xref: /openbmc/linux/security/selinux/selinuxfs.c (revision f9df6458)
11da177e4SLinus Torvalds /* Updated: Karl MacMillan <kmacmillan@tresys.com>
21da177e4SLinus Torvalds  *
31da177e4SLinus Torvalds  *	Added conditional policy language extensions
41da177e4SLinus Torvalds  *
582c21bfaSPaul Moore  *  Updated: Hewlett-Packard <paul@paul-moore.com>
63bb56b25SPaul Moore  *
73bb56b25SPaul Moore  *	Added support for the policy capability bitmap
83bb56b25SPaul Moore  *
93bb56b25SPaul Moore  * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
101da177e4SLinus Torvalds  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
111da177e4SLinus Torvalds  * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
121da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or modify
131da177e4SLinus Torvalds  *	it under the terms of the GNU General Public License as published by
141da177e4SLinus Torvalds  *	the Free Software Foundation, version 2.
151da177e4SLinus Torvalds  */
161da177e4SLinus Torvalds 
171da177e4SLinus Torvalds #include <linux/kernel.h>
181da177e4SLinus Torvalds #include <linux/pagemap.h>
191da177e4SLinus Torvalds #include <linux/slab.h>
201da177e4SLinus Torvalds #include <linux/vmalloc.h>
211da177e4SLinus Torvalds #include <linux/fs.h>
22bb003079SIngo Molnar #include <linux/mutex.h>
231da177e4SLinus Torvalds #include <linux/init.h>
241da177e4SLinus Torvalds #include <linux/string.h>
251da177e4SLinus Torvalds #include <linux/security.h>
261da177e4SLinus Torvalds #include <linux/major.h>
271da177e4SLinus Torvalds #include <linux/seq_file.h>
281da177e4SLinus Torvalds #include <linux/percpu.h>
29af601e46SSteve Grubb #include <linux/audit.h>
30f5269710SEric Paris #include <linux/uaccess.h>
317a627e3bSGreg Kroah-Hartman #include <linux/kobject.h>
320f7e4c33SKohei Kaigai #include <linux/ctype.h>
331da177e4SLinus Torvalds 
341da177e4SLinus Torvalds /* selinuxfs pseudo filesystem for exporting the security policy API.
351da177e4SLinus Torvalds    Based on the proc code and the fs/nfsd/nfsctl.c code. */
361da177e4SLinus Torvalds 
371da177e4SLinus Torvalds #include "flask.h"
381da177e4SLinus Torvalds #include "avc.h"
391da177e4SLinus Torvalds #include "avc_ss.h"
401da177e4SLinus Torvalds #include "security.h"
411da177e4SLinus Torvalds #include "objsec.h"
421da177e4SLinus Torvalds #include "conditional.h"
431da177e4SLinus Torvalds 
443bb56b25SPaul Moore /* Policy capability filenames */
453bb56b25SPaul Moore static char *policycap_names[] = {
46b0c636b9SEric Paris 	"network_peer_controls",
472be4d74fSChris PeBenito 	"open_perms",
482be4d74fSChris PeBenito 	"redhat1",
492be4d74fSChris PeBenito 	"always_check_network"
503bb56b25SPaul Moore };
513bb56b25SPaul Moore 
521da177e4SLinus Torvalds unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
531da177e4SLinus Torvalds 
541da177e4SLinus Torvalds static int __init checkreqprot_setup(char *str)
551da177e4SLinus Torvalds {
56f5269710SEric Paris 	unsigned long checkreqprot;
5729707b20SJingoo Han 	if (!kstrtoul(str, 0, &checkreqprot))
58f5269710SEric Paris 		selinux_checkreqprot = checkreqprot ? 1 : 0;
591da177e4SLinus Torvalds 	return 1;
601da177e4SLinus Torvalds }
611da177e4SLinus Torvalds __setup("checkreqprot=", checkreqprot_setup);
621da177e4SLinus Torvalds 
63bb003079SIngo Molnar static DEFINE_MUTEX(sel_mutex);
641da177e4SLinus Torvalds 
651da177e4SLinus Torvalds /* global data for booleans */
661872981bSEric Paris static struct dentry *bool_dir;
671872981bSEric Paris static int bool_num;
68d313f948SStephen Smalley static char **bool_pending_names;
691872981bSEric Paris static int *bool_pending_values;
701da177e4SLinus Torvalds 
71e47c8fc5SChristopher J. PeBenito /* global data for classes */
721872981bSEric Paris static struct dentry *class_dir;
73e47c8fc5SChristopher J. PeBenito static unsigned long last_class_ino;
74e47c8fc5SChristopher J. PeBenito 
75cee74f47SEric Paris static char policy_opened;
76cee74f47SEric Paris 
773bb56b25SPaul Moore /* global data for policy capabilities */
781872981bSEric Paris static struct dentry *policycap_dir;
793bb56b25SPaul Moore 
801da177e4SLinus Torvalds /* Check whether a task is allowed to use a security operation. */
811da177e4SLinus Torvalds static int task_has_security(struct task_struct *tsk,
821da177e4SLinus Torvalds 			     u32 perms)
831da177e4SLinus Torvalds {
84c69e8d9cSDavid Howells 	const struct task_security_struct *tsec;
85c69e8d9cSDavid Howells 	u32 sid = 0;
861da177e4SLinus Torvalds 
87c69e8d9cSDavid Howells 	rcu_read_lock();
88c69e8d9cSDavid Howells 	tsec = __task_cred(tsk)->security;
89c69e8d9cSDavid Howells 	if (tsec)
90c69e8d9cSDavid Howells 		sid = tsec->sid;
91c69e8d9cSDavid Howells 	rcu_read_unlock();
921da177e4SLinus Torvalds 	if (!tsec)
931da177e4SLinus Torvalds 		return -EACCES;
941da177e4SLinus Torvalds 
95c69e8d9cSDavid Howells 	return avc_has_perm(sid, SECINITSID_SECURITY,
961da177e4SLinus Torvalds 			    SECCLASS_SECURITY, perms, NULL);
971da177e4SLinus Torvalds }
981da177e4SLinus Torvalds 
991da177e4SLinus Torvalds enum sel_inos {
1001da177e4SLinus Torvalds 	SEL_ROOT_INO = 2,
1011da177e4SLinus Torvalds 	SEL_LOAD,	/* load policy */
1021da177e4SLinus Torvalds 	SEL_ENFORCE,	/* get or set enforcing status */
1031da177e4SLinus Torvalds 	SEL_CONTEXT,	/* validate context */
1041da177e4SLinus Torvalds 	SEL_ACCESS,	/* compute access decision */
1051da177e4SLinus Torvalds 	SEL_CREATE,	/* compute create labeling decision */
1061da177e4SLinus Torvalds 	SEL_RELABEL,	/* compute relabeling decision */
1071da177e4SLinus Torvalds 	SEL_USER,	/* compute reachable user contexts */
1081da177e4SLinus Torvalds 	SEL_POLICYVERS,	/* return policy version for this kernel */
1091da177e4SLinus Torvalds 	SEL_COMMIT_BOOLS, /* commit new boolean values */
1101da177e4SLinus Torvalds 	SEL_MLS,	/* return if MLS policy is enabled */
1111da177e4SLinus Torvalds 	SEL_DISABLE,	/* disable SELinux until next reboot */
1121da177e4SLinus Torvalds 	SEL_MEMBER,	/* compute polyinstantiation membership decision */
1131da177e4SLinus Torvalds 	SEL_CHECKREQPROT, /* check requested protection, not kernel-applied one */
1144e5ab4cbSJames Morris 	SEL_COMPAT_NET,	/* whether to use old compat network packet controls */
1153f12070eSEric Paris 	SEL_REJECT_UNKNOWN, /* export unknown reject handling to userspace */
1163f12070eSEric Paris 	SEL_DENY_UNKNOWN, /* export unknown deny handling to userspace */
11711904167SKaiGai Kohei 	SEL_STATUS,	/* export current status using mmap() */
118cee74f47SEric Paris 	SEL_POLICY,	/* allow userspace to read the in kernel policy */
119f9df6458SAndrew Perepechko 	SEL_VALIDATE_TRANS, /* compute validatetrans decision */
1206174eafcSJames Carter 	SEL_INO_NEXT,	/* The next inode number to use */
1211da177e4SLinus Torvalds };
1221da177e4SLinus Torvalds 
1236174eafcSJames Carter static unsigned long sel_last_ino = SEL_INO_NEXT - 1;
1246174eafcSJames Carter 
125f0ee2e46SJames Carter #define SEL_INITCON_INO_OFFSET		0x01000000
126bce34bc0SJames Carter #define SEL_BOOL_INO_OFFSET		0x02000000
127e47c8fc5SChristopher J. PeBenito #define SEL_CLASS_INO_OFFSET		0x04000000
1283bb56b25SPaul Moore #define SEL_POLICYCAP_INO_OFFSET	0x08000000
129f0ee2e46SJames Carter #define SEL_INO_MASK			0x00ffffff
130f0ee2e46SJames Carter 
1311da177e4SLinus Torvalds #define TMPBUFLEN	12
1321da177e4SLinus Torvalds static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
1331da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
1341da177e4SLinus Torvalds {
1351da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
1361da177e4SLinus Torvalds 	ssize_t length;
1371da177e4SLinus Torvalds 
1381da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", selinux_enforcing);
1391da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
1401da177e4SLinus Torvalds }
1411da177e4SLinus Torvalds 
1421da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
1431da177e4SLinus Torvalds static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
1441da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
1451da177e4SLinus Torvalds 
1461da177e4SLinus Torvalds {
147b77a493bSEric Paris 	char *page = NULL;
1481da177e4SLinus Torvalds 	ssize_t length;
1491da177e4SLinus Torvalds 	int new_value;
1501da177e4SLinus Torvalds 
151b77a493bSEric Paris 	length = -ENOMEM;
152bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
153b77a493bSEric Paris 		goto out;
154b77a493bSEric Paris 
1551da177e4SLinus Torvalds 	/* No partial writes. */
1566436a123SJoe Perches 	length = -EINVAL;
157b77a493bSEric Paris 	if (*ppos != 0)
158b77a493bSEric Paris 		goto out;
159b77a493bSEric Paris 
160b77a493bSEric Paris 	length = -ENOMEM;
1611da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
1621da177e4SLinus Torvalds 	if (!page)
163b77a493bSEric Paris 		goto out;
164b77a493bSEric Paris 
1651da177e4SLinus Torvalds 	length = -EFAULT;
1661da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
1671da177e4SLinus Torvalds 		goto out;
1681da177e4SLinus Torvalds 
1691da177e4SLinus Torvalds 	length = -EINVAL;
1701da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
1711da177e4SLinus Torvalds 		goto out;
1721da177e4SLinus Torvalds 
1731da177e4SLinus Torvalds 	if (new_value != selinux_enforcing) {
1741da177e4SLinus Torvalds 		length = task_has_security(current, SECURITY__SETENFORCE);
1751da177e4SLinus Torvalds 		if (length)
1761da177e4SLinus Torvalds 			goto out;
177af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
1784746ec5bSEric Paris 			"enforcing=%d old_enforcing=%d auid=%u ses=%u",
1794746ec5bSEric Paris 			new_value, selinux_enforcing,
180581abc09SEric W. Biederman 			from_kuid(&init_user_ns, audit_get_loginuid(current)),
1814746ec5bSEric Paris 			audit_get_sessionid(current));
1821da177e4SLinus Torvalds 		selinux_enforcing = new_value;
1831da177e4SLinus Torvalds 		if (selinux_enforcing)
1841da177e4SLinus Torvalds 			avc_ss_reset(0);
1851da177e4SLinus Torvalds 		selnl_notify_setenforce(selinux_enforcing);
18611904167SKaiGai Kohei 		selinux_status_update_setenforce(selinux_enforcing);
1871da177e4SLinus Torvalds 	}
1881da177e4SLinus Torvalds 	length = count;
1891da177e4SLinus Torvalds out:
1901da177e4SLinus Torvalds 	free_page((unsigned long) page);
1911da177e4SLinus Torvalds 	return length;
1921da177e4SLinus Torvalds }
1931da177e4SLinus Torvalds #else
1941da177e4SLinus Torvalds #define sel_write_enforce NULL
1951da177e4SLinus Torvalds #endif
1961da177e4SLinus Torvalds 
1979c2e08c5SArjan van de Ven static const struct file_operations sel_enforce_ops = {
1981da177e4SLinus Torvalds 	.read		= sel_read_enforce,
1991da177e4SLinus Torvalds 	.write		= sel_write_enforce,
20057a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
2011da177e4SLinus Torvalds };
2021da177e4SLinus Torvalds 
2033f12070eSEric Paris static ssize_t sel_read_handle_unknown(struct file *filp, char __user *buf,
2043f12070eSEric Paris 					size_t count, loff_t *ppos)
2053f12070eSEric Paris {
2063f12070eSEric Paris 	char tmpbuf[TMPBUFLEN];
2073f12070eSEric Paris 	ssize_t length;
208496ad9aaSAl Viro 	ino_t ino = file_inode(filp)->i_ino;
2093f12070eSEric Paris 	int handle_unknown = (ino == SEL_REJECT_UNKNOWN) ?
