xref: /openbmc/linux/security/selinux/selinuxfs.c (revision 0dd4ae51)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  * 	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
61da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
71da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
81da177e4SLinus Torvalds  *  	it under the terms of the GNU General Public License as published by
91da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
101da177e4SLinus Torvalds  */
111da177e4SLinus Torvalds 
121da177e4SLinus Torvalds #include <linux/kernel.h>
131da177e4SLinus Torvalds #include <linux/pagemap.h>
141da177e4SLinus Torvalds #include <linux/slab.h>
151da177e4SLinus Torvalds #include <linux/vmalloc.h>
161da177e4SLinus Torvalds #include <linux/fs.h>
17bb003079SIngo Molnar #include <linux/mutex.h>
181da177e4SLinus Torvalds #include <linux/init.h>
191da177e4SLinus Torvalds #include <linux/string.h>
201da177e4SLinus Torvalds #include <linux/security.h>
211da177e4SLinus Torvalds #include <linux/major.h>
221da177e4SLinus Torvalds #include <linux/seq_file.h>
231da177e4SLinus Torvalds #include <linux/percpu.h>
24af601e46SSteve Grubb #include <linux/audit.h>
251da177e4SLinus Torvalds #include <asm/uaccess.h>
261da177e4SLinus Torvalds #include <asm/semaphore.h>
271da177e4SLinus Torvalds 
281da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
291da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
301da177e4SLinus Torvalds 
311da177e4SLinus Torvalds #include "flask.h"
321da177e4SLinus Torvalds #include "avc.h"
331da177e4SLinus Torvalds #include "avc_ss.h"
341da177e4SLinus Torvalds #include "security.h"
351da177e4SLinus Torvalds #include "objsec.h"
361da177e4SLinus Torvalds #include "conditional.h"
371da177e4SLinus Torvalds 
381da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
391da177e4SLinus Torvalds 
404e5ab4cbSJames Morris #ifdef CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT
414e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 0
424e5ab4cbSJames Morris #else
434e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 1
444e5ab4cbSJames Morris #endif
454e5ab4cbSJames Morris 
464e5ab4cbSJames Morris int selinux_compat_net = SELINUX_COMPAT_NET_VALUE;
474e5ab4cbSJames Morris 
481da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
491da177e4SLinus Torvalds {
501da177e4SLinus Torvalds 	selinux_checkreqprot = simple_strtoul(str,NULL,0) ? 1 : 0;
511da177e4SLinus Torvalds 	return 1;
521da177e4SLinus Torvalds }
531da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
541da177e4SLinus Torvalds 
554e5ab4cbSJames Morris static int __init selinux_compat_net_setup(char *str)
564e5ab4cbSJames Morris {
574e5ab4cbSJames Morris 	selinux_compat_net = simple_strtoul(str,NULL,0) ? 1 : 0;
584e5ab4cbSJames Morris 	return 1;
594e5ab4cbSJames Morris }
604e5ab4cbSJames Morris __setup("selinux_compat_net=", selinux_compat_net_setup);
614e5ab4cbSJames Morris 
621da177e4SLinus Torvalds 
63bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
641da177e4SLinus Torvalds 
651da177e4SLinus Torvalds /* global data for booleans */
661da177e4SLinus Torvalds static struct dentry *bool_dir = NULL;
671da177e4SLinus Torvalds static int bool_num = 0;
681da177e4SLinus Torvalds static int *bool_pending_values = NULL;
691da177e4SLinus Torvalds 
701da177e4SLinus Torvalds extern void selnl_notify_setenforce(int val);
711da177e4SLinus Torvalds 
721da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
731da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
741da177e4SLinus Torvalds 			     u32 perms)
751da177e4SLinus Torvalds {
761da177e4SLinus Torvalds 	struct task_security_struct *tsec;
771da177e4SLinus Torvalds 
781da177e4SLinus Torvalds 	tsec = tsk->security;
791da177e4SLinus Torvalds 	if (!tsec)
801da177e4SLinus Torvalds 		return -EACCES;
811da177e4SLinus Torvalds 
821da177e4SLinus Torvalds 	return avc_has_perm(tsec->sid, SECINITSID_SECURITY,
831da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
841da177e4SLinus Torvalds }
851da177e4SLinus Torvalds 
861da177e4SLinus Torvalds enum sel_inos {
871da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
881da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
891da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
901da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
911da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
921da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
931da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
941da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
951da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
961da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
971da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
981da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
991da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1001da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1014e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1026174eafcSJames Carter 	SEL_INO_NEXT,	/* The next inode number to use */
1031da177e4SLinus Torvalds };
1041da177e4SLinus Torvalds 
1056174eafcSJames Carter static unsigned long sel_last_ino = SEL_INO_NEXT - 1;
1066174eafcSJames Carter 
107f0ee2e46SJames Carter #define SEL_INITCON_INO_OFFSET 	0x01000000
108bce34bc0SJames Carter #define SEL_BOOL_INO_OFFSET	0x02000000
109f0ee2e46SJames Carter #define SEL_INO_MASK		0x00ffffff
110f0ee2e46SJames Carter 
1111da177e4SLinus Torvalds #define TMPBUFLEN	12
1121da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1131da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1141da177e4SLinus Torvalds {
1151da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1161da177e4SLinus Torvalds 	ssize_t length;
1171da177e4SLinus Torvalds 
1181da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1191da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1201da177e4SLinus Torvalds }
1211da177e4SLinus Torvalds 
1221da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1231da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file * file, const char __user * buf,
1241da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1251da177e4SLinus Torvalds 
1261da177e4SLinus Torvalds {
1271da177e4SLinus Torvalds 	char *page;
1281da177e4SLinus Torvalds 	ssize_t length;
1291da177e4SLinus Torvalds 	int new_value;
1301da177e4SLinus Torvalds 
131bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1321da177e4SLinus Torvalds 		return -ENOMEM;
1331da177e4SLinus Torvalds 	if (*ppos != 0) {
1341da177e4SLinus Torvalds 		/* No partial writes. */
1351da177e4SLinus Torvalds 		return -EINVAL;
1361da177e4SLinus Torvalds 	}
1371da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
1381da177e4SLinus Torvalds 	if (!page)
1391da177e4SLinus Torvalds 		return -ENOMEM;
1401da177e4SLinus Torvalds 	length = -EFAULT;
1411da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1421da177e4SLinus Torvalds 		goto out;
1431da177e4SLinus Torvalds 
1441da177e4SLinus Torvalds 	length = -EINVAL;
1451da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1461da177e4SLinus Torvalds 		goto out;
1471da177e4SLinus Torvalds 
1481da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1491da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1501da177e4SLinus Torvalds 		if (length)
1511da177e4SLinus Torvalds 			goto out;
152af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
153af601e46SSteve Grubb 			"enforcing=%d old_enforcing=%d auid=%u", new_value,
154af601e46SSteve Grubb 			selinux_enforcing,
155af601e46SSteve Grubb 			audit_get_loginuid(current->audit_context));
1561da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1571da177e4SLinus Torvalds 		if (selinux_enforcing)
1581da177e4SLinus Torvalds 			avc_ss_reset(0);
1591da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
1601da177e4SLinus Torvalds 	}
1611da177e4SLinus Torvalds 	length = count;
1621da177e4SLinus Torvalds out:
1631da177e4SLinus Torvalds 	free_page((unsigned long) page);
1641da177e4SLinus Torvalds 	return length;
1651da177e4SLinus Torvalds }
1661da177e4SLinus Torvalds #else
1671da177e4SLinus Torvalds #define sel_write_enforce NULL
1681da177e4SLinus Torvalds #endif
1691da177e4SLinus Torvalds 
1709c2e08c5SArjan van de Ven static const struct file_operations sel_enforce_ops = {
1711da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1721da177e4SLinus Torvalds 	.write		= sel_write_enforce,
1731da177e4SLinus Torvalds };
1741da177e4SLinus Torvalds 
