keyctl.c 26.7 KB
Newer Older
L
Linus Torvalds 已提交
1 2
/* keyctl.c: userspace keyctl operations
 *
3
 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
#include <linux/sched.h>
#include <linux/slab.h>
#include <linux/syscalls.h>
#include <linux/keyctl.h>
#include <linux/fs.h>
19
#include <linux/capability.h>
20
#include <linux/string.h>
L
Linus Torvalds 已提交
21
#include <linux/err.h>
22
#include <linux/vmalloc.h>
L
Linus Torvalds 已提交
23 24 25
#include <asm/uaccess.h>
#include "internal.h"

26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
static int key_get_type_from_user(char *type,
				  const char __user *_type,
				  unsigned len)
{
	int ret;

	ret = strncpy_from_user(type, _type, len);

	if (ret < 0)
		return -EFAULT;

	if (ret == 0 || ret >= len)
		return -EINVAL;

	if (type[0] == '.')
		return -EPERM;

	type[len - 1] = '\0';

	return 0;
}

L
Linus Torvalds 已提交
48 49 50 51 52 53 54 55 56 57 58 59 60 61
/*****************************************************************************/
/*
 * extract the description of a new key from userspace and either add it as a
 * new key to the specified keyring or update a matching key in that keyring
 * - the keyring must be writable
 * - returns the new key's serial number
 * - implements add_key()
 */
asmlinkage long sys_add_key(const char __user *_type,
			    const char __user *_description,
			    const void __user *_payload,
			    size_t plen,
			    key_serial_t ringid)
{
62
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
63 64
	char type[32], *description;
	void *payload;
65
	long ret;
66
	bool vm;
L
Linus Torvalds 已提交
67 68

	ret = -EINVAL;
69
	if (plen > 1024 * 1024 - 1)
L
Linus Torvalds 已提交
70 71 72
		goto error;

	/* draw all the data into kernel space */
73
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
74 75 76
	if (ret < 0)
		goto error;

77 78 79
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
80
		goto error;
81
	}
L
Linus Torvalds 已提交
82 83 84 85

	/* pull the payload in if one was supplied */
	payload = NULL;

86
	vm = false;
L
Linus Torvalds 已提交
87 88 89
	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
90 91 92 93 94 95 96 97
		if (!payload) {
			if (plen <= PAGE_SIZE)
				goto error2;
			vm = true;
			payload = vmalloc(plen);
			if (!payload)
				goto error2;
		}
L
Linus Torvalds 已提交
98 99 100 101 102 103 104

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error3;
	}

	/* find the target keyring (which must be writable) */
105 106 107
	keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
108 109 110 111 112
		goto error3;
	}

	/* create or update the requested key and add it to the target
	 * keyring */
113
	key_ref = key_create_or_update(keyring_ref, type, description,
114
				       payload, plen, KEY_ALLOC_IN_QUOTA);
115 116 117
	if (!IS_ERR(key_ref)) {
		ret = key_ref_to_ptr(key_ref)->serial;
		key_ref_put(key_ref);
L
Linus Torvalds 已提交
118 119
	}
	else {
120
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
121 122
	}

123
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
124
 error3:
125 126 127 128
	if (!vm)
		kfree(payload);
	else
		vfree(payload);
L
Linus Torvalds 已提交
129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152
 error2:
	kfree(description);
 error:
	return ret;

} /* end sys_add_key() */

/*****************************************************************************/
/*
 * search the process keyrings for a matching key
 * - nested keyrings may also be searched if they have Search permission
 * - if a key is found, it will be attached to the destination keyring if
 *   there's one specified
 * - /sbin/request-key will be invoked if _callout_info is non-NULL
 *   - the _callout_info string will be passed to /sbin/request-key
 *   - if the _callout_info string is empty, it will be rendered as "-"
 * - implements request_key()
 */
asmlinkage long sys_request_key(const char __user *_type,
				const char __user *_description,
				const char __user *_callout_info,
				key_serial_t destringid)
{
	struct key_type *ktype;
153 154
	struct key *key;
	key_ref_t dest_ref;
155
	size_t callout_len;
L
Linus Torvalds 已提交
156
	char type[32], *description, *callout_info;
157
	long ret;
L
Linus Torvalds 已提交
158 159

	/* pull the type into kernel space */
160
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
161 162
	if (ret < 0)
		goto error;
163

L
Linus Torvalds 已提交
164
	/* pull the description into kernel space */
165 166 167
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
168
		goto error;
169
	}
L
Linus Torvalds 已提交
170 171 172

