diff options
| author | Roberto Sassu <[email protected]> | 2024-02-15 10:31:00 +0000 |
|---|---|---|
| committer | Paul Moore <[email protected]> | 2024-02-16 04:43:42 +0000 |
| commit | 8f46ff5767b0b18329140d80d6bcabd818f42c4c (patch) | |
| tree | 0023bde4f2e5cacda47f6bb5edb32dd552dfeed8 /fs/nfsd/vfs.c | |
| parent | security: Introduce inode_post_removexattr hook (diff) | |
| download | kernel-8f46ff5767b0b18329140d80d6bcabd818f42c4c.tar.gz kernel-8f46ff5767b0b18329140d80d6bcabd818f42c4c.zip | |
security: Introduce file_post_open hook
In preparation to move IMA and EVM to the LSM infrastructure, introduce the
file_post_open hook. Also, export security_file_post_open() for NFS.
Based on policy, IMA calculates the digest of the file content and
extends the TPM with the digest, verifies the file's integrity based on
the digest, and/or includes the file digest in the audit log.
LSMs could similarly take action depending on the file content and the
access mask requested with open().
The new hook returns a value and can cause the open to be aborted.
Signed-off-by: Roberto Sassu <[email protected]>
Reviewed-by: Stefan Berger <[email protected]>
Acked-by: Casey Schaufler <[email protected]>
Reviewed-by: Mimi Zohar <[email protected]>
Acked-by: Christian Brauner <[email protected]>
Signed-off-by: Paul Moore <[email protected]>
Diffstat (limited to 'fs/nfsd/vfs.c')
| -rw-r--r-- | fs/nfsd/vfs.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c index b7c7a9273ea0..e44d8239545b 100644 --- a/fs/nfsd/vfs.c +++ b/fs/nfsd/vfs.c @@ -877,6 +877,12 @@ __nfsd_open(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, goto out; } + host_err = security_file_post_open(file, may_flags); + if (host_err) { + fput(file); + goto out; + } + host_err = ima_file_check(file, may_flags); if (host_err) { fput(file); |
