xref: /openbmc/linux/security/selinux/selinuxfs.c (revision 454e2398)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  * 	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
61da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
71da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
81da177e4SLinus Torvalds  *  	it under the terms of the GNU General Public License as published by
91da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
101da177e4SLinus Torvalds  */
111da177e4SLinus Torvalds 
121da177e4SLinus Torvalds #include <linux/config.h>
131da177e4SLinus Torvalds #include <linux/kernel.h>
141da177e4SLinus Torvalds #include <linux/pagemap.h>
151da177e4SLinus Torvalds #include <linux/slab.h>
161da177e4SLinus Torvalds #include <linux/vmalloc.h>
171da177e4SLinus Torvalds #include <linux/fs.h>
18bb003079SIngo Molnar #include <linux/mutex.h>
191da177e4SLinus Torvalds #include <linux/init.h>
201da177e4SLinus Torvalds #include <linux/string.h>
211da177e4SLinus Torvalds #include <linux/security.h>
221da177e4SLinus Torvalds #include <linux/major.h>
231da177e4SLinus Torvalds #include <linux/seq_file.h>
241da177e4SLinus Torvalds #include <linux/percpu.h>
25af601e46SSteve Grubb #include <linux/audit.h>
261da177e4SLinus Torvalds #include <asm/uaccess.h>
271da177e4SLinus Torvalds #include <asm/semaphore.h>
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
301da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
311da177e4SLinus Torvalds 
321da177e4SLinus Torvalds #include "flask.h"
331da177e4SLinus Torvalds #include "avc.h"
341da177e4SLinus Torvalds #include "avc_ss.h"
351da177e4SLinus Torvalds #include "security.h"
361da177e4SLinus Torvalds #include "objsec.h"
371da177e4SLinus Torvalds #include "conditional.h"
381da177e4SLinus Torvalds 
391da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
401da177e4SLinus Torvalds 
414e5ab4cbSJames Morris #ifdef CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT
424e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 0
434e5ab4cbSJames Morris #else
444e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 1
454e5ab4cbSJames Morris #endif
464e5ab4cbSJames Morris 
474e5ab4cbSJames Morris int selinux_compat_net = SELINUX_COMPAT_NET_VALUE;
484e5ab4cbSJames Morris 
491da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
501da177e4SLinus Torvalds {
511da177e4SLinus Torvalds 	selinux_checkreqprot = simple_strtoul(str,NULL,0) ? 1 : 0;
521da177e4SLinus Torvalds 	return 1;
531da177e4SLinus Torvalds }
541da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
551da177e4SLinus Torvalds 
564e5ab4cbSJames Morris static int __init selinux_compat_net_setup(char *str)
574e5ab4cbSJames Morris {
584e5ab4cbSJames Morris 	selinux_compat_net = simple_strtoul(str,NULL,0) ? 1 : 0;
594e5ab4cbSJames Morris 	return 1;
604e5ab4cbSJames Morris }
614e5ab4cbSJames Morris __setup("selinux_compat_net=", selinux_compat_net_setup);
624e5ab4cbSJames Morris 
631da177e4SLinus Torvalds 
64bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
651da177e4SLinus Torvalds 
661da177e4SLinus Torvalds /* global data for booleans */
671da177e4SLinus Torvalds static struct dentry *bool_dir = NULL;
681da177e4SLinus Torvalds static int bool_num = 0;
691da177e4SLinus Torvalds static int *bool_pending_values = NULL;
701da177e4SLinus Torvalds 
711da177e4SLinus Torvalds extern void selnl_notify_setenforce(int val);
721da177e4SLinus Torvalds 
731da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
741da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
751da177e4SLinus Torvalds 			     u32 perms)
761da177e4SLinus Torvalds {
771da177e4SLinus Torvalds 	struct task_security_struct *tsec;
781da177e4SLinus Torvalds 
791da177e4SLinus Torvalds 	tsec = tsk->security;
801da177e4SLinus Torvalds 	if (!tsec)
811da177e4SLinus Torvalds 		return -EACCES;
821da177e4SLinus Torvalds 
831da177e4SLinus Torvalds 	return avc_has_perm(tsec->sid, SECINITSID_SECURITY,
841da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
851da177e4SLinus Torvalds }
861da177e4SLinus Torvalds 
871da177e4SLinus Torvalds enum sel_inos {
881da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
891da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
901da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
911da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
921da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
931da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
941da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
951da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
961da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
971da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
981da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
991da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
1001da177e4SLinus Torvalds 	SEL_AVC,	/* AVC management directory */
1011da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1021da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1034e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1041da177e4SLinus Torvalds };
1051da177e4SLinus Torvalds 
1061da177e4SLinus Torvalds #define TMPBUFLEN	12
1071da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1081da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1091da177e4SLinus Torvalds {
1101da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1111da177e4SLinus Torvalds 	ssize_t length;
1121da177e4SLinus Torvalds 
1131da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1141da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1151da177e4SLinus Torvalds }
1161da177e4SLinus Torvalds 
1171da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1181da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file * file, const char __user * buf,
1191da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1201da177e4SLinus Torvalds 
1211da177e4SLinus Torvalds {
1221da177e4SLinus Torvalds 	char *page;
1231da177e4SLinus Torvalds 	ssize_t length;
1241da177e4SLinus Torvalds 	int new_value;
1251da177e4SLinus Torvalds 
126bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1271da177e4SLinus Torvalds 		return -ENOMEM;
1281da177e4SLinus Torvalds 	if (*ppos != 0) {
1291da177e4SLinus Torvalds 		/* No partial writes. */
1301da177e4SLinus Torvalds 		return -EINVAL;
1311da177e4SLinus Torvalds 	}
1321da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
1331da177e4SLinus Torvalds 	if (!page)
1341da177e4SLinus Torvalds 		return -ENOMEM;
1351da177e4SLinus Torvalds 	length = -EFAULT;
1361da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1371da177e4SLinus Torvalds 		goto out;
1381da177e4SLinus Torvalds 
1391da177e4SLinus Torvalds 	length = -EINVAL;
1401da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1411da177e4SLinus Torvalds 		goto out;
1421da177e4SLinus Torvalds 
1431da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1441da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1451da177e4SLinus Torvalds 		if (length)
1461da177e4SLinus Torvalds 			goto out;
147af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
148af601e46SSteve Grubb 			"enforcing=%d old_enforcing=%d auid=%u", new_value,
149af601e46SSteve Grubb 			selinux_enforcing,
150af601e46SSteve Grubb 			audit_get_loginuid(current->audit_context));
1511da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1521da177e4SLinus Torvalds 		if (selinux_enforcing)
1531da177e4SLinus Torvalds 			avc_ss_reset(0);
1541da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
1551da177e4SLinus Torvalds 	}
1561da177e4SLinus Torvalds 	length = count;
1571da177e4SLinus Torvalds out:
1581da177e4SLinus Torvalds 	free_page((unsigned long) page);
1591da177e4SLinus Torvalds 	return length;
1601da177e4SLinus Torvalds }
1611da177e4SLinus Torvalds #else
1621da177e4SLinus Torvalds #define sel_write_enforce NULL
1631da177e4SLinus Torvalds #endif
1641da177e4SLinus Torvalds 
1651da177e4SLinus Torvalds static struct file_operations sel_enforce_ops = {
1661da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1671da177e4SLinus Torvalds 	.write		= sel_write_enforce,
