keyctl.c 31.2 KB
Newer Older
L
Linus Torvalds 已提交
1 2
/* keyctl.c: userspace keyctl operations
 *
3
 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
#include <linux/sched.h>
#include <linux/slab.h>
#include <linux/syscalls.h>
#include <linux/keyctl.h>
#include <linux/fs.h>
19
#include <linux/capability.h>
20
#include <linux/string.h>
L
Linus Torvalds 已提交
21
#include <linux/err.h>
22
#include <linux/vmalloc.h>
23
#include <linux/security.h>
L
Linus Torvalds 已提交
24 25 26
#include <asm/uaccess.h>
#include "internal.h"

27 28 29 30 31 32 33 34 35
static int key_get_type_from_user(char *type,
				  const char __user *_type,
				  unsigned len)
{
	int ret;

	ret = strncpy_from_user(type, _type, len);

	if (ret < 0)
36
		return ret;
37 38 39 40 41 42 43 44 45 46 47 48

	if (ret == 0 || ret >= len)
		return -EINVAL;

	if (type[0] == '.')
		return -EPERM;

	type[len - 1] = '\0';

	return 0;
}

L
Linus Torvalds 已提交
49 50 51 52 53 54 55
/*
 * extract the description of a new key from userspace and either add it as a
 * new key to the specified keyring or update a matching key in that keyring
 * - the keyring must be writable
 * - returns the new key's serial number
 * - implements add_key()
 */
56 57 58 59 60
SYSCALL_DEFINE5(add_key, const char __user *, _type,
		const char __user *, _description,
		const void __user *, _payload,
		size_t, plen,
		key_serial_t, ringid)
L
Linus Torvalds 已提交
61
{
62
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
63 64
	char type[32], *description;
	void *payload;
65
	long ret;
66
	bool vm;
L
Linus Torvalds 已提交
67 68

	ret = -EINVAL;
69
	if (plen > 1024 * 1024 - 1)
L
Linus Torvalds 已提交
70 71 72
		goto error;

	/* draw all the data into kernel space */
73
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
74 75 76
	if (ret < 0)
		goto error;

77 78 79
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
80
		goto error;
81
	}
L
Linus Torvalds 已提交
82 83 84 85

	/* pull the payload in if one was supplied */
	payload = NULL;

86
	vm = false;
L
Linus Torvalds 已提交
87 88 89
	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
90 91 92 93 94 95 96 97
		if (!payload) {
			if (plen <= PAGE_SIZE)
				goto error2;
			vm = true;
			payload = vmalloc(plen);
			if (!payload)
				goto error2;
		}
L
Linus Torvalds 已提交
98 99 100 101 102 103 104

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error3;
	}

	/* find the target keyring (which must be writable) */
105
	keyring_ref = lookup_user_key(ringid, KEY_LOOKUP_CREATE, KEY_WRITE);
106 107
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
108 109 110 111 112
		goto error3;
	}

	/* create or update the requested key and add it to the target
	 * keyring */
113
	key_ref = key_create_or_update(keyring_ref, type, description,
114 115
				       payload, plen, KEY_PERM_UNDEF,
				       KEY_ALLOC_IN_QUOTA);
116 117 118
	if (!IS_ERR(key_ref)) {
		ret = key_ref_to_ptr(key_ref)->serial;
		key_ref_put(key_ref);
L
Linus Torvalds 已提交
119 120
	}
	else {
121
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
122 123
	}

124
	key_ref_put(keyring_ref);
L
Linus Torvalds 已提交
125
 error3:
126 127 128 129
	if (!vm)
		kfree(payload);
	else
		vfree(payload);
L
Linus Torvalds 已提交
130 131 132 133
 error2:
	kfree(description);
 error:
	return ret;
134
}
L
Linus Torvalds 已提交
135 136 137 138 139 140 141 142 143 144 145

/*
 * search the process keyrings for a matching key
 * - nested keyrings may also be searched if they have Search permission
 * - if a key is found, it will be attached to the destination keyring if
 *   there's one specified
 * - /sbin/request-key will be invoked if _callout_info is non-NULL
 *   - the _callout_info string will be passed to /sbin/request-key
 *   - if the _callout_info string is empty, it will be rendered as "-"
 * - implements request_key()
 */
146 147 148 149
SYSCALL_DEFINE4(request_key, const char __user *, _type,
		const char __user *, _description,
		const char __user *, _callout_info,
		key_serial_t, destringid)
L
Linus Torvalds 已提交
150 151
{
	struct key_type *ktype;
152 153
	struct key *key;
	key_ref_t dest_ref;
154
	size_t callout_len;
L
Linus Torvalds 已提交
155
	char type[32], *description, *callout_info;
156
	long ret;
L
Linus Torvalds 已提交
157 158

	/* pull the type into kernel space */
159
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
160 161
	if (ret < 0)
		goto error;
162

L
Linus Torvalds 已提交
163
	/* pull the description into kernel space */
164 165 166
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
167
		goto error;
168
	}
L
Linus Torvalds 已提交
169 170 171

	/* pull the callout info into kernel space */
	callout_info = NULL;
172
	callout_len = 0;
L
Linus Torvalds 已提交
173
	if (_callout_info) {
174 175 176
		callout_info = strndup_user(_callout_info, PAGE_SIZE);
		if (IS_ERR(callout_info)) {
			ret = PTR_ERR(callout_info);
L
Linus Torvalds 已提交
177
			goto error2;
178
		}
179
		callout_len = strlen(callout_info);
L
Linus Torvalds 已提交
180 181 182
	}

	/* get the destination keyring if specified */
183
	dest_ref = NULL;
L
Linus Torvalds 已提交
184
	if (destringid) {
185 186
		dest_ref = lookup_user_key(destringid, KEY_LOOKUP_CREATE,
					   KEY_WRITE);
187 188
		if (IS_ERR(dest_ref)) {
			ret = PTR_ERR(dest_ref);
L
Linus Torvalds 已提交
189 190 191 192 193 194 195 196 197 198 199 200
			goto error3;
		}
	}

