xref: /openbmc/linux/security/selinux/selinuxfs.c (revision f5269710)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  *	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
53bb56b25SPaul Moore  *  Updated: Hewlett-Packard <paul.moore@hp.com>
63bb56b25SPaul Moore  *
73bb56b25SPaul Moore  *	Added support for the policy capability bitmap
83bb56b25SPaul Moore  *
93bb56b25SPaul Moore  * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
101da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
111da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
121da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
131da177e4SLinus Torvalds  *	it under the terms of the GNU General Public License as published by
141da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
151da177e4SLinus Torvalds  */
161da177e4SLinus Torvalds 
171da177e4SLinus Torvalds #include <linux/kernel.h>
181da177e4SLinus Torvalds #include <linux/pagemap.h>
191da177e4SLinus Torvalds #include <linux/slab.h>
201da177e4SLinus Torvalds #include <linux/vmalloc.h>
211da177e4SLinus Torvalds #include <linux/fs.h>
22bb003079SIngo Molnar #include <linux/mutex.h>
231da177e4SLinus Torvalds #include <linux/init.h>
241da177e4SLinus Torvalds #include <linux/string.h>
251da177e4SLinus Torvalds #include <linux/security.h>
261da177e4SLinus Torvalds #include <linux/major.h>
271da177e4SLinus Torvalds #include <linux/seq_file.h>
281da177e4SLinus Torvalds #include <linux/percpu.h>
29af601e46SSteve Grubb #include <linux/audit.h>
30f5269710SEric Paris #include <linux/uaccess.h>
311da177e4SLinus Torvalds 
321da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
331da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds #include "flask.h"
361da177e4SLinus Torvalds #include "avc.h"
371da177e4SLinus Torvalds #include "avc_ss.h"
381da177e4SLinus Torvalds #include "security.h"
391da177e4SLinus Torvalds #include "objsec.h"
401da177e4SLinus Torvalds #include "conditional.h"
411da177e4SLinus Torvalds 
423bb56b25SPaul Moore /* Policy capability filenames */
433bb56b25SPaul Moore static char *policycap_names[] = {
44b0c636b9SEric Paris 	"network_peer_controls",
45b0c636b9SEric Paris 	"open_perms"
463bb56b25SPaul Moore };
473bb56b25SPaul Moore 
481da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
491da177e4SLinus Torvalds 
504e5ab4cbSJames Morris #ifdef CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT
514e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 0
524e5ab4cbSJames Morris #else
534e5ab4cbSJames Morris #define SELINUX_COMPAT_NET_VALUE 1
544e5ab4cbSJames Morris #endif
554e5ab4cbSJames Morris 
564e5ab4cbSJames Morris int selinux_compat_net = SELINUX_COMPAT_NET_VALUE;
574e5ab4cbSJames Morris 
581da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
591da177e4SLinus Torvalds {
60f5269710SEric Paris 	unsigned long checkreqprot;
61f5269710SEric Paris 	if (!strict_strtoul(str, 0, &checkreqprot))
62f5269710SEric Paris 		selinux_checkreqprot = checkreqprot ? 1 : 0;
631da177e4SLinus Torvalds 	return 1;
641da177e4SLinus Torvalds }
651da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
661da177e4SLinus Torvalds 
674e5ab4cbSJames Morris static int __init selinux_compat_net_setup(char *str)
684e5ab4cbSJames Morris {
69f5269710SEric Paris 	unsigned long compat_net;
70f5269710SEric Paris 	if (!strict_strtoul(str, 0, &compat_net))
71f5269710SEric Paris 		selinux_compat_net = compat_net ? 1 : 0;
724e5ab4cbSJames Morris 	return 1;
734e5ab4cbSJames Morris }
744e5ab4cbSJames Morris __setup("selinux_compat_net=", selinux_compat_net_setup);
754e5ab4cbSJames Morris 
761da177e4SLinus Torvalds 
77bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
781da177e4SLinus Torvalds 
791da177e4SLinus Torvalds /* global data for booleans */
801872981bSEric Paris static struct dentry *bool_dir;
811872981bSEric Paris static int bool_num;
82d313f948SStephen Smalley static char **bool_pending_names;
831872981bSEric Paris static int *bool_pending_values;
841da177e4SLinus Torvalds 
85e47c8fc5SChristopher J. PeBenito /* global data for classes */
861872981bSEric Paris static struct dentry *class_dir;
87e47c8fc5SChristopher J. PeBenito static unsigned long last_class_ino;
88e47c8fc5SChristopher J. PeBenito 
893bb56b25SPaul Moore /* global data for policy capabilities */
901872981bSEric Paris static struct dentry *policycap_dir;
913bb56b25SPaul Moore 
921da177e4SLinus Torvalds extern void selnl_notify_setenforce(int val);
931da177e4SLinus Torvalds 
941da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
951da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
961da177e4SLinus Torvalds 			     u32 perms)
971da177e4SLinus Torvalds {
981da177e4SLinus Torvalds 	struct task_security_struct *tsec;
991da177e4SLinus Torvalds 
1001da177e4SLinus Torvalds 	tsec = tsk->security;
1011da177e4SLinus Torvalds 	if (!tsec)
1021da177e4SLinus Torvalds 		return -EACCES;
1031da177e4SLinus Torvalds 
1041da177e4SLinus Torvalds 	return avc_has_perm(tsec->sid, SECINITSID_SECURITY,
1051da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
1061da177e4SLinus Torvalds }
1071da177e4SLinus Torvalds 
1081da177e4SLinus Torvalds enum sel_inos {
1091da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
1101da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
1111da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
1121da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
1131da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
1141da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
1151da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
1161da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
1171da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
1181da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
1191da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
1201da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
1211da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1221da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1234e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1243f12070eSEric Paris 	SEL_REJECT_UNKNOWN, /* export unknown reject handling to userspace */
1253f12070eSEric Paris 	SEL_DENY_UNKNOWN, /* export unknown deny handling to userspace */
1266174eafcSJames Carter 	SEL_INO_NEXT,	/* The next inode number to use */
1271da177e4SLinus Torvalds };
1281da177e4SLinus Torvalds 
1296174eafcSJames Carter static unsigned long sel_last_ino = SEL_INO_NEXT - 1;
1306174eafcSJames Carter 
131f0ee2e46SJames Carter #define SEL_INITCON_INO_OFFSET		0x01000000
132bce34bc0SJames Carter #define SEL_BOOL_INO_OFFSET		0x02000000
133e47c8fc5SChristopher J. PeBenito #define SEL_CLASS_INO_OFFSET		0x04000000
1343bb56b25SPaul Moore #define SEL_POLICYCAP_INO_OFFSET	0x08000000
135f0ee2e46SJames Carter #define SEL_INO_MASK			0x00ffffff
136f0ee2e46SJames Carter 
1371da177e4SLinus Torvalds #define TMPBUFLEN	12
1381da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1391da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1401da177e4SLinus Torvalds {
1411da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1421da177e4SLinus Torvalds 	ssize_t length;
1431da177e4SLinus Torvalds 
1441da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1451da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1461da177e4SLinus Torvalds }
1471da177e4SLinus Torvalds 
1481da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1491da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
1501da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1511da177e4SLinus Torvalds 
1521da177e4SLinus Torvalds {
1531da177e4SLinus Torvalds 	char *page;
1541da177e4SLinus Torvalds 	ssize_t length;
1551da177e4SLinus Torvalds 	int new_value;
1561da177e4SLinus Torvalds 
157bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
1581da177e4SLinus Torvalds 		return -ENOMEM;
1591da177e4SLinus Torvalds 	if (*ppos != 0) {
1601da177e4SLinus Torvalds 		/* No partial writes. */
1611da177e4SLinus Torvalds 		return -EINVAL;
1621da177e4SLinus Torvalds 	}
1631da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
1641da177e4SLinus Torvalds 	if (!page)
1651da177e4SLinus Torvalds 		return -ENOMEM;
1661da177e4SLinus Torvalds 	length = -EFAULT;
1671da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1681da177e4SLinus Torvalds 		goto out;
1691da177e4SLinus Torvalds 
1701da177e4SLinus Torvalds 	length = -EINVAL;
1711da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1721da177e4SLinus Torvalds 		goto out;
1731da177e4SLinus Torvalds 
1741da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1751da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1761da177e4SLinus Torvalds 		if (length)
1771da177e4SLinus Torvalds 			goto out;
178af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
1794746ec5bSEric Paris 			"enforcing=%d old_enforcing=%d auid=%u ses=%u",
1804746ec5bSEric Paris 			new_value, selinux_enforcing,
1814746ec5bSEric Paris 			audit_get_loginuid(current),
1824746ec5bSEric Paris 			audit_get_sessionid(current));
1831da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1841da177e4SLinus Torvalds 		if (selinux_enforcing)
1851da177e4SLinus Torvalds 			avc_ss_reset(0);
1861da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
1871da177e4SLinus Torvalds 	}
1881da177e4SLinus Torvalds 	length = count;
1891da177e4SLinus Torvalds out:
1901da177e4SLinus Torvalds 	free_page((unsigned long) page);
1911da177e4SLinus Torvalds 	return length;
1921da177e4SLinus Torvalds }
1931da177e4SLinus Torvalds #else
1941da177e4SLinus Torvalds #define sel_write_enforce NULL
1951da177e4SLinus Torvalds #endif
1961da177e4SLinus Torvalds 
1979c2e08c5SArjan van de Ven static const struct file_operations sel_enforce_ops = {
1981da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1991da177e4SLinus Torvalds 	.write		= sel_write_enforce,
2001da177e4SLinus Torvalds };
2011da177e4SLinus Torvalds 
2023f12070eSEric Paris static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf,
2033f12070eSEric Paris 					size_t count, loff_t *ppos)
2043f12070eSEric Paris {
2053f12070eSEric Paris 	char tmpbuf[TMPBUFLEN];
2063f12070eSEric Paris 	ssize_t length;
2073f12070eSEric Paris 	ino_t ino = filp->f_path.dentry->d_inode->i_ino;
2083f12070eSEric Paris 	int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ?
