process_keys.c 18.5 KB
Newer Older
1
/* Management of a process's keyrings
L
Linus Torvalds 已提交
2
 *
3
 * Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13 14 15 16 17
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
#include <linux/sched.h>
#include <linux/keyctl.h>
#include <linux/fs.h>
#include <linux/err.h>
I
Ingo Molnar 已提交
18
#include <linux/mutex.h>
19
#include <linux/security.h>
20
#include <linux/user_namespace.h>
L
Linus Torvalds 已提交
21 22 23 24
#include <asm/uaccess.h>
#include "internal.h"

/* session keyring create vs join semaphore */
I
Ingo Molnar 已提交
25
static DEFINE_MUTEX(key_session_mutex);
L
Linus Torvalds 已提交
26

27 28 29
/* user keyring creation semaphore */
static DEFINE_MUTEX(key_user_keyring_mutex);

L
Linus Torvalds 已提交
30 31 32
/* the root user's tracking struct */
struct key_user root_key_user = {
	.usage		= ATOMIC_INIT(3),
33
	.cons_lock	= __MUTEX_INITIALIZER(root_key_user.cons_lock),
34
	.lock		= __SPIN_LOCK_UNLOCKED(root_key_user.lock),
L
Linus Torvalds 已提交
35 36 37
	.nkeys		= ATOMIC_INIT(2),
	.nikeys		= ATOMIC_INIT(2),
	.uid		= 0,
38
	.user_ns	= &init_user_ns,
L
Linus Torvalds 已提交
39 40 41
};

/*
42
 * install user and user session keyrings for a particular UID
L
Linus Torvalds 已提交
43
 */
44
int install_user_keyrings(void)
L
Linus Torvalds 已提交
45
{
D
David Howells 已提交
46 47
	struct user_struct *user;
	const struct cred *cred;
L
Linus Torvalds 已提交
48 49 50 51
	struct key *uid_keyring, *session_keyring;
	char buf[20];
	int ret;

D
David Howells 已提交
52 53 54
	cred = current_cred();
	user = cred->user;

55
	kenter("%p{%u}", user, user->uid);
L
Linus Torvalds 已提交
56

57 58 59
	if (user->uid_keyring) {
		kleave(" = 0 [exist]");
		return 0;
L
Linus Torvalds 已提交
60 61
	}

62 63
	mutex_lock(&key_user_keyring_mutex);
	ret = 0;
L
Linus Torvalds 已提交
64

65 66 67 68 69 70 71 72 73 74
	if (!user->uid_keyring) {
		/* get the UID-specific keyring
		 * - there may be one in existence already as it may have been
		 *   pinned by a session, but the user_struct pointing to it
		 *   may have been destroyed by setuid */
		sprintf(buf, "_uid.%u", user->uid);

		uid_keyring = find_keyring_by_name(buf, true);
		if (IS_ERR(uid_keyring)) {
			uid_keyring = keyring_alloc(buf, user->uid, (gid_t) -1,
D
David Howells 已提交
75
						    cred, KEY_ALLOC_IN_QUOTA,
76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
						    NULL);
			if (IS_ERR(uid_keyring)) {
				ret = PTR_ERR(uid_keyring);
				goto error;
			}
		}

		/* get a default session keyring (which might also exist
		 * already) */
		sprintf(buf, "_uid_ses.%u", user->uid);

		session_keyring = find_keyring_by_name(buf, true);
		if (IS_ERR(session_keyring)) {
			session_keyring =
				keyring_alloc(buf, user->uid, (gid_t) -1,
D
David Howells 已提交
91
					      cred, KEY_ALLOC_IN_QUOTA, NULL);
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
			if (IS_ERR(session_keyring)) {
				ret = PTR_ERR(session_keyring);
				goto error_release;
			}

			/* we install a link from the user session keyring to
			 * the user keyring */
			ret = key_link(session_keyring, uid_keyring);
			if (ret < 0)
				goto error_release_both;
		}

		/* install the keyrings */
		user->uid_keyring = uid_keyring;
		user->session_keyring = session_keyring;
L
Linus Torvalds 已提交
107 108
	}

109 110 111
	mutex_unlock(&key_user_keyring_mutex);
	kleave(" = 0");
	return 0;
L
Linus Torvalds 已提交
112

113 114 115 116
error_release_both:
	key_put(session_keyring);
error_release:
	key_put(uid_keyring);
117
error:
118 119
	mutex_unlock(&key_user_keyring_mutex);
	kleave(" = %d", ret);
L
Linus Torvalds 已提交
120
	return ret;
121
}
L
Linus Torvalds 已提交
122 123

/*
D
David Howells 已提交
124
 * install a fresh thread keyring directly to new credentials
L
Linus Torvalds 已提交
125
 */
D
David Howells 已提交
126
int install_thread_keyring_to_cred(struct cred *new)
L
Linus Torvalds 已提交
127
{
D
David Howells 已提交
128
	struct key *keyring;
L
Linus Torvalds 已提交
129

D
David Howells 已提交
130 131 132 133
	keyring = keyring_alloc("_tid", new->uid, new->gid, new,
				KEY_ALLOC_QUOTA_OVERRUN, NULL);
	if (IS_ERR(keyring))
		return PTR_ERR(keyring);
L
Linus Torvalds 已提交
134

D
David Howells 已提交
135 136 137
	new->thread_keyring = keyring;
	return 0;
}
L
Linus Torvalds 已提交
138 139 140 141

/*
 * install a fresh thread keyring, discarding the old one
 */
D
David Howells 已提交
142
static int install_thread_keyring(void)
L
Linus Torvalds 已提交
143
{
D
David Howells 已提交
144
	struct cred *new;
L
Linus Torvalds 已提交
145 146
	int ret;

D
David Howells 已提交
147 148 149
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
L
Linus Torvalds 已提交
150

D
David Howells 已提交
151 152 153 154 155 156
	BUG_ON(new->thread_keyring);

	ret = install_thread_keyring_to_cred(new);
	if (ret < 0) {
		abort_creds(new);
		return ret;
L
Linus Torvalds 已提交
157 158
	}

D
David Howells 已提交
159 160
	return commit_creds(new);
}
L
Linus Torvalds 已提交
161

D
David Howells 已提交
162 163 164 165 166 167 168 169 170
/*
 * install a process keyring directly to a credentials struct
 * - returns -EEXIST if there was already a process keyring, 0 if one installed,
 *   and other -ve on any other error
 */
int install_process_keyring_to_cred(struct cred *new)
{
	struct key *keyring;
	int ret;
L
Linus Torvalds 已提交
171

D
David Howells 已提交
172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189
	if (new->tgcred->process_keyring)
		return -EEXIST;

	keyring = keyring_alloc("_pid", new->uid, new->gid,
				new, KEY_ALLOC_QUOTA_OVERRUN, NULL);
	if (IS_ERR(keyring))
		return PTR_ERR(keyring);

	spin_lock_irq(&new->tgcred->lock);
	if (!new->tgcred->process_keyring) {
		new->tgcred->process_keyring = keyring;
		keyring = NULL;
		ret = 0;
	} else {
		ret = -EEXIST;
	}
	spin_unlock_irq(&new->tgcred->lock);
	key_put(keyring);
L
Linus Torvalds 已提交
190
	return ret;
D
David Howells 已提交
191
}
L
Linus Torvalds 已提交
192 193 194

/*
 * make sure a process keyring is installed
D
David Howells 已提交
195
 * - we
L
Linus Torvalds 已提交
196
 */
D
David Howells 已提交
197
static int install_process_keyring(void)
L
Linus Torvalds 已提交
198
{
D
David Howells 已提交
199
	struct cred *new;
L
Linus Torvalds 已提交
200 201
	int ret;

D
David Howells 已提交
202 203 204
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
L
Linus Torvalds 已提交
205

D
David Howells 已提交
206 207 208
	ret = install_process_keyring_to_cred(new);
	if (ret < 0) {
		abort_creds(new);
209
		return ret != -EEXIST ? ret : 0;
L
Linus Torvalds 已提交
210 211
	}

D
David Howells 已提交
212 213
	return commit_creds(new);
}
L
Linus Torvalds 已提交
214 215

/*
D
David Howells 已提交
216
 * install a session keyring directly to a credentials struct
L
Linus Torvalds 已提交
217
 */
218
int install_session_keyring_to_cred(struct cred *cred, struct key *keyring)
L
Linus Torvalds 已提交
219
{
220
	unsigned long flags;
L
Linus Torvalds 已提交
221
	struct key *old;
222 223

	might_sleep();
L
Linus Torvalds 已提交
224 225 226

	/* create an empty session keyring */
	if (!keyring) {
227
		flags = KEY_ALLOC_QUOTA_OVERRUN;
D
David Howells 已提交
228
		if (cred->tgcred->session_keyring)
229 230
			flags = KEY_ALLOC_IN_QUOTA;

