• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Implementation of the policy database.
4  *
5  * Author : Stephen Smalley, <sds@tycho.nsa.gov>
6  */
7 
8 /*
9  * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
10  *
11  *	Support for enhanced MLS infrastructure.
12  *
13  * Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>
14  *
15  *	Added conditional policy language extensions
16  *
17  * Updated: Hewlett-Packard <paul@paul-moore.com>
18  *
19  *      Added support for the policy capability bitmap
20  *
21  * Update: Mellanox Techonologies
22  *
23  *	Added Infiniband support
24  *
25  * Copyright (C) 2016 Mellanox Techonologies
26  * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
27  * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
28  * Copyright (C) 2003 - 2004 Tresys Technology, LLC
29  */
30 
31 #include <linux/kernel.h>
32 #include <linux/sched.h>
33 #include <linux/slab.h>
34 #include <linux/string.h>
35 #include <linux/errno.h>
36 #include <linux/audit.h>
37 #include "security.h"
38 
39 #include "policydb.h"
40 #include "conditional.h"
41 #include "mls.h"
42 #include "services.h"
43 
44 #define _DEBUG_HASHES
45 
46 #ifdef DEBUG_HASHES
47 static const char *symtab_name[SYM_NUM] = {
48 	"common prefixes",
49 	"classes",
50 	"roles",
51 	"types",
52 	"users",
53 	"bools",
54 	"levels",
55 	"categories",
56 };
57 #endif
58 
59 struct policydb_compat_info {
60 	int version;
61 	int sym_num;
62 	int ocon_num;
63 };
64 
65 /* These need to be updated if SYM_NUM or OCON_NUM changes */
66 static struct policydb_compat_info policydb_compat[] = {
67 	{
68 		.version	= POLICYDB_VERSION_BASE,
69 		.sym_num	= SYM_NUM - 3,
70 		.ocon_num	= OCON_NUM - 3,
71 	},
72 	{
73 		.version	= POLICYDB_VERSION_BOOL,
74 		.sym_num	= SYM_NUM - 2,
75 		.ocon_num	= OCON_NUM - 3,
76 	},
77 	{
78 		.version	= POLICYDB_VERSION_IPV6,
79 		.sym_num	= SYM_NUM - 2,
80 		.ocon_num	= OCON_NUM - 2,
81 	},
82 	{
83 		.version	= POLICYDB_VERSION_NLCLASS,
84 		.sym_num	= SYM_NUM - 2,
85 		.ocon_num	= OCON_NUM - 2,
86 	},
87 	{
88 		.version	= POLICYDB_VERSION_MLS,
89 		.sym_num	= SYM_NUM,
90 		.ocon_num	= OCON_NUM - 2,
91 	},
92 	{
93 		.version	= POLICYDB_VERSION_AVTAB,
94 		.sym_num	= SYM_NUM,
95 		.ocon_num	= OCON_NUM - 2,
96 	},
97 	{
98 		.version	= POLICYDB_VERSION_RANGETRANS,
99 		.sym_num	= SYM_NUM,
100 		.ocon_num	= OCON_NUM - 2,
101 	},
102 	{
103 		.version	= POLICYDB_VERSION_POLCAP,
104 		.sym_num	= SYM_NUM,
105 		.ocon_num	= OCON_NUM - 2,
106 	},
107 	{
108 		.version	= POLICYDB_VERSION_PERMISSIVE,
109 		.sym_num	= SYM_NUM,
110 		.ocon_num	= OCON_NUM - 2,
111 	},
112 	{
113 		.version	= POLICYDB_VERSION_BOUNDARY,
114 		.sym_num	= SYM_NUM,
115 		.ocon_num	= OCON_NUM - 2,
116 	},
117 	{
118 		.version	= POLICYDB_VERSION_FILENAME_TRANS,
119 		.sym_num	= SYM_NUM,
120 		.ocon_num	= OCON_NUM - 2,
121 	},
122 	{
123 		.version	= POLICYDB_VERSION_ROLETRANS,
124 		.sym_num	= SYM_NUM,
125 		.ocon_num	= OCON_NUM - 2,
126 	},
127 	{
128 		.version	= POLICYDB_VERSION_NEW_OBJECT_DEFAULTS,
129 		.sym_num	= SYM_NUM,
130 		.ocon_num	= OCON_NUM - 2,
131 	},
132 	{
133 		.version	= POLICYDB_VERSION_DEFAULT_TYPE,
134 		.sym_num	= SYM_NUM,
135 		.ocon_num	= OCON_NUM - 2,
136 	},
137 	{
138 		.version	= POLICYDB_VERSION_CONSTRAINT_NAMES,
139 		.sym_num	= SYM_NUM,
140 		.ocon_num	= OCON_NUM - 2,
141 	},
142 	{
143 		.version	= POLICYDB_VERSION_XPERMS_IOCTL,
144 		.sym_num	= SYM_NUM,
145 		.ocon_num	= OCON_NUM - 2,
146 	},
147 	{
148 		.version	= POLICYDB_VERSION_INFINIBAND,
149 		.sym_num	= SYM_NUM,
150 		.ocon_num	= OCON_NUM,
151 	},
152 	{
153 		.version	= POLICYDB_VERSION_GLBLUB,
154 		.sym_num	= SYM_NUM,
155 		.ocon_num	= OCON_NUM,
156 	},
157 	{
158 		.version	= POLICYDB_VERSION_COMP_FTRANS,
159 		.sym_num	= SYM_NUM,
160 		.ocon_num	= OCON_NUM,
161 	},
162 };
163 
policydb_lookup_compat(int version)164 static struct policydb_compat_info *policydb_lookup_compat(int version)
165 {
166 	int i;
167 	struct policydb_compat_info *info = NULL;
168 
169 	for (i = 0; i < ARRAY_SIZE(policydb_compat); i++) {
170 		if (policydb_compat[i].version == version) {
171 			info = &policydb_compat[i];
172 			break;
173 		}
174 	}
175 	return info;
176 }
177 
178 /*
179  * The following *_destroy functions are used to
180  * free any memory allocated for each kind of
181  * symbol data in the policy database.
182  */
183 
perm_destroy(void * key,void * datum,void * p)184 static int perm_destroy(void *key, void *datum, void *p)
185 {
186 	kfree(key);
187 	kfree(datum);
188 	return 0;
189 }
190 
common_destroy(void * key,void * datum,void * p)191 static int common_destroy(void *key, void *datum, void *p)
192 {
193 	struct common_datum *comdatum;
194 
195 	kfree(key);
196 	if (datum) {
197 		comdatum = datum;
198 		hashtab_map(&comdatum->permissions.table, perm_destroy, NULL);
199 		hashtab_destroy(&comdatum->permissions.table);
200 	}
201 	kfree(datum);
202 	return 0;
203 }
204 
constraint_expr_destroy(struct constraint_expr * expr)205 static void constraint_expr_destroy(struct constraint_expr *expr)
206 {
207 	if (expr) {
208 		ebitmap_destroy(&expr->names);
209 		if (expr->type_names) {
210 			ebitmap_destroy(&expr->type_names->types);
211 			ebitmap_destroy(&expr->type_names->negset);
212 			kfree(expr->type_names);
213 		}
214 		kfree(expr);
215 	}
216 }
217 
cls_destroy(void * key,void * datum,void * p)218 static int cls_destroy(void *key, void *datum, void *p)
219 {
220 	struct class_datum *cladatum;
221 	struct constraint_node *constraint, *ctemp;
222 	struct constraint_expr *e, *etmp;
223 
224 	kfree(key);
225 	if (datum) {
226 		cladatum = datum;
227 		hashtab_map(&cladatum->permissions.table, perm_destroy, NULL);
228 		hashtab_destroy(&cladatum->permissions.table);
229 		constraint = cladatum->constraints;
230 		while (constraint) {
231 			e = constraint->expr;
232 			while (e) {
233 				etmp = e;
234 				e = e->next;
235 				constraint_expr_destroy(etmp);
236 			}
237 			ctemp = constraint;
238 			constraint = constraint->next;
239 			kfree(ctemp);
240 		}
241 
242 		constraint = cladatum->validatetrans;
243 		while (constraint) {
244 			e = constraint->expr;
245 			while (e) {
246 				etmp = e;
247 				e = e->next;
248 				constraint_expr_destroy(etmp);
249 			}
250 			ctemp = constraint;
251 			constraint = constraint->next;
252 			kfree(ctemp);
253 		}
254 		kfree(cladatum->comkey);
255 	}
256 	kfree(datum);
257 	return 0;
258 }
259 
role_destroy(void * key,void * datum,void * p)260 static int role_destroy(void *key, void *datum, void *p)
261 {
262 	struct role_datum *role;
263 
264 	kfree(key);
265 	if (datum) {
266 		role = datum;
267 		ebitmap_destroy(&role->dominates);
268 		ebitmap_destroy(&role->types);
269 	}
270 	kfree(datum);
271 	return 0;
272 }
273 
type_destroy(void * key,void * datum,void * p)274 static int type_destroy(void *key, void *datum, void *p)
275 {
276 	kfree(key);
277 	kfree(datum);
278 	return 0;
279 }
280 
user_destroy(void * key,void * datum,void * p)281 static int user_destroy(void *key, void *datum, void *p)
282 {
283 	struct user_datum *usrdatum;
284 
285 	kfree(key);
286 	if (datum) {
287 		usrdatum = datum;
288 		ebitmap_destroy(&usrdatum->roles);
289 		ebitmap_destroy(&usrdatum->range.level[0].cat);
290 		ebitmap_destroy(&usrdatum->range.level[1].cat);
291 		ebitmap_destroy(&usrdatum->dfltlevel.cat);
292 	}
293 	kfree(datum);
294 	return 0;
295 }
296 
sens_destroy(void * key,void * datum,void * p)297 static int sens_destroy(void *key, void *datum, void *p)
298 {
299 	struct level_datum *levdatum;
300 
301 	kfree(key);
302 	if (datum) {
303 		levdatum = datum;
304 		if (levdatum->level)
305 			ebitmap_destroy(&levdatum->level->cat);
306 		kfree(levdatum->level);
307 	}
308 	kfree(datum);
309 	return 0;
310 }
311 
cat_destroy(void * key,void * datum,void * p)312 static int cat_destroy(void *key, void *datum, void *p)
313 {
314 	kfree(key);
315 	kfree(datum);
316 	return 0;
317 }
318 
319 static int (*destroy_f[SYM_NUM]) (void *key, void *datum, void *datap) =
320 {
321 	common_destroy,
322 	cls_destroy,
323 	role_destroy,
324 	type_destroy,
325 	user_destroy,
326 	cond_destroy_bool,
327 	sens_destroy,
328 	cat_destroy,
329 };
330 
filenametr_destroy(void * key,void * datum,void * p)331 static int filenametr_destroy(void *key, void *datum, void *p)
332 {
333 	struct filename_trans_key *ft = key;
334 	struct filename_trans_datum *next, *d = datum;
335 
336 	kfree(ft->name);
337 	kfree(key);
338 	do {
339 		ebitmap_destroy(&d->stypes);
340 		next = d->next;
341 		kfree(d);
342 		d = next;
343 	} while (unlikely(d));
344 	cond_resched();
345 	return 0;
346 }
347 
range_tr_destroy(void * key,void * datum,void * p)348 static int range_tr_destroy(void *key, void *datum, void *p)
349 {
350 	struct mls_range *rt = datum;
351 
352 	kfree(key);
353 	ebitmap_destroy(&rt->level[0].cat);
354 	ebitmap_destroy(&rt->level[1].cat);
355 	kfree(datum);
356 	cond_resched();
357 	return 0;
358 }
359 
role_tr_destroy(void * key,void * datum,void * p)360 static int role_tr_destroy(void *key, void *datum, void *p)
361 {
362 	kfree(key);
363 	kfree(datum);
364 	return 0;
365 }
366 
ocontext_destroy(struct ocontext * c,int i)367 static void ocontext_destroy(struct ocontext *c, int i)
368 {
369 	if (!c)
370 		return;
371 
372 	context_destroy(&c->context[0]);
373 	context_destroy(&c->context[1]);
374 	if (i == OCON_ISID || i == OCON_FS ||
375 	    i == OCON_NETIF || i == OCON_FSUSE)
376 		kfree(c->u.name);
377 	kfree(c);
378 }
379 
380 /*
381  * Initialize the role table.
382  */
roles_init(struct policydb * p)383 static int roles_init(struct policydb *p)
384 {
385 	char *key = NULL;
386 	int rc;
387 	struct role_datum *role;
388 
389 	role = kzalloc(sizeof(*role), GFP_KERNEL);
390 	if (!role)
391 		return -ENOMEM;
392 
393 	rc = -EINVAL;
394 	role->value = ++p->p_roles.nprim;
395 	if (role->value != OBJECT_R_VAL)
396 		goto out;
397 
398 	rc = -ENOMEM;
399 	key = kstrdup(OBJECT_R, GFP_KERNEL);
400 	if (!key)
401 		goto out;
402 
403 	rc = symtab_insert(&p->p_roles, key, role);
404 	if (rc)
405 		goto out;
406 
407 	return 0;
408 out:
409 	kfree(key);
410 	kfree(role);
411 	return rc;
412 }
413 
filenametr_hash(const void * k)414 static u32 filenametr_hash(const void *k)
415 {
416 	const struct filename_trans_key *ft = k;
417 	unsigned long hash;
418 	unsigned int byte_num;
419 	unsigned char focus;
420 
421 	hash = ft->ttype ^ ft->tclass;
422 
423 	byte_num = 0;
424 	while ((focus = ft->name[byte_num++]))
425 		hash = partial_name_hash(focus, hash);
426 	return hash;
427 }
428 
filenametr_cmp(const void * k1,const void * k2)429 static int filenametr_cmp(const void *k1, const void *k2)
430 {
431 	const struct filename_trans_key *ft1 = k1;
432 	const struct filename_trans_key *ft2 = k2;
433 	int v;
434 
435 	v = ft1->ttype - ft2->ttype;
436 	if (v)
437 		return v;
438 
439 	v = ft1->tclass - ft2->tclass;
440 	if (v)
441 		return v;
442 
443 	return strcmp(ft1->name, ft2->name);
444 
445 }
446 
447 static const struct hashtab_key_params filenametr_key_params = {
448 	.hash = filenametr_hash,
449 	.cmp = filenametr_cmp,
450 };
451 
policydb_filenametr_search(struct policydb * p,struct filename_trans_key * key)452 struct filename_trans_datum *policydb_filenametr_search(
453 	struct policydb *p, struct filename_trans_key *key)
454 {
455 	return hashtab_search(&p->filename_trans, key, filenametr_key_params);
456 }
457 
rangetr_hash(const void * k)458 static u32 rangetr_hash(const void *k)
459 {
460 	const struct range_trans *key = k;
461 
462 	return key->source_type + (key->target_type << 3) +
463 		(key->target_class << 5);
464 }
465 
rangetr_cmp(const void * k1,const void * k2)466 static int rangetr_cmp(const void *k1, const void *k2)
467 {
468 	const struct range_trans *key1 = k1, *key2 = k2;
469 	int v;
470 
471 	v = key1->source_type - key2->source_type;
472 	if (v)
473 		return v;
474 
475 	v = key1->target_type - key2->target_type;
476 	if (v)
477 		return v;
478 
479 	v = key1->target_class - key2->target_class;
480 
481 	return v;
482 }
483 
484 static const struct hashtab_key_params rangetr_key_params = {
485 	.hash = rangetr_hash,
486 	.cmp = rangetr_cmp,
487 };
488 
policydb_rangetr_search(struct policydb * p,struct range_trans * key)489 struct mls_range *policydb_rangetr_search(struct policydb *p,
490 					  struct range_trans *key)
491 {
492 	return hashtab_search(&p->range_tr, key, rangetr_key_params);
493 }
494 
role_trans_hash(const void * k)495 static u32 role_trans_hash(const void *k)
496 {
497 	const struct role_trans_key *key = k;
498 
499 	return key->role + (key->type << 3) + (key->tclass << 5);
500 }
501 
role_trans_cmp(const void * k1,const void * k2)502 static int role_trans_cmp(const void *k1, const void *k2)
503 {
504 	const struct role_trans_key *key1 = k1, *key2 = k2;
505 	int v;
506 
507 	v = key1->role - key2->role;
508 	if (v)
509 		return v;
510 
511 	v = key1->type - key2->type;
512 	if (v)
513 		return v;
514 
515 	return key1->tclass - key2->tclass;
516 }
517 
518 static const struct hashtab_key_params roletr_key_params = {
519 	.hash = role_trans_hash,
520 	.cmp = role_trans_cmp,
521 };
522 
policydb_roletr_search(struct policydb * p,struct role_trans_key * key)523 struct role_trans_datum *policydb_roletr_search(struct policydb *p,
524 						struct role_trans_key *key)
525 {
526 	return hashtab_search(&p->role_tr, key, roletr_key_params);
527 }
528 
529 /*
530  * Initialize a policy database structure.