1751da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
1761da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file * file, const char __user * buf,
1771da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1781da177e4SLinus Torvalds 
1791da177e4SLinus Torvalds {
1801da177e4SLinus Torvalds 	char *page;
1811da177e4SLinus Torvalds 	ssize_t length;
1821da177e4SLinus Torvalds 	int new_value;
1831da177e4SLinus Torvalds 	extern int selinux_disable(void);
1841da177e4SLinus Torvalds 
185bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1861da177e4SLinus Torvalds 		return -ENOMEM;
1871da177e4SLinus Torvalds 	if (*ppos != 0) {
1881da177e4SLinus Torvalds 		/* No partial writes. */
1891da177e4SLinus Torvalds 		return -EINVAL;
1901da177e4SLinus Torvalds 	}
1911da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
1921da177e4SLinus Torvalds 	if (!page)
1931da177e4SLinus Torvalds 		return -ENOMEM;
1941da177e4SLinus Torvalds 	length = -EFAULT;
1951da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1961da177e4SLinus Torvalds 		goto out;
1971da177e4SLinus Torvalds 
1981da177e4SLinus Torvalds 	length = -EINVAL;
1991da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
2001da177e4SLinus Torvalds 		goto out;
2011da177e4SLinus Torvalds 
2021da177e4SLinus Torvalds 	if (new_value) {
2031da177e4SLinus Torvalds 		length = selinux_disable();
2041da177e4SLinus Torvalds 		if (length < 0)
2051da177e4SLinus Torvalds 			goto out;
206af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
207af601e46SSteve Grubb 			"selinux=0 auid=%u",
208af601e46SSteve Grubb 			audit_get_loginuid(current->audit_context));
2091da177e4SLinus Torvalds 	}
2101da177e4SLinus Torvalds 
2111da177e4SLinus Torvalds 	length = count;
2121da177e4SLinus Torvalds out:
2131da177e4SLinus Torvalds 	free_page((unsigned long) page);
2141da177e4SLinus Torvalds 	return length;
2151da177e4SLinus Torvalds }
2161da177e4SLinus Torvalds #else
2171da177e4SLinus Torvalds #define sel_write_disable NULL
2181da177e4SLinus Torvalds #endif
2191da177e4SLinus Torvalds 
2209c2e08c5SArjan van de Ven static const struct file_operations sel_disable_ops = {
2211da177e4SLinus Torvalds 	.write		= sel_write_disable,
2221da177e4SLinus Torvalds };
2231da177e4SLinus Torvalds 
2241da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
2251da177e4SLinus Torvalds                                    size_t count, loff_t *ppos)
2261da177e4SLinus Torvalds {
2271da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2281da177e4SLinus Torvalds 	ssize_t length;
2291da177e4SLinus Torvalds 
2301da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
2311da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2321da177e4SLinus Torvalds }
2331da177e4SLinus Torvalds 
2349c2e08c5SArjan van de Ven static const struct file_operations sel_policyvers_ops = {
2351da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
2361da177e4SLinus Torvalds };
2371da177e4SLinus Torvalds 
2381da177e4SLinus Torvalds /* declaration for sel_write_load */
2391da177e4SLinus Torvalds static int sel_make_bools(void);
2401da177e4SLinus Torvalds 
2411da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
2421da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
2431da177e4SLinus Torvalds {
2441da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2451da177e4SLinus Torvalds 	ssize_t length;
2461da177e4SLinus Torvalds 
2471da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_mls_enabled);
2481da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2491da177e4SLinus Torvalds }
2501da177e4SLinus Torvalds 
2519c2e08c5SArjan van de Ven static const struct file_operations sel_mls_ops = {
2521da177e4SLinus Torvalds 	.read		= sel_read_mls,
2531da177e4SLinus Torvalds };
2541da177e4SLinus Torvalds 
2551da177e4SLinus Torvalds static ssize_t sel_write_load(struct file * file, const char __user * buf,
2561da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
2571da177e4SLinus Torvalds 
2581da177e4SLinus Torvalds {
2591da177e4SLinus Torvalds 	int ret;
2601da177e4SLinus Torvalds 	ssize_t length;
2611da177e4SLinus Torvalds 	void *data = NULL;
2621da177e4SLinus Torvalds 
263bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
2641da177e4SLinus Torvalds 
2651da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
2661da177e4SLinus Torvalds 	if (length)
2671da177e4SLinus Torvalds 		goto out;
2681da177e4SLinus Torvalds 
2691da177e4SLinus Torvalds 	if (*ppos != 0) {
2701da177e4SLinus Torvalds 		/* No partial writes. */
2711da177e4SLinus Torvalds 		length = -EINVAL;
2721da177e4SLinus Torvalds 		goto out;
2731da177e4SLinus Torvalds 	}
2741da177e4SLinus Torvalds 
275bfd51626SDavi Arnaut 	if ((count > 64 * 1024 * 1024)
2761da177e4SLinus Torvalds 	    || (data = vmalloc(count)) == NULL) {
2771da177e4SLinus Torvalds 		length = -ENOMEM;
2781da177e4SLinus Torvalds 		goto out;
2791da177e4SLinus Torvalds 	}
2801da177e4SLinus Torvalds 
2811da177e4SLinus Torvalds 	length = -EFAULT;
2821da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
2831da177e4SLinus Torvalds 		goto out;
2841da177e4SLinus Torvalds 
2851da177e4SLinus Torvalds 	length = security_load_policy(data, count);
2861da177e4SLinus Torvalds 	if (length)
2871da177e4SLinus Torvalds 		goto out;
2881da177e4SLinus Torvalds 
2891da177e4SLinus Torvalds 	ret = sel_make_bools();
2901da177e4SLinus Torvalds 	if (ret)
2911da177e4SLinus Torvalds 		length = ret;
2921da177e4SLinus Torvalds 	else
2931da177e4SLinus Torvalds 		length = count;
294af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
295af601e46SSteve Grubb 		"policy loaded auid=%u",
296af601e46SSteve Grubb 		audit_get_loginuid(current->audit_context));
2971da177e4SLinus Torvalds out:
298bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
2991da177e4SLinus Torvalds 	vfree(data);
3001da177e4SLinus Torvalds 	return length;
3011da177e4SLinus Torvalds }
3021da177e4SLinus Torvalds 
3039c2e08c5SArjan van de Ven static const struct file_operations sel_load_ops = {
3041da177e4SLinus Torvalds 	.write		= sel_write_load,
3051da177e4SLinus Torvalds };
3061da177e4SLinus Torvalds 
307ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file * file, char *buf, size_t size)
3081da177e4SLinus Torvalds {
309ce9982d0SStephen Smalley 	char *canon;
310ce9982d0SStephen Smalley 	u32 sid, len;
3111da177e4SLinus Torvalds 	ssize_t length;
3121da177e4SLinus Torvalds 
3131da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
3141da177e4SLinus Torvalds 	if (length)
3151da177e4SLinus Torvalds 		return length;
3161da177e4SLinus Torvalds 
317ce9982d0SStephen Smalley 	length = security_context_to_sid(buf, size, &sid);
3181da177e4SLinus Torvalds 	if (length < 0)
319ce9982d0SStephen Smalley 		return length;
3201da177e4SLinus Torvalds 
321ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
322ce9982d0SStephen Smalley 	if (length < 0)
323ce9982d0SStephen Smalley 		return length;
324ce9982d0SStephen Smalley 
325ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
326ce9982d0SStephen Smalley 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
327ce9982d0SStephen Smalley 		       "max\n", __FUNCTION__, len);
328ce9982d0SStephen Smalley 		length = -ERANGE;
329ce9982d0SStephen Smalley 		goto out;
330ce9982d0SStephen Smalley 	}
331ce9982d0SStephen Smalley 
332ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
333ce9982d0SStephen Smalley 	length = len;
3341da177e4SLinus Torvalds out:
335ce9982d0SStephen Smalley 	kfree(canon);
3361da177e4SLinus Torvalds 	return length;
3371da177e4SLinus Torvalds }
3381da177e4SLinus Torvalds 
3391da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
3401da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
3411da177e4SLinus Torvalds {
3421da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3431da177e4SLinus Torvalds 	ssize_t length;
3441da177e4SLinus Torvalds 
3451da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
3461da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3471da177e4SLinus Torvalds }
3481da177e4SLinus Torvalds 
3491da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file * file, const char __user * buf,
3501da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
3511da177e4SLinus Torvalds {
3521da177e4SLinus Torvalds 	char *page;
3531da177e4SLinus Torvalds 	ssize_t length;
3541da177e4SLinus Torvalds 	unsigned int new_value;
3551da177e4SLinus Torvalds 
3561da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
3571da177e4SLinus Torvalds 	if (length)
3581da177e4SLinus Torvalds 		return length;
