All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Howells <dhowells@redhat.com>
To: James Morris <jmorris@redhat.com>
Cc: torvalds@osdl.org, akpm@osdl.org, linux-kernel@vger.kernel.org,
	arjanv@redhat.com, dwmw2@infradead.org, greg@kroah.com,
	Chris Wright <chrisw@osdl.org>,
	sfrench@samba.org, mike@halcrow.us,
	Trond Myklebust <trond.myklebust@fys.uio.no>,
	Kyle Moffett <mrmacman_g4@mac.com>
Subject: Re: [PATCH] implement in-kernel keys & keyring management
Date: Mon, 09 Aug 2004 10:40:32 +0100	[thread overview]
Message-ID: <16013.1092044432@redhat.com> (raw)
In-Reply-To: <Xine.LNX.4.44.0408080046130.27710-100000@dhcp83-76.boston.redhat.com>


James Morris <jmorris@redhat.com> wrote:
> Here's some more feedback:
> 
>  typedef int32_t key_serial_t;
> 
> Why is this signed?

So I can have special values that are negative. I suppose it doesn't really
matter - they could be small positive numbers or something, but then if I want
to add one later, you get the possibility of overlap on a userspace that
supports one running with a kernel that doesn't.

> And does this really need to be a typedef? (Do you forsee it ever changing
> from 32-bit?).

No... but then 640KB of memory is enough for anyone, right? :-)

> For consistency, request_key(), validate_key() and lookup_key() should 
> probably be of the form key_request() etc.  There are other similar 
> cases throughout the code.

Maybe. Though I think request_key() should follow the form of similar
functions inside the kernel, such as request_firmware().

> I would suggest that the /sbin/request-key interface be done via Netlink
> messaging instead.

Other people argued the exact opposite first.

> 
>   #define sys_keyctl(o,b,c,d,e)          (-EINVAL)
> 
> This should probably be -ENOSYS.

If it becomes a real syscall rather than being a subset of prctl(), then yes.

> -                   capable(CAP_SETGID))
> +                   capable(CAP_SETGID)) {
>                         new_egid = egid;
> +               }
> 
> This looks superfluous.

Yes. I had added an additional statement into there at one point.

> We need to look at the implications for LSM, e.g. keys have Unix style
> access control information attached, and LSM apps may want to extend this
> to other security models.  Some of the user interface calls may also need
> to be mediated via LSM.

True. I don't know much about LSM though.

David

  parent reply	other threads:[~2004-08-09  9:41 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-08-07  0:31 [PATCH] implement in-kernel keys & keyring management David Howells
2004-08-07  8:17 ` Andrew Morton
2004-08-07 16:33   ` [PATCH] implement in-kernel keys & keyring management [try #2] David Howells
2004-08-07 17:48     ` [PATCH] implement in-kernel keys & keyring management [try #3] David Howells
2004-08-08  4:45     ` [PATCH] implement in-kernel keys & keyring management [try #2] James Morris
2004-08-09  9:33       ` David Howells
2004-08-09 14:08         ` James Morris
2004-08-09 14:35           ` David Howells
2004-08-09 15:47             ` James Morris
2004-08-10 18:49               ` David Howells
2004-08-08  2:52   ` [PATCH] implement in-kernel keys & keyring management Greg KH
2004-08-09  9:23     ` David Howells
2004-08-09 20:27       ` Greg KH
2004-08-07  8:59 ` Trond Myklebust
2004-08-07 17:45   ` David Howells
2004-08-08  5:14 ` James Morris
2004-08-08  5:25   ` Linus Torvalds
2004-08-09  1:14     ` James Morris
2004-08-09  4:27       ` Linus Torvalds
2004-08-09  6:32         ` bert hubert
2004-08-09 10:16         ` David Howells
2004-08-09 14:51         ` Alan Cox
2004-08-09 10:01       ` David Howells
2004-08-09  9:45     ` David Howells
2004-08-09 15:24       ` [PATCH] implement in-kernel keys & keyring management [try #4] David Howells
2004-08-09 21:13         ` Kyle Moffett
2004-08-10 17:59       ` [PATCH] implement in-kernel keys & keyring management [try #5] David Howells
2004-08-11  6:37         ` Chris Wright
2004-08-11  9:46           ` David Howells
2004-08-11 12:34         ` [PATCH] implement in-kernel keys & keyring management [try #6] David Howells
2004-08-11 19:10           ` [PATCH] keys & keyring management: key filesystem David Howells
2004-08-09  9:40   ` David Howells [this message]
     [not found] <200410191615.i9JGF8IW002712@hera.kernel.org>
2004-10-20 12:52 ` [PATCH] implement in-kernel keys & keyring management Arjan van de Ven

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=16013.1092044432@redhat.com \
    --to=dhowells@redhat.com \
    --cc=akpm@osdl.org \
    --cc=arjanv@redhat.com \
    --cc=chrisw@osdl.org \
    --cc=dwmw2@infradead.org \
    --cc=greg@kroah.com \
    --cc=jmorris@redhat.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mike@halcrow.us \
    --cc=mrmacman_g4@mac.com \
    --cc=sfrench@samba.org \
    --cc=torvalds@osdl.org \
    --cc=trond.myklebust@fys.uio.no \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.