Posts
4888
Following
324
Followers
489
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

I dared to apply this to my -next:

https://lore.kernel.org/keyrings/Z_e9CVsmiXD3QYkg@kernel.org/

It's a good timing, given that we are at -rc1. key_put() is exactly type of code where:

1. You need to be extremely conservative.
2. Still there's a chance for breakage.
3. struct key is widely accessed kernel object in various context's. Thus, it is practically impossible to consider every possible use case.

I'll put this to my v6.16 PR if it turns out to not cause too much devastation :-)

#linux #kernel #keyring
0
0
0

Jarkko Sakkinen

0
0
0

Jarkko Sakkinen

2
0
0

Jarkko Sakkinen

Flying to Berlin in near future to meet up friends from Tallinn :-) It's cheaper than train + boat.
0
0
1

Jarkko Sakkinen

literally me
0
2
1

Jarkko Sakkinen

"marvel's mignight suns" is a cool game but why they have to talk so much, and why i need to hang out.

i don't hang out IRL either 🤷
0
0
0

Jarkko Sakkinen

thank you mr showerhead for giving this freedom my US comrades (pun intended).

https://www.whitehouse.gov/presidential-actions/2025/04/maintaining-acceptable-water-pressure-in-showerheads/
0
0
0

Jarkko Sakkinen

Edited 6 months ago

container hack for build: unshare + chroot. unshare guarantees unmounts, given a ephemeral file system namespace :-)

#!/bin/sh

set -eu

rootfs_dir=$1
adm_user=$2

if [ "$#" -eq 3 ]; then
  proxy_address=""
  cmdline=$3
else
  proxy_address=$3
  cmdline=$4
fi

sudo unshare --mount --pid --fork sh -c "
  mount --bind /sys '$rootfs_dir/sys'
  mount --bind /dev '$rootfs_dir/dev'
  mount -t proc proc '$rootfs_dir/proc'
  mount -t devpts devpts '$rootfs_dir/dev/pts'
  chroot '$rootfs_dir' su - '$adm_user' -c 'export PUAVO_CACHE_PROXY=\"$proxy_address\"; $cmdline'
"
0
1
1
@oleksandr or at most only cosmetic changes for this patch per se.
0
0
0
@oleksandr not likely but i'll have to hear if this needs additional fixes
1
0
0
@Conan_Kudo BTW, so we do have machine keyring and MOK keys. What is the problem?
1
0
0
@Conan_Kudo There's this irony in shared data (in general) that even if your blob lives for the whole power cycle, it must be prepared for sudden death that could happen in the next time quantum :-)
1
0
0
@Conan_Kudo This work is for key_put() :-) How to make it less sensitive overall.
1
0
0
In the case of procfs I'll check if this strategy would allow to relax locking requirements for /proc/keys.
1
0
0

Jarkko Sakkinen

Anyone interested on keyring:

https://web.git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/commit/?h=keys-graveyard

If this would work out then possibly also radiate to /proc/keys.

I.e. it could also similarly "knock for reference" but that is not within scope of this patch.

#linux #kernel #keyring
1
0
0

Happy International Asexuality Day!

0
5
3
@liw retooted because want to try it out some day...
0
0
1
Show older