mirror of
https://github.com/torvalds/linux.git
synced 2024-12-05 02:23:16 +00:00
5ebcbe342b
Setting cred->ucounts in cred_alloc_blank does not make sense. The
uid and user_ns are deliberately not set in cred_alloc_blank but
instead the setting is delayed until key_change_session_keyring.
So move dealing with ucounts into key_change_session_keyring as well.
Unfortunately that movement of get_ucounts adds a new failure mode to
key_change_session_keyring. I do not see anything stopping the parent
process from calling setuid and changing the relevant part of it's
cred while keyctl_session_to_parent is running making it fundamentally
necessary to call get_ucounts in key_change_session_keyring. Which
means that the new failure mode cannot be avoided.
A failure of key_change_session_keyring results in a single threaded
parent keeping it's existing credentials. Which results in the parent
process not being able to access the session keyring and whichever
keys are in the new keyring.
Further get_ucounts is only expected to fail if the number of bits in
the refernece count for the structure is too few.
Since the code has no other way to report the failure of get_ucounts
and because such failures are not expected to be common add a WARN_ONCE
to report this problem to userspace.
Between the WARN_ONCE and the parent process not having access to
the keys in the new session keyring I expect any failure of get_ucounts
will be noticed and reported and we can find another way to handle this
condition. (Possibly by just making ucounts->count an atomic_long_t).
Cc: stable@vger.kernel.org
Fixes: 905ae01c4a
("Add a reference to ucounts for each cred")
Link: https://lkml.kernel.org/r/7k0ias0uf.fsf_-_@disp2133
Tested-by: Yu Zhao <yuzhao@google.com>
Reviewed-by: Alexey Gladkov <legion@kernel.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
966 lines
24 KiB
C
966 lines
24 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/* Manage a process's keyrings
|
|
*
|
|
* Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
*/
|
|
|
|
#include <linux/init.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/sched/user.h>
|
|
#include <linux/keyctl.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/err.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/security.h>
|
|
#include <linux/user_namespace.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/init_task.h>
|
|
#include <keys/request_key_auth-type.h>
|
|
#include "internal.h"
|
|
|
|
/* Session keyring create vs join semaphore */
|
|
static DEFINE_MUTEX(key_session_mutex);
|
|
|
|
/* The root user's tracking struct */
|
|
struct key_user root_key_user = {
|
|
.usage = REFCOUNT_INIT(3),
|
|
.cons_lock = __MUTEX_INITIALIZER(root_key_user.cons_lock),
|
|
.lock = __SPIN_LOCK_UNLOCKED(root_key_user.lock),
|
|
.nkeys = ATOMIC_INIT(2),
|
|
.nikeys = ATOMIC_INIT(2),
|
|
.uid = GLOBAL_ROOT_UID,
|
|
};
|
|
|
|
/*
|
|
* Get or create a user register keyring.
|
|
*/
|
|
static struct key *get_user_register(struct user_namespace *user_ns)
|
|
{
|
|
struct key *reg_keyring = READ_ONCE(user_ns->user_keyring_register);
|
|
|
|
if (reg_keyring)
|
|
return reg_keyring;
|
|
|
|
down_write(&user_ns->keyring_sem);
|
|
|
|
/* Make sure there's a register keyring. It gets owned by the
|
|
* user_namespace's owner.
|
|
*/
|
|
reg_keyring = user_ns->user_keyring_register;
|
|
if (!reg_keyring) {
|
|
reg_keyring = keyring_alloc(".user_reg",
|
|
user_ns->owner, INVALID_GID,
|
|
&init_cred,
|
|
KEY_POS_WRITE | KEY_POS_SEARCH |
|
|
KEY_USR_VIEW | KEY_USR_READ,
|
|
0,
|
|
NULL, NULL);
|
|
if (!IS_ERR(reg_keyring))
|
|
smp_store_release(&user_ns->user_keyring_register,
|
|
reg_keyring);
|
|
}
|
|
|
|
up_write(&user_ns->keyring_sem);
|
|
|
|
/* We don't return a ref since the keyring is pinned by the user_ns */
|
|
return reg_keyring;
|
|
}
|
|
|
|
/*
|
|
* Look up the user and user session keyrings for the current process's UID,
|
|
* creating them if they don't exist.