	/* pull the callout info into kernel space */
	callout_info = NULL;
173
	callout_len = 0;
L
Linus Torvalds 已提交
174
	if (_callout_info) {
175 176 177
		callout_info = strndup_user(_callout_info, PAGE_SIZE);
		if (IS_ERR(callout_info)) {
			ret = PTR_ERR(callout_info);
L
Linus Torvalds 已提交
178
			goto error2;
179
		}
180
		callout_len = strlen(callout_info);
L
Linus Torvalds 已提交
181 182 183
	}

	/* get the destination keyring if specified */
184
	dest_ref = NULL;
L
Linus Torvalds 已提交
185
	if (destringid) {
186 187 188
		dest_ref = lookup_user_key(NULL, destringid, 1, 0, KEY_WRITE);
		if (IS_ERR(dest_ref)) {
			ret = PTR_ERR(dest_ref);
L
Linus Torvalds 已提交
189 190 191 192 193 194 195 196 197 198 199 200
			goto error3;
		}
	}

	/* find the key type */
	ktype = key_type_lookup(type);
	if (IS_ERR(ktype)) {
		ret = PTR_ERR(ktype);
		goto error4;
	}

	/* do the search */
201 202
	key = request_key_and_link(ktype, description, callout_info,
				   callout_len, NULL, key_ref_to_ptr(dest_ref),
203
				   KEY_ALLOC_IN_QUOTA);
L
Linus Torvalds 已提交
204 205 206 207 208 209 210
	if (IS_ERR(key)) {
		ret = PTR_ERR(key);
		goto error5;
	}

	ret = key->serial;

211
 	key_put(key);
L
Linus Torvalds 已提交
212 213 214
 error5:
	key_type_put(ktype);
 error4:
215
	key_ref_put(dest_ref);
L
Linus Torvalds 已提交
216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232
 error3:
	kfree(callout_info);
 error2:
	kfree(description);
 error:
	return ret;

} /* end sys_request_key() */

/*****************************************************************************/
/*
 * get the ID of the specified process keyring
 * - the keyring must have search permission to be found
 * - implements keyctl(KEYCTL_GET_KEYRING_ID)
 */
long keyctl_get_keyring_ID(key_serial_t id, int create)
{
233
	key_ref_t key_ref;
L
Linus Torvalds 已提交
234 235
	long ret;

236 237 238
	key_ref = lookup_user_key(NULL, id, create, 0, KEY_SEARCH);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
239 240 241
		goto error;
	}

242 243
	ret = key_ref_to_ptr(key_ref)->serial;
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
244 245 246 247 248 249 250 251 252 253 254 255 256
 error:
	return ret;

} /* end keyctl_get_keyring_ID() */

/*****************************************************************************/
/*
 * join the session keyring
 * - implements keyctl(KEYCTL_JOIN_SESSION_KEYRING)
 */
long keyctl_join_session_keyring(const char __user *_name)
{
	char *name;
257
	long ret;
L
Linus Torvalds 已提交
258 259 260 261

	/* fetch the name from userspace */
	name = NULL;
	if (_name) {
262 263 264
		name = strndup_user(_name, PAGE_SIZE);
		if (IS_ERR(name)) {
			ret = PTR_ERR(name);
L
Linus Torvalds 已提交
265
			goto error;
266
		}
L
Linus Torvalds 已提交
267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286
	}

	/* join the session */
	ret = join_session_keyring(name);

 error:
	return ret;

} /* end keyctl_join_session_keyring() */

/*****************************************************************************/
/*
 * update a key's data payload
 * - the key must be writable
 * - implements keyctl(KEYCTL_UPDATE)
 */
long keyctl_update_key(key_serial_t id,
		       const void __user *_payload,
		       size_t plen)
{
287
	key_ref_t key_ref;
L
Linus Torvalds 已提交
288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
	void *payload;
	long ret;

	ret = -EINVAL;
	if (plen > PAGE_SIZE)
		goto error;

	/* pull the payload in if one was supplied */
	payload = NULL;
	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
		if (!payload)
			goto error;

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error2;
	}

	/* find the target key (which must be writable) */
309 310 311
	key_ref = lookup_user_key(NULL, id, 0, 0, KEY_WRITE);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
312 313 314 315
		goto error2;
	}

	/* update the key */
316
	ret = key_update(key_ref, payload, plen);
L
Linus Torvalds 已提交
317

