xref: /openbmc/linux/security/selinux/selinuxfs.c (revision ad3fa08c)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  *	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
582c21bfaSPaul Moore  *  Updated: Hewlett-Packard <paul@paul-moore.com>
63bb56b25SPaul Moore  *
73bb56b25SPaul Moore  *	Added support for the policy capability bitmap
83bb56b25SPaul Moore  *
93bb56b25SPaul Moore  * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
101da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
111da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
121da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
131da177e4SLinus Torvalds  *	it under the terms of the GNU General Public License as published by
141da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
151da177e4SLinus Torvalds  */
161da177e4SLinus Torvalds 
171da177e4SLinus Torvalds #include <linux/kernel.h>
181da177e4SLinus Torvalds #include <linux/pagemap.h>
191da177e4SLinus Torvalds #include <linux/slab.h>
201da177e4SLinus Torvalds #include <linux/vmalloc.h>
211da177e4SLinus Torvalds #include <linux/fs.h>
22bb003079SIngo Molnar #include <linux/mutex.h>
231da177e4SLinus Torvalds #include <linux/init.h>
241da177e4SLinus Torvalds #include <linux/string.h>
251da177e4SLinus Torvalds #include <linux/security.h>
261da177e4SLinus Torvalds #include <linux/major.h>
271da177e4SLinus Torvalds #include <linux/seq_file.h>
281da177e4SLinus Torvalds #include <linux/percpu.h>
29af601e46SSteve Grubb #include <linux/audit.h>
30f5269710SEric Paris #include <linux/uaccess.h>
317a627e3bSGreg Kroah-Hartman #include <linux/kobject.h>
320f7e4c33SKohei Kaigai #include <linux/ctype.h>
331da177e4SLinus Torvalds 
341da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
351da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
361da177e4SLinus Torvalds 
371da177e4SLinus Torvalds #include "flask.h"
381da177e4SLinus Torvalds #include "avc.h"
391da177e4SLinus Torvalds #include "avc_ss.h"
401da177e4SLinus Torvalds #include "security.h"
411da177e4SLinus Torvalds #include "objsec.h"
421da177e4SLinus Torvalds #include "conditional.h"
431da177e4SLinus Torvalds 
443bb56b25SPaul Moore /* Policy capability filenames */
453bb56b25SPaul Moore static char *policycap_names[] = {
46b0c636b9SEric Paris 	"network_peer_controls",
47b0c636b9SEric Paris 	"open_perms"
483bb56b25SPaul Moore };
493bb56b25SPaul Moore 
501da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
511da177e4SLinus Torvalds 
521da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
531da177e4SLinus Torvalds {
54f5269710SEric Paris 	unsigned long checkreqprot;
55f5269710SEric Paris 	if (!strict_strtoul(str, 0, &checkreqprot))
56f5269710SEric Paris 		selinux_checkreqprot = checkreqprot ? 1 : 0;
571da177e4SLinus Torvalds 	return 1;
581da177e4SLinus Torvalds }
591da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
601da177e4SLinus Torvalds 
61bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
621da177e4SLinus Torvalds 
631da177e4SLinus Torvalds /* global data for booleans */
641872981bSEric Paris static struct dentry *bool_dir;
651872981bSEric Paris static int bool_num;
66d313f948SStephen Smalley static char **bool_pending_names;
671872981bSEric Paris static int *bool_pending_values;
681da177e4SLinus Torvalds 
69e47c8fc5SChristopher J. PeBenito /* global data for classes */
701872981bSEric Paris static struct dentry *class_dir;
71e47c8fc5SChristopher J. PeBenito static unsigned long last_class_ino;
72e47c8fc5SChristopher J. PeBenito 
73cee74f47SEric Paris static char policy_opened;
74cee74f47SEric Paris 
753bb56b25SPaul Moore /* global data for policy capabilities */
761872981bSEric Paris static struct dentry *policycap_dir;
773bb56b25SPaul Moore 
781da177e4SLinus Torvalds extern void selnl_notify_setenforce(int val);
791da177e4SLinus Torvalds 
801da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
811da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
821da177e4SLinus Torvalds 			     u32 perms)
831da177e4SLinus Torvalds {
84c69e8d9cSDavid Howells 	const struct task_security_struct *tsec;
85c69e8d9cSDavid Howells 	u32 sid = 0;
861da177e4SLinus Torvalds 
87c69e8d9cSDavid Howells 	rcu_read_lock();
88c69e8d9cSDavid Howells 	tsec = __task_cred(tsk)->security;
89c69e8d9cSDavid Howells 	if (tsec)
90c69e8d9cSDavid Howells 		sid = tsec->sid;
91c69e8d9cSDavid Howells 	rcu_read_unlock();
921da177e4SLinus Torvalds 	if (!tsec)
931da177e4SLinus Torvalds 		return -EACCES;
941da177e4SLinus Torvalds 
95c69e8d9cSDavid Howells 	return avc_has_perm(sid, SECINITSID_SECURITY,
961da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
971da177e4SLinus Torvalds }
981da177e4SLinus Torvalds 
991da177e4SLinus Torvalds enum sel_inos {
1001da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
1011da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
1021da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
1031da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
1041da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
1051da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
1061da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
1071da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
1081da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
1091da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
1101da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
1111da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
1121da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1131da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1144e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1153f12070eSEric Paris 	SEL_REJECT_UNKNOWN, /* export unknown reject handling to userspace */
1163f12070eSEric Paris 	SEL_DENY_UNKNOWN, /* export unknown deny handling to userspace */
11711904167SKaiGai Kohei 	SEL_STATUS,	/* export current status using mmap() */
118cee74f47SEric Paris 	SEL_POLICY,	/* allow userspace to read the in kernel policy */
1196174eafcSJames Carter 	SEL_INO_NEXT,	/* The next inode number to use */
1201da177e4SLinus Torvalds };
1211da177e4SLinus Torvalds 
1226174eafcSJames Carter static unsigned long sel_last_ino = SEL_INO_NEXT - 1;
1236174eafcSJames Carter 
124f0ee2e46SJames Carter #define SEL_INITCON_INO_OFFSET		0x01000000
125bce34bc0SJames Carter #define SEL_BOOL_INO_OFFSET		0x02000000
126e47c8fc5SChristopher J. PeBenito #define SEL_CLASS_INO_OFFSET		0x04000000
1273bb56b25SPaul Moore #define SEL_POLICYCAP_INO_OFFSET	0x08000000
128f0ee2e46SJames Carter #define SEL_INO_MASK			0x00ffffff
129f0ee2e46SJames Carter 
1301da177e4SLinus Torvalds #define TMPBUFLEN	12
1311da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1321da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1331da177e4SLinus Torvalds {
1341da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1351da177e4SLinus Torvalds 	ssize_t length;
1361da177e4SLinus Torvalds 
1371da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1381da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1391da177e4SLinus Torvalds }
1401da177e4SLinus Torvalds 
1411da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1421da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
1431da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1441da177e4SLinus Torvalds 
1451da177e4SLinus Torvalds {
146b77a493bSEric Paris 	char *page = NULL;
1471da177e4SLinus Torvalds 	ssize_t length;
1481da177e4SLinus Torvalds 	int new_value;
1491da177e4SLinus Torvalds 
150b77a493bSEric Paris 	length = -ENOMEM;
151bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
152b77a493bSEric Paris 		goto out;
153b77a493bSEric Paris 
1541da177e4SLinus Torvalds 	/* No partial writes. */
155b77a493bSEric Paris 	length = EINVAL;
156b77a493bSEric Paris 	if (*ppos != 0)
157b77a493bSEric Paris 		goto out;
158b77a493bSEric Paris 
159b77a493bSEric Paris 	length = -ENOMEM;
1601da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
1611da177e4SLinus Torvalds 	if (!page)
162b77a493bSEric Paris 		goto out;
163b77a493bSEric Paris 
1641da177e4SLinus Torvalds 	length = -EFAULT;
1651da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1661da177e4SLinus Torvalds 		goto out;
1671da177e4SLinus Torvalds 
1681da177e4SLinus Torvalds 	length = -EINVAL;
1691da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1701da177e4SLinus Torvalds 		goto out;
1711da177e4SLinus Torvalds 
1721da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1731da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1741da177e4SLinus Torvalds 		if (length)
1751da177e4SLinus Torvalds 			goto out;
176af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
1774746ec5bSEric Paris 			"enforcing=%d old_enforcing=%d auid=%u ses=%u",
1784746ec5bSEric Paris 			new_value, selinux_enforcing,
1794746ec5bSEric Paris 			audit_get_loginuid(current),
1804746ec5bSEric Paris 			audit_get_sessionid(current));
1811da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1821da177e4SLinus Torvalds 		if (selinux_enforcing)
1831da177e4SLinus Torvalds 			avc_ss_reset(0);
1841da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
18511904167SKaiGai Kohei 		selinux_status_update_setenforce(selinux_enforcing);
1861da177e4SLinus Torvalds 	}
1871da177e4SLinus Torvalds 	length = count;
1881da177e4SLinus Torvalds out:
1891da177e4SLinus Torvalds 	free_page((unsigned long) page);
1901da177e4SLinus Torvalds 	return length;
1911da177e4SLinus Torvalds }
1921da177e4SLinus Torvalds #else
1931da177e4SLinus Torvalds #define sel_write_enforce NULL
1941da177e4SLinus Torvalds #endif
1951da177e4SLinus Torvalds 
1969c2e08c5SArjan van de Ven static const struct file_operations sel_enforce_ops = {
1971da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1981da177e4SLinus Torvalds 	.write		= sel_write_enforce,
19957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
2001da177e4SLinus Torvalds };
2011da177e4SLinus Torvalds 
2023f12070eSEric Paris static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf,
2033f12070eSEric Paris 					size_t count, loff_t *ppos)
2043f12070eSEric Paris {
2053f12070eSEric Paris 	char tmpbuf[TMPBUFLEN];
2063f12070eSEric Paris 	ssize_t length;
2073f12070eSEric Paris 	ino_t ino = filp->f_path.dentry->d_inode->i_ino;
2083f12070eSEric Paris 	int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ?