3591da177e4SLinus Torvalds 
360bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
3611da177e4SLinus Torvalds 		return -ENOMEM;
3621da177e4SLinus Torvalds 	if (*ppos != 0) {
3631da177e4SLinus Torvalds 		/* No partial writes. */
3641da177e4SLinus Torvalds 		return -EINVAL;
3651da177e4SLinus Torvalds 	}
3661da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
3671da177e4SLinus Torvalds 	if (!page)
3681da177e4SLinus Torvalds 		return -ENOMEM;
3691da177e4SLinus Torvalds 	length = -EFAULT;
3701da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
3711da177e4SLinus Torvalds 		goto out;
3721da177e4SLinus Torvalds 
3731da177e4SLinus Torvalds 	length = -EINVAL;
3741da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
3751da177e4SLinus Torvalds 		goto out;
3761da177e4SLinus Torvalds 
3771da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
3781da177e4SLinus Torvalds 	length = count;
3791da177e4SLinus Torvalds out:
3801da177e4SLinus Torvalds 	free_page((unsigned long) page);
3811da177e4SLinus Torvalds 	return length;
3821da177e4SLinus Torvalds }
3839c2e08c5SArjan van de Ven static const struct file_operations sel_checkreqprot_ops = {
3841da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
3851da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
3861da177e4SLinus Torvalds };
3871da177e4SLinus Torvalds 
3884e5ab4cbSJames Morris static ssize_t sel_read_compat_net(struct file *filp, char __user *buf,
3894e5ab4cbSJames Morris 				   size_t count, loff_t *ppos)
3904e5ab4cbSJames Morris {
3914e5ab4cbSJames Morris 	char tmpbuf[TMPBUFLEN];
3924e5ab4cbSJames Morris 	ssize_t length;
3934e5ab4cbSJames Morris 
3944e5ab4cbSJames Morris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_compat_net);
3954e5ab4cbSJames Morris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3964e5ab4cbSJames Morris }
3974e5ab4cbSJames Morris 
3984e5ab4cbSJames Morris static ssize_t sel_write_compat_net(struct file * file, const char __user * buf,
3994e5ab4cbSJames Morris 				    size_t count, loff_t *ppos)
4004e5ab4cbSJames Morris {
4014e5ab4cbSJames Morris 	char *page;
4024e5ab4cbSJames Morris 	ssize_t length;
4034e5ab4cbSJames Morris 	int new_value;
4044e5ab4cbSJames Morris 
4054e5ab4cbSJames Morris 	length = task_has_security(current, SECURITY__LOAD_POLICY);
4064e5ab4cbSJames Morris 	if (length)
4074e5ab4cbSJames Morris 		return length;
4084e5ab4cbSJames Morris 
4094e5ab4cbSJames Morris 	if (count >= PAGE_SIZE)
4104e5ab4cbSJames Morris 		return -ENOMEM;
4114e5ab4cbSJames Morris 	if (*ppos != 0) {
4124e5ab4cbSJames Morris 		/* No partial writes. */
4134e5ab4cbSJames Morris 		return -EINVAL;
4144e5ab4cbSJames Morris 	}
4154e5ab4cbSJames Morris 	page = (char*)get_zeroed_page(GFP_KERNEL);
4164e5ab4cbSJames Morris 	if (!page)
4174e5ab4cbSJames Morris 		return -ENOMEM;
4184e5ab4cbSJames Morris 	length = -EFAULT;
4194e5ab4cbSJames Morris 	if (copy_from_user(page, buf, count))
4204e5ab4cbSJames Morris 		goto out;
4214e5ab4cbSJames Morris 
4224e5ab4cbSJames Morris 	length = -EINVAL;
4234e5ab4cbSJames Morris 	if (sscanf(page, "%d", &new_value) != 1)
4244e5ab4cbSJames Morris 		goto out;
4254e5ab4cbSJames Morris 
4264e5ab4cbSJames Morris 	selinux_compat_net = new_value ? 1 : 0;
4274e5ab4cbSJames Morris 	length = count;
4284e5ab4cbSJames Morris out:
4294e5ab4cbSJames Morris 	free_page((unsigned long) page);
4304e5ab4cbSJames Morris 	return length;
4314e5ab4cbSJames Morris }
4329c2e08c5SArjan van de Ven static const struct file_operations sel_compat_net_ops = {
4334e5ab4cbSJames Morris 	.read		= sel_read_compat_net,
4344e5ab4cbSJames Morris 	.write		= sel_write_compat_net,
4354e5ab4cbSJames Morris };
4364e5ab4cbSJames Morris 
4371da177e4SLinus Torvalds /*
4381da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
4391da177e4SLinus Torvalds  */
4401da177e4SLinus Torvalds static ssize_t sel_write_access(struct file * file, char *buf, size_t size);
4411da177e4SLinus Torvalds static ssize_t sel_write_create(struct file * file, char *buf, size_t size);
4421da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size);
4431da177e4SLinus Torvalds static ssize_t sel_write_user(struct file * file, char *buf, size_t size);
4441da177e4SLinus Torvalds static ssize_t sel_write_member(struct file * file, char *buf, size_t size);
4451da177e4SLinus Torvalds 
4461da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
4471da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
4481da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
4491da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
4501da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
4511da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
452ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
4531da177e4SLinus Torvalds };
4541da177e4SLinus Torvalds 
4551da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
4561da177e4SLinus Torvalds {
4573d5ff529SJosef Sipek 	ino_t ino =  file->f_path.dentry->d_inode->i_ino;
4581da177e4SLinus Torvalds 	char *data;
4591da177e4SLinus Torvalds 	ssize_t rv;
4601da177e4SLinus Torvalds 
4616e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
4621da177e4SLinus Torvalds 		return -EINVAL;
4631da177e4SLinus Torvalds 
4641da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
4651da177e4SLinus Torvalds 	if (IS_ERR(data))
4661da177e4SLinus Torvalds 		return PTR_ERR(data);
4671da177e4SLinus Torvalds 
4681da177e4SLinus Torvalds 	rv =  write_op[ino](file, data, size);
4691da177e4SLinus Torvalds 	if (rv>0) {
4701da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
4711da177e4SLinus Torvalds 		rv = size;
4721da177e4SLinus Torvalds 	}
4731da177e4SLinus Torvalds 	return rv;
4741da177e4SLinus Torvalds }
4751da177e4SLinus Torvalds 
4769c2e08c5SArjan van de Ven static const struct file_operations transaction_ops = {
4771da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
4781da177e4SLinus Torvalds 	.read		= simple_transaction_read,
4791da177e4SLinus Torvalds 	.release	= simple_transaction_release,
4801da177e4SLinus Torvalds };
4811da177e4SLinus Torvalds 
4821da177e4SLinus Torvalds /*
4831da177e4SLinus Torvalds  * payload - write methods
4841da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
4851da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
4861da177e4SLinus Torvalds  */
4871da177e4SLinus Torvalds 
4881da177e4SLinus Torvalds static ssize_t sel_write_access(struct file * file, char *buf, size_t size)
4891da177e4SLinus Torvalds {
4901da177e4SLinus Torvalds 	char *scon, *tcon;
4911da177e4SLinus Torvalds 	u32 ssid, tsid;
4921da177e4SLinus Torvalds 	u16 tclass;
4931da177e4SLinus Torvalds 	u32 req;
4941da177e4SLinus Torvalds 	struct av_decision avd;
4951da177e4SLinus Torvalds 	ssize_t length;
4961da177e4SLinus Torvalds 
4971da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
4981da177e4SLinus Torvalds 	if (length)
4991da177e4SLinus Torvalds 		return length;
5001da177e4SLinus Torvalds 
5011da177e4SLinus Torvalds 	length = -ENOMEM;
50289d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
5031da177e4SLinus Torvalds 	if (!scon)
5041da177e4SLinus Torvalds 		return length;
5051da177e4SLinus Torvalds 
50689d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
5071da177e4SLinus Torvalds 	if (!tcon)
5081da177e4SLinus Torvalds 		goto out;
5091da177e4SLinus Torvalds 
5101da177e4SLinus Torvalds 	length = -EINVAL;
5111da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4)
5121da177e4SLinus Torvalds 		goto out2;
5131da177e4SLinus Torvalds 
5141da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
5151da177e4SLinus Torvalds 	if (length < 0)
5161da177e4SLinus Torvalds 		goto out2;
5171da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
5181da177e4SLinus Torvalds 	if (length < 0)
5191da177e4SLinus Torvalds 		goto out2;
5201da177e4SLinus Torvalds 
5211da177e4SLinus Torvalds 	length = security_compute_av(ssid, tsid, tclass, req, &avd);
5221da177e4SLinus Torvalds 	if (length < 0)
5231da177e4SLinus Torvalds 		goto out2;
5241da177e4SLinus Torvalds 
5251da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
5261da177e4SLinus Torvalds 			  "%x %x %x %x %u",
5271da177e4SLinus Torvalds 			  avd.allowed, avd.decided,
5281da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
5291da177e4SLinus Torvalds 			  avd.seqno);
5301da177e4SLinus Torvalds out2:
5311da177e4SLinus Torvalds 	kfree(tcon);
5321da177e4SLinus Torvalds out:
5331da177e4SLinus Torvalds 	kfree(scon);
5341da177e4SLinus Torvalds 	return length;