318
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
319 320 321 322 323 324 325 326 327 328 329 330 331 332 333
 error2:
	kfree(payload);
 error:
	return ret;

} /* end keyctl_update_key() */

/*****************************************************************************/
/*
 * revoke a key
 * - the key must be writable
 * - implements keyctl(KEYCTL_REVOKE)
 */
long keyctl_revoke_key(key_serial_t id)
{
334
	key_ref_t key_ref;
L
Linus Torvalds 已提交
335 336
	long ret;

337 338 339
	key_ref = lookup_user_key(NULL, id, 0, 0, KEY_WRITE);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
340 341 342
		goto error;
	}

343
	key_revoke(key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
344 345
	ret = 0;

346
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
347
 error:
348
	return ret;
L
Linus Torvalds 已提交
349 350 351 352 353 354 355 356 357 358 359

} /* end keyctl_revoke_key() */

/*****************************************************************************/
/*
 * clear the specified process keyring
 * - the keyring must be writable
 * - implements keyctl(KEYCTL_CLEAR)
 */
long keyctl_keyring_clear(key_serial_t ringid)
{
360
	key_ref_t keyring_ref;
L
Linus Torvalds 已提交
361 362
	long ret;

363 364 365
	keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
366 367 368
		goto error;
	}

369
	ret = keyring_clear(key_ref_to_ptr(keyring_ref));
L
Linus Torvalds 已提交
370

371
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
372 373 374 375 376 377 378 379 380 381 382 383 384 385
 error:
	return ret;

} /* end keyctl_keyring_clear() */

/*****************************************************************************/
/*
 * link a key into a keyring
 * - the keyring must be writable
 * - the key must be linkable
 * - implements keyctl(KEYCTL_LINK)
 */
long keyctl_keyring_link(key_serial_t id, key_serial_t ringid)
{
386
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
387 388
	long ret;

389 390 391
	keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
392 393 394
		goto error;
	}

395 396 397
	key_ref = lookup_user_key(NULL, id, 1, 0, KEY_LINK);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
398 399 400
		goto error2;
	}

401
	ret = key_link(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
402

403
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
404
 error2:
405
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
406 407 408 409 410 411 412 413 414 415 416 417 418 419
 error:
	return ret;

} /* end keyctl_keyring_link() */

/*****************************************************************************/
/*
 * unlink the first attachment of a key from a keyring
 * - the keyring must be writable
 * - we don't need any permissions on the key
 * - implements keyctl(KEYCTL_UNLINK)
 */
long keyctl_keyring_unlink(key_serial_t id, key_serial_t ringid)
{
420
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
421 422
	long ret;

423 424 425
	keyring_ref = lookup_user_key(NULL, ringid, 0, 0, KEY_WRITE);
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
426 427 428
		goto error;
	}

429 430 431
	key_ref = lookup_user_key(NULL, id, 0, 0, 0);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
432 433 434
		goto error2;
	}

435
	ret = key_unlink(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
436

437
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
438
 error2:
439
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459
 error:
	return ret;

} /* end keyctl_keyring_unlink() */

/*****************************************************************************/
/*
 * describe a user key
 * - the key must have view permission
 * - if there's a buffer, we place up to buflen bytes of data into it
 * - unless there's an error, we return the amount of description available,
 *   irrespective of how much we may have copied
 * - the description is formatted thus:
 *	type;uid;gid;perm;description<NUL>
 * - implements keyctl(KEYCTL_DESCRIBE)
 */
long keyctl_describe_key(key_serial_t keyid,
			 char __user *buffer,
			 size_t buflen)
{
460
	struct key *key, *instkey;
461
	key_ref_t key_ref;
L
Linus Torvalds 已提交
462 463 464
	char *tmpbuf;
	long ret;

465 466
	key_ref = lookup_user_key(NULL, keyid, 0, 1, KEY_VIEW);
	if (IS_ERR(key_ref)) {
467 468
		/* viewing a key under construction is permitted if we have the
		 * authorisation token handy */
469
		if (PTR_ERR(key_ref) == -EACCES) {
470 471 472
			instkey = key_get_instantiation_authkey(keyid);
			if (!IS_ERR(instkey)) {
				key_put(instkey);
473 474 475
				key_ref = lookup_user_key(NULL, keyid,
							  0, 1, 0);
				if (!IS_ERR(key_ref))
476 477 478 479
					goto okay;
			}
		}

480
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
481 482 483
		goto error;
	}

