2005-04-17 06:20:36 +08:00
|
|
|
/* keyctl.c: userspace keyctl operations
|
|
|
|
*
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
* Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
|
2005-04-17 06:20:36 +08:00
|
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/sched.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/syscalls.h>
|
|
|
|
#include <linux/keyctl.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/err.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* extract the description of a new key from userspace and either add it as a
|
|
|
|
* new key to the specified keyring or update a matching key in that keyring
|
|
|
|
* - the keyring must be writable
|
|
|
|
* - returns the new key's serial number
|
|
|
|
* - implements add_key()
|
|
|
|
*/
|
|
|
|
asmlinkage long sys_add_key(const char __user *_type,
|
|
|
|
const char __user *_description,
|
|
|
|
const void __user *_payload,
|
|
|
|
size_t plen,
|
|
|
|
key_serial_t ringid)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t keyring_ref, key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
char type[32], *description;
|
|
|
|
void *payload;
|
|
|
|
long dlen, ret;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (plen > 32767)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
/* draw all the data into kernel space */
|
|
|
|
ret = strncpy_from_user(type, _type, sizeof(type) - 1);
|
|
|
|
if (ret < 0)
|
|
|
|
goto error;
|
|
|
|
type[31] = '\0';
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
ret = -EPERM;
|
|
|
|
if (type[0] == '.')
|
|
|
|
goto error;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
ret = -EFAULT;
|
|
|
|
dlen = strnlen_user(_description, PAGE_SIZE - 1);
|
|
|
|
if (dlen <= 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (dlen > PAGE_SIZE - 1)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
description = kmalloc(dlen + 1, GFP_KERNEL);
|
|
|
|
if (!description)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(description, _description, dlen + 1) != 0)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
/* pull the payload in if one was supplied */
|
|
|
|
payload = NULL;
|
|
|
|
|
|
|
|
if (_payload) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
payload = kmalloc(plen, GFP_KERNEL);
|
|
|
|
if (!payload)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(payload, _payload, plen) != 0)
|
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* find the target keyring (which must be writable) */
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* create or update the requested key and add it to the target
|
|
|
|
* keyring */
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = key_create_or_update(keyring_ref, type, description,
|
|
|
|
payload, plen, 0);
|
|
|
|
if (!IS_ERR(key_ref)) {
|
|
|
|
ret = key_ref_to_ptr(key_ref)->serial;
|
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
else {
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error3:
|
|
|
|
kfree(payload);
|
|
|
|
error2:
|
|
|
|
kfree(description);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end sys_add_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* search the process keyrings for a matching key
|
|
|
|
* - nested keyrings may also be searched if they have Search permission
|
|
|
|
* - if a key is found, it will be attached to the destination keyring if
|
|
|
|
* there's one specified
|
|
|
|
* - /sbin/request-key will be invoked if _callout_info is non-NULL
|
|
|
|
* - the _callout_info string will be passed to /sbin/request-key
|
|
|
|
* - if the _callout_info string is empty, it will be rendered as "-"
|
|
|
|
* - implements request_key()
|
|
|
|
*/
|
|
|
|
asmlinkage long sys_request_key(const char __user *_type,
|
|
|
|
const char __user *_description,
|
|
|
|
const char __user *_callout_info,
|
|
|
|
key_serial_t destringid)
|
|
|
|
{
|
|
|
|
struct key_type *ktype;
|
2005-09-29 00:03:15 +08:00
|
|
|
struct key *key;
|
|
|
|
key_ref_t dest_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
char type[32], *description, *callout_info;
|
|
|
|
long dlen, ret;
|
|
|
|
|
|
|
|
/* pull the type into kernel space */
|
|
|
|
ret = strncpy_from_user(type, _type, sizeof(type) - 1);
|
|
|
|
if (ret < 0)
|
|
|
|
goto error;
|
|
|
|
type[31] = '\0';
|
|
|
|
|
2005-08-04 18:50:01 +08:00
|
|
|
ret = -EPERM;
|
|
|
|
if (type[0] == '.')
