|
@@ -90,6 +90,61 @@ bool tomoyo_compare_number_union(const unsigned long value,
|
|
|
return value >= ptr->values[0] && value <= ptr->values[1];
|
|
|
}
|
|
|
|
|
|
+/**
|
|
|
+ * tomoyo_init_request_info - Initialize "struct tomoyo_request_info" members.
|
|
|
+ *
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info" to initialize.
|
|
|
+ * @domain: Pointer to "struct tomoyo_domain_info". NULL for tomoyo_domain().
|
|
|
+ *
|
|
|
+ * Returns mode.
|
|
|
+ */
|
|
|
+static int tomoyo_init_request_info(struct tomoyo_request_info *r,
|
|
|
+ struct tomoyo_domain_info *domain)
|
|
|
+{
|
|
|
+ memset(r, 0, sizeof(*r));
|
|
|
+ if (!domain)
|
|
|
+ domain = tomoyo_domain();
|
|
|
+ r->domain = domain;
|
|
|
+ r->mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
+ return r->mode;
|
|
|
+}
|
|
|
+
|
|
|
+static void tomoyo_warn_log(struct tomoyo_request_info *r, const char *fmt, ...)
|
|
|
+ __attribute__ ((format(printf, 2, 3)));
|
|
|
+/**
|
|
|
+ * tomoyo_warn_log - Print warning or error message on console.
|
|
|
+ *
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info".
|
|
|
+ * @fmt: The printf()'s format string, followed by parameters.
|
|
|
+ */
|
|
|
+static void tomoyo_warn_log(struct tomoyo_request_info *r, const char *fmt, ...)
|
|
|
+{
|
|
|
+ int len = PAGE_SIZE;
|
|
|
+ va_list args;
|
|
|
+ char *buffer;
|
|
|
+ if (!tomoyo_verbose_mode(r->domain))
|
|
|
+ return;
|
|
|
+ while (1) {
|
|
|
+ int len2;
|
|
|
+ buffer = kmalloc(len, GFP_NOFS);
|
|
|
+ if (!buffer)
|
|
|
+ return;
|
|
|
+ va_start(args, fmt);
|
|
|
+ len2 = vsnprintf(buffer, len - 1, fmt, args);
|
|
|
+ va_end(args);
|
|
|
+ if (len2 <= len - 1) {
|
|
|
+ buffer[len2] = '\0';
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ len = len2 + 1;
|
|
|
+ kfree(buffer);
|
|
|
+ }
|
|
|
+ printk(KERN_WARNING "TOMOYO-%s: Access %s denied for %s\n",
|
|
|
+ r->mode == TOMOYO_CONFIG_ENFORCING ? "ERROR" : "WARNING",
|
|
|
+ buffer, tomoyo_get_last_name(r->domain));
|
|
|
+ kfree(buffer);
|
|
|
+}
|
|
|
+
|
|
|
/**
|
|
|
* tomoyo_path2keyword - Get the name of single path operation.
|
|
|
*
|
|
@@ -652,9 +707,9 @@ static int tomoyo_update_file_acl(const char *filename, u8 perm,
|
|
|
}
|
|
|
|
|
|
/**
|
|
|
- * tomoyo_path_acl2 - Check permission for single path operation.
|
|
|
+ * tomoyo_path_acl - Check permission for single path operation.
|
|
|
*
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info".
|
|
|
* @filename: Filename to check.
|
|
|
* @perm: Permission.
|
|
|
* @may_use_pattern: True if patterned ACL is permitted.
|
|
@@ -663,10 +718,11 @@ static int tomoyo_update_file_acl(const char *filename, u8 perm,
|
|
|
*
|
|
|
* Caller holds tomoyo_read_lock().
|
|
|
*/
|
|
|
-static int tomoyo_path_acl2(const struct tomoyo_domain_info *domain,
|
|
|
- const struct tomoyo_path_info *filename,
|
|
|
- const u32 perm, const bool may_use_pattern)
|
|
|
+static int tomoyo_path_acl(const struct tomoyo_request_info *r,
|
|
|
+ const struct tomoyo_path_info *filename,
|
|
|
+ const u32 perm, const bool may_use_pattern)
|
|
|
{
|
|
|
+ struct tomoyo_domain_info *domain = r->domain;
|
|
|
struct tomoyo_acl_info *ptr;
|
|
|
int error = -EPERM;
|
|
|
|
|
@@ -692,89 +748,56 @@ static int tomoyo_path_acl2(const struct tomoyo_domain_info *domain,
|
|
|
}
|
|
|
|
|
|
/**
|
|
|
- * tomoyo_check_file_acl - Check permission for opening files.
