mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-20 19:23:57 +08:00
664cceb009
The attached patch adds extra permission grants to keys for the possessor of a key in addition to the owner, group and other permissions bits. This makes SUID binaries easier to support without going as far as labelling keys and key targets using the LSM facilities. This patch adds a second "pointer type" to key structures (struct key_ref *) that can have the bottom bit of the address set to indicate the possession of a key. This is propagated through searches from the keyring to the discovered key. It has been made a separate type so that the compiler can spot attempts to dereference a potentially incorrect pointer. The "possession" attribute can't be attached to a key structure directly as it's not an intrinsic property of a key. Pointers to keys have been replaced with struct key_ref *'s wherever possession information needs to be passed through. This does assume that the bottom bit of the pointer will always be zero on return from kmem_cache_alloc(). The key reference type has been made into a typedef so that at least it can be located in the sources, even though it's basically a pointer to an undefined type. I've also renamed the accessor functions to be more useful, and all reference variables should now end in "_ref". Signed-Off-By: David Howells <dhowells@redhat.com> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
147 lines
3.6 KiB
C
147 lines
3.6 KiB
C
/* key-ui.h: key userspace interface stuff
|
|
*
|
|
* Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*/
|
|
|
|
#ifndef _LINUX_KEY_UI_H
|
|
#define _LINUX_KEY_UI_H
|
|
|
|
#include <linux/key.h>
|
|
|
|
/* the key tree */
|
|
extern struct rb_root key_serial_tree;
|
|
extern spinlock_t key_serial_lock;
|
|
|
|
/* required permissions */
|
|
#define KEY_VIEW 0x01 /* require permission to view attributes */
|
|
#define KEY_READ 0x02 /* require permission to read content */
|
|
#define KEY_WRITE 0x04 /* require permission to update / modify */
|
|
#define KEY_SEARCH 0x08 /* require permission to search (keyring) or find (key) */
|
|
#define KEY_LINK 0x10 /* require permission to link */
|
|
#define KEY_ALL 0x1f /* all the above permissions */
|
|
|
|
/*
|
|
* the keyring payload contains a list of the keys to which the keyring is
|
|
* subscribed
|
|
*/
|
|
struct keyring_list {
|
|
struct rcu_head rcu; /* RCU deletion hook */
|
|
unsigned short maxkeys; /* max keys this list can hold */
|
|
unsigned short nkeys; /* number of keys currently held */
|
|
unsigned short delkey; /* key to be unlinked by RCU */
|
|
struct key *keys[0];
|
|
};
|
|
|
|
|
|
/*
|
|
* check to see whether permission is granted to use a key in the desired way
|
|
*/
|
|
static inline int key_permission(const key_ref_t key_ref, key_perm_t perm)
|
|
{
|
|
struct key *key = key_ref_to_ptr(key_ref);
|
|
key_perm_t kperm;
|
|
|
|
if (is_key_possessed(key_ref))
|
|
kperm = key->perm >> 24;
|
|
else if (key->uid == current->fsuid)
|
|
kperm = key->perm >> 16;
|
|
else if (key->gid != -1 &&
|
|
key->perm & KEY_GRP_ALL &&
|
|
in_group_p(key->gid)
|
|
)
|
|
kperm = key->perm >> 8;
|
|
else
|
|
kperm = key->perm;
|
|
|
|
kperm = kperm & perm & KEY_ALL;
|
|
|
|
return kperm == perm;
|
|
}
|
|
|
|
/*
|
|
* check to see whether permission is granted to use a key in at least one of
|
|
* the desired ways
|
|
*/
|
|
static inline int key_any_permission(const key_ref_t key_ref, key_perm_t perm)
|
|
{
|
|
struct key *key = key_ref_to_ptr(key_ref);
|
|
key_perm_t kperm;
|
|
|
|
if (is_key_possessed(key_ref))
|
|
kperm = key->perm >> 24;
|
|
else if (key->uid == current->fsuid)
|
|
kperm = key->perm >> 16;
|
|
else if (key->gid != -1 &&
|
|
key->perm & KEY_GRP_ALL &&
|
|
in_group_p(key->gid)
|
|
)
|
|
kperm = key->perm >> 8;
|
|
else
|
|
kperm = key->perm;
|
|
|
|
kperm = kperm & perm & KEY_ALL;
|
|
|
|
return kperm != 0;
|
|
}
|
|
|
|
static inline int key_task_groups_search(struct task_struct *tsk, gid_t gid)
|
|
{
|
|
int ret;
|
|
|
|
task_lock(tsk);
|
|
ret = groups_search(tsk->group_info, gid);
|
|
task_unlock(tsk);
|
|
return ret;
|
|
}
|
|
|
|
static inline int key_task_permission(const key_ref_t key_ref,
|
|
struct task_struct *context,
|
|
key_perm_t perm)
|
|
{
|
|
struct key *key = key_ref_to_ptr(key_ref);
|
|
key_perm_t kperm;
|
|
|
|
if (is_key_possessed(key_ref)) {
|
|
kperm = key->perm >> 24;
|
|
}
|
|
else if (key->uid == context->fsuid) {
|
|
kperm = key->perm >> 16;
|
|
}
|
|
else if (key->gid != -1 &&
|
|
key->perm & KEY_GRP_ALL && (
|
|
key->gid == context->fsgid ||
|
|
key_task_groups_search(context, key->gid)
|
|
)
|
|
) {
|
|
kperm = key->perm >> 8;
|
|
}
|
|
else {
|
|
kperm = key->perm;
|
|
}
|
|
|
|
kperm = kperm & perm & KEY_ALL;
|
|
|
|
return kperm == perm;
|
|
|
|
}
|
|
|
|
extern key_ref_t lookup_user_key(struct task_struct *context,
|
|
key_serial_t id, int create, int partial,
|
|
key_perm_t perm);
|
|
|
|
extern long join_session_keyring(const char *name);
|
|
|
|
extern struct key_type *key_type_lookup(const char *type);
|
|
extern void key_type_put(struct key_type *ktype);
|
|
|
|
#define key_negative_timeout 60 /* default timeout on a negative key's existence */
|
|
|
|
|
|
#endif /* _LINUX_KEY_UI_H */
|