Received: by 10.223.185.116 with SMTP id b49csp1070856wrg; Sat, 3 Mar 2018 14:44:03 -0800 (PST) X-Google-Smtp-Source: AG47ELuYNYC7Q+xndIIP5Grzp54B+NVELJnA9aK5kipeEbBnfrplBikD0nojwBjWa5uxg0ejDRV7 X-Received: by 2002:a17:902:7d94:: with SMTP id a20-v6mr8946955plm.184.1520117043555; Sat, 03 Mar 2018 14:44:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520117043; cv=none; d=google.com; s=arc-20160816; b=MLCPT5OMTAqQNcW3zt6nZVi9D7HqsKYi+tc6XUeZoB60BCEa0JqAKOUPhs0VvivB8p WocrNaTfRaWk5BBedsM+L476WPQrydOAK8gTIQvK94POLKxFRu8wthRaUAtkXgGdrNuI vqaXkrsmPWRSRyRsjnhXfO7ugIuSMN2IGIm3bqctCDCOJn5NySUnDqxWldDbLGtthpgb BEUBYoORz9jA6RFqidQ1ncJPQVcDshprcB/h6rF1s9ZZzAetWpo8ODZvVuau9c8xRKP/ klLJGgzkGLosrZA3KDxVBDbq2fI+h/vjehj9GSjDWYQshtABpgh4cckqaZMpvwjmWox2 Ibsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :spamdiagnosticmetadata:spamdiagnosticoutput:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=yI+rBCI6miPUpfbBBKL8Z2wKiRgqxuam9AEFgX20ctw=; b=GED0ghLEBkZuce9nwTWakbXnJNlWfuR9M93uyvCP0VDoZX+5HZhIrizazcXP++cQJl e9CsCaugblvSX9tB8RrCp8mdGML2K+f/oRkLD+Kf69nhwdepZEeqhL8rXYL8Drc6KLJE Lt0FUZw8J8RRl+h84GG5NJbSDdLzCkCI7CuRQCtWYJdrS9EsHUsTVjVs6/+YhKUWn4gB xbycWO/c3BrpJ9zyEl6pQdKOZPDsURC36nDhTM/Ic+YU/kteXwtVFF2dmnk3qvItVh9B QS2qR+j0JGTb4uSKiSm69u9iAvB9I3xWz3Xg94Rx78Sn2doQsg+06IYAyDTELNxxnIf8 R8mQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=Hg6ZOcy2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c9-v6si6823431plo.659.2018.03.03.14.43.48; Sat, 03 Mar 2018 14:44:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=Hg6ZOcy2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935491AbeCCWnM (ORCPT + 99 others); Sat, 3 Mar 2018 17:43:12 -0500 Received: from mail-bn3nam01on0119.outbound.protection.outlook.com ([104.47.33.119]:9830 "EHLO NAM01-BN3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S935616AbeCCWmm (ORCPT ); Sat, 3 Mar 2018 17:42:42 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=yI+rBCI6miPUpfbBBKL8Z2wKiRgqxuam9AEFgX20ctw=; b=Hg6ZOcy2uXCuNwaPGSgaUYkmeot5p9W7XudfVcS9xocsDJJjcO9Tk1oZnO6uMRi5ocbcK9Yd3qiaInTPsnFpfuJtnMe7zeKA0Y2tqc+mygQtm/rAEx+EBpz/OIgmlvXIL0rWveZM+joP1ZpXwFXJ+O+sH7h9kjCLm4oy15giP/w= Received: from MW2PR2101MB1034.namprd21.prod.outlook.com (52.132.149.10) by MW2PR2101MB1020.namprd21.prod.outlook.com (52.132.148.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.588.1; Sat, 3 Mar 2018 22:42:39 +0000 Received: from MW2PR2101MB1034.namprd21.prod.outlook.com ([fe80::1d56:338f:e2b:cec0]) by MW2PR2101MB1034.namprd21.prod.outlook.com ([fe80::1d56:338f:e2b:cec0%3]) with mapi id 15.20.0567.006; Sat, 3 Mar 2018 22:42:39 +0000 From: Sasha Levin To: "linux-kernel@vger.kernel.org" , "stable@vger.kernel.org" CC: Mimi Zohar , Sasha Levin Subject: [PATCH AUTOSEL for 3.18 63/63] ima: relax requiring a file signature for new files with zero length Thread-Topic: [PATCH AUTOSEL for 3.18 63/63] ima: relax requiring a file signature for new files with zero length Thread-Index: AQHTsz+zQt9pvSXie0yumIJAgEVNmQ== Date: Sat, 3 Mar 2018 22:33:50 +0000 Message-ID: <20180303223228.27323-63-alexander.levin@microsoft.com> References: <20180303223228.27323-1-alexander.levin@microsoft.com> In-Reply-To: <20180303223228.27323-1-alexander.levin@microsoft.