Commit 5a73fcfa authored by Mimi Zohar's avatar Mimi Zohar

ima: differentiate appraise status only for hook specific rules

Different hooks can require different methods for appraising a
file's integrity.  As a result, an integrity appraisal status is
cached on a per hook basis.

Only a hook specific rule, requires the inode to be re-appraised.
This patch eliminates unnecessary appraisals.
Signed-off-by: default avatarMimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: default avatarDmitry Kasatkin <dmitry.kasatkin@intel.com>
parent d79d72e0
...@@ -146,7 +146,7 @@ static int process_measurement(struct file *file, const char *filename, ...@@ -146,7 +146,7 @@ static int process_measurement(struct file *file, const char *filename,
struct integrity_iint_cache *iint; struct integrity_iint_cache *iint;
char *pathbuf = NULL; char *pathbuf = NULL;
const char *pathname = NULL; const char *pathname = NULL;
int rc = -ENOMEM, action, must_appraise; int rc = -ENOMEM, action, must_appraise, _func;
if (!ima_initialized || !S_ISREG(inode->i_mode)) if (!ima_initialized || !S_ISREG(inode->i_mode))
return 0; return 0;
...@@ -161,6 +161,9 @@ static int process_measurement(struct file *file, const char *filename, ...@@ -161,6 +161,9 @@ static int process_measurement(struct file *file, const char *filename,
must_appraise = action & IMA_APPRAISE; must_appraise = action & IMA_APPRAISE;
/* Is the appraise rule hook specific? */
_func = (action & IMA_FILE_APPRAISE) ? FILE_CHECK : function;
mutex_lock(&inode->i_mutex); mutex_lock(&inode->i_mutex);
iint = integrity_inode_get(inode); iint = integrity_inode_get(inode);
...@@ -178,7 +181,7 @@ static int process_measurement(struct file *file, const char *filename, ...@@ -178,7 +181,7 @@ static int process_measurement(struct file *file, const char *filename,
/* Nothing to do, just return existing appraised status */ /* Nothing to do, just return existing appraised status */
if (!action) { if (!action) {
if (must_appraise) if (must_appraise)
rc = ima_get_cache_status(iint, function); rc = ima_get_cache_status(iint, _func);
goto out_digsig; goto out_digsig;
} }
...@@ -195,7 +198,7 @@ static int process_measurement(struct file *file, const char *filename, ...@@ -195,7 +198,7 @@ static int process_measurement(struct file *file, const char *filename,
if (action & IMA_MEASURE) if (action & IMA_MEASURE)
ima_store_measurement(iint, file, pathname); ima_store_measurement(iint, file, pathname);
if (action & IMA_APPRAISE_SUBMASK) if (action & IMA_APPRAISE_SUBMASK)
rc = ima_appraise_measurement(function, iint, file, pathname); rc = ima_appraise_measurement(_func, iint, file, pathname);
if (action & IMA_AUDIT) if (action & IMA_AUDIT)
ima_audit_measurement(iint, pathname); ima_audit_measurement(iint, pathname);
kfree(pathbuf); kfree(pathbuf);
......
...@@ -220,10 +220,13 @@ static bool ima_match_rules(struct ima_rule_entry *rule, ...@@ -220,10 +220,13 @@ static bool ima_match_rules(struct ima_rule_entry *rule,
/* /*
* In addition to knowing that we need to appraise the file in general, * In addition to knowing that we need to appraise the file in general,
* we need to differentiate between calling hooks. * we need to differentiate between calling hooks, for hook specific rules.
*/ */
static int get_subaction(int func) static int get_subaction(struct ima_rule_entry *rule, int func)
{ {
if (!(rule->flags & IMA_FUNC))
return IMA_FILE_APPRAISE;
switch(func) { switch(func) {
case MMAP_CHECK: case MMAP_CHECK:
return IMA_MMAP_APPRAISE; return IMA_MMAP_APPRAISE;
...@@ -268,7 +271,7 @@ int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask, ...@@ -268,7 +271,7 @@ int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
action |= entry->action & IMA_DO_MASK; action |= entry->action & IMA_DO_MASK;
if (entry->action & IMA_APPRAISE) if (entry->action & IMA_APPRAISE)
action |= get_subaction(func); action |= get_subaction(entry, func);
if (entry->action & IMA_DO_MASK) if (entry->action & IMA_DO_MASK)
actmask &= ~(entry->action | entry->action << 1); actmask &= ~(entry->action | entry->action << 1);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment