Linux Audio

Check our new training course

Loading...
v6.8
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/* CacheFiles security management
  3 *
  4 * Copyright (C) 2007, 2021 Red Hat, Inc. All Rights Reserved.
  5 * Written by David Howells (dhowells@redhat.com)
 
 
 
 
 
  6 */
  7
  8#include <linux/fs.h>
  9#include <linux/cred.h>
 10#include "internal.h"
 11
 12/*
 13 * determine the security context within which we access the cache from within
 14 * the kernel
 15 */
 16int cachefiles_get_security_ID(struct cachefiles_cache *cache)
 17{
 18	struct cred *new;
 19	int ret;
 20
 21	_enter("{%s}", cache->secctx);
 22
 23	new = prepare_kernel_cred(current);
 24	if (!new) {
 25		ret = -ENOMEM;
 26		goto error;
 27	}
 28
 29	if (cache->secctx) {
 30		ret = set_security_override_from_ctx(new, cache->secctx);
 31		if (ret < 0) {
 32			put_cred(new);
 33			pr_err("Security denies permission to nominate security context: error %d\n",
 
 
 34			       ret);
 35			goto error;
 36		}
 37	}
 38
 39	cache->cache_cred = new;
 40	ret = 0;
 41error:
 42	_leave(" = %d", ret);
 43	return ret;
 44}
 45
 46/*
 47 * see if mkdir and create can be performed in the root directory
 48 */
 49static int cachefiles_check_cache_dir(struct cachefiles_cache *cache,
 50				      struct dentry *root)
 51{
 52	int ret;
 53
 54	ret = security_inode_mkdir(d_backing_inode(root), root, 0);
 55	if (ret < 0) {
 56		pr_err("Security denies permission to make dirs: error %d",
 
 57		       ret);
 58		return ret;
 59	}
 60
 61	ret = security_inode_create(d_backing_inode(root), root, 0);
 62	if (ret < 0)
 63		pr_err("Security denies permission to create files: error %d",
 
 64		       ret);
 65
 66	return ret;
 67}
 68
 69/*
 70 * check the security details of the on-disk cache
 71 * - must be called with security override in force
 72 * - must return with a security override in force - even in the case of an
 73 *   error
 74 */
 75int cachefiles_determine_cache_security(struct cachefiles_cache *cache,
 76					struct dentry *root,
 77					const struct cred **_saved_cred)
 78{
 79	struct cred *new;
 80	int ret;
 81
 82	_enter("");
 83
 84	/* duplicate the cache creds for COW (the override is currently in
 85	 * force, so we can use prepare_creds() to do this) */
 86	new = prepare_creds();
 87	if (!new)
 88		return -ENOMEM;
 89
 90	cachefiles_end_secure(cache, *_saved_cred);
 91
 92	/* use the cache root dir's security context as the basis with
 93	 * which create files */
 94	ret = set_create_files_as(new, d_backing_inode(root));
 95	if (ret < 0) {
 96		abort_creds(new);
 97		cachefiles_begin_secure(cache, _saved_cred);
 98		_leave(" = %d [cfa]", ret);
 99		return ret;
100	}
101
102	put_cred(cache->cache_cred);
103	cache->cache_cred = new;
104
105	cachefiles_begin_secure(cache, _saved_cred);
106	ret = cachefiles_check_cache_dir(cache, root);
107
108	if (ret == -EOPNOTSUPP)
109		ret = 0;
110	_leave(" = %d", ret);
111	return ret;
112}
v3.1
 
  1/* CacheFiles security management
  2 *
  3 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  4 * Written by David Howells (dhowells@redhat.com)
  5 *
  6 * This program is free software; you can redistribute it and/or
  7 * modify it under the terms of the GNU General Public Licence
  8 * as published by the Free Software Foundation; either version
  9 * 2 of the Licence, or (at your option) any later version.
 10 */
 11
 12#include <linux/fs.h>
 13#include <linux/cred.h>
 14#include "internal.h"
 15
 16/*
 17 * determine the security context within which we access the cache from within
 18 * the kernel
 19 */
 20int cachefiles_get_security_ID(struct cachefiles_cache *cache)
 21{
 22	struct cred *new;
 23	int ret;
 24
 25	_enter("{%s}", cache->secctx);
 26
 27	new = prepare_kernel_cred(current);
 28	if (!new) {
 29		ret = -ENOMEM;
 30		goto error;
 31	}
 32
 33	if (cache->secctx) {
 34		ret = set_security_override_from_ctx(new, cache->secctx);
 35		if (ret < 0) {
 36			put_cred(new);
 37			printk(KERN_ERR "CacheFiles:"
 38			       " Security denies permission to nominate"
 39			       " security context: error %d\n",
 40			       ret);
 41			goto error;
 42		}
 43	}
 44
 45	cache->cache_cred = new;
 46	ret = 0;
 47error:
 48	_leave(" = %d", ret);
 49	return ret;
 50}
 51
 52/*
 53 * see if mkdir and create can be performed in the root directory
 54 */
 55static int cachefiles_check_cache_dir(struct cachefiles_cache *cache,
 56				      struct dentry *root)
 57{
 58	int ret;
 59
 60	ret = security_inode_mkdir(root->d_inode, root, 0);
 61	if (ret < 0) {
 62		printk(KERN_ERR "CacheFiles:"
 63		       " Security denies permission to make dirs: error %d",
 64		       ret);
 65		return ret;
 66	}
 67
 68	ret = security_inode_create(root->d_inode, root, 0);
 69	if (ret < 0)
 70		printk(KERN_ERR "CacheFiles:"
 71		       " Security denies permission to create files: error %d",
 72		       ret);
 73
 74	return ret;
 75}
 76
 77/*
 78 * check the security details of the on-disk cache
 79 * - must be called with security override in force
 80 * - must return with a security override in force - even in the case of an
 81 *   error
 82 */
 83int cachefiles_determine_cache_security(struct cachefiles_cache *cache,
 84					struct dentry *root,
 85					const struct cred **_saved_cred)
 86{
 87	struct cred *new;
 88	int ret;
 89
 90	_enter("");
 91
 92	/* duplicate the cache creds for COW (the override is currently in
 93	 * force, so we can use prepare_creds() to do this) */
 94	new = prepare_creds();
 95	if (!new)
 96		return -ENOMEM;
 97
 98	cachefiles_end_secure(cache, *_saved_cred);
 99
100	/* use the cache root dir's security context as the basis with
101	 * which create files */
102	ret = set_create_files_as(new, root->d_inode);
103	if (ret < 0) {
104		abort_creds(new);
105		cachefiles_begin_secure(cache, _saved_cred);
106		_leave(" = %d [cfa]", ret);
107		return ret;
108	}
109
110	put_cred(cache->cache_cred);
111	cache->cache_cred = new;
112
113	cachefiles_begin_secure(cache, _saved_cred);
114	ret = cachefiles_check_cache_dir(cache, root);
115
116	if (ret == -EOPNOTSUPP)
117		ret = 0;
118	_leave(" = %d", ret);
119	return ret;
120}