|
|
*/
|
|
int look_up_user_keyrings(struct key **_user_keyring,
|
|
struct key **_user_session_keyring)
|
|
{
|
|
const struct cred *cred = current_cred();
|
|
struct user_namespace *user_ns = current_user_ns();
|
|
struct key *reg_keyring, *uid_keyring, *session_keyring;
|
|
key_perm_t user_keyring_perm;
|
|
key_ref_t uid_keyring_r, session_keyring_r;
|
|
uid_t uid = from_kuid(user_ns, cred->user->uid);
|
|
char buf[20];
|
|
int ret;
|
|
|
|
user_keyring_perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL;
|
|
|
|
kenter("%u", uid);
|
|
|
|
reg_keyring = get_user_register(user_ns);
|
|
if (IS_ERR(reg_keyring))
|
|
return PTR_ERR(reg_keyring);
|
|
|
|
down_write(&user_ns->keyring_sem);
|
|
ret = 0;
|
|
|
|
/* Get the user keyring. Note that there may be one in existence
|
|
* already as it may have been pinned by a session, but the user_struct
|
|
* pointing to it may have been destroyed by setuid.
|
|
*/
|
|
snprintf(buf, sizeof(buf), "_uid.%u", uid);
|
|
uid_keyring_r = keyring_search(make_key_ref(reg_keyring, true),
|
|
&key_type_keyring, buf, false);
|
|
kdebug("_uid %p", uid_keyring_r);
|
|
if (uid_keyring_r == ERR_PTR(-EAGAIN)) {
|
|
uid_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID,
|
|
cred, user_keyring_perm,
|
|
KEY_ALLOC_UID_KEYRING |
|
|
KEY_ALLOC_IN_QUOTA,
|
|
NULL, reg_keyring);
|
|
if (IS_ERR(uid_keyring)) {
|
|
ret = PTR_ERR(uid_keyring);
|
|
goto error;
|
|
}
|
|
} else if (IS_ERR(uid_keyring_r)) {
|
|
ret = PTR_ERR(uid_keyring_r);
|
|
goto error;
|
|
} else {
|
|
uid_keyring = key_ref_to_ptr(uid_keyring_r);
|
|
}
|
|
|
|
/* Get a default session keyring (which might also exist already) */
|
|
snprintf(buf, sizeof(buf), "_uid_ses.%u", uid);
|
|
session_keyring_r = keyring_search(make_key_ref(reg_keyring, true),
|
|
&key_type_keyring, buf, false);
|
|
kdebug("_uid_ses %p", session_keyring_r);
|
|
if (session_keyring_r == ERR_PTR(-EAGAIN)) {
|
|
session_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID,
|
|
cred, user_keyring_perm,
|
|
KEY_ALLOC_UID_KEYRING |
|
|
KEY_ALLOC_IN_QUOTA,
|
|
NULL, NULL);
|
|
if (IS_ERR(session_keyring)) {
|
|
ret = PTR_ERR(session_keyring);
|
|
goto error_release;
|
|
}
|
|
|
|
/* We install a link from the user session keyring to
|
|
* the user keyring.
|
|
*/
|
|
ret = key_link(session_keyring, uid_keyring);
|
|
if (ret < 0)
|
|
goto error_release_session;
|
|
|
|
/* And only then link the user-session keyring to the
|
|
* register.
|
|
*/
|
|
ret = key_link(reg_keyring, session_keyring);
|
|
if (ret < 0)
|
|
goto error_release_session;
|
|
} else if (IS_ERR(session_keyring_r)) {
|
|
ret = PTR_ERR(session_keyring_r);
|
|
goto error_release;
|
|
} else {
|
|
session_keyring = key_ref_to_ptr(session_keyring_r);
|
|
}
|
|
|
|
up_write(&user_ns->keyring_sem);
|
|
|
|
if (_user_session_keyring)
|
|
*_user_session_keyring = session_keyring;
|
|
else
|
|
key_put(session_keyring);
|
|
if (_user_keyring)
|
|
*_user_keyring = uid_keyring;
|
|
else
|
|
key_put(uid_keyring);
|
|
kleave(" = 0");
|
|
return 0;
|
|
|
|
error_release_session:
|
|
key_put(session_keyring);
|
|
error_release:
|
|
key_put(uid_keyring);
|
|
error:
|
|
up_write(&user_ns->keyring_sem);
|
|
kleave(" = %d", ret);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Get the user session keyring if it exists, but don't create it if it
|
|
* doesn't.
