xref: /openbmc/linux/security/selinux/selinuxfs.c (revision cee74f47)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  *	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
53bb56b25SPaul Moore  *  Updated: Hewlett-Packard <paul.moore@hp.com>
63bb56b25SPaul Moore  *
73bb56b25SPaul Moore  *	Added support for the policy capability bitmap
83bb56b25SPaul Moore  *
93bb56b25SPaul Moore  * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
101da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
111da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
121da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
131da177e4SLinus Torvalds  *	it under the terms of the GNU General Public License as published by
141da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
151da177e4SLinus Torvalds  */
161da177e4SLinus Torvalds 
171da177e4SLinus Torvalds #include <linux/kernel.h>
181da177e4SLinus Torvalds #include <linux/pagemap.h>
191da177e4SLinus Torvalds #include <linux/slab.h>
201da177e4SLinus Torvalds #include <linux/vmalloc.h>
211da177e4SLinus Torvalds #include <linux/fs.h>
22bb003079SIngo Molnar #include <linux/mutex.h>
231da177e4SLinus Torvalds #include <linux/init.h>
241da177e4SLinus Torvalds #include <linux/string.h>
251da177e4SLinus Torvalds #include <linux/security.h>
261da177e4SLinus Torvalds #include <linux/major.h>
271da177e4SLinus Torvalds #include <linux/seq_file.h>
281da177e4SLinus Torvalds #include <linux/percpu.h>
29af601e46SSteve Grubb #include <linux/audit.h>
30f5269710SEric Paris #include <linux/uaccess.h>
311da177e4SLinus Torvalds 
321da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
331da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds #include "flask.h"
361da177e4SLinus Torvalds #include "avc.h"
371da177e4SLinus Torvalds #include "avc_ss.h"
381da177e4SLinus Torvalds #include "security.h"
391da177e4SLinus Torvalds #include "objsec.h"
401da177e4SLinus Torvalds #include "conditional.h"
411da177e4SLinus Torvalds 
423bb56b25SPaul Moore /* Policy capability filenames */
433bb56b25SPaul Moore static char *policycap_names[] = {
44b0c636b9SEric Paris 	"network_peer_controls",
45b0c636b9SEric Paris 	"open_perms"
463bb56b25SPaul Moore };
473bb56b25SPaul Moore 
481da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
491da177e4SLinus Torvalds 
501da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
511da177e4SLinus Torvalds {
52f5269710SEric Paris 	unsigned long checkreqprot;
53f5269710SEric Paris 	if (!strict_strtoul(str, 0, &checkreqprot))
54f5269710SEric Paris 		selinux_checkreqprot = checkreqprot ? 1 : 0;
551da177e4SLinus Torvalds 	return 1;
561da177e4SLinus Torvalds }
571da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
581da177e4SLinus Torvalds 
59bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
601da177e4SLinus Torvalds 
611da177e4SLinus Torvalds /* global data for booleans */
621872981bSEric Paris static struct dentry *bool_dir;
631872981bSEric Paris static int bool_num;
64d313f948SStephen Smalley static char **bool_pending_names;
651872981bSEric Paris static int *bool_pending_values;
661da177e4SLinus Torvalds 
67e47c8fc5SChristopher J. PeBenito /* global data for classes */
681872981bSEric Paris static struct dentry *class_dir;
69e47c8fc5SChristopher J. PeBenito static unsigned long last_class_ino;
70e47c8fc5SChristopher J. PeBenito 
71cee74f47SEric Paris static char policy_opened;
72cee74f47SEric Paris 
733bb56b25SPaul Moore /* global data for policy capabilities */
741872981bSEric Paris static struct dentry *policycap_dir;
753bb56b25SPaul Moore 
761da177e4SLinus Torvalds extern void selnl_notify_setenforce(int val);
771da177e4SLinus Torvalds 
781da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
791da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
801da177e4SLinus Torvalds 			     u32 perms)
811da177e4SLinus Torvalds {
82c69e8d9cSDavid Howells 	const struct task_security_struct *tsec;
83c69e8d9cSDavid Howells 	u32 sid = 0;
841da177e4SLinus Torvalds 
85c69e8d9cSDavid Howells 	rcu_read_lock();
86c69e8d9cSDavid Howells 	tsec = __task_cred(tsk)->security;
87c69e8d9cSDavid Howells 	if (tsec)
88c69e8d9cSDavid Howells 		sid = tsec->sid;
89c69e8d9cSDavid Howells 	rcu_read_unlock();
901da177e4SLinus Torvalds 	if (!tsec)
911da177e4SLinus Torvalds 		return -EACCES;
921da177e4SLinus Torvalds 
93c69e8d9cSDavid Howells 	return avc_has_perm(sid, SECINITSID_SECURITY,
941da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
951da177e4SLinus Torvalds }
961da177e4SLinus Torvalds 
971da177e4SLinus Torvalds enum sel_inos {
981da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
991da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
1001da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
1011da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
1021da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
1031da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
1041da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
1051da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
1061da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
1071da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
1081da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
1091da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
1101da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1111da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1124e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1133f12070eSEric Paris 	SEL_REJECT_UNKNOWN, /* export unknown reject handling to userspace */
1143f12070eSEric Paris 	SEL_DENY_UNKNOWN, /* export unknown deny handling to userspace */
11511904167SKaiGai Kohei 	SEL_STATUS,	/* export current status using mmap() */
116cee74f47SEric Paris 	SEL_POLICY,	/* allow userspace to read the in kernel policy */
1176174eafcSJames Carter 	SEL_INO_NEXT,	/* The next inode number to use */
1181da177e4SLinus Torvalds };
1191da177e4SLinus Torvalds 
1206174eafcSJames Carter static unsigned long sel_last_ino = SEL_INO_NEXT - 1;
1216174eafcSJames Carter 
122f0ee2e46SJames Carter #define SEL_INITCON_INO_OFFSET		0x01000000
123bce34bc0SJames Carter #define SEL_BOOL_INO_OFFSET		0x02000000
124e47c8fc5SChristopher J. PeBenito #define SEL_CLASS_INO_OFFSET		0x04000000
1253bb56b25SPaul Moore #define SEL_POLICYCAP_INO_OFFSET	0x08000000
126f0ee2e46SJames Carter #define SEL_INO_MASK			0x00ffffff
127f0ee2e46SJames Carter 
1281da177e4SLinus Torvalds #define TMPBUFLEN	12
1291da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1301da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1311da177e4SLinus Torvalds {
1321da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1331da177e4SLinus Torvalds 	ssize_t length;
1341da177e4SLinus Torvalds 
1351da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1361da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1371da177e4SLinus Torvalds }
1381da177e4SLinus Torvalds 
1391da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1401da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
1411da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1421da177e4SLinus Torvalds 
1431da177e4SLinus Torvalds {
1441da177e4SLinus Torvalds 	char *page;
1451da177e4SLinus Torvalds 	ssize_t length;
1461da177e4SLinus Torvalds 	int new_value;
1471da177e4SLinus Torvalds 
148bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1491da177e4SLinus Torvalds 		return -ENOMEM;
1501da177e4SLinus Torvalds 	if (*ppos != 0) {
1511da177e4SLinus Torvalds 		/* No partial writes. */
1521da177e4SLinus Torvalds 		return -EINVAL;
1531da177e4SLinus Torvalds 	}
1541da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
1551da177e4SLinus Torvalds 	if (!page)
1561da177e4SLinus Torvalds 		return -ENOMEM;
1571da177e4SLinus Torvalds 	length = -EFAULT;
1581da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1591da177e4SLinus Torvalds 		goto out;
1601da177e4SLinus Torvalds 
1611da177e4SLinus Torvalds 	length = -EINVAL;
1621da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1631da177e4SLinus Torvalds 		goto out;
1641da177e4SLinus Torvalds 
1651da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1661da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1671da177e4SLinus Torvalds 		if (length)
1681da177e4SLinus Torvalds 			goto out;
169af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
1704746ec5bSEric Paris 			"enforcing=%d old_enforcing=%d auid=%u ses=%u",
1714746ec5bSEric Paris 			new_value, selinux_enforcing,
1724746ec5bSEric Paris 			audit_get_loginuid(current),
1734746ec5bSEric Paris 			audit_get_sessionid(current));
1741da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1751da177e4SLinus Torvalds 		if (selinux_enforcing)
1761da177e4SLinus Torvalds 			avc_ss_reset(0);
1771da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
17811904167SKaiGai Kohei 		selinux_status_update_setenforce(selinux_enforcing);
1791da177e4SLinus Torvalds 	}
1801da177e4SLinus Torvalds 	length = count;
1811da177e4SLinus Torvalds out:
1821da177e4SLinus Torvalds 	free_page((unsigned long) page);
1831da177e4SLinus Torvalds 	return length;
1841da177e4SLinus Torvalds }
1851da177e4SLinus Torvalds #else
1861da177e4SLinus Torvalds #define sel_write_enforce NULL
1871da177e4SLinus Torvalds #endif
1881da177e4SLinus Torvalds 
1899c2e08c5SArjan van de Ven static const struct file_operations sel_enforce_ops = {
1901da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1911da177e4SLinus Torvalds 	.write		= sel_write_enforce,
19257a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1931da177e4SLinus Torvalds };
1941da177e4SLinus Torvalds 
1953f12070eSEric Paris static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf,
1963f12070eSEric Paris 					size_t count, loff_t *ppos)
1973f12070eSEric Paris {
1983f12070eSEric Paris 	char tmpbuf[TMPBUFLEN];
1993f12070eSEric Paris 	ssize_t length;
2003f12070eSEric Paris 	ino_t ino = filp->f_path.dentry->d_inode->i_ino;
2013f12070eSEric Paris 	int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ?
