linux-stable/security/integrity
Mimi Zohar 912d16a2d7 evm: fix writing <securityfs>/evm overflow
[ Upstream commit 49219d9b87 ]

EVM_SETUP_COMPLETE is defined as 0x80000000, which is larger than INT_MAX.
The "-fno-strict-overflow" compiler option properly prevents signaling
EVM that the EVM policy setup is complete.  Define and read an unsigned
int.

Fixes: f00d797507 ("EVM: Allow userspace to signal an RSA key has been loaded")
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-07-14 16:56:04 +02:00
..
evm evm: fix writing <securityfs>/evm overflow 2021-07-14 16:56:04 +02:00
ima ima: Fix the error code for restoring the PCR value 2021-05-14 09:50:30 +02:00
platform_certs integrity: Load mokx variables into the blacklist keyring 2021-06-30 08:47:30 -04:00
digsig.c fs/kernel_file_read: Add "offset" arg for partial reads 2020-10-05 13:37:04 +02:00
digsig_asymmetric.c integrity-v5.10 2020-10-15 15:58:18 -07:00
iint.c integrity: double check iint_cache was initialized 2021-03-30 14:31:55 +02:00
integrity.h integrity: Add errno field in audit message 2020-07-16 21:48:11 -04:00
integrity_audit.c integrity: Use current_uid() in integrity_audit_message() 2020-08-31 17:46:50 -04:00
Kconfig powerpc: Load firmware trusted keys/hashes into kernel keyring 2019-11-13 00:33:23 +11:00
Makefile powerpc: Load firmware trusted keys/hashes into kernel keyring 2019-11-13 00:33:23 +11:00