531  */
policydb_init(struct policydb * p)532 static void policydb_init(struct policydb *p)
533 {
534 	memset(p, 0, sizeof(*p));
535 
536 	avtab_init(&p->te_avtab);
537 	cond_policydb_init(p);
538 
539 	ebitmap_init(&p->filename_trans_ttypes);
540 	ebitmap_init(&p->policycaps);
541 	ebitmap_init(&p->permissive_map);
542 }
543 
544 /*
545  * The following *_index functions are used to
546  * define the val_to_name and val_to_struct arrays
547  * in a policy database structure.  The val_to_name
548  * arrays are used when converting security context
549  * structures into string representations.  The
550  * val_to_struct arrays are used when the attributes
551  * of a class, role, or user are needed.
552  */
553 
common_index(void * key,void * datum,void * datap)554 static int common_index(void *key, void *datum, void *datap)
555 {
556 	struct policydb *p;
557 	struct common_datum *comdatum;
558 
559 	comdatum = datum;
560 	p = datap;
561 	if (!comdatum->value || comdatum->value > p->p_commons.nprim)
562 		return -EINVAL;
563 
564 	p->sym_val_to_name[SYM_COMMONS][comdatum->value - 1] = key;
565 
566 	return 0;
567 }
568 
class_index(void * key,void * datum,void * datap)569 static int class_index(void *key, void *datum, void *datap)
570 {
571 	struct policydb *p;
572 	struct class_datum *cladatum;
573 
574 	cladatum = datum;
575 	p = datap;
576 	if (!cladatum->value || cladatum->value > p->p_classes.nprim)
577 		return -EINVAL;
578 
579 	p->sym_val_to_name[SYM_CLASSES][cladatum->value - 1] = key;
580 	p->class_val_to_struct[cladatum->value - 1] = cladatum;
581 	return 0;
582 }
583 
role_index(void * key,void * datum,void * datap)584 static int role_index(void *key, void *datum, void *datap)
585 {
586 	struct policydb *p;
587 	struct role_datum *role;
588 
589 	role = datum;
590 	p = datap;
591 	if (!role->value
592 	    || role->value > p->p_roles.nprim
593 	    || role->bounds > p->p_roles.nprim)
594 		return -EINVAL;
595 
596 	p->sym_val_to_name[SYM_ROLES][role->value - 1] = key;
597 	p->role_val_to_struct[role->value - 1] = role;
598 	return 0;
599 }
600 
type_index(void * key,void * datum,void * datap)601 static int type_index(void *key, void *datum, void *datap)
602 {
603 	struct policydb *p;
604 	struct type_datum *typdatum;
605 
606 	typdatum = datum;
607 	p = datap;
608 
609 	if (typdatum->primary) {
610 		if (!typdatum->value
611 		    || typdatum->value > p->p_types.nprim
612 		    || typdatum->bounds > p->p_types.nprim)
613 			return -EINVAL;
614 		p->sym_val_to_name[SYM_TYPES][typdatum->value - 1] = key;
615 		p->type_val_to_struct[typdatum->value - 1] = typdatum;
616 	}
617 
618 	return 0;
619 }
620 
user_index(void * key,void * datum,void * datap)621 static int user_index(void *key, void *datum, void *datap)
622 {
623 	struct policydb *p;
624 	struct user_datum *usrdatum;
625 
626 	usrdatum = datum;
627 	p = datap;
628 	if (!usrdatum->value
629 	    || usrdatum->value > p->p_users.nprim
630 	    || usrdatum->bounds > p->p_users.nprim)
631 		return -EINVAL;
632 
633 	p->sym_val_to_name[SYM_USERS][usrdatum->value - 1] = key;
634 	p->user_val_to_struct[usrdatum->value - 1] = usrdatum;
635 	return 0;
636 }
637 
sens_index(void * key,void * datum,void * datap)638 static int sens_index(void *key, void *datum, void *datap)
639 {
640 	struct policydb *p;
641 	struct level_datum *levdatum;
642 
643 	levdatum = datum;
644 	p = datap;
645 
646 	if (!levdatum->isalias) {
647 		if (!levdatum->level->sens ||
648 		    levdatum->level->sens > p->p_levels.nprim)
649 			return -EINVAL;
650 
651 		p->sym_val_to_name[SYM_LEVELS][levdatum->level->sens - 1] = key;
652 	}
653 
654 	return 0;
655 }
656 
cat_index(void * key,void * datum,void * datap)657 static int cat_index(void *key, void *datum, void *datap)
658 {
659 	struct policydb *p;
660 	struct cat_datum *catdatum;
661 
662 	catdatum = datum;
663 	p = datap;
664 
665 	if (!catdatum->isalias) {
666 		if (!catdatum->value || catdatum->value > p->p_cats.nprim)
667 			return -EINVAL;
668 
669 		p->sym_val_to_name[SYM_CATS][catdatum->value - 1] = key;
670 	}
671 
672 	return 0;
673 }
674 
675 static int (*index_f[SYM_NUM]) (void *key, void *datum, void *datap) =
676 {
677 	common_index,
678 	class_index,
679 	role_index,
680 	type_index,
681 	user_index,
682 	cond_index_bool,
683 	sens_index,
684 	cat_index,
685 };
686 
687 #ifdef DEBUG_HASHES
hash_eval(struct hashtab * h,const char * hash_name)688 static void hash_eval(struct hashtab *h, const char *hash_name)
689 {
690 	struct hashtab_info info;
691 
692 	hashtab_stat(h, &info);
693 	pr_debug("SELinux: %s:  %d entries and %d/%d buckets used, longest chain length %d\n",
694 		 hash_name, h->nel, info.slots_used, h->size,
695 		 info.max_chain_len);
696 }
697 
symtab_hash_eval(struct symtab * s)698 static void symtab_hash_eval(struct symtab *s)
699 {
700 	int i;
701 
702 	for (i = 0; i < SYM_NUM; i++)
703 		hash_eval(&s[i].table, symtab_name[i]);
704 }
705 
706 #else
hash_eval(struct hashtab * h,char * hash_name)707 static inline void hash_eval(struct hashtab *h, char *hash_name)
708 {
709 }
710 #endif
711 
712 /*
713  * Define the other val_to_name and val_to_struct arrays
714  * in a policy database structure.
715  *
716  * Caller must clean up on failure.
717  */
policydb_index(struct policydb * p)718 static int policydb_index(struct policydb *p)
719 {
720 	int i, rc;
721 
722 	if (p->mls_enabled)
723 		pr_debug("SELinux:  %d users, %d roles, %d types, %d bools, %d sens, %d cats\n",
724 			 p->p_users.nprim, p->p_roles.nprim, p->p_types.nprim,
725 			 p->p_bools.nprim, p->p_levels.nprim, p->p_cats.nprim);
726 	else
727 		pr_debug("SELinux:  %d users, %d roles, %d types, %d bools\n",
728 			 p->p_users.nprim, p->p_roles.nprim, p->p_types.nprim,
729 			 p->p_bools.nprim);
730 
731 	pr_debug("SELinux:  %d classes, %d rules\n",
732 		 p->p_classes.nprim, p->te_avtab.nel);
733 
734 #ifdef DEBUG_HASHES
735 	avtab_hash_eval(&p->te_avtab, "rules");
736 	symtab_hash_eval(p->symtab);
737 #endif
738 
739 	p->class_val_to_struct = kcalloc(p->p_classes.nprim,
740 					 sizeof(*p->class_val_to_struct),
741 					 GFP_KERNEL);
742 	if (!p->class_val_to_struct)
743 		return -ENOMEM;
744 
745 	p->role_val_to_struct = kcalloc(p->p_roles.nprim,
746 					sizeof(*p->role_val_to_struct),
747 					GFP_KERNEL);
748 	if (!p->role_val_to_struct)
749 		return -ENOMEM;
750 
751 	p->user_val_to_struct = kcalloc(p->p_users.nprim,
752 					sizeof(*p->user_val_to_struct),
753 					GFP_KERNEL);
754 	if (!p->user_val_to_struct)
755 		return -ENOMEM;
756 
757 	p->type_val_to_struct = kvcalloc(p->p_types.nprim,
758 					 sizeof(*p->type_val_to_struct),
759 					 GFP_KERNEL);
760 	if (!p->type_val_to_struct)
761 		return -ENOMEM;
762 
763 	rc = cond_init_bool_indexes(p);
764 	if (rc)
765 		goto out;
766 
767 	for (i = 0; i < SYM_NUM; i++) {
768 		p->sym_val_to_name[i] = kvcalloc(p->symtab[i].nprim,
769 						 sizeof(char *),
770 						 GFP_KERNEL);
771 		if (!p->sym_val_to_name[i])
772 			return -ENOMEM;
773 
774 		rc = hashtab_map(&p->symtab[i].table, index_f[i], p);
775 		if (rc)
776 			goto out;
777 	}
778 	rc = 0;
779 out:
780 	return rc;
781 }
782 
783 /*
784  * Free any memory allocated by a policy database structure.
785  */
policydb_destroy(struct policydb * p)786 void policydb_destroy(struct policydb *p)
787 {
788 	struct ocontext *c, *ctmp;
789 	struct genfs *g, *gtmp;
790 	int i;
791 	struct role_allow *ra, *lra = NULL;
792 
793 	for (i = 0; i < SYM_NUM; i++) {
794 		cond_resched();
795 		hashtab_map(&p->symtab[i].table, destroy_f[i], NULL);
796 		hashtab_destroy(&p->symtab[i].table);
797 	}
798 
799 	for (i = 0; i < SYM_NUM; i++)
800 		kvfree(p->sym_val_to_name[i]);
801 
802 	kfree(p->class_val_to_struct);
803 	kfree(p->role_val_to_struct);
804 	kfree(p->user_val_to_struct);
805 	kvfree(p->type_val_to_struct);
806 
807 	avtab_destroy(&p->te_avtab);
808 
809 	for (i = 0; i < OCON_NUM; i++) {
810 		cond_resched();
811 		c = p->ocontexts[i];
812 		while (c) {
813 			ctmp = c;
814 			c = c->next;
815 			ocontext_destroy(ctmp, i);
816 		}
817 		p->ocontexts[i] = NULL;
818 	}
819 
820 	g = p->genfs;
821 	while (g) {
822 		cond_resched();
823 		kfree(g->fstype);
824 		c = g->head;
825 		while (c) {
826 			ctmp = c;
827 			c = c->next;
828 			ocontext_destroy(ctmp, OCON_FSUSE);
829 		}
830 		gtmp = g;
831 		g = g->next;
832 		kfree(gtmp);
833 	}
834 	p->genfs = NULL;
835 
836 	cond_policydb_destroy(p);
837 
838 	hashtab_map(&p->role_tr, role_tr_destroy, NULL);
839 	hashtab_destroy(&p->role_tr);
840 
841 	for (ra = p->role_allow; ra; ra = ra->next) {
842 		cond_resched();
843 		kfree(lra);
844 		lra = ra;
845 	}
846 	kfree(lra);
847 
848 	hashtab_map(&p->filename_trans, filenametr_destroy, NULL);
849 	hashtab_destroy(&p->filename_trans);
850 
851 	hashtab_map(&p->range_tr, range_tr_destroy, NULL);
852 	hashtab_destroy(&p->range_tr);
853 
854 	if (p->type_attr_map_array) {
855 		for (i = 0; i < p->p_types.nprim; i++)
856 			ebitmap_destroy(&p->type_attr_map_array[i]);
857 		kvfree(p->type_attr_map_array);
858 	}
859 
860 	ebitmap_destroy(&p->filename_trans_ttypes);
861 	ebitmap_destroy(&p->policycaps);
862 	ebitmap_destroy(&p->permissive_map);
863 }
864 
865 /*
866  * Load the initial SIDs specified in a policy database
867  * structure into a SID table.
868  */
policydb_load_isids(struct policydb * p,struct sidtab * s)869 int policydb_load_isids(struct policydb *p, struct sidtab *s)
870 {
871 	struct ocontext *head, *c;
872 	int rc;
873 
874 	rc = sidtab_init(s);
875 	if (rc) {
876 		pr_err("SELinux:  out of memory on SID table init\n");
877 		return rc;
878 	}
879 
880 	head = p->ocontexts[OCON_ISID];
881 	for (c = head; c; c = c->next) {
882 		u32 sid = c->sid[0];
883 		const char *name = security_get_initial_sid_context(sid);
884 
885 		if (sid == SECSID_NULL) {
886 			pr_err("SELinux:  SID 0 was assigned a context.\n");
887 			sidtab_destroy(s);
888 			return -EINVAL;
889 		}
890 
891 		/* Ignore initial SIDs unused by this kernel. */
892 		if (!name)
893 			continue;
894 
895 		rc = sidtab_set_initial(s, sid, &c->context[0]);
896 		if (rc) {
897 			pr_err("SELinux:  unable to load initial SID %s.\n",
898 			       name);
899 			sidtab_destroy(s);
900 			return rc;
901 		}
902 	}
903 	return 0;
904 }
905 
policydb_class_isvalid(struct policydb * p,unsigned int class)906 int policydb_class_isvalid(struct policydb *p, unsigned int class)
907 {
908 	if (!class || class > p->p_classes.nprim)
909 		return 0;
910 	return 1;
911 }
912 
policydb_role_isvalid(struct policydb * p,unsigned int role)913 int policydb_role_isvalid(struct policydb *p, unsigned int role)
914 {
915 	if (!role || role > p->p_roles.nprim)
916 		return 0;
917 	return 1;
918 }
919 
policydb_type_isvalid(struct policydb * p,unsigned int type)920 int policydb_type_isvalid(struct policydb *p, unsigned int type)
921 {
922 	if (!type || type > p->p_types.nprim)
923 		return 0;
924 	return 1;
925 }
926 
927 /*
928  * Return 1 if the fields in the security context
929  * structure `c' are valid.  Return 0 otherwise.
930  */
policydb_context_isvalid(struct policydb * p,struct context * c)931 int policydb_context_isvalid(struct policydb *p, struct context *c)
932 {
933 	struct role_datum *role;
934 	struct user_datum *usrdatum;
935 
936 	if (!c->role || c->role > p->p_roles.nprim)
937 		return 0;
938 
939 	if (!c->user || c->user > p->p_users.nprim)
940 		return 0;
941 
942 	if (!c->type || c->type > p->p_types.nprim)
943 		return 0;
944 
945 	if (c->role != OBJECT_R_VAL) {
946 		/*
947 		 * Role must be authorized for the type.
948 		 */
949 		role = p->role_val_to_struct[c->role - 1];
950 		if (!role || !ebitmap_get_bit(&role->types, c->type - 1))
951 			/* role may not be associated with type */
952 			return 0;
953 
954 		/*
955 		 * User must be authorized for the role.
956 		 */
957 		usrdatum = p->user_val_to_struct[c->user - 1];
958 		if (!usrdatum)
959 			return 0;
960 
961 		if (!ebitmap_get_bit(&usrdatum->roles, c->role - 1))
962 			/* user may not be associated with role */
963 			return 0;
964 	}
965 
966 	if (!mls_context_isvalid(p, c))
967 		return 0;
968 
969 	return 1;
970 }
971 
972 /*
973  * Read a MLS range structure from a policydb binary
974  * representation file.
975  */
mls_read_range_helper(struct mls_range * r,void * fp)976 static int mls_read_range_helper(struct mls_range *r, void *fp)
977 {
978 	__le32 buf[2];
979 	u32 items;
980 	int rc;
981 
982 	rc = next_entry(buf, fp, sizeof(u32));
983 	if (rc)
984 		goto out;
985 
986 	rc = -EINVAL;
987 	items = le32_to_cpu(buf[0]);
988 	if (items > ARRAY_SIZE(buf)) {
989 		pr_err("SELinux: mls:  range overflow\n");
990 		goto out;
991 	}
992 
993 	rc = next_entry(buf, fp, sizeof(u32) * items);
994 	if (rc) {
995 		pr_err("SELinux: mls:  truncated range\n");
996 		goto out;
997 	}
998 
999 	r->level[0].sens = le32_to_cpu(buf[0]);
1000 	if (items > 1)
1001 		r->level[1].sens = le32_to_cpu(buf[1]);
1002 	else
1003 		r->level[1].sens = r->level[0].sens;
1004 
1005 	rc = ebitmap_read(&r->level[0].cat, fp);
1006 	if (rc) {
1007 		pr_err("SELinux: mls:  error reading low categories\n");
1008 		goto out;
1009 	}
1010 	if (items > 1) {
1011 		rc = ebitmap_read(&r->level[1].cat, fp);
1012 		if (rc) {
1013 			pr_err("SELinux: mls:  error reading high categories\n");
1014 			goto bad_high;
1015 		}
1016 	} else {
1017 		rc = ebitmap_cpy(&r->level[1].cat, &r->level[0].cat);
1018 		if (rc) {
1019 			pr_err("SELinux: mls:  out of memory\n");
1020 			goto bad_high;
1021 		}
1022 	}
1023 
1024 	return 0;
1025 bad_high:
1026 	ebitmap_destroy(&r->level[0].cat);
1027 out:
1028 	return rc;
1029 }
1030 
1031 /*
1032  * Read and validate a security context structure
1033  * from a policydb binary representation file.
