acrn-kernel/security/integrity/ima
Mimi Zohar 143f450c6c ima: detect changes to the backing overlay file
commit b836c4d29f2744200b2af41e14bf50758dddc818 upstream.

Commit 18b44bc5a6 ("ovl: Always reevaluate the file signature for
IMA") forced signature re-evaulation on every file access.

Instead of always re-evaluating the file's integrity, detect a change
to the backing file, by comparing the cached file metadata with the
backing file's metadata.  Verifying just the i_version has not changed
is insufficient.  In addition save and compare the i_ino and s_dev
as well.

Reviewed-by: Amir Goldstein <amir73il@gmail.com>
Tested-by: Eric Snowberg <eric.snowberg@oracle.com>
Tested-by: Raul E Rangel <rrangel@chromium.org>
Cc: stable@vger.kernel.org
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-11-28 17:07:12 +00:00
..
Kconfig
Makefile
ima.h
ima_api.c
ima_appraise.c
ima_asymmetric_keys.c
ima_crypto.c
ima_efi.c
ima_fs.c
ima_init.c
ima_kexec.c
ima_main.c
ima_modsig.c
ima_mok.c
ima_policy.c
ima_queue.c
ima_queue_keys.c
ima_template.c
ima_template_lib.c
ima_template_lib.h