162306a36Sopenharmony_ci/* Key type used to cache DNS lookups made by the kernel
262306a36Sopenharmony_ci *
362306a36Sopenharmony_ci * See Documentation/networking/dns_resolver.rst
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci *   Copyright (c) 2007 Igor Mammedov
662306a36Sopenharmony_ci *   Author(s): Igor Mammedov (niallain@gmail.com)
762306a36Sopenharmony_ci *              Steve French (sfrench@us.ibm.com)
862306a36Sopenharmony_ci *              Wang Lei (wang840925@gmail.com)
962306a36Sopenharmony_ci *		David Howells (dhowells@redhat.com)
1062306a36Sopenharmony_ci *
1162306a36Sopenharmony_ci *   This library is free software; you can redistribute it and/or modify
1262306a36Sopenharmony_ci *   it under the terms of the GNU Lesser General Public License as published
1362306a36Sopenharmony_ci *   by the Free Software Foundation; either version 2.1 of the License, or
1462306a36Sopenharmony_ci *   (at your option) any later version.
1562306a36Sopenharmony_ci *
1662306a36Sopenharmony_ci *   This library is distributed in the hope that it will be useful,
1762306a36Sopenharmony_ci *   but WITHOUT ANY WARRANTY; without even the implied warranty of
1862306a36Sopenharmony_ci *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
1962306a36Sopenharmony_ci *   the GNU Lesser General Public License for more details.
2062306a36Sopenharmony_ci *
2162306a36Sopenharmony_ci *   You should have received a copy of the GNU Lesser General Public License
2262306a36Sopenharmony_ci *   along with this library; if not, see <http://www.gnu.org/licenses/>.
2362306a36Sopenharmony_ci */
2462306a36Sopenharmony_ci#include <linux/module.h>
2562306a36Sopenharmony_ci#include <linux/moduleparam.h>
2662306a36Sopenharmony_ci#include <linux/slab.h>
2762306a36Sopenharmony_ci#include <linux/string.h>
2862306a36Sopenharmony_ci#include <linux/kernel.h>
2962306a36Sopenharmony_ci#include <linux/keyctl.h>
3062306a36Sopenharmony_ci#include <linux/err.h>
3162306a36Sopenharmony_ci#include <linux/seq_file.h>
3262306a36Sopenharmony_ci#include <linux/dns_resolver.h>
3362306a36Sopenharmony_ci#include <keys/dns_resolver-type.h>
3462306a36Sopenharmony_ci#include <keys/user-type.h>
3562306a36Sopenharmony_ci#include "internal.h"
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_ciMODULE_DESCRIPTION("DNS Resolver");
3862306a36Sopenharmony_ciMODULE_AUTHOR("Wang Lei");
3962306a36Sopenharmony_ciMODULE_LICENSE("GPL");
4062306a36Sopenharmony_ci
4162306a36Sopenharmony_ciunsigned int dns_resolver_debug;
4262306a36Sopenharmony_cimodule_param_named(debug, dns_resolver_debug, uint, 0644);
4362306a36Sopenharmony_ciMODULE_PARM_DESC(debug, "DNS Resolver debugging mask");
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ciconst struct cred *dns_resolver_cache;
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci#define	DNS_ERRORNO_OPTION	"dnserror"
4862306a36Sopenharmony_ci
4962306a36Sopenharmony_ci/*
5062306a36Sopenharmony_ci * Preparse instantiation data for a dns_resolver key.
5162306a36Sopenharmony_ci *
5262306a36Sopenharmony_ci * For normal hostname lookups, the data must be a NUL-terminated string, with
5362306a36Sopenharmony_ci * the NUL char accounted in datalen.
