summaryrefslogtreecommitdiffstats
path: root/security/tomoyo/common.c
diff options
context:
space:
mode:
authorTetsuo Handa2011-06-26 16:22:59 +0200
committerJames Morris2011-06-29 01:31:22 +0200
commit0e4ae0e0dec634b2ae53ac57d14141b140467dbe (patch)
tree9a3b46dd03ea21422359d3948514771d0cc9d72d /security/tomoyo/common.c
parentTOMOYO: Add built-in policy support. (diff)
downloadkernel-qcow2-linux-0e4ae0e0dec634b2ae53ac57d14141b140467dbe.tar.gz
kernel-qcow2-linux-0e4ae0e0dec634b2ae53ac57d14141b140467dbe.tar.xz
kernel-qcow2-linux-0e4ae0e0dec634b2ae53ac57d14141b140467dbe.zip
TOMOYO: Make several options configurable.
To be able to start using enforcing mode from the early stage of boot sequence, this patch adds support for activating access control without calling external policy loader program. This will be useful for systems where operations which can lead to the hijacking of the boot sequence are needed before loading the policy. For example, you can activate immediately after loading the fixed part of policy which will allow only operations needed for mounting a partition which contains the variant part of policy and verifying (e.g. running GPG check) and loading the variant part of policy. Since you can start using enforcing mode from the beginning, you can reduce the possibility of hijacking the boot sequence. This patch makes several variables configurable on build time. This patch also adds TOMOYO_loader= and TOMOYO_trigger= kernel command line option to boot the same kernel in two different init systems (BSD-style init and systemd). Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/tomoyo/common.c')
-rw-r--r--security/tomoyo/common.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c
index 01e60ad68b3a..8b14cef2338d 100644
--- a/security/tomoyo/common.c
+++ b/security/tomoyo/common.c
@@ -2420,4 +2420,7 @@ void __init tomoyo_load_builtin_policy(void)
}
}
tomoyo_read_unlock(idx);
+#ifdef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
+ tomoyo_check_profile();
+#endif
}