Received: by 2002:ac0:950e:0:0:0:0:0 with SMTP id f14csp24270imc; Fri, 15 Mar 2019 14:01:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqwx4ELjrODxrXgj1RzGpopuwHoD9slkPC/z2J0rapd4RUfmSZn7WZDSmjH2QS13+iOe6tC1 X-Received: by 2002:a63:1a12:: with SMTP id a18mr5292449pga.200.1552683708037; Fri, 15 Mar 2019 14:01:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552683708; cv=none; d=google.com; s=arc-20160816; b=LimTvwvVLrJd2g+PuESl5muOIWMze8tOYM61xJ7sRP4XvvctYTSgYDJjB9cADjo1zo e4Rr0nB4sbCCIuFbTi74nYwJtMJBubBENeRK10XwWkqSj/2FpY6aWE1HA5DIIi9zVh+k Jgg2N1K418piT9+aX8WmeWY4/ODkfHIpCRCjhEq9zMWMXO62PKWyaDnWsFA8pYqrPZ5D pmHueFo0LuebY2o8YRRkpt/6VjO7T2rwHFaZDqNa7uU5fKWrKLOMzU/KOCnHjvI8ehkx zvt4oZAtK0LmRVFXapUVniyJYmQJUPX9fohhvbpr19NNM5VZiA6tHmvUgXMCbOtEC44K ev7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=LtAS4qSg7Giefp86uKjVG9vec2LGb+bwqRxzy4Wg2fI=; b=cJi/+NGuUl8IkyuxT/Mw1xisQhBWp/HW/zIdll/0TPOMr9yTgVtlklTY2HmcWIGu2I jryBf0A/NEX0XHJa/7sMJu6MEIDUn1cfpbd0NwVLdgKVD1CvgEz0Be3VABvOk5BERqSV jNBNY9iLM4D0DidZPKv0gUHvunuTGmaRBDaYiQ2jwhBgff9KYsFkMW8AAa9xR3JF1Qvm vAS1H7Oe0S9ZtAmqWWkqOa40T2l/0yNc8znIsBVxlDZGEpcxysrVU83yeOc1OCQdlqzn pm/fMd8ydJCFCrrg0Ok9MEKpRFkSHOWRY4FIy0pbiihCafvw1cDTtkmmpJYYPb6cxIjk SEdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=S94HRmfQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umn.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 8si2615732pgq.591.2019.03.15.14.01.32; Fri, 15 Mar 2019 14:01:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=S94HRmfQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umn.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726796AbfCOVA4 (ORCPT + 99 others); Fri, 15 Mar 2019 17:00:56 -0400 Received: from mta-p6.oit.umn.edu ([134.84.196.206]:40116 "EHLO mta-p6.oit.umn.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726446AbfCOVA4 (ORCPT ); Fri, 15 Mar 2019 17:00:56 -0400 Received: from localhost (unknown [127.0.0.1]) by mta-p6.oit.umn.edu (Postfix) with ESMTP id D2CA6B60 for ; Fri, 15 Mar 2019 21:00:54 +0000 (UTC) X-Virus-Scanned: amavisd-new at umn.edu Received: from mta-p6.oit.umn.edu ([127.0.0.1]) by localhost (mta-p6.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E8Qlhml0cDaS for ; Fri, 15 Mar 2019 16:00:54 -0500 (CDT) Received: from mail-it1-f200.google.com (mail-it1-f200.google.com [209.85.166.200]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p6.oit.umn.edu (Postfix) with ESMTPS id 6F3ECE12 for ; Fri, 15 Mar 2019 16:00:40 -0500 (CDT) Received: by mail-it1-f200.google.com with SMTP id y6so6272681itj.5 for ; Fri, 15 Mar 2019 