xref: /openbmc/linux/security/keys/proc.c (revision 643d1f7f)
1 /* proc.c: proc files for key database enumeration
2  *
3  * Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.
4  * Written by David Howells (dhowells@redhat.com)
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU General Public License
8  * as published by the Free Software Foundation; either version
9  * 2 of the License, or (at your option) any later version.
10  */
11 
12 #include <linux/module.h>
13 #include <linux/init.h>
14 #include <linux/sched.h>
15 #include <linux/slab.h>
16 #include <linux/fs.h>
17 #include <linux/proc_fs.h>
18 #include <linux/seq_file.h>
19 #include <asm/errno.h>
20 #include "internal.h"
21 
22 #ifdef CONFIG_KEYS_DEBUG_PROC_KEYS
23 static int proc_keys_open(struct inode *inode, struct file *file);
24 static void *proc_keys_start(struct seq_file *p, loff_t *_pos);
25 static void *proc_keys_next(struct seq_file *p, void *v, loff_t *_pos);
26 static void proc_keys_stop(struct seq_file *p, void *v);
27 static int proc_keys_show(struct seq_file *m, void *v);
28 
29 static const struct seq_operations proc_keys_ops = {
30 	.start	= proc_keys_start,
31 	.next	= proc_keys_next,
32 	.stop	= proc_keys_stop,
33 	.show	= proc_keys_show,
34 };
35 
36 static const struct file_operations proc_keys_fops = {
37 	.open		= proc_keys_open,
38 	.read		= seq_read,
39 	.llseek		= seq_lseek,
40 	.release	= seq_release,
41 };
42 #endif
43 
44 static int proc_key_users_open(struct inode *inode, struct file *file);
45 static void *proc_key_users_start(struct seq_file *p, loff_t *_pos);
46 static void *proc_key_users_next(struct seq_file *p, void *v, loff_t *_pos);
47 static void proc_key_users_stop(struct seq_file *p, void *v);
48 static int proc_key_users_show(struct seq_file *m, void *v);
49 
50 static const struct seq_operations proc_key_users_ops = {
51 	.start	= proc_key_users_start,
52 	.next	= proc_key_users_next,
53 	.stop	= proc_key_users_stop,
54 	.show	= proc_key_users_show,
55 };
56 
57 static const struct file_operations proc_key_users_fops = {
58 	.open		= proc_key_users_open,
59 	.read		= seq_read,
60 	.llseek		= seq_lseek,
61 	.release	= seq_release,
62 };
63 
64 /*****************************************************************************/
65 /*
66  * declare the /proc files
67  */
68 static int __init key_proc_init(void)
69 {
70 	struct proc_dir_entry *p;
71 
72 #ifdef CONFIG_KEYS_DEBUG_PROC_KEYS
73 	p = create_proc_entry("keys", 0, NULL);
74 	if (!p)
75 		panic("Cannot create /proc/keys\n");
76 
77 	p->proc_fops = &proc_keys_fops;
78 #endif
79 
80 	p = create_proc_entry("key-users", 0, NULL);
81 	if (!p)
82 		panic("Cannot create /proc/key-users\n");
83 
84 	p->proc_fops = &proc_key_users_fops;
85 
86 	return 0;
87 
88 } /* end key_proc_init() */
89 
90 __initcall(key_proc_init);
91 
92 /*****************************************************************************/
93 /*
94  * implement "/proc/keys" to provides a list of the keys on the system
95  */
96 #ifdef CONFIG_KEYS_DEBUG_PROC_KEYS
97 
98 static int proc_keys_open(struct inode *inode, struct file *file)
99 {
100 	return seq_open(file, &proc_keys_ops);
101 
102 }
103 
104 static void *proc_keys_start(struct seq_file *p, loff_t *_pos)
105 {
106 	struct rb_node *_p;
107 	loff_t pos = *_pos;
108 
109 	spin_lock(&key_serial_lock);
110 
111 	_p = rb_first(&key_serial_tree);
112 	while (pos > 0 && _p) {
113 		pos--;
114 		_p = rb_next(_p);
115 	}
116 
117 	return _p;
118 
119 }
120 
121 static void *proc_keys_next(struct seq_file *p, void *v, loff_t *_pos)
122 {
123 	(*_pos)++;
