Dmitry V. Levin
4eef291671
* keyctl.c (sys_add_key, sys_request_key): Update for RVAL_DECODED. (keyctl_join_session_keyring, keyctl_handle_key, keyctl_set_reqkey_keyring): Remove. (keyctl_get_keyring_id, keyctl_update_key, keyctl_handle_key_key, keyctl_read_key, keyctl_keyring_search, keyctl_chown_key, keyctl_instantiate_key, keyctl_instantiate_key_iov, keyctl_negate_key, keyctl_reject_key, keyctl_set_timeout, keyctl_get_persistent, keyctl_setperm_key): Change to return void. Update for RVAL_DECODED. (sys_keyctl): Update callers. Update for RVAL_DECODED.
283 lines
5.8 KiB
C
283 lines
5.8 KiB
C
#include "defs.h"
|
|
|
|
typedef int32_t key_serial_t;
|
|
|
|
#include "xlat/key_spec.h"
|
|
|
|
static void
|
|
print_keyring_serial_number(key_serial_t id)
|
|
{
|
|
const char *str = xlookup(key_spec, id);
|
|
|
|
if (str)
|
|
tprints(str);
|
|
else
|
|
tprintf("%d", id);
|
|
}
|
|
|
|
SYS_FUNC(add_key)
|
|
{
|
|
/* type */
|
|
printstr(tcp, tcp->u_arg[0], -1);
|
|
/* description */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
/* payload */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[2], tcp->u_arg[3]);
|
|
/* payload length */
|
|
tprintf(", %lu, ", tcp->u_arg[3]);
|
|
/* keyring serial number */
|
|
print_keyring_serial_number(tcp->u_arg[4]);
|
|
|
|
return RVAL_DECODED;
|
|
}
|
|
|
|
SYS_FUNC(request_key)
|
|
{
|
|
/* type */
|
|
printstr(tcp, tcp->u_arg[0], -1);
|
|
/* description */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
/* callout_info */
|
|
tprints(", ");
|
|
printstr(tcp, tcp->u_arg[2], -1);
|
|
/* keyring serial number */
|
|
tprints(", ");
|
|
print_keyring_serial_number(tcp->u_arg[3]);
|
|
|
|
return RVAL_DECODED;
|
|
}
|
|
|
|
static void
|
|
keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %d", create);
|
|
}
|
|
|
|
static void
|
|
keyctl_update_key(struct tcb *tcp, key_serial_t id, long addr, long len)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
printstr(tcp, addr, len);
|
|
tprintf(", %lu", len);
|
|
}
|
|
|
|
static void
|
|
keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_read_key(struct tcb *tcp, key_serial_t id, long addr, long len)
|
|
{
|
|
if (entering(tcp)) {
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
} else {
|
|
if (syserror(tcp))
|
|
printaddr(addr);
|
|
else {
|
|
long rval = tcp->u_rval > len ?
|
|
len : (tcp->u_rval ? -1 : 0);
|
|
printstr(tcp, addr, rval);
|
|
}
|
|
tprintf(", %lu", len);
|
|
}
|
|
}
|
|
|
|
static void
|
|
keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, long addr1,
|
|
long addr2, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
printstr(tcp, addr1, -1);
|
|
tprints(", ");
|
|
printstr(tcp, addr2, -1);
|
|
tprints(", ");
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_chown_key(struct tcb *tcp, key_serial_t id, int user, int group)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %d, %d", user, group);
|
|
}
|
|
|
|
static void
|
|
keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, long addr,
|
|
long len, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
printstr(tcp, addr, len);
|
|
tprintf(", %lu, ", len);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
|
|
long addr, long len, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprints(", ");
|
|
tprint_iov(tcp, len, addr, 1);
|
|
tprintf(", %lu, ", len);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
|
|
key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprintf(", %u, ", timeout);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
|
|
unsigned error, key_serial_t id2)
|
|
{
|
|
print_keyring_serial_number(id1);
|
|
tprintf(", %u, %u, ", timeout, error);
|
|
print_keyring_serial_number(id2);
|
|
}
|
|
|
|
static void
|
|
keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprintf(", %u", timeout);
|
|
}
|
|
|
|
static void
|
|
keyctl_get_persistent(struct tcb *tcp, int uid, key_serial_t id)
|
|
{
|
|
tprintf("%d, ", uid);
|
|
print_keyring_serial_number(id);
|
|
}
|
|
|
|
#include "xlat/key_perms.h"
|
|
|
|
static void
|
|
keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
|
|
{
|
|
print_keyring_serial_number(id);
|
|
tprints(", ");
|
|
printflags(key_perms, perm, "KEY_???");
|
|
}
|
|
|
|
#include "xlat/key_reqkeys.h"
|
|
#include "xlat/keyctl_commands.h"
|
|
|
|
SYS_FUNC(keyctl)
|
|
{
|
|
int cmd = tcp->u_arg[0];
|
|
|
|
if (entering(tcp)) {
|
|
printxval(keyctl_commands, cmd, "KEYCTL_???");
|
|
tprints(", ");
|
|
}
|
|
|
|
switch (cmd) {
|
|
case KEYCTL_GET_KEYRING_ID:
|
|
keyctl_get_keyring_id(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_JOIN_SESSION_KEYRING:
|
|
printstr(tcp, tcp->u_arg[1], -1);
|
|
break;
|
|
|
|
case KEYCTL_UPDATE:
|
|
keyctl_update_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_REVOKE:
|
|
case KEYCTL_CLEAR:
|
|
case KEYCTL_INVALIDATE:
|
|
case KEYCTL_ASSUME_AUTHORITY:
|
|
print_keyring_serial_number(tcp->u_arg[1]);
|
|
break;
|
|
|
|
case KEYCTL_LINK:
|
|
case KEYCTL_UNLINK:
|
|
keyctl_handle_key_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_DESCRIBE:
|
|
case KEYCTL_READ:
|
|
case KEYCTL_GET_SECURITY:
|
|
keyctl_read_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
return 0;
|
|
|
|
case KEYCTL_SEARCH:
|
|
keyctl_keyring_search(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_CHOWN:
|
|
keyctl_chown_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_SETPERM:
|
|
keyctl_setperm_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_INSTANTIATE:
|
|
keyctl_instantiate_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_NEGATE:
|
|
keyctl_negate_key(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3]);
|
|
break;
|
|
|
|
case KEYCTL_SET_REQKEY_KEYRING:
|
|
printxval(key_reqkeys, tcp->u_arg[1], "KEY_REQKEY_DEFL_???");
|
|
break;
|
|
|
|
case KEYCTL_SET_TIMEOUT:
|
|
keyctl_set_timeout(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
case KEYCTL_SESSION_TO_PARENT:
|
|
break;
|
|
|
|
case KEYCTL_REJECT:
|
|
keyctl_reject_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_INSTANTIATE_IOV:
|
|
keyctl_instantiate_key_iov(tcp, tcp->u_arg[1],
|
|
tcp->u_arg[2], tcp->u_arg[3],
|
|
tcp->u_arg[4]);
|
|
break;
|
|
|
|
case KEYCTL_GET_PERSISTENT:
|
|
keyctl_get_persistent(tcp, tcp->u_arg[1], tcp->u_arg[2]);
|
|
break;
|
|
|
|
default:
|
|
tprintf("%#lx, %#lx, %#lx, %#lx",
|
|
tcp->u_arg[1], tcp->u_arg[2],
|
|
tcp->u_arg[3], tcp->u_arg[4]);
|
|
break;
|
|
}
|
|
|
|
return RVAL_DECODED;
|
|
}
|