key.c 30.0 KB
Newer Older
1
/* Basic authentication token and access key management
L
Linus Torvalds 已提交
2
 *
3
 * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved.
L
Linus Torvalds 已提交
4 5 6 7 8 9 10 11 12 13
 * Written by David Howells (dhowells@redhat.com)
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License
 * as published by the Free Software Foundation; either version
 * 2 of the License, or (at your option) any later version.
 */

#include <linux/module.h>
#include <linux/init.h>
14
#include <linux/poison.h>
L
Linus Torvalds 已提交
15 16
#include <linux/sched.h>
#include <linux/slab.h>
17
#include <linux/security.h>
L
Linus Torvalds 已提交
18
#include <linux/workqueue.h>
19
#include <linux/random.h>
L
Linus Torvalds 已提交
20 21 22
#include <linux/err.h>
#include "internal.h"

23
struct kmem_cache *key_jar;
L
Linus Torvalds 已提交
24 25 26 27 28 29
struct rb_root		key_serial_tree; /* tree of keys indexed by serial */
DEFINE_SPINLOCK(key_serial_lock);

struct rb_root	key_user_tree; /* tree of quota records indexed by UID */
DEFINE_SPINLOCK(key_user_lock);

30 31
unsigned int key_quota_root_maxkeys = 1000000;	/* root's key count quota */
unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */
32 33 34
unsigned int key_quota_maxkeys = 200;		/* general key count quota */
unsigned int key_quota_maxbytes = 20000;	/* general key space quota */

L
Linus Torvalds 已提交
35 36 37
static LIST_HEAD(key_types_list);
static DECLARE_RWSEM(key_types_sem);

38
/* We serialise key instantiation and link */
39
DEFINE_MUTEX(key_construction_mutex);
L
Linus Torvalds 已提交
40 41 42 43 44 45 46 47 48 49 50

#ifdef KEY_DEBUGGING
void __key_check(const struct key *key)
{
	printk("__key_check: key %p {%08x} should be {%08x}\n",
	       key, key->magic, KEY_DEBUG_MAGIC);
	BUG();
}
#endif

/*
51 52
 * Get the key quota record for a user, allocating a new record if one doesn't
 * already exist.
L
Linus Torvalds 已提交
53
 */
54
struct key_user *key_user_lookup(kuid_t uid)
L
Linus Torvalds 已提交
55 56 57 58 59
{
	struct key_user *candidate = NULL, *user;
	struct rb_node *parent = NULL;
	struct rb_node **p;

60
try_again:
L
Linus Torvalds 已提交
61 62 63 64 65 66 67 68
	p = &key_user_tree.rb_node;
	spin_lock(&key_user_lock);

	/* search the tree for a user record with a matching UID */
	while (*p) {
		parent = *p;
		user = rb_entry(parent, struct key_user, node);

69
		if (uid_lt(uid, user->uid))
L
Linus Torvalds 已提交
70
			p = &(*p)->rb_left;
71
		else if (uid_gt(uid, user->uid))
72
			p = &(*p)->rb_right;
L
Linus Torvalds 已提交
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
		else
			goto found;
	}

	/* if we get here, we failed to find a match in the tree */
	if (!candidate) {
		/* allocate a candidate user record if we don't already have
		 * one */
		spin_unlock(&key_user_lock);

		user = NULL;
		candidate = kmalloc(sizeof(struct key_user), GFP_KERNEL);
		if (unlikely(!candidate))
			goto out;

		/* the allocation may have scheduled, so we need to repeat the
		 * search lest someone else added the record whilst we were
		 * asleep */
		goto try_again;
	}

	/* if we get here, then the user record still hadn't appeared on the
	 * second pass - so we use the candidate record */
96
	refcount_set(&candidate->usage, 1);
L
Linus Torvalds 已提交
97 98 99 100 101 102
	atomic_set(&candidate->nkeys, 0);
	atomic_set(&candidate->nikeys, 0);
	candidate->uid = uid;
	candidate->qnkeys = 0;
	candidate->qnbytes = 0;
	spin_lock_init(&candidate->lock);
103
	mutex_init(&candidate->cons_lock);
L
Linus Torvalds 已提交
104 105 106 107 108 109 110 111

	rb_link_node(&candidate->node, parent, p);
	rb_insert_color(&candidate->node, &key_user_tree);
	spin_unlock(&key_user_lock);
	user = candidate;
	goto out;

	/* okay - we found a user record for this UID */
112
found:
113
	refcount_inc(&user->usage);
L
Linus Torvalds 已提交
114
	spin_unlock(&key_user_lock);
J
Jesper Juhl 已提交
115
	kfree(candidate);
116
out:
L
Linus Torvalds 已提交
117
	return user;
118
}
L
Linus Torvalds 已提交
119 120

/*
121
 * Dispose of a user structure
L
Linus Torvalds 已提交
122 123 124
 */
void key_user_put(struct key_user *user)
{
125
	if (refcount_dec_and_lock(&user->usage, &key_user_lock)) {
L
Linus Torvalds 已提交
126 127 128 129 130
		rb_erase(&user->node, &key_user_tree);
		spin_unlock(&key_user_lock);

		kfree(user);
	}
131
}
L
Linus Torvalds 已提交
132 133

/*
134 135
 * Allocate a serial number for a key.  These are assigned randomly to avoid
 * security issues through covert channel problems.
L
Linus Torvalds 已提交
136 137 138 139 140 141
 */
static inline void key_alloc_serial(struct key *key)
{
	struct rb_node *parent, **p;
	struct key *xkey;