2093f12070eSEric Paris 		security_get_reject_unknown() : !security_get_allow_unknown();
2103f12070eSEric Paris 
2113f12070eSEric Paris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown);
2123f12070eSEric Paris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2133f12070eSEric Paris }
2143f12070eSEric Paris 
2153f12070eSEric Paris static const struct file_operations sel_handle_unknown_ops = {
2163f12070eSEric Paris 	.read		= sel_read_handle_unknown,
2173f12070eSEric Paris };
2183f12070eSEric Paris 
2191da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
2201da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file *file, const char __user *buf,
2211da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
2221da177e4SLinus Torvalds 
2231da177e4SLinus Torvalds {
2241da177e4SLinus Torvalds 	char *page;
2251da177e4SLinus Torvalds 	ssize_t length;
2261da177e4SLinus Torvalds 	int new_value;
2271da177e4SLinus Torvalds 	extern int selinux_disable(void);
2281da177e4SLinus Torvalds 
229bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
2301da177e4SLinus Torvalds 		return -ENOMEM;
2311da177e4SLinus Torvalds 	if (*ppos != 0) {
2321da177e4SLinus Torvalds 		/* No partial writes. */
2331da177e4SLinus Torvalds 		return -EINVAL;
2341da177e4SLinus Torvalds 	}
2351da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
2361da177e4SLinus Torvalds 	if (!page)
2371da177e4SLinus Torvalds 		return -ENOMEM;
2381da177e4SLinus Torvalds 	length = -EFAULT;
2391da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
2401da177e4SLinus Torvalds 		goto out;
2411da177e4SLinus Torvalds 
2421da177e4SLinus Torvalds 	length = -EINVAL;
2431da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
2441da177e4SLinus Torvalds 		goto out;
2451da177e4SLinus Torvalds 
2461da177e4SLinus Torvalds 	if (new_value) {
2471da177e4SLinus Torvalds 		length = selinux_disable();
2481da177e4SLinus Torvalds 		if (length < 0)
2491da177e4SLinus Torvalds 			goto out;
250af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
2514746ec5bSEric Paris 			"selinux=0 auid=%u ses=%u",
2524746ec5bSEric Paris 			audit_get_loginuid(current),
2534746ec5bSEric Paris 			audit_get_sessionid(current));
2541da177e4SLinus Torvalds 	}
2551da177e4SLinus Torvalds 
2561da177e4SLinus Torvalds 	length = count;
2571da177e4SLinus Torvalds out:
2581da177e4SLinus Torvalds 	free_page((unsigned long) page);
2591da177e4SLinus Torvalds 	return length;
2601da177e4SLinus Torvalds }
2611da177e4SLinus Torvalds #else
2621da177e4SLinus Torvalds #define sel_write_disable NULL
2631da177e4SLinus Torvalds #endif
2641da177e4SLinus Torvalds 
2659c2e08c5SArjan van de Ven static const struct file_operations sel_disable_ops = {
2661da177e4SLinus Torvalds 	.write		= sel_write_disable,
2671da177e4SLinus Torvalds };
2681da177e4SLinus Torvalds 
2691da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
2701da177e4SLinus Torvalds 				   size_t count, loff_t *ppos)
2711da177e4SLinus Torvalds {
2721da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2731da177e4SLinus Torvalds 	ssize_t length;
2741da177e4SLinus Torvalds 
2751da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
2761da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2771da177e4SLinus Torvalds }
2781da177e4SLinus Torvalds 
2799c2e08c5SArjan van de Ven static const struct file_operations sel_policyvers_ops = {
2801da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
2811da177e4SLinus Torvalds };
2821da177e4SLinus Torvalds 
2831da177e4SLinus Torvalds /* declaration for sel_write_load */
2841da177e4SLinus Torvalds static int sel_make_bools(void);
285e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void);
2863bb56b25SPaul Moore static int sel_make_policycap(void);
287e47c8fc5SChristopher J. PeBenito 
288e47c8fc5SChristopher J. PeBenito /* declaration for sel_make_class_dirs */
289e47c8fc5SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
290e47c8fc5SChristopher J. PeBenito 			unsigned long *ino);
2911da177e4SLinus Torvalds 
2921da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
2931da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
2941da177e4SLinus Torvalds {
2951da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
2961da177e4SLinus Torvalds 	ssize_t length;
2971da177e4SLinus Torvalds 
2981da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_mls_enabled);
2991da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3001da177e4SLinus Torvalds }
3011da177e4SLinus Torvalds 
3029c2e08c5SArjan van de Ven static const struct file_operations sel_mls_ops = {
3031da177e4SLinus Torvalds 	.read		= sel_read_mls,
3041da177e4SLinus Torvalds };
3051da177e4SLinus Torvalds 
3061da177e4SLinus Torvalds static ssize_t sel_write_load(struct file *file, const char __user *buf,
3071da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
3081da177e4SLinus Torvalds 
3091da177e4SLinus Torvalds {
3101da177e4SLinus Torvalds 	int ret;
3111da177e4SLinus Torvalds 	ssize_t length;
3121da177e4SLinus Torvalds 	void *data = NULL;
3131da177e4SLinus Torvalds 
314bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
3151da177e4SLinus Torvalds 
3161da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
3171da177e4SLinus Torvalds 	if (length)
3181da177e4SLinus Torvalds 		goto out;
3191da177e4SLinus Torvalds 
3201da177e4SLinus Torvalds 	if (*ppos != 0) {
3211da177e4SLinus Torvalds 		/* No partial writes. */
3221da177e4SLinus Torvalds 		length = -EINVAL;
3231da177e4SLinus Torvalds 		goto out;
3241da177e4SLinus Torvalds 	}
3251da177e4SLinus Torvalds 
326bfd51626SDavi Arnaut 	if ((count > 64 * 1024 * 1024)
3271da177e4SLinus Torvalds 	    || (data = vmalloc(count)) == NULL) {
3281da177e4SLinus Torvalds 		length = -ENOMEM;
3291da177e4SLinus Torvalds 		goto out;
3301da177e4SLinus Torvalds 	}
3311da177e4SLinus Torvalds 
3321da177e4SLinus Torvalds 	length = -EFAULT;
3331da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
3341da177e4SLinus Torvalds 		goto out;
3351da177e4SLinus Torvalds 
3361da177e4SLinus Torvalds 	length = security_load_policy(data, count);
3371da177e4SLinus Torvalds 	if (length)
3381da177e4SLinus Torvalds 		goto out;
3391da177e4SLinus Torvalds 
3401da177e4SLinus Torvalds 	ret = sel_make_bools();
341e47c8fc5SChristopher J. PeBenito 	if (ret) {
342e47c8fc5SChristopher J. PeBenito 		length = ret;
343e47c8fc5SChristopher J. PeBenito 		goto out1;
344e47c8fc5SChristopher J. PeBenito 	}
345e47c8fc5SChristopher J. PeBenito 
346e47c8fc5SChristopher J. PeBenito 	ret = sel_make_classes();
3473bb56b25SPaul Moore 	if (ret) {
3483bb56b25SPaul Moore 		length = ret;
3493bb56b25SPaul Moore 		goto out1;
3503bb56b25SPaul Moore 	}
3513bb56b25SPaul Moore 
3523bb56b25SPaul Moore 	ret = sel_make_policycap();
3531da177e4SLinus Torvalds 	if (ret)
3541da177e4SLinus Torvalds 		length = ret;
3551da177e4SLinus Torvalds 	else
3561da177e4SLinus Torvalds 		length = count;
357e47c8fc5SChristopher J. PeBenito 
358e47c8fc5SChristopher J. PeBenito out1:
3593f12070eSEric Paris 
3603f12070eSEric Paris 	printk(KERN_INFO "SELinux: policy loaded with handle_unknown=%s\n",
3613f12070eSEric Paris 	       (security_get_reject_unknown() ? "reject" :
3623f12070eSEric Paris 		(security_get_allow_unknown() ? "allow" : "deny")));
3633f12070eSEric Paris 
364af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
3654746ec5bSEric Paris 		"policy loaded auid=%u ses=%u",
3664746ec5bSEric Paris 		audit_get_loginuid(current),
3674746ec5bSEric Paris 		audit_get_sessionid(current));
3681da177e4SLinus Torvalds out:
369bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
3701da177e4SLinus Torvalds 	vfree(data);
3711da177e4SLinus Torvalds 	return length;
3721da177e4SLinus Torvalds }
3731da177e4SLinus Torvalds 
3749c2e08c5SArjan van de Ven static const struct file_operations sel_load_ops = {
3751da177e4SLinus Torvalds 	.write		= sel_write_load,
3761da177e4SLinus Torvalds };
3771da177e4SLinus Torvalds 
378ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
3791da177e4SLinus Torvalds {
380ce9982d0SStephen Smalley 	char *canon;
381ce9982d0SStephen Smalley 	u32 sid, len;
3821da177e4SLinus Torvalds 	ssize_t length;
3831da177e4SLinus Torvalds 
3841da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
3851da177e4SLinus Torvalds 	if (length)
3861da177e4SLinus Torvalds 		return length;
3871da177e4SLinus Torvalds 
388ce9982d0SStephen Smalley 	length = security_context_to_sid(buf, size, &sid);
3891da177e4SLinus Torvalds 	if (length < 0)
390ce9982d0SStephen Smalley 		return length;
3911da177e4SLinus Torvalds 
392ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
393ce9982d0SStephen Smalley 	if (length < 0)
394ce9982d0SStephen Smalley 		return length;
395ce9982d0SStephen Smalley 
396ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
397744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
398744ba35eSEric Paris 			"payload max\n", __func__, len);
399ce9982d0SStephen Smalley 		length = -ERANGE;
400ce9982d0SStephen Smalley 		goto out;
401ce9982d0SStephen Smalley 	}
402ce9982d0SStephen Smalley 
403ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
404ce9982d0SStephen Smalley 	length = len;
4051da177e4SLinus Torvalds out:
406ce9982d0SStephen Smalley 	kfree(canon);
4071da177e4SLinus Torvalds 	return length;
4081da177e4SLinus Torvalds }
4091da177e4SLinus Torvalds 
4101da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
4111da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
4121da177e4SLinus Torvalds {
4131da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
4141da177e4SLinus Torvalds 	ssize_t length;
4151da177e4SLinus Torvalds 
4161da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
4171da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
4181da177e4SLinus Torvalds }
4191da177e4SLinus Torvalds 
4201da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
4211da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
4221da177e4SLinus Torvalds {
4231da177e4SLinus Torvalds 	char *page;
4241da177e4SLinus Torvalds 	ssize_t length;
4251da177e4SLinus Torvalds 	unsigned int new_value;
4261da177e4SLinus Torvalds 
4271da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
4281da177e4SLinus Torvalds 	if (length)
4291da177e4SLinus Torvalds 		return length;
4301da177e4SLinus Torvalds 
431bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
4321da177e4SLinus Torvalds 		return -ENOMEM;
4331da177e4SLinus Torvalds 	if (*ppos != 0) {
4341da177e4SLinus Torvalds 		/* No partial writes. */
4351da177e4SLinus Torvalds 		return -EINVAL;
4361da177e4SLinus Torvalds 	}
4371da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
4381da177e4SLinus Torvalds 	if (!page)
4391da177e4SLinus Torvalds 		return -ENOMEM;
4401da177e4SLinus Torvalds 	length = -EFAULT;
4411da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
4421da177e4SLinus Torvalds 		goto out;
4431da177e4SLinus Torvalds 
4441da177e4SLinus Torvalds 	length = -EINVAL;