14:00:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=LtAS4qSg7Giefp86uKjVG9vec2LGb+bwqRxzy4Wg2fI=; b=S94HRmfQr/m0sZKQMPtqCskXQEaZ2Y2D78HGRgtvjSlv501+fMcAc6M3XLiclCqjYe Mn6ifpEukgiJAd+VDjn7BrKva6FUYFk58n/O/suvBi7ReQ8UEjoNTreCqqFmivPDEKAQ LQywFVu+Ni7k9nxpEa1cgVix7iPvqcaPF/idEYTkKpMhxYPT8TFZBJ0dMNkC+ZcofwcE lC/L2XqLJsK/tsGCm/myDCyqlVU2TFpw8sIEDzSDRaZmU6lRuk3GiYiP/coM6IjfQx9f o03bVvgdOmWM9eP3iwRFqjwG/m6Yx5UjQnGs+WbdNGPZO9p+qSTbGviDIySQ/youV+1/ Iadg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=LtAS4qSg7Giefp86uKjVG9vec2LGb+bwqRxzy4Wg2fI=; b=M0cPItkQb0U0xww81mdTvRqPH212wE4VAOfs7CWNpYiVKU831muoaTEgG3uqJowzuN GfkwOgOFf5+FNEpDhz1cdPyVD0iOe0r9LNZPl2IDCaDdZe+mbzsI1NQNrJJDARPiVma+ 7u5LnHFuA1PojSKlBsAAtpFr2CeuB4WZb01tFJBEU+EVR7vjf76y6rJicnwoA0m5DsCO q3mwmqvwcFGNtMQjTOTMRXFeqZK/7J4jfXB0RSdw0EqEOyi87E9pTSfBFO2gqGFsZUDy 51vK3mSisIqHqiqs7ofVNPzJ3okvWeEzfo93vHeNSHe2lUULjsVxltcdGZ/dninqMq5e It2A== X-Gm-Message-State: APjAAAVdCJBe3GgTWRVkb78hnvxMgS4rw6ugRAojRmekePiFrIPzVUvV cfablZx6erMfM7D3xjk0NN1r8YVcacNUzS+4OytmQ5Yew3x1Mo5fdmpbq/nDIO5kOys+NY6rtSM 7EVo5fQKu8x4tPnjEM7SZcao8F3RK X-Received: by 2002:a6b:3905:: with SMTP id g5mr3551940ioa.39.1552683640045; Fri, 15 Mar 2019 14:00:40 -0700 (PDT) X-Received: by 2002:a6b:3905:: with SMTP id g5mr3551923ioa.39.1552683639755; Fri, 15 Mar 2019 14:00:39 -0700 (PDT) Received: from bee.dtc.umn.edu (cs-bee-u.cs.umn.edu. [128.101.106.63]) by smtp.gmail.com with ESMTPSA id m26sm1590510iti.6.2019.03.15.14.00.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 15 Mar 2019 14:00:38 -0700 (PDT) From: Kangjie Lu To: kjlu@umn.edu Cc: pakki001@umn.edu, James Morris , "Serge E. Hallyn" , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] security: inode: fix a missing check for securityfs_create_file Date: Fri, 15 Mar 2019 16:00:25 -0500 Message-Id: <20190315210025.17832-1-kjlu@umn.edu> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org securityfs_create_file may fail. The fix checks its status and returns the error code upstream if it fails. Signed-off-by: Kangjie Lu --- Return the exact error code upstream. --- security/inode.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/security/inode.c b/security/inode.c index b7772a9b315e..667f8b15027d 100644 --- a/security/inode.c +++ b/security/inode.c @@ -339,6 +339,11 @@ static int __init securityfs_init(void) #ifdef CONFIG_SECURITY lsm_dentry = securityfs_create_file("lsm", 0444, NULL, NULL, &lsm_ops); + if (IS_ERR(lsm_dentry)) { + unregister_filesystem(&fs_type); + sysfs_remove_mount_point(kernel_kobj, "security"); + return PTR_ERR(lsm_dentry); + } #endif return 0; } -- 2.17.1