484
okay:
L
Linus Torvalds 已提交
485 486 487 488 489 490
	/* calculate how much description we're going to return */
	ret = -ENOMEM;
	tmpbuf = kmalloc(PAGE_SIZE, GFP_KERNEL);
	if (!tmpbuf)
		goto error2;

491 492
	key = key_ref_to_ptr(key_ref);

L
Linus Torvalds 已提交
493
	ret = snprintf(tmpbuf, PAGE_SIZE - 1,
494 495 496 497 498 499 500
		       "%s;%d;%d;%08x;%s",
		       key_ref_to_ptr(key_ref)->type->name,
		       key_ref_to_ptr(key_ref)->uid,
		       key_ref_to_ptr(key_ref)->gid,
		       key_ref_to_ptr(key_ref)->perm,
		       key_ref_to_ptr(key_ref)->description ?
		       key_ref_to_ptr(key_ref)->description : ""
L
Linus Torvalds 已提交
501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519
		       );

	/* include a NUL char at the end of the data */
	if (ret > PAGE_SIZE - 1)
		ret = PAGE_SIZE - 1;
	tmpbuf[ret] = 0;
	ret++;

	/* consider returning the data */
	if (buffer && buflen > 0) {
		if (buflen > ret)
			buflen = ret;

		if (copy_to_user(buffer, tmpbuf, buflen) != 0)
			ret = -EFAULT;
	}

	kfree(tmpbuf);
 error2:
520
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541
 error:
	return ret;

} /* end keyctl_describe_key() */

/*****************************************************************************/
/*
 * search the specified keyring for a matching key
 * - the start keyring must be searchable
 * - nested keyrings may also be searched if they are searchable
 * - only keys with search permission may be found
 * - if a key is found, it will be attached to the destination keyring if
 *   there's one specified
 * - implements keyctl(KEYCTL_SEARCH)
 */
long keyctl_keyring_search(key_serial_t ringid,
			   const char __user *_type,
			   const char __user *_description,
			   key_serial_t destringid)
{
	struct key_type *ktype;
542
	key_ref_t keyring_ref, key_ref, dest_ref;
L
Linus Torvalds 已提交
543
	char type[32], *description;
544
	long ret;
L
Linus Torvalds 已提交
545 546

	/* pull the type and description into kernel space */
547
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
548 549 550
	if (ret < 0)
		goto error;

551 552 553
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
554
		goto error;
555
	}
L
Linus Torvalds 已提交
556 557

	/* get the keyring at which to begin the search */
558 559 560
	keyring_ref = lookup_user_key(NULL, ringid, 0, 0, KEY_SEARCH);
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
561 562 563 564
		goto error2;
	}

	/* get the destination keyring if specified */
565
	dest_ref = NULL;
L
Linus Torvalds 已提交
566
	if (destringid) {
567 568 569
		dest_ref = lookup_user_key(NULL, destringid, 1, 0, KEY_WRITE);
		if (IS_ERR(dest_ref)) {
			ret = PTR_ERR(dest_ref);
L
Linus Torvalds 已提交
570 571 572 573 574 575 576 577 578 579 580 581
			goto error3;
		}
	}

	/* find the key type */
	ktype = key_type_lookup(type);
	if (IS_ERR(ktype)) {
		ret = PTR_ERR(ktype);
		goto error4;
	}

	/* do the search */
582 583 584
	key_ref = keyring_search(keyring_ref, ktype, description);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
585 586 587 588 589 590 591 592

		/* treat lack or presence of a negative key the same */
		if (ret == -EAGAIN)
			ret = -ENOKEY;
		goto error5;
	}

	/* link the resulting key to the destination keyring if we can */
593
	if (dest_ref) {
594 595
		ret = key_permission(key_ref, KEY_LINK);
		if (ret < 0)
L
Linus Torvalds 已提交
596 597
			goto error6;

598
		ret = key_link(key_ref_to_ptr(dest_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
599 600 601 602
		if (ret < 0)
			goto error6;
	}

603
	ret = key_ref_to_ptr(key_ref)->serial;
L
Linus Torvalds 已提交
604 605

 error6:
606
	key_ref_put(key_ref);
L
Linus Torvalds 已提交
607 608 609
 error5:
	key_type_put(ktype);
 error4:
610
	key_ref_put(dest_ref);
L
Linus Torvalds 已提交
611
 error3:
612
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631
 error2:
	kfree(description);
 error:
	return ret;