1034  */
context_read_and_validate(struct context * c,struct policydb * p,void * fp)1035 static int context_read_and_validate(struct context *c,
1036 				     struct policydb *p,
1037 				     void *fp)
1038 {
1039 	__le32 buf[3];
1040 	int rc;
1041 
1042 	rc = next_entry(buf, fp, sizeof buf);
1043 	if (rc) {
1044 		pr_err("SELinux: context truncated\n");
1045 		goto out;
1046 	}
1047 	c->user = le32_to_cpu(buf[0]);
1048 	c->role = le32_to_cpu(buf[1]);
1049 	c->type = le32_to_cpu(buf[2]);
1050 	if (p->policyvers >= POLICYDB_VERSION_MLS) {
1051 		rc = mls_read_range_helper(&c->range, fp);
1052 		if (rc) {
1053 			pr_err("SELinux: error reading MLS range of context\n");
1054 			goto out;
1055 		}
1056 	}
1057 
1058 	rc = -EINVAL;
1059 	if (!policydb_context_isvalid(p, c)) {
1060 		pr_err("SELinux:  invalid security context\n");
1061 		context_destroy(c);
1062 		goto out;
1063 	}
1064 	rc = 0;
1065 out:
1066 	return rc;
1067 }
1068 
1069 /*
1070  * The following *_read functions are used to
1071  * read the symbol data from a policy database
1072  * binary representation file.
1073  */
1074 
str_read(char ** strp,gfp_t flags,void * fp,u32 len)1075 static int str_read(char **strp, gfp_t flags, void *fp, u32 len)
1076 {
1077 	int rc;
1078 	char *str;
1079 
1080 	if ((len == 0) || (len == (u32)-1))
1081 		return -EINVAL;
1082 
1083 	str = kmalloc(len + 1, flags | __GFP_NOWARN);
1084 	if (!str)
1085 		return -ENOMEM;
1086 
1087 	rc = next_entry(str, fp, len);
1088 	if (rc) {
1089 		kfree(str);
1090 		return rc;
1091 	}
1092 
1093 	str[len] = '\0';
1094 	*strp = str;
1095 	return 0;
1096 }
1097 
perm_read(struct policydb * p,struct symtab * s,void * fp)1098 static int perm_read(struct policydb *p, struct symtab *s, void *fp)
1099 {
1100 	char *key = NULL;
1101 	struct perm_datum *perdatum;
1102 	int rc;
1103 	__le32 buf[2];
1104 	u32 len;
1105 
1106 	perdatum = kzalloc(sizeof(*perdatum), GFP_KERNEL);
1107 	if (!perdatum)
1108 		return -ENOMEM;
1109 
1110 	rc = next_entry(buf, fp, sizeof buf);
1111 	if (rc)
1112 		goto bad;
1113 
1114 	len = le32_to_cpu(buf[0]);
1115 	perdatum->value = le32_to_cpu(buf[1]);
1116 
1117 	rc = str_read(&key, GFP_KERNEL, fp, len);
1118 	if (rc)
1119 		goto bad;
1120 
1121 	rc = symtab_insert(s, key, perdatum);
1122 	if (rc)
1123 		goto bad;
1124 
1125 	return 0;
1126 bad:
1127 	perm_destroy(key, perdatum, NULL);
1128 	return rc;
1129 }
1130 
common_read(struct policydb * p,struct symtab * s,void * fp)1131 static int common_read(struct policydb *p, struct symtab *s, void *fp)
1132 {
1133 	char *key = NULL;
1134 	struct common_datum *comdatum;
1135 	__le32 buf[4];
1136 	u32 len, nel;
1137 	int i, rc;
1138 
1139 	comdatum = kzalloc(sizeof(*comdatum), GFP_KERNEL);
1140 	if (!comdatum)
1141 		return -ENOMEM;
1142 
1143 	rc = next_entry(buf, fp, sizeof buf);
1144 	if (rc)
1145 		goto bad;
1146 
1147 	len = le32_to_cpu(buf[0]);
1148 	comdatum->value = le32_to_cpu(buf[1]);
1149 	nel = le32_to_cpu(buf[3]);
1150 
1151 	rc = symtab_init(&comdatum->permissions, nel);
1152 	if (rc)
1153 		goto bad;
1154 	comdatum->permissions.nprim = le32_to_cpu(buf[2]);
1155 
1156 	rc = str_read(&key, GFP_KERNEL, fp, len);
1157 	if (rc)
1158 		goto bad;
1159 
1160 	for (i = 0; i < nel; i++) {
1161 		rc = perm_read(p, &comdatum->permissions, fp);
1162 		if (rc)
1163 			goto bad;
1164 	}
1165 
1166 	rc = symtab_insert(s, key, comdatum);
1167 	if (rc)
1168 		goto bad;
1169 	return 0;
1170 bad:
1171 	common_destroy(key, comdatum, NULL);
1172 	return rc;
1173 }
1174 
type_set_init(struct type_set * t)1175 static void type_set_init(struct type_set *t)
1176 {
1177 	ebitmap_init(&t->types);
1178 	ebitmap_init(&t->negset);
1179 }
1180 
type_set_read(struct type_set * t,void * fp)1181 static int type_set_read(struct type_set *t, void *fp)
1182 {
1183 	__le32 buf[1];
1184 	int rc;
1185 
1186 	if (ebitmap_read(&t->types, fp))
1187 		return -EINVAL;
1188 	if (ebitmap_read(&t->negset, fp))
1189 		return -EINVAL;
1190 
1191 	rc = next_entry(buf, fp, sizeof(u32));
1192 	if (rc < 0)
1193 		return -EINVAL;
1194 	t->flags = le32_to_cpu(buf[0]);
1195 
1196 	return 0;
1197 }
1198 
1199 
read_cons_helper(struct policydb * p,struct constraint_node ** nodep,int ncons,int allowxtarget,void * fp)1200 static int read_cons_helper(struct policydb *p,
1201 				struct constraint_node **nodep,
1202 				int ncons, int allowxtarget, void *fp)
1203 {
1204 	struct constraint_node *c, *lc;
1205 	struct constraint_expr *e, *le;
1206 	__le32 buf[3];
1207 	u32 nexpr;
1208 	int rc, i, j, depth;
1209 
1210 	lc = NULL;
1211 	for (i = 0; i < ncons; i++) {
1212 		c = kzalloc(sizeof(*c), GFP_KERNEL);
1213 		if (!c)
1214 			return -ENOMEM;
1215 
1216 		if (lc)
1217 			lc->next = c;
1218 		else
1219 			*nodep = c;
1220 
1221 		rc = next_entry(buf, fp, (sizeof(u32) * 2));
1222 		if (rc)
1223 			return rc;
1224 		c->permissions = le32_to_cpu(buf[0]);
1225 		nexpr = le32_to_cpu(buf[1]);
1226 		le = NULL;
1227 		depth = -1;
1228 		for (j = 0; j < nexpr; j++) {
1229 			e = kzalloc(sizeof(*e), GFP_KERNEL);
1230 			if (!e)
1231 				return -ENOMEM;
1232 
1233 			if (le)
1234 				le->next = e;
1235 			else
1236 				c->expr = e;
1237 
1238 			rc = next_entry(buf, fp, (sizeof(u32) * 3));
1239 			if (rc)
1240 				return rc;
1241 			e->expr_type = le32_to_cpu(buf[0]);
1242 			e->attr = le32_to_cpu(buf[1]);
1243 			e->op = le32_to_cpu(buf[2]);
1244 
1245 			switch (e->expr_type) {
1246 			case CEXPR_NOT:
1247 				if (depth < 0)
1248 					return -EINVAL;
1249 				break;
1250 			case CEXPR_AND:
1251 			case CEXPR_OR:
1252 				if (depth < 1)
1253 					return -EINVAL;
1254 				depth--;
1255 				break;
1256 			case CEXPR_ATTR:
1257 				if (depth == (CEXPR_MAXDEPTH - 1))
1258 					return -EINVAL;
1259 				depth++;
1260 				break;
1261 			case CEXPR_NAMES:
1262 				if (!allowxtarget && (e->attr & CEXPR_XTARGET))
1263 					return -EINVAL;
1264 				if (depth == (CEXPR_MAXDEPTH - 1))
1265 					return -EINVAL;
1266 				depth++;
1267 				rc = ebitmap_read(&e->names, fp);
1268 				if (rc)
1269 					return rc;
1270 				if (p->policyvers >=
1271 				    POLICYDB_VERSION_CONSTRAINT_NAMES) {
1272 					e->type_names = kzalloc(sizeof
1273 						(*e->type_names), GFP_KERNEL);
1274 					if (!e->type_names)
1275 						return -ENOMEM;
1276 					type_set_init(e->type_names);
1277 					rc = type_set_read(e->type_names, fp);
1278 					if (rc)
1279 						return rc;
1280 				}
1281 				break;
1282 			default:
1283 				return -EINVAL;
1284 			}
1285 			le = e;
1286 		}
1287 		if (depth != 0)
1288 			return -EINVAL;
1289 		lc = c;
1290 	}
1291 
1292 	return 0;
1293 }
1294 
class_read(struct policydb * p,struct symtab * s,void * fp)1295 static int class_read(struct policydb *p, struct symtab *s, void *fp)
1296 {
1297 	char *key = NULL;
1298 	struct class_datum *cladatum;
1299 	__le32 buf[6];
1300 	u32 len, len2, ncons, nel;
1301 	int i, rc;
1302 
1303 	cladatum = kzalloc(sizeof(*cladatum), GFP_KERNEL);
1304 	if (!cladatum)
1305 		return -ENOMEM;
1306 
1307 	rc = next_entry(buf, fp, sizeof(u32)*6);
1308 	if (rc)
1309 		goto bad;
1310 
1311 	len = le32_to_cpu(buf[0]);
1312 	len2 = le32_to_cpu(buf[1]);
1313 	cladatum->value = le32_to_cpu(buf[2]);
1314 	nel = le32_to_cpu(buf[4]);
1315 
1316 	rc = symtab_init(&cladatum->permissions, nel);
1317 	if (rc)
1318 		goto bad;
1319 	cladatum->permissions.nprim = le32_to_cpu(buf[3]);
1320 
1321 	ncons = le32_to_cpu(buf[5]);
1322 
1323 	rc = str_read(&key, GFP_KERNEL, fp, len);
1324 	if (rc)
1325 		goto bad;
1326 
1327 	if (len2) {
1328 		rc = str_read(&cladatum->comkey, GFP_KERNEL, fp, len2);
1329 		if (rc)
1330 			goto bad;
1331 
1332 		rc = -EINVAL;
1333 		cladatum->comdatum = symtab_search(&p->p_commons,
1334 						   cladatum->comkey);
1335 		if (!cladatum->comdatum) {
1336 			pr_err("SELinux:  unknown common %s\n",
1337 			       cladatum->comkey);
1338 			goto bad;
1339 		}
1340 	}
1341 	for (i = 0; i < nel; i++) {
1342 		rc = perm_read(p, &cladatum->permissions, fp);
1343 		if (rc)
1344 			goto bad;
1345 	}
1346 
1347 	rc = read_cons_helper(p, &cladatum->constraints, ncons, 0, fp);
1348 	if (rc)
1349 		goto bad;
1350 
1351 	if (p->policyvers >= POLICYDB_VERSION_VALIDATETRANS) {
1352 		/* grab the validatetrans rules */
1353 		rc = next_entry(buf, fp, sizeof(u32));
1354 		if (rc)
1355 			goto bad;
1356 		ncons = le32_to_cpu(buf[0]);
1357 		rc = read_cons_helper(p, &cladatum->validatetrans,
1358 				ncons, 1, fp);
1359 		if (rc)
1360 			goto bad;
1361 	}
1362 
1363 	if (p->policyvers >= POLICYDB_VERSION_NEW_OBJECT_DEFAULTS) {
1364 		rc = next_entry(buf, fp, sizeof(u32) * 3);
1365 		if (rc)
1366 			goto bad;
1367 
1368 		cladatum->default_user = le32_to_cpu(buf[0]);
1369 		cladatum->default_role = le32_to_cpu(buf[1]);
1370 		cladatum->default_range = le32_to_cpu(buf[2]);
1371 	}
1372 
1373 	if (p->policyvers >= POLICYDB_VERSION_DEFAULT_TYPE) {
1374 		rc = next_entry(buf, fp, sizeof(u32) * 1);
1375 		if (rc)
1376 			goto bad;
1377 		cladatum->default_type = le32_to_cpu(buf[0]);
1378 	}
1379 
1380 	rc = symtab_insert(s, key, cladatum);
1381 	if (rc)
1382 		goto bad;
1383 
1384 	return 0;
1385 bad:
1386 	cls_destroy(key, cladatum, NULL);
1387 	return rc;
1388 }
1389 
role_read(struct policydb * p,struct symtab * s,void * fp)1390 static int role_read(struct policydb *p, struct symtab *s, void *fp)
1391 {
1392 	char *key = NULL;
1393 	struct role_datum *role;
1394 	int rc, to_read = 2;
1395 	__le32 buf[3];
1396 	u32 len;
1397 
1398 	role = kzalloc(sizeof(*role), GFP_KERNEL);
1399 	if (!role)
1400 		return -ENOMEM;
1401 
1402 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
1403 		to_read = 3;
1404 
1405 	rc = next_entry(buf, fp, sizeof(buf[0]) * to_read);
1406 	if (rc)
1407 		goto bad;
1408 
1409 	len = le32_to_cpu(buf[0]);
1410 	role->value = le32_to_cpu(buf[1]);
1411 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
1412 		role->bounds = le32_to_cpu(buf[2]);
1413 
1414 	rc = str_read(&key, GFP_KERNEL, fp, len);
1415 	if (rc)
1416 		goto bad;
1417 
1418 	rc = ebitmap_read(&role->dominates, fp);
1419 	if (rc)
1420 		goto bad;
1421 
1422 	rc = ebitmap_read(&role->types, fp);
1423 	if (rc)
1424 		goto bad;
1425 
1426 	if (strcmp(key, OBJECT_R) == 0) {
1427 		rc = -EINVAL;
1428 		if (role->value != OBJECT_R_VAL) {
1429 			pr_err("SELinux: Role %s has wrong value %d\n",
1430 			       OBJECT_R, role->value);
1431 			goto bad;
1432 		}
1433 		rc = 0;
1434 		goto bad;
1435 	}
1436 
1437 	rc = symtab_insert(s, key, role);
1438 	if (rc)
1439 		goto bad;
1440 	return 0;
1441 bad:
1442 	role_destroy(key, role, NULL);
1443 	return rc;
1444 }
1445 
type_read(struct policydb * p,struct symtab * s,void * fp)1446 static int type_read(struct policydb *p, struct symtab *s, void *fp)
1447 {
1448 	char *key = NULL;
1449 	struct type_datum *typdatum;
1450 	int rc, to_read = 3;
1451 	__le32 buf[4];
1452 	u32 len;
1453 
1454 	typdatum = kzalloc(sizeof(*typdatum), GFP_KERNEL);
1455 	if (!typdatum)
1456 		return -ENOMEM;
1457 
1458 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
1459 		to_read = 4;
1460 
1461 	rc = next_entry(buf, fp, sizeof(buf[0]) * to_read);
1462 	if (rc)
1463 		goto bad;
1464 
1465 	len = le32_to_cpu(buf[0]);
1466 	typdatum->value = le32_to_cpu(buf[1]);
1467 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY) {
1468 		u32 prop = le32_to_cpu(buf[2]);
1469 
1470 		if (prop & TYPEDATUM_PROPERTY_PRIMARY)
1471 			typdatum->primary = 1;
1472 		if (prop & TYPEDATUM_PROPERTY_ATTRIBUTE)
1473 			typdatum->attribute = 1;
1474 
1475 		typdatum->bounds = le32_to_cpu(buf[3]);
1476 	} else {
1477 		typdatum->primary = le32_to_cpu(buf[2]);
1478 	}
1479 
1480 	rc = str_read(&key, GFP_KERNEL, fp, len);
1481 	if (rc)
1482 		goto bad;
1483 
1484 	rc = symtab_insert(s, key, typdatum);
1485 	if (rc)
1486 		goto bad;
1487 	return 0;
1488 bad:
1489 	type_destroy(key, typdatum, NULL);
1490 	return rc;
1491 }
1492 
1493 
1494 /*
1495  * Read a MLS level structure from a policydb binary
1496  * representation file.