|
|
|
|
goto error;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* pull the description into kernel space */
|
|
|
|
ret = -EFAULT;
|
|
|
|
dlen = strnlen_user(_description, PAGE_SIZE - 1);
|
|
|
|
if (dlen <= 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (dlen > PAGE_SIZE - 1)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
description = kmalloc(dlen + 1, GFP_KERNEL);
|
|
|
|
if (!description)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(description, _description, dlen + 1) != 0)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
/* pull the callout info into kernel space */
|
|
|
|
callout_info = NULL;
|
|
|
|
if (_callout_info) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
dlen = strnlen_user(_callout_info, PAGE_SIZE - 1);
|
|
|
|
if (dlen <= 0)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (dlen > PAGE_SIZE - 1)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
callout_info = kmalloc(dlen + 1, GFP_KERNEL);
|
|
|
|
if (!callout_info)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(callout_info, _callout_info, dlen + 1) != 0)
|
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get the destination keyring if specified */
|
2005-09-29 00:03:15 +08:00
|
|
|
dest_ref = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (destringid) {
|
2005-09-29 00:03:15 +08:00
|
|
|
dest_ref = lookup_user_key(NULL, destringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(dest_ref)) {
|
|
|
|
ret = PTR_ERR(dest_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* find the key type */
|
|
|
|
ktype = key_type_lookup(type);
|
|
|
|
if (IS_ERR(ktype)) {
|
|
|
|
ret = PTR_ERR(ktype);
|
|
|
|
goto error4;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* do the search */
|
2005-09-29 00:03:15 +08:00
|
|
|
key = request_key_and_link(ktype, description, callout_info,
|
|
|
|
key_ref_to_ptr(dest_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
if (IS_ERR(key)) {
|
|
|
|
ret = PTR_ERR(key);
|
|
|
|
goto error5;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = key->serial;
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
key_put(key);
|
2005-04-17 06:20:36 +08:00
|
|
|
error5:
|
|
|
|
key_type_put(ktype);
|
|
|
|
error4:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(dest_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error3:
|
|
|
|
kfree(callout_info);
|
|
|
|
error2:
|
|
|
|
kfree(description);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end sys_request_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* get the ID of the specified process keyring
|
|
|
|
* - the keyring must have search permission to be found
|
|
|
|
* - implements keyctl(KEYCTL_GET_KEYRING_ID)
|
|
|
|
*/
|
|
|
|
long keyctl_get_keyring_ID(key_serial_t id, int create)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, create, 0, KEY_SEARCH);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_ref_to_ptr(key_ref)->serial;
|
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_get_keyring_ID() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* join the session keyring
|
|
|
|
* - implements keyctl(KEYCTL_JOIN_SESSION_KEYRING)
|
|
|
|
*/
|
|
|
|
long keyctl_join_session_keyring(const char __user *_name)
|
|
|
|
{
|
|
|
|
char *name;
|
|
|
|
long nlen, ret;
|
|
|
|
|
|
|
|
/* fetch the name from userspace */
|
|
|
|
name = NULL;
|
|
|
|
if (_name) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
nlen = strnlen_user(_name, PAGE_SIZE - 1);
|
|
|
|
if (nlen <= 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (nlen > PAGE_SIZE - 1)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
name = kmalloc(nlen + 1, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(name, _name, nlen + 1) != 0)
|
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* join the session */
|
|
|
|
ret = join_session_keyring(name);
|
|
|
|
|
|
|
|
error2:
|
|
|
|
kfree(name);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_join_session_keyring() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* update a key's data payload
|
|
|
|
* - the key must be writable
|
|
|
|
* - implements keyctl(KEYCTL_UPDATE)
|
|
|
|
*/
|
|
|
|
long keyctl_update_key(key_serial_t id,
|
|
|
|
const void __user *_payload,
|
|
|
|
size_t plen)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
void *payload;
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (plen > PAGE_SIZE)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
/* pull the payload in if one was supplied */
|
|
|
|
payload = NULL;
|
|
|
|
if (_payload) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
payload = kmalloc(plen, GFP_KERNEL);
|
|
|
|
if (!payload)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(payload, _payload, plen) != 0)
|
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* find the target key (which must be writable) */
