process_keys.c 17.5 KB
Newer Older
L
Linus Torvalds 已提交
1 2
/* process_keys.c: management of a process's keyrings
 *
3
 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
#include <linux/sched.h>
#include <linux/slab.h>
#include <linux/keyctl.h>
#include <linux/fs.h>
#include <linux/err.h>
I
Ingo Molnar 已提交
19
#include <linux/mutex.h>
L
Linus Torvalds 已提交
20 21 22 23
#include <asm/uaccess.h>
#include "internal.h"

/* session keyring create vs join semaphore */
I
Ingo Molnar 已提交
24
static DEFINE_MUTEX(key_session_mutex);
L
Linus Torvalds 已提交
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42

/* the root user's tracking struct */
struct key_user root_key_user = {
	.usage		= ATOMIC_INIT(3),
	.consq		= LIST_HEAD_INIT(root_key_user.consq),
	.lock		= SPIN_LOCK_UNLOCKED,
	.nkeys		= ATOMIC_INIT(2),
	.nikeys		= ATOMIC_INIT(2),
	.uid		= 0,
};

/* the root user's UID keyring */
struct key root_user_keyring = {
	.usage		= ATOMIC_INIT(1),
	.serial		= 2,
	.type		= &key_type_keyring,
	.user		= &root_key_user,
	.sem		= __RWSEM_INITIALIZER(root_user_keyring.sem),
43
	.perm		= (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL,
44
	.flags		= 1 << KEY_FLAG_INSTANTIATED,
L
Linus Torvalds 已提交
45 46 47 48 49 50 51 52 53 54 55 56 57
	.description	= "_uid.0",
#ifdef KEY_DEBUGGING
	.magic		= KEY_DEBUG_MAGIC,
#endif
};

/* the root user's default session keyring */
struct key root_session_keyring = {
	.usage		= ATOMIC_INIT(1),
	.serial		= 1,
	.type		= &key_type_keyring,
	.user		= &root_key_user,
	.sem		= __RWSEM_INITIALIZER(root_session_keyring.sem),
58
	.perm		= (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL,
59
	.flags		= 1 << KEY_FLAG_INSTANTIATED,
L
Linus Torvalds 已提交
60 61 62 63 64 65 66 67 68 69
	.description	= "_uid_ses.0",
#ifdef KEY_DEBUGGING
	.magic		= KEY_DEBUG_MAGIC,
#endif
};

/*****************************************************************************/
/*
 * allocate the keyrings to be associated with a UID
 */
70 71
int alloc_uid_keyring(struct user_struct *user,
		      struct task_struct *ctx)
L
Linus Torvalds 已提交
72 73 74 75 76 77 78 79
{
	struct key *uid_keyring, *session_keyring;
	char buf[20];
	int ret;

	/* concoct a default session keyring */
	sprintf(buf, "_uid_ses.%u", user->uid);

80
	session_keyring = keyring_alloc(buf, user->uid, (gid_t) -1, ctx, 0, NULL);
L
Linus Torvalds 已提交
81 82 83 84 85 86 87 88 89
	if (IS_ERR(session_keyring)) {
		ret = PTR_ERR(session_keyring);
		goto error;
	}

	/* and a UID specific keyring, pointed to by the default session
	 * keyring */
	sprintf(buf, "_uid.%u", user->uid);

90
	uid_keyring = keyring_alloc(buf, user->uid, (gid_t) -1, ctx, 0,
L
Linus Torvalds 已提交
91 92 93 94 95 96 97 98 99 100 101 102
				    session_keyring);
	if (IS_ERR(uid_keyring)) {
		key_put(session_keyring);
		ret = PTR_ERR(uid_keyring);
		goto error;
	}

	/* install the keyrings */
	user->uid_keyring = uid_keyring;
	user->session_keyring = session_keyring;
	ret = 0;

103
error:
L
Linus Torvalds 已提交
104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146
	return ret;

} /* end alloc_uid_keyring() */

/*****************************************************************************/
/*
 * deal with the UID changing
 */
void switch_uid_keyring(struct user_struct *new_user)
{
#if 0 /* do nothing for now */
	struct key *old;

