Blame view

security/inode.c 8.73 KB
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
  /*
   *  inode.c - securityfs
   *
   *  Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de>
   *
   *	This program is free software; you can redistribute it and/or
   *	modify it under the terms of the GNU General Public License version
   *	2 as published by the Free Software Foundation.
   *
   *  Based on fs/debugfs/inode.c which had the following copyright notice:
   *    Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com>
   *    Copyright (C) 2004 IBM Inc.
   */
  
  /* #define DEBUG */
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
16
17
18
19
20
21
22
  #include <linux/module.h>
  #include <linux/fs.h>
  #include <linux/mount.h>
  #include <linux/pagemap.h>
  #include <linux/init.h>
  #include <linux/namei.h>
  #include <linux/security.h>
925629278   Mimi Zohar   integrity: specia...
23
  #include <linux/magic.h>
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  
  static struct vfsmount *mount;
  static int mount_count;
  
  /*
   * TODO:
   *   I think I can get rid of these default_file_ops, but not quite sure...
   */
  static ssize_t default_read_file(struct file *file, char __user *buf,
  				 size_t count, loff_t *ppos)
  {
  	return 0;
  }
  
  static ssize_t default_write_file(struct file *file, const char __user *buf,
  				   size_t count, loff_t *ppos)
  {
  	return count;
  }
  
  static int default_open(struct inode *inode, struct file *file)
  {
8e18e2941   Theodore Ts'o   [PATCH] inode_die...
46
47
  	if (inode->i_private)
  		file->private_data = inode->i_private;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
48
49
50
  
  	return 0;
  }
9c2e08c59   Arjan van de Ven   [PATCH] mark stru...
51
  static const struct file_operations default_file_ops = {
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
52
53
54
  	.read =		default_read_file,
  	.write =	default_write_file,
  	.open =		default_open,
6038f373a   Arnd Bergmann   llseek: automatic...
55
  	.llseek =	noop_llseek,
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
56
57
58
59
60
61
62
  };
  
  static struct inode *get_inode(struct super_block *sb, int mode, dev_t dev)
  {
  	struct inode *inode = new_inode(sb);
  
  	if (inode) {
85fe4025c   Christoph Hellwig   fs: do not assign...
63
  		inode->i_ino = get_next_ino();
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
64
  		inode->i_mode = mode;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
65
66
67
68
69
70
71
72
73
74
75
76
77
  		inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
  		switch (mode & S_IFMT) {
  		default:
  			init_special_inode(inode, mode, dev);
  			break;
  		case S_IFREG:
  			inode->i_fop = &default_file_ops;
  			break;
  		case S_IFDIR:
  			inode->i_op = &simple_dir_inode_operations;
  			inode->i_fop = &simple_dir_operations;
  
  			/* directory inodes start off with i_nlink == 2 (for "." entry) */
d8c76e6f4   Dave Hansen   [PATCH] r/o bind ...
78
  			inc_nlink(inode);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
79
80
81
82
83
84
85
86
87
88
89
  			break;
  		}
  	}
  	return inode;
  }
  
  /* SMP-safe */
  static int mknod(struct inode *dir, struct dentry *dentry,
  			 int mode, dev_t dev)
  {
  	struct inode *inode;
b8bc83ab4   Tvrtko Ursulin   securityfs: Drop ...
90
  	int error = -ENOMEM;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
  
  	if (dentry->d_inode)
  		return -EEXIST;
  
  	inode = get_inode(dir->i_sb, mode, dev);
  	if (inode) {
  		d_instantiate(dentry, inode);
  		dget(dentry);
  		error = 0;
  	}
  	return error;
  }
  
  static int mkdir(struct inode *dir, struct dentry *dentry, int mode)
  {
  	int res;
  
  	mode = (mode & (S_IRWXUGO | S_ISVTX)) | S_IFDIR;
  	res = mknod(dir, dentry, mode, 0);
  	if (!res)
d8c76e6f4   Dave Hansen   [PATCH] r/o bind ...
111
  		inc_nlink(dir);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
  	return res;
  }
  
  static int create(struct inode *dir, struct dentry *dentry, int mode)
  {
  	mode = (mode & S_IALLUGO) | S_IFREG;
  	return mknod(dir, dentry, mode, 0);
  }
  
  static inline int positive(struct dentry *dentry)
  {
  	return dentry->d_inode && !d_unhashed(dentry);
  }
  
  static int fill_super(struct super_block *sb, void *data, int silent)
  {
  	static struct tree_descr files[] = {{""}};
  
  	return simple_fill_super(sb, SECURITYFS_MAGIC, files);
  }
fc14f2fef   Al Viro   convert get_sb_si...
132
  static struct dentry *get_sb(struct file_system_type *fs_type,
454e2398b   David Howells   [PATCH] VFS: Perm...
133
  		  int flags, const char *dev_name,
fc14f2fef   Al Viro   convert get_sb_si...
134
  		  void *data)
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
135
  {
fc14f2fef   Al Viro   convert get_sb_si...
136
  	return mount_single(fs_type, flags, data, fill_super);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
137
138
139
140
141
  }
  
  static struct file_system_type fs_type = {
  	.owner =	THIS_MODULE,
  	.name =		"securityfs",
fc14f2fef   Al Viro   convert get_sb_si...
142
  	.mount =	get_sb,
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
  	.kill_sb =	kill_litter_super,
  };
  
  static int create_by_name(const char *name, mode_t mode,
  			  struct dentry *parent,
  			  struct dentry **dentry)
  {
  	int error = 0;
  
