2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
16 #include <afsconfig.h>
17 #include "afs/param.h"
18 #ifdef LINUX_KEYRING_SUPPORT
19 #include <linux/seq_file.h>
23 #include "afs/sysincludes.h"
24 #include "afsincludes.h"
25 #include "afs/afs_stats.h" /* statistics */
26 #include "afs/nfsclient.h"
27 #include "osi_compat.h"
29 #include <linux/smp_lock.h>
31 #ifdef AFS_LINUX26_ONEGROUP_ENV
32 # define NUMPAGGROUPS 1
35 afs_linux_pag_from_groups(struct group_info *group_info) {
39 if (group_info->ngroups < NUMPAGGROUPS)
42 for (i = 0; (i < group_info->ngroups &&
43 (g0 = GROUP_AT(group_info, i)) != (gid_t) NOGROUP); i++) {
44 if (((g0 >> 24) & 0xff) == 'A')
51 afs_linux_pag_to_groups(afs_uint32 newpag,
52 struct group_info *old, struct group_info **new) {
57 if (afs_linux_pag_from_groups(old) == NOPAG)
58 need_space = NUMPAGGROUPS;
60 *new = groups_alloc(old->ngroups + need_space);
62 for (i = 0, j = 0; i < old->ngroups; ++i) {
63 int ths = GROUP_AT(old, i);
64 int last = i > 0 ? GROUP_AT(old, i-1) : 0;
65 if ((ths >> 24) == 'A')
67 if (last <= newpag && ths > newpag) {
68 GROUP_AT(*new, j) = newpag;
71 GROUP_AT(*new, j) = ths;
74 if (j != i + need_space)
75 GROUP_AT(*new, j) = newpag;
79 # define NUMPAGGROUPS 2
81 static inline afs_uint32
82 afs_linux_pag_from_groups(struct group_info *group_info) {
84 if (group_info->ngroups < NUMPAGGROUPS)
87 return afs_get_pag_from_groups(GROUP_AT(group_info, 0), GROUP_AT(group_info, 1));
91 afs_linux_pag_to_groups(afs_uint32 newpag,
92 struct group_info *old, struct group_info *new) {
98 if (afs_linux_pag_from_groups(old) == NOPAG)
99 need_space = NUMPAGGGROUPS;
101 *new = groups_alloc(old->ngroups + need_space);
103 for (i = 0; i < old->ngroups; ++i)
104 GROUP_AT(new, i + need_space) = GROUP_AT(old, i);
106 afs_get_groups_from_pag(newpag, &g0, g1);
107 GROUP_AT(new, 0) = g0;
108 GROUP_AT(new, 1) = g1;
113 osi_get_group_pag(afs_ucred_t *cred) {
114 return afs_linux_pag_from_groups(afs_cr_group_info(cred));
119 afs_setgroups(cred_t **cr, struct group_info *group_info, int change_parent)
121 struct group_info *old_info;
123 AFS_STATCNT(afs_setgroups);
125 old_info = afs_cr_group_info(*cr);
126 get_group_info(group_info);
127 afs_set_cr_group_info(*cr, group_info);
128 put_group_info(old_info);
132 #if defined(STRUCT_TASK_STRUCT_HAS_PARENT) && !defined(STRUCT_TASK_STRUCT_HAS_CRED)
134 old_info = current->parent->group_info;
135 get_group_info(group_info);
136 current->parent->group_info = group_info;
137 put_group_info(old_info);
145 __setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
148 struct group_info *group_info;
149 struct group_info *tmp;
151 get_group_info(afs_cr_group_info(*cr));
152 group_info = afs_cr_group_info(*cr);
154 *newpag = (pagvalue == -1 ? genpag() : pagvalue);
155 afs_linux_pag_to_groups(*newpag, group_info, &tmp);
157 put_group_info(group_info);
160 afs_setgroups(cr, group_info, change_parent);
162 put_group_info(group_info);
167 #ifdef LINUX_KEYRING_SUPPORT
168 extern struct key_type key_type_keyring __attribute__((weak));
169 static struct key_type *__key_type_keyring = &key_type_keyring;
172 install_session_keyring(struct key *keyring)
179 if (!__key_type_keyring)
184 /* create an empty session keyring */
185 sprintf(desc, "_ses.%u", current->tgid);
187 /* if we're root, don't count the keyring against our quota. This
188 * avoids starvation issues when dealing with PAM modules that always
189 * setpag() as root */
190 if (current_uid() == 0)
191 flags = KEY_ALLOC_NOT_IN_QUOTA;
193 flags = KEY_ALLOC_IN_QUOTA;
195 keyring = afs_linux_key_alloc(
196 __key_type_keyring, desc,
197 current_uid(), current_gid(),
