ima: require secure_boot rules in lockdown mode
authorMimi Zohar <zohar@linux.vnet.ibm.com>
Mon, 18 Feb 2019 12:44:58 +0000 (12:44 +0000)
committerSalvatore Bonaccorso <carnil@debian.org>
Sat, 7 Dec 2019 12:24:06 +0000 (12:24 +0000)
Require the "secure_boot" rules, whether or not it is specified
on the boot command line, for both the builtin and custom policies
in secure boot lockdown mode.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name 0003-ima-require-secure_boot-rules-in-lockdown-mode.patch

security/integrity/ima/ima_policy.c

index 6df7f641ff66658e7793185a51c04862e7100728..c411234e775b9c0206e48dde165b096d69d95e99 100644 (file)
@@ -643,6 +643,7 @@ static int __init ima_init_arch_policy(void)
 void __init ima_init_policy(void)
 {
        int build_appraise_entries, arch_entries;
+       bool kernel_locked_down = __kernel_is_locked_down(NULL, false);
 
        /* if !ima_policy, we load NO default rules */
        if (ima_policy)
@@ -680,7 +681,7 @@ void __init ima_init_policy(void)
         * Insert the builtin "secure_boot" policy rules requiring file
         * signatures, prior to other appraise rules.
         */
-       if (ima_use_secure_boot)
+       if (ima_use_secure_boot || kernel_locked_down)
                add_rules(secure_boot_rules, ARRAY_SIZE(secure_boot_rules),
                          IMA_DEFAULT_POLICY);