1497  */
mls_read_level(struct mls_level * lp,void * fp)1498 static int mls_read_level(struct mls_level *lp, void *fp)
1499 {
1500 	__le32 buf[1];
1501 	int rc;
1502 
1503 	memset(lp, 0, sizeof(*lp));
1504 
1505 	rc = next_entry(buf, fp, sizeof buf);
1506 	if (rc) {
1507 		pr_err("SELinux: mls: truncated level\n");
1508 		return rc;
1509 	}
1510 	lp->sens = le32_to_cpu(buf[0]);
1511 
1512 	rc = ebitmap_read(&lp->cat, fp);
1513 	if (rc) {
1514 		pr_err("SELinux: mls:  error reading level categories\n");
1515 		return rc;
1516 	}
1517 	return 0;
1518 }
1519 
user_read(struct policydb * p,struct symtab * s,void * fp)1520 static int user_read(struct policydb *p, struct symtab *s, void *fp)
1521 {
1522 	char *key = NULL;
1523 	struct user_datum *usrdatum;
1524 	int rc, to_read = 2;
1525 	__le32 buf[3];
1526 	u32 len;
1527 
1528 	usrdatum = kzalloc(sizeof(*usrdatum), GFP_KERNEL);
1529 	if (!usrdatum)
1530 		return -ENOMEM;
1531 
1532 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
1533 		to_read = 3;
1534 
1535 	rc = next_entry(buf, fp, sizeof(buf[0]) * to_read);
1536 	if (rc)
1537 		goto bad;
1538 
1539 	len = le32_to_cpu(buf[0]);
1540 	usrdatum->value = le32_to_cpu(buf[1]);
1541 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
1542 		usrdatum->bounds = le32_to_cpu(buf[2]);
1543 
1544 	rc = str_read(&key, GFP_KERNEL, fp, len);
1545 	if (rc)
1546 		goto bad;
1547 
1548 	rc = ebitmap_read(&usrdatum->roles, fp);
1549 	if (rc)
1550 		goto bad;
1551 
1552 	if (p->policyvers >= POLICYDB_VERSION_MLS) {
1553 		rc = mls_read_range_helper(&usrdatum->range, fp);
1554 		if (rc)
1555 			goto bad;
1556 		rc = mls_read_level(&usrdatum->dfltlevel, fp);
1557 		if (rc)
1558 			goto bad;
1559 	}
1560 
1561 	rc = symtab_insert(s, key, usrdatum);
1562 	if (rc)
1563 		goto bad;
1564 	return 0;
1565 bad:
1566 	user_destroy(key, usrdatum, NULL);
1567 	return rc;
1568 }
1569 
sens_read(struct policydb * p,struct symtab * s,void * fp)1570 static int sens_read(struct policydb *p, struct symtab *s, void *fp)
1571 {
1572 	char *key = NULL;
1573 	struct level_datum *levdatum;
1574 	int rc;
1575 	__le32 buf[2];
1576 	u32 len;
1577 
1578 	levdatum = kzalloc(sizeof(*levdatum), GFP_ATOMIC);
1579 	if (!levdatum)
1580 		return -ENOMEM;
1581 
1582 	rc = next_entry(buf, fp, sizeof buf);
1583 	if (rc)
1584 		goto bad;
1585 
1586 	len = le32_to_cpu(buf[0]);
1587 	levdatum->isalias = le32_to_cpu(buf[1]);
1588 
1589 	rc = str_read(&key, GFP_ATOMIC, fp, len);
1590 	if (rc)
1591 		goto bad;
1592 
1593 	rc = -ENOMEM;
1594 	levdatum->level = kmalloc(sizeof(*levdatum->level), GFP_ATOMIC);
1595 	if (!levdatum->level)
1596 		goto bad;
1597 
1598 	rc = mls_read_level(levdatum->level, fp);
1599 	if (rc)
1600 		goto bad;
1601 
1602 	rc = symtab_insert(s, key, levdatum);
1603 	if (rc)
1604 		goto bad;
1605 	return 0;
1606 bad:
1607 	sens_destroy(key, levdatum, NULL);
1608 	return rc;
1609 }
1610 
cat_read(struct policydb * p,struct symtab * s,void * fp)1611 static int cat_read(struct policydb *p, struct symtab *s, void *fp)
1612 {
1613 	char *key = NULL;
1614 	struct cat_datum *catdatum;
1615 	int rc;
1616 	__le32 buf[3];
1617 	u32 len;
1618 
1619 	catdatum = kzalloc(sizeof(*catdatum), GFP_ATOMIC);
1620 	if (!catdatum)
1621 		return -ENOMEM;
1622 
1623 	rc = next_entry(buf, fp, sizeof buf);
1624 	if (rc)
1625 		goto bad;
1626 
1627 	len = le32_to_cpu(buf[0]);
1628 	catdatum->value = le32_to_cpu(buf[1]);
1629 	catdatum->isalias = le32_to_cpu(buf[2]);
1630 
1631 	rc = str_read(&key, GFP_ATOMIC, fp, len);
1632 	if (rc)
1633 		goto bad;
1634 
1635 	rc = symtab_insert(s, key, catdatum);
1636 	if (rc)
1637 		goto bad;
1638 	return 0;
1639 bad:
1640 	cat_destroy(key, catdatum, NULL);
1641 	return rc;
1642 }
1643 
1644 static int (*read_f[SYM_NUM]) (struct policydb *p, struct symtab *s, void *fp) =
1645 {
1646 	common_read,
1647 	class_read,
1648 	role_read,
1649 	type_read,
1650 	user_read,
1651 	cond_read_bool,
1652 	sens_read,
1653 	cat_read,
1654 };
1655 
user_bounds_sanity_check(void * key,void * datum,void * datap)1656 static int user_bounds_sanity_check(void *key, void *datum, void *datap)
1657 {
1658 	struct user_datum *upper, *user;
1659 	struct policydb *p = datap;
1660 	int depth = 0;
1661 
1662 	upper = user = datum;
1663 	while (upper->bounds) {
1664 		struct ebitmap_node *node;
1665 		unsigned long bit;
1666 
1667 		if (++depth == POLICYDB_BOUNDS_MAXDEPTH) {
1668 			pr_err("SELinux: user %s: "
1669 			       "too deep or looped boundary",
1670 			       (char *) key);
1671 			return -EINVAL;
1672 		}
1673 
1674 		upper = p->user_val_to_struct[upper->bounds - 1];
1675 		ebitmap_for_each_positive_bit(&user->roles, node, bit) {
1676 			if (ebitmap_get_bit(&upper->roles, bit))
1677 				continue;
1678 
1679 			pr_err("SELinux: boundary violated policy: "
1680 			       "user=%s role=%s bounds=%s\n",
1681 			       sym_name(p, SYM_USERS, user->value - 1),
1682 			       sym_name(p, SYM_ROLES, bit),
1683 			       sym_name(p, SYM_USERS, upper->value - 1));
1684 
1685 			return -EINVAL;
1686 		}
1687 	}
1688 
1689 	return 0;
1690 }
1691 
role_bounds_sanity_check(void * key,void * datum,void * datap)1692 static int role_bounds_sanity_check(void *key, void *datum, void *datap)
1693 {
1694 	struct role_datum *upper, *role;
1695 	struct policydb *p = datap;
1696 	int depth = 0;
1697 
1698 	upper = role = datum;
1699 	while (upper->bounds) {
1700 		struct ebitmap_node *node;
1701 		unsigned long bit;
1702 
1703 		if (++depth == POLICYDB_BOUNDS_MAXDEPTH) {
1704 			pr_err("SELinux: role %s: "
1705 			       "too deep or looped bounds\n",
1706 			       (char *) key);
1707 			return -EINVAL;
1708 		}
1709 
1710 		upper = p->role_val_to_struct[upper->bounds - 1];
1711 		ebitmap_for_each_positive_bit(&role->types, node, bit) {
1712 			if (ebitmap_get_bit(&upper->types, bit))
1713 				continue;
1714 
1715 			pr_err("SELinux: boundary violated policy: "
1716 			       "role=%s type=%s bounds=%s\n",
1717 			       sym_name(p, SYM_ROLES, role->value - 1),
1718 			       sym_name(p, SYM_TYPES, bit),
1719 			       sym_name(p, SYM_ROLES, upper->value - 1));
1720 
1721 			return -EINVAL;
1722 		}
1723 	}
1724 
1725 	return 0;
1726 }
1727 
type_bounds_sanity_check(void * key,void * datum,void * datap)1728 static int type_bounds_sanity_check(void *key, void *datum, void *datap)
1729 {
1730 	struct type_datum *upper;
1731 	struct policydb *p = datap;
1732 	int depth = 0;
1733 
1734 	upper = datum;
1735 	while (upper->bounds) {
1736 		if (++depth == POLICYDB_BOUNDS_MAXDEPTH) {
1737 			pr_err("SELinux: type %s: "
1738 			       "too deep or looped boundary\n",
1739 			       (char *) key);
1740 			return -EINVAL;
1741 		}
1742 
1743 		upper = p->type_val_to_struct[upper->bounds - 1];
1744 		BUG_ON(!upper);
1745 
1746 		if (upper->attribute) {
1747 			pr_err("SELinux: type %s: "
1748 			       "bounded by attribute %s",
1749 			       (char *) key,
1750 			       sym_name(p, SYM_TYPES, upper->value - 1));
1751 			return -EINVAL;
1752 		}
1753 	}
1754 
1755 	return 0;
1756 }
1757 
policydb_bounds_sanity_check(struct policydb * p)1758 static int policydb_bounds_sanity_check(struct policydb *p)
1759 {
1760 	int rc;
1761 
1762 	if (p->policyvers < POLICYDB_VERSION_BOUNDARY)
1763 		return 0;
1764 
1765 	rc = hashtab_map(&p->p_users.table, user_bounds_sanity_check, p);
1766 	if (rc)
1767 		return rc;
1768 
1769 	rc = hashtab_map(&p->p_roles.table, role_bounds_sanity_check, p);
1770 	if (rc)
1771 		return rc;
1772 
1773 	rc = hashtab_map(&p->p_types.table, type_bounds_sanity_check, p);
1774 	if (rc)
1775 		return rc;
1776 
1777 	return 0;
1778 }
1779 
string_to_security_class(struct policydb * p,const char * name)1780 u16 string_to_security_class(struct policydb *p, const char *name)
1781 {
1782 	struct class_datum *cladatum;
1783 
1784 	cladatum = symtab_search(&p->p_classes, name);
1785 	if (!cladatum)
1786 		return 0;
1787 
1788 	return cladatum->value;
1789 }
1790 
string_to_av_perm(struct policydb * p,u16 tclass,const char * name)1791 u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name)
1792 {
1793 	struct class_datum *cladatum;
1794 	struct perm_datum *perdatum = NULL;
1795 	struct common_datum *comdatum;
1796 
1797 	if (!tclass || tclass > p->p_classes.nprim)
1798 		return 0;
1799 
1800 	cladatum = p->class_val_to_struct[tclass-1];
1801 	comdatum = cladatum->comdatum;
1802 	if (comdatum)
1803 		perdatum = symtab_search(&comdatum->permissions, name);
1804 	if (!perdatum)
1805 		perdatum = symtab_search(&cladatum->permissions, name);
1806 	if (!perdatum)
1807 		return 0;
1808 
1809 	return 1U << (perdatum->value-1);
1810 }
1811 
range_read(struct policydb * p,void * fp)1812 static int range_read(struct policydb *p, void *fp)
1813 {
1814 	struct range_trans *rt = NULL;
1815 	struct mls_range *r = NULL;
1816 	int i, rc;
1817 	__le32 buf[2];
1818 	u32 nel;
1819 
1820 	if (p->policyvers < POLICYDB_VERSION_MLS)
1821 		return 0;
1822 
1823 	rc = next_entry(buf, fp, sizeof(u32));
1824 	if (rc)
1825 		return rc;
1826 
1827 	nel = le32_to_cpu(buf[0]);
1828 
1829 	rc = hashtab_init(&p->range_tr, nel);
1830 	if (rc)
1831 		return rc;
1832 
1833 	for (i = 0; i < nel; i++) {
1834 		rc = -ENOMEM;
1835 		rt = kzalloc(sizeof(*rt), GFP_KERNEL);
1836 		if (!rt)
1837 			goto out;
1838 
1839 		rc = next_entry(buf, fp, (sizeof(u32) * 2));
1840 		if (rc)
1841 			goto out;
1842 
1843 		rt->source_type = le32_to_cpu(buf[0]);
1844 		rt->target_type = le32_to_cpu(buf[1]);
1845 		if (p->policyvers >= POLICYDB_VERSION_RANGETRANS) {
1846 			rc = next_entry(buf, fp, sizeof(u32));
1847 			if (rc)
1848 				goto out;
1849 			rt->target_class = le32_to_cpu(buf[0]);
1850 		} else
1851 			rt->target_class = p->process_class;
1852 
1853 		rc = -EINVAL;
1854 		if (!policydb_type_isvalid(p, rt->source_type) ||
1855 		    !policydb_type_isvalid(p, rt->target_type) ||
1856 		    !policydb_class_isvalid(p, rt->target_class))
1857 			goto out;
1858 
1859 		rc = -ENOMEM;
1860 		r = kzalloc(sizeof(*r), GFP_KERNEL);
1861 		if (!r)
1862 			goto out;
1863 
1864 		rc = mls_read_range_helper(r, fp);
1865 		if (rc)
1866 			goto out;
1867 
1868 		rc = -EINVAL;
1869 		if (!mls_range_isvalid(p, r)) {
1870 			pr_warn("SELinux:  rangetrans:  invalid range\n");
1871 			goto out;
1872 		}
1873 
1874 		rc = hashtab_insert(&p->range_tr, rt, r, rangetr_key_params);
1875 		if (rc)
1876 			goto out;
1877 
1878 		rt = NULL;
1879 		r = NULL;
1880 	}
1881 	hash_eval(&p->range_tr, "rangetr");
1882 	rc = 0;
1883 out:
1884 	kfree(rt);
1885 	kfree(r);
1886 	return rc;
1887 }
1888 
filename_trans_read_helper_compat(struct policydb * p,void * fp)1889 static int filename_trans_read_helper_compat(struct policydb *p, void *fp)
1890 {
1891 	struct filename_trans_key key, *ft = NULL;
1892 	struct filename_trans_datum *last, *datum = NULL;
1893 	char *name = NULL;
1894 	u32 len, stype, otype;
1895 	__le32 buf[4];
1896 	int rc;
1897 
1898 	/* length of the path component string */
1899 	rc = next_entry(buf, fp, sizeof(u32));
1900 	if (rc)
1901 		return rc;
1902 	len = le32_to_cpu(buf[0]);
1903 
1904 	/* path component string */
1905 	rc = str_read(&name, GFP_KERNEL, fp, len);
1906 	if (rc)
1907 		return rc;
1908 
1909 	rc = next_entry(buf, fp, sizeof(u32) * 4);
1910 	if (rc)
1911 		goto out;
1912 
1913 	stype = le32_to_cpu(buf[0]);
1914 	key.ttype = le32_to_cpu(buf[1]);
1915 	key.tclass = le32_to_cpu(buf[2]);
1916 	key.name = name;
1917 
1918 	otype = le32_to_cpu(buf[3]);
1919 
1920 	last = NULL;
1921 	datum = policydb_filenametr_search(p, &key);
1922 	while (datum) {
1923 		if (unlikely(ebitmap_get_bit(&datum->stypes, stype - 1))) {
1924 			/* conflicting/duplicate rules are ignored */
1925 			datum = NULL;
1926 			goto out;
1927 		}
1928 		if (likely(datum->otype == otype))
1929 			break;
1930 		last = datum;
1931 		datum = datum->next;
1932 	}
1933 	if (!datum) {
1934 		rc = -ENOMEM;
1935 		datum = kmalloc(sizeof(*datum), GFP_KERNEL);
1936 		if (!datum)
1937 			goto out;
1938 
1939 		ebitmap_init(&datum->stypes);