2103f12070eSEric Paris 		security_get_reject_unknown() : !security_get_allow_unknown();
2113f12070eSEric Paris 
2123f12070eSEric Paris 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", handle_unknown);
2133f12070eSEric Paris 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
2143f12070eSEric Paris }
2153f12070eSEric Paris 
2163f12070eSEric Paris static const struct file_operations sel_handle_unknown_ops = {
2173f12070eSEric Paris 	.read		= sel_read_handle_unknown,
21857a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
2193f12070eSEric Paris };
2203f12070eSEric Paris 
22111904167SKaiGai Kohei static int sel_open_handle_status(struct inode *inode, struct file *filp)
22211904167SKaiGai Kohei {
22311904167SKaiGai Kohei 	struct page    *status = selinux_kernel_status_page();
22411904167SKaiGai Kohei 
22511904167SKaiGai Kohei 	if (!status)
22611904167SKaiGai Kohei 		return -ENOMEM;
22711904167SKaiGai Kohei 
22811904167SKaiGai Kohei 	filp->private_data = status;
22911904167SKaiGai Kohei 
23011904167SKaiGai Kohei 	return 0;
23111904167SKaiGai Kohei }
23211904167SKaiGai Kohei 
23311904167SKaiGai Kohei static ssize_t sel_read_handle_status(struct file *filp, char __user *buf,
23411904167SKaiGai Kohei 				      size_t count, loff_t *ppos)
23511904167SKaiGai Kohei {
23611904167SKaiGai Kohei 	struct page    *status = filp->private_data;
23711904167SKaiGai Kohei 
23811904167SKaiGai Kohei 	BUG_ON(!status);
23911904167SKaiGai Kohei 
24011904167SKaiGai Kohei 	return simple_read_from_buffer(buf, count, ppos,
24111904167SKaiGai Kohei 				       page_address(status),
24211904167SKaiGai Kohei 				       sizeof(struct selinux_kernel_status));
24311904167SKaiGai Kohei }
24411904167SKaiGai Kohei 
24511904167SKaiGai Kohei static int sel_mmap_handle_status(struct file *filp,
24611904167SKaiGai Kohei 				  struct vm_area_struct *vma)
24711904167SKaiGai Kohei {
24811904167SKaiGai Kohei 	struct page    *status = filp->private_data;
24911904167SKaiGai Kohei 	unsigned long	size = vma->vm_end - vma->vm_start;
25011904167SKaiGai Kohei 
25111904167SKaiGai Kohei 	BUG_ON(!status);
25211904167SKaiGai Kohei 
25311904167SKaiGai Kohei 	/* only allows one page from the head */
25411904167SKaiGai Kohei 	if (vma->vm_pgoff > 0 || size != PAGE_SIZE)
25511904167SKaiGai Kohei 		return -EIO;
25611904167SKaiGai Kohei 	/* disallow writable mapping */
25711904167SKaiGai Kohei 	if (vma->vm_flags & VM_WRITE)
25811904167SKaiGai Kohei 		return -EPERM;
25911904167SKaiGai Kohei 	/* disallow mprotect() turns it into writable */
26011904167SKaiGai Kohei 	vma->vm_flags &= ~VM_MAYWRITE;
26111904167SKaiGai Kohei 
26211904167SKaiGai Kohei 	return remap_pfn_range(vma, vma->vm_start,
26311904167SKaiGai Kohei 			       page_to_pfn(status),
26411904167SKaiGai Kohei 			       size, vma->vm_page_prot);
26511904167SKaiGai Kohei }
26611904167SKaiGai Kohei 
26711904167SKaiGai Kohei static const struct file_operations sel_handle_status_ops = {
26811904167SKaiGai Kohei 	.open		= sel_open_handle_status,
26911904167SKaiGai Kohei 	.read		= sel_read_handle_status,
27011904167SKaiGai Kohei 	.mmap		= sel_mmap_handle_status,
27111904167SKaiGai Kohei 	.llseek		= generic_file_llseek,
27211904167SKaiGai Kohei };
27311904167SKaiGai Kohei 
2741da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
2751da177e4SLinus Torvalds static ssize_t sel_write_disable(struct file *file, const char __user *buf,
2761da177e4SLinus Torvalds 				 size_t count, loff_t *ppos)
2771da177e4SLinus Torvalds 
2781da177e4SLinus Torvalds {
279b77a493bSEric Paris 	char *page = NULL;
2801da177e4SLinus Torvalds 	ssize_t length;
2811da177e4SLinus Torvalds 	int new_value;
2821da177e4SLinus Torvalds 
283b77a493bSEric Paris 	length = -ENOMEM;
284bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
2856eab04a8SJustin P. Mattock 		goto out;
286b77a493bSEric Paris 
2871da177e4SLinus Torvalds 	/* No partial writes. */
288b77a493bSEric Paris 	length = -EINVAL;
289b77a493bSEric Paris 	if (*ppos != 0)
290b77a493bSEric Paris 		goto out;
291b77a493bSEric Paris 
292b77a493bSEric Paris 	length = -ENOMEM;
2931da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
2941da177e4SLinus Torvalds 	if (!page)
295b77a493bSEric Paris 		goto out;
296b77a493bSEric Paris 
2971da177e4SLinus Torvalds 	length = -EFAULT;
2981da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
2991da177e4SLinus Torvalds 		goto out;
3001da177e4SLinus Torvalds 
3011da177e4SLinus Torvalds 	length = -EINVAL;
3021da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
3031da177e4SLinus Torvalds 		goto out;
3041da177e4SLinus Torvalds 
3051da177e4SLinus Torvalds 	if (new_value) {
3061da177e4SLinus Torvalds 		length = selinux_disable();
307b77a493bSEric Paris 		if (length)
3081da177e4SLinus Torvalds 			goto out;
309af601e46SSteve Grubb 		audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
3104746ec5bSEric Paris 			"selinux=0 auid=%u ses=%u",
311581abc09SEric W. Biederman 			from_kuid(&init_user_ns, audit_get_loginuid(current)),
3124746ec5bSEric Paris 			audit_get_sessionid(current));
3131da177e4SLinus Torvalds 	}
3141da177e4SLinus Torvalds 
3151da177e4SLinus Torvalds 	length = count;
3161da177e4SLinus Torvalds out:
3171da177e4SLinus Torvalds 	free_page((unsigned long) page);
3181da177e4SLinus Torvalds 	return length;
3191da177e4SLinus Torvalds }
3201da177e4SLinus Torvalds #else
3211da177e4SLinus Torvalds #define sel_write_disable NULL
3221da177e4SLinus Torvalds #endif
3231da177e4SLinus Torvalds 
3249c2e08c5SArjan van de Ven static const struct file_operations sel_disable_ops = {
3251da177e4SLinus Torvalds 	.write		= sel_write_disable,
32657a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3271da177e4SLinus Torvalds };
3281da177e4SLinus Torvalds 
3291da177e4SLinus Torvalds static ssize_t sel_read_policyvers(struct file *filp, char __user *buf,
3301da177e4SLinus Torvalds 				   size_t count, loff_t *ppos)
3311da177e4SLinus Torvalds {
3321da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3331da177e4SLinus Torvalds 	ssize_t length;
3341da177e4SLinus Torvalds 
3351da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", POLICYDB_VERSION_MAX);
3361da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3371da177e4SLinus Torvalds }
3381da177e4SLinus Torvalds 
3399c2e08c5SArjan van de Ven static const struct file_operations sel_policyvers_ops = {
3401da177e4SLinus Torvalds 	.read		= sel_read_policyvers,
34157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3421da177e4SLinus Torvalds };
3431da177e4SLinus Torvalds 
3441da177e4SLinus Torvalds /* declaration for sel_write_load */
3451da177e4SLinus Torvalds static int sel_make_bools(void);
346e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void);
3473bb56b25SPaul Moore static int sel_make_policycap(void);
348e47c8fc5SChristopher J. PeBenito 
349e47c8fc5SChristopher J. PeBenito /* declaration for sel_make_class_dirs */
350a1c2aa1eSAl Viro static struct dentry *sel_make_dir(struct dentry *dir, const char *name,
351e47c8fc5SChristopher J. PeBenito 			unsigned long *ino);
3521da177e4SLinus Torvalds 
3531da177e4SLinus Torvalds static ssize_t sel_read_mls(struct file *filp, char __user *buf,
3541da177e4SLinus Torvalds 				size_t count, loff_t *ppos)
3551da177e4SLinus Torvalds {
3561da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
3571da177e4SLinus Torvalds 	ssize_t length;
3581da177e4SLinus Torvalds 
3590719aaf5SGuido Trentalancia 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
3600719aaf5SGuido Trentalancia 			   security_mls_enabled());
3611da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
3621da177e4SLinus Torvalds }
3631da177e4SLinus Torvalds 
3649c2e08c5SArjan van de Ven static const struct file_operations sel_mls_ops = {
3651da177e4SLinus Torvalds 	.read		= sel_read_mls,
36657a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
3671da177e4SLinus Torvalds };
3681da177e4SLinus Torvalds 
369cee74f47SEric Paris struct policy_load_memory {
370cee74f47SEric Paris 	size_t len;
371cee74f47SEric Paris 	void *data;
372cee74f47SEric Paris };
373cee74f47SEric Paris 
374cee74f47SEric Paris static int sel_open_policy(struct inode *inode, struct file *filp)
375cee74f47SEric Paris {
376cee74f47SEric Paris 	struct policy_load_memory *plm = NULL;
377cee74f47SEric Paris 	int rc;
378cee74f47SEric Paris 
379cee74f47SEric Paris 	BUG_ON(filp->private_data);
380cee74f47SEric Paris 
381cee74f47SEric Paris 	mutex_lock(&sel_mutex);
382cee74f47SEric Paris 
383cee74f47SEric Paris 	rc = task_has_security(current, SECURITY__READ_POLICY);
384cee74f47SEric Paris 	if (rc)
385cee74f47SEric Paris 		goto err;
386cee74f47SEric Paris 
387cee74f47SEric Paris 	rc = -EBUSY;
388cee74f47SEric Paris 	if (policy_opened)
389cee74f47SEric Paris 		goto err;
390cee74f47SEric Paris 
391cee74f47SEric Paris 	rc = -ENOMEM;
392cee74f47SEric Paris 	plm = kzalloc(sizeof(*plm), GFP_KERNEL);
393cee74f47SEric Paris 	if (!plm)
394cee74f47SEric Paris 		goto err;
395cee74f47SEric Paris 
396cee74f47SEric Paris 	if (i_size_read(inode) != security_policydb_len()) {
397cee74f47SEric Paris 		mutex_lock(&inode->i_mutex);
398cee74f47SEric Paris 		i_size_write(inode, security_policydb_len());
399cee74f47SEric Paris 		mutex_unlock(&inode->i_mutex);
400cee74f47SEric Paris 	}
401cee74f47SEric Paris 
402cee74f47SEric Paris 	rc = security_read_policy(&plm->data, &plm->len);
403cee74f47SEric Paris 	if (rc)
404cee74f47SEric Paris 		goto err;
405cee74f47SEric Paris 
406cee74f47SEric Paris 	policy_opened = 1;
407cee74f47SEric Paris 
408cee74f47SEric Paris 	filp->private_data = plm;
409cee74f47SEric Paris 
410cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
411cee74f47SEric Paris 
412cee74f47SEric Paris 	return 0;
413cee74f47SEric Paris err:
414cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
415cee74f47SEric Paris 
416cee74f47SEric Paris 	if (plm)
417cee74f47SEric Paris 		vfree(plm->data);
418cee74f47SEric Paris 	kfree(plm);
419cee74f47SEric Paris 	return rc;
420cee74f47SEric Paris }
421cee74f47SEric Paris 
422cee74f47SEric Paris static int sel_release_policy(struct inode *inode, struct file *filp)
423cee74f47SEric Paris {
424cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
425cee74f47SEric Paris 
426cee74f47SEric Paris 	BUG_ON(!plm);
427cee74f47SEric Paris 
428cee74f47SEric Paris 	policy_opened = 0;
429cee74f47SEric Paris 
430cee74f47SEric Paris 	vfree(plm->data);
431cee74f47SEric Paris 	kfree(plm);
432cee74f47SEric Paris 
433cee74f47SEric Paris 	return 0;
434cee74f47SEric Paris }
435cee74f47SEric Paris 
436cee74f47SEric Paris static ssize_t sel_read_policy(struct file *filp, char __user *buf,
437cee74f47SEric Paris 			       size_t count, loff_t *ppos)
438cee74f47SEric Paris {
439cee74f47SEric Paris 	struct policy_load_memory *plm = filp->private_data;
440cee74f47SEric Paris 	int ret;
441cee74f47SEric Paris 
442cee74f47SEric Paris 	mutex_lock(&sel_mutex);
443cee74f47SEric Paris 
444cee74f47SEric Paris 	ret = task_has_security(current, SECURITY__READ_POLICY);
445cee74f47SEric Paris 	if (ret)
446cee74f47SEric Paris 		goto out;
447cee74f47SEric Paris 
448cee74f47SEric Paris 	ret = simple_read_from_buffer(buf, count, ppos, plm->data, plm->len);
449cee74f47SEric Paris out:
450cee74f47SEric Paris 	mutex_unlock(&sel_mutex);
451cee74f47SEric Paris 	return ret;
452cee74f47SEric Paris }
453cee74f47SEric Paris 
454845ca30fSEric Paris static int sel_mmap_policy_fault(struct vm_area_struct *vma,
455845ca30fSEric Paris 				 struct vm_fault *vmf)
456845ca30fSEric Paris {
457845ca30fSEric Paris 	struct policy_load_memory *plm = vma->vm_file->private_data;
458845ca30fSEric Paris 	unsigned long offset;
459845ca30fSEric Paris 	struct page *page;
460845ca30fSEric Paris 
461845ca30fSEric Paris 	if (vmf->flags & (FAULT_FLAG_MKWRITE | FAULT_FLAG_WRITE))
462845ca30fSEric Paris 		return VM_FAULT_SIGBUS;
463845ca30fSEric Paris 
464845ca30fSEric Paris 	offset = vmf->pgoff << PAGE_SHIFT;
465845ca30fSEric Paris 	if (offset >= roundup(plm->len, PAGE_SIZE))
466845ca30fSEric Paris 		return VM_FAULT_SIGBUS;
467845ca30fSEric Paris 
468845ca30fSEric Paris 	page = vmalloc_to_page(plm->data + offset);
469845ca30fSEric Paris 	get_page(page);
470845ca30fSEric Paris 
471845ca30fSEric Paris 	vmf->page = page;
472845ca30fSEric Paris 
473845ca30fSEric Paris 	return 0;
474845ca30fSEric Paris }
475845ca30fSEric Paris 
4767cbea8dcSKirill A. Shutemov static const struct vm_operations_struct sel_mmap_policy_ops = {
477845ca30fSEric Paris 	.fault = sel_mmap_policy_fault,
478845ca30fSEric Paris 	.page_mkwrite = sel_mmap_policy_fault,
479845ca30fSEric Paris };
480845ca30fSEric Paris 
481ad3fa08cSJames Morris static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
482845ca30fSEric Paris {
483845ca30fSEric Paris 	if (vma->vm_flags & VM_SHARED) {
484845ca30fSEric Paris 		/* do not allow mprotect to make mapping writable */
485845ca30fSEric Paris 		vma->vm_flags &= ~VM_MAYWRITE;
486845ca30fSEric Paris 
487845ca30fSEric Paris 		if (vma->vm_flags & VM_WRITE)
488845ca30fSEric Paris 			return -EACCES;
489845ca30fSEric Paris 	}
490845ca30fSEric Paris 
491314e51b9SKonstantin Khlebnikov 	vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP;
492845ca30fSEric Paris 	vma->vm_ops = &sel_mmap_policy_ops;
493845ca30fSEric Paris 
494845ca30fSEric Paris 	return 0;
495845ca30fSEric Paris }
496845ca30fSEric Paris 
497cee74f47SEric Paris static const struct file_operations sel_policy_ops = {
498cee74f47SEric Paris 	.open		= sel_open_policy,
499cee74f47SEric Paris 	.read		= sel_read_policy,
