Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 352847
b: refs/heads/master
c: 5a73fcf
h: refs/heads/master
i:
  352845: 965d731
  352843: 866d259
  352839: 7417e0a
  352831: 1e7a4cd
v: v3
  • Loading branch information
Mimi Zohar committed Jan 22, 2013
1 parent 7b34395 commit e9ffb29
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 7 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: d79d72e02485c00b886179538dc8deaffa3be507
refs/heads/master: 5a73fcfa8875a94c2956e7ff8fba54d31a3e2854
9 changes: 6 additions & 3 deletions trunk/security/integrity/ima/ima_main.c
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ static int process_measurement(struct file *file, const char *filename,
struct integrity_iint_cache *iint;
char *pathbuf = NULL;
const char *pathname = NULL;
int rc = -ENOMEM, action, must_appraise;
int rc = -ENOMEM, action, must_appraise, _func;

if (!ima_initialized || !S_ISREG(inode->i_mode))
return 0;
Expand All @@ -161,6 +161,9 @@ static int process_measurement(struct file *file, const char *filename,

must_appraise = action & IMA_APPRAISE;

/* Is the appraise rule hook specific? */
_func = (action & IMA_FILE_APPRAISE) ? FILE_CHECK : function;

mutex_lock(&inode->i_mutex);

iint = integrity_inode_get(inode);
Expand All @@ -178,7 +181,7 @@ static int process_measurement(struct file *file, const char *filename,
/* Nothing to do, just return existing appraised status */
if (!action) {
if (must_appraise)
rc = ima_get_cache_status(iint, function);
rc = ima_get_cache_status(iint, _func);
goto out_digsig;
}

Expand All @@ -195,7 +198,7 @@ static int process_measurement(struct file *file, const char *filename,
if (action & IMA_MEASURE)
ima_store_measurement(iint, file, pathname);
if (action & IMA_APPRAISE_SUBMASK)
rc = ima_appraise_measurement(function, iint, file, pathname);
rc = ima_appraise_measurement(_func, iint, file, pathname);
if (action & IMA_AUDIT)
ima_audit_measurement(iint, pathname);
kfree(pathbuf);
Expand Down
9 changes: 6 additions & 3 deletions trunk/security/integrity/ima/ima_policy.c
Original file line number Diff line number Diff line change
Expand Up @@ -220,10 +220,13 @@ static bool ima_match_rules(struct ima_rule_entry *rule,

/*
* In addition to knowing that we need to appraise the file in general,
* we need to differentiate between calling hooks.
* we need to differentiate between calling hooks, for hook specific rules.
*/
static int get_subaction(int func)
static int get_subaction(struct ima_rule_entry *rule, int func)
{
if (!(rule->flags & IMA_FUNC))
return IMA_FILE_APPRAISE;

switch(func) {
case MMAP_CHECK:
return IMA_MMAP_APPRAISE;
Expand Down Expand Up @@ -268,7 +271,7 @@ int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,

action |= entry->action & IMA_DO_MASK;
if (entry->action & IMA_APPRAISE)
action |= get_subaction(func);
action |= get_subaction(entry, func);

if (entry->action & IMA_DO_MASK)
actmask &= ~(entry->action | entry->action << 1);
Expand Down

0 comments on commit e9ffb29

Please sign in to comment.