2093f12070eSEric Paris 		security_get_reject_unknown() : !security_get_allow_unknown();
2103f12070eSEric Paris 
2113f12070eSEric Paris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown);
2123f12070eSEric Paris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2133f12070eSEric Paris }
2143f12070eSEric Paris 
2153f12070eSEric Paris static const struct file_operations sel_handle_unknown_ops = {
2163f12070eSEric Paris 	.read		= sel_read_handle_unknown,
21757a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
2183f12070eSEric Paris };
2193f12070eSEric Paris 
22011904167SKaiGai Kohei static int sel_open_handle_status(struct inode *inode, struct file *filp)
22111904167SKaiGai Kohei {
22211904167SKaiGai Kohei 	struct page    *status = selinux_kernel_status_page();
22311904167SKaiGai Kohei 
22411904167SKaiGai Kohei 	if (!status)
22511904167SKaiGai Kohei 		return -ENOMEM;
22611904167SKaiGai Kohei 
22711904167SKaiGai Kohei 	filp->private_data = status;
22811904167SKaiGai Kohei 
22911904167SKaiGai Kohei 	return 0;
23011904167SKaiGai Kohei }
23111904167SKaiGai Kohei 
23211904167SKaiGai Kohei static ssize_t sel_read_handle_status(struct file *filp, char __user *buf,
23311904167SKaiGai Kohei 				      size_t count, loff_t *ppos)
23411904167SKaiGai Kohei {
23511904167SKaiGai Kohei 	struct page    *status = filp->private_data;
23611904167SKaiGai Kohei 
23711904167SKaiGai Kohei 	BUG_ON(!status);
23811904167SKaiGai Kohei 
23911904167SKaiGai Kohei 	return simple_read_from_buffer(buf, count, ppos,
24011904167SKaiGai Kohei 				       page_address(status),
24111904167SKaiGai Kohei 				       sizeof(struct selinux_kernel_status));
24211904167SKaiGai Kohei }
24311904167SKaiGai Kohei 
24411904167SKaiGai Kohei static int sel_mmap_handle_status(struct file *filp,
24511904167SKaiGai Kohei 				  struct vm_area_struct *vma)
24611904167SKaiGai Kohei {
24711904167SKaiGai Kohei 	struct page    *status = filp->private_data;
24811904167SKaiGai Kohei 	unsigned long	size = vma->vm_end - vma->vm_start;
24911904167SKaiGai Kohei 
25011904167SKaiGai Kohei 	BUG_ON(!status);
25111904167SKaiGai Kohei 
25211904167SKaiGai Kohei 	/* only allows one page from the head */
25311904167SKaiGai Kohei 	if (vma->vm_pgoff > 0 || size != PAGE_SIZE)
25411904167SKaiGai Kohei 		return -EIO;
25511904167SKaiGai Kohei 	/* disallow writable mapping */
25611904167SKaiGai Kohei 	if (vma->vm_flags & VM_WRITE)
25711904167SKaiGai Kohei 		return -EPERM;
25811904167SKaiGai Kohei 	/* disallow mprotect() turns it into writable */
25911904167SKaiGai Kohei 	vma->vm_flags &= ~VM_MAYWRITE;
26011904167SKaiGai Kohei 
26111904167SKaiGai Kohei 	return remap_pfn_range(vma, vma->vm_start,
26211904167SKaiGai Kohei 			       page_to_pfn(status),
26311904167SKaiGai Kohei 			       size, vma->vm_page_prot);
26411904167SKaiGai Kohei }
26511904167SKaiGai Kohei 
26611904167SKaiGai Kohei static const struct file_operations sel_handle_status_ops = {
26711904167SKaiGai Kohei 	.open		= sel_open_handle_status,
26811904167SKaiGai Kohei 	.read		= sel_read_handle_status,
26911904167SKaiGai Kohei 	.mmap		= sel_mmap_handle_status,
27011904167SKaiGai Kohei 	.llseek		= generic_file_llseek,
27111904167SKaiGai Kohei };
27211904167SKaiGai Kohei 
2731da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
2741da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file *file, const char __user *buf,
2751da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
2761da177e4SLinus Torvalds 
2771da177e4SLinus Torvalds {
278b77a493bSEric Paris 	char *page = NULL;
2791da177e4SLinus Torvalds 	ssize_t length;
2801da177e4SLinus Torvalds 	int new_value;
2811da177e4SLinus Torvalds 
282b77a493bSEric Paris 	length = -ENOMEM;
283bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
2846eab04a8SJustin P. Mattock 		goto out;
285b77a493bSEric Paris 
2861da177e4SLinus Torvalds 	/* No partial writes. */
287b77a493bSEric Paris 	length = -EINVAL;
288b77a493bSEric Paris 	if (*ppos != 0)
289b77a493bSEric Paris 		goto out;
290b77a493bSEric Paris 
291b77a493bSEric Paris 	length = -ENOMEM;
2921da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
2931da177e4SLinus Torvalds 	if (!page)
294b77a493bSEric Paris 		goto out;
295b77a493bSEric Paris 
2961da177e4SLinus Torvalds 	length = -EFAULT;
2971da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
2981da177e4SLinus Torvalds 		goto out;
2991da177e4SLinus Torvalds 
3001da177e4SLinus Torvalds 	length = -EINVAL;
3011da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
3021da177e4SLinus Torvalds 		goto out;
3031da177e4SLinus Torvalds 
3041da177e4SLinus Torvalds 	if (new_value) {
3051da177e4SLinus Torvalds 		length = selinux_disable();
306b77a493bSEric Paris 		if (length)
3071da177e4SLinus Torvalds 			goto out;
308af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
3094746ec5bSEric Paris 			"selinux=0 auid=%u ses=%u",
3104746ec5bSEric Paris 			audit_get_loginuid(current),
3114746ec5bSEric Paris 			audit_get_sessionid(current));
3121da177e4SLinus Torvalds 	}
3131da177e4SLinus Torvalds 
3141da177e4SLinus Torvalds 	length = count;
3151da177e4SLinus Torvalds out:
3161da177e4SLinus Torvalds 	free_page((unsigned long) page);
3171da177e4SLinus Torvalds 	return length;
3181da177e4SLinus Torvalds }
3191da177e4SLinus Torvalds #else
3201da177e4SLinus Torvalds #define sel_write_disable NULL
3211da177e4SLinus Torvalds #endif
3221da177e4SLinus Torvalds 
3239c2e08c5SArjan van de Ven static const struct file_operations sel_disable_ops = {
3241da177e4SLinus Torvalds 	.write		= sel_write_disable,
32557a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3261da177e4SLinus Torvalds };
3271da177e4SLinus Torvalds 
3281da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
3291da177e4SLinus Torvalds 				   size_t count, loff_t *ppos)
3301da177e4SLinus Torvalds {
3311da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3321da177e4SLinus Torvalds 	ssize_t length;
3331da177e4SLinus Torvalds 
3341da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
3351da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3361da177e4SLinus Torvalds }
3371da177e4SLinus Torvalds 
3389c2e08c5SArjan van de Ven static const struct file_operations sel_policyvers_ops = {
3391da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
34057a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3411da177e4SLinus Torvalds };
3421da177e4SLinus Torvalds 
3431da177e4SLinus Torvalds /* declaration for sel_write_load */
3441da177e4SLinus Torvalds static int sel_make_bools(void);
345e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void);
3463bb56b25SPaul Moore static int sel_make_policycap(void);
347e47c8fc5SChristopher J. PeBenito 
348e47c8fc5SChristopher J. PeBenito /* declaration for sel_make_class_dirs */
349e47c8fc5SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
350e47c8fc5SChristopher J. PeBenito 			unsigned long *ino);
3511da177e4SLinus Torvalds 
3521da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
3531da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
3541da177e4SLinus Torvalds {
3551da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3561da177e4SLinus Torvalds 	ssize_t length;
3571da177e4SLinus Torvalds 
3580719aaf5SGuido Trentalancia 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
3590719aaf5SGuido Trentalancia 			   security_mls_enabled());
3601da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3611da177e4SLinus Torvalds }
3621da177e4SLinus Torvalds 
3639c2e08c5SArjan van de Ven static const struct file_operations sel_mls_ops = {
3641da177e4SLinus Torvalds 	.read		= sel_read_mls,
36557a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3661da177e4SLinus Torvalds };
3671da177e4SLinus Torvalds 
368cee74f47SEric Paris struct policy_load_memory {
369cee74f47SEric Paris 	size_t len;
370cee74f47SEric Paris 	void *data;
371cee74f47SEric Paris };
372cee74f47SEric Paris 
373cee74f47SEric Paris static int sel_open_policy(struct inode *inode, struct file *filp)
374cee74f47SEric Paris {
375cee74f47SEric Paris 	struct policy_load_memory *plm = NULL;
376cee74f47SEric Paris 	int rc;
377cee74f47SEric Paris 
378cee74f47SEric Paris 	BUG_ON(filp->private_data);
379cee74f47SEric Paris 
380cee74f47SEric Paris 	mutex_lock(&sel_mutex);
381cee74f47SEric Paris 
382cee74f47SEric Paris 	rc = task_has_security(current, SECURITY__READ_POLICY);
383cee74f47SEric Paris 	if (rc)
384cee74f47SEric Paris 		goto err;
385cee74f47SEric Paris 
386cee74f47SEric Paris 	rc = -EBUSY;
387cee74f47SEric Paris 	if (policy_opened)
388cee74f47SEric Paris 		goto err;
389cee74f47SEric Paris 
390cee74f47SEric Paris 	rc = -ENOMEM;
391cee74f47SEric Paris 	plm = kzalloc(sizeof(*plm), GFP_KERNEL);
392cee74f47SEric Paris 	if (!plm)
393cee74f47SEric Paris 		goto err;
394cee74f47SEric Paris 
395cee74f47SEric Paris 	if (i_size_read(inode) != security_policydb_len()) {
396cee74f47SEric Paris 		mutex_lock(&inode->i_mutex);
397cee74f47SEric Paris 		i_size_write(inode, security_policydb_len());
398cee74f47SEric Paris 		mutex_unlock(&inode->i_mutex);
399cee74f47SEric Paris 	}
400cee74f47SEric Paris 
401cee74f47SEric Paris 	rc = security_read_policy(&plm->data, &plm->len);
402cee74f47SEric Paris 	if (rc)
403cee74f47SEric Paris 		goto err;
404cee74f47SEric Paris 
405cee74f47SEric Paris 	policy_opened = 1;
406cee74f47SEric Paris 
407cee74f47SEric Paris 	filp->private_data = plm;
408cee74f47SEric Paris 
409cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
410cee74f47SEric Paris 
411cee74f47SEric Paris 	return 0;
412cee74f47SEric Paris err:
413cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
414cee74f47SEric Paris 
415cee74f47SEric Paris 	if (plm)
416cee74f47SEric Paris 		vfree(plm->data);
417cee74f47SEric Paris 	kfree(plm);
418cee74f47SEric Paris 	return rc;
419cee74f47SEric Paris }
420cee74f47SEric Paris 
421cee74f47SEric Paris static int sel_release_policy(struct inode *inode, struct file *filp)
422cee74f47SEric Paris {
423cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
424cee74f47SEric Paris 
425cee74f47SEric Paris 	BUG_ON(!plm);
426cee74f47SEric Paris 
427cee74f47SEric Paris 	policy_opened = 0;
428cee74f47SEric Paris 
429cee74f47SEric Paris 	vfree(plm->data);
430cee74f47SEric Paris 	kfree(plm);
431cee74f47SEric Paris 
432cee74f47SEric Paris 	return 0;
433cee74f47SEric Paris }
434cee74f47SEric Paris 
435cee74f47SEric Paris static ssize_t sel_read_policy(struct file *filp, char __user *buf,
436cee74f47SEric Paris 			       size_t count, loff_t *ppos)
437cee74f47SEric Paris {
438cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
439cee74f47SEric Paris 	int ret;
440cee74f47SEric Paris 
441cee74f47SEric Paris 	mutex_lock(&sel_mutex);
442cee74f47SEric Paris 
443cee74f47SEric Paris 	ret = task_has_security(current, SECURITY__READ_POLICY);
444cee74f47SEric Paris 	if (ret)
445cee74f47SEric Paris 		goto out;
446cee74f47SEric Paris 
447cee74f47SEric Paris 	ret = simple_read_from_buffer(buf, count, ppos, plm->data, plm->len);
448cee74f47SEric Paris out:
449cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
450cee74f47SEric Paris 	return ret;
451cee74f47SEric Paris }
452cee74f47SEric Paris 
453845ca30fSEric Paris static int sel_mmap_policy_fault(struct vm_area_struct *vma,
454845ca30fSEric Paris 				 struct vm_fault *vmf)
455845ca30fSEric Paris {
456845ca30fSEric Paris 	struct policy_load_memory *plm = vma->vm_file->private_data;
457845ca30fSEric Paris 	unsigned long offset;
458845ca30fSEric Paris 	struct page *page;
459845ca30fSEric Paris 
460845ca30fSEric Paris 	if (vmf->flags & (FAULT_FLAG_MKWRITE | FAULT_FLAG_WRITE))
461845ca30fSEric Paris 		return VM_FAULT_SIGBUS;
462845ca30fSEric Paris 
463845ca30fSEric Paris 	offset = vmf->pgoff << PAGE_SHIFT;
464845ca30fSEric Paris 	if (offset >= roundup(plm->len, PAGE_SIZE))
465845ca30fSEric Paris 		return VM_FAULT_SIGBUS;
466845ca30fSEric Paris 
467845ca30fSEric Paris 	page = vmalloc_to_page(plm->data + offset);
468845ca30fSEric Paris 	get_page(page);
469845ca30fSEric Paris 
470845ca30fSEric Paris 	vmf->page = page;
471845ca30fSEric Paris 
472845ca30fSEric Paris 	return 0;
473845ca30fSEric Paris }
474845ca30fSEric Paris 
475845ca30fSEric Paris static struct vm_operations_struct sel_mmap_policy_ops = {
476845ca30fSEric Paris 	.fault = sel_mmap_policy_fault,
477845ca30fSEric Paris 	.page_mkwrite = sel_mmap_policy_fault,
478845ca30fSEric Paris };
479845ca30fSEric Paris 
480ad3fa08cSJames Morris static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
481845ca30fSEric Paris {
482845ca30fSEric Paris 	if (vma->vm_flags & VM_SHARED) {
483845ca30fSEric Paris 		/* do not allow mprotect to make mapping writable */
484845ca30fSEric Paris 		vma->vm_flags &= ~VM_MAYWRITE;
485845ca30fSEric Paris 
486845ca30fSEric Paris 		if (vma->vm_flags & VM_WRITE)
487845ca30fSEric Paris 			return -EACCES;
488845ca30fSEric Paris 	}
489845ca30fSEric Paris 
490845ca30fSEric Paris 	vma->vm_flags |= VM_RESERVED;
491845ca30fSEric Paris 	vma->vm_ops = &sel_mmap_policy_ops;
492845ca30fSEric Paris 
493845ca30fSEric Paris 	return 0;
494845ca30fSEric Paris }
495845ca30fSEric Paris 
496cee74f47SEric Paris static const struct file_operations sel_policy_ops = {
497cee74f47SEric Paris 	.open		= sel_open_policy,
498cee74f47SEric Paris 	.read		= sel_read_policy,
499845ca30fSEric Paris 	.mmap		= sel_mmap_policy,
500cee74f47SEric Paris 	.release	= sel_release_policy,
501cee74f47SEric Paris };
502cee74f47SEric Paris 