142
	/* propose a random serial number and look for a hole for it in the
L
Linus Torvalds 已提交
143
	 * serial number tree */
144 145 146 147 148 149 150
	do {
		get_random_bytes(&key->serial, sizeof(key->serial));

		key->serial >>= 1; /* negative numbers are not permitted */
	} while (key->serial < 3);

	spin_lock(&key_serial_lock);
L
Linus Torvalds 已提交
151

152
attempt_insertion:
L
Linus Torvalds 已提交
153 154 155 156 157 158 159 160 161 162 163 164 165 166
	parent = NULL;
	p = &key_serial_tree.rb_node;

	while (*p) {
		parent = *p;
		xkey = rb_entry(parent, struct key, serial_node);

		if (key->serial < xkey->serial)
			p = &(*p)->rb_left;
		else if (key->serial > xkey->serial)
			p = &(*p)->rb_right;
		else
			goto serial_exists;
	}
167 168 169 170 171 172 173

	/* we've found a suitable hole - arrange for this key to occupy it */
	rb_link_node(&key->serial_node, parent, p);
	rb_insert_color(&key->serial_node, &key_serial_tree);

	spin_unlock(&key_serial_lock);
	return;
L
Linus Torvalds 已提交
174 175 176

	/* we found a key with the proposed serial number - walk the tree from
	 * that point looking for the next unused serial number */
177
serial_exists:
L
Linus Torvalds 已提交
178
	for (;;) {
179
		key->serial++;
180 181 182 183
		if (key->serial < 3) {
			key->serial = 3;
			goto attempt_insertion;
		}
L
Linus Torvalds 已提交
184 185 186

		parent = rb_next(parent);
		if (!parent)
187
			goto attempt_insertion;
L
Linus Torvalds 已提交
188 189 190

		xkey = rb_entry(parent, struct key, serial_node);
		if (key->serial < xkey->serial)
191
			goto attempt_insertion;
L
Linus Torvalds 已提交
192
	}
193
}
L
Linus Torvalds 已提交
194

195 196 197 198 199 200 201 202 203
/**
 * key_alloc - Allocate a key of the specified type.
 * @type: The type of key to allocate.
 * @desc: The key description to allow the key to be searched out.
 * @uid: The owner of the new key.
 * @gid: The group ID for the new key's group permissions.
 * @cred: The credentials specifying UID namespace.
 * @perm: The permissions mask of the new key.
 * @flags: Flags specifying quota properties.
204
 * @restrict_link: Optional link restriction method for new keyrings.
205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223
 *
 * Allocate a key of the specified type with the attributes given.  The key is
 * returned in an uninstantiated state and the caller needs to instantiate the
 * key before returning.
 *
 * The user's key count quota is updated to reflect the creation of the key and
 * the user's key data quota has the default for the key type reserved.  The
 * instantiation function should amend this as necessary.  If insufficient
 * quota is available, -EDQUOT will be returned.
 *
 * The LSM security modules can prevent a key being created, in which case
 * -EACCES will be returned.
 *
 * Returns a pointer to the new key if successful and an error code otherwise.
 *
 * Note that the caller needs to ensure the key type isn't uninstantiated.
 * Internally this can be done by locking key_types_sem.  Externally, this can
 * be done by either never unregistering the key type, or making sure
 * key_alloc() calls don't race with module unloading.
L
Linus Torvalds 已提交
224 225
 */
struct key *key_alloc(struct key_type *type, const char *desc,
226
		      kuid_t uid, kgid_t gid, const struct cred *cred,
227
		      key_perm_t perm, unsigned long flags,
228
		      key_restrict_link_func_t restrict_link)
L
Linus Torvalds 已提交
229 230 231 232
{
	struct key_user *user = NULL;
	struct key *key;
	size_t desclen, quotalen;
233
	int ret;
L
Linus Torvalds 已提交
234 235 236 237 238

	key = ERR_PTR(-EINVAL);
	if (!desc || !*desc)
		goto error;

239 240 241 242 243 244 245 246
	if (type->vet_description) {
		ret = type->vet_description(desc);
		if (ret < 0) {
			key = ERR_PTR(ret);
			goto error;
		}
	}

247 248
	desclen = strlen(desc);
	quotalen = desclen + 1 + type->def_datalen;
L
Linus Torvalds 已提交
249 250

	/* get hold of the key tracking for this user */
251
	user = key_user_lookup(uid);
L
Linus Torvalds 已提交
252 253 254 255 256
	if (!user)
		goto no_memory_1;

	/* check that the user's quota permits allocation of another key and
	 * its description */
257
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
258
		unsigned maxkeys = uid_eq(uid, GLOBAL_ROOT_UID) ?
259
			key_quota_root_maxkeys : key_quota_maxkeys;
260
		unsigned maxbytes = uid_eq(uid, GLOBAL_ROOT_UID) ?
261 262
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
263
		spin_lock(&user->lock);
264
		if (!(flags & KEY_ALLOC_QUOTA_OVERRUN)) {
265 266 267
			if (user->qnkeys + 1 >= maxkeys ||
			    user->qnbytes + quotalen >= maxbytes ||
			    user->qnbytes + quotalen < user->qnbytes)
268 269
				goto no_quota;
		}
L
Linus Torvalds 已提交
270 271 272 273 274 275 276

		user->qnkeys++;
		user->qnbytes += quotalen;
		spin_unlock(&user->lock);
	}

	/* allocate and initialise the key and its description */
277
	key = kmem_cache_zalloc(key_jar, GFP_KERNEL);
L
Linus Torvalds 已提交
278 279 280
	if (!key)
		goto no_memory_2;

