aboutsummaryrefslogtreecommitdiffstats
path: root/security/integrity/integrity.h
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.vnet.ibm.com>2012-12-03 17:08:11 -0500
committerMimi Zohar <zohar@linux.vnet.ibm.com>2013-01-22 16:10:36 -0500
commitd79d72e02485c00b886179538dc8deaffa3be507 (patch)
tree92690d5cbd6e4a0a3bee369033fe18d9b2d065f7 /security/integrity/integrity.h
parentf578c08ec959cb0cdadf02bdc9689a4df3e9b9d4 (diff)
ima: per hook cache integrity appraisal status
With the new IMA policy 'appraise_type=' option, different hooks can require different methods for appraising a file's integrity. For example, the existing 'ima_appraise_tcb' policy defines a generic rule, requiring all root files to be appraised, without specfying the appraisal method. A more specific rule could require all kernel modules, for example, to be signed. appraise fowner=0 func=MODULE_CHECK appraise_type=imasig appraise fowner=0 As a result, the integrity appraisal results for the same inode, but for different hooks, could differ. This patch caches the integrity appraisal results on a per hook basis. Changelog v2: - Rename ima_cache_status() to ima_set_cache_status() - Rename and move get_appraise_status() to ima_get_cache_status() Changelog v0: - include IMA_APPRAISE/APPRAISED_SUBMASK in IMA_DO/DONE_MASK (Dmitry) - Support independent MODULE_CHECK appraise status. - fixed IMA_XXXX_APPRAISE/APPRAISED flags Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
Diffstat (limited to 'security/integrity/integrity.h')
-rw-r--r--security/integrity/integrity.h26
1 files changed, 22 insertions, 4 deletions
diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h
index 329ad263e130..0ae08fc88585 100644
--- a/security/integrity/integrity.h
+++ b/security/integrity/integrity.h
@@ -30,9 +30,24 @@
30#define IMA_DIGSIG 0x01000000 30#define IMA_DIGSIG 0x01000000
31#define IMA_DIGSIG_REQUIRED 0x02000000 31#define IMA_DIGSIG_REQUIRED 0x02000000
32 32
33#define IMA_DO_MASK (IMA_MEASURE | IMA_APPRAISE | IMA_AUDIT) 33#define IMA_DO_MASK (IMA_MEASURE | IMA_APPRAISE | IMA_AUDIT | \
34#define IMA_DONE_MASK (IMA_MEASURED | IMA_APPRAISED | IMA_AUDITED \ 34 IMA_APPRAISE_SUBMASK)
35 | IMA_COLLECTED) 35#define IMA_DONE_MASK (IMA_MEASURED | IMA_APPRAISED | IMA_AUDITED | \
36 IMA_COLLECTED | IMA_APPRAISED_SUBMASK)
37
38/* iint subaction appraise cache flags */
39#define IMA_FILE_APPRAISE 0x00000100
40#define IMA_FILE_APPRAISED 0x00000200
41#define IMA_MMAP_APPRAISE 0x00000400
42#define IMA_MMAP_APPRAISED 0x00000800
43#define IMA_BPRM_APPRAISE 0x00001000
44#define IMA_BPRM_APPRAISED 0x00002000
45#define IMA_MODULE_APPRAISE 0x00004000
46#define IMA_MODULE_APPRAISED 0x00008000
47#define IMA_APPRAISE_SUBMASK (IMA_FILE_APPRAISE | IMA_MMAP_APPRAISE | \
48 IMA_BPRM_APPRAISE | IMA_MODULE_APPRAISE)
49#define IMA_APPRAISED_SUBMASK (IMA_FILE_APPRAISED | IMA_MMAP_APPRAISED | \
50 IMA_BPRM_APPRAISED | IMA_MODULE_APPRAISED)
36 51
37enum evm_ima_xattr_type { 52enum evm_ima_xattr_type {
38 IMA_XATTR_DIGEST = 0x01, 53 IMA_XATTR_DIGEST = 0x01,
@@ -52,7 +67,10 @@ struct integrity_iint_cache {
52 u64 version; /* track inode changes */ 67 u64 version; /* track inode changes */
53 unsigned long flags; 68 unsigned long flags;
54 struct evm_ima_xattr_data ima_xattr; 69 struct evm_ima_xattr_data ima_xattr;
55 enum integrity_status ima_status:4; 70 enum integrity_status ima_file_status:4;
71 enum integrity_status ima_mmap_status:4;
72 enum integrity_status ima_bprm_status:4;
73 enum integrity_status ima_module_status:4;
56 enum integrity_status evm_status:4; 74 enum integrity_status evm_status:4;
57}; 75};
58 76