1940 		datum->otype = otype;
1941 		datum->next = NULL;
1942 
1943 		if (unlikely(last)) {
1944 			last->next = datum;
1945 		} else {
1946 			rc = -ENOMEM;
1947 			ft = kmemdup(&key, sizeof(key), GFP_KERNEL);
1948 			if (!ft)
1949 				goto out;
1950 
1951 			rc = hashtab_insert(&p->filename_trans, ft, datum,
1952 					    filenametr_key_params);
1953 			if (rc)
1954 				goto out;
1955 			name = NULL;
1956 
1957 			rc = ebitmap_set_bit(&p->filename_trans_ttypes,
1958 					     key.ttype, 1);
1959 			if (rc)
1960 				return rc;
1961 		}
1962 	}
1963 	kfree(name);
1964 	return ebitmap_set_bit(&datum->stypes, stype - 1, 1);
1965 
1966 out:
1967 	kfree(ft);
1968 	kfree(name);
1969 	kfree(datum);
1970 	return rc;
1971 }
1972 
filename_trans_read_helper(struct policydb * p,void * fp)1973 static int filename_trans_read_helper(struct policydb *p, void *fp)
1974 {
1975 	struct filename_trans_key *ft = NULL;
1976 	struct filename_trans_datum **dst, *datum, *first = NULL;
1977 	char *name = NULL;
1978 	u32 len, ttype, tclass, ndatum, i;
1979 	__le32 buf[3];
1980 	int rc;
1981 
1982 	/* length of the path component string */
1983 	rc = next_entry(buf, fp, sizeof(u32));
1984 	if (rc)
1985 		return rc;
1986 	len = le32_to_cpu(buf[0]);
1987 
1988 	/* path component string */
1989 	rc = str_read(&name, GFP_KERNEL, fp, len);
1990 	if (rc)
1991 		return rc;
1992 
1993 	rc = next_entry(buf, fp, sizeof(u32) * 3);
1994 	if (rc)
1995 		goto out;
1996 
1997 	ttype = le32_to_cpu(buf[0]);
1998 	tclass = le32_to_cpu(buf[1]);
1999 
2000 	ndatum = le32_to_cpu(buf[2]);
2001 	if (ndatum == 0) {
2002 		pr_err("SELinux:  Filename transition key with no datum\n");
2003 		rc = -ENOENT;
2004 		goto out;
2005 	}
2006 
2007 	dst = &first;
2008 	for (i = 0; i < ndatum; i++) {
2009 		rc = -ENOMEM;
2010 		datum = kmalloc(sizeof(*datum), GFP_KERNEL);
2011 		if (!datum)
2012 			goto out;
2013 
2014 		datum->next = NULL;
2015 		*dst = datum;
2016 
2017 		/* ebitmap_read() will at least init the bitmap */
2018 		rc = ebitmap_read(&datum->stypes, fp);
2019 		if (rc)
2020 			goto out;
2021 
2022 		rc = next_entry(buf, fp, sizeof(u32));
2023 		if (rc)
2024 			goto out;
2025 
2026 		datum->otype = le32_to_cpu(buf[0]);
2027 
2028 		dst = &datum->next;
2029 	}
2030 
2031 	rc = -ENOMEM;
2032 	ft = kmalloc(sizeof(*ft), GFP_KERNEL);
2033 	if (!ft)
2034 		goto out;
2035 
2036 	ft->ttype = ttype;
2037 	ft->tclass = tclass;
2038 	ft->name = name;
2039 
2040 	rc = hashtab_insert(&p->filename_trans, ft, first,
2041 			    filenametr_key_params);
2042 	if (rc == -EEXIST)
2043 		pr_err("SELinux:  Duplicate filename transition key\n");
2044 	if (rc)
2045 		goto out;
2046 
2047 	return ebitmap_set_bit(&p->filename_trans_ttypes, ttype, 1);
2048 
2049 out:
2050 	kfree(ft);
2051 	kfree(name);
2052 	while (first) {
2053 		datum = first;
2054 		first = first->next;
2055 
2056 		ebitmap_destroy(&datum->stypes);
2057 		kfree(datum);
2058 	}
2059 	return rc;
2060 }
2061 
filename_trans_read(struct policydb * p,void * fp)2062 static int filename_trans_read(struct policydb *p, void *fp)
2063 {
2064 	u32 nel;
2065 	__le32 buf[1];
2066 	int rc, i;
2067 
2068 	if (p->policyvers < POLICYDB_VERSION_FILENAME_TRANS)
2069 		return 0;
2070 
2071 	rc = next_entry(buf, fp, sizeof(u32));
2072 	if (rc)
2073 		return rc;
2074 	nel = le32_to_cpu(buf[0]);
2075 
2076 	if (p->policyvers < POLICYDB_VERSION_COMP_FTRANS) {
2077 		p->compat_filename_trans_count = nel;
2078 
2079 		rc = hashtab_init(&p->filename_trans, (1 << 11));
2080 		if (rc)
2081 			return rc;
2082 
2083 		for (i = 0; i < nel; i++) {
2084 			rc = filename_trans_read_helper_compat(p, fp);
2085 			if (rc)
2086 				return rc;
2087 		}
2088 	} else {
2089 		rc = hashtab_init(&p->filename_trans, nel);
2090 		if (rc)
2091 			return rc;
2092 
2093 		for (i = 0; i < nel; i++) {
2094 			rc = filename_trans_read_helper(p, fp);
2095 			if (rc)
2096 				return rc;
2097 		}
2098 	}
2099 	hash_eval(&p->filename_trans, "filenametr");
2100 	return 0;
2101 }
2102 
genfs_read(struct policydb * p,void * fp)2103 static int genfs_read(struct policydb *p, void *fp)
2104 {
2105 	int i, j, rc;
2106 	u32 nel, nel2, len, len2;
2107 	__le32 buf[1];
2108 	struct ocontext *l, *c;
2109 	struct ocontext *newc = NULL;
2110 	struct genfs *genfs_p, *genfs;
2111 	struct genfs *newgenfs = NULL;
2112 
2113 	rc = next_entry(buf, fp, sizeof(u32));
2114 	if (rc)
2115 		return rc;
2116 	nel = le32_to_cpu(buf[0]);
2117 
2118 	for (i = 0; i < nel; i++) {
2119 		rc = next_entry(buf, fp, sizeof(u32));
2120 		if (rc)
2121 			goto out;
2122 		len = le32_to_cpu(buf[0]);
2123 
2124 		rc = -ENOMEM;
2125 		newgenfs = kzalloc(sizeof(*newgenfs), GFP_KERNEL);
2126 		if (!newgenfs)
2127 			goto out;
2128 
2129 		rc = str_read(&newgenfs->fstype, GFP_KERNEL, fp, len);
2130 		if (rc)
2131 			goto out;
2132 
2133 		for (genfs_p = NULL, genfs = p->genfs; genfs;
2134 		     genfs_p = genfs, genfs = genfs->next) {
2135 			rc = -EINVAL;
2136 			if (strcmp(newgenfs->fstype, genfs->fstype) == 0) {
2137 				pr_err("SELinux:  dup genfs fstype %s\n",
2138 				       newgenfs->fstype);
2139 				goto out;
2140 			}
2141 			if (strcmp(newgenfs->fstype, genfs->fstype) < 0)
2142 				break;
2143 		}
2144 		newgenfs->next = genfs;
2145 		if (genfs_p)
2146 			genfs_p->next = newgenfs;
2147 		else
2148 			p->genfs = newgenfs;
2149 		genfs = newgenfs;
2150 		newgenfs = NULL;
2151 
2152 		rc = next_entry(buf, fp, sizeof(u32));
2153 		if (rc)
2154 			goto out;
2155 
2156 		nel2 = le32_to_cpu(buf[0]);
2157 		for (j = 0; j < nel2; j++) {
2158 			rc = next_entry(buf, fp, sizeof(u32));
2159 			if (rc)
2160 				goto out;
2161 			len = le32_to_cpu(buf[0]);
2162 
2163 			rc = -ENOMEM;
2164 			newc = kzalloc(sizeof(*newc), GFP_KERNEL);
2165 			if (!newc)
2166 				goto out;
2167 
2168 			rc = str_read(&newc->u.name, GFP_KERNEL, fp, len);
2169 			if (rc)
2170 				goto out;
2171 
2172 			rc = next_entry(buf, fp, sizeof(u32));
2173 			if (rc)
2174 				goto out;
2175 
2176 			newc->v.sclass = le32_to_cpu(buf[0]);
2177 			rc = context_read_and_validate(&newc->context[0], p, fp);
2178 			if (rc)
2179 				goto out;
2180 
2181 			for (l = NULL, c = genfs->head; c;
2182 			     l = c, c = c->next) {
2183 				rc = -EINVAL;
2184 				if (!strcmp(newc->u.name, c->u.name) &&
2185 				    (!c->v.sclass || !newc->v.sclass ||
2186 				     newc->v.sclass == c->v.sclass)) {
2187 					pr_err("SELinux:  dup genfs entry (%s,%s)\n",
2188 					       genfs->fstype, c->u.name);
2189 					goto out;
2190 				}
2191 				len = strlen(newc->u.name);
2192 				len2 = strlen(c->u.name);
2193 				if (len > len2)
2194 					break;
2195 			}
2196 
2197 			newc->next = c;
2198 			if (l)
2199 				l->next = newc;
2200 			else
2201 				genfs->head = newc;
2202 			newc = NULL;
2203 		}
2204 	}
2205 	rc = 0;
2206 out:
2207 	if (newgenfs) {
2208 		kfree(newgenfs->fstype);
2209 		kfree(newgenfs);
2210 	}
2211 	ocontext_destroy(newc, OCON_FSUSE);
2212 
2213 	return rc;
2214 }
2215 
ocontext_read(struct policydb * p,struct policydb_compat_info * info,void * fp)2216 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info,
2217 			 void *fp)
2218 {
2219 	int i, j, rc;
2220 	u32 nel, len;
2221 	__be64 prefixbuf[1];
2222 	__le32 buf[3];
2223 	struct ocontext *l, *c;
2224 	u32 nodebuf[8];
2225 
2226 	for (i = 0; i < info->ocon_num; i++) {
2227 		rc = next_entry(buf, fp, sizeof(u32));
2228 		if (rc)
2229 			goto out;
2230 		nel = le32_to_cpu(buf[0]);
2231 
2232 		l = NULL;
2233 		for (j = 0; j < nel; j++) {
2234 			rc = -ENOMEM;
2235 			c = kzalloc(sizeof(*c), GFP_KERNEL);
2236 			if (!c)
2237 				goto out;
2238 			if (l)
2239 				l->next = c;
2240 			else
2241 				p->ocontexts[i] = c;
2242 			l = c;
2243 
2244 			switch (i) {
2245 			case OCON_ISID:
2246 				rc = next_entry(buf, fp, sizeof(u32));
2247 				if (rc)
2248 					goto out;
2249 
2250 				c->sid[0] = le32_to_cpu(buf[0]);
2251 				rc = context_read_and_validate(&c->context[0], p, fp);
2252 				if (rc)
2253 					goto out;
2254 				break;
2255 			case OCON_FS:
2256 			case OCON_NETIF:
2257 				rc = next_entry(buf, fp, sizeof(u32));
2258 				if (rc)
2259 					goto out;
2260 				len = le32_to_cpu(buf[0]);
2261 
2262 				rc = str_read(&c->u.name, GFP_KERNEL, fp, len);
2263 				if (rc)
2264 					goto out;
2265 
2266 				rc = context_read_and_validate(&c->context[0], p, fp);
2267 				if (rc)
2268 					goto out;
2269 				rc = context_read_and_validate(&c->context[1], p, fp);
2270 				if (rc)
2271 					goto out;
2272 				break;
2273 			case OCON_PORT:
2274 				rc = next_entry(buf, fp, sizeof(u32)*3);
2275 				if (rc)
2276 					goto out;
2277 				c->u.port.protocol = le32_to_cpu(buf[0]);
2278 				c->u.port.low_port = le32_to_cpu(buf[1]);
2279 				c->u.port.high_port = le32_to_cpu(buf[2]);
2280 				rc = context_read_and_validate(&c->context[0], p, fp);
2281 				if (rc)
2282 					goto out;
2283 				break;
2284 			case OCON_NODE:
2285 				rc = next_entry(nodebuf, fp, sizeof(u32) * 2);
2286 				if (rc)
2287 					goto out;
2288 				c->u.node.addr = nodebuf[0]; /* network order */
2289 				c->u.node.mask = nodebuf[1]; /* network order */
2290 				rc = context_read_and_validate(&c->context[0], p, fp);
2291 				if (rc)
2292 					goto out;
2293 				break;
2294 			case OCON_FSUSE:
2295 				rc = next_entry(buf, fp, sizeof(u32)*2);
2296 				if (rc)
2297 					goto out;
2298 
2299 				rc = -EINVAL;
2300 				c->v.behavior = le32_to_cpu(buf[0]);
2301 				/* Determined at runtime, not in policy DB. */
2302 				if (c->v.behavior == SECURITY_FS_USE_MNTPOINT)
2303 					goto out;
2304 				if (c->v.behavior > SECURITY_FS_USE_MAX)
2305 					goto out;
2306 
2307 				len = le32_to_cpu(buf[1]);
2308 				rc = str_read(&c->u.name, GFP_KERNEL, fp, len);
2309 				if (rc)
2310 					goto out;
2311 
2312 				rc = context_read_and_validate(&c->context[0], p, fp);
2313 				if (rc)
2314 					goto out;
2315 				break;
2316 			case OCON_NODE6: {
2317 				int k;
2318 
2319 				rc = next_entry(nodebuf, fp, sizeof(u32) * 8);
2320 				if (rc)
2321 					goto out;
2322 				for (k = 0; k < 4; k++)
2323 					c->u.node6.addr[k] = nodebuf[k];
2324 				for (k = 0; k < 4; k++)
2325 					c->u.node6.mask[k] = nodebuf[k+4];
2326 				rc = context_read_and_validate(&c->context[0], p, fp);
2327 				if (rc)
2328 					goto out;
2329 				break;
2330 			}
2331 			case OCON_IBPKEY: {
2332 				u32 pkey_lo, pkey_hi;
2333 
2334 				rc = next_entry(prefixbuf, fp, sizeof(u64));
2335 				if (rc)
2336 					goto out;
2337 
2338 				/* we need to have subnet_prefix in CPU order */
2339 				c->u.ibpkey.subnet_prefix = be64_to_cpu(prefixbuf[0]);
2340 
2341 				rc = next_entry(buf, fp, sizeof(u32) * 2);
2342 				if (rc)
2343 					goto out;
2344 
2345 				pkey_lo = le32_to_cpu(buf[0]);
2346 				pkey_hi = le32_to_cpu(buf[1]);
2347 
2348 				if (pkey_lo > U16_MAX || pkey_hi > U16_MAX) {
2349 					rc = -EINVAL;
2350 					goto out;
2351 				}
2352 
2353 				c->u.ibpkey.low_pkey  = pkey_lo;
2354 				c->u.ibpkey.high_pkey = pkey_hi;
2355 
2356 				rc = context_read_and_validate(&c->context[0],
2357 							       p,
2358 							       fp);
2359 				if (rc)
2360 					goto out;
2361 				break;
2362 			}
2363 			case OCON_IBENDPORT: {
2364 				u32 port;
2365 
2366 				rc = next_entry(buf, fp, sizeof(u32) * 2);
2367 				if (rc)
2368 					goto out;
2369 				len = le32_to_cpu(buf[0]);
2370 
2371 				rc = str_read(&c->u.ibendport.dev_name, GFP_KERNEL, fp, len);
2372 				if (rc)
2373 					goto out;
2374 
2375 				port = le32_to_cpu(buf[1]);
2376 				if (port > U8_MAX || port == 0) {
2377 					rc = -EINVAL;
2378 					goto out;
2379 				}
2380 
2381 				c->u.ibendport.port = port;
2382 
2383 				rc = context_read_and_validate(&c->context[0],
2384 							       p,
2385 							       fp);
2386 				if (rc)
2387 					goto out;
2388 				break;
2389 			} /* end case */
2390 			} /* end switch */
2391 		}
2392 	}
2393 	rc = 0;
2394 out:
2395 	return rc;
2396 }
2397 
2398 /*
2399  * Read the configuration data from a policy database binary
2400  * representation file into a policy database structure.
2401  */
policydb_read(struct policydb * p,void * fp)2402 int policydb_read(struct policydb *p, void *fp)
2403 {
2404 	struct role_allow *ra, *lra;
2405 	struct role_trans_key *rtk = NULL;
2406 	struct role_trans_datum *rtd = NULL;
2407 	int i, j, rc;
2408 	__le32 buf[4];
2409 	u32 len, nprim, nel, perm;
2410 
2411 	char *policydb_str;
2412 	struct policydb_compat_info *info;
2413 
2414 	policydb_init(p);
2415 
2416 	/* Read the magic number and string length. */
2417 	rc = next_entry(buf, fp, sizeof(u32) * 2);
2418 	if (rc)
2419 		goto bad;
2420 
2421 	rc = -EINVAL;
2422 	if (le32_to_cpu(buf[0]) != POLICYDB_MAGIC) {
2423 		pr_err("SELinux:  policydb magic number 0x%x does "
2424 		       "not match expected magic number 0x%x\n",
2425 		       le32_to_cpu(buf[0]), POLICYDB_MAGIC);
2426 		goto bad;
2427 	}
2428 
2429 	rc = -EINVAL;
2430 	len = le32_to_cpu(buf[1]);
2431 	if (len != strlen(POLICYDB_STRING)) {
2432 		pr_err("SELinux:  policydb string length %d does not "
2433 		       "match expected length %zu\n",
2434 		       len, strlen(POLICYDB_STRING));
2435 		goto bad;
2436 	}
2437 
2438 	rc = -ENOMEM;
2439 	policydb_str = kmalloc(len + 1, GFP_KERNEL);
2440 	if (!policydb_str) {
2441 		pr_err("SELinux:  unable to allocate memory for policydb "
2442 		       "string of length %d\n", len);
2443 		goto bad;
2444 	}
2445 
2446 	rc = next_entry(policydb_str, fp, len);
2447 	if (rc) {
2448 		pr_err("SELinux:  truncated policydb string identifier\n");
2449 		kfree(policydb_str);
2450 		goto bad;
2451 	}
2452 
2453 	rc = -EINVAL;
2454 	policydb_str[len] = '\0';
2455 	if (strcmp(policydb_str, POLICYDB_STRING)) {
2456 		pr_err("SELinux:  policydb string %s does not match "
2457 		       "my string %s\n", policydb_str, POLICYDB_STRING);
2458 		kfree(policydb_str);
2459 		goto bad;
2460 	}
2461 	/* Done with policydb_str. */
2462 	kfree(policydb_str);
2463 	policydb_str = NULL;
2464 
2465 	/* Read the version and table sizes. */
2466 	rc = next_entry(buf, fp, sizeof(u32)*4);
2467 	if (rc)
2468 		goto bad;
2469 
2470 	rc = -EINVAL;
2471 	p->policyvers = le32_to_cpu(buf[0]);
2472 	if (p->policyvers < POLICYDB_VERSION_MIN ||
2473 	    p->policyvers > POLICYDB_VERSION_MAX) {
2474 		pr_err("SELinux:  policydb version %d does not match "
2475 		       "my version range %d-%d\n",
2476 		       le32_to_cpu(buf[0]), POLICYDB_VERSION_MIN, POLICYDB_VERSION_MAX);
2477 		goto bad;
2478 	}
2479 
2480 	if ((le32_to_cpu(buf[1]) & POLICYDB_CONFIG_MLS)) {
2481 		p->mls_enabled = 1;
2482 
2483 		rc = -EINVAL;
2484 		if (p->policyvers < POLICYDB_VERSION_MLS) {
2485 			pr_err("SELinux: security policydb version %d "
2486 				"(MLS) not backwards compatible\n",
2487 				p->policyvers);
2488 			goto bad;
2489 		}
2490 	}
2491 	p->reject_unknown = !!(le32_to_cpu(buf[1]) & REJECT_UNKNOWN);
2492 	p->allow_unknown = !!(le32_to_cpu(buf[1]) & ALLOW_UNKNOWN);
2493 
2494 	if ((le32_to_cpu(buf[1]) & POLICYDB_CONFIG_ANDROID_NETLINK_ROUTE)) {
2495 		p->android_netlink_route = 1;
2496 	}
2497 
2498 	if ((le32_to_cpu(buf[1]) & POLICYDB_CONFIG_ANDROID_NETLINK_GETNEIGH)) {
2499 		p->android_netlink_getneigh = 1;
2500 	}
2501 
2502 	if (p->policyvers >= POLICYDB_VERSION_POLCAP) {
2503 		rc = ebitmap_read(&p->policycaps, fp);
2504 		if (rc)
2505 			goto bad;
2506 	}
2507 
2508 	if (p->policyvers >= POLICYDB_VERSION_PERMISSIVE) {
2509 		rc = ebitmap_read(&p->permissive_map, fp);
2510 		if (rc)
2511 			goto bad;
2512 	}
2513 
2514 	rc = -EINVAL;
2515 	info = policydb_lookup_compat(p->policyvers);
2516 	if (!info) {
2517 		pr_err("SELinux:  unable to find policy compat info "
2518 		       "for version %d\n", p->policyvers);
2519 		goto bad;
2520 	}
2521 
2522 	rc = -EINVAL;
2523 	if (le32_to_cpu(buf[2]) != info->sym_num ||
2524 		le32_to_cpu(buf[3]) != info->ocon_num) {
2525 		pr_err("SELinux:  policydb table sizes (%d,%d) do "
2526 		       "not match mine (%d,%d)\n", le32_to_cpu(buf[2]),
2527 			le32_to_cpu(buf[3]),
2528 		       info->sym_num, info->ocon_num);
2529 		goto bad;
2530 	}
2531 
2532 	for (i = 0; i < info->sym_num; i++) {
2533 		rc = next_entry(buf, fp, sizeof(u32)*2);
2534 		if (rc)
2535 			goto bad;
2536 		nprim = le32_to_cpu(buf[0]);
2537 		nel = le32_to_cpu(buf[1]);
2538 
2539 		rc = symtab_init(&p->symtab[i], nel);
2540 		if (rc)
2541 			goto out;
2542 
2543 		if (i == SYM_ROLES) {
2544 			rc = roles_init(p);
2545 			if (rc)
2546 				goto out;
2547 		}
2548 
2549 		for (j = 0; j < nel; j++) {
2550 			rc = read_f[i](p, &p->symtab[i], fp);
2551 			if (rc)
2552 				goto bad;
2553 		}
2554 
2555 		p->symtab[i].nprim = nprim;
2556 	}
2557 
2558 	rc = -EINVAL;
2559 	p->process_class = string_to_security_class(p, "process");
2560 	if (!p->process_class) {
2561 		pr_err("SELinux: process class is required, not defined in policy\n");
2562 		goto bad;
2563 	}
2564 
2565 	rc = avtab_read(&p->te_avtab, fp, p);
2566 	if (rc)
2567 		goto bad;
2568 
2569 	if (p->policyvers >= POLICYDB_VERSION_BOOL) {
2570 		rc = cond_read_list(p, fp);
2571 		if (rc)
2572 			goto bad;
2573 	}
2574 
2575 	rc = next_entry(buf, fp, sizeof(u32));
2576 	if (rc)
2577 		goto bad;
2578 	nel = le32_to_cpu(buf[0]);
2579 
2580 	rc = hashtab_init(&p->role_tr, nel);
2581 	if (rc)
2582 		goto bad;
2583 	for (i = 0; i < nel; i++) {
2584 		rc = -ENOMEM;
2585 		rtk = kmalloc(sizeof(*rtk), GFP_KERNEL);
2586 		if (!rtk)
2587 			goto bad;
2588 
2589 		rc = -ENOMEM;
2590 		rtd = kmalloc(sizeof(*rtd), GFP_KERNEL);
2591 		if (!rtd)
2592 			goto bad;
2593 
2594 		rc = next_entry(buf, fp, sizeof(u32)*3);
2595 		if (rc)
2596 			goto bad;
2597 
2598 		rtk->role = le32_to_cpu(buf[0]);
2599 		rtk->type = le32_to_cpu(buf[1]);
2600 		rtd->new_role = le32_to_cpu(buf[2]);
2601 		if (p->policyvers >= POLICYDB_VERSION_ROLETRANS) {
2602 			rc = next_entry(buf, fp, sizeof(u32));
2603 			if (rc)
2604 				goto bad;
2605 			rtk->tclass = le32_to_cpu(buf[0]);
2606 		} else
2607 			rtk->tclass = p->process_class;
2608 
2609 		rc = -EINVAL;
2610 		if (!policydb_role_isvalid(p, rtk->role) ||
2611 		    !policydb_type_isvalid(p, rtk->type) ||
2612 		    !policydb_class_isvalid(p, rtk->tclass) ||
2613 		    !policydb_role_isvalid(p, rtd->new_role))
2614 			goto bad;
2615 
2616 		rc = hashtab_insert(&p->role_tr, rtk, rtd, roletr_key_params);
2617 		if (rc)
2618 			goto bad;
2619 
2620 		rtk = NULL;
2621 		rtd = NULL;
2622 	}
2623 
2624 	rc = next_entry(buf, fp, sizeof(u32));
2625 	if (rc)
2626 		goto bad;
2627 	nel = le32_to_cpu(buf[0]);
2628 	lra = NULL;
2629 	for (i = 0; i < nel; i++) {
2630 		rc = -ENOMEM;
2631 		ra = kzalloc(sizeof(*ra), GFP_KERNEL);
2632 		if (!ra)
2633 			goto bad;
2634 		if (lra)
2635 			lra->next = ra;
2636 		else
2637 			p->role_allow = ra;
2638 		rc = next_entry(buf, fp, sizeof(u32)*2);
2639 		if (rc)
2640 			goto bad;
2641 
2642 		rc = -EINVAL;
2643 		ra->role = le32_to_cpu(buf[0]);
2644 		ra->new_role = le32_to_cpu(buf[1]);
2645 		if (!policydb_role_isvalid(p, ra->role) ||
2646 		    !policydb_role_isvalid(p, ra->new_role))
2647 			goto bad;
2648 		lra = ra;
2649 	}
2650 
2651 	rc = filename_trans_read(p, fp);
2652 	if (rc)
2653 		goto bad;
2654 
2655 	rc = policydb_index(p);
2656 	if (rc)
2657 		goto bad;
2658 
2659 	rc = -EINVAL;
2660 	perm = string_to_av_perm(p, p->process_class, "transition");
2661 	if (!perm) {
2662 		pr_err("SELinux: process transition permission is required, not defined in policy\n");
2663 		goto bad;
2664 	}
2665 	p->process_trans_perms = perm;
2666 	perm = string_to_av_perm(p, p->process_class, "dyntransition");
2667 	if (!perm) {
2668 		pr_err("SELinux: process dyntransition permission is required, not defined in policy\n");
2669 		goto bad;
2670 	}
2671 	p->process_trans_perms |= perm;
2672 
2673 	rc = ocontext_read(p, info, fp);
2674 	if (rc)
2675 		goto bad;
2676 
2677 	rc = genfs_read(p, fp);
2678 	if (rc)
2679 		goto bad;
2680 
2681 	rc = range_read(p, fp);
2682 	if (rc)
2683 		goto bad;
2684 
2685 	rc = -ENOMEM;
2686 	p->type_attr_map_array = kvcalloc(p->p_types.nprim,
2687 					  sizeof(*p->type_attr_map_array),
2688 					  GFP_KERNEL);
2689 	if (!p->type_attr_map_array)
2690 		goto bad;
2691 
2692 	/* just in case ebitmap_init() becomes more than just a memset(0): */
2693 	for (i = 0; i < p->p_types.nprim; i++)
2694 		ebitmap_init(&p->type_attr_map_array[i]);
2695 
2696 	for (i = 0; i < p->p_types.nprim; i++) {
2697 		struct ebitmap *e = &p->type_attr_map_array[i];
2698 
2699 		if (p->policyvers >= POLICYDB_VERSION_AVTAB) {
2700 			rc = ebitmap_read(e, fp);
2701 			if (rc)
2702 				goto bad;
2703 		}
2704 		/* add the type itself as the degenerate case */
2705 		rc = ebitmap_set_bit(e, i, 1);
2706 		if (rc)
2707 			goto bad;
2708 	}
2709 
2710 	rc = policydb_bounds_sanity_check(p);
2711 	if (rc)
2712 		goto bad;
2713 
2714 	rc = 0;
2715 out:
2716 	return rc;
2717 bad:
2718 	kfree(rtk);
2719 	kfree(rtd);
2720 	policydb_destroy(p);
2721 	goto out;
2722 }
2723 
2724 /*
2725  * Write a MLS level structure to a policydb binary
2726  * representation file.
2727  */
mls_write_level(struct mls_level * l,void * fp)2728 static int mls_write_level(struct mls_level *l, void *fp)
2729 {
2730 	__le32 buf[1];
2731 	int rc;
2732 
2733 	buf[0] = cpu_to_le32(l->sens);
2734 	rc = put_entry(buf, sizeof(u32), 1, fp);
2735 	if (rc)
2736 		return rc;
2737 
2738 	rc = ebitmap_write(&l->cat, fp);
2739 	if (rc)
2740 		return rc;
2741 
2742 	return 0;
2743 }
2744 
2745 /*
2746  * Write a MLS range structure to a policydb binary
2747  * representation file.
2748  */
mls_write_range_helper(struct mls_range * r,void * fp)2749 static int mls_write_range_helper(struct mls_range *r, void *fp)
2750 {
2751 	__le32 buf[3];
2752 	size_t items;
2753 	int rc, eq;
2754 
2755 	eq = mls_level_eq(&r->level[1], &r->level[0]);
2756 
2757 	if (eq)
2758 		items = 2;
2759 	else
2760 		items = 3;
2761 	buf[0] = cpu_to_le32(items-1);
2762 	buf[1] = cpu_to_le32(r->level[0].sens);
2763 	if (!eq)
2764 		buf[2] = cpu_to_le32(r->level[1].sens);
2765 
2766 	BUG_ON(items > ARRAY_SIZE(buf));
2767 
2768 	rc = put_entry(buf, sizeof(u32), items, fp);
2769 	if (rc)
2770 		return rc;
2771 
2772 	rc = ebitmap_write(&r->level[0].cat, fp);
2773 	if (rc)
2774 		return rc;
2775 	if (!eq) {
2776 		rc = ebitmap_write(&r->level[1].cat, fp);
2777 		if (rc)
2778 			return rc;
2779 	}
2780 
2781 	return 0;
2782 }
2783 
sens_write(void * vkey,void * datum,void * ptr)2784 static int sens_write(void *vkey, void *datum, void *ptr)
2785 {
2786 	char *key = vkey;
2787 	struct level_datum *levdatum = datum;
2788 	struct policy_data *pd = ptr;
2789 	void *fp = pd->fp;
2790 	__le32 buf[2];
2791 	size_t len;
2792 	int rc;
2793 
2794 	len = strlen(key);
2795 	buf[0] = cpu_to_le32(len);
2796 	buf[1] = cpu_to_le32(levdatum->isalias);
2797 	rc = put_entry(buf, sizeof(u32), 2, fp);
2798 	if (rc)
2799 		return rc;
2800 
2801 	rc = put_entry(key, 1, len, fp);
2802 	if (rc)
2803 		return rc;
2804 
2805 	rc = mls_write_level(levdatum->level, fp);
2806 	if (rc)
2807 		return rc;
2808 
2809 	return 0;
2810 }
2811 
cat_write(void * vkey,void * datum,void * ptr)2812 static int cat_write(void *vkey, void *datum, void *ptr)
2813 {
2814 	char *key = vkey;
2815 	struct cat_datum *catdatum = datum;
2816 	struct policy_data *pd = ptr;
2817 	void *fp = pd->fp;
2818 	__le32 buf[3];
2819 	size_t len;
2820 	int rc;
2821 
2822 	len = strlen(key);
2823 	buf[0] = cpu_to_le32(len);
2824 	buf[1] = cpu_to_le32(catdatum->value);
2825 	buf[2] = cpu_to_le32(catdatum->isalias);
2826 	rc = put_entry(buf, sizeof(u32), 3, fp);
2827 	if (rc)
2828 		return rc;
2829 
2830 	rc = put_entry(key, 1, len, fp);
2831 	if (rc)
2832 		return rc;
2833 
2834 	return 0;
2835 }
2836 
role_trans_write_one(void * key,void * datum,void * ptr)2837 static int role_trans_write_one(void *key, void *datum, void *ptr)
2838 {
2839 	struct role_trans_key *rtk = key;
2840 	struct role_trans_datum *rtd = datum;
2841 	struct policy_data *pd = ptr;
2842 	void *fp = pd->fp;
2843 	struct policydb *p = pd->p;
2844 	__le32 buf[3];
2845 	int rc;
2846 
2847 	buf[0] = cpu_to_le32(rtk->role);
2848 	buf[1] = cpu_to_le32(rtk->type);
2849 	buf[2] = cpu_to_le32(rtd->new_role);
2850 	rc = put_entry(buf, sizeof(u32), 3, fp);
2851 	if (rc)
2852 		return rc;
2853 	if (p->policyvers >= POLICYDB_VERSION_ROLETRANS) {
2854 		buf[0] = cpu_to_le32(rtk->tclass);
2855 		rc = put_entry(buf, sizeof(u32), 1, fp);
2856 		if (rc)
2857 			return rc;
2858 	}
2859 	return 0;
2860 }
2861 
role_trans_write(struct policydb * p,void * fp)2862 static int role_trans_write(struct policydb *p, void *fp)
2863 {
2864 	struct policy_data pd = { .p = p, .fp = fp };
2865 	__le32 buf[1];
2866 	int rc;
2867 
2868 	buf[0] = cpu_to_le32(p->role_tr.nel);
2869 	rc = put_entry(buf, sizeof(u32), 1, fp);
2870 	if (rc)
2871 		return rc;
2872 
2873 	return hashtab_map(&p->role_tr, role_trans_write_one, &pd);
2874 }
2875 
role_allow_write(struct role_allow * r,void * fp)2876 static int role_allow_write(struct role_allow *r, void *fp)
2877 {
2878 	struct role_allow *ra;
2879 	__le32 buf[2];
2880 	size_t nel;
2881 	int rc;
2882 
2883 	nel = 0;
2884 	for (ra = r; ra; ra = ra->next)
2885 		nel++;
2886 	buf[0] = cpu_to_le32(nel);
2887 	rc = put_entry(buf, sizeof(u32), 1, fp);
2888 	if (rc)
2889 		return rc;
2890 	for (ra = r; ra; ra = ra->next) {
2891 		buf[0] = cpu_to_le32(ra->role);
2892 		buf[1] = cpu_to_le32(ra->new_role);
2893 		rc = put_entry(buf, sizeof(u32), 2, fp);
2894 		if (rc)
2895 			return rc;
2896 	}
2897 	return 0;
2898 }
2899 
2900 /*
2901  * Write a security context structure
2902  * to a policydb binary representation file.