5462306a36Sopenharmony_ci *
5562306a36Sopenharmony_ci * If the data contains a '#' characters, then we take the clause after each
5662306a36Sopenharmony_ci * one to be an option of the form 'key=value'.  The actual data of interest is
5762306a36Sopenharmony_ci * the string leading up to the first '#'.  For instance:
5862306a36Sopenharmony_ci *
5962306a36Sopenharmony_ci *        "ip1,ip2,...#foo=bar"
6062306a36Sopenharmony_ci *
6162306a36Sopenharmony_ci * For server list requests, the data must begin with a NUL char and be
6262306a36Sopenharmony_ci * followed by a byte indicating the version of the data format.  Version 1
6362306a36Sopenharmony_ci * looks something like (note this is packed):
6462306a36Sopenharmony_ci *
6562306a36Sopenharmony_ci *	u8      Non-string marker (ie. 0)
6662306a36Sopenharmony_ci *	u8	Content (DNS_PAYLOAD_IS_*)
6762306a36Sopenharmony_ci *	u8	Version (e.g. 1)
6862306a36Sopenharmony_ci *	u8	Source of server list
6962306a36Sopenharmony_ci *	u8	Lookup status of server list
7062306a36Sopenharmony_ci *	u8	Number of servers
7162306a36Sopenharmony_ci *	foreach-server {
7262306a36Sopenharmony_ci *		__le16	Name length
7362306a36Sopenharmony_ci *		__le16	Priority (as per SRV record, low first)
7462306a36Sopenharmony_ci *		__le16	Weight (as per SRV record, higher first)
7562306a36Sopenharmony_ci *		__le16	Port
7662306a36Sopenharmony_ci *		u8	Source of address list
7762306a36Sopenharmony_ci *		u8	Lookup status of address list
7862306a36Sopenharmony_ci *		u8	Protocol (DNS_SERVER_PROTOCOL_*)
7962306a36Sopenharmony_ci *		u8	Number of addresses
8062306a36Sopenharmony_ci *		char[]	Name (not NUL-terminated)
8162306a36Sopenharmony_ci *		foreach-address {
8262306a36Sopenharmony_ci *			u8		Family (DNS_ADDRESS_IS_*)
8362306a36Sopenharmony_ci *			union {
8462306a36Sopenharmony_ci *				u8[4]	ipv4_addr
8562306a36Sopenharmony_ci *				u8[16]	ipv6_addr
8662306a36Sopenharmony_ci *			}
8762306a36Sopenharmony_ci *		}
8862306a36Sopenharmony_ci *	}
8962306a36Sopenharmony_ci *
9062306a36Sopenharmony_ci */
9162306a36Sopenharmony_cistatic int
9262306a36Sopenharmony_cidns_resolver_preparse(struct key_preparsed_payload *prep)
9362306a36Sopenharmony_ci{
9462306a36Sopenharmony_ci	struct user_key_payload *upayload;
9562306a36Sopenharmony_ci	unsigned long derrno;
9662306a36Sopenharmony_ci	int ret;
9762306a36Sopenharmony_ci	int datalen = prep->datalen, result_len = 0;
9862306a36Sopenharmony_ci	const char *data = prep->data, *end, *opt;
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_ci	if (datalen <= 1 || !data)
10162306a36Sopenharmony_ci		return -EINVAL;
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_ci	if (data[0] == 0) {
10462306a36Sopenharmony_ci		const struct dns_server_list_v1_header *v1;
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci		/* It may be a server list. */
10762306a36Sopenharmony_ci		if (datalen < sizeof(*v1))
10862306a36Sopenharmony_ci			return -EINVAL;
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_ci		v1 = (const struct dns_server_list_v1_header *)data;
11162306a36Sopenharmony_ci		kenter("[%u,%u],%u", v1->hdr.content, v1->hdr.version, datalen);
11262306a36Sopenharmony_ci		if (v1->hdr.content != DNS_PAYLOAD_IS_SERVER_LIST) {
11362306a36Sopenharmony_ci			pr_warn_ratelimited(
11462306a36Sopenharmony_ci				"dns_resolver: Unsupported content type (%u)\n",
11562306a36Sopenharmony_ci				v1->hdr.content);
11662306a36Sopenharmony_ci			return -EINVAL;
11762306a36Sopenharmony_ci		}
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_ci		if (v1->hdr.version != 1) {
12062306a36Sopenharmony_ci			pr_warn_ratelimited(
12162306a36Sopenharmony_ci				"dns_resolver: Unsupported server list version (%u)\n",
