diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2023-11-16 10:01:22 +0100 |
---|---|---|
committer | Casey Schaufler <casey@schaufler-ca.com> | 2024-01-24 14:06:26 -0800 |
commit | ac02f007d64eb2769d0bde742aac4d7a5fc6e8a5 (patch) | |
tree | e4af2d28ac7fc4beb0fc5161777be3d07c283c11 /security | |
parent | 9c82169208dde516510aaba6bbd8b13976690c5d (diff) | |
download | linux-ac02f007d64eb2769d0bde742aac4d7a5fc6e8a5.tar.gz linux-ac02f007d64eb2769d0bde742aac4d7a5fc6e8a5.tar.bz2 linux-ac02f007d64eb2769d0bde742aac4d7a5fc6e8a5.zip |
smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity()
If the SMACK64TRANSMUTE xattr is provided, and the inode is a directory,
update the in-memory inode flags by setting SMK_INODE_TRANSMUTE.
Cc: stable@vger.kernel.org
Fixes: 5c6d1125f8db ("Smack: Transmute labels on specified directories") # v2.6.38.x
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/smack/smack_lsm.c | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 72b371812a00..6e5f74813c10 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -2856,6 +2856,15 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name, if (value == NULL || size > SMK_LONGLABEL || size == 0) return -EINVAL; + if (strcmp(name, XATTR_SMACK_TRANSMUTE) == 0) { + if (!S_ISDIR(inode->i_mode) || size != TRANS_TRUE_SIZE || + strncmp(value, TRANS_TRUE, TRANS_TRUE_SIZE) != 0) + return -EINVAL; + + nsp->smk_flags |= SMK_INODE_TRANSMUTE; + return 0; + } + skp = smk_import_entry(value, size); if (IS_ERR(skp)) return PTR_ERR(skp); |