Received: by 10.213.65.68 with SMTP id h4csp144016imn; Thu, 15 Mar 2018 12:11:24 -0700 (PDT) X-Google-Smtp-Source: AG47ELsdgp+KrkJzsiurp5WsThcsQiqOPBLaHiqalIQsmjlWa/Dn4uCCOfes8f88iO7OkAO4MBxz X-Received: by 2002:a17:902:6ac2:: with SMTP id i2-v6mr9084350plt.368.1521141084075; Thu, 15 Mar 2018 12:11:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521141084; cv=none; d=google.com; s=arc-20160816; b=gNG1R0yOUPtVZHMUoK9FS1g5ST8dWKFJc6RZ8EFVnf0OTk5BA0DkwdsMAnQwHtPbQj Gzb3eecfcU7wPjANk9JHqJiWfS4SFabe/qv2Xd/O0RTyiHqIbnPcpRYBFcpu4AAphCdE cRk3c3T+sfO5ROFo3pxtqmaAklnLDMzxNrcXKJXlDXsz9A8DSxHV+Qa14+jib4x1+ETq etewELsqrrERjb3P+6ZFp7g+4PQ0ufC5q0leA1DP6YqazjjUQP1muAguEqcF7dY717CJ pcgXCp/mEshQbC4uJZaBvQtGlJUZUg/Cf5gk1fFcfLrs4vYEMuvwVOQAPCdHn1Oj/SVw qdzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=X6Okk/otK3PYo0bEftnzavqORaNpd2lxo3Kc1ALx8DY=; b=kLekLve7lMPQ28q0ovu3ZNso12yyKb4T8G6h0a/75z8E00ce8XydMCU/QYQ/wXIU4f 9jGrNxie/dmjLGw/1FI7w7D7KnUVC+8PBQ2fb4HN611L2HAB+5hw/wRdN/3pH2NuRQFw yohsidjh40XA1fAd2mJu+5ZJQ+i6jpR36Tqu9xRwUviOe61SAxuHaW60Bynu+1NKslOc l6DmCcszkWOlhONTLHd6r0Ga0xkbssA+cMH/CdLEEDeghHISyBCeO66sn5hwfPEM0y8t QV8ZOfHGfYIRtGyvtPZ+h4EBYiLUVc+EzUs6aknPb/oibQpBkuFe1mg86wLP1GgWFcme HWVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 205si4215880pfy.70.2018.03.15.12.11.08; Thu, 15 Mar 2018 12:11:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932915AbeCOTJ3 (ORCPT + 99 others); Thu, 15 Mar 2018 15:09:29 -0400 Received: from isilmar-4.linta.de ([136.243.71.142]:36144 "EHLO isilmar-4.linta.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932496AbeCOTGX (ORCPT ); Thu, 15 Mar 2018 15:06:23 -0400 Received: from light.dominikbrodowski.net (isilmar.linta [10.0.0.1]) by isilmar-4.linta.de (Postfix) with ESMTPS id BE6EF200924; Thu, 15 Mar 2018 19:06:18 +0000 (UTC) Received: by light.dominikbrodowski.net (Postfix, from userid 1000) id EBCA9209FE; Thu, 15 Mar 2018 20:05:39 +0100 (CET) From: Dominik Brodowski To: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, viro@zeniv.linux.org.uk Cc: luto@kernel.org, mingo@kernel.org, akpm@linux-foundation.org, arnd@arndb.de Subject: [PATCH v2 32/36] fs: add do_faccessat() helper and ksys_access() wrapper; remove in-kernel calls to syscall Date: Thu, 15 Mar 2018 20:05:25 +0100 Message-Id: <20180315190529.20943-33-linux@dominikbrodowski.net> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180315190529.20943-1-linux@dominikbrodowski.net> References: <20180315190529.20943-1-linux@dominikbrodowski.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Using the fs-internal do_faccessat() helper allows us to get rid of fs-internal calls to the sys_faccessat() syscall. Introducing the ksys_access() wrapper allows us to avoid the in-kernel calls to the sys_access() syscall. Cc: Al Viro Cc: Andrew Morton Signed-off-by: Dominik Brodowski --- fs/internal.h | 1 + fs/open.c | 9 +++++++-- include/linux/syscalls.h | 7 +++++++ init/main.c | 3 ++- 4 files changed, 17 insertions(+), 3 deletions(-) diff --git a/fs/internal.h b/fs/internal.h index 2474bf460f96..26f4f05b52ef 100644 --- a/fs/internal.h +++ b/fs/internal.h @@ -119,6 +119,7 @@ extern struct file *do_filp_open(int dfd, struct filename *pathname, extern struct file *do_file_open_root(struct dentry *, struct vfsmount *, const char *, const struct open_flags *); +long do_faccessat(int dfd, const char __user *filename, int mode); int do_fchmodat(int dfd, const char __user *filename, umode_t mode); extern int open_check_o_direct(struct file *f); diff --git a/fs/open.c b/fs/open.c index 6037f2bf418c..0fc8188be31a 100644 --- a/fs/open.c +++ b/fs/open.c @@ -350,7 +350,7 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len) * We do this by temporarily clearing all FS-related capabilities and * switching the fsuid/fsgid around to the real ones. */ -SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) +long do_faccessat(int dfd, const char __user *filename, int mode) { const struct cred *old_cred; struct cred *override_cred; @@ -426,9 +426,14 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) return res; } +SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) +{ + return do_faccessat(dfd, filename, mode); +} + SYSCALL_DEFINE2(access, const char __user *, filename, int, mode) { - return sys_faccessat(AT_FDCWD, filename, mode); + return do_faccessat(AT_FDCWD, filename, mode); } int ksys_chdir(const char __user *filename) diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index f2b4858464e2..c376ff14ce1c 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h @@ -1031,4 +1031,11 @@ static inline int ksys_chmod(const char __user *filename, umode_t mode) return do_fchmodat(AT_FDCWD, filename, mode); } +extern long do_faccessat(int dfd, const char __user *filename, int mode); + +static inline long ksys_access(const char __user *filename, int mode) +{ + return do_faccessat(AT_FDCWD, filename, mode); +} + #endif diff --git a/init/main.c b/init/main.c index b8649d1466e1..d0ded4322c6b 100644 --- a/init/main.c +++ b/init/main.c @@ -1087,7 +1087,8 @@ static noinline void __init kernel_init_freeable(void) if (!ramdisk_execute_command) ramdisk_execute_command = "/init"; - if (sys_access((const char __user *) ramdisk_execute_command, 0) != 0) { + if (ksys_access((const char __user *) + ramdisk_execute_command, 0) != 0) { ramdisk_execute_command = NULL; prepare_namespace(); } -- 2.16.2