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [52.168.54.252] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;MW2PR2101MB1020;7:HJVCugpoXtjAlepKWaQ0np+A7NBrCV6KDRU+gZmIotQ7j81DIUKxrS2vCuN4xmPGsOQUnObZYIDR5Gs+sStehzbyhvmdQIA63q+oA+73JXETcx+fon3HAzCHFaMBJ2gWuFInPejlZjvXC/nhNLs87dqD0TcqdkMbkSBrq/FPpbUwiZp/AAaBitcyrrCu7wkJnMJqnNL4Jm8AVgsQ79l1V4mp1PvilEKdvzHElVZIxdTxfTeh4xDTY/uXGNcXoHqQ x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: bb33ea9b-1c87-4805-d1d8-08d5815811c2 x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603307)(7193020);SRVR:MW2PR2101MB1020; x-ms-traffictypediagnostic: MW2PR2101MB1020: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Alexander.Levin@microsoft.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(192374486261705)(104084551191319); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(61425038)(6040501)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3231220)(944501244)(52105095)(3002001)(6055026)(61426038)(61427038)(6041288)(20161123562045)(20161123558120)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011);SRVR:MW2PR2101MB1020;BCL:0;PCL:0;RULEID:;SRVR:MW2PR2101MB1020; x-forefront-prvs: 0600F93FE1 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(39380400002)(396003)(366004)(346002)(376002)(39860400002)(199004)(189003)(6436002)(5250100002)(99286004)(3846002)(6116002)(8936002)(22452003)(86612001)(86362001)(575784001)(4326008)(10090500001)(68736007)(6512007)(7736002)(97736004)(25786009)(76176011)(1076002)(6486002)(2501003)(66066001)(36756003)(107886003)(2950100002)(8676002)(305945005)(5660300001)(105586002)(53936002)(6666003)(3280700002)(81166006)(6506007)(106356001)(2906002)(81156014)(316002)(478600001)(72206003)(10290500003)(2900100001)(54906003)(110136005)(59450400001)(186003)(102836004)(26005)(14454004)(3660700001)(22906009)(217873001);DIR:OUT;SFP:1102;SCL:1;SRVR:MW2PR2101MB1020;H:MW2PR2101MB1034.namprd21.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: gOOC/811kBiu9xZgvN6IaIV01k2gJEtUCfzcIaE8FJvgaAG90l4D+8Z4ul9K91V6fpA7RPGS9M8gONUSSbwmYMxfVpHsld5mRxlQsuUYwM0+lsojbSOJuF7K5SzwixcKYnNuHznJxDjqsTGrMfXsbewXfyvr+1h9lF+ZRhQ22+Y= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: bb33ea9b-1c87-4805-d1d8-08d5815811c2 X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2018 22:33:50.2795 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR2101MB1020 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mimi Zohar [ Upstream commit b7e27bc1d42e8e0cc58b602b529c25cd0071b336 ] Custom policies can require file signatures based on LSM labels. These files are normally created and only afterwards labeled, requiring them to be signed. Instead of requiring file signatures based on LSM labels, entire filesystems could require file signatures. In this case, we need the ability of writing new files without requiring file signatures. The definition of a "new" file was originally defined as any file with a length of zero. Subsequent patches redefined a "new" file to be based on the FILE_CREATE open flag. By combining the open flag with a file size of zero, this patch relaxes the file signature requirement. Fixes: 1ac202e978e1 ima: accept previously set IMA_NEW_FILE Signed-off-by: Mimi Zohar Signed-off-by: Sasha Levin --- security/integrity/ima/ima_appraise.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima= /ima_appraise.c index ee7618115756..0bdf01decb63 100644 --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -206,7 +206,8 @@ int ima_appraise_measurement(int func, struct integrity= _iint_cache *iint, if (opened & FILE_CREATED) iint->flags |=3D IMA_NEW_FILE; if ((iint->flags & IMA_NEW_FILE) && - !(iint->flags & IMA_DIGSIG_REQUIRED)) + (!(iint->flags & IMA_DIGSIG_REQUIRED) || + (inode->i_size =3D=3D 0))) status =3D INTEGRITY_PASS; goto out; } --=20 2.14.1