	/* switch to the new user's session keyring if we were running under
	 * root's default session keyring */
	if (new_user->uid != 0 &&
	    current->session_keyring == &root_session_keyring
	    ) {
		atomic_inc(&new_user->session_keyring->usage);

		task_lock(current);
		old = current->session_keyring;
		current->session_keyring = new_user->session_keyring;
		task_unlock(current);

		key_put(old);
	}
#endif

} /* end switch_uid_keyring() */

/*****************************************************************************/
/*
 * install a fresh thread keyring, discarding the old one
 */
int install_thread_keyring(struct task_struct *tsk)
{
	struct key *keyring, *old;
	char buf[20];
	int ret;

	sprintf(buf, "_tid.%u", tsk->pid);

147
	keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk, 1, NULL);
L
Linus Torvalds 已提交
148 149 150 151 152 153 154 155 156 157 158 159 160
	if (IS_ERR(keyring)) {
		ret = PTR_ERR(keyring);
		goto error;
	}

	task_lock(tsk);
	old = tsk->thread_keyring;
	tsk->thread_keyring = keyring;
	task_unlock(tsk);

	ret = 0;

	key_put(old);
161
error:
L
Linus Torvalds 已提交
162 163 164 165 166 167 168 169
	return ret;

} /* end install_thread_keyring() */

/*****************************************************************************/
/*
 * make sure a process keyring is installed
 */
170
int install_process_keyring(struct task_struct *tsk)
L
Linus Torvalds 已提交
171 172 173 174 175
{
	struct key *keyring;
	char buf[20];
	int ret;

176 177
	might_sleep();

L
Linus Torvalds 已提交
178 179 180
	if (!tsk->signal->process_keyring) {
		sprintf(buf, "_pid.%u", tsk->tgid);

181
		keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk, 1, NULL);
L
Linus Torvalds 已提交
182 183 184 185 186
		if (IS_ERR(keyring)) {
			ret = PTR_ERR(keyring);
			goto error;
		}

187
		/* attach keyring */
188
		spin_lock_irq(&tsk->sighand->siglock);
L
Linus Torvalds 已提交
189 190 191 192
		if (!tsk->signal->process_keyring) {
			tsk->signal->process_keyring = keyring;
			keyring = NULL;
		}
193
		spin_unlock_irq(&tsk->sighand->siglock);
L
Linus Torvalds 已提交
194 195 196 197 198

		key_put(keyring);
	}

	ret = 0;
199
error:
L
Linus Torvalds 已提交
200 201 202 203 204 205 206 207 208 209 210 211 212 213
	return ret;

} /* end install_process_keyring() */

/*****************************************************************************/
/*
 * install a session keyring, discarding the old one
 * - if a keyring is not supplied, an empty one is invented
 */
static int install_session_keyring(struct task_struct *tsk,
				   struct key *keyring)
{
	struct key *old;
	char buf[20];
214 215

	might_sleep();
L
Linus Torvalds 已提交
216 217 218 219 220

	/* create an empty session keyring */
	if (!keyring) {
		sprintf(buf, "_ses.%u", tsk->tgid);

221
		keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk, 1, NULL);
222 223
		if (IS_ERR(keyring))
			return PTR_ERR(keyring);
L
Linus Torvalds 已提交
224 225 226 227 228 229
	}
	else {
		atomic_inc(&keyring->usage);
	}

	/* install the keyring */
230 231
	spin_lock_irq(&tsk->sighand->siglock);
	old = tsk->signal->session_keyring;
232
	rcu_assign_pointer(tsk->signal->session_keyring, keyring);
233
	spin_unlock_irq(&tsk->sighand->siglock);
L
Linus Torvalds 已提交
234

235 236 237 238 239 240
	/* we're using RCU on the pointer, but there's no point synchronising
	 * on it if it didn't previously point to anything */
	if (old) {
		synchronize_rcu();
		key_put(old);
	}
L
Linus Torvalds 已提交
241

242
	return 0;
L
Linus Torvalds 已提交
243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258

