linux-stable/security
Roberto Sassu 60f9cecf6a smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity()
[ Upstream commit ac02f007d6 ]

If the SMACK64TRANSMUTE xattr is provided, and the inode is a directory,
update the in-memory inode flags by setting SMK_INODE_TRANSMUTE.

Cc: stable@vger.kernel.org
Fixes: 5c6d1125f8 ("Smack: Transmute labels on specified directories") # v2.6.38.x
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-04-13 12:51:22 +02:00
..
apparmor apparmor: avoid crash when parsed profile name is empty 2024-01-25 14:34:31 -08:00
integrity ima: detect changes to the backing overlay file 2023-12-08 08:44:27 +01:00
keys security: keys: perform capable check only on privileged operations 2023-09-23 10:59:39 +02:00
loadpin
lockdown lockdown: also lock down previous kgdb use 2022-06-06 08:33:48 +02:00
safesetid
selinux lsm: new security_file_ioctl_compat() hook 2024-02-23 08:25:15 +01:00
smack smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity() 2024-04-13 12:51:22 +02:00
tomoyo lsm: new security_file_ioctl_compat() hook 2024-02-23 08:25:15 +01:00
yama
commoncap.c capabilities: fix potential memleak on error path from vfs_getxattr_alloc() 2022-11-10 17:57:55 +01:00
device_cgroup.c device_cgroup: Roll back to original exceptions after copy failure 2023-01-18 11:41:50 +01:00
inode.c
Kconfig fortify: Explicitly disable Clang support 2021-11-21 13:38:50 +01:00
Kconfig.hardening
lsm_audit.c dump_common_audit_data(): fix racy accesses to ->d_name 2021-01-19 18:26:16 +01:00
Makefile
min_addr.c
security.c lsm: new security_file_ioctl_compat() hook 2024-02-23 08:25:15 +01:00