12262306a36Sopenharmony_ci				v1->hdr.version);
12362306a36Sopenharmony_ci			return -EINVAL;
12462306a36Sopenharmony_ci		}
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci		if ((v1->status != DNS_LOOKUP_GOOD &&
12762306a36Sopenharmony_ci		     v1->status != DNS_LOOKUP_GOOD_WITH_BAD)) {
12862306a36Sopenharmony_ci			if (prep->expiry == TIME64_MAX)
12962306a36Sopenharmony_ci				prep->expiry = ktime_get_real_seconds() + 1;
13062306a36Sopenharmony_ci		}
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci		result_len = datalen;
13362306a36Sopenharmony_ci		goto store_result;
13462306a36Sopenharmony_ci	}
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	kenter("'%*.*s',%u", datalen, datalen, data, datalen);
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci	if (!data || data[datalen - 1] != '\0')
13962306a36Sopenharmony_ci		return -EINVAL;
14062306a36Sopenharmony_ci	datalen--;
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	/* deal with any options embedded in the data */
14362306a36Sopenharmony_ci	end = data + datalen;
14462306a36Sopenharmony_ci	opt = memchr(data, '#', datalen);
14562306a36Sopenharmony_ci	if (!opt) {
14662306a36Sopenharmony_ci		/* no options: the entire data is the result */
14762306a36Sopenharmony_ci		kdebug("no options");
14862306a36Sopenharmony_ci		result_len = datalen;
14962306a36Sopenharmony_ci	} else {
15062306a36Sopenharmony_ci		const char *next_opt;
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci		result_len = opt - data;
15362306a36Sopenharmony_ci		opt++;
15462306a36Sopenharmony_ci		kdebug("options: '%s'", opt);
15562306a36Sopenharmony_ci		do {
15662306a36Sopenharmony_ci			int opt_len, opt_nlen;
15762306a36Sopenharmony_ci			const char *eq;
15862306a36Sopenharmony_ci			char optval[128];
15962306a36Sopenharmony_ci
16062306a36Sopenharmony_ci			next_opt = memchr(opt, '#', end - opt) ?: end;
16162306a36Sopenharmony_ci			opt_len = next_opt - opt;
16262306a36Sopenharmony_ci			if (opt_len <= 0 || opt_len > sizeof(optval)) {
16362306a36Sopenharmony_ci				pr_warn_ratelimited("Invalid option length (%d) for dns_resolver key\n",
16462306a36Sopenharmony_ci						    opt_len);
16562306a36Sopenharmony_ci				return -EINVAL;
16662306a36Sopenharmony_ci			}
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci			eq = memchr(opt, '=', opt_len);
16962306a36Sopenharmony_ci			if (eq) {
17062306a36Sopenharmony_ci				opt_nlen = eq - opt;
17162306a36Sopenharmony_ci				eq++;
17262306a36Sopenharmony_ci				memcpy(optval, eq, next_opt - eq);
17362306a36Sopenharmony_ci				optval[next_opt - eq] = '\0';
17462306a36Sopenharmony_ci			} else {
17562306a36Sopenharmony_ci				opt_nlen = opt_len;
17662306a36Sopenharmony_ci				optval[0] = '\0';
17762306a36Sopenharmony_ci			}
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci			kdebug("option '%*.*s' val '%s'",
18062306a36Sopenharmony_ci			       opt_nlen, opt_nlen, opt, optval);
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci			/* see if it's an error number representing a DNS error
18362306a36Sopenharmony_ci			 * that's to be recorded as the result in this key */
18462306a36Sopenharmony_ci			if (opt_nlen == sizeof(DNS_ERRORNO_OPTION) - 1 &&
18562306a36Sopenharmony_ci			    memcmp(opt, DNS_ERRORNO_OPTION, opt_nlen) == 0) {
18662306a36Sopenharmony_ci				kdebug("dns error number option");
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci				ret = kstrtoul(optval, 10, &derrno);
18962306a36Sopenharmony_ci				if (ret < 0)
19062306a36Sopenharmony_ci					goto bad_option_value;
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_ci				if (derrno < 1 || derrno > 511)
19362306a36Sopenharmony_ci					goto bad_option_value;
