From: David Howells <dhowells@redhat.com> To: keyrings@vger.kernel.org Cc: dhowells@redhat.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/7] keys: Miscellany Date: Wed, 22 May 2019 22:28:03 +0000 [thread overview] Message-ID: <155856408314.10428.17035328117829912815.stgit@warthog.procyon.org.uk> (raw) Here are some miscellaneous keyrings fixes and improvements intended for the next merge window: (1) Fix a bunch of warnings from sparse, including missing RCU bits and kdoc-function argument mismatches (2) Implement a keyctl to allow a key to be moved from one keyring to another, with the option of prohibiting key replacement in the destination keyring. (3) Grant Link permission to possessors of request_key_auth tokens so that upcall servicing daemons can more easily arrange things such that only the necessary auth key is passed to the actual service program, and not all the auth keys a daemon might possesss. The patches can be found on the following branch: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-misc David --- David Howells (7): keys: sparse: Fix key_fs[ug]id_changed() keys: sparse: Fix incorrect RCU accesses keys: sparse: Fix kdoc mismatches keys: Break bits out of key_unlink() keys: Make __key_link_begin() handle lockdep nesting keys: Add a keyctl to move a key between keyrings keys: Grant Link permission to possessers of request_key auth keys include/linux/key.h | 13 ++- include/uapi/linux/keyctl.h | 3 + kernel/cred.c | 4 - security/keys/compat.c | 3 + security/keys/internal.h | 3 - security/keys/key.c | 6 + security/keys/keyctl.c | 58 ++++++++++++ security/keys/keyring.c | 178 ++++++++++++++++++++++++++++++++++---- security/keys/process_keys.c | 22 ++--- security/keys/request_key.c | 4 - security/keys/request_key_auth.c | 4 - 11 files changed, 250 insertions(+), 48 deletions(-)
WARNING: multiple messages have this Message-ID (diff)
From: David Howells <dhowells@redhat.com> To: keyrings@vger.kernel.org Cc: dhowells@redhat.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/7] keys: Miscellany Date: Wed, 22 May 2019 23:28:03 +0100 [thread overview] Message-ID: <155856408314.10428.17035328117829912815.stgit@warthog.procyon.org.uk> (raw) Here are some miscellaneous keyrings fixes and improvements intended for the next merge window: (1) Fix a bunch of warnings from sparse, including missing RCU bits and kdoc-function argument mismatches (2) Implement a keyctl to allow a key to be moved from one keyring to another, with the option of prohibiting key replacement in the destination keyring. (3) Grant Link permission to possessors of request_key_auth tokens so that upcall servicing daemons can more easily arrange things such that only the necessary auth key is passed to the actual service program, and not all the auth keys a daemon might possesss. The patches can be found on the following branch: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-misc David --- David Howells (7): keys: sparse: Fix key_fs[ug]id_changed() keys: sparse: Fix incorrect RCU accesses keys: sparse: Fix kdoc mismatches keys: Break bits out of key_unlink() keys: Make __key_link_begin() handle lockdep nesting keys: Add a keyctl to move a key between keyrings keys: Grant Link permission to possessers of request_key auth keys include/linux/key.h | 13 ++- include/uapi/linux/keyctl.h | 3 + kernel/cred.c | 4 - security/keys/compat.c | 3 + security/keys/internal.h | 3 - security/keys/key.c | 6 + security/keys/keyctl.c | 58 ++++++++++++ security/keys/keyring.c | 178 ++++++++++++++++++++++++++++++++++---- security/keys/process_keys.c | 22 ++--- security/keys/request_key.c | 4 - security/keys/request_key_auth.c | 4 - 11 files changed, 250 insertions(+), 48 deletions(-)
next reply other threads:[~2019-05-22 22:28 UTC|newest] Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-05-22 22:28 David Howells [this message] 2019-05-22 22:28 ` [PATCH 0/7] keys: Miscellany David Howells 2019-05-22 22:28 ` [PATCH 1/7] keys: sparse: Fix key_fs[ug]id_changed() David Howells 2019-05-22 22:28 ` David Howells 2019-05-24 19:38 ` James Morris 2019-05-24 19:38 ` James Morris 2019-05-22 22:28 ` [PATCH 2/7] keys: sparse: Fix incorrect RCU accesses David Howells 2019-05-22 22:28 ` David Howells 2019-05-25 3:57 ` James Morris 2019-05-25 3:57 ` James Morris 2019-05-22 22:28 ` [PATCH 3/7] keys: sparse: Fix kdoc mismatches David Howells 2019-05-22 22:28 ` David Howells 2019-05-25 3:57 ` James Morris 2019-05-25 3:57 ` James Morris 2019-05-22 22:28 ` [PATCH 4/7] keys: Break bits out of key_unlink() David Howells 2019-05-22 22:28 ` David Howells 2019-05-28 20:41 ` James Morris 2019-05-28 20:41 ` James Morris 2019-05-22 22:28 ` [PATCH 5/7] keys: Make __key_link_begin() handle lockdep nesting David Howells 2019-05-22 22:28 ` David Howells 2019-05-28 20:42 ` James Morris 2019-05-28 20:42 ` James Morris 2019-05-22 22:28 ` [PATCH 6/7] keys: Add a keyctl to move a key between keyrings David Howells 2019-05-22 22:28 ` David Howells 2019-05-28 20:51 ` James Morris 2019-05-28 20:51 ` James Morris 2019-05-29 21:34 ` David Howells 2019-05-29 21:34 ` David Howells 2019-05-29 23:25 ` Eric Biggers 2019-05-29 23:25 ` Eric Biggers 2019-05-30 13:31 ` David Howells 2019-05-30 13:31 ` David Howells 2019-05-22 22:28 ` [PATCH 7/7] keys: Grant Link permission to possessers of request_key auth keys David Howells 2019-05-22 22:28 ` David Howells 2019-05-28 21:01 ` James Morris 2019-05-28 21:01 ` James Morris
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=155856408314.10428.17035328117829912815.stgit@warthog.procyon.org.uk \ --to=dhowells@redhat.com \ --cc=keyrings@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.