Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1685186pxf; Fri, 19 Mar 2021 13:06:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx9HC3XT3S6p0OiWo5jdHgZZvYApy9BfIJzuyC0PUWs8U9tsrpkhABnsn85S2ZFAKKO5mdf X-Received: by 2002:a05:6402:4244:: with SMTP id g4mr11712026edb.204.1616184380542; Fri, 19 Mar 2021 13:06:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616184380; cv=none; d=google.com; s=arc-20160816; b=ZXkzGw4yu2Olt0xKaBURNq5VNt/VbPvUup+OlvZm4IqTTDWv9p84aVxPkuh/16nlmy o/odDPYOSWacoz28SDMdZamtQRVIL2RmXyLpNYcGE/C4d9qwk9/00HTq7ErbKwdbUowY +oiKOmwTsOtIJOfWJvwWQRInqL/RC0IDO2zflbIv4A7J3WJMVhJdLzr+9Kg5foXpPD8a 29rldGrEkzqs3r8n5/Gj8Ay3UQu9iL6zOm8F5qM2viox8tcV626Ou1Nf/V3YtOaN4SHO khrsvdkqJAVYkeAu3rttHHtKMUc8cD9upERmYekBSuy+GKd8d8/y/daDrqJ/Ghl5kO5o qXRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bK+JXs12xOWgzRK2d9NUjHcvEDRCeXPN3ChdaM5lhbk=; b=VoQHFytDtvr7nfQO7Ik7Dm9zc1+81WoKNPqn/5ad9nlZuanVTfitt5RP9Gkd3zj8u3 cU45W46d/YCiteT+xImwTOpTD8gtFu2MINvufDeN0oqn3yzpki9J1jphfizcWA7Ws5bK 6ce+KXQtFLfSi4PRGIzkuwW226WrcK/Wy1t+HugOEYAbjsXc7tzlTYcoDstuFymwfsal OTaSt7Ab/HBxjQrdPZvPhHH6xJE3d5eqzuLa67uJFJmj3FxMKNjUXFjhRP8ssGnHKL7i 80lUXQCVcdqihfSSEeo4NR4JQxcz6e5Q+5klqs1GejZNBvTjKa3mWJdkANXIEY7FOlN6 2b9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b="o/xZU6JN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cx18si4936911ejb.543.2021.03.19.13.05.56; Fri, 19 Mar 2021 13:06:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b="o/xZU6JN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230235AbhCSUE6 (ORCPT + 99 others); Fri, 19 Mar 2021 16:04:58 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:8612 "EHLO mx0b-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229912AbhCSUEW (ORCPT ); Fri, 19 Mar 2021 16:04:22 -0400 Received: from pps.filterd (m0127361.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 12JK3PbM088662; Fri, 19 Mar 2021 16:04:12 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=pp1; bh=bK+JXs12xOWgzRK2d9NUjHcvEDRCeXPN3ChdaM5lhbk=; b=o/xZU6JNTXhqHix71J5GadNCkDfIWrN5yMZOl63XQu27mcYCGyNOWCU63/WUQtOSJFmF MPsZvY6v/POJmM06tK8CwJ4Ib1i3uOPWfKIqPjaNa1sTid1oEVCwc+zW5Mfu62eA3a/5 1xUjWlKkbXGgAWL5raMU3jvzT9emZPg1f6tvspq/ZeLcE71AKJRJtChNvs2FRfNI9MWa Bexgb22V1m2rWNkX8QdogcN8RXaKVHGlPVKY/7qFAAK4Lk915zaBxLPixRLR0anxGqNi H1KrHw4ODV0Bikm/b0UH5DA/SBSLgsN19gK6UpET5xpkv8VChIKPQENg+/mmpKzjXIa5 iQ== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 37c2vqnq3k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 19 Mar 2021 16:04:12 -0400 Received: from m0127361.ppops.net (m0127361.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 12JK4BEm091537; Fri, 19 Mar 2021 16:04:11 -0400 Received: from ppma03fra.de.ibm.com (6b.4a.5195.ip4.static.sl-reverse.com [149.81.74.107]) by mx0a-001b2d01.pphosted.com with ESMTP id 37c2vqnq30-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 19 Mar 2021 16:04:11 -0400 Received: from pps.filterd (ppma03fra.de.ibm.com [127.0.0.1]) by ppma03fra.de.ibm.com (8.16.0.43/8.16.0.43) with SMTP id 12JJwPAh016089; Fri, 19 Mar 2021 20:04:09 GMT Received: from b06cxnps4075.portsmouth.uk.ibm.com (d06relay12.portsmouth.uk.ibm.com [9.149.109.197]) by ppma03fra.de.ibm.com with ESMTP id 378n18b6gh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 19 Mar 2021 20:04:09 +0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 12JK47Ex328356 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 19 Mar 2021 20:04:07 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 01E645204F; Fri, 19 Mar 2021 20:04:07 +0000 (GMT) Received: from li-f45666cc-3089-11b2-a85c-c57d1a57929f.ibm.com.ibmuc.com (unknown [9.211.66.110]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 6164B52051; Fri, 19 Mar 2021 20:04:04 +0000 (GMT) From: Mimi Zohar To: Dmitry Vyukov Cc: linux-integrity@vger.kernel.org, Test , James Morris , "Serge E . Hallyn" , linux-security-module , LKML , Eric Biggers , Mimi Zohar Subject: [RFC PATCH 1/2] ima: don't access a file's integrity status before an IMA policy is loaded Date: Fri, 19 Mar 2021 16:03:57 -0400 Message-Id: <20210319200358.22816-1-zohar@linux.ibm.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369,18.0.761 definitions=2021-03-19_10:2021-03-19,2021-03-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 priorityscore=1501 impostorscore=0 phishscore=0 mlxlogscore=999 mlxscore=0 bulkscore=0 suspectscore=0 spamscore=0 clxscore=1015 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103190135 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Test Only after an IMA policy is loaded, check, save, or update the cached file's integrity status. Signed-off-by: Mimi Zohar --- security/integrity/ima/ima_main.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index 9ef748ea829f..9d1196f712e1 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -606,6 +606,9 @@ void ima_post_create_tmpfile(struct user_namespace *mnt_userns, struct integrity_iint_cache *iint; int must_appraise; + if (!ima_policy_flag || !S_ISREG(inode->i_mode)) + return; + must_appraise = ima_must_appraise(mnt_userns, inode, MAY_ACCESS, FILE_CHECK); if (!must_appraise) @@ -636,6 +639,9 @@ void ima_post_path_mknod(struct user_namespace *mnt_userns, struct inode *inode = dentry->d_inode; int must_appraise; + if (!ima_policy_flag || !S_ISREG(inode->i_mode)) + return; + must_appraise = ima_must_appraise(mnt_userns, inode, MAY_ACCESS, FILE_CHECK); if (!must_appraise) -- 2.27.0