key.c 31.9 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
2
/* Basic authentication token and access key management
L
Linus Torvalds 已提交
3
 *
4
 * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
5 6 7
 * Written by David Howells (dhowells@redhat.com)
 */

8
#include <linux/export.h>
L
Linus Torvalds 已提交
9
#include <linux/init.h>
10
#include <linux/poison.h>
L
Linus Torvalds 已提交
11 12
#include <linux/sched.h>
#include <linux/slab.h>
13
#include <linux/security.h>
L
Linus Torvalds 已提交
14
#include <linux/workqueue.h>
15
#include <linux/random.h>
16
#include <linux/ima.h>
L
Linus Torvalds 已提交
17 18 19
#include <linux/err.h>
#include "internal.h"

20
struct kmem_cache *key_jar;
L
Linus Torvalds 已提交
21 22 23 24 25 26
struct rb_root		key_serial_tree; /* tree of keys indexed by serial */
DEFINE_SPINLOCK(key_serial_lock);

struct rb_root	key_user_tree; /* tree of quota records indexed by UID */
DEFINE_SPINLOCK(key_user_lock);

27 28
unsigned int key_quota_root_maxkeys = 1000000;	/* root's key count quota */
unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */
29 30 31
unsigned int key_quota_maxkeys = 200;		/* general key count quota */
unsigned int key_quota_maxbytes = 20000;	/* general key space quota */

L
Linus Torvalds 已提交
32 33 34
static LIST_HEAD(key_types_list);
static DECLARE_RWSEM(key_types_sem);

35
/* We serialise key instantiation and link */
36
DEFINE_MUTEX(key_construction_mutex);
L
Linus Torvalds 已提交
37 38 39 40 41 42 43 44 45 46 47

#ifdef KEY_DEBUGGING
void __key_check(const struct key *key)
{
	printk("__key_check: key %p {%08x} should be {%08x}\n",
	       key, key->magic, KEY_DEBUG_MAGIC);
	BUG();
}
#endif

/*
48 49
 * Get the key quota record for a user, allocating a new record if one doesn't
 * already exist.
L
Linus Torvalds 已提交
50
 */
51
struct key_user *key_user_lookup(kuid_t uid)
L
Linus Torvalds 已提交
52 53
{
	struct key_user *candidate = NULL, *user;
54
	struct rb_node *parent, **p;
L
Linus Torvalds 已提交
55

56
try_again:
57
	parent = NULL;
L
Linus Torvalds 已提交
58 59 60 61 62 63 64 65
	p = &key_user_tree.rb_node;
	spin_lock(&key_user_lock);

	/* search the tree for a user record with a matching UID */
	while (*p) {
		parent = *p;
		user = rb_entry(parent, struct key_user, node);

66
		if (uid_lt(uid, user->uid))
L
Linus Torvalds 已提交
67
			p = &(*p)->rb_left;
68
		else if (uid_gt(uid, user->uid))
69
			p = &(*p)->rb_right;
L
Linus Torvalds 已提交
70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
		else
			goto found;
	}

	/* if we get here, we failed to find a match in the tree */
	if (!candidate) {
		/* allocate a candidate user record if we don't already have
		 * one */
		spin_unlock(&key_user_lock);

		user = NULL;
		candidate = kmalloc(sizeof(struct key_user), GFP_KERNEL);
		if (unlikely(!candidate))
			goto out;

		/* the allocation may have scheduled, so we need to repeat the
		 * search lest someone else added the record whilst we were
		 * asleep */
		goto try_again;
	}

	/* if we get here, then the user record still hadn't appeared on the
	 * second pass - so we use the candidate record */
93
	refcount_set(&candidate->usage, 1);
L
Linus Torvalds 已提交
94 95 96 97 98 99
	atomic_set(&candidate->nkeys, 0);
	atomic_set(&candidate->nikeys, 0);
	candidate->uid = uid;
	candidate->qnkeys = 0;
	candidate->qnbytes = 0;
	spin_lock_init(&candidate->lock);
100
	mutex_init(&candidate->cons_lock);
L
Linus Torvalds 已提交
101 102 103 104 105 106 107 108

	rb_link_node(&candidate->node, parent, p);
	rb_insert_color(&candidate->node, &key_user_tree);
	spin_unlock(&key_user_lock);
	user = candidate;
	goto out;

	/* okay - we found a user record for this UID */
109
found:
110
	refcount_inc(&user->usage);
L
Linus Torvalds 已提交
111
	spin_unlock(&key_user_lock);
J
Jesper Juhl 已提交
112
	kfree(candidate);
113
out:
L
Linus Torvalds 已提交
114
	return user;
115
}
L
Linus Torvalds 已提交
116 117

/*
118
 * Dispose of a user structure
L
Linus Torvalds 已提交
119 120 121
 */
void key_user_put(struct key_user *user)
{
122
	if (refcount_dec_and_lock(&user->usage, &key_user_lock)) {
L
Linus Torvalds 已提交
123 124 125 126 127
		rb_erase(&user->node, &key_user_tree);
		spin_unlock(&key_user_lock);

		kfree(user);
	}
128
}
L
Linus Torvalds 已提交
129 130

/*
131 132
 * Allocate a serial number for a key.  These are assigned randomly to avoid
 * security issues through covert channel problems.
L
Linus Torvalds 已提交
133 134 135 136 137 138
 */
static inline void key_alloc_serial(struct key *key)
{
	struct rb_node *parent, **p;
	struct key *xkey;