500845ca30fSEric Paris 	.mmap		= sel_mmap_policy,
501cee74f47SEric Paris 	.release	= sel_release_policy,
50247a93a5bSEric Paris 	.llseek		= generic_file_llseek,
503cee74f47SEric Paris };
504cee74f47SEric Paris 
5051da177e4SLinus Torvalds static ssize_t sel_write_load(struct file *file, const char __user *buf,
5061da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
5071da177e4SLinus Torvalds 
5081da177e4SLinus Torvalds {
5091da177e4SLinus Torvalds 	ssize_t length;
5101da177e4SLinus Torvalds 	void *data = NULL;
5111da177e4SLinus Torvalds 
512bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
5131da177e4SLinus Torvalds 
5141da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__LOAD_POLICY);
5151da177e4SLinus Torvalds 	if (length)
5161da177e4SLinus Torvalds 		goto out;
5171da177e4SLinus Torvalds 
5181da177e4SLinus Torvalds 	/* No partial writes. */
5191da177e4SLinus Torvalds 	length = -EINVAL;
520b77a493bSEric Paris 	if (*ppos != 0)
5211da177e4SLinus Torvalds 		goto out;
5221da177e4SLinus Torvalds 
523b77a493bSEric Paris 	length = -EFBIG;
524b77a493bSEric Paris 	if (count > 64 * 1024 * 1024)
5251da177e4SLinus Torvalds 		goto out;
526b77a493bSEric Paris 
527b77a493bSEric Paris 	length = -ENOMEM;
528b77a493bSEric Paris 	data = vmalloc(count);
529b77a493bSEric Paris 	if (!data)
530b77a493bSEric Paris 		goto out;
5311da177e4SLinus Torvalds 
5321da177e4SLinus Torvalds 	length = -EFAULT;
5331da177e4SLinus Torvalds 	if (copy_from_user(data, buf, count) != 0)
5341da177e4SLinus Torvalds 		goto out;
5351da177e4SLinus Torvalds 
5361da177e4SLinus Torvalds 	length = security_load_policy(data, count);
5371da177e4SLinus Torvalds 	if (length)
5381da177e4SLinus Torvalds 		goto out;
5391da177e4SLinus Torvalds 
540b77a493bSEric Paris 	length = sel_make_bools();
541b77a493bSEric Paris 	if (length)
542e47c8fc5SChristopher J. PeBenito 		goto out1;
543e47c8fc5SChristopher J. PeBenito 
544b77a493bSEric Paris 	length = sel_make_classes();
545b77a493bSEric Paris 	if (length)
5463bb56b25SPaul Moore 		goto out1;
5473bb56b25SPaul Moore 
548b77a493bSEric Paris 	length = sel_make_policycap();
549b77a493bSEric Paris 	if (length)
550b77a493bSEric Paris 		goto out1;
551b77a493bSEric Paris 
5521da177e4SLinus Torvalds 	length = count;
553e47c8fc5SChristopher J. PeBenito 
554e47c8fc5SChristopher J. PeBenito out1:
555af601e46SSteve Grubb 	audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
5564746ec5bSEric Paris 		"policy loaded auid=%u ses=%u",
557581abc09SEric W. Biederman 		from_kuid(&init_user_ns, audit_get_loginuid(current)),
5584746ec5bSEric Paris 		audit_get_sessionid(current));
5591da177e4SLinus Torvalds out:
560bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
5611da177e4SLinus Torvalds 	vfree(data);
5621da177e4SLinus Torvalds 	return length;
5631da177e4SLinus Torvalds }
5641da177e4SLinus Torvalds 
5659c2e08c5SArjan van de Ven static const struct file_operations sel_load_ops = {
5661da177e4SLinus Torvalds 	.write		= sel_write_load,
56757a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
5681da177e4SLinus Torvalds };
5691da177e4SLinus Torvalds 
570ce9982d0SStephen Smalley static ssize_t sel_write_context(struct file *file, char *buf, size_t size)
5711da177e4SLinus Torvalds {
572b77a493bSEric Paris 	char *canon = NULL;
573ce9982d0SStephen Smalley 	u32 sid, len;
5741da177e4SLinus Torvalds 	ssize_t length;
5751da177e4SLinus Torvalds 
5761da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__CHECK_CONTEXT);
5771da177e4SLinus Torvalds 	if (length)
578b77a493bSEric Paris 		goto out;
5791da177e4SLinus Torvalds 
58052a4c640SNikolay Aleksandrov 	length = security_context_to_sid(buf, size, &sid, GFP_KERNEL);
581b77a493bSEric Paris 	if (length)
582b77a493bSEric Paris 		goto out;
5831da177e4SLinus Torvalds 
584ce9982d0SStephen Smalley 	length = security_sid_to_context(sid, &canon, &len);
585b77a493bSEric Paris 	if (length)
586b77a493bSEric Paris 		goto out;
587ce9982d0SStephen Smalley 
588b77a493bSEric Paris 	length = -ERANGE;
589ce9982d0SStephen Smalley 	if (len > SIMPLE_TRANSACTION_LIMIT) {
590744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
591744ba35eSEric Paris 			"payload max\n", __func__, len);
592ce9982d0SStephen Smalley 		goto out;
593ce9982d0SStephen Smalley 	}
594ce9982d0SStephen Smalley 
595ce9982d0SStephen Smalley 	memcpy(buf, canon, len);
596ce9982d0SStephen Smalley 	length = len;
5971da177e4SLinus Torvalds out:
598ce9982d0SStephen Smalley 	kfree(canon);
5991da177e4SLinus Torvalds 	return length;
6001da177e4SLinus Torvalds }
6011da177e4SLinus Torvalds 
6021da177e4SLinus Torvalds static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf,
6031da177e4SLinus Torvalds 				     size_t count, loff_t *ppos)
6041da177e4SLinus Torvalds {
6051da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
6061da177e4SLinus Torvalds 	ssize_t length;
6071da177e4SLinus Torvalds 
6081da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", selinux_checkreqprot);
6091da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
6101da177e4SLinus Torvalds }
6111da177e4SLinus Torvalds 
6121da177e4SLinus Torvalds static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
6131da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
6141da177e4SLinus Torvalds {
615b77a493bSEric Paris 	char *page = NULL;
6161da177e4SLinus Torvalds 	ssize_t length;
6171da177e4SLinus Torvalds 	unsigned int new_value;
6181da177e4SLinus Torvalds 
6191da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETCHECKREQPROT);
6201da177e4SLinus Torvalds 	if (length)
621b77a493bSEric Paris 		goto out;
6221da177e4SLinus Torvalds 
623b77a493bSEric Paris 	length = -ENOMEM;
624bfd51626SDavi Arnaut 	if (count >= PAGE_SIZE)
625b77a493bSEric Paris 		goto out;
626b77a493bSEric Paris 
6271da177e4SLinus Torvalds 	/* No partial writes. */
628b77a493bSEric Paris 	length = -EINVAL;
629b77a493bSEric Paris 	if (*ppos != 0)
630b77a493bSEric Paris 		goto out;
631b77a493bSEric Paris 
632b77a493bSEric Paris 	length = -ENOMEM;
6331da177e4SLinus Torvalds 	page = (char *)get_zeroed_page(GFP_KERNEL);
6341da177e4SLinus Torvalds 	if (!page)
635b77a493bSEric Paris 		goto out;
636b77a493bSEric Paris 
6371da177e4SLinus Torvalds 	length = -EFAULT;
6381da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
6391da177e4SLinus Torvalds 		goto out;
6401da177e4SLinus Torvalds 
6411da177e4SLinus Torvalds 	length = -EINVAL;
6421da177e4SLinus Torvalds 	if (sscanf(page, "%u", &new_value) != 1)
6431da177e4SLinus Torvalds 		goto out;
6441da177e4SLinus Torvalds 
6451da177e4SLinus Torvalds 	selinux_checkreqprot = new_value ? 1 : 0;
6461da177e4SLinus Torvalds 	length = count;
6471da177e4SLinus Torvalds out:
6481da177e4SLinus Torvalds 	free_page((unsigned long) page);
6491da177e4SLinus Torvalds 	return length;
6501da177e4SLinus Torvalds }
6519c2e08c5SArjan van de Ven static const struct file_operations sel_checkreqprot_ops = {
6521da177e4SLinus Torvalds 	.read		= sel_read_checkreqprot,
6531da177e4SLinus Torvalds 	.write		= sel_write_checkreqprot,
65457a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
6551da177e4SLinus Torvalds };
6561da177e4SLinus Torvalds 
657f9df6458SAndrew Perepechko static ssize_t sel_write_validatetrans(struct file *file,
658f9df6458SAndrew Perepechko 					const char __user *buf,
659f9df6458SAndrew Perepechko 					size_t count, loff_t *ppos)
660f9df6458SAndrew Perepechko {
661f9df6458SAndrew Perepechko 	char *oldcon = NULL, *newcon = NULL, *taskcon = NULL;
662f9df6458SAndrew Perepechko 	char *req = NULL;
663f9df6458SAndrew Perepechko 	u32 osid, nsid, tsid;
664f9df6458SAndrew Perepechko 	u16 tclass;
665f9df6458SAndrew Perepechko 	int rc;
666f9df6458SAndrew Perepechko 
667f9df6458SAndrew Perepechko 	rc = task_has_security(current, SECURITY__VALIDATE_TRANS);
668f9df6458SAndrew Perepechko 	if (rc)
669f9df6458SAndrew Perepechko 		goto out;
670f9df6458SAndrew Perepechko 
671f9df6458SAndrew Perepechko 	rc = -ENOMEM;
672f9df6458SAndrew Perepechko 	if (count >= PAGE_SIZE)
673f9df6458SAndrew Perepechko 		goto out;
674f9df6458SAndrew Perepechko 
675f9df6458SAndrew Perepechko 	/* No partial writes. */
676f9df6458SAndrew Perepechko 	rc = -EINVAL;
677f9df6458SAndrew Perepechko 	if (*ppos != 0)
678f9df6458SAndrew Perepechko 		goto out;
679f9df6458SAndrew Perepechko 
680f9df6458SAndrew Perepechko 	rc = -ENOMEM;
681f9df6458SAndrew Perepechko 	req = kzalloc(count + 1, GFP_KERNEL);
682f9df6458SAndrew Perepechko 	if (!req)
683f9df6458SAndrew Perepechko 		goto out;
684f9df6458SAndrew Perepechko 
685f9df6458SAndrew Perepechko 	rc = -EFAULT;
686f9df6458SAndrew Perepechko 	if (copy_from_user(req, buf, count))
687f9df6458SAndrew Perepechko 		goto out;
688f9df6458SAndrew Perepechko 
689f9df6458SAndrew Perepechko 	rc = -ENOMEM;
690f9df6458SAndrew Perepechko 	oldcon = kzalloc(count + 1, GFP_KERNEL);
691f9df6458SAndrew Perepechko 	if (!oldcon)
692f9df6458SAndrew Perepechko 		goto out;
693f9df6458SAndrew Perepechko 
694f9df6458SAndrew Perepechko 	newcon = kzalloc(count + 1, GFP_KERNEL);
695f9df6458SAndrew Perepechko 	if (!newcon)
696f9df6458SAndrew Perepechko 		goto out;
697f9df6458SAndrew Perepechko 
698f9df6458SAndrew Perepechko 	taskcon = kzalloc(count + 1, GFP_KERNEL);
699f9df6458SAndrew Perepechko 	if (!taskcon)
700f9df6458SAndrew Perepechko 		goto out;
701f9df6458SAndrew Perepechko 
702f9df6458SAndrew Perepechko 	rc = -EINVAL;
703f9df6458SAndrew Perepechko 	if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4)
704f9df6458SAndrew Perepechko 		goto out;
705f9df6458SAndrew Perepechko 
706f9df6458SAndrew Perepechko 	rc = security_context_str_to_sid(oldcon, &osid, GFP_KERNEL);
707f9df6458SAndrew Perepechko 	if (rc)
708f9df6458SAndrew Perepechko 		goto out;
709f9df6458SAndrew Perepechko 
710f9df6458SAndrew Perepechko 	rc = security_context_str_to_sid(newcon, &nsid, GFP_KERNEL);
711f9df6458SAndrew Perepechko 	if (rc)
712f9df6458SAndrew Perepechko 		goto out;
713f9df6458SAndrew Perepechko 
714f9df6458SAndrew Perepechko 	rc = security_context_str_to_sid(taskcon, &tsid, GFP_KERNEL);
715f9df6458SAndrew Perepechko 	if (rc)
716f9df6458SAndrew Perepechko 		goto out;
717f9df6458SAndrew Perepechko 
718f9df6458SAndrew Perepechko 	rc = security_validate_transition_user(osid, nsid, tsid, tclass);
719f9df6458SAndrew Perepechko 	if (!rc)
720f9df6458SAndrew Perepechko 		rc = count;
721f9df6458SAndrew Perepechko out:
722f9df6458SAndrew Perepechko 	kfree(req);
723f9df6458SAndrew Perepechko 	kfree(oldcon);
724f9df6458SAndrew Perepechko 	kfree(newcon);
725f9df6458SAndrew Perepechko 	kfree(taskcon);
726f9df6458SAndrew Perepechko 	return rc;
727f9df6458SAndrew Perepechko }
728f9df6458SAndrew Perepechko 
729f9df6458SAndrew Perepechko static const struct file_operations sel_transition_ops = {
730f9df6458SAndrew Perepechko 	.write		= sel_write_validatetrans,
731f9df6458SAndrew Perepechko 	.llseek		= generic_file_llseek,
732f9df6458SAndrew Perepechko };
733f9df6458SAndrew Perepechko 
7341da177e4SLinus Torvalds /*
7351da177e4SLinus Torvalds  * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c
7361da177e4SLinus Torvalds  */
7371da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
7381da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
7391da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
7401da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
7411da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size);
7421da177e4SLinus Torvalds 
7431da177e4SLinus Torvalds static ssize_t (*write_op[])(struct file *, char *, size_t) = {
7441da177e4SLinus Torvalds 	[SEL_ACCESS] = sel_write_access,
7451da177e4SLinus Torvalds 	[SEL_CREATE] = sel_write_create,
7461da177e4SLinus Torvalds 	[SEL_RELABEL] = sel_write_relabel,
7471da177e4SLinus Torvalds 	[SEL_USER] = sel_write_user,
7481da177e4SLinus Torvalds 	[SEL_MEMBER] = sel_write_member,
749ce9982d0SStephen Smalley 	[SEL_CONTEXT] = sel_write_context,
7501da177e4SLinus Torvalds };
7511da177e4SLinus Torvalds 
7521da177e4SLinus Torvalds static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos)
7531da177e4SLinus Torvalds {
754496ad9aaSAl Viro 	ino_t ino = file_inode(file)->i_ino;
7551da177e4SLinus Torvalds 	char *data;
7561da177e4SLinus Torvalds 	ssize_t rv;
7571da177e4SLinus Torvalds 
7586e20a64aSNicolas Kaiser 	if (ino >= ARRAY_SIZE(write_op) || !write_op[ino])
7591da177e4SLinus Torvalds 		return -EINVAL;
7601da177e4SLinus Torvalds 
7611da177e4SLinus Torvalds 	data = simple_transaction_get(file, buf, size);
7621da177e4SLinus Torvalds 	if (IS_ERR(data))
7631da177e4SLinus Torvalds 		return PTR_ERR(data);
7641da177e4SLinus Torvalds 
7651da177e4SLinus Torvalds 	rv = write_op[ino](file, data, size);
7661da177e4SLinus Torvalds 	if (rv > 0) {
7671da177e4SLinus Torvalds 		simple_transaction_set(file, rv);
7681da177e4SLinus Torvalds 		rv = size;
7691da177e4SLinus Torvalds 	}
7701da177e4SLinus Torvalds 	return rv;
7711da177e4SLinus Torvalds }
7721da177e4SLinus Torvalds 
7739c2e08c5SArjan van de Ven static const struct file_operations transaction_ops = {
7741da177e4SLinus Torvalds 	.write		= selinux_transaction_write,
7751da177e4SLinus Torvalds 	.read		= simple_transaction_read,
7761da177e4SLinus Torvalds 	.release	= simple_transaction_release,
77757a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
7781da177e4SLinus Torvalds };
7791da177e4SLinus Torvalds 
7801da177e4SLinus Torvalds /*
7811da177e4SLinus Torvalds  * payload - write methods
7821da177e4SLinus Torvalds  * If the method has a response, the response should be put in buf,
7831da177e4SLinus Torvalds  * and the length returned.  Otherwise return 0 or and -error.
7841da177e4SLinus Torvalds  */
7851da177e4SLinus Torvalds 
7861da177e4SLinus Torvalds static ssize_t sel_write_access(struct file *file, char *buf, size_t size)
7871da177e4SLinus Torvalds {
788b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
7891da177e4SLinus Torvalds 	u32 ssid, tsid;
7901da177e4SLinus Torvalds 	u16 tclass;
7911da177e4SLinus Torvalds 	struct av_decision avd;
7921da177e4SLinus Torvalds 	ssize_t length;
7931da177e4SLinus Torvalds 
7941da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_AV);
7951da177e4SLinus Torvalds 	if (length)
796b77a493bSEric Paris 		goto out;
7971da177e4SLinus Torvalds 
7981da177e4SLinus Torvalds 	length = -ENOMEM;
79989d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
8001da177e4SLinus Torvalds 	if (!scon)
801b77a493bSEric Paris 		goto out;
8021da177e4SLinus Torvalds 
803b77a493bSEric Paris 	length = -ENOMEM;
80489d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
8051da177e4SLinus Torvalds 	if (!tcon)
8061da177e4SLinus Torvalds 		goto out;
8071da177e4SLinus Torvalds 
8081da177e4SLinus Torvalds 	length = -EINVAL;
80919439d05SStephen Smalley 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
810b77a493bSEric Paris 		goto out;
8111da177e4SLinus Torvalds 
81244be2f65SRasmus Villemoes 	length = security_context_str_to_sid(scon, &ssid, GFP_KERNEL);
813b77a493bSEric Paris 	if (length)
814b77a493bSEric Paris 		goto out;
815b77a493bSEric Paris 
81644be2f65SRasmus Villemoes 	length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL);
817b77a493bSEric Paris 	if (length)
818b77a493bSEric Paris 		goto out;
8191da177e4SLinus Torvalds 
82019439d05SStephen Smalley 	security_compute_av_user(ssid, tsid, tclass, &avd);
8211da177e4SLinus Torvalds 
8221da177e4SLinus Torvalds 	length = scnprintf(buf, SIMPLE_TRANSACTION_LIMIT,
8238a6f83afSKaiGai Kohei 			  "%x %x %x %x %u %x",
824f1c6381aSEric Paris 			  avd.allowed, 0xffffffff,
8251da177e4SLinus Torvalds 			  avd.auditallow, avd.auditdeny,
8268a6f83afSKaiGai Kohei 			  avd.seqno, avd.flags);
8271da177e4SLinus Torvalds out:
828b77a493bSEric Paris 	kfree(tcon);
8291da177e4SLinus Torvalds 	kfree(scon);
8301da177e4SLinus Torvalds 	return length;
8311da177e4SLinus Torvalds }
8321da177e4SLinus Torvalds 
8331da177e4SLinus Torvalds static ssize_t sel_write_create(struct file *file, char *buf, size_t size)
8341da177e4SLinus Torvalds {
835b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
836f50a3ec9SKohei Kaigai 	char *namebuf = NULL, *objname = NULL;
8371da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
8381da177e4SLinus Torvalds 	u16 tclass;
8391da177e4SLinus Torvalds 	ssize_t length;
840b77a493bSEric Paris 	char *newcon = NULL;
8411da177e4SLinus Torvalds 	u32 len;
842f50a3ec9SKohei Kaigai 	int nargs;
8431da177e4SLinus Torvalds 
8441da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_CREATE);
8451da177e4SLinus Torvalds 	if (length)
846b77a493bSEric Paris 		goto out;
8471da177e4SLinus Torvalds 
8481da177e4SLinus Torvalds 	length = -ENOMEM;
84989d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
8501da177e4SLinus Torvalds 	if (!scon)
851b77a493bSEric Paris 		goto out;
8521da177e4SLinus Torvalds 
853b77a493bSEric Paris 	length = -ENOMEM;
85489d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
8551da177e4SLinus Torvalds 	if (!tcon)
8561da177e4SLinus Torvalds 		goto out;
8571da177e4SLinus Torvalds 
858f50a3ec9SKohei Kaigai 	length = -ENOMEM;
859f50a3ec9SKohei Kaigai 	namebuf = kzalloc(size + 1, GFP_KERNEL);
860f50a3ec9SKohei Kaigai 	if (!namebuf)
861b77a493bSEric Paris 		goto out;
8621da177e4SLinus Torvalds 
863f50a3ec9SKohei Kaigai 	length = -EINVAL;
864f50a3ec9SKohei Kaigai 	nargs = sscanf(buf, "%s %s %hu %s", scon, tcon, &tclass, namebuf);
865f50a3ec9SKohei Kaigai 	if (nargs < 3 || nargs > 4)
866f50a3ec9SKohei Kaigai 		goto out;
8670f7e4c33SKohei Kaigai 	if (nargs == 4) {
8680f7e4c33SKohei Kaigai 		/*
8690f7e4c33SKohei Kaigai 		 * If and when the name of new object to be queried contains
8700f7e4c33SKohei Kaigai 		 * either whitespace or multibyte characters, they shall be
8710f7e4c33SKohei Kaigai 		 * encoded based on the percentage-encoding rule.
8720f7e4c33SKohei Kaigai 		 * If not encoded, the sscanf logic picks up only left-half
8730f7e4c33SKohei Kaigai 		 * of the supplied name; splitted by a whitespace unexpectedly.
8740f7e4c33SKohei Kaigai 		 */
8750f7e4c33SKohei Kaigai 		char   *r, *w;
8760f7e4c33SKohei Kaigai 		int     c1, c2;
8770f7e4c33SKohei Kaigai 
8780f7e4c33SKohei Kaigai 		r = w = namebuf;
8790f7e4c33SKohei Kaigai 		do {
8800f7e4c33SKohei Kaigai 			c1 = *r++;
8810f7e4c33SKohei Kaigai 			if (c1 == '+')
8820f7e4c33SKohei Kaigai 				c1 = ' ';
8830f7e4c33SKohei Kaigai 			else if (c1 == '%') {
884af7ff2c2SAndy Shevchenko 				c1 = hex_to_bin(*r++);
885af7ff2c2SAndy Shevchenko 				if (c1 < 0)
8860f7e4c33SKohei Kaigai 					goto out;
887af7ff2c2SAndy Shevchenko 				c2 = hex_to_bin(*r++);
888af7ff2c2SAndy Shevchenko 				if (c2 < 0)
8890f7e4c33SKohei Kaigai 					goto out;
8900f7e4c33SKohei Kaigai 				c1 = (c1 << 4) | c2;
8910f7e4c33SKohei Kaigai 			}
8920f7e4c33SKohei Kaigai 			*w++ = c1;
8930f7e4c33SKohei Kaigai 		} while (c1 != '\0');
8940f7e4c33SKohei Kaigai 
895f50a3ec9SKohei Kaigai 		objname = namebuf;
8960f7e4c33SKohei Kaigai 	}
897f50a3ec9SKohei Kaigai 
89844be2f65SRasmus Villemoes 	length = security_context_str_to_sid(scon, &ssid, GFP_KERNEL);
899b77a493bSEric Paris 	if (length)
900b77a493bSEric Paris 		goto out;
901b77a493bSEric Paris 
90244be2f65SRasmus Villemoes 	length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL);
903b77a493bSEric Paris 	if (length)
904b77a493bSEric Paris 		goto out;
9051da177e4SLinus Torvalds 
906f50a3ec9SKohei Kaigai 	length = security_transition_sid_user(ssid, tsid, tclass,
907f50a3ec9SKohei Kaigai 					      objname, &newsid);
908b77a493bSEric Paris 	if (length)
909b77a493bSEric Paris 		goto out;
9101da177e4SLinus Torvalds 
9111da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
912b77a493bSEric Paris 	if (length)
913b77a493bSEric Paris 		goto out;
9141da177e4SLinus Torvalds 
915b77a493bSEric Paris 	length = -ERANGE;
9161da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
917744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
918744ba35eSEric Paris 			"payload max\n", __func__, len);
919b77a493bSEric Paris 		goto out;
9201da177e4SLinus Torvalds 	}
9211da177e4SLinus Torvalds 
9221da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
9231da177e4SLinus Torvalds 	length = len;
9241da177e4SLinus Torvalds out:
925b77a493bSEric Paris 	kfree(newcon);
926f50a3ec9SKohei Kaigai 	kfree(namebuf);
927b77a493bSEric Paris 	kfree(tcon);
9281da177e4SLinus Torvalds 	kfree(scon);
9291da177e4SLinus Torvalds 	return length;
9301da177e4SLinus Torvalds }
9311da177e4SLinus Torvalds 
9321da177e4SLinus Torvalds static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size)
9331da177e4SLinus Torvalds {
934b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
9351da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
9361da177e4SLinus Torvalds 	u16 tclass;
9371da177e4SLinus Torvalds 	ssize_t length;
938b77a493bSEric Paris 	char *newcon = NULL;
9391da177e4SLinus Torvalds 	u32 len;
9401da177e4SLinus Torvalds 
9411da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_RELABEL);
9421da177e4SLinus Torvalds 	if (length)
943b77a493bSEric Paris 		goto out;
9441da177e4SLinus Torvalds 
9451da177e4SLinus Torvalds 	length = -ENOMEM;
94689d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
9471da177e4SLinus Torvalds 	if (!scon)
948b77a493bSEric Paris 		goto out;
9491da177e4SLinus Torvalds 
950b77a493bSEric Paris 	length = -ENOMEM;
95189d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
9521da177e4SLinus Torvalds 	if (!tcon)
9531da177e4SLinus Torvalds 		goto out;
9541da177e4SLinus Torvalds 
9551da177e4SLinus Torvalds 	length = -EINVAL;
9561da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
957b77a493bSEric Paris 		goto out;
9581da177e4SLinus Torvalds 
95944be2f65SRasmus Villemoes 	length = security_context_str_to_sid(scon, &ssid, GFP_KERNEL);
960b77a493bSEric Paris 	if (length)
961b77a493bSEric Paris 		goto out;
962b77a493bSEric Paris 
96344be2f65SRasmus Villemoes 	length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL);
964b77a493bSEric Paris 	if (length)
965b77a493bSEric Paris 		goto out;
9661da177e4SLinus Torvalds 
9671da177e4SLinus Torvalds 	length = security_change_sid(ssid, tsid, tclass, &newsid);
968b77a493bSEric Paris 	if (length)
969b77a493bSEric Paris 		goto out;
9701da177e4SLinus Torvalds 
9711da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
972b77a493bSEric Paris 	if (length)
973b77a493bSEric Paris 		goto out;
9741da177e4SLinus Torvalds 
9751da177e4SLinus Torvalds 	length = -ERANGE;
976b77a493bSEric Paris 	if (len > SIMPLE_TRANSACTION_LIMIT)
977b77a493bSEric Paris 		goto out;
9781da177e4SLinus Torvalds 
9791da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
9801da177e4SLinus Torvalds 	length = len;
9811da177e4SLinus Torvalds out:
982b77a493bSEric Paris 	kfree(newcon);
983b77a493bSEric Paris 	kfree(tcon);
9841da177e4SLinus Torvalds 	kfree(scon);
9851da177e4SLinus Torvalds 	return length;
9861da177e4SLinus Torvalds }
9871da177e4SLinus Torvalds 
9881da177e4SLinus Torvalds static ssize_t sel_write_user(struct file *file, char *buf, size_t size)
9891da177e4SLinus Torvalds {
990b77a493bSEric Paris 	char *con = NULL, *user = NULL, *ptr;
991b77a493bSEric Paris 	u32 sid, *sids = NULL;
9921da177e4SLinus Torvalds 	ssize_t length;
9931da177e4SLinus Torvalds 	char *newcon;
9941da177e4SLinus Torvalds 	int i, rc;
9951da177e4SLinus Torvalds 	u32 len, nsids;
9961da177e4SLinus Torvalds 
9971da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_USER);
9981da177e4SLinus Torvalds 	if (length)
9996eab04a8SJustin P. Mattock 		goto out;
10001da177e4SLinus Torvalds 
10011da177e4SLinus Torvalds 	length = -ENOMEM;
100289d155efSJames Morris 	con = kzalloc(size + 1, GFP_KERNEL);
10031da177e4SLinus Torvalds 	if (!con)
10046eab04a8SJustin P. Mattock 		goto out;
10051da177e4SLinus Torvalds 
1006b77a493bSEric Paris 	length = -ENOMEM;
100789d155efSJames Morris 	user = kzalloc(size + 1, GFP_KERNEL);
10081da177e4SLinus Torvalds 	if (!user)
10091da177e4SLinus Torvalds 		goto out;
10101da177e4SLinus Torvalds 
10111da177e4SLinus Torvalds 	length = -EINVAL;
10121da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s", con, user) != 2)
1013b77a493bSEric Paris 		goto out;
10141da177e4SLinus Torvalds 
101544be2f65SRasmus Villemoes 	length = security_context_str_to_sid(con, &sid, GFP_KERNEL);
1016b77a493bSEric Paris 	if (length)
1017b77a493bSEric Paris 		goto out;
10181da177e4SLinus Torvalds 
10191da177e4SLinus Torvalds 	length = security_get_user_sids(sid, user, &sids, &nsids);
1020b77a493bSEric Paris 	if (length)
1021b77a493bSEric Paris 		goto out;
10221da177e4SLinus Torvalds 
10231da177e4SLinus Torvalds 	length = sprintf(buf, "%u", nsids) + 1;
10241da177e4SLinus Torvalds 	ptr = buf + length;
10251da177e4SLinus Torvalds 	for (i = 0; i < nsids; i++) {
10261da177e4SLinus Torvalds 		rc = security_sid_to_context(sids[i], &newcon, &len);
10271da177e4SLinus Torvalds 		if (rc) {
10281da177e4SLinus Torvalds 			length = rc;
1029b77a493bSEric Paris 			goto out;
10301da177e4SLinus Torvalds 		}
10311da177e4SLinus Torvalds 		if ((length + len) >= SIMPLE_TRANSACTION_LIMIT) {
10321da177e4SLinus Torvalds 			kfree(newcon);
10331da177e4SLinus Torvalds 			length = -ERANGE;
1034b77a493bSEric Paris 			goto out;
10351da177e4SLinus Torvalds 		}
10361da177e4SLinus Torvalds 		memcpy(ptr, newcon, len);
10371da177e4SLinus Torvalds 		kfree(newcon);