} /* end keyctl_keyring_search() */

/*****************************************************************************/
/*
 * read a user key's payload
 * - the keyring must be readable or the key must be searchable from the
 *   process's keyrings
 * - if there's a buffer, we place up to buflen bytes of data into it
 * - unless there's an error, we return the amount of data in the key,
 *   irrespective of how much we may have copied
 * - implements keyctl(KEYCTL_READ)
 */
long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen)
{
632 633
	struct key *key;
	key_ref_t key_ref;
L
Linus Torvalds 已提交
634 635 636
	long ret;

	/* find the key first */
637 638 639 640
	key_ref = lookup_user_key(NULL, keyid, 0, 0, 0);
	if (IS_ERR(key_ref)) {
		ret = -ENOKEY;
		goto error;
L
Linus Torvalds 已提交
641 642
	}

643 644 645
	key = key_ref_to_ptr(key_ref);

	/* see if we can read it directly */
646 647
	ret = key_permission(key_ref, KEY_READ);
	if (ret == 0)
648
		goto can_read_key;
649 650
	if (ret != -EACCES)
		goto error;
651 652 653 654 655 656 657 658 659

	/* we can't; see if it's searchable from this process's keyrings
	 * - we automatically take account of the fact that it may be
	 *   dangling off an instantiation key
	 */
	if (!is_key_possessed(key_ref)) {
		ret = -EACCES;
		goto error2;
	}
L
Linus Torvalds 已提交
660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690

	/* the key is probably readable - now try to read it */
 can_read_key:
	ret = key_validate(key);
	if (ret == 0) {
		ret = -EOPNOTSUPP;
		if (key->type->read) {
			/* read the data with the semaphore held (since we
			 * might sleep) */
			down_read(&key->sem);
			ret = key->type->read(key, buffer, buflen);
			up_read(&key->sem);
		}
	}

 error2:
	key_put(key);
 error:
	return ret;

} /* end keyctl_read_key() */

/*****************************************************************************/
/*
 * change the ownership of a key
 * - the keyring owned by the changer
 * - if the uid or gid is -1, then that parameter is not changed
 * - implements keyctl(KEYCTL_CHOWN)
 */
long keyctl_chown_key(key_serial_t id, uid_t uid, gid_t gid)
{
691
	struct key_user *newowner, *zapowner = NULL;
L
Linus Torvalds 已提交
692
	struct key *key;
693
	key_ref_t key_ref;
L
Linus Torvalds 已提交
694 695 696 697 698 699
	long ret;

	ret = 0;
	if (uid == (uid_t) -1 && gid == (gid_t) -1)
		goto error;

700
	key_ref = lookup_user_key(NULL, id, 1, 1, KEY_SETATTR);
701 702
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
703 704 705
		goto error;
	}

706 707
	key = key_ref_to_ptr(key_ref);

L
Linus Torvalds 已提交
708 709 710 711 712 713 714
	/* make the changes with the locks held to prevent chown/chown races */
	ret = -EACCES;
	down_write(&key->sem);

	if (!capable(CAP_SYS_ADMIN)) {
		/* only the sysadmin can chown a key to some other UID */
		if (uid != (uid_t) -1 && key->uid != uid)
715
			goto error_put;
L
Linus Torvalds 已提交
716 717 718 719

		/* only the sysadmin can set the key's GID to a group other
		 * than one of those that the current process subscribes to */
		if (gid != (gid_t) -1 && gid != key->gid && !in_group_p(gid))
720
			goto error_put;
L
Linus Torvalds 已提交
721 722
	}

723
	/* change the UID */
L
Linus Torvalds 已提交
724
	if (uid != (uid_t) -1 && uid != key->uid) {
725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758
		ret = -ENOMEM;
		newowner = key_user_lookup(uid);
		if (!newowner)
			goto error_put;

		/* transfer the quota burden to the new user */
		if (test_bit(KEY_FLAG_IN_QUOTA, &key->flags)) {
			spin_lock(&newowner->lock);
			if (newowner->qnkeys + 1 >= KEYQUOTA_MAX_KEYS ||
			    newowner->qnbytes + key->quotalen >=
			    KEYQUOTA_MAX_BYTES)
				goto quota_overrun;

			newowner->qnkeys++;
			newowner->qnbytes += key->quotalen;
			spin_unlock(&newowner->lock);

			spin_lock(&key->user->lock);
			key->user->qnkeys--;
			key->user->qnbytes -= key->quotalen;
			spin_unlock(&key->user->lock);
		}

		atomic_dec(&key->user->nkeys);
		atomic_inc(&newowner->nkeys);

		if (test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
			atomic_dec(&key->user->nikeys);
			atomic_inc(&newowner->nikeys);
		}

		zapowner = key->user;
		key->user = newowner;
		key->uid = uid;
L
Linus Torvalds 已提交
759 760 761 762 763 764 765 766
	}