5031da177e4SLinus Torvalds static ssize_t sel_write_load(struct file *file, const char __user *buf,
5041da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
5051da177e4SLinus Torvalds 
5061da177e4SLinus Torvalds {
5071da177e4SLinus Torvalds 	ssize_t length;
5081da177e4SLinus Torvalds 	void *data = NULL;
5091da177e4SLinus Torvalds 
510bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
5111da177e4SLinus Torvalds 
5121da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
5131da177e4SLinus Torvalds 	if (length)
5141da177e4SLinus Torvalds 		goto out;
5151da177e4SLinus Torvalds 
5161da177e4SLinus Torvalds 	/* No partial writes. */
5171da177e4SLinus Torvalds 	length = -EINVAL;
518b77a493bSEric Paris 	if (*ppos != 0)
5191da177e4SLinus Torvalds 		goto out;
5201da177e4SLinus Torvalds 
521b77a493bSEric Paris 	length = -EFBIG;
522b77a493bSEric Paris 	if (count > 64 * 1024 * 1024)
5231da177e4SLinus Torvalds 		goto out;
524b77a493bSEric Paris 
525b77a493bSEric Paris 	length = -ENOMEM;
526b77a493bSEric Paris 	data = vmalloc(count);
527b77a493bSEric Paris 	if (!data)
528b77a493bSEric Paris 		goto out;
5291da177e4SLinus Torvalds 
5301da177e4SLinus Torvalds 	length = -EFAULT;
5311da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
5321da177e4SLinus Torvalds 		goto out;
5331da177e4SLinus Torvalds 
5341da177e4SLinus Torvalds 	length = security_load_policy(data, count);
5351da177e4SLinus Torvalds 	if (length)
5361da177e4SLinus Torvalds 		goto out;
5371da177e4SLinus Torvalds 
538b77a493bSEric Paris 	length = sel_make_bools();
539b77a493bSEric Paris 	if (length)
540e47c8fc5SChristopher J. PeBenito 		goto out1;
541e47c8fc5SChristopher J. PeBenito 
542b77a493bSEric Paris 	length = sel_make_classes();
543b77a493bSEric Paris 	if (length)
5443bb56b25SPaul Moore 		goto out1;
5453bb56b25SPaul Moore 
546b77a493bSEric Paris 	length = sel_make_policycap();
547b77a493bSEric Paris 	if (length)
548b77a493bSEric Paris 		goto out1;
549b77a493bSEric Paris 
5501da177e4SLinus Torvalds 	length = count;
551e47c8fc5SChristopher J. PeBenito 
552e47c8fc5SChristopher J. PeBenito out1:
553af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
5544746ec5bSEric Paris 		"policy loaded auid=%u ses=%u",
5554746ec5bSEric Paris 		audit_get_loginuid(current),
5564746ec5bSEric Paris 		audit_get_sessionid(current));
5571da177e4SLinus Torvalds out:
558bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
5591da177e4SLinus Torvalds 	vfree(data);
5601da177e4SLinus Torvalds 	return length;
5611da177e4SLinus Torvalds }
5621da177e4SLinus Torvalds 
5639c2e08c5SArjan van de Ven static const struct file_operations sel_load_ops = {
5641da177e4SLinus Torvalds 	.write		= sel_write_load,
56557a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
5661da177e4SLinus Torvalds };
5671da177e4SLinus Torvalds 
568ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
5691da177e4SLinus Torvalds {
570b77a493bSEric Paris 	char *canon = NULL;
571ce9982d0SStephen Smalley 	u32 sid, len;
5721da177e4SLinus Torvalds 	ssize_t length;
5731da177e4SLinus Torvalds 
5741da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
5751da177e4SLinus Torvalds 	if (length)
576b77a493bSEric Paris 		goto out;
5771da177e4SLinus Torvalds 
578ce9982d0SStephen Smalley 	length = security_context_to_sid(buf, size, &sid);
579b77a493bSEric Paris 	if (length)
580b77a493bSEric Paris 		goto out;
5811da177e4SLinus Torvalds 
582ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
583b77a493bSEric Paris 	if (length)
584b77a493bSEric Paris 		goto out;
585ce9982d0SStephen Smalley 
586b77a493bSEric Paris 	length = -ERANGE;
587ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
588744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
589744ba35eSEric Paris 			"payload max\n", __func__, len);
590ce9982d0SStephen Smalley 		goto out;
591ce9982d0SStephen Smalley 	}
592ce9982d0SStephen Smalley 
593ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
594ce9982d0SStephen Smalley 	length = len;
5951da177e4SLinus Torvalds out:
596ce9982d0SStephen Smalley 	kfree(canon);
5971da177e4SLinus Torvalds 	return length;
5981da177e4SLinus Torvalds }
5991da177e4SLinus Torvalds 
6001da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
6011da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
6021da177e4SLinus Torvalds {
6031da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
6041da177e4SLinus Torvalds 	ssize_t length;
6051da177e4SLinus Torvalds 
6061da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
6071da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
6081da177e4SLinus Torvalds }
6091da177e4SLinus Torvalds 
6101da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
6111da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
6121da177e4SLinus Torvalds {
613b77a493bSEric Paris 	char *page = NULL;
6141da177e4SLinus Torvalds 	ssize_t length;
6151da177e4SLinus Torvalds 	unsigned int new_value;
6161da177e4SLinus Torvalds 
6171da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
6181da177e4SLinus Torvalds 	if (length)
619b77a493bSEric Paris 		goto out;
6201da177e4SLinus Torvalds 
621b77a493bSEric Paris 	length = -ENOMEM;
622bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
623b77a493bSEric Paris 		goto out;
624b77a493bSEric Paris 
6251da177e4SLinus Torvalds 	/* No partial writes. */
626b77a493bSEric Paris 	length = -EINVAL;
627b77a493bSEric Paris 	if (*ppos != 0)
628b77a493bSEric Paris 		goto out;
629b77a493bSEric Paris 
630b77a493bSEric Paris 	length = -ENOMEM;
6311da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
6321da177e4SLinus Torvalds 	if (!page)
633b77a493bSEric Paris 		goto out;
634b77a493bSEric Paris 
6351da177e4SLinus Torvalds 	length = -EFAULT;
6361da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
6371da177e4SLinus Torvalds 		goto out;
6381da177e4SLinus Torvalds 
6391da177e4SLinus Torvalds 	length = -EINVAL;
6401da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
6411da177e4SLinus Torvalds 		goto out;
6421da177e4SLinus Torvalds 
6431da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
6441da177e4SLinus Torvalds 	length = count;
6451da177e4SLinus Torvalds out:
6461da177e4SLinus Torvalds 	free_page((unsigned long) page);
6471da177e4SLinus Torvalds 	return length;
6481da177e4SLinus Torvalds }
6499c2e08c5SArjan van de Ven static const struct file_operations sel_checkreqprot_ops = {
6501da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
6511da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
65257a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
6531da177e4SLinus Torvalds };
6541da177e4SLinus Torvalds 
6551da177e4SLinus Torvalds /*
6561da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
6571da177e4SLinus Torvalds  */
6581da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
6591da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
6601da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
6611da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
6621da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size);
6631da177e4SLinus Torvalds 
6641da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
6651da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
6661da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
6671da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
6681da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
6691da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
670ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
6711da177e4SLinus Torvalds };
6721da177e4SLinus Torvalds 
6731da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
6741da177e4SLinus Torvalds {
6753d5ff529SJosef Sipek 	ino_t ino = file->f_path.dentry->d_inode->i_ino;
6761da177e4SLinus Torvalds 	char *data;
6771da177e4SLinus Torvalds 	ssize_t rv;
6781da177e4SLinus Torvalds 
6796e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
6801da177e4SLinus Torvalds 		return -EINVAL;
6811da177e4SLinus Torvalds 
6821da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
6831da177e4SLinus Torvalds 	if (IS_ERR(data))
6841da177e4SLinus Torvalds 		return PTR_ERR(data);
6851da177e4SLinus Torvalds 
6861da177e4SLinus Torvalds 	rv = write_op[ino](file, data, size);
6871da177e4SLinus Torvalds 	if (rv > 0) {
6881da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
6891da177e4SLinus Torvalds 		rv = size;
6901da177e4SLinus Torvalds 	}
6911da177e4SLinus Torvalds 	return rv;
6921da177e4SLinus Torvalds }
6931da177e4SLinus Torvalds 
6949c2e08c5SArjan van de Ven static const struct file_operations transaction_ops = {
6951da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
6961da177e4SLinus Torvalds 	.read		= simple_transaction_read,
6971da177e4SLinus Torvalds 	.release	= simple_transaction_release,
69857a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
6991da177e4SLinus Torvalds };
7001da177e4SLinus Torvalds 
7011da177e4SLinus Torvalds /*
7021da177e4SLinus Torvalds  * payload - write methods
7031da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
7041da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
7051da177e4SLinus Torvalds  */
7061da177e4SLinus Torvalds 
7071da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
7081da177e4SLinus Torvalds {
709b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
7101da177e4SLinus Torvalds 	u32 ssid, tsid;
7111da177e4SLinus Torvalds 	u16 tclass;
7121da177e4SLinus Torvalds 	struct av_decision avd;
7131da177e4SLinus Torvalds 	ssize_t length;
7141da177e4SLinus Torvalds 
7151da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
7161da177e4SLinus Torvalds 	if (length)
717b77a493bSEric Paris 		goto out;
7181da177e4SLinus Torvalds 
7191da177e4SLinus Torvalds 	length = -ENOMEM;
72089d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
7211da177e4SLinus Torvalds 	if (!scon)
722b77a493bSEric Paris 		goto out;
7231da177e4SLinus Torvalds 
724b77a493bSEric Paris 	length = -ENOMEM;
72589d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
7261da177e4SLinus Torvalds 	if (!tcon)
7271da177e4SLinus Torvalds 		goto out;
7281da177e4SLinus Torvalds 
7291da177e4SLinus Torvalds 	length = -EINVAL;
73019439d05SStephen Smalley 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
731b77a493bSEric Paris 		goto out;
7321da177e4SLinus Torvalds 
7331da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
734b77a493bSEric Paris 	if (length)
735b77a493bSEric Paris 		goto out;
736b77a493bSEric Paris 
7371da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
738b77a493bSEric Paris 	if (length)
739b77a493bSEric Paris 		goto out;
7401da177e4SLinus Torvalds 
74119439d05SStephen Smalley 	security_compute_av_user(ssid, tsid, tclass, &avd);
7421da177e4SLinus Torvalds 
7431da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
7448a6f83afSKaiGai Kohei 			  "%x %x %x %x %u %x",
745f1c6381aSEric Paris 			  avd.allowed, 0xffffffff,
7461da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
7478a6f83afSKaiGai Kohei 			  avd.seqno, avd.flags);
7481da177e4SLinus Torvalds out:
749b77a493bSEric Paris 	kfree(tcon);
7501da177e4SLinus Torvalds 	kfree(scon);
7511da177e4SLinus Torvalds 	return length;
7521da177e4SLinus Torvalds }
7531da177e4SLinus Torvalds 
7540f7e4c33SKohei Kaigai static inline int hexcode_to_int(int code) {
7550f7e4c33SKohei Kaigai 	if (code == '\0' || !isxdigit(code))
7560f7e4c33SKohei Kaigai 		return -1;
7570f7e4c33SKohei Kaigai 	if (isdigit(code))
7580f7e4c33SKohei Kaigai 		return code - '0';
7590f7e4c33SKohei Kaigai 	return tolower(code) - 'a' + 10;
7600f7e4c33SKohei Kaigai }
7610f7e4c33SKohei Kaigai 
7621da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
7631da177e4SLinus Torvalds {
764b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
765f50a3ec9SKohei Kaigai 	char *namebuf = NULL, *objname = NULL;
7661da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7671da177e4SLinus Torvalds 	u16 tclass;
7681da177e4SLinus Torvalds 	ssize_t length;
769b77a493bSEric Paris 	char *newcon = NULL;
7701da177e4SLinus Torvalds 	u32 len;
771f50a3ec9SKohei Kaigai 	int nargs;
7721da177e4SLinus Torvalds 
7731da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
7741da177e4SLinus Torvalds 	if (length)
775b77a493bSEric Paris 		goto out;
7761da177e4SLinus Torvalds 
7771da177e4SLinus Torvalds 	length = -ENOMEM;
77889d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
7791da177e4SLinus Torvalds 	if (!scon)
780b77a493bSEric Paris 		goto out;
7811da177e4SLinus Torvalds 
782b77a493bSEric Paris 	length = -ENOMEM;
78389d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
7841da177e4SLinus Torvalds 	if (!tcon)
7851da177e4SLinus Torvalds 		goto out;
7861da177e4SLinus Torvalds 
787f50a3ec9SKohei Kaigai 	length = -ENOMEM;
788f50a3ec9SKohei Kaigai 	namebuf = kzalloc(size + 1, GFP_KERNEL);
789f50a3ec9SKohei Kaigai 	if (!namebuf)
790b77a493bSEric Paris 		goto out;
7911da177e4SLinus Torvalds 
792f50a3ec9SKohei Kaigai 	length = -EINVAL;
793f50a3ec9SKohei Kaigai 	nargs = sscanf(buf, "%s %s %hu %s", scon, tcon, &tclass, namebuf);
794f50a3ec9SKohei Kaigai 	if (nargs < 3 || nargs > 4)
795f50a3ec9SKohei Kaigai 		goto out;
7960f7e4c33SKohei Kaigai 	if (nargs == 4) {
7970f7e4c33SKohei Kaigai 		/*
7980f7e4c33SKohei Kaigai 		 * If and when the name of new object to be queried contains
7990f7e4c33SKohei Kaigai 		 * either whitespace or multibyte characters, they shall be
8000f7e4c33SKohei Kaigai 		 * encoded based on the percentage-encoding rule.
