From: "Günther Noack" <gnoack@google.com>
To: "Mickaël Salaün" <mic@digikod.net>
Cc: linux-security-module@vger.kernel.org,
Jeff Xu <jeffxu@google.com>,
Jorge Lucangeli Obes <jorgelo@chromium.org>,
Allen Webb <allenwebb@google.com>,
Dmitry Torokhov <dtor@google.com>,
Paul Moore <paul@paul-moore.com>,
Konstantin Meskhidze <konstantin.meskhidze@huawei.com>,
Matt Bobrowski <repnop@google.com>,
linux-fsdevel@vger.kernel.org
Subject: Re: [PATCH v5 2/7] landlock: Add IOCTL access right
Date: Fri, 24 Nov 2023 15:03:58 +0100 [thread overview]
Message-ID: <ZWCtTnkL_aYA9cdQ@google.com> (raw)
In-Reply-To: <20231117.aeZ3koh4bu2a@digikod.net>
Hello!
On Fri, Nov 17, 2023 at 09:45:47PM +0100, Mickaël Salaün wrote:
> On Fri, Nov 17, 2023 at 04:49:15PM +0100, Günther Noack wrote:
> > +static inline access_mask_t expand_ioctl(const access_mask_t handled,
>
> Please remove all explicit inlines in the .c files, the compiler should
> be able to inline them if necessary, or it my not inline them at all
> anyway. It would be nice to check the -O2 code to see what GCC or clang
> do though, and I guess they will inline this kind of pattern.
Done.
> > + const access_mask_t access,
> > + const access_mask_t src,
> > + const access_mask_t dst)
> > +{
> > + if (!(handled & LANDLOCK_ACCESS_FS_IOCTL))
> > + return 0;
> > +
> > + access_mask_t copy_from = (handled & src) ? src :
>
> Please declare variables at the beginning of blocks.
Done.
> > +static inline access_mask_t
> > +landlock_expand_access_fs(const access_mask_t handled,
> > + const access_mask_t access)
> > +{
> > + return access |
> > + expand_ioctl(handled, access, LANDLOCK_ACCESS_FS_WRITE_FILE,
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP1 |
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP2 |
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP4) |
> > + expand_ioctl(handled, access, LANDLOCK_ACCESS_FS_READ_FILE,
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP1 |
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP2 |
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP3) |
> > + expand_ioctl(handled, access, LANDLOCK_ACCESS_FS_READ_DIR,
> > + LANDLOCK_ACCESS_FS_IOCTL_GROUP1);
> > +}
>
> I'd prefer to keep the semantic definition of these groups (i.e.
> required_ioctl_access) close the definition of access right expantions,
> and also close to the ioctl_groups veriable. Actually, ioctl_groups
> might make more sense close to the group definition, and then probably
> another define... What do you think?
Done, good idea. Thanks for the suggestion!
I think this makes sense and the code looks better when the IOCTL-related
functionality is grouped together at the top of fs.c, including ioctl_groups,
the LANDLOCK_ACCESS_FS_IOCTL_GROUP1,2,3,4 #defines, the expansion helpers and
the required_ioctl_access helper.
> > + /*
> > + * It is the access rights at the time of opening the file which
> > + * determine whether ioctl can be used on the opened file later.
>
> s/ioctl/IOCTL/g
Done.
> > +/**
> > + * landlock_expand_handled_access_fs() - add synthetic IOCTL access rights to an
> > + * access mask of handled accesses.
> > + *
> > + * @handled: The handled accesses of a ruleset that is being created
> > + *
> > + * Returns: @handled, with the bits for the synthetic IOCTL access rights set,
> > + * if %LANDLOCK_ACCESS_FS_IOCTL is handled
> > + */
>
> This doc should be in fs.c
Done, thanks.
(I did not realize that the convention worked this way in the kernel. This goes
on my bucket list of things to double check.)
Thanks for the review!
—Günther
next prev parent reply other threads:[~2023-11-24 14:04 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-11-17 15:49 [PATCH v5 0/7] Landlock: IOCTL support Günther Noack
2023-11-17 15:49 ` [PATCH v5 1/7] landlock: Optimize the number of calls to get_access_mask slightly Günther Noack
2023-11-17 15:49 ` [PATCH v5 2/7] landlock: Add IOCTL access right Günther Noack
2023-11-17 20:45 ` Mickaël Salaün
2023-11-24 14:03 ` Günther Noack [this message]
2023-11-20 19:43 ` Mickaël Salaün
2023-11-24 15:39 ` Günther Noack
2023-11-30 9:27 ` Mickaël Salaün
2023-11-17 15:49 ` [PATCH v5 3/7] selftests/landlock: Test IOCTL support Günther Noack
2023-11-20 20:41 ` Mickaël Salaün
2023-11-24 16:57 ` Günther Noack
2023-11-30 9:28 ` Mickaël Salaün
2023-11-17 15:49 ` [PATCH v5 4/7] selftests/landlock: Test IOCTL with memfds Günther Noack
2023-11-17 15:49 ` [PATCH v5 5/7] selftests/landlock: Test ioctl(2) and ftruncate(2) with open(O_PATH) Günther Noack
2023-11-17 15:49 ` [PATCH v5 6/7] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL Günther Noack
2023-11-17 15:49 ` [PATCH v5 7/7] landlock: Document IOCTL support Günther Noack
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZWCtTnkL_aYA9cdQ@google.com \
--to=gnoack@google.com \
--cc=allenwebb@google.com \
--cc=dtor@google.com \
--cc=jeffxu@google.com \
--cc=jorgelo@chromium.org \
--cc=konstantin.meskhidze@huawei.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=mic@digikod.net \
--cc=paul@paul-moore.com \
--cc=repnop@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).