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 0, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* update the key */
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_update(key_ref, payload, plen);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
|
|
|
kfree(payload);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_update_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* revoke a key
|
|
|
|
* - the key must be writable
|
|
|
|
* - implements keyctl(KEYCTL_REVOKE)
|
|
|
|
*/
|
|
|
|
long keyctl_revoke_key(key_serial_t id)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 0, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_revoke(key_ref_to_ptr(key_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
ret = 0;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
2005-08-04 18:50:01 +08:00
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
} /* end keyctl_revoke_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* clear the specified process keyring
|
|
|
|
* - the keyring must be writable
|
|
|
|
* - implements keyctl(KEYCTL_CLEAR)
|
|
|
|
*/
|
|
|
|
long keyctl_keyring_clear(key_serial_t ringid)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t keyring_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = keyring_clear(key_ref_to_ptr(keyring_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_keyring_clear() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* link a key into a keyring
|
|
|
|
* - the keyring must be writable
|
|
|
|
* - the key must be linkable
|
|
|
|
* - implements keyctl(KEYCTL_LINK)
|
|
|
|
*/
|
|
|
|
long keyctl_keyring_link(key_serial_t id, key_serial_t ringid)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t keyring_ref, key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 1, 0, KEY_LINK);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_link(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_keyring_link() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* unlink the first attachment of a key from a keyring
|
|
|
|
* - the keyring must be writable
|
|
|
|
* - we don't need any permissions on the key
|
|
|
|
* - implements keyctl(KEYCTL_UNLINK)
|
|
|
|
*/
|
|
|
|
long keyctl_keyring_unlink(key_serial_t id, key_serial_t ringid)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t keyring_ref, key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 0, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 0, 0, 0);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_unlink(key_ref_to_ptr(keyring_ref), key_ref_to_ptr(key_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_keyring_unlink() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* describe a user key
|
|
|
|
* - the key must have view permission
|
|
|
|
* - if there's a buffer, we place up to buflen bytes of data into it
|
|
|
|
* - unless there's an error, we return the amount of description available,
|
|
|
|
* irrespective of how much we may have copied
|
|
|
|
* - the description is formatted thus:
|
|
|
|
* type;uid;gid;perm;description<NUL>
|
|
|
|
* - implements keyctl(KEYCTL_DESCRIBE)
|
|
|
|
*/
|
|
|
|
long keyctl_describe_key(key_serial_t keyid,
|
|
|
|
char __user *buffer,
|
|
|
|
size_t buflen)
|
|
|
|
{
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
struct key *key, *instkey;
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
char *tmpbuf;
|
|
|
|
long ret;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, keyid, 0, 1, KEY_VIEW);
|
|
|
|
if (IS_ERR(key_ref)) {
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
/* viewing a key under construction is permitted if we have the
|
|
|
|
* authorisation token handy */
|
2005-09-29 00:03:15 +08:00
|
|
|
if (PTR_ERR(key_ref) == -EACCES) {
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
instkey = key_get_instantiation_authkey(keyid);
|
|
|
|
if (!IS_ERR(instkey)) {
|
|
|
|
key_put(instkey);
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, keyid,
|
|
|
|
0, 1, 0);
|
|
|
|
if (!IS_ERR(key_ref))
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
goto okay;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
okay:
|
2005-04-17 06:20:36 +08:00
|
|
|
/* calculate how much description we're going to return */
|
|
|
|
ret = -ENOMEM;
|
|
|
|
tmpbuf = kmalloc(PAGE_SIZE, GFP_KERNEL);
|
|
|
|
if (!tmpbuf)
|
|
|
|
goto error2;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key = key_ref_to_ptr(key_ref);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
ret = snprintf(tmpbuf, PAGE_SIZE - 1,
|
2005-09-29 00:03:15 +08:00
|
|
|
"%s;%d;%d;%08x;%s",
|
|
|
|
key_ref_to_ptr(key_ref)->type->name,
|
|
|
|
key_ref_to_ptr(key_ref)->uid,
|
|
|
|
key_ref_to_ptr(key_ref)->gid,
|
|
|
|
key_ref_to_ptr(key_ref)->perm,
|
|
|
|
key_ref_to_ptr(key_ref)->description ?
