Blame view

fs/cachefiles/security.c 2.77 KB
9ae326a69   David Howells   CacheFiles: A cac...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
  /* CacheFiles security management
   *
   * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
   * Written by David Howells (dhowells@redhat.com)
   *
   * This program is free software; you can redistribute it and/or
   * modify it under the terms of the GNU General Public Licence
   * as published by the Free Software Foundation; either version
   * 2 of the Licence, or (at your option) any later version.
   */
  
  #include <linux/fs.h>
  #include <linux/cred.h>
  #include "internal.h"
  
  /*
   * determine the security context within which we access the cache from within
   * the kernel
   */
  int cachefiles_get_security_ID(struct cachefiles_cache *cache)
  {
  	struct cred *new;
  	int ret;
  
  	_enter("{%s}", cache->secctx);
  
  	new = prepare_kernel_cred(current);
  	if (!new) {
  		ret = -ENOMEM;
  		goto error;
  	}
  
  	if (cache->secctx) {
  		ret = set_security_override_from_ctx(new, cache->secctx);
  		if (ret < 0) {
  			put_cred(new);
  			printk(KERN_ERR "CacheFiles:"
  			       " Security denies permission to nominate"
  			       " security context: error %d
  ",
  			       ret);
  			goto error;
  		}
  	}
  
  	cache->cache_cred = new;
  	ret = 0;
  error:
  	_leave(" = %d", ret);
  	return ret;
  }
  
  /*
   * see if mkdir and create can be performed in the root directory
   */
  static int cachefiles_check_cache_dir(struct cachefiles_cache *cache,
  				      struct dentry *root)
  {
  	int ret;
  
  	ret = security_inode_mkdir(root->d_inode, root, 0);
  	if (ret < 0) {
  		printk(KERN_ERR "CacheFiles:"
  		       " Security denies permission to make dirs: error %d",
  		       ret);
  		return ret;
  	}
  
  	ret = security_inode_create(root->d_inode, root, 0);
  	if (ret < 0)
  		printk(KERN_ERR "CacheFiles:"
  		       " Security denies permission to create files: error %d",
  		       ret);
  
  	return ret;
  }
  
  /*
   * check the security details of the on-disk cache
   * - must be called with security override in force
7ac512aa8   David Howells   CacheFiles: Fix e...
81
82
   * - must return with a security override in force - even in the case of an
   *   error
9ae326a69   David Howells   CacheFiles: A cac...
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
   */
  int cachefiles_determine_cache_security(struct cachefiles_cache *cache,
  					struct dentry *root,
  					const struct cred **_saved_cred)
  {
  	struct cred *new;
  	int ret;
  
  	_enter("");
  
  	/* duplicate the cache creds for COW (the override is currently in
  	 * force, so we can use prepare_creds() to do this) */
  	new = prepare_creds();
  	if (!new)
  		return -ENOMEM;
  
  	cachefiles_end_secure(cache, *_saved_cred);
  
  	/* use the cache root dir's security context as the basis with
  	 * which create files */
  	ret = set_create_files_as(new, root->d_inode);
  	if (ret < 0) {
7ac512aa8   David Howells   CacheFiles: Fix e...
105
106
  		abort_creds(new);
  		cachefiles_begin_secure(cache, _saved_cred);
9ae326a69   David Howells   CacheFiles: A cac...
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  		_leave(" = %d [cfa]", ret);
  		return ret;
  	}
  
  	put_cred(cache->cache_cred);
  	cache->cache_cred = new;
  
  	cachefiles_begin_secure(cache, _saved_cred);
  	ret = cachefiles_check_cache_dir(cache, root);
  
  	if (ret == -EOPNOTSUPP)
  		ret = 0;
  	_leave(" = %d", ret);
  	return ret;
  }