From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754957AbaIKM2y (ORCPT ); Thu, 11 Sep 2014 08:28:54 -0400 Received: from mail-we0-f182.google.com ([74.125.82.182]:45372 "EHLO mail-we0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754741AbaIKM2x (ORCPT ); Thu, 11 Sep 2014 08:28:53 -0400 MIME-Version: 1.0 In-Reply-To: References: <20140910212154.10752.23343.stgit@warthog.procyon.org.uk> <20140910212206.10752.21818.stgit@warthog.procyon.org.uk> <1410392204.5187.14.camel@dhcp-9-2-203-236.watson.ibm.com> <1410435813.5187.36.camel@dhcp-9-2-203-236.watson.ibm.com> <27732.1410437386@warthog.procyon.org.uk> Date: Thu, 11 Sep 2014 15:28:44 +0300 Message-ID: Subject: Re: [PATCH 2/6] KEYS: Reinstate EPERM for a key type name beginning with a '.' From: Dmitry Kasatkin To: David Howells Cc: Mimi Zohar , James Morris , keyrings , "linux-kernel@vger.kernel.org" , linux-security-module , Vivek Goyal Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11 September 2014 15:27, Dmitry Kasatkin wrote: > On 11 September 2014 15:09, David Howells wrote: >> Mimi Zohar wrote: >> >>> On Wed, 2014-09-10 at 19:36 -0400, Mimi Zohar wrote: >>> > On Wed, 2014-09-10 at 22:22 +0100, David Howells wrote: >>> > > Reinstate the generation of EPERM for a key type name beginning with a >>> > > '.' in a userspace call. Types whose name begins with a '.' are >>> > > internal only. >>> >>> After re-reading your comment and looking at the different types, >>> testing for dot prefixed types now makes sense. Both dot prefixed types >>> and keyring names are reserved for the kernel. >> >> Are you withdrawing your objection, then? >> > > For me, type test looks unrelated to "." prefixed key/keyring names... > > The rest of that patch does following: > > + } else if ((description[0] == '.') && > + (strncmp(type, "keyring", 7) == 0)) { > + ret = -EPERM; > + goto error2; > > > I wonder why this test is only disallowing keyrings... > Why not also keys? > > keyctl add user ".ring1" Hello @u > > keyctl show > 50463278 --alswrv 0 0 \_ user: .ring1 > > sorry... it was confusing name keyctl newring ".ring1" @u add_key: Operation not permitted But for keys.. keyctl add user ".key1" Hello @u keyctl show 50463298 --alswrv 0 0 \_ user: .key1 - Dmitry > - Dmitry > >> David >> -- >> To unsubscribe from this list: send the line "unsubscribe linux-security-module" in >> the body of a message to majordomo@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html > > > > > -- > Thanks, > Dmitry -- Thanks, Dmitry