diff options
author | David Howells <dhowells@redhat.com> | 2011-03-11 18:57:23 +0100 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2011-03-17 01:59:32 +0100 |
commit | 78b7280cce23293f7570ad52c1ffe1485c6d9669 (patch) | |
tree | f3051c5fe69cb41e88f9470dead8534dda3e94e0 /security/keys/request_key.c | |
parent | Merge branch 'security-next' of git://git.kernel.org/pub/scm/linux/kernel/git... (diff) | |
download | linux-78b7280cce23293f7570ad52c1ffe1485c6d9669.tar.xz linux-78b7280cce23293f7570ad52c1ffe1485c6d9669.zip |
KEYS: Improve /proc/keys
Improve /proc/keys by:
(1) Don't attempt to summarise the payload of a negated key. It won't have
one. To this end, a helper function - key_is_instantiated() has been
added that allows the caller to find out whether the key is positively
instantiated (as opposed to being uninstantiated or negatively
instantiated).
(2) Do show keys that are negative, expired or revoked rather than hiding
them. This requires an override flag (no_state_check) to be passed to
search_my_process_keyrings() and keyring_search_aux() to suppress this
check.
Without this, keys that are possessed by the caller, but only grant
permissions to the caller if possessed are skipped as the possession check
fails.
Keys that are visible due to user, group or other checks are visible with
or without this patch.
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/keys/request_key.c')
-rw-r--r-- | security/keys/request_key.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/security/keys/request_key.c b/security/keys/request_key.c index df3c0417ee40..b18a71745901 100644 --- a/security/keys/request_key.c +++ b/security/keys/request_key.c @@ -530,8 +530,7 @@ struct key *request_key_and_link(struct key_type *type, dest_keyring, flags); /* search all the process keyrings for a key */ - key_ref = search_process_keyrings(type, description, type->match, - cred); + key_ref = search_process_keyrings(type, description, type->match, cred); if (!IS_ERR(key_ref)) { key = key_ref_to_ptr(key_ref); |