	/* change the GID */
	if (gid != (gid_t) -1)
		key->gid = gid;

	ret = 0;

767
error_put:
L
Linus Torvalds 已提交
768 769
	up_write(&key->sem);
	key_put(key);
770 771 772
	if (zapowner)
		key_user_put(zapowner);
error:
L
Linus Torvalds 已提交
773 774
	return ret;

775 776 777 778 779 780
quota_overrun:
	spin_unlock(&newowner->lock);
	zapowner = newowner;
	ret = -EDQUOT;
	goto error_put;

L
Linus Torvalds 已提交
781 782 783 784 785 786 787 788 789 790 791
} /* end keyctl_chown_key() */

/*****************************************************************************/
/*
 * change the permission mask on a key
 * - the keyring owned by the changer
 * - implements keyctl(KEYCTL_SETPERM)
 */
long keyctl_setperm_key(key_serial_t id, key_perm_t perm)
{
	struct key *key;
792
	key_ref_t key_ref;
L
Linus Torvalds 已提交
793 794 795
	long ret;

	ret = -EINVAL;
796
	if (perm & ~(KEY_POS_ALL | KEY_USR_ALL | KEY_GRP_ALL | KEY_OTH_ALL))
L
Linus Torvalds 已提交
797 798
		goto error;

799
	key_ref = lookup_user_key(NULL, id, 1, 1, KEY_SETATTR);
800 801
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
802 803 804
		goto error;
	}

805 806
	key = key_ref_to_ptr(key_ref);

807
	/* make the changes with the locks held to prevent chown/chmod races */
L
Linus Torvalds 已提交
808 809 810
	ret = -EACCES;
	down_write(&key->sem);

811 812 813 814 815
	/* if we're not the sysadmin, we can only change a key that we own */
	if (capable(CAP_SYS_ADMIN) || key->uid == current->fsuid) {
		key->perm = perm;
		ret = 0;
	}
L
Linus Torvalds 已提交
816 817 818

	up_write(&key->sem);
	key_put(key);
819
error:
L
Linus Torvalds 已提交
820 821 822 823 824 825 826 827 828 829 830 831 832 833
	return ret;

} /* end keyctl_setperm_key() */

/*****************************************************************************/
/*
 * instantiate the key with the specified payload, and, if one is given, link
 * the key into the keyring
 */
long keyctl_instantiate_key(key_serial_t id,
			    const void __user *_payload,
			    size_t plen,
			    key_serial_t ringid)
{
834
	struct request_key_auth *rka;
835 836
	struct key *instkey;
	key_ref_t keyring_ref;
L
Linus Torvalds 已提交
837 838
	void *payload;
	long ret;
839
	bool vm = false;
L
Linus Torvalds 已提交
840 841

	ret = -EINVAL;
842
	if (plen > 1024 * 1024 - 1)
L
Linus Torvalds 已提交
843 844
		goto error;

845 846 847 848 849 850 851 852 853 854 855
	/* the appropriate instantiation authorisation key must have been
	 * assumed before calling this */
	ret = -EPERM;
	instkey = current->request_key_auth;
	if (!instkey)
		goto error;

	rka = instkey->payload.data;
	if (rka->target_key->serial != id)
		goto error;

L
Linus Torvalds 已提交
856 857 858 859 860 861
	/* pull the payload in if one was supplied */
	payload = NULL;

	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
862 863 864 865 866 867 868 869
		if (!payload) {
			if (plen <= PAGE_SIZE)
				goto error;
			vm = true;
			payload = vmalloc(plen);
			if (!payload)
				goto error;
		}
L
Linus Torvalds 已提交
870 871 872 873 874 875

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error2;
	}

876 877
	/* find the destination keyring amongst those belonging to the
	 * requesting task */
878
	keyring_ref = NULL;
L
Linus Torvalds 已提交
879
	if (ringid) {
880 881 882 883
		keyring_ref = lookup_user_key(rka->context, ringid, 1, 0,
					      KEY_WRITE);
		if (IS_ERR(keyring_ref)) {
			ret = PTR_ERR(keyring_ref);
884
			goto error2;
L
Linus Torvalds 已提交
885 886 887 888
		}
	}

