From: Lakshmi Ramasubramanian Date: Wed, 11 Dec 2019 16:47:02 +0000 (-0800) Subject: IMA: Check IMA policy flag X-Git-Tag: v5.5.6~264 X-Git-Url: https://www.infradead.org/git/?a=commitdiff_plain;h=487c47c6ddeb82b345b03cb11b83e62ae36573e6;p=users%2Fdwmw2%2Flinux.git IMA: Check IMA policy flag [ Upstream commit c5563bad88e07017e08cce1142903e501598c80c ] process_buffer_measurement() may be called prior to IMA being initialized (for instance, when the IMA hook is called when a key is added to the .builtin_trusted_keys keyring), which would result in a kernel panic. This patch adds the check in process_buffer_measurement() to return immediately if IMA is not initialized yet. Signed-off-by: Lakshmi Ramasubramanian Signed-off-by: Mimi Zohar Signed-off-by: Sasha Levin --- diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index d7e987baf1274..9b35db2fc777a 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -655,6 +655,9 @@ void process_buffer_measurement(const void *buf, int size, int action = 0; u32 secid; + if (!ima_policy_flag) + return; + /* * Both LSM hooks and auxilary based buffer measurements are * based on policy. To avoid code duplication, differentiate