|
|
|
+ * tomoyo_file_perm - Check permission for opening files.
|
|
|
*
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info".
|
|
|
* @filename: Filename to check.
|
|
|
- * @operation: Mode ("read" or "write" or "read/write" or "execute").
|
|
|
- *
|
|
|
- * Returns 0 on success, -EPERM otherwise.
|
|
|
- *
|
|
|
- * Caller holds tomoyo_read_lock().
|
|
|
- */
|
|
|
-static int tomoyo_check_file_acl(const struct tomoyo_domain_info *domain,
|
|
|
- const struct tomoyo_path_info *filename,
|
|
|
- const u8 operation)
|
|
|
-{
|
|
|
- u32 perm = 0;
|
|
|
-
|
|
|
- if (!tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE))
|
|
|
- return 0;
|
|
|
- if (operation == 6)
|
|
|
- perm = 1 << TOMOYO_TYPE_READ_WRITE;
|
|
|
- else if (operation == 4)
|
|
|
- perm = 1 << TOMOYO_TYPE_READ;
|
|
|
- else if (operation == 2)
|
|
|
- perm = 1 << TOMOYO_TYPE_WRITE;
|
|
|
- else if (operation == 1)
|
|
|
- perm = 1 << TOMOYO_TYPE_EXECUTE;
|
|
|
- else
|
|
|
- BUG();
|
|
|
- return tomoyo_path_acl2(domain, filename, perm, operation != 1);
|
|
|
-}
|
|
|
-
|
|
|
-/**
|
|
|
- * tomoyo_check_file_perm2 - Check permission for opening files.
|
|
|
- *
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
- * @filename: Filename to check.
|
|
|
- * @perm: Mode ("read" or "write" or "read/write" or "execute").
|
|
|
- * @operation: Operation name passed used for verbose mode.
|
|
|
- * @mode: Access control mode.
|
|
|
+ * @mode: Mode ("read" or "write" or "read/write" or "execute").
|
|
|
*
|
|
|
* Returns 0 on success, negative value otherwise.
|
|
|
*
|
|
|
* Caller holds tomoyo_read_lock().
|
|
|
*/
|
|
|
-static int tomoyo_check_file_perm2(struct tomoyo_domain_info * const domain,
|
|
|
- const struct tomoyo_path_info *filename,
|
|
|
- const u8 perm, const char *operation,
|
|
|
- const u8 mode)
|
|
|
+static int tomoyo_file_perm(struct tomoyo_request_info *r,
|
|
|
+ const struct tomoyo_path_info *filename,
|
|
|
+ const u8 mode)
|
|
|
{
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
const char *msg = "<unknown>";
|
|
|
int error = 0;
|
|
|
+ u32 perm = 0;
|
|
|
|
|
|
if (!filename)
|
|
|
return 0;
|
|
|
- error = tomoyo_check_file_acl(domain, filename, perm);
|
|
|
- if (error && perm == 4 && !domain->ignore_global_allow_read
|
|
|
- && tomoyo_is_globally_readable_file(filename))
|
|
|
- error = 0;
|
|
|
- if (perm == 6)
|
|
|
+
|
|
|
+ if (mode == 6) {
|
|
|
msg = tomoyo_path2keyword(TOMOYO_TYPE_READ_WRITE);
|
|
|
- else if (perm == 4)
|
|
|
+ perm = 1 << TOMOYO_TYPE_READ_WRITE;
|
|
|
+ } else if (mode == 4) {
|
|
|
msg = tomoyo_path2keyword(TOMOYO_TYPE_READ);
|
|
|
- else if (perm == 2)
|
|
|
+ perm = 1 << TOMOYO_TYPE_READ;
|
|
|
+ } else if (mode == 2) {
|
|
|
msg = tomoyo_path2keyword(TOMOYO_TYPE_WRITE);
|
|
|
- else if (perm == 1)
|
|
|
+ perm = 1 << TOMOYO_TYPE_WRITE;
|
|
|
+ } else if (mode == 1) {
|
|
|
msg = tomoyo_path2keyword(TOMOYO_TYPE_EXECUTE);
|
|
|
- else
|
|
|
+ perm = 1 << TOMOYO_TYPE_EXECUTE;
|
|
|
+ } else
|
|
|
BUG();
|
|
|
+ error = tomoyo_path_acl(r, filename, perm, mode != 1);
|
|
|
+ if (error && mode == 4 && !r->domain->ignore_global_allow_read
|
|
|
