security.c 2.5 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
/* CacheFiles security management
 *
 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
 * Written by David Howells (dhowells@redhat.com)
 */

#include <linux/fs.h>
#include <linux/cred.h>
#include "internal.h"

/*
 * determine the security context within which we access the cache from within
 * the kernel
 */
int cachefiles_get_security_ID(struct cachefiles_cache *cache)
{
	struct cred *new;
	int ret;

	_enter("{%s}", cache->secctx);

	new = prepare_kernel_cred(current);
	if (!new) {
		ret = -ENOMEM;
		goto error;
	}

	if (cache->secctx) {
		ret = set_security_override_from_ctx(new, cache->secctx);
		if (ret < 0) {
			put_cred(new);
33
			pr_err("Security denies permission to nominate security context: error %d\n",
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
			       ret);
			goto error;
		}
	}

	cache->cache_cred = new;
	ret = 0;
error:
	_leave(" = %d", ret);
	return ret;
}

/*
 * see if mkdir and create can be performed in the root directory
 */
static int cachefiles_check_cache_dir(struct cachefiles_cache *cache,
				      struct dentry *root)
{
	int ret;

54
	ret = security_inode_mkdir(d_backing_inode(root), root, 0);
55
	if (ret < 0) {
56
		pr_err("Security denies permission to make dirs: error %d",
57 58 59 60
		       ret);
		return ret;
	}

61
	ret = security_inode_create(d_backing_inode(root), root, 0);
62
	if (ret < 0)
63
		pr_err("Security denies permission to create files: error %d",
64 65 66 67 68 69 70 71
		       ret);

	return ret;
}

/*
 * check the security details of the on-disk cache
 * - must be called with security override in force
72 73
 * - must return with a security override in force - even in the case of an
 *   error
74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
 */
int cachefiles_determine_cache_security(struct cachefiles_cache *cache,
					struct dentry *root,
					const struct cred **_saved_cred)
{
	struct cred *new;
	int ret;

	_enter("");

	/* duplicate the cache creds for COW (the override is currently in
	 * force, so we can use prepare_creds() to do this) */
	new = prepare_creds();
	if (!new)
		return -ENOMEM;

	cachefiles_end_secure(cache, *_saved_cred);

	/* use the cache root dir's security context as the basis with
	 * which create files */
94
	ret = set_create_files_as(new, d_backing_inode(root));
95
	if (ret < 0) {
96 97
		abort_creds(new);
		cachefiles_begin_secure(cache, _saved_cred);
98 99 100 101 102 103 104 105 106 107 108 109 110 111 112
		_leave(" = %d [cfa]", ret);
		return ret;
	}

	put_cred(cache->cache_cred);
	cache->cache_cred = new;

	cachefiles_begin_secure(cache, _saved_cred);
	ret = cachefiles_check_cache_dir(cache, root);

	if (ret == -EOPNOTSUPP)
		ret = 0;
	_leave(" = %d", ret);
	return ret;
}