|
@@ -49,6 +49,7 @@
|
|
|
|
|
|
int ima_policy_flag;
|
|
|
static int temp_ima_appraise;
|
|
|
+static int build_ima_appraise __ro_after_init;
|
|
|
|
|
|
#define MAX_LSM_RULES 6
|
|
|
enum lsm_rule_types { LSM_OBJ_USER, LSM_OBJ_ROLE, LSM_OBJ_TYPE,
|
|
@@ -162,6 +163,25 @@ static struct ima_rule_entry default_appraise_rules[] __ro_after_init = {
|
|
|
#endif
|
|
|
};
|
|
|
|
|
|
+static struct ima_rule_entry build_appraise_rules[] __ro_after_init = {
|
|
|
+#ifdef CONFIG_IMA_APPRAISE_REQUIRE_MODULE_SIGS
|
|
|
+ {.action = APPRAISE, .func = MODULE_CHECK,
|
|
|
+ .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
|
|
+#endif
|
|
|
+#ifdef CONFIG_IMA_APPRAISE_REQUIRE_FIRMWARE_SIGS
|
|
|
+ {.action = APPRAISE, .func = FIRMWARE_CHECK,
|
|
|
+ .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
|
|
+#endif
|
|
|
+#ifdef CONFIG_IMA_APPRAISE_REQUIRE_KEXEC_SIGS
|
|
|
+ {.action = APPRAISE, .func = KEXEC_KERNEL_CHECK,
|
|
|
+ .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
|
|
+#endif
|
|
|
+#ifdef CONFIG_IMA_APPRAISE_REQUIRE_POLICY_SIGS
|
|
|
+ {.action = APPRAISE, .func = POLICY_CHECK,
|
|
|
+ .flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
|
|
+#endif
|
|
|
+};
|
|
|
+
|
|
|
static struct ima_rule_entry secure_boot_rules[] __ro_after_init = {
|
|
|
{.action = APPRAISE, .func = MODULE_CHECK,
|
|
|
.flags = IMA_FUNC | IMA_DIGSIG_REQUIRED},
|
|
@@ -435,7 +455,7 @@ void ima_update_policy_flag(void)
|
|
|
ima_policy_flag |= entry->action;
|
|
|
}
|
|
|
|
|
|
- ima_appraise |= temp_ima_appraise;
|
|
|
+ ima_appraise |= (build_ima_appraise | temp_ima_appraise);
|
|
|
if (!ima_appraise)
|
|
|
ima_policy_flag &= ~IMA_APPRAISE;
|
|
|
}
|
|
@@ -448,6 +468,8 @@ static int ima_appraise_flag(enum ima_hooks func)
|
|
|
return IMA_APPRAISE_FIRMWARE;
|
|
|
else if (func == POLICY_CHECK)
|
|
|
return IMA_APPRAISE_POLICY;
|
|
|
+ else if (func == KEXEC_KERNEL_CHECK)
|
|
|
+ return IMA_APPRAISE_KEXEC;
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
@@ -486,8 +508,8 @@ void __init ima_init_policy(void)
|
|
|
}
|
|
|
|
|
|
/*
|
|
|
- * Insert the appraise rules requiring file signatures, prior to
|
|
|
- * any other appraise rules.
|
|
|
+ * Insert the builtin "secure_boot" policy rules requiring file
|
|
|
+ * signatures, prior to any other appraise rules.
|
|
|
*/
|
|
|
for (i = 0; i < secure_boot_entries; i++) {
|
|
|
list_add_tail(&secure_boot_rules[i].list, &ima_default_rules);
|
|
@@ -495,6 +517,26 @@ void __init ima_init_policy(void)
|
|
|
ima_appraise_flag(secure_boot_rules[i].func);
|
|
|
}
|
|
|
|
|
|
+ /*
|
|
|
+ * Insert the build time appraise rules requiring file signatures
|
|
|
+ * for both the initial and custom policies, prior to other appraise
|
|
|
+ * rules.
|
|
|
+ */
|
|
|
+ for (i = 0; i < ARRAY_SIZE(build_appraise_rules); i++) {
|
|
|
+ struct ima_rule_entry *entry;
|
|
|
+
|
|
|
+ if (!secure_boot_entries)
|
|
|
+ list_add_tail(&build_appraise_rules[i].list,
|
|
|
+ &ima_default_rules);
|
|
|
+
|
|
|
+ entry = kmemdup(&build_appraise_rules[i], sizeof(*entry),
|
|
|
+ GFP_KERNEL);
|
|
|
+ if (entry)
|
|
|
+ list_add_tail(&entry->list, &ima_policy_rules);
|
|
|
+ build_ima_appraise |=
|
|
|
+ ima_appraise_flag(build_appraise_rules[i].func);
|
|
|
+ }
|
|
|
+
|
|
|
for (i = 0; i < appraise_entries; i++) {
|
|
|
list_add_tail(&default_appraise_rules[i].list,
|
|
|
&ima_default_rules);
|