2019-05-20 20:08:01 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2013-09-24 13:35:19 +04:00
|
|
|
/* General persistent per-UID keyrings register
|
|
|
|
*
|
|
|
|
* Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.
|
|
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/user_namespace.h>
|
2017-02-02 19:54:15 +03:00
|
|
|
#include <linux/cred.h>
|
|
|
|
|
2013-09-24 13:35:19 +04:00
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
unsigned persistent_keyring_expiry = 3 * 24 * 3600; /* Expire after 3 days of non-use */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create the persistent keyring register for the current user namespace.
|
|
|
|
*
|
|
|
|
* Called with the namespace's sem locked for writing.
|
|
|
|
*/
|
|
|
|
static int key_create_persistent_register(struct user_namespace *ns)
|
|
|
|
{
|
|
|
|
struct key *reg = keyring_alloc(".persistent_register",
|
|
|
|
KUIDT_INIT(0), KGIDT_INIT(0),
|
|
|
|
current_cred(),
|
2019-07-11 04:43:43 +03:00
|
|
|
((KEY_POS_ALL & ~KEY_POS_SETATTR) |
|
|
|
|
KEY_USR_VIEW | KEY_USR_READ),
|
KEYS: Add a facility to restrict new links into a keyring
Add a facility whereby proposed new links to be added to a keyring can be
vetted, permitting them to be rejected if necessary. This can be used to
block public keys from which the signature cannot be verified or for which
the signature verification fails. It could also be used to provide
blacklisting.
This affects operations like add_key(), KEYCTL_LINK and KEYCTL_INSTANTIATE.
To this end:
(1) A function pointer is added to the key struct that, if set, points to
the vetting function. This is called as:
int (*restrict_link)(struct key *keyring,
const struct key_type *key_type,
unsigned long key_flags,
const union key_payload *key_payload),
where 'keyring' will be the keyring being added to, key_type and
key_payload will describe the key being added and key_flags[*] can be
AND'ed with KEY_FLAG_TRUSTED.
[*] This parameter will be removed in a later patch when
KEY_FLAG_TRUSTED is removed.
The function should return 0 to allow the link to take place or an
error (typically -ENOKEY, -ENOPKG or -EKEYREJECTED) to reject the
link.
The pointer should not be set directly, but rather should be set
through keyring_alloc().
Note that if called during add_key(), preparse is called before this
method, but a key isn't actually allocated until after this function
is called.
(2) KEY_ALLOC_BYPASS_RESTRICTION is added. This can be passed to
key_create_or_update() or key_instantiate_and_link() to bypass the
restriction check.
(3) KEY_FLAG_TRUSTED_ONLY is removed. The entire contents of a keyring
with this restriction emplaced can be considered 'trustworthy' by
virtue of being in the keyring when that keyring is consulted.
(4) key_alloc() and keyring_alloc() take an extra argument that will be
used to set restrict_link in the new key. This ensures that the
pointer is set before the key is published, thus preventing a window
of unrestrictedness. Normally this argument will be NULL.
(5) As a temporary affair, keyring_restrict_trusted_only() is added. It
should be passed to keyring_alloc() as the extra argument instead of
setting KEY_FLAG_TRUSTED_ONLY on a keyring. This will be replaced in
a later patch with functions that look in the appropriate places for
authoritative keys.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2016-04-06 18:14:24 +03:00
|
|
|
KEY_ALLOC_NOT_IN_QUOTA, NULL, NULL);
|
2013-09-24 13:35:19 +04:00
|
|
|
if (IS_ERR(reg))
|
|
|
|
return PTR_ERR(reg);
|
|
|
|
|
|
|
|
ns->persistent_keyring_register = reg;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create the persistent keyring for the specified user.
|
|
|
|
*
|
|
|
|
* Called with the namespace's sem locked for writing.
