2
* Copyright 2000, International Business Machines Corporation and others.
5
* This software has been released under the terms of the IBM Public
6
* License. For details, see the LICENSE file in the top-level source
7
* directory or online at http://www.openafs.org/dl/license10.html
16
#include <afsconfig.h>
17
#include "afs/param.h"
18
#ifdef LINUX_KEYRING_SUPPORT
19
#include <linux/seq_file.h>
23
#include "afs/sysincludes.h"
24
#include "afsincludes.h"
25
#include "afs/afs_stats.h" /* statistics */
26
#include "afs/nfsclient.h"
27
#include "osi_compat.h"
29
#ifdef AFS_LINUX26_ONEGROUP_ENV
30
# define NUMPAGGROUPS 1
33
afs_linux_pag_from_groups(struct group_info *group_info) {
37
if (group_info->ngroups < NUMPAGGROUPS)
40
for (i = 0; (i < group_info->ngroups &&
41
(g0 = GROUP_AT(group_info, i)) != (gid_t) NOGROUP); i++) {
42
if (((g0 >> 24) & 0xff) == 'A')
49
afs_linux_pag_to_groups(afs_uint32 newpag,
50
struct group_info *old, struct group_info **new) {
55
if (afs_linux_pag_from_groups(old) == NOPAG)
56
need_space = NUMPAGGROUPS;
58
*new = groups_alloc(old->ngroups + need_space);
60
for (i = 0, j = 0; i < old->ngroups; ++i) {
61
int ths = GROUP_AT(old, i);
62
int last = i > 0 ? GROUP_AT(old, i-1) : 0;
63
if ((ths >> 24) == 'A')
65
if (last <= newpag && ths > newpag) {
66
GROUP_AT(*new, j) = newpag;
69
GROUP_AT(*new, j) = ths;
72
if (j != i + need_space)
73
GROUP_AT(*new, j) = newpag;
77
# define NUMPAGGROUPS 2
79
static inline afs_uint32
80
afs_linux_pag_from_groups(struct group_info *group_info) {
82
if (group_info->ngroups < NUMPAGGROUPS)
85
return afs_get_pag_from_groups(GROUP_AT(group_info, 0), GROUP_AT(group_info, 1));
89
afs_linux_pag_to_groups(afs_uint32 newpag,
90
struct group_info *old, struct group_info **new) {
96
if (afs_linux_pag_from_groups(old) == NOPAG)
97
need_space = NUMPAGGGROUPS;
99
*new = groups_alloc(old->ngroups + need_space);
101
for (i = 0; i < old->ngroups; ++i)
102
GROUP_AT(new, i + need_space) = GROUP_AT(old, i);
104
afs_get_groups_from_pag(newpag, &g0, g1);
105
GROUP_AT(new, 0) = g0;
106
GROUP_AT(new, 1) = g1;
111
osi_get_group_pag(afs_ucred_t *cred) {
112
return afs_linux_pag_from_groups(afs_cr_group_info(cred));
117
afs_setgroups(cred_t **cr, struct group_info *group_info, int change_parent)
119
struct group_info *old_info;
121
AFS_STATCNT(afs_setgroups);
123
old_info = afs_cr_group_info(*cr);
124
get_group_info(group_info);
125
afs_set_cr_group_info(*cr, group_info);
126
put_group_info(old_info);
130
#if defined(STRUCT_TASK_STRUCT_HAS_PARENT) && !defined(STRUCT_TASK_STRUCT_HAS_CRED)
132
old_info = current->parent->group_info;
133
get_group_info(group_info);
134
current->parent->group_info = group_info;
135
put_group_info(old_info);
143
__setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
144
int change_parent, struct group_info **old_groups)
146
struct group_info *group_info;
147
struct group_info *tmp;
149
get_group_info(afs_cr_group_info(*cr));
150
group_info = afs_cr_group_info(*cr);
152
*newpag = (pagvalue == -1 ? genpag() : pagvalue);
153
afs_linux_pag_to_groups(*newpag, group_info, &tmp);
156
*old_groups = group_info;
158
put_group_info(group_info);
162
afs_setgroups(cr, tmp, change_parent);
169
#ifdef LINUX_KEYRING_SUPPORT
170
extern struct key_type key_type_keyring __attribute__((weak));
171
static struct key_type *__key_type_keyring = &key_type_keyring;
173
/* install_session_keyring returns negative error values */
175
install_session_keyring(struct key *keyring)
182
if (!__key_type_keyring)
187
/* create an empty session keyring */
188
sprintf(desc, "_ses.%u", current->tgid);
190
/* if we're root, don't count the keyring against our quota. This
191
* avoids starvation issues when dealing with PAM modules that always
192
* setpag() as root */
193
if (current_uid() == 0)
194
flags = KEY_ALLOC_NOT_IN_QUOTA;
196
flags = KEY_ALLOC_IN_QUOTA;
198
keyring = afs_linux_key_alloc(
199
__key_type_keyring, desc,
200
current_uid(), current_gid(),
201
(KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL,
204
if (IS_ERR(keyring)) {
205