8010f7e4c33SKohei Kaigai 		 * If not encoded, the sscanf logic picks up only left-half
8020f7e4c33SKohei Kaigai 		 * of the supplied name; splitted by a whitespace unexpectedly.
8030f7e4c33SKohei Kaigai 		 */
8040f7e4c33SKohei Kaigai 		char   *r, *w;
8050f7e4c33SKohei Kaigai 		int     c1, c2;
8060f7e4c33SKohei Kaigai 
8070f7e4c33SKohei Kaigai 		r = w = namebuf;
8080f7e4c33SKohei Kaigai 		do {
8090f7e4c33SKohei Kaigai 			c1 = *r++;
8100f7e4c33SKohei Kaigai 			if (c1 == '+')
8110f7e4c33SKohei Kaigai 				c1 = ' ';
8120f7e4c33SKohei Kaigai 			else if (c1 == '%') {
8130f7e4c33SKohei Kaigai 				if ((c1 = hexcode_to_int(*r++)) < 0)
8140f7e4c33SKohei Kaigai 					goto out;
8150f7e4c33SKohei Kaigai 				if ((c2 = hexcode_to_int(*r++)) < 0)
8160f7e4c33SKohei Kaigai 					goto out;
8170f7e4c33SKohei Kaigai 				c1 = (c1 << 4) | c2;
8180f7e4c33SKohei Kaigai 			}
8190f7e4c33SKohei Kaigai 			*w++ = c1;
8200f7e4c33SKohei Kaigai 		} while (c1 != '\0');
8210f7e4c33SKohei Kaigai 
822f50a3ec9SKohei Kaigai 		objname = namebuf;
8230f7e4c33SKohei Kaigai 	}
824f50a3ec9SKohei Kaigai 
8251da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
826b77a493bSEric Paris 	if (length)
827b77a493bSEric Paris 		goto out;
828b77a493bSEric Paris 
8291da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
830b77a493bSEric Paris 	if (length)
831b77a493bSEric Paris 		goto out;
8321da177e4SLinus Torvalds 
833f50a3ec9SKohei Kaigai 	length = security_transition_sid_user(ssid, tsid, tclass,
834f50a3ec9SKohei Kaigai 					      objname, &newsid);
835b77a493bSEric Paris 	if (length)
836b77a493bSEric Paris 		goto out;
8371da177e4SLinus Torvalds 
8381da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
839b77a493bSEric Paris 	if (length)
840b77a493bSEric Paris 		goto out;
8411da177e4SLinus Torvalds 
842b77a493bSEric Paris 	length = -ERANGE;
8431da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
844744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
845744ba35eSEric Paris 			"payload max\n", __func__, len);
846b77a493bSEric Paris 		goto out;
8471da177e4SLinus Torvalds 	}
8481da177e4SLinus Torvalds 
8491da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
8501da177e4SLinus Torvalds 	length = len;
8511da177e4SLinus Torvalds out:
852b77a493bSEric Paris 	kfree(newcon);
853f50a3ec9SKohei Kaigai 	kfree(namebuf);
854b77a493bSEric Paris 	kfree(tcon);
8551da177e4SLinus Torvalds 	kfree(scon);
8561da177e4SLinus Torvalds 	return length;
8571da177e4SLinus Torvalds }
8581da177e4SLinus Torvalds 
8591da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
8601da177e4SLinus Torvalds {
861b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
8621da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
8631da177e4SLinus Torvalds 	u16 tclass;
8641da177e4SLinus Torvalds 	ssize_t length;
865b77a493bSEric Paris 	char *newcon = NULL;
8661da177e4SLinus Torvalds 	u32 len;
8671da177e4SLinus Torvalds 
8681da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
8691da177e4SLinus Torvalds 	if (length)
870b77a493bSEric Paris 		goto out;
8711da177e4SLinus Torvalds 
8721da177e4SLinus Torvalds 	length = -ENOMEM;
87389d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
8741da177e4SLinus Torvalds 	if (!scon)
875b77a493bSEric Paris 		goto out;
8761da177e4SLinus Torvalds 
877b77a493bSEric Paris 	length = -ENOMEM;
87889d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
8791da177e4SLinus Torvalds 	if (!tcon)
8801da177e4SLinus Torvalds 		goto out;
8811da177e4SLinus Torvalds 
8821da177e4SLinus Torvalds 	length = -EINVAL;
8831da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
884b77a493bSEric Paris 		goto out;
8851da177e4SLinus Torvalds 
8861da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
887b77a493bSEric Paris 	if (length)
888b77a493bSEric Paris 		goto out;
889b77a493bSEric Paris 
8901da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
891b77a493bSEric Paris 	if (length)
892b77a493bSEric Paris 		goto out;
8931da177e4SLinus Torvalds 
8941da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
895b77a493bSEric Paris 	if (length)
896b77a493bSEric Paris 		goto out;
8971da177e4SLinus Torvalds 
8981da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
899b77a493bSEric Paris 	if (length)
900b77a493bSEric Paris 		goto out;
9011da177e4SLinus Torvalds 
9021da177e4SLinus Torvalds 	length = -ERANGE;
903b77a493bSEric Paris 	if (len > SIMPLE_TRANSACTION_LIMIT)
904b77a493bSEric Paris 		goto out;
9051da177e4SLinus Torvalds 
9061da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
9071da177e4SLinus Torvalds 	length = len;
9081da177e4SLinus Torvalds out:
909b77a493bSEric Paris 	kfree(newcon);
910b77a493bSEric Paris 	kfree(tcon);
9111da177e4SLinus Torvalds 	kfree(scon);
9121da177e4SLinus Torvalds 	return length;
9131da177e4SLinus Torvalds }
9141da177e4SLinus Torvalds 
9151da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
9161da177e4SLinus Torvalds {
917b77a493bSEric Paris 	char *con = NULL, *user = NULL, *ptr;
918b77a493bSEric Paris 	u32 sid, *sids = NULL;
9191da177e4SLinus Torvalds 	ssize_t length;
9201da177e4SLinus Torvalds 	char *newcon;
9211da177e4SLinus Torvalds 	int i, rc;
9221da177e4SLinus Torvalds 	u32 len, nsids;
9231da177e4SLinus Torvalds 
9241da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
9251da177e4SLinus Torvalds 	if (length)
9266eab04a8SJustin P. Mattock 		goto out;
9271da177e4SLinus Torvalds 
9281da177e4SLinus Torvalds 	length = -ENOMEM;
92989d155efSJames Morris 	con = kzalloc(size + 1, GFP_KERNEL);
9301da177e4SLinus Torvalds 	if (!con)
9316eab04a8SJustin P. Mattock 		goto out;
9321da177e4SLinus Torvalds 
933b77a493bSEric Paris 	length = -ENOMEM;
93489d155efSJames Morris 	user = kzalloc(size + 1, GFP_KERNEL);
9351da177e4SLinus Torvalds 	if (!user)
9361da177e4SLinus Torvalds 		goto out;
9371da177e4SLinus Torvalds 
9381da177e4SLinus Torvalds 	length = -EINVAL;
9391da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
940b77a493bSEric Paris 		goto out;
9411da177e4SLinus Torvalds 
9421da177e4SLinus Torvalds 	length = security_context_to_sid(con, strlen(con) + 1, &sid);
943b77a493bSEric Paris 	if (length)
944b77a493bSEric Paris 		goto out;
9451da177e4SLinus Torvalds 
9461da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
947b77a493bSEric Paris 	if (length)
948b77a493bSEric Paris 		goto out;
9491da177e4SLinus Torvalds 
9501da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
9511da177e4SLinus Torvalds 	ptr = buf + length;
9521da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
9531da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
9541da177e4SLinus Torvalds 		if (rc) {
9551da177e4SLinus Torvalds 			length = rc;
956b77a493bSEric Paris 			goto out;
9571da177e4SLinus Torvalds 		}
9581da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
9591da177e4SLinus Torvalds 			kfree(newcon);
9601da177e4SLinus Torvalds 			length = -ERANGE;
961b77a493bSEric Paris 			goto out;
9621da177e4SLinus Torvalds 		}
9631da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
9641da177e4SLinus Torvalds 		kfree(newcon);
9651da177e4SLinus Torvalds 		ptr += len;
9661da177e4SLinus Torvalds 		length += len;
9671da177e4SLinus Torvalds 	}
9681da177e4SLinus Torvalds out:
969b77a493bSEric Paris 	kfree(sids);
970b77a493bSEric Paris 	kfree(user);
9711da177e4SLinus Torvalds 	kfree(con);
9721da177e4SLinus Torvalds 	return length;
9731da177e4SLinus Torvalds }
9741da177e4SLinus Torvalds 
9751da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
9761da177e4SLinus Torvalds {
977b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
9781da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
9791da177e4SLinus Torvalds 	u16 tclass;
9801da177e4SLinus Torvalds 	ssize_t length;
981b77a493bSEric Paris 	char *newcon = NULL;
9821da177e4SLinus Torvalds 	u32 len;
9831da177e4SLinus Torvalds 
9841da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
9851da177e4SLinus Torvalds 	if (length)
986b77a493bSEric Paris 		goto out;
9871da177e4SLinus Torvalds 
9881da177e4SLinus Torvalds 	length = -ENOMEM;
98989d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
9901da177e4SLinus Torvalds 	if (!scon)
9916eab04a8SJustin P. Mattock 		goto out;
9921da177e4SLinus Torvalds 
993b77a493bSEric Paris 	length = -ENOMEM;
99489d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
9951da177e4SLinus Torvalds 	if (!tcon)
9961da177e4SLinus Torvalds 		goto out;
9971da177e4SLinus Torvalds 
9981da177e4SLinus Torvalds 	length = -EINVAL;
9991da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
1000b77a493bSEric Paris 		goto out;
10011da177e4SLinus Torvalds 
10021da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
1003b77a493bSEric Paris 	if (length)
1004b77a493bSEric Paris 		goto out;
1005b77a493bSEric Paris 
10061da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
1007b77a493bSEric Paris 	if (length)
1008b77a493bSEric Paris 		goto out;
10091da177e4SLinus Torvalds 
10101da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
1011b77a493bSEric Paris 	if (length)
1012b77a493bSEric Paris 		goto out;
10131da177e4SLinus Torvalds 
10141da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
1015b77a493bSEric Paris 	if (length)
1016b77a493bSEric Paris 		goto out;
10171da177e4SLinus Torvalds 
1018b77a493bSEric Paris 	length = -ERANGE;
10191da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
1020744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
1021744ba35eSEric Paris 			"payload max\n", __func__, len);
1022b77a493bSEric Paris 		goto out;
10231da177e4SLinus Torvalds 	}
10241da177e4SLinus Torvalds 
10251da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
10261da177e4SLinus Torvalds 	length = len;
10271da177e4SLinus Torvalds out:
1028b77a493bSEric Paris 	kfree(newcon);
1029b77a493bSEric Paris 	kfree(tcon);
10301da177e4SLinus Torvalds 	kfree(scon);
10311da177e4SLinus Torvalds 	return length;
10321da177e4SLinus Torvalds }
10331da177e4SLinus Torvalds 
10341da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
10351da177e4SLinus Torvalds {
10361da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
10371da177e4SLinus Torvalds 
10381da177e4SLinus Torvalds 	if (ret) {
10391da177e4SLinus Torvalds 		ret->i_mode = mode;
10401da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
10411da177e4SLinus Torvalds 	}
10421da177e4SLinus Torvalds 	return ret;
10431da177e4SLinus Torvalds }
10441da177e4SLinus Torvalds 
10451da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
10461da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
10471da177e4SLinus Torvalds {
10481da177e4SLinus Torvalds 	char *page = NULL;
10491da177e4SLinus Torvalds 	ssize_t length;
10501da177e4SLinus Torvalds 	ssize_t ret;
10511da177e4SLinus Torvalds 	int cur_enforcing;
1052d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
1053d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
1054d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
10551da177e4SLinus Torvalds 
1056bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
10571da177e4SLinus Torvalds 
1058d313f948SStephen Smalley 	ret = -EINVAL;
1059b77a493bSEric Paris 	if (index >= bool_num || strcmp(name, bool_pending_names[index]))
1060d313f948SStephen Smalley 		goto out;
10611da177e4SLinus Torvalds 
10621da177e4SLinus Torvalds 	ret = -ENOMEM;
