• Casey Schaufler's avatar
    Smack: Rework file hooks · 5e7270a6
    Casey Schaufler authored
    This is one of those cases where you look at code you did
    years ago and wonder what you might have been thinking.
    There are a number of LSM hooks that work off of file pointers,
    and most of them really want the security data from the inode.
    Some, however, really want the security context that the process
    had when the file was opened. The difference went undetected in
    Smack until it started getting used in a real system with real
    testing. At that point it was clear that something was amiss.
    
    This patch corrects the misuse of the f_security value in several
    of the hooks. The behavior will not usually be any different, as
    the process had to be able to open the file in the first place, and
    the old check almost always succeeded, as will the new, but for
    different reasons.
    
    Thanks to the Samsung Tizen development team that identified this.
    Signed-off-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
    5e7270a6
smack_lsm.c 101 KB