139
	/* propose a random serial number and look for a hole for it in the
L
Linus Torvalds 已提交
140
	 * serial number tree */
141 142 143 144 145 146 147
	do {
		get_random_bytes(&key->serial, sizeof(key->serial));

		key->serial >>= 1; /* negative numbers are not permitted */
	} while (key->serial < 3);

	spin_lock(&key_serial_lock);
L
Linus Torvalds 已提交
148

149
attempt_insertion:
L
Linus Torvalds 已提交
150 151 152 153 154 155 156 157 158 159 160 161 162 163
	parent = NULL;
	p = &key_serial_tree.rb_node;

	while (*p) {
		parent = *p;
		xkey = rb_entry(parent, struct key, serial_node);

		if (key->serial < xkey->serial)
			p = &(*p)->rb_left;
		else if (key->serial > xkey->serial)
			p = &(*p)->rb_right;
		else
			goto serial_exists;
	}
164 165 166 167 168 169 170

	/* we've found a suitable hole - arrange for this key to occupy it */
	rb_link_node(&key->serial_node, parent, p);
	rb_insert_color(&key->serial_node, &key_serial_tree);

	spin_unlock(&key_serial_lock);
	return;
L
Linus Torvalds 已提交
171 172 173

	/* we found a key with the proposed serial number - walk the tree from
	 * that point looking for the next unused serial number */
174
serial_exists:
L
Linus Torvalds 已提交
175
	for (;;) {
176
		key->serial++;
177 178 179 180
		if (key->serial < 3) {
			key->serial = 3;
			goto attempt_insertion;
		}
L
Linus Torvalds 已提交
181 182 183

		parent = rb_next(parent);
		if (!parent)
184
			goto attempt_insertion;
L
Linus Torvalds 已提交
185 186 187

		xkey = rb_entry(parent, struct key, serial_node);
		if (key->serial < xkey->serial)
188
			goto attempt_insertion;
L
Linus Torvalds 已提交
189
	}
190
}
L
Linus Torvalds 已提交
191

192 193 194 195 196 197 198
/**
 * key_alloc - Allocate a key of the specified type.
 * @type: The type of key to allocate.
 * @desc: The key description to allow the key to be searched out.
 * @uid: The owner of the new key.
 * @gid: The group ID for the new key's group permissions.
 * @cred: The credentials specifying UID namespace.
199
 * @perm: The permissions mask of the new key.
200
 * @flags: Flags specifying quota properties.
201
 * @restrict_link: Optional link restriction for new keyrings.
202 203 204 205 206
 *
 * Allocate a key of the specified type with the attributes given.  The key is
 * returned in an uninstantiated state and the caller needs to instantiate the
 * key before returning.
 *
207 208 209
 * The restrict_link structure (if not NULL) will be freed when the
 * keyring is destroyed, so it must be dynamically allocated.
 *
210 211 212 213 214 215 216 217 218 219 220 221 222 223
 * The user's key count quota is updated to reflect the creation of the key and
 * the user's key data quota has the default for the key type reserved.  The
 * instantiation function should amend this as necessary.  If insufficient
 * quota is available, -EDQUOT will be returned.
 *
 * The LSM security modules can prevent a key being created, in which case
 * -EACCES will be returned.
 *
 * Returns a pointer to the new key if successful and an error code otherwise.
 *
 * Note that the caller needs to ensure the key type isn't uninstantiated.
 * Internally this can be done by locking key_types_sem.  Externally, this can
 * be done by either never unregistering the key type, or making sure
 * key_alloc() calls don't race with module unloading.
L
Linus Torvalds 已提交
224 225
 */
struct key *key_alloc(struct key_type *type, const char *desc,
226
		      kuid_t uid, kgid_t gid, const struct cred *cred,
227
		      key_perm_t perm, unsigned long flags,
228
		      struct key_restriction *restrict_link)
L
Linus Torvalds 已提交
229 230 231 232
{
	struct key_user *user = NULL;
	struct key *key;
	size_t desclen, quotalen;
233
	int ret;
L
Linus Torvalds 已提交
234 235 236 237 238

	key = ERR_PTR(-EINVAL);
	if (!desc || !*desc)
		goto error;

239 240 241 242 243 244 245 246
	if (type->vet_description) {
		ret = type->vet_description(desc);
		if (ret < 0) {
			key = ERR_PTR(ret);
			goto error;
		}
	}

247 248
	desclen = strlen(desc);
	quotalen = desclen + 1 + type->def_datalen;
L
Linus Torvalds 已提交
249 250

	/* get hold of the key tracking for this user */
251
	user = key_user_lookup(uid);
L
Linus Torvalds 已提交
252 253 254 255 256
	if (!user)
		goto no_memory_1;

	/* check that the user's quota permits allocation of another key and
	 * its description */
257
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
258
		unsigned maxkeys = uid_eq(uid, GLOBAL_ROOT_UID) ?
259
			key_quota_root_maxkeys : key_quota_maxkeys;
260
		unsigned maxbytes = uid_eq(uid, GLOBAL_ROOT_UID) ?
261 262
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
263
		spin_lock(&user->lock);
264
		if (!(flags & KEY_ALLOC_QUOTA_OVERRUN)) {
265 266
			if (user->qnkeys + 1 > maxkeys ||
			    user->qnbytes + quotalen > maxbytes ||
267
			    user->qnbytes + quotalen < user->qnbytes)
268 269
				goto no_quota;
		}
L
Linus Torvalds 已提交
270 271 272 273 274 275 276

		user->qnkeys++;
		user->qnbytes += quotalen;
		spin_unlock(&user->lock);
	}

	/* allocate and initialise the key and its description */
277
	key = kmem_cache_zalloc(key_jar, GFP_KERNEL);
L
Linus Torvalds 已提交
278 279 280
	if (!key)
		goto no_memory_2;