} /* end install_session_keyring() */

/*****************************************************************************/
/*
 * copy the keys in a thread group for fork without CLONE_THREAD
 */
int copy_thread_group_keys(struct task_struct *tsk)
{
	key_check(current->thread_group->session_keyring);
	key_check(current->thread_group->process_keyring);

	/* no process keyring yet */
	tsk->signal->process_keyring = NULL;

	/* same session keyring */
259
	rcu_read_lock();
L
Linus Torvalds 已提交
260
	tsk->signal->session_keyring =
261 262
		key_get(rcu_dereference(current->signal->session_keyring));
	rcu_read_unlock();
L
Linus Torvalds 已提交
263 264 265 266 267 268 269 270 271 272 273 274

	return 0;

} /* end copy_thread_group_keys() */

/*****************************************************************************/
/*
 * copy the keys for fork
 */
int copy_keys(unsigned long clone_flags, struct task_struct *tsk)
{
	key_check(tsk->thread_keyring);
275
	key_check(tsk->request_key_auth);
L
Linus Torvalds 已提交
276 277 278

	/* no thread keyring yet */
	tsk->thread_keyring = NULL;
279 280 281 282

	/* copy the request_key() authorisation for this thread */
	key_get(tsk->request_key_auth);

L
Linus Torvalds 已提交
283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299
	return 0;

} /* end copy_keys() */

/*****************************************************************************/
/*
 * dispose of thread group keys upon thread group destruction
 */
void exit_thread_group_keys(struct signal_struct *tg)
{
	key_put(tg->session_keyring);
	key_put(tg->process_keyring);

} /* end exit_thread_group_keys() */

/*****************************************************************************/
/*
300
 * dispose of per-thread keys upon thread exit
L
Linus Torvalds 已提交
301 302 303 304
 */
void exit_keys(struct task_struct *tsk)
{
	key_put(tsk->thread_keyring);
305
	key_put(tsk->request_key_auth);
L
Linus Torvalds 已提交
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325

} /* end exit_keys() */

/*****************************************************************************/
/*
 * deal with execve()
 */
int exec_keys(struct task_struct *tsk)
{
	struct key *old;

	/* newly exec'd tasks don't get a thread keyring */
	task_lock(tsk);
	old = tsk->thread_keyring;
	tsk->thread_keyring = NULL;
	task_unlock(tsk);

	key_put(old);

	/* discard the process keyring from a newly exec'd task */
326
	spin_lock_irq(&tsk->sighand->siglock);
L
Linus Torvalds 已提交
327 328
	old = tsk->signal->process_keyring;
	tsk->signal->process_keyring = NULL;
329
	spin_unlock_irq(&tsk->sighand->siglock);
L
Linus Torvalds 已提交
330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385

	key_put(old);

	return 0;

} /* end exec_keys() */

/*****************************************************************************/
/*
 * deal with SUID programs
 * - we might want to make this invent a new session keyring
 */
int suid_keys(struct task_struct *tsk)
{
	return 0;

} /* end suid_keys() */

/*****************************************************************************/
/*
 * the filesystem user ID changed
 */
void key_fsuid_changed(struct task_struct *tsk)
{
	/* update the ownership of the thread keyring */
	if (tsk->thread_keyring) {
		down_write(&tsk->thread_keyring->sem);
		tsk->thread_keyring->uid = tsk->fsuid;
		up_write(&tsk->thread_keyring->sem);
	}

} /* end key_fsuid_changed() */

/*****************************************************************************/
/*
 * the filesystem group ID changed
 */
void key_fsgid_changed(struct task_struct *tsk)
{
	/* update the ownership of the thread keyring */
	if (tsk->thread_keyring) {
		down_write(&tsk->thread_keyring->sem);
		tsk->thread_keyring->gid = tsk->fsgid;
		up_write(&tsk->thread_keyring->sem);
	}

} /* end key_fsgid_changed() */

/*****************************************************************************/
/*
 * search the process keyrings for the first matching key
 * - we use the supplied match function to see if the description (or other
 *   feature of interest) matches
 * - we return -EAGAIN if we didn't find any matching key
 * - we return -ENOKEY if we found only negative matching keys
 */
386 387 388 389
key_ref_t search_process_keyrings(struct key_type *type,
				  const void *description,
				  key_match_func_t match,
				  struct task_struct *context)
L
Linus Torvalds 已提交
390
{
391
	struct request_key_auth *rka;
392
	key_ref_t key_ref, ret, err;
L
Linus Torvalds 已提交
393

