]> granicus.if.org Git - strace/blob - keyctl.c
tests: move F_OFD_SETLK* checks from fcntl64.c to fcntl-common.c
[strace] / keyctl.c
1 /*
2  * Copyright (c) 2014-2015 Dmitry V. Levin <ldv@altlinux.org>
3  * Copyright (c) 2014-2017 The strace developers.
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. The name of the author may not be used to endorse or promote products
15  *    derived from this software without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27  */
28
29 #include "defs.h"
30
31 #include "keyctl_kdf_params.h"
32 #include "print_fields.h"
33
34 typedef int32_t key_serial_t;
35
36 #include "xlat/key_spec.h"
37
38 struct keyctl_dh_params {
39         int32_t private;
40         int32_t prime;
41         int32_t base;
42 };
43
44 static void
45 print_keyring_serial_number(key_serial_t id)
46 {
47         printxval_d(key_spec, id, NULL);
48 }
49
50 SYS_FUNC(add_key)
51 {
52         /* type */
53         printstr(tcp, tcp->u_arg[0]);
54         /* description */
55         tprints(", ");
56         printstr(tcp, tcp->u_arg[1]);
57         /* payload */
58         tprints(", ");
59         printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]);
60         /* payload length */
61         tprintf(", %" PRI_klu ", ", tcp->u_arg[3]);
62         /* keyring serial number */
63         print_keyring_serial_number(tcp->u_arg[4]);
64
65         return RVAL_DECODED;
66 }
67
68 SYS_FUNC(request_key)
69 {
70         /* type */
71         printstr(tcp, tcp->u_arg[0]);
72         /* description */
73         tprints(", ");
74         printstr(tcp, tcp->u_arg[1]);
75         /* callout_info */
76         tprints(", ");
77         printstr(tcp, tcp->u_arg[2]);
78         /* keyring serial number */
79         tprints(", ");
80         print_keyring_serial_number(tcp->u_arg[3]);
81
82         return RVAL_DECODED;
83 }
84
85 static void
86 keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
87 {
88         print_keyring_serial_number(id);
89         tprintf(", %d", create);
90 }
91
92 static void
93 keyctl_update_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
94                   kernel_ulong_t len)
95 {
96         print_keyring_serial_number(id);
97         tprints(", ");
98         printstrn(tcp, addr, len);
99         tprintf(", %llu", zero_extend_signed_to_ull(len));
100 }
101
102 static void
103 keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
104 {
105         print_keyring_serial_number(id1);
106         tprints(", ");
107         print_keyring_serial_number(id2);
108 }
109
110 static void
111 keyctl_read_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr,
112                 kernel_ulong_t len, bool has_nul)
113 {
114         if (entering(tcp)) {
115                 print_keyring_serial_number(id);
116                 tprints(", ");
117         } else {
118                 if (syserror(tcp))
119                         printaddr(addr);
120                 else {
121                         kernel_ulong_t rval = (tcp->u_rval >= 0) &&
122                                 ((kernel_ulong_t) tcp->u_rval > len) ? len :
123                                 (kernel_ulong_t) tcp->u_rval;
124                         printstr_ex(tcp, addr, rval, has_nul ?
