187 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			187 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0
 | |
| /* Use watch_queue API to watch for notifications.
 | |
|  *
 | |
|  * Copyright (C) 2020 Red Hat, Inc. All Rights Reserved.
 | |
|  * Written by David Howells (dhowells@redhat.com)
 | |
|  */
 | |
| 
 | |
| #define _GNU_SOURCE
 | |
| #include <stdbool.h>
 | |
| #include <stdarg.h>
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include <signal.h>
 | |
| #include <unistd.h>
 | |
| #include <errno.h>
 | |
| #include <sys/ioctl.h>
 | |
| #include <limits.h>
 | |
| #include <linux/watch_queue.h>
 | |
| #include <linux/unistd.h>
 | |
| #include <linux/keyctl.h>
 | |
| 
 | |
| #ifndef KEYCTL_WATCH_KEY
 | |
| #define KEYCTL_WATCH_KEY -1
 | |
| #endif
 | |
| #ifndef __NR_keyctl
 | |
| #define __NR_keyctl -1
 | |
| #endif
 | |
| 
 | |
| #define BUF_SIZE 256
 | |
| 
 | |
| static long keyctl_watch_key(int key, int watch_fd, int watch_id)
 | |
| {
 | |
| 	return syscall(__NR_keyctl, KEYCTL_WATCH_KEY, key, watch_fd, watch_id);
 | |
| }
 | |
| 
 | |
| static const char *key_subtypes[256] = {
 | |
| 	[NOTIFY_KEY_INSTANTIATED]	= "instantiated",
 | |
| 	[NOTIFY_KEY_UPDATED]		= "updated",
 | |
| 	[NOTIFY_KEY_LINKED]		= "linked",
 | |
| 	[NOTIFY_KEY_UNLINKED]		= "unlinked",
 | |
| 	[NOTIFY_KEY_CLEARED]		= "cleared",
 | |
| 	[NOTIFY_KEY_REVOKED]		= "revoked",
 | |
| 	[NOTIFY_KEY_INVALIDATED]	= "invalidated",
 | |
| 	[NOTIFY_KEY_SETATTR]		= "setattr",
 | |
| };
 | |
| 
 | |
| static void saw_key_change(struct watch_notification *n, size_t len)
 | |
| {
 | |
| 	struct key_notification *k = (struct key_notification *)n;
 | |
| 
 | |
| 	if (len != sizeof(struct key_notification)) {
 | |
| 		fprintf(stderr, "Incorrect key message length\n");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	printf("KEY %08x change=%u[%s] aux=%u\n",
 | |
| 	       k->key_id, n->subtype, key_subtypes[n->subtype], k->aux);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Consume and display events.
 | |
|  */
 | |
| static void consumer(int fd)
 | |
| {
 | |
| 	unsigned char buffer[433], *p, *end;
 | |
| 	union {
 | |
| 		struct watch_notification n;
 | |
| 		unsigned char buf1[128];
 | |
| 	} n;
 | |
| 	ssize_t buf_len;
 | |
| 
 | |
| 	for (;;) {
 | |
| 		buf_len = read(fd, buffer, sizeof(buffer));
 | |
| 		if (buf_len == -1) {
 | |
| 			perror("read");
 | |
| 			exit(1);
 | |
| 		}
 | |
| 
 | |
| 		if (buf_len == 0) {
 | |
| 			printf("-- END --\n");
 | |
| 			return;
 | |
| 		}
 | |
| 
 | |
| 		if (buf_len > sizeof(buffer)) {
 | |
| 			fprintf(stderr, "Read buffer overrun: %zd\n", buf_len);
 | |
| 			return;
 | |
| 		}
 | |
| 
 | |
| 		printf("read() = %zd\n", buf_len);
 | |
| 
 | |
| 		p = buffer;
 | |
| 		end = buffer + buf_len;
 | |
| 		while (p < end) {
 | |
| 			size_t largest, len;
 | |
| 
 | |
| 			largest = end - p;
 | |
| 			if (largest > 128)
 | |
| 				largest = 128;
 | |
| 			if (largest < sizeof(struct watch_notification)) {
 | |
| 				fprintf(stderr, "Short message header: %zu\n", largest);
 | |
| 				return;
 | |
| 			}
 | |
| 			memcpy(&n, p, largest);
 | |
| 
 | |
| 			printf("NOTIFY[%03zx]: ty=%06x sy=%02x i=%08x\n",
 | |
| 			       p - buffer, n.n.type, n.n.subtype, n.n.info);
 | |
| 
 | |
| 			len = n.n.info & WATCH_INFO_LENGTH;
 | |
| 			if (len < sizeof(n.n) || len > largest) {
 | |
| 				fprintf(stderr, "Bad message length: %zu/%zu\n", len, largest);
 | |
| 				exit(1);
 | |
| 			}
 | |
| 
 | |
| 			switch (n.n.type) {
 | |
| 			case WATCH_TYPE_META:
 | |
| 				switch (n.n.subtype) {
 | |
| 				case WATCH_META_REMOVAL_NOTIFICATION:
 | |
| 					printf("REMOVAL of watchpoint %08x\n",
 | |
| 					       (n.n.info & WATCH_INFO_ID) >>
 | |
| 					       WATCH_INFO_ID__SHIFT);
 | |
| 					break;
 | |
| 				case WATCH_META_LOSS_NOTIFICATION:
 | |
| 					printf("-- LOSS --\n");
 | |
| 					break;
 | |
| 				default:
 | |
| 					printf("other meta record\n");
 | |
| 					break;
 | |
| 				}
 | |
| 				break;
 | |
| 			case WATCH_TYPE_KEY_NOTIFY:
 | |
| 				saw_key_change(&n.n, len);
 | |
| 				break;
 | |
| 			default:
 | |
| 				printf("other type\n");
 | |
| 				break;
 | |
| 			}
 | |
| 
 | |
| 			p += len;
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static struct watch_notification_filter filter = {
 | |
| 	.nr_filters	= 1,
 | |
| 	.filters = {
 | |
| 		[0]	= {
 | |
| 			.type			= WATCH_TYPE_KEY_NOTIFY,
 | |
| 			.subtype_filter[0]	= UINT_MAX,
 | |
| 		},
 | |
| 	},
 | |
| };
 | |
| 
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
| 	int pipefd[2], fd;
 | |
| 
 | |
| 	if (pipe2(pipefd, O_NOTIFICATION_PIPE) == -1) {
 | |
| 		perror("pipe2");
 | |
| 		exit(1);
 | |
| 	}
 | |
| 	fd = pipefd[0];
 | |
| 
 | |
| 	if (ioctl(fd, IOC_WATCH_QUEUE_SET_SIZE, BUF_SIZE) == -1) {
 | |
| 		perror("watch_queue(size)");
 | |
| 		exit(1);
 | |
| 	}
 | |
| 
 | |
| 	if (ioctl(fd, IOC_WATCH_QUEUE_SET_FILTER, &filter) == -1) {
 | |
| 		perror("watch_queue(filter)");
 | |
| 		exit(1);
 | |
| 	}
 | |
| 
 | |
| 	if (keyctl_watch_key(KEY_SPEC_SESSION_KEYRING, fd, 0x01) == -1) {
 | |
| 		perror("keyctl");
 | |
| 		exit(1);
 | |
| 	}
 | |
| 
 | |
| 	if (keyctl_watch_key(KEY_SPEC_USER_KEYRING, fd, 0x02) == -1) {
 | |
| 		perror("keyctl");
 | |
| 		exit(1);
 | |
| 	}
 | |
| 
 | |
| 	consumer(fd);
 | |
| 	exit(0);
 | |
| }
 |