key.c 30.2 KB
Newer Older
1
/* Basic authentication token and access key management
L
Linus Torvalds 已提交
2
 *
3
 * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
14
#include <linux/poison.h>
L
Linus Torvalds 已提交
15 16
#include <linux/sched.h>
#include <linux/slab.h>
17
#include <linux/security.h>
L
Linus Torvalds 已提交
18
#include <linux/workqueue.h>
19
#include <linux/random.h>
L
Linus Torvalds 已提交
20 21 22
#include <linux/err.h>
#include "internal.h"

23
struct kmem_cache *key_jar;
L
Linus Torvalds 已提交
24 25 26 27 28 29
struct rb_root		key_serial_tree; /* tree of keys indexed by serial */
DEFINE_SPINLOCK(key_serial_lock);

struct rb_root	key_user_tree; /* tree of quota records indexed by UID */
DEFINE_SPINLOCK(key_user_lock);

30 31
unsigned int key_quota_root_maxkeys = 1000000;	/* root's key count quota */
unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */
32 33 34
unsigned int key_quota_maxkeys = 200;		/* general key count quota */
unsigned int key_quota_maxbytes = 20000;	/* general key space quota */

L
Linus Torvalds 已提交
35 36 37
static LIST_HEAD(key_types_list);
static DECLARE_RWSEM(key_types_sem);

38
/* We serialise key instantiation and link */
39
DEFINE_MUTEX(key_construction_mutex);
L
Linus Torvalds 已提交
40 41 42 43 44 45 46 47 48 49 50

#ifdef KEY_DEBUGGING
void __key_check(const struct key *key)
{
	printk("__key_check: key %p {%08x} should be {%08x}\n",
	       key, key->magic, KEY_DEBUG_MAGIC);
	BUG();
}
#endif

/*
51 52
 * Get the key quota record for a user, allocating a new record if one doesn't
 * already exist.
L
Linus Torvalds 已提交
53
 */
54
struct key_user *key_user_lookup(kuid_t uid)
L
Linus Torvalds 已提交
55 56 57 58 59
{
	struct key_user *candidate = NULL, *user;
	struct rb_node *parent = NULL;
	struct rb_node **p;

60
try_again:
L
Linus Torvalds 已提交
61 62 63 64 65 66 67 68
	p = &key_user_tree.rb_node;
	spin_lock(&key_user_lock);

	/* search the tree for a user record with a matching UID */
	while (*p) {
		parent = *p;
		user = rb_entry(parent, struct key_user, node);

69
		if (uid_lt(uid, user->uid))
L
Linus Torvalds 已提交
70
			p = &(*p)->rb_left;
71
		else if (uid_gt(uid, user->uid))
72
			p = &(*p)->rb_right;
L
Linus Torvalds 已提交
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
		else
			goto found;
	}

	/* if we get here, we failed to find a match in the tree */
	if (!candidate) {
		/* allocate a candidate user record if we don't already have
		 * one */
		spin_unlock(&key_user_lock);

		user = NULL;
		candidate = kmalloc(sizeof(struct key_user), GFP_KERNEL);
		if (unlikely(!candidate))
			goto out;

		/* the allocation may have scheduled, so we need to repeat the
		 * search lest someone else added the record whilst we were
		 * asleep */
		goto try_again;
	}

	/* if we get here, then the user record still hadn't appeared on the
	 * second pass - so we use the candidate record */
96
	refcount_set(&candidate->usage, 1);
L
Linus Torvalds 已提交
97 98 99 100 101 102
	atomic_set(&candidate->nkeys, 0);
	atomic_set(&candidate->nikeys, 0);
	candidate->uid = uid;
	candidate->qnkeys = 0;
	candidate->qnbytes = 0;
	spin_lock_init(&candidate->lock);
103
	mutex_init(&candidate->cons_lock);
L
Linus Torvalds 已提交
104 105 106 107 108 109 110 111

	rb_link_node(&candidate->node, parent, p);
	rb_insert_color(&candidate->node, &key_user_tree);
	spin_unlock(&key_user_lock);
	user = candidate;
	goto out;

	/* okay - we found a user record for this UID */
112
found:
113
	refcount_inc(&user->usage);
L
Linus Torvalds 已提交
114
	spin_unlock(&key_user_lock);
J
Jesper Juhl 已提交
115
	kfree(candidate);
116
out:
L
Linus Torvalds 已提交
117
	return user;
118
}
L
Linus Torvalds 已提交
119 120

/*
121
 * Dispose of a user structure
L
Linus Torvalds 已提交
122 123 124
 */
void key_user_put(struct key_user *user)
{
125
	if (refcount_dec_and_lock(&user->usage, &key_user_lock)) {
L
Linus Torvalds 已提交
126 127 128 129 130
		rb_erase(&user->node, &key_user_tree);
		spin_unlock(&key_user_lock);

		kfree(user);
	}
131
}
L
Linus Torvalds 已提交
132 133

/*
134 135
 * Allocate a serial number for a key.  These are assigned randomly to avoid
 * security issues through covert channel problems.
L
Linus Torvalds 已提交
136 137 138 139 140 141
 */
static inline void key_alloc_serial(struct key *key)
{
	struct rb_node *parent, **p;
	struct key *xkey;