+ && tomoyo_is_globally_readable_file(filename))
|
|
|
+ error = 0;
|
|
|
if (!error)
|
|
|
return 0;
|
|
|
- if (tomoyo_verbose_mode(domain))
|
|
|
- printk(KERN_WARNING "TOMOYO-%s: Access '%s(%s) %s' denied "
|
|
|
- "for %s\n", tomoyo_get_msg(is_enforce), msg, operation,
|
|
|
- filename->name, tomoyo_get_last_name(domain));
|
|
|
- if (is_enforce)
|
|
|
+ tomoyo_warn_log(r, "%s %s", msg, filename->name);
|
|
|
+ if (r->mode == TOMOYO_CONFIG_ENFORCING)
|
|
|
return error;
|
|
|
- if (mode == 1 && tomoyo_domain_quota_is_ok(domain)) {
|
|
|
+ if (tomoyo_domain_quota_is_ok(r)) {
|
|
|
/* Don't use patterns for execute permission. */
|
|
|
- const struct tomoyo_path_info *patterned_file = (perm != 1) ?
|
|
|
+ const struct tomoyo_path_info *patterned_file = (mode != 1) ?
|
|
|
tomoyo_get_file_pattern(filename) : filename;
|
|
|
- tomoyo_update_file_acl(patterned_file->name, perm,
|
|
|
- domain, false);
|
|
|
+ tomoyo_update_file_acl(patterned_file->name, mode,
|
|
|
+ r->domain, false);
|
|
|
}
|
|
|
return 0;
|
|
|
}
|
|
@@ -965,29 +988,10 @@ static int tomoyo_update_path2_acl(const u8 type, const char *filename1,
|
|
|
return error;
|
|
|
}
|
|
|
|
|
|
-/**
|
|
|
- * tomoyo_path_acl - Check permission for single path operation.
|
|
|
- *
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
- * @type: Type of operation.
|
|
|
- * @filename: Filename to check.
|
|
|
- *
|
|
|
- * Returns 0 on success, negative value otherwise.
|
|
|
- *
|
|
|
- * Caller holds tomoyo_read_lock().
|
|
|
- */
|
|
|
-static int tomoyo_path_acl(struct tomoyo_domain_info *domain, const u8 type,
|
|
|
- const struct tomoyo_path_info *filename)
|
|
|
-{
|
|
|
- if (!tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE))
|
|
|
- return 0;
|
|
|
- return tomoyo_path_acl2(domain, filename, 1 << type, 1);
|
|
|
-}
|
|
|
-
|
|
|
/**
|
|
|
* tomoyo_path2_acl - Check permission for double path operation.
|
|
|
*
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info".
|
|
|
* @type: Type of operation.
|
|
|
* @filename1: First filename to check.
|
|
|
* @filename2: Second filename to check.
|
|
@@ -996,17 +1000,15 @@ static int tomoyo_path_acl(struct tomoyo_domain_info *domain, const u8 type,
|
|
|
*
|
|
|
* Caller holds tomoyo_read_lock().
|
|
|
*/
|
|
|
-static int tomoyo_path2_acl(const struct tomoyo_domain_info *domain,
|
|
|
- const u8 type,
|
|
|
+static int tomoyo_path2_acl(const struct tomoyo_request_info *r, const u8 type,
|
|
|
const struct tomoyo_path_info *filename1,
|
|
|
const struct tomoyo_path_info *filename2)
|
|
|
{
|
|
|
+ const struct tomoyo_domain_info *domain = r->domain;
|
|
|
struct tomoyo_acl_info *ptr;
|
|
|
const u8 perm = 1 << type;
|
|
|
int error = -EPERM;
|
|
|
|
|
|
- if (!tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE))
|
|
|
- return 0;
|
|
|
list_for_each_entry_rcu(ptr, &domain->acl_info_list, list) {
|
|
|
struct tomoyo_path2_acl *acl;
|
|
|
if (ptr->type != TOMOYO_TYPE_PATH2_ACL)
|
|
@@ -1025,42 +1027,32 @@ static int tomoyo_path2_acl(const struct tomoyo_domain_info *domain,
|
|
|
}
|
|
|
|
|
|
/**
|
|
|
- * tomoyo_path_permission2 - Check permission for single path operation.
