Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp377119pxv; Thu, 22 Jul 2021 02:20:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwmfxfYQXjTmPLJxa6ZEg9pNsGneH8cBcLHmd8Q1qsxgXiqbtxQKdZz3pikPLp+uQD/rI0x X-Received: by 2002:aa7:da4f:: with SMTP id w15mr52527179eds.266.1626945621668; Thu, 22 Jul 2021 02:20:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626945621; cv=none; d=google.com; s=arc-20160816; b=E5WHqJ6imQjeBONcGovu9gi/pWYgqfgl3LsT80mK8xWh81oa5f92fc5PA2H8C1yLTL ujN6ZKhk1takdhxdU976n2wx9VAkYC7zyoPoyQ2FsvhI9UFGmDo8S0fkcksz9hsfEJjx 9pqCAzs5Jqvi0uoE6jJYnAK4YjsDRtwCefvyDHvAc5+V3ePJC0Sqx+4/3aMWYiqWRaLz D+2eHRwoQw/3gAdo2Yt5ZlU72kdRNMW2LZY/eFfbTsAMYOTsSRfmWELBydiwnQm7Ti5p /4640jorHQ0Xbazbq1EJkNnFVoK/viZGWWffn2Ba2gpueLtakivEV7sn6jZnlqako3QA /XeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=56OmtqtCkiCyOcZ4UP9aDcBE51QcFb7nDqnHrdkq5Cc=; b=H1XGIOVZMl04zpnZsOjfcIF1Qf9xFKf06sAz10nhJzU2hq+6WavvXH7FHQHvCEeCRB as++igAVeSWvM8itahmjnGJjbtiXbyf/9HSHbb2RHZU34SKkDNlLO4EW8iUMwKmboJuz ZL7EORPkcVk2n9e7W3LUKHzplVHoGoe5KUoIGtUBgdMf3QHL9lnwGAbz9FTLiMiVk1z8 KsY81zagkPcYhM7PKlJWN/44BmCwMPwqoEjo5H3uceqBqIdQhRCZ/9kOCH+Y692/k8oB VC9jHjNCTRDUbHfi6CvFwTmlZ3QQh/5ZYKFbe75r1Bg0l53h+Cs7D5T3LYDZ1geGU8VT feOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v17si29222142edy.2.2021.07.22.02.19.58; Thu, 22 Jul 2021 02:20:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231368AbhGVIh7 (ORCPT + 99 others); Thu, 22 Jul 2021 04:37:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58796 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230504AbhGVIhu (ORCPT ); Thu, 22 Jul 2021 04:37:50 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B61FC061757 for ; Thu, 22 Jul 2021 02:18:25 -0700 (PDT) Received: from dude.hi.pengutronix.de ([2001:67c:670:100:1d::7]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1m6UqE-0001NN-VX; Thu, 22 Jul 2021 11:18:06 +0200 Received: from afa by dude.hi.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1m6UqC-0001Cw-GC; Thu, 22 Jul 2021 11:18:04 +0200 From: Ahmad Fatoum To: David Howells , Jarkko Sakkinen , James Morris , "Serge E. Hallyn" , Alasdair Kergon , Mike Snitzer , dm-devel@redhat.com, Song Liu , Richard Weinberger Cc: kernel@pengutronix.de, Ahmad Fatoum , linux-kernel@vger.kernel.org, linux-raid@vger.kernel.org, keyrings@vger.kernel.org, linux-mtd@lists.infradead.org, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org Subject: [RFC PATCH v1 3/4] ubifs: auth: remove never hit key type error check Date: Thu, 22 Jul 2021 11:18:01 +0200 Message-Id: X-Mailer: git-send-email 2.30.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::7 X-SA-Exim-Mail-From: afa@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org key_request accepts a key type as its first argument. If it returns a valid pointer, it should always have this same requested key type. Indeed other request_key users surveyed such as dm-crypt, ecryptfs and fscrypt v1 also don't check the key type. Therefore drop the apparently unneeded check. Signed-off-by: Ahmad Fatoum --- To: David Howells To: Jarkko Sakkinen To: James Morris To: "Serge E. Hallyn" To: Alasdair Kergon To: Mike Snitzer To: dm-devel@redhat.com To: Song Liu To: Richard Weinberger Cc: linux-kernel@vger.kernel.org Cc: linux-raid@vger.kernel.org Cc: keyrings@vger.kernel.org Cc: linux-mtd@lists.infradead.org Cc: linux-security-module@vger.kernel.org Cc: linux-integrity@vger.kernel.org --- fs/ubifs/auth.c | 6 ------ 1 file changed, 6 deletions(-) diff --git a/fs/ubifs/auth.c b/fs/ubifs/auth.c index e564d5ff8781..6a0b8d858d81 100644 --- a/fs/ubifs/auth.c +++ b/fs/ubifs/auth.c @@ -286,12 +286,6 @@ int ubifs_init_authentication(struct ubifs_info *c) down_read(&keyring_key->sem); - if (keyring_key->type != &key_type_logon) { - ubifs_err(c, "key type must be logon"); - err = -ENOKEY; - goto out; - } - ukp = user_key_payload_locked(keyring_key); if (!ukp) { /* key was revoked before we acquired its semaphore */ -- git-series 0.9.1