Blame view

kernel/linux-imx6_3.14.28/security/keys/compat.c 3.76 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
  /* 32-bit compatibility syscall for 64-bit systems
   *
   * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
   * Written by David Howells (dhowells@redhat.com)
   *
   * This program is free software; you can redistribute it and/or
   * modify it under the terms of the GNU General Public License
   * as published by the Free Software Foundation; either version
   * 2 of the License, or (at your option) any later version.
   */
  
  #include <linux/syscalls.h>
  #include <linux/keyctl.h>
  #include <linux/compat.h>
  #include <linux/slab.h>
  #include "internal.h"
  
  /*
   * Instantiate a key with the specified compatibility multipart payload and
   * link the key into the destination keyring if one is given.
   *
   * The caller must have the appropriate instantiation permit set for this to
   * work (see keyctl_assume_authority).  No other permissions are required.
   *
   * If successful, 0 will be returned.
   */
  static long compat_keyctl_instantiate_key_iov(
  	key_serial_t id,
  	const struct compat_iovec __user *_payload_iov,
  	unsigned ioc,
  	key_serial_t ringid)
  {
  	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
  	long ret;
  
  	if (!_payload_iov || !ioc)
  		goto no_payload;
  
  	ret = compat_rw_copy_check_uvector(WRITE, _payload_iov, ioc,
  					   ARRAY_SIZE(iovstack),
  					   iovstack, &iov);
  	if (ret < 0)
  		goto err;
  	if (ret == 0)
  		goto no_payload_free;
  
  	ret = keyctl_instantiate_key_common(id, iov, ioc, ret, ringid);
  err:
  	if (iov != iovstack)
  		kfree(iov);
  	return ret;
  
  no_payload_free:
  	if (iov != iovstack)
  		kfree(iov);
  no_payload:
  	return keyctl_instantiate_key_common(id, NULL, 0, 0, ringid);
  }
  
  /*
   * The key control system call, 32-bit compatibility version for 64-bit archs
   *
   * This should only be called if the 64-bit arch uses weird pointers in 32-bit
   * mode or doesn't guarantee that the top 32-bits of the argument registers on
   * taking a 32-bit syscall are zero.  If you can, you should call sys_keyctl()
   * directly.
   */
  asmlinkage long compat_sys_keyctl(u32 option,
  				  u32 arg2, u32 arg3, u32 arg4, u32 arg5)
  {
  	switch (option) {
  	case KEYCTL_GET_KEYRING_ID:
  		return keyctl_get_keyring_ID(arg2, arg3);
  
  	case KEYCTL_JOIN_SESSION_KEYRING:
  		return keyctl_join_session_keyring(compat_ptr(arg2));
  
  	case KEYCTL_UPDATE:
  		return keyctl_update_key(arg2, compat_ptr(arg3), arg4);
  
  	case KEYCTL_REVOKE:
  		return keyctl_revoke_key(arg2);
  
  	case KEYCTL_DESCRIBE:
  		return keyctl_describe_key(arg2, compat_ptr(arg3), arg4);
  
  	case KEYCTL_CLEAR:
  		return keyctl_keyring_clear(arg2);
  
  	case KEYCTL_LINK:
  		return keyctl_keyring_link(arg2, arg3);
  
  	case KEYCTL_UNLINK:
  		return keyctl_keyring_unlink(arg2, arg3);
  
  	case KEYCTL_SEARCH:
  		return keyctl_keyring_search(arg2, compat_ptr(arg3),
  					     compat_ptr(arg4), arg5);
  
  	case KEYCTL_READ:
  		return keyctl_read_key(arg2, compat_ptr(arg3), arg4);
  
  	case KEYCTL_CHOWN:
  		return keyctl_chown_key(arg2, arg3, arg4);
  
  	case KEYCTL_SETPERM:
  		return keyctl_setperm_key(arg2, arg3);
  
  	case KEYCTL_INSTANTIATE:
  		return keyctl_instantiate_key(arg2, compat_ptr(arg3), arg4,
  					      arg5);
  
  	case KEYCTL_NEGATE:
  		return keyctl_negate_key(arg2, arg3, arg4);
  
  	case KEYCTL_SET_REQKEY_KEYRING:
  		return keyctl_set_reqkey_keyring(arg2);
  
  	case KEYCTL_SET_TIMEOUT:
  		return keyctl_set_timeout(arg2, arg3);
  
  	case KEYCTL_ASSUME_AUTHORITY:
  		return keyctl_assume_authority(arg2);
  
  	case KEYCTL_GET_SECURITY:
  		return keyctl_get_security(arg2, compat_ptr(arg3), arg4);
  
  	case KEYCTL_SESSION_TO_PARENT:
  		return keyctl_session_to_parent();
  
  	case KEYCTL_REJECT:
  		return keyctl_reject_key(arg2, arg3, arg4, arg5);
  
  	case KEYCTL_INSTANTIATE_IOV:
  		return compat_keyctl_instantiate_key_iov(
  			arg2, compat_ptr(arg3), arg4, arg5);
  
  	case KEYCTL_INVALIDATE:
  		return keyctl_invalidate_key(arg2);
  
  	case KEYCTL_GET_PERSISTENT:
  		return keyctl_get_persistent(arg2, arg3);
  
  	default:
  		return -EOPNOTSUPP;
  	}
  }