Received: by 2002:ab2:69cc:0:b0:1f4:be93:e15a with SMTP id n12csp1656207lqp; Mon, 15 Apr 2024 12:50:52 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXSuaCEWYJ5+OM4+8KgRYFaSiwfRDFOHkXS5lkoZbhwnGiZMKf6A5UXBFAOp95wfJSMsuJSOCUtBauUwaBVDuuW5tgvsghGawKaleP4Sg== X-Google-Smtp-Source: AGHT+IHfkgAGg+fRzp7eHVdLmvf+SqMrXfxrtA9ekTkPkSWvGc3speglddmDqIo7clh4UwHzNOC1 X-Received: by 2002:a50:c050:0:b0:56e:4ac1:88f with SMTP id u16-20020a50c050000000b0056e4ac1088fmr7393503edd.27.1713210652492; Mon, 15 Apr 2024 12:50:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713210652; cv=pass; d=google.com; s=arc-20160816; b=OE1ryHepQrYHQ1T4j7otwrHAybTI1y43tFJIVkaEFjh+pyFqXJPAJOOGmRZPhpMkLO y08v5YmpuImdOeHK/ei0IeIdCePynAom6HK6I/LY+WYUX4I4ZkASBwQyw5oooqclNJOH S3jURuNOkIC8g7gcPh5TXXSfltbrNK/CCq2EwQt89CU4DM3WLX2mFJoJeqvsyI7ByaE2 HlKDvR8CJG6gelq/pAJuAoBOdOQovF6Osf3efxRorMFhvgAdOpbmDl/HaB+w3LEQR4NJ nqaYKxoX7DMCVv/V9+3LLNB9sCwzAzKwjEuNsBPB9kTldKy9arYxgGkwIlgl8YC59CnI BMPA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:to:from:subject:cc:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=pp2B+xNbp9OVI8mkJN1jxS/HAr4NjrvrfnhuIyNq4bI=; fh=jaK2ayMGVBqPMeFeKHwpJiQDrCePaxCsf7KYyT84CGU=; b=W3N6dNn73C09VDN5RBDZtH1B3F9eqVz8UchiPConpYobAmEKAWPGtDhJBDpw4uYhs1 kUdco0VYBVnE3KKzHqelvZR5Ncb2OqFiBlwvMWpUw6vcvKI1EGgIbPUCsuSS9FFTMGxp RwLpn1h9ItUGXNAZqUda79j9sO5TqbwvLNErQ0u2tKvvRVyu/sYyzwCIKnRqBCGgtBCD IxT3ZYB5r9Q3PCyt0pxJNx0ZLfo8lJATYhJDMDQG2hzM3uWvy+DE6xHbwqBjRKuiD7oy 9rsBnMqXKAbWEFXaVRF/odLyd36f4l4Tx9waX4P6jXWYkvrik1AE/skrf5kabOJDntwP uuvw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KQN9VzK2; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-145828-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-145828-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id t8-20020a056402524800b005702422bf38si1587783edd.413.2024.04.15.12.50.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Apr 2024 12:50:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-145828-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KQN9VzK2; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-145828-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-145828-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 135561F212C0 for ; Mon, 15 Apr 2024 19:50:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7839A15B0FD; Mon, 15 Apr 2024 19:42:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="KQN9VzK2" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B22F115ADA5; Mon, 15 Apr 2024 19:42:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713210177; cv=none; b=MSM1wZbyIwGnMsCYypJUa0g9sSqkPSAglCmLpkhi6jo0J4dh7HSZNpi2BJovd/LrAmWPHvLdS0vJnEcr3LifeYkxDaYExw+MH8Q11rH+ZIXBtpWa1LxmuZWcGsTdigsDJubOUePurUSnm9BCCe1xU9DZxGsMV9vrKQxxW6gQ+Co= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713210177; c=relaxed/simple; bh=zWl4FINXy62+vi+wMdBL+mWCZpfqQrUua4QQFeKbpoo=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To: References:In-Reply-To; b=IiyHMXMu+Q107+3aSWkfyvNUVoaqrXNLLqLkQfB2up0xfuY5P64/ISbibjyPRVFLk+2LE69rWGwO5ADoYK/cVHGms6QJfxOj46J8u3I+KupG+XBCzdFemCLeqYD8Uk+GQtjqcNQgV9kEDyKkSjNNBG5vq9oRqOwH3CrCmpbjvY0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=KQN9VzK2; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id CAF3AC32781; Mon, 15 Apr 2024 19:42:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713210177; bh=zWl4FINXy62+vi+wMdBL+mWCZpfqQrUua4QQFeKbpoo=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=KQN9VzK2VlXdRsG/ffqdBOcdou3GRBmgj1TEbx3ePNkfUa3LQ/FykMCLCINYuX2ZZ V1/Nh6xWrIpgGgL5XwvpGrLvZoj3r6H9wvAdxbNc30YhBXkhFuTCTXv7RsQ6VYf9FO brj1lx9+zx/AWxnZVRzG/quP56n5FLfbNuDdB5OxN+ebpUoAPYK8vbWnsRq+c5aE5I JGJNkD2RjzYdo2aDQzl3/gBX9pkv7NxjUm9UaY8xPmY9CdJ0192wEVf1Td8fwfiArK eqZ6T/Ukn0zAfaNTxQJmRskGjy5LP23PJI9U3Uws05mcSQlwYu/Slp0SyFCobf5ABB iEXyWtxaOprzg== Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Mon, 15 Apr 2024 22:42:49 +0300 Message-Id: Cc: , , , , , , , , , , , , , , , , , , , , , , "Roberto Sassu" Subject: Re: [PATCH v4 10/14] digest cache: Prefetch digest lists if requested From: "Jarkko Sakkinen" To: "Roberto Sassu" , , , , , , , , , X-Mailer: aerc 0.17.0 References: <20240415142436.2545003-1-roberto.sassu@huaweicloud.com> <20240415142436.2545003-11-roberto.sassu@huaweicloud.com> In-Reply-To: <20240415142436.2545003-11-roberto.sassu@huaweicloud.com> On Mon Apr 15, 2024 at 5:24 PM EEST, Roberto Sassu wrote: > From: Roberto Sassu > > A desirable goal when doing integrity measurements is that they are done > always in the same order across boots, so that the resulting PCR value > becomes predictable and suitable for sealing policies. However, due to > parallel execution of system services at boot, a deterministic order of > measurements is difficult to achieve. > > The digest_cache LSM is not exempted from this issue. Under the assumptio= n > that only the digest list is measured, and file measurements are omitted = if > their digest is found in that digest list, a PCR can be predictable only = if > all files belong to the same digest list. Otherwise, it will still be > unpredictable, since files accessed in a non-deterministic order will cau= se > digest lists to be measured in a non-deterministic order too. > > Overcome this issue, if prefetching is enabled, by searching a digest lis= t > file name in digest_list_dir_lookup_filename() among the entries of the > linked list built by digest_cache_dir_create(). If the file name does not > match, read the digest list to trigger its measurement. Otherwise, also > create a digest cache and return that to the caller. Release the extra > reference of the directory digest cache in digest_cache_new(), since it w= as > only used for the search and it is not going to be returned. > > Prefetching needs to be explicitly enabled by setting the new > security.dig_prefetch xattr to 1 in the directory containing the digest > lists. The newly introduced function digest_cache_prefetch_requested() > checks first if the DIR_PREFETCH bit is set in dig_owner, otherwise it > reads the xattr. digest_cache_create() sets DIR_PREFETCH in dig_owner, if > prefetching is enabled, before declaring the digest cache as initialized. > > Signed-off-by: Roberto Sassu > --- > include/uapi/linux/xattr.h | 3 + > security/digest_cache/dir.c | 55 +++++++++++++++++- > security/digest_cache/internal.h | 11 +++- > security/digest_cache/main.c | 95 +++++++++++++++++++++++++++++++- > security/digest_cache/populate.c | 8 ++- > security/digest_cache/verif.c | 5 +- > 6 files changed, 170 insertions(+), 7 deletions(-) > > diff --git a/include/uapi/linux/xattr.h b/include/uapi/linux/xattr.h > index 8a58cf4bce65..8af33d38d9e8 100644 > --- a/include/uapi/linux/xattr.h > +++ b/include/uapi/linux/xattr.h > @@ -57,6 +57,9 @@ > #define XATTR_DIGEST_LIST_SUFFIX "digest_list" > #define XATTR_NAME_DIGEST_LIST XATTR_SECURITY_PREFIX XATTR_DIGEST_LIST_S= UFFIX > =20 > +#define XATTR_DIG_PREFETCH_SUFFIX "dig_prefetch" > +#define