|
|
|
|
key_ref_to_ptr(key_ref)->description : ""
|
2005-04-17 06:20:36 +08:00
|
|
|
);
|
|
|
|
|
|
|
|
/* include a NUL char at the end of the data */
|
|
|
|
if (ret > PAGE_SIZE - 1)
|
|
|
|
ret = PAGE_SIZE - 1;
|
|
|
|
tmpbuf[ret] = 0;
|
|
|
|
ret++;
|
|
|
|
|
|
|
|
/* consider returning the data */
|
|
|
|
if (buffer && buflen > 0) {
|
|
|
|
if (buflen > ret)
|
|
|
|
buflen = ret;
|
|
|
|
|
|
|
|
if (copy_to_user(buffer, tmpbuf, buflen) != 0)
|
|
|
|
ret = -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
kfree(tmpbuf);
|
|
|
|
error2:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_describe_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* search the specified keyring for a matching key
|
|
|
|
* - the start keyring must be searchable
|
|
|
|
* - nested keyrings may also be searched if they are searchable
|
|
|
|
* - only keys with search permission may be found
|
|
|
|
* - if a key is found, it will be attached to the destination keyring if
|
|
|
|
* there's one specified
|
|
|
|
* - implements keyctl(KEYCTL_SEARCH)
|
|
|
|
*/
|
|
|
|
long keyctl_keyring_search(key_serial_t ringid,
|
|
|
|
const char __user *_type,
|
|
|
|
const char __user *_description,
|
|
|
|
key_serial_t destringid)
|
|
|
|
{
|
|
|
|
struct key_type *ktype;
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t keyring_ref, key_ref, dest_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
char type[32], *description;
|
|
|
|
long dlen, ret;
|
|
|
|
|
|
|
|
/* pull the type and description into kernel space */
|
|
|
|
ret = strncpy_from_user(type, _type, sizeof(type) - 1);
|
|
|
|
if (ret < 0)
|
|
|
|
goto error;
|
|
|
|
type[31] = '\0';
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
dlen = strnlen_user(_description, PAGE_SIZE - 1);
|
|
|
|
if (dlen <= 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (dlen > PAGE_SIZE - 1)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
description = kmalloc(dlen + 1, GFP_KERNEL);
|
|
|
|
if (!description)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(description, _description, dlen + 1) != 0)
|
|
|
|
goto error2;
|
|
|
|
|
|
|
|
/* get the keyring at which to begin the search */
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 0, 0, KEY_SEARCH);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get the destination keyring if specified */
|
2005-09-29 00:03:15 +08:00
|
|
|
dest_ref = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (destringid) {
|
2005-09-29 00:03:15 +08:00
|
|
|
dest_ref = lookup_user_key(NULL, destringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(dest_ref)) {
|
|
|
|
ret = PTR_ERR(dest_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* find the key type */
|
|
|
|
ktype = key_type_lookup(type);
|
|
|
|
if (IS_ERR(ktype)) {
|
|
|
|
ret = PTR_ERR(ktype);
|
|
|
|
goto error4;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* do the search */
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = keyring_search(keyring_ref, ktype, description);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* treat lack or presence of a negative key the same */
|
|
|
|
if (ret == -EAGAIN)
|
|
|
|
ret = -ENOKEY;
|
|
|
|
goto error5;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* link the resulting key to the destination keyring if we can */
|
2005-09-29 00:03:15 +08:00
|
|
|
if (dest_ref) {
|
2005-10-31 07:02:44 +08:00
|
|
|
ret = key_permission(key_ref, KEY_LINK);
|
|
|
|
if (ret < 0)
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error6;
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_link(key_ref_to_ptr(dest_ref), key_ref_to_ptr(key_ref));
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto error6;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_ref_to_ptr(key_ref)->serial;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
error6:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error5:
|
|
|
|
key_type_put(ktype);
|
|
|
|
error4:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(dest_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error3:
