| .. | .. | 
|---|
| 13 | 13 | #include <linux/dcache.h> | 
|---|
| 14 | 14 | #include <linux/magic.h> | 
|---|
| 15 | 15 | #include <linux/types.h> | 
|---|
|  | 16 | +#include <linux/rcupdate.h> | 
|---|
| 16 | 17 | #include <linux/refcount.h> | 
|---|
| 17 | 18 | #include <linux/workqueue.h> | 
|---|
| 18 | 19 | #include "flask.h" | 
|---|
|  | 20 | +#include "policycap.h" | 
|---|
| 19 | 21 |  | 
|---|
| 20 | 22 | #define SECSID_NULL			0x00000000 /* unspecified SID */ | 
|---|
| 21 | 23 | #define SECSID_WILD			0xffffffff /* wildcard SID */ | 
|---|
| .. | .. | 
|---|
| 40 | 42 | #define POLICYDB_VERSION_CONSTRAINT_NAMES	29 | 
|---|
| 41 | 43 | #define POLICYDB_VERSION_XPERMS_IOCTL	30 | 
|---|
| 42 | 44 | #define POLICYDB_VERSION_INFINIBAND		31 | 
|---|
|  | 45 | +#define POLICYDB_VERSION_GLBLUB		32 | 
|---|
|  | 46 | +#define POLICYDB_VERSION_COMP_FTRANS	33 /* compressed filename transitions */ | 
|---|
| 43 | 47 |  | 
|---|
| 44 | 48 | /* Range of policy versions we understand*/ | 
|---|
| 45 | 49 | #define POLICYDB_VERSION_MIN   POLICYDB_VERSION_BASE | 
|---|
| 46 |  | -#define POLICYDB_VERSION_MAX   POLICYDB_VERSION_INFINIBAND | 
|---|
|  | 50 | +#define POLICYDB_VERSION_MAX   POLICYDB_VERSION_COMP_FTRANS | 
|---|
| 47 | 51 |  | 
|---|
| 48 | 52 | /* Mask for just the mount related flags */ | 
|---|
| 49 | 53 | #define SE_MNTMASK	0x0f | 
|---|
| .. | .. | 
|---|
| 58 | 62 | #define SE_SBINITIALIZED	0x0100 | 
|---|
| 59 | 63 | #define SE_SBPROC		0x0200 | 
|---|
| 60 | 64 | #define SE_SBGENFS		0x0400 | 
|---|
|  | 65 | +#define SE_SBGENFS_XATTR	0x0800 | 
|---|
| 61 | 66 |  | 
|---|
| 62 |  | -#define CONTEXT_STR	"context=" | 
|---|
| 63 |  | -#define FSCONTEXT_STR	"fscontext=" | 
|---|
| 64 |  | -#define ROOTCONTEXT_STR	"rootcontext=" | 
|---|
| 65 |  | -#define DEFCONTEXT_STR	"defcontext=" | 
|---|
| 66 |  | -#define LABELSUPP_STR "seclabel" | 
|---|
|  | 67 | +#define CONTEXT_STR	"context" | 
|---|
|  | 68 | +#define FSCONTEXT_STR	"fscontext" | 
|---|
|  | 69 | +#define ROOTCONTEXT_STR	"rootcontext" | 
|---|
|  | 70 | +#define DEFCONTEXT_STR	"defcontext" | 
|---|
|  | 71 | +#define SECLABEL_STR "seclabel" | 
|---|
| 67 | 72 |  | 
|---|
| 68 | 73 | struct netlbl_lsm_secattr; | 
|---|
| 69 | 74 |  | 
|---|
| 70 |  | -extern int selinux_enabled; | 
|---|
| 71 |  | - | 
|---|
| 72 |  | -/* Policy capabilities */ | 
|---|
| 73 |  | -enum { | 
|---|
| 74 |  | -	POLICYDB_CAPABILITY_NETPEER, | 
|---|
| 75 |  | -	POLICYDB_CAPABILITY_OPENPERM, | 
|---|
| 76 |  | -	POLICYDB_CAPABILITY_EXTSOCKCLASS, | 
|---|
| 77 |  | -	POLICYDB_CAPABILITY_ALWAYSNETWORK, | 
|---|
| 78 |  | -	POLICYDB_CAPABILITY_CGROUPSECLABEL, | 
|---|
| 79 |  | -	POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION, | 
|---|
| 80 |  | -	__POLICYDB_CAPABILITY_MAX | 
|---|
| 81 |  | -}; | 
|---|
| 82 |  | -#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1) | 
|---|
| 83 |  | - | 
|---|
| 84 |  | -extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX]; | 
|---|
|  | 75 | +extern int selinux_enabled_boot; | 
|---|
| 85 | 76 |  | 
|---|
| 86 | 77 | /* | 
|---|
| 87 | 78 | * type_datum properties | 
|---|
| .. | .. | 
|---|
| 94 | 85 | #define POLICYDB_BOUNDS_MAXDEPTH	4 | 
|---|
| 95 | 86 |  | 
|---|
| 96 | 87 | struct selinux_avc; | 
|---|
| 97 |  | -struct selinux_ss; | 
|---|
|  | 88 | +struct selinux_policy; | 
|---|
| 98 | 89 |  | 
|---|
| 99 | 90 | struct selinux_state { | 
|---|
|  | 91 | +#ifdef CONFIG_SECURITY_SELINUX_DISABLE | 
|---|
| 100 | 92 | bool disabled; | 
