Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp87071img; Tue, 19 Mar 2019 18:36:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqw3bJYmy/1diL0pvonoW/c9+YkBy6NFqoh4HSE38y2vDDfMH/WhploYCSUpS3ltsb9Mzjre X-Received: by 2002:a63:fd12:: with SMTP id d18mr25042112pgh.88.1553045774431; Tue, 19 Mar 2019 18:36:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553045774; cv=none; d=google.com; s=arc-20160816; b=ESXm/3edmBmpm0/Kn9eLI4N6C9ZVfcrb/885xn4HfXyz1KlCKzvcBdXZ9bSsHFcAsZ GZvT20jdiev51VYtgDX0bx4Llyhq37fNwTvh4zvv+Cp0FjEY4SR9CqvLK+evT8L8JVSB 4YnnR3ddQFnJDf6dVvbQxy92zdEF2tcP8QJqIrUETdLdYiSGV1xS9iE248GjIEdNY4Rm xXjt3ZUucjXeA73OFIhvdA9MvKGHdFJfNyRoO8JUrDEA0X3OBFma21Bf99JAJ5JiawE0 lUDqXjb/YLju/yymod3K7t4IbwT4vow2dd8UuObR51C0TxX3g1SGe7I5vXf7sPa1EXH8 bk9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=O4zXDXP+dequDiEbKm3pStFQKpRoMp17/vh+4KWT3mc=; b=hIaRR3WK3pEqmV0EMgtJ1x/jKJHmMVbqgA5SpM/ihLuiCjNCQzH69sikMsLMzAxS5E icBUiswGqB2uexxXNRm72CjRntLbx1zv3iwATpUvsEMmWPgm3reHadwkHv+ykk5Ji7U6 BlvKM1upUpMerLQmknIzlPdorwkXFCWZvLZrQPAvTd+JaN4uXEjGipIvN6Jb5eVKs/0Q uZQ2ON+VLQR9KynrixzDBbh9CYkZL3tJ1oSnLBz7R5aLVcrLjk0JV3+dt7qZK6fey1eO +5f8T/MBaIE4T4xmc3wMNG/b3Vu4/r0JdYYqT7b906soSzsU0FFNjoAfVemvSET6Dy0O T+Xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=mnkxq2H0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v2si411375pgk.123.2019.03.19.18.35.58; Tue, 19 Mar 2019 18:36:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=mnkxq2H0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727247AbfCTBfI (ORCPT + 99 others); Tue, 19 Mar 2019 21:35:08 -0400 Received: from mail-ot1-f65.google.com ([209.85.210.65]:44540 "EHLO mail-ot1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726801AbfCTBfH (ORCPT ); Tue, 19 Mar 2019 21:35:07 -0400 Received: by mail-ot1-f65.google.com with SMTP id d24so640987otl.11 for ; Tue, 19 Mar 2019 18:35:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=O4zXDXP+dequDiEbKm3pStFQKpRoMp17/vh+4KWT3mc=; b=mnkxq2H0ovZc/AJfBvEHbJSLwgE2/T+Yo9JAOfRnfQ+4UUfQi6wwkq8ejm5eG7Fym1 +NMHDEUhAG5HnxB+KeZ82SUZGepvOK9BCwjvpThgBCsgflbls6OiL8BMGBnbzNzzmzXR wuxz2stMCzuR8nYbrRAvjzd3PiPIyVzz37Z+5HsKqBIjesp1Q3sY6kVm4AljAnro/Zqn Yqd1Ce/avKuDGNM/ecTS3r/d7EGWS81zxol9WRupR/vlfivAMFxuWnSeR9ppqiZAdVpa 6wPQeJUQYSRE4BrR933KIrLr5wDRKhvAzm+QQ15tAcUKqPuvQ3gBYHxvlozVeBg9cI4a t1qg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=O4zXDXP+dequDiEbKm3pStFQKpRoMp17/vh+4KWT3mc=; b=R1yL3Z7A1Ku3rhV/EAChu5cOHaUua6XbJrZxei3W30I+RNLTzPKmMGIsX2CkgNbhzw wdTPb96jfwCTNklwDtC9SdpukLVPI/qxvM/dE9oxJnF46eLnqbhZrwtB32B30hXu8q8L OO4YnMKbIHZbv5i8g01eWpSkW2dRaBXb2w7H74+YmCDGMTRyPDvB0Wf+K/cnYW3KWdwD wszkLnzX245ED1nai5Z+sDjPWX5X0qz8GQ+S6tQXG07NfznuPT0zBjpe9rfB8OwCOueH