diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2023-06-10 09:57:37 +0200 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2023-07-10 13:59:38 -0400 |
commit | 6db7d1dee8003921b353d7e613471fe8995f46b5 (patch) | |
tree | cd4c88e6eb047849624f2d3bc7839bd551f6e687 /MAINTAINERS | |
parent | baed456a6a2f6b8bec2913a6c6a72cc811252c6e (diff) | |
download | linux-stable-6db7d1dee8003921b353d7e613471fe8995f46b5.tar.gz linux-stable-6db7d1dee8003921b353d7e613471fe8995f46b5.tar.bz2 linux-stable-6db7d1dee8003921b353d7e613471fe8995f46b5.zip |
evm: Align evm_inode_init_security() definition with LSM infrastructure
Change the evm_inode_init_security() definition to align with the LSM
infrastructure. Keep the existing behavior of including in the HMAC
calculation only the first xattr provided by LSMs.
Changing the evm_inode_init_security() definition requires passing the
xattr array allocated by security_inode_init_security(), and the number of
xattrs filled by previously invoked LSMs.
Use the newly introduced lsm_get_xattr_slot() to position EVM correctly in
the xattrs array, like a regular LSM, and to increment the number of filled
slots. For now, the LSM infrastructure allocates enough xattrs slots to
store the EVM xattr, without using the reservation mechanism.
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Acked-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'MAINTAINERS')
0 files changed, 0 insertions, 0 deletions