ima: fail file signature verification on non-init mounted filesystems
authorMimi Zohar <zohar@linux.vnet.ibm.com>
Wed, 21 Feb 2018 16:33:37 +0000 (11:33 -0500)
committerMimi Zohar <zohar@linux.vnet.ibm.com>
Fri, 23 Mar 2018 10:31:37 +0000 (06:31 -0400)
commit57b56ac6fecb05c3192586e4892572dd13d972de
tree125efeee62e9ec9a3fc99a761151569cdba7e26c
parentd906c10d8a31654cb9167c9a2ebc7d3e43820bad
ima: fail file signature verification on non-init mounted filesystems

FUSE can be mounted by unprivileged users either today with fusermount
installed with setuid, or soon with the upcoming patches to allow FUSE
mounts in a non-init user namespace.

This patch addresses the new unprivileged non-init mounted filesystems,
which are untrusted, by failing the signature verification.

This patch defines two new flags SB_I_IMA_UNVERIFIABLE_SIGNATURE and
SB_I_UNTRUSTED_MOUNTER.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Cc: Miklos Szeredi <miklos@szeredi.hu>
Cc: Seth Forshee <seth.forshee@canonical.com>
Cc: Dongsu Park <dongsu@kinvolk.io>
Cc: Alban Crequy <alban@kinvolk.io>
Acked-by: Serge Hallyn <serge@hallyn.com>
Acked-by: "Eric W. Biederman" <ebiederm@xmission.com>
include/linux/fs.h
security/integrity/ima/ima_appraise.c