D
Dan Carpenter 已提交
281 282
	key->index_key.desc_len = desclen;
	key->index_key.description = kmemdup(desc, desclen + 1, GFP_KERNEL);
283
	if (!key->index_key.description)
D
Dan Carpenter 已提交
284
		goto no_memory_3;
L
Linus Torvalds 已提交
285

286
	refcount_set(&key->usage, 1);
L
Linus Torvalds 已提交
287
	init_rwsem(&key->sem);
288
	lockdep_set_class(&key->sem, &type->lock_class);
289
	key->index_key.type = type;
L
Linus Torvalds 已提交
290 291 292 293 294 295
	key->user = user;
	key->quotalen = quotalen;
	key->datalen = type->def_datalen;
	key->uid = uid;
	key->gid = gid;
	key->perm = perm;
296
	key->restrict_link = restrict_link;
L
Linus Torvalds 已提交
297

298
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA))
299
		key->flags |= 1 << KEY_FLAG_IN_QUOTA;
300 301
	if (flags & KEY_ALLOC_BUILT_IN)
		key->flags |= 1 << KEY_FLAG_BUILTIN;
L
Linus Torvalds 已提交
302 303 304 305 306

#ifdef KEY_DEBUGGING
	key->magic = KEY_DEBUG_MAGIC;
#endif

307
	/* let the security module know about the key */
D
David Howells 已提交
308
	ret = security_key_alloc(key, cred, flags);
309 310 311
	if (ret < 0)
		goto security_error;

L
Linus Torvalds 已提交
312 313 314 315
	/* publish the key by giving it a serial number */
	atomic_inc(&user->nkeys);
	key_alloc_serial(key);

316
error:
L
Linus Torvalds 已提交
317 318
	return key;

319 320
security_error:
	kfree(key->description);
L
Linus Torvalds 已提交
321
	kmem_cache_free(key_jar, key);
322
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
L
Linus Torvalds 已提交
323 324 325 326 327 328
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
329 330 331 332 333 334
	key = ERR_PTR(ret);
	goto error;

no_memory_3:
	kmem_cache_free(key_jar, key);
no_memory_2:
335
	if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
336 337 338 339 340 341 342
		spin_lock(&user->lock);
		user->qnkeys--;
		user->qnbytes -= quotalen;
		spin_unlock(&user->lock);
	}
	key_user_put(user);
no_memory_1:
L
Linus Torvalds 已提交
343 344 345
	key = ERR_PTR(-ENOMEM);
	goto error;

346
no_quota:
L
Linus Torvalds 已提交
347 348 349 350
	spin_unlock(&user->lock);
	key_user_put(user);
	key = ERR_PTR(-EDQUOT);
	goto error;
351
}
L
Linus Torvalds 已提交
352 353
EXPORT_SYMBOL(key_alloc);

354 355 356 357 358 359 360 361 362 363
/**
 * key_payload_reserve - Adjust data quota reservation for the key's payload
 * @key: The key to make the reservation for.
 * @datalen: The amount of data payload the caller now wants.
 *
 * Adjust the amount of the owning user's key data quota that a key reserves.
 * If the amount is increased, then -EDQUOT may be returned if there isn't
 * enough free quota available.
 *
 * If successful, 0 is returned.
L
Linus Torvalds 已提交
364 365 366
 */
int key_payload_reserve(struct key *key, size_t datalen)
{
367
	int delta = (int)datalen - key->datalen;
L
Linus Torvalds 已提交
368 369 370 371 372
	int ret = 0;

	key_check(key);

	/* contemplate the quota adjustment */
373
	if (delta != 0 && test_bit(KEY_FLAG_IN_QUOTA, &key->flags)) {
374
		unsigned maxbytes = uid_eq(key->user->uid, GLOBAL_ROOT_UID) ?
375 376
			key_quota_root_maxbytes : key_quota_maxbytes;

L
Linus Torvalds 已提交
377 378 379
		spin_lock(&key->user->lock);

		if (delta > 0 &&
380 381
		    (key->user->qnbytes + delta >= maxbytes ||
		     key->user->qnbytes + delta < key->user->qnbytes)) {
L
Linus Torvalds 已提交
382 383 384 385 386 387 388 389 390 391 392 393 394 395
			ret = -EDQUOT;
		}
		else {
			key->user->qnbytes += delta;
			key->quotalen += delta;
		}
		spin_unlock(&key->user->lock);
	}

	/* change the recorded data length if that didn't generate an error */
	if (ret == 0)
		key->datalen = datalen;

	return ret;
396
}
L
Linus Torvalds 已提交
397 398 399
EXPORT_SYMBOL(key_payload_reserve);

/*
400 401 402 403
 * Instantiate a key and link it into the target keyring atomically.  Must be
 * called with the target keyring's semaphore writelocked.  The target key's
 * semaphore need not be locked as instantiation is serialised by
 * key_construction_mutex.
L
Linus Torvalds 已提交
404 405
 */
static int __key_instantiate_and_link(struct key *key,
406
				      struct key_preparsed_payload *prep,
407
				      struct key *keyring,
408
				      struct key *authkey,
409
				      struct assoc_array_edit **_edit)
L
Linus Torvalds 已提交
410 411 412 413 414 415 416 417 418
{
	int ret, awaken;