2903  */
context_write(struct policydb * p,struct context * c,void * fp)2904 static int context_write(struct policydb *p, struct context *c,
2905 			 void *fp)
2906 {
2907 	int rc;
2908 	__le32 buf[3];
2909 
2910 	buf[0] = cpu_to_le32(c->user);
2911 	buf[1] = cpu_to_le32(c->role);
2912 	buf[2] = cpu_to_le32(c->type);
2913 
2914 	rc = put_entry(buf, sizeof(u32), 3, fp);
2915 	if (rc)
2916 		return rc;
2917 
2918 	rc = mls_write_range_helper(&c->range, fp);
2919 	if (rc)
2920 		return rc;
2921 
2922 	return 0;
2923 }
2924 
2925 /*
2926  * The following *_write functions are used to
2927  * write the symbol data to a policy database
2928  * binary representation file.
2929  */
2930 
perm_write(void * vkey,void * datum,void * fp)2931 static int perm_write(void *vkey, void *datum, void *fp)
2932 {
2933 	char *key = vkey;
2934 	struct perm_datum *perdatum = datum;
2935 	__le32 buf[2];
2936 	size_t len;
2937 	int rc;
2938 
2939 	len = strlen(key);
2940 	buf[0] = cpu_to_le32(len);
2941 	buf[1] = cpu_to_le32(perdatum->value);
2942 	rc = put_entry(buf, sizeof(u32), 2, fp);
2943 	if (rc)
2944 		return rc;
2945 
2946 	rc = put_entry(key, 1, len, fp);
2947 	if (rc)
2948 		return rc;
2949 
2950 	return 0;
2951 }
2952 
common_write(void * vkey,void * datum,void * ptr)2953 static int common_write(void *vkey, void *datum, void *ptr)
2954 {
2955 	char *key = vkey;
2956 	struct common_datum *comdatum = datum;
2957 	struct policy_data *pd = ptr;
2958 	void *fp = pd->fp;
2959 	__le32 buf[4];
2960 	size_t len;
2961 	int rc;
2962 
2963 	len = strlen(key);
2964 	buf[0] = cpu_to_le32(len);
2965 	buf[1] = cpu_to_le32(comdatum->value);
2966 	buf[2] = cpu_to_le32(comdatum->permissions.nprim);
2967 	buf[3] = cpu_to_le32(comdatum->permissions.table.nel);
2968 	rc = put_entry(buf, sizeof(u32), 4, fp);
2969 	if (rc)
2970 		return rc;
2971 
2972 	rc = put_entry(key, 1, len, fp);
2973 	if (rc)
2974 		return rc;
2975 
2976 	rc = hashtab_map(&comdatum->permissions.table, perm_write, fp);
2977 	if (rc)
2978 		return rc;
2979 
2980 	return 0;
2981 }
2982 
type_set_write(struct type_set * t,void * fp)2983 static int type_set_write(struct type_set *t, void *fp)
2984 {
2985 	int rc;
2986 	__le32 buf[1];
2987 
2988 	if (ebitmap_write(&t->types, fp))
2989 		return -EINVAL;
2990 	if (ebitmap_write(&t->negset, fp))
2991 		return -EINVAL;
2992 
2993 	buf[0] = cpu_to_le32(t->flags);
2994 	rc = put_entry(buf, sizeof(u32), 1, fp);
2995 	if (rc)
2996 		return -EINVAL;
2997 
2998 	return 0;
2999 }
3000 
write_cons_helper(struct policydb * p,struct constraint_node * node,void * fp)3001 static int write_cons_helper(struct policydb *p, struct constraint_node *node,
3002 			     void *fp)
3003 {
3004 	struct constraint_node *c;
3005 	struct constraint_expr *e;
3006 	__le32 buf[3];
3007 	u32 nel;
3008 	int rc;
3009 
3010 	for (c = node; c; c = c->next) {
3011 		nel = 0;
3012 		for (e = c->expr; e; e = e->next)
3013 			nel++;
3014 		buf[0] = cpu_to_le32(c->permissions);
3015 		buf[1] = cpu_to_le32(nel);
3016 		rc = put_entry(buf, sizeof(u32), 2, fp);
3017 		if (rc)
3018 			return rc;
3019 		for (e = c->expr; e; e = e->next) {
3020 			buf[0] = cpu_to_le32(e->expr_type);
3021 			buf[1] = cpu_to_le32(e->attr);
3022 			buf[2] = cpu_to_le32(e->op);
3023 			rc = put_entry(buf, sizeof(u32), 3, fp);
3024 			if (rc)
3025 				return rc;
3026 
3027 			switch (e->expr_type) {
3028 			case CEXPR_NAMES:
3029 				rc = ebitmap_write(&e->names, fp);
3030 				if (rc)
3031 					return rc;
3032 				if (p->policyvers >=
3033 					POLICYDB_VERSION_CONSTRAINT_NAMES) {
3034 					rc = type_set_write(e->type_names, fp);
3035 					if (rc)
3036 						return rc;
3037 				}
3038 				break;
3039 			default:
3040 				break;
3041 			}
3042 		}
3043 	}
3044 
3045 	return 0;
3046 }
3047 
class_write(void * vkey,void * datum,void * ptr)3048 static int class_write(void *vkey, void *datum, void *ptr)
3049 {
3050 	char *key = vkey;
3051 	struct class_datum *cladatum = datum;
3052 	struct policy_data *pd = ptr;
3053 	void *fp = pd->fp;
3054 	struct policydb *p = pd->p;
3055 	struct constraint_node *c;
3056 	__le32 buf[6];
3057 	u32 ncons;
3058 	size_t len, len2;
3059 	int rc;
3060 
3061 	len = strlen(key);
3062 	if (cladatum->comkey)
3063 		len2 = strlen(cladatum->comkey);
3064 	else
3065 		len2 = 0;
3066 
3067 	ncons = 0;
3068 	for (c = cladatum->constraints; c; c = c->next)
3069 		ncons++;
3070 
3071 	buf[0] = cpu_to_le32(len);
3072 	buf[1] = cpu_to_le32(len2);
3073 	buf[2] = cpu_to_le32(cladatum->value);
3074 	buf[3] = cpu_to_le32(cladatum->permissions.nprim);
3075 	buf[4] = cpu_to_le32(cladatum->permissions.table.nel);
3076 	buf[5] = cpu_to_le32(ncons);
3077 	rc = put_entry(buf, sizeof(u32), 6, fp);
3078 	if (rc)
3079 		return rc;
3080 
3081 	rc = put_entry(key, 1, len, fp);
3082 	if (rc)
3083 		return rc;
3084 
3085 	if (cladatum->comkey) {
3086 		rc = put_entry(cladatum->comkey, 1, len2, fp);
3087 		if (rc)
3088 			return rc;
3089 	}
3090 
3091 	rc = hashtab_map(&cladatum->permissions.table, perm_write, fp);
3092 	if (rc)
3093 		return rc;
3094 
3095 	rc = write_cons_helper(p, cladatum->constraints, fp);
3096 	if (rc)
3097 		return rc;
3098 
3099 	/* write out the validatetrans rule */
3100 	ncons = 0;
3101 	for (c = cladatum->validatetrans; c; c = c->next)
3102 		ncons++;
3103 
3104 	buf[0] = cpu_to_le32(ncons);
3105 	rc = put_entry(buf, sizeof(u32), 1, fp);
3106 	if (rc)
3107 		return rc;
3108 
3109 	rc = write_cons_helper(p, cladatum->validatetrans, fp);
3110 	if (rc)
3111 		return rc;
3112 
3113 	if (p->policyvers >= POLICYDB_VERSION_NEW_OBJECT_DEFAULTS) {
3114 		buf[0] = cpu_to_le32(cladatum->default_user);
3115 		buf[1] = cpu_to_le32(cladatum->default_role);
3116 		buf[2] = cpu_to_le32(cladatum->default_range);
3117 
3118 		rc = put_entry(buf, sizeof(uint32_t), 3, fp);
3119 		if (rc)
3120 			return rc;
3121 	}
3122 
3123 	if (p->policyvers >= POLICYDB_VERSION_DEFAULT_TYPE) {
3124 		buf[0] = cpu_to_le32(cladatum->default_type);
3125 		rc = put_entry(buf, sizeof(uint32_t), 1, fp);
3126 		if (rc)
3127 			return rc;
3128 	}
3129 
3130 	return 0;
3131 }
3132 
role_write(void * vkey,void * datum,void * ptr)3133 static int role_write(void *vkey, void *datum, void *ptr)
3134 {
3135 	char *key = vkey;
3136 	struct role_datum *role = datum;
3137 	struct policy_data *pd = ptr;
3138 	void *fp = pd->fp;
3139 	struct policydb *p = pd->p;
3140 	__le32 buf[3];
3141 	size_t items, len;
3142 	int rc;
3143 
3144 	len = strlen(key);
3145 	items = 0;
3146 	buf[items++] = cpu_to_le32(len);
3147 	buf[items++] = cpu_to_le32(role->value);
3148 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
3149 		buf[items++] = cpu_to_le32(role->bounds);
3150 
3151 	BUG_ON(items > ARRAY_SIZE(buf));
3152 
3153 	rc = put_entry(buf, sizeof(u32), items, fp);
3154 	if (rc)
3155 		return rc;
3156 
3157 	rc = put_entry(key, 1, len, fp);
3158 	if (rc)
3159 		return rc;
3160 
3161 	rc = ebitmap_write(&role->dominates, fp);
3162 	if (rc)
3163 		return rc;
3164 
3165 	rc = ebitmap_write(&role->types, fp);
3166 	if (rc)
3167 		return rc;
3168 
3169 	return 0;
3170 }
3171 
type_write(void * vkey,void * datum,void * ptr)3172 static int type_write(void *vkey, void *datum, void *ptr)
3173 {
3174 	char *key = vkey;
3175 	struct type_datum *typdatum = datum;
3176 	struct policy_data *pd = ptr;
3177 	struct policydb *p = pd->p;
3178 	void *fp = pd->fp;
3179 	__le32 buf[4];
3180 	int rc;
3181 	size_t items, len;
3182 
3183 	len = strlen(key);
3184 	items = 0;
3185 	buf[items++] = cpu_to_le32(len);
3186 	buf[items++] = cpu_to_le32(typdatum->value);
3187 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY) {
3188 		u32 properties = 0;
3189 
3190 		if (typdatum->primary)
3191 			properties |= TYPEDATUM_PROPERTY_PRIMARY;
3192 
3193 		if (typdatum->attribute)
3194 			properties |= TYPEDATUM_PROPERTY_ATTRIBUTE;
3195 
3196 		buf[items++] = cpu_to_le32(properties);
3197 		buf[items++] = cpu_to_le32(typdatum->bounds);
3198 	} else {
3199 		buf[items++] = cpu_to_le32(typdatum->primary);
3200 	}
3201 	BUG_ON(items > ARRAY_SIZE(buf));
3202 	rc = put_entry(buf, sizeof(u32), items, fp);
3203 	if (rc)
3204 		return rc;
3205 
3206 	rc = put_entry(key, 1, len, fp);
3207 	if (rc)
3208 		return rc;
3209 
3210 	return 0;
3211 }
3212 
user_write(void * vkey,void * datum,void * ptr)3213 static int user_write(void *vkey, void *datum, void *ptr)
3214 {
3215 	char *key = vkey;
3216 	struct user_datum *usrdatum = datum;
3217 	struct policy_data *pd = ptr;
3218 	struct policydb *p = pd->p;
3219 	void *fp = pd->fp;
3220 	__le32 buf[3];
3221 	size_t items, len;
3222 	int rc;
3223 
3224 	len = strlen(key);
3225 	items = 0;
3226 	buf[items++] = cpu_to_le32(len);
3227 	buf[items++] = cpu_to_le32(usrdatum->value);
3228 	if (p->policyvers >= POLICYDB_VERSION_BOUNDARY)
3229 		buf[items++] = cpu_to_le32(usrdatum->bounds);
3230 	BUG_ON(items > ARRAY_SIZE(buf));
3231 	rc = put_entry(buf, sizeof(u32), items, fp);
3232 	if (rc)
3233 		return rc;
3234 
3235 	rc = put_entry(key, 1, len, fp);
3236 	if (rc)
3237 		return rc;
3238 
3239 	rc = ebitmap_write(&usrdatum->roles, fp);
3240 	if (rc)
3241 		return rc;
3242 
3243 	rc = mls_write_range_helper(&usrdatum->range, fp);
3244 	if (rc)
3245 		return rc;
3246 
3247 	rc = mls_write_level(&usrdatum->dfltlevel, fp);
3248 	if (rc)
3249 		return rc;
3250 
3251 	return 0;
3252 }
3253 
3254 static int (*write_f[SYM_NUM]) (void *key, void *datum,
3255 				void *datap) =
3256 {
3257 	common_write,
3258 	class_write,
3259 	role_write,
3260 	type_write,
3261 	user_write,
3262 	cond_write_bool,
3263 	sens_write,
3264 	cat_write,
3265 };
3266 
ocontext_write(struct policydb * p,struct policydb_compat_info * info,void * fp)3267 static int ocontext_write(struct policydb *p, struct policydb_compat_info *info,
3268 			  void *fp)
3269 {
3270 	unsigned int i, j, rc;
3271 	size_t nel, len;
3272 	__be64 prefixbuf[1];
3273 	__le32 buf[3];
3274 	u32 nodebuf[8];
3275 	struct ocontext *c;
3276 	for (i = 0; i < info->ocon_num; i++) {
3277 		nel = 0;
3278 		for (c = p->ocontexts[i]; c; c = c->next)
3279 			nel++;
3280 		buf[0] = cpu_to_le32(nel);
3281 		rc = put_entry(buf, sizeof(u32), 1, fp);
3282 		if (rc)
3283 			return rc;
3284 		for (c = p->ocontexts[i]; c; c = c->next) {
3285 			switch (i) {
3286 			case OCON_ISID:
3287 				buf[0] = cpu_to_le32(c->sid[0]);
3288 				rc = put_entry(buf, sizeof(u32), 1, fp);
3289 				if (rc)
3290 					return rc;
3291 				rc = context_write(p, &c->context[0], fp);
3292 				if (rc)
3293 					return rc;
3294 				break;
3295 			case OCON_FS:
3296 			case OCON_NETIF:
3297 				len = strlen(c->u.name);
3298 				buf[0] = cpu_to_le32(len);
3299 				rc = put_entry(buf, sizeof(u32), 1, fp);
3300 				if (rc)
3301 					return rc;
3302 				rc = put_entry(c->u.name, 1, len, fp);
3303 				if (rc)
3304 					return rc;
3305 				rc = context_write(p, &c->context[0], fp);
3306 				if (rc)
3307 					return rc;
3308 				rc = context_write(p, &c->context[1], fp);
3309 				if (rc)
3310 					return rc;
3311 				break;
3312 			case OCON_PORT:
3313 				buf[0] = cpu_to_le32(c->u.port.protocol);
3314 				buf[1] = cpu_to_le32(c->u.port.low_port);
3315 				buf[2] = cpu_to_le32(c->u.port.high_port);
3316 				rc = put_entry(buf, sizeof(u32), 3, fp);
3317 				if (rc)
3318 					return rc;
3319 				rc = context_write(p, &c->context[0], fp);
3320 				if (rc)
3321 					return rc;
3322 				break;
3323 			case OCON_NODE:
3324 				nodebuf[0] = c->u.node.addr; /* network order */
3325 				nodebuf[1] = c->u.node.mask; /* network order */
