オープンソース・ソフトウェアの開発とダウンロード

Subversion リポジトリの参照

Annotation of /branches/ccs-patch/security/ccsecurity/policy_io.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 3441 - (hide annotations) (download) (as text)
Sun Feb 14 04:31:38 2010 UTC (14 years, 3 months ago) by kumaneko
Original Path: trunk/1.7.x/ccs-patch/security/ccsecurity/policy_io.c
File MIME type: text/x-csrc
File size: 75994 byte(s)


1 kumaneko 2863 /*
2 kumaneko 2864 * security/ccsecurity/policy_io.c
3 kumaneko 2863 *
4 kumaneko 3441 * Copyright (C) 2005-2010 NTT DATA CORPORATION
5 kumaneko 2863 *
6 kumaneko 3441 * Version: 1.7.1+ 2010/02/14
7 kumaneko 2863 *
8     * This file is applicable to both 2.4.30 and 2.6.11 and later.
9     * See README.ccs for ChangeLog.
10     *
11     */
12    
13     #include "internal.h"
14    
15 kumaneko 2962 static struct ccs_profile ccs_default_profile = {
16     .learning = &ccs_default_profile.preference,
17     .permissive = &ccs_default_profile.preference,
18     .enforcing = &ccs_default_profile.preference,
19 kumaneko 3069 .audit = &ccs_default_profile.preference,
20 kumaneko 2962 #ifdef CONFIG_CCSECURITY_AUDIT
21     .preference.audit_max_grant_log = CONFIG_CCSECURITY_MAX_GRANT_LOG,
22     .preference.audit_max_reject_log = CONFIG_CCSECURITY_MAX_REJECT_LOG,
23     #endif
24 kumaneko 3064 .preference.audit_task_info = true,
25     .preference.audit_path_info = true,
26 kumaneko 2962 .preference.enforcing_penalty = 0,
27     .preference.enforcing_verbose = true,
28     .preference.learning_max_entry = CONFIG_CCSECURITY_MAX_ACCEPT_ENTRY,
29     .preference.learning_verbose = false,
30     .preference.learning_exec_realpath = true,
31     .preference.learning_exec_argv0 = true,
32     .preference.learning_symlink_target = true,
33     .preference.permissive_verbose = true
34     };
35    
36 kumaneko 3158 /* Profile version. Currently only 20090903 is defined. */
37     static unsigned int ccs_profile_version;
38    
39 kumaneko 2958 /* Profile table. Memory is allocated as needed. */
40     static struct ccs_profile *ccs_profile_ptr[CCS_MAX_PROFILES];
41    
42 kumaneko 2948 /* String table for functionality that takes 4 modes. */
43 kumaneko 2925 static const char *ccs_mode_4[4] = {
44     "disabled", "learning", "permissive", "enforcing"
45 kumaneko 2863 };
46 kumaneko 2915
47 kumaneko 2948 /* String table for /proc/ccs/profile */
48 kumaneko 2918 static const char *ccs_mac_keywords[CCS_MAX_MAC_INDEX +
49 kumaneko 2943 CCS_MAX_CAPABILITY_INDEX +
50     CCS_MAX_MAC_CATEGORY_INDEX] = {
51     [CCS_MAC_FILE_EXECUTE]
52     = "file::execute",
53     [CCS_MAC_FILE_OPEN]
54     = "file::open",
55     [CCS_MAC_FILE_CREATE]
56     = "file::create",
57     [CCS_MAC_FILE_UNLINK]
58     = "file::unlink",
59     [CCS_MAC_FILE_MKDIR]
60     = "file::mkdir",
61     [CCS_MAC_FILE_RMDIR]
62     = "file::rmdir",
63     [CCS_MAC_FILE_MKFIFO]
64     = "file::mkfifo",
65     [CCS_MAC_FILE_MKSOCK]
66     = "file::mksock",
67     [CCS_MAC_FILE_TRUNCATE]
68     = "file::truncate",
69     [CCS_MAC_FILE_SYMLINK]
70     = "file::symlink",
71     [CCS_MAC_FILE_REWRITE]
72     = "file::rewrite",
73     [CCS_MAC_FILE_MKBLOCK]
74     = "file::mkblock",
75     [CCS_MAC_FILE_MKCHAR]
76     = "file::mkchar",
77     [CCS_MAC_FILE_LINK]
78     = "file::link",
79     [CCS_MAC_FILE_RENAME]
80     = "file::rename",
81     [CCS_MAC_FILE_CHMOD]
82     = "file::chmod",
83     [CCS_MAC_FILE_CHOWN]
84     = "file::chown",
85     [CCS_MAC_FILE_CHGRP]
86     = "file::chgrp",
87     [CCS_MAC_FILE_IOCTL]
88     = "file::ioctl",
89     [CCS_MAC_FILE_CHROOT]
90     = "file::chroot",
91     [CCS_MAC_FILE_MOUNT]
92     = "file::mount",
93     [CCS_MAC_FILE_UMOUNT]
94     = "file::umount",
95     [CCS_MAC_FILE_PIVOT_ROOT]
96     = "file::pivot_root",
97     [CCS_MAC_ENVIRON]
98     = "misc::env",
99     [CCS_MAC_NETWORK_UDP_BIND]
100     = "network::inet_udp_bind",
101     [CCS_MAC_NETWORK_UDP_CONNECT]
102     = "network::inet_udp_connect",
103     [CCS_MAC_NETWORK_TCP_BIND]
104     = "network::inet_tcp_bind",
105     [CCS_MAC_NETWORK_TCP_LISTEN]
106     = "network::inet_tcp_listen",
107     [CCS_MAC_NETWORK_TCP_CONNECT]
108     = "network::inet_tcp_connect",
109     [CCS_MAC_NETWORK_TCP_ACCEPT]
110     = "network::inet_tcp_accept",
111     [CCS_MAC_NETWORK_RAW_BIND]
112     = "network::inet_raw_bind",
113     [CCS_MAC_NETWORK_RAW_CONNECT]
114     = "network::inet_raw_connect",
115     [CCS_MAC_SIGNAL]
116     = "ipc::signal",
117 kumaneko 2918 [CCS_MAX_MAC_INDEX + CCS_INET_STREAM_SOCKET_CREATE]
118 kumaneko 2943 = "capability::inet_tcp_create",
119 kumaneko 2918 [CCS_MAX_MAC_INDEX + CCS_INET_STREAM_SOCKET_LISTEN]
120 kumaneko 2943 = "capability::inet_tcp_listen",
121 kumaneko 2918 [CCS_MAX_MAC_INDEX + CCS_INET_STREAM_SOCKET_CONNECT]
122 kumaneko 2943 = "capability::inet_tcp_connect",
123     [CCS_MAX_MAC_INDEX + CCS_USE_INET_DGRAM_SOCKET]
124     = "capability::use_inet_udp",
125     [CCS_MAX_MAC_INDEX + CCS_USE_INET_RAW_SOCKET]
126     = "capability::use_inet_ip",
127     [CCS_MAX_MAC_INDEX + CCS_USE_ROUTE_SOCKET]
128     = "capability::use_route",
129     [CCS_MAX_MAC_INDEX + CCS_USE_PACKET_SOCKET]
130     = "capability::use_packet",
131     [CCS_MAX_MAC_INDEX + CCS_SYS_MOUNT]
132     = "capability::SYS_MOUNT",
133     [CCS_MAX_MAC_INDEX + CCS_SYS_UMOUNT]
134     = "capability::SYS_UMOUNT",
135     [CCS_MAX_MAC_INDEX + CCS_SYS_REBOOT]
136     = "capability::SYS_REBOOT",
137     [CCS_MAX_MAC_INDEX + CCS_SYS_CHROOT]
138     = "capability::SYS_CHROOT",
139     [CCS_MAX_MAC_INDEX + CCS_SYS_KILL]
140     = "capability::SYS_KILL",
141     [CCS_MAX_MAC_INDEX + CCS_SYS_VHANGUP]
142     = "capability::SYS_VHANGUP",
143     [CCS_MAX_MAC_INDEX + CCS_SYS_SETTIME]
144     = "capability::SYS_TIME",
145     [CCS_MAX_MAC_INDEX + CCS_SYS_NICE]
146     = "capability::SYS_NICE",
147     [CCS_MAX_MAC_INDEX + CCS_SYS_SETHOSTNAME]
148     = "capability::SYS_SETHOSTNAME",
149     [CCS_MAX_MAC_INDEX + CCS_USE_KERNEL_MODULE]
150     = "capability::use_kernel_module",
151     [CCS_MAX_MAC_INDEX + CCS_CREATE_FIFO]
152     = "capability::create_fifo",
153     [CCS_MAX_MAC_INDEX + CCS_CREATE_BLOCK_DEV]
154     = "capability::create_block_dev",
155     [CCS_MAX_MAC_INDEX + CCS_CREATE_CHAR_DEV]
156     = "capability::create_char_dev",
157     [CCS_MAX_MAC_INDEX + CCS_CREATE_UNIX_SOCKET]
158     = "capability::create_unix_socket",
159     [CCS_MAX_MAC_INDEX + CCS_SYS_LINK]
160     = "capability::SYS_LINK",
161     [CCS_MAX_MAC_INDEX + CCS_SYS_SYMLINK]
162     = "capability::SYS_SYMLINK",
163     [CCS_MAX_MAC_INDEX + CCS_SYS_RENAME]
164     = "capability::SYS_RENAME",
165     [CCS_MAX_MAC_INDEX + CCS_SYS_UNLINK]
166     = "capability::SYS_UNLINK",
167     [CCS_MAX_MAC_INDEX + CCS_SYS_CHMOD]
168     = "capability::SYS_CHMOD",
169     [CCS_MAX_MAC_INDEX + CCS_SYS_CHOWN]
170     = "capability::SYS_CHOWN",
171     [CCS_MAX_MAC_INDEX + CCS_SYS_IOCTL]
172     = "capability::SYS_IOCTL",
173     [CCS_MAX_MAC_INDEX + CCS_SYS_KEXEC_LOAD]
174     = "capability::SYS_KEXEC_LOAD",
175     [CCS_MAX_MAC_INDEX + CCS_SYS_PIVOT_ROOT]
176     = "capability::SYS_PIVOT_ROOT",
177     [CCS_MAX_MAC_INDEX + CCS_SYS_PTRACE]
178     = "capability::SYS_PTRACE",
179     [CCS_MAX_MAC_INDEX + CCS_CONCEAL_MOUNT]
180     = "capability::conceal_mount",
181     [CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
182     + CCS_MAC_CATEGORY_FILE] = "file",
183     [CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
184     + CCS_MAC_CATEGORY_NETWORK] = "network",
185     [CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
186     + CCS_MAC_CATEGORY_MISC] = "misc",
187     [CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
188     + CCS_MAC_CATEGORY_IPC] = "ipc",
189     [CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
190     + CCS_MAC_CATEGORY_CAPABILITY] = "capability",
191 kumaneko 2915 };
192    
193 kumaneko 2863 /* Permit policy management by non-root user? */
194     static bool ccs_manage_by_non_root;
195    
196     /**
197 kumaneko 2918 * ccs_cap2keyword - Convert capability operation to capability name.
198     *
199     * @operation: The capability index.
200     *
201     * Returns the name of the specified capability's name.
202     */
203     const char *ccs_cap2keyword(const u8 operation)
204     {
205     return operation < CCS_MAX_CAPABILITY_INDEX
206 kumaneko 2943 ? ccs_mac_keywords[CCS_MAX_MAC_INDEX + operation] + 12 : NULL;
207 kumaneko 2918 }
208    
209     /**
210 kumaneko 2958 * ccs_yesno - Return "yes" or "no".
211 kumaneko 2863 *
212 kumaneko 2958 * @value: Bool value.
213 kumaneko 2863 */
214 kumaneko 2958 static const char *ccs_yesno(const unsigned int value)
215 kumaneko 2863 {
216 kumaneko 2958 return value ? "yes" : "no";
217 kumaneko 2863 }
218    
219     /**
220     * ccs_io_printf - Transactional printf() to "struct ccs_io_buffer" structure.
221     *
222     * @head: Pointer to "struct ccs_io_buffer".
223     * @fmt: The printf()'s format string, followed by parameters.
224     *
225     * Returns true on success, false otherwise.
226     *
227     * The snprintf() will truncate, but ccs_io_printf() won't.
228     */
229     bool ccs_io_printf(struct ccs_io_buffer *head, const char *fmt, ...)
230     {
231     va_list args;
232     int len;
233     int pos = head->read_avail;
234     int size = head->readbuf_size - pos;
235     if (size <= 0)
236     return false;
237     va_start(args, fmt);
238     len = vsnprintf(head->read_buf + pos, size, fmt, args);
239     va_end(args);
240     if (pos + len >= head->readbuf_size)
241     return false;
242     head->read_avail += len;
243     return true;
244     }
245    
246     /**
247     * ccs_find_or_assign_new_profile - Create a new profile.
248     *
249     * @profile: Profile number to create.
250     *
251     * Returns pointer to "struct ccs_profile" on success, NULL otherwise.