XATTR_NAME_DIG_PREFETCH XATTR_SECURITY_PREFIX XATTR_DIG_PREFETCH= _SUFFIX > + > #define XATTR_SELINUX_SUFFIX "selinux" > #define XATTR_NAME_SELINUX XATTR_SECURITY_PREFIX XATTR_SELINUX_SUFFIX > =20 > diff --git a/security/digest_cache/dir.c b/security/digest_cache/dir.c > index 7bfcdd5f7ef1..a7d203c15386 100644 > --- a/security/digest_cache/dir.c > +++ b/security/digest_cache/dir.c > @@ -54,6 +54,7 @@ static bool digest_cache_dir_iter(struct dir_context *_= _ctx, const char *name, > new_entry->seq_num =3D UINT_MAX; > new_entry->digest_cache =3D NULL; > mutex_init(&new_entry->digest_cache_mutex); > + new_entry->prefetched =3D false; > =20 > if (new_entry->name[0] < '0' || new_entry->name[0] > '9') > goto out; > @@ -127,6 +128,7 @@ int digest_cache_dir_create(struct digest_cache *dige= st_cache, > * @digest_cache: Digest cache > * @digest: Digest to search > * @algo: Algorithm of the digest to search > + * @filename: File name of the digest list to search > * > * This function iterates over the linked list created by > * digest_cache_dir_create() and looks up the digest in the digest cache= of > @@ -149,7 +151,8 @@ digest_cache_dir_lookup_digest(struct dentry *dentry, > if (!dir_entry->digest_cache) { > cache =3D digest_cache_create(dentry, digest_list_path, > digest_cache->path_str, > - dir_entry->name); > + dir_entry->name, false, > + false); > /* Ignore digest caches that cannot be instantiated. */ > if (!cache) { > mutex_unlock(&dir_entry->digest_cache_mutex); > @@ -158,6 +161,8 @@ digest_cache_dir_lookup_digest(struct dentry *dentry, > =20 > /* Consume extra ref. from digest_cache_create(). */ > dir_entry->digest_cache =3D cache; > + /* Digest list was read, mark entry as prefetched. */ > + dir_entry->prefetched =3D true; > } > mutex_unlock(&dir_entry->digest_cache_mutex); > =20 > @@ -171,6 +176,54 @@ digest_cache_dir_lookup_digest(struct dentry *dentry= , > return 0UL; > } > =20 > +/** > + * digest_cache_dir_lookup_filename - Lookup a digest list > + * @dentry: Dentry of the file whose digest list is looked up > + * @digest_list_path: Path structure of the digest list directory > + * @digest_cache: Digest cache > + * @filename: File name of the digest list to search > + * > + * This function iterates over the linked list created by > + * digest_cache_dir_create() and looks up a digest list with a matching = file > + * name among the entries. If there is no match, it prefetches (reads) t= he > + * current digest list. Otherwise, it returns the digest cache pointer f= rom > + * digest_cache_create() to the caller. > + * > + * Return: A digest cache pointer if the digest list if found, NULL othe= rwise. > + */ > +struct digest_cache * > +digest_cache_dir_lookup_filename(struct dentry *dentry, > + struct path *digest_list_path, > + struct digest_cache *digest_cache, > + char *filename) > +{ > + struct digest_cache *cache; > + struct dir_entry *dir_entry; > + bool filename_found; > + > + list_for_each_entry(dir_entry, &digest_cache->dir_entries, list) { > + mutex_lock(&dir_entry->digest_cache_mutex); > + filename_found =3D !strcmp(dir_entry->name, filename); > + if (!filename_found && dir_entry->prefetched) { > + mutex_unlock(&dir_entry->digest_cache_mutex); > + continue; > + } > + > + cache =3D digest_cache_create(dentry, digest_list_path, > + digest_cache->path_str, > + dir_entry->name, false, > + filename_found ? false : true); > + > + dir_entry->prefetched =3D