|
|
*/
|
|
struct key *get_user_session_keyring_rcu(const struct cred *cred)
|
|
{
|
|
struct key *reg_keyring = READ_ONCE(cred->user_ns->user_keyring_register);
|
|
key_ref_t session_keyring_r;
|
|
char buf[20];
|
|
|
|
struct keyring_search_context ctx = {
|
|
.index_key.type = &key_type_keyring,
|
|
.index_key.description = buf,
|
|
.cred = cred,
|
|
.match_data.cmp = key_default_cmp,
|
|
.match_data.raw_data = buf,
|
|
.match_data.lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT,
|
|
.flags = KEYRING_SEARCH_DO_STATE_CHECK,
|
|
};
|
|
|
|
if (!reg_keyring)
|
|
return NULL;
|
|
|
|
ctx.index_key.desc_len = snprintf(buf, sizeof(buf), "_uid_ses.%u",
|
|
from_kuid(cred->user_ns,
|
|
cred->user->uid));
|
|
|
|
session_keyring_r = keyring_search_rcu(make_key_ref(reg_keyring, true),
|
|
&ctx);
|
|
if (IS_ERR(session_keyring_r))
|
|
return NULL;
|
|
return key_ref_to_ptr(session_keyring_r);
|
|
}
|
|
|
|
/*
|
|
* Install a thread keyring to the given credentials struct if it didn't have
|
|
* one already. This is allowed to overrun the quota.
|
|
*
|
|
* Return: 0 if a thread keyring is now present; -errno on failure.
|
|
*/
|
|
int install_thread_keyring_to_cred(struct cred *new)
|
|
{
|
|
struct key *keyring;
|
|
|
|
if (new->thread_keyring)
|
|
return 0;
|
|
|
|
keyring = keyring_alloc("_tid", new->uid, new->gid, new,
|
|
KEY_POS_ALL | KEY_USR_VIEW,
|
|
KEY_ALLOC_QUOTA_OVERRUN,
|
|
NULL, NULL);
|
|
if (IS_ERR(keyring))
|
|
return PTR_ERR(keyring);
|
|
|
|
new->thread_keyring = keyring;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Install a thread keyring to the current task if it didn't have one already.
|
|
*
|
|
* Return: 0 if a thread keyring is now present; -errno on failure.
|
|
*/
|
|
static int install_thread_keyring(void)
|
|
{
|
|
struct cred *new;
|
|
int ret;
|
|
|
|
new = prepare_creds();
|
|
if (!new)
|
|
return -ENOMEM;
|
|
|
|
ret = install_thread_keyring_to_cred(new);
|
|
if (ret < 0) {
|
|
abort_creds(new);
|
|
return ret;
|
|
}
|
|
|
|
return commit_creds(new);
|
|
}
|
|
|
|
/*
|
|
* Install a process keyring to the given credentials struct if it didn't have
|
|
* one already. This is allowed to overrun the quota.
|
|
*
|
|
* Return: 0 if a process keyring is now present; -errno on failure.
|
|
*/
|
|
int install_process_keyring_to_cred(struct cred *new)
|
|
{
|
|
struct key *keyring;
|
|
|
|
if (new->process_keyring)
|
|
return 0;
|
|
|
|
keyring = keyring_alloc("_pid", new->uid, new->gid, new,
|
|
KEY_POS_ALL | KEY_USR_VIEW,
|
|
KEY_ALLOC_QUOTA_OVERRUN,
|
|
NULL, NULL);
|
|
if (IS_ERR(keyring))
|
|
return PTR_ERR(keyring);
|
|
|
|
new->process_keyring = keyring;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Install a process keyring to the current task if it didn't have one already.
|
|
*
|
|
* Return: 0 if a process keyring is now present; -errno on failure.
|
|
*/
|
|
static int install_process_keyring(void)
|
|
{
|
|
struct cred *new;
|
|
int ret;
|
|
|
|
new = prepare_creds();
|
|
if (!new)
|
|
return -ENOMEM;
|
|
|
|
ret = install_process_keyring_to_cred(new);
|
|
if (ret < 0) {
|
|
abort_creds(new);
|
|
return ret;
|
|
}
|
|
|
|
return commit_creds(new);
|
|
}
|
|
|
|
/*
|
|
* Install the given keyring as the session keyring of the given credentials
|
|
* struct, replacing the existing one if any. If the given keyring is NULL,
|
|
* then install a new anonymous session keyring.
|
|
* @cred can not be in use by any task yet.
|
|
*
|
|
* Return: 0 on success; -errno on failure.