252     */
253 kumaneko 2892 static struct ccs_profile *ccs_find_or_assign_new_profile(const unsigned int
254     profile)
255 kumaneko 2863 {
256     struct ccs_profile *ptr;
257     struct ccs_profile *entry;
258 kumaneko 2892 if (profile >= CCS_MAX_PROFILES)
259 kumaneko 2863 return NULL;
260     ptr = ccs_profile_ptr[profile];
261     if (ptr)
262     return ptr;
263     entry = kzalloc(sizeof(*entry), GFP_KERNEL);
264     mutex_lock(&ccs_policy_lock);
265     ptr = ccs_profile_ptr[profile];
266     if (!ptr && ccs_memory_ok(entry, sizeof(*entry))) {
267     ptr = entry;
268 kumaneko 2962 ptr->audit = &ccs_default_profile.preference;
269     ptr->learning = &ccs_default_profile.preference;
270     ptr->permissive = &ccs_default_profile.preference;
271     ptr->enforcing = &ccs_default_profile.preference;
272 kumaneko 2958 ptr->default_config = CCS_CONFIG_DISABLED |
273     CCS_CONFIG_WANT_GRANT_LOG | CCS_CONFIG_WANT_REJECT_LOG;
274     memset(ptr->config, CCS_CONFIG_USE_DEFAULT,
275 kumaneko 2943 sizeof(ptr->config));
276 kumaneko 2863 mb(); /* Avoid out-of-order execution. */
277     ccs_profile_ptr[profile] = ptr;
278     entry = NULL;
279     }
280     mutex_unlock(&ccs_policy_lock);
281     kfree(entry);
282     return ptr;
283     }
284    
285     /**
286 kumaneko 2991 * ccs_check_profile - Check all profiles currently assigned to domains are defined.
287     */
288     void ccs_check_profile(void)
289     {
290     struct ccs_domain_info *domain;
291     ccs_policy_loaded = true;
292     list_for_each_entry_rcu(domain, &ccs_domain_list, list) {
293     const u8 profile = domain->profile;
294     if (ccs_profile_ptr[profile])
295     continue;
296     panic("Profile %u (used by '%s') not defined.\n",
297     profile, domain->domainname->name);
298     }
299 kumaneko 3158 if (ccs_profile_version != 20090903)
300     panic("Profile version %u is not supported.\n",
301     ccs_profile_version);
302 kumaneko 2991 }
303    
304     /**
305 kumaneko 2958 * ccs_profile - Find a profile.
306     *
307     * @profile: Profile number to find.
308     *
309 kumaneko 2991 * Returns pointer to "struct ccs_profile".
310 kumaneko 2958 */
311     struct ccs_profile *ccs_profile(const u8 profile)
312     {
313 kumaneko 2974 struct ccs_profile *ptr = ccs_profile_ptr[profile];
314 kumaneko 2962 if (!ccs_policy_loaded)
315     return &ccs_default_profile;
316 kumaneko 2974 BUG_ON(!ptr);
317     return ptr;
318 kumaneko 2958 }
319    
320     /**
321 kumaneko 2863 * ccs_write_profile - Write profile table.
322     *
323     * @head: Pointer to "struct ccs_io_buffer".
324     *
325     * Returns 0 on success, negative value otherwise.
326     */
327     static int ccs_write_profile(struct ccs_io_buffer *head)
328     {
329     char *data = head->write_buf;
330     unsigned int i;
331 kumaneko 2958 int value;
332 kumaneko 2915 int mode;
333 kumaneko 2943 u8 config;
334 kumaneko 2962 bool use_default = false;
335 kumaneko 2863 char *cp;
336 kumaneko 2958 struct ccs_profile *profile;
337 kumaneko 3158 if (sscanf(data, "PROFILE_VERSION=%u", &ccs_profile_version) == 1)
338     return 0;
339 kumaneko 2863 i = simple_strtoul(data, &cp, 10);
340 kumaneko 2962 if (data == cp) {
341     profile = &ccs_default_profile;
342     } else {
343 kumaneko 2863 if (*cp != '-')
344     return -EINVAL;
345     data = cp + 1;
346 kumaneko 2962 profile = ccs_find_or_assign_new_profile(i);
347     if (!profile)
348     return -EINVAL;
349 kumaneko 2863 }
350     cp = strchr(data, '=');
351     if (!cp)
352     return -EINVAL;
353 kumaneko 2925 *cp++ = '\0';
354 kumaneko 2962 if (profile != &ccs_default_profile)
355     use_default = strstr(cp, "use_default") != NULL;
356     if (strstr(cp, "verbose=yes"))
357     value = 1;
358     else if (strstr(cp, "verbose=no"))
359     value = 0;
360     else
361     value = -1;
362 kumaneko 3069 if (!strcmp(data, "PREFERENCE::audit")) {
363 kumaneko 2959 #ifdef CONFIG_CCSECURITY_AUDIT
364 kumaneko 2962 char *cp2;
365 kumaneko 3069 #endif
366 kumaneko 2962 if (use_default) {
367     profile->audit = &ccs_default_profile.preference;
368     return 0;
369     }
370     profile->audit = &profile->preference;
371 kumaneko 3069 #ifdef CONFIG_CCSECURITY_AUDIT
372 kumaneko 2962 cp2 = strstr(cp, "max_grant_log=");
373 kumaneko 2958 if (cp2)
374 kumaneko 2962 sscanf(cp2 + 14, "%u",
375     &profile->preference.audit_max_grant_log);
376 kumaneko 2958 cp2 = strstr(cp, "max_reject_log=");
377     if (cp2)
378 kumaneko 2962 sscanf(cp2 + 15, "%u",
379     &profile->preference.audit_max_reject_log);
380 kumaneko 3069 #endif
381 kumaneko 3064 if (strstr(cp, "task_info=yes"))
382     profile->preference.audit_task_info = true;
383     else if (strstr(cp, "task_info=no"))
384     profile->preference.audit_task_info = false;
385     if (strstr(cp, "path_info=yes"))
386     profile->preference.audit_path_info = true;
387     else if (strstr(cp, "path_info=no"))
388     profile->preference.audit_path_info = false;
389 kumaneko 2863 return 0;
390     }
391 kumaneko 2958 if (!strcmp(data, "PREFERENCE::enforcing")) {
392     char *cp2;
393 kumaneko 2962 if (use_default) {
394     profile->enforcing = &ccs_default_profile.preference;
395     return 0;
396     }
397     profile->enforcing = &profile->preference;
398 kumaneko 2958 if (value >= 0)
399 kumaneko 2962 profile->preference.enforcing_verbose = value;
400 kumaneko 2958 cp2 = strstr(cp, "penalty=");
401     if (cp2)
402 kumaneko 2962 sscanf(cp2 + 8, "%u",
403     &profile->preference.enforcing_penalty);
404 kumaneko 2958 return 0;
405     }
406     if (!strcmp(data, "PREFERENCE::permissive")) {
407 kumaneko 2962 if (use_default) {
408     profile->permissive = &ccs_default_profile.preference;
409     return 0;
410     }
411     profile->permissive = &profile->preference;
412 kumaneko 2958 if (value >= 0)
413 kumaneko 2962 profile->preference.permissive_verbose = value;
414 kumaneko 2958 return 0;
415     }
416     if (!strcmp(data, "PREFERENCE::learning")) {
417     char *cp2;
418 kumaneko 2962 if (use_default) {
419     profile->learning = &ccs_default_profile.preference;
420     return 0;
421     }
422     profile->learning = &profile->preference;
423 kumaneko 2958 if (value >= 0)
424 kumaneko 2962 profile->preference.learning_verbose = value;
425 kumaneko 2958 cp2 = strstr(cp, "max_entry=");
426     if (cp2)
427 kumaneko 2962 sscanf(cp2 + 10, "%u",
428     &profile->preference.learning_max_entry);
429 kumaneko 2958 if (strstr(cp, "exec.realpath=yes"))
430 kumaneko 2962 profile->preference.learning_exec_realpath = true;
431 kumaneko 2958 else if (strstr(cp, "exec.realpath=no"))
432 kumaneko 2962 profile->preference.learning_exec_realpath = false;
433 kumaneko 2958 if (strstr(cp, "exec.argv0=yes"))
434 kumaneko 2962 profile->preference.learning_exec_argv0 = true;
435 kumaneko 2958 else if (strstr(cp, "exec.argv0=no"))
436 kumaneko 2962 profile->preference.learning_exec_argv0 = false;
437 kumaneko 2961 if (strstr(cp, "symlink.target=yes"))
438 kumaneko 2962 profile->preference.learning_symlink_target = true;
439 kumaneko 2961 else if (strstr(cp, "symlink.target=no"))
440 kumaneko 2962 profile->preference.learning_symlink_target = false;
441 kumaneko 2958 return 0;
442     }
443 kumaneko 2962 if (profile == &ccs_default_profile)
444     return -EINVAL;
445     if (!strcmp(data, "COMMENT")) {
446 kumaneko 3131 const struct ccs_path_info *old_comment = profile->comment;
447     profile->comment = ccs_get_name(cp);
448 kumaneko 2962 ccs_put_name(old_comment);
449     return 0;
450     }
451 kumaneko 2958 if (!strcmp(data, "CONFIG")) {
452     i = CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
453     + CCS_MAX_MAC_CATEGORY_INDEX;
454     config = profile->default_config;
455     } else if (ccs_str_starts(&data, "CONFIG::")) {
456     config = 0;
457 kumaneko 2943 for (i = 0; i < CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
458     + CCS_MAX_MAC_CATEGORY_INDEX; i++) {
459     if (strcmp(data, ccs_mac_keywords[i]))
460     continue;
461 kumaneko 2958 config = profile->config[i];
462 kumaneko 2943 break;
463     }
464 kumaneko 2958 if (i == CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
465     + CCS_MAX_MAC_CATEGORY_INDEX)
466     return -EINVAL;
467     } else {
468     return -EINVAL;
469     }
470 kumaneko 2962 if (use_default) {
471 kumaneko 2958 config = CCS_CONFIG_USE_DEFAULT;
472     } else {
473     for (mode = 3; mode >= 0; mode--)
474     if (strstr(cp, ccs_mode_4[mode]))
475     /*
476     * Update lower 3 bits in order to distinguish
477     * 'config' from 'CCS_CONFIG_USE_DEAFULT'.
478     */
479     config = (config & ~7) | mode;
480 kumaneko 2959 #ifdef CONFIG_CCSECURITY_AUDIT
481 kumaneko 2958 if (config != CCS_CONFIG_USE_DEFAULT) {
482     if (strstr(cp, "grant_log=yes"))
483     config |= CCS_CONFIG_WANT_GRANT_LOG;
484     else if (strstr(cp, "grant_log=no"))
485     config &= ~CCS_CONFIG_WANT_GRANT_LOG;
486     if (strstr(cp, "reject_log=yes"))
487     config |= CCS_CONFIG_WANT_REJECT_LOG;
488     else if (strstr(cp, "reject_log=no"))
489     config &= ~CCS_CONFIG_WANT_REJECT_LOG;
490     }
491 kumaneko 2959 #endif
492 kumaneko 2958 }
493     if (i < CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
494     + CCS_MAX_MAC_CATEGORY_INDEX)
495     profile->config[i] = config;
496     else if (config != CCS_CONFIG_USE_DEFAULT)
497     profile->default_config = config;
498 kumaneko 2943 return 0;
499 kumaneko 2863 }
500    
501     /**
502     * ccs_read_profile - Read profile table.
503     *
504     * @head: Pointer to "struct ccs_io_buffer".
505     */
506 kumaneko 2943 static void ccs_read_profile(struct ccs_io_buffer *head)
507 kumaneko 2863 {
508 kumaneko 2958 int index;
509 kumaneko 2863 if (head->read_eof)
510 kumaneko 2943 return;
511 kumaneko 2965 if (head->read_bit)
512     goto body;
513 kumaneko 2976 ccs_io_printf(head, "PROFILE_VERSION=%s\n", "20090903");
514 kumaneko 3069 ccs_io_printf(head, "PREFERENCE::audit={ "
515 kumaneko 2962 #ifdef CONFIG_CCSECURITY_AUDIT
516 kumaneko 3069 "max_grant_log=%u max_reject_log=%u "
517     #endif
518     "task_info=%s path_info=%s }\n",
519     #ifdef CONFIG_CCSECURITY_AUDIT
520 kumaneko 2962 ccs_default_profile.preference.audit_max_grant_log,
521 kumaneko 3064 ccs_default_profile.preference.audit_max_reject_log,
522 kumaneko 3069 #endif
523 kumaneko 3064 ccs_yesno(ccs_default_profile.preference.
524     audit_task_info),
525     ccs_yesno(ccs_default_profile.preference.
526     audit_path_info));
527 kumaneko 2962 ccs_io_printf(head, "PREFERENCE::learning={ verbose=%s max_entry=%u "
528     "exec.realpath=%s exec.argv0=%s symlink.target=%s }\n",
529 kumaneko 2973 ccs_yesno(ccs_default_profile.preference.
530     learning_verbose),
531 kumaneko 2962 ccs_default_profile.preference.learning_max_entry,
532     ccs_yesno(ccs_default_profile.preference.
533 kumaneko 2973 learning_exec_realpath),
534     ccs_yesno(ccs_default_profile.preference.
535     learning_exec_argv0),
536     ccs_yesno(ccs_default_profile.preference.