1063b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1064b77a493bSEric Paris 	if (!page)
10651da177e4SLinus Torvalds 		goto out;
10661da177e4SLinus Torvalds 
1067d313f948SStephen Smalley 	cur_enforcing = security_get_bool_value(index);
10681da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
10691da177e4SLinus Torvalds 		ret = cur_enforcing;
10701da177e4SLinus Torvalds 		goto out;
10711da177e4SLinus Torvalds 	}
10721da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
1073d313f948SStephen Smalley 			  bool_pending_values[index]);
107468bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
10751da177e4SLinus Torvalds out:
1076bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
10771da177e4SLinus Torvalds 	free_page((unsigned long)page);
10781da177e4SLinus Torvalds 	return ret;
10791da177e4SLinus Torvalds }
10801da177e4SLinus Torvalds 
10811da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
10821da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
10831da177e4SLinus Torvalds {
10841da177e4SLinus Torvalds 	char *page = NULL;
1085d313f948SStephen Smalley 	ssize_t length;
10861da177e4SLinus Torvalds 	int new_value;
1087d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
1088d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
1089d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
10901da177e4SLinus Torvalds 
1091bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
10921da177e4SLinus Torvalds 
10931da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
10941da177e4SLinus Torvalds 	if (length)
10951da177e4SLinus Torvalds 		goto out;
10961da177e4SLinus Torvalds 
1097d313f948SStephen Smalley 	length = -EINVAL;
1098b77a493bSEric Paris 	if (index >= bool_num || strcmp(name, bool_pending_names[index]))
1099d313f948SStephen Smalley 		goto out;
1100d313f948SStephen Smalley 
11011da177e4SLinus Torvalds 	length = -ENOMEM;
1102b77a493bSEric Paris 	if (count >= PAGE_SIZE)
11031da177e4SLinus Torvalds 		goto out;
1104d313f948SStephen Smalley 
11051da177e4SLinus Torvalds 	/* No partial writes. */
1106d313f948SStephen Smalley 	length = -EINVAL;
1107b77a493bSEric Paris 	if (*ppos != 0)
11081da177e4SLinus Torvalds 		goto out;
1109b77a493bSEric Paris 
11101da177e4SLinus Torvalds 	length = -ENOMEM;
1111b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1112b77a493bSEric Paris 	if (!page)
11131da177e4SLinus Torvalds 		goto out;
11141da177e4SLinus Torvalds 
1115d313f948SStephen Smalley 	length = -EFAULT;
11161da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
11171da177e4SLinus Torvalds 		goto out;
11181da177e4SLinus Torvalds 
11191da177e4SLinus Torvalds 	length = -EINVAL;
11201da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
11211da177e4SLinus Torvalds 		goto out;
11221da177e4SLinus Torvalds 
11231da177e4SLinus Torvalds 	if (new_value)
11241da177e4SLinus Torvalds 		new_value = 1;
11251da177e4SLinus Torvalds 
1126d313f948SStephen Smalley 	bool_pending_values[index] = new_value;
11271da177e4SLinus Torvalds 	length = count;
11281da177e4SLinus Torvalds 
11291da177e4SLinus Torvalds out:
1130bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
11311da177e4SLinus Torvalds 	free_page((unsigned long) page);
11321da177e4SLinus Torvalds 	return length;
11331da177e4SLinus Torvalds }
11341da177e4SLinus Torvalds 
11359c2e08c5SArjan van de Ven static const struct file_operations sel_bool_ops = {
11361da177e4SLinus Torvalds 	.read		= sel_read_bool,
11371da177e4SLinus Torvalds 	.write		= sel_write_bool,
113857a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
11391da177e4SLinus Torvalds };
11401da177e4SLinus Torvalds 
11411da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
11421da177e4SLinus Torvalds 				      const char __user *buf,
11431da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
11441da177e4SLinus Torvalds {
11451da177e4SLinus Torvalds 	char *page = NULL;
1146d313f948SStephen Smalley 	ssize_t length;
11471da177e4SLinus Torvalds 	int new_value;
11481da177e4SLinus Torvalds 
1149bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
11501da177e4SLinus Torvalds 
11511da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
11521da177e4SLinus Torvalds 	if (length)
11531da177e4SLinus Torvalds 		goto out;
11541da177e4SLinus Torvalds 
11551da177e4SLinus Torvalds 	length = -ENOMEM;
1156b77a493bSEric Paris 	if (count >= PAGE_SIZE)
11571da177e4SLinus Torvalds 		goto out;
1158b77a493bSEric Paris 
11591da177e4SLinus Torvalds 	/* No partial writes. */
1160b77a493bSEric Paris 	length = -EINVAL;
1161b77a493bSEric Paris 	if (*ppos != 0)
11621da177e4SLinus Torvalds 		goto out;
1163b77a493bSEric Paris 
11641da177e4SLinus Torvalds 	length = -ENOMEM;
1165b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1166b77a493bSEric Paris 	if (!page)
11671da177e4SLinus Torvalds 		goto out;
11681da177e4SLinus Torvalds 
1169d313f948SStephen Smalley 	length = -EFAULT;
11701da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
11711da177e4SLinus Torvalds 		goto out;
11721da177e4SLinus Torvalds 
11731da177e4SLinus Torvalds 	length = -EINVAL;
11741da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
11751da177e4SLinus Torvalds 		goto out;
11761da177e4SLinus Torvalds 
1177b77a493bSEric Paris 	length = 0;
11781872981bSEric Paris 	if (new_value && bool_pending_values)
1179b77a493bSEric Paris 		length = security_set_bools(bool_num, bool_pending_values);
11801da177e4SLinus Torvalds 
1181b77a493bSEric Paris 	if (!length)
11821da177e4SLinus Torvalds 		length = count;
11831da177e4SLinus Torvalds 
11841da177e4SLinus Torvalds out:
1185bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
11861da177e4SLinus Torvalds 	free_page((unsigned long) page);
11871da177e4SLinus Torvalds 	return length;
11881da177e4SLinus Torvalds }
11891da177e4SLinus Torvalds 
11909c2e08c5SArjan van de Ven static const struct file_operations sel_commit_bools_ops = {
11911da177e4SLinus Torvalds 	.write		= sel_commit_bools_write,
119257a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
11931da177e4SLinus Torvalds };
11941da177e4SLinus Torvalds 
11950c92d7c7SChristopher J. PeBenito static void sel_remove_entries(struct dentry *de)
11961da177e4SLinus Torvalds {
11970955dc03SStephen Smalley 	struct list_head *node;
11981da177e4SLinus Torvalds 
11992fd6b7f5SNick Piggin 	spin_lock(&de->d_lock);
12001da177e4SLinus Torvalds 	node = de->d_subdirs.next;
12011da177e4SLinus Torvalds 	while (node != &de->d_subdirs) {
12025160ee6fSEric Dumazet 		struct dentry *d = list_entry(node, struct dentry, d_u.d_child);
12032fd6b7f5SNick Piggin 
12042fd6b7f5SNick Piggin 		spin_lock_nested(&d->d_lock, DENTRY_D_LOCK_NESTED);
12051da177e4SLinus Torvalds 		list_del_init(node);
12061da177e4SLinus Torvalds 
12071da177e4SLinus Torvalds 		if (d->d_inode) {
1208dc0474beSNick Piggin 			dget_dlock(d);
12092fd6b7f5SNick Piggin 			spin_unlock(&de->d_lock);
12102fd6b7f5SNick Piggin 			spin_unlock(&d->d_lock);
12111da177e4SLinus Torvalds 			d_delete(d);
12121da177e4SLinus Torvalds 			simple_unlink(de->d_inode, d);
12131da177e4SLinus Torvalds 			dput(d);
12142fd6b7f5SNick Piggin 			spin_lock(&de->d_lock);
12152fd6b7f5SNick Piggin 		} else
12162fd6b7f5SNick Piggin 			spin_unlock(&d->d_lock);
12171da177e4SLinus Torvalds 		node = de->d_subdirs.next;
12181da177e4SLinus Torvalds 	}
12191da177e4SLinus Torvalds 
12202fd6b7f5SNick Piggin 	spin_unlock(&de->d_lock);
12211da177e4SLinus Torvalds }
12221da177e4SLinus Torvalds 
12231da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
12241da177e4SLinus Torvalds 
12251da177e4SLinus Torvalds static int sel_make_bools(void)
12261da177e4SLinus Torvalds {
1227b77a493bSEric Paris 	int i, ret;
12281da177e4SLinus Torvalds 	ssize_t len;
12291da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
12301da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
12311da177e4SLinus Torvalds 	struct inode *inode = NULL;
12321da177e4SLinus Torvalds 	struct inode_security_struct *isec;
12331da177e4SLinus Torvalds 	char **names = NULL, *page;
12341da177e4SLinus Torvalds 	int num;
12351da177e4SLinus Torvalds 	int *values = NULL;
12361da177e4SLinus Torvalds 	u32 sid;
12371da177e4SLinus Torvalds 
12381da177e4SLinus Torvalds 	/* remove any existing files */
12398007f102SXiaotian Feng 	for (i = 0; i < bool_num; i++)
12408007f102SXiaotian Feng 		kfree(bool_pending_names[i]);
1241d313f948SStephen Smalley 	kfree(bool_pending_names);
12421da177e4SLinus Torvalds 	kfree(bool_pending_values);
1243d313f948SStephen Smalley 	bool_pending_names = NULL;
124420c19e41SDavi Arnaut 	bool_pending_values = NULL;
12451da177e4SLinus Torvalds 
12460c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
12471da177e4SLinus Torvalds 
1248b77a493bSEric Paris 	ret = -ENOMEM;
12491872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
12501872981bSEric Paris 	if (!page)
1251b77a493bSEric Paris 		goto out;
12521da177e4SLinus Torvalds 
12531da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
1254b77a493bSEric Paris 	if (ret)
12551da177e4SLinus Torvalds 		goto out;
12561da177e4SLinus Torvalds 
12571da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
1258b77a493bSEric Paris 		ret = -ENOMEM;
12591da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
1260b77a493bSEric Paris 		if (!dentry)
1261b77a493bSEric Paris 			goto out;
12621da177e4SLinus Torvalds 
1263b77a493bSEric Paris 		ret = -ENOMEM;
1264b77a493bSEric Paris 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
1265b77a493bSEric Paris 		if (!inode)
1266b77a493bSEric Paris 			goto out;
1267b77a493bSEric Paris 
12681da177e4SLinus Torvalds 		ret = -EINVAL;
1269b77a493bSEric Paris 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
1270b77a493bSEric Paris 		if (len < 0)
1271b77a493bSEric Paris 			goto out;
1272b77a493bSEric Paris 
12731da177e4SLinus Torvalds 		ret = -ENAMETOOLONG;
1274b77a493bSEric Paris 		if (len >= PAGE_SIZE)
1275b77a493bSEric Paris 			goto out;
1276b77a493bSEric Paris 
12771da177e4SLinus Torvalds 		isec = (struct inode_security_struct *)inode->i_security;
12781872981bSEric Paris 		ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
12791872981bSEric Paris 		if (ret)
1280b77a493bSEric Paris 			goto out;
1281b77a493bSEric Paris 
12821da177e4SLinus Torvalds 		isec->sid = sid;
12831da177e4SLinus Torvalds 		isec->initialized = 1;
12841da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
1285bce34bc0SJames Carter 		inode->i_ino = i|SEL_BOOL_INO_OFFSET;
12861da177e4SLinus Torvalds 		d_add(dentry, inode);
12871da177e4SLinus Torvalds 	}
12881da177e4SLinus Torvalds 	bool_num = num;
1289d313f948SStephen Smalley 	bool_pending_names = names;
12901da177e4SLinus Torvalds 	bool_pending_values = values;
1291b77a493bSEric Paris 
1292b77a493bSEric Paris 	free_page((unsigned long)page);
1293b77a493bSEric Paris 	return 0;
12941da177e4SLinus Torvalds out:
12951da177e4SLinus Torvalds 	free_page((unsigned long)page);
1296b77a493bSEric Paris 
12971da177e4SLinus Torvalds 	if (names) {
12989a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
12991da177e4SLinus Torvalds 			kfree(names[i]);
13001da177e4SLinus Torvalds 		kfree(names);
13011da177e4SLinus Torvalds 	}
130220c19e41SDavi Arnaut 	kfree(values);
13030c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
1304b77a493bSEric Paris 
1305b77a493bSEric Paris 	return ret;
13061da177e4SLinus Torvalds }
13071da177e4SLinus Torvalds 
13081da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
13091da177e4SLinus Torvalds 
13101872981bSEric Paris struct dentry *selinux_null;
13111da177e4SLinus Torvalds 
13121da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
13131da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
13141da177e4SLinus Torvalds {
13151da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
13161da177e4SLinus Torvalds 	ssize_t length;
13171da177e4SLinus Torvalds 
13181da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
13191da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
13201da177e4SLinus Torvalds }
13211da177e4SLinus Torvalds 
13221da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file *file,
13231da177e4SLinus Torvalds 					     const char __user *buf,
13241da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
13251da177e4SLinus Torvalds 
13261da177e4SLinus Torvalds {
1327b77a493bSEric Paris 	char *page = NULL;
13281da177e4SLinus Torvalds 	ssize_t ret;
13291da177e4SLinus Torvalds 	int new_value;
13301da177e4SLinus Torvalds 
13311da177e4SLinus Torvalds 	ret = task_has_security(current, SECURITY__SETSECPARAM);
13321da177e4SLinus Torvalds 	if (ret)
1333b77a493bSEric Paris 		goto out;
1334b77a493bSEric Paris 
1335b77a493bSEric Paris 	ret = -ENOMEM;
1336b77a493bSEric Paris 	if (count >= PAGE_SIZE)
1337b77a493bSEric Paris 		goto out;
1338b77a493bSEric Paris 
1339b77a493bSEric Paris 	/* No partial writes. */
1340b77a493bSEric Paris 	ret = -EINVAL;
1341b77a493bSEric Paris 	if (*ppos != 0)
1342b77a493bSEric Paris 		goto out;
1343b77a493bSEric Paris 
1344b77a493bSEric Paris 	ret = -ENOMEM;
1345b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1346b77a493bSEric Paris 	if (!page)
1347b77a493bSEric Paris 		goto out;
1348b77a493bSEric Paris 
1349b77a493bSEric Paris 	ret = -EFAULT;
1350b77a493bSEric Paris 	if (copy_from_user(page, buf, count))
1351b77a493bSEric Paris 		goto out;
1352b77a493bSEric Paris 
1353b77a493bSEric Paris 	ret = -EINVAL;
1354b77a493bSEric Paris 	if (sscanf(page, "%u", &new_value) != 1)
1355b77a493bSEric Paris 		goto out;
1356b77a493bSEric Paris 
13571da177e4SLinus Torvalds 	avc_cache_threshold = new_value;
1358b77a493bSEric Paris 
13591da177e4SLinus Torvalds 	ret = count;
13601da177e4SLinus Torvalds out:
1361b77a493bSEric Paris 	free_page((unsigned long)page);
13621da177e4SLinus Torvalds 	return ret;
13631da177e4SLinus Torvalds }
13641da177e4SLinus Torvalds 
13651da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
13661da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
13671da177e4SLinus Torvalds {
13681da177e4SLinus Torvalds 	char *page;
1369b77a493bSEric Paris 	ssize_t length;
13701da177e4SLinus Torvalds 
13711da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
1372b77a493bSEric Paris 	if (!page)
1373b77a493bSEric Paris 		return -ENOMEM;
1374b77a493bSEric Paris 
1375b77a493bSEric Paris 	length = avc_get_hash_stats(page);
1376b77a493bSEric Paris 	if (length >= 0)
1377b77a493bSEric Paris 		length = simple_read_from_buffer(buf, count, ppos, page, length);
13781da177e4SLinus Torvalds 	free_page((unsigned long)page);
1379b77a493bSEric Paris 
1380b77a493bSEric Paris 	return length;
13811da177e4SLinus Torvalds }
13821da177e4SLinus Torvalds 
13839c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_threshold_ops = {
13841da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
13851da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
138657a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
13871da177e4SLinus Torvalds };
13881da177e4SLinus Torvalds 
13899c2e08c5SArjan van de Ven static const struct file_operations sel_avc_hash_stats_ops = {
13901da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
139157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
13921da177e4SLinus Torvalds };
13931da177e4SLinus Torvalds 
13941da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
13951da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
13961da177e4SLinus Torvalds {
13971da177e4SLinus Torvalds 	int cpu;
13981da177e4SLinus Torvalds 
13994f4b6c1aSRusty Russell 	for (cpu = *idx; cpu < nr_cpu_ids; ++cpu) {
14001da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
14011da177e4SLinus Torvalds 			continue;
14021da177e4SLinus Torvalds 		*idx = cpu + 1;
14031da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
14041da177e4SLinus Torvalds 	}
14051da177e4SLinus Torvalds 	return NULL;
14061da177e4SLinus Torvalds }
14071da177e4SLinus Torvalds 
14081da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
14091da177e4SLinus Torvalds {
14101da177e4SLinus Torvalds 	loff_t n = *pos - 1;
14111da177e4SLinus Torvalds 
14121da177e4SLinus Torvalds 	if (*pos == 0)
14131da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
14141da177e4SLinus Torvalds 
14151da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
14161da177e4SLinus Torvalds }
14171da177e4SLinus Torvalds 
14181da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
14191da177e4SLinus Torvalds {
14201da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
14211da177e4SLinus Torvalds }
14221da177e4SLinus Torvalds 
14231da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
14241da177e4SLinus Torvalds {
14251da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
14261da177e4SLinus Torvalds 
14271da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
14281da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
14291da177e4SLinus Torvalds 			   "frees\n");
1430257313b2SLinus Torvalds 	else {
1431257313b2SLinus Torvalds 		unsigned int lookups = st->lookups;
1432257313b2SLinus Torvalds 		unsigned int misses = st->misses;
1433257313b2SLinus Torvalds 		unsigned int hits = lookups - misses;
1434257313b2SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", lookups,
1435257313b2SLinus Torvalds 			   hits, misses, st->allocations,
14361da177e4SLinus Torvalds 			   st->reclaims, st->frees);
1437257313b2SLinus Torvalds 	}
14381da177e4SLinus Torvalds 	return 0;
14391da177e4SLinus Torvalds }
14401da177e4SLinus Torvalds 
14411da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
14421da177e4SLinus Torvalds { }
14431da177e4SLinus Torvalds 
14441996a109SJan Engelhardt static const struct seq_operations sel_avc_cache_stats_seq_ops = {
14451da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
14461da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
14471da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
14481da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
14491da177e4SLinus Torvalds };
14501da177e4SLinus Torvalds 
14511da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
14521da177e4SLinus Torvalds {
14531da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
14541da177e4SLinus Torvalds }
14551da177e4SLinus Torvalds 
14569c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_stats_ops = {
14571da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
14581da177e4SLinus Torvalds 	.read		= seq_read,
14591da177e4SLinus Torvalds 	.llseek		= seq_lseek,
14601da177e4SLinus Torvalds 	.release	= seq_release,
14611da177e4SLinus Torvalds };
14621da177e4SLinus Torvalds #endif
14631da177e4SLinus Torvalds 
14641da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
14651da177e4SLinus Torvalds {
1466b77a493bSEric Paris 	int i;
14671da177e4SLinus Torvalds 	static struct tree_descr files[] = {
14681da177e4SLinus Torvalds 		{ "cache_threshold",
14691da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
14701da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
14711da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
14721da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
14731da177e4SLinus Torvalds #endif
14741da177e4SLinus Torvalds 	};
14751da177e4SLinus Torvalds 
14766e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
14771da177e4SLinus Torvalds 		struct inode *inode;
14781da177e4SLinus Torvalds 		struct dentry *dentry;
14791da177e4SLinus Torvalds 
14801da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
1481b77a493bSEric Paris 		if (!dentry)
1482b77a493bSEric Paris 			return -ENOMEM;
14831da177e4SLinus Torvalds 
14841da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
1485b77a493bSEric Paris 		if (!inode)
1486b77a493bSEric Paris 			return -ENOMEM;
1487b77a493bSEric Paris 
14881da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
14896174eafcSJames Carter 		inode->i_ino = ++sel_last_ino;
14901da177e4SLinus Torvalds 		d_add(dentry, inode);
14911da177e4SLinus Torvalds 	}
1492b77a493bSEric Paris 
1493b77a493bSEric Paris 	return 0;
14941da177e4SLinus Torvalds }
14951da177e4SLinus Torvalds 
1496f0ee2e46SJames Carter static ssize_t sel_read_initcon(struct file *file, char __user *buf,
1497f0ee2e46SJames Carter 				size_t count, loff_t *ppos)
1498f0ee2e46SJames Carter {
1499f0ee2e46SJames Carter 	struct inode *inode;
1500f0ee2e46SJames Carter 	char *con;
1501f0ee2e46SJames Carter 	u32 sid, len;
1502f0ee2e46SJames Carter 	ssize_t ret;
1503f0ee2e46SJames Carter 
1504f0ee2e46SJames Carter 	inode = file->f_path.dentry->d_inode;
1505f0ee2e46SJames Carter 	sid = inode->i_ino&SEL_INO_MASK;
1506f0ee2e46SJames Carter 	ret = security_sid_to_context(sid, &con, &len);
1507b77a493bSEric Paris 	if (ret)
1508f0ee2e46SJames Carter 		return ret;
1509f0ee2e46SJames Carter 
1510f0ee2e46SJames Carter 	ret = simple_read_from_buffer(buf, count, ppos, con, len);
1511f0ee2e46SJames Carter 	kfree(con);
1512f0ee2e46SJames Carter 	return ret;
1513f0ee2e46SJames Carter }
1514f0ee2e46SJames Carter 
1515f0ee2e46SJames Carter static const struct file_operations sel_initcon_ops = {
1516f0ee2e46SJames Carter 	.read		= sel_read_initcon,
151757a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1518f0ee2e46SJames Carter };
1519f0ee2e46SJames Carter 
1520f0ee2e46SJames Carter static int sel_make_initcon_files(struct dentry *dir)
1521f0ee2e46SJames Carter {
1522b77a493bSEric Paris 	int i;
1523f0ee2e46SJames Carter 
1524f0ee2e46SJames Carter 	for (i = 1; i <= SECINITSID_NUM; i++) {
1525f0ee2e46SJames Carter 		struct inode *inode;
1526f0ee2e46SJames Carter 		struct dentry *dentry;
1527f0ee2e46SJames Carter 		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
1528b77a493bSEric Paris 		if (!dentry)
1529b77a493bSEric Paris 			return -ENOMEM;
1530f0ee2e46SJames Carter 
1531f0ee2e46SJames Carter 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1532b77a493bSEric Paris 		if (!inode)
1533b77a493bSEric Paris 			return -ENOMEM;
1534b77a493bSEric Paris 
1535f0ee2e46SJames Carter 		inode->i_fop = &sel_initcon_ops;
1536f0ee2e46SJames Carter 		inode->i_ino = i|SEL_INITCON_INO_OFFSET;
1537f0ee2e46SJames Carter 		d_add(dentry, inode);
1538f0ee2e46SJames Carter 	}
1539b77a493bSEric Paris 
1540b77a493bSEric Paris 	return 0;
1541f0ee2e46SJames Carter }
1542f0ee2e46SJames Carter 
1543e47c8fc5SChristopher J. PeBenito static inline unsigned int sel_div(unsigned long a, unsigned long b)
1544e47c8fc5SChristopher J. PeBenito {
1545e47c8fc5SChristopher J. PeBenito 	return a / b - (a % b < 0);
1546e47c8fc5SChristopher J. PeBenito }
1547e47c8fc5SChristopher J. PeBenito 
1548e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_class_to_ino(u16 class)