4451da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
4461da177e4SLinus Torvalds 		goto out;
4471da177e4SLinus Torvalds 
4481da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
4491da177e4SLinus Torvalds 	length = count;
4501da177e4SLinus Torvalds out:
4511da177e4SLinus Torvalds 	free_page((unsigned long) page);
4521da177e4SLinus Torvalds 	return length;
4531da177e4SLinus Torvalds }
4549c2e08c5SArjan van de Ven static const struct file_operations sel_checkreqprot_ops = {
4551da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
4561da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
4571da177e4SLinus Torvalds };
4581da177e4SLinus Torvalds 
4594e5ab4cbSJames Morris static ssize_t sel_read_compat_net(struct file *filp, char __user *buf,
4604e5ab4cbSJames Morris 				   size_t count, loff_t *ppos)
4614e5ab4cbSJames Morris {
4624e5ab4cbSJames Morris 	char tmpbuf[TMPBUFLEN];
4634e5ab4cbSJames Morris 	ssize_t length;
4644e5ab4cbSJames Morris 
4654e5ab4cbSJames Morris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_compat_net);
4664e5ab4cbSJames Morris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
4674e5ab4cbSJames Morris }
4684e5ab4cbSJames Morris 
4694e5ab4cbSJames Morris static ssize_t sel_write_compat_net(struct file *file, const char __user *buf,
4704e5ab4cbSJames Morris 				    size_t count, loff_t *ppos)
4714e5ab4cbSJames Morris {
4724e5ab4cbSJames Morris 	char *page;
4734e5ab4cbSJames Morris 	ssize_t length;
4744e5ab4cbSJames Morris 	int new_value;
4754e5ab4cbSJames Morris 
4764e5ab4cbSJames Morris 	length = task_has_security(current, SECURITY__LOAD_POLICY);
4774e5ab4cbSJames Morris 	if (length)
4784e5ab4cbSJames Morris 		return length;
4794e5ab4cbSJames Morris 
4804e5ab4cbSJames Morris 	if (count >= PAGE_SIZE)
4814e5ab4cbSJames Morris 		return -ENOMEM;
4824e5ab4cbSJames Morris 	if (*ppos != 0) {
4834e5ab4cbSJames Morris 		/* No partial writes. */
4844e5ab4cbSJames Morris 		return -EINVAL;
4854e5ab4cbSJames Morris 	}
4864e5ab4cbSJames Morris 	page = (char *)get_zeroed_page(GFP_KERNEL);
4874e5ab4cbSJames Morris 	if (!page)
4884e5ab4cbSJames Morris 		return -ENOMEM;
4894e5ab4cbSJames Morris 	length = -EFAULT;
4904e5ab4cbSJames Morris 	if (copy_from_user(page, buf, count))
4914e5ab4cbSJames Morris 		goto out;
4924e5ab4cbSJames Morris 
4934e5ab4cbSJames Morris 	length = -EINVAL;
4944e5ab4cbSJames Morris 	if (sscanf(page, "%d", &new_value) != 1)
4954e5ab4cbSJames Morris 		goto out;
4964e5ab4cbSJames Morris 
4974e5ab4cbSJames Morris 	selinux_compat_net = new_value ? 1 : 0;
4984e5ab4cbSJames Morris 	length = count;
4994e5ab4cbSJames Morris out:
5004e5ab4cbSJames Morris 	free_page((unsigned long) page);
5014e5ab4cbSJames Morris 	return length;
5024e5ab4cbSJames Morris }
5039c2e08c5SArjan van de Ven static const struct file_operations sel_compat_net_ops = {
5044e5ab4cbSJames Morris 	.read		= sel_read_compat_net,
5054e5ab4cbSJames Morris 	.write		= sel_write_compat_net,
5064e5ab4cbSJames Morris };
5074e5ab4cbSJames Morris 
5081da177e4SLinus Torvalds /*
5091da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
5101da177e4SLinus Torvalds  */
5111da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
5121da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
5131da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
5141da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
5151da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size);
5161da177e4SLinus Torvalds 
5171da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
5181da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
5191da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
5201da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
5211da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
5221da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
523ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
5241da177e4SLinus Torvalds };
5251da177e4SLinus Torvalds 
5261da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
5271da177e4SLinus Torvalds {
5283d5ff529SJosef Sipek 	ino_t ino = file->f_path.dentry->d_inode->i_ino;
5291da177e4SLinus Torvalds 	char *data;
5301da177e4SLinus Torvalds 	ssize_t rv;
5311da177e4SLinus Torvalds 
5326e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
5331da177e4SLinus Torvalds 		return -EINVAL;
5341da177e4SLinus Torvalds 
5351da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
5361da177e4SLinus Torvalds 	if (IS_ERR(data))
5371da177e4SLinus Torvalds 		return PTR_ERR(data);
5381da177e4SLinus Torvalds 
5391da177e4SLinus Torvalds 	rv = write_op[ino](file, data, size);
5401da177e4SLinus Torvalds 	if (rv > 0) {
5411da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
5421da177e4SLinus Torvalds 		rv = size;
5431da177e4SLinus Torvalds 	}
5441da177e4SLinus Torvalds 	return rv;
5451da177e4SLinus Torvalds }
5461da177e4SLinus Torvalds 
5479c2e08c5SArjan van de Ven static const struct file_operations transaction_ops = {
5481da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
5491da177e4SLinus Torvalds 	.read		= simple_transaction_read,
5501da177e4SLinus Torvalds 	.release	= simple_transaction_release,
5511da177e4SLinus Torvalds };
5521da177e4SLinus Torvalds 
5531da177e4SLinus Torvalds /*
5541da177e4SLinus Torvalds  * payload - write methods
5551da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
5561da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
5571da177e4SLinus Torvalds  */
5581da177e4SLinus Torvalds 
5591da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
5601da177e4SLinus Torvalds {
5611da177e4SLinus Torvalds 	char *scon, *tcon;
5621da177e4SLinus Torvalds 	u32 ssid, tsid;
5631da177e4SLinus Torvalds 	u16 tclass;
5641da177e4SLinus Torvalds 	u32 req;
5651da177e4SLinus Torvalds 	struct av_decision avd;
5661da177e4SLinus Torvalds 	ssize_t length;
5671da177e4SLinus Torvalds 
5681da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
5691da177e4SLinus Torvalds 	if (length)
5701da177e4SLinus Torvalds 		return length;
5711da177e4SLinus Torvalds 
5721da177e4SLinus Torvalds 	length = -ENOMEM;
57389d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
5741da177e4SLinus Torvalds 	if (!scon)
5751da177e4SLinus Torvalds 		return length;
5761da177e4SLinus Torvalds 
57789d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
5781da177e4SLinus Torvalds 	if (!tcon)
5791da177e4SLinus Torvalds 		goto out;
5801da177e4SLinus Torvalds 
5811da177e4SLinus Torvalds 	length = -EINVAL;
5821da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4)
5831da177e4SLinus Torvalds 		goto out2;
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
5861da177e4SLinus Torvalds 	if (length < 0)
5871da177e4SLinus Torvalds 		goto out2;
5881da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
5891da177e4SLinus Torvalds 	if (length < 0)
5901da177e4SLinus Torvalds 		goto out2;
5911da177e4SLinus Torvalds 
5921da177e4SLinus Torvalds 	length = security_compute_av(ssid, tsid, tclass, req, &avd);
5931da177e4SLinus Torvalds 	if (length < 0)
5941da177e4SLinus Torvalds 		goto out2;
5951da177e4SLinus Torvalds 
5961da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
5971da177e4SLinus Torvalds 			  "%x %x %x %x %u",
5981da177e4SLinus Torvalds 			  avd.allowed, avd.decided,
5991da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
6001da177e4SLinus Torvalds 			  avd.seqno);
6011da177e4SLinus Torvalds out2:
6021da177e4SLinus Torvalds 	kfree(tcon);
6031da177e4SLinus Torvalds out:
6041da177e4SLinus Torvalds 	kfree(scon);
6051da177e4SLinus Torvalds 	return length;
6061da177e4SLinus Torvalds }
6071da177e4SLinus Torvalds 
6081da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
6091da177e4SLinus Torvalds {
6101da177e4SLinus Torvalds 	char *scon, *tcon;
6111da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
6121da177e4SLinus Torvalds 	u16 tclass;
6131da177e4SLinus Torvalds 	ssize_t length;
6141da177e4SLinus Torvalds 	char *newcon;
6151da177e4SLinus Torvalds 	u32 len;
6161da177e4SLinus Torvalds 
6171da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
6181da177e4SLinus Torvalds 	if (length)
6191da177e4SLinus Torvalds 		return length;
6201da177e4SLinus Torvalds 
6211da177e4SLinus Torvalds 	length = -ENOMEM;
62289d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
6231da177e4SLinus Torvalds 	if (!scon)
6241da177e4SLinus Torvalds 		return length;
6251da177e4SLinus Torvalds 
62689d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
6271da177e4SLinus Torvalds 	if (!tcon)
6281da177e4SLinus Torvalds 		goto out;
6291da177e4SLinus Torvalds 
6301da177e4SLinus Torvalds 	length = -EINVAL;
6311da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
6321da177e4SLinus Torvalds 		goto out2;
6331da177e4SLinus Torvalds 
6341da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
6351da177e4SLinus Torvalds 	if (length < 0)
6361da177e4SLinus Torvalds 		goto out2;
6371da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
6381da177e4SLinus Torvalds 	if (length < 0)
6391da177e4SLinus Torvalds 		goto out2;
6401da177e4SLinus Torvalds 
6411da177e4SLinus Torvalds 	length = security_transition_sid(ssid, tsid, tclass, &newsid);
6421da177e4SLinus Torvalds 	if (length < 0)
6431da177e4SLinus Torvalds 		goto out2;
6441da177e4SLinus Torvalds 
6451da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
6461da177e4SLinus Torvalds 	if (length < 0)
6471da177e4SLinus Torvalds 		goto out2;
6481da177e4SLinus Torvalds 
6491da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
650744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
651744ba35eSEric Paris 			"payload max\n", __func__, len);
6521da177e4SLinus Torvalds 		length = -ERANGE;
6531da177e4SLinus Torvalds 		goto out3;
6541da177e4SLinus Torvalds 	}
6551da177e4SLinus Torvalds 
6561da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
6571da177e4SLinus Torvalds 	length = len;
6581da177e4SLinus Torvalds out3:
6591da177e4SLinus Torvalds 	kfree(newcon);
6601da177e4SLinus Torvalds out2:
6611da177e4SLinus Torvalds 	kfree(tcon);
6621da177e4SLinus Torvalds out:
6631da177e4SLinus Torvalds 	kfree(scon);
6641da177e4SLinus Torvalds 	return length;
6651da177e4SLinus Torvalds }
6661da177e4SLinus Torvalds 
6671da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
6681da177e4SLinus Torvalds {
6691da177e4SLinus Torvalds 	char *scon, *tcon;
6701da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
6711da177e4SLinus Torvalds 	u16 tclass;
6721da177e4SLinus Torvalds 	ssize_t length;
6731da177e4SLinus Torvalds 	char *newcon;
6741da177e4SLinus Torvalds 	u32 len;
6751da177e4SLinus Torvalds 
6761da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
6771da177e4SLinus Torvalds 	if (length)
6781da177e4SLinus Torvalds 		return length;
6791da177e4SLinus Torvalds 
6801da177e4SLinus Torvalds 	length = -ENOMEM;
68189d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
6821da177e4SLinus Torvalds 	if (!scon)
6831da177e4SLinus Torvalds 		return length;
6841da177e4SLinus Torvalds 