|
|
|
|
*/
|
|
|
|
static key_ref_t key_create_persistent(struct user_namespace *ns, kuid_t uid,
|
|
|
|
struct keyring_index_key *index_key)
|
|
|
|
{
|
|
|
|
struct key *persistent;
|
|
|
|
key_ref_t reg_ref, persistent_ref;
|
|
|
|
|
|
|
|
if (!ns->persistent_keyring_register) {
|
|
|
|
long err = key_create_persistent_register(ns);
|
|
|
|
if (err < 0)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
} else {
|
|
|
|
reg_ref = make_key_ref(ns->persistent_keyring_register, true);
|
|
|
|
persistent_ref = find_key_to_update(reg_ref, index_key);
|
|
|
|
if (persistent_ref)
|
|
|
|
return persistent_ref;
|
|
|
|
}
|
|
|
|
|
|
|
|
persistent = keyring_alloc(index_key->description,
|
|
|
|
uid, INVALID_GID, current_cred(),
|
2019-07-11 04:43:43 +03:00
|
|
|
((KEY_POS_ALL & ~KEY_POS_SETATTR) |
|
|
|
|
KEY_USR_VIEW | KEY_USR_READ),
|
KEYS: Add a facility to restrict new links into a keyring
Add a facility whereby proposed new links to be added to a keyring can be
vetted, permitting them to be rejected if necessary. This can be used to
block public keys from which the signature cannot be verified or for which
the signature verification fails. It could also be used to provide
blacklisting.
This affects operations like add_key(), KEYCTL_LINK and KEYCTL_INSTANTIATE.
To this end:
(1) A function pointer is added to the key struct that, if set, points to
the vetting function. This is called as:
int (*restrict_link)(struct key *keyring,
const struct key_type *key_type,
unsigned long key_flags,
const union key_payload *key_payload),
where 'keyring' will be the keyring being added to, key_type and
key_payload will describe the key being added and key_flags[*] can be
AND'ed with KEY_FLAG_TRUSTED.
[*] This parameter will be removed in a later patch when
KEY_FLAG_TRUSTED is removed.
The function should return 0 to allow the link to take place or an
error (typically -ENOKEY, -ENOPKG or -EKEYREJECTED) to reject the
link.
The pointer should not be set directly, but rather should be set
through keyring_alloc().
Note that if called during add_key(), preparse is called before this
method, but a key isn't actually allocated until after this function
is called.
(2) KEY_ALLOC_BYPASS_RESTRICTION is added. This can be passed to
key_create_or_update() or key_instantiate_and_link() to bypass the
restriction check.
(3) KEY_FLAG_TRUSTED_ONLY is removed. The entire contents of a keyring
with this restriction emplaced can be considered 'trustworthy' by
virtue of being in the keyring when that keyring is consulted.
(4) key_alloc() and keyring_alloc() take an extra argument that will be
used to set restrict_link in the new key. This ensures that the
pointer is set before the key is published, thus preventing a window
of unrestrictedness. Normally this argument will be NULL.
(5) As a temporary affair, keyring_restrict_trusted_only() is added. It
should be passed to keyring_alloc() as the extra argument instead of
setting KEY_FLAG_TRUSTED_ONLY on a keyring. This will be replaced in
a later patch with functions that look in the appropriate places for
authoritative keys.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2016-04-06 18:14:24 +03:00
|
|
|
KEY_ALLOC_NOT_IN_QUOTA, NULL,
|
2013-09-24 13:35:19 +04:00
|
|
|
ns->persistent_keyring_register);
|
|
|
|
if (IS_ERR(persistent))
|
|
|
|
return ERR_CAST(persistent);
|
|
|
|
|
|
|
|
return make_key_ref(persistent, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get the persistent keyring for a specific UID and link it to the nominated
|
|
|
|
* keyring.
