Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp6347295ybi; Wed, 29 May 2019 06:36:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwfy86bO9wlQ+SzwnmYVop5D4mOYq6c+2CravN5BXC7ivEuKDluc9eMInd5pK7yhRp8msem X-Received: by 2002:a62:2f87:: with SMTP id v129mr77524855pfv.9.1559136973991; Wed, 29 May 2019 06:36:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559136973; cv=none; d=google.com; s=arc-20160816; b=gPr1Wjpg8LD2h/1iqb9qDu4X+DAIW4k3mWPwYTBRbV8MA/k/SgEzgk3G1LzCVrz4RU CpGUu0g6RnBTg1XNfngnHZ4y7XlKsKb1dKvJYkALeeuL2LyazKTChndqy2X9uBaEfQx4 L+TuKwpeMQgN4bi3eODEgz3XNuv5Ie5NMUYb7Ulb9BevVKFeliYm6d9s6qoKu4U379ht pB+rBs3sWjyPDTJp414GkHkLHDvaxoIJxKGFUn6Ljr7k4n5ahA8uFA5xU5WZb5s9hOkY ryJClC0wBR7Jz+IcR8iOzcwSTquQ4fLhwTf+DC8i448nL/csVWUiKuFSpPSdXncDUA1F oCOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=ZinlhTJHmzLnAYgCyUm3BVe8uVnS1zW7UEfqxKJkjyw=; b=FliaiwZX7iWBEGv+daQBCd1onENsPeWCya9u0/M123bHWhQud5L9WVGHBpG+LECRM9 pgzQJR0Ws+ijkA57xMgrGjD+9tuFugSb4WaNhOIGqstMIOxYSLvg7leVzQZHKsb92AWt l53tnzP/j0xXyzM/jgHBjvDIyBLHAyb30BbZIkEZJq6pHugYPYeGDdsipZroAn6CLbpj Oamua2pRYg+1rN7EMrzy3QLYHVbmsi4caDx52umxkvlB8d/RsgwX1rKCgNnMkLiXviIA p9QWBWXXPtFXy5QnrBMYkJl0nRDAy8bXRFr3j6X2aUMR90soqToNjNa5+F+nCx+YKHMV Iolw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k12si19367582pgj.593.2019.05.29.06.35.56; Wed, 29 May 2019 06:36:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727066AbfE2Neg (ORCPT + 99 others); Wed, 29 May 2019 09:34:36 -0400 Received: from lhrrgout.huawei.com ([185.176.76.210]:32971 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726104AbfE2Neg (ORCPT ); Wed, 29 May 2019 09:34:36 -0400 Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id C4463E5CB010485960B9; Wed, 29 May 2019 14:34:34 +0100 (IST) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.154) by smtpsuk.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 29 May 2019 14:34:24 +0100 From: Roberto Sassu To: , , CC: , , , , , Roberto Sassu Subject: [PATCH v2 0/3] ima/evm fixes for v5.2 Date: Wed, 29 May 2019 15:30:32 +0200 Message-ID: <20190529133035.28724-1-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.154] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changelog v1: - remove patch 2/4 (evm: reset status in evm_inode_post_setattr()); file attributes cannot be set if the signature is portable and immutable - patch 3/4: add __ro_after_init to ima_appraise_req_evm variable declaration - patch 3/4: remove ima_appraise_req_evm kernel option and introduce 'enforce-evm' and 'log-evm' as possible values for ima_appraise= - remove patch 4/4 (ima: only audit failed appraisal verifications) - add new patch (ima: show rules with IMA_INMASK correctly) Roberto Sassu (3): evm: check hash algorithm passed to init_desc() ima: don't ignore INTEGRITY_UNKNOWN EVM status ima: show rules with IMA_INMASK correctly .../admin-guide/kernel-parameters.txt | 3 ++- security/integrity/evm/evm_crypto.c | 3 +++ security/integrity/ima/ima_appraise.c | 8 +++++++ security/integrity/ima/ima_policy.c | 21 +++++++++++-------- 4 files changed, 25 insertions(+), 10 deletions(-) -- 2.17.1