Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs"
This reverts merge0f75ef6a9c
(and thus effectively commits7a1ade8475
("keys: Provide KEYCTL_GRANT_PERMISSION")2e12256b9a
("keys: Replace uid/gid/perm permissions checking with an ACL") that the merge brought in). It turns out that it breaks booting with an encrypted volume, and Eric biggers reports that it also breaks the fscrypt tests [1] and loading of in-kernel X.509 certificates [2]. The root cause of all the breakage is likely the same, but David Howells is off email so rather than try to work it out it's getting reverted in order to not impact the rest of the merge window. [1] https://lore.kernel.org/lkml/20190710011559.GA7973@sol.localdomain/ [2] https://lore.kernel.org/lkml/20190710013225.GB7973@sol.localdomain/ Link: https://lore.kernel.org/lkml/CAHk-=wjxoeMJfeBahnWH=9zShKp2bsVy527vo3_y8HfOdhwAAw@mail.gmail.com/ Reported-by: Eric Biggers <ebiggers@kernel.org> Cc: David Howells <dhowells@redhat.com> Cc: James Morris <jmorris@namei.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
@@ -24,17 +24,6 @@ static void request_key_auth_revoke(struct key *);
|
||||
static void request_key_auth_destroy(struct key *);
|
||||
static long request_key_auth_read(const struct key *, char __user *, size_t);
|
||||
|
||||
static struct key_acl request_key_auth_acl = {
|
||||
.usage = REFCOUNT_INIT(1),
|
||||
.nr_ace = 2,
|
||||
.possessor_viewable = true,
|
||||
.aces = {
|
||||
KEY_POSSESSOR_ACE(KEY_ACE_VIEW | KEY_ACE_READ | KEY_ACE_SEARCH |
|
||||
KEY_ACE_LINK),
|
||||
KEY_OWNER_ACE(KEY_ACE_VIEW),
|
||||
}
|
||||
};
|
||||
|
||||
/*
|
||||
* The request-key authorisation key type definition.
|
||||
*/
|
||||
@@ -221,8 +210,8 @@ struct key *request_key_auth_new(struct key *target, const char *op,
|
||||
|
||||
authkey = key_alloc(&key_type_request_key_auth, desc,
|
||||
cred->fsuid, cred->fsgid, cred,
|
||||
&request_key_auth_acl,
|
||||
KEY_ALLOC_NOT_IN_QUOTA, NULL);
|
||||
KEY_POS_VIEW | KEY_POS_READ | KEY_POS_SEARCH | KEY_POS_LINK |
|
||||
KEY_USR_VIEW, KEY_ALLOC_NOT_IN_QUOTA, NULL);
|
||||
if (IS_ERR(authkey)) {
|
||||
ret = PTR_ERR(authkey);
|
||||
goto error_free_rka;
|
||||
|
Reference in New Issue
Block a user