Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / security / keys / process_keys.c
1 /* Management of a process's keyrings
2 *
3 * Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
12 #include <linux/module.h>
13 #include <linux/init.h>
14 #include <linux/sched.h>
15 #include <linux/slab.h>
16 #include <linux/keyctl.h>
17 #include <linux/fs.h>
18 #include <linux/err.h>
19 #include <linux/mutex.h>
20 #include <asm/uaccess.h>
21 #include "internal.h"
22
23 /* session keyring create vs join semaphore */
24 static DEFINE_MUTEX(key_session_mutex);
25
26 /* user keyring creation semaphore */
27 static DEFINE_MUTEX(key_user_keyring_mutex);
28
29 /* the root user's tracking struct */
30 struct key_user root_key_user = {
31 .usage = ATOMIC_INIT(3),
32 .cons_lock = __MUTEX_INITIALIZER(root_key_user.cons_lock),
33 .lock = __SPIN_LOCK_UNLOCKED(root_key_user.lock),
34 .nkeys = ATOMIC_INIT(2),
35 .nikeys = ATOMIC_INIT(2),
36 .uid = 0,
37 };
38
39 /*****************************************************************************/
40 /*
41 * install user and user session keyrings for a particular UID
42 */
43 static int install_user_keyrings(struct task_struct *tsk)
44 {
45 struct user_struct *user = tsk->user;
46 struct key *uid_keyring, *session_keyring;
47 char buf[20];
48 int ret;
49
50 kenter("%p{%u}", user, user->uid);
51
52 if (user->uid_keyring) {
53 kleave(" = 0 [exist]");
54 return 0;
55 }
56
57 mutex_lock(&key_user_keyring_mutex);
58 ret = 0;
59
60 if (!user->uid_keyring) {
61 /* get the UID-specific keyring
62 * - there may be one in existence already as it may have been
63 * pinned by a session, but the user_struct pointing to it
64 * may have been destroyed by setuid */
65 sprintf(buf, "_uid.%u", user->uid);
66
67 uid_keyring = find_keyring_by_name(buf, true);
68 if (IS_ERR(uid_keyring)) {
69 uid_keyring = keyring_alloc(buf, user->uid, (gid_t) -1,
70 tsk, KEY_ALLOC_IN_QUOTA,
71 NULL);
72 if (IS_ERR(uid_keyring)) {
73 ret = PTR_ERR(uid_keyring);
74 goto error;
75 }
76 }
77
78 /* get a default session keyring (which might also exist
79 * already) */
80 sprintf(buf, "_uid_ses.%u", user->uid);
81
82 session_keyring = find_keyring_by_name(buf, true);
83 if (IS_ERR(session_keyring)) {
84 session_keyring =
85 keyring_alloc(buf, user->uid, (gid_t) -1,
86 tsk, KEY_ALLOC_IN_QUOTA, NULL);
87 if (IS_ERR(session_keyring)) {
88 ret = PTR_ERR(session_keyring);
89 goto error_release;
90 }
91
92 /* we install a link from the user session keyring to
93 * the user keyring */
94 ret = key_link(session_keyring, uid_keyring);
95 if (ret < 0)
96 goto error_release_both;
97 }
98
99 /* install the keyrings */
100 user->uid_keyring = uid_keyring;
101 user->session_keyring = session_keyring;
102 }
103
104 mutex_unlock(&key_user_keyring_mutex);
105 kleave(" = 0");
106 return 0;
107
108 error_release_both:
109 key_put(session_keyring);
110 error_release:
111 key_put(uid_keyring);
112 error:
113 mutex_unlock(&key_user_keyring_mutex);
114 kleave(" = %d", ret);
115 return ret;
116 }
117
118 /*****************************************************************************/
119 /*
120 * deal with the UID changing
121 */
122 void switch_uid_keyring(struct user_struct *new_user)
123 {
124 #if 0 /* do nothing for now */
125 struct key *old;
126
127 /* switch to the new user's session keyring if we were running under
128 * root's default session keyring */
129 if (new_user->uid != 0 &&
130 current->session_keyring == &root_session_keyring
131 ) {
132 atomic_inc(&new_user->session_keyring->usage);
133
134 task_lock(current);
135 old = current->session_keyring;
136 current->session_keyring = new_user->session_keyring;
137 task_unlock(current);
138
139 key_put(old);
140 }
141 #endif
142
143 } /* end switch_uid_keyring() */
144
145 /*****************************************************************************/
146 /*
147 * install a fresh thread keyring, discarding the old one
148 */
149 int install_thread_keyring(struct task_struct *tsk)
150 {
151 struct key *keyring, *old;
152 char buf[20];
153 int ret;
154
155 sprintf(buf, "_tid.%u", tsk->pid);
156