3326 				rc = put_entry(nodebuf, sizeof(u32), 2, fp);
3327 				if (rc)
3328 					return rc;
3329 				rc = context_write(p, &c->context[0], fp);
3330 				if (rc)
3331 					return rc;
3332 				break;
3333 			case OCON_FSUSE:
3334 				buf[0] = cpu_to_le32(c->v.behavior);
3335 				len = strlen(c->u.name);
3336 				buf[1] = cpu_to_le32(len);
3337 				rc = put_entry(buf, sizeof(u32), 2, fp);
3338 				if (rc)
3339 					return rc;
3340 				rc = put_entry(c->u.name, 1, len, fp);
3341 				if (rc)
3342 					return rc;
3343 				rc = context_write(p, &c->context[0], fp);
3344 				if (rc)
3345 					return rc;
3346 				break;
3347 			case OCON_NODE6:
3348 				for (j = 0; j < 4; j++)
3349 					nodebuf[j] = c->u.node6.addr[j]; /* network order */
3350 				for (j = 0; j < 4; j++)
3351 					nodebuf[j + 4] = c->u.node6.mask[j]; /* network order */
3352 				rc = put_entry(nodebuf, sizeof(u32), 8, fp);
3353 				if (rc)
3354 					return rc;
3355 				rc = context_write(p, &c->context[0], fp);
3356 				if (rc)
3357 					return rc;
3358 				break;
3359 			case OCON_IBPKEY:
3360 				/* subnet_prefix is in CPU order */
3361 				prefixbuf[0] = cpu_to_be64(c->u.ibpkey.subnet_prefix);
3362 
3363 				rc = put_entry(prefixbuf, sizeof(u64), 1, fp);
3364 				if (rc)
3365 					return rc;
3366 
3367 				buf[0] = cpu_to_le32(c->u.ibpkey.low_pkey);
3368 				buf[1] = cpu_to_le32(c->u.ibpkey.high_pkey);
3369 
3370 				rc = put_entry(buf, sizeof(u32), 2, fp);
3371 				if (rc)
3372 					return rc;
3373 				rc = context_write(p, &c->context[0], fp);
3374 				if (rc)
3375 					return rc;
3376 				break;
3377 			case OCON_IBENDPORT:
3378 				len = strlen(c->u.ibendport.dev_name);
3379 				buf[0] = cpu_to_le32(len);
3380 				buf[1] = cpu_to_le32(c->u.ibendport.port);
3381 				rc = put_entry(buf, sizeof(u32), 2, fp);
3382 				if (rc)
3383 					return rc;
3384 				rc = put_entry(c->u.ibendport.dev_name, 1, len, fp);
3385 				if (rc)
3386 					return rc;
3387 				rc = context_write(p, &c->context[0], fp);
3388 				if (rc)
3389 					return rc;
3390 				break;
3391 			}
3392 		}
3393 	}
3394 	return 0;
3395 }
3396 
genfs_write(struct policydb * p,void * fp)3397 static int genfs_write(struct policydb *p, void *fp)
3398 {
3399 	struct genfs *genfs;
3400 	struct ocontext *c;
3401 	size_t len;
3402 	__le32 buf[1];
3403 	int rc;
3404 
3405 	len = 0;
3406 	for (genfs = p->genfs; genfs; genfs = genfs->next)
3407 		len++;
3408 	buf[0] = cpu_to_le32(len);
3409 	rc = put_entry(buf, sizeof(u32), 1, fp);
3410 	if (rc)
3411 		return rc;
3412 	for (genfs = p->genfs; genfs; genfs = genfs->next) {
3413 		len = strlen(genfs->fstype);
3414 		buf[0] = cpu_to_le32(len);
3415 		rc = put_entry(buf, sizeof(u32), 1, fp);
3416 		if (rc)
3417 			return rc;
3418 		rc = put_entry(genfs->fstype, 1, len, fp);
3419 		if (rc)
3420 			return rc;
3421 		len = 0;
3422 		for (c = genfs->head; c; c = c->next)
3423 			len++;
3424 		buf[0] = cpu_to_le32(len);
3425 		rc = put_entry(buf, sizeof(u32), 1, fp);
3426 		if (rc)
3427 			return rc;
3428 		for (c = genfs->head; c; c = c->next) {
3429 			len = strlen(c->u.name);
3430 			buf[0] = cpu_to_le32(len);
3431 			rc = put_entry(buf, sizeof(u32), 1, fp);
3432 			if (rc)
3433 				return rc;
3434 			rc = put_entry(c->u.name, 1, len, fp);
3435 			if (rc)
3436 				return rc;
3437 			buf[0] = cpu_to_le32(c->v.sclass);
3438 			rc = put_entry(buf, sizeof(u32), 1, fp);
3439 			if (rc)
3440 				return rc;
3441 			rc = context_write(p, &c->context[0], fp);
3442 			if (rc)
3443 				return rc;
3444 		}
3445 	}
3446 	return 0;
3447 }
3448 
range_write_helper(void * key,void * data,void * ptr)3449 static int range_write_helper(void *key, void *data, void *ptr)
3450 {
3451 	__le32 buf[2];
3452 	struct range_trans *rt = key;
3453 	struct mls_range *r = data;
3454 	struct policy_data *pd = ptr;
3455 	void *fp = pd->fp;
3456 	struct policydb *p = pd->p;
3457 	int rc;
3458 
3459 	buf[0] = cpu_to_le32(rt->source_type);
3460 	buf[1] = cpu_to_le32(rt->target_type);
3461 	rc = put_entry(buf, sizeof(u32), 2, fp);
3462 	if (rc)
3463 		return rc;
3464 	if (p->policyvers >= POLICYDB_VERSION_RANGETRANS) {
3465 		buf[0] = cpu_to_le32(rt->target_class);
3466 		rc = put_entry(buf, sizeof(u32), 1, fp);
3467 		if (rc)
3468 			return rc;
3469 	}
3470 	rc = mls_write_range_helper(r, fp);
3471 	if (rc)
3472 		return rc;
3473 
3474 	return 0;
3475 }
3476 
range_write(struct policydb * p,void * fp)3477 static int range_write(struct policydb *p, void *fp)
3478 {
3479 	__le32 buf[1];
3480 	int rc;
3481 	struct policy_data pd;
3482 
3483 	pd.p = p;
3484 	pd.fp = fp;
3485 
3486 	buf[0] = cpu_to_le32(p->range_tr.nel);
3487 	rc = put_entry(buf, sizeof(u32), 1, fp);
3488 	if (rc)
3489 		return rc;
3490 
3491 	/* actually write all of the entries */
3492 	rc = hashtab_map(&p->range_tr, range_write_helper, &pd);
3493 	if (rc)
3494 		return rc;
3495 
3496 	return 0;
3497 }
3498 
filename_write_helper_compat(void * key,void * data,void * ptr)3499 static int filename_write_helper_compat(void *key, void *data, void *ptr)
3500 {
3501 	struct filename_trans_key *ft = key;
3502 	struct filename_trans_datum *datum = data;
3503 	struct ebitmap_node *node;
3504 	void *fp = ptr;
3505 	__le32 buf[4];
3506 	int rc;
3507 	u32 bit, len = strlen(ft->name);
3508 
3509 	do {
3510 		ebitmap_for_each_positive_bit(&datum->stypes, node, bit) {
3511 			buf[0] = cpu_to_le32(len);
3512 			rc = put_entry(buf, sizeof(u32), 1, fp);
3513 			if (rc)
3514 				return rc;
3515 
3516 			rc = put_entry(ft->name, sizeof(char), len, fp);
3517 			if (rc)
3518 				return rc;
3519 
3520 			buf[0] = cpu_to_le32(bit + 1);
3521 			buf[1] = cpu_to_le32(ft->ttype);
3522 			buf[2] = cpu_to_le32(ft->tclass);
3523 			buf[3] = cpu_to_le32(datum->otype);
3524 
3525 			rc = put_entry(buf, sizeof(u32), 4, fp);
3526 			if (rc)
3527 				return rc;
3528 		}
3529 
3530 		datum = datum->next;
3531 	} while (unlikely(datum));
3532 
3533 	return 0;
3534 }
3535 
filename_write_helper(void * key,void * data,void * ptr)3536 static int filename_write_helper(void *key, void *data, void *ptr)
3537 {
3538 	struct filename_trans_key *ft = key;
3539 	struct filename_trans_datum *datum;
3540 	void *fp = ptr;
3541 	__le32 buf[3];
3542 	int rc;
3543 	u32 ndatum, len = strlen(ft->name);
3544 
3545 	buf[0] = cpu_to_le32(len);
3546 	rc = put_entry(buf, sizeof(u32), 1, fp);
3547 	if (rc)
3548 		return rc;
3549 
3550 	rc = put_entry(ft->name, sizeof(char), len, fp);
3551 	if (rc)
3552 		return rc;
3553 
3554 	ndatum = 0;
3555 	datum = data;
3556 	do {
3557 		ndatum++;
3558 		datum = datum->next;
3559 	} while (unlikely(datum));
3560 
3561 	buf[0] = cpu_to_le32(ft->ttype);
3562 	buf[1] = cpu_to_le32(ft->tclass);
3563 	buf[2] = cpu_to_le32(ndatum);
3564 	rc = put_entry(buf, sizeof(u32), 3, fp);
3565 	if (rc)
3566 		return rc;
3567 
3568 	datum = data;
3569 	do {
3570 		rc = ebitmap_write(&datum->stypes, fp);
3571 		if (rc)
3572 			return rc;
3573 
3574 		buf[0] = cpu_to_le32(datum->otype);
3575 		rc = put_entry(buf, sizeof(u32), 1, fp);
3576 		if (rc)
3577 			return rc;
3578 
3579 		datum = datum->next;
3580 	} while (unlikely(datum));
3581 
3582 	return 0;
3583 }
3584 
filename_trans_write(struct policydb * p,void * fp)3585 static int filename_trans_write(struct policydb *p, void *fp)
3586 {
3587 	__le32 buf[1];
3588 	int rc;
3589 
3590 	if (p->policyvers < POLICYDB_VERSION_FILENAME_TRANS)
3591 		return 0;
3592 
3593 	if (p->policyvers < POLICYDB_VERSION_COMP_FTRANS) {
3594 		buf[0] = cpu_to_le32(p->compat_filename_trans_count);
3595 		rc = put_entry(buf, sizeof(u32), 1, fp);
3596 		if (rc)
3597 			return rc;
3598 
3599 		rc = hashtab_map(&p->filename_trans,
3600 				 filename_write_helper_compat, fp);
3601 	} else {
3602 		buf[0] = cpu_to_le32(p->filename_trans.nel);
3603 		rc = put_entry(buf, sizeof(u32), 1, fp);
3604 		if (rc)
3605 			return rc;
3606 
3607 		rc = hashtab_map(&p->filename_trans, filename_write_helper, fp);
3608 	}
3609 	return rc;
3610 }
3611 
3612 /*
3613  * Write the configuration data in a policy database
3614  * structure to a policy database binary representation
3615  * file.
3616  */
policydb_write(struct policydb * p,void * fp)3617 int policydb_write(struct policydb *p, void *fp)
3618 {
3619 	unsigned int i, num_syms;
3620 	int rc;
3621 	__le32 buf[4];
3622 	u32 config;
3623 	size_t len;
3624 	struct policydb_compat_info *info;
3625 
3626 	/*
3627 	 * refuse to write policy older than compressed avtab
3628 	 * to simplify the writer.  There are other tests dropped
3629 	 * since we assume this throughout the writer code.  Be
3630 	 * careful if you ever try to remove this restriction
3631 	 */
3632 	if (p->policyvers < POLICYDB_VERSION_AVTAB) {
3633 		pr_err("SELinux: refusing to write policy version %d."
3634 		       "  Because it is less than version %d\n", p->policyvers,
3635 		       POLICYDB_VERSION_AVTAB);
3636 		return -EINVAL;
3637 	}
3638 
3639 	config = 0;
3640 	if (p->mls_enabled)
3641 		config |= POLICYDB_CONFIG_MLS;
3642 
3643 	if (p->reject_unknown)
3644 		config |= REJECT_UNKNOWN;
3645 	if (p->allow_unknown)
3646 		config |= ALLOW_UNKNOWN;
3647 
3648 	/* Write the magic number and string identifiers. */
3649 	buf[0] = cpu_to_le32(POLICYDB_MAGIC);
3650 	len = strlen(POLICYDB_STRING);
3651 	buf[1] = cpu_to_le32(len);
3652 	rc = put_entry(buf, sizeof(u32), 2, fp);
3653 	if (rc)
3654 		return rc;
3655 	rc = put_entry(POLICYDB_STRING, 1, len, fp);
3656 	if (rc)
3657 		return rc;
3658 
3659 	/* Write the version, config, and table sizes. */
3660 	info = policydb_lookup_compat(p->policyvers);
3661 	if (!info) {
3662 		pr_err("SELinux: compatibility lookup failed for policy "
3663 		    "version %d", p->policyvers);
3664 		return -EINVAL;
3665 	}
3666 
3667 	buf[0] = cpu_to_le32(p->policyvers);
3668 	buf[1] = cpu_to_le32(config);
3669 	buf[2] = cpu_to_le32(info->sym_num);
3670 	buf[3] = cpu_to_le32(info->ocon_num);
3671 
3672 	rc = put_entry(buf, sizeof(u32), 4, fp);
3673 	if (rc)
3674 		return rc;
3675 
3676 	if (p->policyvers >= POLICYDB_VERSION_POLCAP) {
3677 		rc = ebitmap_write(&p->policycaps, fp);
3678 		if (rc)
3679 			return rc;
3680 	}
3681 
3682 	if (p->policyvers >= POLICYDB_VERSION_PERMISSIVE) {
3683 		rc = ebitmap_write(&p->permissive_map, fp);
3684 		if (rc)
3685 			return rc;
3686 	}
3687 
3688 	num_syms = info->sym_num;
3689 	for (i = 0; i < num_syms; i++) {
3690 		struct policy_data pd;
3691 
3692 		pd.fp = fp;
3693 		pd.p = p;
3694 
3695 		buf[0] = cpu_to_le32(p->symtab[i].nprim);
3696 		buf[1] = cpu_to_le32(p->symtab[i].table.nel);
3697 
3698 		rc = put_entry(buf, sizeof(u32), 2, fp);
3699 		if (rc)
3700 			return rc;
3701 		rc = hashtab_map(&p->symtab[i].table, write_f[i], &pd);
3702 		if (rc)
3703 			return rc;
3704 	}
3705 
3706 	rc = avtab_write(p, &p->te_avtab, fp);
3707 	if (rc)
3708 		return rc;
3709 
3710 	rc = cond_write_list(p, fp);
3711 	if (rc)
3712 		return rc;
3713 
3714 	rc = role_trans_write(p, fp);
3715 	if (rc)
3716 		return rc;
3717 
3718 	rc = role_allow_write(p->role_allow, fp);
3719 	if (rc)
3720 		return rc;
3721 
3722 	rc = filename_trans_write(p, fp);
3723 	if (rc)
3724 		return rc;
3725 
3726 	rc = ocontext_write(p, info, fp);
3727 	if (rc)
3728 		return rc;
3729 
3730 	rc = genfs_write(p, fp);
3731 	if (rc)
3732 		return rc;
3733 
3734 	rc = range_write(p, fp);
3735 	if (rc)
3736 		return rc;
3737 
3738 	for (i = 0; i < p->p_types.nprim; i++) {
3739 		struct ebitmap *e = &p->type_attr_map_array[i];
3740 
3741 		rc = ebitmap_write(e, fp);
3742 		if (rc)
3743 			return rc;
3744 	}
3745 
3746 	return 0;
3747 }
3748