10381da177e4SLinus Torvalds 		ptr += len;
10391da177e4SLinus Torvalds 		length += len;
10401da177e4SLinus Torvalds 	}
10411da177e4SLinus Torvalds out:
1042b77a493bSEric Paris 	kfree(sids);
1043b77a493bSEric Paris 	kfree(user);
10441da177e4SLinus Torvalds 	kfree(con);
10451da177e4SLinus Torvalds 	return length;
10461da177e4SLinus Torvalds }
10471da177e4SLinus Torvalds 
10481da177e4SLinus Torvalds static ssize_t sel_write_member(struct file *file, char *buf, size_t size)
10491da177e4SLinus Torvalds {
1050b77a493bSEric Paris 	char *scon = NULL, *tcon = NULL;
10511da177e4SLinus Torvalds 	u32 ssid, tsid, newsid;
10521da177e4SLinus Torvalds 	u16 tclass;
10531da177e4SLinus Torvalds 	ssize_t length;
1054b77a493bSEric Paris 	char *newcon = NULL;
10551da177e4SLinus Torvalds 	u32 len;
10561da177e4SLinus Torvalds 
10571da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__COMPUTE_MEMBER);
10581da177e4SLinus Torvalds 	if (length)
1059b77a493bSEric Paris 		goto out;
10601da177e4SLinus Torvalds 
10611da177e4SLinus Torvalds 	length = -ENOMEM;
106289d155efSJames Morris 	scon = kzalloc(size + 1, GFP_KERNEL);
10631da177e4SLinus Torvalds 	if (!scon)
10646eab04a8SJustin P. Mattock 		goto out;
10651da177e4SLinus Torvalds 
1066b77a493bSEric Paris 	length = -ENOMEM;
106789d155efSJames Morris 	tcon = kzalloc(size + 1, GFP_KERNEL);
10681da177e4SLinus Torvalds 	if (!tcon)
10691da177e4SLinus Torvalds 		goto out;
10701da177e4SLinus Torvalds 
10711da177e4SLinus Torvalds 	length = -EINVAL;
10721da177e4SLinus Torvalds 	if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3)
1073b77a493bSEric Paris 		goto out;
10741da177e4SLinus Torvalds 
107544be2f65SRasmus Villemoes 	length = security_context_str_to_sid(scon, &ssid, GFP_KERNEL);
1076b77a493bSEric Paris 	if (length)
1077b77a493bSEric Paris 		goto out;
1078b77a493bSEric Paris 
107944be2f65SRasmus Villemoes 	length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL);
1080b77a493bSEric Paris 	if (length)
1081b77a493bSEric Paris 		goto out;
10821da177e4SLinus Torvalds 
10831da177e4SLinus Torvalds 	length = security_member_sid(ssid, tsid, tclass, &newsid);
1084b77a493bSEric Paris 	if (length)
1085b77a493bSEric Paris 		goto out;
10861da177e4SLinus Torvalds 
10871da177e4SLinus Torvalds 	length = security_sid_to_context(newsid, &newcon, &len);
1088b77a493bSEric Paris 	if (length)
1089b77a493bSEric Paris 		goto out;
10901da177e4SLinus Torvalds 
1091b77a493bSEric Paris 	length = -ERANGE;
10921da177e4SLinus Torvalds 	if (len > SIMPLE_TRANSACTION_LIMIT) {
1093744ba35eSEric Paris 		printk(KERN_ERR "SELinux: %s:  context size (%u) exceeds "
1094744ba35eSEric Paris 			"payload max\n", __func__, len);
1095b77a493bSEric Paris 		goto out;
10961da177e4SLinus Torvalds 	}
10971da177e4SLinus Torvalds 
10981da177e4SLinus Torvalds 	memcpy(buf, newcon, len);
10991da177e4SLinus Torvalds 	length = len;
11001da177e4SLinus Torvalds out:
1101b77a493bSEric Paris 	kfree(newcon);
1102b77a493bSEric Paris 	kfree(tcon);
11031da177e4SLinus Torvalds 	kfree(scon);
11041da177e4SLinus Torvalds 	return length;
11051da177e4SLinus Torvalds }
11061da177e4SLinus Torvalds 
11071da177e4SLinus Torvalds static struct inode *sel_make_inode(struct super_block *sb, int mode)
11081da177e4SLinus Torvalds {
11091da177e4SLinus Torvalds 	struct inode *ret = new_inode(sb);
11101da177e4SLinus Torvalds 
11111da177e4SLinus Torvalds 	if (ret) {
11121da177e4SLinus Torvalds 		ret->i_mode = mode;
11131da177e4SLinus Torvalds 		ret->i_atime = ret->i_mtime = ret->i_ctime = CURRENT_TIME;
11141da177e4SLinus Torvalds 	}
11151da177e4SLinus Torvalds 	return ret;
11161da177e4SLinus Torvalds }
11171da177e4SLinus Torvalds 
11181da177e4SLinus Torvalds static ssize_t sel_read_bool(struct file *filep, char __user *buf,
11191da177e4SLinus Torvalds 			     size_t count, loff_t *ppos)
11201da177e4SLinus Torvalds {
11211da177e4SLinus Torvalds 	char *page = NULL;
11221da177e4SLinus Torvalds 	ssize_t length;
11231da177e4SLinus Torvalds 	ssize_t ret;
11241da177e4SLinus Torvalds 	int cur_enforcing;
1125496ad9aaSAl Viro 	unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK;
1126d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
11271da177e4SLinus Torvalds 
1128bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
11291da177e4SLinus Torvalds 
1130d313f948SStephen Smalley 	ret = -EINVAL;
1131b77a493bSEric Paris 	if (index >= bool_num || strcmp(name, bool_pending_names[index]))
1132d313f948SStephen Smalley 		goto out;
11331da177e4SLinus Torvalds 
11341da177e4SLinus Torvalds 	ret = -ENOMEM;
1135b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1136b77a493bSEric Paris 	if (!page)
11371da177e4SLinus Torvalds 		goto out;
11381da177e4SLinus Torvalds 
1139d313f948SStephen Smalley 	cur_enforcing = security_get_bool_value(index);
11401da177e4SLinus Torvalds 	if (cur_enforcing < 0) {
11411da177e4SLinus Torvalds 		ret = cur_enforcing;
11421da177e4SLinus Torvalds 		goto out;
11431da177e4SLinus Torvalds 	}
11441da177e4SLinus Torvalds 	length = scnprintf(page, PAGE_SIZE, "%d %d", cur_enforcing,
1145d313f948SStephen Smalley 			  bool_pending_values[index]);
114668bdcf28SStephen Smalley 	ret = simple_read_from_buffer(buf, count, ppos, page, length);
11471da177e4SLinus Torvalds out:
1148bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
11491da177e4SLinus Torvalds 	free_page((unsigned long)page);
11501da177e4SLinus Torvalds 	return ret;
11511da177e4SLinus Torvalds }
11521da177e4SLinus Torvalds 
11531da177e4SLinus Torvalds static ssize_t sel_write_bool(struct file *filep, const char __user *buf,
11541da177e4SLinus Torvalds 			      size_t count, loff_t *ppos)
11551da177e4SLinus Torvalds {
11561da177e4SLinus Torvalds 	char *page = NULL;
1157d313f948SStephen Smalley 	ssize_t length;
11581da177e4SLinus Torvalds 	int new_value;
1159496ad9aaSAl Viro 	unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK;
1160d313f948SStephen Smalley 	const char *name = filep->f_path.dentry->d_name.name;
11611da177e4SLinus Torvalds 
1162bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
11631da177e4SLinus Torvalds 
11641da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
11651da177e4SLinus Torvalds 	if (length)
11661da177e4SLinus Torvalds 		goto out;
11671da177e4SLinus Torvalds 
1168d313f948SStephen Smalley 	length = -EINVAL;
1169b77a493bSEric Paris 	if (index >= bool_num || strcmp(name, bool_pending_names[index]))
1170d313f948SStephen Smalley 		goto out;
1171d313f948SStephen Smalley 
11721da177e4SLinus Torvalds 	length = -ENOMEM;
1173b77a493bSEric Paris 	if (count >= PAGE_SIZE)
11741da177e4SLinus Torvalds 		goto out;
1175d313f948SStephen Smalley 
11761da177e4SLinus Torvalds 	/* No partial writes. */
1177d313f948SStephen Smalley 	length = -EINVAL;
1178b77a493bSEric Paris 	if (*ppos != 0)
11791da177e4SLinus Torvalds 		goto out;
1180b77a493bSEric Paris 
11811da177e4SLinus Torvalds 	length = -ENOMEM;
1182b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1183b77a493bSEric Paris 	if (!page)
11841da177e4SLinus Torvalds 		goto out;
11851da177e4SLinus Torvalds 
1186d313f948SStephen Smalley 	length = -EFAULT;
11871da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
11881da177e4SLinus Torvalds 		goto out;
11891da177e4SLinus Torvalds 
11901da177e4SLinus Torvalds 	length = -EINVAL;
11911da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
11921da177e4SLinus Torvalds 		goto out;
11931da177e4SLinus Torvalds 
11941da177e4SLinus Torvalds 	if (new_value)
11951da177e4SLinus Torvalds 		new_value = 1;
11961da177e4SLinus Torvalds 
1197d313f948SStephen Smalley 	bool_pending_values[index] = new_value;
11981da177e4SLinus Torvalds 	length = count;
11991da177e4SLinus Torvalds 
12001da177e4SLinus Torvalds out:
1201bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
12021da177e4SLinus Torvalds 	free_page((unsigned long) page);
12031da177e4SLinus Torvalds 	return length;
12041da177e4SLinus Torvalds }
12051da177e4SLinus Torvalds 
12069c2e08c5SArjan van de Ven static const struct file_operations sel_bool_ops = {
12071da177e4SLinus Torvalds 	.read		= sel_read_bool,
12081da177e4SLinus Torvalds 	.write		= sel_write_bool,
120957a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
12101da177e4SLinus Torvalds };
12111da177e4SLinus Torvalds 
12121da177e4SLinus Torvalds static ssize_t sel_commit_bools_write(struct file *filep,
12131da177e4SLinus Torvalds 				      const char __user *buf,
12141da177e4SLinus Torvalds 				      size_t count, loff_t *ppos)
12151da177e4SLinus Torvalds {
12161da177e4SLinus Torvalds 	char *page = NULL;
1217d313f948SStephen Smalley 	ssize_t length;
12181da177e4SLinus Torvalds 	int new_value;
12191da177e4SLinus Torvalds 
1220bb003079SIngo Molnar 	mutex_lock(&sel_mutex);
12211da177e4SLinus Torvalds 
12221da177e4SLinus Torvalds 	length = task_has_security(current, SECURITY__SETBOOL);
12231da177e4SLinus Torvalds 	if (length)
12241da177e4SLinus Torvalds 		goto out;
12251da177e4SLinus Torvalds 
12261da177e4SLinus Torvalds 	length = -ENOMEM;
1227b77a493bSEric Paris 	if (count >= PAGE_SIZE)
12281da177e4SLinus Torvalds 		goto out;
1229b77a493bSEric Paris 
12301da177e4SLinus Torvalds 	/* No partial writes. */
1231b77a493bSEric Paris 	length = -EINVAL;
1232b77a493bSEric Paris 	if (*ppos != 0)
12331da177e4SLinus Torvalds 		goto out;
1234b77a493bSEric Paris 
12351da177e4SLinus Torvalds 	length = -ENOMEM;
1236b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1237b77a493bSEric Paris 	if (!page)
12381da177e4SLinus Torvalds 		goto out;
12391da177e4SLinus Torvalds 
1240d313f948SStephen Smalley 	length = -EFAULT;
12411da177e4SLinus Torvalds 	if (copy_from_user(page, buf, count))
12421da177e4SLinus Torvalds 		goto out;
12431da177e4SLinus Torvalds 
12441da177e4SLinus Torvalds 	length = -EINVAL;
12451da177e4SLinus Torvalds 	if (sscanf(page, "%d", &new_value) != 1)
12461da177e4SLinus Torvalds 		goto out;
12471da177e4SLinus Torvalds 
1248b77a493bSEric Paris 	length = 0;
12491872981bSEric Paris 	if (new_value && bool_pending_values)
1250b77a493bSEric Paris 		length = security_set_bools(bool_num, bool_pending_values);
12511da177e4SLinus Torvalds 
1252b77a493bSEric Paris 	if (!length)
12531da177e4SLinus Torvalds 		length = count;
12541da177e4SLinus Torvalds 
12551da177e4SLinus Torvalds out:
1256bb003079SIngo Molnar 	mutex_unlock(&sel_mutex);
12571da177e4SLinus Torvalds 	free_page((unsigned long) page);
12581da177e4SLinus Torvalds 	return length;
12591da177e4SLinus Torvalds }
12601da177e4SLinus Torvalds 
12619c2e08c5SArjan van de Ven static const struct file_operations sel_commit_bools_ops = {
12621da177e4SLinus Torvalds 	.write		= sel_commit_bools_write,
126357a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
12641da177e4SLinus Torvalds };
12651da177e4SLinus Torvalds 
12660c92d7c7SChristopher J. PeBenito static void sel_remove_entries(struct dentry *de)
12671da177e4SLinus Torvalds {
1268ad52184bSAl Viro 	d_genocide(de);
1269ad52184bSAl Viro 	shrink_dcache_parent(de);
12701da177e4SLinus Torvalds }
12711da177e4SLinus Torvalds 
12721da177e4SLinus Torvalds #define BOOL_DIR_NAME "booleans"
12731da177e4SLinus Torvalds 
12741da177e4SLinus Torvalds static int sel_make_bools(void)
12751da177e4SLinus Torvalds {
1276b77a493bSEric Paris 	int i, ret;
12771da177e4SLinus Torvalds 	ssize_t len;
12781da177e4SLinus Torvalds 	struct dentry *dentry = NULL;
12791da177e4SLinus Torvalds 	struct dentry *dir = bool_dir;
12801da177e4SLinus Torvalds 	struct inode *inode = NULL;
12811da177e4SLinus Torvalds 	struct inode_security_struct *isec;
12821da177e4SLinus Torvalds 	char **names = NULL, *page;
12831da177e4SLinus Torvalds 	int num;