394 395
	might_sleep();

L
Linus Torvalds 已提交
396 397 398 399 400 401 402
	/* we want to return -EAGAIN or -ENOKEY if any of the keyrings were
	 * searchable, but we failed to find a key or we found a negative key;
	 * otherwise we want to return a sample error (probably -EACCES) if
	 * none of the keyrings were searchable
	 *
	 * in terms of priority: success > -ENOKEY > -EAGAIN > other error
	 */
403
	key_ref = NULL;
L
Linus Torvalds 已提交
404 405 406 407
	ret = NULL;
	err = ERR_PTR(-EAGAIN);

	/* search the thread keyring first */
408
	if (context->thread_keyring) {
409 410 411 412
		key_ref = keyring_search_aux(
			make_key_ref(context->thread_keyring, 1),
			context, type, description, match);
		if (!IS_ERR(key_ref))
L
Linus Torvalds 已提交
413 414
			goto found;

415
		switch (PTR_ERR(key_ref)) {
L
Linus Torvalds 已提交
416 417 418 419
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
420
			ret = key_ref;
L
Linus Torvalds 已提交
421 422
			break;
		default:
423
			err = key_ref;
L
Linus Torvalds 已提交
424 425 426 427 428
			break;
		}
	}

	/* search the process keyring second */
429
	if (context->signal->process_keyring) {
430 431 432 433
		key_ref = keyring_search_aux(
			make_key_ref(context->signal->process_keyring, 1),
			context, type, description, match);
		if (!IS_ERR(key_ref))
L
Linus Torvalds 已提交
434 435
			goto found;

436
		switch (PTR_ERR(key_ref)) {
L
Linus Torvalds 已提交
437 438 439 440
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
441
			ret = key_ref;
L
Linus Torvalds 已提交
442 443
			break;
		default:
444
			err = key_ref;
L
Linus Torvalds 已提交
445 446 447 448
			break;
		}
	}

449 450
	/* search the session keyring */
	if (context->signal->session_keyring) {
451
		rcu_read_lock();
452 453 454 455
		key_ref = keyring_search_aux(
			make_key_ref(rcu_dereference(
					     context->signal->session_keyring),
				     1),
456
			context, type, description, match);
457
		rcu_read_unlock();
458

459
		if (!IS_ERR(key_ref))
460 461
			goto found;

462
		switch (PTR_ERR(key_ref)) {
463 464 465 466
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
467
			ret = key_ref;
468 469
			break;
		default:
470
			err = key_ref;
471 472
			break;
		}
473 474 475 476 477 478
	}
	/* or search the user-session keyring */
	else {
		key_ref = keyring_search_aux(
			make_key_ref(context->user->session_keyring, 1),
			context, type, description, match);
479
		if (!IS_ERR(key_ref))
480 481
			goto found;

482
		switch (PTR_ERR(key_ref)) {
483 484 485 486
		case -EAGAIN: /* no key */
			if (ret)
				break;
		case -ENOKEY: /* negative key */
487
			ret = key_ref;
488 489
			break;
		default:
490
			err = key_ref;
491 492
			break;
		}
493
	}
494 495 496 497 498 499 500

	/* if this process has an instantiation authorisation key, then we also
	 * search the keyrings of the process mentioned there
	 * - we don't permit access to request_key auth keys via this method
	 */
	if (context->request_key_auth &&
	    context == current &&
501
	    type != &key_type_request_key_auth
502
	    ) {
503 504
		/* defend against the auth key being revoked */
		down_read(&context->request_key_auth->sem);
505

506 507
		if (key_validate(context->request_key_auth) == 0) {
			rka = context->request_key_auth->payload.data;
508

509 510
			key_ref = search_process_keyrings(type, description,
							  match, rka->context);
L
Linus Torvalds 已提交
511