1681da177e4SLinus Torvalds };
1691da177e4SLinus Torvalds 
1701da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
1711da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file * file, const char __user * buf,
1721da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1731da177e4SLinus Torvalds 
1741da177e4SLinus Torvalds {
1751da177e4SLinus Torvalds 	char *page;
1761da177e4SLinus Torvalds 	ssize_t length;
1771da177e4SLinus Torvalds 	int new_value;
1781da177e4SLinus Torvalds 	extern int selinux_disable(void);
1791da177e4SLinus Torvalds 
180bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1811da177e4SLinus Torvalds 		return -ENOMEM;
1821da177e4SLinus Torvalds 	if (*ppos != 0) {
1831da177e4SLinus Torvalds 		/* No partial writes. */
1841da177e4SLinus Torvalds 		return -EINVAL;
1851da177e4SLinus Torvalds 	}
1861da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
1871da177e4SLinus Torvalds 	if (!page)
1881da177e4SLinus Torvalds 		return -ENOMEM;
1891da177e4SLinus Torvalds 	length = -EFAULT;
1901da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1911da177e4SLinus Torvalds 		goto out;
1921da177e4SLinus Torvalds 
1931da177e4SLinus Torvalds 	length = -EINVAL;
1941da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1951da177e4SLinus Torvalds 		goto out;
1961da177e4SLinus Torvalds 
1971da177e4SLinus Torvalds 	if (new_value) {
1981da177e4SLinus Torvalds 		length = selinux_disable();
1991da177e4SLinus Torvalds 		if (length < 0)
2001da177e4SLinus Torvalds 			goto out;
201af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
202af601e46SSteve Grubb 			"selinux=0 auid=%u",
203af601e46SSteve Grubb 			audit_get_loginuid(current->audit_context));
2041da177e4SLinus Torvalds 	}
2051da177e4SLinus Torvalds 
2061da177e4SLinus Torvalds 	length = count;
2071da177e4SLinus Torvalds out:
2081da177e4SLinus Torvalds 	free_page((unsigned long) page);
2091da177e4SLinus Torvalds 	return length;
2101da177e4SLinus Torvalds }
2111da177e4SLinus Torvalds #else
2121da177e4SLinus Torvalds #define sel_write_disable NULL
2131da177e4SLinus Torvalds #endif
2141da177e4SLinus Torvalds 
2151da177e4SLinus Torvalds static struct file_operations sel_disable_ops = {
2161da177e4SLinus Torvalds 	.write		= sel_write_disable,
2171da177e4SLinus Torvalds };
2181da177e4SLinus Torvalds 
2191da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
2201da177e4SLinus Torvalds                                    size_t count, loff_t *ppos)
2211da177e4SLinus Torvalds {
2221da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2231da177e4SLinus Torvalds 	ssize_t length;
2241da177e4SLinus Torvalds 
2251da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
2261da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2271da177e4SLinus Torvalds }
2281da177e4SLinus Torvalds 
2291da177e4SLinus Torvalds static struct file_operations sel_policyvers_ops = {
2301da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
2311da177e4SLinus Torvalds };
2321da177e4SLinus Torvalds 
2331da177e4SLinus Torvalds /* declaration for sel_write_load */
2341da177e4SLinus Torvalds static int sel_make_bools(void);
2351da177e4SLinus Torvalds 
2361da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
2371da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
2381da177e4SLinus Torvalds {
2391da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2401da177e4SLinus Torvalds 	ssize_t length;
2411da177e4SLinus Torvalds 
2421da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_mls_enabled);
2431da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2441da177e4SLinus Torvalds }
2451da177e4SLinus Torvalds 
2461da177e4SLinus Torvalds static struct file_operations sel_mls_ops = {
2471da177e4SLinus Torvalds 	.read		= sel_read_mls,
2481da177e4SLinus Torvalds };
2491da177e4SLinus Torvalds 
2501da177e4SLinus Torvalds static ssize_t sel_write_load(struct file * file, const char __user * buf,
2511da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
2521da177e4SLinus Torvalds 
2531da177e4SLinus Torvalds {
2541da177e4SLinus Torvalds 	int ret;
2551da177e4SLinus Torvalds 	ssize_t length;
2561da177e4SLinus Torvalds 	void *data = NULL;
2571da177e4SLinus Torvalds 
258bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
2591da177e4SLinus Torvalds 
2601da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
2611da177e4SLinus Torvalds 	if (length)
2621da177e4SLinus Torvalds 		goto out;
2631da177e4SLinus Torvalds 
2641da177e4SLinus Torvalds 	if (*ppos != 0) {
2651da177e4SLinus Torvalds 		/* No partial writes. */
2661da177e4SLinus Torvalds 		length = -EINVAL;
2671da177e4SLinus Torvalds 		goto out;
2681da177e4SLinus Torvalds 	}
2691da177e4SLinus Torvalds 
270bfd51626SDavi Arnaut 	if ((count > 64 * 1024 * 1024)
2711da177e4SLinus Torvalds 	    || (data = vmalloc(count)) == NULL) {
2721da177e4SLinus Torvalds 		length = -ENOMEM;
2731da177e4SLinus Torvalds 		goto out;
2741da177e4SLinus Torvalds 	}
2751da177e4SLinus Torvalds 
2761da177e4SLinus Torvalds 	length = -EFAULT;
2771da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
2781da177e4SLinus Torvalds 		goto out;
2791da177e4SLinus Torvalds 
2801da177e4SLinus Torvalds 	length = security_load_policy(data, count);
2811da177e4SLinus Torvalds 	if (length)
2821da177e4SLinus Torvalds 		goto out;
2831da177e4SLinus Torvalds 
2841da177e4SLinus Torvalds 	ret = sel_make_bools();
2851da177e4SLinus Torvalds 	if (ret)
2861da177e4SLinus Torvalds 		length = ret;
2871da177e4SLinus Torvalds 	else
2881da177e4SLinus Torvalds 		length = count;
289af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
290af601e46SSteve Grubb 		"policy loaded auid=%u",
291af601e46SSteve Grubb 		audit_get_loginuid(current->audit_context));
2921da177e4SLinus Torvalds out:
293bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
2941da177e4SLinus Torvalds 	vfree(data);
2951da177e4SLinus Torvalds 	return length;
2961da177e4SLinus Torvalds }
2971da177e4SLinus Torvalds 
2981da177e4SLinus Torvalds static struct file_operations sel_load_ops = {
2991da177e4SLinus Torvalds 	.write		= sel_write_load,
3001da177e4SLinus Torvalds };
3011da177e4SLinus Torvalds 
302ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file * file, char *buf, size_t size)
3031da177e4SLinus Torvalds {
304ce9982d0SStephen Smalley 	char *canon;
305ce9982d0SStephen Smalley 	u32 sid, len;
3061da177e4SLinus Torvalds 	ssize_t length;
3071da177e4SLinus Torvalds 
3081da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
3091da177e4SLinus Torvalds 	if (length)
3101da177e4SLinus Torvalds 		return length;
3111da177e4SLinus Torvalds 
312ce9982d0SStephen Smalley 	length = security_context_to_sid(buf, size, &sid);
3131da177e4SLinus Torvalds 	if (length < 0)
314ce9982d0SStephen Smalley 		return length;
3151da177e4SLinus Torvalds 
316ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
317ce9982d0SStephen Smalley 	if (length < 0)
318ce9982d0SStephen Smalley 		return length;
319ce9982d0SStephen Smalley 
320ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
321ce9982d0SStephen Smalley 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
322ce9982d0SStephen Smalley 		       "max\n", __FUNCTION__, len);
323ce9982d0SStephen Smalley 		length = -ERANGE;
324ce9982d0SStephen Smalley 		goto out;
325ce9982d0SStephen Smalley 	}
326ce9982d0SStephen Smalley 
327ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
328ce9982d0SStephen Smalley 	length = len;
3291da177e4SLinus Torvalds out:
330ce9982d0SStephen Smalley 	kfree(canon);
3311da177e4SLinus Torvalds 	return length;
3321da177e4SLinus Torvalds }
3331da177e4SLinus Torvalds 
3341da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
3351da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
3361da177e4SLinus Torvalds {
3371da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3381da177e4SLinus Torvalds 	ssize_t length;
3391da177e4SLinus Torvalds 
3401da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
3411da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3421da177e4SLinus Torvalds }
3431da177e4SLinus Torvalds 
