Esempio n. 1
0
/*
 * the key control system call, 32-bit compatibility version for 64-bit archs
 * - this should only be called if the 64-bit arch uses weird pointers in
 *   32-bit mode or doesn't guarantee that the top 32-bits of the argument
 *   registers on taking a 32-bit syscall are zero
 * - if you can, you should call sys_keyctl directly
 */
asmlinkage long compat_sys_keyctl(u32 option,
			      u32 arg2, u32 arg3, u32 arg4, u32 arg5)
{
	switch (option) {
	case KEYCTL_GET_KEYRING_ID:
		return keyctl_get_keyring_ID(arg2, arg3);

	case KEYCTL_JOIN_SESSION_KEYRING:
		return keyctl_join_session_keyring(compat_ptr(arg2));

	case KEYCTL_UPDATE:
		return keyctl_update_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_REVOKE:
		return keyctl_revoke_key(arg2);

	case KEYCTL_DESCRIBE:
		return keyctl_describe_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_CLEAR:
		return keyctl_keyring_clear(arg2);

	case KEYCTL_LINK:
		return keyctl_keyring_link(arg2, arg3);

	case KEYCTL_UNLINK:
		return keyctl_keyring_unlink(arg2, arg3);

	case KEYCTL_SEARCH:
		return keyctl_keyring_search(arg2, compat_ptr(arg3),
					     compat_ptr(arg4), arg5);

	case KEYCTL_READ:
		return keyctl_read_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_CHOWN:
		return keyctl_chown_key(arg2, arg3, arg4);

	case KEYCTL_SETPERM:
		return keyctl_setperm_key(arg2, arg3);

	case KEYCTL_INSTANTIATE:
		return keyctl_instantiate_key(arg2, compat_ptr(arg3), arg4,
					      arg5);

	case KEYCTL_NEGATE:
		return keyctl_negate_key(arg2, arg3, arg4);

	default:
		return -EOPNOTSUPP;
	}

} /* end compat_sys_keyctl() */
Esempio n. 2
0
static void
setup (void *arg)
{
  key_serial_t keyring;
  struct passwd *pw;

  expect_message = NULL;

  keyring = keyctl_join_session_keyring (NULL);
  assert (keyring >= 0);

  pw = getpwuid (getuid ());
  assert (pw != NULL);
  user = strdup (pw->pw_name);
  assert (user != NULL);
}
Esempio n. 3
0
/*
 * the key control system call, 32-bit compatibility version for 64-bit archs
 * - this should only be called if the 64-bit arch uses weird pointers in
 *   32-bit mode or doesn't guarantee that the top 32-bits of the argument
 *   registers on taking a 32-bit syscall are zero
 * - if you can, you should call sys_keyctl directly
 */
asmlinkage long compat_sys_keyctl(u32 option,
				  u32 arg2, u32 arg3, u32 arg4, u32 arg5)
{
	switch (option) {
	case KEYCTL_GET_KEYRING_ID:
		return keyctl_get_keyring_ID(arg2, arg3);

	case KEYCTL_JOIN_SESSION_KEYRING:
		return keyctl_join_session_keyring(compat_ptr(arg2));

	case KEYCTL_UPDATE:
		return keyctl_update_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_REVOKE:
		return keyctl_revoke_key(arg2);

	case KEYCTL_DESCRIBE:
		return keyctl_describe_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_CLEAR:
		return keyctl_keyring_clear(arg2);

	case KEYCTL_LINK:
		return keyctl_keyring_link(arg2, arg3);

	case KEYCTL_UNLINK:
		return keyctl_keyring_unlink(arg2, arg3);

	case KEYCTL_SEARCH:
		return keyctl_keyring_search(arg2, compat_ptr(arg3),
					     compat_ptr(arg4), arg5);

	case KEYCTL_READ:
		return keyctl_read_key(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_CHOWN:
		return keyctl_chown_key(arg2, arg3, arg4);

	case KEYCTL_SETPERM:
		return keyctl_setperm_key(arg2, arg3);

	case KEYCTL_INSTANTIATE:
		return keyctl_instantiate_key(arg2, compat_ptr(arg3), arg4,
					      arg5);

	case KEYCTL_NEGATE:
		return keyctl_negate_key(arg2, arg3, arg4);

	case KEYCTL_SET_REQKEY_KEYRING:
		return keyctl_set_reqkey_keyring(arg2);

	case KEYCTL_SET_TIMEOUT:
		return keyctl_set_timeout(arg2, arg3);

	case KEYCTL_ASSUME_AUTHORITY:
		return keyctl_assume_authority(arg2);

	case KEYCTL_GET_SECURITY:
		return keyctl_get_security(arg2, compat_ptr(arg3), arg4);

	case KEYCTL_SESSION_TO_PARENT:
		return keyctl_session_to_parent();

	default:
		return -EOPNOTSUPP;
	}

} /* end compat_sys_keyctl() */
Esempio n. 4
0
int
sys_keyctl(struct tcb *tcp)
{
    int cmd = tcp->u_arg[0];

    if (entering(tcp))
        printxval(keyctl_commands, cmd, "KEYCTL_???");

    switch (cmd) {
    case KEYCTL_GET_KEYRING_ID:
        return keyctl_get_keyring_id(tcp, tcp->u_arg[1], tcp->u_arg[2]);

    case KEYCTL_JOIN_SESSION_KEYRING:
        return keyctl_join_session_keyring(tcp, tcp->u_arg[1]);