2023f12070eSEric Paris 		security_get_reject_unknown() : !security_get_allow_unknown();
2033f12070eSEric Paris 
2043f12070eSEric Paris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown);
2053f12070eSEric Paris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2063f12070eSEric Paris }
2073f12070eSEric Paris 
2083f12070eSEric Paris static const struct file_operations sel_handle_unknown_ops = {
2093f12070eSEric Paris 	.read		= sel_read_handle_unknown,
21057a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
2113f12070eSEric Paris };
2123f12070eSEric Paris 
21311904167SKaiGai Kohei static int sel_open_handle_status(struct inode *inode, struct file *filp)
21411904167SKaiGai Kohei {
21511904167SKaiGai Kohei 	struct page    *status = selinux_kernel_status_page();
21611904167SKaiGai Kohei 
21711904167SKaiGai Kohei 	if (!status)
21811904167SKaiGai Kohei 		return -ENOMEM;
21911904167SKaiGai Kohei 
22011904167SKaiGai Kohei 	filp->private_data = status;
22111904167SKaiGai Kohei 
22211904167SKaiGai Kohei 	return 0;
22311904167SKaiGai Kohei }
22411904167SKaiGai Kohei 
22511904167SKaiGai Kohei static ssize_t sel_read_handle_status(struct file *filp, char __user *buf,
22611904167SKaiGai Kohei 				      size_t count, loff_t *ppos)
22711904167SKaiGai Kohei {
22811904167SKaiGai Kohei 	struct page    *status = filp->private_data;
22911904167SKaiGai Kohei 
23011904167SKaiGai Kohei 	BUG_ON(!status);
23111904167SKaiGai Kohei 
23211904167SKaiGai Kohei 	return simple_read_from_buffer(buf, count, ppos,
23311904167SKaiGai Kohei 				       page_address(status),
23411904167SKaiGai Kohei 				       sizeof(struct selinux_kernel_status));
23511904167SKaiGai Kohei }
23611904167SKaiGai Kohei 
23711904167SKaiGai Kohei static int sel_mmap_handle_status(struct file *filp,
23811904167SKaiGai Kohei 				  struct vm_area_struct *vma)
23911904167SKaiGai Kohei {
24011904167SKaiGai Kohei 	struct page    *status = filp->private_data;
24111904167SKaiGai Kohei 	unsigned long	size = vma->vm_end - vma->vm_start;
24211904167SKaiGai Kohei 
24311904167SKaiGai Kohei 	BUG_ON(!status);
24411904167SKaiGai Kohei 
24511904167SKaiGai Kohei 	/* only allows one page from the head */
24611904167SKaiGai Kohei 	if (vma->vm_pgoff > 0 || size != PAGE_SIZE)
24711904167SKaiGai Kohei 		return -EIO;
24811904167SKaiGai Kohei 	/* disallow writable mapping */
24911904167SKaiGai Kohei 	if (vma->vm_flags & VM_WRITE)
25011904167SKaiGai Kohei 		return -EPERM;
25111904167SKaiGai Kohei 	/* disallow mprotect() turns it into writable */
25211904167SKaiGai Kohei 	vma->vm_flags &= ~VM_MAYWRITE;
25311904167SKaiGai Kohei 
25411904167SKaiGai Kohei 	return remap_pfn_range(vma, vma->vm_start,
25511904167SKaiGai Kohei 			       page_to_pfn(status),
25611904167SKaiGai Kohei 			       size, vma->vm_page_prot);
25711904167SKaiGai Kohei }
25811904167SKaiGai Kohei 
25911904167SKaiGai Kohei static const struct file_operations sel_handle_status_ops = {
26011904167SKaiGai Kohei 	.open		= sel_open_handle_status,
26111904167SKaiGai Kohei 	.read		= sel_read_handle_status,
26211904167SKaiGai Kohei 	.mmap		= sel_mmap_handle_status,
26311904167SKaiGai Kohei 	.llseek		= generic_file_llseek,
26411904167SKaiGai Kohei };
26511904167SKaiGai Kohei 
2661da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
2671da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file *file, const char __user *buf,
2681da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
2691da177e4SLinus Torvalds 
2701da177e4SLinus Torvalds {
2711da177e4SLinus Torvalds 	char *page;
2721da177e4SLinus Torvalds 	ssize_t length;
2731da177e4SLinus Torvalds 	int new_value;
2741da177e4SLinus Torvalds 	extern int selinux_disable(void);
2751da177e4SLinus Torvalds 
276bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
2771da177e4SLinus Torvalds 		return -ENOMEM;
2781da177e4SLinus Torvalds 	if (*ppos != 0) {
2791da177e4SLinus Torvalds 		/* No partial writes. */
2801da177e4SLinus Torvalds 		return -EINVAL;
2811da177e4SLinus Torvalds 	}
2821da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
2831da177e4SLinus Torvalds 	if (!page)
2841da177e4SLinus Torvalds 		return -ENOMEM;
2851da177e4SLinus Torvalds 	length = -EFAULT;
2861da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
2871da177e4SLinus Torvalds 		goto out;
2881da177e4SLinus Torvalds 
2891da177e4SLinus Torvalds 	length = -EINVAL;
2901da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
2911da177e4SLinus Torvalds 		goto out;
2921da177e4SLinus Torvalds 
2931da177e4SLinus Torvalds 	if (new_value) {
2941da177e4SLinus Torvalds 		length = selinux_disable();
2951da177e4SLinus Torvalds 		if (length < 0)
2961da177e4SLinus Torvalds 			goto out;
297af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
2984746ec5bSEric Paris 			"selinux=0 auid=%u ses=%u",
2994746ec5bSEric Paris 			audit_get_loginuid(current),
3004746ec5bSEric Paris 			audit_get_sessionid(current));
3011da177e4SLinus Torvalds 	}
3021da177e4SLinus Torvalds 
3031da177e4SLinus Torvalds 	length = count;
3041da177e4SLinus Torvalds out:
3051da177e4SLinus Torvalds 	free_page((unsigned long) page);
3061da177e4SLinus Torvalds 	return length;
3071da177e4SLinus Torvalds }
3081da177e4SLinus Torvalds #else
3091da177e4SLinus Torvalds #define sel_write_disable NULL
3101da177e4SLinus Torvalds #endif
3111da177e4SLinus Torvalds 
3129c2e08c5SArjan van de Ven static const struct file_operations sel_disable_ops = {
3131da177e4SLinus Torvalds 	.write		= sel_write_disable,
31457a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3151da177e4SLinus Torvalds };
3161da177e4SLinus Torvalds 
3171da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
3181da177e4SLinus Torvalds 				   size_t count, loff_t *ppos)
3191da177e4SLinus Torvalds {
3201da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3211da177e4SLinus Torvalds 	ssize_t length;
3221da177e4SLinus Torvalds 
3231da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
3241da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3251da177e4SLinus Torvalds }
3261da177e4SLinus Torvalds 
3279c2e08c5SArjan van de Ven static const struct file_operations sel_policyvers_ops = {
3281da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
32957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3301da177e4SLinus Torvalds };
3311da177e4SLinus Torvalds 
3321da177e4SLinus Torvalds /* declaration for sel_write_load */
3331da177e4SLinus Torvalds static int sel_make_bools(void);
334e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void);
3353bb56b25SPaul Moore static int sel_make_policycap(void);
336e47c8fc5SChristopher J. PeBenito 
337e47c8fc5SChristopher J. PeBenito /* declaration for sel_make_class_dirs */
338e47c8fc5SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
339e47c8fc5SChristopher J. PeBenito 			unsigned long *ino);
3401da177e4SLinus Torvalds 
3411da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
3421da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
3431da177e4SLinus Torvalds {
3441da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3451da177e4SLinus Torvalds 	ssize_t length;
3461da177e4SLinus Torvalds 
3470719aaf5SGuido Trentalancia 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
3480719aaf5SGuido Trentalancia 			   security_mls_enabled());
3491da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3501da177e4SLinus Torvalds }
3511da177e4SLinus Torvalds 
3529c2e08c5SArjan van de Ven static const struct file_operations sel_mls_ops = {
3531da177e4SLinus Torvalds 	.read		= sel_read_mls,
35457a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3551da177e4SLinus Torvalds };
3561da177e4SLinus Torvalds 
357cee74f47SEric Paris struct policy_load_memory {
358cee74f47SEric Paris 	size_t len;
359cee74f47SEric Paris 	void *data;
360cee74f47SEric Paris };
361cee74f47SEric Paris 
362cee74f47SEric Paris static int sel_open_policy(struct inode *inode, struct file *filp)
363cee74f47SEric Paris {
364cee74f47SEric Paris 	struct policy_load_memory *plm = NULL;
365cee74f47SEric Paris 	int rc;
366cee74f47SEric Paris 
367cee74f47SEric Paris 	BUG_ON(filp->private_data);
368cee74f47SEric Paris 
369cee74f47SEric Paris 	mutex_lock(&sel_mutex);
370cee74f47SEric Paris 
371cee74f47SEric Paris 	rc = task_has_security(current, SECURITY__READ_POLICY);
372cee74f47SEric Paris 	if (rc)
373cee74f47SEric Paris 		goto err;
374cee74f47SEric Paris 
375cee74f47SEric Paris 	rc = -EBUSY;
376cee74f47SEric Paris 	if (policy_opened)
377cee74f47SEric Paris 		goto err;
378cee74f47SEric Paris 
379cee74f47SEric Paris 	rc = -ENOMEM;
380cee74f47SEric Paris 	plm = kzalloc(sizeof(*plm), GFP_KERNEL);
381cee74f47SEric Paris 	if (!plm)
382cee74f47SEric Paris 		goto err;
383cee74f47SEric Paris 
384cee74f47SEric Paris 	if (i_size_read(inode) != security_policydb_len()) {
385cee74f47SEric Paris 		mutex_lock(&inode->i_mutex);
386cee74f47SEric Paris 		i_size_write(inode, security_policydb_len());
387cee74f47SEric Paris 		mutex_unlock(&inode->i_mutex);
388cee74f47SEric Paris 	}
389cee74f47SEric Paris 
390cee74f47SEric Paris 	rc = security_read_policy(&plm->data, &plm->len);
391cee74f47SEric Paris 	if (rc)
392cee74f47SEric Paris 		goto err;
393cee74f47SEric Paris 
394cee74f47SEric Paris 	policy_opened = 1;
395cee74f47SEric Paris 
396cee74f47SEric Paris 	filp->private_data = plm;
397cee74f47SEric Paris 
398cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
399cee74f47SEric Paris 
400cee74f47SEric Paris 	return 0;
401cee74f47SEric Paris err:
402cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
403cee74f47SEric Paris 
404cee74f47SEric Paris 	if (plm)
405cee74f47SEric Paris 		vfree(plm->data);
406cee74f47SEric Paris 	kfree(plm);
407cee74f47SEric Paris 	return rc;
408cee74f47SEric Paris }
409cee74f47SEric Paris 
410cee74f47SEric Paris static int sel_release_policy(struct inode *inode, struct file *filp)
411cee74f47SEric Paris {
412cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
413cee74f47SEric Paris 
414cee74f47SEric Paris 	BUG_ON(!plm);
415cee74f47SEric Paris 
416cee74f47SEric Paris 	policy_opened = 0;
417cee74f47SEric Paris 
418cee74f47SEric Paris 	vfree(plm->data);
419cee74f47SEric Paris 	kfree(plm);
420cee74f47SEric Paris 
421cee74f47SEric Paris 	return 0;
422cee74f47SEric Paris }
423cee74f47SEric Paris 
424cee74f47SEric Paris static ssize_t sel_read_policy(struct file *filp, char __user *buf,
425cee74f47SEric Paris 			       size_t count, loff_t *ppos)
426cee74f47SEric Paris {
427cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
428cee74f47SEric Paris 	int ret;
429cee74f47SEric Paris 
430cee74f47SEric Paris 	mutex_lock(&sel_mutex);
431cee74f47SEric Paris 
432cee74f47SEric Paris 	ret = task_has_security(current, SECURITY__READ_POLICY);
433cee74f47SEric Paris 	if (ret)
434cee74f47SEric Paris 		goto out;
435cee74f47SEric Paris 
436cee74f47SEric Paris 	ret = simple_read_from_buffer(buf, count, ppos, plm->data, plm->len);
437cee74f47SEric Paris out:
438cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
439cee74f47SEric Paris 	return ret;
440cee74f47SEric Paris }
441cee74f47SEric Paris 
442cee74f47SEric Paris static const struct file_operations sel_policy_ops = {
443cee74f47SEric Paris 	.open		= sel_open_policy,
444cee74f47SEric Paris 	.read		= sel_read_policy,
445cee74f47SEric Paris 	.release	= sel_release_policy,
446cee74f47SEric Paris };
447cee74f47SEric Paris 
4481da177e4SLinus Torvalds static ssize_t sel_write_load(struct file *file, const char __user *buf,
4491da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
4501da177e4SLinus Torvalds 