157 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
158 KEY_ALLOC_QUOTA_OVERRUN, NULL);
159 if (IS_ERR(keyring)) {
160 ret = PTR_ERR(keyring);
161 goto error;
162 }
163
164 task_lock(tsk);
165 old = tsk->thread_keyring;
166 tsk->thread_keyring = keyring;
167 task_unlock(tsk);
168
169 ret = 0;
170
171 key_put(old);
172 error:
173 return ret;
174
175 } /* end install_thread_keyring() */
176
177 /*****************************************************************************/
178 /*
179 * make sure a process keyring is installed
180 */
181 int install_process_keyring(struct task_struct *tsk)
182 {
183 struct key *keyring;
184 char buf[20];
185 int ret;
186
187 might_sleep();
188
189 if (!tsk->signal->process_keyring) {
190 sprintf(buf, "_pid.%u", tsk->tgid);
191
192 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
193 KEY_ALLOC_QUOTA_OVERRUN, NULL);
194 if (IS_ERR(keyring)) {
195 ret = PTR_ERR(keyring);
196 goto error;
197 }
198
199 /* attach keyring */
200 spin_lock_irq(&tsk->sighand->siglock);
201 if (!tsk->signal->process_keyring) {
202 tsk->signal->process_keyring = keyring;
203 keyring = NULL;
204 }
205 spin_unlock_irq(&tsk->sighand->siglock);
206
207 key_put(keyring);
208 }
209
210 ret = 0;
211 error:
212 return ret;
213
214 } /* end install_process_keyring() */
215
216 /*****************************************************************************/
217 /*
218 * install a session keyring, discarding the old one
219 * - if a keyring is not supplied, an empty one is invented
220 */
221 static int install_session_keyring(struct task_struct *tsk,
222 struct key *keyring)
223 {
224 unsigned long flags;
225 struct key *old;
226 char buf[20];
227
228 might_sleep();
229
230 /* create an empty session keyring */
231 if (!keyring) {
232 sprintf(buf, "_ses.%u", tsk->tgid);
233
234 flags = KEY_ALLOC_QUOTA_OVERRUN;
235 if (tsk->signal->session_keyring)
236 flags = KEY_ALLOC_IN_QUOTA;
237
238 keyring = keyring_alloc(buf, tsk->uid, tsk->gid, tsk,
239 flags, NULL);
240 if (IS_ERR(keyring))
241 return PTR_ERR(keyring);
242 }
243 else {
244 atomic_inc(&keyring->usage);
245 }
246
247 /* install the keyring */
248 spin_lock_irq(&tsk->sighand->siglock);
249 old = tsk->signal->session_keyring;
250 rcu_assign_pointer(tsk->signal->session_keyring, keyring);
251 spin_unlock_irq(&tsk->sighand->siglock);
252
253 /* we're using RCU on the pointer, but there's no point synchronising
254 * on it if it didn't previously point to anything */
255 if (old) {
256 synchronize_rcu();
257 key_put(old);
258 }
259
260 return 0;
261
262 } /* end install_session_keyring() */
263
264 /*****************************************************************************/
265 /*
266 * copy the keys in a thread group for fork without CLONE_THREAD
267 */
268 int copy_thread_group_keys(struct task_struct *tsk)
269 {
270 key_check(current->thread_group->session_keyring);
271 key_check(current->thread_group->process_keyring);
272
273 /* no process keyring yet */
274 tsk->signal->process_keyring = NULL;
275
276 /* same session keyring */
277 rcu_read_lock();
278 tsk->signal->session_keyring =
279 key_get(rcu_dereference(current->signal->session_keyring));
280 rcu_read_unlock();
281
282 return 0;
283
284 } /* end copy_thread_group_keys() */
285
286 /*****************************************************************************/
287 /*
288 * copy the keys for fork
289 */
290 int copy_keys(unsigned long clone_flags, struct task_struct *tsk)
291 {
292 key_check(tsk->thread_keyring);
293 key_check(tsk->request_key_auth);
294
295 /* no thread keyring yet */
296 tsk->thread_keyring = NULL;
297
298 /* copy the request_key() authorisation for this thread */
299 key_get(tsk->request_key_auth);
300
301 return 0;
302
303 } /* end copy_keys() */
304
305 /*****************************************************************************/
306 /*
307 * dispose of thread group keys upon thread group destruction
308 */
309 void exit_thread_group_keys(struct signal_struct *tg)
310 {
311 key_put(tg->session_keyring);
312 key_put(tg->process_keyring);
313
314 } /* end exit_thread_group_keys() */