142
	/* propose a random serial number and look for a hole for it in the
L
Linus Torvalds 已提交
143
	 * serial number tree */
144 145 146 147 148 149 150
	do {
		get_random_bytes(&key->serial, sizeof(key->serial));

		key->serial >>= 1; /* negative numbers are not permitted */
	} while (key->serial < 3);

	spin_lock(&key_serial_lock);
L
Linus Torvalds 已提交
151

152
attempt_insertion:
L
Linus Torvalds 已提交
153 154 155 156 157 158 159 160 161 162 163 164 165 166
	parent = NULL;
	p = &key_serial_tree.rb_node;

	while (*p) {
		parent = *p;
		xkey = rb_entry(parent, struct key, serial_node);

		if (key->serial < xkey->serial)
			p = &(*p)->rb_left;
		else if (key->serial > xkey->serial)
			p = &(*p)->rb_right;
		else
			goto serial_exists;
	}
167 168 169 170 171 172 173

	/* we've found a suitable hole - arrange for this key to occupy it */
	rb_link_node(&key->serial_node, parent, p);
	rb_insert_color(&key->serial_node, &key_serial_tree);

	spin_unlock(&key_serial_lock);
	return;
L
Linus Torvalds 已提交
174 175 176

	/* we found a key with the proposed serial number - walk the tree from
	 * that point looking for the next unused serial number */
177
serial_exists:
L
Linus Torvalds 已提交
178
	for (;;) {
179
		key->serial++;
180 181 182 183
		if (key->serial < 3) {
			key->serial = 3;
			goto attempt_insertion;
		}
L
Linus Torvalds 已提交
184 185 186

		parent = rb_next(parent);
		if (!parent)
187
			goto attempt_insertion;
L
Linus Torvalds 已提交
188 189 190

		xkey = rb_entry(parent, struct key, serial_node);
		if (key->serial < xkey->serial)
191
			goto attempt_insertion;
L
Linus Torvalds 已提交
192
	}
193
}
L
Linus Torvalds 已提交
194

195 196 197 198 199 200 201 202 203
/**
 * key_alloc - Allocate a key of the specified type.
 * @type: The type of key to allocate.
 * @desc: The key description to allow the key to be searched out.
 * @uid: The owner of the new key.
 * @gid: The group ID for the new key's group permissions.
 * @cred: The credentials specifying UID namespace.
 * @perm: The permissions mask of the new key.
 * @flags: Flags specifying quota properties.
204
 * @restrict_link: Optional link restriction for new keyrings.
205 206 207 208 209
 *
 * Allocate a key of the specified type with the attributes given.  The key is
 * returned in an uninstantiated state and the caller needs to instantiate the
 * key before returning.
 *
210 211 212
 * The restrict_link structure (if not NULL) will be freed when the
 * keyring is destroyed, so it must be dynamically allocated.
 *
213 214 215 216 217 218 219 220 221 222 223 224 225 226
 * The user's key count quota is updated to reflect the creation of the key and
 * the user's key data quota has the default for the key type reserved.  The
 * instantiation function should amend this as necessary.  If insufficient
 * quota is available, -EDQUOT will be returned.
 *
 * The LSM security modules can prevent a key being created, in which case
 * -EACCES will be returned.
 *
 * Returns a pointer to the new key if successful and an error code otherwise.
 *
 * Note that the caller needs to ensure the key type isn't uninstantiated.
 * Internally this can be done by locking key_types_sem.  Externally, this can
 * be done by either never unregistering the key type, or making sure
 * key_alloc() calls don't race with module unloading.
L
Linus Torvalds 已提交
227 228
 */
struct key *key_alloc(struct key_type *type, const char *desc,
229
		      kuid_t uid, kgid_t gid, const struct cred *cred,
230
		      key_perm_t perm, unsigned long flags,
231
		      struct key_restriction *restrict_link)
L
Linus Torvalds 已提交
232 233 234 235
{
	struct key_user *user = NULL;
	struct key *key;
	size_t desclen, quotalen;
236
	int ret;
L
Linus Torvalds 已提交
237 238 239 240 241

	key = ERR_PTR(-EINVAL);
	if (!desc || !*desc)
		goto error;

242 243 244 245 246 247 248 249
	if (type->vet_description) {
		ret = type->vet_description(desc);
		if (ret < 0) {
			key = ERR_PTR(ret);
			goto error;
		}
	}

250 251
	desclen = strlen(desc);
	quotalen = desclen + 1 + type->def_datalen;
L
Linus Torvalds 已提交
252 253

	/* get hold of the key tracking for this user */
254
	user = key_user_lookup(uid);
L
Linus Torvalds 已提交
255 256 257 258 259
	if (!user)
		goto no_memory_1;

	/* check that the user's quota permits allocation of another key and
	 * its description */
260
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
261
		unsigned maxkeys = uid_eq(uid, GLOBAL_ROOT_UID) ?
262
			key_quota_root_maxkeys : key_quota_maxkeys;
263
		unsigned maxbytes = uid_eq(uid, GLOBAL_ROOT_UID) ?
264 265
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
266
		spin_lock(&user->lock);
267
		if (!(flags & KEY_ALLOC_QUOTA_OVERRUN)) {
268 269 270
			if (user->qnkeys + 1 >= maxkeys ||
			    user->qnbytes + quotalen >= maxbytes ||
			    user->qnbytes + quotalen < user->qnbytes)
271 272
				goto no_quota;
		}
L
Linus Torvalds 已提交
273 274 275 276 277 278 279

		user->qnkeys++;
		user->qnbytes += quotalen;
		spin_unlock(&user->lock);
	}

	/* allocate and initialise the key and its description */
280
	key = kmem_cache_zalloc(key_jar, GFP_KERNEL);
L
Linus Torvalds 已提交
281 282 283
	if (!key)
		goto no_memory_2;