512 513 514 515 516 517 518 519 520 521 522
			up_read(&context->request_key_auth->sem);

			if (!IS_ERR(key_ref))
				goto found;

			switch (PTR_ERR(key_ref)) {
			case -EAGAIN: /* no key */
				if (ret)
					break;
			case -ENOKEY: /* negative key */
				ret = key_ref;
523
				break;
524 525 526 527 528 529
			default:
				err = key_ref;
				break;
			}
		} else {
			up_read(&context->request_key_auth->sem);
530
		}
L
Linus Torvalds 已提交
531 532 533
	}

	/* no key - decide on the error we're going to go for */
534
	key_ref = ret ? ret : err;
L
Linus Torvalds 已提交
535

536
found:
537
	return key_ref;
L
Linus Torvalds 已提交
538 539 540

} /* end search_process_keyrings() */

541 542 543 544 545 546 547 548 549 550
/*****************************************************************************/
/*
 * see if the key we're looking at is the target key
 */
static int lookup_user_key_possessed(const struct key *key, const void *target)
{
	return key == target;

} /* end lookup_user_key_possessed() */

L
Linus Torvalds 已提交
551 552 553 554 555 556
/*****************************************************************************/
/*
 * lookup a key given a key ID from userspace with a given permissions mask
 * - don't create special keyrings unless so requested
 * - partially constructed keys aren't found unless requested
 */
557 558
key_ref_t lookup_user_key(struct task_struct *context, key_serial_t id,
			  int create, int partial, key_perm_t perm)
L
Linus Torvalds 已提交
559
{
560
	key_ref_t key_ref, skey_ref;
L
Linus Torvalds 已提交
561 562 563
	struct key *key;
	int ret;

564 565 566
	if (!context)
		context = current;

567
	key_ref = ERR_PTR(-ENOKEY);
L
Linus Torvalds 已提交
568 569 570

	switch (id) {
	case KEY_SPEC_THREAD_KEYRING:
571
		if (!context->thread_keyring) {
L
Linus Torvalds 已提交
572 573 574
			if (!create)
				goto error;

575
			ret = install_thread_keyring(context);
L
Linus Torvalds 已提交
576 577 578 579 580 581
			if (ret < 0) {
				key = ERR_PTR(ret);
				goto error;
			}
		}

582
		key = context->thread_keyring;
L
Linus Torvalds 已提交
583
		atomic_inc(&key->usage);
584
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
585 586 587
		break;

	case KEY_SPEC_PROCESS_KEYRING:
588
		if (!context->signal->process_keyring) {
L
Linus Torvalds 已提交
589 590 591
			if (!create)
				goto error;

592
			ret = install_process_keyring(context);
L
Linus Torvalds 已提交
593 594 595 596 597 598
			if (ret < 0) {
				key = ERR_PTR(ret);
				goto error;
			}
		}

599
		key = context->signal->process_keyring;
L
Linus Torvalds 已提交
600
		atomic_inc(&key->usage);
601
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
602 603 604
		break;

	case KEY_SPEC_SESSION_KEYRING:
605
		if (!context->signal->session_keyring) {
L
Linus Torvalds 已提交
606 607 608
			/* always install a session keyring upon access if one
			 * doesn't exist yet */
			ret = install_session_keyring(
609
				context, context->user->session_keyring);
L
Linus Torvalds 已提交
610 611 612 613
			if (ret < 0)
				goto error;
		}

614 615
		rcu_read_lock();
		key = rcu_dereference(context->signal->session_keyring);
L
Linus Torvalds 已提交
616
		atomic_inc(&key->usage);
617
		rcu_read_unlock();
618
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
619 620 621
		break;

	case KEY_SPEC_USER_KEYRING:
622
		key = context->user->uid_keyring;
L
Linus Torvalds 已提交
623
		atomic_inc(&key->usage);
624
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
625 626 627
		break;

	case KEY_SPEC_USER_SESSION_KEYRING:
628
		key = context->user->session_keyring;
L
Linus Torvalds 已提交
629
		atomic_inc(&key->usage);
630
		key_ref = make_key_ref(key, 1);
L
Linus Torvalds 已提交
631 632 633 634 635 636 637
		break;

	case KEY_SPEC_GROUP_KEYRING:
		/* group keyrings are not yet supported */
		key = ERR_PTR(-EINVAL);
		goto error;

