Received: by 10.192.165.148 with SMTP id m20csp785221imm; Wed, 2 May 2018 08:46:24 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpx1QDa8KvVF2HBE1GEpmun26r69GiAY6jwGeWbN8mae7ri3QSm1/Tp2uD9k4F1LQcn94Pg X-Received: by 10.98.138.68 with SMTP id y65mr19713108pfd.110.1525275984377; Wed, 02 May 2018 08:46:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525275984; cv=none; d=google.com; s=arc-20160816; b=vKGSqYvNrfMs9FYS9AZNrd1cZmrRG+ZtbBq7O5LYwslGvi2bs/0XJSVNMUi+/scjN3 JiVPmauY+pilje62uZ8IUcoTWy/hoF2bkyGJOM6c76+6L474UCCfuDSwkvShCwxpYpQd ulieUctyRajDhMyXpzfHXt5nlVkeZCGioe9U1Y/sHQwvDSDHQZOYXOfSs27VGtrv0V6S BDxFlL/y7VWzLrzx5y251u4zqfpc/HNlITlZv0SCVmVAdOk0Ft+jkp9leKTwTcHpb9SI xZnczfj4jKLXz65a+ut3koZt5zIKSNwidlgZucEIIlc6ZVFARM0t2c8OoVnHpN1QzAiq Dp8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=EhLctBKiZu9IiU9SP8Zy0pBzdLnR04Tmv5WEy2iTUZU=; b=dCjD1Ewv0ugk519F4r4zmXHCZQHmEkFvIvVxzYwKXcbyrEQZ9nlUFJi2kLU3hvbFpQ 8dlCdZ6dPOpgJL4JuUwjvf2woGJZI18tYFXTXonS120KmiKy8K34jYLPDcm3BC+RMrWC 2DFipHZe66QJhdgvm9gvGCpR3CyMPsBNzq+DDlOc7vF2AClU0yY3DNSvrghsFRgfzkub jJPa4/DFtbOBrr9j/npyefmjiXhY8EJn8dBZ1+/a1OAPnCGy4kLwXHdoBqKraw17llP8 6CI0yHP4EiyZP8liY0k1t+iwFYQAWR5EFEGFSTxQXPBxTG1RVSNt67P6XsowayN7Mhz1 e+HA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n26-v6si9822643pgc.677.2018.05.02.08.46.10; Wed, 02 May 2018 08:46:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751899AbeEBPpT (ORCPT + 99 others); Wed, 2 May 2018 11:45:19 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:46564 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751862AbeEBPpP (ORCPT ); Wed, 2 May 2018 11:45:15 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w42Fj2vF044269 for ; Wed, 2 May 2018 11:45:15 -0400 Received: from e06smtp11.uk.ibm.com (e06smtp11.uk.ibm.com [195.75.94.107]) by mx0b-001b2d01.pphosted.com with ESMTP id 2hqe0hpxjb-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 02 May 2018 11:45:14 -0400 Received: from localhost by e06smtp11.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 2 May 2018 16:45:11 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp11.uk.ibm.com (192.168.101.141) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 2 May 2018 16:45:07 +0100 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w42Fj7Me66977878; Wed, 2 May 2018 15:45:07 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 45BDA11C05B; Wed, 2 May 2018 16:36:42 +0100 (BST) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 560D811C04A; Wed, 2 May 2018 16:36:41 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.107.182]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 2 May 2018 16:36:41 +0100 (BST) Subject: Re: [PATCH 2/3] kexec: call LSM hook for kexec_load syscall From: Mimi Zohar To: "Eric W. Biederman" Cc: David Howells , Matthew Garrett , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org Date: Wed, 02 May 2018 11:45:04 -0400 In-Reply-To: <87h8nqglpx.fsf@xmission.com> References: <1523572911-16363-1-git-send-email-zohar@linux.vnet.ibm.com> <1523572911-16363-3-git-send-email-zohar@linux.vnet.ibm.com> <87h8nqglpx.fsf@xmission.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18050215-0040-0000-0000-0000045431C8 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18050215-0041-0000-0000-000020F8531F Message-Id: <1525275904.5669.308.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-02_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805020131 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2018-05-02 at 09:45 -0500, Eric W. Biederman wrote: > Mimi Zohar writes: > > > Allow LSMs and IMA to differentiate between the kexec_load and > > kexec_file_load syscalls by adding an "unnecessary" call to > > security_kernel_read_file() in kexec_load. This would be similar to the > > existing init_module syscall calling security_kernel_read_file(). > > Given the reasonable desire to load a policy that ensures everything > has a signature I don't have fundamental objections. > > security_kernel_read_file as a hook seems an odd choice. At the very > least it has a bad name because there is no file reading going on here. > > I am concerned that I don't see CONFIG_KEXEC_VERIFY_SIG being tested > anywhere. Which means I could have a kernel compiled without that and I > would be allowed to use kexec_file_load without signature checking. > While kexec_load would be denied. > > Am I missing something here? The kexec_file_load() calls kernel_read_file_from_fd(), which in turn calls security_kernel_read_file().  So kexec_file_load and kexec_load syscall would be using the same method for enforcing signature verification. This is independent of the architecture specific method for verifying signatures.  The coordination between these two methods was included in the lockdown patch set, but is being removed, as well the gating of kexec_load syscall.  Instead of being based on the lockdown flag, I assume the coordination between the two methods will reappear based on a secure boot flag of some sort. Mimi > > > Signed-off-by: Mimi Zohar > > --- > > kernel/kexec.c | 11 +++++++++++ > > 1 file changed, 11 insertions(+) > > > > diff --git a/kernel/kexec.c b/kernel/kexec.c > > index aed8fb2564b3..d1386cfc6796 100644 > > --- a/kernel/kexec.c > > +++ b/kernel/kexec.c > > @@ -11,6 +11,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -195,11 +196,21 @@ static int do_kexec_load(unsigned long entry, unsigned long nr_segments, > > static inline int kexec_load_check(unsigned long nr_segments, > > unsigned long flags) > > { > > + int result; > > + > > /* We only trust the superuser with rebooting the system. */ > > if (!capable(CAP_SYS_BOOT) || kexec_load_disabled) > > return -EPERM; > > > > /* > > + * Allow LSMs and IMA to differentiate between kexec_load and > > + * kexec_file_load syscalls. > > + */ > > + result = security_kernel_read_file(NULL, READING_KEXEC_IMAGE); > > + if (result < 0) > > + return result; > > + > > + /* > > * Verify we have a legal set of flags > > * This leaves us room for future extensions. > > */ >