~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/tomoyo/load_policy.c

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/tomoyo/load_policy.c (Version linux-6.12-rc7) and /security/tomoyo/load_policy.c (Version linux-6.11.7)


  1 // SPDX-License-Identifier: GPL-2.0                 1 // SPDX-License-Identifier: GPL-2.0
  2 /*                                                  2 /*
  3  * security/tomoyo/load_policy.c                    3  * security/tomoyo/load_policy.c
  4  *                                                  4  *
  5  * Copyright (C) 2005-2011  NTT DATA CORPORATI      5  * Copyright (C) 2005-2011  NTT DATA CORPORATION
  6  */                                                 6  */
  7                                                     7 
  8 #include "common.h"                                 8 #include "common.h"
  9                                                     9 
 10 #ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_     10 #ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
 11                                                    11 
 12 /*                                                 12 /*
 13  * Path to the policy loader. (default = CONFI     13  * Path to the policy loader. (default = CONFIG_SECURITY_TOMOYO_POLICY_LOADER)
 14  */                                                14  */
 15 static const char *tomoyo_loader;                  15 static const char *tomoyo_loader;
 16                                                    16 
 17 /**                                                17 /**
 18  * tomoyo_loader_setup - Set policy loader.        18  * tomoyo_loader_setup - Set policy loader.
 19  *                                                 19  *
 20  * @str: Program to use as a policy loader (e.     20  * @str: Program to use as a policy loader (e.g. /sbin/tomoyo-init ).
 21  *                                                 21  *
 22  * Returns 0.                                      22  * Returns 0.
 23  */                                                23  */
 24 static int __init tomoyo_loader_setup(char *st     24 static int __init tomoyo_loader_setup(char *str)
 25 {                                                  25 {
 26         tomoyo_loader = str;                       26         tomoyo_loader = str;
 27         return 1;                                  27         return 1;
 28 }                                                  28 }
 29                                                    29 
 30 __setup("TOMOYO_loader=", tomoyo_loader_setup)     30 __setup("TOMOYO_loader=", tomoyo_loader_setup);
 31                                                    31 
 32 /**                                                32 /**
 33  * tomoyo_policy_loader_exists - Check whether     33  * tomoyo_policy_loader_exists - Check whether /sbin/tomoyo-init exists.
 34  *                                                 34  *
 35  * Returns true if /sbin/tomoyo-init exists, f     35  * Returns true if /sbin/tomoyo-init exists, false otherwise.
 36  */                                                36  */
 37 static bool tomoyo_policy_loader_exists(void)      37 static bool tomoyo_policy_loader_exists(void)
 38 {                                                  38 {
 39         struct path path;                          39         struct path path;
 40                                                    40 
 41         if (!tomoyo_loader)                        41         if (!tomoyo_loader)
 42                 tomoyo_loader = CONFIG_SECURIT     42                 tomoyo_loader = CONFIG_SECURITY_TOMOYO_POLICY_LOADER;
 43         if (kern_path(tomoyo_loader, LOOKUP_FO     43         if (kern_path(tomoyo_loader, LOOKUP_FOLLOW, &path)) {
 44                 pr_info("Not activating Mandat     44                 pr_info("Not activating Mandatory Access Control as %s does not exist.\n",
 45                         tomoyo_loader);            45                         tomoyo_loader);
 46                 return false;                      46                 return false;
 47         }                                          47         }
 48         path_put(&path);                           48         path_put(&path);
 49         return true;                               49         return true;
 50 }                                                  50 }
 51                                                    51 
 52 /*                                                 52 /*
 53  * Path to the trigger. (default = CONFIG_SECU     53  * Path to the trigger. (default = CONFIG_SECURITY_TOMOYO_ACTIVATION_TRIGGER)
 54  */                                                54  */
 55 static const char *tomoyo_trigger;                 55 static const char *tomoyo_trigger;
 56                                                    56 
 57 /**                                                57 /**
 58  * tomoyo_trigger_setup - Set trigger for acti     58  * tomoyo_trigger_setup - Set trigger for activation.