12841da177e4SLinus Torvalds 	int *values = NULL;
12851da177e4SLinus Torvalds 	u32 sid;
12861da177e4SLinus Torvalds 
12871da177e4SLinus Torvalds 	/* remove any existing files */
12888007f102SXiaotian Feng 	for (i = 0; i < bool_num; i++)
12898007f102SXiaotian Feng 		kfree(bool_pending_names[i]);
1290d313f948SStephen Smalley 	kfree(bool_pending_names);
12911da177e4SLinus Torvalds 	kfree(bool_pending_values);
1292154c50caSEric Paris 	bool_num = 0;
1293d313f948SStephen Smalley 	bool_pending_names = NULL;
129420c19e41SDavi Arnaut 	bool_pending_values = NULL;
12951da177e4SLinus Torvalds 
12960c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
12971da177e4SLinus Torvalds 
1298b77a493bSEric Paris 	ret = -ENOMEM;
12991872981bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
13001872981bSEric Paris 	if (!page)
1301b77a493bSEric Paris 		goto out;
13021da177e4SLinus Torvalds 
13031da177e4SLinus Torvalds 	ret = security_get_bools(&num, &names, &values);
1304b77a493bSEric Paris 	if (ret)
13051da177e4SLinus Torvalds 		goto out;
13061da177e4SLinus Torvalds 
13071da177e4SLinus Torvalds 	for (i = 0; i < num; i++) {
1308b77a493bSEric Paris 		ret = -ENOMEM;
13091da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, names[i]);
1310b77a493bSEric Paris 		if (!dentry)
1311b77a493bSEric Paris 			goto out;
13121da177e4SLinus Torvalds 
1313b77a493bSEric Paris 		ret = -ENOMEM;
1314b77a493bSEric Paris 		inode = sel_make_inode(dir->d_sb, S_IFREG | S_IRUGO | S_IWUSR);
1315b77a493bSEric Paris 		if (!inode)
1316b77a493bSEric Paris 			goto out;
1317b77a493bSEric Paris 
13181da177e4SLinus Torvalds 		ret = -ENAMETOOLONG;
1319cc1dad71SAl Viro 		len = snprintf(page, PAGE_SIZE, "/%s/%s", BOOL_DIR_NAME, names[i]);
1320b77a493bSEric Paris 		if (len >= PAGE_SIZE)
1321b77a493bSEric Paris 			goto out;
1322b77a493bSEric Paris 
13231da177e4SLinus Torvalds 		isec = (struct inode_security_struct *)inode->i_security;
13241872981bSEric Paris 		ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid);
13251872981bSEric Paris 		if (ret)
1326b77a493bSEric Paris 			goto out;
1327b77a493bSEric Paris 
13281da177e4SLinus Torvalds 		isec->sid = sid;
13291da177e4SLinus Torvalds 		isec->initialized = 1;
13301da177e4SLinus Torvalds 		inode->i_fop = &sel_bool_ops;
1331bce34bc0SJames Carter 		inode->i_ino = i|SEL_BOOL_INO_OFFSET;
13321da177e4SLinus Torvalds 		d_add(dentry, inode);
13331da177e4SLinus Torvalds 	}
13341da177e4SLinus Torvalds 	bool_num = num;
1335d313f948SStephen Smalley 	bool_pending_names = names;
13361da177e4SLinus Torvalds 	bool_pending_values = values;
1337b77a493bSEric Paris 
1338b77a493bSEric Paris 	free_page((unsigned long)page);
1339b77a493bSEric Paris 	return 0;
13401da177e4SLinus Torvalds out:
13411da177e4SLinus Torvalds 	free_page((unsigned long)page);
1342b77a493bSEric Paris 
13431da177e4SLinus Torvalds 	if (names) {
13449a5f04bfSJesper Juhl 		for (i = 0; i < num; i++)
13451da177e4SLinus Torvalds 			kfree(names[i]);
13461da177e4SLinus Torvalds 		kfree(names);
13471da177e4SLinus Torvalds 	}
134820c19e41SDavi Arnaut 	kfree(values);
13490c92d7c7SChristopher J. PeBenito 	sel_remove_entries(dir);
1350b77a493bSEric Paris 
1351b77a493bSEric Paris 	return ret;
13521da177e4SLinus Torvalds }
13531da177e4SLinus Torvalds 
13541da177e4SLinus Torvalds #define NULL_FILE_NAME "null"
13551da177e4SLinus Torvalds 
1356765927b2SAl Viro struct path selinux_null;
13571da177e4SLinus Torvalds 
13581da177e4SLinus Torvalds static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf,
13591da177e4SLinus Torvalds 					    size_t count, loff_t *ppos)
13601da177e4SLinus Torvalds {
13611da177e4SLinus Torvalds 	char tmpbuf[TMPBUFLEN];
13621da177e4SLinus Torvalds 	ssize_t length;
13631da177e4SLinus Torvalds 
13641da177e4SLinus Torvalds 	length = scnprintf(tmpbuf, TMPBUFLEN, "%u", avc_cache_threshold);
13651da177e4SLinus Torvalds 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
13661da177e4SLinus Torvalds }
13671da177e4SLinus Torvalds 
13681da177e4SLinus Torvalds static ssize_t sel_write_avc_cache_threshold(struct file *file,
13691da177e4SLinus Torvalds 					     const char __user *buf,
13701da177e4SLinus Torvalds 					     size_t count, loff_t *ppos)
13711da177e4SLinus Torvalds 
13721da177e4SLinus Torvalds {
1373b77a493bSEric Paris 	char *page = NULL;
13741da177e4SLinus Torvalds 	ssize_t ret;
13751da177e4SLinus Torvalds 	int new_value;
13761da177e4SLinus Torvalds 
13771da177e4SLinus Torvalds 	ret = task_has_security(current, SECURITY__SETSECPARAM);
13781da177e4SLinus Torvalds 	if (ret)
1379b77a493bSEric Paris 		goto out;
1380b77a493bSEric Paris 
1381b77a493bSEric Paris 	ret = -ENOMEM;
1382b77a493bSEric Paris 	if (count >= PAGE_SIZE)
1383b77a493bSEric Paris 		goto out;
1384b77a493bSEric Paris 
1385b77a493bSEric Paris 	/* No partial writes. */
1386b77a493bSEric Paris 	ret = -EINVAL;
1387b77a493bSEric Paris 	if (*ppos != 0)
1388b77a493bSEric Paris 		goto out;
1389b77a493bSEric Paris 
1390b77a493bSEric Paris 	ret = -ENOMEM;
1391b77a493bSEric Paris 	page = (char *)get_zeroed_page(GFP_KERNEL);
1392b77a493bSEric Paris 	if (!page)
1393b77a493bSEric Paris 		goto out;
1394b77a493bSEric Paris 
1395b77a493bSEric Paris 	ret = -EFAULT;
1396b77a493bSEric Paris 	if (copy_from_user(page, buf, count))
1397b77a493bSEric Paris 		goto out;
1398b77a493bSEric Paris 
1399b77a493bSEric Paris 	ret = -EINVAL;
1400b77a493bSEric Paris 	if (sscanf(page, "%u", &new_value) != 1)
1401b77a493bSEric Paris 		goto out;
1402b77a493bSEric Paris 
14031da177e4SLinus Torvalds 	avc_cache_threshold = new_value;
1404b77a493bSEric Paris 
14051da177e4SLinus Torvalds 	ret = count;
14061da177e4SLinus Torvalds out:
1407b77a493bSEric Paris 	free_page((unsigned long)page);
14081da177e4SLinus Torvalds 	return ret;
14091da177e4SLinus Torvalds }
14101da177e4SLinus Torvalds 
14111da177e4SLinus Torvalds static ssize_t sel_read_avc_hash_stats(struct file *filp, char __user *buf,
14121da177e4SLinus Torvalds 				       size_t count, loff_t *ppos)
14131da177e4SLinus Torvalds {
14141da177e4SLinus Torvalds 	char *page;
1415b77a493bSEric Paris 	ssize_t length;
14161da177e4SLinus Torvalds 
14171da177e4SLinus Torvalds 	page = (char *)__get_free_page(GFP_KERNEL);
1418b77a493bSEric Paris 	if (!page)
1419b77a493bSEric Paris 		return -ENOMEM;
1420b77a493bSEric Paris 
1421b77a493bSEric Paris 	length = avc_get_hash_stats(page);
1422b77a493bSEric Paris 	if (length >= 0)
1423b77a493bSEric Paris 		length = simple_read_from_buffer(buf, count, ppos, page, length);
14241da177e4SLinus Torvalds 	free_page((unsigned long)page);
1425b77a493bSEric Paris 
1426b77a493bSEric Paris 	return length;
14271da177e4SLinus Torvalds }
14281da177e4SLinus Torvalds 
14299c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_threshold_ops = {
14301da177e4SLinus Torvalds 	.read		= sel_read_avc_cache_threshold,
14311da177e4SLinus Torvalds 	.write		= sel_write_avc_cache_threshold,
143257a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
14331da177e4SLinus Torvalds };
14341da177e4SLinus Torvalds 
14359c2e08c5SArjan van de Ven static const struct file_operations sel_avc_hash_stats_ops = {
14361da177e4SLinus Torvalds 	.read		= sel_read_avc_hash_stats,
143757a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
14381da177e4SLinus Torvalds };
14391da177e4SLinus Torvalds 
14401da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
14411da177e4SLinus Torvalds static struct avc_cache_stats *sel_avc_get_stat_idx(loff_t *idx)
14421da177e4SLinus Torvalds {
14431da177e4SLinus Torvalds 	int cpu;
14441da177e4SLinus Torvalds 
14454f4b6c1aSRusty Russell 	for (cpu = *idx; cpu < nr_cpu_ids; ++cpu) {
14461da177e4SLinus Torvalds 		if (!cpu_possible(cpu))
14471da177e4SLinus Torvalds 			continue;
14481da177e4SLinus Torvalds 		*idx = cpu + 1;
14491da177e4SLinus Torvalds 		return &per_cpu(avc_cache_stats, cpu);
14501da177e4SLinus Torvalds 	}
14511da177e4SLinus Torvalds 	return NULL;
14521da177e4SLinus Torvalds }
14531da177e4SLinus Torvalds 
14541da177e4SLinus Torvalds static void *sel_avc_stats_seq_start(struct seq_file *seq, loff_t *pos)
14551da177e4SLinus Torvalds {
14561da177e4SLinus Torvalds 	loff_t n = *pos - 1;
14571da177e4SLinus Torvalds 
14581da177e4SLinus Torvalds 	if (*pos == 0)
14591da177e4SLinus Torvalds 		return SEQ_START_TOKEN;
14601da177e4SLinus Torvalds 
14611da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(&n);
14621da177e4SLinus Torvalds }
14631da177e4SLinus Torvalds 
14641da177e4SLinus Torvalds static void *sel_avc_stats_seq_next(struct seq_file *seq, void *v, loff_t *pos)
14651da177e4SLinus Torvalds {
14661da177e4SLinus Torvalds 	return sel_avc_get_stat_idx(pos);
14671da177e4SLinus Torvalds }
14681da177e4SLinus Torvalds 
14691da177e4SLinus Torvalds static int sel_avc_stats_seq_show(struct seq_file *seq, void *v)
14701da177e4SLinus Torvalds {
14711da177e4SLinus Torvalds 	struct avc_cache_stats *st = v;
14721da177e4SLinus Torvalds 
14731da177e4SLinus Torvalds 	if (v == SEQ_START_TOKEN)
14741da177e4SLinus Torvalds 		seq_printf(seq, "lookups hits misses allocations reclaims "
14751da177e4SLinus Torvalds 			   "frees\n");
1476257313b2SLinus Torvalds 	else {
1477257313b2SLinus Torvalds 		unsigned int lookups = st->lookups;
1478257313b2SLinus Torvalds 		unsigned int misses = st->misses;
1479257313b2SLinus Torvalds 		unsigned int hits = lookups - misses;
1480257313b2SLinus Torvalds 		seq_printf(seq, "%u %u %u %u %u %u\n", lookups,
1481257313b2SLinus Torvalds 			   hits, misses, st->allocations,
14821da177e4SLinus Torvalds 			   st->reclaims, st->frees);
1483257313b2SLinus Torvalds 	}
14841da177e4SLinus Torvalds 	return 0;
14851da177e4SLinus Torvalds }
14861da177e4SLinus Torvalds 
14871da177e4SLinus Torvalds static void sel_avc_stats_seq_stop(struct seq_file *seq, void *v)
14881da177e4SLinus Torvalds { }
14891da177e4SLinus Torvalds 
14901996a109SJan Engelhardt static const struct seq_operations sel_avc_cache_stats_seq_ops = {
14911da177e4SLinus Torvalds 	.start		= sel_avc_stats_seq_start,
14921da177e4SLinus Torvalds 	.next		= sel_avc_stats_seq_next,
14931da177e4SLinus Torvalds 	.show		= sel_avc_stats_seq_show,
14941da177e4SLinus Torvalds 	.stop		= sel_avc_stats_seq_stop,
14951da177e4SLinus Torvalds };
14961da177e4SLinus Torvalds 
14971da177e4SLinus Torvalds static int sel_open_avc_cache_stats(struct inode *inode, struct file *file)
14981da177e4SLinus Torvalds {
14991da177e4SLinus Torvalds 	return seq_open(file, &sel_avc_cache_stats_seq_ops);
15001da177e4SLinus Torvalds }
15011da177e4SLinus Torvalds 
15029c2e08c5SArjan van de Ven static const struct file_operations sel_avc_cache_stats_ops = {
15031da177e4SLinus Torvalds 	.open		= sel_open_avc_cache_stats,
15041da177e4SLinus Torvalds 	.read		= seq_read,
15051da177e4SLinus Torvalds 	.llseek		= seq_lseek,
15061da177e4SLinus Torvalds 	.release	= seq_release,
15071da177e4SLinus Torvalds };
15081da177e4SLinus Torvalds #endif
15091da177e4SLinus Torvalds 
15101da177e4SLinus Torvalds static int sel_make_avc_files(struct dentry *dir)
15111da177e4SLinus Torvalds {
1512b77a493bSEric Paris 	int i;
15131da177e4SLinus Torvalds 	static struct tree_descr files[] = {
15141da177e4SLinus Torvalds 		{ "cache_threshold",
15151da177e4SLinus Torvalds 		  &sel_avc_cache_threshold_ops, S_IRUGO|S_IWUSR },
15161da177e4SLinus Torvalds 		{ "hash_stats", &sel_avc_hash_stats_ops, S_IRUGO },
15171da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_AVC_STATS
15181da177e4SLinus Torvalds 		{ "cache_stats", &sel_avc_cache_stats_ops, S_IRUGO },
15191da177e4SLinus Torvalds #endif
15201da177e4SLinus Torvalds 	};
15211da177e4SLinus Torvalds 