|
|
|
+ * tomoyo_path_permission - Check permission for single path operation.
|
|
|
*
|
|
|
- * @domain: Pointer to "struct tomoyo_domain_info".
|
|
|
+ * @r: Pointer to "struct tomoyo_request_info".
|
|
|
* @operation: Type of operation.
|
|
|
* @filename: Filename to check.
|
|
|
- * @mode: Access control mode.
|
|
|
*
|
|
|
* Returns 0 on success, negative value otherwise.
|
|
|
*
|
|
|
* Caller holds tomoyo_read_lock().
|
|
|
*/
|
|
|
-static int tomoyo_path_permission2(struct tomoyo_domain_info *const domain,
|
|
|
- u8 operation,
|
|
|
- const struct tomoyo_path_info *filename,
|
|
|
- const u8 mode)
|
|
|
+static int tomoyo_path_permission(struct tomoyo_request_info *r, u8 operation,
|
|
|
+ const struct tomoyo_path_info *filename)
|
|
|
{
|
|
|
- const char *msg;
|
|
|
int error;
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
|
|
|
- if (!mode)
|
|
|
- return 0;
|
|
|
next:
|
|
|
- error = tomoyo_path_acl(domain, operation, filename);
|
|
|
- msg = tomoyo_path2keyword(operation);
|
|
|
+ error = tomoyo_path_acl(r, filename, 1 << operation, 1);
|
|
|
if (!error)
|
|
|
goto ok;
|
|
|
- if (tomoyo_verbose_mode(domain))
|
|
|
- printk(KERN_WARNING "TOMOYO-%s: Access '%s %s' denied for %s\n",
|
|
|
- tomoyo_get_msg(is_enforce), msg, filename->name,
|
|
|
- tomoyo_get_last_name(domain));
|
|
|
- if (mode == 1 && tomoyo_domain_quota_is_ok(domain)) {
|
|
|
+ tomoyo_warn_log(r, "%s %s", tomoyo_path2keyword(operation),
|
|
|
+ filename->name);
|
|
|
+ if (tomoyo_domain_quota_is_ok(r)) {
|
|
|
const char *name = tomoyo_get_file_pattern(filename)->name;
|
|
|
- tomoyo_update_path_acl(operation, name, domain, false);
|
|
|
+ tomoyo_update_path_acl(operation, name, r->domain, false);
|
|
|
}
|
|
|
- if (!is_enforce)
|
|
|
+ if (r->mode != TOMOYO_CONFIG_ENFORCING)
|
|
|
error = 0;
|
|
|
ok:
|
|
|
/*
|
|
@@ -1089,11 +1081,11 @@ static int tomoyo_path_permission2(struct tomoyo_domain_info *const domain,
|
|
|
int tomoyo_check_exec_perm(struct tomoyo_domain_info *domain,
|
|
|
const struct tomoyo_path_info *filename)
|
|
|
{
|
|
|
- const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
+ struct tomoyo_request_info r;
|
|
|
|
|
|
- if (!mode)
|
|
|
+ if (tomoyo_init_request_info(&r, NULL) == TOMOYO_CONFIG_DISABLED)
|
|
|
return 0;
|
|
|
- return tomoyo_check_file_perm2(domain, filename, 1, "do_execve", mode);
|
|
|
+ return tomoyo_file_perm(&r, filename, 1);
|
|
|
}
|
|
|
|
|
|
/**
|
|
@@ -1111,11 +1103,11 @@ int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
|
|
|
const u8 acc_mode = ACC_MODE(flag);
|
|
|
int error = -ENOMEM;
|
|
|
struct tomoyo_path_info *buf;
|
|
|
- const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
+ struct tomoyo_request_info r;
|
|
|
int idx;
|
|
|
|
|
|
- if (!mode || !path->mnt)
|
|
|
+ if (tomoyo_init_request_info(&r, domain) == TOMOYO_CONFIG_DISABLED ||
|
|
|
+ !path->mnt)
|
|
|
return 0;
|
|
|
if (acc_mode == 0)