537 kumaneko 2962 learning_symlink_target));
538     ccs_io_printf(head, "PREFERENCE::permissive={ verbose=%s }\n",
539 kumaneko 2973 ccs_yesno(ccs_default_profile.preference.
540     permissive_verbose));
541 kumaneko 2962 ccs_io_printf(head, "PREFERENCE::enforcing={ verbose=%s penalty=%u "
542     "}\n",
543 kumaneko 2973 ccs_yesno(ccs_default_profile.preference.
544     enforcing_verbose),
545 kumaneko 2962 ccs_default_profile.preference.enforcing_penalty);
546 kumaneko 2965 head->read_bit = 1;
547     body:
548 kumaneko 2958 for (index = head->read_step; index < CCS_MAX_PROFILES; index++) {
549     bool done;
550     u8 config;
551     int i;
552 kumaneko 2965 int pos;
553 kumaneko 2958 const struct ccs_profile *profile = ccs_profile_ptr[index];
554 kumaneko 3131 const struct ccs_path_info *comment;
555 kumaneko 2958 head->read_step = index;
556     if (!profile)
557 kumaneko 2863 continue;
558 kumaneko 2965 pos = head->read_avail;
559 kumaneko 3131 comment = profile->comment;
560 kumaneko 2958 done = ccs_io_printf(head, "%u-COMMENT=%s\n", index,
561 kumaneko 3131 comment ? comment->name : "");
562 kumaneko 2958 if (!done)
563     goto out;
564     config = profile->default_config;
565 kumaneko 2959 #ifdef CONFIG_CCSECURITY_AUDIT
566 kumaneko 2958 if (!ccs_io_printf(head, "%u-CONFIG={ mode=%s grant_log=%s "
567     "reject_log=%s }\n", index,
568     ccs_mode_4[config & 3],
569     ccs_yesno(config &
570     CCS_CONFIG_WANT_GRANT_LOG),
571     ccs_yesno(config &
572     CCS_CONFIG_WANT_REJECT_LOG)))
573     goto out;
574 kumaneko 2959 #else
575     if (!ccs_io_printf(head, "%u-CONFIG={ mode=%s }\n", index,
576     ccs_mode_4[config & 3]))
577     goto out;
578     #endif
579 kumaneko 2958 for (i = 0; i < CCS_MAX_MAC_INDEX + CCS_MAX_CAPABILITY_INDEX
580     + CCS_MAX_MAC_CATEGORY_INDEX; i++) {
581 kumaneko 2959 #ifdef CONFIG_CCSECURITY_AUDIT
582 kumaneko 2958 const char *g;
583     const char *r;
584 kumaneko 2959 #endif
585 kumaneko 2958 config = profile->config[i];
586     if (config == CCS_CONFIG_USE_DEFAULT)
587     continue;
588 kumaneko 2959 #ifdef CONFIG_CCSECURITY_AUDIT
589 kumaneko 2958 g = ccs_yesno(config & CCS_CONFIG_WANT_GRANT_LOG);
590     r = ccs_yesno(config & CCS_CONFIG_WANT_REJECT_LOG);
591     if (!ccs_io_printf(head, "%u-CONFIG::%s={ mode=%s "
592     "grant_log=%s reject_log=%s }\n",
593     index, ccs_mac_keywords[i],
594     ccs_mode_4[config & 3], g, r))
595     goto out;
596 kumaneko 2959 #else
597     if (!ccs_io_printf(head, "%u-CONFIG::%s={ mode=%s }\n",
598     index, ccs_mac_keywords[i],
599     ccs_mode_4[config & 3]))
600     goto out;
601     #endif
602 kumaneko 2908 }
603 kumaneko 2962 if (profile->audit != &ccs_default_profile.preference &&
604     !ccs_io_printf(head, "%u-PREFERENCE::audit={ "
605 kumaneko 3069 #ifdef CONFIG_CCSECURITY_AUDIT
606 kumaneko 3064 "max_grant_log=%u max_reject_log=%u "
607 kumaneko 3069 #endif
608 kumaneko 3064 "task_info=%s path_info=%s }\n", index,
609 kumaneko 3069 #ifdef CONFIG_CCSECURITY_AUDIT
610 kumaneko 2962 profile->preference.audit_max_grant_log,
611 kumaneko 3064 profile->preference.audit_max_reject_log,
612 kumaneko 3069 #endif
613 kumaneko 3064 ccs_yesno(profile->preference.
614     audit_task_info),
615     ccs_yesno(profile->preference.
616     audit_path_info)))
617 kumaneko 2959 goto out;
618 kumaneko 2962 if (profile->learning != &ccs_default_profile.preference &&
619     !ccs_io_printf(head, "%u-PREFERENCE::learning={ "
620 kumaneko 2958 "verbose=%s max_entry=%u exec.realpath=%s "
621 kumaneko 2961 "exec.argv0=%s symlink.target=%s }\n",
622 kumaneko 2962 index,
623     ccs_yesno(profile->preference.
624     learning_verbose),
625     profile->preference.learning_max_entry,
626     ccs_yesno(profile->preference.
627     learning_exec_realpath),
628     ccs_yesno(profile->preference.
629     learning_exec_argv0),
630     ccs_yesno(profile->preference.
631     learning_symlink_target)))
632 kumaneko 2958 goto out;
633 kumaneko 2962 if (profile->permissive != &ccs_default_profile.preference &&
634     !ccs_io_printf(head, "%u-PREFERENCE::permissive={ "
635     "verbose=%s }\n", index,
636     ccs_yesno(profile->preference.
637     permissive_verbose)))
638     goto out;
639     if (profile->enforcing != &ccs_default_profile.preference &&
640     !ccs_io_printf(head, "%u-PREFERENCE::enforcing={ "
641     "verbose=%s penalty=%u }\n", index,
642     ccs_yesno(profile->preference.
643     enforcing_verbose),
644     profile->preference.enforcing_penalty))
645     goto out;
646 kumaneko 2958 continue;
647     out:
648     head->read_avail = pos;
649     break;
650 kumaneko 2863 }
651 kumaneko 2958 if (index == CCS_MAX_PROFILES)
652 kumaneko 2863 head->read_eof = true;
653     }
654    
655     /* The list for "struct ccs_policy_manager_entry". */
656     LIST_HEAD(ccs_policy_manager_list);
657    
658     /**
659     * ccs_update_manager_entry - Add a manager entry.
660     *
661     * @manager: The path to manager or the domainnamme.
662     * @is_delete: True if it is a delete request.
663     *
664     * Returns 0 on success, negative value otherwise.
665     */
666     static int ccs_update_manager_entry(const char *manager, const bool is_delete)
667     {
668     struct ccs_policy_manager_entry *entry = NULL;
669     struct ccs_policy_manager_entry *ptr;
670 kumaneko 2900 struct ccs_policy_manager_entry e = { };
671 kumaneko 2863 int error = is_delete ? -ENOENT : -ENOMEM;
672     if (ccs_is_domain_def(manager)) {
673     if (!ccs_is_correct_domain(manager))
674     return -EINVAL;
675 kumaneko 2900 e.is_domain = true;
676 kumaneko 2863 } else {
677     if (!ccs_is_correct_path(manager, 1, -1, -1))
678     return -EINVAL;
679     }
680 kumaneko 2900 e.manager = ccs_get_name(manager);
681     if (!e.manager)
682 kumaneko 2863 return -ENOMEM;
683     if (!is_delete)
684 kumaneko 2900 entry = kmalloc(sizeof(e), GFP_KERNEL);
685 kumaneko 2863 mutex_lock(&ccs_policy_lock);
686     list_for_each_entry_rcu(ptr, &ccs_policy_manager_list, list) {
687 kumaneko 2900 if (ptr->manager != e.manager)
688 kumaneko 2863 continue;
689     ptr->is_deleted = is_delete;
690     error = 0;
691     break;
692     }
693 kumaneko 2900 if (!is_delete && error && ccs_commit_ok(entry, &e, sizeof(e))) {
694 kumaneko 2863 list_add_tail_rcu(&entry->list, &ccs_policy_manager_list);
695     entry = NULL;
696     error = 0;
697     }
698     mutex_unlock(&ccs_policy_lock);
699 kumaneko 2900 ccs_put_name(e.manager);
700 kumaneko 2863 kfree(entry);
701     return error;
702     }
703    
704     /**
705     * ccs_write_manager_policy - Write manager policy.
706     *
707     * @head: Pointer to "struct ccs_io_buffer".
708     *
709     * Returns 0 on success, negative value otherwise.
710     */
711     static int ccs_write_manager_policy(struct ccs_io_buffer *head)
712     {
713     char *data = head->write_buf;
714 kumaneko 2892 bool is_delete = ccs_str_starts(&data, CCS_KEYWORD_DELETE);
715 kumaneko 2863 if (!strcmp(data, "manage_by_non_root")) {
716     ccs_manage_by_non_root = !is_delete;
717     return 0;
718     }
719     return ccs_update_manager_entry(data, is_delete);
720     }
721    
722     /**
723     * ccs_read_manager_policy - Read manager policy.
724     *
725     * @head: Pointer to "struct ccs_io_buffer".
726     *
727     * Caller holds ccs_read_lock().
728     */
729 kumaneko 2943 static void ccs_read_manager_policy(struct ccs_io_buffer *head)
730 kumaneko 2863 {
731     struct list_head *pos;
732     if (head->read_eof)
733 kumaneko 2943 return;
734 kumaneko 2863 list_for_each_cookie(pos, head->read_var2, &ccs_policy_manager_list) {
735     struct ccs_policy_manager_entry *ptr;
736     ptr = list_entry(pos, struct ccs_policy_manager_entry, list);
737     if (ptr->is_deleted)
738     continue;
739     if (!ccs_io_printf(head, "%s\n", ptr->manager->name))
740 kumaneko 2943 return;
741 kumaneko 2863 }
742     head->read_eof = true;
743     }
744    
745     /**
746     * ccs_is_policy_manager - Check whether the current process is a policy manager.
747     *
748     * Returns true if the current process is permitted to modify policy
749     * via /proc/ccs/ interface.
750     *
751     * Caller holds ccs_read_lock().
752     */
753     static bool ccs_is_policy_manager(void)
754     {
755     struct ccs_policy_manager_entry *ptr;
756     const char *exe;
757     struct task_struct *task = current;
758     const struct ccs_path_info *domainname
759     = ccs_current_domain()->domainname;
760     bool found = false;
761     if (!ccs_policy_loaded)
762     return true;
763     if (task->ccs_flags & CCS_TASK_IS_POLICY_MANAGER)
764     return true;
765     if (!ccs_manage_by_non_root && (current_uid() || current_euid()))
766     return false;
767     list_for_each_entry_rcu(ptr, &ccs_policy_manager_list, list) {
768     if (!ptr->is_deleted && ptr->is_domain
769     && !ccs_pathcmp(domainname, ptr->manager)) {
770     /* Set manager flag. */
771     task->ccs_flags |= CCS_TASK_IS_POLICY_MANAGER;
772     return true;
773     }
774     }
775     exe = ccs_get_exe();
776     if (!exe)
777     return false;
778     list_for_each_entry_rcu(ptr, &ccs_policy_manager_list, list) {
779     if (!ptr->is_deleted && !ptr->is_domain
780     && !strcmp(exe, ptr->manager->name)) {
781     found = true;
782     /* Set manager flag. */
783     task->ccs_flags |= CCS_TASK_IS_POLICY_MANAGER;
784     break;
785     }
786     }
787     if (!found) { /* Reduce error messages. */
788     static pid_t ccs_last_pid;
789     const pid_t pid = current->pid;
790     if (ccs_last_pid != pid) {
791     printk(KERN_WARNING "%s ( %s ) is not permitted to "
792     "update policies.\n", domainname->name, exe);
793     ccs_last_pid = pid;
794     }
795     }
796     kfree(exe);
797     return found;
798     }
799    
800     /**
801     * ccs_find_condition_part - Find condition part from the statement.
802     *
803     * @data: String to parse.
804     *
805     * Returns pointer to the condition part if it was found in the statement,
806     * NULL otherwise.
807     */
808     static char *ccs_find_condition_part(char *data)
809     {
810     char *cp = strstr(data, " if ");
811     if (cp) {
812     while (1) {
813     char *cp2 = strstr(cp + 3, " if ");
814     if (!cp2)
815     break;
816     cp = cp2;
817     }
818     *cp++ = '\0';
819     } else {
820     cp = strstr(data, " ; set ");
821     if (cp)
822     *cp++ = '\0';
823     }
824     return cp;
825     }
826    
827     /**
828     * ccs_is_select_one - Parse select command.
829     *
830     * @head: Pointer to "struct ccs_io_buffer".
831     * @data: String to parse.
832     *
833     * Returns true on success, false otherwise.
834     *
835     * Caller holds ccs_read_lock().