 59  *                                                 59  *
 60  * @str: Program to use as an activation trigg     60  * @str: Program to use as an activation trigger (e.g. /sbin/init ).
 61  *                                                 61  *
 62  * Returns 0.                                      62  * Returns 0.
 63  */                                                63  */
 64 static int __init tomoyo_trigger_setup(char *s     64 static int __init tomoyo_trigger_setup(char *str)
 65 {                                                  65 {
 66         tomoyo_trigger = str;                      66         tomoyo_trigger = str;
 67         return 1;                                  67         return 1;
 68 }                                                  68 }
 69                                                    69 
 70 __setup("TOMOYO_trigger=", tomoyo_trigger_setu     70 __setup("TOMOYO_trigger=", tomoyo_trigger_setup);
 71                                                    71 
 72 /**                                                72 /**
 73  * tomoyo_load_policy - Run external policy lo     73  * tomoyo_load_policy - Run external policy loader to load policy.
 74  *                                                 74  *
 75  * @filename: The program about to start.          75  * @filename: The program about to start.
 76  *                                                 76  *
 77  * This function checks whether @filename is /     77  * This function checks whether @filename is /sbin/init , and if so
 78  * invoke /sbin/tomoyo-init and wait for the t     78  * invoke /sbin/tomoyo-init and wait for the termination of /sbin/tomoyo-init
 79  * and then continues invocation of /sbin/init     79  * and then continues invocation of /sbin/init.
 80  * /sbin/tomoyo-init reads policy files in /et     80  * /sbin/tomoyo-init reads policy files in /etc/tomoyo/ directory and
 81  * writes to /sys/kernel/security/tomoyo/ inte     81  * writes to /sys/kernel/security/tomoyo/ interfaces.
 82  *                                                 82  *
 83  * Returns nothing.                                83  * Returns nothing.
 84  */                                                84  */
 85 void tomoyo_load_policy(const char *filename)      85 void tomoyo_load_policy(const char *filename)
 86 {                                                  86 {
 87         static bool done;                          87         static bool done;
 88         char *argv[2];                             88         char *argv[2];
 89         char *envp[3];                             89         char *envp[3];
 90                                                    90 
 91         if (tomoyo_policy_loaded || done)          91         if (tomoyo_policy_loaded || done)
 92                 return;                            92                 return;
 93         if (!tomoyo_trigger)                       93         if (!tomoyo_trigger)
 94                 tomoyo_trigger = CONFIG_SECURI     94                 tomoyo_trigger = CONFIG_SECURITY_TOMOYO_ACTIVATION_TRIGGER;
 95         if (strcmp(filename, tomoyo_trigger))      95         if (strcmp(filename, tomoyo_trigger))
 96                 return;                            96                 return;
 97         if (!tomoyo_policy_loader_exists())        97         if (!tomoyo_policy_loader_exists())
 98                 return;                            98                 return;
 99         done = true;                               99         done = true;
100         pr_info("Calling %s to load policy. Pl    100         pr_info("Calling %s to load policy. Please wait.\n", tomoyo_loader);
101         argv[0] = (char *) tomoyo_loader;         101         argv[0] = (char *) tomoyo_loader;
102         argv[1] = NULL;                           102         argv[1] = NULL;
103         envp[0] = "HOME=/";                       103         envp[0] = "HOME=/";
104         envp[1] = "PATH=/sbin:/bin:/usr/sbin:/    104         envp[1] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin";
105         envp[2] = NULL;                           105         envp[2] = NULL;
106         call_usermodehelper(argv[0], argv, env    106         call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
107         tomoyo_check_profile();                   107         tomoyo_check_profile();
108 }                                                 108 }
109                                                   109 
110 #endif                                            110 #endif
111                                                   111 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php