On Fri, 2018-05-11 at 11:39 -0700, Matthew Garrett wrote: > > static int evm_is_immutable(struct dentry *dentry, struct inode *inode) > @@ -303,6 +305,7 @@ int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, > { > struct inode *inode = d_backing_inode(dentry); > struct evm_ima_xattr_data xattr_data; > + struct ima_digest_data *data; > int rc = 0; > > /* > @@ -315,10 +318,16 @@ int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, > if (rc) > return -EPERM; > > + data = kmalloc(sizeof(*data) + SHA1_DIGEST_SIZE, GFP_KERNEL); > + if (!data) > + return -ENOMEM; Instead of allocating and freeing the buffer each time an HMAC is updated or verified, like before, why not define a new struct which is allocated on the stack both here and in evm_verify_hmac()? > + > + data->algo = HASH_ALGO_SHA1; > rc = evm_calc_hmac(dentry, xattr_name, xattr_value, > - xattr_value_len, xattr_data.digest); > + xattr_value_len, data); > if (rc == 0) { > xattr_data.type = EVM_XATTR_HMAC; > + memcpy(&xattr_data.digest, data->digest, SHA1_DIGEST_SIZE); > rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_EVM, > &xattr_data, > sizeof(xattr_data), 0); ima_fix_xattr() supports writing both the original IMA_XATTR_DIGEST format, which was sha1 based, and the new IMA_XATTR_DIGEST_NG format, which supports larger digests. It writes security.ima directly from ima_digest_data struct. No need for copying it. Mimi