diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2015-11-05 18:32:38 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2015-11-05 18:32:38 -0500 |
commit | 1873499e13648a2dd01a394ed3217c9290921b3d (patch) | |
tree | 3a662aadb3c02bbce2e9231a90da6e98b54d33d4 /fs/ext4 | |
parent | 3460b01b12aaf0011cb30f6f502edd05752f70eb (diff) | |
parent | ba94c3ff20c9c179f2a80f0e4c71e1571ebbf5c7 (diff) |
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem update from James Morris:
"This is mostly maintenance updates across the subsystem, with a
notable update for TPM 2.0, and addition of Jarkko Sakkinen as a
maintainer of that"
* 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (40 commits)
apparmor: clarify CRYPTO dependency
selinux: Use a kmem_cache for allocation struct file_security_struct
selinux: ioctl_has_perm should be static
selinux: use sprintf return value
selinux: use kstrdup() in security_get_bools()
selinux: use kmemdup in security_sid_to_context_core()
selinux: remove pointless cast in selinux_inode_setsecurity()
selinux: introduce security_context_str_to_sid
selinux: do not check open perm on ftruncate call
selinux: change CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE default
KEYS: Merge the type-specific data with the payload data
KEYS: Provide a script to extract a module signature
KEYS: Provide a script to extract the sys cert list from a vmlinux file
keys: Be more consistent in selection of union members used
certs: add .gitignore to stop git nagging about x509_certificate_list
KEYS: use kvfree() in add_key
Smack: limited capability for changing process label
TPM: remove unnecessary little endian conversion
vTPM: support little endian guests
char: Drop owner assignment from i2c_driver
...
Diffstat (limited to 'fs/ext4')
-rw-r--r-- | fs/ext4/crypto_key.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/ext4/crypto_key.c b/fs/ext4/crypto_key.c index 1d510c11b100..5c52c79dea46 100644 --- a/fs/ext4/crypto_key.c +++ b/fs/ext4/crypto_key.c | |||
@@ -121,7 +121,7 @@ int _ext4_get_encryption_info(struct inode *inode) | |||
121 | struct key *keyring_key = NULL; | 121 | struct key *keyring_key = NULL; |
122 | struct ext4_encryption_key *master_key; | 122 | struct ext4_encryption_key *master_key; |
123 | struct ext4_encryption_context ctx; | 123 | struct ext4_encryption_context ctx; |
124 | struct user_key_payload *ukp; | 124 | const struct user_key_payload *ukp; |
125 | struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb); | 125 | struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb); |
126 | struct crypto_ablkcipher *ctfm; | 126 | struct crypto_ablkcipher *ctfm; |
127 | const char *cipher_str; | 127 | const char *cipher_str; |
@@ -209,7 +209,7 @@ retry: | |||
209 | } | 209 | } |
210 | crypt_info->ci_keyring_key = keyring_key; | 210 | crypt_info->ci_keyring_key = keyring_key; |
211 | BUG_ON(keyring_key->type != &key_type_logon); | 211 | BUG_ON(keyring_key->type != &key_type_logon); |
212 | ukp = ((struct user_key_payload *)keyring_key->payload.data); | 212 | ukp = user_key_payload(keyring_key); |
213 | if (ukp->datalen != sizeof(struct ext4_encryption_key)) { | 213 | if (ukp->datalen != sizeof(struct ext4_encryption_key)) { |
214 | res = -EINVAL; | 214 | res = -EINVAL; |
215 | goto out; | 215 | goto out; |