125                                     QUOTE_OMIT_TRAILING_0 : 0);
126                 }
127                 tprintf(", %llu", zero_extend_signed_to_ull(len));
128         }
129 }
130
131 static void
132 keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr1,
133                       kernel_ulong_t addr2, key_serial_t id2)
134 {
135         print_keyring_serial_number(id1);
136         tprints(", ");
137         printstr(tcp, addr1);
138         tprints(", ");
139         printstr(tcp, addr2);
140         tprints(", ");
141         print_keyring_serial_number(id2);
142 }
143
144 static void
145 keyctl_chown_key(struct tcb *tcp, key_serial_t id, unsigned user,
146                  unsigned group)
147 {
148         print_keyring_serial_number(id);
149         printuid(", ", user);
150         printuid(", ", group);
151 }
152
153 static void
154 keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr,
155                        kernel_ulong_t len, key_serial_t id2)
156 {
157         print_keyring_serial_number(id1);
158         tprints(", ");
159         printstrn(tcp, addr, len);
160         tprintf(", %llu, ", zero_extend_signed_to_ull(len));
161         print_keyring_serial_number(id2);
162 }
163
164 static void
165 keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
166                            kernel_ulong_t addr, kernel_ulong_t len,
167                            key_serial_t id2)
168 {
169         print_keyring_serial_number(id1);
170         tprints(", ");
171         tprint_iov(tcp, len, addr, IOV_DECODE_STR);
172         tprintf(", %llu, ", zero_extend_signed_to_ull(len));
173         print_keyring_serial_number(id2);
174 }
175
176 static void
177 keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
178                   key_serial_t id2)
179 {
180         print_keyring_serial_number(id1);
181         tprintf(", %u, ", timeout);
182         print_keyring_serial_number(id2);
183 }
184
185 static void
186 keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
187                   unsigned error, key_serial_t id2)
188 {
189         const char *err_str = err_name(error);
190
191         print_keyring_serial_number(id1);
192         tprintf(", %u, ", timeout);
193         print_xlat_ex(error, err_str, XLAT_STYLE_FMT_U);
194         tprints(", ");
195         print_keyring_serial_number(id2);
196 }
197
198 static void
199 keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
200 {
201         print_keyring_serial_number(id);
202         tprintf(", %u", timeout);
203 }
204
205 static void
206 keyctl_get_persistent(struct tcb *tcp, unsigned uid, key_serial_t id)
207 {
208         printuid("", uid);
209         tprints(", ");
210         print_keyring_serial_number(id);
211 }
212
213 #include "xlat/key_perms.h"
214
215 static void
216 keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
217 {
218         print_keyring_serial_number(id);
219         tprints(", ");
220         printflags(key_perms, perm, "KEY_???");
221 }
222
223 static void
224 print_dh_params(struct tcb *tcp, kernel_ulong_t addr)
225 {
226         struct keyctl_dh_params params;
227
228         if (umove_or_printaddr(tcp, addr, &params))
229                 return;
230
231         tprints("{private=");
232         print_keyring_serial_number(params.private);
233         tprints(", prime=");
234         print_keyring_serial_number(params.prime);
235         tprints(", base=");
236         print_keyring_serial_number(params.base);
237         tprints("}");
238 }
239
240 static void
241 keyctl_dh_compute(struct tcb *tcp, kernel_ulong_t params, kernel_ulong_t buf,
242                   kernel_ulong_t len, kernel_ulong_t kdf_addr)
243 {
244         if (entering(tcp)) {
245                 print_dh_params(tcp, params);
246                 tprints(", ");
247         } else {
248                 struct strace_keyctl_kdf_params kdf;
249
250                 if (syserror(tcp)) {
251                         printaddr(buf);
252                 } else {
253                         kernel_ulong_t rval = (tcp->u_rval >= 0) &&
254                                 ((kernel_ulong_t) tcp->u_rval > len) ? len :
255                                 (kernel_ulong_t) tcp->u_rval;
256                         printstrn(tcp, buf, rval);
257                 }
258                 tprintf(", %llu, ", zero_extend_signed_to_ull(len));
259
260                 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) {
261                         printaddr(kdf_addr);
262                 } else {
263                         size_t i;
264
265                         PRINT_FIELD_STR("{", kdf, hashname, tcp);
266
267                         /*
268                          * Kernel doesn't touch otherinfo
269                          * if otherinfolen is zero.
270                          */
271                         if (kdf.otherinfolen)
272                                 PRINT_FIELD_STRN(", ", kdf, otherinfo,
273                                                  kdf.otherinfolen, tcp);
274                         else
275                                 PRINT_FIELD_PTR(", ", kdf, otherinfo);
276
277                         PRINT_FIELD_U(", ", kdf, otherinfolen);
278
279                         /* Some future-proofing */
280                         for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
281                                 if (kdf.__spare[i])
282                                         break;
283                         }
284
285                         if (i < ARRAY_SIZE(kdf.__spare)) {
286                                 tprints(", __spare=[");
287
288                                 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) {
289                                         if (i)
290                                                 tprints(", ");
291
292                                         tprintf("%#x", kdf.__spare[i]);
293                                 }
294
295                                 tprints("]");
296                         }
297
298                         tprints("}");
299                 }
300         }
301 }
302
303 static void
304 keyctl_restrict_keyring(struct tcb *const tcp,
305                         const key_serial_t id,
306                         const kernel_ulong_t addr1,
307                         const kernel_ulong_t addr2)
308 {
309         print_keyring_serial_number(id);
310         tprints(", ");
311         printstr(tcp, addr1);
312         tprints(", ");
313         printstr(tcp, addr2);
314 }
315
316 #include "xlat/key_reqkeys.h"
317 #include "xlat/keyctl_commands.h"
318
319 SYS_FUNC(keyctl)
320 {
321         int cmd = tcp->u_arg[0];
322         kernel_ulong_t arg2 = tcp->u_arg[1];
323         kernel_ulong_t arg3 = tcp->u_arg[2];
324         kernel_ulong_t arg4 = tcp->u_arg[3];
325         kernel_ulong_t arg5 = tcp->u_arg[4];
326
327         if (entering(tcp)) {
328                 printxval(keyctl_commands, cmd, "KEYCTL_???");
329
330                 /*
331                  * For now, KEYCTL_SESSION_TO_PARENT is the only cmd without
332                  * arguments.