true; > + mutex_unlock(&dir_entry->digest_cache_mutex); > + > + if (filename_found) > + return cache; > + } > + > + return NULL; > +} > + > /** > * digest_cache_dir_free - Free the stored file list and put digest cach= es > * @digest_cache: Digest cache > diff --git a/security/digest_cache/internal.h b/security/digest_cache/int= ernal.h > index b7afca8e04da..c13b35f6b2c0 100644 > --- a/security/digest_cache/internal.h > +++ b/security/digest_cache/internal.h > @@ -17,6 +17,7 @@ > #define INIT_IN_PROGRESS 0 /* Digest cache being initialized. */ > #define INVALID 1 /* Digest cache marked as invalid. */ > #define IS_DIR 2 /* Digest cache created from dir. */ > +#define DIR_PREFETCH 3 /* Prefetching requested for dir. */ > =20 > /** > * struct readdir_callback - Structure to store information for dir iter= ation > @@ -37,6 +38,7 @@ struct readdir_callback { > * @digest_cache: Digest cache associated to the directory entry > * @digest_cache_mutex: Protects @digest_cache > * @seq_num: Sequence number of the directory entry from file name > + * @prefetched: Whether the digest list has been already prefetched > * @name: File name of the directory entry > * > * This structure represents a directory entry with a digest cache creat= ed > @@ -47,6 +49,7 @@ struct dir_entry { > struct digest_cache *digest_cache; > struct mutex digest_cache_mutex; > unsigned int seq_num; > + bool prefetched; > char name[]; > } __packed; > =20 > @@ -205,7 +208,8 @@ digest_cache_from_file_sec(const struct file *file) > /* main.c */ > struct digest_cache *digest_cache_create(struct dentry *dentry, > struct path *digest_list_path, > - char *path_str, char *filename); > + char *path_str, char *filename, > + bool prefetch_req, bool prefetch); > =20 > /* htable.c */ > int digest_cache_htable_init(struct digest_cache *digest_cache, u64 num_= digests, > @@ -236,6 +240,11 @@ digest_cache_dir_lookup_digest(struct dentry *dentry= , > struct path *digest_list_path, > struct digest_cache *digest_cache, u8 *digest, > enum hash_algo algo); > +struct digest_cache * > +digest_cache_dir_lookup_filename(struct dentry *dentry, > + struct path *digest_list_path, > + struct digest_cache *digest_cache, > + char *filename); > void digest_cache_dir_free(struct digest_cache *digest_cache); > =20 > #endif /* _DIGEST_CACHE_INTERNAL_H */ > diff --git a/security/digest_cache/main.c b/security/digest_cache/main.c > index 15f1486610a3..a5616fd07c1d 100644 > --- a/security/digest_cache/main.c > +++ b/security/digest_cache/main.c > @@ -83,6 +83,8 @@ static void digest_cache_free(struct digest_cache *dige= st_cache) > * @digest_list_path: Path structure of the digest list > * @path_str: Path string of the digest list > * @filename: Digest list file name (can be an empty string) > + * @prefetch_req: Whether prefetching has been requested > + * @prefetch: Whether prefetching of a digest list is being done > * > * This function first locates, from the passed path, the digest list in= ode > * from which the digest cache will be created or retrieved (if it alrea= dy > @@ -109,7 +111,8 @@ static void digest_cache_free(struct digest_cache *di= gest_cache) > */ > struct digest_cache *digest_cache_create(struct dentry *dentry, > struct path *digest_list_path, > - char *path_str, char *filename) > + char *path_str, char *filename, > + bool prefetch_req, bool prefetch) This has enough parameters to consider separate "digest_cache_descriptor"= =20 or whatever. In some architectures this is beyond