836     */
837     static bool ccs_is_select_one(struct ccs_io_buffer *head, const char *data)
838     {
839     unsigned int pid;
840     struct ccs_domain_info *domain = NULL;
841 kumaneko 2970 bool global_pid = false;
842 kumaneko 2863 if (!strcmp(data, "allow_execute")) {
843     head->read_execute_only = true;
844     return true;
845     }
846 kumaneko 2970 if (sscanf(data, "pid=%u", &pid) == 1 ||
847     (global_pid = true, sscanf(data, "global-pid=%u", &pid) == 1)) {
848 kumaneko 2863 struct task_struct *p;
849 kumaneko 3248 ccs_tasklist_lock();
850 kumaneko 2970 #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 24)
851     if (global_pid)
852     p = find_task_by_pid_ns(pid, &init_pid_ns);
853     else
854     p = find_task_by_vpid(pid);
855     #else
856 kumaneko 2863 p = find_task_by_pid(pid);
857 kumaneko 2970 #endif
858 kumaneko 2863 if (p)
859     domain = ccs_task_domain(p);
860 kumaneko 3248 ccs_tasklist_unlock();
861 kumaneko 2863 } else if (!strncmp(data, "domain=", 7)) {
862     if (ccs_is_domain_def(data + 7))
863     domain = ccs_find_domain(data + 7);
864     } else
865     return false;
866     head->write_var1 = domain;
867     /* Accessing read_buf is safe because head->io_sem is held. */
868     if (!head->read_buf)
869     return true; /* Do nothing if open(O_WRONLY). */
870     head->read_avail = 0;
871     ccs_io_printf(head, "# select %s\n", data);
872     head->read_single_domain = true;
873     head->read_eof = !domain;
874     if (domain) {
875     struct ccs_domain_info *d;
876     head->read_var1 = NULL;
877     list_for_each_entry_rcu(d, &ccs_domain_list, list) {
878     if (d == domain)
879     break;
880     head->read_var1 = &d->list;
881     }
882     head->read_var2 = NULL;
883     head->read_bit = 0;
884     head->read_step = 0;
885     if (domain->is_deleted)
886     ccs_io_printf(head, "# This is a deleted domain.\n");
887     }
888     return true;
889     }
890    
891 kumaneko 2897 static int ccs_write_domain_policy2(char *data, struct ccs_domain_info *domain,
892     struct ccs_condition *cond,
893     const bool is_delete)
894     {
895     if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_CAPABILITY))
896     return ccs_write_capability_policy(data, domain, cond,
897     is_delete);
898     if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_NETWORK))
899     return ccs_write_network_policy(data, domain, cond, is_delete);
900     if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_SIGNAL))
901     return ccs_write_signal_policy(data, domain, cond, is_delete);
902     if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_ENV))
903     return ccs_write_env_policy(data, domain, cond, is_delete);
904     if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_MOUNT))
905     return ccs_write_mount_policy(data, domain, cond, is_delete);
906     return ccs_write_file_policy(data, domain, cond, is_delete);
907     }
908    
909 kumaneko 2863 /**
910     * ccs_write_domain_policy - Write domain policy.
911     *
912     * @head: Pointer to "struct ccs_io_buffer".
913     *
914     * Returns 0 on success, negative value otherwise.
915     */
916     static int ccs_write_domain_policy(struct ccs_io_buffer *head)
917     {
918     char *data = head->write_buf;
919     struct ccs_domain_info *domain = head->write_var1;
920     bool is_delete = false;
921     bool is_select = false;
922     unsigned int profile;
923     struct ccs_condition *cond = NULL;
924     char *cp;
925     int error;
926 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_DELETE))
927 kumaneko 2863 is_delete = true;
928 kumaneko 2892 else if (ccs_str_starts(&data, CCS_KEYWORD_SELECT))
929 kumaneko 2863 is_select = true;
930     if (is_select && ccs_is_select_one(head, data))
931     return 0;
932     /* Don't allow updating policies by non manager programs. */
933     if (!ccs_is_policy_manager())
934     return -EPERM;
935     if (ccs_is_domain_def(data)) {
936     domain = NULL;
937     if (is_delete)
938     ccs_delete_domain(data);
939     else if (is_select)
940     domain = ccs_find_domain(data);
941     else
942     domain = ccs_find_or_assign_new_domain(data, 0);
943     head->write_var1 = domain;
944     return 0;
945     }
946     if (!domain)
947     return -EINVAL;
948    
949 kumaneko 2892 if (sscanf(data, CCS_KEYWORD_USE_PROFILE "%u", &profile) == 1
950     && profile < CCS_MAX_PROFILES) {
951 kumaneko 2991 if (!ccs_policy_loaded || ccs_profile_ptr[(u8) profile])
952 kumaneko 2863 domain->profile = (u8) profile;
953     return 0;
954     }
955 kumaneko 2892 if (!strcmp(data, CCS_KEYWORD_IGNORE_GLOBAL_ALLOW_READ)) {
956 kumaneko 2863 domain->ignore_global_allow_read = !is_delete;
957     return 0;
958     }
959 kumaneko 2892 if (!strcmp(data, CCS_KEYWORD_IGNORE_GLOBAL_ALLOW_ENV)) {
960 kumaneko 2863 domain->ignore_global_allow_env = !is_delete;
961     return 0;
962     }
963 kumaneko 3258 if (!strcmp(data, CCS_KEYWORD_QUOTA_EXCEEDED)) {
964     domain->quota_warned = !is_delete;
965     return 0;
966     }
967     if (!strcmp(data, CCS_KEYWORD_TRANSITION_FAILED)) {
968     domain->domain_transition_failed = !is_delete;
969     return 0;
970     }
971 kumaneko 2863 cp = ccs_find_condition_part(data);
972     if (cp) {
973     cond = ccs_get_condition(cp);
974     if (!cond)
975     return -EINVAL;
976     }
977 kumaneko 2897 error = ccs_write_domain_policy2(data, domain, cond, is_delete);
978 kumaneko 2863 if (cond)
979     ccs_put_condition(cond);
980     return error;
981     }
982    
983 kumaneko 2948 /**
984     * ccs_print_name_union - Print a ccs_name_union.
985     *
986     * @head: Pointer to "struct ccs_io_buffer".
987     * @ptr: Pointer to "struct ccs_name_union".
988     *
989     * Returns true on success, false otherwise.
990     */
991 kumaneko 2888 static bool ccs_print_name_union(struct ccs_io_buffer *head,
992 kumaneko 2894 const struct ccs_name_union *ptr)
993 kumaneko 2863 {
994 kumaneko 2894 int pos = head->read_avail;
995 kumaneko 2863 if (pos && head->read_buf[pos - 1] == ' ')
996     head->read_avail--;
997 kumaneko 2888 if (ptr->is_group)
998 kumaneko 2870 return ccs_io_printf(head, " @%s",
999 kumaneko 2888 ptr->group->group_name->name);
1000     return ccs_io_printf(head, " %s", ptr->filename->name);
1001 kumaneko 2863 }
1002    
1003 kumaneko 2948 /**
1004     * ccs_print_name_union_quoted - Print a ccs_name_union with double quotes.
1005     *
1006     * @head: Pointer to "struct ccs_io_buffer".
1007     * @ptr: Pointer to "struct ccs_name_union".
1008     *
1009     * Returns true on success, false otherwise.
1010     */
1011 kumaneko 2894 static bool ccs_print_name_union_quoted(struct ccs_io_buffer *head,
1012     const struct ccs_name_union *ptr)
1013 kumaneko 2863 {
1014 kumaneko 2894 if (ptr->is_group)
1015     return ccs_io_printf(head, "@%s",
1016     ptr->group->group_name->name);
1017     return ccs_io_printf(head, "\"%s\"", ptr->filename->name);
1018     }
1019    
1020 kumaneko 2948 /**
1021     * ccs_print_number_union_common - Print a ccs_number_union.
1022     *
1023     * @head: Pointer to "struct ccs_io_buffer".
1024     * @ptr: Pointer to "struct ccs_number_union".
1025     * @need_space: True if a space character is needed.
1026     *
1027     * Returns true on success, false otherwise.
1028     */
1029 kumaneko 2894 static bool ccs_print_number_union_common(struct ccs_io_buffer *head,
1030     const struct ccs_number_union *ptr,
1031     const bool need_space)
1032     {
1033 kumaneko 2888 unsigned long min;
1034     unsigned long max;
1035 kumaneko 2890 u8 min_type;
1036     u8 max_type;
1037 kumaneko 2894 if (need_space && !ccs_io_printf(head, " "))
1038     return false;
1039 kumaneko 2888 if (ptr->is_group)
1040 kumaneko 2894 return ccs_io_printf(head, "@%s",
1041 kumaneko 2888 ptr->group->group_name->name);
1042 kumaneko 2890 min_type = ptr->min_type;
1043     max_type = ptr->max_type;
1044 kumaneko 2888 min = ptr->values[0];
1045     max = ptr->values[1];
1046 kumaneko 2890 switch (min_type) {
1047 kumaneko 2892 case CCS_VALUE_TYPE_HEXADECIMAL:
1048 kumaneko 2894 if (!ccs_io_printf(head, "0x%lX", min))
1049 kumaneko 2890 return false;
1050     break;
1051 kumaneko 2892 case CCS_VALUE_TYPE_OCTAL:
1052 kumaneko 2894 if (!ccs_io_printf(head, "0%lo", min))
1053 kumaneko 2890 return false;
1054     break;
1055     default:
1056 kumaneko 2894 if (!ccs_io_printf(head, "%lu", min))
1057 kumaneko 2890 return false;
1058     break;
1059     }
1060     if (min == max && min_type == max_type)
1061     return true;
1062     switch (max_type) {
1063 kumaneko 2892 case CCS_VALUE_TYPE_HEXADECIMAL:
1064 kumaneko 2890 return ccs_io_printf(head, "-0x%lX", max);
1065 kumaneko 2892 case CCS_VALUE_TYPE_OCTAL:
1066 kumaneko 2890 return ccs_io_printf(head, "-0%lo", max);
1067     default:
1068     return ccs_io_printf(head, "-%lu", max);
1069     }
1070 kumaneko 2863 }
1071    
1072 kumaneko 2948 /**
1073     * ccs_print_number_union - Print a ccs_number_union.
1074     *
1075     * @head: Pointer to "struct ccs_io_buffer".
1076     * @ptr: Pointer to "struct ccs_number_union".
1077     *
1078     * Returns true on success, false otherwise.
1079     */
1080 kumaneko 2900 bool ccs_print_number_union(struct ccs_io_buffer *head,
1081     const struct ccs_number_union *ptr)
1082 kumaneko 2894 {
1083     return ccs_print_number_union_common(head, ptr, true);
1084     }
1085    
1086 kumaneko 2948 /**
1087     * ccs_print_number_union_nospace - Print a ccs_number_union without a space character.
1088     *
1089     * @head: Pointer to "struct ccs_io_buffer".
1090     * @ptr: Pointer to "struct ccs_number_union".
1091     *
1092     * Returns true on success, false otherwise.
1093     */
1094 kumaneko 2894 static bool ccs_print_number_union_nospace(struct ccs_io_buffer *head,
1095     const struct ccs_number_union *ptr)
1096     {
1097     return ccs_print_number_union_common(head, ptr, false);
1098     }
1099    
1100 kumaneko 2863 /**
1101 kumaneko 2894 * ccs_print_condition - Print condition part.
1102     *
1103     * @head: Pointer to "struct ccs_io_buffer".
1104     * @cond: Pointer to "struct ccs_condition". May be NULL.
1105     *
1106     * Returns true on success, false otherwise.
1107     */
1108     static bool ccs_print_condition(struct ccs_io_buffer *head,
1109     const struct ccs_condition *cond)
1110     {
1111     const struct ccs_condition_element *condp;
1112     const struct ccs_number_union *numbers_p;
1113     const struct ccs_name_union *names_p;
1114     const struct ccs_argv_entry *argv;
1115     const struct ccs_envp_entry *envp;
1116     u16 condc;
1117     u16 i;
1118     u16 j;
1119     char buffer[32];
1120     if (!cond)
1121     goto no_condition;
1122     condc = cond->condc;
1123     condp = (const struct ccs_condition_element *) (cond + 1);
1124     numbers_p = (const struct ccs_number_union *) (condp + condc);
1125     names_p = (const struct ccs_name_union *)
1126     (numbers_p + cond->numbers_count);
1127     argv = (const struct ccs_argv_entry *) (names_p + cond->names_count);
1128     envp = (const struct ccs_envp_entry *) (argv + cond->argc);
1129     memset(buffer, 0, sizeof(buffer));
1130     if (condc && !ccs_io_printf(head, "%s", " if"))
1131     goto out;
1132     for (i = 0; i < condc; i++) {
1133     const u8 match = condp->equals;
1134     const u8 left = condp->left;
1135     const u8 right = condp->right;
1136     condp++;
1137     switch (left) {
1138     case CCS_ARGV_ENTRY:
1139     if (!ccs_io_printf(head, " exec.argv[%u]%s\"%s\"",
1140     argv->index, argv->is_not ?
1141     "!=" : "=", argv->value->name))
1142     goto out;
1143     argv++;
1144     continue;
1145     case CCS_ENVP_ENTRY:
1146     if (!ccs_io_printf(head, " exec.envp[\"%s\"]%s",
1147     envp->name->name, envp->is_not ?
