| David Howells | 9ae326a | 2009-04-03 16:42:41 +0100 | [diff] [blame] | 1 | /* CacheFiles security management | 
 | 2 |  * | 
 | 3 |  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. | 
 | 4 |  * Written by David Howells (dhowells@redhat.com) | 
 | 5 |  * | 
 | 6 |  * This program is free software; you can redistribute it and/or | 
 | 7 |  * modify it under the terms of the GNU General Public Licence | 
 | 8 |  * as published by the Free Software Foundation; either version | 
 | 9 |  * 2 of the Licence, or (at your option) any later version. | 
 | 10 |  */ | 
 | 11 |  | 
 | 12 | #include <linux/fs.h> | 
 | 13 | #include <linux/cred.h> | 
 | 14 | #include "internal.h" | 
 | 15 |  | 
 | 16 | /* | 
 | 17 |  * determine the security context within which we access the cache from within | 
 | 18 |  * the kernel | 
 | 19 |  */ | 
 | 20 | int cachefiles_get_security_ID(struct cachefiles_cache *cache) | 
 | 21 | { | 
 | 22 | 	struct cred *new; | 
 | 23 | 	int ret; | 
 | 24 |  | 
 | 25 | 	_enter("{%s}", cache->secctx); | 
 | 26 |  | 
 | 27 | 	new = prepare_kernel_cred(current); | 
 | 28 | 	if (!new) { | 
 | 29 | 		ret = -ENOMEM; | 
 | 30 | 		goto error; | 
 | 31 | 	} | 
 | 32 |  | 
 | 33 | 	if (cache->secctx) { | 
 | 34 | 		ret = set_security_override_from_ctx(new, cache->secctx); | 
 | 35 | 		if (ret < 0) { | 
 | 36 | 			put_cred(new); | 
 | 37 | 			printk(KERN_ERR "CacheFiles:" | 
 | 38 | 			       " Security denies permission to nominate" | 
 | 39 | 			       " security context: error %d\n", | 
 | 40 | 			       ret); | 
 | 41 | 			goto error; | 
 | 42 | 		} | 
 | 43 | 	} | 
 | 44 |  | 
 | 45 | 	cache->cache_cred = new; | 
 | 46 | 	ret = 0; | 
 | 47 | error: | 
 | 48 | 	_leave(" = %d", ret); | 
 | 49 | 	return ret; | 
 | 50 | } | 
 | 51 |  | 
 | 52 | /* | 
 | 53 |  * see if mkdir and create can be performed in the root directory | 
 | 54 |  */ | 
 | 55 | static int cachefiles_check_cache_dir(struct cachefiles_cache *cache, | 
 | 56 | 				      struct dentry *root) | 
 | 57 | { | 
 | 58 | 	int ret; | 
 | 59 |  | 
 | 60 | 	ret = security_inode_mkdir(root->d_inode, root, 0); | 
 | 61 | 	if (ret < 0) { | 
 | 62 | 		printk(KERN_ERR "CacheFiles:" | 
 | 63 | 		       " Security denies permission to make dirs: error %d", | 
 | 64 | 		       ret); | 
 | 65 | 		return ret; | 
 | 66 | 	} | 
 | 67 |  | 
 | 68 | 	ret = security_inode_create(root->d_inode, root, 0); | 
 | 69 | 	if (ret < 0) | 
 | 70 | 		printk(KERN_ERR "CacheFiles:" | 
 | 71 | 		       " Security denies permission to create files: error %d", | 
 | 72 | 		       ret); | 
 | 73 |  | 
 | 74 | 	return ret; | 
 | 75 | } | 
 | 76 |  | 
 | 77 | /* | 
 | 78 |  * check the security details of the on-disk cache | 
 | 79 |  * - must be called with security override in force | 
 | 80 |  */ | 
 | 81 | int cachefiles_determine_cache_security(struct cachefiles_cache *cache, | 
 | 82 | 					struct dentry *root, | 
 | 83 | 					const struct cred **_saved_cred) | 
 | 84 | { | 
 | 85 | 	struct cred *new; | 
 | 86 | 	int ret; | 
 | 87 |  | 
 | 88 | 	_enter(""); | 
 | 89 |  | 
 | 90 | 	/* duplicate the cache creds for COW (the override is currently in | 
 | 91 | 	 * force, so we can use prepare_creds() to do this) */ | 
 | 92 | 	new = prepare_creds(); | 
 | 93 | 	if (!new) | 
 | 94 | 		return -ENOMEM; | 
 | 95 |  | 
 | 96 | 	cachefiles_end_secure(cache, *_saved_cred); | 
 | 97 |  | 
 | 98 | 	/* use the cache root dir's security context as the basis with | 
 | 99 | 	 * which create files */ | 
 | 100 | 	ret = set_create_files_as(new, root->d_inode); | 
 | 101 | 	if (ret < 0) { | 
 | 102 | 		_leave(" = %d [cfa]", ret); | 
 | 103 | 		return ret; | 
 | 104 | 	} | 
 | 105 |  | 
 | 106 | 	put_cred(cache->cache_cred); | 
 | 107 | 	cache->cache_cred = new; | 
 | 108 |  | 
 | 109 | 	cachefiles_begin_secure(cache, _saved_cred); | 
 | 110 | 	ret = cachefiles_check_cache_dir(cache, root); | 
 | 111 |  | 
 | 112 | 	if (ret == -EOPNOTSUPP) | 
 | 113 | 		ret = 0; | 
 | 114 | 	_leave(" = %d", ret); | 
 | 115 | 	return ret; | 
 | 116 | } |