315
316 /*****************************************************************************/
317 /*
318 * dispose of per-thread keys upon thread exit
319 */
320 void exit_keys(struct task_struct *tsk)
321 {
322 key_put(tsk->thread_keyring);
323 key_put(tsk->request_key_auth);
324
325 } /* end exit_keys() */
326
327 /*****************************************************************************/
328 /*
329 * deal with execve()
330 */
331 int exec_keys(struct task_struct *tsk)
332 {
333 struct key *old;
334
335 /* newly exec'd tasks don't get a thread keyring */
336 task_lock(tsk);
337 old = tsk->thread_keyring;
338 tsk->thread_keyring = NULL;
339 task_unlock(tsk);
340
341 key_put(old);
342
343 /* discard the process keyring from a newly exec'd task */
344 spin_lock_irq(&tsk->sighand->siglock);
345 old = tsk->signal->process_keyring;
346 tsk->signal->process_keyring = NULL;
347 spin_unlock_irq(&tsk->sighand->siglock);
348
349 key_put(old);
350
351 return 0;
352
353 } /* end exec_keys() */
354
355 /*****************************************************************************/
356 /*
357 * deal with SUID programs
358 * - we might want to make this invent a new session keyring
359 */
360 int suid_keys(struct task_struct *tsk)
361 {
362 return 0;
363
364 } /* end suid_keys() */
365
366 /*****************************************************************************/
367 /*
368 * the filesystem user ID changed
369 */
370 void key_fsuid_changed(struct task_struct *tsk)
371 {
372 /* update the ownership of the thread keyring */
373 if (tsk->thread_keyring) {
374 down_write(&tsk->thread_keyring->sem);
375 tsk->thread_keyring->uid = tsk->fsuid;
376 up_write(&tsk->thread_keyring->sem);
377 }
378
379 } /* end key_fsuid_changed() */
380
381 /*****************************************************************************/
382 /*
383 * the filesystem group ID changed
384 */
385 void key_fsgid_changed(struct task_struct *tsk)
386 {
387 /* update the ownership of the thread keyring */
388 if (tsk->thread_keyring) {
389 down_write(&tsk->thread_keyring->sem);
390 tsk->thread_keyring->gid = tsk->fsgid;
391 up_write(&tsk->thread_keyring->sem);
392 }
393
394 } /* end key_fsgid_changed() */
395
396 /*****************************************************************************/
397 /*
398 * search the process keyrings for the first matching key
399 * - we use the supplied match function to see if the description (or other
400 * feature of interest) matches
401 * - we return -EAGAIN if we didn't find any matching key
402 * - we return -ENOKEY if we found only negative matching keys
403 */
404 key_ref_t search_process_keyrings(struct key_type *type,
405 const void *description,
406 key_match_func_t match,
407 struct task_struct *context)
408 {
409 struct request_key_auth *rka;
410 key_ref_t key_ref, ret, err;
411
412 might_sleep();
413
414 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were
415 * searchable, but we failed to find a key or we found a negative key;
416 * otherwise we want to return a sample error (probably -EACCES) if
417 * none of the keyrings were searchable
418 *
419 * in terms of priority: success > -ENOKEY > -EAGAIN > other error
420 */
421 key_ref = NULL;
422 ret = NULL;
423 err = ERR_PTR(-EAGAIN);
424
425 /* search the thread keyring first */
426 if (context->thread_keyring) {
427 key_ref = keyring_search_aux(
428 make_key_ref(context->thread_keyring, 1),
429 context, type, description, match);
430 if (!IS_ERR(key_ref))
431 goto found;
432
433 switch (PTR_ERR(key_ref)) {
434 case -EAGAIN: /* no key */
435 if (ret)
436 break;
437 case -ENOKEY: /* negative key */
438 ret = key_ref;
439 break;
440 default:
441 err = key_ref;
442 break;
443 }
444 }
445
446 /* search the process keyring second */
447 if (context->signal->process_keyring) {
448 key_ref = keyring_search_aux(
449 make_key_ref(context->signal->process_keyring, 1),
450 context, type, description, match);
451 if (!IS_ERR(key_ref))
452 goto found;
453
454 switch (PTR_ERR(key_ref)) {
455 case -EAGAIN: /* no key */
456 if (ret)
457 break;
458 case -ENOKEY: /* negative key */
