From: Mimi Zohar Date: Thu, 11 Aug 2011 04:22:52 +0000 (-0400) Subject: evm: fix evm_inode_init_security return code X-Git-Tag: v3.2-rc1~78^2~63 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=5a4730ba9517cf2793175991243436a24b1db18f;p=platform%2Fupstream%2Fkernel-adaptation-pc.git evm: fix evm_inode_init_security return code evm_inode_init_security() should return 0, when EVM is not enabled. (Returning an error is a remnant of evm_inode_post_init_security.) Signed-off-by: Mimi Zohar Signed-off-by: James Morris --- diff --git a/include/linux/evm.h b/include/linux/evm.h index 62deb65..ea603c9 100644 --- a/include/linux/evm.h +++ b/include/linux/evm.h @@ -85,7 +85,7 @@ static inline int evm_inode_init_security(struct inode *inode, const struct xattr *xattr_array, struct xattr *evm) { - return -EOPNOTSUPP; + return 0; } #endif /* CONFIG_EVM_H */ diff --git a/security/integrity/evm/evm_main.c b/security/integrity/evm/evm_main.c index 8fc5b5d..f0127e5 100644 --- a/security/integrity/evm/evm_main.c +++ b/security/integrity/evm/evm_main.c @@ -324,7 +324,7 @@ int evm_inode_init_security(struct inode *inode, int rc; if (!evm_initialized || !evm_protected_xattr(lsm_xattr->name)) - return -EOPNOTSUPP; + return 0; xattr_data = kzalloc(sizeof(*xattr_data), GFP_NOFS); if (!xattr_data)