<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/include/linux/evm.h, branch v3.2</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v3.2</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v3.2'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2011-09-14T19:24:51Z</updated>
<entry>
<title>evm: posix acls modify i_mode</title>
<updated>2011-09-14T19:24:51Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-08-18T22:07:44Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=bf6d0f5dcda17df3cc5577e203d0f8ea1c2ad6aa'/>
<id>urn:sha1:bf6d0f5dcda17df3cc5577e203d0f8ea1c2ad6aa</id>
<content type='text'>
The posix xattr acls are 'system' prefixed, which normally would not
affect security.evm.  An interesting side affect of writing posix xattr
acls is their modifying of the i_mode, which is included in security.evm.

This patch updates security.evm when posix xattr acls are written.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>evm: fix evm_inode_init_security return code</title>
<updated>2011-08-11T07:42:41Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-08-11T04:22:52Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=5a4730ba9517cf2793175991243436a24b1db18f'/>
<id>urn:sha1:5a4730ba9517cf2793175991243436a24b1db18f</id>
<content type='text'>
evm_inode_init_security() should return 0, when EVM is not enabled.
(Returning an error is a remnant of evm_inode_post_init_security.)

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>evm: building without EVM enabled fixes</title>
<updated>2011-08-11T07:42:07Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-08-11T04:22:51Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=e1c9b23adbe86c725738402857397d7a29f9d6ef'/>
<id>urn:sha1:e1c9b23adbe86c725738402857397d7a29f9d6ef</id>
<content type='text'>
- Missing 'inline' on evm_inode_setattr() definition.
Introduced by commit 817b54aa45db ("evm: add evm_inode_setattr to prevent
updating an invalid security.evm").

- Missing security_old_inode_init_security() stub function definition.
Caused by commit 9d8f13ba3f48 ("security: new security_inode_init_security
API adds function callback").

Reported-by: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;
Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>evm: add evm_inode_setattr to prevent updating an invalid security.evm</title>
<updated>2011-07-18T16:29:50Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-05-13T16:53:38Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=817b54aa45db03437c6d09a7693fc6926eb8e822'/>
<id>urn:sha1:817b54aa45db03437c6d09a7693fc6926eb8e822</id>
<content type='text'>
Permit changing of security.evm only when valid, unless in fixmode.

Reported-by: Roberto Sassu &lt;roberto.sassu@polito.it&gt;
Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>evm: additional parameter to pass integrity cache entry 'iint'</title>
<updated>2011-07-18T16:29:47Z</updated>
<author>
<name>Dmitry Kasatkin</name>
<email>dmitry.kasatkin@nokia.com</email>
</author>
<published>2011-05-06T08:34:13Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=2960e6cb5f7c662b8edb6b0d2edc72095b4f5672'/>
<id>urn:sha1:2960e6cb5f7c662b8edb6b0d2edc72095b4f5672</id>
<content type='text'>
Additional iint parameter allows to skip lookup in the cache.

Signed-off-by: Dmitry Kasatkin &lt;dmitry.kasatkin@nokia.com&gt;
Signed-off-by: Mimi Zohar &lt;zohar@linux.vnet.ibm.com&gt;
</content>
</entry>
<entry>
<title>evm: add evm_inode_init_security to initialize new files</title>
<updated>2011-07-18T16:29:45Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-03-09T19:40:44Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=cb72318069d5e92eb74840118732c66eb38c812f'/>
<id>urn:sha1:cb72318069d5e92eb74840118732c66eb38c812f</id>
<content type='text'>
Initialize 'security.evm' for new files.

Changelog v7:
- renamed evm_inode_post_init_security to evm_inode_init_security
- moved struct xattr definition to earlier patch
- allocate xattr name
Changelog v6:
- Use 'struct evm_ima_xattr_data'

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>evm: imbed evm_inode_post_setattr</title>
<updated>2011-07-18T16:29:44Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-03-09T19:39:57Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=975d294373d8c1c913ad2bf4eb93966d4c7ca38f'/>
<id>urn:sha1:975d294373d8c1c913ad2bf4eb93966d4c7ca38f</id>
<content type='text'>
Changing the inode's metadata may require the 'security.evm' extended
attribute to be re-calculated and updated.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Acked-by: Serge Hallyn &lt;serge.hallyn@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>evm: evm_inode_post_removexattr</title>
<updated>2011-07-18T16:29:43Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-03-09T19:39:18Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c7b87de23b6fd5dfbe5c36601f29d6c515056343'/>
<id>urn:sha1:c7b87de23b6fd5dfbe5c36601f29d6c515056343</id>
<content type='text'>
When an EVM protected extended attribute is removed, update 'security.evm'.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Acked-by: Serge Hallyn &lt;serge.hallyn@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>security: imbed evm calls in security hooks</title>
<updated>2011-07-18T16:29:42Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2011-03-09T19:38:26Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=3e1be52d6c6b21d9080dd886c0e609e009831562'/>
<id>urn:sha1:3e1be52d6c6b21d9080dd886c0e609e009831562</id>
<content type='text'>
Imbed the evm calls evm_inode_setxattr(), evm_inode_post_setxattr(),
evm_inode_removexattr() in the security hooks.  evm_inode_setxattr()
protects security.evm xattr.  evm_inode_post_setxattr() and
evm_inode_removexattr() updates the hmac associated with an inode.

(Assumes an LSM module protects the setting/removing of xattr.)

Changelog:
  - Don't define evm_verifyxattr(), unless CONFIG_INTEGRITY is enabled.
  - xattr_name is a 'const', value is 'void *'

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Acked-by: Serge Hallyn &lt;serge.hallyn@ubuntu.com&gt;
</content>
</entry>
</feed>