5351da177e4SLinus Torvalds }
5361da177e4SLinus Torvalds 
5371da177e4SLinus Torvalds static ssize_t sel_write_create(struct file * file, char *buf, size_t size)
5381da177e4SLinus Torvalds {
5391da177e4SLinus Torvalds 	char *scon, *tcon;
5401da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
5411da177e4SLinus Torvalds 	u16 tclass;
5421da177e4SLinus Torvalds 	ssize_t length;
5431da177e4SLinus Torvalds 	char *newcon;
5441da177e4SLinus Torvalds 	u32 len;
5451da177e4SLinus Torvalds 
5461da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
5471da177e4SLinus Torvalds 	if (length)
5481da177e4SLinus Torvalds 		return length;
5491da177e4SLinus Torvalds 
5501da177e4SLinus Torvalds 	length = -ENOMEM;
55189d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
5521da177e4SLinus Torvalds 	if (!scon)
5531da177e4SLinus Torvalds 		return length;
5541da177e4SLinus Torvalds 
55589d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
5561da177e4SLinus Torvalds 	if (!tcon)
5571da177e4SLinus Torvalds 		goto out;
5581da177e4SLinus Torvalds 
5591da177e4SLinus Torvalds 	length = -EINVAL;
5601da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
5611da177e4SLinus Torvalds 		goto out2;
5621da177e4SLinus Torvalds 
5631da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
5641da177e4SLinus Torvalds 	if (length < 0)
5651da177e4SLinus Torvalds 		goto out2;
5661da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
5671da177e4SLinus Torvalds 	if (length < 0)
5681da177e4SLinus Torvalds 		goto out2;
5691da177e4SLinus Torvalds 
5701da177e4SLinus Torvalds 	length = security_transition_sid(ssid, tsid, tclass, &newsid);
5711da177e4SLinus Torvalds 	if (length < 0)
5721da177e4SLinus Torvalds 		goto out2;
5731da177e4SLinus Torvalds 
5741da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
5751da177e4SLinus Torvalds 	if (length < 0)
5761da177e4SLinus Torvalds 		goto out2;
5771da177e4SLinus Torvalds 
5781da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
5791da177e4SLinus Torvalds 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
5801da177e4SLinus Torvalds 		       "max\n", __FUNCTION__, len);
5811da177e4SLinus Torvalds 		length = -ERANGE;
5821da177e4SLinus Torvalds 		goto out3;
5831da177e4SLinus Torvalds 	}
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
5861da177e4SLinus Torvalds 	length = len;
5871da177e4SLinus Torvalds out3:
5881da177e4SLinus Torvalds 	kfree(newcon);
5891da177e4SLinus Torvalds out2:
5901da177e4SLinus Torvalds 	kfree(tcon);
5911da177e4SLinus Torvalds out:
5921da177e4SLinus Torvalds 	kfree(scon);
5931da177e4SLinus Torvalds 	return length;
5941da177e4SLinus Torvalds }
5951da177e4SLinus Torvalds 
5961da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size)
5971da177e4SLinus Torvalds {
5981da177e4SLinus Torvalds 	char *scon, *tcon;
5991da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
6001da177e4SLinus Torvalds 	u16 tclass;
6011da177e4SLinus Torvalds 	ssize_t length;
6021da177e4SLinus Torvalds 	char *newcon;
6031da177e4SLinus Torvalds 	u32 len;
6041da177e4SLinus Torvalds 
6051da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
6061da177e4SLinus Torvalds 	if (length)
6071da177e4SLinus Torvalds 		return length;
6081da177e4SLinus Torvalds 
6091da177e4SLinus Torvalds 	length = -ENOMEM;
61089d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
6111da177e4SLinus Torvalds 	if (!scon)
6121da177e4SLinus Torvalds 		return length;
6131da177e4SLinus Torvalds 
61489d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
6151da177e4SLinus Torvalds 	if (!tcon)
6161da177e4SLinus Torvalds 		goto out;
6171da177e4SLinus Torvalds 
6181da177e4SLinus Torvalds 	length = -EINVAL;
6191da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
6201da177e4SLinus Torvalds 		goto out2;
6211da177e4SLinus Torvalds 
6221da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
6231da177e4SLinus Torvalds 	if (length < 0)
6241da177e4SLinus Torvalds 		goto out2;
6251da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
6261da177e4SLinus Torvalds 	if (length < 0)
6271da177e4SLinus Torvalds 		goto out2;
6281da177e4SLinus Torvalds 
6291da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
6301da177e4SLinus Torvalds 	if (length < 0)
6311da177e4SLinus Torvalds 		goto out2;
6321da177e4SLinus Torvalds 
6331da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
6341da177e4SLinus Torvalds 	if (length < 0)
6351da177e4SLinus Torvalds 		goto out2;
6361da177e4SLinus Torvalds 
6371da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
6381da177e4SLinus Torvalds 		length = -ERANGE;
6391da177e4SLinus Torvalds 		goto out3;
6401da177e4SLinus Torvalds 	}
6411da177e4SLinus Torvalds 
6421da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
6431da177e4SLinus Torvalds 	length = len;
6441da177e4SLinus Torvalds out3:
6451da177e4SLinus Torvalds 	kfree(newcon);
6461da177e4SLinus Torvalds out2:
6471da177e4SLinus Torvalds 	kfree(tcon);
6481da177e4SLinus Torvalds out:
6491da177e4SLinus Torvalds 	kfree(scon);
6501da177e4SLinus Torvalds 	return length;
6511da177e4SLinus Torvalds }
6521da177e4SLinus Torvalds 
6531da177e4SLinus Torvalds static ssize_t sel_write_user(struct file * file, char *buf, size_t size)
6541da177e4SLinus Torvalds {
6551da177e4SLinus Torvalds 	char *con, *user, *ptr;
6561da177e4SLinus Torvalds 	u32 sid, *sids;
6571da177e4SLinus Torvalds 	ssize_t length;
6581da177e4SLinus Torvalds 	char *newcon;
6591da177e4SLinus Torvalds 	int i, rc;
6601da177e4SLinus Torvalds 	u32 len, nsids;
6611da177e4SLinus Torvalds 
6621da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
6631da177e4SLinus Torvalds 	if (length)
6641da177e4SLinus Torvalds 		return length;
6651da177e4SLinus Torvalds 
6661da177e4SLinus Torvalds 	length = -ENOMEM;
66789d155efSJames Morris 	con = kzalloc(size+1, GFP_KERNEL);
6681da177e4SLinus Torvalds 	if (!con)
6691da177e4SLinus Torvalds 		return length;
6701da177e4SLinus Torvalds 
67189d155efSJames Morris 	user = kzalloc(size+1, GFP_KERNEL);
6721da177e4SLinus Torvalds 	if (!user)
6731da177e4SLinus Torvalds 		goto out;
6741da177e4SLinus Torvalds 
6751da177e4SLinus Torvalds 	length = -EINVAL;
6761da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
6771da177e4SLinus Torvalds 		goto out2;
6781da177e4SLinus Torvalds 
6791da177e4SLinus Torvalds 	length = security_context_to_sid(con, strlen(con)+1, &sid);
6801da177e4SLinus Torvalds 	if (length < 0)
6811da177e4SLinus Torvalds 		goto out2;
6821da177e4SLinus Torvalds 
6831da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
6841da177e4SLinus Torvalds 	if (length < 0)
6851da177e4SLinus Torvalds 		goto out2;
6861da177e4SLinus Torvalds 
6871da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
6881da177e4SLinus Torvalds 	ptr = buf + length;
6891da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
6901da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
6911da177e4SLinus Torvalds 		if (rc) {
6921da177e4SLinus Torvalds 			length = rc;
6931da177e4SLinus Torvalds 			goto out3;
6941da177e4SLinus Torvalds 		}
6951da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
6961da177e4SLinus Torvalds 			kfree(newcon);
6971da177e4SLinus Torvalds 			length = -ERANGE;
6981da177e4SLinus Torvalds 			goto out3;
6991da177e4SLinus Torvalds 		}
7001da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
7011da177e4SLinus Torvalds 		kfree(newcon);
7021da177e4SLinus Torvalds 		ptr += len;
7031da177e4SLinus Torvalds 		length += len;
7041da177e4SLinus Torvalds 	}
7051da177e4SLinus Torvalds out3:
7061da177e4SLinus Torvalds 	kfree(sids);
7071da177e4SLinus Torvalds out2:
7081da177e4SLinus Torvalds 	kfree(user);
7091da177e4SLinus Torvalds out:
7101da177e4SLinus Torvalds 	kfree(con);
7111da177e4SLinus Torvalds 	return length;
7121da177e4SLinus Torvalds }
7131da177e4SLinus Torvalds 
7141da177e4SLinus Torvalds static ssize_t sel_write_member(struct file * file, char *buf, size_t size)
7151da177e4SLinus Torvalds {
7161da177e4SLinus Torvalds 	char *scon, *tcon;
7171da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7181da177e4SLinus Torvalds 	u16 tclass;
7191da177e4SLinus Torvalds 	ssize_t length;
7201da177e4SLinus Torvalds 	char *newcon;
7211da177e4SLinus Torvalds 	u32 len;
7221da177e4SLinus Torvalds 
7231da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
7241da177e4SLinus Torvalds 	if (length)
7251da177e4SLinus Torvalds 		return length;
7261da177e4SLinus Torvalds 
7271da177e4SLinus Torvalds 	length = -ENOMEM;
72889d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
