summaryrefslogtreecommitdiffstats
path: root/cache.cxx
diff options
context:
space:
mode:
Diffstat (limited to 'cache.cxx')
-rw-r--r--cache.cxx61
1 files changed, 59 insertions, 2 deletions
diff --git a/cache.cxx b/cache.cxx
index 86f7213a..1e4d7f18 100644
--- a/cache.cxx
+++ b/cache.cxx
@@ -1,12 +1,12 @@
// systemtap cache manager
-// Copyright (C) 2006-2008 Red Hat Inc.
+// Copyright (C) 2006-2009 Red Hat Inc.
//
// This file is part of systemtap, and is free software. You can
// redistribute it and/or modify it under the terms of the GNU General
// Public License (GPL); either version 2, or (at your option) any
// later version.
-
+#include "config.h"
#include "session.h"
#include "cache.h"
#include "util.h"
@@ -68,6 +68,41 @@ add_to_cache(systemtap_session& s)
return;
}
+#if HAVE_NSS
+ // This is the name of the cached module signature.
+ string module_signature_dest_path = s.hash_path;
+ module_signature_dest_path += ".sgn";
+
+ if (!s.cert_db_path.empty())
+ {
+ // Copy the module signature, if it was signed.
+ string module_signature_src_path = module_src_path;
+ module_signature_src_path += ".sgn";
+
+ if (s.verbose > 1)
+ clog << "Copying " << module_signature_src_path << " to " << module_signature_dest_path << endl;
+ if (copy_file(module_signature_src_path.c_str(), module_signature_dest_path.c_str()) != 0)
+ {
+ cerr << "Copy failed (\"" << module_signature_src_path << "\" to \""
+ << module_signature_dest_path << "\"): " << strerror(errno) << endl;
+ // NB: this is not so severe as to prevent reuse of the .ko
+ // already copied.
+ //
+ // s.use_cache = false;
+ }
+ }
+ else
+ {
+ // If this module was not signed, then delete any existing signature from the cache.
+ // This is not a fatal error. Even if the existing signature happens to match a
+ // new module later, it still means that the module is identical to one generated by a
+ // trusted server.
+ if (remove_file_or_dir (module_signature_dest_path.c_str()) != 0)
+ cerr << "Failed to remove \"" << module_signature_dest_path << "\" from the cache: "
+ << strerror(errno) << endl;
+ }
+#endif /* HAVE_NSS */
+
string c_dest_path = s.hash_path;
if (c_dest_path.rfind(".ko") == (c_dest_path.size() - 3))
c_dest_path.resize(c_dest_path.size() - 3);
@@ -98,6 +133,10 @@ get_from_cache(systemtap_session& s)
string module_dest_path = s.tmpdir + "/" + s.module_name + ".ko";
string c_src_path = s.hash_path;
int fd_stapconf, fd_module, fd_c;
+#if HAVE_NSS
+ string hash_signature_path = s.hash_path + ".sgn";
+ int fd_signature;
+#endif
if (c_src_path.rfind(".ko") == (c_src_path.size() - 3))
c_src_path.resize(c_src_path.size() - 3);
@@ -167,6 +206,24 @@ get_from_cache(systemtap_session& s)
close(fd_c);
return false;
}
+#if HAVE_NSS
+ // See if module signature exists. It's not an error if it doesn't. It just
+ // means that the module is unsigned.
+ fd_signature = open(hash_signature_path.c_str(), O_RDONLY);
+ if (fd_signature != -1) {
+ string signature_dest_path = module_dest_path + ".sgn";
+ close(fd_signature);
+ if (copy_file(hash_signature_path.c_str(), signature_dest_path.c_str()) != 0)
+ {
+ cerr << "Copy failed (\"" << hash_signature_path << "\" to \""
+ << signature_dest_path << "\"): " << strerror(errno) << endl;
+ unlink(c_src_path.c_str());
+ close(fd_module);
+ close(fd_c);
+ return false;
+ }
+ }
+#endif
}
// We're done with these file handles.