3441da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file * file, const char __user * buf,
3451da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
3461da177e4SLinus Torvalds {
3471da177e4SLinus Torvalds 	char *page;
3481da177e4SLinus Torvalds 	ssize_t length;
3491da177e4SLinus Torvalds 	unsigned int new_value;
3501da177e4SLinus Torvalds 
3511da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
3521da177e4SLinus Torvalds 	if (length)
3531da177e4SLinus Torvalds 		return length;
3541da177e4SLinus Torvalds 
355bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
3561da177e4SLinus Torvalds 		return -ENOMEM;
3571da177e4SLinus Torvalds 	if (*ppos != 0) {
3581da177e4SLinus Torvalds 		/* No partial writes. */
3591da177e4SLinus Torvalds 		return -EINVAL;
3601da177e4SLinus Torvalds 	}
3611da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
3621da177e4SLinus Torvalds 	if (!page)
3631da177e4SLinus Torvalds 		return -ENOMEM;
3641da177e4SLinus Torvalds 	length = -EFAULT;
3651da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
3661da177e4SLinus Torvalds 		goto out;
3671da177e4SLinus Torvalds 
3681da177e4SLinus Torvalds 	length = -EINVAL;
3691da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
3701da177e4SLinus Torvalds 		goto out;
3711da177e4SLinus Torvalds 
3721da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
3731da177e4SLinus Torvalds 	length = count;
3741da177e4SLinus Torvalds out:
3751da177e4SLinus Torvalds 	free_page((unsigned long) page);
3761da177e4SLinus Torvalds 	return length;
3771da177e4SLinus Torvalds }
3781da177e4SLinus Torvalds static struct file_operations sel_checkreqprot_ops = {
3791da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
3801da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
3811da177e4SLinus Torvalds };
3821da177e4SLinus Torvalds 
3834e5ab4cbSJames Morris static ssize_t sel_read_compat_net(struct file *filp, char __user *buf,
3844e5ab4cbSJames Morris 				   size_t count, loff_t *ppos)
3854e5ab4cbSJames Morris {
3864e5ab4cbSJames Morris 	char tmpbuf[TMPBUFLEN];
3874e5ab4cbSJames Morris 	ssize_t length;
3884e5ab4cbSJames Morris 
3894e5ab4cbSJames Morris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_compat_net);
3904e5ab4cbSJames Morris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3914e5ab4cbSJames Morris }
3924e5ab4cbSJames Morris 
3934e5ab4cbSJames Morris static ssize_t sel_write_compat_net(struct file * file, const char __user * buf,
3944e5ab4cbSJames Morris 				    size_t count, loff_t *ppos)
3954e5ab4cbSJames Morris {
3964e5ab4cbSJames Morris 	char *page;
3974e5ab4cbSJames Morris 	ssize_t length;
3984e5ab4cbSJames Morris 	int new_value;
3994e5ab4cbSJames Morris 
4004e5ab4cbSJames Morris 	length = task_has_security(current, SECURITY__LOAD_POLICY);
4014e5ab4cbSJames Morris 	if (length)
4024e5ab4cbSJames Morris 		return length;
4034e5ab4cbSJames Morris 
4044e5ab4cbSJames Morris 	if (count >= PAGE_SIZE)
4054e5ab4cbSJames Morris 		return -ENOMEM;
4064e5ab4cbSJames Morris 	if (*ppos != 0) {
4074e5ab4cbSJames Morris 		/* No partial writes. */
4084e5ab4cbSJames Morris 		return -EINVAL;
4094e5ab4cbSJames Morris 	}
4104e5ab4cbSJames Morris 	page = (char*)get_zeroed_page(GFP_KERNEL);
4114e5ab4cbSJames Morris 	if (!page)
4124e5ab4cbSJames Morris 		return -ENOMEM;
4134e5ab4cbSJames Morris 	length = -EFAULT;
4144e5ab4cbSJames Morris 	if (copy_from_user(page, buf, count))
4154e5ab4cbSJames Morris 		goto out;
4164e5ab4cbSJames Morris 
4174e5ab4cbSJames Morris 	length = -EINVAL;
4184e5ab4cbSJames Morris 	if (sscanf(page, "%d", &new_value) != 1)
4194e5ab4cbSJames Morris 		goto out;
4204e5ab4cbSJames Morris 
4214e5ab4cbSJames Morris 	selinux_compat_net = new_value ? 1 : 0;
4224e5ab4cbSJames Morris 	length = count;
4234e5ab4cbSJames Morris out:
4244e5ab4cbSJames Morris 	free_page((unsigned long) page);
4254e5ab4cbSJames Morris 	return length;
4264e5ab4cbSJames Morris }
4274e5ab4cbSJames Morris static struct file_operations sel_compat_net_ops = {
4284e5ab4cbSJames Morris 	.read		= sel_read_compat_net,
4294e5ab4cbSJames Morris 	.write		= sel_write_compat_net,
4304e5ab4cbSJames Morris };
4314e5ab4cbSJames Morris 
4321da177e4SLinus Torvalds /*
4331da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
4341da177e4SLinus Torvalds  */
4351da177e4SLinus Torvalds static ssize_t sel_write_access(struct file * file, char *buf, size_t size);
4361da177e4SLinus Torvalds static ssize_t sel_write_create(struct file * file, char *buf, size_t size);
4371da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size);
4381da177e4SLinus Torvalds static ssize_t sel_write_user(struct file * file, char *buf, size_t size);
4391da177e4SLinus Torvalds static ssize_t sel_write_member(struct file * file, char *buf, size_t size);
4401da177e4SLinus Torvalds 
4411da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
4421da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
4431da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
4441da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
4451da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
4461da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
447ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
4481da177e4SLinus Torvalds };
4491da177e4SLinus Torvalds 
4501da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
4511da177e4SLinus Torvalds {
4521da177e4SLinus Torvalds 	ino_t ino =  file->f_dentry->d_inode->i_ino;
4531da177e4SLinus Torvalds 	char *data;
4541da177e4SLinus Torvalds 	ssize_t rv;
4551da177e4SLinus Torvalds 
4566e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
4571da177e4SLinus Torvalds 		return -EINVAL;
4581da177e4SLinus Torvalds 
4591da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
4601da177e4SLinus Torvalds 	if (IS_ERR(data))
4611da177e4SLinus Torvalds 		return PTR_ERR(data);
4621da177e4SLinus Torvalds 
4631da177e4SLinus Torvalds 	rv =  write_op[ino](file, data, size);
4641da177e4SLinus Torvalds 	if (rv>0) {
4651da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
4661da177e4SLinus Torvalds 		rv = size;
4671da177e4SLinus Torvalds 	}
4681da177e4SLinus Torvalds 	return rv;
4691da177e4SLinus Torvalds }
4701da177e4SLinus Torvalds 
4711da177e4SLinus Torvalds static struct file_operations transaction_ops = {
4721da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
4731da177e4SLinus Torvalds 	.read		= simple_transaction_read,
4741da177e4SLinus Torvalds 	.release	= simple_transaction_release,
4751da177e4SLinus Torvalds };
4761da177e4SLinus Torvalds 
4771da177e4SLinus Torvalds /*
4781da177e4SLinus Torvalds  * payload - write methods
4791da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
4801da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
4811da177e4SLinus Torvalds  */
4821da177e4SLinus Torvalds 
4831da177e4SLinus Torvalds static ssize_t sel_write_access(struct file * file, char *buf, size_t size)
4841da177e4SLinus Torvalds {
4851da177e4SLinus Torvalds 	char *scon, *tcon;
4861da177e4SLinus Torvalds 	u32 ssid, tsid;
4871da177e4SLinus Torvalds 	u16 tclass;
4881da177e4SLinus Torvalds 	u32 req;
4891da177e4SLinus Torvalds 	struct av_decision avd;
4901da177e4SLinus Torvalds 	ssize_t length;
4911da177e4SLinus Torvalds 
4921da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
4931da177e4SLinus Torvalds 	if (length)
4941da177e4SLinus Torvalds 		return length;
4951da177e4SLinus Torvalds 
4961da177e4SLinus Torvalds 	length = -ENOMEM;
49789d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
4981da177e4SLinus Torvalds 	if (!scon)
4991da177e4SLinus Torvalds 		return length;
5001da177e4SLinus Torvalds 
50189d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
5021da177e4SLinus Torvalds 	if (!tcon)
5031da177e4SLinus Torvalds 		goto out;
5041da177e4SLinus Torvalds 
5051da177e4SLinus Torvalds 	length = -EINVAL;
5061da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4)
5071da177e4SLinus Torvalds 		goto out2;
5081da177e4SLinus Torvalds 
5091da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
5101da177e4SLinus Torvalds 	if (length < 0)
5111da177e4SLinus Torvalds 		goto out2;
