[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e5fb34e1-43ee-bee1-2751-065e8b2b083a@schaufler-ca.com>
Date: Thu, 10 May 2018 17:56:10 -0700
From: Casey Schaufler <casey@...aufler-ca.com>
To: LSM <linux-security-module@...r.kernel.org>,
LKLM <linux-kernel@...r.kernel.org>,
Paul Moore <paul@...l-moore.com>,
Stephen Smalley <sds@...ho.nsa.gov>,
SE Linux <selinux@...ho.nsa.gov>,
"SMACK-discuss@...ts.01.org" <SMACK-discuss@...ts.01.org>,
John Johansen <john.johansen@...onical.com>,
Kees Cook <keescook@...omium.org>,
Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>,
James Morris <jmorris@...ei.org>
Subject: [PATCH 22/23] LSM: Fix setting of the IMA data in inode init
From: Casey Schaufler <casey@...aufler-ca.com>
Date: Thu, 10 May 2018 16:23:47 -0700
Subject: [PATCH 22/23] LSM: Fix setting of the IMA data in inode init
Fix a missing assignment in the inode security initialization.
The EVM entry was not being set correctly.
Signed-off-by: Casey Schaufler <casey@...aufler-ca.com>
---
security/security.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/security/security.c b/security/security.c
index ef51783e967e..571643cc7256 100644
--- a/security/security.c
+++ b/security/security.c
@@ -941,6 +941,7 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
&lsm_xattr->value_len);
if (rc == 0) {
lsm_xattr++;
+ evm_xattr = lsm_xattr;
if (ret == -EOPNOTSUPP)
ret = 0;
} else if (rc != -EOPNOTSUPP) {
@@ -950,7 +951,7 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
}
if (ret == 0) {
- rc = evm_inode_init_security(inode, lsm_xattr, evm_xattr);
+ rc = evm_inode_init_security(inode, new_xattrs, evm_xattr);
if (rc == 0)
rc = initxattrs(inode, new_xattrs, fs_data);
}
--
2.14.3
Powered by blists - more mailing lists