1148     "!=" : "="))
1149     goto out;
1150     if (envp->value) {
1151     if (!ccs_io_printf(head, "\"%s\"",
1152     envp->value->name))
1153     goto out;
1154     } else {
1155     if (!ccs_io_printf(head, "NULL"))
1156     goto out;
1157     }
1158     envp++;
1159     continue;
1160     case CCS_NUMBER_UNION:
1161     if (!ccs_print_number_union(head, numbers_p++))
1162     goto out;
1163     break;
1164     default:
1165     if (left >= CCS_MAX_CONDITION_KEYWORD)
1166     goto out;
1167     if (!ccs_io_printf(head, " %s",
1168     ccs_condition_keyword[left]))
1169     goto out;
1170     break;
1171     }
1172     if (!ccs_io_printf(head, "%s", match ? "=" : "!="))
1173     goto out;
1174     switch (right) {
1175     case CCS_NAME_UNION:
1176     if (!ccs_print_name_union_quoted(head, names_p++))
1177     goto out;
1178     break;
1179     case CCS_NUMBER_UNION:
1180     if (!ccs_print_number_union_nospace(head, numbers_p++))
1181     goto out;
1182     break;
1183     default:
1184     if (right >= CCS_MAX_CONDITION_KEYWORD)
1185     goto out;
1186     if (!ccs_io_printf(head, "%s",
1187     ccs_condition_keyword[right]))
1188     goto out;
1189     break;
1190     }
1191     }
1192     i = cond->post_state[3];
1193     if (!i)
1194     goto no_condition;
1195     if (!ccs_io_printf(head, " ; set"))
1196     goto out;
1197     for (j = 0; j < 3; j++) {
1198     if (!(i & (1 << j)))
1199     continue;
1200     if (!ccs_io_printf(head, " task.state[%u]=%u", j,
1201     cond->post_state[j]))
1202     goto out;
1203     }
1204     no_condition:
1205     if (ccs_io_printf(head, "\n"))
1206     return true;
1207     out:
1208     return false;
1209     }
1210    
1211     /**
1212 kumaneko 3106 * ccs_print_path_acl - Print a path ACL entry.
1213 kumaneko 2863 *
1214     * @head: Pointer to "struct ccs_io_buffer".
1215 kumaneko 2915 * @ptr: Pointer to "struct ccs_path_acl".
1216 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1217     *
1218     * Returns true on success, false otherwise.
1219     */
1220 kumaneko 2915 static bool ccs_print_path_acl(struct ccs_io_buffer *head,
1221 kumaneko 2943 struct ccs_path_acl *ptr,
1222     const struct ccs_condition *cond)
1223 kumaneko 2863 {
1224     int pos;
1225     u8 bit;
1226     const u16 perm = ptr->perm;
1227 kumaneko 2915 for (bit = head->read_bit; bit < CCS_MAX_PATH_OPERATION; bit++) {
1228 kumaneko 2863 if (!(perm & (1 << bit)))
1229     continue;
1230 kumaneko 2915 if (head->read_execute_only && bit != CCS_TYPE_EXECUTE)
1231 kumaneko 2863 continue;
1232     /* Print "read/write" instead of "read" and "write". */
1233 kumaneko 2915 if ((bit == CCS_TYPE_READ || bit == CCS_TYPE_WRITE)
1234     && (perm & (1 << CCS_TYPE_READ_WRITE)))
1235 kumaneko 2863 continue;
1236     pos = head->read_avail;
1237 kumaneko 2916 if (!ccs_io_printf(head, "allow_%s", ccs_path2keyword(bit)) ||
1238 kumaneko 2888 !ccs_print_name_union(head, &ptr->name) ||
1239 kumaneko 2897 !ccs_print_condition(head, cond)) {
1240     head->read_bit = bit;
1241     head->read_avail = pos;
1242     return false;
1243     }
1244 kumaneko 2863 }
1245     head->read_bit = 0;
1246     return true;
1247     }
1248    
1249     /**
1250 kumaneko 2922 * ccs_print_path_number3_acl - Print a path_number3 ACL entry.
1251 kumaneko 2863 *
1252     * @head: Pointer to "struct ccs_io_buffer".
1253 kumaneko 2922 * @ptr: Pointer to "struct ccs_path_number3_acl".
1254 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1255     *
1256     * Returns true on success, false otherwise.
1257     */
1258 kumaneko 2922 static bool ccs_print_path_number3_acl(struct ccs_io_buffer *head,
1259 kumaneko 2943 struct ccs_path_number3_acl *ptr,
1260     const struct ccs_condition *cond)
1261 kumaneko 2863 {
1262     int pos;
1263     u8 bit;
1264     const u16 perm = ptr->perm;
1265 kumaneko 2922 for (bit = head->read_bit; bit < CCS_MAX_PATH_NUMBER3_OPERATION;
1266 kumaneko 2916 bit++) {
1267 kumaneko 2863 if (!(perm & (1 << bit)))
1268     continue;
1269     pos = head->read_avail;
1270 kumaneko 2916 if (!ccs_io_printf(head, "allow_%s",
1271 kumaneko 2922 ccs_path_number32keyword(bit)) ||
1272 kumaneko 2888 !ccs_print_name_union(head, &ptr->name) ||
1273 kumaneko 2922 !ccs_print_number_union(head, &ptr->mode) ||
1274 kumaneko 2888 !ccs_print_number_union(head, &ptr->major) ||
1275     !ccs_print_number_union(head, &ptr->minor) ||
1276 kumaneko 2897 !ccs_print_condition(head, cond)) {
1277     head->read_bit = bit;
1278     head->read_avail = pos;
1279     return false;
1280     }
1281 kumaneko 2863 }
1282     head->read_bit = 0;
1283     return true;
1284     }
1285    
1286     /**
1287 kumaneko 2948 * ccs_print_path2_acl - Print a path2 ACL entry.
1288 kumaneko 2863 *
1289     * @head: Pointer to "struct ccs_io_buffer".
1290 kumaneko 2922 * @ptr: Pointer to "struct ccs_path2_acl".
1291 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1292     *
1293     * Returns true on success, false otherwise.
1294     */
1295 kumaneko 2922 static bool ccs_print_path2_acl(struct ccs_io_buffer *head,
1296 kumaneko 2943 struct ccs_path2_acl *ptr,
1297     const struct ccs_condition *cond)
1298 kumaneko 2863 {
1299     int pos;
1300     u8 bit;
1301     const u8 perm = ptr->perm;
1302 kumaneko 2922 for (bit = head->read_bit; bit < CCS_MAX_PATH2_OPERATION; bit++) {
1303 kumaneko 2863 if (!(perm & (1 << bit)))
1304     continue;
1305     pos = head->read_avail;
1306 kumaneko 2916 if (!ccs_io_printf(head, "allow_%s",
1307 kumaneko 2922 ccs_path22keyword(bit)) ||
1308 kumaneko 2888 !ccs_print_name_union(head, &ptr->name1) ||
1309     !ccs_print_name_union(head, &ptr->name2) ||
1310 kumaneko 2897 !ccs_print_condition(head, cond)) {
1311     head->read_bit = bit;
1312     head->read_avail = pos;
1313     return false;
1314     }
1315 kumaneko 2863 }
1316     head->read_bit = 0;
1317     return true;
1318     }
1319    
1320     /**
1321 kumaneko 2948 * ccs_print_path_number_acl - Print a path_number ACL entry.
1322 kumaneko 2863 *
1323     * @head: Pointer to "struct ccs_io_buffer".
1324 kumaneko 2915 * @ptr: Pointer to "struct ccs_path_number_acl".
1325 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1326     *
1327     * Returns true on success, false otherwise.
1328     */
1329 kumaneko 2871 static bool ccs_print_path_number_acl(struct ccs_io_buffer *head,
1330 kumaneko 2915 struct ccs_path_number_acl *ptr,
1331 kumaneko 2871 const struct ccs_condition *cond)
1332 kumaneko 2863 {
1333 kumaneko 2871 int pos;
1334     u8 bit;
1335     const u8 perm = ptr->perm;
1336 kumaneko 2916 for (bit = head->read_bit; bit < CCS_MAX_PATH_NUMBER_OPERATION;
1337     bit++) {
1338 kumaneko 2871 if (!(perm & (1 << bit)))
1339     continue;
1340     pos = head->read_avail;
1341 kumaneko 2916 if (!ccs_io_printf(head, "allow_%s",
1342     ccs_path_number2keyword(bit)) ||
1343 kumaneko 2888 !ccs_print_name_union(head, &ptr->name) ||
1344     !ccs_print_number_union(head, &ptr->number) ||
1345 kumaneko 2897 !ccs_print_condition(head, cond)) {
1346     head->read_bit = bit;
1347     head->read_avail = pos;
1348     return false;
1349     }
1350 kumaneko 2871 }
1351     head->read_bit = 0;
1352 kumaneko 2863 return true;
1353     }
1354    
1355     /**
1356     * ccs_print_env_acl - Print an evironment variable name's ACL entry.
1357     *
1358     * @head: Pointer to "struct ccs_io_buffer".
1359 kumaneko 2915 * @ptr: Pointer to "struct ccs_env_acl".
1360 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1361     *
1362     * Returns true on success, false otherwise.
1363     */
1364     static bool ccs_print_env_acl(struct ccs_io_buffer *head,
1365 kumaneko 2915 struct ccs_env_acl *ptr,
1366 kumaneko 2863 const struct ccs_condition *cond)
1367     {
1368 kumaneko 2897 const int pos = head->read_avail;
1369     if (!ccs_io_printf(head, CCS_KEYWORD_ALLOW_ENV "%s", ptr->env->name) ||
1370     !ccs_print_condition(head, cond)) {
1371     head->read_avail = pos;
1372     return false;
1373     }
1374 kumaneko 2863 return true;
1375     }
1376    
1377     /**
1378     * ccs_print_capability_acl - Print a capability ACL entry.
1379     *
1380     * @head: Pointer to "struct ccs_io_buffer".
1381 kumaneko 2915 * @ptr: Pointer to "struct ccs_capability_acl".
1382 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1383     *
1384     * Returns true on success, false otherwise.
1385     */
1386     static bool ccs_print_capability_acl(struct ccs_io_buffer *head,
1387 kumaneko 2915 struct ccs_capability_acl *ptr,
1388 kumaneko 2863 const struct ccs_condition *cond)
1389     {
1390 kumaneko 2897 const int pos = head->read_avail;
1391 kumaneko 2892 if (!ccs_io_printf(head, CCS_KEYWORD_ALLOW_CAPABILITY "%s",
1392 kumaneko 2897 ccs_cap2keyword(ptr->operation)) ||
1393     !ccs_print_condition(head, cond)) {
1394     head->read_avail = pos;
1395     return false;
1396     }
1397 kumaneko 2863 return true;
1398     }
1399    
1400     /**
1401     * ccs_print_ipv4_entry - Print IPv4 address of a network ACL entry.
1402     *
1403     * @head: Pointer to "struct ccs_io_buffer".
1404 kumaneko 2915 * @ptr: Pointer to "struct ccs_ip_network_acl".
1405 kumaneko 2863 *
1406     * Returns true on success, false otherwise.
1407     */
1408     static bool ccs_print_ipv4_entry(struct ccs_io_buffer *head,
1409 kumaneko 2915 struct ccs_ip_network_acl *ptr)
1410 kumaneko 2863 {
1411     const u32 min_address = ptr->address.ipv4.min;
1412     const u32 max_address = ptr->address.ipv4.max;
1413     if (!ccs_io_printf(head, "%u.%u.%u.%u", HIPQUAD(min_address)))
1414     return false;
1415     if (min_address != max_address
1416     && !ccs_io_printf(head, "-%u.%u.%u.%u", HIPQUAD(max_address)))
1417     return false;
1418     return true;
1419     }
1420    
1421     /**
1422     * ccs_print_ipv6_entry - Print IPv6 address of a network ACL entry.
1423     *
1424     * @head: Pointer to "struct ccs_io_buffer".
1425 kumaneko 2915 * @ptr: Pointer to "struct ccs_ip_network_acl".
1426 kumaneko 2863 *
1427     * Returns true on success, false otherwise.
1428     */
1429     static bool ccs_print_ipv6_entry(struct ccs_io_buffer *head,
1430 kumaneko 2915 struct ccs_ip_network_acl *ptr)
1431 kumaneko 2863 {
1432     char buf[64];
1433     const struct in6_addr *min_address = ptr->address.ipv6.min;
1434     const struct in6_addr *max_address = ptr->address.ipv6.max;
1435     ccs_print_ipv6(buf, sizeof(buf), min_address);
1436     if (!ccs_io_printf(head, "%s", buf))
1437     return false;
1438     if (min_address != max_address) {
1439     ccs_print_ipv6(buf, sizeof(buf), max_address);
1440     if (!ccs_io_printf(head, "-%s", buf))
1441     return false;
1442     }
1443     return true;
1444     }
1445    
1446     /**
1447     * ccs_print_network_acl - Print a network ACL entry.
1448     *
1449     * @head: Pointer to "struct ccs_io_buffer".
1450 kumaneko 2915 * @ptr: Pointer to "struct ccs_ip_network_acl".
1451 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1452     *
1453     * Returns true on success, false otherwise.