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

419
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
420 421

	/* can't instantiate twice */
422
	if (!test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
L
Linus Torvalds 已提交
423
		/* instantiate the key */
424
		ret = key->type->instantiate(key, prep);
L
Linus Torvalds 已提交
425 426 427 428

		if (ret == 0) {
			/* mark the key as being instantiated */
			atomic_inc(&key->user->nikeys);
429
			set_bit(KEY_FLAG_INSTANTIATED, &key->flags);
L
Linus Torvalds 已提交
430

431
			if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
432 433 434
				awaken = 1;

			/* and link it into the destination keyring */
435
			if (keyring) {
436 437
				if (test_bit(KEY_FLAG_KEEP, &keyring->flags))
					set_bit(KEY_FLAG_KEEP, &key->flags);
438

439
				__key_link(key, _edit);
440
			}
441 442

			/* disable the authorisation key */
D
David Howells 已提交
443 444
			if (authkey)
				key_revoke(authkey);
445 446 447 448 449

			if (prep->expiry != TIME_T_MAX) {
				key->expiry = prep->expiry;
				key_schedule_gc(prep->expiry + key_gc_delay);
			}
L
Linus Torvalds 已提交
450 451 452
		}
	}

453
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
454 455 456

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
457
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
458 459

	return ret;
460
}
L
Linus Torvalds 已提交
461

462 463 464 465 466 467 468 469 470 471 472 473 474 475 476
/**
 * key_instantiate_and_link - Instantiate a key and link it into the keyring.
 * @key: The key to instantiate.
 * @data: The data to use to instantiate the keyring.
 * @datalen: The length of @data.
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Instantiate a key that's in the uninstantiated state using the provided data
 * and, if successful, link it in to the destination keyring if one is
 * supplied.
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
477 478 479 480
 */
int key_instantiate_and_link(struct key *key,
			     const void *data,
			     size_t datalen,
481
			     struct key *keyring,
D
David Howells 已提交
482
			     struct key *authkey)
L
Linus Torvalds 已提交
483
{
484
	struct key_preparsed_payload prep;
485
	struct assoc_array_edit *edit;
L
Linus Torvalds 已提交
486 487
	int ret;

488 489 490 491
	memset(&prep, 0, sizeof(prep));
	prep.data = data;
	prep.datalen = datalen;
	prep.quotalen = key->type->def_datalen;
492
	prep.expiry = TIME_T_MAX;
493 494 495 496 497 498
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
	}

499
	if (keyring) {
500 501
		if (keyring->restrict_link) {
			ret = keyring->restrict_link(keyring, key->type,
502
						     &prep.payload);
503 504 505
			if (ret < 0)
				goto error;
		}
506
		ret = __key_link_begin(keyring, &key->index_key, &edit);
507
		if (ret < 0)
508
			goto error;
509
	}
L
Linus Torvalds 已提交
510

511
	ret = __key_instantiate_and_link(key, &prep, keyring, authkey, &edit);
L
Linus Torvalds 已提交
512 513

	if (keyring)
514
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
515

516
error:
517 518
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
519
	return ret;
520
}
L
Linus Torvalds 已提交
521 522 523

EXPORT_SYMBOL(key_instantiate_and_link);

524
/**
525
 * key_reject_and_link - Negatively instantiate a key and link it into the keyring.
526 527
 * @key: The key to instantiate.
 * @timeout: The timeout on the negative key.
528
 * @error: The error to return when the key is hit.
529 530 531 532
 * @keyring: Keyring to create a link in on success (or NULL).
 * @authkey: The authorisation token permitting instantiation.
 *
 * Negatively instantiate a key that's in the uninstantiated state and, if
533 534 535
 * successful, set its timeout and stored error and link it in to the
 * destination keyring if one is supplied.  The key and any links to the key
 * will be automatically garbage collected after the timeout expires.
536 537
 *
 * Negative keys are used to rate limit repeated request_key() calls by causing
538 539
 * them to return the stored error code (typically ENOKEY) until the negative
 * key expires.
540 541 542 543
 *
 * If successful, 0 is returned, the authorisation token is revoked and anyone
 * waiting for the key is woken up.  If the key was already instantiated,
 * -EBUSY will be returned.
L
Linus Torvalds 已提交
544
 */
545
int key_reject_and_link(struct key *key,
L
Linus Torvalds 已提交
546
			unsigned timeout,
547
			unsigned error,
548
			struct key *keyring,
D
David Howells 已提交
549
			struct key *authkey)
L
Linus Torvalds 已提交
550
{
551
	struct assoc_array_edit *edit;
L
Linus Torvalds 已提交
552
	struct timespec now;
553
	int ret, awaken, link_ret = 0;
L
Linus Torvalds 已提交
554 555 556 557 558 559 560

	key_check(key);
	key_check(keyring);

	awaken = 0;
	ret = -EBUSY;

561 562 563 564
	if (keyring) {
		if (keyring->restrict_link)
			return -EPERM;

565
		link_ret = __key_link_begin(keyring, &key->index_key, &edit);
566
	}
L
Linus Torvalds 已提交
567

568
	mutex_lock(&key_construction_mutex);
L
Linus Torvalds 已提交
569 570

	/* can't instantiate twice */
571
	if (!test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) {
L
Linus Torvalds 已提交
572 573
		/* mark the key as being negatively instantiated */
		atomic_inc(&key->user->nikeys);
574
		key->reject_error = -error;
575
		smp_wmb();
576 577
		set_bit(KEY_FLAG_NEGATIVE, &key->flags);
		set_bit(KEY_FLAG_INSTANTIATED, &key->flags);
L
Linus Torvalds 已提交
578 579
		now = current_kernel_time();
		key->expiry = now.tv_sec + timeout;
D
David Howells 已提交
580
		key_schedule_gc(key->expiry + key_gc_delay);
L
Linus Torvalds 已提交
581

