[PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
xiujianfeng
xiujianfeng at huawei.com
Mon Jan 30 04:02:44 UTC 2023
Hi,
On 2023/1/30 0:15, Mimi Zohar wrote:
>> @@ -254,15 +264,9 @@ static int evm_calc_hmac_or_hash(struct dentry *dentry,
>> if (is_ima)
>> ima_present = true;
>>
>> - if (req_xattr_value_len < 64)
>> - pr_debug("%s: (%zu) [%*phN]\n", req_xattr_name,
>> - req_xattr_value_len,
>> - (int)req_xattr_value_len,
>> - req_xattr_value);
>> - else
>> - dump_security_xattr(req_xattr_name,
>> - req_xattr_value,
>> - req_xattr_value_len);
>> + dump_security_xattr(req_xattr_name,
>> + req_xattr_value,
>> + req_xattr_value_len);
>> continue;
>> }
>> size = vfs_getxattr_alloc(&nop_mnt_idmap, dentry, xattr->name,
>
> Hm, this patch doesn't apply properly.
I noticed that the patch fails to apply on linux master, however this
patch is meant for linux-next, would you please maybe have a look?
>
> Mimi>
>
More information about the Linux-security-module-archive
mailing list