1454     */
1455     static bool ccs_print_network_acl(struct ccs_io_buffer *head,
1456 kumaneko 2915 struct ccs_ip_network_acl *ptr,
1457 kumaneko 2863 const struct ccs_condition *cond)
1458     {
1459 kumaneko 2916 int pos;
1460     u8 bit;
1461     const u16 perm = ptr->perm;
1462     for (bit = head->read_bit; bit < CCS_MAX_NETWORK_OPERATION; bit++) {
1463     if (!(perm & (1 << bit)))
1464     continue;
1465     pos = head->read_avail;
1466     if (!ccs_io_printf(head, CCS_KEYWORD_ALLOW_NETWORK "%s ",
1467     ccs_net2keyword(bit)))
1468 kumaneko 2863 goto out;
1469 kumaneko 2916 switch (ptr->address_type) {
1470     case CCS_IP_ADDRESS_TYPE_ADDRESS_GROUP:
1471     if (!ccs_io_printf(head, "@%s", ptr->address.group->
1472     group_name->name))
1473     goto out;
1474     break;
1475     case CCS_IP_ADDRESS_TYPE_IPv4:
1476     if (!ccs_print_ipv4_entry(head, ptr))
1477     goto out;
1478     break;
1479     case CCS_IP_ADDRESS_TYPE_IPv6:
1480     if (!ccs_print_ipv6_entry(head, ptr))
1481     goto out;
1482     break;
1483     }
1484     if (!ccs_print_number_union(head, &ptr->port) ||
1485     !ccs_print_condition(head, cond))
1486 kumaneko 2863 goto out;
1487     }
1488 kumaneko 2916 head->read_bit = 0;
1489 kumaneko 2863 return true;
1490     out:
1491 kumaneko 2916 head->read_bit = bit;
1492 kumaneko 2863 head->read_avail = pos;
1493     return false;
1494     }
1495    
1496     /**
1497     * ccs_print_signal_acl - Print a signal ACL entry.
1498     *
1499     * @head: Pointer to "struct ccs_io_buffer".
1500 kumaneko 2915 * @ptr: Pointer to "struct signale_acl".
1501 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1502     *
1503     * Returns true on success, false otherwise.
1504     */
1505     static bool ccs_print_signal_acl(struct ccs_io_buffer *head,
1506 kumaneko 2915 struct ccs_signal_acl *ptr,
1507 kumaneko 2863 const struct ccs_condition *cond)
1508     {
1509 kumaneko 2897 const int pos = head->read_avail;
1510 kumaneko 2892 if (!ccs_io_printf(head, CCS_KEYWORD_ALLOW_SIGNAL "%u %s",
1511 kumaneko 2897 ptr->sig, ptr->domainname->name) ||
1512     !ccs_print_condition(head, cond)) {
1513     head->read_avail = pos;
1514     return false;
1515     }
1516 kumaneko 2863 return true;
1517     }
1518    
1519     /**
1520     * ccs_print_execute_handler_record - Print an execute handler ACL entry.
1521     *
1522     * @head: Pointer to "struct ccs_io_buffer".
1523     * @keyword: Name of the keyword.
1524     * @ptr: Pointer to "struct ccs_execute_handler_record".
1525     *
1526     * Returns true on success, false otherwise.
1527     */
1528     static bool ccs_print_execute_handler_record(struct ccs_io_buffer *head,
1529     const char *keyword,
1530     struct ccs_execute_handler_record *
1531     ptr)
1532     {
1533     return ccs_io_printf(head, "%s %s\n", keyword, ptr->handler->name);
1534     }
1535    
1536     /**
1537     * ccs_print_mount_acl - Print a mount ACL entry.
1538     *
1539     * @head: Pointer to "struct ccs_io_buffer".
1540 kumaneko 2915 * @ptr: Pointer to "struct ccs_mount_acl".
1541 kumaneko 2863 * @cond: Pointer to "struct ccs_condition". May be NULL.
1542     *
1543     * Returns true on success, false otherwise.
1544     */
1545     static bool ccs_print_mount_acl(struct ccs_io_buffer *head,
1546 kumaneko 2915 struct ccs_mount_acl *ptr,
1547 kumaneko 2863 const struct ccs_condition *cond)
1548     {
1549 kumaneko 2897 const int pos = head->read_avail;
1550     if (!ccs_io_printf(head, CCS_KEYWORD_ALLOW_MOUNT) ||
1551     !ccs_print_name_union(head, &ptr->dev_name) ||
1552     !ccs_print_name_union(head, &ptr->dir_name) ||
1553     !ccs_print_name_union(head, &ptr->fs_type) ||
1554     !ccs_print_number_union(head, &ptr->flags) ||
1555     !ccs_print_condition(head, cond)) {
1556     head->read_avail = pos;
1557     return false;
1558     }
1559 kumaneko 2863 return true;
1560     }
1561    
1562     /**
1563     * ccs_print_entry - Print an ACL entry.
1564     *
1565     * @head: Pointer to "struct ccs_io_buffer".
1566     * @ptr: Pointer to an ACL entry.
1567     *
1568     * Returns true on success, false otherwise.
1569     */
1570     static bool ccs_print_entry(struct ccs_io_buffer *head,
1571     struct ccs_acl_info *ptr)
1572     {
1573     const struct ccs_condition *cond = ptr->cond;
1574 kumaneko 2900 const u8 acl_type = ptr->type;
1575     if (ptr->is_deleted)
1576 kumaneko 2863 return true;
1577 kumaneko 2915 if (acl_type == CCS_TYPE_PATH_ACL) {
1578     struct ccs_path_acl *acl
1579 kumaneko 3046 = container_of(ptr, struct ccs_path_acl, head);
1580 kumaneko 2915 return ccs_print_path_acl(head, acl, cond);
1581 kumaneko 2863 }
1582 kumaneko 2892 if (acl_type == CCS_TYPE_EXECUTE_HANDLER) {
1583 kumaneko 2863 struct ccs_execute_handler_record *acl
1584     = container_of(ptr, struct ccs_execute_handler_record,
1585     head);
1586 kumaneko 2892 const char *keyword = CCS_KEYWORD_EXECUTE_HANDLER;
1587 kumaneko 2863 return ccs_print_execute_handler_record(head, keyword, acl);
1588     }
1589 kumaneko 2892 if (acl_type == CCS_TYPE_DENIED_EXECUTE_HANDLER) {
1590 kumaneko 2863 struct ccs_execute_handler_record *acl
1591     = container_of(ptr, struct ccs_execute_handler_record,
1592     head);
1593 kumaneko 2892 const char *keyword = CCS_KEYWORD_DENIED_EXECUTE_HANDLER;
1594 kumaneko 2863 return ccs_print_execute_handler_record(head, keyword, acl);
1595     }
1596     if (head->read_execute_only)
1597     return true;
1598 kumaneko 2922 if (acl_type == CCS_TYPE_PATH_NUMBER3_ACL) {
1599     struct ccs_path_number3_acl *acl
1600     = container_of(ptr, struct ccs_path_number3_acl, head);
1601     return ccs_print_path_number3_acl(head, acl, cond);
1602 kumaneko 2863 }
1603 kumaneko 2922 if (acl_type == CCS_TYPE_PATH2_ACL) {
1604     struct ccs_path2_acl *acl
1605 kumaneko 3106 = container_of(ptr, struct ccs_path2_acl, head);
1606 kumaneko 2922 return ccs_print_path2_acl(head, acl, cond);
1607 kumaneko 2863 }
1608 kumaneko 2892 if (acl_type == CCS_TYPE_PATH_NUMBER_ACL) {
1609 kumaneko 2915 struct ccs_path_number_acl *acl
1610 kumaneko 3106 = container_of(ptr, struct ccs_path_number_acl, head);
1611 kumaneko 2871 return ccs_print_path_number_acl(head, acl, cond);
1612 kumaneko 2863 }
1613 kumaneko 2892 if (acl_type == CCS_TYPE_ENV_ACL) {
1614 kumaneko 2915 struct ccs_env_acl *acl
1615     = container_of(ptr, struct ccs_env_acl, head);
1616 kumaneko 2863 return ccs_print_env_acl(head, acl, cond);
1617     }
1618 kumaneko 2892 if (acl_type == CCS_TYPE_CAPABILITY_ACL) {
1619 kumaneko 2915 struct ccs_capability_acl *acl
1620 kumaneko 3106 = container_of(ptr, struct ccs_capability_acl, head);
1621 kumaneko 2863 return ccs_print_capability_acl(head, acl, cond);
1622     }
1623 kumaneko 2892 if (acl_type == CCS_TYPE_IP_NETWORK_ACL) {
1624 kumaneko 2915 struct ccs_ip_network_acl *acl
1625 kumaneko 3106 = container_of(ptr, struct ccs_ip_network_acl, head);
1626 kumaneko 2863 return ccs_print_network_acl(head, acl, cond);
1627     }
1628 kumaneko 2892 if (acl_type == CCS_TYPE_SIGNAL_ACL) {
1629 kumaneko 2915 struct ccs_signal_acl *acl
1630     = container_of(ptr, struct ccs_signal_acl, head);
1631 kumaneko 2863 return ccs_print_signal_acl(head, acl, cond);
1632     }
1633 kumaneko 2892 if (acl_type == CCS_TYPE_MOUNT_ACL) {
1634 kumaneko 2915 struct ccs_mount_acl *acl
1635     = container_of(ptr, struct ccs_mount_acl, head);
1636 kumaneko 2863 return ccs_print_mount_acl(head, acl, cond);
1637     }
1638     BUG(); /* This must not happen. */
1639     return false;
1640     }
1641    
1642     /**
1643     * ccs_read_domain_policy - Read domain policy.
1644     *
1645     * @head: Pointer to "struct ccs_io_buffer".
1646     *
1647     * Caller holds ccs_read_lock().
1648     */
1649 kumaneko 2943 static void ccs_read_domain_policy(struct ccs_io_buffer *head)
1650 kumaneko 2863 {
1651     struct list_head *dpos;
1652     struct list_head *apos;
1653     if (head->read_eof)
1654 kumaneko 2943 return;
1655 kumaneko 2863 if (head->read_step == 0)
1656     head->read_step = 1;
1657     list_for_each_cookie(dpos, head->read_var1, &ccs_domain_list) {
1658     struct ccs_domain_info *domain;
1659     const char *quota_exceeded = "";
1660     const char *transition_failed = "";
1661     const char *ignore_global_allow_read = "";
1662     const char *ignore_global_allow_env = "";
1663     domain = list_entry(dpos, struct ccs_domain_info, list);
1664     if (head->read_step != 1)
1665     goto acl_loop;
1666     if (domain->is_deleted && !head->read_single_domain)
1667     continue;
1668     /* Print domainname and flags. */
1669     if (domain->quota_warned)
1670 kumaneko 3258 quota_exceeded = CCS_KEYWORD_QUOTA_EXCEEDED "\n";
1671 kumaneko 2863 if (domain->domain_transition_failed)
1672 kumaneko 3258 transition_failed = CCS_KEYWORD_TRANSITION_FAILED "\n";
1673 kumaneko 2863 if (domain->ignore_global_allow_read)
1674     ignore_global_allow_read
1675 kumaneko 2892 = CCS_KEYWORD_IGNORE_GLOBAL_ALLOW_READ "\n";
1676 kumaneko 2863 if (domain->ignore_global_allow_env)
1677     ignore_global_allow_env
1678 kumaneko 2892 = CCS_KEYWORD_IGNORE_GLOBAL_ALLOW_ENV "\n";
1679     if (!ccs_io_printf(head, "%s\n" CCS_KEYWORD_USE_PROFILE "%u\n"
1680 kumaneko 2863 "%s%s%s%s\n", domain->domainname->name,
1681     domain->profile, quota_exceeded,
1682     transition_failed,
1683     ignore_global_allow_read,
1684     ignore_global_allow_env))
1685 kumaneko 2943 return;
1686 kumaneko 2863 head->read_step = 2;
1687     acl_loop:
1688     if (head->read_step == 3)
1689     goto tail_mark;
1690     /* Print ACL entries in the domain. */
1691     list_for_each_cookie(apos, head->read_var2,
1692     &domain->acl_info_list) {
1693     struct ccs_acl_info *ptr
1694     = list_entry(apos, struct ccs_acl_info, list);
1695     if (!ccs_print_entry(head, ptr))
1696 kumaneko 2943 return;
1697 kumaneko 2863 }
1698     head->read_step = 3;
1699     tail_mark:
1700     if (!ccs_io_printf(head, "\n"))
1701 kumaneko 2943 return;
1702 kumaneko 2863 head->read_step = 1;
1703     if (head->read_single_domain)
1704     break;
1705     }
1706     head->read_eof = true;
1707     }
1708    
1709     /**
1710     * ccs_write_domain_profile - Assign profile for specified domain.
1711     *
1712     * @head: Pointer to "struct ccs_io_buffer".
1713     *
1714     * Returns 0 on success, -EINVAL otherwise.
1715     *
1716     * This is equivalent to doing
1717     *
1718     * ( echo "select " $domainname; echo "use_profile " $profile ) |
1719 kumaneko 2948 * /usr/sbin/ccs-loadpolicy -d
1720 kumaneko 2863 *
1721     * Caller holds ccs_read_lock().
