Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp34842pxy; Wed, 21 Apr 2021 17:39:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwrOBO4XzLJXnl+gva1RkvrxmpJUlCGugZ2EFFVL1at84aDnIv68f2jC0DySUQsJgAtGaWL X-Received: by 2002:a17:902:eccd:b029:ea:ed20:b646 with SMTP id a13-20020a170902eccdb02900eaed20b646mr714512plh.4.1619051990463; Wed, 21 Apr 2021 17:39:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619051990; cv=none; d=google.com; s=arc-20160816; b=e6t083HPMW88U5rFruXrMD5wyYG9gc6LY4U7DQ/MBgd3+lWqusNMj2cXGg4+3hvBMh eKcghOMv8DwKYTASRhiSL1LB/fN2gz1/CnLSAH2CUKmphMUsEO1ejFHAPnMmNjx/Uiil zEqOlfNFcoo2YoFKBtleaLMQhdrYTxC9IMHqJve4IqFDOe3kkq1T9gccJftVjiB4AbmV 0tR7nwnGnY3GFfL1SVvoskkzX7Wcr78P4Ml+T73oNWr1L2mKgbCkBwrhSwSzvosrGWTu +4pCcKIg9Dop++0NHT03qoGr0Koj7GkmcmRRZ5CA84xg/G3NYZTZKJ+lhBrmYhctbl2k S4/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=NyOkADSLv5AHCP/wm3Mx3ILzcq+qZevAc9w1bQDldes=; b=G6Gg0JKCXCksEObTSvNk3t1VFv3/SrjkaskkhnEajWbVVYkr1BVsBb/0R8km/DjR8k cNZ26lOHQa/KJ/WR22CrFRuVAqXYDw0NuLYrpvpiRjo+e1KA0HhrmauX4/KL8PoOXxE7 BVGx19HIBHcaipDvaWicjZcHw56ZQ83K86qaLvCXyQquVYllVvgSKnwkh/Mz3rN2P214 gndm47ibU9Ii0XbgLlxDdgjCgTmEmr5PIlRSTWMTIS+p5QGfmlPogoByQC5Ak6VD3M2H L8zNWcrSfHc7mz+ffIOTeWckgPQC1ScEGKzBRaeInnqLbnFPxQFIqY7RJzFPP2HlaFei LqwQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r1si1204950pge.91.2021.04.21.17.39.38; Wed, 21 Apr 2021 17:39:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235180AbhDUQUp (ORCPT + 99 others); Wed, 21 Apr 2021 12:20:45 -0400 Received: from frasgout.his.huawei.com ([185.176.79.56]:2895 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241179AbhDUQUi (ORCPT ); Wed, 21 Apr 2021 12:20:38 -0400 Received: from fraeml714-chm.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4FQQYl6JSsz68Bmv; Thu, 22 Apr 2021 00:12:27 +0800 (CST) Received: from roberto-ThinkStation-P620.huawei.com (10.204.62.217) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 21 Apr 2021 18:19:58 +0200 From: Roberto Sassu To: , , , CC: , , , , , Roberto Sassu , , Jeff Mahoney , Tetsuo Handa Subject: [PATCH v2 1/6] xattr: Complete constify ->name member of "struct xattr" Date: Wed, 21 Apr 2021 18:19:20 +0200 Message-ID: <20210421161925.968825-2-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210421161925.968825-1-roberto.sassu@huawei.com> References: <20210421161925.968825-1-roberto.sassu@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.204.62.217] X-ClientProxiedBy: lhreml754-chm.china.huawei.com (10.201.108.204) To fraeml714-chm.china.huawei.com (10.206.15.33) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch completes commit 9548906b2bb7 ('xattr: Constify ->name member of "struct xattr"'). It fixes the documentation of the inode_init_security hook, by removing the xattr name from the objects that are expected to be allocated by LSMs (only the value is allocated). Also, it removes the kfree() of name and setting it to NULL in reiserfs_security_free(). Fixes: 9548906b2bb7 ('xattr: Constify ->name member of "struct xattr"') Cc: stable@vger.kernel.org Cc: Jeff Mahoney Cc: Tetsuo Handa Signed-off-by: Roberto Sassu --- fs/reiserfs/xattr_security.c | 2 -- include/linux/lsm_hooks.h | 4 ++-- 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/fs/reiserfs/xattr_security.c b/fs/reiserfs/xattr_security.c index 8965c8e5e172..bb2a0062e0e5 100644 --- a/fs/reiserfs/xattr_security.c +++ b/fs/reiserfs/xattr_security.c @@ -95,9 +95,7 @@ int reiserfs_security_write(struct reiserfs_transaction_handle *th, void reiserfs_security_free(struct reiserfs_security_handle *sec) { - kfree(sec->name); kfree(sec->value); - sec->name = NULL; sec->value = NULL; } diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index fb7f3193753d..c5498f5174ce 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -219,8 +219,8 @@ * This hook is called by the fs code as part of the inode creation * transaction and provides for atomic labeling of the inode, unlike * the post_create/mkdir/... hooks called by the VFS. The hook function - * is expected to allocate the name and value via kmalloc, with the caller - * being responsible for calling kfree after using them. + * is expected to allocate the value via kmalloc, with the caller + * being responsible for calling kfree after using it. * If the security module does not use security attributes or does * not wish to put a security attribute on this particular inode, * then it should return -EOPNOTSUPP to skip this processing. -- 2.25.1