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci				kdebug("dns error no. = %lu", derrno);
19662306a36Sopenharmony_ci				prep->payload.data[dns_key_error] = ERR_PTR(-derrno);
19762306a36Sopenharmony_ci				continue;
19862306a36Sopenharmony_ci			}
19962306a36Sopenharmony_ci
20062306a36Sopenharmony_ci		bad_option_value:
20162306a36Sopenharmony_ci			pr_warn_ratelimited("Option '%*.*s' to dns_resolver key: bad/missing value\n",
20262306a36Sopenharmony_ci					    opt_nlen, opt_nlen, opt);
20362306a36Sopenharmony_ci			return -EINVAL;
20462306a36Sopenharmony_ci		} while (opt = next_opt + 1, opt < end);
20562306a36Sopenharmony_ci	}
20662306a36Sopenharmony_ci
20762306a36Sopenharmony_ci	/* don't cache the result if we're caching an error saying there's no
20862306a36Sopenharmony_ci	 * result */
20962306a36Sopenharmony_ci	if (prep->payload.data[dns_key_error]) {
21062306a36Sopenharmony_ci		kleave(" = 0 [h_error %ld]", PTR_ERR(prep->payload.data[dns_key_error]));
21162306a36Sopenharmony_ci		return 0;
21262306a36Sopenharmony_ci	}
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_cistore_result:
21562306a36Sopenharmony_ci	kdebug("store result");
21662306a36Sopenharmony_ci	prep->quotalen = result_len;
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	upayload = kmalloc(sizeof(*upayload) + result_len + 1, GFP_KERNEL);
21962306a36Sopenharmony_ci	if (!upayload) {
22062306a36Sopenharmony_ci		kleave(" = -ENOMEM");
22162306a36Sopenharmony_ci		return -ENOMEM;
22262306a36Sopenharmony_ci	}
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci	upayload->datalen = result_len;
22562306a36Sopenharmony_ci	memcpy(upayload->data, data, result_len);
22662306a36Sopenharmony_ci	upayload->data[result_len] = '\0';
22762306a36Sopenharmony_ci
22862306a36Sopenharmony_ci	prep->payload.data[dns_key_data] = upayload;
22962306a36Sopenharmony_ci	kleave(" = 0");
23062306a36Sopenharmony_ci	return 0;
23162306a36Sopenharmony_ci}
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci/*
23462306a36Sopenharmony_ci * Clean up the preparse data
23562306a36Sopenharmony_ci */
23662306a36Sopenharmony_cistatic void dns_resolver_free_preparse(struct key_preparsed_payload *prep)
23762306a36Sopenharmony_ci{
23862306a36Sopenharmony_ci	pr_devel("==>%s()\n", __func__);
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci	kfree(prep->payload.data[dns_key_data]);
24162306a36Sopenharmony_ci}
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci/*
24462306a36Sopenharmony_ci * The description is of the form "[<type>:]<domain_name>"
24562306a36Sopenharmony_ci *
24662306a36Sopenharmony_ci * The domain name may be a simple name or an absolute domain name (which
24762306a36Sopenharmony_ci * should end with a period).  The domain name is case-independent.
24862306a36Sopenharmony_ci */
24962306a36Sopenharmony_cistatic bool dns_resolver_cmp(const struct key *key,
25062306a36Sopenharmony_ci			     const struct key_match_data *match_data)
25162306a36Sopenharmony_ci{
25262306a36Sopenharmony_ci	int slen, dlen, ret = 0;
25362306a36Sopenharmony_ci	const char *src = key->description, *dsp = match_data->raw_data;
25462306a36Sopenharmony_ci
25562306a36Sopenharmony_ci	kenter("%s,%s", src, dsp);
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	if (!src || !dsp)
25862306a36Sopenharmony_ci		goto no_match;
25962306a36Sopenharmony_ci
26062306a36Sopenharmony_ci	if (strcasecmp(src, dsp) == 0)
26162306a36Sopenharmony_ci		goto matched;
26262306a36Sopenharmony_ci
26362306a36Sopenharmony_ci	slen = strlen(src);
26462306a36Sopenharmony_ci	dlen = strlen(dsp);
26562306a36Sopenharmony_ci	if (slen <= 0 || dlen <= 0)
26662306a36Sopenharmony_ci		goto no_match;
26762306a36Sopenharmony_ci	if (src[slen - 1] == '.')
