[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cad9a20cadc074cf15dcd0d8eb63b43c98a2f13d.camel@huaweicloud.com>
Date: Wed, 31 Aug 2022 11:23:25 +0200
From: Roberto Sassu <roberto.sassu@...weicloud.com>
To: Jarkko Sakkinen <jarkko@...nel.org>
Cc: ast@...nel.org, daniel@...earbox.net, andrii@...nel.org,
martin.lau@...ux.dev, song@...nel.org, yhs@...com,
john.fastabend@...il.com, kpsingh@...nel.org, sdf@...gle.com,
haoluo@...gle.com, jolsa@...nel.org, mykolal@...com,
dhowells@...hat.com, rostedt@...dmis.org, mingo@...hat.com,
paul@...l-moore.com, jmorris@...ei.org, serge@...lyn.com,
shuah@...nel.org, bpf@...r.kernel.org, keyrings@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-kselftest@...r.kernel.org, linux-kernel@...r.kernel.org,
deso@...teo.net, memxor@...il.com,
Roberto Sassu <roberto.sassu@...wei.com>
Subject: Re: [PATCH v14 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h
and set KEY_LOOKUP_FLAGS_ALL
On Wed, 2022-08-31 at 07:51 +0300, Jarkko Sakkinen wrote:
> On Wed, Aug 31, 2022 at 05:53:28AM +0300, Jarkko Sakkinen wrote:
> > On Tue, Aug 30, 2022 at 06:17:09PM +0200, Roberto Sassu wrote:
> > > From: Roberto Sassu <roberto.sassu@...wei.com>
> > >
> > > In preparation for the patch that introduces the
> > > bpf_lookup_user_key() eBPF
> > > kfunc, move KEY_LOOKUP_ definitions to include/linux/key.h, to be
> > > able to
> > > validate the kfunc parameters.
> > >
> > > Also, define the new constant KEY_LOOKUP_FLAGS_ALL, to facilitate
> > > checking
> > > whether a variable contains only defined flags.
> > >
> > > Signed-off-by: Roberto Sassu <roberto.sassu@...wei.com>
> > > Reviewed-by: KP Singh <kpsingh@...nel.org>
> > > ---
> > > include/linux/key.h | 4 ++++
> > > security/keys/internal.h | 2 --
> > > 2 files changed, 4 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/include/linux/key.h b/include/linux/key.h
> > > index 7febc4881363..e2a70e0fa89f 100644
> > > --- a/include/linux/key.h
> > > +++ b/include/linux/key.h
> > > @@ -88,6 +88,10 @@ enum key_need_perm {
> > > KEY_DEFER_PERM_CHECK, /* Special: permission check is deferred
> > > */
> > > };
> > >
> > > +#define KEY_LOOKUP_CREATE 0x01
> > > +#define KEY_LOOKUP_PARTIAL 0x02
> > > +#define KEY_LOOKUP_FLAGS_ALL (KEY_LOOKUP_CREATE |
> > > KEY_LOOKUP_PARTIAL)
> >
> > IMHO this could be just KEY_LOOKUP_ALL.
> >
> > > +
> > > struct seq_file;
> > > struct user_struct;
> > > struct signal_struct;
> > > diff --git a/security/keys/internal.h b/security/keys/internal.h
> > > index 9b9cf3b6fcbb..3c1e7122076b 100644
> > > --- a/security/keys/internal.h
> > > +++ b/security/keys/internal.h
> > > @@ -165,8 +165,6 @@ extern struct key
> > > *request_key_and_link(struct key_type *type,
> > >
> > > extern bool lookup_user_key_possessed(const struct key *key,
> > > const struct key_match_data
> > > *match_data);
> > > -#define KEY_LOOKUP_CREATE 0x01
> > > -#define KEY_LOOKUP_PARTIAL 0x02
> > >
> > > extern long join_session_keyring(const char *name);
> > > extern void key_change_session_keyring(struct callback_head
> > > *twork);
> > > --
> > > 2.25.1
> > >
> >
> > Other than that wfm.
>
> Roberto, with the change done above, just add my ack
> to the next version:
>
> Acked-by: Jarkko Sakkinen <jarkko@...nel.org>
>
Perfect, thanks.
Roberto
Powered by blists - more mailing lists