Root/
1 | /* |
2 | * security/tomoyo/load_policy.c |
3 | * |
4 | * Copyright (C) 2005-2011 NTT DATA CORPORATION |
5 | */ |
6 | |
7 | #include "common.h" |
8 | |
9 | #ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER |
10 | |
11 | /* |
12 | * Path to the policy loader. (default = CONFIG_SECURITY_TOMOYO_POLICY_LOADER) |
13 | */ |
14 | static const char *tomoyo_loader; |
15 | |
16 | /** |
17 | * tomoyo_loader_setup - Set policy loader. |
18 | * |
19 | * @str: Program to use as a policy loader (e.g. /sbin/tomoyo-init ). |
20 | * |
21 | * Returns 0. |
22 | */ |
23 | static int __init tomoyo_loader_setup(char *str) |
24 | { |
25 | tomoyo_loader = str; |
26 | return 0; |
27 | } |
28 | |
29 | __setup("TOMOYO_loader=", tomoyo_loader_setup); |
30 | |
31 | /** |
32 | * tomoyo_policy_loader_exists - Check whether /sbin/tomoyo-init exists. |
33 | * |
34 | * Returns true if /sbin/tomoyo-init exists, false otherwise. |
35 | */ |
36 | static bool tomoyo_policy_loader_exists(void) |
37 | { |
38 | struct path path; |
39 | if (!tomoyo_loader) |
40 | tomoyo_loader = CONFIG_SECURITY_TOMOYO_POLICY_LOADER; |
41 | if (kern_path(tomoyo_loader, LOOKUP_FOLLOW, &path)) { |
42 | printk(KERN_INFO "Not activating Mandatory Access Control " |
43 | "as %s does not exist.\n", tomoyo_loader); |
44 | return false; |
45 | } |
46 | path_put(&path); |
47 | return true; |
48 | } |
49 | |
50 | /* |
51 | * Path to the trigger. (default = CONFIG_SECURITY_TOMOYO_ACTIVATION_TRIGGER) |
52 | */ |
53 | static const char *tomoyo_trigger; |
54 | |
55 | /** |
56 | * tomoyo_trigger_setup - Set trigger for activation. |
57 | * |
58 | * @str: Program to use as an activation trigger (e.g. /sbin/init ). |
59 | * |
60 | * Returns 0. |
61 | */ |
62 | static int __init tomoyo_trigger_setup(char *str) |
63 | { |
64 | tomoyo_trigger = str; |
65 | return 0; |
66 | } |
67 | |
68 | __setup("TOMOYO_trigger=", tomoyo_trigger_setup); |
69 | |
70 | /** |
71 | * tomoyo_load_policy - Run external policy loader to load policy. |
72 | * |
73 | * @filename: The program about to start. |
74 | * |
75 | * This function checks whether @filename is /sbin/init , and if so |
76 | * invoke /sbin/tomoyo-init and wait for the termination of /sbin/tomoyo-init |
77 | * and then continues invocation of /sbin/init. |
78 | * /sbin/tomoyo-init reads policy files in /etc/tomoyo/ directory and |
79 | * writes to /sys/kernel/security/tomoyo/ interfaces. |
80 | * |
81 | * Returns nothing. |
82 | */ |
83 | void tomoyo_load_policy(const char *filename) |
84 | { |
85 | static bool done; |
86 | char *argv[2]; |
87 | char *envp[3]; |
88 | |
89 | if (tomoyo_policy_loaded || done) |
90 | return; |
91 | if (!tomoyo_trigger) |
92 | tomoyo_trigger = CONFIG_SECURITY_TOMOYO_ACTIVATION_TRIGGER; |
93 | if (strcmp(filename, tomoyo_trigger)) |
94 | return; |
95 | if (!tomoyo_policy_loader_exists()) |
96 | return; |
97 | done = true; |
98 | printk(KERN_INFO "Calling %s to load policy. Please wait.\n", |
99 | tomoyo_loader); |
100 | argv[0] = (char *) tomoyo_loader; |
101 | argv[1] = NULL; |
102 | envp[0] = "HOME=/"; |
103 | envp[1] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin"; |
104 | envp[2] = NULL; |
105 | call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC); |
106 | tomoyo_check_profile(); |
107 | } |
108 | |
109 | #endif |
110 |
Branches:
ben-wpan
ben-wpan-stefan
javiroman/ks7010
jz-2.6.34
jz-2.6.34-rc5
jz-2.6.34-rc6
jz-2.6.34-rc7
jz-2.6.35
jz-2.6.36
jz-2.6.37
jz-2.6.38
jz-2.6.39
jz-3.0
jz-3.1
jz-3.11
jz-3.12
jz-3.13
jz-3.15
jz-3.16
jz-3.18-dt
jz-3.2
jz-3.3
jz-3.4
jz-3.5
jz-3.6
jz-3.6-rc2-pwm
jz-3.9
jz-3.9-clk
jz-3.9-rc8
jz47xx
jz47xx-2.6.38
master
Tags:
od-2011-09-04
od-2011-09-18
v2.6.34-rc5
v2.6.34-rc6
v2.6.34-rc7
v3.9