    case KEYCTL_UPDATE:
        return keyctl_update_key(tcp, tcp->u_arg[1],
                                 tcp->u_arg[2], tcp->u_arg[3]);

    case KEYCTL_REVOKE:
    case KEYCTL_CLEAR:
    case KEYCTL_INVALIDATE:
    case KEYCTL_ASSUME_AUTHORITY:
        return keyctl_handle_key(tcp, tcp->u_arg[1]);

    case KEYCTL_LINK:
    case KEYCTL_UNLINK:
        return keyctl_handle_key_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);

    case KEYCTL_DESCRIBE:
    case KEYCTL_READ:
    case KEYCTL_GET_SECURITY:
        return keyctl_read_key(tcp, tcp->u_arg[1],
                               tcp->u_arg[2], tcp->u_arg[3]);

    case KEYCTL_SEARCH:
        return keyctl_keyring_search(tcp, tcp->u_arg[1], tcp->u_arg[2],
                                     tcp->u_arg[3], tcp->u_arg[4]);

    case KEYCTL_CHOWN:
        return keyctl_chown_key(tcp, tcp->u_arg[1],
                                tcp->u_arg[2], tcp->u_arg[3]);

    case KEYCTL_SETPERM:
        return keyctl_setperm_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);

    case KEYCTL_INSTANTIATE:
        return keyctl_instantiate_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
                                      tcp->u_arg[3], tcp->u_arg[4]);

    case KEYCTL_NEGATE:
        return keyctl_negate_key(tcp, tcp->u_arg[1],
                                 tcp->u_arg[2], tcp->u_arg[3]);

    case KEYCTL_SET_REQKEY_KEYRING:
        return keyctl_set_reqkey_keyring(tcp, tcp->u_arg[1]);

    case KEYCTL_SET_TIMEOUT:
        return keyctl_set_timeout(tcp, tcp->u_arg[1], tcp->u_arg[2]);

    case KEYCTL_SESSION_TO_PARENT:
        return 0;

    case KEYCTL_REJECT:
        return keyctl_reject_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
                                 tcp->u_arg[3], tcp->u_arg[4]);

    case KEYCTL_INSTANTIATE_IOV:
        return keyctl_instantiate_key_iov(tcp, tcp->u_arg[1],
                                          tcp->u_arg[2], tcp->u_arg[3],
                                          tcp->u_arg[4]);

    case KEYCTL_GET_PERSISTENT:
        return keyctl_get_persistent(tcp, tcp->u_arg[1], tcp->u_arg[2]);

    default:
        if (entering(tcp))
            tprintf(", %#lx, %#lx, %#lx, %#lx",
                    tcp->u_arg[1], tcp->u_arg[2],
                    tcp->u_arg[3], tcp->u_arg[4]);
    }

    return 0;
}
Esempio n. 5
0
/*
 * the key control system call
 */
asmlinkage long sys_keyctl(int option, unsigned long arg2, unsigned long arg3,
			   unsigned long arg4, unsigned long arg5)
{
	switch (option) {
	case KEYCTL_GET_KEYRING_ID:
		return keyctl_get_keyring_ID((key_serial_t) arg2,
					     (int) arg3);

	case KEYCTL_JOIN_SESSION_KEYRING:
		return keyctl_join_session_keyring((const char __user *) arg2);

	case KEYCTL_UPDATE:
		return keyctl_update_key((key_serial_t) arg2,
					 (const void __user *) arg3,
					 (size_t) arg4);

	case KEYCTL_REVOKE:
		return keyctl_revoke_key((key_serial_t) arg2);

	case KEYCTL_DESCRIBE:
		return keyctl_describe_key((key_serial_t) arg2,
					   (char __user *) arg3,
					   (unsigned) arg4);

	case KEYCTL_CLEAR:
		return keyctl_keyring_clear((key_serial_t) arg2);

	case KEYCTL_LINK:
		return keyctl_keyring_link((key_serial_t) arg2,
					   (key_serial_t) arg3);

	case KEYCTL_UNLINK:
		return keyctl_keyring_unlink((key_serial_t) arg2,
					     (key_serial_t) arg3);

	case KEYCTL_SEARCH:
		return keyctl_keyring_search((key_serial_t) arg2,
					     (const char __user *) arg3,
					     (const char __user *) arg4,
					     (key_serial_t) arg5);

	case KEYCTL_READ:
		return keyctl_read_key((key_serial_t) arg2,
				       (char __user *) arg3,
				       (size_t) arg4);

	case KEYCTL_CHOWN:
		return keyctl_chown_key((key_serial_t) arg2,
					(uid_t) arg3,
					(gid_t) arg4);

	case KEYCTL_SETPERM:
		return keyctl_setperm_key((key_serial_t) arg2,
					  (key_perm_t) arg3);

	case KEYCTL_INSTANTIATE:
		return keyctl_instantiate_key((key_serial_t) arg2,
					      (const void __user *) arg3,
					      (size_t) arg4,
					      (key_serial_t) arg5);

	case KEYCTL_NEGATE:
		return keyctl_negate_key((key_serial_t) arg2,
					 (unsigned) arg3,
					 (key_serial_t) arg4);

	case KEYCTL_SET_REQKEY_KEYRING:
		return keyctl_set_reqkey_keyring(arg2);

	default:
		return -EOPNOTSUPP;
	}

} /* end sys_keyctl() */