5121da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
5131da177e4SLinus Torvalds 	if (length < 0)
5141da177e4SLinus Torvalds 		goto out2;
5151da177e4SLinus Torvalds 
5161da177e4SLinus Torvalds 	length = security_compute_av(ssid, tsid, tclass, req, &avd);
5171da177e4SLinus Torvalds 	if (length < 0)
5181da177e4SLinus Torvalds 		goto out2;
5191da177e4SLinus Torvalds 
5201da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
5211da177e4SLinus Torvalds 			  "%x %x %x %x %u",
5221da177e4SLinus Torvalds 			  avd.allowed, avd.decided,
5231da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
5241da177e4SLinus Torvalds 			  avd.seqno);
5251da177e4SLinus Torvalds out2:
5261da177e4SLinus Torvalds 	kfree(tcon);
5271da177e4SLinus Torvalds out:
5281da177e4SLinus Torvalds 	kfree(scon);
5291da177e4SLinus Torvalds 	return length;
5301da177e4SLinus Torvalds }
5311da177e4SLinus Torvalds 
5321da177e4SLinus Torvalds static ssize_t sel_write_create(struct file * file, char *buf, size_t size)
5331da177e4SLinus Torvalds {
5341da177e4SLinus Torvalds 	char *scon, *tcon;
5351da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
5361da177e4SLinus Torvalds 	u16 tclass;
5371da177e4SLinus Torvalds 	ssize_t length;
5381da177e4SLinus Torvalds 	char *newcon;
5391da177e4SLinus Torvalds 	u32 len;
5401da177e4SLinus Torvalds 
5411da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
5421da177e4SLinus Torvalds 	if (length)
5431da177e4SLinus Torvalds 		return length;
5441da177e4SLinus Torvalds 
5451da177e4SLinus Torvalds 	length = -ENOMEM;
54689d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
5471da177e4SLinus Torvalds 	if (!scon)
5481da177e4SLinus Torvalds 		return length;
5491da177e4SLinus Torvalds 
55089d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
5511da177e4SLinus Torvalds 	if (!tcon)
5521da177e4SLinus Torvalds 		goto out;
5531da177e4SLinus Torvalds 
5541da177e4SLinus Torvalds 	length = -EINVAL;
5551da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
5561da177e4SLinus Torvalds 		goto out2;
5571da177e4SLinus Torvalds 
5581da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
5591da177e4SLinus Torvalds 	if (length < 0)
5601da177e4SLinus Torvalds 		goto out2;
5611da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
5621da177e4SLinus Torvalds 	if (length < 0)
5631da177e4SLinus Torvalds 		goto out2;
5641da177e4SLinus Torvalds 
5651da177e4SLinus Torvalds 	length = security_transition_sid(ssid, tsid, tclass, &newsid);
5661da177e4SLinus Torvalds 	if (length < 0)
5671da177e4SLinus Torvalds 		goto out2;
5681da177e4SLinus Torvalds 
5691da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
5701da177e4SLinus Torvalds 	if (length < 0)
5711da177e4SLinus Torvalds 		goto out2;
5721da177e4SLinus Torvalds 
5731da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
5741da177e4SLinus Torvalds 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
5751da177e4SLinus Torvalds 		       "max\n", __FUNCTION__, len);
5761da177e4SLinus Torvalds 		length = -ERANGE;
5771da177e4SLinus Torvalds 		goto out3;
5781da177e4SLinus Torvalds 	}
5791da177e4SLinus Torvalds 
5801da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
5811da177e4SLinus Torvalds 	length = len;
5821da177e4SLinus Torvalds out3:
5831da177e4SLinus Torvalds 	kfree(newcon);
5841da177e4SLinus Torvalds out2:
5851da177e4SLinus Torvalds 	kfree(tcon);
5861da177e4SLinus Torvalds out:
5871da177e4SLinus Torvalds 	kfree(scon);
5881da177e4SLinus Torvalds 	return length;
5891da177e4SLinus Torvalds }
5901da177e4SLinus Torvalds 
5911da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size)
5921da177e4SLinus Torvalds {
5931da177e4SLinus Torvalds 	char *scon, *tcon;
5941da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
5951da177e4SLinus Torvalds 	u16 tclass;
5961da177e4SLinus Torvalds 	ssize_t length;
5971da177e4SLinus Torvalds 	char *newcon;
5981da177e4SLinus Torvalds 	u32 len;
5991da177e4SLinus Torvalds 
6001da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
6011da177e4SLinus Torvalds 	if (length)
6021da177e4SLinus Torvalds 		return length;
6031da177e4SLinus Torvalds 
6041da177e4SLinus Torvalds 	length = -ENOMEM;
60589d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
6061da177e4SLinus Torvalds 	if (!scon)
6071da177e4SLinus Torvalds 		return length;
6081da177e4SLinus Torvalds 
60989d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
6101da177e4SLinus Torvalds 	if (!tcon)
6111da177e4SLinus Torvalds 		goto out;
6121da177e4SLinus Torvalds 
6131da177e4SLinus Torvalds 	length = -EINVAL;
6141da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
6151da177e4SLinus Torvalds 		goto out2;
6161da177e4SLinus Torvalds 
6171da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
6181da177e4SLinus Torvalds 	if (length < 0)
6191da177e4SLinus Torvalds 		goto out2;
6201da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
6211da177e4SLinus Torvalds 	if (length < 0)
6221da177e4SLinus Torvalds 		goto out2;
6231da177e4SLinus Torvalds 
6241da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
6251da177e4SLinus Torvalds 	if (length < 0)
6261da177e4SLinus Torvalds 		goto out2;
6271da177e4SLinus Torvalds 
6281da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
6291da177e4SLinus Torvalds 	if (length < 0)
6301da177e4SLinus Torvalds 		goto out2;
6311da177e4SLinus Torvalds 
6321da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
6331da177e4SLinus Torvalds 		length = -ERANGE;
6341da177e4SLinus Torvalds 		goto out3;
6351da177e4SLinus Torvalds 	}
6361da177e4SLinus Torvalds 
6371da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
6381da177e4SLinus Torvalds 	length = len;
6391da177e4SLinus Torvalds out3:
6401da177e4SLinus Torvalds 	kfree(newcon);
6411da177e4SLinus Torvalds out2:
6421da177e4SLinus Torvalds 	kfree(tcon);
6431da177e4SLinus Torvalds out:
6441da177e4SLinus Torvalds 	kfree(scon);
6451da177e4SLinus Torvalds 	return length;
6461da177e4SLinus Torvalds }
6471da177e4SLinus Torvalds 
6481da177e4SLinus Torvalds static ssize_t sel_write_user(struct file * file, char *buf, size_t size)
6491da177e4SLinus Torvalds {
6501da177e4SLinus Torvalds 	char *con, *user, *ptr;
6511da177e4SLinus Torvalds 	u32 sid, *sids;
6521da177e4SLinus Torvalds 	ssize_t length;
6531da177e4SLinus Torvalds 	char *newcon;
6541da177e4SLinus Torvalds 	int i, rc;
6551da177e4SLinus Torvalds 	u32 len, nsids;
6561da177e4SLinus Torvalds 
6571da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
6581da177e4SLinus Torvalds 	if (length)
6591da177e4SLinus Torvalds 		return length;
6601da177e4SLinus Torvalds 
6611da177e4SLinus Torvalds 	length = -ENOMEM;
66289d155efSJames Morris 	con = kzalloc(size+1, GFP_KERNEL);
6631da177e4SLinus Torvalds 	if (!con)
6641da177e4SLinus Torvalds 		return length;
6651da177e4SLinus Torvalds 
66689d155efSJames Morris 	user = kzalloc(size+1, GFP_KERNEL);
6671da177e4SLinus Torvalds 	if (!user)
6681da177e4SLinus Torvalds 		goto out;
6691da177e4SLinus Torvalds 
6701da177e4SLinus Torvalds 	length = -EINVAL;
6711da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
6721da177e4SLinus Torvalds 		goto out2;
6731da177e4SLinus Torvalds 
6741da177e4SLinus Torvalds 	length = security_context_to_sid(con, strlen(con)+1, &sid);
6751da177e4SLinus Torvalds 	if (length < 0)
6761da177e4SLinus Torvalds 		goto out2;
6771da177e4SLinus Torvalds 
6781da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
6791da177e4SLinus Torvalds 	if (length < 0)
6801da177e4SLinus Torvalds 		goto out2;
6811da177e4SLinus Torvalds 
6821da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
6831da177e4SLinus Torvalds 	ptr = buf + length;
6841da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
6851da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
6861da177e4SLinus Torvalds 		if (rc) {
6871da177e4SLinus Torvalds 			length = rc;
6881da177e4SLinus Torvalds 			goto out3;
6891da177e4SLinus Torvalds 		}
6901da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
6911da177e4SLinus Torvalds 			kfree(newcon);
6921da177e4SLinus Torvalds 			length = -ERANGE;
6931da177e4SLinus Torvalds 			goto out3;