1549e47c8fc5SChristopher J. PeBenito {
1550e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1)) | SEL_CLASS_INO_OFFSET;
1551e47c8fc5SChristopher J. PeBenito }
1552e47c8fc5SChristopher J. PeBenito 
1553e47c8fc5SChristopher J. PeBenito static inline u16 sel_ino_to_class(unsigned long ino)
1554e47c8fc5SChristopher J. PeBenito {
1555e47c8fc5SChristopher J. PeBenito 	return sel_div(ino & SEL_INO_MASK, SEL_VEC_MAX + 1);
1556e47c8fc5SChristopher J. PeBenito }
1557e47c8fc5SChristopher J. PeBenito 
1558e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_perm_to_ino(u16 class, u32 perm)
1559e47c8fc5SChristopher J. PeBenito {
1560e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET;
1561e47c8fc5SChristopher J. PeBenito }
1562e47c8fc5SChristopher J. PeBenito 
1563e47c8fc5SChristopher J. PeBenito static inline u32 sel_ino_to_perm(unsigned long ino)
1564e47c8fc5SChristopher J. PeBenito {
1565e47c8fc5SChristopher J. PeBenito 	return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1);
1566e47c8fc5SChristopher J. PeBenito }
1567e47c8fc5SChristopher J. PeBenito 
1568e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_class(struct file *file, char __user *buf,
1569e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1570e47c8fc5SChristopher J. PeBenito {
1571e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1572e47c8fc5SChristopher J. PeBenito 	char *page;
1573e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1574e47c8fc5SChristopher J. PeBenito 
1575e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1576b77a493bSEric Paris 	if (!page)
1577b77a493bSEric Paris 		return -ENOMEM;
1578e47c8fc5SChristopher J. PeBenito 
1579e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_class(ino));
1580e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1581e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1582b77a493bSEric Paris 
1583e47c8fc5SChristopher J. PeBenito 	return rc;
1584e47c8fc5SChristopher J. PeBenito }
1585e47c8fc5SChristopher J. PeBenito 
1586e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_class_ops = {
1587e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_class,
158857a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1589e47c8fc5SChristopher J. PeBenito };
1590e47c8fc5SChristopher J. PeBenito 
1591e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_perm(struct file *file, char __user *buf,
1592e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1593e47c8fc5SChristopher J. PeBenito {
1594e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1595e47c8fc5SChristopher J. PeBenito 	char *page;
1596e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1597e47c8fc5SChristopher J. PeBenito 
1598e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1599b77a493bSEric Paris 	if (!page)
1600b77a493bSEric Paris 		return -ENOMEM;
1601e47c8fc5SChristopher J. PeBenito 
1602e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_perm(ino));
1603e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1604e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1605b77a493bSEric Paris 
1606e47c8fc5SChristopher J. PeBenito 	return rc;
1607e47c8fc5SChristopher J. PeBenito }
1608e47c8fc5SChristopher J. PeBenito 
1609e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_perm_ops = {
1610e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_perm,
161157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1612e47c8fc5SChristopher J. PeBenito };
1613e47c8fc5SChristopher J. PeBenito 
16143bb56b25SPaul Moore static ssize_t sel_read_policycap(struct file *file, char __user *buf,
16153bb56b25SPaul Moore 				  size_t count, loff_t *ppos)
16163bb56b25SPaul Moore {
16173bb56b25SPaul Moore 	int value;
16183bb56b25SPaul Moore 	char tmpbuf[TMPBUFLEN];
16193bb56b25SPaul Moore 	ssize_t length;
16203bb56b25SPaul Moore 	unsigned long i_ino = file->f_path.dentry->d_inode->i_ino;
16213bb56b25SPaul Moore 
16223bb56b25SPaul Moore 	value = security_policycap_supported(i_ino & SEL_INO_MASK);
16233bb56b25SPaul Moore 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
16243bb56b25SPaul Moore 
16253bb56b25SPaul Moore 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
16263bb56b25SPaul Moore }
16273bb56b25SPaul Moore 
16283bb56b25SPaul Moore static const struct file_operations sel_policycap_ops = {
16293bb56b25SPaul Moore 	.read		= sel_read_policycap,
163057a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
16313bb56b25SPaul Moore };
16323bb56b25SPaul Moore 
1633e47c8fc5SChristopher J. PeBenito static int sel_make_perm_files(char *objclass, int classvalue,
1634e47c8fc5SChristopher J. PeBenito 				struct dentry *dir)
1635e47c8fc5SChristopher J. PeBenito {
1636b77a493bSEric Paris 	int i, rc, nperms;
1637e47c8fc5SChristopher J. PeBenito 	char **perms;
1638e47c8fc5SChristopher J. PeBenito 
1639e47c8fc5SChristopher J. PeBenito 	rc = security_get_permissions(objclass, &perms, &nperms);
1640e47c8fc5SChristopher J. PeBenito 	if (rc)
1641b77a493bSEric Paris 		return rc;
1642e47c8fc5SChristopher J. PeBenito 
1643e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++) {
1644e47c8fc5SChristopher J. PeBenito 		struct inode *inode;
1645e47c8fc5SChristopher J. PeBenito 		struct dentry *dentry;
1646e47c8fc5SChristopher J. PeBenito 
1647b77a493bSEric Paris 		rc = -ENOMEM;
1648e47c8fc5SChristopher J. PeBenito 		dentry = d_alloc_name(dir, perms[i]);
1649b77a493bSEric Paris 		if (!dentry)
1650b77a493bSEric Paris 			goto out;
1651e47c8fc5SChristopher J. PeBenito 
1652e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1653b77a493bSEric Paris 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1654b77a493bSEric Paris 		if (!inode)
1655b77a493bSEric Paris 			goto out;
1656b77a493bSEric Paris 
1657e47c8fc5SChristopher J. PeBenito 		inode->i_fop = &sel_perm_ops;
1658e47c8fc5SChristopher J. PeBenito 		/* i+1 since perm values are 1-indexed */
1659e47c8fc5SChristopher J. PeBenito 		inode->i_ino = sel_perm_to_ino(classvalue, i + 1);
1660e47c8fc5SChristopher J. PeBenito 		d_add(dentry, inode);
1661e47c8fc5SChristopher J. PeBenito 	}
1662b77a493bSEric Paris 	rc = 0;
1663b77a493bSEric Paris out:
1664e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++)
1665e47c8fc5SChristopher J. PeBenito 		kfree(perms[i]);
1666e47c8fc5SChristopher J. PeBenito 	kfree(perms);
1667e47c8fc5SChristopher J. PeBenito 	return rc;
1668e47c8fc5SChristopher J. PeBenito }
1669e47c8fc5SChristopher J. PeBenito 
1670e47c8fc5SChristopher J. PeBenito static int sel_make_class_dir_entries(char *classname, int index,
1671e47c8fc5SChristopher J. PeBenito 					struct dentry *dir)
1672e47c8fc5SChristopher J. PeBenito {
1673e47c8fc5SChristopher J. PeBenito 	struct dentry *dentry = NULL;
1674e47c8fc5SChristopher J. PeBenito 	struct inode *inode = NULL;
1675e47c8fc5SChristopher J. PeBenito 	int rc;
1676e47c8fc5SChristopher J. PeBenito 
1677e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "index");
1678b77a493bSEric Paris 	if (!dentry)
1679b77a493bSEric Paris 		return -ENOMEM;
1680e47c8fc5SChristopher J. PeBenito 
1681e47c8fc5SChristopher J. PeBenito 	inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1682b77a493bSEric Paris 	if (!inode)
1683b77a493bSEric Paris 		return -ENOMEM;
1684e47c8fc5SChristopher J. PeBenito 
1685e47c8fc5SChristopher J. PeBenito 	inode->i_fop = &sel_class_ops;
1686e47c8fc5SChristopher J. PeBenito 	inode->i_ino = sel_class_to_ino(index);
1687e47c8fc5SChristopher J. PeBenito 	d_add(dentry, inode);
1688e47c8fc5SChristopher J. PeBenito 
1689e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "perms");
1690b77a493bSEric Paris 	if (!dentry)
1691b77a493bSEric Paris 		return -ENOMEM;
1692e47c8fc5SChristopher J. PeBenito 
1693e47c8fc5SChristopher J. PeBenito 	rc = sel_make_dir(dir->d_inode, dentry, &last_class_ino);
1694e47c8fc5SChristopher J. PeBenito 	if (rc)
1695b77a493bSEric Paris 		return rc;
1696e47c8fc5SChristopher J. PeBenito 
1697e47c8fc5SChristopher J. PeBenito 	rc = sel_make_perm_files(classname, index, dentry);
1698e47c8fc5SChristopher J. PeBenito 
1699e47c8fc5SChristopher J. PeBenito 	return rc;
1700e47c8fc5SChristopher J. PeBenito }
1701e47c8fc5SChristopher J. PeBenito 
1702e47c8fc5SChristopher J. PeBenito static void sel_remove_classes(void)
1703e47c8fc5SChristopher J. PeBenito {
1704e47c8fc5SChristopher J. PeBenito 	struct list_head *class_node;
1705e47c8fc5SChristopher J. PeBenito 
1706e47c8fc5SChristopher J. PeBenito 	list_for_each(class_node, &class_dir->d_subdirs) {
1707e47c8fc5SChristopher J. PeBenito 		struct dentry *class_subdir = list_entry(class_node,
1708e47c8fc5SChristopher J. PeBenito 					struct dentry, d_u.d_child);
1709e47c8fc5SChristopher J. PeBenito 		struct list_head *class_subdir_node;
1710e47c8fc5SChristopher J. PeBenito 
1711e47c8fc5SChristopher J. PeBenito 		list_for_each(class_subdir_node, &class_subdir->d_subdirs) {
1712e47c8fc5SChristopher J. PeBenito 			struct dentry *d = list_entry(class_subdir_node,
1713e47c8fc5SChristopher J. PeBenito 						struct dentry, d_u.d_child);
1714e47c8fc5SChristopher J. PeBenito 
1715e47c8fc5SChristopher J. PeBenito 			if (d->d_inode)
1716e47c8fc5SChristopher J. PeBenito 				if (d->d_inode->i_mode & S_IFDIR)
1717e47c8fc5SChristopher J. PeBenito 					sel_remove_entries(d);
1718e47c8fc5SChristopher J. PeBenito 		}
1719e47c8fc5SChristopher J. PeBenito 
1720e47c8fc5SChristopher J. PeBenito 		sel_remove_entries(class_subdir);
1721e47c8fc5SChristopher J. PeBenito 	}
1722e47c8fc5SChristopher J. PeBenito 
1723e47c8fc5SChristopher J. PeBenito 	sel_remove_entries(class_dir);
1724e47c8fc5SChristopher J. PeBenito }
1725e47c8fc5SChristopher J. PeBenito 
1726e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void)
1727e47c8fc5SChristopher J. PeBenito {
1728b77a493bSEric Paris 	int rc, nclasses, i;
1729e47c8fc5SChristopher J. PeBenito 	char **classes;
1730e47c8fc5SChristopher J. PeBenito 
1731e47c8fc5SChristopher J. PeBenito 	/* delete any existing entries */
1732e47c8fc5SChristopher J. PeBenito 	sel_remove_classes();
1733e47c8fc5SChristopher J. PeBenito 
1734e47c8fc5SChristopher J. PeBenito 	rc = security_get_classes(&classes, &nclasses);
1735b77a493bSEric Paris 	if (rc)
1736b77a493bSEric Paris 		return rc;
1737e47c8fc5SChristopher J. PeBenito 
1738e47c8fc5SChristopher J. PeBenito 	/* +2 since classes are 1-indexed */
1739e47c8fc5SChristopher J. PeBenito 	last_class_ino = sel_class_to_ino(nclasses + 2);
1740e47c8fc5SChristopher J. PeBenito 
1741e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++) {
1742e47c8fc5SChristopher J. PeBenito 		struct dentry *class_name_dir;
1743e47c8fc5SChristopher J. PeBenito 
1744e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1745b77a493bSEric Paris 		class_name_dir = d_alloc_name(class_dir, classes[i]);
1746b77a493bSEric Paris 		if (!class_name_dir)
1747b77a493bSEric Paris 			goto out;
1748e47c8fc5SChristopher J. PeBenito 
1749e47c8fc5SChristopher J. PeBenito 		rc = sel_make_dir(class_dir->d_inode, class_name_dir,
1750e47c8fc5SChristopher J. PeBenito 				&last_class_ino);
1751e47c8fc5SChristopher J. PeBenito 		if (rc)
1752b77a493bSEric Paris 			goto out;
1753e47c8fc5SChristopher J. PeBenito 
1754e47c8fc5SChristopher J. PeBenito 		/* i+1 since class values are 1-indexed */
1755e47c8fc5SChristopher J. PeBenito 		rc = sel_make_class_dir_entries(classes[i], i + 1,
