Message ID | 20241128100621.461743-8-roberto.sassu@huaweicloud.com (mailing list archive) |
---|---|
State | Handled Elsewhere |
Headers | show |
Series | ima: Remove unnecessary inode locks | expand |
On Thu, 2024-11-28 at 11:06 +0100, Roberto Sassu wrote: > From: Roberto Sassu <roberto.sassu@huawei.com> > > Commit 11c60f23ed13 ("integrity: Remove unused macro > IMA_ACTION_RULE_FLAGS") removed the IMA_ACTION_RULE_FLAGS mask, due to it > not being used after commit 0d73a55208e9 ("ima: re-introduce own integrity > cache lock"). > > However, it seems that the latter commit mistakenly used the wrong mask > when moving the code from ima_inode_post_setattr() to > process_measurement(). There is no mention in the commit message about this > change and it looks quite important, since changing from IMA_ACTIONS_FLAGS > (later renamed to IMA_NONACTION_FLAGS) to IMA_ACTION_RULE_FLAGS was done by > commit 42a4c603198f0 ("ima: fix ima_inode_post_setattr"). > > Restore the original change, but with new mask 0xfb000000 since the > policy-specific flags changed meanwhile, and rename IMA_ACTION_RULE_FLAGS > to IMA_NONACTION_RULE_FLAGS, to be consistent with IMA_NONACTION_FLAGS. Thanks, Roberto. Please summarize the reason for reverting the change. Something like: Restore the original change to not reset the new file status after ... > > Cc: stable@vger.kernel.org # v4.16.x > Fixes: 11c60f23ed13 ("integrity: Remove unused macro IMA_ACTION_RULE_FLAGS") > Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> > --- > security/integrity/ima/ima.h | 1 + > security/integrity/ima/ima_main.c | 2 +- > 2 files changed, 2 insertions(+), 1 deletion(-) > > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > index 22c3b87cfcac..32ffef2cc92a 100644 > --- a/security/integrity/ima/ima.h > +++ b/security/integrity/ima/ima.h > @@ -141,6 +141,7 @@ struct ima_kexec_hdr { > > /* IMA iint policy rule cache flags */ > #define IMA_NONACTION_FLAGS 0xff000000 > +#define IMA_NONACTION_RULE_FLAGS 0xfb000000 > #define IMA_DIGSIG_REQUIRED 0x01000000 > #define IMA_PERMIT_DIRECTIO 0x02000000 > #define IMA_NEW_FILE 0x04000000 > diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c > index 712c3a522e6c..83e467ad18d4 100644 > --- a/security/integrity/ima/ima_main.c > +++ b/security/integrity/ima/ima_main.c > @@ -277,7 +277,7 @@ static int process_measurement(struct file *file, const struct > cred *cred, > /* reset appraisal flags if ima_inode_post_setattr was called */ > iint->flags &= ~(IMA_APPRAISE | IMA_APPRAISED | > IMA_APPRAISE_SUBMASK | IMA_APPRAISED_SUBMASK | > - IMA_NONACTION_FLAGS); > + IMA_NONACTION_RULE_FLAGS); > > /* > * Re-evaulate the file if either the xattr has changed or the
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h index 22c3b87cfcac..32ffef2cc92a 100644 --- a/security/integrity/ima/ima.h +++ b/security/integrity/ima/ima.h @@ -141,6 +141,7 @@ struct ima_kexec_hdr { /* IMA iint policy rule cache flags */ #define IMA_NONACTION_FLAGS 0xff000000 +#define IMA_NONACTION_RULE_FLAGS 0xfb000000 #define IMA_DIGSIG_REQUIRED 0x01000000 #define IMA_PERMIT_DIRECTIO 0x02000000 #define IMA_NEW_FILE 0x04000000 diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index 712c3a522e6c..83e467ad18d4 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -277,7 +277,7 @@ static int process_measurement(struct file *file, const struct cred *cred, /* reset appraisal flags if ima_inode_post_setattr was called */ iint->flags &= ~(IMA_APPRAISE | IMA_APPRAISED | IMA_APPRAISE_SUBMASK | IMA_APPRAISED_SUBMASK | - IMA_NONACTION_FLAGS); + IMA_NONACTION_RULE_FLAGS); /* * Re-evaulate the file if either the xattr has changed or the