Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752735AbbLHUYf (ORCPT ); Tue, 8 Dec 2015 15:24:35 -0500 Received: from mga03.intel.com ([134.134.136.65]:21922 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752547AbbLHUYc (ORCPT ); Tue, 8 Dec 2015 15:24:32 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.20,400,1444719600"; d="scan'208";a="867430313" Date: Tue, 8 Dec 2015 22:24:23 +0200 From: Jarkko Sakkinen To: Mimi Zohar , David Howells Cc: Peter Huewe , Marcel Selhorst , David Howells , Mimi Zohar , Jonathan Corbet , Jason Gunthorpe , James Morris , "Serge E. Hallyn" , "open list:KEYS-ENCRYPTED" , "open list:KEYS-ENCRYPTED" , "open list:DOCUMENTATION" , open list , "moderated list:TPM DEVICE DRIVER" Subject: Re: [PATCH 2/2] keys, trusted: seal with a policy Message-ID: <20151208202423.GA4232@intel.com> References: <1447777643-10777-1-git-send-email-jarkko.sakkinen@linux.intel.com> <1447777643-10777-3-git-send-email-jarkko.sakkinen@linux.intel.com> <20151118070339.GA4942@intel.com> <20151207091202.GA15701@intel.com> <20151208110102.GA12339@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20151208110102.GA12339@intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2022 Lines: 51 On Tue, Dec 08, 2015 at 01:01:02PM +0200, Jarkko Sakkinen wrote: > On Tue, Dec 08, 2015 at 09:35:05AM +1100, James Morris wrote: > > On Mon, 7 Dec 2015, Jarkko Sakkinen wrote: > > > > > On Fri, Nov 20, 2015 at 01:34:35PM +1100, James Morris wrote: > > > > On Wed, 18 Nov 2015, Jarkko Sakkinen wrote: > > > > > > > > > On Wed, Nov 18, 2015 at 11:21:01AM +1100, James Morris wrote: > > > > > > On Tue, 17 Nov 2015, Jarkko Sakkinen wrote: > > > > > > > > > > > > > } > > > > > > > break; > > > > > > > + case Opt_policydigest: > > > > > > > + if (!tpm2 || > > > > > > > + strlen(args[0].from) != (2 * opt->digest_len)) > > > > > > > + return -EINVAL; > > > > > > > + kfree(opt->policydigest); > > > > > > > + opt->policydigest = kzalloc(opt->digest_len, > > > > > > > + GFP_KERNEL); > > > > > > > > > > > > Is it correct to kfree opt->policydigest here before allocating it? > > > > > > > > > > I think so. The same option might be encountered multiple times. > > > > > > > > This would surely signify an error? > > > > > > I'm following the semantics of other options. That's why I implemented > > > it that way for example: > > > > > > keyctl add trusted kmk "new 32 keyhandle=0x80000000 keyhandle=0x80000000" > > > > > > is perfectly OK. I just thought that it'd be more odd if this option > > > behaved in a different way... > > > > It seems broken to me -- if you're messing up keyctl commands you might > > want to know about it, but we should remain consistent. > > So should I return error if policyhandle/digest appears a second time? I > agree that it'd be better to return -EINVAL. > > The existing behavior is such that any option can appear multiple times > and I chose to be consistent with that. Mimi, David? /Jarkko -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/