D
Dan Carpenter 已提交
284 285
	key->index_key.desc_len = desclen;
	key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL);
286
	if (!key->index_key.description)
D
Dan Carpenter 已提交
287
		goto no_memory_3;
L
Linus Torvalds 已提交
288

289
	refcount_set(&key->usage, 1);
L
Linus Torvalds 已提交
290
	init_rwsem(&key->sem);
291
	lockdep_set_class(&key->sem, &type->lock_class);
292
	key->index_key.type = type;
L
Linus Torvalds 已提交
293 294 295 296 297 298
	key->user = user;
	key->quotalen = quotalen;
	key->datalen = type->def_datalen;
	key->uid = uid;
	key->gid = gid;
	key->perm = perm;
299
	key->restrict_link = restrict_link;
L
Linus Torvalds 已提交
300

301
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA))
302
		key->flags |= 1 << KEY_FLAG_IN_QUOTA;
303 304
	if (flags & KEY_ALLOC_BUILT_IN)
		key->flags |= 1 << KEY_FLAG_BUILTIN;
L
Linus Torvalds 已提交
305 306 307 308 309

#ifdef KEY_DEBUGGING
	key->magic = KEY_DEBUG_MAGIC;
#endif

310
	/* let the security module know about the key */
D
David Howells 已提交
311
	ret = security_key_alloc(key, cred, flags);
312 313 314
	if (ret < 0)
		goto security_error;

L
Linus Torvalds 已提交
315 316 317 318
	/* publish the key by giving it a serial number */
	atomic_inc(&user->nkeys);
	key_alloc_serial(key);

319
error:
L
Linus Torvalds 已提交
320 321
	return key;

322 323
security_error:
	kfree(key->description);
L
Linus Torvalds 已提交
324
	kmem_cache_free(key_jar, key);
325
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
L
Linus Torvalds 已提交
326 327 328 329 330 331
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
332 333 334 335 336 337
	key = ERR_PTR(ret);
	goto error;

no_memory_3:
	kmem_cache_free(key_jar, key);
no_memory_2:
338
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
339 340 341 342 343 344 345
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
no_memory_1:
L
Linus Torvalds 已提交
346 347 348
	key = ERR_PTR(-ENOMEM);
	goto error;

349
no_quota:
L
Linus Torvalds 已提交
350 351 352 353
	spin_unlock(&user->lock);
	key_user_put(user);
	key = ERR_PTR(-EDQUOT);
	goto error;
354
}
L
Linus Torvalds 已提交
355 356
EXPORT_SYMBOL(key_alloc);

357 358 359 360 361 362 363 364 365 366
/**
 * key_payload_reserve - Adjust data quota reservation for the key's payload
 * @key: The key to make the reservation for.
 * @datalen: The amount of data payload the caller now wants.
 *
 * Adjust the amount of the owning user's key data quota that a key reserves.
 * If the amount is increased, then -EDQUOT may be returned if there isn't
 * enough free quota available.
 *
 * If successful, 0 is returned.
L
Linus Torvalds 已提交
367 368 369
 */
int key_payload_reserve(struct key *key, size_t datalen)
{
370
	int delta = (int)datalen - key->datalen;
L
Linus Torvalds 已提交
371 372 373 374 375
	int ret = 0;

	key_check(key);

	/* contemplate the quota adjustment */
376
	if (delta != 0 && test_bit(KEY_FLAG_IN_QUOTA, &key->flags)) {
377
		unsigned maxbytes = uid_eq(key->user->uid, GLOBAL_ROOT_UID) ?
378 379
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
380 381 382
		spin_lock(&key->user->lock);

		if (delta > 0 &&
383 384
		    (key->user->qnbytes + delta >= maxbytes ||
		     key->user->qnbytes + delta < key->user->qnbytes)) {
L
Linus Torvalds 已提交
385 386 387 388 389 390 391 392 393 394 395 396 397 398
			ret = -EDQUOT;
		}
		else {
			key->user->qnbytes += delta;
			key->quotalen += delta;
		}
		spin_unlock(&key->user->lock);
	}

	/* change the recorded data length if that didn't generate an error */
	if (ret == 0)
		key->datalen = datalen;

	return ret;
399
}
L
Linus Torvalds 已提交
400 401 402
EXPORT_SYMBOL(key_payload_reserve);

/*
403 404 405 406
 * Instantiate a key and link it into the target keyring atomically.  Must be
 * called with the target keyring's semaphore writelocked.  The target key's
 * semaphore need not be locked as instantiation is serialised by
 * key_construction_mutex.
L
Linus Torvalds 已提交
407 408
 */
static int __key_instantiate_and_link(struct key *key,
409
				      struct key_preparsed_payload *prep,
410
				      struct key *keyring,
411
				      struct key *authkey,
412
				      struct assoc_array_edit **_edit)
L
Linus Torvalds 已提交
413 414 415 416 417 418 419 420 421
{
	int ret, awaken;

