diff options
| -rw-r--r-- | Documentation/kernel-parameters.txt | 10 | ||||
| -rw-r--r-- | security/integrity/ima/ima_policy.c | 65 |
2 files changed, 65 insertions, 10 deletions
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index abc496f95220..807b765087d4 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt | |||
| @@ -1398,7 +1398,15 @@ bytes respectively. Such letter suffixes can also be entirely omitted. | |||
| 1398 | The list of supported hash algorithms is defined | 1398 | The list of supported hash algorithms is defined |
| 1399 | in crypto/hash_info.h. | 1399 | in crypto/hash_info.h. |
| 1400 | 1400 | ||
| 1401 | ima_tcb [IMA] | 1401 | ima_policy= [IMA] |
| 1402 | The builtin measurement policy to load during IMA | ||
| 1403 | setup. Specyfing "tcb" as the value, measures all | ||
| 1404 | programs exec'd, files mmap'd for exec, and all files | ||
| 1405 | opened with the read mode bit set by either the | ||
| 1406 | effective uid (euid=0) or uid=0. | ||
| 1407 | Format: "tcb" | ||
| 1408 | |||
| 1409 | ima_tcb [IMA] Deprecated. Use ima_policy= instead. | ||
| 1402 | Load a policy which meets the needs of the Trusted | 1410 | Load a policy which meets the needs of the Trusted |
| 1403 | Computing Base. This means IMA will measure all | 1411 | Computing Base. This means IMA will measure all |
| 1404 | programs exec'd, files mmap'd for exec, and all files | 1412 | programs exec'd, files mmap'd for exec, and all files |
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index b3a2038ed424..3997e206f82d 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c | |||
| @@ -44,6 +44,8 @@ enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE, | |||
| 44 | LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE | 44 | LSM_SUBJ_USER, LSM_SUBJ_ROLE, LSM_SUBJ_TYPE |
| 45 | }; | 45 | }; |
| 46 | 46 | ||
| 47 | enum policy_types { ORIGINAL_TCB = 1, DEFAULT_TCB }; | ||
| 48 | |||
| 47 | struct ima_rule_entry { | 49 | struct ima_rule_entry { |
| 48 | struct list_head list; | 50 | struct list_head list; |
| 49 | int action; | 51 | int action; |
| @@ -72,7 +74,7 @@ struct ima_rule_entry { | |||
| 72 | * normal users can easily run the machine out of memory simply building | 74 | * normal users can easily run the machine out of memory simply building |
| 73 | * and running executables. | 75 | * and running executables. |
| 74 | */ | 76 | */ |
| 75 | static struct ima_rule_entry default_rules[] = { | 77 | static struct ima_rule_entry dont_measure_rules[] = { |
| 76 | {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC}, | 78 | {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC}, |
| 77 | {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC}, | 79 | {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC}, |
| 78 | {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC}, | 80 | {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC}, |
| @@ -83,13 +85,29 @@ static struct ima_rule_entry default_rules[] = { | |||
| 83 | {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, | 85 | {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags = IMA_FSMAGIC}, |
| 84 | {.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC, | 86 | {.action = DONT_MEASURE, .fsmagic = CGROUP_SUPER_MAGIC, |
| 85 | .flags = IMA_FSMAGIC}, | 87 | .flags = IMA_FSMAGIC}, |
| 86 | {.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC}, | 88 | {.action = DONT_MEASURE, .fsmagic = NSFS_MAGIC, .flags = IMA_FSMAGIC} |
| 89 | }; | ||
| 90 | |||
| 91 | static struct ima_rule_entry original_measurement_rules[] = { | ||
| 92 | {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, | ||
| 93 | .flags = IMA_FUNC | IMA_MASK}, | ||
| 94 | {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, | ||
| 95 | .flags = IMA_FUNC | IMA_MASK}, | ||
| 96 | {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, | ||
| 97 | .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_MASK | IMA_UID}, | ||
| 98 | {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, | ||
| 99 | {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, | ||
| 100 | }; | ||
| 101 | |||
| 102 | static struct ima_rule_entry default_measurement_rules[] = { | ||