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
|
|
|
kfree(description);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_keyring_search() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* read a user key's payload
|
|
|
|
* - the keyring must be readable or the key must be searchable from the
|
|
|
|
* process's keyrings
|
|
|
|
* - if there's a buffer, we place up to buflen bytes of data into it
|
|
|
|
* - unless there's an error, we return the amount of data in the key,
|
|
|
|
* irrespective of how much we may have copied
|
|
|
|
* - implements keyctl(KEYCTL_READ)
|
|
|
|
*/
|
|
|
|
long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen)
|
|
|
|
{
|
2005-09-29 00:03:15 +08:00
|
|
|
struct key *key;
|
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
|
|
|
/* find the key first */
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref = lookup_user_key(NULL, keyid, 0, 0, 0);
|
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = -ENOKEY;
|
|
|
|
goto error;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key = key_ref_to_ptr(key_ref);
|
|
|
|
|
|
|
|
/* see if we can read it directly */
|
2005-10-31 07:02:44 +08:00
|
|
|
ret = key_permission(key_ref, KEY_READ);
|
|
|
|
if (ret == 0)
|
2005-09-29 00:03:15 +08:00
|
|
|
goto can_read_key;
|
2005-10-31 07:02:44 +08:00
|
|
|
if (ret != -EACCES)
|
|
|
|
goto error;
|
2005-09-29 00:03:15 +08:00
|
|
|
|
|
|
|
/* we can't; see if it's searchable from this process's keyrings
|
|
|
|
* - we automatically take account of the fact that it may be
|
|
|
|
* dangling off an instantiation key
|
|
|
|
*/
|
|
|
|
if (!is_key_possessed(key_ref)) {
|
|
|
|
ret = -EACCES;
|
|
|
|
goto error2;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* the key is probably readable - now try to read it */
|
|
|
|
can_read_key:
|
|
|
|
ret = key_validate(key);
|
|
|
|
if (ret == 0) {
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
if (key->type->read) {
|
|
|
|
/* read the data with the semaphore held (since we
|
|
|
|
* might sleep) */
|
|
|
|
down_read(&key->sem);
|
|
|
|
ret = key->type->read(key, buffer, buflen);
|
|
|
|
up_read(&key->sem);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
error2:
|
|
|
|
key_put(key);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_read_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* change the ownership of a key
|
|
|
|
* - the keyring owned by the changer
|
|
|
|
* - if the uid or gid is -1, then that parameter is not changed
|
|
|
|
* - implements keyctl(KEYCTL_CHOWN)
|
|
|
|
*/
|
|
|
|
long keyctl_chown_key(key_serial_t id, uid_t uid, gid_t gid)
|
|
|
|
{
|
|
|
|
struct key *key;
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
if (uid == (uid_t) -1 && gid == (gid_t) -1)
|
|
|
|
goto error;
|
|
|
|
|
2005-10-31 07:02:44 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 1, 1, KEY_SETATTR);
|
2005-09-29 00:03:15 +08:00
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key = key_ref_to_ptr(key_ref);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* make the changes with the locks held to prevent chown/chown races */
|
|
|
|
ret = -EACCES;
|
|
|
|
down_write(&key->sem);
|
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) {
|
|
|
|
/* only the sysadmin can chown a key to some other UID */
|
|
|
|
if (uid != (uid_t) -1 && key->uid != uid)
|
|
|
|
goto no_access;
|
|
|
|
|
|
|
|
/* only the sysadmin can set the key's GID to a group other
|
|
|
|
* than one of those that the current process subscribes to */
|
|
|
|
if (gid != (gid_t) -1 && gid != key->gid && !in_group_p(gid))
|
|
|
|
goto no_access;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* change the UID (have to update the quotas) */
|
|
|
|
if (uid != (uid_t) -1 && uid != key->uid) {
|
|
|
|
/* don't support UID changing yet */
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto no_access;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* change the GID */
|
|
|
|
if (gid != (gid_t) -1)
|
|
|
|
key->gid = gid;