26862306a36Sopenharmony_ci		slen--;
26962306a36Sopenharmony_ci	if (dsp[dlen - 1] == '.')
27062306a36Sopenharmony_ci		dlen--;
27162306a36Sopenharmony_ci	if (slen != dlen || strncasecmp(src, dsp, slen) != 0)
27262306a36Sopenharmony_ci		goto no_match;
27362306a36Sopenharmony_ci
27462306a36Sopenharmony_cimatched:
27562306a36Sopenharmony_ci	ret = 1;
27662306a36Sopenharmony_cino_match:
27762306a36Sopenharmony_ci	kleave(" = %d", ret);
27862306a36Sopenharmony_ci	return ret;
27962306a36Sopenharmony_ci}
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_ci/*
28262306a36Sopenharmony_ci * Preparse the match criterion.
28362306a36Sopenharmony_ci */
28462306a36Sopenharmony_cistatic int dns_resolver_match_preparse(struct key_match_data *match_data)
28562306a36Sopenharmony_ci{
28662306a36Sopenharmony_ci	match_data->lookup_type = KEYRING_SEARCH_LOOKUP_ITERATE;
28762306a36Sopenharmony_ci	match_data->cmp = dns_resolver_cmp;
28862306a36Sopenharmony_ci	return 0;
28962306a36Sopenharmony_ci}
29062306a36Sopenharmony_ci
29162306a36Sopenharmony_ci/*
29262306a36Sopenharmony_ci * Describe a DNS key
29362306a36Sopenharmony_ci */
29462306a36Sopenharmony_cistatic void dns_resolver_describe(const struct key *key, struct seq_file *m)
29562306a36Sopenharmony_ci{
29662306a36Sopenharmony_ci	seq_puts(m, key->description);
29762306a36Sopenharmony_ci	if (key_is_positive(key)) {
29862306a36Sopenharmony_ci		int err = PTR_ERR(key->payload.data[dns_key_error]);
29962306a36Sopenharmony_ci
30062306a36Sopenharmony_ci		if (err)
30162306a36Sopenharmony_ci			seq_printf(m, ": %d", err);
30262306a36Sopenharmony_ci		else
30362306a36Sopenharmony_ci			seq_printf(m, ": %u", key->datalen);
30462306a36Sopenharmony_ci	}
30562306a36Sopenharmony_ci}
30662306a36Sopenharmony_ci
30762306a36Sopenharmony_ci/*
30862306a36Sopenharmony_ci * read the DNS data
30962306a36Sopenharmony_ci * - the key's semaphore is read-locked
31062306a36Sopenharmony_ci */
31162306a36Sopenharmony_cistatic long dns_resolver_read(const struct key *key,
31262306a36Sopenharmony_ci			      char *buffer, size_t buflen)
31362306a36Sopenharmony_ci{
31462306a36Sopenharmony_ci	int err = PTR_ERR(key->payload.data[dns_key_error]);
31562306a36Sopenharmony_ci
31662306a36Sopenharmony_ci	if (err)
31762306a36Sopenharmony_ci		return err;
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	return user_read(key, buffer, buflen);
32062306a36Sopenharmony_ci}
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_cistruct key_type key_type_dns_resolver = {
32362306a36Sopenharmony_ci	.name		= "dns_resolver",
32462306a36Sopenharmony_ci	.flags		= KEY_TYPE_NET_DOMAIN | KEY_TYPE_INSTANT_REAP,
32562306a36Sopenharmony_ci	.preparse	= dns_resolver_preparse,
32662306a36Sopenharmony_ci	.free_preparse	= dns_resolver_free_preparse,
32762306a36Sopenharmony_ci	.instantiate	= generic_key_instantiate,
32862306a36Sopenharmony_ci	.match_preparse	= dns_resolver_match_preparse,
32962306a36Sopenharmony_ci	.revoke		= user_revoke,
33062306a36Sopenharmony_ci	.destroy	= user_destroy,
33162306a36Sopenharmony_ci	.describe	= dns_resolver_describe,
33262306a36Sopenharmony_ci	.read		= dns_resolver_read,
33362306a36Sopenharmony_ci};
33462306a36Sopenharmony_ci
33562306a36Sopenharmony_cistatic int __init init_dns_resolver(void)
33662306a36Sopenharmony_ci{
33762306a36Sopenharmony_ci	struct cred *cred;
33862306a36Sopenharmony_ci	struct key *keyring;
33962306a36Sopenharmony_ci	int ret;
34062306a36Sopenharmony_ci
34162306a36Sopenharmony_ci	/* create an override credential set with a special thread keyring in
34262306a36Sopenharmony_ci	 * which DNS requests are cached
34362306a36Sopenharmony_ci	 *
34462306a36Sopenharmony_ci	 * this is used to prevent malicious redirections from being installed
34562306a36Sopenharmony_ci	 * with add_key().
