@@ -69,6 +69,7 @@
#define KEYCTL_RESTRICT_KEYRING 29 /* Restrict keys allowed to link to a keyring */
#define KEYCTL_WATCH_KEY 30 /* Watch a key or ring of keys for changes */
#define KEYCTL_CONTAINER_INTERCEPT 31 /* Intercept upcalls inside a container */
+#define KEYCTL_QUERY_REQUEST_KEY_AUTH 32 /* Query a request_key_auth key */
/* keyctl structures */
struct keyctl_dh_params {
@@ -114,4 +115,15 @@ struct keyctl_pkey_params {
__u32 __spare[7];
};
+struct keyctl_query_request_key_auth {
+ char operation[32]; /* Operation name, typically "create" */
+ uid_t fsuid; /* UID of requester */
+ gid_t fsgid; /* GID of requester */
+ __u32 target_key; /* The key being instantiated */
+ __u32 thread_keyring; /* The requester's thread keyring */
+ __u32 process_keyring; /* The requester's process keyring */
+ __u32 session_keyring; /* The requester's session keyring */
+ __u64 spare[1];
+};
+
#endif /* _LINUX_KEYCTL_H */
@@ -164,6 +164,8 @@ COMPAT_SYSCALL_DEFINE5(keyctl, u32, option,
#ifdef CONFIG_CONTAINERS
case KEYCTL_CONTAINER_INTERCEPT:
return keyctl_container_intercept(arg2, compat_ptr(arg3), arg4, arg5);
+ case KEYCTL_QUERY_REQUEST_KEY_AUTH:
+ return keyctl_query_request_key_auth(arg2, compat_ptr(arg3));
#endif
default:
@@ -225,3 +225,45 @@ int queue_request_key(struct key *authkey)
kleave(" = %d", ret);
return ret;
}
+
+/*
+ * Query information about a request_key_auth key.
+ */
+long keyctl_query_request_key_auth(key_serial_t auth_id,
+ struct keyctl_query_request_key_auth __user *_data)
+{
+ struct keyctl_query_request_key_auth data;
+ struct request_key_auth *rka;
+ struct key *session;
+ key_ref_t authkey_ref;
+
+ if (auth_id <= 0 || !_data)
+ return -EINVAL;
+
+ authkey_ref = lookup_user_key(auth_id, 0, KEY_NEED_SEARCH);
+ if (IS_ERR(authkey_ref))
+ return PTR_ERR(authkey_ref);
+ rka = get_request_key_auth(key_ref_to_ptr(authkey_ref));
+
+ memset(&data, 0, sizeof(data));
+ strlcpy(data.operation, rka->op, sizeof(data.operation));
+ data.fsuid = from_kuid(current_user_ns(), rka->cred->fsuid);
+ data.fsgid = from_kgid(current_user_ns(), rka->cred->fsgid);
+ data.target_key = rka->target_key->serial;
+ data.thread_keyring = key_serial(rka->cred->thread_keyring);
+ data.process_keyring = key_serial(rka->cred->thread_keyring);
+
+ rcu_read_lock();
+ session = rcu_dereference(rka->cred->session_keyring);
+ if (!session)
+ session = rka->cred->user->session_keyring;
+ data.session_keyring = key_serial(session);
+ rcu_read_unlock();
+
+ key_ref_put(authkey_ref);
+
+ if (copy_to_user(_data, &data, sizeof(data)))
+ return -EFAULT;
+
+ return 0;
+}
@@ -362,6 +362,8 @@ static inline long keyctl_watch_key(key_serial_t key_id, int watch_fd, int watch
#ifdef CONFIG_CONTAINERS
extern long keyctl_container_intercept(int, const char __user *, unsigned int, key_serial_t);
+extern long keyctl_query_request_key_auth(key_serial_t,
+ struct keyctl_query_request_key_auth __user *);
#endif
/*
@@ -1863,6 +1863,10 @@ SYSCALL_DEFINE5(keyctl, int, option, unsigned long, arg2, unsigned long, arg3,
(const char __user *)arg3,
(unsigned int)arg4,
(key_serial_t)arg5);
+ case KEYCTL_QUERY_REQUEST_KEY_AUTH:
+ return keyctl_query_request_key_auth(
+ (key_serial_t)arg2,
+ (struct keyctl_query_request_key_auth __user *)arg3);
#endif
default:
Provide a keyctl to query a request_key authentication key for situations where this information isn't passed on the command line (such as where the authentication key is placed in a queue instead of /sbin/request-key being invoked): struct keyctl_query_request_key_auth { char operation[32]; uid_t fsuid; gid_t fsgid; key_serial_t target_key; key_serial_t thread_keyring; key_serial_t process_keyring; key_serial_t session_keyring; __u64 spare[1]; }; keyctl(KEYCTL_QUERY_REQUEST_KEY_AUTH, key_serial_t key, struct keyctl_query_request_key_auth *data); Signed-off-by: David Howells <dhowells@redhat.com> --- include/uapi/linux/keyctl.h | 12 ++++++++++++ security/keys/compat.c | 2 ++ security/keys/container.c | 42 ++++++++++++++++++++++++++++++++++++++++++ security/keys/internal.h | 2 ++ security/keys/keyctl.c | 4 ++++ 5 files changed, 62 insertions(+)