459 ret = key_ref;
460 break;
461 default:
462 err = key_ref;
463 break;
464 }
465 }
466
467 /* search the session keyring */
468 if (context->signal->session_keyring) {
469 rcu_read_lock();
470 key_ref = keyring_search_aux(
471 make_key_ref(rcu_dereference(
472 context->signal->session_keyring),
473 1),
474 context, type, description, match);
475 rcu_read_unlock();
476
477 if (!IS_ERR(key_ref))
478 goto found;
479
480 switch (PTR_ERR(key_ref)) {
481 case -EAGAIN: /* no key */
482 if (ret)
483 break;
484 case -ENOKEY: /* negative key */
485 ret = key_ref;
486 break;
487 default:
488 err = key_ref;
489 break;
490 }
491 }
492 /* or search the user-session keyring */
493 else if (context->user->session_keyring) {
494 key_ref = keyring_search_aux(
495 make_key_ref(context->user->session_keyring, 1),
496 context, type, description, match);
497 if (!IS_ERR(key_ref))
498 goto found;
499
500 switch (PTR_ERR(key_ref)) {
501 case -EAGAIN: /* no key */
502 if (ret)
503 break;
504 case -ENOKEY: /* negative key */
505 ret = key_ref;
506 break;
507 default:
508 err = key_ref;
509 break;
510 }
511 }
512
513 /* if this process has an instantiation authorisation key, then we also
514 * search the keyrings of the process mentioned there
515 * - we don't permit access to request_key auth keys via this method
516 */
517 if (context->request_key_auth &&
518 context == current &&
519 type != &key_type_request_key_auth
520 ) {
521 /* defend against the auth key being revoked */
522 down_read(&context->request_key_auth->sem);
523
524 if (key_validate(context->request_key_auth) == 0) {
525 rka = context->request_key_auth->payload.data;
526
527 key_ref = search_process_keyrings(type, description,
528 match, rka->context);
529
530 up_read(&context->request_key_auth->sem);
531
532 if (!IS_ERR(key_ref))
533 goto found;
534
535 switch (PTR_ERR(key_ref)) {
536 case -EAGAIN: /* no key */
537 if (ret)
538 break;
539 case -ENOKEY: /* negative key */
540 ret = key_ref;
541 break;
542 default:
543 err = key_ref;
544 break;
545 }
546 } else {
547 up_read(&context->request_key_auth->sem);
548 }
549 }
550
551 /* no key - decide on the error we're going to go for */
552 key_ref = ret ? ret : err;
553
554 found:
555 return key_ref;
556
557 } /* end search_process_keyrings() */
558
559 /*****************************************************************************/
560 /*
561 * see if the key we're looking at is the target key
562 */
563 static int lookup_user_key_possessed(const struct key *key, const void *target)
564 {
565 return key == target;
566
567 } /* end lookup_user_key_possessed() */
568
569 /*****************************************************************************/
570 /*
571 * lookup a key given a key ID from userspace with a given permissions mask
572 * - don't create special keyrings unless so requested
573 * - partially constructed keys aren't found unless requested
574 */
575 key_ref_t lookup_user_key(struct task_struct *context, key_serial_t id,
576 int create, int partial, key_perm_t perm)
577 {
578 key_ref_t key_ref, skey_ref;
579 struct key *key;
580 int ret;
581
582 if (!context)
583 context = current;
584
585 key_ref = ERR_PTR(-ENOKEY);
586
587 switch (id) {
588 case KEY_SPEC_THREAD_KEYRING:
589 if (!context->thread_keyring) {
590 if (!create)
591 goto error;
592
593 ret = install_thread_keyring(context);
594 if (ret < 0) {
595 key = ERR_PTR(ret);
596 goto error;
597 }
598 }
599
600 key = context->thread_keyring;
601 atomic_inc(&key->usage);
602 key_ref = make_key_ref(key, 1);
603 break;
604
605 case KEY_SPEC_PROCESS_KEYRING:
606 if (!context->signal->process_keyring) {
607 if (!create)
608 goto error;
609
610 ret = install_process_keyring(context);
611 if (ret < 0) {
612 key = ERR_PTR(ret);
613 goto error;
614 }
615 }
616
617 key = context->signal->process_keyring;
618 atomic_inc(&key->usage);
619 key_ref = make_key_ref(key, 1);
620 break;
621
622 case KEY_SPEC_SESSION_KEYRING:
623 if (!context->signal->session_keyring) {
624 /* always install a session keyring upon access if one
625 * doesn't exist yet */