|
|
|
|
*/
|
|
|
|
static long key_get_persistent(struct user_namespace *ns, kuid_t uid,
|
|
|
|
key_ref_t dest_ref)
|
|
|
|
{
|
|
|
|
struct keyring_index_key index_key;
|
|
|
|
struct key *persistent;
|
|
|
|
key_ref_t reg_ref, persistent_ref;
|
|
|
|
char buf[32];
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
/* Look in the register if it exists */
|
2019-06-26 23:02:32 +03:00
|
|
|
memset(&index_key, 0, sizeof(index_key));
|
2013-09-24 13:35:19 +04:00
|
|
|
index_key.type = &key_type_keyring;
|
|
|
|
index_key.description = buf;
|
|
|
|
index_key.desc_len = sprintf(buf, "_persistent.%u", from_kuid(ns, uid));
|
2019-06-26 23:02:31 +03:00
|
|
|
key_set_index_key(&index_key);
|
2013-09-24 13:35:19 +04:00
|
|
|
|
|
|
|
if (ns->persistent_keyring_register) {
|
|
|
|
reg_ref = make_key_ref(ns->persistent_keyring_register, true);
|
2019-06-26 23:02:32 +03:00
|
|
|
down_read(&ns->keyring_sem);
|
2013-09-24 13:35:19 +04:00
|
|
|
persistent_ref = find_key_to_update(reg_ref, &index_key);
|
2019-06-26 23:02:32 +03:00
|
|
|
up_read(&ns->keyring_sem);
|
2013-09-24 13:35:19 +04:00
|
|
|
|
|
|
|
if (persistent_ref)
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It wasn't in the register, so we'll need to create it. We might
|
|
|
|
* also need to create the register.
|
|
|
|
*/
|
2019-06-26 23:02:32 +03:00
|
|
|
down_write(&ns->keyring_sem);
|
2013-09-24 13:35:19 +04:00
|
|
|
persistent_ref = key_create_persistent(ns, uid, &index_key);
|
2019-06-26 23:02:32 +03:00
|
|
|
up_write(&ns->keyring_sem);
|
2013-09-24 13:35:19 +04:00
|
|
|
if (!IS_ERR(persistent_ref))
|
|
|
|
goto found;
|
|
|
|
|
|
|
|
return PTR_ERR(persistent_ref);
|
|
|
|
|
|
|
|
found:
|
2014-03-14 21:44:49 +04:00
|
|
|
ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK);
|
2013-09-24 13:35:19 +04:00
|
|
|
if (ret == 0) {
|
|
|
|
persistent = key_ref_to_ptr(persistent_ref);
|
|
|
|
ret = key_link(key_ref_to_ptr(dest_ref), persistent);
|
|
|
|
if (ret == 0) {
|
|
|
|
key_set_timeout(persistent, persistent_keyring_expiry);
|
2016-06-14 12:29:44 +03:00
|
|
|
ret = persistent->serial;
|
2013-09-24 13:35:19 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
key_ref_put(persistent_ref);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get the persistent keyring for a specific UID and link it to the nominated
|
|
|
|
* keyring.
|
|
|
|
*/
|
|
|
|
long keyctl_get_persistent(uid_t _uid, key_serial_t destid)
|
|
|
|
{
|
|
|
|
struct user_namespace *ns = current_user_ns();
|
|
|
|
key_ref_t dest_ref;
|
|
|
|
kuid_t uid;
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
/* -1 indicates the current user */
|
|
|
|
if (_uid == (uid_t)-1) {
|
|
|
|
uid = current_uid();
|
|
|
|
} else {
|
|
|
|
uid = make_kuid(ns, _uid);
|
|
|
|
if (!uid_valid(uid))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* You can only see your own persistent cache if you're not
|
|
|
|
* sufficiently privileged.
|
|
|
|
*/
|
2013-11-06 18:01:51 +04:00
|
|
|
if (!uid_eq(uid, current_uid()) &&
|
|
|
|
!uid_eq(uid, current_euid()) &&
|
2013-09-24 13:35:19 +04:00
|
|
|
!ns_capable(ns, CAP_SETUID))
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* There must be a destination keyring */
|
2014-03-14 21:44:49 +04:00
|
|
|
dest_ref = lookup_user_key(destid, KEY_LOOKUP_CREATE, KEY_NEED_WRITE);
|
2013-09-24 13:35:19 +04:00
|
|
|
if (IS_ERR(dest_ref))
|
|
|
|
return PTR_ERR(dest_ref);
|
|
|
|
if (key_ref_to_ptr(dest_ref)->type != &key_type_keyring) {
|
|
|
|
ret = -ENOTDIR;
|
|
|
|
goto out_put_dest;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = key_get_persistent(ns, uid, dest_ref);
|
|
|
|
|
|
|
|
out_put_dest:
|
|
|
|
key_ref_put(dest_ref);
|
|
|
|
return ret;
|
|
|
|
}
|