|
|
*/
|
|
int install_session_keyring_to_cred(struct cred *cred, struct key *keyring)
|
|
{
|
|
unsigned long flags;
|
|
struct key *old;
|
|
|
|
might_sleep();
|
|
|
|
/* create an empty session keyring */
|
|
if (!keyring) {
|
|
flags = KEY_ALLOC_QUOTA_OVERRUN;
|
|
if (cred->session_keyring)
|
|
flags = KEY_ALLOC_IN_QUOTA;
|
|
|
|
keyring = keyring_alloc("_ses", cred->uid, cred->gid, cred,
|
|
KEY_POS_ALL | KEY_USR_VIEW | KEY_USR_READ,
|
|
flags, NULL, NULL);
|
|
if (IS_ERR(keyring))
|
|
return PTR_ERR(keyring);
|
|
} else {
|
|
__key_get(keyring);
|
|
}
|
|
|
|
/* install the keyring */
|
|
old = cred->session_keyring;
|
|
cred->session_keyring = keyring;
|
|
|
|
if (old)
|
|
key_put(old);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Install the given keyring as the session keyring of the current task,
|
|
* replacing the existing one if any. If the given keyring is NULL, then
|
|
* install a new anonymous session keyring.
|
|
*
|
|
* Return: 0 on success; -errno on failure.
|
|
*/
|
|
static int install_session_keyring(struct key *keyring)
|
|
{
|
|
struct cred *new;
|
|
int ret;
|
|
|
|
new = prepare_creds();
|
|
if (!new)
|
|
return -ENOMEM;
|
|
|
|
ret = install_session_keyring_to_cred(new, keyring);
|
|
if (ret < 0) {
|
|
abort_creds(new);
|
|
return ret;
|
|
}
|
|
|
|
return commit_creds(new);
|
|
}
|
|
|
|
/*
|
|
* Handle the fsuid changing.
|
|
*/
|
|
void key_fsuid_changed(struct cred *new_cred)
|
|
{
|
|
/* update the ownership of the thread keyring */
|
|
if (new_cred->thread_keyring) {
|
|
down_write(&new_cred->thread_keyring->sem);
|
|
new_cred->thread_keyring->uid = new_cred->fsuid;
|
|
up_write(&new_cred->thread_keyring->sem);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Handle the fsgid changing.
|
|
*/
|
|
void key_fsgid_changed(struct cred *new_cred)
|
|
{
|
|
/* update the ownership of the thread keyring */
|
|
if (new_cred->thread_keyring) {
|
|
down_write(&new_cred->thread_keyring->sem);
|
|
new_cred->thread_keyring->gid = new_cred->fsgid;
|
|
up_write(&new_cred->thread_keyring->sem);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Search the process keyrings attached to the supplied cred for the first
|
|
* matching key under RCU conditions (the caller must be holding the RCU read
|
|
* lock).
|
|
*
|
|
* The search criteria are the type and the match function. The description is
|
|
* given to the match function as a parameter, but doesn't otherwise influence
|
|
* the search. Typically the match function will compare the description
|
|
* parameter to the key's description.
|
|
*
|
|
* This can only search keyrings that grant Search permission to the supplied
|
|
* credentials. Keyrings linked to searched keyrings will also be searched if
|
|
* they grant Search permission too. Keys can only be found if they grant
|
|
* Search permission to the credentials.
|
|
*
|
|
* Returns a pointer to the key with the key usage count incremented if
|
|
* successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only
|
|
* matched negative keys.
|
|
*
|
|
* In the case of a successful return, the possession attribute is set on the
|
|
* returned key reference.