| 87 | {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, | 103 | {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, |
| 88 | .flags = IMA_FUNC | IMA_MASK}, | 104 | .flags = IMA_FUNC | IMA_MASK}, |
| 89 | {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, | 105 | {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, |
| 90 | .flags = IMA_FUNC | IMA_MASK}, | 106 | .flags = IMA_FUNC | IMA_MASK}, |
| 91 | {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, .uid = GLOBAL_ROOT_UID, | 107 | {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, |
| 92 | .flags = IMA_FUNC | IMA_MASK | IMA_UID}, | 108 | .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_EUID}, |
| 109 | {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, | ||
| 110 | .uid = GLOBAL_ROOT_UID, .flags = IMA_FUNC | IMA_INMASK | IMA_UID}, | ||
| 93 | {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, | 111 | {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, |
| 94 | {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, | 112 | {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, |
| 95 | }; | 113 | }; |
| @@ -121,14 +139,29 @@ static struct list_head *ima_rules; | |||
| 121 | 139 | ||
| 122 | static DEFINE_MUTEX(ima_rules_mutex); | 140 | static DEFINE_MUTEX(ima_rules_mutex); |
| 123 | 141 | ||
| 124 | static bool ima_use_tcb __initdata; | 142 | static int ima_policy __initdata; |
| 125 | static int __init default_measure_policy_setup(char *str) | 143 | static int __init default_measure_policy_setup(char *str) |
| 126 | { | 144 | { |
| 127 | ima_use_tcb = 1; | 145 | if (ima_policy) |
| 146 | return 1; | ||
| 147 | |||
| 148 | ima_policy = ORIGINAL_TCB; | ||
| 128 | return 1; | 149 | return 1; |
| 129 | } | 150 | } |
| 130 | __setup("ima_tcb", default_measure_policy_setup); | 151 | __setup("ima_tcb", default_measure_policy_setup); |
| 131 | 152 | ||
| 153 | static int __init policy_setup(char *str) | ||
| 154 | { | ||
| 155 | if (ima_policy) | ||
| 156 | return 1; | ||
| 157 | |||
| 158 | if (strcmp(str, "tcb") == 0) | ||
| 159 | ima_policy = DEFAULT_TCB; | ||
| 160 | |||
| 161 | return 1; | ||
| 162 | } | ||
| 163 | __setup("ima_policy=", policy_setup); | ||
| 164 | |||
| 132 | static bool ima_use_appraise_tcb __initdata; | 165 | static bool ima_use_appraise_tcb __initdata; |
| 133 | static int __init default_appraise_policy_setup(char *str) | 166 | static int __init default_appraise_policy_setup(char *str) |
| 134 | { | 167 | { |
| @@ -352,13 +385,27 @@ void __init ima_init_policy(void) | |||
| 352 | { | 385 | { |
| 353 | int i, measure_entries, appraise_entries; | 386 | int i, measure_entries, appraise_entries; |
| 354 | 387 | ||
| 355 | /* if !ima_use_tcb set entries = 0 so we load NO default rules */ | 388 | /* if !ima_policy set entries = 0 so we load NO default rules */ |
| 356 | measure_entries = ima_use_tcb ? ARRAY_SIZE(default_rules) : 0; | 389 | measure_entries = ima_policy ? ARRAY_SIZE(dont_measure_rules) : 0; |
| 357 | appraise_entries = ima_use_appraise_tcb ? | 390 | appraise_entries = ima_use_appraise_tcb ? |
| 358 | ARRAY_SIZE(default_appraise_rules) : 0; | 391 | ARRAY_SIZE(default_appraise_rules) : 0; |
| 359 | 392 | ||
| 360 | for (i = 0; i < measure_entries; i++) | 393 | for (i = 0; i < measure_entries; i++) |
| 361 | list_add_tail(&default_rules[i].list, &ima_default_rules); | 394 | list_add_tail(&dont_measure_rules[i].list, &ima_default_rules); |
| 395 | |||
| 396 | switch (ima_policy) { | ||
| 397 | case ORIGINAL_TCB: | ||
| 398 | for (i = 0; i < ARRAY_SIZE(original_measurement_rules); i++) | ||
| 399 | list_add_tail(&original_measurement_rules[i].list, | ||
| 400 | &ima_default_rules); | ||
| 401 | break; | ||
| 402 | case DEFAULT_TCB: | ||
| 403 | for (i = 0; i < ARRAY_SIZE(default_measurement_rules); i++) | ||
| 404 | list_add_tail(&default_measurement_rules[i].list, | ||
| 405 | &ima_default_rules); | ||
| 406 | default: | ||
| 407 | break; | ||
| 408 | } | ||
| 362 | 409 | ||
| 363 | for (i = 0; i < appraise_entries; i++) { | 410 | for (i = 0; i < appraise_entries; i++) { |
| 364 | list_add_tail(&default_appraise_rules[i].list, | 411 | list_add_tail(&default_appraise_rules[i].list, |