281 282 283 284 285 286 287 288 289 290 291 292 293
	if (flags & KEY_ALLOC_DOMAIN_MASK) {
		/* set alloc domain for all keys added to this keyring */
		if (type == &key_type_keyring)
			key->key_alloc_domain = (flags & KEY_ALLOC_DOMAIN_MASK);

		/* set domain tag if it's not predefined for the key type */
		if ((!type->flags) && (flags & KEY_ALLOC_DOMAIN_IMA))
			/* Set it to something meaningful after adding a key
			 * domain to the ima namespace.
			 */
			key->index_key.domain_tag = NULL;
	}

D
Dan Carpenter 已提交
294 295
	key->index_key.desc_len = desclen;
	key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL);
296
	if (!key->index_key.description)
D
Dan Carpenter 已提交
297
		goto no_memory_3;
298
	key->index_key.type = type;
299
	key_set_index_key(&key->index_key);
L
Linus Torvalds 已提交
300

301
	refcount_set(&key->usage, 1);
L
Linus Torvalds 已提交
302
	init_rwsem(&key->sem);
303
	lockdep_set_class(&key->sem, &type->lock_class);
L
Linus Torvalds 已提交
304 305 306 307 308
	key->user = user;
	key->quotalen = quotalen;
	key->datalen = type->def_datalen;
	key->uid = uid;
	key->gid = gid;
309
	key->perm = perm;
310
	key->restrict_link = restrict_link;
D
David Howells 已提交
311
	key->last_used_at = ktime_get_real_seconds();
L
Linus Torvalds 已提交
312

313
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA))
314
		key->flags |= 1 << KEY_FLAG_IN_QUOTA;
315 316
	if (flags & KEY_ALLOC_BUILT_IN)
		key->flags |= 1 << KEY_FLAG_BUILTIN;
317 318
	if (flags & KEY_ALLOC_UID_KEYRING)
		key->flags |= 1 << KEY_FLAG_UID_KEYRING;
319 320
	if (flags & KEY_ALLOC_SET_KEEP)
		key->flags |= 1 << KEY_FLAG_KEEP;
L
Linus Torvalds 已提交
321 322 323 324 325

#ifdef KEY_DEBUGGING
	key->magic = KEY_DEBUG_MAGIC;
#endif

326
	/* let the security module know about the key */
D
David Howells 已提交
327
	ret = security_key_alloc(key, cred, flags);
328 329 330
	if (ret < 0)
		goto security_error;

L
Linus Torvalds 已提交
331
	/* publish the key by giving it a serial number */
332
	refcount_inc(&key->domain_tag->usage);
L
Linus Torvalds 已提交
333 334 335
	atomic_inc(&user->nkeys);
	key_alloc_serial(key);

336
error:
L
Linus Torvalds 已提交
337 338
	return key;

339 340
security_error:
	kfree(key->description);
L
Linus Torvalds 已提交
341
	kmem_cache_free(key_jar, key);
342
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
L
Linus Torvalds 已提交
343 344 345 346 347 348
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
349 350 351 352 353 354
	key = ERR_PTR(ret);
	goto error;

no_memory_3:
	kmem_cache_free(key_jar, key);
no_memory_2:
355
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
356 357 358 359 360 361 362
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
no_memory_1:
L
Linus Torvalds 已提交
363 364 365
	key = ERR_PTR(-ENOMEM);
	goto error;

366
no_quota:
L
Linus Torvalds 已提交
367 368 369 370
	spin_unlock(&user->lock);
	key_user_put(user);
	key = ERR_PTR(-EDQUOT);
	goto error;
371
}
L
Linus Torvalds 已提交
372 373
EXPORT_SYMBOL(key_alloc);

374 375 376 377 378 379 380 381 382 383
/**
 * key_payload_reserve - Adjust data quota reservation for the key's payload
 * @key: The key to make the reservation for.
 * @datalen: The amount of data payload the caller now wants.
 *
 * Adjust the amount of the owning user's key data quota that a key reserves.
 * If the amount is increased, then -EDQUOT may be returned if there isn't
 * enough free quota available.
 *
 * If successful, 0 is returned.
L
Linus Torvalds 已提交
384 385 386
 */
int key_payload_reserve(struct key *key, size_t datalen)
{
387
	int delta = (int)datalen - key->datalen;
L
Linus Torvalds 已提交
388 389 390 391 392
	int ret = 0;

	key_check(key);

	/* contemplate the quota adjustment */
393
	if (delta != 0 && test_bit(KEY_FLAG_IN_QUOTA, &key->flags)) {
394
		unsigned maxbytes = uid_eq(key->user->uid, GLOBAL_ROOT_UID) ?
395 396
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
397 398 399
		spin_lock(&key->user->lock);

		if (delta > 0 &&
400
		    (key->user->qnbytes + delta > maxbytes ||
401
		     key->user->qnbytes + delta < key->user->qnbytes)) {
L
Linus Torvalds 已提交
402 403 404 405 406 407 408 409 410 411 412 413 414 415
			ret = -EDQUOT;
		}
		else {
			key->user->qnbytes += delta;
			key->quotalen += delta;
		}
		spin_unlock(&key->user->lock);
	}

	/* change the recorded data length if that didn't generate an error */
	if (ret == 0)
		key->datalen = datalen;

	return ret;
416
}
L
Linus Torvalds 已提交
417 418
EXPORT_SYMBOL(key_payload_reserve);

419 420 421 422 423 424 425 426 427 428 429 430
/*
 * Change the key state to being instantiated.
 */
static void mark_key_instantiated(struct key *key, int reject_error)
{
	/* Commit the payload before setting the state; barrier versus
	 * key_read_state().
	 */
	smp_store_release(&key->state,
			  (reject_error < 0) ? reject_error : KEY_IS_POSITIVE);
}