124 	return rb_next((struct rb_node *) v);
125 
126 }
127 
128 static void proc_keys_stop(struct seq_file *p, void *v)
129 {
130 	spin_unlock(&key_serial_lock);
131 }
132 
133 static int proc_keys_show(struct seq_file *m, void *v)
134 {
135 	struct rb_node *_p = v;
136 	struct key *key = rb_entry(_p, struct key, serial_node);
137 	struct timespec now;
138 	unsigned long timo;
139 	char xbuf[12];
140 	int rc;
141 
142 	/* check whether the current task is allowed to view the key (assuming
143 	 * non-possession) */
144 	rc = key_task_permission(make_key_ref(key, 0), current, KEY_VIEW);
145 	if (rc < 0)
146 		return 0;
147 
148 	now = current_kernel_time();
149 
150 	rcu_read_lock();
151 
152 	/* come up with a suitable timeout value */
153 	if (key->expiry == 0) {
154 		memcpy(xbuf, "perm", 5);
155 	}
156 	else if (now.tv_sec >= key->expiry) {
157 		memcpy(xbuf, "expd", 5);
158 	}
159 	else {
160 		timo = key->expiry - now.tv_sec;
161 
162 		if (timo < 60)
163 			sprintf(xbuf, "%lus", timo);
164 		else if (timo < 60*60)
165 			sprintf(xbuf, "%lum", timo / 60);
166 		else if (timo < 60*60*24)
167 			sprintf(xbuf, "%luh", timo / (60*60));
168 		else if (timo < 60*60*24*7)
169 			sprintf(xbuf, "%lud", timo / (60*60*24));
170 		else
171 			sprintf(xbuf, "%luw", timo / (60*60*24*7));
172 	}
173 
174 #define showflag(KEY, LETTER, FLAG) \
175 	(test_bit(FLAG,	&(KEY)->flags) ? LETTER : '-')
176 
177 	seq_printf(m, "%08x %c%c%c%c%c%c %5d %4s %08x %5d %5d %-9.9s ",
178 		   key->serial,
179 		   showflag(key, 'I', KEY_FLAG_INSTANTIATED),
180 		   showflag(key, 'R', KEY_FLAG_REVOKED),
181 		   showflag(key, 'D', KEY_FLAG_DEAD),
182 		   showflag(key, 'Q', KEY_FLAG_IN_QUOTA),
183 		   showflag(key, 'U', KEY_FLAG_USER_CONSTRUCT),
184 		   showflag(key, 'N', KEY_FLAG_NEGATIVE),
185 		   atomic_read(&key->usage),
186 		   xbuf,
187 		   key->perm,
188 		   key->uid,
189 		   key->gid,
190 		   key->type->name);
191 
192 #undef showflag
193 
194 	if (key->type->describe)
195 		key->type->describe(key, m);
196 	seq_putc(m, '\n');
197 
198 	rcu_read_unlock();
199 
200 	return 0;
201 
202 }
203 
204 #endif /* CONFIG_KEYS_DEBUG_PROC_KEYS */
205 
206 /*****************************************************************************/
207 /*
208  * implement "/proc/key-users" to provides a list of the key users
209  */
210 static int proc_key_users_open(struct inode *inode, struct file *file)
211 {
212 	return seq_open(file, &proc_key_users_ops);
213 
214 }
215 
216 static void *proc_key_users_start(struct seq_file *p, loff_t *_pos)
217 {
218 	struct rb_node *_p;
219 	loff_t pos = *_pos;
220 
221 	spin_lock(&key_user_lock);
222 
223 	_p = rb_first(&key_user_tree);
224 	while (pos > 0 && _p) {
225 		pos--;
226 		_p = rb_next(_p);
227 	}
228 
229 	return _p;
230 
231 }
232 
233 static void *proc_key_users_next(struct seq_file *p, void *v, loff_t *_pos)
234 {
235 	(*_pos)++;
236 	return rb_next((struct rb_node *) v);
237 
238 }
239 
240 static void proc_key_users_stop(struct seq_file *p, void *v)
241 {
242 	spin_unlock(&key_user_lock);
243 }
244 
245 static int proc_key_users_show(struct seq_file *m, void *v)
246 {
247 	struct rb_node *_p = v;
248 	struct key_user *user = rb_entry(_p, struct key_user, node);
249 
250 	seq_printf(m, "%5u: %5d %d/%d %d/%d %d/%d\n",
251 		   user->uid,
252 		   atomic_read(&user->usage),
253 		   atomic_read(&user->nkeys),
254 		   atomic_read(&user->nikeys),
255 		   user->qnkeys,
256 		   KEYQUOTA_MAX_KEYS,
257 		   user->qnbytes,
258 		   KEYQUOTA_MAX_BYTES
259 		   );
260 
261 	return 0;
262 
263 }
264