lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 13 Dec 2021 16:15:40 -0500
From:   Stefan Berger <stefanb@...ux.ibm.com>
To:     linux-integrity@...r.kernel.org
Cc:     zohar@...ux.ibm.com, serge@...lyn.com,
        christian.brauner@...ntu.com, containers@...ts.linux.dev,
        dmitry.kasatkin@...il.com, ebiederm@...ssion.com,
        krzysztof.struczynski@...wei.com, roberto.sassu@...wei.com,
        mpeters@...hat.com, lhinds@...hat.com, lsturman@...hat.com,
        puiterwi@...hat.com, jejb@...ux.ibm.com, jamjoom@...ibm.com,
        linux-kernel@...r.kernel.org, paul@...l-moore.com, rgb@...hat.com,
        linux-security-module@...r.kernel.org, jmorris@...ei.org
Subject: Re: [PATCH v6 06/17] ima: Move policy related variables into
 ima_namespace


On 12/10/21 14:47, Stefan Berger wrote:
> @@ -357,7 +359,7 @@ int ima_check_blacklist(struct integrity_iint_cache *iint,
>   
>   		rc = is_binary_blacklisted(digest, digestsize);
>   		if ((rc == -EPERM) && (iint->flags & IMA_MEASURE))
> -			process_buffer_measurement(&init_user_ns, NULL, digest, digestsize,
> +			process_buffer_measurement(ns, &init_user_ns, NULL, digest, digestsize,
>   						   "blacklisted-hash", NONE,
>   						   pcr, NULL, false, NULL, 0);
>   	}
> @@ -527,14 +529,15 @@ void ima_inode_post_setattr(struct user_namespace *mnt_userns,
>   			    struct dentry *dentry)
>   {
>   	struct inode *inode = d_backing_inode(dentry);
> +	struct ima_namespace *ns = get_current_ns();

I am getting the ima_namespace now from the dentry in the 3 locations in 
this file.

   Stefan


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