1. 08 Nov, 2017 6 commits
    • Matthew Garrett's avatar
      EVM: Include security.apparmor in EVM measurements · 096b8546
      Matthew Garrett authored
      Apparmor will be gaining support for security.apparmor labels, and it
      would be helpful to include these in EVM validation now so appropriate
      signatures can be generated even before full support is merged.
      Signed-off-by: default avatarMatthew Garrett <mjg59@google.com>
      Acked-by: default avatarJohn Johansen <John.johansen@canonical.com>
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      096b8546
    • Mimi Zohar's avatar
      ima: call ima_file_free() prior to calling fasync · bb02b186
      Mimi Zohar authored
      The file hash is calculated and written out as an xattr after
      calling fasync().  In order for the file data and metadata to be
      written out to disk at the same time, this patch calculates the
      file hash and stores it as an xattr before calling fasync.
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      bb02b186
    • Christoph Hellwig's avatar
      integrity: use kernel_read_file_from_path() to read x509 certs · a7d3d039
      Christoph Hellwig authored
      The CONFIG_IMA_LOAD_X509 and CONFIG_EVM_LOAD_X509 options permit
      loading x509 signed certificates onto the trusted keyrings without
      verifying the x509 certificate file's signature.
      
      This patch replaces the call to the integrity_read_file() specific
      function with the common kernel_read_file_from_path() function.
      To avoid verifying the file signature, this patch defines
      READING_X509_CERTFICATE.
      Signed-off-by: default avatarChristoph Hellwig <hch@lst.de>
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      a7d3d039
    • Mimi Zohar's avatar
      ima: always measure and audit files in policy · f3cc6b25
      Mimi Zohar authored
      All files matching a "measure" rule must be included in the IMA
      measurement list, even when the file hash cannot be calculated.
      Similarly, all files matching an "audit" rule must be audited, even when
      the file hash can not be calculated.
      
      The file data hash field contained in the IMA measurement list template
      data will contain 0's instead of the actual file hash digest.
      
      Note:
      In general, adding, deleting or in anyway changing which files are
      included in the IMA measurement list is not a good idea, as it might
      result in not being able to unseal trusted keys sealed to a specific
      TPM PCR value.  This patch not only adds file measurements that were
      not previously measured, but specifies that the file hash value for
      these files will be 0's.
      
      As the IMA measurement list ordering is not consistent from one boot
      to the next, it is unlikely that anyone is sealing keys based on the
      IMA measurement list.  Remote attestation servers should be able to
      process these new measurement records, but might complain about
      these unknown records.
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      Reviewed-by: default avatarDmitry Kasatkin <dmitry.kasatkin@huawei.com>
      f3cc6b25
    • Mimi Zohar's avatar
      ima: don't remove the securityfs policy file · 2068626d
      Mimi Zohar authored
      The securityfs policy file is removed unless additional rules can be
      appended to the IMA policy (CONFIG_IMA_WRITE_POLICY), regardless as
      to whether the policy is configured so that it can be displayed.
      
      This patch changes this behavior, removing the securityfs policy file,
      only if CONFIG_IMA_READ_POLICY is also not enabled.
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      2068626d
    • Mimi Zohar's avatar
      vfs: fix mounting a filesystem with i_version · 46cdc6d5
      Mimi Zohar authored
      The mount i_version flag is not enabled in the new sb_flags.  This patch
      adds the missing SB_I_VERSION flag.
      
      Fixes: e462ec50 "VFS: Differentiate mount flags (MS_*) from internal
             superblock flags"
      Cc: David Howells <dhowells@redhat.com>
      Cc: Al Viro <viro@ZenIV.linux.org.uk>
      Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
      46cdc6d5
  2. 05 Nov, 2017 1 commit
  3. 02 Nov, 2017 1 commit
  4. 27 Oct, 2017 1 commit
  5. 21 Oct, 2017 1 commit
  6. 20 Oct, 2017 10 commits
  7. 18 Oct, 2017 13 commits
  8. 12 Oct, 2017 1 commit
  9. 25 Sep, 2017 1 commit
  10. 24 Sep, 2017 5 commits