diff options
Diffstat (limited to 'security/keys/user_defined.c')
| -rw-r--r-- | security/keys/user_defined.c | 129 | 
1 files changed, 71 insertions, 58 deletions
diff --git a/security/keys/user_defined.c b/security/keys/user_defined.c index e9aa0792965..faa2caeb593 100644 --- a/security/keys/user_defined.c +++ b/security/keys/user_defined.c @@ -18,34 +18,56 @@  #include <asm/uaccess.h>  #include "internal.h" +static int logon_vet_description(const char *desc); +  /*   * user defined keys take an arbitrary string as the description and an   * arbitrary blob of data as the payload   */  struct key_type key_type_user = { -	.name		= "user", -	.instantiate	= user_instantiate, -	.update		= user_update, -	.match		= user_match, -	.revoke		= user_revoke, -	.destroy	= user_destroy, -	.describe	= user_describe, -	.read		= user_read, +	.name			= "user", +	.def_lookup_type	= KEYRING_SEARCH_LOOKUP_DIRECT, +	.instantiate		= user_instantiate, +	.update			= user_update, +	.match			= user_match, +	.revoke			= user_revoke, +	.destroy		= user_destroy, +	.describe		= user_describe, +	.read			= user_read,  };  EXPORT_SYMBOL_GPL(key_type_user); -/*****************************************************************************/ +/* + * This key type is essentially the same as key_type_user, but it does + * not define a .read op. This is suitable for storing username and + * password pairs in the keyring that you do not want to be readable + * from userspace. + */ +struct key_type key_type_logon = { +	.name			= "logon", +	.def_lookup_type	= KEYRING_SEARCH_LOOKUP_DIRECT, +	.instantiate		= user_instantiate, +	.update			= user_update, +	.match			= user_match, +	.revoke			= user_revoke, +	.destroy		= user_destroy, +	.describe		= user_describe, +	.vet_description	= logon_vet_description, +}; +EXPORT_SYMBOL_GPL(key_type_logon); +  /*   * instantiate a user defined key   */ -int user_instantiate(struct key *key, const void *data, size_t datalen) +int user_instantiate(struct key *key, struct key_preparsed_payload *prep)  {  	struct user_key_payload *upayload; +	size_t datalen = prep->datalen;  	int ret;  	ret = -EINVAL; -	if (datalen <= 0 || datalen > 32767 || !data) +	if (datalen <= 0 || datalen > 32767 || !prep->data)  		goto error;  	ret = key_payload_reserve(key, datalen); @@ -59,43 +81,28 @@ int user_instantiate(struct key *key, const void *data, size_t datalen)  	/* attach the data */  	upayload->datalen = datalen; -	memcpy(upayload->data, data, datalen); -	rcu_assign_pointer(key->payload.data, upayload); +	memcpy(upayload->data, prep->data, datalen); +	rcu_assign_keypointer(key, upayload);  	ret = 0;  error:  	return ret; - -} /* end user_instantiate() */ +}  EXPORT_SYMBOL_GPL(user_instantiate); -/*****************************************************************************/ -/* - * dispose of the old data from an updated user defined key - */ -static void user_update_rcu_disposal(struct rcu_head *rcu) -{ -	struct user_key_payload *upayload; - -	upayload = container_of(rcu, struct user_key_payload, rcu); - -	kfree(upayload); - -} /* end user_update_rcu_disposal() */ - -/*****************************************************************************/  /*   * update a user defined key   * - the key's semaphore is write-locked   */ -int user_update(struct key *key, const void *data, size_t datalen) +int user_update(struct key *key, struct key_preparsed_payload *prep)  {  	struct user_key_payload *upayload, *zap; +	size_t datalen = prep->datalen;  	int ret;  	ret = -EINVAL; -	if (datalen <= 0 || datalen > 32767 || !data) +	if (datalen <= 0 || datalen > 32767 || !prep->data)  		goto error;  	/* construct a replacement payload */ @@ -105,7 +112,7 @@ int user_update(struct key *key, const void *data, size_t datalen)  		goto error;  	upayload->datalen = datalen; -	memcpy(upayload->data, data, datalen); +	memcpy(upayload->data, prep->data, datalen);  	/* check the quota and attach the new data */  	zap = upayload; @@ -115,32 +122,29 @@ int user_update(struct key *key, const void *data, size_t datalen)  	if (ret == 0) {  		/* attach the new data, displacing the old */  		zap = key->payload.data; -		rcu_assign_pointer(key->payload.data, upayload); +		rcu_assign_keypointer(key, upayload);  		key->expiry = 0;  	} -	call_rcu(&zap->rcu, user_update_rcu_disposal); +	if (zap) +		kfree_rcu(zap, rcu);  error:  	return ret; - -} /* end user_update() */ +}  EXPORT_SYMBOL_GPL(user_update); -/*****************************************************************************/  /*   * match users on their name   */  int user_match(const struct key *key, const void *description)  {  	return strcmp(key->description, description) == 0; - -} /* end user_match() */ +}  EXPORT_SYMBOL_GPL(user_match); -/*****************************************************************************/  /*   * dispose of the links from a revoked keyring   * - called with the key sem write-locked @@ -153,15 +157,13 @@ void user_revoke(struct key *key)  	key_payload_reserve(key, 0);  	if (upayload) { -		rcu_assign_pointer(key->payload.data, NULL); -		call_rcu(&upayload->rcu, user_update_rcu_disposal); +		rcu_assign_keypointer(key, NULL); +		kfree_rcu(upayload, rcu);  	} - -} /* end user_revoke() */ +}  EXPORT_SYMBOL(user_revoke); -/*****************************************************************************/  /*   * dispose of the data dangling from the corpse of a user key   */ @@ -170,26 +172,22 @@ void user_destroy(struct key *key)  	struct user_key_payload *upayload = key->payload.data;  	kfree(upayload); - -} /* end user_destroy() */ +}  EXPORT_SYMBOL_GPL(user_destroy); -/*****************************************************************************/  /*   * describe the user key   */  void user_describe(const struct key *key, struct seq_file *m)  {  	seq_puts(m, key->description); - -	seq_printf(m, ": %u", key->datalen); - -} /* end user_describe() */ +	if (key_is_instantiated(key)) +		seq_printf(m, ": %u", key->datalen); +}  EXPORT_SYMBOL_GPL(user_describe); -/*****************************************************************************/  /*   * read the key data   * - the key's semaphore is read-locked @@ -199,8 +197,7 @@ long user_read(const struct key *key, char __user *buffer, size_t buflen)  	struct user_key_payload *upayload;  	long ret; -	upayload = rcu_dereference_protected( -		key->payload.data, rwsem_is_locked(&((struct key *)key)->sem)); +	upayload = rcu_dereference_key(key);  	ret = upayload->datalen;  	/* we can return the data as is */ @@ -213,7 +210,23 @@ long user_read(const struct key *key, char __user *buffer, size_t buflen)  	}  	return ret; - -} /* end user_read() */ +}  EXPORT_SYMBOL_GPL(user_read); + +/* Vet the description for a "logon" key */ +static int logon_vet_description(const char *desc) +{ +	char *p; + +	/* require a "qualified" description string */ +	p = strchr(desc, ':'); +	if (!p) +		return -EINVAL; + +	/* also reject description with ':' as first char */ +	if (p == desc) +		return -EINVAL; + +	return 0; +}  | 