7291da177e4SLinus Torvalds 	if (!scon)
7301da177e4SLinus Torvalds 		return length;
7311da177e4SLinus Torvalds 
73289d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
7331da177e4SLinus Torvalds 	if (!tcon)
7341da177e4SLinus Torvalds 		goto out;
7351da177e4SLinus Torvalds 
7361da177e4SLinus Torvalds 	length = -EINVAL;
7371da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
7381da177e4SLinus Torvalds 		goto out2;
7391da177e4SLinus Torvalds 
7401da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
7411da177e4SLinus Torvalds 	if (length < 0)
7421da177e4SLinus Torvalds 		goto out2;
7431da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
7441da177e4SLinus Torvalds 	if (length < 0)
7451da177e4SLinus Torvalds 		goto out2;
7461da177e4SLinus Torvalds 
7471da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
7481da177e4SLinus Torvalds 	if (length < 0)
7491da177e4SLinus Torvalds 		goto out2;
7501da177e4SLinus Torvalds 
7511da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
7521da177e4SLinus Torvalds 	if (length < 0)
7531da177e4SLinus Torvalds 		goto out2;
7541da177e4SLinus Torvalds 
7551da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
7561da177e4SLinus Torvalds 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
7571da177e4SLinus Torvalds 		       "max\n", __FUNCTION__, len);
7581da177e4SLinus Torvalds 		length = -ERANGE;
7591da177e4SLinus Torvalds 		goto out3;
7601da177e4SLinus Torvalds 	}
7611da177e4SLinus Torvalds 
7621da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
7631da177e4SLinus Torvalds 	length = len;
7641da177e4SLinus Torvalds out3:
7651da177e4SLinus Torvalds 	kfree(newcon);
7661da177e4SLinus Torvalds out2:
7671da177e4SLinus Torvalds 	kfree(tcon);
7681da177e4SLinus Torvalds out:
7691da177e4SLinus Torvalds 	kfree(scon);
7701da177e4SLinus Torvalds 	return length;
7711da177e4SLinus Torvalds }
7721da177e4SLinus Torvalds 
7731da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
7741da177e4SLinus Torvalds {
7751da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
7761da177e4SLinus Torvalds 
7771da177e4SLinus Torvalds 	if (ret) {
7781da177e4SLinus Torvalds 		ret->i_mode = mode;
7791da177e4SLinus Torvalds 		ret->i_uid = ret->i_gid = 0;
7801da177e4SLinus Torvalds 		ret->i_blocks = 0;
7811da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
7821da177e4SLinus Torvalds 	}
7831da177e4SLinus Torvalds 	return ret;
7841da177e4SLinus Torvalds }
7851da177e4SLinus Torvalds 
7861da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
7871da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
7881da177e4SLinus Torvalds {
7891da177e4SLinus Torvalds 	char *page = NULL;
7901da177e4SLinus Torvalds 	ssize_t length;
7911da177e4SLinus Torvalds 	ssize_t ret;
7921da177e4SLinus Torvalds 	int cur_enforcing;
7931da177e4SLinus Torvalds 	struct inode *inode;
7941da177e4SLinus Torvalds 
795bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
7961da177e4SLinus Torvalds 
7971da177e4SLinus Torvalds 	ret = -EFAULT;
7981da177e4SLinus Torvalds 
7991da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
8001da177e4SLinus Torvalds 	if (!filep->f_op)
8011da177e4SLinus Torvalds 		goto out;
8021da177e4SLinus Torvalds 
803bfd51626SDavi Arnaut 	if (count > PAGE_SIZE) {
8041da177e4SLinus Torvalds 		ret = -EINVAL;
8051da177e4SLinus Torvalds 		goto out;
8061da177e4SLinus Torvalds 	}
8071da177e4SLinus Torvalds 	if (!(page = (char*)get_zeroed_page(GFP_KERNEL))) {
8081da177e4SLinus Torvalds 		ret = -ENOMEM;
8091da177e4SLinus Torvalds 		goto out;
8101da177e4SLinus Torvalds 	}
8111da177e4SLinus Torvalds 
8123d5ff529SJosef Sipek 	inode = filep->f_path.dentry->d_inode;
813bce34bc0SJames Carter 	cur_enforcing = security_get_bool_value(inode->i_ino&SEL_INO_MASK);
8141da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
8151da177e4SLinus Torvalds 		ret = cur_enforcing;
8161da177e4SLinus Torvalds 		goto out;
8171da177e4SLinus Torvalds 	}
8181da177e4SLinus Torvalds 
8191da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
820bce34bc0SJames Carter 			  bool_pending_values[inode->i_ino&SEL_INO_MASK]);
82168bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
8221da177e4SLinus Torvalds out:
823bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
8241da177e4SLinus Torvalds 	if (page)
8251da177e4SLinus Torvalds 		free_page((unsigned long)page);
8261da177e4SLinus Torvalds 	return ret;
8271da177e4SLinus Torvalds }
8281da177e4SLinus Torvalds 
8291da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
8301da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
8311da177e4SLinus Torvalds {
8321da177e4SLinus Torvalds 	char *page = NULL;
8331da177e4SLinus Torvalds 	ssize_t length = -EFAULT;
8341da177e4SLinus Torvalds 	int new_value;
8351da177e4SLinus Torvalds 	struct inode *inode;
8361da177e4SLinus Torvalds 
837bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
8381da177e4SLinus Torvalds 
8391da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
8401da177e4SLinus Torvalds 	if (length)
8411da177e4SLinus Torvalds 		goto out;
8421da177e4SLinus Torvalds 
8431da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
8441da177e4SLinus Torvalds 	if (!filep->f_op)
8451da177e4SLinus Torvalds 		goto out;
8461da177e4SLinus Torvalds 
847bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
8481da177e4SLinus Torvalds 		length = -ENOMEM;
8491da177e4SLinus Torvalds 		goto out;
8501da177e4SLinus Torvalds 	}
8511da177e4SLinus Torvalds 	if (*ppos != 0) {
8521da177e4SLinus Torvalds 		/* No partial writes. */
8531da177e4SLinus Torvalds 		goto out;
8541da177e4SLinus Torvalds 	}
8551da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
8561da177e4SLinus Torvalds 	if (!page) {
8571da177e4SLinus Torvalds 		length = -ENOMEM;
8581da177e4SLinus Torvalds 		goto out;
8591da177e4SLinus Torvalds 	}
8601da177e4SLinus Torvalds 
8611da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
8621da177e4SLinus Torvalds 		goto out;
8631da177e4SLinus Torvalds 
8641da177e4SLinus Torvalds 	length = -EINVAL;
8651da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
8661da177e4SLinus Torvalds 		goto out;
8671da177e4SLinus Torvalds 
8681da177e4SLinus Torvalds 	if (new_value)
8691da177e4SLinus Torvalds 		new_value = 1;
8701da177e4SLinus Torvalds 
8713d5ff529SJosef Sipek 	inode = filep->f_path.dentry->d_inode;
872bce34bc0SJames Carter 	bool_pending_values[inode->i_ino&SEL_INO_MASK] = new_value;
8731da177e4SLinus Torvalds 	length = count;
8741da177e4SLinus Torvalds 
8751da177e4SLinus Torvalds out:
876bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
8771da177e4SLinus Torvalds 	if (page)
8781da177e4SLinus Torvalds 		free_page((unsigned long) page);
8791da177e4SLinus Torvalds 	return length;
8801da177e4SLinus Torvalds }
8811da177e4SLinus Torvalds 
8829c2e08c5SArjan van de Ven static const struct file_operations sel_bool_ops = {
8831da177e4SLinus Torvalds 	.read           = sel_read_bool,
8841da177e4SLinus Torvalds 	.write          = sel_write_bool,
8851da177e4SLinus Torvalds };
8861da177e4SLinus Torvalds 
8871da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
8881da177e4SLinus Torvalds 				      const char __user *buf,
8891da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
8901da177e4SLinus Torvalds {
8911da177e4SLinus Torvalds 	char *page = NULL;
8921da177e4SLinus Torvalds 	ssize_t length = -EFAULT;
8931da177e4SLinus Torvalds 	int new_value;
8941da177e4SLinus Torvalds 
895bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
8961da177e4SLinus Torvalds 
8971da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
8981da177e4SLinus Torvalds 	if (length)
8991da177e4SLinus Torvalds 		goto out;
9001da177e4SLinus Torvalds 
9011da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
9021da177e4SLinus Torvalds 	if (!filep->f_op)
9031da177e4SLinus Torvalds 		goto out;
9041da177e4SLinus Torvalds 
905bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
9061da177e4SLinus Torvalds 		length = -ENOMEM;
9071da177e4SLinus Torvalds 		goto out;
9081da177e4SLinus Torvalds 	}
9091da177e4SLinus Torvalds 	if (*ppos != 0) {
9101da177e4SLinus Torvalds 		/* No partial writes. */
9111da177e4SLinus Torvalds 		goto out;
9121da177e4SLinus Torvalds 	}
9131da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
9141da177e4SLinus Torvalds 	if (!page) {
9151da177e4SLinus Torvalds 		length = -ENOMEM;
9161da177e4SLinus Torvalds 		goto out;
9171da177e4SLinus Torvalds 	}
9181da177e4SLinus Torvalds 