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
no_access:
|
|
|
|
up_write(&key->sem);
|
|
|
|
key_put(key);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_chown_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* change the permission mask on a key
|
|
|
|
* - the keyring owned by the changer
|
|
|
|
* - implements keyctl(KEYCTL_SETPERM)
|
|
|
|
*/
|
|
|
|
long keyctl_setperm_key(key_serial_t id, key_perm_t perm)
|
|
|
|
{
|
|
|
|
struct key *key;
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_t key_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
2005-09-29 00:03:15 +08:00
|
|
|
if (perm & ~(KEY_POS_ALL | KEY_USR_ALL | KEY_GRP_ALL | KEY_OTH_ALL))
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
|
2005-10-31 07:02:44 +08:00
|
|
|
key_ref = lookup_user_key(NULL, id, 1, 1, KEY_SETATTR);
|
2005-09-29 00:03:15 +08:00
|
|
|
if (IS_ERR(key_ref)) {
|
|
|
|
ret = PTR_ERR(key_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key = key_ref_to_ptr(key_ref);
|
|
|
|
|
2005-06-24 13:00:49 +08:00
|
|
|
/* make the changes with the locks held to prevent chown/chmod races */
|
2005-04-17 06:20:36 +08:00
|
|
|
ret = -EACCES;
|
|
|
|
down_write(&key->sem);
|
|
|
|
|
2005-06-24 13:00:49 +08:00
|
|
|
/* if we're not the sysadmin, we can only change a key that we own */
|
|
|
|
if (capable(CAP_SYS_ADMIN) || key->uid == current->fsuid) {
|
|
|
|
key->perm = perm;
|
|
|
|
ret = 0;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
up_write(&key->sem);
|
|
|
|
key_put(key);
|
2005-06-24 13:00:49 +08:00
|
|
|
error:
|
2005-04-17 06:20:36 +08:00
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_setperm_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* instantiate the key with the specified payload, and, if one is given, link
|
|
|
|
* the key into the keyring
|
|
|
|
*/
|
|
|
|
long keyctl_instantiate_key(key_serial_t id,
|
|
|
|
const void __user *_payload,
|
|
|
|
size_t plen,
|
|
|
|
key_serial_t ringid)
|
|
|
|
{
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
struct request_key_auth *rka;
|
2005-09-29 00:03:15 +08:00
|
|
|
struct key *instkey;
|
|
|
|
key_ref_t keyring_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
void *payload;
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (plen > 32767)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
/* pull the payload in if one was supplied */
|
|
|
|
payload = NULL;
|
|
|
|
|
|
|
|
if (_payload) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
payload = kmalloc(plen, GFP_KERNEL);
|
|
|
|
if (!payload)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ret = -EFAULT;
|
|
|
|
if (copy_from_user(payload, _payload, plen) != 0)
|
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
/* find the instantiation authorisation key */
|
|
|
|
instkey = key_get_instantiation_authkey(id);
|
|
|
|
if (IS_ERR(instkey)) {
|
|
|
|
ret = PTR_ERR(instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
rka = instkey->payload.data;
|
|
|
|
|
|
|
|
/* find the destination keyring amongst those belonging to the
|
|
|
|
* requesting task */
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ringid) {
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(rka->context, ringid, 1, 0,
|
|
|
|
KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error3;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* instantiate the key and link it into a keyring */
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
ret = key_instantiate_and_link(rka->target_key, payload, plen,
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_to_ptr(keyring_ref), instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error3:
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
key_put(instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
|
|
|
kfree(payload);
|
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_instantiate_key() */
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* negatively instantiate the key with the given timeout (in seconds), and, if
|
|
|
|
* one is given, link the key into the keyring
