diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2015-12-07 15:08:01 -0500 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2016-02-21 09:34:23 -0500 |
commit | 95ee08fa373b9ede1059c2f384cfeafe10dcd6bb (patch) | |
tree | 6a0a93475e6a3a26328a800747e9188a04c8eef5 /security | |
parent | 19f8a84713edc1d27ea05be00effb97b8f1ef207 (diff) |
ima: require signed IMA policy
Require the IMA policy to be signed when additional rules can be added.
v1:
- initialize the policy flag
- include IMA_APPRAISE_POLICY in the policy flag
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: Petko Manolov <petkan@mip-labs.com>
Acked-by: Dmitry Kasatkin <dmitry.kasatkin@huawei.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/integrity/ima/ima_policy.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index c1b5d00fe5d4..be09e2cacf82 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c | |||
@@ -129,6 +129,10 @@ static struct ima_rule_entry default_appraise_rules[] = { | |||
129 | {.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, | 129 | {.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, |
130 | {.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}, | 130 | {.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}, |
131 | {.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC}, | 131 | {.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC}, |
132 | #ifdef CONFIG_IMA_WRITE_POLICY | ||
133 | {.action = APPRAISE, .func = POLICY_CHECK, | ||
134 | .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED}, | ||
135 | #endif | ||
132 | #ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT | 136 | #ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT |
133 | {.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER}, | 137 | {.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER}, |
134 | #else | 138 | #else |
@@ -412,9 +416,12 @@ void __init ima_init_policy(void) | |||
412 | for (i = 0; i < appraise_entries; i++) { | 416 | for (i = 0; i < appraise_entries; i++) { |
413 | list_add_tail(&default_appraise_rules[i].list, | 417 | list_add_tail(&default_appraise_rules[i].list, |
414 | &ima_default_rules); | 418 | &ima_default_rules); |
419 | if (default_appraise_rules[i].func == POLICY_CHECK) | ||
420 | temp_ima_appraise |= IMA_APPRAISE_POLICY; | ||
415 | } | 421 | } |
416 | 422 | ||
417 | ima_rules = &ima_default_rules; | 423 | ima_rules = &ima_default_rules; |
424 | ima_update_policy_flag(); | ||
418 | } | 425 | } |
419 | 426 | ||
420 | /* Make sure we have a valid policy, at least containing some rules. */ | 427 | /* Make sure we have a valid policy, at least containing some rules. */ |