D
David Howells 已提交
231 232
		keyring = keyring_alloc("_ses", cred->uid, cred->gid,
					cred, flags, NULL);
233 234
		if (IS_ERR(keyring))
			return PTR_ERR(keyring);
D
David Howells 已提交
235
	} else {
L
Linus Torvalds 已提交
236 237 238 239
		atomic_inc(&keyring->usage);
	}

	/* install the keyring */
D
David Howells 已提交
240 241 242 243
	spin_lock_irq(&cred->tgcred->lock);
	old = cred->tgcred->session_keyring;
	rcu_assign_pointer(cred->tgcred->session_keyring, keyring);
	spin_unlock_irq(&cred->tgcred->lock);
L
Linus Torvalds 已提交
244

245 246 247 248 249 250
	/* we're using RCU on the pointer, but there's no point synchronising
	 * on it if it didn't previously point to anything */
	if (old) {
		synchronize_rcu();
		key_put(old);
	}
L
Linus Torvalds 已提交
251

252
	return 0;
D
David Howells 已提交
253
}
L
Linus Torvalds 已提交
254 255

/*
D
David Howells 已提交
256 257
 * install a session keyring, discarding the old one
 * - if a keyring is not supplied, an empty one is invented
L
Linus Torvalds 已提交
258
 */
D
David Howells 已提交
259
static int install_session_keyring(struct key *keyring)
L
Linus Torvalds 已提交
260
{
D
David Howells 已提交
261 262
	struct cred *new;
	int ret;
L
Linus Torvalds 已提交
263

D
David Howells 已提交
264 265 266
	new = prepare_creds();
	if (!new)
		return -ENOMEM;
L
Linus Torvalds 已提交
267

D
David Howells 已提交
268 269 270 271 272
	ret = install_session_keyring_to_cred(new, NULL);
	if (ret < 0) {
		abort_creds(new);
		return ret;
	}
L
Linus Torvalds 已提交
273

D
David Howells 已提交
274 275
	return commit_creds(new);
}
L
Linus Torvalds 已提交
276 277 278 279 280 281 282

/*
 * the filesystem user ID changed
 */
void key_fsuid_changed(struct task_struct *tsk)
{
	/* update the ownership of the thread keyring */
283 284 285 286 287
	BUG_ON(!tsk->cred);
	if (tsk->cred->thread_keyring) {
		down_write(&tsk->cred->thread_keyring->sem);
		tsk->cred->thread_keyring->uid = tsk->cred->fsuid;
		up_write(&tsk->cred->thread_keyring->sem);
L
Linus Torvalds 已提交
288
	}
289
}
L
Linus Torvalds 已提交
290 291 292 293 294 295 296

/*
 * the filesystem group ID changed
 */
void key_fsgid_changed(struct task_struct *tsk)
{
	/* update the ownership of the thread keyring */
297 298 299 300 301
	BUG_ON(!tsk->cred);
	if (tsk->cred->thread_keyring) {
		down_write(&tsk->cred->thread_keyring->sem);
		tsk->cred->thread_keyring->gid = tsk->cred->fsgid;
		up_write(&tsk->cred->thread_keyring->sem);
L
Linus Torvalds 已提交
302
	}
303
}
L
Linus Torvalds 已提交
304 305

/*
306
 * search only my process keyrings for the first matching key
L
Linus Torvalds 已提交
307 308 309 310 311
 * - we use the supplied match function to see if the description (or other
 *   feature of interest) matches
 * - we return -EAGAIN if we didn't find any matching key
 * - we return -ENOKEY if we found only negative matching keys
 */
312 313 314 315
key_ref_t search_my_process_keyrings(struct key_type *type,
				     const void *description,
				     key_match_func_t match,
				     const struct cred *cred)
L
Linus Torvalds 已提交
316
{
317
	key_ref_t key_ref, ret, err;
L
Linus Torvalds 已提交
318 319 320 321 322 323 324 325