|
|
|
|
*/
|
|
|
|
long keyctl_negate_key(key_serial_t id, unsigned timeout, key_serial_t ringid)
|
|
|
|
{
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
struct request_key_auth *rka;
|
2005-09-29 00:03:15 +08:00
|
|
|
struct key *instkey;
|
|
|
|
key_ref_t keyring_ref;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret;
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
/* find the instantiation authorisation key */
|
|
|
|
instkey = key_get_instantiation_authkey(id);
|
|
|
|
if (IS_ERR(instkey)) {
|
|
|
|
ret = PTR_ERR(instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
rka = instkey->payload.data;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* find the destination keyring if present (which must also be
|
|
|
|
* writable) */
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ringid) {
|
2005-09-29 00:03:15 +08:00
|
|
|
keyring_ref = lookup_user_key(NULL, ringid, 1, 0, KEY_WRITE);
|
|
|
|
if (IS_ERR(keyring_ref)) {
|
|
|
|
ret = PTR_ERR(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto error2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* instantiate the key and link it into a keyring */
|
2005-09-29 00:03:15 +08:00
|
|
|
ret = key_negate_and_link(rka->target_key, timeout,
|
|
|
|
key_ref_to_ptr(keyring_ref), instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-29 00:03:15 +08:00
|
|
|
key_ref_put(keyring_ref);
|
2005-04-17 06:20:36 +08:00
|
|
|
error2:
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
key_put(instkey);
|
2005-04-17 06:20:36 +08:00
|
|
|
error:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
} /* end keyctl_negate_key() */
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* set the default keyring in which request_key() will cache keys
|
|
|
|
* - return the old setting
|
|
|
|
*/
|
|
|
|
long keyctl_set_reqkey_keyring(int reqkey_defl)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (reqkey_defl) {
|
|
|
|
case KEY_REQKEY_DEFL_THREAD_KEYRING:
|
|
|
|
ret = install_thread_keyring(current);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
goto set;
|
|
|
|
|
|
|
|
case KEY_REQKEY_DEFL_PROCESS_KEYRING:
|
|
|
|
ret = install_process_keyring(current);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
case KEY_REQKEY_DEFL_DEFAULT:
|
|
|
|
case KEY_REQKEY_DEFL_SESSION_KEYRING:
|
|
|
|
case KEY_REQKEY_DEFL_USER_KEYRING:
|
|
|
|
case KEY_REQKEY_DEFL_USER_SESSION_KEYRING:
|
|
|
|
set:
|
|
|
|
current->jit_keyring = reqkey_defl;
|
|
|
|
|
|
|
|
case KEY_REQKEY_DEFL_NO_CHANGE:
|
|
|
|
return current->jit_keyring;
|
|
|
|
|
|
|
|
case KEY_REQKEY_DEFL_GROUP_KEYRING:
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
} /* end keyctl_set_reqkey_keyring() */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
|
|
* the key control system call
|
|
|
|
*/
|
|
|
|
asmlinkage long sys_keyctl(int option, unsigned long arg2, unsigned long arg3,
|
|
|
|
unsigned long arg4, unsigned long arg5)
|
|
|
|
{
|
|
|
|
switch (option) {
|
|
|
|
case KEYCTL_GET_KEYRING_ID:
|
|
|
|
return keyctl_get_keyring_ID((key_serial_t) arg2,
|
|
|
|
(int) arg3);
|
|
|
|
|
|
|
|
case KEYCTL_JOIN_SESSION_KEYRING:
|
|
|
|
return keyctl_join_session_keyring((const char __user *) arg2);
|
|
|
|
|
|
|
|
case KEYCTL_UPDATE:
|
|
|
|
return keyctl_update_key((key_serial_t) arg2,
|
|
|
|
(const void __user *) arg3,
|
|
|
|
(size_t) arg4);
|
|
|
|
|
|
|
|
case KEYCTL_REVOKE:
|
|
|
|
return keyctl_revoke_key((key_serial_t) arg2);
|
|
|
|
|
|
|
|
case KEYCTL_DESCRIBE:
|
|
|
|
return keyctl_describe_key((key_serial_t) arg2,
|
|
|
|
(char __user *) arg3,
|
|
|
|
(unsigned) arg4);
|
|
|
|
|
|
|
|
case KEYCTL_CLEAR:
|
|
|
|
return keyctl_keyring_clear((key_serial_t) arg2);
|
|
|
|
|
|
|
|
case KEYCTL_LINK:
|
|
|
|
return keyctl_keyring_link((key_serial_t) arg2,
|
|
|
|
(key_serial_t) arg3);
|
|
|
|
|
|
|
|
case KEYCTL_UNLINK:
|
|
|
|
return keyctl_keyring_unlink((key_serial_t) arg2,
|
|
|
|
(key_serial_t) arg3);
|
|
|
|
|
|
|
|
case KEYCTL_SEARCH:
|
|
|
|
return keyctl_keyring_search((key_serial_t) arg2,