|---|
|  | 93 | +#endif | 
|---|
| 101 | 94 | #ifdef CONFIG_SECURITY_SELINUX_DEVELOP | 
|---|
| 102 | 95 | bool enforcing; | 
|---|
| 103 | 96 | #endif | 
|---|
| .. | .. | 
|---|
| 107 | 100 | bool android_netlink_route; | 
|---|
| 108 | 101 | bool android_netlink_getneigh; | 
|---|
| 109 | 102 |  | 
|---|
| 110 |  | -	struct selinux_avc *avc; | 
|---|
| 111 |  | -	struct selinux_ss *ss; | 
|---|
| 112 |  | -}; | 
|---|
|  | 103 | +	struct page *status_page; | 
|---|
|  | 104 | +	struct mutex status_lock; | 
|---|
| 113 | 105 |  | 
|---|
| 114 |  | -void selinux_ss_init(struct selinux_ss **ss); | 
|---|
|  | 106 | +	struct selinux_avc *avc; | 
|---|
|  | 107 | +	struct selinux_policy __rcu *policy; | 
|---|
|  | 108 | +	struct mutex policy_mutex; | 
|---|
|  | 109 | +} __randomize_layout; | 
|---|
|  | 110 | + | 
|---|
| 115 | 111 | void selinux_avc_init(struct selinux_avc **avc); | 
|---|
| 116 | 112 |  | 
|---|
| 117 | 113 | extern struct selinux_state selinux_state; | 
|---|
| 118 | 114 |  | 
|---|
|  | 115 | +static inline bool selinux_initialized(const struct selinux_state *state) | 
|---|
|  | 116 | +{ | 
|---|
|  | 117 | +	/* do a synchronized load to avoid race conditions */ | 
|---|
|  | 118 | +	return smp_load_acquire(&state->initialized); | 
|---|
|  | 119 | +} | 
|---|
|  | 120 | + | 
|---|
|  | 121 | +static inline void selinux_mark_initialized(struct selinux_state *state) | 
|---|
|  | 122 | +{ | 
|---|
|  | 123 | +	/* do a synchronized write to avoid race conditions */ | 
|---|
|  | 124 | +	smp_store_release(&state->initialized, true); | 
|---|
|  | 125 | +} | 
|---|
|  | 126 | + | 
|---|
| 119 | 127 | #ifdef CONFIG_SECURITY_SELINUX_DEVELOP | 
|---|
| 120 | 128 | static inline bool enforcing_enabled(struct selinux_state *state) | 
|---|
| 121 | 129 | { | 
|---|
| 122 |  | -	return state->enforcing; | 
|---|
|  | 130 | +	return READ_ONCE(state->enforcing); | 
|---|
| 123 | 131 | } | 
|---|
| 124 | 132 |  | 
|---|
| 125 | 133 | static inline void enforcing_set(struct selinux_state *state, bool value) | 
|---|
| 126 | 134 | { | 
|---|
| 127 |  | -	state->enforcing = value; | 
|---|
|  | 135 | +	WRITE_ONCE(state->enforcing, value); | 
|---|
| 128 | 136 | } | 
|---|
| 129 | 137 | #else | 
|---|
| 130 | 138 | static inline bool enforcing_enabled(struct selinux_state *state) | 
|---|
| .. | .. | 
|---|
| 137 | 145 | } | 
|---|
| 138 | 146 | #endif | 
|---|
| 139 | 147 |  | 
|---|
|  | 148 | +static inline bool checkreqprot_get(const struct selinux_state *state) | 
|---|
|  | 149 | +{ | 
|---|
|  | 150 | +	return READ_ONCE(state->checkreqprot); | 
|---|
|  | 151 | +} | 
|---|
|  | 152 | + | 
|---|
|  | 153 | +static inline void checkreqprot_set(struct selinux_state *state, bool value) | 
|---|
|  | 154 | +{ | 
|---|
|  | 155 | +	WRITE_ONCE(state->checkreqprot, value); | 
|---|
|  | 156 | +} | 
|---|
|  | 157 | + | 
|---|
|  | 158 | +#ifdef CONFIG_SECURITY_SELINUX_DISABLE | 
|---|
|  | 159 | +static inline bool selinux_disabled(struct selinux_state *state) | 
|---|
|  | 160 | +{ | 
|---|
|  | 161 | +	return READ_ONCE(state->disabled); | 
|---|
|  | 162 | +} | 
|---|
|  | 163 | + | 
|---|
|  | 164 | +static inline void selinux_mark_disabled(struct selinux_state *state) | 
|---|
|  | 165 | +{ | 
|---|
|  | 166 | +	WRITE_ONCE(state->disabled, true); | 
|---|
|  | 167 | +} | 
|---|
|  | 168 | +#else | 
|---|
|  | 169 | +static inline bool selinux_disabled(struct selinux_state *state) | 
|---|
|  | 170 | +{ | 
|---|
|  | 171 | +	return false; | 
