KEYS: Don't permit request_key() to construct a new keyring
authorDavid Howells <dhowells@redhat.com>
Mon, 19 Oct 2015 10:20:28 +0000 (11:20 +0100)
committerDavid Howells <dhowells@redhat.com>
Mon, 19 Oct 2015 10:24:51 +0000 (11:24 +0100)
commit911b79cde95c7da0ec02f48105358a36636b7a71
tree623ed8957cae8115b835018968fec344fba9677d
parentf05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
KEYS: Don't permit request_key() to construct a new keyring

If request_key() is used to find a keyring, only do the search part - don't
do the construction part if the keyring was not found by the search.  We
don't really want keyrings in the negative instantiated state since the
rejected/negative instantiation error value in the payload is unioned with
keyring metadata.

Now the kernel gives an error:

request_key("keyring", "#selinux,bdekeyring", "keyring", KEY_SPEC_USER_SESSION_KEYRING) = -1 EPERM (Operation not permitted)

Signed-off-by: David Howells <dhowells@redhat.com>
security/keys/request_key.c