4511da177e4SLinus Torvalds {
4521da177e4SLinus Torvalds 	int ret;
4531da177e4SLinus Torvalds 	ssize_t length;
4541da177e4SLinus Torvalds 	void *data = NULL;
4551da177e4SLinus Torvalds 
456bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
4571da177e4SLinus Torvalds 
4581da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
4591da177e4SLinus Torvalds 	if (length)
4601da177e4SLinus Torvalds 		goto out;
4611da177e4SLinus Torvalds 
4621da177e4SLinus Torvalds 	if (*ppos != 0) {
4631da177e4SLinus Torvalds 		/* No partial writes. */
4641da177e4SLinus Torvalds 		length = -EINVAL;
4651da177e4SLinus Torvalds 		goto out;
4661da177e4SLinus Torvalds 	}
4671da177e4SLinus Torvalds 
468bfd51626SDavi Arnaut 	if ((count > 64 * 1024 * 1024)
4691da177e4SLinus Torvalds 	    || (data = vmalloc(count)) == NULL) {
4701da177e4SLinus Torvalds 		length = -ENOMEM;
4711da177e4SLinus Torvalds 		goto out;
4721da177e4SLinus Torvalds 	}
4731da177e4SLinus Torvalds 
4741da177e4SLinus Torvalds 	length = -EFAULT;
4751da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
4761da177e4SLinus Torvalds 		goto out;
4771da177e4SLinus Torvalds 
4781da177e4SLinus Torvalds 	length = security_load_policy(data, count);
4791da177e4SLinus Torvalds 	if (length)
4801da177e4SLinus Torvalds 		goto out;
4811da177e4SLinus Torvalds 
4821da177e4SLinus Torvalds 	ret = sel_make_bools();
483e47c8fc5SChristopher J. PeBenito 	if (ret) {
484e47c8fc5SChristopher J. PeBenito 		length = ret;
485e47c8fc5SChristopher J. PeBenito 		goto out1;
486e47c8fc5SChristopher J. PeBenito 	}
487e47c8fc5SChristopher J. PeBenito 
488e47c8fc5SChristopher J. PeBenito 	ret = sel_make_classes();
4893bb56b25SPaul Moore 	if (ret) {
4903bb56b25SPaul Moore 		length = ret;
4913bb56b25SPaul Moore 		goto out1;
4923bb56b25SPaul Moore 	}
4933bb56b25SPaul Moore 
4943bb56b25SPaul Moore 	ret = sel_make_policycap();
4951da177e4SLinus Torvalds 	if (ret)
4961da177e4SLinus Torvalds 		length = ret;
4971da177e4SLinus Torvalds 	else
4981da177e4SLinus Torvalds 		length = count;
499e47c8fc5SChristopher J. PeBenito 
500e47c8fc5SChristopher J. PeBenito out1:
501af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
5024746ec5bSEric Paris 		"policy loaded auid=%u ses=%u",
5034746ec5bSEric Paris 		audit_get_loginuid(current),
5044746ec5bSEric Paris 		audit_get_sessionid(current));
5051da177e4SLinus Torvalds out:
506bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
5071da177e4SLinus Torvalds 	vfree(data);
5081da177e4SLinus Torvalds 	return length;
5091da177e4SLinus Torvalds }
5101da177e4SLinus Torvalds 
5119c2e08c5SArjan van de Ven static const struct file_operations sel_load_ops = {
5121da177e4SLinus Torvalds 	.write		= sel_write_load,
51357a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
5141da177e4SLinus Torvalds };
5151da177e4SLinus Torvalds 
516ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
5171da177e4SLinus Torvalds {
518ce9982d0SStephen Smalley 	char *canon;
519ce9982d0SStephen Smalley 	u32 sid, len;
5201da177e4SLinus Torvalds 	ssize_t length;
5211da177e4SLinus Torvalds 
5221da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
5231da177e4SLinus Torvalds 	if (length)
5241da177e4SLinus Torvalds 		return length;
5251da177e4SLinus Torvalds 
526ce9982d0SStephen Smalley 	length = security_context_to_sid(buf, size, &sid);
5271da177e4SLinus Torvalds 	if (length < 0)
528ce9982d0SStephen Smalley 		return length;
5291da177e4SLinus Torvalds 
530ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
531ce9982d0SStephen Smalley 	if (length < 0)
532ce9982d0SStephen Smalley 		return length;
533ce9982d0SStephen Smalley 
534ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
535744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
536744ba35eSEric Paris 			"payload max\n", __func__, len);
537ce9982d0SStephen Smalley 		length = -ERANGE;
538ce9982d0SStephen Smalley 		goto out;
539ce9982d0SStephen Smalley 	}
540ce9982d0SStephen Smalley 
541ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
542ce9982d0SStephen Smalley 	length = len;
5431da177e4SLinus Torvalds out:
544ce9982d0SStephen Smalley 	kfree(canon);
5451da177e4SLinus Torvalds 	return length;
5461da177e4SLinus Torvalds }
5471da177e4SLinus Torvalds 
5481da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
5491da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
5501da177e4SLinus Torvalds {
5511da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
5521da177e4SLinus Torvalds 	ssize_t length;
5531da177e4SLinus Torvalds 
5541da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
5551da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
5561da177e4SLinus Torvalds }
5571da177e4SLinus Torvalds 
5581da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
5591da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
5601da177e4SLinus Torvalds {
5611da177e4SLinus Torvalds 	char *page;
5621da177e4SLinus Torvalds 	ssize_t length;
5631da177e4SLinus Torvalds 	unsigned int new_value;
5641da177e4SLinus Torvalds 
5651da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
5661da177e4SLinus Torvalds 	if (length)
5671da177e4SLinus Torvalds 		return length;
5681da177e4SLinus Torvalds 
569bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
5701da177e4SLinus Torvalds 		return -ENOMEM;
5711da177e4SLinus Torvalds 	if (*ppos != 0) {
5721da177e4SLinus Torvalds 		/* No partial writes. */
5731da177e4SLinus Torvalds 		return -EINVAL;
5741da177e4SLinus Torvalds 	}
5751da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
5761da177e4SLinus Torvalds 	if (!page)
5771da177e4SLinus Torvalds 		return -ENOMEM;
5781da177e4SLinus Torvalds 	length = -EFAULT;
5791da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
5801da177e4SLinus Torvalds 		goto out;
5811da177e4SLinus Torvalds 
5821da177e4SLinus Torvalds 	length = -EINVAL;
5831da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
5841da177e4SLinus Torvalds 		goto out;
5851da177e4SLinus Torvalds 
5861da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
5871da177e4SLinus Torvalds 	length = count;
5881da177e4SLinus Torvalds out:
5891da177e4SLinus Torvalds 	free_page((unsigned long) page);
5901da177e4SLinus Torvalds 	return length;
5911da177e4SLinus Torvalds }
5929c2e08c5SArjan van de Ven static const struct file_operations sel_checkreqprot_ops = {
5931da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
5941da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
59557a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
5961da177e4SLinus Torvalds };
5971da177e4SLinus Torvalds 
5981da177e4SLinus Torvalds /*
5991da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
6001da177e4SLinus Torvalds  */
6011da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
6021da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
6031da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
6041da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
6051da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size);
6061da177e4SLinus Torvalds 
6071da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
6081da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
6091da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
6101da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
6111da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
6121da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
613ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
6141da177e4SLinus Torvalds };
6151da177e4SLinus Torvalds 
6161da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
6171da177e4SLinus Torvalds {
6183d5ff529SJosef Sipek 	ino_t ino = file->f_path.dentry->d_inode->i_ino;
6191da177e4SLinus Torvalds 	char *data;
6201da177e4SLinus Torvalds 	ssize_t rv;
6211da177e4SLinus Torvalds 
6226e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
6231da177e4SLinus Torvalds 		return -EINVAL;
6241da177e4SLinus Torvalds 
6251da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
6261da177e4SLinus Torvalds 	if (IS_ERR(data))
6271da177e4SLinus Torvalds 		return PTR_ERR(data);
6281da177e4SLinus Torvalds 
6291da177e4SLinus Torvalds 	rv = write_op[ino](file, data, size);
6301da177e4SLinus Torvalds 	if (rv > 0) {
6311da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
6321da177e4SLinus Torvalds 		rv = size;
6331da177e4SLinus Torvalds 	}
6341da177e4SLinus Torvalds 	return rv;
6351da177e4SLinus Torvalds }
6361da177e4SLinus Torvalds 
6379c2e08c5SArjan van de Ven static const struct file_operations transaction_ops = {
6381da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
6391da177e4SLinus Torvalds 	.read		= simple_transaction_read,
6401da177e4SLinus Torvalds 	.release	= simple_transaction_release,
64157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
6421da177e4SLinus Torvalds };
6431da177e4SLinus Torvalds 
6441da177e4SLinus Torvalds /*
6451da177e4SLinus Torvalds  * payload - write methods
6461da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
6471da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
6481da177e4SLinus Torvalds  */
6491da177e4SLinus Torvalds 
6501da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
6511da177e4SLinus Torvalds {
6521da177e4SLinus Torvalds 	char *scon, *tcon;
6531da177e4SLinus Torvalds 	u32 ssid, tsid;
6541da177e4SLinus Torvalds 	u16 tclass;
6551da177e4SLinus Torvalds 	struct av_decision avd;
6561da177e4SLinus Torvalds 	ssize_t length;
6571da177e4SLinus Torvalds 
6581da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
6591da177e4SLinus Torvalds 	if (length)
6601da177e4SLinus Torvalds 		return length;
6611da177e4SLinus Torvalds 
6621da177e4SLinus Torvalds 	length = -ENOMEM;
66389d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
6641da177e4SLinus Torvalds 	if (!scon)
6651da177e4SLinus Torvalds 		return length;
6661da177e4SLinus Torvalds 
66789d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
6681da177e4SLinus Torvalds 	if (!tcon)
6691da177e4SLinus Torvalds 		goto out;
6701da177e4SLinus Torvalds 
6711da177e4SLinus Torvalds 	length = -EINVAL;
67219439d05SStephen Smalley 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
6731da177e4SLinus Torvalds 		goto out2;
6741da177e4SLinus Torvalds 
6751da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
6761da177e4SLinus Torvalds 	if (length < 0)
6771da177e4SLinus Torvalds 		goto out2;
6781da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
6791da177e4SLinus Torvalds 	if (length < 0)
6801da177e4SLinus Torvalds 		goto out2;
6811da177e4SLinus Torvalds 
68219439d05SStephen Smalley 	security_compute_av_user(ssid, tsid, tclass, &avd);
6831da177e4SLinus Torvalds 
6841da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
6858a6f83afSKaiGai Kohei 			  "%x %x %x %x %u %x",
686f1c6381aSEric Paris 			  avd.allowed, 0xffffffff,
6871da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
6888a6f83afSKaiGai Kohei 			  avd.seqno, avd.flags);
6891da177e4SLinus Torvalds out2:
6901da177e4SLinus Torvalds 	kfree(tcon);
6911da177e4SLinus Torvalds out:
6921da177e4SLinus Torvalds 	kfree(scon);
6931da177e4SLinus Torvalds 	return length;
6941da177e4SLinus Torvalds }
6951da177e4SLinus Torvalds 
6961da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
6971da177e4SLinus Torvalds {
6981da177e4SLinus Torvalds 	char *scon, *tcon;
6991da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7001da177e4SLinus Torvalds 	u16 tclass;
7011da177e4SLinus Torvalds 	ssize_t length;
7021da177e4SLinus Torvalds 	char *newcon;
7031da177e4SLinus Torvalds 	u32 len;
7041da177e4SLinus Torvalds 
7051da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