	/* we want to return -EAGAIN or -ENOKEY if any of the keyrings were
	 * searchable, but we failed to find a key or we found a negative key;
	 * otherwise we want to return a sample error (probably -EACCES) if
	 * none of the keyrings were searchable
	 *
	 * in terms of priority: success > -ENOKEY > -EAGAIN > other error
	 */
326
	key_ref = NULL;
L
Linus Torvalds 已提交
327 328 329 330
	ret = NULL;
	err = ERR_PTR(-EAGAIN);

	/* search the thread keyring first */
331
	if (cred->thread_keyring) {
332
		key_ref = keyring_search_aux(
333
			make_key_ref(cred->thread_keyring, 1),
D
David Howells 已提交
334
			cred, type, description, match);
335
		if (!IS_ERR(key_ref))
L
Linus Torvalds 已提交
336 337
			goto found;

338
		switch (PTR_ERR(key_ref)) {
L
Linus Torvalds 已提交
339 340 341 342
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
343
			ret = key_ref;
L
Linus Torvalds 已提交
344 345
			break;
		default:
346
			err = key_ref;
L
Linus Torvalds 已提交
347 348 349 350 351
			break;
		}
	}

	/* search the process keyring second */
352
	if (cred->tgcred->process_keyring) {
353
		key_ref = keyring_search_aux(
354
			make_key_ref(cred->tgcred->process_keyring, 1),
D
David Howells 已提交
355
			cred, type, description, match);
356
		if (!IS_ERR(key_ref))
L
Linus Torvalds 已提交
357 358
			goto found;

359
		switch (PTR_ERR(key_ref)) {
L
Linus Torvalds 已提交
360 361 362 363
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
364
			ret = key_ref;
L
Linus Torvalds 已提交
365 366
			break;
		default:
367
			err = key_ref;
L
Linus Torvalds 已提交
368 369 370 371
			break;
		}
	}

372
	/* search the session keyring */
373
	if (cred->tgcred->session_keyring) {
374
		rcu_read_lock();
375 376
		key_ref = keyring_search_aux(
			make_key_ref(rcu_dereference(
377
					     cred->tgcred->session_keyring),
378
				     1),
D
David Howells 已提交
379
			cred, type, description, match);
380
		rcu_read_unlock();
381

382
		if (!IS_ERR(key_ref))
383 384
			goto found;

385
		switch (PTR_ERR(key_ref)) {
386 387 388 389
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
390
			ret = key_ref;
391 392
			break;
		default:
393
			err = key_ref;
394 395
			break;
		}
396 397
	}
	/* or search the user-session keyring */
398
	else if (cred->user->session_keyring) {
399
		key_ref = keyring_search_aux(
400
			make_key_ref(cred->user->session_keyring, 1),
D
David Howells 已提交
401
			cred, type, description, match);
402
		if (!IS_ERR(key_ref))
403 404
			goto found;

405
		switch (PTR_ERR(key_ref)) {
406 407 408 409
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
410
			ret = key_ref;
411 412
			break;
		default:
413
			err = key_ref;
414 415
			break;
		}
416
	}
417

418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446
	/* no key - decide on the error we're going to go for */
	key_ref = ret ? ret : err;

found:
	return key_ref;
}

/*
 * search the process keyrings for the first matching key
 * - we use the supplied match function to see if the description (or other
 *   feature of interest) matches
 * - we return -EAGAIN if we didn't find any matching key
 * - we return -ENOKEY if we found only negative matching keys
 */
key_ref_t search_process_keyrings(struct key_type *type,
				  const void *description,
				  key_match_func_t match,
				  const struct cred *cred)
{
	struct request_key_auth *rka;
	key_ref_t key_ref, ret = ERR_PTR(-EACCES), err;

	might_sleep();

	key_ref = search_my_process_keyrings(type, description, match, cred);
	if (!IS_ERR(key_ref))
		goto found;
	err = key_ref;

447 448 449 450
	/* if this process has an instantiation authorisation key, then we also
	 * search the keyrings of the process mentioned there
	 * - we don't permit access to request_key auth keys via this method
	 */
451
	if (cred->request_key_auth &&
D
David Howells 已提交
452
	    cred == current_cred() &&
453
	    type != &key_type_request_key_auth
454
	    ) {
455
		/* defend against the auth key being revoked */
456
		down_read(&cred->request_key_auth->sem);
457

458 459
		if (key_validate(cred->request_key_auth) == 0) {
			rka = cred->request_key_auth->payload.data;
460

461
			key_ref = search_process_keyrings(type, description,
D
David Howells 已提交
462
							  match, rka->cred);
L
Linus Torvalds 已提交
463