6941da177e4SLinus Torvalds 		}
6951da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
6961da177e4SLinus Torvalds 		kfree(newcon);
6971da177e4SLinus Torvalds 		ptr += len;
6981da177e4SLinus Torvalds 		length += len;
6991da177e4SLinus Torvalds 	}
7001da177e4SLinus Torvalds out3:
7011da177e4SLinus Torvalds 	kfree(sids);
7021da177e4SLinus Torvalds out2:
7031da177e4SLinus Torvalds 	kfree(user);
7041da177e4SLinus Torvalds out:
7051da177e4SLinus Torvalds 	kfree(con);
7061da177e4SLinus Torvalds 	return length;
7071da177e4SLinus Torvalds }
7081da177e4SLinus Torvalds 
7091da177e4SLinus Torvalds static ssize_t sel_write_member(struct file * file, char *buf, size_t size)
7101da177e4SLinus Torvalds {
7111da177e4SLinus Torvalds 	char *scon, *tcon;
7121da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7131da177e4SLinus Torvalds 	u16 tclass;
7141da177e4SLinus Torvalds 	ssize_t length;
7151da177e4SLinus Torvalds 	char *newcon;
7161da177e4SLinus Torvalds 	u32 len;
7171da177e4SLinus Torvalds 
7181da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
7191da177e4SLinus Torvalds 	if (length)
7201da177e4SLinus Torvalds 		return length;
7211da177e4SLinus Torvalds 
7221da177e4SLinus Torvalds 	length = -ENOMEM;
72389d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
7241da177e4SLinus Torvalds 	if (!scon)
7251da177e4SLinus Torvalds 		return length;
7261da177e4SLinus Torvalds 
72789d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
7281da177e4SLinus Torvalds 	if (!tcon)
7291da177e4SLinus Torvalds 		goto out;
7301da177e4SLinus Torvalds 
7311da177e4SLinus Torvalds 	length = -EINVAL;
7321da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
7331da177e4SLinus Torvalds 		goto out2;
7341da177e4SLinus Torvalds 
7351da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
7361da177e4SLinus Torvalds 	if (length < 0)
7371da177e4SLinus Torvalds 		goto out2;
7381da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
7391da177e4SLinus Torvalds 	if (length < 0)
7401da177e4SLinus Torvalds 		goto out2;
7411da177e4SLinus Torvalds 
7421da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
7431da177e4SLinus Torvalds 	if (length < 0)
7441da177e4SLinus Torvalds 		goto out2;
7451da177e4SLinus Torvalds 
7461da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
7471da177e4SLinus Torvalds 	if (length < 0)
7481da177e4SLinus Torvalds 		goto out2;
7491da177e4SLinus Torvalds 
7501da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
7511da177e4SLinus Torvalds 		printk(KERN_ERR "%s:  context size (%u) exceeds payload "
7521da177e4SLinus Torvalds 		       "max\n", __FUNCTION__, len);
7531da177e4SLinus Torvalds 		length = -ERANGE;
7541da177e4SLinus Torvalds 		goto out3;
7551da177e4SLinus Torvalds 	}
7561da177e4SLinus Torvalds 
7571da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
7581da177e4SLinus Torvalds 	length = len;
7591da177e4SLinus Torvalds out3:
7601da177e4SLinus Torvalds 	kfree(newcon);
7611da177e4SLinus Torvalds out2:
7621da177e4SLinus Torvalds 	kfree(tcon);
7631da177e4SLinus Torvalds out:
7641da177e4SLinus Torvalds 	kfree(scon);
7651da177e4SLinus Torvalds 	return length;
7661da177e4SLinus Torvalds }
7671da177e4SLinus Torvalds 
7681da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
7691da177e4SLinus Torvalds {
7701da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
7711da177e4SLinus Torvalds 
7721da177e4SLinus Torvalds 	if (ret) {
7731da177e4SLinus Torvalds 		ret->i_mode = mode;
7741da177e4SLinus Torvalds 		ret->i_uid = ret->i_gid = 0;
7751da177e4SLinus Torvalds 		ret->i_blksize = PAGE_CACHE_SIZE;
7761da177e4SLinus Torvalds 		ret->i_blocks = 0;
7771da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
7781da177e4SLinus Torvalds 	}
7791da177e4SLinus Torvalds 	return ret;
7801da177e4SLinus Torvalds }
7811da177e4SLinus Torvalds 
7821da177e4SLinus Torvalds #define BOOL_INO_OFFSET 30
7831da177e4SLinus Torvalds 
7841da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
7851da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
7861da177e4SLinus Torvalds {
7871da177e4SLinus Torvalds 	char *page = NULL;
7881da177e4SLinus Torvalds 	ssize_t length;
7891da177e4SLinus Torvalds 	ssize_t ret;
7901da177e4SLinus Torvalds 	int cur_enforcing;
7911da177e4SLinus Torvalds 	struct inode *inode;
7921da177e4SLinus Torvalds 
793bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
7941da177e4SLinus Torvalds 
7951da177e4SLinus Torvalds 	ret = -EFAULT;
7961da177e4SLinus Torvalds 
7971da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
7981da177e4SLinus Torvalds 	if (!filep->f_op)
7991da177e4SLinus Torvalds 		goto out;
8001da177e4SLinus Torvalds 
801bfd51626SDavi Arnaut 	if (count > PAGE_SIZE) {
8021da177e4SLinus Torvalds 		ret = -EINVAL;
8031da177e4SLinus Torvalds 		goto out;
8041da177e4SLinus Torvalds 	}
8051da177e4SLinus Torvalds 	if (!(page = (char*)get_zeroed_page(GFP_KERNEL))) {
8061da177e4SLinus Torvalds 		ret = -ENOMEM;
8071da177e4SLinus Torvalds 		goto out;
8081da177e4SLinus Torvalds 	}
8091da177e4SLinus Torvalds 
8101da177e4SLinus Torvalds 	inode = filep->f_dentry->d_inode;
8111da177e4SLinus Torvalds 	cur_enforcing = security_get_bool_value(inode->i_ino - BOOL_INO_OFFSET);
8121da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
8131da177e4SLinus Torvalds 		ret = cur_enforcing;
8141da177e4SLinus Torvalds 		goto out;
8151da177e4SLinus Torvalds 	}
8161da177e4SLinus Torvalds 
8171da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
8181da177e4SLinus Torvalds 			  bool_pending_values[inode->i_ino - BOOL_INO_OFFSET]);
81968bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
8201da177e4SLinus Torvalds out:
821bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
8221da177e4SLinus Torvalds 	if (page)
8231da177e4SLinus Torvalds 		free_page((unsigned long)page);
8241da177e4SLinus Torvalds 	return ret;
8251da177e4SLinus Torvalds }
8261da177e4SLinus Torvalds 
8271da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
8281da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
8291da177e4SLinus Torvalds {
8301da177e4SLinus Torvalds 	char *page = NULL;
8311da177e4SLinus Torvalds 	ssize_t length = -EFAULT;
8321da177e4SLinus Torvalds 	int new_value;
8331da177e4SLinus Torvalds 	struct inode *inode;
8341da177e4SLinus Torvalds 
835bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
8361da177e4SLinus Torvalds 
8371da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
8381da177e4SLinus Torvalds 	if (length)
8391da177e4SLinus Torvalds 		goto out;
8401da177e4SLinus Torvalds 
8411da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
8421da177e4SLinus Torvalds 	if (!filep->f_op)
8431da177e4SLinus Torvalds 		goto out;
8441da177e4SLinus Torvalds 
845bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
8461da177e4SLinus Torvalds 		length = -ENOMEM;
8471da177e4SLinus Torvalds 		goto out;
8481da177e4SLinus Torvalds 	}
8491da177e4SLinus Torvalds 	if (*ppos != 0) {
8501da177e4SLinus Torvalds 		/* No partial writes. */
8511da177e4SLinus Torvalds 		goto out;
8521da177e4SLinus Torvalds 	}
8531da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
8541da177e4SLinus Torvalds 	if (!page) {
8551da177e4SLinus Torvalds 		length = -ENOMEM;
8561da177e4SLinus Torvalds 		goto out;
8571da177e4SLinus Torvalds 	}
8581da177e4SLinus Torvalds 
8591da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
8601da177e4SLinus Torvalds 		goto out;
8611da177e4SLinus Torvalds 
8621da177e4SLinus Torvalds 	length = -EINVAL;
8631da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
8641da177e4SLinus Torvalds 		goto out;
8651da177e4SLinus Torvalds 
8661da177e4SLinus Torvalds 	if (new_value)
8671da177e4SLinus Torvalds 		new_value = 1;
8681da177e4SLinus Torvalds 
8691da177e4SLinus Torvalds 	inode = filep->f_dentry->d_inode;
8701da177e4SLinus Torvalds 	bool_pending_values[inode->i_ino - BOOL_INO_OFFSET] = new_value;
8711da177e4SLinus Torvalds 	length = count;
8721da177e4SLinus Torvalds 
8731da177e4SLinus Torvalds out:
874bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
8751da177e4SLinus Torvalds 	if (page)