7061da177e4SLinus Torvalds 	if (length)
7071da177e4SLinus Torvalds 		return length;
7081da177e4SLinus Torvalds 
7091da177e4SLinus Torvalds 	length = -ENOMEM;
71089d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
7111da177e4SLinus Torvalds 	if (!scon)
7121da177e4SLinus Torvalds 		return length;
7131da177e4SLinus Torvalds 
71489d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
7151da177e4SLinus Torvalds 	if (!tcon)
7161da177e4SLinus Torvalds 		goto out;
7171da177e4SLinus Torvalds 
7181da177e4SLinus Torvalds 	length = -EINVAL;
7191da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
7201da177e4SLinus Torvalds 		goto out2;
7211da177e4SLinus Torvalds 
7221da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
7231da177e4SLinus Torvalds 	if (length < 0)
7241da177e4SLinus Torvalds 		goto out2;
7251da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
7261da177e4SLinus Torvalds 	if (length < 0)
7271da177e4SLinus Torvalds 		goto out2;
7281da177e4SLinus Torvalds 
729c6d3aaa4SStephen Smalley 	length = security_transition_sid_user(ssid, tsid, tclass, &newsid);
7301da177e4SLinus Torvalds 	if (length < 0)
7311da177e4SLinus Torvalds 		goto out2;
7321da177e4SLinus Torvalds 
7331da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
7341da177e4SLinus Torvalds 	if (length < 0)
7351da177e4SLinus Torvalds 		goto out2;
7361da177e4SLinus Torvalds 
7371da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
738744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
739744ba35eSEric Paris 			"payload max\n", __func__, len);
7401da177e4SLinus Torvalds 		length = -ERANGE;
7411da177e4SLinus Torvalds 		goto out3;
7421da177e4SLinus Torvalds 	}
7431da177e4SLinus Torvalds 
7441da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
7451da177e4SLinus Torvalds 	length = len;
7461da177e4SLinus Torvalds out3:
7471da177e4SLinus Torvalds 	kfree(newcon);
7481da177e4SLinus Torvalds out2:
7491da177e4SLinus Torvalds 	kfree(tcon);
7501da177e4SLinus Torvalds out:
7511da177e4SLinus Torvalds 	kfree(scon);
7521da177e4SLinus Torvalds 	return length;
7531da177e4SLinus Torvalds }
7541da177e4SLinus Torvalds 
7551da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
7561da177e4SLinus Torvalds {
7571da177e4SLinus Torvalds 	char *scon, *tcon;
7581da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7591da177e4SLinus Torvalds 	u16 tclass;
7601da177e4SLinus Torvalds 	ssize_t length;
7611da177e4SLinus Torvalds 	char *newcon;
7621da177e4SLinus Torvalds 	u32 len;
7631da177e4SLinus Torvalds 
7641da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
7651da177e4SLinus Torvalds 	if (length)
7661da177e4SLinus Torvalds 		return length;
7671da177e4SLinus Torvalds 
7681da177e4SLinus Torvalds 	length = -ENOMEM;
76989d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
7701da177e4SLinus Torvalds 	if (!scon)
7711da177e4SLinus Torvalds 		return length;
7721da177e4SLinus Torvalds 
77389d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
7741da177e4SLinus Torvalds 	if (!tcon)
7751da177e4SLinus Torvalds 		goto out;
7761da177e4SLinus Torvalds 
7771da177e4SLinus Torvalds 	length = -EINVAL;
7781da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
7791da177e4SLinus Torvalds 		goto out2;
7801da177e4SLinus Torvalds 
7811da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
7821da177e4SLinus Torvalds 	if (length < 0)
7831da177e4SLinus Torvalds 		goto out2;
7841da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
7851da177e4SLinus Torvalds 	if (length < 0)
7861da177e4SLinus Torvalds 		goto out2;
7871da177e4SLinus Torvalds 
7881da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
7891da177e4SLinus Torvalds 	if (length < 0)
7901da177e4SLinus Torvalds 		goto out2;
7911da177e4SLinus Torvalds 
7921da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
7931da177e4SLinus Torvalds 	if (length < 0)
7941da177e4SLinus Torvalds 		goto out2;
7951da177e4SLinus Torvalds 
7961da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
7971da177e4SLinus Torvalds 		length = -ERANGE;
7981da177e4SLinus Torvalds 		goto out3;
7991da177e4SLinus Torvalds 	}
8001da177e4SLinus Torvalds 
8011da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
8021da177e4SLinus Torvalds 	length = len;
8031da177e4SLinus Torvalds out3:
8041da177e4SLinus Torvalds 	kfree(newcon);
8051da177e4SLinus Torvalds out2:
8061da177e4SLinus Torvalds 	kfree(tcon);
8071da177e4SLinus Torvalds out:
8081da177e4SLinus Torvalds 	kfree(scon);
8091da177e4SLinus Torvalds 	return length;
8101da177e4SLinus Torvalds }
8111da177e4SLinus Torvalds 
8121da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
8131da177e4SLinus Torvalds {
8141da177e4SLinus Torvalds 	char *con, *user, *ptr;
8151da177e4SLinus Torvalds 	u32 sid, *sids;
8161da177e4SLinus Torvalds 	ssize_t length;
8171da177e4SLinus Torvalds 	char *newcon;
8181da177e4SLinus Torvalds 	int i, rc;
8191da177e4SLinus Torvalds 	u32 len, nsids;
8201da177e4SLinus Torvalds 
8211da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
8221da177e4SLinus Torvalds 	if (length)
8231da177e4SLinus Torvalds 		return length;
8241da177e4SLinus Torvalds 
8251da177e4SLinus Torvalds 	length = -ENOMEM;
82689d155efSJames Morris 	con = kzalloc(size + 1, GFP_KERNEL);
8271da177e4SLinus Torvalds 	if (!con)
8281da177e4SLinus Torvalds 		return length;
8291da177e4SLinus Torvalds 
83089d155efSJames Morris 	user = kzalloc(size + 1, GFP_KERNEL);
8311da177e4SLinus Torvalds 	if (!user)
8321da177e4SLinus Torvalds 		goto out;
8331da177e4SLinus Torvalds 
8341da177e4SLinus Torvalds 	length = -EINVAL;
8351da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
8361da177e4SLinus Torvalds 		goto out2;
8371da177e4SLinus Torvalds 
8381da177e4SLinus Torvalds 	length = security_context_to_sid(con, strlen(con) + 1, &sid);
8391da177e4SLinus Torvalds 	if (length < 0)
8401da177e4SLinus Torvalds 		goto out2;
8411da177e4SLinus Torvalds 
8421da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
8431da177e4SLinus Torvalds 	if (length < 0)
8441da177e4SLinus Torvalds 		goto out2;
8451da177e4SLinus Torvalds 
8461da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
8471da177e4SLinus Torvalds 	ptr = buf + length;
8481da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
8491da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
8501da177e4SLinus Torvalds 		if (rc) {
8511da177e4SLinus Torvalds 			length = rc;
8521da177e4SLinus Torvalds 			goto out3;
8531da177e4SLinus Torvalds 		}
8541da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
8551da177e4SLinus Torvalds 			kfree(newcon);
8561da177e4SLinus Torvalds 			length = -ERANGE;
8571da177e4SLinus Torvalds 			goto out3;
8581da177e4SLinus Torvalds 		}
8591da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
8601da177e4SLinus Torvalds 		kfree(newcon);
8611da177e4SLinus Torvalds 		ptr += len;
8621da177e4SLinus Torvalds 		length += len;
8631da177e4SLinus Torvalds 	}
8641da177e4SLinus Torvalds out3:
8651da177e4SLinus Torvalds 	kfree(sids);
8661da177e4SLinus Torvalds out2:
8671da177e4SLinus Torvalds 	kfree(user);
8681da177e4SLinus Torvalds out:
8691da177e4SLinus Torvalds 	kfree(con);
8701da177e4SLinus Torvalds 	return length;
8711da177e4SLinus Torvalds }
8721da177e4SLinus Torvalds 
8731da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
8741da177e4SLinus Torvalds {
8751da177e4SLinus Torvalds 	char *scon, *tcon;
8761da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
8771da177e4SLinus Torvalds 	u16 tclass;
8781da177e4SLinus Torvalds 	ssize_t length;
8791da177e4SLinus Torvalds 	char *newcon;
8801da177e4SLinus Torvalds 	u32 len;
8811da177e4SLinus Torvalds 
8821da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
8831da177e4SLinus Torvalds 	if (length)
8841da177e4SLinus Torvalds 		return length;
8851da177e4SLinus Torvalds 
8861da177e4SLinus Torvalds 	length = -ENOMEM;
88789d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
8881da177e4SLinus Torvalds 	if (!scon)
8891da177e4SLinus Torvalds 		return length;
8901da177e4SLinus Torvalds 
89189d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
8921da177e4SLinus Torvalds 	if (!tcon)
8931da177e4SLinus Torvalds 		goto out;
8941da177e4SLinus Torvalds 
8951da177e4SLinus Torvalds 	length = -EINVAL;
8961da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
8971da177e4SLinus Torvalds 		goto out2;
8981da177e4SLinus Torvalds 
8991da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon) + 1, &ssid);
9001da177e4SLinus Torvalds 	if (length < 0)
9011da177e4SLinus Torvalds 		goto out2;
9021da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon) + 1, &tsid);
9031da177e4SLinus Torvalds 	if (length < 0)
9041da177e4SLinus Torvalds 		goto out2;
9051da177e4SLinus Torvalds 
9061da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
9071da177e4SLinus Torvalds 	if (length < 0)
9081da177e4SLinus Torvalds 		goto out2;
9091da177e4SLinus Torvalds 
9101da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
9111da177e4SLinus Torvalds 	if (length < 0)
9121da177e4SLinus Torvalds 		goto out2;
9131da177e4SLinus Torvalds 
9141da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
915744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
916744ba35eSEric Paris 			"payload max\n", __func__, len);
9171da177e4SLinus Torvalds 		length = -ERANGE;
9181da177e4SLinus Torvalds 		goto out3;
9191da177e4SLinus Torvalds 	}
9201da177e4SLinus Torvalds 
9211da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
9221da177e4SLinus Torvalds 	length = len;
9231da177e4SLinus Torvalds out3:
9241da177e4SLinus Torvalds 	kfree(newcon);
9251da177e4SLinus Torvalds out2:
9261da177e4SLinus Torvalds 	kfree(tcon);
9271da177e4SLinus Torvalds out:
9281da177e4SLinus Torvalds 	kfree(scon);
9291da177e4SLinus Torvalds 	return length;
9301da177e4SLinus Torvalds }
9311da177e4SLinus Torvalds 
9321da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
9331da177e4SLinus Torvalds {
9341da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
9351da177e4SLinus Torvalds 
9361da177e4SLinus Torvalds 	if (ret) {
9371da177e4SLinus Torvalds 		ret->i_mode = mode;
9381da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
9391da177e4SLinus Torvalds 	}
9401da177e4SLinus Torvalds 	return ret;
9411da177e4SLinus Torvalds }
9421da177e4SLinus Torvalds 
9431da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
9441da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
9451da177e4SLinus Torvalds {
9461da177e4SLinus Torvalds 	char *page = NULL;
9471da177e4SLinus Torvalds 	ssize_t length;
9481da177e4SLinus Torvalds 	ssize_t ret;
9491da177e4SLinus Torvalds 	int cur_enforcing;
950d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
951d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
952d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
9531da177e4SLinus Torvalds 
954bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
9551da177e4SLinus Torvalds 
956d313f948SStephen Smalley 	if (index >= bool_num || strcmp(name, bool_pending_names[index])) {
957d313f948SStephen Smalley 		ret = -EINVAL;
958d313f948SStephen Smalley 		goto out;
959d313f948SStephen Smalley 	}
9601da177e4SLinus Torvalds 
9611872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
9621872981bSEric Paris 	if (!page) {
9631da177e4SLinus Torvalds 		ret = -ENOMEM;
9641da177e4SLinus Torvalds 		goto out;
9651da177e4SLinus Torvalds 	}
9661da177e4SLinus Torvalds 
967d313f948SStephen Smalley 	cur_enforcing = security_get_bool_value(index);
9681da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
9691da177e4SLinus Torvalds 		ret = cur_enforcing;
9701da177e4SLinus Torvalds 		goto out;
