Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1222404yba; Thu, 4 Apr 2019 06:41:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqwJfgghC/DBl4rzFobOx2yFIojfDfeWVga4xFUZEWdfsxc5geIFfpjYtK9J1l1PVLhKsQtA X-Received: by 2002:a63:e20b:: with SMTP id q11mr6038240pgh.263.1554385291892; Thu, 04 Apr 2019 06:41:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554385291; cv=none; d=google.com; s=arc-20160816; b=lFE7PQ0wRjGlvPtIV6MmFSMFAdAREHg8qHNpZTSdG/gbExeNkFBhk8TpQYHcsRh8BW Llf7ax+GEC/n9aJraXgw8NzH5HtQ7mASHgOTsihhCFxdZHYMwQINVL9m0frVMjSg78ZM tjYKrWxIADhjshpFFR6LQzVKXfXXOyu1s8/DeT0vYpSFtI7SmMi/chWlh9bhickkWQbq g9rrWwhL1XQXDv6zZNI86Ddc6KFJKldoHzyxWWksAtAQpVXsEeFVyy2Z1PgLo66UxwNd ce9lwbf7hIZJ32bPlLGO3U1tAEcwY2d33gApX/bUgn2lFio/t/Py3aUL7BcBCorFDe9Q BvAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=UKkQQpAA4ZJ/X8VC9Cyvzr7FasAuv7nlB01xN8rvcIg=; b=XMH8EKPkt1W9+P125oSJcuEifgcnnW7rhEmkLhBccmBIQpRIIZFUcTnG0MCEll4Bhy MlhXih4nlyoxB09oeAqfE6vE6DTrfL2Imud3wKCJ5IGWVYwKN/vHxZ+gGce/sYdpAh5O wYMWgX8NF7HdElpVLoMETVIl9JDzTs1Syjsj//UFLvw7CV+8ZjGFrdml5FJpNIKWkFsl JpkeBxl3enq5fXvAlnYNEI1u91/fvR2vOavRIiZayLcusaml2yovE0mVq4pt5wAsymHo JyrMoVsFmmlg2fmz/34MJfIlCiXHilRwUkGtzch95OlHNID++s5b8TiydpvyI5qxxXD6 ppmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9si16091127pgn.457.2019.04.04.06.41.16; Thu, 04 Apr 2019 06:41:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729128AbfDDNjL (ORCPT + 99 others); Thu, 4 Apr 2019 09:39:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:36692 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726790AbfDDNjL (ORCPT ); Thu, 4 Apr 2019 09:39:11 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 66F6220855; Thu, 4 Apr 2019 13:39:09 +0000 (UTC) Date: Thu, 4 Apr 2019 09:39:07 -0400 From: Steven Rostedt To: Matthew Garrett Cc: jmorris@namei.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, dhowells@redhat.com, linux-api@vger.kernel.org, luto@kernel.org, Matthew Garrett Subject: Re: [PATCH V32 27/27] tracefs: Restrict tracefs when the kernel is locked down Message-ID: <20190404093907.153f52a8@gandalf.local.home> In-Reply-To: <20190404003249.14356-28-matthewgarrett@google.com> References: <20190404003249.14356-1-matthewgarrett@google.com> <20190404003249.14356-28-matthewgarrett@google.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 3 Apr 2019 17:32:49 -0700 Matthew Garrett wrote: > +static void tracefs_destroy_inode(struct inode *inode) > +{ > + if S_ISREG(inode->i_mode) Can we please put parenthesis around the condition. I know that the macro has them, but no other place in the kernel plays such a trick. if (S_ISREG(inode->i_mode)) Other than that, the rest looks good. Reviewed-by: Steven Rostedt (VMware) -- Steve > + kfree(inode->i_fop); > +} > + > static int tracefs_remount(struct super_block *sb, int *flags, char *data) > { > int err; > @@ -260,6 +288,7 @@ static int tracefs_show_options(struct seq_file *m, struct dentry *root) > > static const struct super_operations tracefs_super_operations = { > .statfs = simple_statfs, > + .destroy_inode = tracefs_destroy_inode, > .remount_fs = tracefs_remount, > .show_options = tracefs_show_options, > }; > @@ -393,6 +422,7 @@ struct dentry *tracefs_create_file(const char *name, umode_t mode, > { > struct dentry *dentry; > struct inode *inode; > + struct file_operations *proxy_fops; > > if (!(mode & S_IFMT)) > mode |= S_IFREG; > @@ -406,8 +436,16 @@ struct dentry *tracefs_create_file(const char *name, umode_t mode, > if (unlikely(!inode)) > return failed_creating(dentry); > > + proxy_fops = kzalloc(sizeof(struct file_operations), GFP_KERNEL); > + if (!proxy_fops) > + return failed_creating(dentry); > + > + dentry->d_fsdata = fops ? (void *)fops : > + (void *)&tracefs_file_operations; > + memcpy(proxy_fops, dentry->d_fsdata, sizeof(struct file_operations)); > + proxy_fops->open = default_open_file; > inode->i_mode = mode; > - inode->i_fop = fops ? fops : &tracefs_file_operations; > + inode->i_fop = proxy_fops; > inode->i_private = data; > d_instantiate(dentry, inode); > fsnotify_create(dentry->d_parent->d_inode, dentry);