Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1460463ybt; Thu, 18 Jun 2020 09:10:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyGg+0AUQsFef24zj0SlBiAuAHFvSVQHuaj6KqvztTvby2bf4QzgYW9Q7Ab1GmY/qW5b0Tw X-Received: by 2002:a17:906:528b:: with SMTP id c11mr4450666ejm.407.1592496614482; Thu, 18 Jun 2020 09:10:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592496614; cv=none; d=google.com; s=arc-20160816; b=Rk0U7a//+HYzSO+eo/FfKG4muwb02Jlcqu+6H91vAZJeE7/7x50QUGRnzSl8/PzjLO ZlcQq4ZcaeM0XzGCX/8T5cDyEZYmWV4O0Zw/E55ltm248FKKgjQHEPSK046kfJQOrjti YpNWjCIQFScWOOr28K362xhk9I8Cipm7dkc2LYErjju2gOUFEqXLLiV33B+L34DInxPH r7BPOjZkwPzAXHr2bs4rBSZ1etLi/6lNPkl6ggHb2fiafLK9NUqi5RpWQ0hrv0sIe62V 6LIf7tJLi6Br5NR2DOr20eHOUECv+bZ933u38NVxk6hCV6ixBh1WRoiUcqTO/48559GM QkEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=m1A7S671MgvMwMve0KD5pbaa1O9YTeVPuASZrjHDXoE=; b=t8CzGmkdaE0o0Hz6e6pTgWJTb4/80cZPZPJxZnRbKIrKcAsN6DKpDem5pdJxCNMgpP EvlH9QWola5wKZLnqDgCLlw/Nz81xdO2hvxIZsDDReZ/UjfNQJs94RBrvbhAsNc9Bn2J ELTGQrXx0G4ZpzsTzDJx7ziyfRpyK9nE8nyoRsYFBmbvq+LN5GkBMa5Yux81O84MfONZ phJUQQa/rOAwSWMVfRMsD8AV6MILXP+qzyuAQDPke3PSslUu1BTDIvcCQBOssGLxsmLE C2a0vurHGXs+Iqlt4fjP1Y5dYSigVTD2nlGxkNStIMc+a/kZvvul2mVHS6OpxAqTgN23 9IOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t15si2167597edy.62.2020.06.18.09.09.51; Thu, 18 Jun 2020 09:10:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731824AbgFRQHv (ORCPT + 99 others); Thu, 18 Jun 2020 12:07:51 -0400 Received: from lhrrgout.huawei.com ([185.176.76.210]:2339 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731681AbgFRQHm (ORCPT ); Thu, 18 Jun 2020 12:07:42 -0400 Received: from lhreml719-chm.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 8E057847CE065CC3FF82; Thu, 18 Jun 2020 17:07:41 +0100 (IST) Received: from fraeml714-chm.china.huawei.com (10.206.15.33) by lhreml719-chm.china.huawei.com (10.201.108.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Thu, 18 Jun 2020 17:07:41 +0100 Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.160) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1913.5; Thu, 18 Jun 2020 18:07:40 +0200 From: Roberto Sassu To: , CC: , , , , Roberto Sassu Subject: [PATCH 09/11] ima: Don't remove security.ima if file must not be appraised Date: Thu, 18 Jun 2020 18:04:56 +0200 Message-ID: <20200618160458.1579-9-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200618160329.1263-2-roberto.sassu@huawei.com> References: <20200618160329.1263-2-roberto.sassu@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.160] X-ClientProxiedBy: lhreml704-chm.china.huawei.com (10.201.108.53) To fraeml714-chm.china.huawei.com (10.206.15.33) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Files might come from a remote source and might have xattrs, including security.ima. It should not be IMA task to decide whether security.ima should be kept or not. This patch removes the removexattr() system call in ima_inode_post_setattr(). Signed-off-by: Roberto Sassu --- security/integrity/ima/ima_appraise.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c index 9505bb390d90..83c62eaf342d 100644 --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -504,8 +504,6 @@ void ima_inode_post_setattr(struct dentry *dentry) return; action = ima_must_appraise(inode, MAY_ACCESS, POST_SETATTR); - if (!action) - __vfs_removexattr(dentry, XATTR_NAME_IMA); iint = integrity_iint_find(inode); if (iint) { set_bit(IMA_CHANGE_ATTR, &iint->atomic_flags); -- 2.17.1