summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_api.c
diff options
context:
space:
mode:
authorPatrick Callaghan <patrickc@linux.ibm.com>2019-11-11 20:23:48 +0100
committerMimi Zohar <zohar@linux.ibm.com>2019-12-12 14:52:05 +0100
commit96c9e1de99545ce4be1b5e7dff217a896ba96d06 (patch)
tree295e290ddea43c07a7da9806fe65df87adf0269b /security/integrity/ima/ima_api.c
parentLinux 5.5-rc1 (diff)
downloadlinux-96c9e1de99545ce4be1b5e7dff217a896ba96d06.tar.xz
linux-96c9e1de99545ce4be1b5e7dff217a896ba96d06.zip
ima: avoid appraise error for hash calc interrupt
The integrity_kernel_read() call in ima_calc_file_hash_tfm() can return a value of 0 before all bytes of the file are read. A value of 0 would normally indicate an EOF. This has been observed if a user process is causing a file appraisal and is terminated with a SIGTERM signal. The most common occurrence of seeing the problem is if a shutdown or systemd reload is initiated while files are being appraised. The problem is similar to commit <f5e1040196db> (ima: always return negative code for error) that fixed the problem in ima_calc_file_hash_atfm(). Suggested-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Patrick Callaghan <patrickc@linux.ibm.com> Reviewed-by: Sascha Hauer <s.hauer@pengutronix.de> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima_api.c')
0 files changed, 0 insertions, 0 deletions