582
		if (test_and_clear_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags))
L
Linus Torvalds 已提交
583 584 585 586 587
			awaken = 1;

		ret = 0;

		/* and link it into the destination keyring */
588
		if (keyring && link_ret == 0)
589
			__key_link(key, &edit);
590 591

		/* disable the authorisation key */
D
David Howells 已提交
592 593
		if (authkey)
			key_revoke(authkey);
L
Linus Torvalds 已提交
594 595
	}

596
	mutex_unlock(&key_construction_mutex);
L
Linus Torvalds 已提交
597

598
	if (keyring && link_ret == 0)
599
		__key_link_end(keyring, &key->index_key, edit);
L
Linus Torvalds 已提交
600 601 602

	/* wake up anyone waiting for a key to be constructed */
	if (awaken)
603
		wake_up_bit(&key->flags, KEY_FLAG_USER_CONSTRUCT);
L
Linus Torvalds 已提交
604

605
	return ret == 0 ? link_ret : ret;
606
}
607
EXPORT_SYMBOL(key_reject_and_link);
L
Linus Torvalds 已提交
608

609 610 611 612 613 614 615
/**
 * key_put - Discard a reference to a key.
 * @key: The key to discard a reference from.
 *
 * Discard a reference to a key, and when all the references are gone, we
 * schedule the cleanup task to come and pull it out of the tree in process
 * context at some later time.
L
Linus Torvalds 已提交
616 617 618 619 620 621
 */
void key_put(struct key *key)
{
	if (key) {
		key_check(key);

622
		if (refcount_dec_and_test(&key->usage))
623
			schedule_work(&key_gc_work);
L
Linus Torvalds 已提交
624
	}
625
}
L
Linus Torvalds 已提交
626 627 628
EXPORT_SYMBOL(key_put);

/*
629
 * Find a key by its serial number.
L
Linus Torvalds 已提交
630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650
 */
struct key *key_lookup(key_serial_t id)
{
	struct rb_node *n;
	struct key *key;

	spin_lock(&key_serial_lock);

	/* search the tree for the specified key */
	n = key_serial_tree.rb_node;
	while (n) {
		key = rb_entry(n, struct key, serial_node);

		if (id < key->serial)
			n = n->rb_left;
		else if (id > key->serial)
			n = n->rb_right;
		else
			goto found;
	}

651
not_found:
L
Linus Torvalds 已提交
652 653 654
	key = ERR_PTR(-ENOKEY);
	goto error;

655
found:
656
	/* pretend it doesn't exist if it is awaiting deletion */
657
	if (refcount_read(&key->usage) == 0)
L
Linus Torvalds 已提交
658 659 660 661 662
		goto not_found;

	/* this races with key_put(), but that doesn't matter since key_put()
	 * doesn't actually change the key
	 */
663
	__key_get(key);
L
Linus Torvalds 已提交
664

665
error:
L
Linus Torvalds 已提交
666 667
	spin_unlock(&key_serial_lock);
	return key;
668
}
L
Linus Torvalds 已提交
669 670

/*
671 672 673 674
 * Find and lock the specified key type against removal.
 *
 * We return with the sem read-locked if successful.  If the type wasn't
 * available -ENOKEY is returned instead.
L
Linus Torvalds 已提交
675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691
 */
struct key_type *key_type_lookup(const char *type)
{
	struct key_type *ktype;

	down_read(&key_types_sem);

	/* look up the key type to see if it's one of the registered kernel
	 * types */
	list_for_each_entry(ktype, &key_types_list, link) {
		if (strcmp(ktype->name, type) == 0)
			goto found_kernel_type;
	}

	up_read(&key_types_sem);
	ktype = ERR_PTR(-ENOKEY);

692
found_kernel_type:
L
Linus Torvalds 已提交
693
	return ktype;
694
}
L
Linus Torvalds 已提交
695

696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715
void key_set_timeout(struct key *key, unsigned timeout)
{
	struct timespec now;
	time_t expiry = 0;

	/* make the changes with the locks held to prevent races */
	down_write(&key->sem);

	if (timeout > 0) {
		now = current_kernel_time();
		expiry = now.tv_sec + timeout;
	}

	key->expiry = expiry;
	key_schedule_gc(key->expiry + key_gc_delay);

	up_write(&key->sem);
}
EXPORT_SYMBOL_GPL(key_set_timeout);

L
Linus Torvalds 已提交
716
/*
717
 * Unlock a key type locked by key_type_lookup().
L
Linus Torvalds 已提交
718 719 720 721
 */
void key_type_put(struct key_type *ktype)
{
	up_read(&key_types_sem);
722
}
L
Linus Torvalds 已提交
723 724

/*
725 726 727 728
 * Attempt to update an existing key.
 *
 * The key is given to us with an incremented refcount that we need to discard
 * if we get an error.
L
Linus Torvalds 已提交
729
 */
730
static inline key_ref_t __key_update(key_ref_t key_ref,
731
				     struct key_preparsed_payload *prep)
L
Linus Torvalds 已提交
732
{
733
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
734 735 736
	int ret;

	/* need write permission on the key to update it */
737
	ret = key_permission(key_ref, KEY_NEED_WRITE);
738
	if (ret < 0)
L
Linus Torvalds 已提交
739 740 741 742 743 744 745 746
		goto error;

	ret = -EEXIST;
	if (!key->type->update)
		goto error;

	down_write(&key->sem);

