BACKPORT: Smack: Fix setting label on successful file open
authorMarcin Niesluchowski <m.niesluchow@samsung.com>
Tue, 19 Aug 2014 12:26:32 +0000 (14:26 +0200)
committerRafal Krypa <r.krypa@samsung.com>
Thu, 3 Nov 2016 16:41:47 +0000 (17:41 +0100)
While opening with CAP_MAC_OVERRIDE file label is not set.
Other calls may access it after CAP_MAC_OVERRIDE is dropped from process.

Signed-off-by: Marcin Niesluchowski <m.niesluchow@samsung.com>
(cherry-picked from upstream d83d2c26461d661384676a4eed935d925b0fcc34)

security/smack/smack_lsm.c

index d347b7911a839b86135871773b11e4de25c10a03..47ed6a484901c3829ad68ae029f1c4d465062d61 100644 (file)
@@ -1477,8 +1477,10 @@ static int smack_file_open(struct file *file, const struct cred *cred)
        struct smk_audit_info ad;
        int rc;
 
-       if (smack_privileged(CAP_MAC_OVERRIDE))
+       if (smack_privileged(CAP_MAC_OVERRIDE)) {
+               file->f_security = isp->smk_inode;
                return 0;
+       }
 
        smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_PATH);
        smk_ad_setfield_u_fs_path(&ad, file->f_path);