638 639 640 641 642 643 644 645 646
	case KEY_SPEC_REQKEY_AUTH_KEY:
		key = context->request_key_auth;
		if (!key)
			goto error;

		atomic_inc(&key->usage);
		key_ref = make_key_ref(key, 1);
		break;

L
Linus Torvalds 已提交
647
	default:
648
		key_ref = ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
649 650 651 652
		if (id < 1)
			goto error;

		key = key_lookup(id);
653 654
		if (IS_ERR(key)) {
			key_ref = ERR_PTR(PTR_ERR(key));
L
Linus Torvalds 已提交
655
			goto error;
656 657 658 659 660 661 662 663 664 665 666 667 668 669
		}

		key_ref = make_key_ref(key, 0);

		/* check to see if we possess the key */
		skey_ref = search_process_keyrings(key->type, key,
						   lookup_user_key_possessed,
						   current);

		if (!IS_ERR(skey_ref)) {
			key_put(key);
			key_ref = skey_ref;
		}

L
Linus Torvalds 已提交
670 671 672
		break;
	}

673
	/* check the status */
L
Linus Torvalds 已提交
674 675 676 677 678 679 680
	if (perm) {
		ret = key_validate(key);
		if (ret < 0)
			goto invalid_key;
	}

	ret = -EIO;
681
	if (!partial && !test_bit(KEY_FLAG_INSTANTIATED, &key->flags))
L
Linus Torvalds 已提交
682 683
		goto invalid_key;

684
	/* check the permissions */
685 686
	ret = key_task_permission(key_ref, context, perm);
	if (ret < 0)
L
Linus Torvalds 已提交
687 688
		goto invalid_key;

689 690
error:
	return key_ref;
L
Linus Torvalds 已提交
691

692 693 694
invalid_key:
	key_ref_put(key_ref);
	key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717
	goto error;

} /* end lookup_user_key() */

/*****************************************************************************/
/*
 * join the named keyring as the session keyring if possible, or attempt to
 * create a new one of that name if not
 * - if the name is NULL, an empty anonymous keyring is installed instead
 * - named session keyring joining is done with a semaphore held
 */
long join_session_keyring(const char *name)
{
	struct task_struct *tsk = current;
	struct key *keyring;
	long ret;

	/* if no name is provided, install an anonymous keyring */
	if (!name) {
		ret = install_session_keyring(tsk, NULL);
		if (ret < 0)
			goto error;

718 719 720
		rcu_read_lock();
		ret = rcu_dereference(tsk->signal->session_keyring)->serial;
		rcu_read_unlock();
L
Linus Torvalds 已提交
721 722 723 724
		goto error;
	}

	/* allow the user to join or create a named keyring */
I
Ingo Molnar 已提交
725
	mutex_lock(&key_session_mutex);
L
Linus Torvalds 已提交
726 727 728 729 730

	/* look for an existing keyring of this name */
	keyring = find_keyring_by_name(name, 0);
	if (PTR_ERR(keyring) == -ENOKEY) {
		/* not found - try and create a new one */
731
		keyring = keyring_alloc(name, tsk->uid, tsk->gid, tsk, 0, NULL);
L
Linus Torvalds 已提交
732 733
		if (IS_ERR(keyring)) {
			ret = PTR_ERR(keyring);
734
			goto error2;
L
Linus Torvalds 已提交
735 736 737 738 739 740 741 742 743 744 745 746 747 748 749
		}
	}
	else if (IS_ERR(keyring)) {
		ret = PTR_ERR(keyring);
		goto error2;
	}

	/* we've got a keyring - now to install it */
	ret = install_session_keyring(tsk, keyring);
	if (ret < 0)
		goto error2;

	ret = keyring->serial;
	key_put(keyring);

750
error2:
I
Ingo Molnar 已提交
751
	mutex_unlock(&key_session_mutex);
752
error:
L
Linus Torvalds 已提交
753 754 755
	return ret;

} /* end join_session_keyring() */