register parameters, which is IMHO good threshold to consider that. This will make e.g. tracing easier as you have to map only one parameter to a known struct to inspect the values. > { > struct path file_path; > struct digest_cache *digest_cache =3D NULL; > @@ -148,6 +151,16 @@ struct digest_cache *digest_cache_create(struct dent= ry *dentry, > dentry->d_name.name); > goto out; > } > + > + if (prefetch) { > + /* Fine to fail, we are just prefetching. */ > + ret =3D digest_cache_populate(NULL, digest_list_path, > + path_str, filename); > + pr_debug("Digest list %s/%s %s prefetched\n", > + path_str, filename, > + !ret ? "has been" : "cannot be"); > + goto out; > + } > } > =20 > dig_sec =3D digest_cache_get_security(inode); > @@ -176,6 +189,11 @@ struct digest_cache *digest_cache_create(struct dent= ry *dentry, > =20 > /* Make the other lock contenders wait until creation complete. */ > set_bit(INIT_IN_PROGRESS, &dig_sec->dig_owner->flags); > + > + /* Set DIR_PREFETCH if prefetching was requested. */ > + if (prefetch_req) > + set_bit(DIR_PREFETCH, &digest_cache->flags); > + > mutex_unlock(&dig_sec->dig_owner_mutex); > =20 > if (S_ISREG(inode->i_mode)) { > @@ -220,6 +238,52 @@ struct digest_cache *digest_cache_create(struct dent= ry *dentry, > return digest_cache; > } > =20 > +/** > + * digest_cache_prefetch_requested - Verify if prefetching is requested > + * @digest_list_path: Path structure of the digest list directory > + * @path_str: Path string of the digest list directory > + * > + * This function verifies whether or not digest list prefetching is requ= ested. > + * If dig_owner exists in the inode security blob, it checks the DIR_PRE= FETCH > + * bit (faster). Otherwise, it reads the new security.dig_prefetch xattr= . > + * > + * Return: True if prefetching is requested, false otherwise. > + */ > +static bool digest_cache_prefetch_requested(struct path *digest_list_pat= h, > + char *path_str) > +{ > + struct digest_cache_security *dig_sec; > + bool prefetch_req =3D false; > + char prefetch_value; > + struct inode *inode; > + int ret; > + > + inode =3D d_backing_inode(digest_list_path->dentry); > + dig_sec =3D digest_cache_get_security(inode); > + if (unlikely(!dig_sec)) > + return false; > + > + mutex_lock(&dig_sec->dig_owner_mutex); > + if (dig_sec->dig_owner) { > + /* Reliable test: DIR_PREFETCH set with dig_owner_mutex held. */ > + prefetch_req =3D test_bit(DIR_PREFETCH, > + &dig_sec->dig_owner->flags); > + mutex_unlock(&dig_sec->dig_owner_mutex); > + return prefetch_req; > + } > + mutex_unlock(&dig_sec->dig_owner_mutex); > + > + ret =3D vfs_getxattr(&nop_mnt_idmap, digest_list_path->dentry, > + XATTR_NAME_DIG_PREFETCH, &prefetch_value, 1); > + if (ret =3D=3D 1 && prefetch_value =3D=3D '1') { > + pr_debug("Prefetching has been enabled for directory %s\n", > + path_str); > + prefetch_req =3D true; > + } > + > + return prefetch_req; > +} > + > /** > * digest_cache_new - Retrieve digest list file name and request digest = cache > * @dentry: Dentry of the inode for which the digest cache will be used > @@ -230,13 +294,19 @@ struct digest_cache *digest_cache_create(struct den= try *dentry, > * with that file name. If security.digest_list is not found, this funct= ion > * requests the creation of a digest cache on the parent directory. > * > + * On prefetching, if the default path is a directory and if > + * security.digest_list is found, this function first retrieves the dire= ctory > + * digest