L
Linus Torvalds 已提交
431
/*
432 433 434 435
 * Instantiate a key and link it into the target keyring atomically.  Must be
 * called with the target keyring's semaphore writelocked.  The target key's
 * semaphore need not be locked as instantiation is serialised by
 * key_construction_mutex.
L
Linus Torvalds 已提交
436 437
 */
static int __key_instantiate_and_link(struct key *key,
438
				      struct key_preparsed_payload *prep,
439
				      struct key *keyring,
440
				      struct key *authkey,
441
				      struct assoc_array_edit **_edit)
L
Linus Torvalds 已提交
442 443 444 445 446 447 448 449 450
{
	int ret, awaken;

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

451
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
452 453

	/* can't instantiate twice */
454
	if (key->state == KEY_IS_UNINSTANTIATED) {
L
Linus Torvalds 已提交
455
		/* instantiate the key */
456
		ret = key->type->instantiate(key, prep);
L
Linus Torvalds 已提交
457 458 459 460

		if (ret == 0) {
			/* mark the key as being instantiated */
			atomic_inc(&key->user->nikeys);
461
			mark_key_instantiated(key, 0);
462
			notify_key(key, NOTIFY_KEY_INSTANTIATED, 0);
L
Linus Torvalds 已提交
463

464
			if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
465 466 467
				awaken = 1;

			/* and link it into the destination keyring */
468
			if (keyring) {
469 470
				if (test_bit(KEY_FLAG_KEEP, &keyring->flags))
					set_bit(KEY_FLAG_KEEP, &key->flags);
471

472
				__key_link(keyring, key, _edit);
473
			}
474 475

			/* disable the authorisation key */
D
David Howells 已提交
476
			if (authkey)
477
				key_invalidate(authkey);
478

479
			if (prep->expiry != TIME64_MAX) {
480 481 482
				key->expiry = prep->expiry;
				key_schedule_gc(prep->expiry + key_gc_delay);
			}
L
Linus Torvalds 已提交
483 484 485
		}
	}

486
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
487 488 489

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
490
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
491 492

	return ret;
493
}
L
Linus Torvalds 已提交
494

495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
/**
 * key_instantiate_and_link - Instantiate a key and link it into the keyring.
 * @key: The key to instantiate.
 * @data: The data to use to instantiate the keyring.
 * @datalen: The length of @data.
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Instantiate a key that's in the uninstantiated state using the provided data
 * and, if successful, link it in to the destination keyring if one is
 * supplied.
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
510 511 512 513
 */
int key_instantiate_and_link(struct key *key,
			     const void *data,
			     size_t datalen,
514
			     struct key *keyring,
D
David Howells 已提交
515
			     struct key *authkey)
L
Linus Torvalds 已提交
516
{
517
	struct key_preparsed_payload prep;
518
	struct assoc_array_edit *edit = NULL;
L
Linus Torvalds 已提交
519 520
	int ret;

521 522 523 524
	memset(&prep, 0, sizeof(prep));
	prep.data = data;
	prep.datalen = datalen;
	prep.quotalen = key->type->def_datalen;
525
	prep.expiry = TIME64_MAX;
526 527 528 529 530 531
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
	}

532
	if (keyring) {
533
		ret = __key_link_lock(keyring, &key->index_key);
534 535 536
		if (ret < 0)
			goto error;

537 538 539 540
		ret = __key_link_begin(keyring, &key->index_key, &edit);
		if (ret < 0)
			goto error_link_end;

541 542 543 544 545
		if (keyring->restrict_link && keyring->restrict_link->check) {
			struct key_restriction *keyres = keyring->restrict_link;

			ret = keyres->check(keyring, key->type, &prep.payload,
					    keyres->key);
546
			if (ret < 0)
547
				goto error_link_end;
548
		}
549
	}
L
Linus Torvalds 已提交
550

551
	ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit);
L
Linus Torvalds 已提交
552

553
error_link_end:
L
Linus Torvalds 已提交
554
	if (keyring)
555
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
556

557
error:
558 559
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
560
	return ret;
561
}
L
Linus Torvalds 已提交
562 563 564

EXPORT_SYMBOL(key_instantiate_and_link);

565
/**
566
 * key_reject_and_link - Negatively instantiate a key and link it into the keyring.
567 568
 * @key: The key to instantiate.
 * @timeout: The timeout on the negative key.
569
 * @error: The error to return when the key is hit.
570 571 572 573
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Negatively instantiate a key that's in the uninstantiated state and, if
574 575 576
 * successful, set its timeout and stored error and link it in to the
 * destination keyring if one is supplied.  The key and any links to the key
 * will be automatically garbage collected after the timeout expires.
577 578
 *
 * Negative keys are used to rate limit repeated request_key() calls by causing
579 580
 * them to return the stored error code (typically ENOKEY) until the negative
 * key expires.
581 582 583 584
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
585
 */
586
int key_reject_and_link(struct key *key,
L
Linus Torvalds 已提交
587
			unsigned timeout,
588
			unsigned error,
589
			struct key *keyring,
D
David Howells 已提交
590
			struct key *authkey)
L
Linus Torvalds 已提交
591
{
592
	struct assoc_array_edit *edit = NULL;
593
	int ret, awaken, link_ret = 0;
L
Linus Torvalds 已提交
594 595 596 597 598 599 600

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

601 602 603 604
	if (keyring) {
		if (keyring->restrict_link)
			return -EPERM;

605 606 607 608 609 610
		link_ret = __key_link_lock(keyring, &key->index_key);
		if (link_ret == 0) {
			link_ret = __key_link_begin(keyring, &key->index_key, &edit);
			if (link_ret < 0)
				__key_link_end(keyring, &key->index_key, edit);
		}
611
	}
L
Linus Torvalds 已提交
612

613
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
614 615

	/* can't instantiate twice */
616
	if (key->state == KEY_IS_UNINSTANTIATED) {
L
Linus Torvalds 已提交
617 618
		/* mark the key as being negatively instantiated */
		atomic_inc(&key->user->nikeys);
619
		mark_key_instantiated(key, -error);
620
		notify_key(key, NOTIFY_KEY_INSTANTIATED, -error);
621
		key->expiry = ktime_get_real_seconds() + timeout;
D
David Howells 已提交
622
		key_schedule_gc(key->expiry + key_gc_delay);
L
Linus Torvalds 已提交
623

624
		if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
625 626 627 628 629
			awaken = 1;

		ret = 0;

		/* and link it into the destination keyring */
630
		if (keyring && link_ret == 0)
631
			__key_link(keyring, key, &edit);
632 633

		/* disable the authorisation key */
D
David Howells 已提交
634
		if (authkey)
635
			key_invalidate(authkey);
L
Linus Torvalds 已提交
636 637
	}

638
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
639

640
	if (keyring && link_ret == 0)
641
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
642 643 644

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
645
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
646

647
	return ret == 0 ? link_ret : ret;
648
}
649
EXPORT_SYMBOL(key_reject_and_link);
L
Linus Torvalds 已提交
650

651 652 653 654 655 656 657
/**
 * key_put - Discard a reference to a key.
 * @key: The key to discard a reference from.
 *
 * Discard a reference to a key, and when all the references are gone, we
 * schedule the cleanup task to come and pull it out of the tree in process
 * context at some later time.
L
Linus Torvalds 已提交
658 659 660 661 662 663
 */
void key_put(struct key *key)
{
	if (key) {
		key_check(key);

664
		if (refcount_dec_and_test(&key->usage))
665
			schedule_work(&key_gc_work);
L
Linus Torvalds 已提交
666
	}
667
}
L
Linus Torvalds 已提交
668 669 670
EXPORT_SYMBOL(key_put);

/*
671
 * Find a key by its serial number.
L
Linus Torvalds 已提交
672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692
 */
struct key *key_lookup(key_serial_t id)
{
	struct rb_node *n;
	struct key *key;

	spin_lock(&key_serial_lock);

	/* search the tree for the specified key */
	n = key_serial_tree.rb_node;
	while (n) {
		key = rb_entry(n, struct key, serial_node);

		if (id < key->serial)
			n = n->rb_left;
		else if (id > key->serial)
			n = n->rb_right;
		else
			goto found;
	}

693
not_found:
L
Linus Torvalds 已提交
694 695 696
	key = ERR_PTR(-ENOKEY);
	goto error;

697
found:
M
Mark Rutland 已提交
698 699
	/* A key is allowed to be looked up only if someone still owns a
	 * reference to it - otherwise it's awaiting the gc.
L
Linus Torvalds 已提交
700
	 */
M
Mark Rutland 已提交
701 702
	if (!refcount_inc_not_zero(&key->usage))
		goto not_found;
L
Linus Torvalds 已提交
703

704
error:
L
Linus Torvalds 已提交
705 706
	spin_unlock(&key_serial_lock);
	return key;
707
}
L
Linus Torvalds 已提交
708 709

/*
710 711 712 713
 * Find and lock the specified key type against removal.
 *
 * We return with the sem read-locked if successful.  If the type wasn't
 * available -ENOKEY is returned instead.
L
Linus Torvalds 已提交
714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730
 */
struct key_type *key_type_lookup(const char *type)
{
	struct key_type *ktype;

	down_read(&key_types_sem);

	/* look up the key type to see if it's one of the registered kernel
	 * types */
	list_for_each_entry(ktype, &key_types_list, link) {
		if (strcmp(ktype->name, type) == 0)
			goto found_kernel_type;
	}

	up_read(&key_types_sem);
	ktype = ERR_PTR(-ENOKEY);

731
found_kernel_type:
L
Linus Torvalds 已提交
732
	return ktype;
733
}
L
Linus Torvalds 已提交
734

735 736
void key_set_timeout(struct key *key, unsigned timeout)
{
737
	time64_t expiry = 0;
738 739 740 741

	/* make the changes with the locks held to prevent races */
	down_write(&key->sem);

742 743
	if (timeout > 0)
		expiry = ktime_get_real_seconds() + timeout;
744 745 746 747 748 749 750 751

	key->expiry = expiry;
	key_schedule_gc(key->expiry + key_gc_delay);

	up_write(&key->sem);
}
EXPORT_SYMBOL_GPL(key_set_timeout);

L
Linus Torvalds 已提交
752
/*
753
 * Unlock a key type locked by key_type_lookup().
L
Linus Torvalds 已提交
754 755 756 757
 */
void key_type_put(struct key_type *ktype)
{
	up_read(&key_types_sem);
758
}
L
Linus Torvalds 已提交
759 760

/*
761 762 763 764
 * Attempt to update an existing key.
 *
 * The key is given to us with an incremented refcount that we need to discard
 * if we get an error.
L
Linus Torvalds 已提交
765
 */
766
static inline key_ref_t __key_update(key_ref_t key_ref,
767
				     struct key_preparsed_payload *prep)
L
Linus Torvalds 已提交
768
{
769
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
770 771 772
	int ret;

	/* need write permission on the key to update it */
773
	ret = key_permission(key_ref, KEY_NEED_WRITE);
774
	if (ret < 0)
L
Linus Torvalds 已提交
775 776 777 778 779 780 781 782
		goto error;

	ret = -EEXIST;
	if (!key->type->update)
		goto error;

	down_write(&key->sem);