333                  */
334                 if (cmd != KEYCTL_SESSION_TO_PARENT)
335                         tprints(", ");
336         }
337
338         switch (cmd) {
339         case KEYCTL_GET_KEYRING_ID:
340                 keyctl_get_keyring_id(tcp, arg2, arg3);
341                 break;
342
343         case KEYCTL_JOIN_SESSION_KEYRING:
344                 printstr(tcp, arg2);
345                 break;
346
347         case KEYCTL_UPDATE:
348                 keyctl_update_key(tcp, arg2, arg3, arg4);
349                 break;
350
351         case KEYCTL_REVOKE:
352         case KEYCTL_CLEAR:
353         case KEYCTL_INVALIDATE:
354         case KEYCTL_ASSUME_AUTHORITY:
355                 print_keyring_serial_number(arg2);
356                 break;
357
358         case KEYCTL_LINK:
359         case KEYCTL_UNLINK:
360                 keyctl_handle_key_key(tcp, arg2, arg3);
361                 break;
362
363         case KEYCTL_DESCRIBE:
364         case KEYCTL_READ:
365         case KEYCTL_GET_SECURITY:
366                 keyctl_read_key(tcp, arg2, arg3, arg4, cmd != KEYCTL_READ);
367                 return 0;
368
369         case KEYCTL_SEARCH:
370                 keyctl_keyring_search(tcp, arg2, arg3, arg4, arg5);
371                 break;
372
373         case KEYCTL_CHOWN:
374                 keyctl_chown_key(tcp, arg2, arg3, arg4);
375                 break;
376
377         case KEYCTL_SETPERM:
378                 keyctl_setperm_key(tcp, arg2, arg3);
379                 break;
380
381         case KEYCTL_INSTANTIATE:
382                 keyctl_instantiate_key(tcp, arg2, arg3, arg4, arg5);
383                 break;
384
385         case KEYCTL_NEGATE:
386                 keyctl_negate_key(tcp, arg2, arg3, arg4);
387                 break;
388
389         case KEYCTL_SET_REQKEY_KEYRING:
390                 printxvals_ex((int) arg2, "KEY_REQKEY_DEFL_???",
391                               XLAT_STYLE_FMT_D, key_reqkeys, NULL);
392                 break;
393
394         case KEYCTL_SET_TIMEOUT:
395                 keyctl_set_timeout(tcp, arg2, arg3);
396                 break;
397
398         case KEYCTL_SESSION_TO_PARENT:
399                 break;
400
401         case KEYCTL_REJECT:
402                 keyctl_reject_key(tcp, arg2, arg3, arg4, arg5);
403                 break;
404
405         case KEYCTL_INSTANTIATE_IOV:
406                 keyctl_instantiate_key_iov(tcp, arg2, arg3, arg4, arg5);
407                 break;
408
409         case KEYCTL_GET_PERSISTENT:
410                 keyctl_get_persistent(tcp, arg2, arg3);
411                 break;
412
413         case KEYCTL_DH_COMPUTE:
414                 keyctl_dh_compute(tcp, arg2, arg3, arg4, arg5);
415                 return 0;
416
417         case KEYCTL_RESTRICT_KEYRING:
418                 keyctl_restrict_keyring(tcp, arg2, arg3, arg4);
419                 break;
420
421         default:
422                 tprintf("%#" PRI_klx ", %#" PRI_klx
423                         ", %#" PRI_klx ", %#" PRI_klx,
424                         arg2, arg3, arg4, arg5);
425                 break;
426         }
427
428         return RVAL_DECODED;
429 }