On 11/21/19 9:14 AM, Lakshmi Ramasubramanian wrote:
Hi Mimi,
process_buffer_measurement() needs to check if ima_policy_flag
is set to measure and\or appraise. Not doing this check can
result in kernel panic (such as when process_buffer_measurement()
is called before IMA is initialized).
This change adds the check in process_buffer_measurement()
to return immediately if ima_policy_flag is set to 0.
Signed-off-by: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
---
security/integrity/ima/ima_main.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 60027c643ecd..c9374430bb72 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -651,6 +651,9 @@ static void process_buffer_measurement(const void *buf, int size,
int pcr = CONFIG_IMA_MEASURE_PCR_IDX;
int action = 0;
+ if (!ima_policy_flag)
+ return;
+
Please let me know if the above change would be accepted as a standalone
patch (like the one in this patch),
or, I should include this change as one of the patches in the "Key
Measurement" patch set?
thanks,
-lakshmi