15226e20a64aSNicolas Kaiser 	for (i = 0; i < ARRAY_SIZE(files); i++) {
15231da177e4SLinus Torvalds 		struct inode *inode;
15241da177e4SLinus Torvalds 		struct dentry *dentry;
15251da177e4SLinus Torvalds 
15261da177e4SLinus Torvalds 		dentry = d_alloc_name(dir, files[i].name);
1527b77a493bSEric Paris 		if (!dentry)
1528b77a493bSEric Paris 			return -ENOMEM;
15291da177e4SLinus Torvalds 
15301da177e4SLinus Torvalds 		inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode);
1531b77a493bSEric Paris 		if (!inode)
1532b77a493bSEric Paris 			return -ENOMEM;
1533b77a493bSEric Paris 
15341da177e4SLinus Torvalds 		inode->i_fop = files[i].ops;
15356174eafcSJames Carter 		inode->i_ino = ++sel_last_ino;
15361da177e4SLinus Torvalds 		d_add(dentry, inode);
15371da177e4SLinus Torvalds 	}
1538b77a493bSEric Paris 
1539b77a493bSEric Paris 	return 0;
15401da177e4SLinus Torvalds }
15411da177e4SLinus Torvalds 
1542f0ee2e46SJames Carter static ssize_t sel_read_initcon(struct file *file, char __user *buf,
1543f0ee2e46SJames Carter 				size_t count, loff_t *ppos)
1544f0ee2e46SJames Carter {
1545f0ee2e46SJames Carter 	char *con;
1546f0ee2e46SJames Carter 	u32 sid, len;
1547f0ee2e46SJames Carter 	ssize_t ret;
1548f0ee2e46SJames Carter 
1549496ad9aaSAl Viro 	sid = file_inode(file)->i_ino&SEL_INO_MASK;
1550f0ee2e46SJames Carter 	ret = security_sid_to_context(sid, &con, &len);
1551b77a493bSEric Paris 	if (ret)
1552f0ee2e46SJames Carter 		return ret;
1553f0ee2e46SJames Carter 
1554f0ee2e46SJames Carter 	ret = simple_read_from_buffer(buf, count, ppos, con, len);
1555f0ee2e46SJames Carter 	kfree(con);
1556f0ee2e46SJames Carter 	return ret;
1557f0ee2e46SJames Carter }
1558f0ee2e46SJames Carter 
1559f0ee2e46SJames Carter static const struct file_operations sel_initcon_ops = {
1560f0ee2e46SJames Carter 	.read		= sel_read_initcon,
156157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1562f0ee2e46SJames Carter };
1563f0ee2e46SJames Carter 
1564f0ee2e46SJames Carter static int sel_make_initcon_files(struct dentry *dir)
1565f0ee2e46SJames Carter {
1566b77a493bSEric Paris 	int i;
1567f0ee2e46SJames Carter 
1568f0ee2e46SJames Carter 	for (i = 1; i <= SECINITSID_NUM; i++) {
1569f0ee2e46SJames Carter 		struct inode *inode;
1570f0ee2e46SJames Carter 		struct dentry *dentry;
1571f0ee2e46SJames Carter 		dentry = d_alloc_name(dir, security_get_initial_sid_context(i));
1572b77a493bSEric Paris 		if (!dentry)
1573b77a493bSEric Paris 			return -ENOMEM;
1574f0ee2e46SJames Carter 
1575f0ee2e46SJames Carter 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1576b77a493bSEric Paris 		if (!inode)
1577b77a493bSEric Paris 			return -ENOMEM;
1578b77a493bSEric Paris 
1579f0ee2e46SJames Carter 		inode->i_fop = &sel_initcon_ops;
1580f0ee2e46SJames Carter 		inode->i_ino = i|SEL_INITCON_INO_OFFSET;
1581f0ee2e46SJames Carter 		d_add(dentry, inode);
1582f0ee2e46SJames Carter 	}
1583b77a493bSEric Paris 
1584b77a493bSEric Paris 	return 0;
1585f0ee2e46SJames Carter }
1586f0ee2e46SJames Carter 
1587e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_class_to_ino(u16 class)
1588e47c8fc5SChristopher J. PeBenito {
1589e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1)) | SEL_CLASS_INO_OFFSET;
1590e47c8fc5SChristopher J. PeBenito }
1591e47c8fc5SChristopher J. PeBenito 
1592e47c8fc5SChristopher J. PeBenito static inline u16 sel_ino_to_class(unsigned long ino)
1593e47c8fc5SChristopher J. PeBenito {
159492ae9e82SEric Paris 	return (ino & SEL_INO_MASK) / (SEL_VEC_MAX + 1);
1595e47c8fc5SChristopher J. PeBenito }
1596e47c8fc5SChristopher J. PeBenito 
1597e47c8fc5SChristopher J. PeBenito static inline unsigned long sel_perm_to_ino(u16 class, u32 perm)
1598e47c8fc5SChristopher J. PeBenito {
1599e47c8fc5SChristopher J. PeBenito 	return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET;
1600e47c8fc5SChristopher J. PeBenito }
1601e47c8fc5SChristopher J. PeBenito 
1602e47c8fc5SChristopher J. PeBenito static inline u32 sel_ino_to_perm(unsigned long ino)
1603e47c8fc5SChristopher J. PeBenito {
1604e47c8fc5SChristopher J. PeBenito 	return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1);
1605e47c8fc5SChristopher J. PeBenito }
1606e47c8fc5SChristopher J. PeBenito 
1607e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_class(struct file *file, char __user *buf,
1608e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1609e47c8fc5SChristopher J. PeBenito {
1610496ad9aaSAl Viro 	unsigned long ino = file_inode(file)->i_ino;
1611cc1dad71SAl Viro 	char res[TMPBUFLEN];
1612cc1dad71SAl Viro 	ssize_t len = snprintf(res, sizeof(res), "%d", sel_ino_to_class(ino));
1613cc1dad71SAl Viro 	return simple_read_from_buffer(buf, count, ppos, res, len);
1614e47c8fc5SChristopher J. PeBenito }
1615e47c8fc5SChristopher J. PeBenito 
1616e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_class_ops = {
1617e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_class,
161857a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1619e47c8fc5SChristopher J. PeBenito };
1620e47c8fc5SChristopher J. PeBenito 
1621e47c8fc5SChristopher J. PeBenito static ssize_t sel_read_perm(struct file *file, char __user *buf,
1622e47c8fc5SChristopher J. PeBenito 				size_t count, loff_t *ppos)
1623e47c8fc5SChristopher J. PeBenito {
1624496ad9aaSAl Viro 	unsigned long ino = file_inode(file)->i_ino;
1625cc1dad71SAl Viro 	char res[TMPBUFLEN];
1626cc1dad71SAl Viro 	ssize_t len = snprintf(res, sizeof(res), "%d", sel_ino_to_perm(ino));
1627cc1dad71SAl Viro 	return simple_read_from_buffer(buf, count, ppos, res, len);
1628e47c8fc5SChristopher J. PeBenito }
1629e47c8fc5SChristopher J. PeBenito 
1630e47c8fc5SChristopher J. PeBenito static const struct file_operations sel_perm_ops = {
1631e47c8fc5SChristopher J. PeBenito 	.read		= sel_read_perm,
163257a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
1633e47c8fc5SChristopher J. PeBenito };
1634e47c8fc5SChristopher J. PeBenito 
16353bb56b25SPaul Moore static ssize_t sel_read_policycap(struct file *file, char __user *buf,
16363bb56b25SPaul Moore 				  size_t count, loff_t *ppos)
16373bb56b25SPaul Moore {
16383bb56b25SPaul Moore 	int value;
16393bb56b25SPaul Moore 	char tmpbuf[TMPBUFLEN];
16403bb56b25SPaul Moore 	ssize_t length;
1641496ad9aaSAl Viro 	unsigned long i_ino = file_inode(file)->i_ino;
16423bb56b25SPaul Moore 
16433bb56b25SPaul Moore 	value = security_policycap_supported(i_ino & SEL_INO_MASK);
16443bb56b25SPaul Moore 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
16453bb56b25SPaul Moore 
16463bb56b25SPaul Moore 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
16473bb56b25SPaul Moore }
16483bb56b25SPaul Moore 
16493bb56b25SPaul Moore static const struct file_operations sel_policycap_ops = {
16503bb56b25SPaul Moore 	.read		= sel_read_policycap,
165157a62c23SArnd Bergmann 	.llseek		= generic_file_llseek,
16523bb56b25SPaul Moore };
16533bb56b25SPaul Moore 
1654e47c8fc5SChristopher J. PeBenito static int sel_make_perm_files(char *objclass, int classvalue,
1655e47c8fc5SChristopher J. PeBenito 				struct dentry *dir)
1656e47c8fc5SChristopher J. PeBenito {
1657b77a493bSEric Paris 	int i, rc, nperms;
1658e47c8fc5SChristopher J. PeBenito 	char **perms;
1659e47c8fc5SChristopher J. PeBenito 
1660e47c8fc5SChristopher J. PeBenito 	rc = security_get_permissions(objclass, &perms, &nperms);
1661e47c8fc5SChristopher J. PeBenito 	if (rc)
1662b77a493bSEric Paris 		return rc;
1663e47c8fc5SChristopher J. PeBenito 
1664e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++) {
1665e47c8fc5SChristopher J. PeBenito 		struct inode *inode;
1666e47c8fc5SChristopher J. PeBenito 		struct dentry *dentry;
1667e47c8fc5SChristopher J. PeBenito 
1668b77a493bSEric Paris 		rc = -ENOMEM;
1669e47c8fc5SChristopher J. PeBenito 		dentry = d_alloc_name(dir, perms[i]);
1670b77a493bSEric Paris 		if (!dentry)
1671b77a493bSEric Paris 			goto out;
1672e47c8fc5SChristopher J. PeBenito 
1673e47c8fc5SChristopher J. PeBenito 		rc = -ENOMEM;
1674b77a493bSEric Paris 		inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1675b77a493bSEric Paris 		if (!inode)
1676b77a493bSEric Paris 			goto out;
1677b77a493bSEric Paris 
1678e47c8fc5SChristopher J. PeBenito 		inode->i_fop = &sel_perm_ops;
1679e47c8fc5SChristopher J. PeBenito 		/* i+1 since perm values are 1-indexed */
1680e47c8fc5SChristopher J. PeBenito 		inode->i_ino = sel_perm_to_ino(classvalue, i + 1);
1681e47c8fc5SChristopher J. PeBenito 		d_add(dentry, inode);
1682e47c8fc5SChristopher J. PeBenito 	}
1683b77a493bSEric Paris 	rc = 0;
1684b77a493bSEric Paris out:
1685e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nperms; i++)
1686e47c8fc5SChristopher J. PeBenito 		kfree(perms[i]);
1687e47c8fc5SChristopher J. PeBenito 	kfree(perms);
1688e47c8fc5SChristopher J. PeBenito 	return rc;
1689e47c8fc5SChristopher J. PeBenito }
1690e47c8fc5SChristopher J. PeBenito 
1691e47c8fc5SChristopher J. PeBenito static int sel_make_class_dir_entries(char *classname, int index,
1692e47c8fc5SChristopher J. PeBenito 					struct dentry *dir)
1693e47c8fc5SChristopher J. PeBenito {
1694e47c8fc5SChristopher J. PeBenito 	struct dentry *dentry = NULL;
1695e47c8fc5SChristopher J. PeBenito 	struct inode *inode = NULL;
1696e47c8fc5SChristopher J. PeBenito 	int rc;
1697e47c8fc5SChristopher J. PeBenito 
1698e47c8fc5SChristopher J. PeBenito 	dentry = d_alloc_name(dir, "index");
1699b77a493bSEric Paris 	if (!dentry)
1700b77a493bSEric Paris 		return -ENOMEM;
1701e47c8fc5SChristopher J. PeBenito 
1702e47c8fc5SChristopher J. PeBenito 	inode = sel_make_inode(dir->d_sb, S_IFREG|S_IRUGO);
1703b77a493bSEric Paris 	if (!inode)
1704b77a493bSEric Paris 		return -ENOMEM;
1705e47c8fc5SChristopher J. PeBenito 
1706e47c8fc5SChristopher J. PeBenito 	inode->i_fop = &sel_class_ops;
1707e47c8fc5SChristopher J. PeBenito 	inode->i_ino = sel_class_to_ino(index);
1708e47c8fc5SChristopher J. PeBenito 	d_add(dentry, inode);
1709e47c8fc5SChristopher J. PeBenito 
1710a1c2aa1eSAl Viro 	dentry = sel_make_dir(dir, "perms", &last_class_ino);
1711a1c2aa1eSAl Viro 	if (IS_ERR(dentry))
1712a1c2aa1eSAl Viro 		return PTR_ERR(dentry);
1713e47c8fc5SChristopher J. PeBenito 
1714e47c8fc5SChristopher J. PeBenito 	rc = sel_make_perm_files(classname, index, dentry);
1715e47c8fc5SChristopher J. PeBenito 
1716e47c8fc5SChristopher J. PeBenito 	return rc;
1717e47c8fc5SChristopher J. PeBenito }
1718e47c8fc5SChristopher J. PeBenito 
1719e47c8fc5SChristopher J. PeBenito static int sel_make_classes(void)
1720e47c8fc5SChristopher J. PeBenito {
1721b77a493bSEric Paris 	int rc, nclasses, i;
1722e47c8fc5SChristopher J. PeBenito 	char **classes;
1723e47c8fc5SChristopher J. PeBenito 
1724e47c8fc5SChristopher J. PeBenito 	/* delete any existing entries */
1725ad52184bSAl Viro 	sel_remove_entries(class_dir);
1726e47c8fc5SChristopher J. PeBenito 
1727e47c8fc5SChristopher J. PeBenito 	rc = security_get_classes(&classes, &nclasses);
1728b77a493bSEric Paris 	if (rc)
1729b77a493bSEric Paris 		return rc;
1730e47c8fc5SChristopher J. PeBenito 
1731e47c8fc5SChristopher J. PeBenito 	/* +2 since classes are 1-indexed */
1732e47c8fc5SChristopher J. PeBenito 	last_class_ino = sel_class_to_ino(nclasses + 2);
1733e47c8fc5SChristopher J. PeBenito 
1734e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++) {
1735e47c8fc5SChristopher J. PeBenito 		struct dentry *class_name_dir;
1736e47c8fc5SChristopher J. PeBenito 
1737a1c2aa1eSAl Viro 		class_name_dir = sel_make_dir(class_dir, classes[i],
1738e47c8fc5SChristopher J. PeBenito 				&last_class_ino);
1739a1c2aa1eSAl Viro 		if (IS_ERR(class_name_dir)) {
1740a1c2aa1eSAl Viro 			rc = PTR_ERR(class_name_dir);
1741b77a493bSEric Paris 			goto out;
1742a1c2aa1eSAl Viro 		}