9711da177e4SLinus Torvalds 	}
9721da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
973d313f948SStephen Smalley 			  bool_pending_values[index]);
97468bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
9751da177e4SLinus Torvalds out:
976bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
9771da177e4SLinus Torvalds 	if (page)
9781da177e4SLinus Torvalds 		free_page((unsigned long)page);
9791da177e4SLinus Torvalds 	return ret;
9801da177e4SLinus Torvalds }
9811da177e4SLinus Torvalds 
9821da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
9831da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
9841da177e4SLinus Torvalds {
9851da177e4SLinus Torvalds 	char *page = NULL;
986d313f948SStephen Smalley 	ssize_t length;
9871da177e4SLinus Torvalds 	int new_value;
988d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
989d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
990d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
9911da177e4SLinus Torvalds 
992bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
9931da177e4SLinus Torvalds 
9941da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
9951da177e4SLinus Torvalds 	if (length)
9961da177e4SLinus Torvalds 		goto out;
9971da177e4SLinus Torvalds 
998d313f948SStephen Smalley 	if (index >= bool_num || strcmp(name, bool_pending_names[index])) {
999d313f948SStephen Smalley 		length = -EINVAL;
1000d313f948SStephen Smalley 		goto out;
1001d313f948SStephen Smalley 	}
1002d313f948SStephen Smalley 
1003bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
10041da177e4SLinus Torvalds 		length = -ENOMEM;
10051da177e4SLinus Torvalds 		goto out;
10061da177e4SLinus Torvalds 	}
1007d313f948SStephen Smalley 
10081da177e4SLinus Torvalds 	if (*ppos != 0) {
10091da177e4SLinus Torvalds 		/* No partial writes. */
1010d313f948SStephen Smalley 		length = -EINVAL;
10111da177e4SLinus Torvalds 		goto out;
10121da177e4SLinus Torvalds 	}
10131da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
10141da177e4SLinus Torvalds 	if (!page) {
10151da177e4SLinus Torvalds 		length = -ENOMEM;
10161da177e4SLinus Torvalds 		goto out;
10171da177e4SLinus Torvalds 	}
10181da177e4SLinus Torvalds 
1019d313f948SStephen Smalley 	length = -EFAULT;
10201da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
10211da177e4SLinus Torvalds 		goto out;
10221da177e4SLinus Torvalds 
10231da177e4SLinus Torvalds 	length = -EINVAL;
10241da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
10251da177e4SLinus Torvalds 		goto out;
10261da177e4SLinus Torvalds 
10271da177e4SLinus Torvalds 	if (new_value)
10281da177e4SLinus Torvalds 		new_value = 1;
10291da177e4SLinus Torvalds 
1030d313f948SStephen Smalley 	bool_pending_values[index] = new_value;
10311da177e4SLinus Torvalds 	length = count;
10321da177e4SLinus Torvalds 
10331da177e4SLinus Torvalds out:
1034bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
10351da177e4SLinus Torvalds 	if (page)
10361da177e4SLinus Torvalds 		free_page((unsigned long) page);
10371da177e4SLinus Torvalds 	return length;
10381da177e4SLinus Torvalds }
10391da177e4SLinus Torvalds 
10409c2e08c5SArjan van de Ven static const struct file_operations sel_bool_ops = {
10411da177e4SLinus Torvalds 	.read		= sel_read_bool,
10421da177e4SLinus Torvalds 	.write		= sel_write_bool,
104357a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
10441da177e4SLinus Torvalds };
10451da177e4SLinus Torvalds 
10461da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
10471da177e4SLinus Torvalds 				      const char __user *buf,
10481da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
10491da177e4SLinus Torvalds {
10501da177e4SLinus Torvalds 	char *page = NULL;
1051d313f948SStephen Smalley 	ssize_t length;
10521da177e4SLinus Torvalds 	int new_value;
10531da177e4SLinus Torvalds 
1054bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
10551da177e4SLinus Torvalds 
10561da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
10571da177e4SLinus Torvalds 	if (length)
10581da177e4SLinus Torvalds 		goto out;
10591da177e4SLinus Torvalds 
1060bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
10611da177e4SLinus Torvalds 		length = -ENOMEM;
10621da177e4SLinus Torvalds 		goto out;
10631da177e4SLinus Torvalds 	}
10641da177e4SLinus Torvalds 	if (*ppos != 0) {
10651da177e4SLinus Torvalds 		/* No partial writes. */
10661da177e4SLinus Torvalds 		goto out;
10671da177e4SLinus Torvalds 	}
10681da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
10691da177e4SLinus Torvalds 	if (!page) {
10701da177e4SLinus Torvalds 		length = -ENOMEM;
10711da177e4SLinus Torvalds 		goto out;
10721da177e4SLinus Torvalds 	}
10731da177e4SLinus Torvalds 
1074d313f948SStephen Smalley 	length = -EFAULT;
10751da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
10761da177e4SLinus Torvalds 		goto out;
10771da177e4SLinus Torvalds 
10781da177e4SLinus Torvalds 	length = -EINVAL;
10791da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
10801da177e4SLinus Torvalds 		goto out;
10811da177e4SLinus Torvalds 
10821872981bSEric Paris 	if (new_value && bool_pending_values)
10831da177e4SLinus Torvalds 		security_set_bools(bool_num, bool_pending_values);
10841da177e4SLinus Torvalds 
10851da177e4SLinus Torvalds 	length = count;
10861da177e4SLinus Torvalds 
10871da177e4SLinus Torvalds out:
1088bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
10891da177e4SLinus Torvalds 	if (page)
10901da177e4SLinus Torvalds 		free_page((unsigned long) page);
10911da177e4SLinus Torvalds 	return length;
10921da177e4SLinus Torvalds }
10931da177e4SLinus Torvalds 
10949c2e08c5SArjan van de Ven static const struct file_operations sel_commit_bools_ops = {
10951da177e4SLinus Torvalds 	.write		= sel_commit_bools_write,
109657a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
10971da177e4SLinus Torvalds };
10981da177e4SLinus Torvalds 
10990c92d7c7SChristopher J. PeBenito static void sel_remove_entries(struct dentry *de)
11001da177e4SLinus Torvalds {
11010955dc03SStephen Smalley 	struct list_head *node;
11021da177e4SLinus Torvalds 
11031da177e4SLinus Torvalds 	spin_lock(&dcache_lock);
11041da177e4SLinus Torvalds 	node = de->d_subdirs.next;
11051da177e4SLinus Torvalds 	while (node != &de->d_subdirs) {
11065160ee6fSEric Dumazet 		struct dentry *d = list_entry(node, struct dentry, d_u.d_child);
11071da177e4SLinus Torvalds 		list_del_init(node);
11081da177e4SLinus Torvalds 
11091da177e4SLinus Torvalds 		if (d->d_inode) {
11101da177e4SLinus Torvalds 			d = dget_locked(d);
11111da177e4SLinus Torvalds 			spin_unlock(&dcache_lock);
11121da177e4SLinus Torvalds 			d_delete(d);
11131da177e4SLinus Torvalds 			simple_unlink(de->d_inode, d);
11141da177e4SLinus Torvalds 			dput(d);
11151da177e4SLinus Torvalds 			spin_lock(&dcache_lock);
11161da177e4SLinus Torvalds 		}
11171da177e4SLinus Torvalds 		node = de->d_subdirs.next;
11181da177e4SLinus Torvalds 	}
11191da177e4SLinus Torvalds 
11201da177e4SLinus Torvalds 	spin_unlock(&dcache_lock);
11211da177e4SLinus Torvalds }
11221da177e4SLinus Torvalds 
11231da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
11241da177e4SLinus Torvalds 
11251da177e4SLinus Torvalds static int sel_make_bools(void)
11261da177e4SLinus Torvalds {
11271da177e4SLinus Torvalds 	int i, ret = 0;
11281da177e4SLinus Torvalds 	ssize_t len;
11291da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
11301da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
11311da177e4SLinus Torvalds 	struct inode *inode = NULL;
11321da177e4SLinus Torvalds 	struct inode_security_struct *isec;
11331da177e4SLinus Torvalds 	char **names = NULL, *page;
11341da177e4SLinus Torvalds 	int num;
11351da177e4SLinus Torvalds 	int *values = NULL;
11361da177e4SLinus Torvalds 	u32 sid;
11371da177e4SLinus Torvalds 
11381da177e4SLinus Torvalds 	/* remove any existing files */
11398007f102SXiaotian Feng 	for (i = 0; i < bool_num; i++)
11408007f102SXiaotian Feng 		kfree(bool_pending_names[i]);
1141d313f948SStephen Smalley 	kfree(bool_pending_names);
11421da177e4SLinus Torvalds 	kfree(bool_pending_values);
1143d313f948SStephen Smalley 	bool_pending_names = NULL;
114420c19e41SDavi Arnaut 	bool_pending_values = NULL;
11451da177e4SLinus Torvalds 
11460c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
11471da177e4SLinus Torvalds 
11481872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
11491872981bSEric Paris 	if (!page)
11501da177e4SLinus Torvalds 		return -ENOMEM;
11511da177e4SLinus Torvalds 
11521da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
11531da177e4SLinus Torvalds 	if (ret != 0)
11541da177e4SLinus Torvalds 		goto out;
11551da177e4SLinus Torvalds 
11561da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
11571da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
11581da177e4SLinus Torvalds 		if (!dentry) {
11591da177e4SLinus Torvalds 			ret = -ENOMEM;
11601da177e4SLinus Torvalds 			goto err;
11611da177e4SLinus Torvalds 		}
11621da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
11631da177e4SLinus Torvalds 		if (!inode) {
11641da177e4SLinus Torvalds 			ret = -ENOMEM;
11651da177e4SLinus Torvalds 			goto err;
11661da177e4SLinus Torvalds 		}
11671da177e4SLinus Torvalds 
11681da177e4SLinus Torvalds 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
11691da177e4SLinus Torvalds 		if (len < 0) {
11701da177e4SLinus Torvalds 			ret = -EINVAL;
11711da177e4SLinus Torvalds 			goto err;
11721da177e4SLinus Torvalds 		} else if (len >= PAGE_SIZE) {
11731da177e4SLinus Torvalds 			ret = -ENAMETOOLONG;
11741da177e4SLinus Torvalds 			goto err;
11751da177e4SLinus Torvalds 		}
11761da177e4SLinus Torvalds 		isec = (struct inode_security_struct *)inode->i_security;
11771872981bSEric Paris 		ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
11781872981bSEric Paris 		if (ret)
11791da177e4SLinus Torvalds 			goto err;
11801da177e4SLinus Torvalds 		isec->sid = sid;
11811da177e4SLinus Torvalds 		isec->initialized = 1;
11821da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
1183bce34bc0SJames Carter 		inode->i_ino = i|SEL_BOOL_INO_OFFSET;
11841da177e4SLinus Torvalds 		d_add(dentry, inode);
11851da177e4SLinus Torvalds 	}
11861da177e4SLinus Torvalds 	bool_num = num;
1187d313f948SStephen Smalley 	bool_pending_names = names;
11881da177e4SLinus Torvalds 	bool_pending_values = values;
11891da177e4SLinus Torvalds out:
11901da177e4SLinus Torvalds 	free_page((unsigned long)page);
1191d313f948SStephen Smalley 	return ret;
1192d313f948SStephen Smalley err:
11931da177e4SLinus Torvalds 	if (names) {
11949a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
11951da177e4SLinus Torvalds 			kfree(names[i]);
11961da177e4SLinus Torvalds 		kfree(names);
11971da177e4SLinus Torvalds 	}
119820c19e41SDavi Arnaut 	kfree(values);
11990c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
12001da177e4SLinus Torvalds 	ret = -ENOMEM;
12011da177e4SLinus Torvalds 	goto out;
12021da177e4SLinus Torvalds }
12031da177e4SLinus Torvalds 
12041da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
12051da177e4SLinus Torvalds 
12061872981bSEric Paris struct dentry *selinux_null;
12071da177e4SLinus Torvalds 
12081da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
12091da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
12101da177e4SLinus Torvalds {
12111da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
12121da177e4SLinus Torvalds 	ssize_t length;
12131da177e4SLinus Torvalds 
12141da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
12151da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
12161da177e4SLinus Torvalds }
12171da177e4SLinus Torvalds 