PmzA6UyNaQzC9ViBbTFX67Ekj+Vjcy8oneaflOrFRpzG+KpdukkauBOKz8jwPJNngdCc CZIw== X-Gm-Message-State: APjAAAWiEZDeAPtSyc+iGXLQBsX5UVYpYv48/LYnuDvn1Rv4JiJA8Mjz SMwYCCGVN3v+7VZeZZmfAGu7elQiZo50Rj5K7HeEig== X-Received: by 2002:a9d:2c23:: with SMTP id f32mr3762854otb.353.1553045707061; Tue, 19 Mar 2019 18:35:07 -0700 (PDT) MIME-Version: 1.0 References: <155297557534.2276575.16264199708584900090.stgit@dwillia2-desk3.amr.corp.intel.com> <155297558570.2276575.11731393787282486177.stgit@dwillia2-desk3.amr.corp.intel.com> <1553040398.4899.149.camel@linux.ibm.com> <1553044252.4899.165.camel@linux.ibm.com> In-Reply-To: <1553044252.4899.165.camel@linux.ibm.com> From: Dan Williams Date: Tue, 19 Mar 2019 18:34:56 -0700 Message-ID: Subject: Re: [PATCH 2/6] security/keys/encrypted: Clean up request_trusted_key() To: Mimi Zohar Cc: keyrings@vger.kernel.org, James Bottomley , David Howells , Vishal L Verma , linux-nvdimm , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 19, 2019 at 6:11 PM Mimi Zohar wrote: > > On Tue, 2019-03-19 at 17:20 -0700, Dan Williams wrote: > > On Tue, Mar 19, 2019 at 5:07 PM Mimi Zohar wrote: > > > On Mon, 2019-03-18 at 23:06 -0700, Dan Williams wrote: > > > > > > diff --git a/security/keys/key.c b/security/keys/key.c > > > > index 696f1c092c50..9045b62afb04 100644 > > > > --- a/security/keys/key.c > > > > +++ b/security/keys/key.c > > > > @@ -706,6 +706,7 @@ struct key_type *key_type_lookup(const char *type) > > > > found_kernel_type: > > > > return ktype; > > > > } > > > > +EXPORT_SYMBOL_GPL(key_type_lookup); > > > > This needs to be moved to patch1. > > > > > Only the kernel is calling key_type_lookup(). Why does > > > key_type_lookup() need to be exported? > > > > This patch series adds several new callers outside of keys-subsystem > > core that need this export, the first one being encrypted-keys itself > > in patch1. > > It's needed, because they could be compiled as kernel modules, not > builtin (eg. EVM). > Right, but now I realize a problem. The side effect of having direct module dependencies to the key_type_{encrypted,trusted} symbols is that module reference counting is handled automatically. So, I need to respin this with some explicit try_module_get() and module_put() added otherwise the encrypted_keys facility can be removed while active keys are instantiated. > > drivers/nvdimm/security.c:57: type = key_type_lookup("encrypted"); > > fs/ecryptfs/keystore.c:1627: type = key_type_lookup("encrypted"); > > security/integrity/evm/evm_crypto.c:361: type = > > key_type_lookup("encrypted"); > > security/keys/encrypted-keys/encrypted.c:440: type = > > key_type_lookup("trusted"); > > >