1743e47c8fc5SChristopher J. PeBenito 
1744e47c8fc5SChristopher J. PeBenito 		/* i+1 since class values are 1-indexed */
1745e47c8fc5SChristopher J. PeBenito 		rc = sel_make_class_dir_entries(classes[i], i + 1,
1746e47c8fc5SChristopher J. PeBenito 				class_name_dir);
1747e47c8fc5SChristopher J. PeBenito 		if (rc)
1748b77a493bSEric Paris 			goto out;
1749e47c8fc5SChristopher J. PeBenito 	}
1750b77a493bSEric Paris 	rc = 0;
1751b77a493bSEric Paris out:
1752e47c8fc5SChristopher J. PeBenito 	for (i = 0; i < nclasses; i++)
1753e47c8fc5SChristopher J. PeBenito 		kfree(classes[i]);
1754e47c8fc5SChristopher J. PeBenito 	kfree(classes);
1755e47c8fc5SChristopher J. PeBenito 	return rc;
1756e47c8fc5SChristopher J. PeBenito }
1757e47c8fc5SChristopher J. PeBenito 
17583bb56b25SPaul Moore static int sel_make_policycap(void)
17593bb56b25SPaul Moore {
17603bb56b25SPaul Moore 	unsigned int iter;
17613bb56b25SPaul Moore 	struct dentry *dentry = NULL;
17623bb56b25SPaul Moore 	struct inode *inode = NULL;
17633bb56b25SPaul Moore 
17643bb56b25SPaul Moore 	sel_remove_entries(policycap_dir);
17653bb56b25SPaul Moore 
17663bb56b25SPaul Moore 	for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
17673bb56b25SPaul Moore 		if (iter < ARRAY_SIZE(policycap_names))
17683bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir,
17693bb56b25SPaul Moore 					      policycap_names[iter]);
17703bb56b25SPaul Moore 		else
17713bb56b25SPaul Moore 			dentry = d_alloc_name(policycap_dir, "unknown");
17723bb56b25SPaul Moore 
17733bb56b25SPaul Moore 		if (dentry == NULL)
17743bb56b25SPaul Moore 			return -ENOMEM;
17753bb56b25SPaul Moore 
17763bb56b25SPaul Moore 		inode = sel_make_inode(policycap_dir->d_sb, S_IFREG | S_IRUGO);
17773bb56b25SPaul Moore 		if (inode == NULL)
17783bb56b25SPaul Moore 			return -ENOMEM;
17793bb56b25SPaul Moore 
17803bb56b25SPaul Moore 		inode->i_fop = &sel_policycap_ops;
17813bb56b25SPaul Moore 		inode->i_ino = iter | SEL_POLICYCAP_INO_OFFSET;
17823bb56b25SPaul Moore 		d_add(dentry, inode);
17833bb56b25SPaul Moore 	}
17843bb56b25SPaul Moore 
17853bb56b25SPaul Moore 	return 0;
17863bb56b25SPaul Moore }
17873bb56b25SPaul Moore 
1788a1c2aa1eSAl Viro static struct dentry *sel_make_dir(struct dentry *dir, const char *name,
17890dd4ae51SChristopher J. PeBenito 			unsigned long *ino)
17901da177e4SLinus Torvalds {
1791a1c2aa1eSAl Viro 	struct dentry *dentry = d_alloc_name(dir, name);
17921da177e4SLinus Torvalds 	struct inode *inode;
17931da177e4SLinus Torvalds 
1794a1c2aa1eSAl Viro 	if (!dentry)
1795a1c2aa1eSAl Viro 		return ERR_PTR(-ENOMEM);
1796a1c2aa1eSAl Viro 
1797a1c2aa1eSAl Viro 	inode = sel_make_inode(dir->d_sb, S_IFDIR | S_IRUGO | S_IXUGO);
1798a1c2aa1eSAl Viro 	if (!inode) {
1799a1c2aa1eSAl Viro 		dput(dentry);
1800a1c2aa1eSAl Viro 		return ERR_PTR(-ENOMEM);
1801a1c2aa1eSAl Viro 	}
1802b77a493bSEric Paris 
18031da177e4SLinus Torvalds 	inode->i_op = &simple_dir_inode_operations;
18041da177e4SLinus Torvalds 	inode->i_fop = &simple_dir_operations;
18050dd4ae51SChristopher J. PeBenito 	inode->i_ino = ++(*ino);
180640e906f8SJames Morris 	/* directory inodes start off with i_nlink == 2 (for "." entry) */
1807d8c76e6fSDave Hansen 	inc_nlink(inode);
18081da177e4SLinus Torvalds 	d_add(dentry, inode);
1809edb20fb5SJames Morris 	/* bump link count on parent directory, too */
1810ce0b16ddSDavid Howells 	inc_nlink(d_inode(dir));
1811b77a493bSEric Paris 
1812a1c2aa1eSAl Viro 	return dentry;
18131da177e4SLinus Torvalds }
18141da177e4SLinus Torvalds 
18151da177e4SLinus Torvalds static int sel_fill_super(struct super_block *sb, void *data, int silent)
18161da177e4SLinus Torvalds {
18171da177e4SLinus Torvalds 	int ret;
18181da177e4SLinus Torvalds 	struct dentry *dentry;
1819a1c2aa1eSAl Viro 	struct inode *inode;
18201da177e4SLinus Torvalds 	struct inode_security_struct *isec;
18211da177e4SLinus Torvalds 
18221da177e4SLinus Torvalds 	static struct tree_descr selinux_files[] = {
18231da177e4SLinus Torvalds 		[SEL_LOAD] = {"load", &sel_load_ops, S_IRUSR|S_IWUSR},
18241da177e4SLinus Torvalds 		[SEL_ENFORCE] = {"enforce", &sel_enforce_ops, S_IRUGO|S_IWUSR},
1825ce9982d0SStephen Smalley 		[SEL_CONTEXT] = {"context", &transaction_ops, S_IRUGO|S_IWUGO},
18261da177e4SLinus Torvalds 		[SEL_ACCESS] = {"access", &transaction_ops, S_IRUGO|S_IWUGO},
18271da177e4SLinus Torvalds 		[SEL_CREATE] = {"create", &transaction_ops, S_IRUGO|S_IWUGO},
18281da177e4SLinus Torvalds 		[SEL_RELABEL] = {"relabel", &transaction_ops, S_IRUGO|S_IWUGO},
18291da177e4SLinus Torvalds 		[SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
18301da177e4SLinus Torvalds 		[SEL_POLICYVERS] = {"policyvers", &sel_policyvers_ops, S_IRUGO},
18311da177e4SLinus Torvalds 		[SEL_COMMIT_BOOLS] = {"commit_pending_bools", &sel_commit_bools_ops, S_IWUSR},
18321da177e4SLinus Torvalds 		[SEL_MLS] = {"mls", &sel_mls_ops, S_IRUGO},
18331da177e4SLinus Torvalds 		[SEL_DISABLE] = {"disable", &sel_disable_ops, S_IWUSR},
18341da177e4SLinus Torvalds 		[SEL_MEMBER] = {"member", &transaction_ops, S_IRUGO|S_IWUGO},
18351da177e4SLinus Torvalds 		[SEL_CHECKREQPROT] = {"checkreqprot", &sel_checkreqprot_ops, S_IRUGO|S_IWUSR},
18363f12070eSEric Paris 		[SEL_REJECT_UNKNOWN] = {"reject_unknown", &sel_handle_unknown_ops, S_IRUGO},
18373f12070eSEric Paris 		[SEL_DENY_UNKNOWN] = {"deny_unknown", &sel_handle_unknown_ops, S_IRUGO},
183811904167SKaiGai Kohei 		[SEL_STATUS] = {"status", &sel_handle_status_ops, S_IRUGO},
183972e8c859SEric Paris 		[SEL_POLICY] = {"policy", &sel_policy_ops, S_IRUGO},
1840f9df6458SAndrew Perepechko 		[SEL_VALIDATE_TRANS] = {"validatetrans", &sel_transition_ops,
1841f9df6458SAndrew Perepechko 					S_IWUGO},
18421da177e4SLinus Torvalds 		/* last one */ {""}
18431da177e4SLinus Torvalds 	};
18441da177e4SLinus Torvalds 	ret = simple_fill_super(sb, SELINUX_MAGIC, selinux_files);
18451da177e4SLinus Torvalds 	if (ret)
1846161ce45aSJames Morris 		goto err;
18471da177e4SLinus Torvalds 
1848a1c2aa1eSAl Viro 	bool_dir = sel_make_dir(sb->s_root, BOOL_DIR_NAME, &sel_last_ino);
1849a1c2aa1eSAl Viro 	if (IS_ERR(bool_dir)) {
1850a1c2aa1eSAl Viro 		ret = PTR_ERR(bool_dir);
1851a1c2aa1eSAl Viro 		bool_dir = NULL;
1852161ce45aSJames Morris 		goto err;
1853a1c2aa1eSAl Viro 	}
18541da177e4SLinus Torvalds 
1855b77a493bSEric Paris 	ret = -ENOMEM;
18561da177e4SLinus Torvalds 	dentry = d_alloc_name(sb->s_root, NULL_FILE_NAME);
1857b77a493bSEric Paris 	if (!dentry)
1858161ce45aSJames Morris 		goto err;
18591da177e4SLinus Torvalds 
1860161ce45aSJames Morris 	ret = -ENOMEM;
1861b77a493bSEric Paris 	inode = sel_make_inode(sb, S_IFCHR | S_IRUGO | S_IWUGO);
1862b77a493bSEric Paris 	if (!inode)
1863161ce45aSJames Morris 		goto err;
1864b77a493bSEric Paris 
18656174eafcSJames Carter 	inode->i_ino = ++sel_last_ino;
18661da177e4SLinus Torvalds 	isec = (struct inode_security_struct *)inode->i_security;
18671da177e4SLinus Torvalds 	isec->sid = SECINITSID_DEVNULL;
18681da177e4SLinus Torvalds 	isec->sclass = SECCLASS_CHR_FILE;
18691da177e4SLinus Torvalds 	isec->initialized = 1;
18701da177e4SLinus Torvalds 
18711da177e4SLinus Torvalds 	init_special_inode(inode, S_IFCHR | S_IRUGO | S_IWUGO, MKDEV(MEM_MAJOR, 3));
18721da177e4SLinus Torvalds 	d_add(dentry, inode);
1873765927b2SAl Viro 	selinux_null.dentry = dentry;
18741da177e4SLinus Torvalds 
1875a1c2aa1eSAl Viro 	dentry = sel_make_dir(sb->s_root, "avc", &sel_last_ino);
1876a1c2aa1eSAl Viro 	if (IS_ERR(dentry)) {
1877a1c2aa1eSAl Viro 		ret = PTR_ERR(dentry);
1878161ce45aSJames Morris 		goto err;
1879a1c2aa1eSAl Viro 	}
18801da177e4SLinus Torvalds 
18811da177e4SLinus Torvalds 	ret = sel_make_avc_files(dentry);
18821da177e4SLinus Torvalds 	if (ret)
1883161ce45aSJames Morris 		goto err;
1884f0ee2e46SJames Carter 
1885a1c2aa1eSAl Viro 	dentry = sel_make_dir(sb->s_root, "initial_contexts", &sel_last_ino);
1886a1c2aa1eSAl Viro 	if (IS_ERR(dentry)) {
1887a1c2aa1eSAl Viro 		ret = PTR_ERR(dentry);
1888f0ee2e46SJames Carter 		goto err;
1889a1c2aa1eSAl Viro 	}
1890f0ee2e46SJames Carter 
1891f0ee2e46SJames Carter 	ret = sel_make_initcon_files(dentry);
1892f0ee2e46SJames Carter 	if (ret)
1893f0ee2e46SJames Carter 		goto err;
1894f0ee2e46SJames Carter 
1895a1c2aa1eSAl Viro 	class_dir = sel_make_dir(sb->s_root, "class", &sel_last_ino);
1896a1c2aa1eSAl Viro 	if (IS_ERR(class_dir)) {
1897a1c2aa1eSAl Viro 		ret = PTR_ERR(class_dir);
1898a1c2aa1eSAl Viro 		class_dir = NULL;
1899e47c8fc5SChristopher J. PeBenito 		goto err;
1900a1c2aa1eSAl Viro 	}
1901e47c8fc5SChristopher J. PeBenito 
1902a1c2aa1eSAl Viro 	policycap_dir = sel_make_dir(sb->s_root, "policy_capabilities", &sel_last_ino);
1903a1c2aa1eSAl Viro 	if (IS_ERR(policycap_dir)) {
1904a1c2aa1eSAl Viro 		ret = PTR_ERR(policycap_dir);
1905a1c2aa1eSAl Viro 		policycap_dir = NULL;
1906e47c8fc5SChristopher J. PeBenito 		goto err;
1907a1c2aa1eSAl Viro 	}
1908b77a493bSEric Paris 	return 0;
1909161ce45aSJames Morris err:
1910744ba35eSEric Paris 	printk(KERN_ERR "SELinux: %s:  failed while creating inodes\n",
1911744ba35eSEric Paris 		__func__);
1912b77a493bSEric Paris 	return ret;
19131da177e4SLinus Torvalds }
19141da177e4SLinus Torvalds 
1915fc14f2feSAl Viro static struct dentry *sel_mount(struct file_system_type *fs_type,
1916fc14f2feSAl Viro 		      int flags, const char *dev_name, void *data)
19171da177e4SLinus Torvalds {
1918fc14f2feSAl Viro 	return mount_single(fs_type, flags, data, sel_fill_super);
19191da177e4SLinus Torvalds }
19201da177e4SLinus Torvalds 
19211da177e4SLinus Torvalds static struct file_system_type sel_fs_type = {
19221da177e4SLinus Torvalds 	.name		= "selinuxfs",
1923fc14f2feSAl Viro 	.mount		= sel_mount,
19241da177e4SLinus Torvalds 	.kill_sb	= kill_litter_super,
19251da177e4SLinus Torvalds };
19261da177e4SLinus Torvalds 
19271da177e4SLinus Torvalds struct vfsmount *selinuxfs_mount;
19281da177e4SLinus Torvalds 
19291da177e4SLinus Torvalds static int __init init_sel_fs(void)
19301da177e4SLinus Torvalds {
19311da177e4SLinus Torvalds 	int err;
19321da177e4SLinus Torvalds 
19331da177e4SLinus Torvalds 	if (!selinux_enabled)
19341da177e4SLinus Torvalds 		return 0;
19357a627e3bSGreg Kroah-Hartman 
1936f9bb4882SEric W. Biederman 	err = sysfs_create_mount_point(fs_kobj, "selinux");
1937f9bb4882SEric W. Biederman 	if (err)
1938f9bb4882SEric W. Biederman 		return err;
19397a627e3bSGreg Kroah-Hartman 
19401da177e4SLinus Torvalds 	err = register_filesystem(&sel_fs_type);
19417a627e3bSGreg Kroah-Hartman 	if (err) {
1942f9bb4882SEric W. Biederman 		sysfs_remove_mount_point(fs_kobj, "selinux");
1943b77a493bSEric Paris 		return err;
19447a627e3bSGreg Kroah-Hartman 	}
1945b77a493bSEric Paris 
1946765927b2SAl Viro 	selinux_null.mnt = selinuxfs_mount = kern_mount(&sel_fs_type);
19471da177e4SLinus Torvalds 	if (IS_ERR(selinuxfs_mount)) {
19481da177e4SLinus Torvalds 		printk(KERN_ERR "selinuxfs:  could not mount!\n");
19491da177e4SLinus Torvalds 		err = PTR_ERR(selinuxfs_mount);
19501da177e4SLinus Torvalds 		selinuxfs_mount = NULL;
19511da177e4SLinus Torvalds 	}
1952b77a493bSEric Paris 
19531da177e4SLinus Torvalds 	return err;
19541da177e4SLinus Torvalds }
19551da177e4SLinus Torvalds 
19561da177e4SLinus Torvalds __initcall(init_sel_fs);
19571da177e4SLinus Torvalds 
19581da177e4SLinus Torvalds #ifdef CONFIG_SECURITY_SELINUX_DISABLE
19591da177e4SLinus Torvalds void exit_sel_fs(void)
19601da177e4SLinus Torvalds {
1961f9bb4882SEric W. Biederman 	sysfs_remove_mount_point(fs_kobj, "selinux");
1962423e0ab0STim Chen 	kern_unmount(selinuxfs_mount);
19631da177e4SLinus Torvalds 	unregister_filesystem(&sel_fs_type);
19641da177e4SLinus Torvalds }
19651da177e4SLinus Torvalds #endif
1966