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

422
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
423 424

	/* can't instantiate twice */
425
	if (!test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
L
Linus Torvalds 已提交
426
		/* instantiate the key */
427
		ret = key->type->instantiate(key, prep);
L
Linus Torvalds 已提交
428 429 430 431

		if (ret == 0) {
			/* mark the key as being instantiated */
			atomic_inc(&key->user->nikeys);
432
			set_bit(KEY_FLAG_INSTANTIATED, &key->flags);
L
Linus Torvalds 已提交
433

434
			if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
435 436 437
				awaken = 1;

			/* and link it into the destination keyring */
438
			if (keyring) {
439 440
				if (test_bit(KEY_FLAG_KEEP, &keyring->flags))
					set_bit(KEY_FLAG_KEEP, &key->flags);
441

442
				__key_link(key, _edit);
443
			}
444 445

			/* disable the authorisation key */
D
David Howells 已提交
446 447
			if (authkey)
				key_revoke(authkey);
448 449 450 451 452

			if (prep->expiry != TIME_T_MAX) {
				key->expiry = prep->expiry;
				key_schedule_gc(prep->expiry + key_gc_delay);
			}
L
Linus Torvalds 已提交
453 454 455
		}
	}

456
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
457 458 459

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
460
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
461 462

	return ret;
463
}
L
Linus Torvalds 已提交
464

465 466 467 468 469 470 471 472 473 474 475 476 477 478 479
/**
 * key_instantiate_and_link - Instantiate a key and link it into the keyring.
 * @key: The key to instantiate.
 * @data: The data to use to instantiate the keyring.
 * @datalen: The length of @data.
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Instantiate a key that's in the uninstantiated state using the provided data
 * and, if successful, link it in to the destination keyring if one is
 * supplied.
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
480 481 482 483
 */
int key_instantiate_and_link(struct key *key,
			     const void *data,
			     size_t datalen,
484
			     struct key *keyring,
D
David Howells 已提交
485
			     struct key *authkey)
L
Linus Torvalds 已提交
486
{
487
	struct key_preparsed_payload prep;
488
	struct assoc_array_edit *edit;
L
Linus Torvalds 已提交
489 490
	int ret;

491 492 493 494
	memset(&prep, 0, sizeof(prep));
	prep.data = data;
	prep.datalen = datalen;
	prep.quotalen = key->type->def_datalen;
495
	prep.expiry = TIME_T_MAX;
496 497 498 499 500 501
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
	}

502
	if (keyring) {
503 504 505 506
		ret = __key_link_begin(keyring, &key->index_key, &edit);
		if (ret < 0)
			goto error;

507 508 509 510 511
		if (keyring->restrict_link && keyring->restrict_link->check) {
			struct key_restriction *keyres = keyring->restrict_link;

			ret = keyres->check(keyring, key->type, &prep.payload,
					    keyres->key);
512
			if (ret < 0)
513
				goto error_link_end;
514
		}
515
	}
L
Linus Torvalds 已提交
516

517
	ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit);
L
Linus Torvalds 已提交
518

519
error_link_end:
L
Linus Torvalds 已提交
520
	if (keyring)
521
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
522

523
error:
524 525
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
526
	return ret;
527
}
L
Linus Torvalds 已提交
528 529 530

EXPORT_SYMBOL(key_instantiate_and_link);

531
/**
532
 * key_reject_and_link - Negatively instantiate a key and link it into the keyring.
533 534
 * @key: The key to instantiate.
 * @timeout: The timeout on the negative key.
535
 * @error: The error to return when the key is hit.
536 537 538 539
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Negatively instantiate a key that's in the uninstantiated state and, if
540 541 542
 * successful, set its timeout and stored error and link it in to the
 * destination keyring if one is supplied.  The key and any links to the key
 * will be automatically garbage collected after the timeout expires.
543 544
 *
 * Negative keys are used to rate limit repeated request_key() calls by causing
545 546
 * them to return the stored error code (typically ENOKEY) until the negative
 * key expires.
547 548 549 550
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
551
 */
552
int key_reject_and_link(struct key *key,
L
Linus Torvalds 已提交
553
			unsigned timeout,
554
			unsigned error,
555
			struct key *keyring,
D
David Howells 已提交
556
			struct key *authkey)
L
Linus Torvalds 已提交
557
{
558
	struct assoc_array_edit *edit;
L
Linus Torvalds 已提交
559
	struct timespec now;
560
	int ret, awaken, link_ret = 0;
L
Linus Torvalds 已提交
561 562 563 564 565 566 567

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

568 569 570 571
	if (keyring) {
		if (keyring->restrict_link)
			return -EPERM;

572
		link_ret = __key_link_begin(keyring, &key->index_key, &edit);
573
	}
L
Linus Torvalds 已提交
574

575
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
576 577

	/* can't instantiate twice */
578
	if (!test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
L
Linus Torvalds 已提交
579 580
		/* mark the key as being negatively instantiated */
		atomic_inc(&key->user->nikeys);
581
		key->reject_error = -error;
582
		smp_wmb();
583 584
		set_bit(KEY_FLAG_NEGATIVE, &key->flags);
		set_bit(KEY_FLAG_INSTANTIATED, &key->flags);
L
Linus Torvalds 已提交
585 586
		now = current_kernel_time();
		key->expiry = now.tv_sec + timeout;
D
David Howells 已提交
587
		key_schedule_gc(key->expiry + key_gc_delay);
L
Linus Torvalds 已提交
588

