On Thu, 2022-06-23 at 09:23 -0400, James Bottomley wrote: > On Thu, 2022-06-23 at 10:54 +0200, Greg Kroah-Hartman wrote: > [...] > > > diff --git a/fs/fwsecurityfs/inode.c b/fs/fwsecurityfs/inode.c > > > new file mode 100644 > > > index 000000000000..5d06dc0de059 > > > --- /dev/null > > > +++ b/fs/fwsecurityfs/inode.c > > > @@ -0,0 +1,159 @@ > > > +// SPDX-License-Identifier: GPL-2.0-only > > > +/* > > > + * Copyright (C) 2022 IBM Corporation > > > + * Author: Nayna Jain <nayna@xxxxxxxxxxxxx> > > > + */ > > > + > > > +#include <linux/sysfs.h> > > > +#include <linux/kobject.h> > > > +#include <linux/fs.h> > > > +#include <linux/fs_context.h> > > > +#include <linux/mount.h> > > > +#include <linux/pagemap.h> > > > +#include <linux/init.h> > > > +#include <linux/namei.h> > > > +#include <linux/security.h> > > > +#include <linux/lsm_hooks.h> > > > +#include <linux/magic.h> > > > +#include <linux/ctype.h> > > > +#include <linux/fwsecurityfs.h> > > > + > > > +#include "internal.h" > > > + > > > +int fwsecurityfs_remove_file(struct dentry *dentry) > > > +{ > > > + drop_nlink(d_inode(dentry)); > > > + dput(dentry); > > > + return 0; > > > +}; > > > +EXPORT_SYMBOL_GPL(fwsecurityfs_remove_file); > > > + > > > +int fwsecurityfs_create_file(const char *name, umode_t mode, > > > + u16 filesize, struct dentry > > > *parent, > > > + struct dentry *dentry, > > > + const struct file_operations > > > *fops) > > > +{ > > > + struct inode *inode; > > > + int error; > > > + struct inode *dir; > > > + > > > + if (!parent) > > > + return -EINVAL; > > > + > > > + dir = d_inode(parent); > > > + pr_debug("securityfs: creating file '%s'\n", name); > > > > Did you forget to call simple_pin_fs() here or anywhere else? > > > > And this can be just one function with the directory creation file, > > just check the mode and you will be fine. Look at securityfs as an > > example of how to make this simpler. > > Actually, before you go down this route can you consider the namespace > ramifications. In fact we're just having to rework securityfs to pull > out all the simple_pin_... calls because simple_pin_... is completely > inimical to namespaces. > > The first thing to consider is if you simply use securityfs you'll > inherit all the simple_pin_... removal work and be namespace ready. It > could be that creating a new filesystem that can't be namespaced is the > right thing to do here, but at least ask the question: would we ever > want any of these files to be presented selectively inside containers? > If the answer is "yes" then simple_pin_... is the wrong interface. Greg, the securityfs changes James is referring to are part of the IMA namespacing patch set: https://lore.kernel.org/linux-integrity/20220420140633.753772-1-stefanb@xxxxxxxxxxxxx/ I'd really appreciate your reviewing the first two patches: [PATCH v12 01/26] securityfs: rework dentry creation [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support thanks, Mimi