Message ID | 1497031364-19949-3-git-send-email-zohar@linux.vnet.ibm.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show
Return-Path: <linux-security-module-owner@kernel.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id BB43160393 for <patchwork-linux-security-module@patchwork.kernel.org>; Fri, 9 Jun 2017 18:04:02 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B1827286F5 for <patchwork-linux-security-module@patchwork.kernel.org>; Fri, 9 Jun 2017 18:04:02 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id A4DA0286E2; Fri, 9 Jun 2017 18:04:02 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5C062286E2 for <patchwork-linux-security-module@patchwork.kernel.org>; Fri, 9 Jun 2017 18:04:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751725AbdFISEB (ORCPT <rfc822;patchwork-linux-security-module@patchwork.kernel.org>); Fri, 9 Jun 2017 14:04:01 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:33312 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751671AbdFISEA (ORCPT <rfc822;linux-security-module@vger.kernel.org>); Fri, 9 Jun 2017 14:04:00 -0400 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.20/8.16.0.20) with SMTP id v59HxXDw044308 for <linux-security-module@vger.kernel.org>; Fri, 9 Jun 2017 14:03:58 -0400 Received: from e23smtp07.au.ibm.com (e23smtp07.au.ibm.com [202.81.31.140]) by mx0b-001b2d01.pphosted.com with ESMTP id 2ayw2yhwts-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for <linux-security-module@vger.kernel.org>; Fri, 09 Jun 2017 14:03:58 -0400 Received: from localhost by e23smtp07.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <linux-security-module@vger.kernel.org> from <zohar@linux.vnet.ibm.com>; Sat, 10 Jun 2017 04:03:55 +1000 Received: from d23relay10.au.ibm.com (202.81.31.229) by e23smtp07.au.ibm.com (202.81.31.204) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Sat, 10 Jun 2017 04:03:52 +1000 Received: from d23av05.au.ibm.com (d23av05.au.ibm.com [9.190.234.119]) by d23relay10.au.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id v59I3hBV51773666; Sat, 10 Jun 2017 04:03:51 +1000 Received: from d23av05.au.ibm.com (localhost [127.0.0.1]) by d23av05.au.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id v59I3JcX020413; Sat, 10 Jun 2017 04:03:19 +1000 Received: from localhost.localdomain.com ([9.80.110.47]) by d23av05.au.ibm.com (8.14.4/8.14.4/NCO v10.0 AVin) with ESMTP id v59I39Cr019585; Sat, 10 Jun 2017 04:03:16 +1000 From: Mimi Zohar <zohar@linux.vnet.ibm.com> To: Christoph Hellwig <hch@lst.de>, Al Viro <viro@zeniv.linux.org.uk> Cc: Mimi Zohar <zohar@linux.vnet.ibm.com>, James Morris <jmorris@namei.org>, linux-fsdevel@vger.kernel.org, linux-ima-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org Subject: [PATCH 2/4] tmpfs: define integrity_read file operation method Date: Fri, 9 Jun 2017 14:02:42 -0400 X-Mailer: git-send-email 2.7.4 In-Reply-To: <1497031364-19949-1-git-send-email-zohar@linux.vnet.ibm.com> References: <1497031364-19949-1-git-send-email-zohar@linux.vnet.ibm.com> X-TM-AS-MML: disable x-cbid: 17060918-0044-0000-0000-0000026A76FC X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17060918-0045-0000-0000-000006F98AB7 Message-Id: <1497031364-19949-3-git-send-email-zohar@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2017-06-09_08:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1706090312 Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: <linux-security-module.vger.kernel.org> X-Virus-Scanned: ClamAV using ClamSMTP |
diff --git a/mm/shmem.c b/mm/shmem.c index e67d6ba4e98e..16958b20946f 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -3846,6 +3846,7 @@ static const struct file_operations shmem_file_operations = { .splice_read = generic_file_splice_read, .splice_write = iter_file_splice_write, .fallocate = shmem_fallocate, + .integrity_read = shmem_file_read_iter, #endif };
Although temporary filesystems for the most part are not something that we're interested in measuring or appraising, we do want to at least measure, and at some point appraise, files on the rootfs. This patch defines an integrity_read file operation method used for calculating the file hash. Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> --- mm/shmem.c | 1 + 1 file changed, 1 insertion(+)