code = PTR_ERR(keyring);
210
code = key_instantiate_and_link(keyring, NULL, 0, NULL, NULL);
216
/* install the keyring */
217
spin_lock_irq(¤t->sighand->siglock);
218
old = task_session_keyring(current);
220
task_session_keyring(current) = keyring;
221
spin_unlock_irq(¤t->sighand->siglock);
229
#endif /* LINUX_KEYRING_SUPPORT */
231
/* Error codes from setpag must be positive, otherwise they don't
232
* make it back into userspace properly. Error codes from the
233
* Linux keyring utilities, and from install_session_keyring()
234
* are negative. So we need to be careful to convert them correctly
238
setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
242
struct group_info *old_groups = NULL;
246
code = __setpag(cr, pagvalue, newpag, change_parent, &old_groups);
248
#ifdef LINUX_KEYRING_SUPPORT
249
if (code == 0 && afs_cr_rgid(*cr) != NFSXLATOR_CRED) {
250
code = install_session_keyring(NULL);
251
if (code == 0 && current_session_keyring()) {
255
perm = KEY_POS_VIEW | KEY_POS_SEARCH;
256
perm |= KEY_USR_VIEW | KEY_USR_SEARCH;
258
key = afs_linux_key_alloc(&key_type_afs_pag, "_pag", 0, 0, perm, KEY_ALLOC_NOT_IN_QUOTA);
261
key_instantiate_and_link(key, (void *) newpag, sizeof(afs_uint32),
262
current_session_keyring(), NULL);
271
#endif /* LINUX_KEYRING_SUPPORT */
275
afs_setgroups(cr, old_groups, change_parent);
276
put_group_info(old_groups);
280
afs_MarkUserExpired(*newpag);
289
/* Intercept the standard system call. */
290
extern asmlinkage long (*sys_setgroupsp) (int gidsetsize, gid_t * grouplist);
292
afs_xsetgroups(int gidsetsize, gid_t * grouplist)
295
cred_t *cr = crref();
299
old_pag = PagInCred(cr);
302
code = (*sys_setgroupsp) (gidsetsize, grouplist);
308
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
309
/* re-install old pag if there's room. */
310
code = __setpag(&cr, old_pag, &junk, 0, NULL);
314
/* Linux syscall ABI returns errno as negative */
318
/* Intercept the standard uid32 system call. */
319
extern asmlinkage int (*sys_setgroups32p) (int gidsetsize,
320
__kernel_gid32_t * grouplist);
322
afs_xsetgroups32(int gidsetsize, gid_t * grouplist)
325
cred_t *cr = crref();
329
old_pag = PagInCred(cr);
332
code = (*sys_setgroups32p) (gidsetsize, grouplist);
339
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
340
/* re-install old pag if there's room. */
341
code = __setpag(&cr, old_pag, &junk, 0, NULL);
345
/* Linux syscall ABI returns errno as negative */
349
#if defined(AFS_PPC64_LINUX20_ENV)
350
/* Intercept the uid16 system call as used by 32bit programs. */
351
extern asmlinkage long (*sys32_setgroupsp)(int gidsetsize, gid_t *grouplist);
352
asmlinkage long afs32_xsetgroups(int gidsetsize, gid_t *grouplist)
355
cred_t *cr = crref();
359
old_pag = PagInCred(cr);
362
code = (*sys32_setgroupsp)(gidsetsize, grouplist);
368
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
369
/* re-install old pag if there's room. */
370
code = __setpag(&cr, old_pag, &junk, 0, NULL);
374
/* Linux syscall ABI returns errno as negative */
379
#if defined(AFS_SPARC64_LINUX20_ENV) || defined(AFS_AMD64_LINUX20_ENV)
380
/* Intercept the uid16 system call as used by 32bit programs. */
381
#ifdef AFS_AMD64_LINUX20_ENV
382
extern asmlinkage long (*sys32_setgroupsp) (int gidsetsize, u16 * grouplist);
383
#endif /* AFS_AMD64_LINUX20_ENV */
384
#ifdef AFS_SPARC64_LINUX26_ENV
385
extern asmlinkage int (*sys32_setgroupsp) (int gidsetsize,
386
__kernel_gid32_t * grouplist);
387
#endif /* AFS_SPARC64_LINUX26_ENV */
389
afs32_xsetgroups(int gidsetsize, u16 * grouplist)
392
cred_t *cr = crref();
396
old_pag = PagInCred(cr);
399
code = (*sys32_setgroupsp) (gidsetsize, grouplist);
405
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
406
/* re-install old pag if there's room. */
407
code = __setpag(&cr, old_pag, &junk, 0, NULL);
411
/* Linux syscall ABI returns errno as negative */
415
/* Intercept the uid32 system call as used by 32bit programs. */
416
#ifdef AFS_AMD64_LINUX20_ENV
417
extern asmlinkage long (*sys32_setgroups32p) (int gidsetsize, gid_t * grouplist);
418
