| /* |
| * Copyright (c) 2014-2015 Dmitry V. Levin <[email protected]> |
| * Copyright (c) 2014-2018 The strace developers. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. The name of the author may not be used to endorse or promote products |
| * derived from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "defs.h" |
| |
| #include "keyctl_kdf_params.h" |
| #include "print_fields.h" |
| |
| typedef int32_t key_serial_t; |
| |
| #include "xlat/key_spec.h" |
| |
| struct keyctl_dh_params { |
| int32_t private; |
| int32_t prime; |
| int32_t base; |
| }; |
| |
| static void |
| print_keyring_serial_number(key_serial_t id) |
| { |
| printxval_d(key_spec, id, NULL); |
| } |
| |
| SYS_FUNC(add_key) |
| { |
| /* type */ |
| printstr(tcp, tcp->u_arg[0]); |
| /* description */ |
| tprints(", "); |
| printstr(tcp, tcp->u_arg[1]); |
| /* payload */ |
| tprints(", "); |
| printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]); |
| /* payload length */ |
| tprintf(", %" PRI_klu ", ", tcp->u_arg[3]); |
| /* keyring serial number */ |
| print_keyring_serial_number(tcp->u_arg[4]); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(request_key) |
| { |
| /* type */ |
| printstr(tcp, tcp->u_arg[0]); |
| /* description */ |
| tprints(", "); |
| printstr(tcp, tcp->u_arg[1]); |
| /* callout_info */ |
| tprints(", "); |
| printstr(tcp, tcp->u_arg[2]); |
| /* keyring serial number */ |
| tprints(", "); |
| print_keyring_serial_number(tcp->u_arg[3]); |
| |
| return RVAL_DECODED; |
| } |
| |
| static void |
| keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create) |
| { |
| print_keyring_serial_number(id); |
| tprintf(", %d", create); |
| } |
| |
| static void |
| keyctl_update_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr, |
| kernel_ulong_t len) |
| { |
| print_keyring_serial_number(id); |
| tprints(", "); |
| printstrn(tcp, addr, len); |
| tprintf(", %llu", zero_extend_signed_to_ull(len)); |
| } |
| |
| static void |
| keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2) |
| { |
| print_keyring_serial_number(id1); |
| tprints(", "); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_read_key(struct tcb *tcp, key_serial_t id, kernel_ulong_t addr, |
| kernel_ulong_t len, bool has_nul) |
| { |
| if (entering(tcp)) { |
| print_keyring_serial_number(id); |
| tprints(", "); |
| } else { |
| if (syserror(tcp)) |
| printaddr(addr); |
| else { |
| kernel_ulong_t rval = (tcp->u_rval >= 0) && |
| ((kernel_ulong_t) tcp->u_rval > len) ? len : |
| (kernel_ulong_t) tcp->u_rval; |
| printstr_ex(tcp, addr, rval, has_nul ? |
| QUOTE_OMIT_TRAILING_0 : 0); |
| } |
| tprintf(", %llu", zero_extend_signed_to_ull(len)); |
| } |
| } |
| |
| static void |
| keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr1, |
| kernel_ulong_t addr2, key_serial_t id2) |
| { |
| print_keyring_serial_number(id1); |
| tprints(", "); |
| printstr(tcp, addr1); |
| tprints(", "); |
| printstr(tcp, addr2); |
| tprints(", "); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_chown_key(struct tcb *tcp, key_serial_t id, unsigned user, |
| unsigned group) |
| { |
| print_keyring_serial_number(id); |
| printuid(", ", user); |
| printuid(", ", group); |
| } |
| |
| static void |
| keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, kernel_ulong_t addr, |
| kernel_ulong_t len, key_serial_t id2) |
| { |
| print_keyring_serial_number(id1); |
| tprints(", "); |
| printstrn(tcp, addr, len); |
| tprintf(", %llu, ", zero_extend_signed_to_ull(len)); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1, |
| kernel_ulong_t addr, kernel_ulong_t len, |
| key_serial_t id2) |
| { |
| print_keyring_serial_number(id1); |
| tprints(", "); |
| tprint_iov(tcp, len, addr, IOV_DECODE_STR); |
| tprintf(", %llu, ", zero_extend_signed_to_ull(len)); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout, |
| key_serial_t id2) |
| { |
| print_keyring_serial_number(id1); |
| tprintf(", %u, ", timeout); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout, |
| unsigned error, key_serial_t id2) |
| { |
| const char *err_str = err_name(error); |
| |
| print_keyring_serial_number(id1); |
| tprintf(", %u, ", timeout); |
| print_xlat_ex(error, err_str, XLAT_STYLE_FMT_U); |
| tprints(", "); |
| print_keyring_serial_number(id2); |
| } |
| |
| static void |
| keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout) |
| { |
| print_keyring_serial_number(id); |
| tprintf(", %u", timeout); |
| } |
| |
| static void |
| keyctl_get_persistent(struct tcb *tcp, unsigned uid, key_serial_t id) |
| { |
| printuid("", uid); |
| tprints(", "); |
| print_keyring_serial_number(id); |
| } |
| |
| #include "xlat/key_perms.h" |
| |
| static void |
| keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm) |
| { |
| print_keyring_serial_number(id); |
| tprints(", "); |
| printflags(key_perms, perm, "KEY_???"); |
| } |
| |
| static void |
| print_dh_params(struct tcb *tcp, kernel_ulong_t addr) |
| { |
| struct keyctl_dh_params params; |
| |
| if (umove_or_printaddr(tcp, addr, ¶ms)) |
| return; |
| |
| tprints("{private="); |
| print_keyring_serial_number(params.private); |
| tprints(", prime="); |
| print_keyring_serial_number(params.prime); |
| tprints(", base="); |
| print_keyring_serial_number(params.base); |
| tprints("}"); |
| } |
| |
| static void |
| keyctl_dh_compute(struct tcb *tcp, kernel_ulong_t params, kernel_ulong_t buf, |
| kernel_ulong_t len, kernel_ulong_t kdf_addr) |
| { |
| if (entering(tcp)) { |
| print_dh_params(tcp, params); |
| tprints(", "); |
| } else { |
| struct strace_keyctl_kdf_params kdf; |
| |
| if (syserror(tcp)) { |
| printaddr(buf); |
| } else { |
| kernel_ulong_t rval = (tcp->u_rval >= 0) && |
| ((kernel_ulong_t) tcp->u_rval > len) ? len : |
| (kernel_ulong_t) tcp->u_rval; |
| printstrn(tcp, buf, rval); |
| } |
| tprintf(", %llu, ", zero_extend_signed_to_ull(len)); |
| |
| if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) { |
| printaddr(kdf_addr); |
| } else { |
| size_t i; |
| |
| PRINT_FIELD_STR("{", kdf, hashname, tcp); |
| |
| /* |
| * Kernel doesn't touch otherinfo |
| * if otherinfolen is zero. |
| */ |
| if (kdf.otherinfolen) |
| PRINT_FIELD_STRN(", ", kdf, otherinfo, |
| kdf.otherinfolen, tcp); |
| else |
| PRINT_FIELD_PTR(", ", kdf, otherinfo); |
| |
| PRINT_FIELD_U(", ", kdf, otherinfolen); |
| |
| /* Some future-proofing */ |
| for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) { |
| if (kdf.__spare[i]) |
| break; |
| } |