589
		if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
590 591 592 593 594
			awaken = 1;

		ret = 0;

		/* and link it into the destination keyring */
595
		if (keyring && link_ret == 0)
596
			__key_link(key, &edit);
597 598

		/* disable the authorisation key */
D
David Howells 已提交
599 600
		if (authkey)
			key_revoke(authkey);
L
Linus Torvalds 已提交
601 602
	}

603
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
604

605
	if (keyring && link_ret == 0)
606
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
607 608 609

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
610
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
611

612
	return ret == 0 ? link_ret : ret;
613
}
614
EXPORT_SYMBOL(key_reject_and_link);
L
Linus Torvalds 已提交
615

616 617 618 619 620 621 622
/**
 * key_put - Discard a reference to a key.
 * @key: The key to discard a reference from.
 *
 * Discard a reference to a key, and when all the references are gone, we
 * schedule the cleanup task to come and pull it out of the tree in process
 * context at some later time.
L
Linus Torvalds 已提交
623 624 625 626 627 628
 */
void key_put(struct key *key)
{
	if (key) {
		key_check(key);

629
		if (refcount_dec_and_test(&key->usage))
630
			schedule_work(&key_gc_work);
L
Linus Torvalds 已提交
631
	}
632
}
L
Linus Torvalds 已提交
633 634 635
EXPORT_SYMBOL(key_put);

/*
636
 * Find a key by its serial number.
L
Linus Torvalds 已提交
637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657
 */
struct key *key_lookup(key_serial_t id)
{
	struct rb_node *n;
	struct key *key;

	spin_lock(&key_serial_lock);

	/* search the tree for the specified key */
	n = key_serial_tree.rb_node;
	while (n) {
		key = rb_entry(n, struct key, serial_node);

		if (id < key->serial)
			n = n->rb_left;
		else if (id > key->serial)
			n = n->rb_right;
		else
			goto found;
	}

658
not_found:
L
Linus Torvalds 已提交
659 660 661
	key = ERR_PTR(-ENOKEY);
	goto error;

662
found:
663
	/* pretend it doesn't exist if it is awaiting deletion */
664
	if (refcount_read(&key->usage) == 0)
L
Linus Torvalds 已提交
665 666 667 668 669
		goto not_found;

	/* this races with key_put(), but that doesn't matter since key_put()
	 * doesn't actually change the key
	 */
670
	__key_get(key);
L
Linus Torvalds 已提交
671

672
error:
L
Linus Torvalds 已提交
673 674
	spin_unlock(&key_serial_lock);
	return key;
675
}
L
Linus Torvalds 已提交
676 677

/*
678 679 680 681
 * Find and lock the specified key type against removal.
 *
 * We return with the sem read-locked if successful.  If the type wasn't
 * available -ENOKEY is returned instead.
L
Linus Torvalds 已提交
682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698
 */
struct key_type *key_type_lookup(const char *type)
{
	struct key_type *ktype;

	down_read(&key_types_sem);

	/* look up the key type to see if it's one of the registered kernel
	 * types */
	list_for_each_entry(ktype, &key_types_list, link) {
		if (strcmp(ktype->name, type) == 0)
			goto found_kernel_type;
	}

	up_read(&key_types_sem);
	ktype = ERR_PTR(-ENOKEY);

699
found_kernel_type:
L
Linus Torvalds 已提交
700
	return ktype;
701
}
L
Linus Torvalds 已提交
702

703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722
void key_set_timeout(struct key *key, unsigned timeout)
{
	struct timespec now;
	time_t expiry = 0;

	/* make the changes with the locks held to prevent races */
	down_write(&key->sem);

	if (timeout > 0) {
		now = current_kernel_time();
		expiry = now.tv_sec + timeout;
	}

	key->expiry = expiry;
	key_schedule_gc(key->expiry + key_gc_delay);

	up_write(&key->sem);
}
EXPORT_SYMBOL_GPL(key_set_timeout);

L
Linus Torvalds 已提交
723
/*
724
 * Unlock a key type locked by key_type_lookup().
L
Linus Torvalds 已提交
725 726 727 728
 */
void key_type_put(struct key_type *ktype)
{
	up_read(&key_types_sem);
729
}
L
Linus Torvalds 已提交
730 731

/*
732 733 734 735
 * Attempt to update an existing key.
 *
 * The key is given to us with an incremented refcount that we need to discard
 * if we get an error.
L
Linus Torvalds 已提交
736
 */
737
static inline key_ref_t __key_update(key_ref_t key_ref,
738
				     struct key_preparsed_payload *prep)
L
Linus Torvalds 已提交
739
{
740
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
741 742 743
	int ret;

	/* need write permission on the key to update it */
744
	ret = key_permission(key_ref, KEY_NEED_WRITE);
745
	if (ret < 0)
L
Linus Torvalds 已提交
746 747 748 749 750 751 752 753
		goto error;

	ret = -EEXIST;
	if (!key->type->update)
		goto error;

	down_write(&key->sem);