  	*dentry = NULL;
  
  	/* If the parent is not specified, we create it in the root.
  	 * We need the root dentry to do this, which is in the super
  	 * block. A pointer to that is in the struct vfsmount that we
  	 * have around.
  	 */
ef52c75e4   Al Viro   get rid of pointl...
159
160
  	if (!parent)
  		parent = mount->mnt_sb->s_root;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
161

1b1dcc1b5   Jes Sorensen   [PATCH] mutex sub...
162
  	mutex_lock(&parent->d_inode->i_mutex);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
163
  	*dentry = lookup_one_len(name, parent, strlen(name));
b338cc820   Dan Carpenter   security: testing...
164
  	if (!IS_ERR(*dentry)) {
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
165
166
167
168
  		if ((mode & S_IFMT) == S_IFDIR)
  			error = mkdir(parent->d_inode, *dentry, mode);
  		else
  			error = create(parent->d_inode, *dentry, mode);
b8bc83ab4   Tvrtko Ursulin   securityfs: Drop ...
169
170
  		if (error)
  			dput(*dentry);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
171
  	} else
b338cc820   Dan Carpenter   security: testing...
172
  		error = PTR_ERR(*dentry);
1b1dcc1b5   Jes Sorensen   [PATCH] mutex sub...
173
  	mutex_unlock(&parent->d_inode->i_mutex);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
174
175
176
177
178
179
180
181
182
183
  
  	return error;
  }
  
  /**
   * securityfs_create_file - create a file in the securityfs filesystem
   *
   * @name: a pointer to a string containing the name of the file to create.
   * @mode: the permission that the file should have
   * @parent: a pointer to the parent dentry for this file.  This should be a
3f23d815c   Randy Dunlap   security: add/fix...
184
   *          directory dentry if set.  If this parameter is %NULL, then the
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
185
186
   *          file will be created in the root of the securityfs filesystem.
   * @data: a pointer to something that the caller will want to get to later
8e18e2941   Theodore Ts'o   [PATCH] inode_die...
187
   *        on.  The inode.i_private pointer will point to this value on
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
188
189
190
191
192
   *        the open() call.
   * @fops: a pointer to a struct file_operations that should be used for
   *        this file.
   *
   * This is the basic "create a file" function for securityfs.  It allows for a
3f23d815c   Randy Dunlap   security: add/fix...
193
   * wide range of flexibility in creating a file, or a directory (if you
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
194
   * want to create a directory, the securityfs_create_dir() function is
3f23d815c   Randy Dunlap   security: add/fix...
195
   * recommended to be used instead).
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
196
   *
3f23d815c   Randy Dunlap   security: add/fix...
197
   * This function returns a pointer to a dentry if it succeeds.  This
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
198
199
   * pointer must be passed to the securityfs_remove() function when the file is
   * to be removed (no automatic cleanup happens if your module is unloaded,
faa3aad75   Serge E. Hallyn   securityfs: fix l...
200
201
   * you are responsible here).  If an error occurs, the function will return
   * the erorr value (via ERR_PTR).
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
202
   *
3f23d815c   Randy Dunlap   security: add/fix...
203
   * If securityfs is not enabled in the kernel, the value %-ENODEV is
faa3aad75   Serge E. Hallyn   securityfs: fix l...
204
   * returned.
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
205
206
207
   */
  struct dentry *securityfs_create_file(const char *name, mode_t mode,
  				   struct dentry *parent, void *data,
9c2e08c59   Arjan van de Ven   [PATCH] mark stru...
208
  				   const struct file_operations *fops)
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
209
210
211
212
213
214
  {
  	struct dentry *dentry = NULL;
  	int error;
  
  	pr_debug("securityfs: creating file '%s'
  ",name);
1f5ce9e93   Trond Myklebust   VFS: Unexport do_...
215
  	error = simple_pin_fs(&fs_type, &mount, &mount_count);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
  	if (error) {
  		dentry = ERR_PTR(error);
  		goto exit;
  	}
  
  	error = create_by_name(name, mode, parent, &dentry);
  	if (error) {
  		dentry = ERR_PTR(error);
  		simple_release_fs(&mount, &mount_count);
  		goto exit;
  	}
  
  	if (dentry->d_inode) {
  		if (fops)
  			dentry->d_inode->i_fop = fops;
  		if (data)
8e18e2941   Theodore Ts'o   [PATCH] inode_die...
232
  			dentry->d_inode->i_private = data;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
233
234
235
236
237
238
239
240
241
242
243
244
  	}
  exit:
  	return dentry;
  }
  EXPORT_SYMBOL_GPL(securityfs_create_file);
  
