summaryrefslogtreecommitdiffstats
path: root/fs/posix_acl.c
diff options
context:
space:
mode:
authorRoberto Sassu <roberto.sassu@huawei.com>2024-02-15 11:31:04 +0100
committerPaul Moore <paul@paul-moore.com>2024-02-15 23:43:44 -0500
commit8b9d0b825c6573d654c8b8039ea79920926305c2 (patch)
tree8d8d0b005065fdbf63cd364719627447de4a0b91 /fs/posix_acl.c
parenta7811e34d100acf24870eb949c5ae3e49dde18b9 (diff)
downloadlinux-stable-8b9d0b825c6573d654c8b8039ea79920926305c2.tar.gz
linux-stable-8b9d0b825c6573d654c8b8039ea79920926305c2.tar.bz2
linux-stable-8b9d0b825c6573d654c8b8039ea79920926305c2.zip
security: Introduce inode_post_set_acl hook
In preparation for moving IMA and EVM to the LSM infrastructure, introduce the inode_post_set_acl hook. At inode_set_acl hook, EVM verifies the file's existing HMAC value. At inode_post_set_acl, EVM re-calculates the file's HMAC based on the modified POSIX ACL and other file metadata. Other LSMs could similarly take some action after successful POSIX ACL change. The new hook cannot return an error and cannot cause the operation to be reverted. Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Reviewed-by: Stefan Berger <stefanb@linux.ibm.com> Acked-by: Casey Schaufler <casey@schaufler-ca.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Acked-by: Christian Brauner <brauner@kernel.org> Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'fs/posix_acl.c')
-rw-r--r--fs/posix_acl.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/fs/posix_acl.c b/fs/posix_acl.c
index e1af20893ebe..7556ee9f8a51 100644
--- a/fs/posix_acl.c
+++ b/fs/posix_acl.c
@@ -1137,6 +1137,7 @@ retry_deleg:
error = -EIO;
if (!error) {
fsnotify_xattr(dentry);
+ security_inode_post_set_acl(dentry, acl_name, kacl);
evm_inode_post_set_acl(dentry, acl_name, kacl);
}