|
|
*/
|
|
key_ref_t search_cred_keyrings_rcu(struct keyring_search_context *ctx)
|
|
{
|
|
struct key *user_session;
|
|
key_ref_t key_ref, ret, err;
|
|
const struct cred *cred = ctx->cred;
|
|
|
|
/* we want to return -EAGAIN or -ENOKEY if any of the keyrings were
|
|
* searchable, but we failed to find a key or we found a negative key;
|
|
* otherwise we want to return a sample error (probably -EACCES) if
|
|
* none of the keyrings were searchable
|
|
*
|
|
* in terms of priority: success > -ENOKEY > -EAGAIN > other error
|
|
*/
|
|
key_ref = NULL;
|
|
ret = NULL;
|
|
err = ERR_PTR(-EAGAIN);
|
|
|
|
/* search the thread keyring first */
|
|
if (cred->thread_keyring) {
|
|
key_ref = keyring_search_rcu(
|
|
make_key_ref(cred->thread_keyring, 1), ctx);
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
|
|
switch (PTR_ERR(key_ref)) {
|
|
case -EAGAIN: /* no key */
|
|
case -ENOKEY: /* negative key */
|
|
ret = key_ref;
|
|
break;
|
|
default:
|
|
err = key_ref;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* search the process keyring second */
|
|
if (cred->process_keyring) {
|
|
key_ref = keyring_search_rcu(
|
|
make_key_ref(cred->process_keyring, 1), ctx);
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
|
|
switch (PTR_ERR(key_ref)) {
|
|
case -EAGAIN: /* no key */
|
|
if (ret)
|
|
break;
|
|
fallthrough;
|
|
case -ENOKEY: /* negative key */
|
|
ret = key_ref;
|
|
break;
|
|
default:
|
|
err = key_ref;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* search the session keyring */
|
|
if (cred->session_keyring) {
|
|
key_ref = keyring_search_rcu(
|
|
make_key_ref(cred->session_keyring, 1), ctx);
|
|
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
|
|
switch (PTR_ERR(key_ref)) {
|
|
case -EAGAIN: /* no key */
|
|
if (ret)
|
|
break;
|
|
fallthrough;
|
|
case -ENOKEY: /* negative key */
|
|
ret = key_ref;
|
|
break;
|
|
default:
|
|
err = key_ref;
|
|
break;
|
|
}
|
|
}
|
|
/* or search the user-session keyring */
|
|
else if ((user_session = get_user_session_keyring_rcu(cred))) {
|
|
key_ref = keyring_search_rcu(make_key_ref(user_session, 1),
|
|
ctx);
|
|
key_put(user_session);
|
|
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
|
|
switch (PTR_ERR(key_ref)) {
|
|
case -EAGAIN: /* no key */
|
|
if (ret)
|
|
break;
|
|
fallthrough;
|
|
case -ENOKEY: /* negative key */
|
|
ret = key_ref;
|
|
break;
|
|
default:
|
|
err = key_ref;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* no key - decide on the error we're going to go for */
|
|
key_ref = ret ? ret : err;
|
|
|
|
found:
|
|
return key_ref;
|
|
}
|
|
|
|
/*
|
|
* Search the process keyrings attached to the supplied cred for the first
|
|
* matching key in the manner of search_my_process_keyrings(), but also search
|
|
* the keys attached to the assumed authorisation key using its credentials if
|
|
* one is available.
|
|
*
|
|
* The caller must be holding the RCU read lock.
|
|
*
|
|
* Return same as search_cred_keyrings_rcu().
|
|
*/
|
|
key_ref_t search_process_keyrings_rcu(struct keyring_search_context *ctx)
|
|
{
|
|
struct request_key_auth *rka;
|
|
key_ref_t key_ref, ret = ERR_PTR(-EACCES), err;
|
|
|
|
key_ref = search_cred_keyrings_rcu(ctx);
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
err = key_ref;
|
|
|
|
/* if this process has an instantiation authorisation key, then we also
|
|
* search the keyrings of the process mentioned there
|
|
* - we don't permit access to request_key auth keys via this method
|
|
*/
|
|
if (ctx->cred->request_key_auth &&
|
|
ctx->cred == current_cred() &&
|
|
ctx->index_key.type != &key_type_request_key_auth
|
|
) {
|
|
const struct cred *cred = ctx->cred;
|
|
|
|
if (key_validate(cred->request_key_auth) == 0) {
|
|
rka = ctx->cred->request_key_auth->payload.data[0];
|
|
|
|
//// was search_process_keyrings() [ie. recursive]
|
|
ctx->cred = rka->cred;
|
|
key_ref = search_cred_keyrings_rcu(ctx);
|
|
ctx->cred = cred;
|
|
|
|
if (!IS_ERR(key_ref))
|
|
goto found;
|
|
ret = key_ref;
|
|
}
|
|
}
|
|
|
|
/* no key - decide on the error we're going to go for */
|
|
if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY))
|
|
key_ref = ERR_PTR(-ENOKEY);
|
|
else if (err == ERR_PTR(-EACCES))
|
|
key_ref = ret;
|
|
else
|
|
key_ref = err;
|
|
|
|
found:
|
|
return key_ref;
|
|
}
|
|
/*
|
|
* See if the key we're looking at is the target key.
|
|
*/
|
|
bool lookup_user_key_possessed(const struct key *key,
|
|
const struct key_match_data *match_data)
|
|
{
|
|
return key == match_data->raw_data;
|
|
}
|
|
|
|
/*
|
|
* Look up a key ID given us by userspace with a given permissions mask to get
|
|
* the key it refers to.