68589d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
6861da177e4SLinus Torvalds 	if (!tcon)
6871da177e4SLinus Torvalds 		goto out;
6881da177e4SLinus Torvalds 
6891da177e4SLinus Torvalds 	length = -EINVAL;
6901da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
6911da177e4SLinus Torvalds 		goto out2;
6921da177e4SLinus Torvalds 
6931da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
6941da177e4SLinus Torvalds 	if (length < 0)
6951da177e4SLinus Torvalds 		goto out2;
6961da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
6971da177e4SLinus Torvalds 	if (length < 0)
6981da177e4SLinus Torvalds 		goto out2;
6991da177e4SLinus Torvalds 
7001da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
7011da177e4SLinus Torvalds 	if (length < 0)
7021da177e4SLinus Torvalds 		goto out2;
7031da177e4SLinus Torvalds 
7041da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
7051da177e4SLinus Torvalds 	if (length < 0)
7061da177e4SLinus Torvalds 		goto out2;
7071da177e4SLinus Torvalds 
7081da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
7091da177e4SLinus Torvalds 		length = -ERANGE;
7101da177e4SLinus Torvalds 		goto out3;
7111da177e4SLinus Torvalds 	}
7121da177e4SLinus Torvalds 
7131da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
7141da177e4SLinus Torvalds 	length = len;
7151da177e4SLinus Torvalds out3:
7161da177e4SLinus Torvalds 	kfree(newcon);
7171da177e4SLinus Torvalds out2:
7181da177e4SLinus Torvalds 	kfree(tcon);
7191da177e4SLinus Torvalds out:
7201da177e4SLinus Torvalds 	kfree(scon);
7211da177e4SLinus Torvalds 	return length;
7221da177e4SLinus Torvalds }
7231da177e4SLinus Torvalds 
7241da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
7251da177e4SLinus Torvalds {
7261da177e4SLinus Torvalds 	char *con, *user, *ptr;
7271da177e4SLinus Torvalds 	u32 sid, *sids;
7281da177e4SLinus Torvalds 	ssize_t length;
7291da177e4SLinus Torvalds 	char *newcon;
7301da177e4SLinus Torvalds 	int i, rc;
7311da177e4SLinus Torvalds 	u32 len, nsids;
7321da177e4SLinus Torvalds 
7331da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
7341da177e4SLinus Torvalds 	if (length)
7351da177e4SLinus Torvalds 		return length;
7361da177e4SLinus Torvalds 
7371da177e4SLinus Torvalds 	length = -ENOMEM;
73889d155efSJames Morris 	con = kzalloc(size+1, GFP_KERNEL);
7391da177e4SLinus Torvalds 	if (!con)
7401da177e4SLinus Torvalds 		return length;
7411da177e4SLinus Torvalds 
74289d155efSJames Morris 	user = kzalloc(size+1, GFP_KERNEL);
7431da177e4SLinus Torvalds 	if (!user)
7441da177e4SLinus Torvalds 		goto out;
7451da177e4SLinus Torvalds 
7461da177e4SLinus Torvalds 	length = -EINVAL;
7471da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
7481da177e4SLinus Torvalds 		goto out2;
7491da177e4SLinus Torvalds 
7501da177e4SLinus Torvalds 	length = security_context_to_sid(con, strlen(con)+1, &sid);
7511da177e4SLinus Torvalds 	if (length < 0)
7521da177e4SLinus Torvalds 		goto out2;
7531da177e4SLinus Torvalds 
7541da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
7551da177e4SLinus Torvalds 	if (length < 0)
7561da177e4SLinus Torvalds 		goto out2;
7571da177e4SLinus Torvalds 
7581da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
7591da177e4SLinus Torvalds 	ptr = buf + length;
7601da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
7611da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
7621da177e4SLinus Torvalds 		if (rc) {
7631da177e4SLinus Torvalds 			length = rc;
7641da177e4SLinus Torvalds 			goto out3;
7651da177e4SLinus Torvalds 		}
7661da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
7671da177e4SLinus Torvalds 			kfree(newcon);
7681da177e4SLinus Torvalds 			length = -ERANGE;
7691da177e4SLinus Torvalds 			goto out3;
7701da177e4SLinus Torvalds 		}
7711da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
7721da177e4SLinus Torvalds 		kfree(newcon);
7731da177e4SLinus Torvalds 		ptr += len;
7741da177e4SLinus Torvalds 		length += len;
7751da177e4SLinus Torvalds 	}
7761da177e4SLinus Torvalds out3:
7771da177e4SLinus Torvalds 	kfree(sids);
7781da177e4SLinus Torvalds out2:
7791da177e4SLinus Torvalds 	kfree(user);
7801da177e4SLinus Torvalds out:
7811da177e4SLinus Torvalds 	kfree(con);
7821da177e4SLinus Torvalds 	return length;
7831da177e4SLinus Torvalds }
7841da177e4SLinus Torvalds 
7851da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
7861da177e4SLinus Torvalds {
7871da177e4SLinus Torvalds 	char *scon, *tcon;
7881da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
7891da177e4SLinus Torvalds 	u16 tclass;
7901da177e4SLinus Torvalds 	ssize_t length;
7911da177e4SLinus Torvalds 	char *newcon;
7921da177e4SLinus Torvalds 	u32 len;
7931da177e4SLinus Torvalds 
7941da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
7951da177e4SLinus Torvalds 	if (length)
7961da177e4SLinus Torvalds 		return length;
7971da177e4SLinus Torvalds 
7981da177e4SLinus Torvalds 	length = -ENOMEM;
79989d155efSJames Morris 	scon = kzalloc(size+1, GFP_KERNEL);
8001da177e4SLinus Torvalds 	if (!scon)
8011da177e4SLinus Torvalds 		return length;
8021da177e4SLinus Torvalds 
80389d155efSJames Morris 	tcon = kzalloc(size+1, GFP_KERNEL);
8041da177e4SLinus Torvalds 	if (!tcon)
8051da177e4SLinus Torvalds 		goto out;
8061da177e4SLinus Torvalds 
8071da177e4SLinus Torvalds 	length = -EINVAL;
8081da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
8091da177e4SLinus Torvalds 		goto out2;
8101da177e4SLinus Torvalds 
8111da177e4SLinus Torvalds 	length = security_context_to_sid(scon, strlen(scon)+1, &ssid);
8121da177e4SLinus Torvalds 	if (length < 0)
8131da177e4SLinus Torvalds 		goto out2;
8141da177e4SLinus Torvalds 	length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid);
8151da177e4SLinus Torvalds 	if (length < 0)
8161da177e4SLinus Torvalds 		goto out2;
8171da177e4SLinus Torvalds 
8181da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
8191da177e4SLinus Torvalds 	if (length < 0)
8201da177e4SLinus Torvalds 		goto out2;
8211da177e4SLinus Torvalds 
8221da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
8231da177e4SLinus Torvalds 	if (length < 0)
8241da177e4SLinus Torvalds 		goto out2;
8251da177e4SLinus Torvalds 
8261da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
827744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
828744ba35eSEric Paris 			"payload max\n", __func__, len);
8291da177e4SLinus Torvalds 		length = -ERANGE;
8301da177e4SLinus Torvalds 		goto out3;
8311da177e4SLinus Torvalds 	}
8321da177e4SLinus Torvalds 
8331da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
8341da177e4SLinus Torvalds 	length = len;
8351da177e4SLinus Torvalds out3:
8361da177e4SLinus Torvalds 	kfree(newcon);
8371da177e4SLinus Torvalds out2:
8381da177e4SLinus Torvalds 	kfree(tcon);
8391da177e4SLinus Torvalds out:
8401da177e4SLinus Torvalds 	kfree(scon);
8411da177e4SLinus Torvalds 	return length;
8421da177e4SLinus Torvalds }
8431da177e4SLinus Torvalds 
8441da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
8451da177e4SLinus Torvalds {
8461da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
8471da177e4SLinus Torvalds 
8481da177e4SLinus Torvalds 	if (ret) {
8491da177e4SLinus Torvalds 		ret->i_mode = mode;
8501da177e4SLinus Torvalds 		ret->i_uid = ret->i_gid = 0;
8511da177e4SLinus Torvalds 		ret->i_blocks = 0;
8521da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
8531da177e4SLinus Torvalds 	}
8541da177e4SLinus Torvalds 	return ret;
8551da177e4SLinus Torvalds }
8561da177e4SLinus Torvalds 
8571da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
8581da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
8591da177e4SLinus Torvalds {
8601da177e4SLinus Torvalds 	char *page = NULL;
8611da177e4SLinus Torvalds 	ssize_t length;
8621da177e4SLinus Torvalds 	ssize_t ret;
8631da177e4SLinus Torvalds 	int cur_enforcing;
864d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
865d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
866d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
8671da177e4SLinus Torvalds 
868bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
8691da177e4SLinus Torvalds 
870d313f948SStephen Smalley 	if (index >= bool_num || strcmp(name, bool_pending_names[index])) {
871d313f948SStephen Smalley 		ret = -EINVAL;
872d313f948SStephen Smalley 		goto out;
873d313f948SStephen Smalley 	}
8741da177e4SLinus Torvalds 
875bfd51626SDavi Arnaut 	if (count > PAGE_SIZE) {
8761da177e4SLinus Torvalds 		ret = -EINVAL;
8771da177e4SLinus Torvalds 		goto out;
8781da177e4SLinus Torvalds 	}
8791872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
8801872981bSEric Paris 	if (!page) {
8811da177e4SLinus Torvalds 		ret = -ENOMEM;
8821da177e4SLinus Torvalds 		goto out;
8831da177e4SLinus Torvalds 	}
8841da177e4SLinus Torvalds 
885d313f948SStephen Smalley 	cur_enforcing = security_get_bool_value(index);
8861da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
8871da177e4SLinus Torvalds 		ret = cur_enforcing;
8881da177e4SLinus Torvalds 		goto out;
8891da177e4SLinus Torvalds 	}
8901da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
891d313f948SStephen Smalley 			  bool_pending_values[index]);
89268bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
8931da177e4SLinus Torvalds out:
894bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
8951da177e4SLinus Torvalds 	if (page)
8961da177e4SLinus Torvalds 		free_page((unsigned long)page);
8971da177e4SLinus Torvalds 	return ret;
8981da177e4SLinus Torvalds }
8991da177e4SLinus Torvalds 
9001da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
9011da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
9021da177e4SLinus Torvalds {
9031da177e4SLinus Torvalds 	char *page = NULL;
904d313f948SStephen Smalley 	ssize_t length;
9051da177e4SLinus Torvalds 	int new_value;
906d313f948SStephen Smalley 	struct inode *inode = filep->f_path.dentry->d_inode;
907d313f948SStephen Smalley 	unsigned index = inode->i_ino & SEL_INO_MASK;
908d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
9091da177e4SLinus Torvalds 
910bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
9111da177e4SLinus Torvalds 
9121da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
9131da177e4SLinus Torvalds 	if (length)
9141da177e4SLinus Torvalds 		goto out;
9151da177e4SLinus Torvalds 
916d313f948SStephen Smalley 	if (index >= bool_num || strcmp(name, bool_pending_names[index])) {
917d313f948SStephen Smalley 		length = -EINVAL;
918d313f948SStephen Smalley 		goto out;
919d313f948SStephen Smalley 	}
920d313f948SStephen Smalley 
921bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
9221da177e4SLinus Torvalds 		length = -ENOMEM;
9231da177e4SLinus Torvalds 		goto out;
9241da177e4SLinus Torvalds 	}
925d313f948SStephen Smalley 
9261da177e4SLinus Torvalds 	if (*ppos != 0) {
9271da177e4SLinus Torvalds 		/* No partial writes. */
928d313f948SStephen Smalley 		length = -EINVAL;
9291da177e4SLinus Torvalds 		goto out;
9301da177e4SLinus Torvalds 	}
9311da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