34662306a36Sopenharmony_ci	 */
34762306a36Sopenharmony_ci	cred = prepare_kernel_cred(&init_task);
34862306a36Sopenharmony_ci	if (!cred)
34962306a36Sopenharmony_ci		return -ENOMEM;
35062306a36Sopenharmony_ci
35162306a36Sopenharmony_ci	keyring = keyring_alloc(".dns_resolver",
35262306a36Sopenharmony_ci				GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, cred,
35362306a36Sopenharmony_ci				(KEY_POS_ALL & ~KEY_POS_SETATTR) |
35462306a36Sopenharmony_ci				KEY_USR_VIEW | KEY_USR_READ,
35562306a36Sopenharmony_ci				KEY_ALLOC_NOT_IN_QUOTA, NULL, NULL);
35662306a36Sopenharmony_ci	if (IS_ERR(keyring)) {
35762306a36Sopenharmony_ci		ret = PTR_ERR(keyring);
35862306a36Sopenharmony_ci		goto failed_put_cred;
35962306a36Sopenharmony_ci	}
36062306a36Sopenharmony_ci
36162306a36Sopenharmony_ci	ret = register_key_type(&key_type_dns_resolver);
36262306a36Sopenharmony_ci	if (ret < 0)
36362306a36Sopenharmony_ci		goto failed_put_key;
36462306a36Sopenharmony_ci
36562306a36Sopenharmony_ci	/* instruct request_key() to use this special keyring as a cache for
36662306a36Sopenharmony_ci	 * the results it looks up */
36762306a36Sopenharmony_ci	set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags);
36862306a36Sopenharmony_ci	cred->thread_keyring = keyring;
36962306a36Sopenharmony_ci	cred->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING;
37062306a36Sopenharmony_ci	dns_resolver_cache = cred;
37162306a36Sopenharmony_ci
37262306a36Sopenharmony_ci	kdebug("DNS resolver keyring: %d\n", key_serial(keyring));
37362306a36Sopenharmony_ci	return 0;
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_cifailed_put_key:
37662306a36Sopenharmony_ci	key_put(keyring);
37762306a36Sopenharmony_cifailed_put_cred:
37862306a36Sopenharmony_ci	put_cred(cred);
37962306a36Sopenharmony_ci	return ret;
38062306a36Sopenharmony_ci}
38162306a36Sopenharmony_ci
38262306a36Sopenharmony_cistatic void __exit exit_dns_resolver(void)
38362306a36Sopenharmony_ci{
38462306a36Sopenharmony_ci	key_revoke(dns_resolver_cache->thread_keyring);
38562306a36Sopenharmony_ci	unregister_key_type(&key_type_dns_resolver);
38662306a36Sopenharmony_ci	put_cred(dns_resolver_cache);
38762306a36Sopenharmony_ci}
38862306a36Sopenharmony_ci
38962306a36Sopenharmony_cimodule_init(init_dns_resolver)
39062306a36Sopenharmony_cimodule_exit(exit_dns_resolver)
39162306a36Sopenharmony_ciMODULE_LICENSE("GPL");
392