9191da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
9201da177e4SLinus Torvalds 		goto out;
9211da177e4SLinus Torvalds 
9221da177e4SLinus Torvalds 	length = -EINVAL;
9231da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
9241da177e4SLinus Torvalds 		goto out;
9251da177e4SLinus Torvalds 
92620c19e41SDavi Arnaut 	if (new_value && bool_pending_values) {
9271da177e4SLinus Torvalds 		security_set_bools(bool_num, bool_pending_values);
9281da177e4SLinus Torvalds 	}
9291da177e4SLinus Torvalds 
9301da177e4SLinus Torvalds 	length = count;
9311da177e4SLinus Torvalds 
9321da177e4SLinus Torvalds out:
933bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
9341da177e4SLinus Torvalds 	if (page)
9351da177e4SLinus Torvalds 		free_page((unsigned long) page);
9361da177e4SLinus Torvalds 	return length;
9371da177e4SLinus Torvalds }
9381da177e4SLinus Torvalds 
9399c2e08c5SArjan van de Ven static const struct file_operations sel_commit_bools_ops = {
9401da177e4SLinus Torvalds 	.write          = sel_commit_bools_write,
9411da177e4SLinus Torvalds };
9421da177e4SLinus Torvalds 
9430c92d7c7SChristopher J. PeBenito /* partial revoke() from fs/proc/generic.c proc_kill_inodes */
9440c92d7c7SChristopher J. PeBenito static void sel_remove_entries(struct dentry *de)
9451da177e4SLinus Torvalds {
9461da177e4SLinus Torvalds 	struct list_head *p, *node;
9471da177e4SLinus Torvalds 	struct super_block *sb = de->d_sb;
9481da177e4SLinus Torvalds 
9491da177e4SLinus Torvalds 	spin_lock(&dcache_lock);
9501da177e4SLinus Torvalds 	node = de->d_subdirs.next;
9511da177e4SLinus Torvalds 	while (node != &de->d_subdirs) {
9525160ee6fSEric Dumazet 		struct dentry *d = list_entry(node, struct dentry, d_u.d_child);
9531da177e4SLinus Torvalds 		list_del_init(node);
9541da177e4SLinus Torvalds 
9551da177e4SLinus Torvalds 		if (d->d_inode) {
9561da177e4SLinus Torvalds 			d = dget_locked(d);
9571da177e4SLinus Torvalds 			spin_unlock(&dcache_lock);
9581da177e4SLinus Torvalds 			d_delete(d);
9591da177e4SLinus Torvalds 			simple_unlink(de->d_inode, d);
9601da177e4SLinus Torvalds 			dput(d);
9611da177e4SLinus Torvalds 			spin_lock(&dcache_lock);
9621da177e4SLinus Torvalds 		}
9631da177e4SLinus Torvalds 		node = de->d_subdirs.next;
9641da177e4SLinus Torvalds 	}
9651da177e4SLinus Torvalds 
9661da177e4SLinus Torvalds 	spin_unlock(&dcache_lock);
9671da177e4SLinus Torvalds 
9681da177e4SLinus Torvalds 	file_list_lock();
9691da177e4SLinus Torvalds 	list_for_each(p, &sb->s_files) {
9702f512016SEric Dumazet 		struct file * filp = list_entry(p, struct file, f_u.fu_list);
9713d5ff529SJosef Sipek 		struct dentry * dentry = filp->f_path.dentry;
9721da177e4SLinus Torvalds 
9731da177e4SLinus Torvalds 		if (dentry->d_parent != de) {
9741da177e4SLinus Torvalds 			continue;
9751da177e4SLinus Torvalds 		}
9761da177e4SLinus Torvalds 		filp->f_op = NULL;
9771da177e4SLinus Torvalds 	}
9781da177e4SLinus Torvalds 	file_list_unlock();
9791da177e4SLinus Torvalds }
9801da177e4SLinus Torvalds 
9811da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
9821da177e4SLinus Torvalds 
9831da177e4SLinus Torvalds static int sel_make_bools(void)
9841da177e4SLinus Torvalds {
9851da177e4SLinus Torvalds 	int i, ret = 0;
9861da177e4SLinus Torvalds 	ssize_t len;
9871da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
9881da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
9891da177e4SLinus Torvalds 	struct inode *inode = NULL;
9901da177e4SLinus Torvalds 	struct inode_security_struct *isec;
9911da177e4SLinus Torvalds 	char **names = NULL, *page;
9921da177e4SLinus Torvalds 	int num;
9931da177e4SLinus Torvalds 	int *values = NULL;
9941da177e4SLinus Torvalds 	u32 sid;
9951da177e4SLinus Torvalds 
9961da177e4SLinus Torvalds 	/* remove any existing files */
9971da177e4SLinus Torvalds 	kfree(bool_pending_values);
99820c19e41SDavi Arnaut 	bool_pending_values = NULL;
9991da177e4SLinus Torvalds 
10000c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
10011da177e4SLinus Torvalds 
10021da177e4SLinus Torvalds 	if (!(page = (char*)get_zeroed_page(GFP_KERNEL)))
10031da177e4SLinus Torvalds 		return -ENOMEM;
10041da177e4SLinus Torvalds 
10051da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
10061da177e4SLinus Torvalds 	if (ret != 0)
10071da177e4SLinus Torvalds 		goto out;
10081da177e4SLinus Torvalds 
10091da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
10101da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
10111da177e4SLinus Torvalds 		if (!dentry) {
10121da177e4SLinus Torvalds 			ret = -ENOMEM;
10131da177e4SLinus Torvalds 			goto err;
10141da177e4SLinus Torvalds 		}
10151da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
10161da177e4SLinus Torvalds 		if (!inode) {
10171da177e4SLinus Torvalds 			ret = -ENOMEM;
10181da177e4SLinus Torvalds 			goto err;
10191da177e4SLinus Torvalds 		}
10201da177e4SLinus Torvalds 
10211da177e4SLinus Torvalds 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
10221da177e4SLinus Torvalds 		if (len < 0) {
10231da177e4SLinus Torvalds 			ret = -EINVAL;
10241da177e4SLinus Torvalds 			goto err;
10251da177e4SLinus Torvalds 		} else if (len >= PAGE_SIZE) {
10261da177e4SLinus Torvalds 			ret = -ENAMETOOLONG;
10271da177e4SLinus Torvalds 			goto err;
10281da177e4SLinus Torvalds 		}
10291da177e4SLinus Torvalds 		isec = (struct inode_security_struct*)inode->i_security;
10301da177e4SLinus Torvalds 		if ((ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid)))
10311da177e4SLinus Torvalds 			goto err;
10321da177e4SLinus Torvalds 		isec->sid = sid;
10331da177e4SLinus Torvalds 		isec->initialized = 1;
10341da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
1035bce34bc0SJames Carter 		inode->i_ino = i|SEL_BOOL_INO_OFFSET;
10361da177e4SLinus Torvalds 		d_add(dentry, inode);
10371da177e4SLinus Torvalds 	}
10381da177e4SLinus Torvalds 	bool_num = num;
10391da177e4SLinus Torvalds 	bool_pending_values = values;
10401da177e4SLinus Torvalds out:
10411da177e4SLinus Torvalds 	free_page((unsigned long)page);
10421da177e4SLinus Torvalds 	if (names) {
10439a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
10441da177e4SLinus Torvalds 			kfree(names[i]);
10451da177e4SLinus Torvalds 		kfree(names);
10461da177e4SLinus Torvalds 	}
10471da177e4SLinus Torvalds 	return ret;
10481da177e4SLinus Torvalds err:
104920c19e41SDavi Arnaut 	kfree(values);
10500c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
10511da177e4SLinus Torvalds 	ret = -ENOMEM;
10521da177e4SLinus Torvalds 	goto out;
10531da177e4SLinus Torvalds }
10541da177e4SLinus Torvalds 
10551da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
10561da177e4SLinus Torvalds 
10571da177e4SLinus Torvalds struct dentry *selinux_null = NULL;
10581da177e4SLinus Torvalds 
10591da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
10601da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
10611da177e4SLinus Torvalds {
10621da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
10631da177e4SLinus Torvalds 	ssize_t length;
10641da177e4SLinus Torvalds 
10651da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
10661da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
10671da177e4SLinus Torvalds }
10681da177e4SLinus Torvalds 
10691da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file * file,
10701da177e4SLinus Torvalds 					     const char __user * buf,
10711da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
10721da177e4SLinus Torvalds 
10731da177e4SLinus Torvalds {
10741da177e4SLinus Torvalds 	char *page;
10751da177e4SLinus Torvalds 	ssize_t ret;
10761da177e4SLinus Torvalds 	int new_value;
10771da177e4SLinus Torvalds 
1078bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
10791da177e4SLinus Torvalds 		ret = -ENOMEM;
10801da177e4SLinus Torvalds 		goto out;
10811da177e4SLinus Torvalds 	}
10821da177e4SLinus Torvalds 
10831da177e4SLinus Torvalds 	if (*ppos != 0) {
10841da177e4SLinus Torvalds 		/* No partial writes. */
10851da177e4SLinus Torvalds 		ret = -EINVAL;
10861da177e4SLinus Torvalds 		goto out;
10871da177e4SLinus Torvalds 	}
10881da177e4SLinus Torvalds 
10891da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
10901da177e4SLinus Torvalds 	if (!page) {
10911da177e4SLinus Torvalds 		ret = -ENOMEM;
10921da177e4SLinus Torvalds 		goto out;
10931da177e4SLinus Torvalds 	}
10941da177e4SLinus Torvalds 
10951da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count)) {
10961da177e4SLinus Torvalds 		ret = -EFAULT;
10971da177e4SLinus Torvalds 		goto out_free;
10981da177e4SLinus Torvalds 	}