1722     */
1723     static int ccs_write_domain_profile(struct ccs_io_buffer *head)
1724     {
1725     char *data = head->write_buf;
1726     char *cp = strchr(data, ' ');
1727     struct ccs_domain_info *domain;
1728     unsigned int profile;
1729     if (!cp)
1730     return -EINVAL;
1731     *cp = '\0';
1732     profile = simple_strtoul(data, NULL, 10);
1733 kumaneko 2892 if (profile >= CCS_MAX_PROFILES)
1734 kumaneko 2863 return -EINVAL;
1735     domain = ccs_find_domain(cp + 1);
1736 kumaneko 2991 if (domain && (!ccs_policy_loaded || ccs_profile_ptr[(u8) profile]))
1737 kumaneko 2863 domain->profile = (u8) profile;
1738     return 0;
1739     }
1740    
1741     /**
1742     * ccs_read_domain_profile - Read only domainname and profile.
1743     *
1744     * @head: Pointer to "struct ccs_io_buffer".
1745     *
1746     * This is equivalent to doing
1747     *
1748     * grep -A 1 '^<kernel>' /proc/ccs/domain_policy |
1749     * awk ' { if ( domainname == "" ) { if ( $1 == "<kernel>" )
1750     * domainname = $0; } else if ( $1 == "use_profile" ) {
1751     * print $2 " " domainname; domainname = ""; } } ; '
1752     *
1753     * Caller holds ccs_read_lock().
1754     */
1755 kumaneko 2943 static void ccs_read_domain_profile(struct ccs_io_buffer *head)
1756 kumaneko 2863 {
1757     struct list_head *pos;
1758     if (head->read_eof)
1759 kumaneko 2943 return;
1760 kumaneko 2863 list_for_each_cookie(pos, head->read_var1, &ccs_domain_list) {
1761     struct ccs_domain_info *domain;
1762     domain = list_entry(pos, struct ccs_domain_info, list);
1763     if (domain->is_deleted)
1764     continue;
1765     if (!ccs_io_printf(head, "%u %s\n", domain->profile,
1766     domain->domainname->name))
1767 kumaneko 2943 return;
1768 kumaneko 2863 }
1769     head->read_eof = true;
1770     }
1771    
1772     /**
1773     * ccs_write_pid: Specify PID to obtain domainname.
1774     *
1775     * @head: Pointer to "struct ccs_io_buffer".
1776     *
1777     * Returns 0.
1778     */
1779     static int ccs_write_pid(struct ccs_io_buffer *head)
1780     {
1781     head->read_eof = false;
1782     return 0;
1783     }
1784    
1785     /**
1786     * ccs_read_pid - Read information of a process.
1787     *
1788     * @head: Pointer to "struct ccs_io_buffer".
1789     *
1790     * Returns the domainname which the specified PID is in or
1791     * process information of the specified PID on success,
1792     * empty string otherwise.
1793     *
1794     * Caller holds ccs_read_lock().
1795     */
1796 kumaneko 2943 static void ccs_read_pid(struct ccs_io_buffer *head)
1797 kumaneko 2863 {
1798     char *buf = head->write_buf;
1799     bool task_info = false;
1800 kumaneko 2970 bool global_pid = false;
1801 kumaneko 2863 unsigned int pid;
1802     struct task_struct *p;
1803     struct ccs_domain_info *domain = NULL;
1804     u32 ccs_flags = 0;
1805     /* Accessing write_buf is safe because head->io_sem is held. */
1806 kumaneko 3136 if (!buf) {
1807     head->read_eof = true;
1808 kumaneko 2943 return; /* Do nothing if open(O_RDONLY). */
1809 kumaneko 3136 }
1810 kumaneko 2863 if (head->read_avail || head->read_eof)
1811 kumaneko 2943 return;
1812 kumaneko 2863 head->read_eof = true;
1813     if (ccs_str_starts(&buf, "info "))
1814     task_info = true;
1815 kumaneko 2970 if (ccs_str_starts(&buf, "global-pid "))
1816     global_pid = true;
1817 kumaneko 2863 pid = (unsigned int) simple_strtoul(buf, NULL, 10);
1818 kumaneko 3248 ccs_tasklist_lock();
1819 kumaneko 2970 #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 24)
1820     if (global_pid)
1821     p = find_task_by_pid_ns(pid, &init_pid_ns);
1822     else
1823     p = find_task_by_vpid(pid);
1824     #else
1825 kumaneko 2863 p = find_task_by_pid(pid);
1826 kumaneko 2970 #endif
1827 kumaneko 2863 if (p) {
1828     domain = ccs_task_domain(p);
1829     ccs_flags = p->ccs_flags;
1830     }
1831 kumaneko 3248 ccs_tasklist_unlock();
1832 kumaneko 2863 if (!domain)
1833 kumaneko 2943 return;
1834 kumaneko 2863 if (!task_info)
1835     ccs_io_printf(head, "%u %u %s", pid, domain->profile,
1836     domain->domainname->name);
1837     else
1838     ccs_io_printf(head, "%u manager=%s execute_handler=%s "
1839     "state[0]=%u state[1]=%u state[2]=%u", pid,
1840 kumaneko 2958 ccs_yesno(ccs_flags &
1841     CCS_TASK_IS_POLICY_MANAGER),
1842     ccs_yesno(ccs_flags &
1843     CCS_TASK_IS_EXECUTE_HANDLER),
1844 kumaneko 2863 (u8) (ccs_flags >> 24),
1845     (u8) (ccs_flags >> 16),
1846     (u8) (ccs_flags >> 8));
1847     }
1848    
1849     /**
1850     * ccs_write_exception_policy - Write exception policy.
1851     *
1852     * @head: Pointer to "struct ccs_io_buffer".
1853     *
1854     * Returns 0 on success, negative value otherwise.
1855     */
1856     static int ccs_write_exception_policy(struct ccs_io_buffer *head)
1857     {
1858     char *data = head->write_buf;
1859 kumaneko 2892 bool is_delete = ccs_str_starts(&data, CCS_KEYWORD_DELETE);
1860     if (ccs_str_starts(&data, CCS_KEYWORD_KEEP_DOMAIN))
1861 kumaneko 2863 return ccs_write_domain_keeper_policy(data, false, is_delete);
1862 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_NO_KEEP_DOMAIN))
1863 kumaneko 2863 return ccs_write_domain_keeper_policy(data, true, is_delete);
1864 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_INITIALIZE_DOMAIN))
1865 kumaneko 2863 return ccs_write_domain_initializer_policy(data, false,
1866     is_delete);
1867 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_NO_INITIALIZE_DOMAIN))
1868 kumaneko 2863 return ccs_write_domain_initializer_policy(data, true,
1869     is_delete);
1870 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_AGGREGATOR))
1871 kumaneko 2863 return ccs_write_aggregator_policy(data, is_delete);
1872 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_READ))
1873 kumaneko 2863 return ccs_write_globally_readable_policy(data, is_delete);
1874 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_ALLOW_ENV))
1875 kumaneko 2863 return ccs_write_globally_usable_env_policy(data, is_delete);
1876 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_FILE_PATTERN))
1877 kumaneko 2863 return ccs_write_pattern_policy(data, is_delete);
1878 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_PATH_GROUP))
1879 kumaneko 2863 return ccs_write_path_group_policy(data, is_delete);
1880 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_NUMBER_GROUP))
1881 kumaneko 2863 return ccs_write_number_group_policy(data, is_delete);
1882 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_DENY_REWRITE))
1883 kumaneko 2863 return ccs_write_no_rewrite_policy(data, is_delete);
1884 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_ADDRESS_GROUP))
1885 kumaneko 2863 return ccs_write_address_group_policy(data, is_delete);
1886 kumaneko 2892 if (ccs_str_starts(&data, CCS_KEYWORD_DENY_AUTOBIND))
1887 kumaneko 2863 return ccs_write_reserved_port_policy(data, is_delete);
1888     return -EINVAL;
1889     }
1890    
1891     /**
1892     * ccs_read_exception_policy - Read exception policy.
1893     *
1894     * @head: Pointer to "struct ccs_io_buffer".
1895     *
1896     * Caller holds ccs_read_lock().
1897     */
1898 kumaneko 2943 static void ccs_read_exception_policy(struct ccs_io_buffer *head)
1899 kumaneko 2863 {
1900 kumaneko 2943 if (head->read_eof)
1901     return;
1902     switch (head->read_step) {
1903     case 0:
1904     head->read_var2 = NULL;
1905     head->read_step = 1;
1906     case 1:
1907     if (!ccs_read_domain_keeper_policy(head))
1908 kumaneko 2863 break;
1909 kumaneko 2943 head->read_var2 = NULL;
1910     head->read_step = 2;
1911     case 2:
1912     if (!ccs_read_globally_readable_policy(head))
1913     break;
1914     head->read_var2 = NULL;
1915     head->read_step = 3;
1916     case 3:
1917     if (!ccs_read_globally_usable_env_policy(head))
1918     break;
1919     head->read_var2 = NULL;
1920     head->read_step = 4;
1921     case 4:
1922     if (!ccs_read_domain_initializer_policy(head))
1923     break;
1924     head->read_var2 = NULL;
1925     head->read_step = 6;
1926     case 6:
1927     if (!ccs_read_aggregator_policy(head))
1928     break;
1929     head->read_var2 = NULL;
1930     head->read_step = 7;
1931     case 7:
1932     if (!ccs_read_file_pattern(head))
1933     break;
1934     head->read_var2 = NULL;
1935     head->read_step = 8;
1936     case 8:
1937     if (!ccs_read_no_rewrite_policy(head))
1938     break;
1939     head->read_var2 = NULL;
1940     head->read_step = 9;
1941     case 9:
1942     if (!ccs_read_path_group_policy(head))
1943     break;
1944     head->read_var1 = NULL;
1945     head->read_var2 = NULL;
1946     head->read_step = 10;
1947     case 10:
1948     if (!ccs_read_number_group_policy(head))
1949     break;
1950     head->read_var1 = NULL;
1951     head->read_var2 = NULL;
1952     head->read_step = 11;
1953     case 11:
1954     if (!ccs_read_address_group_policy(head))
1955     break;
1956     head->read_var2 = NULL;
1957     head->read_step = 12;
1958     case 12:
1959     if (!ccs_read_reserved_port_policy(head))
1960     break;
1961     head->read_eof = true;
1962 kumaneko 2863 }
1963     }
1964    
1965 kumaneko 2897 /**
1966     * ccs_get_argv0 - Get argv[0].
1967     *
1968     * @ee: Pointer to "struct ccs_execve_entry".
1969     *
1970     * Returns true on success, false otherwise.
1971     */
1972     static bool ccs_get_argv0(struct ccs_execve_entry *ee)
1973     {
1974     struct linux_binprm *bprm = ee->bprm;
1975     char *arg_ptr = ee->tmp;
1976     int arg_len = 0;
1977     unsigned long pos = bprm->p;
1978     int offset = pos % PAGE_SIZE;
1979     bool done = false;
1980     if (!bprm->argc)
1981     goto out;
1982     while (1) {
1983     if (!ccs_dump_page(bprm, pos, &ee->dump))
1984     goto out;
1985     pos += PAGE_SIZE - offset;
1986     /* Read. */
1987     while (offset < PAGE_SIZE) {
1988     const char *kaddr = ee->dump.data;
1989     const unsigned char c = kaddr[offset++];
1990 kumaneko 2932 if (c && arg_len < CCS_EXEC_TMPSIZE - 10) {
1991 kumaneko 2897 if (c == '\\') {
1992     arg_ptr[arg_len++] = '\\';
1993     arg_ptr[arg_len++] = '\\';
1994     } else if (c > ' ' && c < 127) {
1995     arg_ptr[arg_len++] = c;
1996     } else {
1997     arg_ptr[arg_len++] = '\\';
1998     arg_ptr[arg_len++] = (c >> 6) + '0';
1999     arg_ptr[arg_len++]
2000     = ((c >> 3) & 7) + '0';
2001     arg_ptr[arg_len++] = (c & 7) + '0';
2002     }
2003     } else {
2004     arg_ptr[arg_len] = '\0';
2005     done = true;
2006     break;
2007     }
2008     }
2009     offset = 0;
2010     if (done)
2011     break;
2012     }
2013     return true;
2014     out:
2015     return false;
2016     }
2017    
2018 kumaneko 2948 /**
2019     * ccs_get_execute_condition - Get condition part for execute requests.
2020     *
2021     * @ee: Pointer to "struct ccs_execve_entry".
2022     *
2023     * Returns pointer to "struct ccs_condition" on success, NULL otherwise.
