aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2016-10-10 16:04:49 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2016-10-10 16:04:49 -0400
commitabb5a14fa20fdd400995926134b7be9eb8ce6048 (patch)
tree085add41cae3193b8c8293d25b453fd1ecae0c19 /security
parent911f9dab301e8583143c7e75b552eadd434ea0a8 (diff)
parente55f1d1d13e7f1c364672d667d78fd1f640ab9f9 (diff)
Merge branch 'work.misc' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
Pull misc vfs updates from Al Viro: "Assorted misc bits and pieces. There are several single-topic branches left after this (rename2 series from Miklos, current_time series from Deepa Dinamani, xattr series from Andreas, uaccess stuff from from me) and I'd prefer to send those separately" * 'work.misc' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs: (39 commits) proc: switch auxv to use of __mem_open() hpfs: support FIEMAP cifs: get rid of unused arguments of CIFSSMBWrite() posix_acl: uapi header split posix_acl: xattr representation cleanups fs/aio.c: eliminate redundant loads in put_aio_ring_file fs/internal.h: add const to ns_dentry_operations declaration compat: remove compat_printk() fs/buffer.c: make __getblk_slow() static proc: unsigned file descriptors fs/file: more unsigned file descriptors fs: compat: remove redundant check of nr_segs cachefiles: Fix attempt to read i_blocks after deleting file [ver #2] cifs: don't use memcpy() to copy struct iov_iter get rid of separate multipage fault-in primitives fs: Avoid premature clearing of capabilities fs: Give dentry to inode_change_ok() instead of inode fuse: Propagate dentry down to inode_change_ok() ceph: Propagate dentry down to inode_change_ok() xfs: Propagate dentry down to inode_change_ok() ...
Diffstat (limited to 'security')
-rw-r--r--security/integrity/ima/ima_appraise.c4
-rw-r--r--security/integrity/ima/ima_main.c2
2 files changed, 3 insertions, 3 deletions
diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c
index 4b9b4a4e1b89..ef1e4e701780 100644
--- a/security/integrity/ima/ima_appraise.c
+++ b/security/integrity/ima/ima_appraise.c
@@ -190,7 +190,7 @@ int ima_appraise_measurement(enum ima_hooks func,
190{ 190{
191 static const char op[] = "appraise_data"; 191 static const char op[] = "appraise_data";
192 char *cause = "unknown"; 192 char *cause = "unknown";
193 struct dentry *dentry = file->f_path.dentry; 193 struct dentry *dentry = file_dentry(file);
194 struct inode *inode = d_backing_inode(dentry); 194 struct inode *inode = d_backing_inode(dentry);
195 enum integrity_status status = INTEGRITY_UNKNOWN; 195 enum integrity_status status = INTEGRITY_UNKNOWN;
196 int rc = xattr_len, hash_start = 0; 196 int rc = xattr_len, hash_start = 0;
@@ -295,7 +295,7 @@ out:
295 */ 295 */
296void ima_update_xattr(struct integrity_iint_cache *iint, struct file *file) 296void ima_update_xattr(struct integrity_iint_cache *iint, struct file *file)
297{ 297{
298 struct dentry *dentry = file->f_path.dentry; 298 struct dentry *dentry = file_dentry(file);
299 int rc = 0; 299 int rc = 0;
300 300
301 /* do not collect and update hash for digital signatures */ 301 /* do not collect and update hash for digital signatures */
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 596ef616ac21..423d111b3b94 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -228,7 +228,7 @@ static int process_measurement(struct file *file, char *buf, loff_t size,
228 if ((action & IMA_APPRAISE_SUBMASK) || 228 if ((action & IMA_APPRAISE_SUBMASK) ||
229 strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) != 0) 229 strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) != 0)
230 /* read 'security.ima' */ 230 /* read 'security.ima' */
231 xattr_len = ima_read_xattr(file->f_path.dentry, &xattr_value); 231 xattr_len = ima_read_xattr(file_dentry(file), &xattr_value);
232 232
233 hash_algo = ima_get_hash_algo(xattr_value, xattr_len); 233 hash_algo = ima_get_hash_algo(xattr_value, xattr_len);
234 234