754
	ret = key->type->update(key, prep);
755
	if (ret == 0)
L
Linus Torvalds 已提交
756
		/* updating a negative key instantiates it */
757
		clear_bit(KEY_FLAG_NEGATIVE, &key->flags);
L
Linus Torvalds 已提交
758 759 760 761 762

	up_write(&key->sem);

	if (ret < 0)
		goto error;
763 764
out:
	return key_ref;
L
Linus Torvalds 已提交
765

766
error:
L
Linus Torvalds 已提交
767
	key_put(key);
768
	key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
769
	goto out;
770
}
L
Linus Torvalds 已提交
771

772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795
/**
 * key_create_or_update - Update or create and instantiate a key.
 * @keyring_ref: A pointer to the destination keyring with possession flag.
 * @type: The type of key.
 * @description: The searchable description for the key.
 * @payload: The data to use to instantiate or update the key.
 * @plen: The length of @payload.
 * @perm: The permissions mask for a new key.
 * @flags: The quota flags for a new key.
 *
 * Search the destination keyring for a key of the same description and if one
 * is found, update it, otherwise create and instantiate a new one and create a
 * link to it from that keyring.
 *
 * If perm is KEY_PERM_UNDEF then an appropriate key permissions mask will be
 * concocted.
 *
 * Returns a pointer to the new key if successful, -ENODEV if the key type
 * wasn't available, -ENOTDIR if the keyring wasn't a keyring, -EACCES if the
 * caller isn't permitted to modify the keyring or the LSM did not permit
 * creation of the key.
 *
 * On success, the possession flag from the keyring ref will be tacked on to
 * the key ref before it is returned.
L
Linus Torvalds 已提交
796
 */
797 798 799 800 801
key_ref_t key_create_or_update(key_ref_t keyring_ref,
			       const char *type,
			       const char *description,
			       const void *payload,
			       size_t plen,
802
			       key_perm_t perm,
803
			       unsigned long flags)
L
Linus Torvalds 已提交
804
{
805 806 807
	struct keyring_index_key index_key = {
		.description	= description,
	};
808
	struct key_preparsed_payload prep;
809
	struct assoc_array_edit *edit;
D
David Howells 已提交
810
	const struct cred *cred = current_cred();
811 812
	struct key *keyring, *key = NULL;
	key_ref_t key_ref;
L
Linus Torvalds 已提交
813
	int ret;
814
	struct key_restriction *restrict_link = NULL;
L
Linus Torvalds 已提交
815 816 817

	/* look up the key type to see if it's one of the registered kernel
	 * types */
818 819
	index_key.type = key_type_lookup(type);
	if (IS_ERR(index_key.type)) {
820
		key_ref = ERR_PTR(-ENODEV);
L
Linus Torvalds 已提交
821 822 823
		goto error;
	}

824
	key_ref = ERR_PTR(-EINVAL);
825
	if (!index_key.type->instantiate ||
826
	    (!index_key.description && !index_key.type->preparse))
827
		goto error_put_type;
L
Linus Torvalds 已提交
828

829 830 831 832
	keyring = key_ref_to_ptr(keyring_ref);

	key_check(keyring);

833 834 835 836
	key_ref = ERR_PTR(-EPERM);
	if (!(flags & KEY_ALLOC_BYPASS_RESTRICTION))
		restrict_link = keyring->restrict_link;

837 838
	key_ref = ERR_PTR(-ENOTDIR);
	if (keyring->type != &key_type_keyring)
839 840 841 842 843
		goto error_put_type;

	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
844
	prep.quotalen = index_key.type->def_datalen;
845
	prep.expiry = TIME_T_MAX;
846 847
	if (index_key.type->preparse) {
		ret = index_key.type->preparse(&prep);
848 849
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
850
			goto error_free_prep;
851
		}
852 853
		if (!index_key.description)
			index_key.description = prep.description;
854
		key_ref = ERR_PTR(-EINVAL);
855
		if (!index_key.description)
856 857
			goto error_free_prep;
	}
858
	index_key.desc_len = strlen(index_key.description);
859

860 861 862 863 864 865
	ret = __key_link_begin(keyring, &index_key, &edit);
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
		goto error_free_prep;
	}

866 867 868
	if (restrict_link && restrict_link->check) {
		ret = restrict_link->check(keyring, index_key.type,
					   &prep.payload, restrict_link->key);
869 870
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
871
			goto error_link_end;
872 873
		}
	}
874

875 876
	/* if we're going to allocate a new key, we're going to have
	 * to modify the keyring */
877
	ret = key_permission(keyring_ref, KEY_NEED_WRITE);
878 879
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
880
		goto error_link_end;
881
	}
882

883 884 885
	/* if it's possible to update this type of key, search for an existing
	 * key of the same type and description in the destination keyring and
	 * update that instead if possible
L
Linus Torvalds 已提交
886
	 */
887
	if (index_key.type->update) {
888 889
		key_ref = find_key_to_update(keyring_ref, &index_key);
		if (key_ref)
890 891
			goto found_matching_key;
	}
L
Linus Torvalds 已提交
892

893 894 895
	/* if the client doesn't provide, decide on the permissions we want */
	if (perm == KEY_PERM_UNDEF) {
		perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR;
896
		perm |= KEY_USR_VIEW;
L
Linus Torvalds 已提交
897

