android_kernel_oneplus_msm8998/security/integrity
Mimi Zohar 851ae480e6 Revert "ima: limit file hash setting by user to fix and log modes"
commit f5acb3dcba1ffb7f0b8cbb9dba61500eea5d610b upstream.

Userspace applications have been modified to write security xattrs,
but they are not context aware.  In the case of security.ima, the
security xattr can be either a file hash or a file signature.
Permitting writing one, but not the other requires the application to
be context aware.

In addition, userspace applications might write files to a staging
area, which might not be in policy, and then change some file metadata
(eg. owner) making it in policy.  As a result, these files are not
labeled properly.

This reverts commit c68ed80c97, which
prevents writing file hashes as security.ima xattrs.

Requested-by: Patrick Ohly <patrick.ohly@intel.com>
Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Cc: Mike Rapoport <rppt@linux.vnet.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-06-06 16:46:20 +02:00
..
evm EVM: Use crypto_memneq() for digest comparisons 2016-02-17 12:31:04 -08:00
ima Revert "ima: limit file hash setting by user to fix and log modes" 2018-06-06 16:46:20 +02:00
digsig.c integrity: prevent loading untrusted certificates on the IMA trusted keyring 2015-10-09 15:31:18 -04:00
digsig_asymmetric.c integrity: do zero padding of the key id 2014-10-06 17:33:27 +01:00
iint.c integrity: add validity checks for 'path' parameter 2015-05-21 13:59:28 -04:00
integrity.h integrity: add validity checks for 'path' parameter 2015-05-21 13:59:28 -04:00
integrity_audit.c Merge git://git.infradead.org/users/eparis/audit 2014-04-12 12:38:53 -07:00
Kconfig kconfig: use bool instead of boolean for type definition attributes 2015-01-07 13:08:04 +01:00
Makefile integrity: make integrity files as 'integrity' module 2014-09-09 10:28:58 -04:00