12181da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file *file,
12191da177e4SLinus Torvalds 					     const char __user *buf,
12201da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
12211da177e4SLinus Torvalds 
12221da177e4SLinus Torvalds {
12231da177e4SLinus Torvalds 	char *page;
12241da177e4SLinus Torvalds 	ssize_t ret;
12251da177e4SLinus Torvalds 	int new_value;
12261da177e4SLinus Torvalds 
1227bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
12281da177e4SLinus Torvalds 		ret = -ENOMEM;
12291da177e4SLinus Torvalds 		goto out;
12301da177e4SLinus Torvalds 	}
12311da177e4SLinus Torvalds 
12321da177e4SLinus Torvalds 	if (*ppos != 0) {
12331da177e4SLinus Torvalds 		/* No partial writes. */
12341da177e4SLinus Torvalds 		ret = -EINVAL;
12351da177e4SLinus Torvalds 		goto out;
12361da177e4SLinus Torvalds 	}
12371da177e4SLinus Torvalds 
12381da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
12391da177e4SLinus Torvalds 	if (!page) {
12401da177e4SLinus Torvalds 		ret = -ENOMEM;
12411da177e4SLinus Torvalds 		goto out;
12421da177e4SLinus Torvalds 	}
12431da177e4SLinus Torvalds 
12441da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count)) {
12451da177e4SLinus Torvalds 		ret = -EFAULT;
12461da177e4SLinus Torvalds 		goto out_free;
12471da177e4SLinus Torvalds 	}
12481da177e4SLinus Torvalds 
12491da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1) {
12501da177e4SLinus Torvalds 		ret = -EINVAL;
12511da177e4SLinus Torvalds 		goto out;
12521da177e4SLinus Torvalds 	}
12531da177e4SLinus Torvalds 
12541da177e4SLinus Torvalds 	if (new_value != avc_cache_threshold) {
12551da177e4SLinus Torvalds 		ret = task_has_security(current, SECURITY__SETSECPARAM);
12561da177e4SLinus Torvalds 		if (ret)
12571da177e4SLinus Torvalds 			goto out_free;
12581da177e4SLinus Torvalds 		avc_cache_threshold = new_value;
12591da177e4SLinus Torvalds 	}
12601da177e4SLinus Torvalds 	ret = count;
12611da177e4SLinus Torvalds out_free:
12621da177e4SLinus Torvalds 	free_page((unsigned long)page);
12631da177e4SLinus Torvalds out:
12641da177e4SLinus Torvalds 	return ret;
12651da177e4SLinus Torvalds }
12661da177e4SLinus Torvalds 
12671da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
12681da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
12691da177e4SLinus Torvalds {
12701da177e4SLinus Torvalds 	char *page;
12711da177e4SLinus Torvalds 	ssize_t ret = 0;
12721da177e4SLinus Torvalds 
12731da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
12741da177e4SLinus Torvalds 	if (!page) {
12751da177e4SLinus Torvalds 		ret = -ENOMEM;
12761da177e4SLinus Torvalds 		goto out;
12771da177e4SLinus Torvalds 	}
12781da177e4SLinus Torvalds 	ret = avc_get_hash_stats(page);
12791da177e4SLinus Torvalds 	if (ret >= 0)
12801da177e4SLinus Torvalds 		ret = simple_read_from_buffer(buf, count, ppos, page, ret);
12811da177e4SLinus Torvalds 	free_page((unsigned long)page);
12821da177e4SLinus Torvalds out:
12831da177e4SLinus Torvalds 	return ret;
12841da177e4SLinus Torvalds }
12851da177e4SLinus Torvalds 
12869c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_threshold_ops = {
12871da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
12881da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
128957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
12901da177e4SLinus Torvalds };
12911da177e4SLinus Torvalds 
12929c2e08c5SArjan van de Ven static const struct file_operations sel_avc_hash_stats_ops = {
12931da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
129457a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
12951da177e4SLinus Torvalds };
12961da177e4SLinus Torvalds 
12971da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
12981da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
12991da177e4SLinus Torvalds {
13001da177e4SLinus Torvalds 	int cpu;
13011da177e4SLinus Torvalds 
13024f4b6c1aSRusty Russell 	for (cpu = *idx; cpu < nr_cpu_ids; ++cpu) {
13031da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
13041da177e4SLinus Torvalds 			continue;
13051da177e4SLinus Torvalds 		*idx = cpu + 1;
13061da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
13071da177e4SLinus Torvalds 	}
13081da177e4SLinus Torvalds 	return NULL;
13091da177e4SLinus Torvalds }
13101da177e4SLinus Torvalds 
13111da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
13121da177e4SLinus Torvalds {
13131da177e4SLinus Torvalds 	loff_t n = *pos - 1;
13141da177e4SLinus Torvalds 
13151da177e4SLinus Torvalds 	if (*pos == 0)
13161da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
13171da177e4SLinus Torvalds 
13181da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
13191da177e4SLinus Torvalds }
13201da177e4SLinus Torvalds 
13211da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
13221da177e4SLinus Torvalds {
13231da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
13241da177e4SLinus Torvalds }
13251da177e4SLinus Torvalds 
13261da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
13271da177e4SLinus Torvalds {
13281da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
13291da177e4SLinus Torvalds 
13301da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
13311da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
13321da177e4SLinus Torvalds 			   "frees\n");
13331da177e4SLinus Torvalds 	else
13341da177e4SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", st->lookups,
13351da177e4SLinus Torvalds 			   st->hits, st->misses, st->allocations,
13361da177e4SLinus Torvalds 			   st->reclaims, st->frees);
13371da177e4SLinus Torvalds 	return 0;
13381da177e4SLinus Torvalds }
13391da177e4SLinus Torvalds 
13401da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
13411da177e4SLinus Torvalds { }
13421da177e4SLinus Torvalds 
13431996a109SJan Engelhardt static const struct seq_operations sel_avc_cache_stats_seq_ops = {
13441da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
13451da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
13461da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
13471da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
13481da177e4SLinus Torvalds };
13491da177e4SLinus Torvalds 
13501da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
13511da177e4SLinus Torvalds {
13521da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
13531da177e4SLinus Torvalds }
13541da177e4SLinus Torvalds 
13559c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_stats_ops = {
13561da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
13571da177e4SLinus Torvalds 	.read		= seq_read,
13581da177e4SLinus Torvalds 	.llseek		= seq_lseek,
13591da177e4SLinus Torvalds 	.release	= seq_release,
13601da177e4SLinus Torvalds };
13611da177e4SLinus Torvalds #endif
13621da177e4SLinus Torvalds 
13631da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
13641da177e4SLinus Torvalds {
13651da177e4SLinus Torvalds 	int i, ret = 0;
13661da177e4SLinus Torvalds 	static struct tree_descr files[] = {
13671da177e4SLinus Torvalds 		{ "cache_threshold",
13681da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
13691da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
13701da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
13711da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
13721da177e4SLinus Torvalds #endif
13731da177e4SLinus Torvalds 	};
13741da177e4SLinus Torvalds 
13756e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
13761da177e4SLinus Torvalds 		struct inode *inode;
13771da177e4SLinus Torvalds 		struct dentry *dentry;
13781da177e4SLinus Torvalds 
13791da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
13801da177e4SLinus Torvalds 		if (!dentry) {
13811da177e4SLinus Torvalds 			ret = -ENOMEM;
1382d6aafa65SJames Morris 			goto out;
13831da177e4SLinus Torvalds 		}
13841da177e4SLinus Torvalds 
13851da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
13861da177e4SLinus Torvalds 		if (!inode) {
13871da177e4SLinus Torvalds 			ret = -ENOMEM;
1388d6aafa65SJames Morris 			goto out;
13891da177e4SLinus Torvalds 		}
13901da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
13916174eafcSJames Carter 		inode->i_ino = ++sel_last_ino;
13921da177e4SLinus Torvalds 		d_add(dentry, inode);
13931da177e4SLinus Torvalds 	}
13941da177e4SLinus Torvalds out:
13951da177e4SLinus Torvalds 	return ret;
13961da177e4SLinus Torvalds }
13971da177e4SLinus Torvalds 
1398f0ee2e46SJames Carter static ssize_t sel_read_initcon(struct file *file, char __user *buf,
1399f0ee2e46SJames Carter 				size_t count, loff_t *ppos)
1400f0ee2e46SJames Carter {
1401f0ee2e46SJames Carter 	struct inode *inode;
1402f0ee2e46SJames Carter 	char *con;
1403f0ee2e46SJames Carter 	u32 sid, len;
1404f0ee2e46SJames Carter 	ssize_t ret;
1405f0ee2e46SJames Carter 
1406f0ee2e46SJames Carter 	inode = file->f_path.dentry->d_inode;
1407f0ee2e46SJames Carter 	sid = inode->i_ino&SEL_INO_MASK;
1408f0ee2e46SJames Carter 	ret = security_sid_to_context(sid, &con, &len);
1409f0ee2e46SJames Carter 	if (ret < 0)
1410f0ee2e46SJames Carter 		return ret;
1411f0ee2e46SJames Carter 
1412f0ee2e46SJames Carter 	ret = simple_read_from_buffer(buf, count, ppos, con, len);
1413f0ee2e46SJames Carter 	kfree(con);
1414f0ee2e46SJames Carter 	return ret;
1415f0ee2e46SJames Carter }
1416f0ee2e46SJames Carter 
1417f0ee2e46SJames Carter static const struct file_operations sel_initcon_ops = {
1418f0ee2e46SJames Carter 	.read		= sel_read_initcon,
141957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1420f0ee2e46SJames Carter };
1421f0ee2e46SJames Carter 
1422f0ee2e46SJames Carter static int sel_make_initcon_files(struct dentry *dir)
1423f0ee2e46SJames Carter {
1424f0ee2e46SJames Carter 	int i, ret = 0;
1425f0ee2e46SJames Carter 
1426f0ee2e46SJames Carter 	for (i = 1; i <= SECINITSID_NUM; i++) {
1427f0ee2e46SJames Carter 		struct inode *inode;
1428f0ee2e46SJames Carter 		struct dentry *dentry;
1429f0ee2e46SJames Carter 		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
1430f0ee2e46SJames Carter 		if (!dentry) {
1431f0ee2e46SJames Carter 			ret = -ENOMEM;
1432f0ee2e46SJames Carter 			goto out;
1433f0ee2e46SJames Carter 		}
1434f0ee2e46SJames Carter 
1435f0ee2e46SJames Carter 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1436f0ee2e46SJames Carter 		if (!inode) {
1437f0ee2e46SJames Carter 			ret = -ENOMEM;
1438f0ee2e46SJames Carter 			goto out;
1439f0ee2e46SJames Carter 		}
1440f0ee2e46SJames Carter 		inode->i_fop = &sel_initcon_ops;
1441f0ee2e46SJames Carter 		inode->i_ino = i|SEL_INITCON_INO_OFFSET;
1442f0ee2e46SJames Carter 		d_add(dentry, inode);
1443f0ee2e46SJames Carter 	}
1444f0ee2e46SJames Carter out:
1445f0ee2e46SJames Carter 	return ret;
1446f0ee2e46SJames Carter }
1447f0ee2e46SJames Carter 
1448e47c8fc5SChristopher J. PeBenito static inline unsigned int sel_div(unsigned long a, unsigned long b)
1449e47c8fc5SChristopher J. PeBenito {
1450e47c8fc5SChristopher J. PeBenito 	return a / b - (a % b < 0);
1451e47c8fc5SChristopher J. PeBenito }
1452e47c8fc5SChristopher J. PeBenito 
1453e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_class_to_ino(u16 class)
1454e47c8fc5SChristopher J. PeBenito {
1455e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1)) | SEL_CLASS_INO_OFFSET;
1456e47c8fc5SChristopher J. PeBenito }
1457e47c8fc5SChristopher J. PeBenito 
1458e47c8fc5SChristopher J. PeBenito static inline u16 sel_ino_to_class(unsigned long ino)
1459e47c8fc5SChristopher J. PeBenito {
1460e47c8fc5SChristopher J. PeBenito 	return sel_div(ino & SEL_INO_MASK, SEL_VEC_MAX + 1);
1461e47c8fc5SChristopher J. PeBenito }
1462e47c8fc5SChristopher J. PeBenito 