| |
| if (i < ARRAY_SIZE(kdf.__spare)) { |
| tprints(", __spare=["); |
| |
| for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) { |
| if (i) |
| tprints(", "); |
| |
| tprintf("%#x", kdf.__spare[i]); |
| } |
| |
| tprints("]"); |
| } |
| |
| tprints("}"); |
| } |
| } |
| } |
| |
| static void |
| keyctl_restrict_keyring(struct tcb *const tcp, |
| const key_serial_t id, |
| const kernel_ulong_t addr1, |
| const kernel_ulong_t addr2) |
| { |
| print_keyring_serial_number(id); |
| tprints(", "); |
| printstr(tcp, addr1); |
| tprints(", "); |
| printstr(tcp, addr2); |
| } |
| |
| #include "xlat/key_reqkeys.h" |
| #include "xlat/keyctl_commands.h" |
| |
| SYS_FUNC(keyctl) |
| { |
| int cmd = tcp->u_arg[0]; |
| kernel_ulong_t arg2 = tcp->u_arg[1]; |
| kernel_ulong_t arg3 = tcp->u_arg[2]; |
| kernel_ulong_t arg4 = tcp->u_arg[3]; |
| kernel_ulong_t arg5 = tcp->u_arg[4]; |
| |
| if (entering(tcp)) { |
| printxval(keyctl_commands, cmd, "KEYCTL_???"); |
| |
| /* |
| * For now, KEYCTL_SESSION_TO_PARENT is the only cmd without |
| * arguments. |
| */ |
| if (cmd != KEYCTL_SESSION_TO_PARENT) |
| tprints(", "); |
| } |
| |
| switch (cmd) { |
| case KEYCTL_GET_KEYRING_ID: |
| keyctl_get_keyring_id(tcp, arg2, arg3); |
| break; |
| |
| case KEYCTL_JOIN_SESSION_KEYRING: |
| printstr(tcp, arg2); |
| break; |
| |
| case KEYCTL_UPDATE: |
| keyctl_update_key(tcp, arg2, arg3, arg4); |
| break; |
| |
| case KEYCTL_REVOKE: |
| case KEYCTL_CLEAR: |
| case KEYCTL_INVALIDATE: |
| case KEYCTL_ASSUME_AUTHORITY: |
| print_keyring_serial_number(arg2); |
| break; |
| |
| case KEYCTL_LINK: |
| case KEYCTL_UNLINK: |
| keyctl_handle_key_key(tcp, arg2, arg3); |
| break; |
| |
| case KEYCTL_DESCRIBE: |
| case KEYCTL_READ: |
| case KEYCTL_GET_SECURITY: |
| keyctl_read_key(tcp, arg2, arg3, arg4, cmd != KEYCTL_READ); |
| return 0; |
| |
| case KEYCTL_SEARCH: |
| keyctl_keyring_search(tcp, arg2, arg3, arg4, arg5); |
| break; |
| |
| case KEYCTL_CHOWN: |
| keyctl_chown_key(tcp, arg2, arg3, arg4); |
| break; |
| |
| case KEYCTL_SETPERM: |
| keyctl_setperm_key(tcp, arg2, arg3); |
| break; |
| |
| case KEYCTL_INSTANTIATE: |
| keyctl_instantiate_key(tcp, arg2, arg3, arg4, arg5); |
| break; |
| |
| case KEYCTL_NEGATE: |
| keyctl_negate_key(tcp, arg2, arg3, arg4); |
| break; |
| |
| case KEYCTL_SET_REQKEY_KEYRING: |
| printxvals_ex((int) arg2, "KEY_REQKEY_DEFL_???", |
| XLAT_STYLE_FMT_D, key_reqkeys, NULL); |
| break; |
| |
| case KEYCTL_SET_TIMEOUT: |
| keyctl_set_timeout(tcp, arg2, arg3); |
| break; |
| |
| case KEYCTL_SESSION_TO_PARENT: |
| break; |
| |
| case KEYCTL_REJECT: |
| keyctl_reject_key(tcp, arg2, arg3, arg4, arg5); |
| break; |
| |
| case KEYCTL_INSTANTIATE_IOV: |
| keyctl_instantiate_key_iov(tcp, arg2, arg3, arg4, arg5); |
| break; |
| |
| case KEYCTL_GET_PERSISTENT: |
| keyctl_get_persistent(tcp, arg2, arg3); |
| break; |
| |
| case KEYCTL_DH_COMPUTE: |
| keyctl_dh_compute(tcp, arg2, arg3, arg4, arg5); |
| return 0; |
| |
| case KEYCTL_RESTRICT_KEYRING: |
| keyctl_restrict_keyring(tcp, arg2, arg3, arg4); |
| break; |
| |
| default: |
| tprintf("%#" PRI_klx ", %#" PRI_klx |
| ", %#" PRI_klx ", %#" PRI_klx, |
| arg2, arg3, arg4, arg5); |
| break; |
| } |
| |
| return RVAL_DECODED; |
| } |