|
|
|
return 0;
|
|
@@ -1138,25 +1130,22 @@ int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
|
|
|
if ((acc_mode & MAY_WRITE) &&
|
|
|
((flag & O_TRUNC) || !(flag & O_APPEND)) &&
|
|
|
(tomoyo_is_no_rewrite_file(buf))) {
|
|
|
- error = tomoyo_path_permission2(domain, TOMOYO_TYPE_REWRITE,
|
|
|
- buf, mode);
|
|
|
+ error = tomoyo_path_permission(&r, TOMOYO_TYPE_REWRITE, buf);
|
|
|
}
|
|
|
if (!error)
|
|
|
- error = tomoyo_check_file_perm2(domain, buf, acc_mode, "open",
|
|
|
- mode);
|
|
|
+ error = tomoyo_file_perm(&r, buf, acc_mode);
|
|
|
if (!error && (flag & O_TRUNC))
|
|
|
- error = tomoyo_path_permission2(domain, TOMOYO_TYPE_TRUNCATE,
|
|
|
- buf, mode);
|
|
|
+ error = tomoyo_path_permission(&r, TOMOYO_TYPE_TRUNCATE, buf);
|
|
|
out:
|
|
|
kfree(buf);
|
|
|
tomoyo_read_unlock(idx);
|
|
|
- if (!is_enforce)
|
|
|
+ if (r.mode != TOMOYO_CONFIG_ENFORCING)
|
|
|
error = 0;
|
|
|
return error;
|
|
|
}
|
|
|
|
|
|
/**
|
|
|
- * tomoyo_path_perm - Check permission for "create", "unlink", "mkdir", "rmdir", "mkfifo", "mksock", "mkblock", "mkchar", "truncate", "symlink", "ioctl", "chmod", "chown", "chgrp", "chroot", "mount" and "unmount".
|
|
|
+ * tomoyo_path_perm - Check permission for "create", "unlink", "mkdir", "rmdir", "mkfifo", "mksock", "mkblock", "mkchar", "truncate", "symlink", "rewrite", "ioctl", "chmod", "chown", "chgrp", "chroot", "mount" and "unmount".
|
|
|
*
|
|
|
* @operation: Type of operation.
|
|
|
* @path: Pointer to "struct path".
|
|
@@ -1167,18 +1156,23 @@ int tomoyo_path_perm(const u8 operation, struct path *path)
|
|
|
{
|
|
|
int error = -ENOMEM;
|
|
|
struct tomoyo_path_info *buf;
|
|
|
- struct tomoyo_domain_info *domain = tomoyo_domain();
|
|
|
- const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
+ struct tomoyo_request_info r;
|
|
|
int idx;
|
|
|
|
|
|
- if (!mode || !path->mnt)
|
|
|
+ if (tomoyo_init_request_info(&r, NULL) == TOMOYO_CONFIG_DISABLED ||
|
|
|
+ !path->mnt)
|
|
|
return 0;
|
|
|
idx = tomoyo_read_lock();
|
|
|
buf = tomoyo_get_path(path);
|
|
|
if (!buf)
|
|
|
goto out;
|
|
|
switch (operation) {
|
|
|
+ case TOMOYO_TYPE_REWRITE:
|
|
|
+ if (!tomoyo_is_no_rewrite_file(buf)) {
|
|
|
+ error = 0;
|
|
|
+ goto out;
|
|
|
+ }
|
|
|
+ break;
|
|
|
case TOMOYO_TYPE_MKDIR:
|
|
|
case TOMOYO_TYPE_RMDIR:
|
|
|
case TOMOYO_TYPE_CHROOT:
|
|
@@ -1190,47 +1184,11 @@ int tomoyo_path_perm(const u8 operation, struct path *path)
|
|
|
tomoyo_fill_path_info(buf);
|
|
|
}
|
|
|
}
|
|
|
- error = tomoyo_path_permission2(domain, operation, buf, mode);
|
|
|
- out:
|
|
|
- kfree(buf);
|
|
|
- tomoyo_read_unlock(idx);
|
|
|
- if (!is_enforce)
|
|
|
- error = 0;
|
|
|
- return error;
|
|
|
-}
|
|
|
-
|
|
|
-/**
|
|
|
- * tomoyo_check_rewrite_permission - Check permission for "rewrite".
|
|
|
- *
|
|
|
- * @filp: Pointer to "struct file".
|
|
|
- *
|
|
|
- * Returns 0 on success, negative value otherwise.