464
			up_read(&cred->request_key_auth->sem);
465 466 467 468

			if (!IS_ERR(key_ref))
				goto found;

469
			ret = key_ref;
470
		} else {
471
			up_read(&cred->request_key_auth->sem);
472
		}
L
Linus Torvalds 已提交
473 474 475
	}

	/* no key - decide on the error we're going to go for */
476 477 478 479 480 481
	if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY))
		key_ref = ERR_PTR(-ENOKEY);
	else if (err == ERR_PTR(-EACCES))
		key_ref = ret;
	else
		key_ref = err;
L
Linus Torvalds 已提交
482

483
found:
484
	return key_ref;
485
}
L
Linus Torvalds 已提交
486

487 488 489
/*
 * see if the key we're looking at is the target key
 */
490
int lookup_user_key_possessed(const struct key *key, const void *target)
491 492
{
	return key == target;
493
}
494

L
Linus Torvalds 已提交
495 496 497 498 499
/*
 * lookup a key given a key ID from userspace with a given permissions mask
 * - don't create special keyrings unless so requested
 * - partially constructed keys aren't found unless requested
 */
500
key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags,
501
			  key_perm_t perm)
L
Linus Torvalds 已提交
502
{
503
	struct request_key_auth *rka;
D
David Howells 已提交
504
	const struct cred *cred;
L
Linus Torvalds 已提交
505
	struct key *key;
506
	key_ref_t key_ref, skey_ref;
L
Linus Torvalds 已提交
507 508
	int ret;

509 510
try_again:
	cred = get_current_cred();
511
	key_ref = ERR_PTR(-ENOKEY);
L
Linus Torvalds 已提交
512 513 514

	switch (id) {
	case KEY_SPEC_THREAD_KEYRING:
515
		if (!cred->thread_keyring) {
516
			if (!(lflags & KEY_LOOKUP_CREATE))
L
Linus Torvalds 已提交
517 518
				goto error;

519
			ret = install_thread_keyring();
L
Linus Torvalds 已提交
520
			if (ret < 0) {
521
				key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
522 523
				goto error;
			}
524
			goto reget_creds;
L
Linus Torvalds 已提交
525 526
		}

527
		key = cred->thread_keyring;
L
Linus Torvalds 已提交
528
		atomic_inc(&key->usage);
529
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
530 531 532
		break;

	case KEY_SPEC_PROCESS_KEYRING:
533
		if (!cred->tgcred->process_keyring) {
534
			if (!(lflags & KEY_LOOKUP_CREATE))
L
Linus Torvalds 已提交
535 536
				goto error;

537
			ret = install_process_keyring();
L
Linus Torvalds 已提交
538
			if (ret < 0) {
539
				key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
540 541
				goto error;
			}
542
			goto reget_creds;
L
Linus Torvalds 已提交
543 544
		}

545
		key = cred->tgcred->process_keyring;
L
Linus Torvalds 已提交
546
		atomic_inc(&key->usage);
547
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
548 549 550
		break;

	case KEY_SPEC_SESSION_KEYRING:
551
		if (!cred->tgcred->session_keyring) {
L
Linus Torvalds 已提交
552 553
			/* always install a session keyring upon access if one
			 * doesn't exist yet */
554
			ret = install_user_keyrings();
555 556
			if (ret < 0)
				goto error;
557 558
			ret = install_session_keyring(
				cred->user->session_keyring);
D
David Howells 已提交
559

L
Linus Torvalds 已提交
560 561
			if (ret < 0)
				goto error;
562
			goto reget_creds;
L
Linus Torvalds 已提交
563 564
		}

565
		rcu_read_lock();
566
		key = rcu_dereference(cred->tgcred->session_keyring);
L
Linus Torvalds 已提交
567
		atomic_inc(&key->usage);
568
		rcu_read_unlock();
569
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
570 571 572
		break;

	case KEY_SPEC_USER_KEYRING:
573
		if (!cred->user->uid_keyring) {
574
			ret = install_user_keyrings();
575 576 577 578
			if (ret < 0)
				goto error;
		}

579
		key = cred->user->uid_keyring;
L
Linus Torvalds 已提交
580
		atomic_inc(&key->usage);
581
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
582 583 584
		break;

	case KEY_SPEC_USER_SESSION_KEYRING:
585
		if (!cred->user->session_keyring) {
586
			ret = install_user_keyrings();
587 588 589 590
			if (ret < 0)
				goto error;
		}