	/* find the key type */
	ktype = key_type_lookup(type);
	if (IS_ERR(ktype)) {
		ret = PTR_ERR(ktype);
		goto error4;
	}

	/* do the search */
201 202
	key = request_key_and_link(ktype, description, callout_info,
				   callout_len, NULL, key_ref_to_ptr(dest_ref),
203
				   KEY_ALLOC_IN_QUOTA);
L
Linus Torvalds 已提交
204 205 206 207 208 209 210
	if (IS_ERR(key)) {
		ret = PTR_ERR(key);
		goto error5;
	}

	ret = key->serial;

211
 	key_put(key);
212
error5:
L
Linus Torvalds 已提交
213
	key_type_put(ktype);
214
error4:
215
	key_ref_put(dest_ref);
216
error3:
L
Linus Torvalds 已提交
217
	kfree(callout_info);
218
error2:
L
Linus Torvalds 已提交
219
	kfree(description);
220
error:
L
Linus Torvalds 已提交
221
	return ret;
222
}
L
Linus Torvalds 已提交
223 224 225 226 227 228 229 230

/*
 * get the ID of the specified process keyring
 * - the keyring must have search permission to be found
 * - implements keyctl(KEYCTL_GET_KEYRING_ID)
 */
long keyctl_get_keyring_ID(key_serial_t id, int create)
{
231
	key_ref_t key_ref;
232
	unsigned long lflags;
L
Linus Torvalds 已提交
233 234
	long ret;

235 236
	lflags = create ? KEY_LOOKUP_CREATE : 0;
	key_ref = lookup_user_key(id, lflags, KEY_SEARCH);
237 238
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
239 240 241
		goto error;
	}

242 243
	ret = key_ref_to_ptr(key_ref)->serial;
	key_ref_put(key_ref);
244
error:
L
Linus Torvalds 已提交
245 246 247 248 249 250 251 252 253 254 255
	return ret;

} /* end keyctl_get_keyring_ID() */

/*
 * join the session keyring
 * - implements keyctl(KEYCTL_JOIN_SESSION_KEYRING)
 */
long keyctl_join_session_keyring(const char __user *_name)
{
	char *name;
256
	long ret;
L
Linus Torvalds 已提交
257 258 259 260

	/* fetch the name from userspace */
	name = NULL;
	if (_name) {
261 262 263
		name = strndup_user(_name, PAGE_SIZE);
		if (IS_ERR(name)) {
			ret = PTR_ERR(name);
L
Linus Torvalds 已提交
264
			goto error;
265
		}
L
Linus Torvalds 已提交
266 267 268 269
	}

	/* join the session */
	ret = join_session_keyring(name);
270
	kfree(name);
L
Linus Torvalds 已提交
271

272
error:
L
Linus Torvalds 已提交
273
	return ret;
274
}
L
Linus Torvalds 已提交
275 276 277 278 279 280 281 282 283 284

/*
 * update a key's data payload
 * - the key must be writable
 * - implements keyctl(KEYCTL_UPDATE)
 */
long keyctl_update_key(key_serial_t id,
		       const void __user *_payload,
		       size_t plen)
{
285
	key_ref_t key_ref;
L
Linus Torvalds 已提交
286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306
	void *payload;
	long ret;

	ret = -EINVAL;
	if (plen > PAGE_SIZE)
		goto error;

	/* pull the payload in if one was supplied */
	payload = NULL;
	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
		if (!payload)
			goto error;

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error2;
	}

	/* find the target key (which must be writable) */
307
	key_ref = lookup_user_key(id, 0, KEY_WRITE);
308 309
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
310 311 312 313
		goto error2;
	}

	/* update the key */
314
	ret = key_update(key_ref, payload, plen);
L
Linus Torvalds 已提交
315

316
	key_ref_put(key_ref);
317
error2:
L
Linus Torvalds 已提交
318
	kfree(payload);
319
error:
L
Linus Torvalds 已提交
320
	return ret;
321
}
L
Linus Torvalds 已提交
322 323 324 325 326 327 328 329

/*
 * revoke a key
 * - the key must be writable
 * - implements keyctl(KEYCTL_REVOKE)
 */
long keyctl_revoke_key(key_serial_t id)
{
330
	key_ref_t key_ref;
L
Linus Torvalds 已提交
331 332
	long ret;

333
	key_ref = lookup_user_key(id, 0, KEY_WRITE);
334 335
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
336 337 338 339 340 341 342
		if (ret != -EACCES)
			goto error;
		key_ref = lookup_user_key(id, 0, KEY_SETATTR);
		if (IS_ERR(key_ref)) {
			ret = PTR_ERR(key_ref);
			goto error;
		}
L
Linus Torvalds 已提交
343 344
	}

345
	key_revoke(key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
346 347
	ret = 0;

348
	key_ref_put(key_ref);
349
error:
350
	return ret;
351
}
L
Linus Torvalds 已提交
352 353 354 355 356 357 358 359

/*
 * clear the specified process keyring
 * - the keyring must be writable
 * - implements keyctl(KEYCTL_CLEAR)
 */
long keyctl_keyring_clear(key_serial_t ringid)
{
360
	key_ref_t keyring_ref;
L
Linus Torvalds 已提交
361 362
	long ret;

363
	keyring_ref = lookup_user_key(ringid, KEY_LOOKUP_CREATE, KEY_WRITE);
364 365
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
366 367 368
		goto error;
	}

369
	ret = keyring_clear(key_ref_to_ptr(keyring_ref));
L
Linus Torvalds 已提交
370

371
	key_ref_put(keyring_ref);
372
error:
L
Linus Torvalds 已提交
373
	return ret;
374
}
L
Linus Torvalds 已提交
375 376 377 378 379 380 381 382 383

/*
 * link a key into a keyring
 * - the keyring must be writable
 * - the key must be linkable
 * - implements keyctl(KEYCTL_LINK)
 */
long keyctl_keyring_link(key_serial_t id, key_serial_t ringid)
{
384
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
385 386
	long ret;

387
	keyring_ref = lookup_user_key(ringid, KEY_LOOKUP_CREATE, KEY_WRITE);
388 389
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
390 391 392
		goto error;
	}

393
	key_ref = lookup_user_key(id, KEY_LOOKUP_CREATE, KEY_LINK);
394 395
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
396 397 398
		goto error2;
	}

399
	ret = key_link(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
400

401
	key_ref_put(key_ref);
402
error2:
403
	key_ref_put(keyring_ref);
404
error:
L
Linus Torvalds 已提交
405
	return ret;
406
}
L
Linus Torvalds 已提交
407 408 409 410 411 412 413 414 415

/*
 * unlink the first attachment of a key from a keyring
 * - the keyring must be writable
 * - we don't need any permissions on the key
 * - implements keyctl(KEYCTL_UNLINK)
 */
long keyctl_keyring_unlink(key_serial_t id, key_serial_t ringid)
{
416
	key_ref_t keyring_ref, key_ref;
L
Linus Torvalds 已提交
417 418
	long ret;

419
	keyring_ref = lookup_user_key(ringid, 0, KEY_WRITE);
420 421
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
422 423 424
		goto error;
	}

425
	key_ref = lookup_user_key(id, KEY_LOOKUP_FOR_UNLINK, 0);
426 427
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
428 429 430
		goto error2;
	}

431
	ret = key_unlink(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
432

433
	key_ref_put(key_ref);
434
error2:
435
	key_ref_put(keyring_ref);
436
error:
L
Linus Torvalds 已提交
437
	return ret;
438
}
L
Linus Torvalds 已提交
439 440 441 442 443 444 445 446 447 448 449 450 451 452 453

/*
 * describe a user key
 * - the key must have view permission
 * - if there's a buffer, we place up to buflen bytes of data into it
 * - unless there's an error, we return the amount of description available,
 *   irrespective of how much we may have copied
 * - the description is formatted thus:
 *	type;uid;gid;perm;description<NUL>
 * - implements keyctl(KEYCTL_DESCRIBE)
 */
long keyctl_describe_key(key_serial_t keyid,
			 char __user *buffer,
			 size_t buflen)
{
454
	struct key *key, *instkey;
455
	key_ref_t key_ref;
L
Linus Torvalds 已提交
456 457 458
	char *tmpbuf;
	long ret;

459
	key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_VIEW);
460
	if (IS_ERR(key_ref)) {
461 462
		/* viewing a key under construction is permitted if we have the
		 * authorisation token handy */
463
		if (PTR_ERR(key_ref) == -EACCES) {
464 465 466
			instkey = key_get_instantiation_authkey(keyid);
			if (!IS_ERR(instkey)) {
				key_put(instkey);
467
				key_ref = lookup_user_key(keyid,
468 469
							  KEY_LOOKUP_PARTIAL,
							  0);
470
				if (!IS_ERR(key_ref))
471 472 473 474
					goto okay;
			}
		}

475
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
476 477 478
		goto error;
	}

479
okay:
L
Linus Torvalds 已提交
480 481 482 483 484 485
	/* calculate how much description we're going to return */
	ret = -ENOMEM;
	tmpbuf = kmalloc(PAGE_SIZE, GFP_KERNEL);
	if (!tmpbuf)
		goto error2;

486 487
	key = key_ref_to_ptr(key_ref);

L
Linus Torvalds 已提交
488
	ret = snprintf(tmpbuf, PAGE_SIZE - 1,
489
		       "%s;%d;%d;%08x;%s",
490 491 492 493 494
		       key->type->name,
		       key->uid,
		       key->gid,
		       key->perm,
		       key->description ?: "");
L
Linus Torvalds 已提交
495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511

	/* include a NUL char at the end of the data */
	if (ret > PAGE_SIZE - 1)
		ret = PAGE_SIZE - 1;
	tmpbuf[ret] = 0;
	ret++;

	/* consider returning the data */
	if (buffer && buflen > 0) {
		if (buflen > ret)
			buflen = ret;

		if (copy_to_user(buffer, tmpbuf, buflen) != 0)
			ret = -EFAULT;
	}

	kfree(tmpbuf);
512
error2:
513
	key_ref_put(key_ref);
514
error:
L
Linus Torvalds 已提交
515
	return ret;
516
}
L
Linus Torvalds 已提交
517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532

/*
 * search the specified keyring for a matching key
 * - the start keyring must be searchable
 * - nested keyrings may also be searched if they are searchable
 * - only keys with search permission may be found
 * - if a key is found, it will be attached to the destination keyring if
 *   there's one specified
 * - implements keyctl(KEYCTL_SEARCH)
 */
long keyctl_keyring_search(key_serial_t ringid,
			   const char __user *_type,
			   const char __user *_description,
			   key_serial_t destringid)
{
	struct key_type *ktype;
533
	key_ref_t keyring_ref, key_ref, dest_ref;
L
Linus Torvalds 已提交
534
	char type[32], *description;
535
	long ret;
L
Linus Torvalds 已提交
536 537

	/* pull the type and description into kernel space */
538
	ret = key_get_type_from_user(type, _type, sizeof(type));
L
Linus Torvalds 已提交
539 540 541
	if (ret < 0)
		goto error;

542 543 544
	description = strndup_user(_description, PAGE_SIZE);
	if (IS_ERR(description)) {
		ret = PTR_ERR(description);
L
Linus Torvalds 已提交
545
		goto error;
546
	}
L
Linus Torvalds 已提交
547 548

	/* get the keyring at which to begin the search */
549
	keyring_ref = lookup_user_key(ringid, 0, KEY_SEARCH);
550 551
	if (IS_ERR(keyring_ref)) {
		ret = PTR_ERR(keyring_ref);
L
Linus Torvalds 已提交
552 553 554 555
		goto error2;
	}

	/* get the destination keyring if specified */
556
	dest_ref = NULL;
L
Linus Torvalds 已提交
557
	if (destringid) {
558 559
		dest_ref = lookup_user_key(destringid, KEY_LOOKUP_CREATE,
					   KEY_WRITE);
560 561
		if (IS_ERR(dest_ref)) {
			ret = PTR_ERR(dest_ref);
L
Linus Torvalds 已提交
562 563 564 565 566 567 568 569 570 571 572 573
			goto error3;
		}
	}

	/* find the key type */
	ktype = key_type_lookup(type);
	if (IS_ERR(ktype)) {
		ret = PTR_ERR(ktype);
		goto error4;
	}

	/* do the search */
574 575 576
	key_ref = keyring_search(keyring_ref, ktype, description);
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
577 578 579 580 581 582 583 584

		/* treat lack or presence of a negative key the same */
		if (ret == -EAGAIN)
			ret = -ENOKEY;
		goto error5;
	}

	/* link the resulting key to the destination keyring if we can */
585
	if (dest_ref) {
586 587
		ret = key_permission(key_ref, KEY_LINK);
		if (ret < 0)
L
Linus Torvalds 已提交
588 589
			goto error6;

590
		ret = key_link(key_ref_to_ptr(dest_ref), key_ref_to_ptr(key_ref));
L
Linus Torvalds 已提交
591 592 593 594
		if (ret < 0)
			goto error6;
	}

595
	ret = key_ref_to_ptr(key_ref)->serial;
L
Linus Torvalds 已提交
596

597
error6:
598
	key_ref_put(key_ref);
599
error5:
L
Linus Torvalds 已提交
600
	key_type_put(ktype);
601
error4:
602
	key_ref_put(dest_ref);
603
error3:
604
	key_ref_put(keyring_ref);
605
error2:
L
Linus Torvalds 已提交
606
	kfree(description);
607
error:
L
Linus Torvalds 已提交
608
	return ret;
609
}
L
Linus Torvalds 已提交
610 611 612 613 614 615 616 617 618 619 620 621

/*
 * read a user key's payload
 * - the keyring must be readable or the key must be searchable from the
 *   process's keyrings
 * - if there's a buffer, we place up to buflen bytes of data into it
 * - unless there's an error, we return the amount of data in the key,
 *   irrespective of how much we may have copied
 * - implements keyctl(KEYCTL_READ)
 */
long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen)
{
622 623
	struct key *key;
	key_ref_t key_ref;
L
Linus Torvalds 已提交
624 625 626
	long ret;

	/* find the key first */
627
	key_ref = lookup_user_key(keyid, 0, 0);
628 629 630
	if (IS_ERR(key_ref)) {
		ret = -ENOKEY;
		goto error;
L
Linus Torvalds 已提交
631 632
	}

633 634 635
	key = key_ref_to_ptr(key_ref);

	/* see if we can read it directly */
636 637
	ret = key_permission(key_ref, KEY_READ);
	if (ret == 0)
638
		goto can_read_key;
639 640
	if (ret != -EACCES)
		goto error;
641 642 643 644 645 646 647 648 649

	/* we can't; see if it's searchable from this process's keyrings
	 * - we automatically take account of the fact that it may be
	 *   dangling off an instantiation key
	 */
	if (!is_key_possessed(key_ref)) {
		ret = -EACCES;
		goto error2;
	}
L
Linus Torvalds 已提交
650 651

	/* the key is probably readable - now try to read it */
652
can_read_key:
L
Linus Torvalds 已提交
653 654 655 656 657 658 659 660 661 662 663 664
	ret = key_validate(key);
	if (ret == 0) {
		ret = -EOPNOTSUPP;
		if (key->type->read) {
			/* read the data with the semaphore held (since we
			 * might sleep) */
			down_read(&key->sem);
			ret = key->type->read(key, buffer, buflen);
			up_read(&key->sem);
		}
	}

665
error2:
L
Linus Torvalds 已提交
666
	key_put(key);
667
error:
L
Linus Torvalds 已提交
668
	return ret;
669
}
L
Linus Torvalds 已提交
670 671 672 673 674 675 676 677 678

/*
 * change the ownership of a key
 * - the keyring owned by the changer
 * - if the uid or gid is -1, then that parameter is not changed
 * - implements keyctl(KEYCTL_CHOWN)
 */
long keyctl_chown_key(key_serial_t id, uid_t uid, gid_t gid)
{
679
	struct key_user *newowner, *zapowner = NULL;
L
Linus Torvalds 已提交
680
	struct key *key;
681
	key_ref_t key_ref;
L
Linus Torvalds 已提交
682 683 684 685 686 687
	long ret;

	ret = 0;
	if (uid == (uid_t) -1 && gid == (gid_t) -1)
		goto error;

688 689
	key_ref = lookup_user_key(id, KEY_LOOKUP_CREATE | KEY_LOOKUP_PARTIAL,
				  KEY_SETATTR);
690 691
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
692 693 694
		goto error;
	}

695 696
	key = key_ref_to_ptr(key_ref);

L
Linus Torvalds 已提交
697 698 699 700 701 702 703
	/* make the changes with the locks held to prevent chown/chown races */
	ret = -EACCES;
	down_write(&key->sem);

	if (!capable(CAP_SYS_ADMIN)) {
		/* only the sysadmin can chown a key to some other UID */
		if (uid != (uid_t) -1 && key->uid != uid)
704
			goto error_put;
L
Linus Torvalds 已提交
705 706 707 708

		/* only the sysadmin can set the key's GID to a group other
		 * than one of those that the current process subscribes to */
		if (gid != (gid_t) -1 && gid != key->gid && !in_group_p(gid))
709
			goto error_put;
L
Linus Torvalds 已提交
710 711
	}

712
	/* change the UID */
L
Linus Torvalds 已提交
713
	if (uid != (uid_t) -1 && uid != key->uid) {
714
		ret = -ENOMEM;
715
		newowner = key_user_lookup(uid, current_user_ns());
716 717 718 719 720
		if (!newowner)
			goto error_put;

		/* transfer the quota burden to the new user */
		if (test_bit(KEY_FLAG_IN_QUOTA, &key->flags)) {
721 722 723 724 725
			unsigned maxkeys = (uid == 0) ?
				key_quota_root_maxkeys : key_quota_maxkeys;
			unsigned maxbytes = (uid == 0) ?
				key_quota_root_maxbytes : key_quota_maxbytes;

726
			spin_lock(&newowner->lock);
727 728 729 730
			if (newowner->qnkeys + 1 >= maxkeys ||
			    newowner->qnbytes + key->quotalen >= maxbytes ||
			    newowner->qnbytes + key->quotalen <
			    newowner->qnbytes)
731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753
				goto quota_overrun;

			newowner->qnkeys++;
			newowner->qnbytes += key->quotalen;
			spin_unlock(&newowner->lock);

			spin_lock(&key->user->lock);
			key->user->qnkeys--;
			key->user->qnbytes -= key->quotalen;
			spin_unlock(&key->user->lock);
		}

		atomic_dec(&key->user->nkeys);
		atomic_inc(&newowner->nkeys);

		if (test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
			atomic_dec(&key->user->nikeys);
			atomic_inc(&newowner->nikeys);
		}

		zapowner = key->user;
		key->user = newowner;
		key->uid = uid;
L
Linus Torvalds 已提交
754 755 756 757 758 759 760 761
	}

	/* change the GID */
	if (gid != (gid_t) -1)
		key->gid = gid;

	ret = 0;

762
error_put:
L
Linus Torvalds 已提交
763 764
	up_write(&key->sem);
	key_put(key);
765 766 767
	if (zapowner)
		key_user_put(zapowner);
error:
L
Linus Torvalds 已提交
768 769
	return ret;

770 771 772 773 774
quota_overrun:
	spin_unlock(&newowner->lock);
	zapowner = newowner;
	ret = -EDQUOT;
	goto error_put;
775
}
776

L
Linus Torvalds 已提交
777 778 779 780 781 782 783 784
/*
 * change the permission mask on a key
 * - the keyring owned by the changer
 * - implements keyctl(KEYCTL_SETPERM)
 */
long keyctl_setperm_key(key_serial_t id, key_perm_t perm)
{
	struct key *key;
785
	key_ref_t key_ref;
L
Linus Torvalds 已提交
786 787 788
	long ret;

	ret = -EINVAL;
789
	if (perm & ~(KEY_POS_ALL | KEY_USR_ALL | KEY_GRP_ALL | KEY_OTH_ALL))
L
Linus Torvalds 已提交
790 791
		goto error;

792 793
	key_ref = lookup_user_key(id, KEY_LOOKUP_CREATE | KEY_LOOKUP_PARTIAL,
				  KEY_SETATTR);
794 795
	if (IS_ERR(key_ref)) {
		ret = PTR_ERR(key_ref);
L
Linus Torvalds 已提交
796 797 798
		goto error;
	}

799 800
	key = key_ref_to_ptr(key_ref);

801
	/* make the changes with the locks held to prevent chown/chmod races */
L
Linus Torvalds 已提交
802 803 804
	ret = -EACCES;
	down_write(&key->sem);

805
	/* if we're not the sysadmin, we can only change a key that we own */
806
	if (capable(CAP_SYS_ADMIN) || key->uid == current_fsuid()) {
807 808 809
		key->perm = perm;
		ret = 0;
	}
L
Linus Torvalds 已提交
810 811 812

	up_write(&key->sem);
	key_put(key);
813
error:
L
Linus Torvalds 已提交
814
	return ret;
815
}
L
Linus Torvalds 已提交
816

817 818 819 820 821 822 823 824 825
/*
 * get the destination keyring for instantiation
 */
static long get_instantiation_keyring(key_serial_t ringid,
				      struct request_key_auth *rka,
				      struct key **_dest_keyring)
{
	key_ref_t dkref;

826 827
	*_dest_keyring = NULL;

828
	/* just return a NULL pointer if we weren't asked to make a link */
829
	if (ringid == 0)
830 831 832 833
		return 0;

	/* if a specific keyring is nominated by ID, then use that */
	if (ringid > 0) {
834
		dkref = lookup_user_key(ringid, KEY_LOOKUP_CREATE, KEY_WRITE);
835 836 837 838 839 840 841 842 843 844 845 846
		if (IS_ERR(dkref))
			return PTR_ERR(dkref);
		*_dest_keyring = key_ref_to_ptr(dkref);
		return 0;
	}

	if (ringid == KEY_SPEC_REQKEY_AUTH_KEY)
		return -EINVAL;

	/* otherwise specify the destination keyring recorded in the
	 * authorisation key (any KEY_SPEC_*_KEYRING) */
	if (ringid >= KEY_SPEC_REQUESTOR_KEYRING) {
847
		*_dest_keyring = key_get(rka->dest_keyring);
848 849 850 851 852 853
		return 0;
	}

	return -ENOKEY;
}

D
David Howells 已提交
854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870
/*
 * change the request_key authorisation key on the current process
 */
static int keyctl_change_reqkey_auth(struct key *key)
{
	struct cred *new;

	new = prepare_creds();
	if (!new)
		return -ENOMEM;

	key_put(new->request_key_auth);
	new->request_key_auth = key_get(key);

	return commit_creds(new);
}

L
Linus Torvalds 已提交
871 872 873 874 875 876 877 878 879
/*
 * instantiate the key with the specified payload, and, if one is given, link
 * the key into the keyring
 */
long keyctl_instantiate_key(key_serial_t id,
			    const void __user *_payload,
			    size_t plen,
			    key_serial_t ringid)
{
D
David Howells 已提交
880
	const struct cred *cred = current_cred();
881
	struct request_key_auth *rka;
882
	struct key *instkey, *dest_keyring;
L
Linus Torvalds 已提交
883 884
	void *payload;
	long ret;
885
	bool vm = false;
L
Linus Torvalds 已提交
886

D
David Howells 已提交
887 888
	kenter("%d,,%zu,%d", id, plen, ringid);

L
Linus Torvalds 已提交
889
	ret = -EINVAL;
890
	if (plen > 1024 * 1024 - 1)
L
Linus Torvalds 已提交
891 892
		goto error;

893 894 895
	/* the appropriate instantiation authorisation key must have been
	 * assumed before calling this */
	ret = -EPERM;
D
David Howells 已提交
896
	instkey = cred->request_key_auth;
897 898 899 900 901 902 903
	if (!instkey)
		goto error;

	rka = instkey->payload.data;
	if (rka->target_key->serial != id)
		goto error;

L
Linus Torvalds 已提交
904 905 906 907 908 909
	/* pull the payload in if one was supplied */
	payload = NULL;

	if (_payload) {
		ret = -ENOMEM;
		payload = kmalloc(plen, GFP_KERNEL);
910 911 912 913 914 915 916 917
		if (!payload) {
			if (plen <= PAGE_SIZE)
				goto error;
			vm = true;
			payload = vmalloc(plen);
			if (!payload)
				goto error;
		}
L
Linus Torvalds 已提交
918 919 920 921 922 923

		ret = -EFAULT;
		if (copy_from_user(payload, _payload, plen) != 0)
			goto error2;
	}

924 925
	/* find the destination keyring amongst those belonging to the
	 * requesting task */
926 927 928
	ret = get_instantiation_keyring(ringid, rka, &dest_keyring);
	if (ret < 0)
		goto error2;
L
Linus Torvalds 已提交
929 930

	/* instantiate the key and link it into a keyring */
931
	ret = key_instantiate_and_link(rka->target_key, payload, plen,
932
				       dest_keyring, instkey);
L
Linus Torvalds 已提交
933

934
	key_put(dest_keyring);
935 936 937

	/* discard the assumed authority if it's just been disabled by
	 * instantiation of the key */
D
David Howells 已提交
938 939
	if (ret == 0)
		keyctl_change_reqkey_auth(NULL);
940 941

error2:
942 943 944 945
	if (!vm)
		kfree(payload);
	else
		vfree(payload);
946
error:
L
Linus Torvalds 已提交
947
	return ret;
948
}
L
Linus Torvalds 已提交
949 950 951 952 953 954 955

/*
 * negatively instantiate the key with the given timeout (in seconds), and, if
 * one is given, link the key into the keyring
 */
long keyctl_negate_key(key_serial_t id, unsigned timeout, key_serial_t ringid)
{
D
David Howells 已提交
956
	const struct cred *cred = current_cred();
957
	struct request_key_auth *rka;
958
	struct key *instkey, *dest_keyring;
L
Linus Torvalds 已提交
959 960
	long ret;

D
David Howells 已提交
961 962
	kenter("%d,%u,%d", id, timeout, ringid);

963 964 965
	/* the appropriate instantiation authorisation key must have been
	 * assumed before calling this */
	ret = -EPERM;
D
David Howells 已提交
966
	instkey = cred->request_key_auth;
967
	if (!instkey)
L
Linus Torvalds 已提交
968 969
		goto error;

970
	rka = instkey->payload.data;
971 972
	if (rka->target_key->serial != id)
		goto error;
973

L
Linus Torvalds 已提交
974 975
	/* find the destination keyring if present (which must also be
	 * writable) */
976 977 978
	ret = get_instantiation_keyring(ringid, rka, &dest_keyring);
	if (ret < 0)
		goto error;
L
Linus Torvalds 已提交
979 980

	/* instantiate the key and link it into a keyring */
981
	ret = key_negate_and_link(rka->target_key, timeout,
982
				  dest_keyring, instkey);
L
Linus Torvalds 已提交
983

984
	key_put(dest_keyring);
985 986 987

	/* discard the assumed authority if it's just been disabled by
	 * instantiation of the key */
D
David Howells 已提交
988 989
	if (ret == 0)
		keyctl_change_reqkey_auth(NULL);
990 991

error:
L
Linus Torvalds 已提交
992
	return ret;
993
}
L
Linus Torvalds 已提交
994

995 996 997 998 999 1000
/*
 * set the default keyring in which request_key() will cache keys
 * - return the old setting
 */
long keyctl_set_reqkey_keyring(int reqkey_defl)
{
D
David Howells 已提交
1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011
	struct cred *new;
	int ret, old_setting;

	old_setting = current_cred_xxx(jit_keyring);

	if (reqkey_defl == KEY_REQKEY_DEFL_NO_CHANGE)
		return old_setting;

	new = prepare_creds();
	if (!new)
		return -ENOMEM;
1012 1013 1014

	switch (reqkey_defl) {
	case KEY_REQKEY_DEFL_THREAD_KEYRING:
D
David Howells 已提交
1015
		ret = install_thread_keyring_to_cred(new);
1016
		if (ret < 0)
D
David Howells 已提交
1017
			goto error;
1018 1019 1020
		goto set;

	case KEY_REQKEY_DEFL_PROCESS_KEYRING:
D
David Howells 已提交
1021 1022 1023 1024 1025 1026 1027
		ret = install_process_keyring_to_cred(new);
		if (ret < 0) {
			if (ret != -EEXIST)
				goto error;
			ret = 0;
		}
		goto set;
1028 1029 1030 1031 1032

	case KEY_REQKEY_DEFL_DEFAULT:
	case KEY_REQKEY_DEFL_SESSION_KEYRING:
	case KEY_REQKEY_DEFL_USER_KEYRING:
	case KEY_REQKEY_DEFL_USER_SESSION_KEYRING:
D
David Howells 已提交
1033 1034
	case KEY_REQKEY_DEFL_REQUESTOR_KEYRING:
		goto set;
1035 1036 1037 1038

	case KEY_REQKEY_DEFL_NO_CHANGE:
	case KEY_REQKEY_DEFL_GROUP_KEYRING:
	default:
D
David Howells 已提交
1039 1040
		ret = -EINVAL;
		goto error;
1041 1042
	}

D
David Howells 已提交
1043 1044 1045 1046 1047 1048
set:
	new->jit_keyring = reqkey_defl;
	commit_creds(new);
	return old_setting;
error:
	abort_creds(new);
1049
	return ret;
1050
}
D
David Howells 已提交
1051