8761da177e4SLinus Torvalds 		free_page((unsigned long) page);
8771da177e4SLinus Torvalds 	return length;
8781da177e4SLinus Torvalds }
8791da177e4SLinus Torvalds 
8801da177e4SLinus Torvalds static struct file_operations sel_bool_ops = {
8811da177e4SLinus Torvalds 	.read           = sel_read_bool,
8821da177e4SLinus Torvalds 	.write          = sel_write_bool,
8831da177e4SLinus Torvalds };
8841da177e4SLinus Torvalds 
8851da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
8861da177e4SLinus Torvalds 				      const char __user *buf,
8871da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
8881da177e4SLinus Torvalds {
8891da177e4SLinus Torvalds 	char *page = NULL;
8901da177e4SLinus Torvalds 	ssize_t length = -EFAULT;
8911da177e4SLinus Torvalds 	int new_value;
8921da177e4SLinus Torvalds 
893bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
8941da177e4SLinus Torvalds 
8951da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
8961da177e4SLinus Torvalds 	if (length)
8971da177e4SLinus Torvalds 		goto out;
8981da177e4SLinus Torvalds 
8991da177e4SLinus Torvalds 	/* check to see if this file has been deleted */
9001da177e4SLinus Torvalds 	if (!filep->f_op)
9011da177e4SLinus Torvalds 		goto out;
9021da177e4SLinus Torvalds 
903bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
9041da177e4SLinus Torvalds 		length = -ENOMEM;
9051da177e4SLinus Torvalds 		goto out;
9061da177e4SLinus Torvalds 	}
9071da177e4SLinus Torvalds 	if (*ppos != 0) {
9081da177e4SLinus Torvalds 		/* No partial writes. */
9091da177e4SLinus Torvalds 		goto out;
9101da177e4SLinus Torvalds 	}
9111da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
9121da177e4SLinus Torvalds 	if (!page) {
9131da177e4SLinus Torvalds 		length = -ENOMEM;
9141da177e4SLinus Torvalds 		goto out;
9151da177e4SLinus Torvalds 	}
9161da177e4SLinus Torvalds 
9171da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
9181da177e4SLinus Torvalds 		goto out;
9191da177e4SLinus Torvalds 
9201da177e4SLinus Torvalds 	length = -EINVAL;
9211da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
9221da177e4SLinus Torvalds 		goto out;
9231da177e4SLinus Torvalds 
92420c19e41SDavi Arnaut 	if (new_value && bool_pending_values) {
9251da177e4SLinus Torvalds 		security_set_bools(bool_num, bool_pending_values);
9261da177e4SLinus Torvalds 	}
9271da177e4SLinus Torvalds 
9281da177e4SLinus Torvalds 	length = count;
9291da177e4SLinus Torvalds 
9301da177e4SLinus Torvalds out:
931bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
9321da177e4SLinus Torvalds 	if (page)
9331da177e4SLinus Torvalds 		free_page((unsigned long) page);
9341da177e4SLinus Torvalds 	return length;
9351da177e4SLinus Torvalds }
9361da177e4SLinus Torvalds 
9371da177e4SLinus Torvalds static struct file_operations sel_commit_bools_ops = {
9381da177e4SLinus Torvalds 	.write          = sel_commit_bools_write,
9391da177e4SLinus Torvalds };
9401da177e4SLinus Torvalds 
9411da177e4SLinus Torvalds /* delete booleans - partial revoke() from
9421da177e4SLinus Torvalds  * fs/proc/generic.c proc_kill_inodes */
9431da177e4SLinus Torvalds static void sel_remove_bools(struct dentry *de)
9441da177e4SLinus Torvalds {
9451da177e4SLinus Torvalds 	struct list_head *p, *node;
9461da177e4SLinus Torvalds 	struct super_block *sb = de->d_sb;
9471da177e4SLinus Torvalds 
9481da177e4SLinus Torvalds 	spin_lock(&dcache_lock);
9491da177e4SLinus Torvalds 	node = de->d_subdirs.next;
9501da177e4SLinus Torvalds 	while (node != &de->d_subdirs) {
9515160ee6fSEric Dumazet 		struct dentry *d = list_entry(node, struct dentry, d_u.d_child);
9521da177e4SLinus Torvalds 		list_del_init(node);
9531da177e4SLinus Torvalds 
9541da177e4SLinus Torvalds 		if (d->d_inode) {
9551da177e4SLinus Torvalds 			d = dget_locked(d);
9561da177e4SLinus Torvalds 			spin_unlock(&dcache_lock);
9571da177e4SLinus Torvalds 			d_delete(d);
9581da177e4SLinus Torvalds 			simple_unlink(de->d_inode, d);
9591da177e4SLinus Torvalds 			dput(d);
9601da177e4SLinus Torvalds 			spin_lock(&dcache_lock);
9611da177e4SLinus Torvalds 		}
9621da177e4SLinus Torvalds 		node = de->d_subdirs.next;
9631da177e4SLinus Torvalds 	}
9641da177e4SLinus Torvalds 
9651da177e4SLinus Torvalds 	spin_unlock(&dcache_lock);
9661da177e4SLinus Torvalds 
9671da177e4SLinus Torvalds 	file_list_lock();
9681da177e4SLinus Torvalds 	list_for_each(p, &sb->s_files) {
9692f512016SEric Dumazet 		struct file * filp = list_entry(p, struct file, f_u.fu_list);
9701da177e4SLinus Torvalds 		struct dentry * dentry = filp->f_dentry;
9711da177e4SLinus Torvalds 
9721da177e4SLinus Torvalds 		if (dentry->d_parent != de) {
9731da177e4SLinus Torvalds 			continue;
9741da177e4SLinus Torvalds 		}
9751da177e4SLinus Torvalds 		filp->f_op = NULL;
9761da177e4SLinus Torvalds 	}
9771da177e4SLinus Torvalds 	file_list_unlock();
9781da177e4SLinus Torvalds }
9791da177e4SLinus Torvalds 
9801da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
9811da177e4SLinus Torvalds 
9821da177e4SLinus Torvalds static int sel_make_bools(void)
9831da177e4SLinus Torvalds {
9841da177e4SLinus Torvalds 	int i, ret = 0;
9851da177e4SLinus Torvalds 	ssize_t len;
9861da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
9871da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
9881da177e4SLinus Torvalds 	struct inode *inode = NULL;
9891da177e4SLinus Torvalds 	struct inode_security_struct *isec;
9901da177e4SLinus Torvalds 	char **names = NULL, *page;
9911da177e4SLinus Torvalds 	int num;
9921da177e4SLinus Torvalds 	int *values = NULL;
9931da177e4SLinus Torvalds 	u32 sid;
9941da177e4SLinus Torvalds 
9951da177e4SLinus Torvalds 	/* remove any existing files */
9961da177e4SLinus Torvalds 	kfree(bool_pending_values);
99720c19e41SDavi Arnaut 	bool_pending_values = NULL;
9981da177e4SLinus Torvalds 
9991da177e4SLinus Torvalds 	sel_remove_bools(dir);
10001da177e4SLinus Torvalds 
10011da177e4SLinus Torvalds 	if (!(page = (char*)get_zeroed_page(GFP_KERNEL)))
10021da177e4SLinus Torvalds 		return -ENOMEM;
10031da177e4SLinus Torvalds 
10041da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
10051da177e4SLinus Torvalds 	if (ret != 0)
10061da177e4SLinus Torvalds 		goto out;
10071da177e4SLinus Torvalds 
10081da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
10091da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
10101da177e4SLinus Torvalds 		if (!dentry) {
10111da177e4SLinus Torvalds 			ret = -ENOMEM;
10121da177e4SLinus Torvalds 			goto err;
10131da177e4SLinus Torvalds 		}
10141da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
10151da177e4SLinus Torvalds 		if (!inode) {
10161da177e4SLinus Torvalds 			ret = -ENOMEM;
10171da177e4SLinus Torvalds 			goto err;
10181da177e4SLinus Torvalds 		}
10191da177e4SLinus Torvalds 
10201da177e4SLinus Torvalds 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
10211da177e4SLinus Torvalds 		if (len < 0) {
10221da177e4SLinus Torvalds 			ret = -EINVAL;
10231da177e4SLinus Torvalds 			goto err;
10241da177e4SLinus Torvalds 		} else if (len >= PAGE_SIZE) {
10251da177e4SLinus Torvalds 			ret = -ENAMETOOLONG;
10261da177e4SLinus Torvalds 			goto err;
10271da177e4SLinus Torvalds 		}
10281da177e4SLinus Torvalds 		isec = (struct inode_security_struct*)inode->i_security;
10291da177e4SLinus Torvalds 		if ((ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid)))
10301da177e4SLinus Torvalds 			goto err;
10311da177e4SLinus Torvalds 		isec->sid = sid;
10321da177e4SLinus Torvalds 		isec->initialized = 1;
10331da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
10341da177e4SLinus Torvalds 		inode->i_ino = i + BOOL_INO_OFFSET;
10351da177e4SLinus Torvalds 		d_add(dentry, inode);
10361da177e4SLinus Torvalds 	}
10371da177e4SLinus Torvalds 	bool_num = num;
10381da177e4SLinus Torvalds 	bool_pending_values = values;
10391da177e4SLinus Torvalds out:
10401da177e4SLinus Torvalds 	free_page((unsigned long)page);
10411da177e4SLinus Torvalds 	if (names) {
10429a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
10431da177e4SLinus Torvalds 			kfree(names[i]);
10441da177e4SLinus Torvalds 		kfree(names);
10451da177e4SLinus Torvalds 	}