747
	ret = key->type->update(key, prep);
748
	if (ret == 0)
L
Linus Torvalds 已提交
749
		/* updating a negative key instantiates it */
750
		clear_bit(KEY_FLAG_NEGATIVE, &key->flags);
L
Linus Torvalds 已提交
751 752 753 754 755

	up_write(&key->sem);

	if (ret < 0)
		goto error;
756 757
out:
	return key_ref;
L
Linus Torvalds 已提交
758

759
error:
L
Linus Torvalds 已提交
760
	key_put(key);
761
	key_ref = ERR_PTR(ret);
L
Linus Torvalds 已提交
762
	goto out;
763
}
L
Linus Torvalds 已提交
764

765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788
/**
 * key_create_or_update - Update or create and instantiate a key.
 * @keyring_ref: A pointer to the destination keyring with possession flag.
 * @type: The type of key.
 * @description: The searchable description for the key.
 * @payload: The data to use to instantiate or update the key.
 * @plen: The length of @payload.
 * @perm: The permissions mask for a new key.
 * @flags: The quota flags for a new key.
 *
 * Search the destination keyring for a key of the same description and if one
 * is found, update it, otherwise create and instantiate a new one and create a
 * link to it from that keyring.
 *
 * If perm is KEY_PERM_UNDEF then an appropriate key permissions mask will be
 * concocted.
 *
 * Returns a pointer to the new key if successful, -ENODEV if the key type
 * wasn't available, -ENOTDIR if the keyring wasn't a keyring, -EACCES if the
 * caller isn't permitted to modify the keyring or the LSM did not permit
 * creation of the key.
 *
 * On success, the possession flag from the keyring ref will be tacked on to
 * the key ref before it is returned.
L
Linus Torvalds 已提交
789
 */
790 791 792 793 794
key_ref_t key_create_or_update(key_ref_t keyring_ref,
			       const char *type,
			       const char *description,
			       const void *payload,
			       size_t plen,
795
			       key_perm_t perm,
796
			       unsigned long flags)
L
Linus Torvalds 已提交
797
{
798 799 800
	struct keyring_index_key index_key = {
		.description	= description,
	};
801
	struct key_preparsed_payload prep;
802
	struct assoc_array_edit *edit;
D
David Howells 已提交
803
	const struct cred *cred = current_cred();
804 805
	struct key *keyring, *key = NULL;
	key_ref_t key_ref;
L
Linus Torvalds 已提交
806
	int ret;
807
	key_restrict_link_func_t restrict_link = NULL;
L
Linus Torvalds 已提交
808 809 810

	/* look up the key type to see if it's one of the registered kernel
	 * types */
811 812
	index_key.type = key_type_lookup(type);
	if (IS_ERR(index_key.type)) {
813
		key_ref = ERR_PTR(-ENODEV);
L
Linus Torvalds 已提交
814 815 816
		goto error;
	}

817
	key_ref = ERR_PTR(-EINVAL);
818
	if (!index_key.type->instantiate ||
819
	    (!index_key.description && !index_key.type->preparse))
820
		goto error_put_type;
L
Linus Torvalds 已提交
821

822 823 824 825
	keyring = key_ref_to_ptr(keyring_ref);

	key_check(keyring);

826 827 828 829
	key_ref = ERR_PTR(-EPERM);
	if (!(flags & KEY_ALLOC_BYPASS_RESTRICTION))
		restrict_link = keyring->restrict_link;

830 831
	key_ref = ERR_PTR(-ENOTDIR);
	if (keyring->type != &key_type_keyring)
832 833 834 835 836
		goto error_put_type;

	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
837
	prep.quotalen = index_key.type->def_datalen;
838
	prep.expiry = TIME_T_MAX;
839 840
	if (index_key.type->preparse) {
		ret = index_key.type->preparse(&prep);
841 842
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
843
			goto error_free_prep;
844
		}
845 846
		if (!index_key.description)
			index_key.description = prep.description;
847
		key_ref = ERR_PTR(-EINVAL);
848
		if (!index_key.description)
849 850
			goto error_free_prep;
	}
851
	index_key.desc_len = strlen(index_key.description);
852

853
	if (restrict_link) {
854
		ret = restrict_link(keyring, index_key.type, &prep.payload);
855 856 857 858 859
		if (ret < 0) {
			key_ref = ERR_PTR(ret);
			goto error_free_prep;
		}
	}
860

861
	ret = __key_link_begin(keyring, &index_key, &edit);
862 863 864 865
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
		goto error_free_prep;
	}
866 867 868

	/* if we're going to allocate a new key, we're going to have
	 * to modify the keyring */
869
	ret = key_permission(keyring_ref, KEY_NEED_WRITE);
870 871
	if (ret < 0) {
		key_ref = ERR_PTR(ret);
872
		goto error_link_end;
873
	}
874

875 876 877
	/* if it's possible to update this type of key, search for an existing
	 * key of the same type and description in the destination keyring and
	 * update that instead if possible
L
Linus Torvalds 已提交
878
	 */
879
	if (index_key.type->update) {
880 881
		key_ref = find_key_to_update(keyring_ref, &index_key);
		if (key_ref)
882 883
			goto found_matching_key;
	}
L
Linus Torvalds 已提交
884

885 886 887
	/* if the client doesn't provide, decide on the permissions we want */
	if (perm == KEY_PERM_UNDEF) {
		perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR;
888
		perm |= KEY_USR_VIEW;
L
Linus Torvalds 已提交
889

