Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2460611imm; Thu, 7 Jun 2018 10:58:55 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKwOr5AM3DGCL49uN9Ajljb4eyHcg1RorbacWhSBz9J0PyzcPue+rBxy+/NUzH7M0YLw548 X-Received: by 2002:a65:5648:: with SMTP id m8-v6mr2459633pgs.123.1528394335575; Thu, 07 Jun 2018 10:58:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528394335; cv=none; d=google.com; s=arc-20160816; b=WCc91A59N3BPtWJsu9z7H5fDJrBh6/KFFaXbOsMr4VaH36N06w/IY3Orsqqx6X3g5J PjSPd25ynY8h7z8vcnEEw+qPFVEfRLlpRfrLdZwN7sBKqbzrg3u9qIyDH/qo8M//M5a+ eNyeqs3V3RPaMNapVXJLD5qo73G3PrrU598zPJ/D0QDFo98rPaCKrmM29CaFPHpsk0oU X0PkltW9KpzKQyAMFEWoeIfq/EPhGZmR7CONf5VqblY3EsuVFVEVr1PlBI9/7+SyaVTz eTfMk64bvCTVKcxLcsgIk7LpIzXHoMeLIbg+FoX2pKh2pifbzXYIxTnG+aZPZlfgXFLP RJIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=OZ49Q6xDXCOmmRNiBz+IFS4j28bgeBEfJ2HLTM7DT4Y=; b=hA5Xc/MA5nwlX14dE+PONUnm/chF922uwpn8TnkNbCNlTnZmnzdB0ufF3xN5PryByd bkg8HL1AOs2n0e/r3agA6v1u4oWdLLH7SZizVoieCFYWTN2LNCS4HsaUMg32EtLdORMQ XVH5qPtE2StA7lo3D41FRaUqkDNAwt2/3d44qhiOMyDWmGU80nE5v/yGOUD31MprIT9i rmdJfFi8RN6MZRmiexC4UpQgkj16SiXQ6JmyFr5Q7yNmWToTLO77MAEIpiVycvvxuuK7 bQcQrkWIZQOomE129SKscGRKM7K8+gAfgTm4NRp3u46JGsVS9DtbE2y6uBMdpxAHFkeL GVWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k74-v6si14322216pgc.304.2018.06.07.10.58.41; Thu, 07 Jun 2018 10:58:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935175AbeFGOtq (ORCPT + 99 others); Thu, 7 Jun 2018 10:49:46 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:40882 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934866AbeFGOtn (ORCPT ); Thu, 7 Jun 2018 10:49:43 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbt-0005a0-Iq; Thu, 07 Jun 2018 15:09:53 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvb0-0002np-MT; Thu, 07 Jun 2018 15:08:58 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Mimi Zohar" Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 082/410] ima: relax requiring a file signature for new files with zero length In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Mimi Zohar commit b7e27bc1d42e8e0cc58b602b529c25cd0071b336 upstream. Custom policies can require file signatures based on LSM labels. These files are normally created and only afterwards labeled, requiring them to be signed. Instead of requiring file signatures based on LSM labels, entire filesystems could require file signatures. In this case, we need the ability of writing new files without requiring file signatures. The definition of a "new" file was originally defined as any file with a length of zero. Subsequent patches redefined a "new" file to be based on the FILE_CREATE open flag. By combining the open flag with a file size of zero, this patch relaxes the file signature requirement. Fixes: 1ac202e978e1 ima: accept previously set IMA_NEW_FILE Signed-off-by: Mimi Zohar Signed-off-by: Ben Hutchings --- security/integrity/ima/ima_appraise.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -198,7 +198,8 @@ int ima_appraise_measurement(int func, s if (opened & FILE_CREATED) iint->flags |= IMA_NEW_FILE; if ((iint->flags & IMA_NEW_FILE) && - !(iint->flags & IMA_DIGSIG_REQUIRED)) + (!(iint->flags & IMA_DIGSIG_REQUIRED) || + (inode->i_size == 0))) status = INTEGRITY_PASS; goto out; }