#endif /* AFS_AMD64_LINUX20_ENV */
419
#ifdef AFS_SPARC64_LINUX26_ENV
420
extern asmlinkage int (*sys32_setgroups32p) (int gidsetsize,
421
__kernel_gid32_t * grouplist);
422
#endif /* AFS_SPARC64_LINUX26_ENV */
424
afs32_xsetgroups32(int gidsetsize, gid_t * grouplist)
427
cred_t *cr = crref();
431
old_pag = PagInCred(cr);
434
code = (*sys32_setgroups32p) (gidsetsize, grouplist);
440
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
441
/* re-install old pag if there's room. */
442
code = __setpag(&cr, old_pag, &junk, 0, NULL);
446
/* Linux syscall ABI returns errno as negative */
452
#ifdef LINUX_KEYRING_SUPPORT
453
static void afs_pag_describe(const struct key *key, struct seq_file *m)
455
seq_puts(m, key->description);
457
seq_printf(m, ": %u", key->datalen);
460
#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
461
static int afs_pag_instantiate(struct key *key, struct key_preparsed_payload *prep)
463
static int afs_pag_instantiate(struct key *key, const void *data, size_t datalen)
467
afs_uint32 *userpag, pag = NOPAG;
469
if (key->uid != 0 || key->gid != 0)
473
get_group_info(current_group_info());
475
#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
476
if (prep->datalen != sizeof(afs_uint32) || !prep->data)
478
if (datalen != sizeof(afs_uint32) || !data)
482
/* ensure key being set matches current pag */
483
pag = afs_linux_pag_from_groups(current_group_info());
488
#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
489
userpag = (afs_uint32 *)prep->data;
491
userpag = (afs_uint32 *)data;
496
key->payload.value = (unsigned long) *userpag;
497
key->datalen = sizeof(afs_uint32);
501
put_group_info(current_group_info());
505
static int afs_pag_match(const struct key *key, const void *description)
507
return strcmp(key->description, description) == 0;
510
static void afs_pag_destroy(struct key *key)
512
afs_uint32 pag = key->payload.value;
513
int locked = ISAFS_GLOCK();
518
afs_MarkUserExpired(pag);
524
struct key_type key_type_afs_pag =
527
.describe = afs_pag_describe,
528
.instantiate = afs_pag_instantiate,
529
.match = afs_pag_match,
530
.destroy = afs_pag_destroy,
533
#ifdef EXPORTED_TASKLIST_LOCK
534
extern rwlock_t tasklist_lock __attribute__((weak));
537
void osi_keyring_init(void)
539
#if !defined(EXPORTED_KEY_TYPE_KEYRING)
540
struct task_struct *p;
542
/* If we can't lock the tasklist, either with its explicit lock,
543
* or by using the RCU lock, then we can't safely work out the
544
* type of a keyring. So, we have to rely on the weak reference.
545
* If that's not available, then keyring based PAGs won't work.
548
#if defined(EXPORTED_TASKLIST_LOCK) || (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
549
if (__key_type_keyring == NULL) {
550
# ifdef EXPORTED_TASKLIST_LOCK
552
read_lock(&tasklist_lock);
554
# if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
555
# ifdef EXPORTED_TASKLIST_LOCK
560
#if defined(HAVE_LINUX_FIND_TASK_BY_PID)
561
p = find_task_by_pid(1);
563
p = find_task_by_vpid(1);
565
if (p && task_user(p)->session_keyring)
566
__key_type_keyring = task_user(p)->session_keyring->type;
567
# ifdef EXPORTED_TASKLIST_LOCK
569
read_unlock(&tasklist_lock);
571
# if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
572
# ifdef EXPORTED_TASKLIST_LOCK
581
register_key_type(&key_type_afs_pag);
584
void osi_keyring_shutdown(void)
586
unregister_key_type(&key_type_afs_pag);
590
osi_get_keyring_pag(afs_ucred_t *cred)
594
afs_int32 keyring_pag = NOPAG;
596
if (afs_cr_rgid(cred) != NFSXLATOR_CRED) {
597
key = afs_linux_search_keyring(cred, &key_type_afs_pag);
600
if (key_validate(key) == 0 && key->uid == 0) { /* also verify in the session keyring? */
601
keyring_pag = key->payload.value;
602
/* Only set PAG in groups if needed,
603
* and the creds are from the current process */
604
if (afs_linux_cred_is_current(cred) &&
605
((keyring_pag >> 24) & 0xff) == 'A' &&
606
keyring_pag != afs_linux_pag_from_groups(current_group_info())) {
607
__setpag(&cred, keyring_pag, &newpag, 0, NULL);
617
void osi_keyring_init(void)
622
void osi_keyring_shutdown(void)