                 op = IPE_OP_KEXEC_INITRAMFS;      169                 op = IPE_OP_KEXEC_INITRAMFS;
170                 break;                            170                 break;
171         case LOADING_KEXEC_IMAGE:                 171         case LOADING_KEXEC_IMAGE:
172                 op = IPE_OP_KEXEC_IMAGE;          172                 op = IPE_OP_KEXEC_IMAGE;
173                 break;                            173                 break;
174         case LOADING_POLICY:                      174         case LOADING_POLICY:
175                 op = IPE_OP_POLICY;               175                 op = IPE_OP_POLICY;
176                 break;                            176                 break;
177         case LOADING_X509_CERTIFICATE:            177         case LOADING_X509_CERTIFICATE:
178                 op = IPE_OP_X509;                 178                 op = IPE_OP_X509;
179                 break;                            179                 break;
180         default:                                  180         default:
181                 op = IPE_OP_INVALID;              181                 op = IPE_OP_INVALID;
182                 WARN(1, "no rule setup for ker    182                 WARN(1, "no rule setup for kernel_load_data enum %d", id);
183         }                                         183         }
184                                                   184 
185         ipe_build_eval_ctx(&ctx, NULL, op, IPE    185         ipe_build_eval_ctx(&ctx, NULL, op, IPE_HOOK_KERNEL_LOAD);
186         return ipe_evaluate_event(&ctx);          186         return ipe_evaluate_event(&ctx);
187 }                                                 187 }
188                                                   188 
189 /**                                               189 /**
190  * ipe_unpack_initramfs() - Mark the current r    190  * ipe_unpack_initramfs() - Mark the current rootfs as initramfs.
191  */                                               191  */
192 void ipe_unpack_initramfs(void)                   192 void ipe_unpack_initramfs(void)
193 {                                                 193 {
194         ipe_sb(current->fs->root.mnt->mnt_sb)-    194         ipe_sb(current->fs->root.mnt->mnt_sb)->initramfs = true;
195 }                                                 195 }
196                                                   196 
197 #ifdef CONFIG_IPE_PROP_DM_VERITY                  197 #ifdef CONFIG_IPE_PROP_DM_VERITY
198 /**                                               198 /**
199  * ipe_bdev_free_security() - Free IPE's LSM b    199  * ipe_bdev_free_security() - Free IPE's LSM blob of block_devices.
200  * @bdev: Supplies a pointer to a block_device    200  * @bdev: Supplies a pointer to a block_device that contains the structure
201  *        to free.                                201  *        to free.
202  */                                               202  */
203 void ipe_bdev_free_security(struct block_devic    203 void ipe_bdev_free_security(struct block_device *bdev)
204 {                                                 204 {
205         struct ipe_bdev *blob = ipe_bdev(bdev)    205         struct ipe_bdev *blob = ipe_bdev(bdev);
206                                                   206 
207         ipe_digest_free(blob->root_hash);         207         ipe_digest_free(blob->root_hash);
208 }                                                 208 }
209                                                   209 
210 #ifdef CONFIG_IPE_PROP_DM_VERITY_SIGNATURE        210 #ifdef CONFIG_IPE_PROP_DM_VERITY_SIGNATURE
211 static void ipe_set_dmverity_signature(struct     211 static void ipe_set_dmverity_signature(struct ipe_bdev *blob,
212                                        const v    212                                        const void *value,
213                                        size_t     213                                        size_t size)
214 {                                                 214 {
215         blob->dm_verity_signed = size > 0 && v    215         blob->dm_verity_signed = size > 0 && value;
216 }                                                 216 }
217 #else                                             217 #else
218 static inline void ipe_set_dmverity_signature(    218 static inline void ipe_set_dmverity_signature(struct ipe_bdev *blob,
219                                                   219                                               const void *value,
220                                                   220                                               size_t size)
221 {                                                 221 {
222 }                                                 222 }
223 #endif /* CONFIG_IPE_PROP_DM_VERITY_SIGNATURE     223 #endif /* CONFIG_IPE_PROP_DM_VERITY_SIGNATURE */
224                                                   224 
225 /**                                               225 /**
226  * ipe_bdev_setintegrity() - Save integrity da    226  * ipe_bdev_setintegrity() - Save integrity data from a bdev to IPE's LSM blob.
227  * @bdev: Supplies a pointer to a block_device    227  * @bdev: Supplies a pointer to a block_device that contains the LSM blob.
228  * @type: Supplies the integrity type.            228  * @type: Supplies the integrity type.
229  * @value: Supplies the value to store.           229  * @value: Supplies the value to store.
230  * @size: The size of @value.                     230  * @size: The size of @value.
231  *                                                231  *
232  * This hook is currently used to save dm-veri    232  * This hook is currently used to save dm-verity's root hash or the existence
233  * of a validated signed dm-verity root hash i    233  * of a validated signed dm-verity root hash into LSM blob.
234  *                                                234  *
235  * Return: %0 on success. If an error occurs,     235  * Return: %0 on success. If an error occurs, the function will return the
236  * -errno.                                        236  * -errno.