10991da177e4SLinus Torvalds 
11001da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1) {
11011da177e4SLinus Torvalds 		ret = -EINVAL;
11021da177e4SLinus Torvalds 		goto out;
11031da177e4SLinus Torvalds 	}
11041da177e4SLinus Torvalds 
11051da177e4SLinus Torvalds 	if (new_value != avc_cache_threshold) {
11061da177e4SLinus Torvalds 		ret = task_has_security(current, SECURITY__SETSECPARAM);
11071da177e4SLinus Torvalds 		if (ret)
11081da177e4SLinus Torvalds 			goto out_free;
11091da177e4SLinus Torvalds 		avc_cache_threshold = new_value;
11101da177e4SLinus Torvalds 	}
11111da177e4SLinus Torvalds 	ret = count;
11121da177e4SLinus Torvalds out_free:
11131da177e4SLinus Torvalds 	free_page((unsigned long)page);
11141da177e4SLinus Torvalds out:
11151da177e4SLinus Torvalds 	return ret;
11161da177e4SLinus Torvalds }
11171da177e4SLinus Torvalds 
11181da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
11191da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
11201da177e4SLinus Torvalds {
11211da177e4SLinus Torvalds 	char *page;
11221da177e4SLinus Torvalds 	ssize_t ret = 0;
11231da177e4SLinus Torvalds 
11241da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
11251da177e4SLinus Torvalds 	if (!page) {
11261da177e4SLinus Torvalds 		ret = -ENOMEM;
11271da177e4SLinus Torvalds 		goto out;
11281da177e4SLinus Torvalds 	}
11291da177e4SLinus Torvalds 	ret = avc_get_hash_stats(page);
11301da177e4SLinus Torvalds 	if (ret >= 0)
11311da177e4SLinus Torvalds 		ret = simple_read_from_buffer(buf, count, ppos, page, ret);
11321da177e4SLinus Torvalds 	free_page((unsigned long)page);
11331da177e4SLinus Torvalds out:
11341da177e4SLinus Torvalds 	return ret;
11351da177e4SLinus Torvalds }
11361da177e4SLinus Torvalds 
11379c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_threshold_ops = {
11381da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
11391da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
11401da177e4SLinus Torvalds };
11411da177e4SLinus Torvalds 
11429c2e08c5SArjan van de Ven static const struct file_operations sel_avc_hash_stats_ops = {
11431da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
11441da177e4SLinus Torvalds };
11451da177e4SLinus Torvalds 
11461da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
11471da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
11481da177e4SLinus Torvalds {
11491da177e4SLinus Torvalds 	int cpu;
11501da177e4SLinus Torvalds 
11511da177e4SLinus Torvalds 	for (cpu = *idx; cpu < NR_CPUS; ++cpu) {
11521da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
11531da177e4SLinus Torvalds 			continue;
11541da177e4SLinus Torvalds 		*idx = cpu + 1;
11551da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
11561da177e4SLinus Torvalds 	}
11571da177e4SLinus Torvalds 	return NULL;
11581da177e4SLinus Torvalds }
11591da177e4SLinus Torvalds 
11601da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
11611da177e4SLinus Torvalds {
11621da177e4SLinus Torvalds 	loff_t n = *pos - 1;
11631da177e4SLinus Torvalds 
11641da177e4SLinus Torvalds 	if (*pos == 0)
11651da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
11661da177e4SLinus Torvalds 
11671da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
11681da177e4SLinus Torvalds }
11691da177e4SLinus Torvalds 
11701da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
11711da177e4SLinus Torvalds {
11721da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
11731da177e4SLinus Torvalds }
11741da177e4SLinus Torvalds 
11751da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
11761da177e4SLinus Torvalds {
11771da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
11781da177e4SLinus Torvalds 
11791da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
11801da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
11811da177e4SLinus Torvalds 			   "frees\n");
11821da177e4SLinus Torvalds 	else
11831da177e4SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", st->lookups,
11841da177e4SLinus Torvalds 			   st->hits, st->misses, st->allocations,
11851da177e4SLinus Torvalds 			   st->reclaims, st->frees);
11861da177e4SLinus Torvalds 	return 0;
11871da177e4SLinus Torvalds }
11881da177e4SLinus Torvalds 
11891da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
11901da177e4SLinus Torvalds { }
11911da177e4SLinus Torvalds 
11921da177e4SLinus Torvalds static struct seq_operations sel_avc_cache_stats_seq_ops = {
11931da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
11941da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
11951da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
11961da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
11971da177e4SLinus Torvalds };
11981da177e4SLinus Torvalds 
11991da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
12001da177e4SLinus Torvalds {
12011da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
12021da177e4SLinus Torvalds }
12031da177e4SLinus Torvalds 
12049c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_stats_ops = {
12051da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
12061da177e4SLinus Torvalds 	.read		= seq_read,
12071da177e4SLinus Torvalds 	.llseek		= seq_lseek,
12081da177e4SLinus Torvalds 	.release	= seq_release,
12091da177e4SLinus Torvalds };
12101da177e4SLinus Torvalds #endif
12111da177e4SLinus Torvalds 
12121da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
12131da177e4SLinus Torvalds {
12141da177e4SLinus Torvalds 	int i, ret = 0;
12151da177e4SLinus Torvalds 	static struct tree_descr files[] = {
12161da177e4SLinus Torvalds 		{ "cache_threshold",
12171da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
12181da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
12191da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
12201da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
12211da177e4SLinus Torvalds #endif
12221da177e4SLinus Torvalds 	};
12231da177e4SLinus Torvalds 
12246e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
12251da177e4SLinus Torvalds 		struct inode *inode;
12261da177e4SLinus Torvalds 		struct dentry *dentry;
12271da177e4SLinus Torvalds 
12281da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
12291da177e4SLinus Torvalds 		if (!dentry) {
12301da177e4SLinus Torvalds 			ret = -ENOMEM;
1231d6aafa65SJames Morris 			goto out;
12321da177e4SLinus Torvalds 		}
12331da177e4SLinus Torvalds 
12341da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
12351da177e4SLinus Torvalds 		if (!inode) {
12361da177e4SLinus Torvalds 			ret = -ENOMEM;
1237d6aafa65SJames Morris 			goto out;
12381da177e4SLinus Torvalds 		}
12391da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
12406174eafcSJames Carter 		inode->i_ino = ++sel_last_ino;
12411da177e4SLinus Torvalds 		d_add(dentry, inode);
12421da177e4SLinus Torvalds 	}
12431da177e4SLinus Torvalds out:
12441da177e4SLinus Torvalds 	return ret;
12451da177e4SLinus Torvalds }
12461da177e4SLinus Torvalds 
1247f0ee2e46SJames Carter static ssize_t sel_read_initcon(struct file * file, char __user *buf,
1248f0ee2e46SJames Carter 				size_t count, loff_t *ppos)
1249f0ee2e46SJames Carter {
1250f0ee2e46SJames Carter 	struct inode *inode;
1251f0ee2e46SJames Carter 	char *con;
1252f0ee2e46SJames Carter 	u32 sid, len;
1253f0ee2e46SJames Carter 	ssize_t ret;
1254f0ee2e46SJames Carter 
1255f0ee2e46SJames Carter 	inode = file->f_path.dentry->d_inode;
1256f0ee2e46SJames Carter 	sid = inode->i_ino&SEL_INO_MASK;
1257f0ee2e46SJames Carter 	ret = security_sid_to_context(sid, &con, &len);
1258f0ee2e46SJames Carter 	if (ret < 0)
1259f0ee2e46SJames Carter 		return ret;
1260f0ee2e46SJames Carter 
1261f0ee2e46SJames Carter 	ret = simple_read_from_buffer(buf, count, ppos, con, len);
1262f0ee2e46SJames Carter 	kfree(con);
1263f0ee2e46SJames Carter 	return ret;
1264f0ee2e46SJames Carter }
1265f0ee2e46SJames Carter 
1266f0ee2e46SJames Carter static const struct file_operations sel_initcon_ops = {
1267f0ee2e46SJames Carter 	.read		= sel_read_initcon,
1268f0ee2e46SJames Carter };
1269f0ee2e46SJames Carter 
1270f0ee2e46SJames Carter static int sel_make_initcon_files(struct dentry *dir)
1271f0ee2e46SJames Carter {
1272f0ee2e46SJames Carter 	int i, ret = 0;
1273f0ee2e46SJames Carter 
1274f0ee2e46SJames Carter 	for (i = 1; i <= SECINITSID_NUM; i++) {
1275f0ee2e46SJames Carter 		struct inode *inode;
1276f0ee2e46SJames Carter 		struct dentry *dentry;
1277f0ee2e46SJames Carter 		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
1278f0ee2e46SJames Carter 		if (!dentry) {