cache, and then calls digest_cache_dir_lookup_filename() to re= trieve > + * the desired digest cache in that directory. > + * > * Return: A new digest cache on success, NULL on error. > */ > static struct digest_cache *digest_cache_new(struct dentry *dentry) > { > char filename[NAME_MAX + 1] =3D { 0 }; > - struct digest_cache *digest_cache =3D NULL; > + struct digest_cache *digest_cache =3D NULL, *found; > struct path default_path; > + bool prefetch_req =3D false; > int ret; > =20 > ret =3D kern_path(default_path_str, 0, &default_path); > @@ -273,9 +343,28 @@ static struct digest_cache *digest_cache_new(struct = dentry *dentry) > pr_debug("Found %s xattr in %s, default path: %s, digest list: %s\n", > XATTR_NAME_DIGEST_LIST, dentry->d_name.name, default_path_str, > filename); > + > + if (filename[0]) > + prefetch_req =3D digest_cache_prefetch_requested(&default_path, > + default_path_str); > create: > + /* On prefetching, retrieve the directory digest cache. */ > digest_cache =3D digest_cache_create(dentry, &default_path, > - default_path_str, filename); > + default_path_str, > + !prefetch_req ? filename : "", > + prefetch_req, false); > + if (!digest_cache) > + goto out; > + > + if (prefetch_req) { > + /* Find the digest cache with a matching file name. */ > + found =3D digest_cache_dir_lookup_filename(dentry, &default_path, > + digest_cache, > + filename); > + /* Release ref. to the directory digest cache. */ > + digest_cache_put(digest_cache); > + digest_cache =3D found; > + } > out: > path_put(&default_path); > return digest_cache; > diff --git a/security/digest_cache/populate.c b/security/digest_cache/pop= ulate.c > index 9c2fc2295310..17e7b011c367 100644 > --- a/security/digest_cache/populate.c > +++ b/security/digest_cache/populate.c > @@ -143,6 +143,12 @@ int digest_cache_populate(struct digest_cache *diges= t_cache, > return ret; > } > =20 > + /* The caller wants just to read digest lists. */ > + if (!digest_cache) { > + ret =3D 0; > + goto out_vfree; > + } > + > data_len =3D digest_cache_strip_modsig(data, ret); > =20 > /* Digest list parsers initialize the hash table and add the digests. *= / > @@ -151,7 +157,7 @@ int digest_cache_populate(struct digest_cache *digest= _cache, > if (ret < 0) > pr_debug("Error parsing digest list %s%s%s, ret: %d\n", > path_str, filename[0] ? "/" : "", filename, ret); > - > +out_vfree: > vfree(data); > return ret; > } > diff --git a/security/digest_cache/verif.c b/security/digest_cache/verif.= c > index 04023240d3b4..c42ae93261e2 100644 > --- a/security/digest_cache/verif.c > +++ b/security/digest_cache/verif.c > @@ -33,7 +33,7 @@ static void free_verif(struct digest_cache_verif *verif= ) > * This function lets a verifier supply verification data about a digest= list > * being read to populate the digest cache. > * > - * Return: Zero on success, -ENOMEM if out of memory. > + * Return: Zero on success, -ENOMEM if out of memory, -ENOENT on prefetc= hing. > */ > int digest_cache_verif_set(struct file *file, const char *verif_id, void= *data, > size_t size) > @@ -41,6 +41,9 @@ int digest_cache_verif_set(struct file *file, const cha= r *verif_id, void *data, > struct digest_cache *digest_cache =3D digest_cache_from_file_sec(file); > struct digest_cache_verif *new_verif; > =20 > + if (!digest_cache) > + return -ENOENT; > + > /* > * All allocations must be atomic (non-sleepable) since kprobe does not > * allow otherwise (kprobe is needed for testing). BR, Jarkko