1463e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_perm_to_ino(u16 class, u32 perm)
1464e47c8fc5SChristopher J. PeBenito {
1465e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET;
1466e47c8fc5SChristopher J. PeBenito }
1467e47c8fc5SChristopher J. PeBenito 
1468e47c8fc5SChristopher J. PeBenito static inline u32 sel_ino_to_perm(unsigned long ino)
1469e47c8fc5SChristopher J. PeBenito {
1470e47c8fc5SChristopher J. PeBenito 	return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1);
1471e47c8fc5SChristopher J. PeBenito }
1472e47c8fc5SChristopher J. PeBenito 
1473e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_class(struct file *file, char __user *buf,
1474e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1475e47c8fc5SChristopher J. PeBenito {
1476e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1477e47c8fc5SChristopher J. PeBenito 	char *page;
1478e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1479e47c8fc5SChristopher J. PeBenito 
1480e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1481e47c8fc5SChristopher J. PeBenito 	if (!page) {
1482e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1483e47c8fc5SChristopher J. PeBenito 		goto out;
1484e47c8fc5SChristopher J. PeBenito 	}
1485e47c8fc5SChristopher J. PeBenito 
1486e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_class(ino));
1487e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1488e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1489e47c8fc5SChristopher J. PeBenito out:
1490e47c8fc5SChristopher J. PeBenito 	return rc;
1491e47c8fc5SChristopher J. PeBenito }
1492e47c8fc5SChristopher J. PeBenito 
1493e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_class_ops = {
1494e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_class,
149557a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1496e47c8fc5SChristopher J. PeBenito };
1497e47c8fc5SChristopher J. PeBenito 
1498e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_perm(struct file *file, char __user *buf,
1499e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1500e47c8fc5SChristopher J. PeBenito {
1501e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1502e47c8fc5SChristopher J. PeBenito 	char *page;
1503e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1504e47c8fc5SChristopher J. PeBenito 
1505e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1506e47c8fc5SChristopher J. PeBenito 	if (!page) {
1507e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1508e47c8fc5SChristopher J. PeBenito 		goto out;
1509e47c8fc5SChristopher J. PeBenito 	}
1510e47c8fc5SChristopher J. PeBenito 
1511e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_perm(ino));
1512e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1513e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1514e47c8fc5SChristopher J. PeBenito out:
1515e47c8fc5SChristopher J. PeBenito 	return rc;
1516e47c8fc5SChristopher J. PeBenito }
1517e47c8fc5SChristopher J. PeBenito 
1518e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_perm_ops = {
1519e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_perm,
152057a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1521e47c8fc5SChristopher J. PeBenito };
1522e47c8fc5SChristopher J. PeBenito 
15233bb56b25SPaul Moore static ssize_t sel_read_policycap(struct file *file, char __user *buf,
15243bb56b25SPaul Moore 				  size_t count, loff_t *ppos)
15253bb56b25SPaul Moore {
15263bb56b25SPaul Moore 	int value;
15273bb56b25SPaul Moore 	char tmpbuf[TMPBUFLEN];
15283bb56b25SPaul Moore 	ssize_t length;
15293bb56b25SPaul Moore 	unsigned long i_ino = file->f_path.dentry->d_inode->i_ino;
15303bb56b25SPaul Moore 
15313bb56b25SPaul Moore 	value = security_policycap_supported(i_ino & SEL_INO_MASK);
15323bb56b25SPaul Moore 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
15333bb56b25SPaul Moore 
15343bb56b25SPaul Moore 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
15353bb56b25SPaul Moore }
15363bb56b25SPaul Moore 
15373bb56b25SPaul Moore static const struct file_operations sel_policycap_ops = {
15383bb56b25SPaul Moore 	.read		= sel_read_policycap,
153957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
15403bb56b25SPaul Moore };
15413bb56b25SPaul Moore 
1542e47c8fc5SChristopher J. PeBenito static int sel_make_perm_files(char *objclass, int classvalue,
1543e47c8fc5SChristopher J. PeBenito 				struct dentry *dir)
1544e47c8fc5SChristopher J. PeBenito {
1545e47c8fc5SChristopher J. PeBenito 	int i, rc = 0, nperms;
1546e47c8fc5SChristopher J. PeBenito 	char **perms;
1547e47c8fc5SChristopher J. PeBenito 
1548e47c8fc5SChristopher J. PeBenito 	rc = security_get_permissions(objclass, &perms, &nperms);
1549e47c8fc5SChristopher J. PeBenito 	if (rc)
1550e47c8fc5SChristopher J. PeBenito 		goto out;
1551e47c8fc5SChristopher J. PeBenito 
1552e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++) {
1553e47c8fc5SChristopher J. PeBenito 		struct inode *inode;
1554e47c8fc5SChristopher J. PeBenito 		struct dentry *dentry;
1555e47c8fc5SChristopher J. PeBenito 
1556e47c8fc5SChristopher J. PeBenito 		dentry = d_alloc_name(dir, perms[i]);
1557e47c8fc5SChristopher J. PeBenito 		if (!dentry) {
1558e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1559e47c8fc5SChristopher J. PeBenito 			goto out1;
1560e47c8fc5SChristopher J. PeBenito 		}
1561e47c8fc5SChristopher J. PeBenito 
1562e47c8fc5SChristopher J. PeBenito 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1563e47c8fc5SChristopher J. PeBenito 		if (!inode) {
1564e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1565e47c8fc5SChristopher J. PeBenito 			goto out1;
1566e47c8fc5SChristopher J. PeBenito 		}
1567e47c8fc5SChristopher J. PeBenito 		inode->i_fop = &sel_perm_ops;
1568e47c8fc5SChristopher J. PeBenito 		/* i+1 since perm values are 1-indexed */
1569e47c8fc5SChristopher J. PeBenito 		inode->i_ino = sel_perm_to_ino(classvalue, i + 1);
1570e47c8fc5SChristopher J. PeBenito 		d_add(dentry, inode);
1571e47c8fc5SChristopher J. PeBenito 	}
1572e47c8fc5SChristopher J. PeBenito 
1573e47c8fc5SChristopher J. PeBenito out1:
1574e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++)
1575e47c8fc5SChristopher J. PeBenito 		kfree(perms[i]);
1576e47c8fc5SChristopher J. PeBenito 	kfree(perms);
1577e47c8fc5SChristopher J. PeBenito out:
1578e47c8fc5SChristopher J. PeBenito 	return rc;
1579e47c8fc5SChristopher J. PeBenito }
1580e47c8fc5SChristopher J. PeBenito 
1581e47c8fc5SChristopher J. PeBenito static int sel_make_class_dir_entries(char *classname, int index,
1582e47c8fc5SChristopher J. PeBenito 					struct dentry *dir)
1583e47c8fc5SChristopher J. PeBenito {
1584e47c8fc5SChristopher J. PeBenito 	struct dentry *dentry = NULL;
1585e47c8fc5SChristopher J. PeBenito 	struct inode *inode = NULL;
1586e47c8fc5SChristopher J. PeBenito 	int rc;
1587e47c8fc5SChristopher J. PeBenito 
1588e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "index");
1589e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1590e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1591e47c8fc5SChristopher J. PeBenito 		goto out;
1592e47c8fc5SChristopher J. PeBenito 	}
1593e47c8fc5SChristopher J. PeBenito 
1594e47c8fc5SChristopher J. PeBenito 	inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1595e47c8fc5SChristopher J. PeBenito 	if (!inode) {
1596e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1597e47c8fc5SChristopher J. PeBenito 		goto out;
1598e47c8fc5SChristopher J. PeBenito 	}
1599e47c8fc5SChristopher J. PeBenito 
1600e47c8fc5SChristopher J. PeBenito 	inode->i_fop = &sel_class_ops;
1601e47c8fc5SChristopher J. PeBenito 	inode->i_ino = sel_class_to_ino(index);
1602e47c8fc5SChristopher J. PeBenito 	d_add(dentry, inode);
1603e47c8fc5SChristopher J. PeBenito 
1604e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "perms");
1605e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1606e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1607e47c8fc5SChristopher J. PeBenito 		goto out;
1608e47c8fc5SChristopher J. PeBenito 	}
1609e47c8fc5SChristopher J. PeBenito 
1610e47c8fc5SChristopher J. PeBenito 	rc = sel_make_dir(dir->d_inode, dentry, &last_class_ino);
1611e47c8fc5SChristopher J. PeBenito 	if (rc)
1612e47c8fc5SChristopher J. PeBenito 		goto out;
1613e47c8fc5SChristopher J. PeBenito 
1614e47c8fc5SChristopher J. PeBenito 	rc = sel_make_perm_files(classname, index, dentry);
1615e47c8fc5SChristopher J. PeBenito 
1616e47c8fc5SChristopher J. PeBenito out:
1617e47c8fc5SChristopher J. PeBenito 	return rc;
1618e47c8fc5SChristopher J. PeBenito }
1619e47c8fc5SChristopher J. PeBenito 
1620e47c8fc5SChristopher J. PeBenito static void sel_remove_classes(void)
1621e47c8fc5SChristopher J. PeBenito {
1622e47c8fc5SChristopher J. PeBenito 	struct list_head *class_node;
1623e47c8fc5SChristopher J. PeBenito 
1624e47c8fc5SChristopher J. PeBenito 	list_for_each(class_node, &class_dir->d_subdirs) {
1625e47c8fc5SChristopher J. PeBenito 		struct dentry *class_subdir = list_entry(class_node,
1626e47c8fc5SChristopher J. PeBenito 					struct dentry, d_u.d_child);
1627e47c8fc5SChristopher J. PeBenito 		struct list_head *class_subdir_node;
1628e47c8fc5SChristopher J. PeBenito 
1629e47c8fc5SChristopher J. PeBenito 		list_for_each(class_subdir_node, &class_subdir->d_subdirs) {
1630e47c8fc5SChristopher J. PeBenito 			struct dentry *d = list_entry(class_subdir_node,
1631e47c8fc5SChristopher J. PeBenito 						struct dentry, d_u.d_child);
1632e47c8fc5SChristopher J. PeBenito 
1633e47c8fc5SChristopher J. PeBenito 			if (d->d_inode)
1634e47c8fc5SChristopher J. PeBenito 				if (d->d_inode->i_mode & S_IFDIR)
1635e47c8fc5SChristopher J. PeBenito 					sel_remove_entries(d);
1636e47c8fc5SChristopher J. PeBenito 		}
1637e47c8fc5SChristopher J. PeBenito 
1638e47c8fc5SChristopher J. PeBenito 		sel_remove_entries(class_subdir);
1639e47c8fc5SChristopher J. PeBenito 	}
1640e47c8fc5SChristopher J. PeBenito 
1641e47c8fc5SChristopher J. PeBenito 	sel_remove_entries(class_dir);
1642e47c8fc5SChristopher J. PeBenito }
1643e47c8fc5SChristopher J. PeBenito 
1644e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void)
1645e47c8fc5SChristopher J. PeBenito {
1646e47c8fc5SChristopher J. PeBenito 	int rc = 0, nclasses, i;
1647e47c8fc5SChristopher J. PeBenito 	char **classes;
1648e47c8fc5SChristopher J. PeBenito 
1649e47c8fc5SChristopher J. PeBenito 	/* delete any existing entries */
1650e47c8fc5SChristopher J. PeBenito 	sel_remove_classes();
1651e47c8fc5SChristopher J. PeBenito 
1652e47c8fc5SChristopher J. PeBenito 	rc = security_get_classes(&classes, &nclasses);
1653e47c8fc5SChristopher J. PeBenito 	if (rc < 0)
1654e47c8fc5SChristopher J. PeBenito 		goto out;
1655e47c8fc5SChristopher J. PeBenito 
1656e47c8fc5SChristopher J. PeBenito 	/* +2 since classes are 1-indexed */
1657e47c8fc5SChristopher J. PeBenito 	last_class_ino = sel_class_to_ino(nclasses + 2);
1658e47c8fc5SChristopher J. PeBenito 
1659e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++) {
1660e47c8fc5SChristopher J. PeBenito 		struct dentry *class_name_dir;
1661e47c8fc5SChristopher J. PeBenito 
1662e47c8fc5SChristopher J. PeBenito 		class_name_dir = d_alloc_name(class_dir, classes[i]);
1663e47c8fc5SChristopher J. PeBenito 		if (!class_name_dir) {
1664e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1665e47c8fc5SChristopher J. PeBenito 			goto out1;
1666e47c8fc5SChristopher J. PeBenito 		}
1667e47c8fc5SChristopher J. PeBenito 
1668e47c8fc5SChristopher J. PeBenito 		rc = sel_make_dir(class_dir->d_inode, class_name_dir,
