On Jan 15, 2024 Roberto Sassu <[email protected]> wrote: > > In preparation to move IMA and EVM to the LSM infrastructure, introduce the > file_post_open hook. Also, export security_file_post_open() for NFS. > > Based on policy, IMA calculates the digest of the file content and > extends the TPM with the digest, verifies the file's integrity based on > the digest, and/or includes the file digest in the audit log. > > LSMs could similarly take action depending on the file content and the > access mask requested with open(). > > The new hook returns a value and can cause the open to be aborted. > > Signed-off-by: Roberto Sassu <[email protected]> > Reviewed-by: Stefan Berger <[email protected]> > Acked-by: Casey Schaufler <[email protected]> > Reviewed-by: Mimi Zohar <[email protected]> > --- > fs/namei.c | 2 ++ > fs/nfsd/vfs.c | 6 ++++++ > include/linux/lsm_hook_defs.h | 1 + > include/linux/security.h | 6 ++++++ > security/security.c | 17 +++++++++++++++++ > 5 files changed, 32 insertions(+)
Acked-by: Paul Moore <[email protected]> -- paul-moore.com