|
|
*
|
|
* Flags can be passed to request that special keyrings be created if referred
|
|
* to directly, to permit partially constructed keys to be found and to skip
|
|
* validity and permission checks on the found key.
|
|
*
|
|
* Returns a pointer to the key with an incremented usage count if successful;
|
|
* -EINVAL if the key ID is invalid; -ENOKEY if the key ID does not correspond
|
|
* to a key or the best found key was a negative key; -EKEYREVOKED or
|
|
* -EKEYEXPIRED if the best found key was revoked or expired; -EACCES if the
|
|
* found key doesn't grant the requested permit or the LSM denied access to it;
|
|
* or -ENOMEM if a special keyring couldn't be created.
|
|
*
|
|
* In the case of a successful return, the possession attribute is set on the
|
|
* returned key reference.
|
|
*/
|
|
key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags,
|
|
enum key_need_perm need_perm)
|
|
{
|
|
struct keyring_search_context ctx = {
|
|
.match_data.cmp = lookup_user_key_possessed,
|
|
.match_data.lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT,
|
|
.flags = (KEYRING_SEARCH_NO_STATE_CHECK |
|
|
KEYRING_SEARCH_RECURSE),
|
|
};
|
|
struct request_key_auth *rka;
|
|
struct key *key, *user_session;
|
|
key_ref_t key_ref, skey_ref;
|
|
int ret;
|
|
|
|
try_again:
|
|
ctx.cred = get_current_cred();
|
|
key_ref = ERR_PTR(-ENOKEY);
|
|
|
|
switch (id) {
|
|
case KEY_SPEC_THREAD_KEYRING:
|
|
if (!ctx.cred->thread_keyring) {
|
|
if (!(lflags & KEY_LOOKUP_CREATE))
|
|
goto error;
|
|
|
|
ret = install_thread_keyring();
|
|
if (ret < 0) {
|
|
key_ref = ERR_PTR(ret);
|
|
goto error;
|
|
}
|
|
goto reget_creds;
|
|
}
|
|
|
|
key = ctx.cred->thread_keyring;
|
|
__key_get(key);
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_PROCESS_KEYRING:
|
|
if (!ctx.cred->process_keyring) {
|
|
if (!(lflags & KEY_LOOKUP_CREATE))
|
|
goto error;
|
|
|
|
ret = install_process_keyring();
|
|
if (ret < 0) {
|
|
key_ref = ERR_PTR(ret);
|
|
goto error;
|
|
}
|
|
goto reget_creds;
|
|
}
|
|
|
|
key = ctx.cred->process_keyring;
|
|
__key_get(key);
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_SESSION_KEYRING:
|
|
if (!ctx.cred->session_keyring) {
|
|
/* always install a session keyring upon access if one
|
|
* doesn't exist yet */
|
|
ret = look_up_user_keyrings(NULL, &user_session);
|
|
if (ret < 0)
|
|
goto error;
|
|
if (lflags & KEY_LOOKUP_CREATE)
|
|
ret = join_session_keyring(NULL);
|
|
else
|
|
ret = install_session_keyring(user_session);
|
|
|
|
key_put(user_session);
|
|
if (ret < 0)
|
|
goto error;
|
|
goto reget_creds;
|
|
} else if (test_bit(KEY_FLAG_UID_KEYRING,
|
|
&ctx.cred->session_keyring->flags) &&
|
|
lflags & KEY_LOOKUP_CREATE) {
|
|
ret = join_session_keyring(NULL);
|
|
if (ret < 0)
|
|
goto error;
|
|
goto reget_creds;
|
|
}
|
|
|
|
key = ctx.cred->session_keyring;
|
|
__key_get(key);
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_USER_KEYRING:
|
|
ret = look_up_user_keyrings(&key, NULL);
|
|
if (ret < 0)
|
|
goto error;
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_USER_SESSION_KEYRING:
|
|
ret = look_up_user_keyrings(NULL, &key);
|
|
if (ret < 0)
|
|
goto error;
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_GROUP_KEYRING:
|
|
/* group keyrings are not yet supported */
|
|
key_ref = ERR_PTR(-EINVAL);
|
|
goto error;
|
|
|
|
case KEY_SPEC_REQKEY_AUTH_KEY:
|
|
key = ctx.cred->request_key_auth;
|
|
if (!key)
|
|
goto error;
|
|
|
|
__key_get(key);
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
case KEY_SPEC_REQUESTOR_KEYRING:
|
|
if (!ctx.cred->request_key_auth)
|
|
goto error;
|
|
|
|
down_read(&ctx.cred->request_key_auth->sem);
|
|
if (test_bit(KEY_FLAG_REVOKED,
|
|
&ctx.cred->request_key_auth->flags)) {
|
|
key_ref = ERR_PTR(-EKEYREVOKED);
|
|
key = NULL;
|
|
} else {
|
|
rka = ctx.cred->request_key_auth->payload.data[0];
|
|
key = rka->dest_keyring;
|
|
__key_get(key);
|
|
}
|
|
up_read(&ctx.cred->request_key_auth->sem);
|
|
if (!key)
|
|
goto error;
|
|
key_ref = make_key_ref(key, 1);
|
|
break;
|
|
|
|
default:
|
|
key_ref = ERR_PTR(-EINVAL);
|
|
if (id < 1)
|
|
goto error;
|
|
|
|
key = key_lookup(id);
|
|
if (IS_ERR(key)) {
|
|
key_ref = ERR_CAST(key);
|
|
goto error;
|
|
}
|
|
|
|
key_ref = make_key_ref(key, 0);
|
|
|
|
/* check to see if we possess the key */
|
|
ctx.index_key = key->index_key;
|
|
ctx.match_data.raw_data = key;
|
|
kdebug("check possessed");
|
|
rcu_read_lock();
|
|
skey_ref = search_process_keyrings_rcu(&ctx);
|
|
rcu_read_unlock();
|
|
kdebug("possessed=%p", skey_ref);
|
|
|
|
if (!IS_ERR(skey_ref)) {
|
|
key_put(key);
|
|
key_ref = skey_ref;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
/* unlink does not use the nominated key in any way, so can skip all
|
|
* the permission checks as it is only concerned with the keyring */
|
|
if (need_perm != KEY_NEED_UNLINK) {
|
|
if (!(lflags & KEY_LOOKUP_PARTIAL)) {
|
|
ret = wait_for_key_construction(key, true);
|
|
switch (ret) {
|
|
case -ERESTARTSYS:
|
|
goto invalid_key;
|
|
default:
|
|
if (need_perm != KEY_AUTHTOKEN_OVERRIDE &&
|
|
need_perm != KEY_DEFER_PERM_CHECK)
|
|
goto invalid_key;
|
|
break;
|
|
case 0:
|
|
break;
|
|
}
|
|
} else if (need_perm != KEY_DEFER_PERM_CHECK) {
|
|
ret = key_validate(key);
|
|
if (ret < 0)
|
|
goto invalid_key;
|
|
}
|
|
|
|
ret = -EIO;
|
|
if (!(lflags & KEY_LOOKUP_PARTIAL) &&
|
|
key_read_state(key) == KEY_IS_UNINSTANTIATED)
|
|
goto invalid_key;
|
|
}
|
|
|
|
/* check the permissions */
|
|
ret = key_task_permission(key_ref, ctx.cred, need_perm);
|
|
if (ret < 0)
|
|
goto invalid_key;
|
|
|
|
key->last_used_at = ktime_get_real_seconds();
|
|
|
|
error:
|
|
put_cred(ctx.cred);
|
|
return key_ref;
|
|
|
|
invalid_key:
|
|
key_ref_put(key_ref);
|
|
key_ref = ERR_PTR(ret);
|
|
goto error;
|
|
|
|
/* if we attempted to install a keyring, then it may have caused new
|
|
* creds to be installed */
|
|
reget_creds:
|
|
put_cred(ctx.cred);
|
|
goto try_again;
|
|
}
|
|
EXPORT_SYMBOL(lookup_user_key);
|
|
|
|
/*
|
|
* Join the named keyring as the session keyring if possible else attempt to
|
|
* create a new one of that name and join that.
|
|
*
|
|
* If the name is NULL, an empty anonymous keyring will be installed as the
|
|
* session keyring.
|
|
*
|
|
* Named session keyrings are joined with a semaphore held to prevent the
|
|
* keyrings from going away whilst the attempt is made to going them and also
|
|
* to prevent a race in creating compatible session keyrings.
