summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima.h
diff options
context:
space:
mode:
authorEric Biggers2018-09-07 21:16:24 +0200
committerMimi Zohar2018-10-10 18:56:14 +0200
commit691115c3513ec83edf68ba6575ae85630bc94b8b (patch)
tree8e77e6e14650f10a67a314380362f9430254e151 /security/integrity/ima/ima.h
parentsecurity: fix LSM description location (diff)
downloadkernel-qcow2-linux-691115c3513ec83edf68ba6575ae85630bc94b8b.tar.gz
kernel-qcow2-linux-691115c3513ec83edf68ba6575ae85630bc94b8b.tar.xz
kernel-qcow2-linux-691115c3513ec83edf68ba6575ae85630bc94b8b.zip
vfs: require i_size <= SIZE_MAX in kernel_read_file()
On 32-bit systems, the buffer allocated by kernel_read_file() is too small if the file size is > SIZE_MAX, due to truncation to size_t. Fortunately, since the 'count' argument to kernel_read() is also truncated to size_t, only the allocated space is filled; then, -EIO is returned since 'pos != i_size' after the read loop. But this is not obvious and seems incidental. We should be more explicit about this case. So, fail early if i_size > SIZE_MAX. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima.h')
0 files changed, 0 insertions, 0 deletions