591
		key = cred->user->session_keyring;
L
Linus Torvalds 已提交
592
		atomic_inc(&key->usage);
593
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
594 595 596 597
		break;

	case KEY_SPEC_GROUP_KEYRING:
		/* group keyrings are not yet supported */
598
		key_ref = ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
599 600
		goto error;

601
	case KEY_SPEC_REQKEY_AUTH_KEY:
602
		key = cred->request_key_auth;
603 604 605 606 607 608 609
		if (!key)
			goto error;

		atomic_inc(&key->usage);
		key_ref = make_key_ref(key, 1);
		break;

610
	case KEY_SPEC_REQUESTOR_KEYRING:
611
		if (!cred->request_key_auth)
612 613
			goto error;

614 615
		down_read(&cred->request_key_auth->sem);
		if (cred->request_key_auth->flags & KEY_FLAG_REVOKED) {
616 617 618
			key_ref = ERR_PTR(-EKEYREVOKED);
			key = NULL;
		} else {
619
			rka = cred->request_key_auth->payload.data;
620 621 622
			key = rka->dest_keyring;
			atomic_inc(&key->usage);
		}
623
		up_read(&cred->request_key_auth->sem);
624 625 626 627 628
		if (!key)
			goto error;
		key_ref = make_key_ref(key, 1);
		break;

L
Linus Torvalds 已提交
629
	default:
630
		key_ref = ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
631 632 633 634
		if (id < 1)
			goto error;

		key = key_lookup(id);
635
		if (IS_ERR(key)) {
636
			key_ref = ERR_CAST(key);
L
Linus Torvalds 已提交
637
			goto error;
638 639 640 641 642 643 644
		}

		key_ref = make_key_ref(key, 0);

		/* check to see if we possess the key */
		skey_ref = search_process_keyrings(key->type, key,
						   lookup_user_key_possessed,
D
David Howells 已提交
645
						   cred);
646 647 648 649 650 651

		if (!IS_ERR(skey_ref)) {
			key_put(key);
			key_ref = skey_ref;
		}

L
Linus Torvalds 已提交
652 653 654
		break;
	}

655 656 657 658 659 660 661 662
	/* unlink does not use the nominated key in any way, so can skip all
	 * the permission checks as it is only concerned with the keyring */
	if (lflags & KEY_LOOKUP_FOR_UNLINK) {
		ret = 0;
		goto error;
	}

	if (!(lflags & KEY_LOOKUP_PARTIAL)) {
663 664 665 666 667 668 669 670 671 672 673
		ret = wait_for_key_construction(key, true);
		switch (ret) {
		case -ERESTARTSYS:
			goto invalid_key;
		default:
			if (perm)
				goto invalid_key;
		case 0:
			break;
		}
	} else if (perm) {
L
Linus Torvalds 已提交
674 675 676 677 678 679
		ret = key_validate(key);
		if (ret < 0)
			goto invalid_key;
	}

	ret = -EIO;
680 681
	if (!(lflags & KEY_LOOKUP_PARTIAL) &&
	    !test_bit(KEY_FLAG_INSTANTIATED, &key->flags))
L
Linus Torvalds 已提交
682 683
		goto invalid_key;

684
	/* check the permissions */
D
David Howells 已提交
685
	ret = key_task_permission(key_ref, cred, perm);
686
	if (ret < 0)
L
Linus Torvalds 已提交
687 688
		goto invalid_key;

689
error:
690
	put_cred(cred);
691
	return key_ref;
L
Linus Torvalds 已提交
692

693 694 695
invalid_key:
	key_ref_put(key_ref);
	key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
696 697
	goto error;

698 699 700 701 702
	/* if we attempted to install a keyring, then it may have caused new
	 * creds to be installed */
reget_creds:
	put_cred(cred);
	goto try_again;
703
}
704

L
Linus Torvalds 已提交
705 706 707 708 709 710 711 712
/*
 * join the named keyring as the session keyring if possible, or attempt to
 * create a new one of that name if not
 * - if the name is NULL, an empty anonymous keyring is installed instead
 * - named session keyring joining is done with a semaphore held
 */
long join_session_keyring(const char *name)
{
D
David Howells 已提交
713 714
	const struct cred *old;
	struct cred *new;
L
Linus Torvalds 已提交
715
	struct key *keyring;
D
David Howells 已提交
716 717 718 719 720
	long ret, serial;