890
		if (index_key.type->read)
891
			perm |= KEY_POS_READ;
L
Linus Torvalds 已提交
892

893 894
		if (index_key.type == &key_type_keyring ||
		    index_key.type->update)
895
			perm |= KEY_POS_WRITE;
896
	}
L
Linus Torvalds 已提交
897 898

	/* allocate a new key */
899
	key = key_alloc(index_key.type, index_key.description,
900
			cred->fsuid, cred->fsgid, cred, perm, flags, NULL);
L
Linus Torvalds 已提交
901
	if (IS_ERR(key)) {
902
		key_ref = ERR_CAST(key);
903
		goto error_link_end;
L
Linus Torvalds 已提交
904 905 906
	}

	/* instantiate it and link it into the target keyring */
907
	ret = __key_instantiate_and_link(key, &prep, keyring, NULL, &edit);
L
Linus Torvalds 已提交
908 909
	if (ret < 0) {
		key_put(key);
910
		key_ref = ERR_PTR(ret);
911
		goto error_link_end;
L
Linus Torvalds 已提交
912 913
	}

914 915
	key_ref = make_key_ref(key, is_key_possessed(keyring_ref));

916
error_link_end:
917
	__key_link_end(keyring, &index_key, edit);
918
error_free_prep:
919 920
	if (index_key.type->preparse)
		index_key.type->free_preparse(&prep);
921
error_put_type:
922
	key_type_put(index_key.type);
923
error:
924
	return key_ref;
L
Linus Torvalds 已提交
925 926 927 928 929

 found_matching_key:
	/* we found a matching key, so we're going to try to update it
	 * - we can drop the locks first as we have the key pinned
	 */
930
	__key_link_end(keyring, &index_key, edit);
L
Linus Torvalds 已提交
931

932 933
	key_ref = __key_update(key_ref, &prep);
	goto error_free_prep;
934
}
L
Linus Torvalds 已提交
935 936
EXPORT_SYMBOL(key_create_or_update);

937 938 939 940 941 942 943 944 945 946 947 948
/**
 * key_update - Update a key's contents.
 * @key_ref: The pointer (plus possession flag) to the key.
 * @payload: The data to be used to update the key.
 * @plen: The length of @payload.
 *
 * Attempt to update the contents of a key with the given payload data.  The
 * caller must be granted Write permission on the key.  Negative keys can be
 * instantiated by this method.
 *
 * Returns 0 on success, -EACCES if not permitted and -EOPNOTSUPP if the key
 * type does not support updating.  The key type may return other errors.
L
Linus Torvalds 已提交
949
 */
950
int key_update(key_ref_t key_ref, const void *payload, size_t plen)
L
Linus Torvalds 已提交
951
{
952
	struct key_preparsed_payload prep;
953
	struct key *key = key_ref_to_ptr(key_ref);
L
Linus Torvalds 已提交
954 955 956 957 958
	int ret;

	key_check(key);

	/* the key must be writable */
959
	ret = key_permission(key_ref, KEY_NEED_WRITE);
960
	if (ret < 0)
L
Linus Torvalds 已提交
961 962 963 964
		goto error;

	/* attempt to update it if supported */
	ret = -EOPNOTSUPP;
965 966
	if (!key->type->update)
		goto error;
L
Linus Torvalds 已提交
967

968 969 970 971
	memset(&prep, 0, sizeof(prep));
	prep.data = payload;
	prep.datalen = plen;
	prep.quotalen = key->type->def_datalen;
972
	prep.expiry = TIME_T_MAX;
973 974 975 976
	if (key->type->preparse) {
		ret = key->type->preparse(&prep);
		if (ret < 0)
			goto error;
L
Linus Torvalds 已提交
977 978
	}

979 980 981 982 983 984 985 986 987
	down_write(&key->sem);

	ret = key->type->update(key, &prep);
	if (ret == 0)
		/* updating a negative key instantiates it */
		clear_bit(KEY_FLAG_NEGATIVE, &key->flags);

	up_write(&key->sem);

988
error:
989 990
	if (key->type->preparse)
		key->type->free_preparse(&prep);
L
Linus Torvalds 已提交
991
	return ret;
992
}
L
Linus Torvalds 已提交
993 994
EXPORT_SYMBOL(key_update);

995 996 997 998 999 1000 1001 1002
/**
 * key_revoke - Revoke a key.
 * @key: The key to be revoked.
 *
 * Mark a key as being revoked and ask the type to free up its resources.  The
 * revocation timeout is set and the key and all its links will be
 * automatically garbage collected after key_gc_delay amount of time if they
 * are not manually dealt with first.
L
Linus Torvalds 已提交
1003 1004 1005
 */
void key_revoke(struct key *key)
{
1006 1007 1008
	struct timespec now;
	time_t time;

L
Linus Torvalds 已提交
1009 1010
	key_check(key);

1011 1012 1013 1014 1015 1016 1017 1018
	/* make sure no one's trying to change or use the key when we mark it
	 * - we tell lockdep that we might nest because we might be revoking an
	 *   authorisation key whilst holding the sem on a key we've just
	 *   instantiated
	 */
	down_write_nested(&key->sem, 1);
	if (!test_and_set_bit(KEY_FLAG_REVOKED, &key->flags) &&
	    key->type->revoke)
1019 1020
		key->type->revoke(key);