|
|
*/
|
|
long join_session_keyring(const char *name)
|
|
{
|
|
const struct cred *old;
|
|
struct cred *new;
|
|
struct key *keyring;
|
|
long ret, serial;
|
|
|
|
new = prepare_creds();
|
|
if (!new)
|
|
return -ENOMEM;
|
|
old = current_cred();
|
|
|
|
/* if no name is provided, install an anonymous keyring */
|
|
if (!name) {
|
|
ret = install_session_keyring_to_cred(new, NULL);
|
|
if (ret < 0)
|
|
goto error;
|
|
|
|
serial = new->session_keyring->serial;
|
|
ret = commit_creds(new);
|
|
if (ret == 0)
|
|
ret = serial;
|
|
goto okay;
|
|
}
|
|
|
|
/* allow the user to join or create a named keyring */
|
|
mutex_lock(&key_session_mutex);
|
|
|
|
/* look for an existing keyring of this name */
|
|
keyring = find_keyring_by_name(name, false);
|
|
if (PTR_ERR(keyring) == -ENOKEY) {
|
|
/* not found - try and create a new one */
|
|
keyring = keyring_alloc(
|
|
name, old->uid, old->gid, old,
|
|
KEY_POS_ALL | KEY_USR_VIEW | KEY_USR_READ | KEY_USR_LINK,
|
|
KEY_ALLOC_IN_QUOTA, NULL, NULL);
|
|
if (IS_ERR(keyring)) {
|
|
ret = PTR_ERR(keyring);
|
|
goto error2;
|
|
}
|
|
} else if (IS_ERR(keyring)) {
|
|
ret = PTR_ERR(keyring);
|
|
goto error2;
|
|
} else if (keyring == new->session_keyring) {
|
|
ret = 0;
|
|
goto error3;
|
|
}
|
|
|
|
/* we've got a keyring - now to install it */
|
|
ret = install_session_keyring_to_cred(new, keyring);
|
|
if (ret < 0)
|
|
goto error3;
|
|
|
|
commit_creds(new);
|
|
mutex_unlock(&key_session_mutex);
|
|
|
|
ret = keyring->serial;
|
|
key_put(keyring);
|
|
okay:
|
|
return ret;
|
|
|
|
error3:
|
|
key_put(keyring);
|
|
error2:
|
|
mutex_unlock(&key_session_mutex);
|
|
error:
|
|
abort_creds(new);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Replace a process's session keyring on behalf of one of its children when
|
|
* the target process is about to resume userspace execution.
|
|
*/
|
|
void key_change_session_keyring(struct callback_head *twork)
|
|
{
|
|
const struct cred *old = current_cred();
|
|
struct cred *new = container_of(twork, struct cred, rcu);
|
|
|
|
if (unlikely(current->flags & PF_EXITING)) {
|
|
put_cred(new);
|
|
return;
|
|
}
|
|
|
|
/* If get_ucounts fails more bits are needed in the refcount */
|
|
if (unlikely(!get_ucounts(old->ucounts))) {
|
|
WARN_ONCE(1, "In %s get_ucounts failed\n", __func__);
|
|
put_cred(new);
|
|
return;
|
|
}
|
|
|
|
new-> uid = old-> uid;
|
|
new-> euid = old-> euid;
|
|
new-> suid = old-> suid;
|
|
new->fsuid = old->fsuid;
|
|
new-> gid = old-> gid;
|
|
new-> egid = old-> egid;
|
|
new-> sgid = old-> sgid;
|
|
new->fsgid = old->fsgid;
|
|
new->user = get_uid(old->user);
|
|
new->ucounts = old->ucounts;
|
|
new->user_ns = get_user_ns(old->user_ns);
|
|
new->group_info = get_group_info(old->group_info);
|
|
|
|
new->securebits = old->securebits;
|
|
new->cap_inheritable = old->cap_inheritable;
|
|
new->cap_permitted = old->cap_permitted;
|
|
new->cap_effective = old->cap_effective;
|
|
new->cap_ambient = old->cap_ambient;
|
|
new->cap_bset = old->cap_bset;
|
|
|
|
new->jit_keyring = old->jit_keyring;
|
|
new->thread_keyring = key_get(old->thread_keyring);
|
|
new->process_keyring = key_get(old->process_keyring);
|
|
|
|
security_transfer_creds(new, old);
|
|
|
|
commit_creds(new);
|
|
}
|
|
|
|
/*
|
|
* Make sure that root's user and user-session keyrings exist.
|
|
*/
|
|
static int __init init_root_keyring(void)
|
|
{
|
|
return look_up_user_keyrings(NULL, NULL);
|
|
}
|
|
|
|
late_initcall(init_root_keyring);
|