10461da177e4SLinus Torvalds 	return ret;
10471da177e4SLinus Torvalds err:
104820c19e41SDavi Arnaut 	kfree(values);
1049253a8b1dSJames Morris 	sel_remove_bools(dir);
10501da177e4SLinus Torvalds 	ret = -ENOMEM;
10511da177e4SLinus Torvalds 	goto out;
10521da177e4SLinus Torvalds }
10531da177e4SLinus Torvalds 
10541da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
10551da177e4SLinus Torvalds 
10561da177e4SLinus Torvalds struct dentry *selinux_null = NULL;
10571da177e4SLinus Torvalds 
10581da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
10591da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
10601da177e4SLinus Torvalds {
10611da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
10621da177e4SLinus Torvalds 	ssize_t length;
10631da177e4SLinus Torvalds 
10641da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
10651da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
10661da177e4SLinus Torvalds }
10671da177e4SLinus Torvalds 
10681da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file * file,
10691da177e4SLinus Torvalds 					     const char __user * buf,
10701da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
10711da177e4SLinus Torvalds 
10721da177e4SLinus Torvalds {
10731da177e4SLinus Torvalds 	char *page;
10741da177e4SLinus Torvalds 	ssize_t ret;
10751da177e4SLinus Torvalds 	int new_value;
10761da177e4SLinus Torvalds 
1077bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
10781da177e4SLinus Torvalds 		ret = -ENOMEM;
10791da177e4SLinus Torvalds 		goto out;
10801da177e4SLinus Torvalds 	}
10811da177e4SLinus Torvalds 
10821da177e4SLinus Torvalds 	if (*ppos != 0) {
10831da177e4SLinus Torvalds 		/* No partial writes. */
10841da177e4SLinus Torvalds 		ret = -EINVAL;
10851da177e4SLinus Torvalds 		goto out;
10861da177e4SLinus Torvalds 	}
10871da177e4SLinus Torvalds 
10881da177e4SLinus Torvalds 	page = (char*)get_zeroed_page(GFP_KERNEL);
10891da177e4SLinus Torvalds 	if (!page) {
10901da177e4SLinus Torvalds 		ret = -ENOMEM;
10911da177e4SLinus Torvalds 		goto out;
10921da177e4SLinus Torvalds 	}
10931da177e4SLinus Torvalds 
10941da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count)) {
10951da177e4SLinus Torvalds 		ret = -EFAULT;
10961da177e4SLinus Torvalds 		goto out_free;
10971da177e4SLinus Torvalds 	}
10981da177e4SLinus Torvalds 
10991da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1) {
11001da177e4SLinus Torvalds 		ret = -EINVAL;
11011da177e4SLinus Torvalds 		goto out;
11021da177e4SLinus Torvalds 	}
11031da177e4SLinus Torvalds 
11041da177e4SLinus Torvalds 	if (new_value != avc_cache_threshold) {
11051da177e4SLinus Torvalds 		ret = task_has_security(current, SECURITY__SETSECPARAM);
11061da177e4SLinus Torvalds 		if (ret)
11071da177e4SLinus Torvalds 			goto out_free;
11081da177e4SLinus Torvalds 		avc_cache_threshold = new_value;
11091da177e4SLinus Torvalds 	}
11101da177e4SLinus Torvalds 	ret = count;
11111da177e4SLinus Torvalds out_free:
11121da177e4SLinus Torvalds 	free_page((unsigned long)page);
11131da177e4SLinus Torvalds out:
11141da177e4SLinus Torvalds 	return ret;
11151da177e4SLinus Torvalds }
11161da177e4SLinus Torvalds 
11171da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
11181da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
11191da177e4SLinus Torvalds {
11201da177e4SLinus Torvalds 	char *page;
11211da177e4SLinus Torvalds 	ssize_t ret = 0;
11221da177e4SLinus Torvalds 
11231da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
11241da177e4SLinus Torvalds 	if (!page) {
11251da177e4SLinus Torvalds 		ret = -ENOMEM;
11261da177e4SLinus Torvalds 		goto out;
11271da177e4SLinus Torvalds 	}
11281da177e4SLinus Torvalds 	ret = avc_get_hash_stats(page);
11291da177e4SLinus Torvalds 	if (ret >= 0)
11301da177e4SLinus Torvalds 		ret = simple_read_from_buffer(buf, count, ppos, page, ret);
11311da177e4SLinus Torvalds 	free_page((unsigned long)page);
11321da177e4SLinus Torvalds out:
11331da177e4SLinus Torvalds 	return ret;
11341da177e4SLinus Torvalds }
11351da177e4SLinus Torvalds 
11361da177e4SLinus Torvalds static struct file_operations sel_avc_cache_threshold_ops = {
11371da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
11381da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
11391da177e4SLinus Torvalds };
11401da177e4SLinus Torvalds 
11411da177e4SLinus Torvalds static struct file_operations sel_avc_hash_stats_ops = {
11421da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
11431da177e4SLinus Torvalds };
11441da177e4SLinus Torvalds 
11451da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
11461da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
11471da177e4SLinus Torvalds {
11481da177e4SLinus Torvalds 	int cpu;
11491da177e4SLinus Torvalds 
11501da177e4SLinus Torvalds 	for (cpu = *idx; cpu < NR_CPUS; ++cpu) {
11511da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
11521da177e4SLinus Torvalds 			continue;
11531da177e4SLinus Torvalds 		*idx = cpu + 1;
11541da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
11551da177e4SLinus Torvalds 	}
11561da177e4SLinus Torvalds 	return NULL;
11571da177e4SLinus Torvalds }
11581da177e4SLinus Torvalds 
11591da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
11601da177e4SLinus Torvalds {
11611da177e4SLinus Torvalds 	loff_t n = *pos - 1;
11621da177e4SLinus Torvalds 
11631da177e4SLinus Torvalds 	if (*pos == 0)
11641da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
11651da177e4SLinus Torvalds 
11661da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
11671da177e4SLinus Torvalds }
11681da177e4SLinus Torvalds 
11691da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
11701da177e4SLinus Torvalds {
11711da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
11721da177e4SLinus Torvalds }
11731da177e4SLinus Torvalds 
11741da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
11751da177e4SLinus Torvalds {
11761da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
11771da177e4SLinus Torvalds 
11781da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
11791da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
11801da177e4SLinus Torvalds 			   "frees\n");
11811da177e4SLinus Torvalds 	else
11821da177e4SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", st->lookups,
11831da177e4SLinus Torvalds 			   st->hits, st->misses, st->allocations,
11841da177e4SLinus Torvalds 			   st->reclaims, st->frees);
11851da177e4SLinus Torvalds 	return 0;
11861da177e4SLinus Torvalds }
11871da177e4SLinus Torvalds 
11881da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
11891da177e4SLinus Torvalds { }
11901da177e4SLinus Torvalds 
11911da177e4SLinus Torvalds static struct seq_operations sel_avc_cache_stats_seq_ops = {
11921da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
11931da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
11941da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
11951da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
11961da177e4SLinus Torvalds };
11971da177e4SLinus Torvalds 
11981da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
11991da177e4SLinus Torvalds {
12001da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
12011da177e4SLinus Torvalds }
12021da177e4SLinus Torvalds 
12031da177e4SLinus Torvalds static struct file_operations sel_avc_cache_stats_ops = {
12041da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
12051da177e4SLinus Torvalds 	.read		= seq_read,
12061da177e4SLinus Torvalds 	.llseek		= seq_lseek,
12071da177e4SLinus Torvalds 	.release	= seq_release,
12081da177e4SLinus Torvalds };
12091da177e4SLinus Torvalds #endif
12101da177e4SLinus Torvalds 
12111da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
12121da177e4SLinus Torvalds {
12131da177e4SLinus Torvalds 	int i, ret = 0;
12141da177e4SLinus Torvalds 	static struct tree_descr files[] = {
12151da177e4SLinus Torvalds 		{ "cache_threshold",
12161da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
12171da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
12181da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
12191da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