898
		if (index_key.type->read)
899
			perm |= KEY_POS_READ;
L
Linus Torvalds 已提交
900

901 902
		if (index_key.type == &key_type_keyring ||
		    index_key.type->update)
903
			perm |= KEY_POS_WRITE;
904
	}
L
Linus Torvalds 已提交
905 906

	/* allocate a new key */
907
	key = key_alloc(index_key.type, index_key.description,
908
			cred->fsuid, cred->fsgid, cred, perm, flags, NULL);
L
Linus Torvalds 已提交
909
	if (IS_ERR(key)) {
910
		key_ref = ERR_CAST(key);
911
		goto error_link_end;
L
Linus Torvalds 已提交
912 913 914
	}

	/* instantiate it and link it into the target keyring */
915
	ret = __key_instantiate_and_link(key, &prep, keyring, NULL, &edit);
L
Linus Torvalds 已提交
916 917
	if (ret < 0) {
		key_put(key);
918
		key_ref = ERR_PTR(ret);
919
		goto error_link_end;
L
Linus Torvalds 已提交
920 921
	}

922 923
	key_ref = make_key_ref(key, is_key_possessed(keyring_ref));

924
error_link_end:
925
	__key_link_end(keyring, &index_key, edit);
926
error_free_prep:
927 928
	if (index_key.type->preparse)
		index_key.type->free_preparse(&prep);
929
error_put_type:
930
	key_type_put(index_key.type);
931
error:
932
	return key_ref;
L
Linus Torvalds 已提交
933 934 935 936 937

 found_matching_key:
	/* we found a matching key, so we're going to try to update it
	 * - we can drop the locks first as we have the key pinned
	 */
938
	__key_link_end(keyring, &index_key, edit);
L
Linus Torvalds 已提交
939

940 941
	key_ref = __key_update(key_ref, &prep);
	goto error_free_prep;
942
}
L
Linus Torvalds 已提交
943 944
EXPORT_SYMBOL(key_create_or_update);

945 946 947 948 949 950 951 952 953 954 955 956
/**
 * key_update - Update a key's contents.
 * @key_ref: The pointer (plus possession flag) to the key.
 * @payload: The data to be used to update the key.
 * @plen: The length of @payload.
 *
 * Attempt to update the contents of a key with the given payload data.  The
 * caller must be granted Write permission on the key.  Negative keys can be
 * instantiated by this method.
 *
 * Returns 0 on success, -EACCES if not permitted and -EOPNOTSUPP if the key
 * type does not support updating.  The key type may return other errors.
L
Linus Torvalds 已提交
957
 */
958
int key_update(key_ref_t key_ref, const void *payload, size_t plen)
L
Linus Torvalds 已提交
959
{
960
	struct key_preparsed_payload prep;
961
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
962 963 964 965 966
	int ret;

	key_check(key);

	/* the key must be writable */
967
	ret = key_permission(key_ref, KEY_NEED_WRITE);
968
	if (ret < 0)
L
Linus Torvalds 已提交
969 970 971 972
		goto error;

	/* attempt to update it if supported */
	ret = -EOPNOTSUPP;
973 974
	if (!key->type->update)
		goto error;
L
Linus Torvalds 已提交
975

976 977 978 979
	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
	prep.quotalen = key->type->def_datalen;
980
	prep.expiry = TIME_T_MAX;
981 982 983 984
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
L
Linus Torvalds 已提交
985 986
	}

987 988 989 990 991 992 993 994 995
	down_write(&key->sem);

	ret = key->type->update(key, &prep);
	if (ret == 0)
		/* updating a negative key instantiates it */
		clear_bit(KEY_FLAG_NEGATIVE, &key->flags);

	up_write(&key->sem);

996
error:
997 998
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
999
	return ret;
1000
}
L
Linus Torvalds 已提交
1001 1002
EXPORT_SYMBOL(key_update);

1003 1004 1005 1006 1007 1008 1009 1010
/**
 * key_revoke - Revoke a key.
 * @key: The key to be revoked.
 *
 * Mark a key as being revoked and ask the type to free up its resources.  The
 * revocation timeout is set and the key and all its links will be
 * automatically garbage collected after key_gc_delay amount of time if they
 * are not manually dealt with first.
L
Linus Torvalds 已提交
1011 1012 1013
 */
void key_revoke(struct key *key)
{
1014 1015 1016
	struct timespec now;
	time_t time;

L
Linus Torvalds 已提交
1017 1018
	key_check(key);

1019 1020 1021 1022 1023 1024 1025 1026
	/* make sure no one's trying to change or use the key when we mark it
	 * - we tell lockdep that we might nest because we might be revoking an
	 *   authorisation key whilst holding the sem on a key we've just
	 *   instantiated
	 */
	down_write_nested(&key->sem, 1);
	if (!test_and_set_bit(KEY_FLAG_REVOKED, &key->flags) &&
	    key->type->revoke)
1027 1028
		key->type->revoke(key);

1029 1030 1031 1032 1033
	/* set the death time to no more than the expiry time */
	now = current_kernel_time();
	time = now.tv_sec;
	if (key->revoked_at == 0 || key->revoked_at > time) {
		key->revoked_at = time;
D
David Howells 已提交
1034
		key_schedule_gc(key->revoked_at + key_gc_delay);
1035 1036
	}