	/* only permit this if there's a single thread in the thread group -
	 * this avoids us having to adjust the creds on all threads and risking
	 * ENOMEM */
721
	if (!current_is_single_threaded())
D
David Howells 已提交
722 723 724 725 726 727
		return -EMLINK;

	new = prepare_creds();
	if (!new)
		return -ENOMEM;
	old = current_cred();
L
Linus Torvalds 已提交
728 729 730

	/* if no name is provided, install an anonymous keyring */
	if (!name) {
D
David Howells 已提交
731
		ret = install_session_keyring_to_cred(new, NULL);
L
Linus Torvalds 已提交
732 733 734
		if (ret < 0)
			goto error;

D
David Howells 已提交
735 736 737 738 739
		serial = new->tgcred->session_keyring->serial;
		ret = commit_creds(new);
		if (ret == 0)
			ret = serial;
		goto okay;
L
Linus Torvalds 已提交
740 741 742
	}

	/* allow the user to join or create a named keyring */
I
Ingo Molnar 已提交
743
	mutex_lock(&key_session_mutex);
L
Linus Torvalds 已提交
744 745

	/* look for an existing keyring of this name */
746
	keyring = find_keyring_by_name(name, false);
L
Linus Torvalds 已提交
747 748
	if (PTR_ERR(keyring) == -ENOKEY) {
		/* not found - try and create a new one */
D
David Howells 已提交
749
		keyring = keyring_alloc(name, old->uid, old->gid, old,
750
					KEY_ALLOC_IN_QUOTA, NULL);
L
Linus Torvalds 已提交
751 752
		if (IS_ERR(keyring)) {
			ret = PTR_ERR(keyring);
753
			goto error2;
L
Linus Torvalds 已提交
754
		}
D
David Howells 已提交
755
	} else if (IS_ERR(keyring)) {
L
Linus Torvalds 已提交
756 757 758 759 760
		ret = PTR_ERR(keyring);
		goto error2;
	}

	/* we've got a keyring - now to install it */
D
David Howells 已提交
761
	ret = install_session_keyring_to_cred(new, keyring);
L
Linus Torvalds 已提交
762 763 764
	if (ret < 0)
		goto error2;

D
David Howells 已提交
765 766 767
	commit_creds(new);
	mutex_unlock(&key_session_mutex);

L
Linus Torvalds 已提交
768 769
	ret = keyring->serial;
	key_put(keyring);
D
David Howells 已提交
770 771
okay:
	return ret;
L
Linus Torvalds 已提交
772

773
error2:
I
Ingo Molnar 已提交
774
	mutex_unlock(&key_session_mutex);
775
error:
D
David Howells 已提交
776
	abort_creds(new);
L
Linus Torvalds 已提交
777
	return ret;
D
David Howells 已提交
778
}
779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826

/*
 * Replace a process's session keyring when that process resumes userspace on
 * behalf of one of its children
 */
void key_replace_session_keyring(void)
{
	const struct cred *old;
	struct cred *new;

	if (!current->replacement_session_keyring)
		return;

	write_lock_irq(&tasklist_lock);
	new = current->replacement_session_keyring;
	current->replacement_session_keyring = NULL;
	write_unlock_irq(&tasklist_lock);

	if (!new)
		return;

	old = current_cred();
	new->  uid	= old->  uid;
	new-> euid	= old-> euid;
	new-> suid	= old-> suid;
	new->fsuid	= old->fsuid;
	new->  gid	= old->  gid;
	new-> egid	= old-> egid;
	new-> sgid	= old-> sgid;
	new->fsgid	= old->fsgid;
	new->user	= get_uid(old->user);
	new->group_info	= get_group_info(old->group_info);

	new->securebits	= old->securebits;
	new->cap_inheritable	= old->cap_inheritable;
	new->cap_permitted	= old->cap_permitted;
	new->cap_effective	= old->cap_effective;
	new->cap_bset		= old->cap_bset;

	new->jit_keyring	= old->jit_keyring;
	new->thread_keyring	= key_get(old->thread_keyring);
	new->tgcred->tgid	= old->tgcred->tgid;
	new->tgcred->process_keyring = key_get(old->tgcred->process_keyring);

	security_transfer_creds(new, old);

	commit_creds(new);
}