2024     */
2025 kumaneko 2897 static struct ccs_condition *ccs_get_execute_condition(struct ccs_execve_entry
2026     *ee)
2027     {
2028     struct ccs_condition *cond;
2029     char *buf;
2030     int len = 256;
2031     char *realpath = NULL;
2032     char *argv0 = NULL;
2033 kumaneko 2958 const struct ccs_profile *profile = ccs_profile(ee->r.domain->profile);
2034 kumaneko 2962 if (profile->learning->learning_exec_realpath) {
2035 kumaneko 2897 struct file *file = ee->bprm->file;
2036 kumaneko 2911 #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 20)
2037     struct path path = { file->f_vfsmnt, file->f_dentry };
2038     realpath = ccs_realpath_from_path(&path);
2039     #else
2040     realpath = ccs_realpath_from_path(&file->f_path);
2041     #endif
2042 kumaneko 2897 if (realpath)
2043     len += strlen(realpath) + 17;
2044     }
2045 kumaneko 2962 if (profile->learning->learning_exec_argv0) {
2046 kumaneko 2897 if (ccs_get_argv0(ee)) {
2047     argv0 = ee->tmp;
2048     len += strlen(argv0) + 16;
2049     }
2050     }
2051     buf = kmalloc(len, GFP_KERNEL);
2052 kumaneko 2958 if (!buf) {
2053     kfree(realpath);
2054 kumaneko 2897 return NULL;
2055 kumaneko 2958 }
2056 kumaneko 2897 snprintf(buf, len - 1, "if");
2057     if (current->ccs_flags & CCS_TASK_IS_EXECUTE_HANDLER) {
2058     const int pos = strlen(buf);
2059     snprintf(buf + pos, len - pos - 1,
2060     " task.type=execute_handler");
2061     }
2062     if (realpath) {
2063     const int pos = strlen(buf);
2064     snprintf(buf + pos, len - pos - 1, " exec.realpath=\"%s\"",
2065     realpath);
2066     kfree(realpath);
2067     }
2068     if (argv0) {
2069     const int pos = strlen(buf);
2070     snprintf(buf + pos, len - pos - 1, " exec.argv[0]=\"%s\"",
2071     argv0);
2072     }
2073     cond = ccs_get_condition(buf);
2074     kfree(buf);
2075     return cond;
2076     }
2077    
2078 kumaneko 2961 /**
2079     * ccs_get_symlink_condition - Get condition part for symlink requests.
2080     *
2081     * @r: Pointer to "struct ccs_request_info".
2082     *
2083     * Returns pointer to "struct ccs_condition" on success, NULL otherwise.
2084     */
2085     static struct ccs_condition *ccs_get_symlink_condition(struct ccs_request_info
2086     *r)
2087     {
2088     struct ccs_condition *cond;
2089     char *buf;
2090     int len = 256;
2091     const char *symlink = NULL;
2092     const struct ccs_profile *profile = ccs_profile(r->profile);
2093 kumaneko 2962 if (profile->learning->learning_symlink_target) {
2094 kumaneko 2961 symlink = r->obj->symlink_target->name;
2095     len += strlen(symlink) + 18;
2096     }
2097     buf = kmalloc(len, GFP_KERNEL);
2098     if (!buf)
2099     return NULL;
2100     snprintf(buf, len - 1, "if");
2101     if (current->ccs_flags & CCS_TASK_IS_EXECUTE_HANDLER) {
2102     const int pos = strlen(buf);
2103     snprintf(buf + pos, len - pos - 1,
2104     " task.type=execute_handler");
2105     }
2106     if (symlink) {
2107     const int pos = strlen(buf);
2108     snprintf(buf + pos, len - pos - 1, " symlink.target=\"%s\"",
2109     symlink);
2110     }
2111     cond = ccs_get_condition(buf);
2112     kfree(buf);
2113     return cond;
2114     }
2115    
2116 kumaneko 2863 /* Wait queue for ccs_query_list. */
2117     static DECLARE_WAIT_QUEUE_HEAD(ccs_query_wait);
2118    
2119     /* Lock for manipulating ccs_query_list. */
2120     static DEFINE_SPINLOCK(ccs_query_list_lock);
2121    
2122     /* Structure for query. */
2123     struct ccs_query_entry {
2124     struct list_head list;
2125     char *query;
2126     int query_len;
2127     unsigned int serial;
2128     int timer;
2129     int answer;
2130     };
2131    
2132     /* The list for "struct ccs_query_entry". */
2133     static LIST_HEAD(ccs_query_list);
2134    
2135     /* Number of "struct file" referring /proc/ccs/query interface. */
2136     static atomic_t ccs_query_observers = ATOMIC_INIT(0);
2137    
2138     /**
2139 kumaneko 2922 * ccs_supervisor - Ask for the supervisor's decision.
2140 kumaneko 2863 *
2141     * @r: Pointer to "struct ccs_request_info".
2142     * @fmt: The printf()'s format string, followed by parameters.
2143     *
2144     * Returns 0 if the supervisor decided to permit the access request which
2145     * violated the policy in enforcing mode, 1 if the supervisor decided to
2146     * retry the access request which violated the policy in enforcing mode,
2147 kumaneko 2897 * 0 if it is not in enforcing mode, -EPERM otherwise.
2148 kumaneko 2863 */
2149 kumaneko 2922 int ccs_supervisor(struct ccs_request_info *r, const char *fmt, ...)
2150 kumaneko 2863 {
2151     va_list args;
2152     int error = -EPERM;
2153     int pos;
2154     int len;
2155     static unsigned int ccs_serial;
2156     struct ccs_query_entry *ccs_query_entry = NULL;
2157     bool quota_exceeded = false;
2158     char *header;
2159     if (!r->domain)
2160     r->domain = ccs_current_domain();
2161 kumaneko 2897 switch (r->mode) {
2162     char *buffer;
2163     struct ccs_condition *cond;
2164 kumaneko 2958 case CCS_CONFIG_LEARNING:
2165 kumaneko 2897 if (!ccs_domain_quota_ok(r))
2166     return 0;
2167     va_start(args, fmt);
2168     len = vsnprintf((char *) &pos, sizeof(pos) - 1, fmt, args) + 4;
2169     va_end(args);
2170     buffer = kmalloc(len, GFP_KERNEL);
2171     if (!buffer)
2172     return 0;
2173     va_start(args, fmt);
2174     vsnprintf(buffer, len - 1, fmt, args);
2175     va_end(args);
2176     ccs_normalize_line(buffer);
2177     if (r->ee && !strncmp(buffer, "allow_execute ", 14))
2178     cond = ccs_get_execute_condition(r->ee);
2179 kumaneko 2961 else if (r->obj && r->obj->symlink_target)
2180     cond = ccs_get_symlink_condition(r);
2181 kumaneko 2897 else if ((current->ccs_flags & CCS_TASK_IS_EXECUTE_HANDLER)) {
2182     char str[] = "if task.type=execute_handler";
2183     cond = ccs_get_condition(str);
2184     } else
2185     cond = NULL;
2186     ccs_write_domain_policy2(buffer, r->domain, cond, false);
2187     ccs_put_condition(cond);
2188     kfree(buffer);
2189     /* fall through */
2190 kumaneko 2958 case CCS_CONFIG_PERMISSIVE:
2191 kumaneko 2897 return 0;
2192     }
2193 kumaneko 2863 if (!atomic_read(&ccs_query_observers)) {
2194     int i;
2195     if (current->ccs_flags & CCS_DONT_SLEEP_ON_ENFORCE_ERROR)
2196     return -EPERM;
2197 kumaneko 2962 for (i = 0; i < ccs_profile(r->domain->profile)->enforcing->
2198 kumaneko 2958 enforcing_penalty; i++) {
2199 kumaneko 2863 set_current_state(TASK_INTERRUPTIBLE);
2200     schedule_timeout(HZ / 10);
2201     }
2202     return -EPERM;
2203     }
2204     va_start(args, fmt);
2205     len = vsnprintf((char *) &pos, sizeof(pos) - 1, fmt, args) + 32;
2206     va_end(args);
2207     header = ccs_init_audit_log(&len, r);
2208     if (!header)
2209     goto out;
2210     ccs_query_entry = kzalloc(sizeof(*ccs_query_entry), GFP_KERNEL);
2211     if (!ccs_query_entry)
2212     goto out;
2213 kumaneko 2900 len = ccs_round2(len);
2214 kumaneko 2863 ccs_query_entry->query = kzalloc(len, GFP_KERNEL);
2215     if (!ccs_query_entry->query)
2216     goto out;
2217     INIT_LIST_HEAD(&ccs_query_entry->list);
2218     spin_lock(&ccs_query_list_lock);
2219     if (ccs_quota_for_query && ccs_query_memory_size + len +
2220     sizeof(*ccs_query_entry) >= ccs_quota_for_query) {
2221     quota_exceeded = true;
2222     } else {
2223     ccs_query_memory_size += len + sizeof(*ccs_query_entry);
2224     ccs_query_entry->serial = ccs_serial++;
2225     }
2226     spin_unlock(&ccs_query_list_lock);
2227     if (quota_exceeded)
2228     goto out;
2229     pos = snprintf(ccs_query_entry->query, len - 1, "Q%u-%hu\n%s",
2230     ccs_query_entry->serial, r->retry, header);
2231     kfree(header);
2232     header = NULL;
2233     va_start(args, fmt);
2234     vsnprintf(ccs_query_entry->query + pos, len - 1 - pos, fmt, args);
2235     ccs_query_entry->query_len = strlen(ccs_query_entry->query) + 1;
2236     va_end(args);
2237     spin_lock(&ccs_query_list_lock);
2238     list_add_tail(&ccs_query_entry->list, &ccs_query_list);
2239     spin_unlock(&ccs_query_list_lock);
2240     /* Give 10 seconds for supervisor's opinion. */
2241     for (ccs_query_entry->timer = 0;
2242     atomic_read(&ccs_query_observers) && ccs_query_entry->timer < 100;
2243     ccs_query_entry->timer++) {
2244     wake_up(&ccs_query_wait);
2245     set_current_state(TASK_INTERRUPTIBLE);
2246     schedule_timeout(HZ / 10);
2247     if (ccs_query_entry->answer)
2248     break;
2249     }
2250     spin_lock(&ccs_query_list_lock);
2251     list_del(&ccs_query_entry->list);
2252     ccs_query_memory_size -= len + sizeof(*ccs_query_entry);
2253     spin_unlock(&ccs_query_list_lock);
2254     switch (ccs_query_entry->answer) {
2255     case 3: /* Asked to retry by administrator. */
2256     error = 1;
2257     r->retry++;
2258     break;
2259     case 1:
2260     /* Granted by administrator. */
2261     error = 0;
2262     break;
2263     case 0:
2264     /* Timed out. */
2265     break;
2266     default:
2267     /* Rejected by administrator. */
2268     break;
2269     }
2270     out:
2271     if (ccs_query_entry)
2272     kfree(ccs_query_entry->query);
2273     kfree(ccs_query_entry);
2274     kfree(header);
2275     return error;
2276     }
2277    
2278     /**
2279     * ccs_poll_query - poll() for /proc/ccs/query.
2280     *
2281     * @file: Pointer to "struct file".
2282     * @wait: Pointer to "poll_table".
2283     *
2284     * Returns POLLIN | POLLRDNORM when ready to read, 0 otherwise.
2285     *
2286     * Waits for access requests which violated policy in enforcing mode.
2287     */
2288     static int ccs_poll_query(struct file *file, poll_table *wait)
2289     {
2290     struct list_head *tmp;
2291     bool found = false;
2292     u8 i;
2293     for (i = 0; i < 2; i++) {
2294     spin_lock(&ccs_query_list_lock);
2295     list_for_each(tmp, &ccs_query_list) {
2296     struct ccs_query_entry *ptr
2297     = list_entry(tmp, struct ccs_query_entry, list);
2298     if (ptr->answer)
2299     continue;
2300     found = true;
2301     break;
2302     }
2303     spin_unlock(&ccs_query_list_lock);
2304     if (found)
2305     return POLLIN | POLLRDNORM;
2306     if (i)
2307     break;
2308     poll_wait(file, &ccs_query_wait, wait);
2309     }
2310     return 0;
2311     }
2312    
2313     /**
2314     * ccs_read_query - Read access requests which violated policy in enforcing mode.
2315     *
2316     * @head: Pointer to "struct ccs_io_buffer".
2317     */
2318 kumaneko 2943 static void ccs_read_query(struct ccs_io_buffer *head)
2319 kumaneko 2863 {
2320     struct list_head *tmp;
2321     int pos = 0;
2322     int len = 0;
2323     char *buf;
2324     if (head->read_avail)
2325 kumaneko 2943 return;
2326 kumaneko 2863 if (head->read_buf) {
2327     kfree(head->read_buf);
2328     head->read_buf = NULL;
2329     head->readbuf_size = 0;
2330     }
2331     spin_lock(&ccs_query_list_lock);
2332     list_for_each(tmp, &ccs_query_list) {
2333     struct ccs_query_entry *ptr
2334     = list_entry(tmp, struct ccs_query_entry, list);
2335     if (ptr->answer)
2336     continue;
2337     if (pos++ != head->read_step)
2338     continue;
2339     len = ptr->query_len;
2340     break;
2341     }
2342     spin_unlock(&ccs_query_list_lock);
2343     if (!len) {
2344     head->read_step = 0;
2345 kumaneko 2943 return;
2346 kumaneko 2863 }
2347     buf = kzalloc(len, GFP_KERNEL);
2348     if (!buf)
2349 kumaneko 2943 return;
2350 kumaneko 2863 pos = 0;
2351     spin_lock(&ccs_query_list_lock);
2352     list_for_each(tmp, &ccs_query_list) {
2353     struct ccs_query_entry *ptr
2354     = list_entry(tmp, struct ccs_query_entry, list);
2355     if (ptr->answer)
2356     continue;
2357     if (pos++ != head->read_step)
2358     continue;
2359     /*
2360     * Some query can be skipped because ccs_query_list
2361     * can change, but I don't care.
2362     */
2363     if (len == ptr->query_len)
2364     memmove(buf, ptr->query, len);
2365     break;
2366     }
2367     spin_unlock(&ccs_query_list_lock);
2368     if (buf[0]) {
2369     head->read_avail = len;
2370     head->readbuf_size = head->read_avail;
2371     head->read_buf