1669e47c8fc5SChristopher J. PeBenito 				&last_class_ino);
1670e47c8fc5SChristopher J. PeBenito 		if (rc)
1671e47c8fc5SChristopher J. PeBenito 			goto out1;
1672e47c8fc5SChristopher J. PeBenito 
1673e47c8fc5SChristopher J. PeBenito 		/* i+1 since class values are 1-indexed */
1674e47c8fc5SChristopher J. PeBenito 		rc = sel_make_class_dir_entries(classes[i], i + 1,
1675e47c8fc5SChristopher J. PeBenito 				class_name_dir);
1676e47c8fc5SChristopher J. PeBenito 		if (rc)
1677e47c8fc5SChristopher J. PeBenito 			goto out1;
1678e47c8fc5SChristopher J. PeBenito 	}
1679e47c8fc5SChristopher J. PeBenito 
1680e47c8fc5SChristopher J. PeBenito out1:
1681e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++)
1682e47c8fc5SChristopher J. PeBenito 		kfree(classes[i]);
1683e47c8fc5SChristopher J. PeBenito 	kfree(classes);
1684e47c8fc5SChristopher J. PeBenito out:
1685e47c8fc5SChristopher J. PeBenito 	return rc;
1686e47c8fc5SChristopher J. PeBenito }
1687e47c8fc5SChristopher J. PeBenito 
16883bb56b25SPaul Moore static int sel_make_policycap(void)
16893bb56b25SPaul Moore {
16903bb56b25SPaul Moore 	unsigned int iter;
16913bb56b25SPaul Moore 	struct dentry *dentry = NULL;
16923bb56b25SPaul Moore 	struct inode *inode = NULL;
16933bb56b25SPaul Moore 
16943bb56b25SPaul Moore 	sel_remove_entries(policycap_dir);
16953bb56b25SPaul Moore 
16963bb56b25SPaul Moore 	for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
16973bb56b25SPaul Moore 		if (iter < ARRAY_SIZE(policycap_names))
16983bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir,
16993bb56b25SPaul Moore 					      policycap_names[iter]);
17003bb56b25SPaul Moore 		else
17013bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir, "unknown");
17023bb56b25SPaul Moore 
17033bb56b25SPaul Moore 		if (dentry == NULL)
17043bb56b25SPaul Moore 			return -ENOMEM;
17053bb56b25SPaul Moore 
17063bb56b25SPaul Moore 		inode = sel_make_inode(policycap_dir->d_sb, S_IFREG | S_IRUGO);
17073bb56b25SPaul Moore 		if (inode == NULL)
17083bb56b25SPaul Moore 			return -ENOMEM;
17093bb56b25SPaul Moore 
17103bb56b25SPaul Moore 		inode->i_fop = &sel_policycap_ops;
17113bb56b25SPaul Moore 		inode->i_ino = iter | SEL_POLICYCAP_INO_OFFSET;
17123bb56b25SPaul Moore 		d_add(dentry, inode);
17133bb56b25SPaul Moore 	}
17143bb56b25SPaul Moore 
17153bb56b25SPaul Moore 	return 0;
17163bb56b25SPaul Moore }
17173bb56b25SPaul Moore 
17180dd4ae51SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
17190dd4ae51SChristopher J. PeBenito 			unsigned long *ino)
17201da177e4SLinus Torvalds {
17211da177e4SLinus Torvalds 	int ret = 0;
17221da177e4SLinus Torvalds 	struct inode *inode;
17231da177e4SLinus Torvalds 
1724edb20fb5SJames Morris 	inode = sel_make_inode(dir->i_sb, S_IFDIR | S_IRUGO | S_IXUGO);
17251da177e4SLinus Torvalds 	if (!inode) {
17261da177e4SLinus Torvalds 		ret = -ENOMEM;
17271da177e4SLinus Torvalds 		goto out;
17281da177e4SLinus Torvalds 	}
17291da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
17301da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
17310dd4ae51SChristopher J. PeBenito 	inode->i_ino = ++(*ino);
173240e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
1733d8c76e6fSDave Hansen 	inc_nlink(inode);
17341da177e4SLinus Torvalds 	d_add(dentry, inode);
1735edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1736d8c76e6fSDave Hansen 	inc_nlink(dir);
17371da177e4SLinus Torvalds out:
17381da177e4SLinus Torvalds 	return ret;
17391da177e4SLinus Torvalds }
17401da177e4SLinus Torvalds 
17411da177e4SLinus Torvalds static int sel_fill_super(struct super_block *sb, void *data, int silent)
17421da177e4SLinus Torvalds {
17431da177e4SLinus Torvalds 	int ret;
17441da177e4SLinus Torvalds 	struct dentry *dentry;
1745edb20fb5SJames Morris 	struct inode *inode, *root_inode;
17461da177e4SLinus Torvalds 	struct inode_security_struct *isec;
17471da177e4SLinus Torvalds 
17481da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
17491da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
17501da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1751ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
17521da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
17531da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
17541da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
17551da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
17561da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
17571da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
17581da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
17591da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
17601da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
17611da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
17623f12070eSEric Paris 		[SEL_REJECT_UNKNOWN] = {"reject_unknown", &sel_handle_unknown_ops, S_IRUGO},
17633f12070eSEric Paris 		[SEL_DENY_UNKNOWN] = {"deny_unknown", &sel_handle_unknown_ops, S_IRUGO},
176411904167SKaiGai Kohei 		[SEL_STATUS] = {"status", &sel_handle_status_ops, S_IRUGO},
1765cee74f47SEric Paris 		[SEL_POLICY] = {"policy", &sel_policy_ops, S_IRUSR},
17661da177e4SLinus Torvalds 		/* last one */ {""}
17671da177e4SLinus Torvalds 	};
17681da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
17691da177e4SLinus Torvalds 	if (ret)
1770161ce45aSJames Morris 		goto err;
17711da177e4SLinus Torvalds 
1772edb20fb5SJames Morris 	root_inode = sb->s_root->d_inode;
1773edb20fb5SJames Morris 
17741da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, BOOL_DIR_NAME);
1775161ce45aSJames Morris 	if (!dentry) {
1776161ce45aSJames Morris 		ret = -ENOMEM;
1777161ce45aSJames Morris 		goto err;
1778161ce45aSJames Morris 	}
17791da177e4SLinus Torvalds 
17800dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1781cde174a8SJames Morris 	if (ret)
1782161ce45aSJames Morris 		goto err;
1783cde174a8SJames Morris 
17841da177e4SLinus Torvalds 	bool_dir = dentry;
17851da177e4SLinus Torvalds 
17861da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1787161ce45aSJames Morris 	if (!dentry) {
1788161ce45aSJames Morris 		ret = -ENOMEM;
1789161ce45aSJames Morris 		goto err;
1790161ce45aSJames Morris 	}
17911da177e4SLinus Torvalds 
17921da177e4SLinus Torvalds 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1793161ce45aSJames Morris 	if (!inode) {
1794161ce45aSJames Morris 		ret = -ENOMEM;
1795161ce45aSJames Morris 		goto err;
1796161ce45aSJames Morris 	}
17976174eafcSJames Carter 	inode->i_ino = ++sel_last_ino;
17981da177e4SLinus Torvalds 	isec = (struct inode_security_struct *)inode->i_security;
17991da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
18001da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
18011da177e4SLinus Torvalds 	isec->initialized = 1;
18021da177e4SLinus Torvalds 
18031da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
18041da177e4SLinus Torvalds 	d_add(dentry, inode);
18051da177e4SLinus Torvalds 	selinux_null = dentry;
18061da177e4SLinus Torvalds 
18071da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, "avc");
1808161ce45aSJames Morris 	if (!dentry) {
1809161ce45aSJames Morris 		ret = -ENOMEM;
1810161ce45aSJames Morris 		goto err;
1811161ce45aSJames Morris 	}
18121da177e4SLinus Torvalds 
18130dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
18141da177e4SLinus Torvalds 	if (ret)
1815161ce45aSJames Morris 		goto err;
18161da177e4SLinus Torvalds 
18171da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
18181da177e4SLinus Torvalds 	if (ret)
1819161ce45aSJames Morris 		goto err;
1820f0ee2e46SJames Carter 
1821f0ee2e46SJames Carter 	dentry = d_alloc_name(sb->s_root, "initial_contexts");
1822f0ee2e46SJames Carter 	if (!dentry) {
1823f0ee2e46SJames Carter 		ret = -ENOMEM;
1824f0ee2e46SJames Carter 		goto err;
1825f0ee2e46SJames Carter 	}
1826f0ee2e46SJames Carter 
18270dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1828f0ee2e46SJames Carter 	if (ret)
1829f0ee2e46SJames Carter 		goto err;
1830f0ee2e46SJames Carter 
1831f0ee2e46SJames Carter 	ret = sel_make_initcon_files(dentry);
1832f0ee2e46SJames Carter 	if (ret)
1833f0ee2e46SJames Carter 		goto err;
1834f0ee2e46SJames Carter 
1835e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(sb->s_root, "class");
1836e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1837e47c8fc5SChristopher J. PeBenito 		ret = -ENOMEM;
1838e47c8fc5SChristopher J. PeBenito 		goto err;
1839e47c8fc5SChristopher J. PeBenito 	}
1840e47c8fc5SChristopher J. PeBenito 
1841e47c8fc5SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1842e47c8fc5SChristopher J. PeBenito 	if (ret)
1843e47c8fc5SChristopher J. PeBenito 		goto err;
1844e47c8fc5SChristopher J. PeBenito 
1845e47c8fc5SChristopher J. PeBenito 	class_dir = dentry;
1846e47c8fc5SChristopher J. PeBenito 
18473bb56b25SPaul Moore 	dentry = d_alloc_name(sb->s_root, "policy_capabilities");
18483bb56b25SPaul Moore 	if (!dentry) {
18493bb56b25SPaul Moore 		ret = -ENOMEM;
18503bb56b25SPaul Moore 		goto err;
18513bb56b25SPaul Moore 	}
18523bb56b25SPaul Moore 
18533bb56b25SPaul Moore 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
18543bb56b25SPaul Moore 	if (ret)
18553bb56b25SPaul Moore 		goto err;
18563bb56b25SPaul Moore 
18573bb56b25SPaul Moore 	policycap_dir = dentry;
18583bb56b25SPaul Moore 
18591da177e4SLinus Torvalds out:
1860161ce45aSJames Morris 	return ret;
1861161ce45aSJames Morris err:
1862744ba35eSEric Paris 	printk(KERN_ERR "SELinux: %s:  failed while creating inodes\n",
1863744ba35eSEric Paris 		__func__);
1864161ce45aSJames Morris 	goto out;
18651da177e4SLinus Torvalds }
18661da177e4SLinus Torvalds 
1867454e2398SDavid Howells static int sel_get_sb(struct file_system_type *fs_type,
1868454e2398SDavid Howells 		      int flags, const char *dev_name, void *data,
1869454e2398SDavid Howells 		      struct vfsmount *mnt)
18701da177e4SLinus Torvalds {
1871454e2398SDavid Howells 	return get_sb_single(fs_type, flags, data, sel_fill_super, mnt);
18721da177e4SLinus Torvalds }
18731da177e4SLinus Torvalds 
18741da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
18751da177e4SLinus Torvalds 	.name		= "selinuxfs",
18761da177e4SLinus Torvalds 	.get_sb		= sel_get_sb,
18771da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
18781da177e4SLinus Torvalds };
18791da177e4SLinus Torvalds 
18801da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
18811da177e4SLinus Torvalds 
18821da177e4SLinus Torvalds static int __init init_sel_fs(void)
18831da177e4SLinus Torvalds {
18841da177e4SLinus Torvalds 	int err;
18851da177e4SLinus Torvalds 
18861da177e4SLinus Torvalds 	if (!selinux_enabled)
18871da177e4SLinus Torvalds 		return 0;
18881da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
18891da177e4SLinus Torvalds 	if (!err) {
18901da177e4SLinus Torvalds 		selinuxfs_mount = kern_mount(&sel_fs_type);
18911da177e4SLinus Torvalds 		if (IS_ERR(selinuxfs_mount)) {
18921da177e4SLinus Torvalds 			printk(KERN_ERR "selinuxfs:  could not mount!\n");
18931da177e4SLinus Torvalds 			err = PTR_ERR(selinuxfs_mount);
18941da177e4SLinus Torvalds 			selinuxfs_mount = NULL;
18951da177e4SLinus Torvalds 		}
18961da177e4SLinus Torvalds 	}
18971da177e4SLinus Torvalds 	return err;
18981da177e4SLinus Torvalds }
18991da177e4SLinus Torvalds 
19001da177e4SLinus Torvalds __initcall(init_sel_fs);
19011da177e4SLinus Torvalds 
19021da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
19031da177e4SLinus Torvalds void exit_sel_fs(void)
19041da177e4SLinus Torvalds {
19051da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
19061da177e4SLinus Torvalds }
19071da177e4SLinus Torvalds #endif
1908