626 ret = install_user_keyrings(context);
627 if (ret < 0)
628 goto error;
629 ret = install_session_keyring(
630 context, context->user->session_keyring);
631 if (ret < 0)
632 goto error;
633 }
634
635 rcu_read_lock();
636 key = rcu_dereference(context->signal->session_keyring);
637 atomic_inc(&key->usage);
638 rcu_read_unlock();
639 key_ref = make_key_ref(key, 1);
640 break;
641
642 case KEY_SPEC_USER_KEYRING:
643 if (!context->user->uid_keyring) {
644 ret = install_user_keyrings(context);
645 if (ret < 0)
646 goto error;
647 }
648
649 key = context->user->uid_keyring;
650 atomic_inc(&key->usage);
651 key_ref = make_key_ref(key, 1);
652 break;
653
654 case KEY_SPEC_USER_SESSION_KEYRING:
655 if (!context->user->session_keyring) {
656 ret = install_user_keyrings(context);
657 if (ret < 0)
658 goto error;
659 }
660
661 key = context->user->session_keyring;
662 atomic_inc(&key->usage);
663 key_ref = make_key_ref(key, 1);
664 break;
665
666 case KEY_SPEC_GROUP_KEYRING:
667 /* group keyrings are not yet supported */
668 key = ERR_PTR(-EINVAL);
669 goto error;
670
671 case KEY_SPEC_REQKEY_AUTH_KEY:
672 key = context->request_key_auth;
673 if (!key)
674 goto error;
675
676 atomic_inc(&key->usage);
677 key_ref = make_key_ref(key, 1);
678 break;
679
680 default:
681 key_ref = ERR_PTR(-EINVAL);
682 if (id < 1)
683 goto error;
684
685 key = key_lookup(id);
686 if (IS_ERR(key)) {
687 key_ref = ERR_CAST(key);
688 goto error;
689 }
690
691 key_ref = make_key_ref(key, 0);
692
693 /* check to see if we possess the key */
694 skey_ref = search_process_keyrings(key->type, key,
695 lookup_user_key_possessed,
696 current);
697
698 if (!IS_ERR(skey_ref)) {
699 key_put(key);
700 key_ref = skey_ref;
701 }
702
703 break;
704 }
705
706 if (!partial) {
707 ret = wait_for_key_construction(key, true);
708 switch (ret) {
709 case -ERESTARTSYS:
710 goto invalid_key;
711 default:
712 if (perm)
713 goto invalid_key;
714 case 0:
715 break;
716 }
717 } else if (perm) {
718 ret = key_validate(key);
719 if (ret < 0)
720 goto invalid_key;
721 }
722
723 ret = -EIO;
724 if (!partial && !test_bit(KEY_FLAG_INSTANTIATED, &key->flags))
725 goto invalid_key;
726
727 /* check the permissions */
728 ret = key_task_permission(key_ref, context, perm);
729 if (ret < 0)
730 goto invalid_key;
731
732 error:
733 return key_ref;
734
735 invalid_key:
736 key_ref_put(key_ref);
737 key_ref = ERR_PTR(ret);
738 goto error;
739
740 } /* end lookup_user_key() */
741
742 /*****************************************************************************/
743 /*
744 * join the named keyring as the session keyring if possible, or attempt to
745 * create a new one of that name if not
746 * - if the name is NULL, an empty anonymous keyring is installed instead
747 * - named session keyring joining is done with a semaphore held
748 */
749 long join_session_keyring(const char *name)
750 {
751 struct task_struct *tsk = current;
752 struct key *keyring;
753 long ret;
754
755 /* if no name is provided, install an anonymous keyring */
756 if (!name) {
757 ret = install_session_keyring(tsk, NULL);
758 if (ret < 0)
759 goto error;
760
761 rcu_read_lock();
762 ret = rcu_dereference(tsk->signal->session_keyring)->serial;
763 rcu_read_unlock();
764 goto error;
765 }
766
767 /* allow the user to join or create a named keyring */
768 mutex_lock(&key_session_mutex);
769
770 /* look for an existing keyring of this name */
771 keyring = find_keyring_by_name(name, false);
772 if (PTR_ERR(keyring) == -ENOKEY) {
773 /* not found - try and create a new one */
774 keyring = keyring_alloc(name, tsk->uid, tsk->gid, tsk,
775 KEY_ALLOC_IN_QUOTA, NULL);
776 if (IS_ERR(keyring)) {
777 ret = PTR_ERR(keyring);
778 goto error2;
779 }
780 }
781 else if (IS_ERR(keyring)) {
782 ret = PTR_ERR(keyring);
783 goto error2;
784 }
785
786 /* we've got a keyring - now to install it */
787 ret = install_session_keyring(tsk, keyring);
788 if (ret < 0)
789 goto error2;
790
791 ret = keyring->serial;
792 key_put(keyring);
793
794 error2:
795 mutex_unlock(&key_session_mutex);
796 error:
797 return ret;
798
799 } /* end join_session_keyring() */