12201da177e4SLinus Torvalds #endif
12211da177e4SLinus Torvalds 	};
12221da177e4SLinus Torvalds 
12236e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
12241da177e4SLinus Torvalds 		struct inode *inode;
12251da177e4SLinus Torvalds 		struct dentry *dentry;
12261da177e4SLinus Torvalds 
12271da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
12281da177e4SLinus Torvalds 		if (!dentry) {
12291da177e4SLinus Torvalds 			ret = -ENOMEM;
1230d6aafa65SJames Morris 			goto out;
12311da177e4SLinus Torvalds 		}
12321da177e4SLinus Torvalds 
12331da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
12341da177e4SLinus Torvalds 		if (!inode) {
12351da177e4SLinus Torvalds 			ret = -ENOMEM;
1236d6aafa65SJames Morris 			goto out;
12371da177e4SLinus Torvalds 		}
12381da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
12391da177e4SLinus Torvalds 		d_add(dentry, inode);
12401da177e4SLinus Torvalds 	}
12411da177e4SLinus Torvalds out:
12421da177e4SLinus Torvalds 	return ret;
12431da177e4SLinus Torvalds }
12441da177e4SLinus Torvalds 
1245edb20fb5SJames Morris static int sel_make_dir(struct inode *dir, struct dentry *dentry)
12461da177e4SLinus Torvalds {
12471da177e4SLinus Torvalds 	int ret = 0;
12481da177e4SLinus Torvalds 	struct inode *inode;
12491da177e4SLinus Torvalds 
1250edb20fb5SJames Morris 	inode = sel_make_inode(dir->i_sb, S_IFDIR | S_IRUGO | S_IXUGO);
12511da177e4SLinus Torvalds 	if (!inode) {
12521da177e4SLinus Torvalds 		ret = -ENOMEM;
12531da177e4SLinus Torvalds 		goto out;
12541da177e4SLinus Torvalds 	}
12551da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
12561da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
125740e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
125840e906f8SJames Morris 	inode->i_nlink++;
12591da177e4SLinus Torvalds 	d_add(dentry, inode);
1260edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1261edb20fb5SJames Morris 	dir->i_nlink++;
12621da177e4SLinus Torvalds out:
12631da177e4SLinus Torvalds 	return ret;
12641da177e4SLinus Torvalds }
12651da177e4SLinus Torvalds 
12661da177e4SLinus Torvalds static int sel_fill_super(struct super_block * sb, void * data, int silent)
12671da177e4SLinus Torvalds {
12681da177e4SLinus Torvalds 	int ret;
12691da177e4SLinus Torvalds 	struct dentry *dentry;
1270edb20fb5SJames Morris 	struct inode *inode, *root_inode;
12711da177e4SLinus Torvalds 	struct inode_security_struct *isec;
12721da177e4SLinus Torvalds 
12731da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
12741da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
12751da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1276ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
12771da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
12781da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
12791da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
12801da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
12811da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
12821da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
12831da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
12841da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
12851da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
12861da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
12874e5ab4cbSJames Morris 		[SEL_COMPAT_NET] = {"compat_net", &sel_compat_net_ops, S_IRUGO|S_IWUSR},
12881da177e4SLinus Torvalds 		/* last one */ {""}
12891da177e4SLinus Torvalds 	};
12901da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
12911da177e4SLinus Torvalds 	if (ret)
1292161ce45aSJames Morris 		goto err;
12931da177e4SLinus Torvalds 
1294edb20fb5SJames Morris 	root_inode = sb->s_root->d_inode;
1295edb20fb5SJames Morris 
12961da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, BOOL_DIR_NAME);
1297161ce45aSJames Morris 	if (!dentry) {
1298161ce45aSJames Morris 		ret = -ENOMEM;
1299161ce45aSJames Morris 		goto err;
1300161ce45aSJames Morris 	}
13011da177e4SLinus Torvalds 
1302edb20fb5SJames Morris 	ret = sel_make_dir(root_inode, dentry);
1303cde174a8SJames Morris 	if (ret)
1304161ce45aSJames Morris 		goto err;
1305cde174a8SJames Morris 
13061da177e4SLinus Torvalds 	bool_dir = dentry;
13071da177e4SLinus Torvalds 
13081da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1309161ce45aSJames Morris 	if (!dentry) {
1310161ce45aSJames Morris 		ret = -ENOMEM;
1311161ce45aSJames Morris 		goto err;
1312161ce45aSJames Morris 	}
13131da177e4SLinus Torvalds 
13141da177e4SLinus Torvalds 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1315161ce45aSJames Morris 	if (!inode) {
1316161ce45aSJames Morris 		ret = -ENOMEM;
1317161ce45aSJames Morris 		goto err;
1318161ce45aSJames Morris 	}
13191da177e4SLinus Torvalds 	isec = (struct inode_security_struct*)inode->i_security;
13201da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
13211da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
13221da177e4SLinus Torvalds 	isec->initialized = 1;
13231da177e4SLinus Torvalds 
13241da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
13251da177e4SLinus Torvalds 	d_add(dentry, inode);
13261da177e4SLinus Torvalds 	selinux_null = dentry;
13271da177e4SLinus Torvalds 
13281da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, "avc");
1329161ce45aSJames Morris 	if (!dentry) {
1330161ce45aSJames Morris 		ret = -ENOMEM;
1331161ce45aSJames Morris 		goto err;
1332161ce45aSJames Morris 	}
13331da177e4SLinus Torvalds 
1334edb20fb5SJames Morris 	ret = sel_make_dir(root_inode, dentry);
13351da177e4SLinus Torvalds 	if (ret)
1336161ce45aSJames Morris 		goto err;
13371da177e4SLinus Torvalds 
13381da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
13391da177e4SLinus Torvalds 	if (ret)
1340161ce45aSJames Morris 		goto err;
13411da177e4SLinus Torvalds out:
1342161ce45aSJames Morris 	return ret;
1343161ce45aSJames Morris err:
13441da177e4SLinus Torvalds 	printk(KERN_ERR "%s:  failed while creating inodes\n", __FUNCTION__);
1345161ce45aSJames Morris 	goto out;
13461da177e4SLinus Torvalds }
13471da177e4SLinus Torvalds 
1348454e2398SDavid Howells static int sel_get_sb(struct file_system_type *fs_type,
1349454e2398SDavid Howells 		      int flags, const char *dev_name, void *data,
1350454e2398SDavid Howells 		      struct vfsmount *mnt)
13511da177e4SLinus Torvalds {
1352454e2398SDavid Howells 	return get_sb_single(fs_type, flags, data, sel_fill_super, mnt);
13531da177e4SLinus Torvalds }
13541da177e4SLinus Torvalds 
13551da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
13561da177e4SLinus Torvalds 	.name		= "selinuxfs",
13571da177e4SLinus Torvalds 	.get_sb		= sel_get_sb,
13581da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
13591da177e4SLinus Torvalds };
13601da177e4SLinus Torvalds 
13611da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
13621da177e4SLinus Torvalds 
13631da177e4SLinus Torvalds static int __init init_sel_fs(void)
13641da177e4SLinus Torvalds {
13651da177e4SLinus Torvalds 	int err;
13661da177e4SLinus Torvalds 
13671da177e4SLinus Torvalds 	if (!selinux_enabled)
13681da177e4SLinus Torvalds 		return 0;
13691da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
13701da177e4SLinus Torvalds 	if (!err) {
13711da177e4SLinus Torvalds 		selinuxfs_mount = kern_mount(&sel_fs_type);
13721da177e4SLinus Torvalds 		if (IS_ERR(selinuxfs_mount)) {
13731da177e4SLinus Torvalds 			printk(KERN_ERR "selinuxfs:  could not mount!\n");
13741da177e4SLinus Torvalds 			err = PTR_ERR(selinuxfs_mount);
13751da177e4SLinus Torvalds 			selinuxfs_mount = NULL;
13761da177e4SLinus Torvalds 		}
13771da177e4SLinus Torvalds 	}
13781da177e4SLinus Torvalds 	return err;
13791da177e4SLinus Torvalds }
13801da177e4SLinus Torvalds 
13811da177e4SLinus Torvalds __initcall(init_sel_fs);
13821da177e4SLinus Torvalds 
13831da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
13841da177e4SLinus Torvalds void exit_sel_fs(void)
13851da177e4SLinus Torvalds {
13861da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
13871da177e4SLinus Torvalds }
13881da177e4SLinus Torvalds #endif
1389