aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.vnet.ibm.com>2015-12-07 15:08:01 -0500
committerMimi Zohar <zohar@linux.vnet.ibm.com>2016-02-21 09:34:23 -0500
commit95ee08fa373b9ede1059c2f384cfeafe10dcd6bb (patch)
tree6a0a93475e6a3a26328a800747e9188a04c8eef5 /security
parent19f8a84713edc1d27ea05be00effb97b8f1ef207 (diff)
ima: require signed IMA policy
Require the IMA policy to be signed when additional rules can be added. v1: - initialize the policy flag - include IMA_APPRAISE_POLICY in the policy flag Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Acked-by: Petko Manolov <petkan@mip-labs.com> Acked-by: Dmitry Kasatkin <dmitry.kasatkin@huawei.com>
Diffstat (limited to 'security')
-rw-r--r--security/integrity/ima/ima_policy.c7
1 files changed, 7 insertions, 0 deletions
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
index c1b5d00fe5d4..be09e2cacf82 100644
--- a/security/integrity/ima/ima_policy.c
+++ b/security/integrity/ima/ima_policy.c
@@ -129,6 +129,10 @@ static struct ima_rule_entry default_appraise_rules[] = {
129 {.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, 129 {.action = DONT_APPRAISE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC},
130 {.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}, 130 {.action = DONT_APPRAISE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC},
131 {.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC}, 131 {.action = DONT_APPRAISE, .fsmagic = CGROUP_SUPER_MAGIC, .flags = IMA_FSMAGIC},
132#ifdef CONFIG_IMA_WRITE_POLICY
133 {.action = APPRAISE, .func = POLICY_CHECK,
134 .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
135#endif
132#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT 136#ifndef CONFIG_IMA_APPRAISE_SIGNED_INIT
133 {.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER}, 137 {.action = APPRAISE, .fowner = GLOBAL_ROOT_UID, .flags = IMA_FOWNER},
134#else 138#else
@@ -412,9 +416,12 @@ void __init ima_init_policy(void)
412 for (i = 0; i < appraise_entries; i++) { 416 for (i = 0; i < appraise_entries; i++) {
413 list_add_tail(&default_appraise_rules[i].list, 417 list_add_tail(&default_appraise_rules[i].list,
414 &ima_default_rules); 418 &ima_default_rules);
419 if (default_appraise_rules[i].func == POLICY_CHECK)
420 temp_ima_appraise |= IMA_APPRAISE_POLICY;
415 } 421 }
416 422
417 ima_rules = &ima_default_rules; 423 ima_rules = &ima_default_rules;
424 ima_update_policy_flag();
418} 425}
419 426
420/* Make sure we have a valid policy, at least containing some rules. */ 427/* Make sure we have a valid policy, at least containing some rules. */