aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMimi Zohar2012-12-05 14:14:38 -0600
committerMimi Zohar2013-01-22 15:10:39 -0600
commit5a73fcfa8875a94c2956e7ff8fba54d31a3e2854 (patch)
tree4f7a55a1f4c7524aaa422fc216717c1c0424d48e /security
parentd79d72e02485c00b886179538dc8deaffa3be507 (diff)
downloadam43-linux-kernel-5a73fcfa8875a94c2956e7ff8fba54d31a3e2854.tar.gz
am43-linux-kernel-5a73fcfa8875a94c2956e7ff8fba54d31a3e2854.tar.xz
am43-linux-kernel-5a73fcfa8875a94c2956e7ff8fba54d31a3e2854.zip
ima: differentiate appraise status only for hook specific rules
Different hooks can require different methods for appraising a file's integrity. As a result, an integrity appraisal status is cached on a per hook basis. Only a hook specific rule, requires the inode to be re-appraised. This patch eliminates unnecessary appraisals. Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
Diffstat (limited to 'security')
-rw-r--r--security/integrity/ima/ima_main.c9
-rw-r--r--security/integrity/ima/ima_policy.c9
2 files changed, 12 insertions, 6 deletions
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 66b7f408eff..3e751a9743a 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -146,7 +146,7 @@ static int process_measurement(struct file *file, const char *filename,
146 struct integrity_iint_cache *iint; 146 struct integrity_iint_cache *iint;
147 char *pathbuf = NULL; 147 char *pathbuf = NULL;
148 const char *pathname = NULL; 148 const char *pathname = NULL;
149 int rc = -ENOMEM, action, must_appraise; 149 int rc = -ENOMEM, action, must_appraise, _func;
150 150
151 if (!ima_initialized || !S_ISREG(inode->i_mode)) 151 if (!ima_initialized || !S_ISREG(inode->i_mode))
152 return 0; 152 return 0;
@@ -161,6 +161,9 @@ static int process_measurement(struct file *file, const char *filename,
161 161
162 must_appraise = action & IMA_APPRAISE; 162 must_appraise = action & IMA_APPRAISE;
163 163
164 /* Is the appraise rule hook specific? */
165 _func = (action & IMA_FILE_APPRAISE) ? FILE_CHECK : function;
166
164 mutex_lock(&inode->i_mutex); 167 mutex_lock(&inode->i_mutex);
165 168
166 iint = integrity_inode_get(inode); 169 iint = integrity_inode_get(inode);
@@ -178,7 +181,7 @@ static int process_measurement(struct file *file, const char *filename,
178 /* Nothing to do, just return existing appraised status */ 181 /* Nothing to do, just return existing appraised status */
179 if (!action) { 182 if (!action) {
180 if (must_appraise) 183 if (must_appraise)
181 rc = ima_get_cache_status(iint, function); 184 rc = ima_get_cache_status(iint, _func);
182 goto out_digsig; 185 goto out_digsig;
183 } 186 }
184 187
@@ -195,7 +198,7 @@ static int process_measurement(struct file *file, const char *filename,
195 if (action & IMA_MEASURE) 198 if (action & IMA_MEASURE)
196 ima_store_measurement(iint, file, pathname); 199 ima_store_measurement(iint, file, pathname);
197 if (action & IMA_APPRAISE_SUBMASK) 200 if (action & IMA_APPRAISE_SUBMASK)
198 rc = ima_appraise_measurement(function, iint, file, pathname); 201 rc = ima_appraise_measurement(_func, iint, file, pathname);
199 if (action & IMA_AUDIT) 202 if (action & IMA_AUDIT)
200 ima_audit_measurement(iint, pathname); 203 ima_audit_measurement(iint, pathname);
201 kfree(pathbuf); 204 kfree(pathbuf);
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
index 4d7c0ae656d..4adcd0f8c1d 100644
--- a/security/integrity/ima/ima_policy.c
+++ b/security/integrity/ima/ima_policy.c
@@ -220,10 +220,13 @@ retry:
220 220
221/* 221/*
222 * In addition to knowing that we need to appraise the file in general, 222 * In addition to knowing that we need to appraise the file in general,
223 * we need to differentiate between calling hooks. 223 * we need to differentiate between calling hooks, for hook specific rules.
224 */ 224 */
225static int get_subaction(int func) 225static int get_subaction(struct ima_rule_entry *rule, int func)
226{ 226{
227 if (!(rule->flags & IMA_FUNC))
228 return IMA_FILE_APPRAISE;
229
227 switch(func) { 230 switch(func) {
228 case MMAP_CHECK: 231 case MMAP_CHECK:
229 return IMA_MMAP_APPRAISE; 232 return IMA_MMAP_APPRAISE;
@@ -268,7 +271,7 @@ int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
268 271
269 action |= entry->action & IMA_DO_MASK; 272 action |= entry->action & IMA_DO_MASK;
270 if (entry->action & IMA_APPRAISE) 273 if (entry->action & IMA_APPRAISE)
271 action |= get_subaction(func); 274 action |= get_subaction(entry, func);
272 275
273 if (entry->action & IMA_DO_MASK) 276 if (entry->action & IMA_DO_MASK)
274 actmask &= ~(entry->action | entry->action << 1); 277 actmask &= ~(entry->action | entry->action << 1);