1052 1053 1054 1055 1056 1057
/*
 * set or clear the timeout for a key
 */
long keyctl_set_timeout(key_serial_t id, unsigned timeout)
{
	struct timespec now;
1058
	struct key *key, *instkey;
1059 1060 1061 1062
	key_ref_t key_ref;
	time_t expiry;
	long ret;

1063 1064
	key_ref = lookup_user_key(id, KEY_LOOKUP_CREATE | KEY_LOOKUP_PARTIAL,
				  KEY_SETATTR);
1065
	if (IS_ERR(key_ref)) {
1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079
		/* setting the timeout on a key under construction is permitted
		 * if we have the authorisation token handy */
		if (PTR_ERR(key_ref) == -EACCES) {
			instkey = key_get_instantiation_authkey(id);
			if (!IS_ERR(instkey)) {
				key_put(instkey);
				key_ref = lookup_user_key(id,
							  KEY_LOOKUP_PARTIAL,
							  0);
				if (!IS_ERR(key_ref))
					goto okay;
			}
		}

1080 1081 1082 1083
		ret = PTR_ERR(key_ref);
		goto error;
	}

1084
okay:
1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096
	key = key_ref_to_ptr(key_ref);

	/* make the changes with the locks held to prevent races */
	down_write(&key->sem);

	expiry = 0;
	if (timeout > 0) {
		now = current_kernel_time();
		expiry = now.tv_sec + timeout;
	}

	key->expiry = expiry;
D
David Howells 已提交
1097
	key_schedule_gc(key->expiry + key_gc_delay);
1098 1099 1100 1101 1102 1103 1104

	up_write(&key->sem);
	key_put(key);

	ret = 0;
error:
	return ret;
1105
}
1106

1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121
/*
 * assume the authority to instantiate the specified key
 */
long keyctl_assume_authority(key_serial_t id)
{
	struct key *authkey;
	long ret;

	/* special key IDs aren't permitted */
	ret = -EINVAL;
	if (id < 0)
		goto error;

	/* we divest ourselves of authority if given an ID of 0 */
	if (id == 0) {
D
David Howells 已提交
1122
		ret = keyctl_change_reqkey_auth(NULL);
1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136
		goto error;
	}

	/* attempt to assume the authority temporarily granted to us whilst we
	 * instantiate the specified key
	 * - the authorisation key must be in the current task's keyrings
	 *   somewhere
	 */
	authkey = key_get_instantiation_authkey(id);
	if (IS_ERR(authkey)) {
		ret = PTR_ERR(authkey);
		goto error;
	}

D
David Howells 已提交
1137 1138 1139 1140
	ret = keyctl_change_reqkey_auth(authkey);
	if (ret < 0)
		goto error;
	key_put(authkey);
1141

D
David Howells 已提交
1142
	ret = authkey->serial;
1143 1144
error:
	return ret;
1145
}
1146

1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163
/*
 * get the security label of a key
 * - the key must grant us view permission
 * - if there's a buffer, we place up to buflen bytes of data into it
 * - unless there's an error, we return the amount of information available,
 *   irrespective of how much we may have copied (including the terminal NUL)
 * - implements keyctl(KEYCTL_GET_SECURITY)
 */
long keyctl_get_security(key_serial_t keyid,
			 char __user *buffer,
			 size_t buflen)
{
	struct key *key, *instkey;
	key_ref_t key_ref;
	char *context;
	long ret;

1164
	key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_VIEW);
1165 1166 1167 1168 1169 1170 1171 1172
	if (IS_ERR(key_ref)) {
		if (PTR_ERR(key_ref) != -EACCES)
			return PTR_ERR(key_ref);

		/* viewing a key under construction is also permitted if we
		 * have the authorisation token handy */
		instkey = key_get_instantiation_authkey(keyid);
		if (IS_ERR(instkey))
1173
			return PTR_ERR(instkey);
1174 1175
		key_put(instkey);

1176
		key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, 0);
1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206
		if (IS_ERR(key_ref))
			return PTR_ERR(key_ref);
	}

	key = key_ref_to_ptr(key_ref);
	ret = security_key_getsecurity(key, &context);
	if (ret == 0) {
		/* if no information was returned, give userspace an empty
		 * string */
		ret = 1;
		if (buffer && buflen > 0 &&
		    copy_to_user(buffer, "", 1) != 0)
			ret = -EFAULT;
	} else if (ret > 0) {
		/* return as much data as there's room for */
		if (buffer && buflen > 0) {
			if (buflen > ret)
				buflen = ret;

			if (copy_to_user(buffer, context, buflen) != 0)
				ret = -EFAULT;
		}

		kfree(context);
	}

	key_ref_put(key_ref);
	return ret;
}

1207 1208 1209 1210 1211 1212 1213 1214
/*
 * attempt to install the calling process's session keyring on the process's
 * parent process
 * - the keyring must exist and must grant us LINK permission
 * - implements keyctl(KEYCTL_SESSION_TO_PARENT)
 */
long keyctl_session_to_parent(void)
{
1215
#ifdef TIF_NOTIFY_RESUME
1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237
	struct task_struct *me, *parent;
	const struct cred *mycred, *pcred;
	struct cred *cred, *oldcred;
	key_ref_t keyring_r;
	int ret;

	keyring_r = lookup_user_key(KEY_SPEC_SESSION_KEYRING, 0, KEY_LINK);
	if (IS_ERR(keyring_r))
		return PTR_ERR(keyring_r);

	/* our parent is going to need a new cred struct, a new tgcred struct
	 * and new security data, so we allocate them here to prevent ENOMEM in
	 * our parent */
	ret = -ENOMEM;
	cred = cred_alloc_blank();
	if (!cred)
		goto error_keyring;

	cred->tgcred->session_keyring = key_ref_to_ptr(keyring_r);
	keyring_r = NULL;

	me = current;
1238
	rcu_read_lock();
1239 1240 1241 1242 1243 1244 1245 1246 1247 1248
	write_lock_irq(&tasklist_lock);

	parent = me->real_parent;
	ret = -EPERM;

	/* the parent mustn't be init and mustn't be a kernel thread */
	if (parent->pid <= 1 || !parent->mm)
		goto not_permitted;

	/* the parent must be single threaded */
1249
	if (!thread_group_empty(parent))
1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261
		goto not_permitted;

	/* the parent and the child must have different session keyrings or
	 * there's no point */
	mycred = current_cred();
	pcred = __task_cred(parent);
	if (mycred == pcred ||
	    mycred->tgcred->session_keyring == pcred->tgcred->session_keyring)
		goto already_same;

	/* the parent must have the same effective ownership and mustn't be
	 * SUID/SGID */
1262
	if (pcred->uid	!= mycred->euid	||
1263 1264
	    pcred->euid	!= mycred->euid	||
	    pcred->suid	!= mycred->euid	||
1265
	    pcred->gid	!= mycred->egid	||
1266 1267 1268 1269 1270
	    pcred->egid	!= mycred->egid	||
	    pcred->sgid	!= mycred->egid)
		goto not_permitted;

	/* the keyrings must have the same UID */
1271 1272
	if ((pcred->tgcred->session_keyring &&
	     pcred->tgcred->session_keyring->uid != mycred->euid) ||
1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286
	    mycred->tgcred->session_keyring->uid != mycred->euid)
		goto not_permitted;

	/* if there's an already pending keyring replacement, then we replace
	 * that */
	oldcred = parent->replacement_session_keyring;

	/* the replacement session keyring is applied just prior to userspace
	 * restarting */
	parent->replacement_session_keyring = cred;
	cred = NULL;
	set_ti_thread_flag(task_thread_info(parent), TIF_NOTIFY_RESUME);

	write_unlock_irq(&tasklist_lock);
1287
	rcu_read_unlock();
1288 1289 1290 1291 1292 1293 1294
	if (oldcred)
		put_cred(oldcred);
	return 0;

already_same:
	ret = 0;
not_permitted:
1295
	write_unlock_irq(&tasklist_lock);
1296
	rcu_read_unlock();
1297 1298 1299 1300 1301 1302
	put_cred(cred);
	return ret;

error_keyring:
	key_ref_put(keyring_r);
	return ret;
1303 1304 1305 1306 1307 1308 1309 1310 1311

#else /* !TIF_NOTIFY_RESUME */
	/*
	 * To be removed when TIF_NOTIFY_RESUME has been implemented on
	 * m68k/xtensa
	 */
#warning TIF_NOTIFY_RESUME not implemented
	return -EOPNOTSUPP;
#endif /* !TIF_NOTIFY_RESUME */
1312 1313
}

L
Linus Torvalds 已提交
1314 1315 1316
/*
 * the key control system call
 */
1317 1318
SYSCALL_DEFINE5(keyctl, int, option, unsigned long, arg2, unsigned long, arg3,
		unsigned long, arg4, unsigned long, arg5)
L
Linus Torvalds 已提交
1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382
{
	switch (option) {
	case KEYCTL_GET_KEYRING_ID:
		return keyctl_get_keyring_ID((key_serial_t) arg2,
					     (int) arg3);

	case KEYCTL_JOIN_SESSION_KEYRING:
		return keyctl_join_session_keyring((const char __user *) arg2);

	case KEYCTL_UPDATE:
		return keyctl_update_key((key_serial_t) arg2,
					 (const void __user *) arg3,
					 (size_t) arg4);

	case KEYCTL_REVOKE:
		return keyctl_revoke_key((key_serial_t) arg2);

	case KEYCTL_DESCRIBE:
		return keyctl_describe_key((key_serial_t) arg2,
					   (char __user *) arg3,
					   (unsigned) arg4);

	case KEYCTL_CLEAR:
		return keyctl_keyring_clear((key_serial_t) arg2);

	case KEYCTL_LINK:
		return keyctl_keyring_link((key_serial_t) arg2,
					   (key_serial_t) arg3);

	case KEYCTL_UNLINK:
		return keyctl_keyring_unlink((key_serial_t) arg2,
					     (key_serial_t) arg3);

	case KEYCTL_SEARCH:
		return keyctl_keyring_search((key_serial_t) arg2,
					     (const char __user *) arg3,
					     (const char __user *) arg4,
					     (key_serial_t) arg5);

	case KEYCTL_READ:
		return keyctl_read_key((key_serial_t) arg2,
				       (char __user *) arg3,
				       (size_t) arg4);

	case KEYCTL_CHOWN:
		return keyctl_chown_key((key_serial_t) arg2,
					(uid_t) arg3,
					(gid_t) arg4);

	case KEYCTL_SETPERM:
		return keyctl_setperm_key((key_serial_t) arg2,
					  (key_perm_t) arg3);

	case KEYCTL_INSTANTIATE:
		return keyctl_instantiate_key((key_serial_t) arg2,
					      (const void __user *) arg3,
					      (size_t) arg4,
					      (key_serial_t) arg5);

	case KEYCTL_NEGATE:
		return keyctl_negate_key((key_serial_t) arg2,
					 (unsigned) arg3,
					 (key_serial_t) arg4);

1383 1384 1385
	case KEYCTL_SET_REQKEY_KEYRING:
		return keyctl_set_reqkey_keyring(arg2);

1386 1387 1388 1389
	case KEYCTL_SET_TIMEOUT:
		return keyctl_set_timeout((key_serial_t) arg2,
					  (unsigned) arg3);

1390 1391 1392
	case KEYCTL_ASSUME_AUTHORITY:
		return keyctl_assume_authority((key_serial_t) arg2);

1393 1394
	case KEYCTL_GET_SECURITY:
		return keyctl_get_security((key_serial_t) arg2,
1395
					   (char __user *) arg3,
1396 1397
					   (size_t) arg4);

1398 1399 1400
	case KEYCTL_SESSION_TO_PARENT:
		return keyctl_session_to_parent();

L
Linus Torvalds 已提交
1401 1402 1403
	default:
		return -EOPNOTSUPP;
	}
1404
}