[PATCH 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
zohar at linux.vnet.ibm.com
Tue Oct 17 19:07:03 UTC 2017
On Mon, 2017-10-16 at 13:37 -0700, Matthew Garrett wrote:
> static int __init init_ima(void)
> diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
> index 95209a5f8595..c9d5735711eb 100644
> --- a/security/integrity/ima/ima_policy.c
> +++ b/security/integrity/ima/ima_policy.c
> @@ -247,10 +247,9 @@ static void ima_lsm_update_rules(void)
> * Returns true on rule match, false on failure.
> */
> static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
> - enum ima_hooks func, int mask)
> + const struct cred *cred, enum ima_hooks func,
> + int mask)
> {
> - struct task_struct *tsk = current;
> - const struct cred *cred = current_cred();
> int i;
>
> if ((rule->flags & IMA_FUNC) &&
> @@ -305,7 +304,7 @@ static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode,
> case LSM_SUBJ_USER:
> case LSM_SUBJ_ROLE:
> case LSM_SUBJ_TYPE:
> - security_task_getsecid(tsk, &sid);
> + security_cred_getsecid(cred, &sid);
> rc = security_filter_rule_match(sid,
> rule->lsm[i].type,
> Audit_equal,
By replacing the call from security_task_getsec() to
security_cred_getsecid(), I assume you're expecting different results.
Will this change break existing IMA policies?
Mimi
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list