9321da177e4SLinus Torvalds 	if (!page) {
9331da177e4SLinus Torvalds 		length = -ENOMEM;
9341da177e4SLinus Torvalds 		goto out;
9351da177e4SLinus Torvalds 	}
9361da177e4SLinus Torvalds 
937d313f948SStephen Smalley 	length = -EFAULT;
9381da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
9391da177e4SLinus Torvalds 		goto out;
9401da177e4SLinus Torvalds 
9411da177e4SLinus Torvalds 	length = -EINVAL;
9421da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
9431da177e4SLinus Torvalds 		goto out;
9441da177e4SLinus Torvalds 
9451da177e4SLinus Torvalds 	if (new_value)
9461da177e4SLinus Torvalds 		new_value = 1;
9471da177e4SLinus Torvalds 
948d313f948SStephen Smalley 	bool_pending_values[index] = new_value;
9491da177e4SLinus Torvalds 	length = count;
9501da177e4SLinus Torvalds 
9511da177e4SLinus Torvalds out:
952bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
9531da177e4SLinus Torvalds 	if (page)
9541da177e4SLinus Torvalds 		free_page((unsigned long) page);
9551da177e4SLinus Torvalds 	return length;
9561da177e4SLinus Torvalds }
9571da177e4SLinus Torvalds 
9589c2e08c5SArjan van de Ven static const struct file_operations sel_bool_ops = {
9591da177e4SLinus Torvalds 	.read		= sel_read_bool,
9601da177e4SLinus Torvalds 	.write		= sel_write_bool,
9611da177e4SLinus Torvalds };
9621da177e4SLinus Torvalds 
9631da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
9641da177e4SLinus Torvalds 				      const char __user *buf,
9651da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
9661da177e4SLinus Torvalds {
9671da177e4SLinus Torvalds 	char *page = NULL;
968d313f948SStephen Smalley 	ssize_t length;
9691da177e4SLinus Torvalds 	int new_value;
9701da177e4SLinus Torvalds 
971bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
9721da177e4SLinus Torvalds 
9731da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
9741da177e4SLinus Torvalds 	if (length)
9751da177e4SLinus Torvalds 		goto out;
9761da177e4SLinus Torvalds 
977bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
9781da177e4SLinus Torvalds 		length = -ENOMEM;
9791da177e4SLinus Torvalds 		goto out;
9801da177e4SLinus Torvalds 	}
9811da177e4SLinus Torvalds 	if (*ppos != 0) {
9821da177e4SLinus Torvalds 		/* No partial writes. */
9831da177e4SLinus Torvalds 		goto out;
9841da177e4SLinus Torvalds 	}
9851da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
9861da177e4SLinus Torvalds 	if (!page) {
9871da177e4SLinus Torvalds 		length = -ENOMEM;
9881da177e4SLinus Torvalds 		goto out;
9891da177e4SLinus Torvalds 	}
9901da177e4SLinus Torvalds 
991d313f948SStephen Smalley 	length = -EFAULT;
9921da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
9931da177e4SLinus Torvalds 		goto out;
9941da177e4SLinus Torvalds 
9951da177e4SLinus Torvalds 	length = -EINVAL;
9961da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
9971da177e4SLinus Torvalds 		goto out;
9981da177e4SLinus Torvalds 
9991872981bSEric Paris 	if (new_value && bool_pending_values)
10001da177e4SLinus Torvalds 		security_set_bools(bool_num, bool_pending_values);
10011da177e4SLinus Torvalds 
10021da177e4SLinus Torvalds 	length = count;
10031da177e4SLinus Torvalds 
10041da177e4SLinus Torvalds out:
1005bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
10061da177e4SLinus Torvalds 	if (page)
10071da177e4SLinus Torvalds 		free_page((unsigned long) page);
10081da177e4SLinus Torvalds 	return length;
10091da177e4SLinus Torvalds }
10101da177e4SLinus Torvalds 
10119c2e08c5SArjan van de Ven static const struct file_operations sel_commit_bools_ops = {
10121da177e4SLinus Torvalds 	.write		= sel_commit_bools_write,
10131da177e4SLinus Torvalds };
10141da177e4SLinus Torvalds 
10150c92d7c7SChristopher J. PeBenito static void sel_remove_entries(struct dentry *de)
10161da177e4SLinus Torvalds {
10170955dc03SStephen Smalley 	struct list_head *node;
10181da177e4SLinus Torvalds 
10191da177e4SLinus Torvalds 	spin_lock(&dcache_lock);
10201da177e4SLinus Torvalds 	node = de->d_subdirs.next;
10211da177e4SLinus Torvalds 	while (node != &de->d_subdirs) {
10225160ee6fSEric Dumazet 		struct dentry *d = list_entry(node, struct dentry, d_u.d_child);
10231da177e4SLinus Torvalds 		list_del_init(node);
10241da177e4SLinus Torvalds 
10251da177e4SLinus Torvalds 		if (d->d_inode) {
10261da177e4SLinus Torvalds 			d = dget_locked(d);
10271da177e4SLinus Torvalds 			spin_unlock(&dcache_lock);
10281da177e4SLinus Torvalds 			d_delete(d);
10291da177e4SLinus Torvalds 			simple_unlink(de->d_inode, d);
10301da177e4SLinus Torvalds 			dput(d);
10311da177e4SLinus Torvalds 			spin_lock(&dcache_lock);
10321da177e4SLinus Torvalds 		}
10331da177e4SLinus Torvalds 		node = de->d_subdirs.next;
10341da177e4SLinus Torvalds 	}
10351da177e4SLinus Torvalds 
10361da177e4SLinus Torvalds 	spin_unlock(&dcache_lock);
10371da177e4SLinus Torvalds }
10381da177e4SLinus Torvalds 
10391da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
10401da177e4SLinus Torvalds 
10411da177e4SLinus Torvalds static int sel_make_bools(void)
10421da177e4SLinus Torvalds {
10431da177e4SLinus Torvalds 	int i, ret = 0;
10441da177e4SLinus Torvalds 	ssize_t len;
10451da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
10461da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
10471da177e4SLinus Torvalds 	struct inode *inode = NULL;
10481da177e4SLinus Torvalds 	struct inode_security_struct *isec;
10491da177e4SLinus Torvalds 	char **names = NULL, *page;
10501da177e4SLinus Torvalds 	int num;
10511da177e4SLinus Torvalds 	int *values = NULL;
10521da177e4SLinus Torvalds 	u32 sid;
10531da177e4SLinus Torvalds 
10541da177e4SLinus Torvalds 	/* remove any existing files */
1055d313f948SStephen Smalley 	kfree(bool_pending_names);
10561da177e4SLinus Torvalds 	kfree(bool_pending_values);
1057d313f948SStephen Smalley 	bool_pending_names = NULL;
105820c19e41SDavi Arnaut 	bool_pending_values = NULL;
10591da177e4SLinus Torvalds 
10600c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
10611da177e4SLinus Torvalds 
10621872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
10631872981bSEric Paris 	if (!page)
10641da177e4SLinus Torvalds 		return -ENOMEM;
10651da177e4SLinus Torvalds 
10661da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
10671da177e4SLinus Torvalds 	if (ret != 0)
10681da177e4SLinus Torvalds 		goto out;
10691da177e4SLinus Torvalds 
10701da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
10711da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
10721da177e4SLinus Torvalds 		if (!dentry) {
10731da177e4SLinus Torvalds 			ret = -ENOMEM;
10741da177e4SLinus Torvalds 			goto err;
10751da177e4SLinus Torvalds 		}
10761da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
10771da177e4SLinus Torvalds 		if (!inode) {
10781da177e4SLinus Torvalds 			ret = -ENOMEM;
10791da177e4SLinus Torvalds 			goto err;
10801da177e4SLinus Torvalds 		}
10811da177e4SLinus Torvalds 
10821da177e4SLinus Torvalds 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
10831da177e4SLinus Torvalds 		if (len < 0) {
10841da177e4SLinus Torvalds 			ret = -EINVAL;
10851da177e4SLinus Torvalds 			goto err;
10861da177e4SLinus Torvalds 		} else if (len >= PAGE_SIZE) {
10871da177e4SLinus Torvalds 			ret = -ENAMETOOLONG;
10881da177e4SLinus Torvalds 			goto err;
10891da177e4SLinus Torvalds 		}
10901da177e4SLinus Torvalds 		isec = (struct inode_security_struct *)inode->i_security;
10911872981bSEric Paris 		ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
10921872981bSEric Paris 		if (ret)
10931da177e4SLinus Torvalds 			goto err;
10941da177e4SLinus Torvalds 		isec->sid = sid;
10951da177e4SLinus Torvalds 		isec->initialized = 1;
10961da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
1097bce34bc0SJames Carter 		inode->i_ino = i|SEL_BOOL_INO_OFFSET;
10981da177e4SLinus Torvalds 		d_add(dentry, inode);
10991da177e4SLinus Torvalds 	}
11001da177e4SLinus Torvalds 	bool_num = num;
1101d313f948SStephen Smalley 	bool_pending_names = names;
11021da177e4SLinus Torvalds 	bool_pending_values = values;
11031da177e4SLinus Torvalds out:
11041da177e4SLinus Torvalds 	free_page((unsigned long)page);
1105d313f948SStephen Smalley 	return ret;
1106d313f948SStephen Smalley err:
11071da177e4SLinus Torvalds 	if (names) {
11089a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
11091da177e4SLinus Torvalds 			kfree(names[i]);
11101da177e4SLinus Torvalds 		kfree(names);
11111da177e4SLinus Torvalds 	}
111220c19e41SDavi Arnaut 	kfree(values);
11130c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
11141da177e4SLinus Torvalds 	ret = -ENOMEM;
11151da177e4SLinus Torvalds 	goto out;
11161da177e4SLinus Torvalds }
11171da177e4SLinus Torvalds 
11181da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
11191da177e4SLinus Torvalds 
11201872981bSEric Paris struct dentry *selinux_null;
11211da177e4SLinus Torvalds 
11221da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
11231da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
11241da177e4SLinus Torvalds {
11251da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
11261da177e4SLinus Torvalds 	ssize_t length;
11271da177e4SLinus Torvalds 
11281da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
11291da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
11301da177e4SLinus Torvalds }
11311da177e4SLinus Torvalds 
11321da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file *file,
11331da177e4SLinus Torvalds 					     const char __user *buf,
11341da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
11351da177e4SLinus Torvalds 
11361da177e4SLinus Torvalds {
11371da177e4SLinus Torvalds 	char *page;
11381da177e4SLinus Torvalds 	ssize_t ret;
11391da177e4SLinus Torvalds 	int new_value;
11401da177e4SLinus Torvalds 
1141bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE) {
11421da177e4SLinus Torvalds 		ret = -ENOMEM;
11431da177e4SLinus Torvalds 		goto out;
11441da177e4SLinus Torvalds 	}
11451da177e4SLinus Torvalds 
11461da177e4SLinus Torvalds 	if (*ppos != 0) {
11471da177e4SLinus Torvalds 		/* No partial writes. */
11481da177e4SLinus Torvalds 		ret = -EINVAL;
11491da177e4SLinus Torvalds 		goto out;
11501da177e4SLinus Torvalds 	}
11511da177e4SLinus Torvalds 
11521da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
11531da177e4SLinus Torvalds 	if (!page) {
11541da177e4SLinus Torvalds 		ret = -ENOMEM;
11551da177e4SLinus Torvalds 		goto out;
11561da177e4SLinus Torvalds 	}
11571da177e4SLinus Torvalds 
11581da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count)) {
11591da177e4SLinus Torvalds 		ret = -EFAULT;
11601da177e4SLinus Torvalds 		goto out_free;
11611da177e4SLinus Torvalds 	}
11621da177e4SLinus Torvalds 
11631da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1) {
11641da177e4SLinus Torvalds 		ret = -EINVAL;
11651da177e4SLinus Torvalds 		goto out;
11661da177e4SLinus Torvalds 	}
11671da177e4SLinus Torvalds 
11681da177e4SLinus Torvalds 	if (new_value != avc_cache_threshold) {