1279f0ee2e46SJames Carter 			ret = -ENOMEM;
1280f0ee2e46SJames Carter 			goto out;
1281f0ee2e46SJames Carter 		}
1282f0ee2e46SJames Carter 
1283f0ee2e46SJames Carter 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1284f0ee2e46SJames Carter 		if (!inode) {
1285f0ee2e46SJames Carter 			ret = -ENOMEM;
1286f0ee2e46SJames Carter 			goto out;
1287f0ee2e46SJames Carter 		}
1288f0ee2e46SJames Carter 		inode->i_fop = &sel_initcon_ops;
1289f0ee2e46SJames Carter 		inode->i_ino = i|SEL_INITCON_INO_OFFSET;
1290f0ee2e46SJames Carter 		d_add(dentry, inode);
1291f0ee2e46SJames Carter 	}
1292f0ee2e46SJames Carter out:
1293f0ee2e46SJames Carter 	return ret;
1294f0ee2e46SJames Carter }
1295f0ee2e46SJames Carter 
12960dd4ae51SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
12970dd4ae51SChristopher J. PeBenito 			unsigned long *ino)
12981da177e4SLinus Torvalds {
12991da177e4SLinus Torvalds 	int ret = 0;
13001da177e4SLinus Torvalds 	struct inode *inode;
13011da177e4SLinus Torvalds 
1302edb20fb5SJames Morris 	inode = sel_make_inode(dir->i_sb, S_IFDIR | S_IRUGO | S_IXUGO);
13031da177e4SLinus Torvalds 	if (!inode) {
13041da177e4SLinus Torvalds 		ret = -ENOMEM;
13051da177e4SLinus Torvalds 		goto out;
13061da177e4SLinus Torvalds 	}
13071da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
13081da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
13090dd4ae51SChristopher J. PeBenito 	inode->i_ino = ++(*ino);
131040e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
1311d8c76e6fSDave Hansen 	inc_nlink(inode);
13121da177e4SLinus Torvalds 	d_add(dentry, inode);
1313edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1314d8c76e6fSDave Hansen 	inc_nlink(dir);
13151da177e4SLinus Torvalds out:
13161da177e4SLinus Torvalds 	return ret;
13171da177e4SLinus Torvalds }
13181da177e4SLinus Torvalds 
13191da177e4SLinus Torvalds static int sel_fill_super(struct super_block * sb, void * data, int silent)
13201da177e4SLinus Torvalds {
13211da177e4SLinus Torvalds 	int ret;
13221da177e4SLinus Torvalds 	struct dentry *dentry;
1323edb20fb5SJames Morris 	struct inode *inode, *root_inode;
13241da177e4SLinus Torvalds 	struct inode_security_struct *isec;
13251da177e4SLinus Torvalds 
13261da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
13271da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
13281da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1329ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
13301da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
13311da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
13321da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
13331da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
13341da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
13351da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
13361da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
13371da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
13381da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
13391da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
13404e5ab4cbSJames Morris 		[SEL_COMPAT_NET] = {"compat_net", &sel_compat_net_ops, S_IRUGO|S_IWUSR},
13411da177e4SLinus Torvalds 		/* last one */ {""}
13421da177e4SLinus Torvalds 	};
13431da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
13441da177e4SLinus Torvalds 	if (ret)
1345161ce45aSJames Morris 		goto err;
13461da177e4SLinus Torvalds 
1347edb20fb5SJames Morris 	root_inode = sb->s_root->d_inode;
1348edb20fb5SJames Morris 
13491da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, BOOL_DIR_NAME);
1350161ce45aSJames Morris 	if (!dentry) {
1351161ce45aSJames Morris 		ret = -ENOMEM;
1352161ce45aSJames Morris 		goto err;
1353161ce45aSJames Morris 	}
13541da177e4SLinus Torvalds 
13550dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1356cde174a8SJames Morris 	if (ret)
1357161ce45aSJames Morris 		goto err;
1358cde174a8SJames Morris 
13591da177e4SLinus Torvalds 	bool_dir = dentry;
13601da177e4SLinus Torvalds 
13611da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1362161ce45aSJames Morris 	if (!dentry) {
1363161ce45aSJames Morris 		ret = -ENOMEM;
1364161ce45aSJames Morris 		goto err;
1365161ce45aSJames Morris 	}
13661da177e4SLinus Torvalds 
13671da177e4SLinus Torvalds 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1368161ce45aSJames Morris 	if (!inode) {
1369161ce45aSJames Morris 		ret = -ENOMEM;
1370161ce45aSJames Morris 		goto err;
1371161ce45aSJames Morris 	}
13726174eafcSJames Carter 	inode->i_ino = ++sel_last_ino;
13731da177e4SLinus Torvalds 	isec = (struct inode_security_struct*)inode->i_security;
13741da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
13751da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
13761da177e4SLinus Torvalds 	isec->initialized = 1;
13771da177e4SLinus Torvalds 
13781da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
13791da177e4SLinus Torvalds 	d_add(dentry, inode);
13801da177e4SLinus Torvalds 	selinux_null = dentry;
13811da177e4SLinus Torvalds 
13821da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, "avc");
1383161ce45aSJames Morris 	if (!dentry) {
1384161ce45aSJames Morris 		ret = -ENOMEM;
1385161ce45aSJames Morris 		goto err;
1386161ce45aSJames Morris 	}
13871da177e4SLinus Torvalds 
13880dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
13891da177e4SLinus Torvalds 	if (ret)
1390161ce45aSJames Morris 		goto err;
13911da177e4SLinus Torvalds 
13921da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
13931da177e4SLinus Torvalds 	if (ret)
1394161ce45aSJames Morris 		goto err;
1395f0ee2e46SJames Carter 
1396f0ee2e46SJames Carter 	dentry = d_alloc_name(sb->s_root, "initial_contexts");
1397f0ee2e46SJames Carter 	if (!dentry) {
1398f0ee2e46SJames Carter 		ret = -ENOMEM;
1399f0ee2e46SJames Carter 		goto err;
1400f0ee2e46SJames Carter 	}
1401f0ee2e46SJames Carter 
14020dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1403f0ee2e46SJames Carter 	if (ret)
1404f0ee2e46SJames Carter 		goto err;
1405f0ee2e46SJames Carter 
1406f0ee2e46SJames Carter 	ret = sel_make_initcon_files(dentry);
1407f0ee2e46SJames Carter 	if (ret)
1408f0ee2e46SJames Carter 		goto err;
1409f0ee2e46SJames Carter 
14101da177e4SLinus Torvalds out:
1411161ce45aSJames Morris 	return ret;
1412161ce45aSJames Morris err:
14131da177e4SLinus Torvalds 	printk(KERN_ERR "%s:  failed while creating inodes\n", __FUNCTION__);
1414161ce45aSJames Morris 	goto out;
14151da177e4SLinus Torvalds }
14161da177e4SLinus Torvalds 
1417454e2398SDavid Howells static int sel_get_sb(struct file_system_type *fs_type,
1418454e2398SDavid Howells 		      int flags, const char *dev_name, void *data,
1419454e2398SDavid Howells 		      struct vfsmount *mnt)
14201da177e4SLinus Torvalds {
1421454e2398SDavid Howells 	return get_sb_single(fs_type, flags, data, sel_fill_super, mnt);
14221da177e4SLinus Torvalds }
14231da177e4SLinus Torvalds 
14241da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
14251da177e4SLinus Torvalds 	.name		= "selinuxfs",
14261da177e4SLinus Torvalds 	.get_sb		= sel_get_sb,
14271da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
14281da177e4SLinus Torvalds };
14291da177e4SLinus Torvalds 
14301da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
14311da177e4SLinus Torvalds 
14321da177e4SLinus Torvalds static int __init init_sel_fs(void)
14331da177e4SLinus Torvalds {
14341da177e4SLinus Torvalds 	int err;
14351da177e4SLinus Torvalds 
14361da177e4SLinus Torvalds 	if (!selinux_enabled)
14371da177e4SLinus Torvalds 		return 0;
14381da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
14391da177e4SLinus Torvalds 	if (!err) {
14401da177e4SLinus Torvalds 		selinuxfs_mount = kern_mount(&sel_fs_type);
14411da177e4SLinus Torvalds 		if (IS_ERR(selinuxfs_mount)) {
14421da177e4SLinus Torvalds 			printk(KERN_ERR "selinuxfs:  could not mount!\n");
14431da177e4SLinus Torvalds 			err = PTR_ERR(selinuxfs_mount);
14441da177e4SLinus Torvalds 			selinuxfs_mount = NULL;
14451da177e4SLinus Torvalds 		}
14461da177e4SLinus Torvalds 	}
14471da177e4SLinus Torvalds 	return err;
14481da177e4SLinus Torvalds }
14491da177e4SLinus Torvalds 
14501da177e4SLinus Torvalds __initcall(init_sel_fs);
14511da177e4SLinus Torvalds 
14521da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
14531da177e4SLinus Torvalds void exit_sel_fs(void)
14541da177e4SLinus Torvalds {
14551da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
14561da177e4SLinus Torvalds }
14571da177e4SLinus Torvalds #endif
1458