237  */                                               237  */
238 int ipe_bdev_setintegrity(struct block_device     238 int ipe_bdev_setintegrity(struct block_device *bdev, enum lsm_integrity_type type,
239                           const void *value, s    239                           const void *value, size_t size)
240 {                                                 240 {
241         const struct dm_verity_digest *digest     241         const struct dm_verity_digest *digest = NULL;
242         struct ipe_bdev *blob = ipe_bdev(bdev)    242         struct ipe_bdev *blob = ipe_bdev(bdev);
243         struct digest_info *info = NULL;          243         struct digest_info *info = NULL;
244                                                   244 
245         if (type == LSM_INT_DMVERITY_SIG_VALID    245         if (type == LSM_INT_DMVERITY_SIG_VALID) {
246                 ipe_set_dmverity_signature(blo    246                 ipe_set_dmverity_signature(blob, value, size);
247                                                   247 
248                 return 0;                         248                 return 0;
249         }                                         249         }
250                                                   250 
251         if (type != LSM_INT_DMVERITY_ROOTHASH)    251         if (type != LSM_INT_DMVERITY_ROOTHASH)
252                 return -EINVAL;                   252                 return -EINVAL;
253                                                   253 
254         if (!value) {                             254         if (!value) {
255                 ipe_digest_free(blob->root_has    255                 ipe_digest_free(blob->root_hash);
256                 blob->root_hash = NULL;           256                 blob->root_hash = NULL;
257                                                   257 
258                 return 0;                         258                 return 0;
259         }                                         259         }
260         digest = value;                           260         digest = value;
261                                                   261 
262         info = kzalloc(sizeof(*info), GFP_KERN    262         info = kzalloc(sizeof(*info), GFP_KERNEL);
263         if (!info)                                263         if (!info)
264                 return -ENOMEM;                   264                 return -ENOMEM;
265                                                   265 
266         info->digest = kmemdup(digest->digest,    266         info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL);
267         if (!info->digest)                        267         if (!info->digest)
268                 goto err;                         268                 goto err;
269                                                   269 
270         info->alg = kstrdup(digest->alg, GFP_K    270         info->alg = kstrdup(digest->alg, GFP_KERNEL);
271         if (!info->alg)                           271         if (!info->alg)
272                 goto err;                         272                 goto err;
273                                                   273 
274         info->digest_len = digest->digest_len;    274         info->digest_len = digest->digest_len;
275                                                   275 
276         ipe_digest_free(blob->root_hash);         276         ipe_digest_free(blob->root_hash);
277         blob->root_hash = info;                   277         blob->root_hash = info;
278                                                   278 
279         return 0;                                 279         return 0;
280 err:                                              280 err:
281         ipe_digest_free(info);                    281         ipe_digest_free(info);
282                                                   282 
283         return -ENOMEM;                           283         return -ENOMEM;
284 }                                                 284 }
285 #endif /* CONFIG_IPE_PROP_DM_VERITY */            285 #endif /* CONFIG_IPE_PROP_DM_VERITY */
286                                                   286 
287 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG      287 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
288 /**                                               288 /**
289  * ipe_inode_setintegrity() - save integrity d    289  * ipe_inode_setintegrity() - save integrity data from a inode to IPE's LSM blob.
290  * @inode: The inode to source the security bl    290  * @inode: The inode to source the security blob from.
291  * @type: Supplies the integrity type.            291  * @type: Supplies the integrity type.
292  * @value: The value to be stored.                292  * @value: The value to be stored.
293  * @size: The size of @value.                     293  * @size: The size of @value.
294  *                                                294  *
295  * This hook is currently used to save the exi    295  * This hook is currently used to save the existence of a validated fs-verity
296  * builtin signature into LSM blob.               296  * builtin signature into LSM blob.
297  *                                                297  *
298  * Return: %0 on success. If an error occurs,     298  * Return: %0 on success. If an error occurs, the function will return the
299  * -errno.                                        299  * -errno.
300  */                                               300  */
301 int ipe_inode_setintegrity(const struct inode     301 int ipe_inode_setintegrity(const struct inode *inode,
302                            enum lsm_integrity_    302                            enum lsm_integrity_type type,
303                            const void *value,     303                            const void *value, size_t size)
304 {                                                 304 {
305         struct ipe_inode *inode_sec = ipe_inod    305         struct ipe_inode *inode_sec = ipe_inode(inode);
306                                                   306 
307         if (type == LSM_INT_FSVERITY_BUILTINSI    307         if (type == LSM_INT_FSVERITY_BUILTINSIG_VALID) {
308                 inode_sec->fs_verity_signed =     308                 inode_sec->fs_verity_signed = size > 0 && value;
309                 return 0;                         309                 return 0;
310         }                                         310         }
311                                                   311 
312         return -EINVAL;                           312         return -EINVAL;
313 }                                                 313 }
314 #endif /* CONFIG_CONFIG_IPE_PROP_FS_VERITY_BUI    314 #endif /* CONFIG_CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */
315                                                   315 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php