BACKPORT: Smack: Fix setting label on successful file open
authorMarcin Niesluchowski <m.niesluchow@samsung.com>
Tue, 19 Aug 2014 12:26:32 +0000 (14:26 +0200)
committerRafal Krypa <r.krypa@samsung.com>
Tue, 22 Mar 2016 11:49:06 +0000 (12:49 +0100)
While opening with CAP_MAC_OVERRIDE file label is not set.
Other calls may access it after CAP_MAC_OVERRIDE is dropped from process.

Signed-off-by: Marcin Niesluchowski <m.niesluchow@samsung.com>
(cherry-picked from upstream d83d2c26461d661384676a4eed935d925b0fcc34)

security/smack/smack_lsm.c

index 84761f9a6e7b7d7d7bf86e185bf269c53be167c1..8a22d7bd73ccb13734ab3bba73f4f1f3459b98c9 100644 (file)
@@ -1480,8 +1480,10 @@ static int smack_file_open(struct file *file, const struct cred *cred)
        struct smk_audit_info ad;
        int rc;
 
-       if (smack_privileged(CAP_MAC_OVERRIDE))
+       if (smack_privileged(CAP_MAC_OVERRIDE)) {
+               file->f_security = isp->smk_inode;
                return 0;
+       }
 
        smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_PATH);
        smk_ad_setfield_u_fs_path(&ad, file->f_path);