diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2012-12-03 17:08:11 -0500 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2013-01-22 16:10:36 -0500 |
commit | d79d72e02485c00b886179538dc8deaffa3be507 (patch) | |
tree | 92690d5cbd6e4a0a3bee369033fe18d9b2d065f7 /security/integrity/integrity.h | |
parent | f578c08ec959cb0cdadf02bdc9689a4df3e9b9d4 (diff) |
ima: per hook cache integrity appraisal status
With the new IMA policy 'appraise_type=' option, different hooks
can require different methods for appraising a file's integrity.
For example, the existing 'ima_appraise_tcb' policy defines a
generic rule, requiring all root files to be appraised, without
specfying the appraisal method. A more specific rule could require
all kernel modules, for example, to be signed.
appraise fowner=0 func=MODULE_CHECK appraise_type=imasig
appraise fowner=0
As a result, the integrity appraisal results for the same inode, but
for different hooks, could differ. This patch caches the integrity
appraisal results on a per hook basis.
Changelog v2:
- Rename ima_cache_status() to ima_set_cache_status()
- Rename and move get_appraise_status() to ima_get_cache_status()
Changelog v0:
- include IMA_APPRAISE/APPRAISED_SUBMASK in IMA_DO/DONE_MASK (Dmitry)
- Support independent MODULE_CHECK appraise status.
- fixed IMA_XXXX_APPRAISE/APPRAISED flags
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
Diffstat (limited to 'security/integrity/integrity.h')
-rw-r--r-- | security/integrity/integrity.h | 26 |
1 files changed, 22 insertions, 4 deletions
diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h index 329ad263e130..0ae08fc88585 100644 --- a/security/integrity/integrity.h +++ b/security/integrity/integrity.h | |||
@@ -30,9 +30,24 @@ | |||
30 | #define IMA_DIGSIG 0x01000000 | 30 | #define IMA_DIGSIG 0x01000000 |
31 | #define IMA_DIGSIG_REQUIRED 0x02000000 | 31 | #define IMA_DIGSIG_REQUIRED 0x02000000 |
32 | 32 | ||
33 | #define IMA_DO_MASK (IMA_MEASURE | IMA_APPRAISE | IMA_AUDIT) | 33 | #define IMA_DO_MASK (IMA_MEASURE | IMA_APPRAISE | IMA_AUDIT | \ |
34 | #define IMA_DONE_MASK (IMA_MEASURED | IMA_APPRAISED | IMA_AUDITED \ | 34 | IMA_APPRAISE_SUBMASK) |
35 | | IMA_COLLECTED) | 35 | #define IMA_DONE_MASK (IMA_MEASURED | IMA_APPRAISED | IMA_AUDITED | \ |
36 | IMA_COLLECTED | IMA_APPRAISED_SUBMASK) | ||
37 | |||
38 | /* iint subaction appraise cache flags */ | ||
39 | #define IMA_FILE_APPRAISE 0x00000100 | ||
40 | #define IMA_FILE_APPRAISED 0x00000200 | ||
41 | #define IMA_MMAP_APPRAISE 0x00000400 | ||
42 | #define IMA_MMAP_APPRAISED 0x00000800 | ||
43 | #define IMA_BPRM_APPRAISE 0x00001000 | ||
44 | #define IMA_BPRM_APPRAISED 0x00002000 | ||
45 | #define IMA_MODULE_APPRAISE 0x00004000 | ||
46 | #define IMA_MODULE_APPRAISED 0x00008000 | ||
47 | #define IMA_APPRAISE_SUBMASK (IMA_FILE_APPRAISE | IMA_MMAP_APPRAISE | \ | ||
48 | IMA_BPRM_APPRAISE | IMA_MODULE_APPRAISE) | ||
49 | #define IMA_APPRAISED_SUBMASK (IMA_FILE_APPRAISED | IMA_MMAP_APPRAISED | \ | ||
50 | IMA_BPRM_APPRAISED | IMA_MODULE_APPRAISED) | ||
36 | 51 | ||
37 | enum evm_ima_xattr_type { | 52 | enum evm_ima_xattr_type { |
38 | IMA_XATTR_DIGEST = 0x01, | 53 | IMA_XATTR_DIGEST = 0x01, |
@@ -52,7 +67,10 @@ struct integrity_iint_cache { | |||
52 | u64 version; /* track inode changes */ | 67 | u64 version; /* track inode changes */ |
53 | unsigned long flags; | 68 | unsigned long flags; |
54 | struct evm_ima_xattr_data ima_xattr; | 69 | struct evm_ima_xattr_data ima_xattr; |
55 | enum integrity_status ima_status:4; | 70 | enum integrity_status ima_file_status:4; |
71 | enum integrity_status ima_mmap_status:4; | ||
72 | enum integrity_status ima_bprm_status:4; | ||
73 | enum integrity_status ima_module_status:4; | ||
56 | enum integrity_status evm_status:4; | 74 | enum integrity_status evm_status:4; |
57 | }; | 75 | }; |
58 | 76 | ||