  /**
   * securityfs_create_dir - create a directory in the securityfs filesystem
   *
   * @name: a pointer to a string containing the name of the directory to
   *        create.
   * @parent: a pointer to the parent dentry for this file.  This should be a
3f23d815c   Randy Dunlap   security: add/fix...
245
   *          directory dentry if set.  If this parameter is %NULL, then the
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
246
247
   *          directory will be created in the root of the securityfs filesystem.
   *
3f23d815c   Randy Dunlap   security: add/fix...
248
   * This function creates a directory in securityfs with the given @name.
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
249
   *
3f23d815c   Randy Dunlap   security: add/fix...
250
   * This function returns a pointer to a dentry if it succeeds.  This
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
251
252
   * pointer must be passed to the securityfs_remove() function when the file is
   * to be removed (no automatic cleanup happens if your module is unloaded,
3f23d815c   Randy Dunlap   security: add/fix...
253
   * you are responsible here).  If an error occurs, %NULL will be returned.
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
254
   *
3f23d815c   Randy Dunlap   security: add/fix...
255
   * If securityfs is not enabled in the kernel, the value %-ENODEV is
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
256
   * returned.  It is not wise to check for this value, but rather, check for
3f23d815c   Randy Dunlap   security: add/fix...
257
   * %NULL or !%NULL instead as to eliminate the need for #ifdef in the calling
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
258
259
260
261
262
263
264
265
266
267
268
269
270
   * code.
   */
  struct dentry *securityfs_create_dir(const char *name, struct dentry *parent)
  {
  	return securityfs_create_file(name,
  				      S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO,
  				      parent, NULL, NULL);
  }
  EXPORT_SYMBOL_GPL(securityfs_create_dir);
  
  /**
   * securityfs_remove - removes a file or directory from the securityfs filesystem
   *
3f23d815c   Randy Dunlap   security: add/fix...
271
   * @dentry: a pointer to a the dentry of the file or directory to be removed.
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
272
273
274
275
276
277
   *
   * This function removes a file or directory in securityfs that was previously
   * created with a call to another securityfs function (like
   * securityfs_create_file() or variants thereof.)
   *
   * This function is required to be called in order for the file to be
3f23d815c   Randy Dunlap   security: add/fix...
278
279
   * removed. No automatic cleanup of files will happen when a module is
   * removed; you are responsible here.
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
280
281
282
283
   */
  void securityfs_remove(struct dentry *dentry)
  {
  	struct dentry *parent;
d93e4c940   Eric Paris   securityfs: secur...
284
  	if (!dentry || IS_ERR(dentry))
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
285
286
287
288
289
  		return;
  
  	parent = dentry->d_parent;
  	if (!parent || !parent->d_inode)
  		return;
1b1dcc1b5   Jes Sorensen   [PATCH] mutex sub...
290
  	mutex_lock(&parent->d_inode->i_mutex);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
291
292
293
294
295
296
297
298
299
  	if (positive(dentry)) {
  		if (dentry->d_inode) {
  			if (S_ISDIR(dentry->d_inode->i_mode))
  				simple_rmdir(parent->d_inode, dentry);
  			else
  				simple_unlink(parent->d_inode, dentry);
  			dput(dentry);
  		}
  	}
1b1dcc1b5   Jes Sorensen   [PATCH] mutex sub...
300
  	mutex_unlock(&parent->d_inode->i_mutex);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
301
302
303
  	simple_release_fs(&mount, &mount_count);
  }
  EXPORT_SYMBOL_GPL(securityfs_remove);
69d8e1389   Greg Kroah-Hartman   kobject: convert ...
304
  static struct kobject *security_kobj;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
305
306
307
308
  
  static int __init securityfs_init(void)
  {
  	int retval;
0ff21e466   Greg Kroah-Hartman   kobject: convert ...
309
  	security_kobj = kobject_create_and_add("security", kernel_kobj);
69d8e1389   Greg Kroah-Hartman   kobject: convert ...
310
311
  	if (!security_kobj)
  		return -EINVAL;
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
312
313
314
  
  	retval = register_filesystem(&fs_type);
  	if (retval)
78a2d906b   Greg Kroah-Hartman   Kobject: convert ...
315
  		kobject_put(security_kobj);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
316
317
  	return retval;
  }
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
318
  core_initcall(securityfs_init);
b67dbf9d4   Greg Kroah-Hartman   [PATCH] add secur...
319
  MODULE_LICENSE("GPL");