1021 1022 1023 1024 1025
	/* set the death time to no more than the expiry time */
	now = current_kernel_time();
	time = now.tv_sec;
	if (key->revoked_at == 0 || key->revoked_at > time) {
		key->revoked_at = time;
D
David Howells 已提交
1026
		key_schedule_gc(key->revoked_at + key_gc_delay);
1027 1028
	}

L
Linus Torvalds 已提交
1029
	up_write(&key->sem);
1030
}
L
Linus Torvalds 已提交
1031 1032
EXPORT_SYMBOL(key_revoke);

D
David Howells 已提交
1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054
/**
 * key_invalidate - Invalidate a key.
 * @key: The key to be invalidated.
 *
 * Mark a key as being invalidated and have it cleaned up immediately.  The key
 * is ignored by all searches and other operations from this point.
 */
void key_invalidate(struct key *key)
{
	kenter("%d", key_serial(key));

	key_check(key);

	if (!test_bit(KEY_FLAG_INVALIDATED, &key->flags)) {
		down_write_nested(&key->sem, 1);
		if (!test_and_set_bit(KEY_FLAG_INVALIDATED, &key->flags))
			key_schedule_gc_links();
		up_write(&key->sem);
	}
}
EXPORT_SYMBOL(key_invalidate);

1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072
/**
 * generic_key_instantiate - Simple instantiation of a key from preparsed data
 * @key: The key to be instantiated
 * @prep: The preparsed data to load.
 *
 * Instantiate a key from preparsed data.  We assume we can just copy the data
 * in directly and clear the old pointers.
 *
 * This can be pointed to directly by the key type instantiate op pointer.
 */
int generic_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
{
	int ret;

	pr_devel("==>%s()\n", __func__);

	ret = key_payload_reserve(key, prep->quotalen);
	if (ret == 0) {
1073 1074 1075 1076 1077 1078 1079 1080
		rcu_assign_keypointer(key, prep->payload.data[0]);
		key->payload.data[1] = prep->payload.data[1];
		key->payload.data[2] = prep->payload.data[2];
		key->payload.data[3] = prep->payload.data[3];
		prep->payload.data[0] = NULL;
		prep->payload.data[1] = NULL;
		prep->payload.data[2] = NULL;
		prep->payload.data[3] = NULL;
1081 1082 1083 1084 1085 1086
	}
	pr_devel("<==%s() = %d\n", __func__, ret);
	return ret;
}
EXPORT_SYMBOL(generic_key_instantiate);

1087 1088 1089 1090 1091 1092 1093
/**
 * register_key_type - Register a type of key.
 * @ktype: The new key type.
 *
 * Register a new key type.
 *
 * Returns 0 on success or -EEXIST if a type of this name already exists.
L
Linus Torvalds 已提交
1094 1095 1096 1097 1098 1099
 */
int register_key_type(struct key_type *ktype)
{
	struct key_type *p;
	int ret;

1100 1101
	memset(&ktype->lock_class, 0, sizeof(ktype->lock_class));

L
Linus Torvalds 已提交
1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112
	ret = -EEXIST;
	down_write(&key_types_sem);

	/* disallow key types with the same name */
	list_for_each_entry(p, &key_types_list, link) {
		if (strcmp(p->name, ktype->name) == 0)
			goto out;
	}

	/* store the type */
	list_add(&ktype->link, &key_types_list);
1113 1114

	pr_notice("Key type %s registered\n", ktype->name);
L
Linus Torvalds 已提交
1115 1116
	ret = 0;

1117
out:
L
Linus Torvalds 已提交
1118 1119
	up_write(&key_types_sem);
	return ret;
1120
}
L
Linus Torvalds 已提交
1121 1122
EXPORT_SYMBOL(register_key_type);

1123 1124 1125 1126 1127 1128 1129
/**
 * unregister_key_type - Unregister a type of key.
 * @ktype: The key type.
 *
 * Unregister a key type and mark all the extant keys of this type as dead.
 * Those keys of this type are then destroyed to get rid of their payloads and
 * they and their links will be garbage collected as soon as possible.
L
Linus Torvalds 已提交
1130 1131 1132 1133 1134
 */
void unregister_key_type(struct key_type *ktype)
{
	down_write(&key_types_sem);
	list_del_init(&ktype->link);
1135 1136
	downgrade_write(&key_types_sem);
	key_gc_keytype(ktype);
1137
	pr_notice("Key type %s unregistered\n", ktype->name);
1138
	up_read(&key_types_sem);
1139
}
L
Linus Torvalds 已提交
1140 1141 1142
EXPORT_SYMBOL(unregister_key_type);

/*
1143
 * Initialise the key management state.
L
Linus Torvalds 已提交
1144 1145 1146 1147 1148
 */
void __init key_init(void)
{
	/* allocate a slab in which we can store keys */
	key_jar = kmem_cache_create("key_jar", sizeof(struct key),
1149
			0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
L
Linus Torvalds 已提交
1150 1151 1152 1153 1154

	/* add the special key types */
	list_add_tail(&key_type_keyring.link, &key_types_list);
	list_add_tail(&key_type_dead.link, &key_types_list);
	list_add_tail(&key_type_user.link, &key_types_list);
J
Jeff Layton 已提交
1155
	list_add_tail(&key_type_logon.link, &key_types_list);
L
Linus Torvalds 已提交
1156 1157 1158 1159 1160 1161 1162 1163

	/* record the root user tracking */
	rb_link_node(&root_key_user.node,
		     NULL,
		     &key_user_tree.rb_node);

	rb_insert_color(&root_key_user.node,
			&key_user_tree);
1164
}