linux/security/integrity/ima
Mimi Zohar 1df9f0a731 Integrity: IMA file free imbalance
The number of calls to ima_path_check()/ima_file_free()
should be balanced.  An extra call to fput(), indicates
the file could have been accessed without first being
measured.

Although f_count is incremented/decremented in places other
than fget/fput, like fget_light/fput_light and get_file, the
current task must already hold a file refcnt.  The call to
__fput() is delayed until the refcnt becomes 0, resulting
in ima_file_free() flagging any changes.

- add hook to increment opencount for IPC shared memory(SYSV),
  shmat files, and /dev/zero
- moved NULL iint test in opencount_get()

Signed-off-by: Mimi Zohar <zohar@us.ibm.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
2009-02-06 09:05:33 +11:00
..
ima_api.c integrity: IMA as an integrity service provider 2009-02-06 09:05:30 +11:00
ima_audit.c integrity: IMA as an integrity service provider 2009-02-06 09:05:30 +11:00
ima_crypto.c integrity: IMA as an integrity service provider 2009-02-06 09:05:30 +11:00
ima_fs.c integrity: IMA policy open 2009-02-06 09:05:32 +11:00
ima_iint.c Integrity: IMA file free imbalance 2009-02-06 09:05:33 +11:00
ima_init.c integrity: IMA display 2009-02-06 09:05:31 +11:00
ima_main.c Integrity: IMA file free imbalance 2009-02-06 09:05:33 +11:00
ima_policy.c integrity: IMA policy 2009-02-06 09:05:31 +11:00
ima_queue.c integrity: IMA as an integrity service provider 2009-02-06 09:05:30 +11:00
ima.h Integrity: IMA file free imbalance 2009-02-06 09:05:33 +11:00
Kconfig integrity: IMA policy 2009-02-06 09:05:31 +11:00
Makefile integrity: IMA display 2009-02-06 09:05:31 +11:00