783
	ret = key->type->update(key, prep);
784
	if (ret == 0) {
785 786
		/* Updating a negative key positively instantiates it */
		mark_key_instantiated(key, 0);
787 788
		notify_key(key, NOTIFY_KEY_UPDATED, 0);
	}
L
Linus Torvalds 已提交
789 790 791 792 793

	up_write(&key->sem);

	if (ret < 0)
		goto error;
794 795
out:
	return key_ref;
L
Linus Torvalds 已提交
796

797
error:
L
Linus Torvalds 已提交
798
	key_put(key);
799
	key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
800
	goto out;
801
}
L
Linus Torvalds 已提交
802

803 804 805 806 807 808 809
/**
 * key_create_or_update - Update or create and instantiate a key.
 * @keyring_ref: A pointer to the destination keyring with possession flag.
 * @type: The type of key.
 * @description: The searchable description for the key.
 * @payload: The data to use to instantiate or update the key.
 * @plen: The length of @payload.
810
 * @perm: The permissions mask for a new key.
811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826
 * @flags: The quota flags for a new key.
 *
 * Search the destination keyring for a key of the same description and if one
 * is found, update it, otherwise create and instantiate a new one and create a
 * link to it from that keyring.
 *
 * If perm is KEY_PERM_UNDEF then an appropriate key permissions mask will be
 * concocted.
 *
 * Returns a pointer to the new key if successful, -ENODEV if the key type
 * wasn't available, -ENOTDIR if the keyring wasn't a keyring, -EACCES if the
 * caller isn't permitted to modify the keyring or the LSM did not permit
 * creation of the key.
 *
 * On success, the possession flag from the keyring ref will be tacked on to
 * the key ref before it is returned.
L
Linus Torvalds 已提交
827
 */
828 829 830 831 832
key_ref_t key_create_or_update(key_ref_t keyring_ref,
			       const char *type,
			       const char *description,
			       const void *payload,
			       size_t plen,
833
			       key_perm_t perm,
834
			       unsigned long flags)
L
Linus Torvalds 已提交
835
{
836 837 838
	struct keyring_index_key index_key = {
		.description	= description,
	};
839
	struct key_preparsed_payload prep;
840
	struct assoc_array_edit *edit = NULL;
D
David Howells 已提交
841
	const struct cred *cred = current_cred();
842 843
	struct key *keyring, *key = NULL;
	key_ref_t key_ref;
L
Linus Torvalds 已提交
844
	int ret;
845
	struct key_restriction *restrict_link = NULL;
L
Linus Torvalds 已提交
846 847 848

	/* look up the key type to see if it's one of the registered kernel
	 * types */
849 850
	index_key.type = key_type_lookup(type);
	if (IS_ERR(index_key.type)) {
851
		key_ref = ERR_PTR(-ENODEV);
L
Linus Torvalds 已提交
852 853 854
		goto error;
	}

855
	key_ref = ERR_PTR(-EINVAL);
856
	if (!index_key.type->instantiate ||
857
	    (!index_key.description && !index_key.type->preparse))
858
		goto error_put_type;
L
Linus Torvalds 已提交
859

860 861 862 863
	keyring = key_ref_to_ptr(keyring_ref);

	key_check(keyring);

864 865 866
	if (!(flags & KEY_ALLOC_BYPASS_RESTRICTION))
		restrict_link = keyring->restrict_link;

867 868
	key_ref = ERR_PTR(-ENOTDIR);
	if (keyring->type != &key_type_keyring)
869 870 871 872 873
		goto error_put_type;

	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
874
	prep.quotalen = index_key.type->def_datalen;
875
	prep.expiry = TIME64_MAX;
876 877
	if (index_key.type->preparse) {
		ret = index_key.type->preparse(&prep);
878 879
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
880
			goto error_free_prep;
881
		}
882 883
		if (!index_key.description)
			index_key.description = prep.description;
884
		key_ref = ERR_PTR(-EINVAL);
885
		if (!index_key.description)
886 887
			goto error_free_prep;
	}
888
	index_key.desc_len = strlen(index_key.description);
889
	key_set_index_key(&index_key);
890

891
	ret = __key_link_lock(keyring, &index_key);
892 893 894 895 896
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
		goto error_free_prep;
	}

897 898 899 900 901 902
	ret = __key_link_begin(keyring, &index_key, &edit);
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
		goto error_link_end;
	}

903 904 905
	if (restrict_link && restrict_link->check) {
		ret = restrict_link->check(keyring, index_key.type,
					   &prep.payload, restrict_link->key);
906 907
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
908
			goto error_link_end;
909 910
		}
	}
911

912 913
	/* if we're going to allocate a new key, we're going to have
	 * to modify the keyring */
914
	ret = key_permission(keyring_ref, KEY_NEED_WRITE);
915 916
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
917
		goto error_link_end;
918
	}
919

920 921 922
	/* if it's possible to update this type of key, search for an existing
	 * key of the same type and description in the destination keyring and
	 * update that instead if possible
L
Linus Torvalds 已提交
923
	 */
924
	if (index_key.type->update) {
925 926
		key_ref = find_key_to_update(keyring_ref, &index_key);
		if (key_ref)
927 928
			goto found_matching_key;
	}
L
Linus Torvalds 已提交
929

930 931 932 933 934 935 936 937 938 939 940 941 942
	/* if the client doesn't provide, decide on the permissions we want */
	if (perm == KEY_PERM_UNDEF) {
		perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR;
		perm |= KEY_USR_VIEW;

		if (index_key.type->read)
			perm |= KEY_POS_READ;

		if (index_key.type == &key_type_keyring ||
		    index_key.type->update)
			perm |= KEY_POS_WRITE;
	}