	/* instantiate the key and link it into a keyring */
889
	ret = key_instantiate_and_link(rka->target_key, payload, plen,
890
				       key_ref_to_ptr(keyring_ref), instkey);
L
Linus Torvalds 已提交
891

892
	key_ref_put(keyring_ref);
893 894 895 896 897 898 899 900 901

	/* discard the assumed authority if it's just been disabled by
	 * instantiation of the key */
	if (ret == 0) {
		key_put(current->request_key_auth);
		current->request_key_auth = NULL;
	}

error2:
902 903 904 905
	if (!vm)
		kfree(payload);
	else
		vfree(payload);
906
error:
L
Linus Torvalds 已提交
907 908 909 910 911 912 913 914 915 916 917
	return ret;

} /* end keyctl_instantiate_key() */

/*****************************************************************************/
/*
 * negatively instantiate the key with the given timeout (in seconds), and, if
 * one is given, link the key into the keyring
 */
long keyctl_negate_key(key_serial_t id, unsigned timeout, key_serial_t ringid)
{
918
	struct request_key_auth *rka;
919 920
	struct key *instkey;
	key_ref_t keyring_ref;
L
Linus Torvalds 已提交
921 922
	long ret;

923 924 925 926 927
	/* the appropriate instantiation authorisation key must have been
	 * assumed before calling this */
	ret = -EPERM;
	instkey = current->request_key_auth;
	if (!instkey)
L
Linus Torvalds 已提交
928 929
		goto error;

930
	rka = instkey->payload.data;
931 932
	if (rka->target_key->serial != id)
		goto error;
933

L
Linus Torvalds 已提交
934 935
	/* find the destination keyring if present (which must also be
	 * writable) */
936
	keyring_ref = NULL;
L
Linus Torvalds 已提交
937
	if (ringid) {
938 939 940
		keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
		if (IS_ERR(keyring_ref)) {
			ret = PTR_ERR(keyring_ref);
941
			goto error;
L
Linus Torvalds 已提交
942 943 944 945
		}
	}

	/* instantiate the key and link it into a keyring */
946 947
	ret = key_negate_and_link(rka->target_key, timeout,
				  key_ref_to_ptr(keyring_ref), instkey);
L
Linus Torvalds 已提交
948

949
	key_ref_put(keyring_ref);
950 951 952 953 954 955 956 957 958

	/* discard the assumed authority if it's just been disabled by
	 * instantiation of the key */
	if (ret == 0) {
		key_put(current->request_key_auth);
		current->request_key_auth = NULL;
	}

error:
L
Linus Torvalds 已提交
959 960 961 962
	return ret;

} /* end keyctl_negate_key() */

963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000
/*****************************************************************************/
/*
 * set the default keyring in which request_key() will cache keys
 * - return the old setting
 */
long keyctl_set_reqkey_keyring(int reqkey_defl)
{
	int ret;

	switch (reqkey_defl) {
	case KEY_REQKEY_DEFL_THREAD_KEYRING:
		ret = install_thread_keyring(current);
		if (ret < 0)
			return ret;
		goto set;

	case KEY_REQKEY_DEFL_PROCESS_KEYRING:
		ret = install_process_keyring(current);
		if (ret < 0)
			return ret;

	case KEY_REQKEY_DEFL_DEFAULT:
	case KEY_REQKEY_DEFL_SESSION_KEYRING:
	case KEY_REQKEY_DEFL_USER_KEYRING:
	case KEY_REQKEY_DEFL_USER_SESSION_KEYRING:
	set:
		current->jit_keyring = reqkey_defl;

	case KEY_REQKEY_DEFL_NO_CHANGE:
		return current->jit_keyring;

	case KEY_REQKEY_DEFL_GROUP_KEYRING:
	default:
		return -EINVAL;
	}

} /* end keyctl_set_reqkey_keyring() */

1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040
/*****************************************************************************/
/*
 * set or clear the timeout for a key
 */
long keyctl_set_timeout(key_serial_t id, unsigned timeout)
{
	struct timespec now;
	struct key *key;
	key_ref_t key_ref;
	time_t expiry;
	long ret;

	key_ref = lookup_user_key(NULL, id, 1, 1, KEY_SETATTR);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
		goto error;
	}

	key = key_ref_to_ptr(key_ref);

