1hTpV4-0006ET-5x-H Debian-exim 104 113 1558624762 0 -received_time_usec .184872 -helo_name vger.kernel.org -host_address 209.132.180.67.35245 -host_name vger.kernel.org -interface_address 213.154.236.176.25 -received_protocol esmtp -aclm 1 4 batv -aclm 0 6 run-sa -body_linecount 581 -max_received_linelength 142 -deliver_firsttime XX 1 ssmeenk@freshdot.net 226P Received: from vger.kernel.org ([209.132.180.67]) by mx.freshdot.net with esmtp (Exim 4.90_1) (envelope-from ) id 1hTpV4-0006ET-5x for ssmeenk@freshdot.net; Thu, 23 May 2019 17:19:23 +0200 179P Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731240AbfEWPTF (ORCPT ); Thu, 23 May 2019 11:19:05 -0400 251P Received: from mx1.redhat.com ([209.132.183.28]:39052 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730709AbfEWPTE (ORCPT ); Thu, 23 May 2019 11:19:04 -0400 312P Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BF775811A9; Thu, 23 May 2019 15:19:03 +0000 (UTC) 199P Received: from warthog.procyon.org.uk (ovpn-121-142.rdu2.redhat.com [10.10.121.142]) by smtp.corp.redhat.com (Postfix) with ESMTP id 61DC67BE71; Thu, 23 May 2019 15:19:00 +0000 (UTC) 225 Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 091* Subject: [PATCH 9/9] keys: Pass the network namespace into request_key mechanism [ver #3] 044F From: David Howells 030T To: ebiederm@xmission.com 334C Cc: netdev@vger.kernel.org, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, linux-afs@lists.infradead.org, dhowells@redhat.com, dwalsh@redhat.com, vgoyal@redhat.com, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org 040 Date: Thu, 23 May 2019 16:18:59 +0100 082I Message-ID: <155862473964.15244.4574284793348756266.stgit@warthog.procyon.org.uk> 084 In-Reply-To: <155862466770.15244.16038372267332150004.stgit@warthog.procyon.org.uk> 083 References: <155862466770.15244.16038372267332150004.stgit@warthog.procyon.org.uk> 034 User-Agent: StGit/unknown-version 018 MIME-Version: 1.0 042 Content-Type: text/plain; charset="utf-8" 032 Content-Transfer-Encoding: 7bit 044 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 143 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Thu, 23 May 2019 15:19:03 +0000 (UTC) 040S Sender: linux-nfs-owner@vger.kernel.org 017 Precedence: bulk 037 List-ID: 042 X-Mailing-List: linux-nfs@vger.kernel.org 037 X-SA-Exim-Connect-IP: 209.132.180.67 040 X-SA-Exim-Rcpt-To: ssmeenk@freshdot.net 053 X-SA-Exim-Mail-From: linux-nfs-owner@vger.kernel.org 098 X-Spam-Checker-Version: SpamAssassin 3.4.2-fdi_20121011.01 (2018-09-13) on services.freshdot.net 015 X-Spam-Level: 197 X-Spam-Status: No, score=-2.9 required=4.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.2-fdi_20121011.01 091 Subject: [PATCH 9/9] keys: Pass the network namespace into request_key mechanism [ver #3] 065 X-SA-Exim-Version: 4.2.1 (built Tue, 02 Aug 2016 21:08:31 +0000) 099 X-SA-Exim-Scanned: Yes (on .index_key.desc_len = strlen(description), .cred = current_cred(), 044 size_t callout_len, void *aux, 147 @@ -561,6 +565,7 @@ struct key *request_key_and_link(struct key_type *type, { struct keyring_search_context ctx = { .index_key.type = type, 155 + .index_key.domain_tag = domain_tag, .index_key.description = description, .index_key.desc_len = strlen(description), .cred = current_cred(), 129 @@ -667,9 +672,10 @@ int wait_for_key_construction(struct key *key, bool intr) EXPORT_SYMBOL(wait_for_key_construction); /** 058 - * request_key - Request a key and wait for construction 143 + * request_key_tag - Request a key and wait for construction * @type: Type of key. * @description: The searchable description of the key. 213 + * @domain_tag: The domain in which the key operates. * @callout_info: The data to pass to the instantiation upcall (or NULL). * * As for request_key_and_link() except that it does not add the returned key 224 @@ -680,9 +686,10 @@ EXPORT_SYMBOL(wait_for_key_construction); * Furthermore, it then works as wait_for_key_construction() to wait for the * completion of keys undergoing construction with a non-interruptible wait. */ 048 -struct key *request_key(struct key_type *type, 029 - const char *description, 030 - const char *callout_info) 052 +struct key *request_key_tag(struct key_type *type, 033 + const char *description, 036 + struct key_tag *domain_tag, 082 + const char *callout_info) { struct key *key; size_t callout_len = 0; 128 @@ -690,7 +697,8 @@ struct key *request_key(struct key_type *type, if (callout_info) callout_len = strlen(callout_info); 075 - key = request_key_and_link(type, description, callout_info, callout_len, 018 + key = reques)