11691da177e4SLinus Torvalds 		ret = task_has_security(current, SECURITY__SETSECPARAM);
11701da177e4SLinus Torvalds 		if (ret)
11711da177e4SLinus Torvalds 			goto out_free;
11721da177e4SLinus Torvalds 		avc_cache_threshold = new_value;
11731da177e4SLinus Torvalds 	}
11741da177e4SLinus Torvalds 	ret = count;
11751da177e4SLinus Torvalds out_free:
11761da177e4SLinus Torvalds 	free_page((unsigned long)page);
11771da177e4SLinus Torvalds out:
11781da177e4SLinus Torvalds 	return ret;
11791da177e4SLinus Torvalds }
11801da177e4SLinus Torvalds 
11811da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
11821da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
11831da177e4SLinus Torvalds {
11841da177e4SLinus Torvalds 	char *page;
11851da177e4SLinus Torvalds 	ssize_t ret = 0;
11861da177e4SLinus Torvalds 
11871da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
11881da177e4SLinus Torvalds 	if (!page) {
11891da177e4SLinus Torvalds 		ret = -ENOMEM;
11901da177e4SLinus Torvalds 		goto out;
11911da177e4SLinus Torvalds 	}
11921da177e4SLinus Torvalds 	ret = avc_get_hash_stats(page);
11931da177e4SLinus Torvalds 	if (ret >= 0)
11941da177e4SLinus Torvalds 		ret = simple_read_from_buffer(buf, count, ppos, page, ret);
11951da177e4SLinus Torvalds 	free_page((unsigned long)page);
11961da177e4SLinus Torvalds out:
11971da177e4SLinus Torvalds 	return ret;
11981da177e4SLinus Torvalds }
11991da177e4SLinus Torvalds 
12009c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_threshold_ops = {
12011da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
12021da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
12031da177e4SLinus Torvalds };
12041da177e4SLinus Torvalds 
12059c2e08c5SArjan van de Ven static const struct file_operations sel_avc_hash_stats_ops = {
12061da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
12071da177e4SLinus Torvalds };
12081da177e4SLinus Torvalds 
12091da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
12101da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
12111da177e4SLinus Torvalds {
12121da177e4SLinus Torvalds 	int cpu;
12131da177e4SLinus Torvalds 
12141da177e4SLinus Torvalds 	for (cpu = *idx; cpu < NR_CPUS; ++cpu) {
12151da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
12161da177e4SLinus Torvalds 			continue;
12171da177e4SLinus Torvalds 		*idx = cpu + 1;
12181da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
12191da177e4SLinus Torvalds 	}
12201da177e4SLinus Torvalds 	return NULL;
12211da177e4SLinus Torvalds }
12221da177e4SLinus Torvalds 
12231da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
12241da177e4SLinus Torvalds {
12251da177e4SLinus Torvalds 	loff_t n = *pos - 1;
12261da177e4SLinus Torvalds 
12271da177e4SLinus Torvalds 	if (*pos == 0)
12281da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
12291da177e4SLinus Torvalds 
12301da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
12311da177e4SLinus Torvalds }
12321da177e4SLinus Torvalds 
12331da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
12341da177e4SLinus Torvalds {
12351da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
12361da177e4SLinus Torvalds }
12371da177e4SLinus Torvalds 
12381da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
12391da177e4SLinus Torvalds {
12401da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
12411da177e4SLinus Torvalds 
12421da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
12431da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
12441da177e4SLinus Torvalds 			   "frees\n");
12451da177e4SLinus Torvalds 	else
12461da177e4SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", st->lookups,
12471da177e4SLinus Torvalds 			   st->hits, st->misses, st->allocations,
12481da177e4SLinus Torvalds 			   st->reclaims, st->frees);
12491da177e4SLinus Torvalds 	return 0;
12501da177e4SLinus Torvalds }
12511da177e4SLinus Torvalds 
12521da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
12531da177e4SLinus Torvalds { }
12541da177e4SLinus Torvalds 
12551996a109SJan Engelhardt static const struct seq_operations sel_avc_cache_stats_seq_ops = {
12561da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
12571da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
12581da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
12591da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
12601da177e4SLinus Torvalds };
12611da177e4SLinus Torvalds 
12621da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
12631da177e4SLinus Torvalds {
12641da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
12651da177e4SLinus Torvalds }
12661da177e4SLinus Torvalds 
12679c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_stats_ops = {
12681da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
12691da177e4SLinus Torvalds 	.read		= seq_read,
12701da177e4SLinus Torvalds 	.llseek		= seq_lseek,
12711da177e4SLinus Torvalds 	.release	= seq_release,
12721da177e4SLinus Torvalds };
12731da177e4SLinus Torvalds #endif
12741da177e4SLinus Torvalds 
12751da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
12761da177e4SLinus Torvalds {
12771da177e4SLinus Torvalds 	int i, ret = 0;
12781da177e4SLinus Torvalds 	static struct tree_descr files[] = {
12791da177e4SLinus Torvalds 		{ "cache_threshold",
12801da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
12811da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
12821da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
12831da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
12841da177e4SLinus Torvalds #endif
12851da177e4SLinus Torvalds 	};
12861da177e4SLinus Torvalds 
12876e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
12881da177e4SLinus Torvalds 		struct inode *inode;
12891da177e4SLinus Torvalds 		struct dentry *dentry;
12901da177e4SLinus Torvalds 
12911da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
12921da177e4SLinus Torvalds 		if (!dentry) {
12931da177e4SLinus Torvalds 			ret = -ENOMEM;
1294d6aafa65SJames Morris 			goto out;
12951da177e4SLinus Torvalds 		}
12961da177e4SLinus Torvalds 
12971da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
12981da177e4SLinus Torvalds 		if (!inode) {
12991da177e4SLinus Torvalds 			ret = -ENOMEM;
1300d6aafa65SJames Morris 			goto out;
13011da177e4SLinus Torvalds 		}
13021da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
13036174eafcSJames Carter 		inode->i_ino = ++sel_last_ino;
13041da177e4SLinus Torvalds 		d_add(dentry, inode);
13051da177e4SLinus Torvalds 	}
13061da177e4SLinus Torvalds out:
13071da177e4SLinus Torvalds 	return ret;
13081da177e4SLinus Torvalds }
13091da177e4SLinus Torvalds 
1310f0ee2e46SJames Carter static ssize_t sel_read_initcon(struct file *file, char __user *buf,
1311f0ee2e46SJames Carter 				size_t count, loff_t *ppos)
1312f0ee2e46SJames Carter {
1313f0ee2e46SJames Carter 	struct inode *inode;
1314f0ee2e46SJames Carter 	char *con;
1315f0ee2e46SJames Carter 	u32 sid, len;
1316f0ee2e46SJames Carter 	ssize_t ret;
1317f0ee2e46SJames Carter 
1318f0ee2e46SJames Carter 	inode = file->f_path.dentry->d_inode;
1319f0ee2e46SJames Carter 	sid = inode->i_ino&SEL_INO_MASK;
1320f0ee2e46SJames Carter 	ret = security_sid_to_context(sid, &con, &len);
1321f0ee2e46SJames Carter 	if (ret < 0)
1322f0ee2e46SJames Carter 		return ret;
1323f0ee2e46SJames Carter 
1324f0ee2e46SJames Carter 	ret = simple_read_from_buffer(buf, count, ppos, con, len);
1325f0ee2e46SJames Carter 	kfree(con);
1326f0ee2e46SJames Carter 	return ret;
1327f0ee2e46SJames Carter }
1328f0ee2e46SJames Carter 
1329f0ee2e46SJames Carter static const struct file_operations sel_initcon_ops = {
1330f0ee2e46SJames Carter 	.read		= sel_read_initcon,
1331f0ee2e46SJames Carter };
1332f0ee2e46SJames Carter 
1333f0ee2e46SJames Carter static int sel_make_initcon_files(struct dentry *dir)
1334f0ee2e46SJames Carter {
1335f0ee2e46SJames Carter 	int i, ret = 0;
1336f0ee2e46SJames Carter 
1337f0ee2e46SJames Carter 	for (i = 1; i <= SECINITSID_NUM; i++) {
1338f0ee2e46SJames Carter 		struct inode *inode;
1339f0ee2e46SJames Carter 		struct dentry *dentry;
1340f0ee2e46SJames Carter 		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
1341f0ee2e46SJames Carter 		if (!dentry) {
1342f0ee2e46SJames Carter 			ret = -ENOMEM;
1343f0ee2e46SJames Carter 			goto out;
1344f0ee2e46SJames Carter 		}
1345f0ee2e46SJames Carter 
1346f0ee2e46SJames Carter 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1347f0ee2e46SJames Carter 		if (!inode) {
1348f0ee2e46SJames Carter 			ret = -ENOMEM;
1349f0ee2e46SJames Carter 			goto out;
1350f0ee2e46SJames Carter 		}
1351f0ee2e46SJames Carter 		inode->i_fop = &sel_initcon_ops;
1352f0ee2e46SJames Carter 		inode->i_ino = i|SEL_INITCON_INO_OFFSET;
1353f0ee2e46SJames Carter 		d_add(dentry, inode);
1354f0ee2e46SJames Carter 	}
1355f0ee2e46SJames Carter out:
1356f0ee2e46SJames Carter 	return ret;
1357f0ee2e46SJames Carter }
1358f0ee2e46SJames Carter 
1359e47c8fc5SChristopher J. PeBenito static inline unsigned int sel_div(unsigned long a, unsigned long b)
1360e47c8fc5SChristopher J. PeBenito {
1361e47c8fc5SChristopher J. PeBenito 	return a / b - (a % b < 0);
1362e47c8fc5SChristopher J. PeBenito }
1363e47c8fc5SChristopher J. PeBenito 
1364e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_class_to_ino(u16 class)
1365e47c8fc5SChristopher J. PeBenito {
1366e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1)) | SEL_CLASS_INO_OFFSET;
1367e47c8fc5SChristopher J. PeBenito }
1368e47c8fc5SChristopher J. PeBenito 
1369e47c8fc5SChristopher J. PeBenito static inline u16 sel_ino_to_class(unsigned long ino)
1370e47c8fc5SChristopher J. PeBenito {
1371e47c8fc5SChristopher J. PeBenito 	return sel_div(ino & SEL_INO_MASK, SEL_VEC_MAX + 1);
1372e47c8fc5SChristopher J. PeBenito }
1373e47c8fc5SChristopher J. PeBenito 
1374e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_perm_to_ino(u16 class, u32 perm)
1375e47c8fc5SChristopher J. PeBenito {
1376e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET;
1377e47c8fc5SChristopher J. PeBenito }
1378e47c8fc5SChristopher J. PeBenito 
1379e47c8fc5SChristopher J. PeBenito static inline u32 sel_ino_to_perm(unsigned long ino)
1380e47c8fc5SChristopher J. PeBenito {
1381e47c8fc5SChristopher J. PeBenito 	return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1);
1382e47c8fc5SChristopher J. PeBenito }
1383e47c8fc5SChristopher J. PeBenito 
1384e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_class(struct file *file, char __user *buf,
1385e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1386e47c8fc5SChristopher J. PeBenito {
1387e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1388e47c8fc5SChristopher J. PeBenito 	char *page;
1389e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1390e47c8fc5SChristopher J. PeBenito 
1391e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1392e47c8fc5SChristopher J. PeBenito 	if (!page) {
1393e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1394e47c8fc5SChristopher J. PeBenito 		goto out;