198 (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL,
201 if (IS_ERR(keyring)) {
202 code = PTR_ERR(keyring);
207 code = key_instantiate_and_link(keyring, NULL, 0, NULL, NULL);
213 /* install the keyring */
214 spin_lock_irq(¤t->sighand->siglock);
215 old = task_session_keyring(current);
217 task_session_keyring(current) = keyring;
218 spin_unlock_irq(¤t->sighand->siglock);
226 #endif /* LINUX_KEYRING_SUPPORT */
229 setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
236 code = __setpag(cr, pagvalue, newpag, change_parent);
238 #ifdef LINUX_KEYRING_SUPPORT
239 if (code == 0 && afs_cr_rgid(*cr) != NFSXLATOR_CRED) {
240 code = install_session_keyring(NULL);
241 if (code == 0 && current_session_keyring()) {
245 perm = KEY_POS_VIEW | KEY_POS_SEARCH;
246 perm |= KEY_USR_VIEW | KEY_USR_SEARCH;
248 key = afs_linux_key_alloc(&key_type_afs_pag, "_pag", 0, 0, perm, KEY_ALLOC_NOT_IN_QUOTA);
251 key_instantiate_and_link(key, (void *) newpag, sizeof(afs_uint32),
252 current_session_keyring(), NULL);
259 #endif /* LINUX_KEYRING_SUPPORT */
265 /* Intercept the standard system call. */
266 extern asmlinkage long (*sys_setgroupsp) (int gidsetsize, gid_t * grouplist);
268 afs_xsetgroups(int gidsetsize, gid_t * grouplist)
271 cred_t *cr = crref();
275 old_pag = PagInCred(cr);
278 code = (*sys_setgroupsp) (gidsetsize, grouplist);
284 if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
285 /* re-install old pag if there's room. */
286 code = __setpag(&cr, old_pag, &junk, 0);
290 /* Linux syscall ABI returns errno as negative */
294 /* Intercept the standard uid32 system call. */
295 extern asmlinkage int (*sys_setgroups32p) (int gidsetsize,
296 __kernel_gid32_t * grouplist);
298 afs_xsetgroups32(int gidsetsize, gid_t * grouplist)
301 cred_t *cr = crref();
305 old_pag = PagInCred(cr);
308 code = (*sys_setgroups32p) (gidsetsize, grouplist);
315 if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
316 /* re-install old pag if there's room. */
317 code = __setpag(&cr, old_pag, &junk, 0);
321 /* Linux syscall ABI returns errno as negative */
325 #if defined(AFS_PPC64_LINUX20_ENV)
326 /* Intercept the uid16 system call as used by 32bit programs. */
327 extern asmlinkage long (*sys32_setgroupsp)(int gidsetsize, gid_t *grouplist);
328 asmlinkage long afs32_xsetgroups(int gidsetsize, gid_t *grouplist)
331 cred_t *cr = crref();
335 old_pag = PagInCred(cr);
338 code = (*sys32_setgroupsp)(gidsetsize, grouplist);
344 if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
345 /* re-install old pag if there's room. */
346 code = __setpag(&cr, old_pag, &junk, 0);
350 /* Linux syscall ABI returns errno as negative */
355 #if defined(AFS_SPARC64_LINUX20_ENV) || defined(AFS_AMD64_LINUX20_ENV)
356 /* Intercept the uid16 system call as used by 32bit programs. */
357 #ifdef AFS_AMD64_LINUX20_ENV
358 extern asmlinkage long (*sys32_setgroupsp) (int gidsetsize, u16 * grouplist);
359 #endif /* AFS_AMD64_LINUX20_ENV */
360 #ifdef AFS_SPARC64_LINUX26_ENV
361 extern asmlinkage int (*sys32_setgroupsp) (int gidsetsize,
362 __kernel_gid32_t * grouplist);
363 #endif /* AFS_SPARC64_LINUX26_ENV */
365 afs32_xsetgroups(int gidsetsize, u16 * grouplist)
368 cred_t *cr = crref();
372 old_pag = PagInCred(cr);
375 code = (*sys32_setgroupsp) (gidsetsize, grouplist);
381 if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
382 /* re-install old pag if there's room. */
383 code = __setpag(&cr, old_pag, &junk, 0);
387 /* Linux syscall ABI returns errno as negative */
391 /* Intercept the uid32 system call as used by 32bit programs. */
392 #ifdef AFS_AMD64_LINUX20_ENV
393 extern asmlinkage long (*sys32_setgroups32p) (int gidsetsize, gid_t * grouplist);
394 #endif /* AFS_AMD64_LINUX20_ENV */