|
|
|
- */
|
|
|
-int tomoyo_check_rewrite_permission(struct file *filp)
|
|
|
-{
|
|
|
- int error = -ENOMEM;
|
|
|
- struct tomoyo_domain_info *domain = tomoyo_domain();
|
|
|
- const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
- struct tomoyo_path_info *buf;
|
|
|
- int idx;
|
|
|
-
|
|
|
- if (!mode || !filp->f_path.mnt)
|
|
|
- return 0;
|
|
|
-
|
|
|
- idx = tomoyo_read_lock();
|
|
|
- buf = tomoyo_get_path(&filp->f_path);
|
|
|
- if (!buf)
|
|
|
- goto out;
|
|
|
- if (!tomoyo_is_no_rewrite_file(buf)) {
|
|
|
- error = 0;
|
|
|
- goto out;
|
|
|
- }
|
|
|
- error = tomoyo_path_permission2(domain, TOMOYO_TYPE_REWRITE, buf, mode);
|
|
|
+ error = tomoyo_path_permission(&r, operation, buf);
|
|
|
out:
|
|
|
kfree(buf);
|
|
|
tomoyo_read_unlock(idx);
|
|
|
- if (!is_enforce)
|
|
|
+ if (r.mode != TOMOYO_CONFIG_ENFORCING)
|
|
|
error = 0;
|
|
|
return error;
|
|
|
}
|
|
@@ -1248,14 +1206,13 @@ int tomoyo_path2_perm(const u8 operation, struct path *path1,
|
|
|
struct path *path2)
|
|
|
{
|
|
|
int error = -ENOMEM;
|
|
|
- struct tomoyo_path_info *buf1, *buf2;
|
|
|
- struct tomoyo_domain_info *domain = tomoyo_domain();
|
|
|
- const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE);
|
|
|
- const bool is_enforce = (mode == 3);
|
|
|
- const char *msg;
|
|
|
+ struct tomoyo_path_info *buf1;
|
|
|
+ struct tomoyo_path_info *buf2;
|
|
|
+ struct tomoyo_request_info r;
|
|
|
int idx;
|
|
|
|
|
|
- if (!mode || !path1->mnt || !path2->mnt)
|
|
|
+ if (tomoyo_init_request_info(&r, NULL) == TOMOYO_CONFIG_DISABLED ||
|
|
|
+ !path1->mnt || !path2->mnt)
|
|
|
return 0;
|
|
|
idx = tomoyo_read_lock();
|
|
|
buf1 = tomoyo_get_path(path1);
|
|
@@ -1278,26 +1235,22 @@ int tomoyo_path2_perm(const u8 operation, struct path *path1,
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
- error = tomoyo_path2_acl(domain, operation, buf1, buf2);
|
|
|
- msg = tomoyo_path22keyword(operation);
|
|
|
+ error = tomoyo_path2_acl(&r, operation, buf1, buf2);
|
|
|
if (!error)
|
|
|
goto out;
|
|
|
- if (tomoyo_verbose_mode(domain))
|
|
|
- printk(KERN_WARNING "TOMOYO-%s: Access '%s %s %s' "
|
|
|
- "denied for %s\n", tomoyo_get_msg(is_enforce),
|
|
|
- msg, buf1->name, buf2->name,
|
|
|
- tomoyo_get_last_name(domain));
|
|
|
- if (mode == 1 && tomoyo_domain_quota_is_ok(domain)) {
|
|
|
+ tomoyo_warn_log(&r, "%s %s %s", tomoyo_path22keyword(operation),
|
|
|
+ buf1->name, buf2->name);
|
|
|
+ if (tomoyo_domain_quota_is_ok(&r)) {
|
|
|
const char *name1 = tomoyo_get_file_pattern(buf1)->name;
|
|
|
const char *name2 = tomoyo_get_file_pattern(buf2)->name;
|
|
|
- tomoyo_update_path2_acl(operation, name1, name2, domain,
|
|
|
+ tomoyo_update_path2_acl(operation, name1, name2, r.domain,
|
|
|
false);
|
|
|
}
|
|
|
out:
|
|
|
kfree(buf1);
|
|
|
kfree(buf2);
|
|
|
tomoyo_read_unlock(idx);
|
|
|
- if (!is_enforce)
|
|
|
+ if (r.mode != TOMOYO_CONFIG_ENFORCING)
|
|
|
error = 0;
|
|
|
return error;
|
|
|
}
|