diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2021-05-14 17:27:48 +0200 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2021-05-21 18:57:52 +0200 |
commit | 7e135dc725417ecc0629afb4b3b24457d2a4869d (patch) | |
tree | 896e2f46d532e12fcfbbe3d6c8eff9bb484017cd /security/security.c | |
parent | evm: Allow xattr/attr operations for portable signatures (diff) | |
download | linux-7e135dc725417ecc0629afb4b3b24457d2a4869d.tar.xz linux-7e135dc725417ecc0629afb4b3b24457d2a4869d.zip |
evm: Pass user namespace to set/remove xattr hooks
In preparation for 'evm: Allow setxattr() and setattr() for unmodified
metadata', this patch passes mnt_userns to the inode set/remove xattr hooks
so that the GID of the inode on an idmapped mount is correctly determined
by posix_acl_update_mode().
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Reviewed-by: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Andreas Gruenbacher <agruenba@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/security.c')
-rw-r--r-- | security/security.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/security.c b/security/security.c index b38155b2de83..e9f8010a2341 100644 --- a/security/security.c +++ b/security/security.c @@ -1354,7 +1354,7 @@ int security_inode_setxattr(struct user_namespace *mnt_userns, ret = ima_inode_setxattr(dentry, name, value, size); if (ret) return ret; - return evm_inode_setxattr(dentry, name, value, size); + return evm_inode_setxattr(mnt_userns, dentry, name, value, size); } void security_inode_post_setxattr(struct dentry *dentry, const char *name, @@ -1399,7 +1399,7 @@ int security_inode_removexattr(struct user_namespace *mnt_userns, ret = ima_inode_removexattr(dentry, name); if (ret) return ret; - return evm_inode_removexattr(dentry, name); + return evm_inode_removexattr(mnt_userns, dentry, name); } int security_inode_need_killpriv(struct dentry *dentry) |