|---|
|  | 172 | +} | 
|---|
|  | 173 | +#endif | 
|---|
|  | 174 | + | 
|---|
| 140 | 175 | static inline bool selinux_policycap_netpeer(void) | 
|---|
| 141 | 176 | { | 
|---|
| 142 | 177 | struct selinux_state *state = &selinux_state; | 
|---|
| 143 | 178 |  | 
|---|
| 144 |  | -	return state->policycap[POLICYDB_CAPABILITY_NETPEER]; | 
|---|
|  | 179 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NETPEER]); | 
|---|
| 145 | 180 | } | 
|---|
| 146 | 181 |  | 
|---|
| 147 | 182 | static inline bool selinux_policycap_openperm(void) | 
|---|
| 148 | 183 | { | 
|---|
| 149 | 184 | struct selinux_state *state = &selinux_state; | 
|---|
| 150 | 185 |  | 
|---|
| 151 |  | -	return state->policycap[POLICYDB_CAPABILITY_OPENPERM]; | 
|---|
|  | 186 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_OPENPERM]); | 
|---|
| 152 | 187 | } | 
|---|
| 153 | 188 |  | 
|---|
| 154 | 189 | static inline bool selinux_policycap_extsockclass(void) | 
|---|
| 155 | 190 | { | 
|---|
| 156 | 191 | struct selinux_state *state = &selinux_state; | 
|---|
| 157 | 192 |  | 
|---|
| 158 |  | -	return state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS]; | 
|---|
|  | 193 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS]); | 
|---|
| 159 | 194 | } | 
|---|
| 160 | 195 |  | 
|---|
| 161 | 196 | static inline bool selinux_policycap_alwaysnetwork(void) | 
|---|
| 162 | 197 | { | 
|---|
| 163 | 198 | struct selinux_state *state = &selinux_state; | 
|---|
| 164 | 199 |  | 
|---|
| 165 |  | -	return state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK]; | 
|---|
|  | 200 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK]); | 
|---|
| 166 | 201 | } | 
|---|
| 167 | 202 |  | 
|---|
| 168 | 203 | static inline bool selinux_policycap_cgroupseclabel(void) | 
|---|
| 169 | 204 | { | 
|---|
| 170 | 205 | struct selinux_state *state = &selinux_state; | 
|---|
| 171 | 206 |  | 
|---|
| 172 |  | -	return state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL]; | 
|---|
|  | 207 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL]); | 
|---|
| 173 | 208 | } | 
|---|
| 174 | 209 |  | 
|---|
| 175 | 210 | static inline bool selinux_policycap_nnp_nosuid_transition(void) | 
|---|
| 176 | 211 | { | 
|---|
| 177 | 212 | struct selinux_state *state = &selinux_state; | 
|---|
| 178 | 213 |  | 
|---|
| 179 |  | -	return state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION]; | 
|---|
|  | 214 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION]); | 
|---|
|  | 215 | +} | 
|---|
|  | 216 | + | 
|---|
|  | 217 | +static inline bool selinux_policycap_genfs_seclabel_symlinks(void) | 
|---|
|  | 218 | +{ | 
|---|
|  | 219 | +	struct selinux_state *state = &selinux_state; | 
|---|
|  | 220 | + | 
|---|
|  | 221 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS]); | 
|---|
|  | 222 | +} | 
|---|
|  | 223 | + | 
|---|
|  | 224 | +static inline bool selinux_policycap_ioctl_skip_cloexec(void) | 
|---|
|  | 225 | +{ | 
|---|
|  | 226 | +	struct selinux_state *state = &selinux_state; | 
|---|
|  | 227 | + | 
|---|
|  | 228 | +	return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC]); | 
|---|
| 180 | 229 | } | 
|---|
| 181 | 230 |  | 
|---|
| 182 | 231 | static inline bool selinux_android_nlroute_getlink(void) | 
|---|
| .. | .. | 
|---|
| 193 | 242 | return state->android_netlink_getneigh; | 
|---|
| 194 | 243 | } | 
|---|
| 195 | 244 |  | 
|---|
|  | 245 | +struct selinux_policy_convert_data; | 
|---|
|  | 246 | + | 
|---|
|  | 247 | +struct selinux_load_state { | 