1395e47c8fc5SChristopher J. PeBenito 	}
1396e47c8fc5SChristopher J. PeBenito 
1397e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_class(ino));
1398e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1399e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1400e47c8fc5SChristopher J. PeBenito out:
1401e47c8fc5SChristopher J. PeBenito 	return rc;
1402e47c8fc5SChristopher J. PeBenito }
1403e47c8fc5SChristopher J. PeBenito 
1404e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_class_ops = {
1405e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_class,
1406e47c8fc5SChristopher J. PeBenito };
1407e47c8fc5SChristopher J. PeBenito 
1408e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_perm(struct file *file, char __user *buf,
1409e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1410e47c8fc5SChristopher J. PeBenito {
1411e47c8fc5SChristopher J. PeBenito 	ssize_t rc, len;
1412e47c8fc5SChristopher J. PeBenito 	char *page;
1413e47c8fc5SChristopher J. PeBenito 	unsigned long ino = file->f_path.dentry->d_inode->i_ino;
1414e47c8fc5SChristopher J. PeBenito 
1415e47c8fc5SChristopher J. PeBenito 	page = (char *)__get_free_page(GFP_KERNEL);
1416e47c8fc5SChristopher J. PeBenito 	if (!page) {
1417e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1418e47c8fc5SChristopher J. PeBenito 		goto out;
1419e47c8fc5SChristopher J. PeBenito 	}
1420e47c8fc5SChristopher J. PeBenito 
1421e47c8fc5SChristopher J. PeBenito 	len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_perm(ino));
1422e47c8fc5SChristopher J. PeBenito 	rc = simple_read_from_buffer(buf, count, ppos, page, len);
1423e47c8fc5SChristopher J. PeBenito 	free_page((unsigned long)page);
1424e47c8fc5SChristopher J. PeBenito out:
1425e47c8fc5SChristopher J. PeBenito 	return rc;
1426e47c8fc5SChristopher J. PeBenito }
1427e47c8fc5SChristopher J. PeBenito 
1428e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_perm_ops = {
1429e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_perm,
1430e47c8fc5SChristopher J. PeBenito };
1431e47c8fc5SChristopher J. PeBenito 
14323bb56b25SPaul Moore static ssize_t sel_read_policycap(struct file *file, char __user *buf,
14333bb56b25SPaul Moore 				  size_t count, loff_t *ppos)
14343bb56b25SPaul Moore {
14353bb56b25SPaul Moore 	int value;
14363bb56b25SPaul Moore 	char tmpbuf[TMPBUFLEN];
14373bb56b25SPaul Moore 	ssize_t length;
14383bb56b25SPaul Moore 	unsigned long i_ino = file->f_path.dentry->d_inode->i_ino;
14393bb56b25SPaul Moore 
14403bb56b25SPaul Moore 	value = security_policycap_supported(i_ino & SEL_INO_MASK);
14413bb56b25SPaul Moore 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
14423bb56b25SPaul Moore 
14433bb56b25SPaul Moore 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
14443bb56b25SPaul Moore }
14453bb56b25SPaul Moore 
14463bb56b25SPaul Moore static const struct file_operations sel_policycap_ops = {
14473bb56b25SPaul Moore 	.read		= sel_read_policycap,
14483bb56b25SPaul Moore };
14493bb56b25SPaul Moore 
1450e47c8fc5SChristopher J. PeBenito static int sel_make_perm_files(char *objclass, int classvalue,
1451e47c8fc5SChristopher J. PeBenito 				struct dentry *dir)
1452e47c8fc5SChristopher J. PeBenito {
1453e47c8fc5SChristopher J. PeBenito 	int i, rc = 0, nperms;
1454e47c8fc5SChristopher J. PeBenito 	char **perms;
1455e47c8fc5SChristopher J. PeBenito 
1456e47c8fc5SChristopher J. PeBenito 	rc = security_get_permissions(objclass, &perms, &nperms);
1457e47c8fc5SChristopher J. PeBenito 	if (rc)
1458e47c8fc5SChristopher J. PeBenito 		goto out;
1459e47c8fc5SChristopher J. PeBenito 
1460e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++) {
1461e47c8fc5SChristopher J. PeBenito 		struct inode *inode;
1462e47c8fc5SChristopher J. PeBenito 		struct dentry *dentry;
1463e47c8fc5SChristopher J. PeBenito 
1464e47c8fc5SChristopher J. PeBenito 		dentry = d_alloc_name(dir, perms[i]);
1465e47c8fc5SChristopher J. PeBenito 		if (!dentry) {
1466e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1467e47c8fc5SChristopher J. PeBenito 			goto out1;
1468e47c8fc5SChristopher J. PeBenito 		}
1469e47c8fc5SChristopher J. PeBenito 
1470e47c8fc5SChristopher J. PeBenito 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1471e47c8fc5SChristopher J. PeBenito 		if (!inode) {
1472e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1473e47c8fc5SChristopher J. PeBenito 			goto out1;
1474e47c8fc5SChristopher J. PeBenito 		}
1475e47c8fc5SChristopher J. PeBenito 		inode->i_fop = &sel_perm_ops;
1476e47c8fc5SChristopher J. PeBenito 		/* i+1 since perm values are 1-indexed */
1477e47c8fc5SChristopher J. PeBenito 		inode->i_ino = sel_perm_to_ino(classvalue, i+1);
1478e47c8fc5SChristopher J. PeBenito 		d_add(dentry, inode);
1479e47c8fc5SChristopher J. PeBenito 	}
1480e47c8fc5SChristopher J. PeBenito 
1481e47c8fc5SChristopher J. PeBenito out1:
1482e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++)
1483e47c8fc5SChristopher J. PeBenito 		kfree(perms[i]);
1484e47c8fc5SChristopher J. PeBenito 	kfree(perms);
1485e47c8fc5SChristopher J. PeBenito out:
1486e47c8fc5SChristopher J. PeBenito 	return rc;
1487e47c8fc5SChristopher J. PeBenito }
1488e47c8fc5SChristopher J. PeBenito 
1489e47c8fc5SChristopher J. PeBenito static int sel_make_class_dir_entries(char *classname, int index,
1490e47c8fc5SChristopher J. PeBenito 					struct dentry *dir)
1491e47c8fc5SChristopher J. PeBenito {
1492e47c8fc5SChristopher J. PeBenito 	struct dentry *dentry = NULL;
1493e47c8fc5SChristopher J. PeBenito 	struct inode *inode = NULL;
1494e47c8fc5SChristopher J. PeBenito 	int rc;
1495e47c8fc5SChristopher J. PeBenito 
1496e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "index");
1497e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1498e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1499e47c8fc5SChristopher J. PeBenito 		goto out;
1500e47c8fc5SChristopher J. PeBenito 	}
1501e47c8fc5SChristopher J. PeBenito 
1502e47c8fc5SChristopher J. PeBenito 	inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1503e47c8fc5SChristopher J. PeBenito 	if (!inode) {
1504e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1505e47c8fc5SChristopher J. PeBenito 		goto out;
1506e47c8fc5SChristopher J. PeBenito 	}
1507e47c8fc5SChristopher J. PeBenito 
1508e47c8fc5SChristopher J. PeBenito 	inode->i_fop = &sel_class_ops;
1509e47c8fc5SChristopher J. PeBenito 	inode->i_ino = sel_class_to_ino(index);
1510e47c8fc5SChristopher J. PeBenito 	d_add(dentry, inode);
1511e47c8fc5SChristopher J. PeBenito 
1512e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "perms");
1513e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1514e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1515e47c8fc5SChristopher J. PeBenito 		goto out;
1516e47c8fc5SChristopher J. PeBenito 	}
1517e47c8fc5SChristopher J. PeBenito 
1518e47c8fc5SChristopher J. PeBenito 	rc = sel_make_dir(dir->d_inode, dentry, &last_class_ino);
1519e47c8fc5SChristopher J. PeBenito 	if (rc)
1520e47c8fc5SChristopher J. PeBenito 		goto out;
1521e47c8fc5SChristopher J. PeBenito 
1522e47c8fc5SChristopher J. PeBenito 	rc = sel_make_perm_files(classname, index, dentry);
1523e47c8fc5SChristopher J. PeBenito 
1524e47c8fc5SChristopher J. PeBenito out:
1525e47c8fc5SChristopher J. PeBenito 	return rc;
1526e47c8fc5SChristopher J. PeBenito }
1527e47c8fc5SChristopher J. PeBenito 
1528e47c8fc5SChristopher J. PeBenito static void sel_remove_classes(void)
1529e47c8fc5SChristopher J. PeBenito {
1530e47c8fc5SChristopher J. PeBenito 	struct list_head *class_node;
1531e47c8fc5SChristopher J. PeBenito 
1532e47c8fc5SChristopher J. PeBenito 	list_for_each(class_node, &class_dir->d_subdirs) {
1533e47c8fc5SChristopher J. PeBenito 		struct dentry *class_subdir = list_entry(class_node,
1534e47c8fc5SChristopher J. PeBenito 					struct dentry, d_u.d_child);
1535e47c8fc5SChristopher J. PeBenito 		struct list_head *class_subdir_node;
1536e47c8fc5SChristopher J. PeBenito 
1537e47c8fc5SChristopher J. PeBenito 		list_for_each(class_subdir_node, &class_subdir->d_subdirs) {
1538e47c8fc5SChristopher J. PeBenito 			struct dentry *d = list_entry(class_subdir_node,
1539e47c8fc5SChristopher J. PeBenito 						struct dentry, d_u.d_child);
1540e47c8fc5SChristopher J. PeBenito 
1541e47c8fc5SChristopher J. PeBenito 			if (d->d_inode)
1542e47c8fc5SChristopher J. PeBenito 				if (d->d_inode->i_mode & S_IFDIR)
1543e47c8fc5SChristopher J. PeBenito 					sel_remove_entries(d);
1544e47c8fc5SChristopher J. PeBenito 		}
1545e47c8fc5SChristopher J. PeBenito 
1546e47c8fc5SChristopher J. PeBenito 		sel_remove_entries(class_subdir);
1547e47c8fc5SChristopher J. PeBenito 	}
1548e47c8fc5SChristopher J. PeBenito 
1549e47c8fc5SChristopher J. PeBenito 	sel_remove_entries(class_dir);
1550e47c8fc5SChristopher J. PeBenito }
1551e47c8fc5SChristopher J. PeBenito 
1552e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void)
1553e47c8fc5SChristopher J. PeBenito {
1554e47c8fc5SChristopher J. PeBenito 	int rc = 0, nclasses, i;
1555e47c8fc5SChristopher J. PeBenito 	char **classes;
1556e47c8fc5SChristopher J. PeBenito 
1557e47c8fc5SChristopher J. PeBenito 	/* delete any existing entries */
1558e47c8fc5SChristopher J. PeBenito 	sel_remove_classes();
1559e47c8fc5SChristopher J. PeBenito 
1560e47c8fc5SChristopher J. PeBenito 	rc = security_get_classes(&classes, &nclasses);
1561e47c8fc5SChristopher J. PeBenito 	if (rc < 0)
1562e47c8fc5SChristopher J. PeBenito 		goto out;
1563e47c8fc5SChristopher J. PeBenito 
1564e47c8fc5SChristopher J. PeBenito 	/* +2 since classes are 1-indexed */
1565e47c8fc5SChristopher J. PeBenito 	last_class_ino = sel_class_to_ino(nclasses+2);
1566e47c8fc5SChristopher J. PeBenito 
1567e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++) {
1568e47c8fc5SChristopher J. PeBenito 		struct dentry *class_name_dir;
1569e47c8fc5SChristopher J. PeBenito 
1570e47c8fc5SChristopher J. PeBenito 		class_name_dir = d_alloc_name(class_dir, classes[i]);
1571e47c8fc5SChristopher J. PeBenito 		if (!class_name_dir) {
1572e47c8fc5SChristopher J. PeBenito 			rc = -ENOMEM;
1573e47c8fc5SChristopher J. PeBenito 			goto out1;
1574e47c8fc5SChristopher J. PeBenito 		}
1575e47c8fc5SChristopher J. PeBenito 
1576e47c8fc5SChristopher J. PeBenito 		rc = sel_make_dir(class_dir->d_inode, class_name_dir,
1577e47c8fc5SChristopher J. PeBenito 				&last_class_ino);
1578e47c8fc5SChristopher J. PeBenito 		if (rc)
1579e47c8fc5SChristopher J. PeBenito 			goto out1;
1580e47c8fc5SChristopher J. PeBenito 
1581e47c8fc5SChristopher J. PeBenito 		/* i+1 since class values are 1-indexed */
1582e47c8fc5SChristopher J. PeBenito 		rc = sel_make_class_dir_entries(classes[i], i+1,
1583e47c8fc5SChristopher J. PeBenito 				class_name_dir);
1584e47c8fc5SChristopher J. PeBenito 		if (rc)
1585e47c8fc5SChristopher J. PeBenito 			goto out1;
1586e47c8fc5SChristopher J. PeBenito 	}
1587e47c8fc5SChristopher J. PeBenito 
1588e47c8fc5SChristopher J. PeBenito out1:
1589e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++)
1590e47c8fc5SChristopher J. PeBenito 		kfree(classes[i]);
1591e47c8fc5SChristopher J. PeBenito 	kfree(classes);
1592e47c8fc5SChristopher J. PeBenito out:
1593e47c8fc5SChristopher J. PeBenito 	return rc;
1594e47c8fc5SChristopher J. PeBenito }
1595e47c8fc5SChristopher J. PeBenito 
15963bb56b25SPaul Moore static int sel_make_policycap(void)
15973bb56b25SPaul Moore {
15983bb56b25SPaul Moore 	unsigned int iter;
15993bb56b25SPaul Moore 	struct dentry *dentry = NULL;
16003bb56b25SPaul Moore 	struct inode *inode = NULL;
16013bb56b25SPaul Moore 
16023bb56b25SPaul Moore 	sel_remove_entries(policycap_dir);
16033bb56b25SPaul Moore 
16043bb56b25SPaul Moore 	for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
16053bb56b25SPaul Moore 		if (iter < ARRAY_SIZE(policycap_names))
16063bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir,
16073bb56b25SPaul Moore 					      policycap_names[iter]);
16083bb56b25SPaul Moore 		else
16093bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir, "unknown");
16103bb56b25SPaul Moore 
16113bb56b25SPaul Moore 		if (dentry == NULL)
16123bb56b25SPaul Moore 			return -ENOMEM;
16133bb56b25SPaul Moore 
16143bb56b25SPaul Moore 		inode = sel_make_inode(policycap_dir->d_sb, S_IFREG | S_IRUGO);
16153bb56b25SPaul Moore 		if (inode == NULL)
16163bb56b25SPaul Moore 			return -ENOMEM;
16173bb56b25SPaul Moore 
16183bb56b25SPaul Moore 		inode->i_fop = &sel_policycap_ops;
16193bb56b25SPaul Moore 		inode->i_ino = iter | SEL_POLICYCAP_INO_OFFSET;
16203bb56b25SPaul Moore 		d_add(dentry, inode);
16213bb56b25SPaul Moore 	}
16223bb56b25SPaul Moore 
16233bb56b25SPaul Moore 	return 0;
16243bb56b25SPaul Moore }
16253bb56b25SPaul Moore 
16260dd4ae51SChristopher J. PeBenito static int sel_make_dir(struct inode *dir, struct dentry *dentry,
16270dd4ae51SChristopher J. PeBenito 			unsigned long *ino)
16281da177e4SLinus Torvalds {
16291da177e4SLinus Torvalds 	int ret = 0;
16301da177e4SLinus Torvalds 	struct inode *inode;
16311da177e4SLinus Torvalds 
1632edb20fb5SJames Morris 	inode = sel_make_inode(dir->i_sb, S_IFDIR | S_IRUGO | S_IXUGO);
16331da177e4SLinus Torvalds 	if (!inode) {
16341da177e4SLinus Torvalds 		ret = -ENOMEM;
16351da177e4SLinus Torvalds 		goto out;
16361da177e4SLinus Torvalds 	}
16371da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
16381da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
16390dd4ae51SChristopher J. PeBenito 	inode->i_ino = ++(*ino);
164040e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
1641d8c76e6fSDave Hansen 	inc_nlink(inode);
16421da177e4SLinus Torvalds 	d_add(dentry, inode);
1643edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1644d8c76e6fSDave Hansen 	inc_nlink(dir);
16451da177e4SLinus Torvalds out:
16461da177e4SLinus Torvalds 	return ret;
16471da177e4SLinus Torvalds }
16481da177e4SLinus Torvalds 
16491da177e4SLinus Torvalds static int sel_fill_super(struct super_block *sb, void *data, int silent)
16501da177e4SLinus Torvalds {
16511da177e4SLinus Torvalds 	int ret;
16521da177e4SLinus Torvalds 	struct dentry *dentry;
1653edb20fb5SJames Morris 	struct inode *inode, *root_inode;
16541da177e4SLinus Torvalds 	struct inode_security_struct *isec;
16551da177e4SLinus Torvalds 
16561da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
16571da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
16581da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1659ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
16601da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
16611da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
16621da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
16631da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
16641da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
16651da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
16661da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
16671da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
16681da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
16691da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
16704e5ab4cbSJames Morris 		[SEL_COMPAT_NET] = {"compat_net", &sel_compat_net_ops, S_IRUGO|S_IWUSR},
16713f12070eSEric Paris 		[SEL_REJECT_UNKNOWN] = {"reject_unknown", &sel_handle_unknown_ops, S_IRUGO},
16723f12070eSEric Paris 		[SEL_DENY_UNKNOWN] = {"deny_unknown", &sel_handle_unknown_ops, S_IRUGO},
16731da177e4SLinus Torvalds 		/* last one */ {""}
16741da177e4SLinus Torvalds 	};
16751da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
16761da177e4SLinus Torvalds 	if (ret)
1677161ce45aSJames Morris 		goto err;
16781da177e4SLinus Torvalds 
1679edb20fb5SJames Morris 	root_inode = sb->s_root->d_inode;
1680edb20fb5SJames Morris 
16811da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, BOOL_DIR_NAME);
1682161ce45aSJames Morris 	if (!dentry) {
1683161ce45aSJames Morris 		ret = -ENOMEM;
1684161ce45aSJames Morris 		goto err;
1685161ce45aSJames Morris 	}
16861da177e4SLinus Torvalds 
16870dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1688cde174a8SJames Morris 	if (ret)
1689161ce45aSJames Morris 		goto err;
1690cde174a8SJames Morris 
16911da177e4SLinus Torvalds 	bool_dir = dentry;
16921da177e4SLinus Torvalds 
16931da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1694161ce45aSJames Morris 	if (!dentry) {
1695161ce45aSJames Morris 		ret = -ENOMEM;
1696161ce45aSJames Morris 		goto err;
1697161ce45aSJames Morris 	}
16981da177e4SLinus Torvalds 
16991da177e4SLinus Torvalds 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1700161ce45aSJames Morris 	if (!inode) {
1701161ce45aSJames Morris 		ret = -ENOMEM;
1702161ce45aSJames Morris 		goto err;
1703161ce45aSJames Morris 	}
17046174eafcSJames Carter 	inode->i_ino = ++sel_last_ino;
17051da177e4SLinus Torvalds 	isec = (struct inode_security_struct *)inode->i_security;
17061da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
17071da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
17081da177e4SLinus Torvalds 	isec->initialized = 1;
17091da177e4SLinus Torvalds 
17101da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
17111da177e4SLinus Torvalds 	d_add(dentry, inode);
17121da177e4SLinus Torvalds 	selinux_null = dentry;
17131da177e4SLinus Torvalds 
17141da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, "avc");
1715161ce45aSJames Morris 	if (!dentry) {
1716161ce45aSJames Morris 		ret = -ENOMEM;
1717161ce45aSJames Morris 		goto err;
1718161ce45aSJames Morris 	}
17191da177e4SLinus Torvalds 
17200dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
17211da177e4SLinus Torvalds 	if (ret)
1722161ce45aSJames Morris 		goto err;
17231da177e4SLinus Torvalds 
17241da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
17251da177e4SLinus Torvalds 	if (ret)
1726161ce45aSJames Morris 		goto err;
1727f0ee2e46SJames Carter 
1728f0ee2e46SJames Carter 	dentry = d_alloc_name(sb->s_root, "initial_contexts");
1729f0ee2e46SJames Carter 	if (!dentry) {
1730f0ee2e46SJames Carter 		ret = -ENOMEM;
1731f0ee2e46SJames Carter 		goto err;
1732f0ee2e46SJames Carter 	}
1733f0ee2e46SJames Carter 
17340dd4ae51SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1735f0ee2e46SJames Carter 	if (ret)
1736f0ee2e46SJames Carter 		goto err;
1737f0ee2e46SJames Carter 
1738f0ee2e46SJames Carter 	ret = sel_make_initcon_files(dentry);
1739f0ee2e46SJames Carter 	if (ret)
1740f0ee2e46SJames Carter 		goto err;
1741f0ee2e46SJames Carter 
1742e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(sb->s_root, "class");
1743e47c8fc5SChristopher J. PeBenito 	if (!dentry) {
1744e47c8fc5SChristopher J. PeBenito 		ret = -ENOMEM;
1745e47c8fc5SChristopher J. PeBenito 		goto err;
1746e47c8fc5SChristopher J. PeBenito 	}
1747e47c8fc5SChristopher J. PeBenito 
1748e47c8fc5SChristopher J. PeBenito 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
1749e47c8fc5SChristopher J. PeBenito 	if (ret)
1750e47c8fc5SChristopher J. PeBenito 		goto err;
1751e47c8fc5SChristopher J. PeBenito 
1752e47c8fc5SChristopher J. PeBenito 	class_dir = dentry;
1753e47c8fc5SChristopher J. PeBenito 
17543bb56b25SPaul Moore 	dentry = d_alloc_name(sb->s_root, "policy_capabilities");
17553bb56b25SPaul Moore 	if (!dentry) {
17563bb56b25SPaul Moore 		ret = -ENOMEM;
17573bb56b25SPaul Moore 		goto err;
17583bb56b25SPaul Moore 	}
17593bb56b25SPaul Moore 
17603bb56b25SPaul Moore 	ret = sel_make_dir(root_inode, dentry, &sel_last_ino);
17613bb56b25SPaul Moore 	if (ret)
17623bb56b25SPaul Moore 		goto err;
17633bb56b25SPaul Moore 
17643bb56b25SPaul Moore 	policycap_dir = dentry;
17653bb56b25SPaul Moore 
17661da177e4SLinus Torvalds out:
1767161ce45aSJames Morris 	return ret;
1768161ce45aSJames Morris err:
1769744ba35eSEric Paris 	printk(KERN_ERR "SELinux: %s:  failed while creating inodes\n",
1770744ba35eSEric Paris 		__func__);
1771161ce45aSJames Morris 	goto out;
17721da177e4SLinus Torvalds }
17731da177e4SLinus Torvalds 
1774454e2398SDavid Howells static int sel_get_sb(struct file_system_type *fs_type,
1775454e2398SDavid Howells 		      int flags, const char *dev_name, void *data,
1776454e2398SDavid Howells 		      struct vfsmount *mnt)
17771da177e4SLinus Torvalds {
1778454e2398SDavid Howells 	return get_sb_single(fs_type, flags, data, sel_fill_super, mnt);
17791da177e4SLinus Torvalds }
17801da177e4SLinus Torvalds 
17811da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
17821da177e4SLinus Torvalds 	.name		= "selinuxfs",
17831da177e4SLinus Torvalds 	.get_sb		= sel_get_sb,
17841da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
17851da177e4SLinus Torvalds };
17861da177e4SLinus Torvalds 
17871da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
17881da177e4SLinus Torvalds 
17891da177e4SLinus Torvalds static int __init init_sel_fs(void)
17901da177e4SLinus Torvalds {
17911da177e4SLinus Torvalds 	int err;
17921da177e4SLinus Torvalds 
17931da177e4SLinus Torvalds 	if (!selinux_enabled)
17941da177e4SLinus Torvalds 		return 0;
17951da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
17961da177e4SLinus Torvalds 	if (!err) {
17971da177e4SLinus Torvalds 		selinuxfs_mount = kern_mount(&sel_fs_type);
17981da177e4SLinus Torvalds 		if (IS_ERR(selinuxfs_mount)) {
17991da177e4SLinus Torvalds 			printk(KERN_ERR "selinuxfs:  could not mount!\n");
18001da177e4SLinus Torvalds 			err = PTR_ERR(selinuxfs_mount);
18011da177e4SLinus Torvalds 			selinuxfs_mount = NULL;
18021da177e4SLinus Torvalds 		}
18031da177e4SLinus Torvalds 	}
18041da177e4SLinus Torvalds 	return err;
18051da177e4SLinus Torvalds }
18061da177e4SLinus Torvalds 
18071da177e4SLinus Torvalds __initcall(init_sel_fs);
18081da177e4SLinus Torvalds 
18091da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
18101da177e4SLinus Torvalds void exit_sel_fs(void)
18111da177e4SLinus Torvalds {
18121da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
18131da177e4SLinus Torvalds }
18141da177e4SLinus Torvalds #endif
1815