|
|
|
|
(const char __user *) arg3,
|
|
|
|
(const char __user *) arg4,
|
|
|
|
(key_serial_t) arg5);
|
|
|
|
|
|
|
|
case KEYCTL_READ:
|
|
|
|
return keyctl_read_key((key_serial_t) arg2,
|
|
|
|
(char __user *) arg3,
|
|
|
|
(size_t) arg4);
|
|
|
|
|
|
|
|
case KEYCTL_CHOWN:
|
|
|
|
return keyctl_chown_key((key_serial_t) arg2,
|
|
|
|
(uid_t) arg3,
|
|
|
|
(gid_t) arg4);
|
|
|
|
|
|
|
|
case KEYCTL_SETPERM:
|
|
|
|
return keyctl_setperm_key((key_serial_t) arg2,
|
|
|
|
(key_perm_t) arg3);
|
|
|
|
|
|
|
|
case KEYCTL_INSTANTIATE:
|
|
|
|
return keyctl_instantiate_key((key_serial_t) arg2,
|
|
|
|
(const void __user *) arg3,
|
|
|
|
(size_t) arg4,
|
|
|
|
(key_serial_t) arg5);
|
|
|
|
|
|
|
|
case KEYCTL_NEGATE:
|
|
|
|
return keyctl_negate_key((key_serial_t) arg2,
|
|
|
|
(unsigned) arg3,
|
|
|
|
(key_serial_t) arg4);
|
|
|
|
|
[PATCH] Keys: Make request-key create an authorisation key
The attached patch makes the following changes:
(1) There's a new special key type called ".request_key_auth".
This is an authorisation key for when one process requests a key and
another process is started to construct it. This type of key cannot be
created by the user; nor can it be requested by kernel services.
Authorisation keys hold two references:
(a) Each refers to a key being constructed. When the key being
constructed is instantiated the authorisation key is revoked,
rendering it of no further use.
(b) The "authorising process". This is either:
(i) the process that called request_key(), or:
(ii) if the process that called request_key() itself had an
authorisation key in its session keyring, then the authorising
process referred to by that authorisation key will also be
referred to by the new authorisation key.
This means that the process that initiated a chain of key requests
will authorise the lot of them, and will, by default, wind up with
the keys obtained from them in its keyrings.
(2) request_key() creates an authorisation key which is then passed to
/sbin/request-key in as part of a new session keyring.
(3) When request_key() is searching for a key to hand back to the caller, if
it comes across an authorisation key in the session keyring of the
calling process, it will also search the keyrings of the process
specified therein and it will use the specified process's credentials
(fsuid, fsgid, groups) to do that rather than the calling process's
credentials.
This allows a process started by /sbin/request-key to find keys belonging
to the authorising process.
(4) A key can be read, even if the process executing KEYCTL_READ doesn't have
direct read or search permission if that key is contained within the
keyrings of a process specified by an authorisation key found within the
calling process's session keyring, and is searchable using the
credentials of the authorising process.
This allows a process started by /sbin/request-key to read keys belonging
to the authorising process.
(5) The magic KEY_SPEC_*_KEYRING key IDs when passed to KEYCTL_INSTANTIATE or
KEYCTL_NEGATE will specify a keyring of the authorising process, rather
than the process doing the instantiation.
(6) One of the process keyrings can be nominated as the default to which
request_key() should attach new keys if not otherwise specified. This is
done with KEYCTL_SET_REQKEY_KEYRING and one of the KEY_REQKEY_DEFL_*
constants. The current setting can also be read using this call.
(7) request_key() is partially interruptible. If it is waiting for another
process to finish constructing a key, it can be interrupted. This permits
a request-key cycle to be broken without recourse to rebooting.
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-Off-By: Benoit Boissinot <benoit.boissinot@ens-lyon.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-06-24 13:00:56 +08:00
|
|
|
case KEYCTL_SET_REQKEY_KEYRING:
|
|
|
|
return keyctl_set_reqkey_keyring(arg2);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
default:
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
} /* end sys_keyctl() */
|