|---|
|  | 248 | +	struct selinux_policy *policy; | 
|---|
|  | 249 | +	struct selinux_policy_convert_data *convert_data; | 
|---|
|  | 250 | +}; | 
|---|
|  | 251 | + | 
|---|
| 196 | 252 | int security_mls_enabled(struct selinux_state *state); | 
|---|
| 197 | 253 | int security_load_policy(struct selinux_state *state, | 
|---|
| 198 |  | -			 void *data, size_t len); | 
|---|
|  | 254 | +			 void *data, size_t len, | 
|---|
|  | 255 | +			 struct selinux_load_state *load_state); | 
|---|
|  | 256 | +void selinux_policy_commit(struct selinux_state *state, | 
|---|
|  | 257 | +			   struct selinux_load_state *load_state); | 
|---|
|  | 258 | +void selinux_policy_cancel(struct selinux_state *state, | 
|---|
|  | 259 | +			   struct selinux_load_state *load_state); | 
|---|
| 199 | 260 | int security_read_policy(struct selinux_state *state, | 
|---|
| 200 | 261 | void **data, size_t *len); | 
|---|
| 201 |  | -size_t security_policydb_len(struct selinux_state *state); | 
|---|
| 202 | 262 |  | 
|---|
| 203 | 263 | int security_policycap_supported(struct selinux_state *state, | 
|---|
| 204 | 264 | unsigned int req_cap); | 
|---|
| .. | .. | 
|---|
| 272 | 332 | int security_sid_to_context_force(struct selinux_state *state, | 
|---|
| 273 | 333 | u32 sid, char **scontext, u32 *scontext_len); | 
|---|
| 274 | 334 |  | 
|---|
|  | 335 | +int security_sid_to_context_inval(struct selinux_state *state, | 
|---|
|  | 336 | +				  u32 sid, char **scontext, u32 *scontext_len); | 
|---|
|  | 337 | + | 
|---|
| 275 | 338 | int security_context_to_sid(struct selinux_state *state, | 
|---|
| 276 | 339 | const char *scontext, u32 scontext_len, | 
|---|
| 277 | 340 | u32 *out_sid, gfp_t gfp); | 
|---|
| .. | .. | 
|---|
| 326 | 389 | u32 xfrm_sid, | 
|---|
| 327 | 390 | u32 *peer_sid); | 
|---|
| 328 | 391 |  | 
|---|
| 329 |  | -int security_get_classes(struct selinux_state *state, | 
|---|
|  | 392 | +int security_get_classes(struct selinux_policy *policy, | 
|---|
| 330 | 393 | char ***classes, int *nclasses); | 
|---|
| 331 |  | -int security_get_permissions(struct selinux_state *state, | 
|---|
|  | 394 | +int security_get_permissions(struct selinux_policy *policy, | 
|---|
| 332 | 395 | char *class, char ***perms, int *nperms); | 
|---|
| 333 | 396 | int security_get_reject_unknown(struct selinux_state *state); | 
|---|
| 334 | 397 | int security_get_allow_unknown(struct selinux_state *state); | 
|---|
| .. | .. | 
|---|
| 345 | 408 | int security_fs_use(struct selinux_state *state, struct super_block *sb); | 
|---|
| 346 | 409 |  | 
|---|
| 347 | 410 | int security_genfs_sid(struct selinux_state *state, | 
|---|
|  | 411 | +		       const char *fstype, char *name, u16 sclass, | 
|---|
|  | 412 | +		       u32 *sid); | 
|---|
|  | 413 | + | 
|---|
|  | 414 | +int selinux_policy_genfs_sid(struct selinux_policy *policy, | 
|---|
| 348 | 415 | const char *fstype, char *name, u16 sclass, | 
|---|
| 349 | 416 | u32 *sid); | 
|---|
| 350 | 417 |  | 
|---|
| .. | .. | 
|---|
| 407 | 474 | extern void avtab_cache_init(void); | 
|---|
| 408 | 475 | extern void ebitmap_cache_init(void); | 
|---|
| 409 | 476 | extern void hashtab_cache_init(void); | 
|---|
| 410 |  | -extern void selinux_nlmsg_init(void); | 
|---|
| 411 | 477 | extern int security_sidtab_hash_stats(struct selinux_state *state, char *page); | 
|---|
|  | 478 | +extern void selinux_nlmsg_init(void); | 
|---|
| 412 | 479 |  | 
|---|
| 413 | 480 | #endif /* _SELINUX_SECURITY_H_ */ | 
|---|