943 944 945
	if (keyring->key_alloc_domain)
		flags |= keyring->key_alloc_domain;

L
Linus Torvalds 已提交
946
	/* allocate a new key */
947
	key = key_alloc(index_key.type, index_key.description,
948
			cred->fsuid, cred->fsgid, cred, perm, flags, NULL);
L
Linus Torvalds 已提交
949
	if (IS_ERR(key)) {
950
		key_ref = ERR_CAST(key);
951
		goto error_link_end;
L
Linus Torvalds 已提交
952 953 954
	}

	/* instantiate it and link it into the target keyring */
955
	ret = __key_instantiate_and_link(key, &prep, keyring, NULL, &edit);
L
Linus Torvalds 已提交
956 957
	if (ret < 0) {
		key_put(key);
958
		key_ref = ERR_PTR(ret);
959
		goto error_link_end;
L
Linus Torvalds 已提交
960 961
	}

962 963 964
	ima_post_key_create_or_update(keyring, key, payload, plen,
				      flags, true);

965 966
	key_ref = make_key_ref(key, is_key_possessed(keyring_ref));

967
error_link_end:
968
	__key_link_end(keyring, &index_key, edit);
969
error_free_prep:
970 971
	if (index_key.type->preparse)
		index_key.type->free_preparse(&prep);
972
error_put_type:
973
	key_type_put(index_key.type);
974
error:
975
	return key_ref;
L
Linus Torvalds 已提交
976 977 978 979 980

 found_matching_key:
	/* we found a matching key, so we're going to try to update it
	 * - we can drop the locks first as we have the key pinned
	 */
981
	__key_link_end(keyring, &index_key, edit);
L
Linus Torvalds 已提交
982

983 984 985 986 987 988 989 990 991 992
	key = key_ref_to_ptr(key_ref);
	if (test_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags)) {
		ret = wait_for_key_construction(key, true);
		if (ret < 0) {
			key_ref_put(key_ref);
			key_ref = ERR_PTR(ret);
			goto error_free_prep;
		}
	}

993
	key_ref = __key_update(key_ref, &prep);
994 995 996 997 998 999

	if (!IS_ERR(key_ref))
		ima_post_key_create_or_update(keyring, key,
					      payload, plen,
					      flags, false);

1000
	goto error_free_prep;
1001
}
L
Linus Torvalds 已提交
1002 1003
EXPORT_SYMBOL(key_create_or_update);

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015
/**
 * key_update - Update a key's contents.
 * @key_ref: The pointer (plus possession flag) to the key.
 * @payload: The data to be used to update the key.
 * @plen: The length of @payload.
 *
 * Attempt to update the contents of a key with the given payload data.  The
 * caller must be granted Write permission on the key.  Negative keys can be
 * instantiated by this method.
 *
 * Returns 0 on success, -EACCES if not permitted and -EOPNOTSUPP if the key
 * type does not support updating.  The key type may return other errors.
L
Linus Torvalds 已提交
1016
 */
1017
int key_update(key_ref_t key_ref, const void *payload, size_t plen)
L
Linus Torvalds 已提交
1018
{
1019
	struct key_preparsed_payload prep;
1020
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
1021 1022 1023 1024 1025
	int ret;

	key_check(key);

	/* the key must be writable */
1026
	ret = key_permission(key_ref, KEY_NEED_WRITE);
1027
	if (ret < 0)
1028
		return ret;
L
Linus Torvalds 已提交
1029 1030

	/* attempt to update it if supported */
1031
	if (!key->type->update)
1032
		return -EOPNOTSUPP;
L
Linus Torvalds 已提交
1033

1034 1035 1036 1037
	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
	prep.quotalen = key->type->def_datalen;
1038
	prep.expiry = TIME64_MAX;
1039 1040 1041 1042
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
L
Linus Torvalds 已提交
1043 1044
	}

1045 1046 1047
	down_write(&key->sem);

	ret = key->type->update(key, &prep);
1048
	if (ret == 0) {
1049 1050
		/* Updating a negative key positively instantiates it */
		mark_key_instantiated(key, 0);
1051 1052
		notify_key(key, NOTIFY_KEY_UPDATED, 0);
	}
1053 1054 1055

	up_write(&key->sem);

1056
error:
1057 1058
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
1059
	return ret;
1060
}
L
Linus Torvalds 已提交
1061 1062
EXPORT_SYMBOL(key_update);

1063 1064 1065 1066 1067 1068 1069 1070
/**
 * key_revoke - Revoke a key.
 * @key: The key to be revoked.
 *
 * Mark a key as being revoked and ask the type to free up its resources.  The
 * revocation timeout is set and the key and all its links will be
 * automatically garbage collected after key_gc_delay amount of time if they
 * are not manually dealt with first.
L
Linus Torvalds 已提交
1071 1072 1073
 */
void key_revoke(struct key *key)
{
1074
	time64_t time;
1075

L
Linus Torvalds 已提交
1076 1077
	key_check(key);

1078 1079 1080 1081 1082 1083
	/* make sure no one's trying to change or use the key when we mark it
	 * - we tell lockdep that we might nest because we might be revoking an
	 *   authorisation key whilst holding the sem on a key we've just
	 *   instantiated
	 */
	down_write_nested(&key->sem, 1);
1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
	if (!test_and_set_bit(KEY_FLAG_REVOKED, &key->flags)) {
		notify_key(key, NOTIFY_KEY_REVOKED, 0);
		if (key->type->revoke)
			key->type->revoke(key);