	/* make the changes with the locks held to prevent races */
	down_write(&key->sem);

	expiry = 0;
	if (timeout > 0) {
		now = current_kernel_time();
		expiry = now.tv_sec + timeout;
	}

	key->expiry = expiry;

	up_write(&key->sem);
	key_put(key);

	ret = 0;
error:
	return ret;

} /* end keyctl_set_timeout() */

1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082
/*****************************************************************************/
/*
 * assume the authority to instantiate the specified key
 */
long keyctl_assume_authority(key_serial_t id)
{
	struct key *authkey;
	long ret;

	/* special key IDs aren't permitted */
	ret = -EINVAL;
	if (id < 0)
		goto error;

	/* we divest ourselves of authority if given an ID of 0 */
	if (id == 0) {
		key_put(current->request_key_auth);
		current->request_key_auth = NULL;
		ret = 0;
		goto error;
	}

	/* attempt to assume the authority temporarily granted to us whilst we
	 * instantiate the specified key
	 * - the authorisation key must be in the current task's keyrings
	 *   somewhere
	 */
	authkey = key_get_instantiation_authkey(id);
	if (IS_ERR(authkey)) {
		ret = PTR_ERR(authkey);
		goto error;
	}

	key_put(current->request_key_auth);
	current->request_key_auth = authkey;
	ret = authkey->serial;

error:
	return ret;

} /* end keyctl_assume_authority() */

L
Linus Torvalds 已提交
1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152
/*****************************************************************************/
/*
 * the key control system call
 */
asmlinkage long sys_keyctl(int option, unsigned long arg2, unsigned long arg3,
			   unsigned long arg4, unsigned long arg5)
{
	switch (option) {
	case KEYCTL_GET_KEYRING_ID:
		return keyctl_get_keyring_ID((key_serial_t) arg2,
					     (int) arg3);

	case KEYCTL_JOIN_SESSION_KEYRING:
		return keyctl_join_session_keyring((const char __user *) arg2);

	case KEYCTL_UPDATE:
		return keyctl_update_key((key_serial_t) arg2,
					 (const void __user *) arg3,
					 (size_t) arg4);

	case KEYCTL_REVOKE:
		return keyctl_revoke_key((key_serial_t) arg2);

	case KEYCTL_DESCRIBE:
		return keyctl_describe_key((key_serial_t) arg2,
					   (char __user *) arg3,
					   (unsigned) arg4);

	case KEYCTL_CLEAR:
		return keyctl_keyring_clear((key_serial_t) arg2);

	case KEYCTL_LINK:
		return keyctl_keyring_link((key_serial_t) arg2,
					   (key_serial_t) arg3);

	case KEYCTL_UNLINK:
		return keyctl_keyring_unlink((key_serial_t) arg2,
					     (key_serial_t) arg3);

	case KEYCTL_SEARCH:
		return keyctl_keyring_search((key_serial_t) arg2,
					     (const char __user *) arg3,
					     (const char __user *) arg4,
					     (key_serial_t) arg5);

	case KEYCTL_READ:
		return keyctl_read_key((key_serial_t) arg2,
				       (char __user *) arg3,
				       (size_t) arg4);

	case KEYCTL_CHOWN:
		return keyctl_chown_key((key_serial_t) arg2,
					(uid_t) arg3,
					(gid_t) arg4);

	case KEYCTL_SETPERM:
		return keyctl_setperm_key((key_serial_t) arg2,
					  (key_perm_t) arg3);

	case KEYCTL_INSTANTIATE:
		return keyctl_instantiate_key((key_serial_t) arg2,
					      (const void __user *) arg3,
					      (size_t) arg4,
					      (key_serial_t) arg5);

	case KEYCTL_NEGATE:
		return keyctl_negate_key((key_serial_t) arg2,
					 (unsigned) arg3,
					 (key_serial_t) arg4);

1153 1154 1155
	case KEYCTL_SET_REQKEY_KEYRING:
		return keyctl_set_reqkey_keyring(arg2);

1156 1157 1158 1159
	case KEYCTL_SET_TIMEOUT:
		return keyctl_set_timeout((key_serial_t) arg2,
					  (unsigned) arg3);

1160 1161 1162
	case KEYCTL_ASSUME_AUTHORITY:
		return keyctl_assume_authority((key_serial_t) arg2);

L
Linus Torvalds 已提交
1163 1164 1165 1166 1167
	default:
		return -EOPNOTSUPP;
	}

} /* end sys_keyctl() */