1756e47c8fc5SChristopher J. PeBenito 				class_name_dir);
1757e47c8fc5SChristopher J. PeBenito 		if (rc)
1758b77a493bSEric Paris 			goto out;
1759e47c8fc5SChristopher J. PeBenito 	}
1760b77a493bSEric Paris 	rc = 0;
1761b77a493bSEric Paris out:
1762e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++)
1763e47c8fc5SChristopher J. PeBenito 		kfree(classes[i]);
1764e47c8fc5SChristopher J. PeBenito 	kfree(classes);
1765e47c8fc5SChristopher J. PeBenito 	return rc;
1766e47c8fc5SChristopher J. PeBenito }
1767e47c8fc5SChristopher J. PeBenito 
17683bb56b25SPaul Moore static int sel_make_policycap(void)
17693bb56b25SPaul Moore {
17703bb56b25SPaul Moore 	unsigned int iter;
17713bb56b25SPaul Moore 	struct dentry *dentry = NULL;
17723bb56b25SPaul Moore 	struct inode *inode = NULL;
17733bb56b25SPaul Moore 
17743bb56b25SPaul Moore 	sel_remove_entries(policycap_dir);
17753bb56b25SPaul Moore 
17763bb56b25SPaul Moore 	for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
17773bb56b25SPaul Moore 		if (iter < ARRAY_SIZE(policycap_names))
17783bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir,
17793bb56b25SPaul Moore 					      policycap_names[iter]);
17803bb56b25SPaul Moore 		else
17813bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir, "unknown");
17823bb56b25SPaul Moore 
17833bb56b25SPaul Moore 		if (dentry == NULL)
17843bb56b25SPaul Moore 			return -ENOMEM;
17853bb56b25SPaul Moore 
17863bb56b25SPaul Moore 		inode = sel_make_inode(policycap_dir->d_sb, S_IFREG | S_IRUGO);
17873bb56b25SPaul Moore 		if (inode == NULL)
17883bb56b25SPaul Moore 			return -ENOMEM;
17893bb56b25SPaul Moore 
17903bb56b25SPaul Moore 		inode->i_fop = &sel_policycap_ops;
17913bb56b25SPaul Moore 		inode->i_ino = iter | SEL_POLICYCAP_INO_OFFSET;
17923bb56b25SPaul Moore 		d_add(dentry, inode);
17933bb56b25SPaul Moore 	}
17943bb56b25SPaul Moore 
17953bb56b25SPaul Moore 	return 0;
17963bb56b25SPaul Moore }
17973bb56b25SPaul Moore 
17980dd4ae51SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
17990dd4ae51SChristopher J. PeBenito 			unsigned long *ino)
18001da177e4SLinus Torvalds {
18011da177e4SLinus Torvalds 	struct inode *inode;
18021da177e4SLinus Torvalds 
1803edb20fb5SJames Morris 	inode = sel_make_inode(dir->i_sb, S_IFDIR | S_IRUGO | S_IXUGO);
1804b77a493bSEric Paris 	if (!inode)
1805b77a493bSEric Paris 		return -ENOMEM;
1806b77a493bSEric Paris 
18071da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
18081da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
18090dd4ae51SChristopher J. PeBenito 	inode->i_ino = ++(*ino);
181040e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
1811d8c76e6fSDave Hansen 	inc_nlink(inode);
18121da177e4SLinus Torvalds 	d_add(dentry, inode);
1813edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1814d8c76e6fSDave Hansen 	inc_nlink(dir);
1815b77a493bSEric Paris 
1816b77a493bSEric Paris 	return 0;
18171da177e4SLinus Torvalds }
18181da177e4SLinus Torvalds 
18191da177e4SLinus Torvalds static int sel_fill_super(struct super_block *sb, void *data, int silent)
18201da177e4SLinus Torvalds {
18211da177e4SLinus Torvalds 	int ret;
18221da177e4SLinus Torvalds 	struct dentry *dentry;
1823edb20fb5SJames Morris 	struct inode *inode, *root_inode;
18241da177e4SLinus Torvalds 	struct inode_security_struct *isec;
18251da177e4SLinus Torvalds 
18261da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
18271da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
18281da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1829ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
18301da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
18311da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
18321da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
18331da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
18341da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
18351da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
18361da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
18371da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
18381da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
18391da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
18403f12070eSEric Paris 		[SEL_REJECT_UNKNOWN] = {"reject_unknown", &sel_handle_unknown_ops, S_IRUGO},
18413f12070eSEric Paris 		[SEL_DENY_UNKNOWN] = {"deny_unknown", &sel_handle_unknown_ops, S_IRUGO},
184211904167SKaiGai Kohei 		[SEL_STATUS] = {"status", &sel_handle_status_ops, S_IRUGO},
1843cee74f47SEric Paris 		[SEL_POLICY] = {"policy", &sel_policy_ops, S_IRUSR},
18441da177e4SLinus Torvalds 		/* last one */ {""}
18451da177e4SLinus Torvalds 	};
18461da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
18471da177e4SLinus Torvalds 	if (ret)
1848161ce45aSJames Morris 		goto err;
18491da177e4SLinus Torvalds 
1850edb20fb5SJames Morris 	root_inode = sb->s_root->d_inode;
1851edb20fb5SJames Morris 
1852161ce45aSJames Morris 	ret = -ENOMEM;
1853b77a493bSEric Paris 	dentry = d_alloc_name(sb->s_root, BOOL_DIR_NAME);
1854b77a493bSEric Paris 	if (!dentry)
1855161ce45aSJames Morris 		goto err;
18561da177e4SLinus Torvalds 
18570dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1858cde174a8SJames Morris 	if (ret)
1859161ce45aSJames Morris 		goto err;
1860cde174a8SJames Morris 
18611da177e4SLinus Torvalds 	bool_dir = dentry;
18621da177e4SLinus Torvalds 
1863b77a493bSEric Paris 	ret = -ENOMEM;
18641da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1865b77a493bSEric Paris 	if (!dentry)
1866161ce45aSJames Morris 		goto err;
18671da177e4SLinus Torvalds 
1868161ce45aSJames Morris 	ret = -ENOMEM;
1869b77a493bSEric Paris 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1870b77a493bSEric Paris 	if (!inode)
1871161ce45aSJames Morris 		goto err;
1872b77a493bSEric Paris 
18736174eafcSJames Carter 	inode->i_ino = ++sel_last_ino;
18741da177e4SLinus Torvalds 	isec = (struct inode_security_struct *)inode->i_security;
18751da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
18761da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
18771da177e4SLinus Torvalds 	isec->initialized = 1;
18781da177e4SLinus Torvalds 
18791da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
18801da177e4SLinus Torvalds 	d_add(dentry, inode);
18811da177e4SLinus Torvalds 	selinux_null = dentry;
18821da177e4SLinus Torvalds 
1883161ce45aSJames Morris 	ret = -ENOMEM;
1884b77a493bSEric Paris 	dentry = d_alloc_name(sb->s_root, "avc");
1885b77a493bSEric Paris 	if (!dentry)
1886161ce45aSJames Morris 		goto err;
18871da177e4SLinus Torvalds 
18880dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
18891da177e4SLinus Torvalds 	if (ret)
1890161ce45aSJames Morris 		goto err;
18911da177e4SLinus Torvalds 
18921da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
18931da177e4SLinus Torvalds 	if (ret)
1894161ce45aSJames Morris 		goto err;
1895f0ee2e46SJames Carter 
1896f0ee2e46SJames Carter 	ret = -ENOMEM;
1897b77a493bSEric Paris 	dentry = d_alloc_name(sb->s_root, "initial_contexts");
1898b77a493bSEric Paris 	if (!dentry)
1899f0ee2e46SJames Carter 		goto err;
1900f0ee2e46SJames Carter 
19010dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1902f0ee2e46SJames Carter 	if (ret)
1903f0ee2e46SJames Carter 		goto err;
1904f0ee2e46SJames Carter 
1905f0ee2e46SJames Carter 	ret = sel_make_initcon_files(dentry);
1906f0ee2e46SJames Carter 	if (ret)
1907f0ee2e46SJames Carter 		goto err;
1908f0ee2e46SJames Carter 
1909e47c8fc5SChristopher J. PeBenito 	ret = -ENOMEM;
1910b77a493bSEric Paris 	dentry = d_alloc_name(sb->s_root, "class");
1911b77a493bSEric Paris 	if (!dentry)
1912e47c8fc5SChristopher J. PeBenito 		goto err;
1913e47c8fc5SChristopher J. PeBenito 
1914e47c8fc5SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1915e47c8fc5SChristopher J. PeBenito 	if (ret)
1916e47c8fc5SChristopher J. PeBenito 		goto err;
1917e47c8fc5SChristopher J. PeBenito 
1918e47c8fc5SChristopher J. PeBenito 	class_dir = dentry;
1919e47c8fc5SChristopher J. PeBenito 
19203bb56b25SPaul Moore 	ret = -ENOMEM;
1921b77a493bSEric Paris 	dentry = d_alloc_name(sb->s_root, "policy_capabilities");
1922b77a493bSEric Paris 	if (!dentry)
19233bb56b25SPaul Moore 		goto err;
19243bb56b25SPaul Moore 
19253bb56b25SPaul Moore 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
19263bb56b25SPaul Moore 	if (ret)
19273bb56b25SPaul Moore 		goto err;
19283bb56b25SPaul Moore 
19293bb56b25SPaul Moore 	policycap_dir = dentry;
19303bb56b25SPaul Moore 
1931b77a493bSEric Paris 	return 0;
1932161ce45aSJames Morris err:
1933744ba35eSEric Paris 	printk(KERN_ERR "SELinux: %s:  failed while creating inodes\n",
1934744ba35eSEric Paris 		__func__);
1935b77a493bSEric Paris 	return ret;
19361da177e4SLinus Torvalds }
19371da177e4SLinus Torvalds 
1938fc14f2feSAl Viro static struct dentry *sel_mount(struct file_system_type *fs_type,
1939fc14f2feSAl Viro 		      int flags, const char *dev_name, void *data)
19401da177e4SLinus Torvalds {
1941fc14f2feSAl Viro 	return mount_single(fs_type, flags, data, sel_fill_super);
19421da177e4SLinus Torvalds }
19431da177e4SLinus Torvalds 
19441da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
19451da177e4SLinus Torvalds 	.name		= "selinuxfs",
1946fc14f2feSAl Viro 	.mount		= sel_mount,
19471da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
19481da177e4SLinus Torvalds };
19491da177e4SLinus Torvalds 
19501da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
19517a627e3bSGreg Kroah-Hartman static struct kobject *selinuxfs_kobj;
19521da177e4SLinus Torvalds 
19531da177e4SLinus Torvalds static int __init init_sel_fs(void)
19541da177e4SLinus Torvalds {
19551da177e4SLinus Torvalds 	int err;
19561da177e4SLinus Torvalds 
19571da177e4SLinus Torvalds 	if (!selinux_enabled)
19581da177e4SLinus Torvalds 		return 0;
19597a627e3bSGreg Kroah-Hartman 
19607a627e3bSGreg Kroah-Hartman 	selinuxfs_kobj = kobject_create_and_add("selinux", fs_kobj);
19617a627e3bSGreg Kroah-Hartman 	if (!selinuxfs_kobj)
19627a627e3bSGreg Kroah-Hartman 		return -ENOMEM;
19637a627e3bSGreg Kroah-Hartman 
19641da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
19657a627e3bSGreg Kroah-Hartman 	if (err) {
19667a627e3bSGreg Kroah-Hartman 		kobject_put(selinuxfs_kobj);
1967b77a493bSEric Paris 		return err;
19687a627e3bSGreg Kroah-Hartman 	}
1969b77a493bSEric Paris 
19701da177e4SLinus Torvalds 	selinuxfs_mount = kern_mount(&sel_fs_type);
19711da177e4SLinus Torvalds 	if (IS_ERR(selinuxfs_mount)) {
19721da177e4SLinus Torvalds 		printk(KERN_ERR "selinuxfs:  could not mount!\n");
19731da177e4SLinus Torvalds 		err = PTR_ERR(selinuxfs_mount);
19741da177e4SLinus Torvalds 		selinuxfs_mount = NULL;
19751da177e4SLinus Torvalds 	}
1976b77a493bSEric Paris 
19771da177e4SLinus Torvalds 	return err;
19781da177e4SLinus Torvalds }
19791da177e4SLinus Torvalds 
19801da177e4SLinus Torvalds __initcall(init_sel_fs);
19811da177e4SLinus Torvalds 
19821da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
19831da177e4SLinus Torvalds void exit_sel_fs(void)
19841da177e4SLinus Torvalds {
19857a627e3bSGreg Kroah-Hartman 	kobject_put(selinuxfs_kobj);
1986423e0ab0STim Chen 	kern_unmount(selinuxfs_mount);
19871da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
19881da177e4SLinus Torvalds }
19891da177e4SLinus Torvalds #endif
1990