		/* set the death time to no more than the expiry time */
		time = ktime_get_real_seconds();
		if (key->revoked_at == 0 || key->revoked_at > time) {
			key->revoked_at = time;
			key_schedule_gc(key->revoked_at + key_gc_delay);
		}
1095 1096
	}

L
Linus Torvalds 已提交
1097
	up_write(&key->sem);
1098
}
L
Linus Torvalds 已提交
1099 1100
EXPORT_SYMBOL(key_revoke);

D
David Howells 已提交
1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115
/**
 * key_invalidate - Invalidate a key.
 * @key: The key to be invalidated.
 *
 * Mark a key as being invalidated and have it cleaned up immediately.  The key
 * is ignored by all searches and other operations from this point.
 */
void key_invalidate(struct key *key)
{
	kenter("%d", key_serial(key));

	key_check(key);

	if (!test_bit(KEY_FLAG_INVALIDATED, &key->flags)) {
		down_write_nested(&key->sem, 1);
1116 1117
		if (!test_and_set_bit(KEY_FLAG_INVALIDATED, &key->flags)) {
			notify_key(key, NOTIFY_KEY_INVALIDATED, 0);
D
David Howells 已提交
1118
			key_schedule_gc_links();
1119
		}
D
David Howells 已提交
1120 1121 1122 1123 1124
		up_write(&key->sem);
	}
}
EXPORT_SYMBOL(key_invalidate);

1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142
/**
 * generic_key_instantiate - Simple instantiation of a key from preparsed data
 * @key: The key to be instantiated
 * @prep: The preparsed data to load.
 *
 * Instantiate a key from preparsed data.  We assume we can just copy the data
 * in directly and clear the old pointers.
 *
 * This can be pointed to directly by the key type instantiate op pointer.
 */
int generic_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
{
	int ret;

	pr_devel("==>%s()\n", __func__);

	ret = key_payload_reserve(key, prep->quotalen);
	if (ret == 0) {
1143 1144 1145 1146 1147 1148 1149 1150
		rcu_assign_keypointer(key, prep->payload.data[0]);
		key->payload.data[1] = prep->payload.data[1];
		key->payload.data[2] = prep->payload.data[2];
		key->payload.data[3] = prep->payload.data[3];
		prep->payload.data[0] = NULL;
		prep->payload.data[1] = NULL;
		prep->payload.data[2] = NULL;
		prep->payload.data[3] = NULL;
1151 1152 1153 1154 1155 1156
	}
	pr_devel("<==%s() = %d\n", __func__, ret);
	return ret;
}
EXPORT_SYMBOL(generic_key_instantiate);

1157 1158 1159 1160 1161 1162 1163
/**
 * register_key_type - Register a type of key.
 * @ktype: The new key type.
 *
 * Register a new key type.
 *
 * Returns 0 on success or -EEXIST if a type of this name already exists.
L
Linus Torvalds 已提交
1164 1165 1166 1167 1168 1169
 */
int register_key_type(struct key_type *ktype)
{
	struct key_type *p;
	int ret;

1170 1171
	memset(&ktype->lock_class, 0, sizeof(ktype->lock_class));

L
Linus Torvalds 已提交
1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182
	ret = -EEXIST;
	down_write(&key_types_sem);

	/* disallow key types with the same name */
	list_for_each_entry(p, &key_types_list, link) {
		if (strcmp(p->name, ktype->name) == 0)
			goto out;
	}

	/* store the type */
	list_add(&ktype->link, &key_types_list);
1183 1184

	pr_notice("Key type %s registered\n", ktype->name);
L
Linus Torvalds 已提交
1185 1186
	ret = 0;

1187
out:
L
Linus Torvalds 已提交
1188 1189
	up_write(&key_types_sem);
	return ret;
1190
}
L
Linus Torvalds 已提交
1191 1192
EXPORT_SYMBOL(register_key_type);

1193 1194 1195 1196 1197 1198 1199
/**
 * unregister_key_type - Unregister a type of key.
 * @ktype: The key type.
 *
 * Unregister a key type and mark all the extant keys of this type as dead.
 * Those keys of this type are then destroyed to get rid of their payloads and
 * they and their links will be garbage collected as soon as possible.
L
Linus Torvalds 已提交
1200 1201 1202 1203 1204
 */
void unregister_key_type(struct key_type *ktype)
{
	down_write(&key_types_sem);
	list_del_init(&ktype->link);
1205 1206
	downgrade_write(&key_types_sem);
	key_gc_keytype(ktype);
1207
	pr_notice("Key type %s unregistered\n", ktype->name);
1208
	up_read(&key_types_sem);
1209
}
L
Linus Torvalds 已提交
1210 1211 1212
EXPORT_SYMBOL(unregister_key_type);

/*
1213
 * Initialise the key management state.
L
Linus Torvalds 已提交
1214 1215 1216 1217 1218
 */
void __init key_init(void)
{
	/* allocate a slab in which we can store keys */
	key_jar = kmem_cache_create("key_jar", sizeof(struct key),
1219
			0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
L
Linus Torvalds 已提交
1220 1221 1222 1223 1224

	/* add the special key types */
	list_add_tail(&key_type_keyring.link, &key_types_list);
	list_add_tail(&key_type_dead.link, &key_types_list);
	list_add_tail(&key_type_user.link, &key_types_list);
J
Jeff Layton 已提交
1225
	list_add_tail(&key_type_logon.link, &key_types_list);
L
Linus Torvalds 已提交
1226 1227 1228 1229 1230 1231 1232 1233

	/* record the root user tracking */
	rb_link_node(&root_key_user.node,
		     NULL,
		     &key_user_tree.rb_node);

	rb_insert_color(&root_key_user.node,
			&key_user_tree);
1234
}