1. 09 11月, 2017 3 次提交
    • M
      ima: always measure and audit files in policy · f3cc6b25
      Mimi Zohar 提交于
      All files matching a "measure" rule must be included in the IMA
      measurement list, even when the file hash cannot be calculated.
      Similarly, all files matching an "audit" rule must be audited, even when
      the file hash can not be calculated.
      
      The file data hash field contained in the IMA measurement list template
      data will contain 0's instead of the actual file hash digest.
      
      Note:
      In general, adding, deleting or in anyway changing which files are
      included in the IMA measurement list is not a good idea, as it might
      result in not being able to unseal trusted keys sealed to a specific
      TPM PCR value.  This patch not only adds file measurements that were
      not previously measured, but specifies that the file hash value for
      these files will be 0's.
      
      As the IMA measurement list ordering is not consistent from one boot
      to the next, it is unlikely that anyone is sealing keys based on the
      IMA measurement list.  Remote attestation servers should be able to
      process these new measurement records, but might complain about
      these unknown records.
      Signed-off-by: NMimi Zohar <zohar@linux.vnet.ibm.com>
      Reviewed-by: NDmitry Kasatkin <dmitry.kasatkin@huawei.com>
      f3cc6b25
    • M
      ima: don't remove the securityfs policy file · 2068626d
      Mimi Zohar 提交于
      The securityfs policy file is removed unless additional rules can be
      appended to the IMA policy (CONFIG_IMA_WRITE_POLICY), regardless as
      to whether the policy is configured so that it can be displayed.
      
      This patch changes this behavior, removing the securityfs policy file,
      only if CONFIG_IMA_READ_POLICY is also not enabled.
      Signed-off-by: NMimi Zohar <zohar@linux.vnet.ibm.com>
      2068626d
    • M
      vfs: fix mounting a filesystem with i_version · 46cdc6d5
      Mimi Zohar 提交于
      The mount i_version flag is not enabled in the new sb_flags.  This patch
      adds the missing SB_I_VERSION flag.
      
      Fixes: e462ec50 "VFS: Differentiate mount flags (MS_*) from internal
             superblock flags"
      Cc: David Howells <dhowells@redhat.com>
      Cc: Al Viro <viro@ZenIV.linux.org.uk>
      Signed-off-by: NMimi Zohar <zohar@linux.vnet.ibm.com>
      46cdc6d5
  2. 05 11月, 2017 1 次提交
  3. 02 11月, 2017 1 次提交
  4. 27 10月, 2017 1 次提交
  5. 21 10月, 2017 1 次提交
  6. 20 10月, 2017 10 次提交
  7. 18 10月, 2017 13 次提交
  8. 12 10月, 2017 1 次提交
  9. 25 9月, 2017 9 次提交