L
Linus Torvalds 已提交
1037
	up_write(&key->sem);
1038
}
L
Linus Torvalds 已提交
1039 1040
EXPORT_SYMBOL(key_revoke);

D
David Howells 已提交
1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062
/**
 * key_invalidate - Invalidate a key.
 * @key: The key to be invalidated.
 *
 * Mark a key as being invalidated and have it cleaned up immediately.  The key
 * is ignored by all searches and other operations from this point.
 */
void key_invalidate(struct key *key)
{
	kenter("%d", key_serial(key));

	key_check(key);

	if (!test_bit(KEY_FLAG_INVALIDATED, &key->flags)) {
		down_write_nested(&key->sem, 1);
		if (!test_and_set_bit(KEY_FLAG_INVALIDATED, &key->flags))
			key_schedule_gc_links();
		up_write(&key->sem);
	}
}
EXPORT_SYMBOL(key_invalidate);

1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080
/**
 * generic_key_instantiate - Simple instantiation of a key from preparsed data
 * @key: The key to be instantiated
 * @prep: The preparsed data to load.
 *
 * Instantiate a key from preparsed data.  We assume we can just copy the data
 * in directly and clear the old pointers.
 *
 * This can be pointed to directly by the key type instantiate op pointer.
 */
int generic_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
{
	int ret;

	pr_devel("==>%s()\n", __func__);

	ret = key_payload_reserve(key, prep->quotalen);
	if (ret == 0) {
1081 1082 1083 1084 1085 1086 1087 1088
		rcu_assign_keypointer(key, prep->payload.data[0]);
		key->payload.data[1] = prep->payload.data[1];
		key->payload.data[2] = prep->payload.data[2];
		key->payload.data[3] = prep->payload.data[3];
		prep->payload.data[0] = NULL;
		prep->payload.data[1] = NULL;
		prep->payload.data[2] = NULL;
		prep->payload.data[3] = NULL;
1089 1090 1091 1092 1093 1094
	}
	pr_devel("<==%s() = %d\n", __func__, ret);
	return ret;
}
EXPORT_SYMBOL(generic_key_instantiate);

1095 1096 1097 1098 1099 1100 1101
/**
 * register_key_type - Register a type of key.
 * @ktype: The new key type.
 *
 * Register a new key type.
 *
 * Returns 0 on success or -EEXIST if a type of this name already exists.
L
Linus Torvalds 已提交
1102 1103 1104 1105 1106 1107
 */
int register_key_type(struct key_type *ktype)
{
	struct key_type *p;
	int ret;

1108 1109
	memset(&ktype->lock_class, 0, sizeof(ktype->lock_class));

L
Linus Torvalds 已提交
1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120
	ret = -EEXIST;
	down_write(&key_types_sem);

	/* disallow key types with the same name */
	list_for_each_entry(p, &key_types_list, link) {
		if (strcmp(p->name, ktype->name) == 0)
			goto out;
	}

	/* store the type */
	list_add(&ktype->link, &key_types_list);
1121 1122

	pr_notice("Key type %s registered\n", ktype->name);
L
Linus Torvalds 已提交
1123 1124
	ret = 0;

1125
out:
L
Linus Torvalds 已提交
1126 1127
	up_write(&key_types_sem);
	return ret;
1128
}
L
Linus Torvalds 已提交
1129 1130
EXPORT_SYMBOL(register_key_type);

1131 1132 1133 1134 1135 1136 1137
/**
 * unregister_key_type - Unregister a type of key.
 * @ktype: The key type.
 *
 * Unregister a key type and mark all the extant keys of this type as dead.
 * Those keys of this type are then destroyed to get rid of their payloads and
 * they and their links will be garbage collected as soon as possible.
L
Linus Torvalds 已提交
1138 1139 1140 1141 1142
 */
void unregister_key_type(struct key_type *ktype)
{
	down_write(&key_types_sem);
	list_del_init(&ktype->link);
1143 1144
	downgrade_write(&key_types_sem);
	key_gc_keytype(ktype);
1145
	pr_notice("Key type %s unregistered\n", ktype->name);
1146
	up_read(&key_types_sem);
1147
}
L
Linus Torvalds 已提交
1148 1149 1150
EXPORT_SYMBOL(unregister_key_type);

/*
1151
 * Initialise the key management state.
L
Linus Torvalds 已提交
1152 1153 1154 1155 1156
 */
void __init key_init(void)
{
	/* allocate a slab in which we can store keys */
	key_jar = kmem_cache_create("key_jar", sizeof(struct key),
1157
			0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
L
Linus Torvalds 已提交
1158 1159 1160 1161 1162

	/* add the special key types */
	list_add_tail(&key_type_keyring.link, &key_types_list);
	list_add_tail(&key_type_dead.link, &key_types_list);
	list_add_tail(&key_type_user.link, &key_types_list);
J
Jeff Layton 已提交
1163
	list_add_tail(&key_type_logon.link, &key_types_list);
L
Linus Torvalds 已提交
1164 1165 1166 1167 1168 1169 1170 1171

	/* record the root user tracking */
	rb_link_node(&root_key_user.node,
		     NULL,
		     &key_user_tree.rb_node);

	rb_insert_color(&root_key_user.node,
			&key_user_tree);
1172
}