395 #ifdef AFS_SPARC64_LINUX26_ENV
396 extern asmlinkage int (*sys32_setgroups32p) (int gidsetsize,
397 __kernel_gid32_t * grouplist);
398 #endif /* AFS_SPARC64_LINUX26_ENV */
400 afs32_xsetgroups32(int gidsetsize, gid_t * grouplist)
403 cred_t *cr = crref();
407 old_pag = PagInCred(cr);
410 code = (*sys32_setgroups32p) (gidsetsize, grouplist);
416 if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
417 /* re-install old pag if there's room. */
418 code = __setpag(&cr, old_pag, &junk, 0);
422 /* Linux syscall ABI returns errno as negative */
428 #ifdef LINUX_KEYRING_SUPPORT
429 static void afs_pag_describe(const struct key *key, struct seq_file *m)
431 seq_puts(m, key->description);
433 seq_printf(m, ": %u", key->datalen);
436 static int afs_pag_instantiate(struct key *key, const void *data, size_t datalen)
439 afs_uint32 *userpag, pag = NOPAG;
441 if (key->uid != 0 || key->gid != 0)
445 get_group_info(current_group_info());
447 if (datalen != sizeof(afs_uint32) || !data)
450 /* ensure key being set matches current pag */
451 pag = afs_linux_pag_from_groups(current_group_info());
456 userpag = (afs_uint32 *) data;
460 key->payload.value = (unsigned long) *userpag;
461 key->datalen = sizeof(afs_uint32);
465 put_group_info(current_group_info());
469 static int afs_pag_match(const struct key *key, const void *description)
471 return strcmp(key->description, description) == 0;
474 static void afs_pag_destroy(struct key *key)
476 afs_uint32 pag = key->payload.value;
477 int locked = ISAFS_GLOCK();
482 afs_MarkUserExpired(pag);
488 struct key_type key_type_afs_pag =
491 .describe = afs_pag_describe,
492 .instantiate = afs_pag_instantiate,
493 .match = afs_pag_match,
494 .destroy = afs_pag_destroy,
497 #ifdef EXPORTED_TASKLIST_LOCK
498 extern rwlock_t tasklist_lock __attribute__((weak));
501 void osi_keyring_init(void)
503 #if !defined(EXPORTED_KEY_TYPE_KEYRING)
504 struct task_struct *p;
506 /* If we can't lock the tasklist, either with its explicit lock,
507 * or by using the RCU lock, then we can't safely work out the
508 * type of a keyring. So, we have to rely on the weak reference.
509 * If that's not available, then keyring based PAGs won't work.
512 #if defined(EXPORTED_TASKLIST_LOCK) || (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
513 if (__key_type_keyring == NULL) {
514 # ifdef EXPORTED_TASKLIST_LOCK
516 read_lock(&tasklist_lock);
518 # if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
519 # ifdef EXPORTED_TASKLIST_LOCK
524 #if defined(HAVE_LINUX_FIND_TASK_BY_PID)
525 p = find_task_by_pid(1);
527 p = find_task_by_vpid(1);
529 if (p && task_user(p)->session_keyring)
530 __key_type_keyring = task_user(p)->session_keyring->type;
531 # ifdef EXPORTED_TASKLIST_LOCK
533 read_unlock(&tasklist_lock);
535 # if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
536 # ifdef EXPORTED_TASKLIST_LOCK
545 register_key_type(&key_type_afs_pag);
548 void osi_keyring_shutdown(void)
550 unregister_key_type(&key_type_afs_pag);
554 osi_get_keyring_pag(afs_ucred_t *cred)
558 afs_int32 keyring_pag = NOPAG;
560 if (afs_cr_rgid(cred) != NFSXLATOR_CRED) {
561 key = afs_linux_search_keyring(cred, &key_type_afs_pag);
564 if (key_validate(key) == 0 && key->uid == 0) { /* also verify in the session keyring? */
565 keyring_pag = key->payload.value;
566 /* Only set PAG in groups if needed,
567 * and the creds are from the current process */
568 if (afs_linux_cred_is_current(cred) &&
569 ((keyring_pag >> 24) & 0xff) == 'A' &&
570 keyring_pag != afs_linux_pag_from_groups(current_group_info())) {
571 __setpag(&cred, keyring_pag, &newpag, 0);
581 void osi_keyring_init(void)
586 void osi_keyring_shutdown(void)