ima: Don't remove security.ima if file must not be appraised
Files might come from a remote source and might have xattrs, including security.ima. It should not be IMA task to decide whether security.ima should be kept or not. This patch removes the removexattr() system call in ima_inode_post_setattr(). Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
This commit is contained in:
parent
026d7fc92a
commit
ed1b472fc1
|
@ -532,8 +532,6 @@ void ima_inode_post_setattr(struct user_namespace *mnt_userns,
|
|||
return;
|
||||
|
||||
action = ima_must_appraise(mnt_userns, inode, MAY_ACCESS, POST_SETATTR);
|
||||
if (!action)
|
||||
__vfs_removexattr(&init_user_ns, dentry, XATTR_NAME_IMA);
|
||||
iint = integrity_iint_find(inode);
|
||||
if (iint) {
|
||||
set_bit(IMA_CHANGE_ATTR, &iint->atomic_flags);
|
||||
|
|
Loading…
Reference in New Issue