Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3180037imu; Mon, 19 Nov 2018 11:58:50 -0800 (PST) X-Google-Smtp-Source: AJdET5drL+lraHHT38XCPtVuarQoZU0Uiaex3Pn98fSaRUaVjryH82CK3T9151w1FhbI3d/rTiqX X-Received: by 2002:a62:113:: with SMTP id 19mr23956784pfb.176.1542657530090; Mon, 19 Nov 2018 11:58:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542657530; cv=none; d=google.com; s=arc-20160816; b=yP+lb5wAkR4X4aHldFN8ZDuK/Vmjp7U635s8fpIOAZtkXXx4Uyw0eJ+JnoWzWagDIO 7Dfd1KXRKQmZ1NVOvKIJnNQu1jvQ98Sc/rGFVOxqY0QzT+d35sYw3J5i0WBVgPpUhQO4 8c5p6k9uI0csPGAQrvcZ7xgWRXZSutBxr1UKRDXI8fV5G2bmas5L3puOzTEnePj5G6+C 8eX9Zs7nTXLgkNgt6KyNjQcvrcvEuPzpfYo0W2yrbO1E8Ln0Eiqrh8bObaXCIXdBcay2 omccWO79Wv/Eeg0vKNDQLz5/eYipbXvOYIqpKPTWWzanH6TnAYLJRcb4pBIofNei0ZP7 sDfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=PoGqWPMVYEthY7iKW70o2oELF4xd5PZR+p13EaluPuY=; b=KbDawj5kNjUY/1+zaTUWNt64SfVmoQVbywCgkhatXWw+j3ngR7yAiy4UPqssNIaIz9 4TnQOpReS4j2OOCM66GRfj7CNpHjP/dyrU9zKeVI+8VUAMOnUkHhS/M7eYApevBvEdq6 hzPWbHICuRLc3PW4M+eH0ox9QKDyuyMqyJepBVU4avG/casB/Otu5hrzipm4RRpxsbGu wllo5Mf5RpZbxqtIpa3g1IOoTysYIA7Ek0pVzuk1OsjG2gDi/1fSIYCR+/LVPtbU0PdT M6tcg7LL2eeUpO/4Qjd/Bx8C9w/GO9pl6NmNbnjxz49A1/dOHbYJnUq3dlISMy5dqvba Zl8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si10925268pgl.122.2018.11.19.11.58.34; Mon, 19 Nov 2018 11:58:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730556AbeKTGVj (ORCPT + 99 others); Tue, 20 Nov 2018 01:21:39 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:42324 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730215AbeKTGVj (ORCPT ); Tue, 20 Nov 2018 01:21:39 -0500 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wAJJsUuW005087 for ; Mon, 19 Nov 2018 14:56:28 -0500 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 2nv0qbqy5r-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 19 Nov 2018 14:56:27 -0500 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 19 Nov 2018 19:56:25 -0000 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 19 Nov 2018 19:56:23 -0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id wAJJuLIO2687318 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 19 Nov 2018 19:56:21 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 6B715A4064; Mon, 19 Nov 2018 19:56:21 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 37BFDA4054; Mon, 19 Nov 2018 19:56:20 +0000 (GMT) Received: from dhcp-9-31-102-82.watson.ibm.com (unknown [9.31.102.82]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 19 Nov 2018 19:56:20 +0000 (GMT) From: Mimi Zohar To: linux-integrity@vger.kernel.org Cc: Mimi Zohar , linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, dhowells@redhat.com, jforbes@redhat.com, seth.forshee@canonical.com, kexec@lists.infradead.org, Nayna Jain Subject: [PATCH 0/3] selftest/ima: fail kexec_load syscall Date: Mon, 19 Nov 2018 14:56:08 -0500 X-Mailer: git-send-email 2.7.5 X-TM-AS-GCONF: 00 x-cbid: 18111919-0012-0000-0000-000002CCE816 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18111919-0013-0000-0000-000021020D83 Message-Id: <1542657371-7019-1-git-send-email-zohar@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-11-19_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=6 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=338 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1811190178 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The "ima: add support for arch specific policies" patch set introduced architecture specific policies, including an x86 policy which prevents loading a kernel image via the kexec_load syscall. This patch set preq's that patch set, adding a missing kexec_load syscall failure message, extending the existing support for detecting secureboot mode, and defining a kexec_load syscall selftest to simplify testing. To run the kexec_load test requires root privileges. Execute: "sudo make TARGETS=ima kselftest". With secure boot enabled, the kexec_load fails, but the test succeeds. selftests: ima: test_kexec_load.sh ======================================== ./test_kexec_load.sh: kexec_load failed [PASS] ok 1..1 selftests: ima: test_kexec_load.sh [PASS] Mimi Mimi Zohar (3): ima: add error mesage to kexec_load selftests/ima: kexec_load syscall test x86/ima: retry detecting secure boot mode arch/x86/kernel/Makefile | 2 + arch/x86/kernel/ima_arch.c | 46 +++++++++++++++++++++- include/linux/ima.h | 2 +- security/integrity/ima/ima_main.c | 4 +- tools/testing/selftests/Makefile | 1 + tools/testing/selftests/ima/Makefile | 11 ++++++ tools/testing/selftests/ima/config | 4 ++ tools/testing/selftests/ima/test_kexec_load.sh | 54 ++++++++++++++++++++++++++ 8 files changed, 120 insertions(+), 4 deletions(-) create mode 100644 tools/testing/selftests/ima/Makefile create mode 100644 tools/testing/selftests/ima/config create mode 100755 tools/testing/selftests/ima/test_kexec_load.sh -- 2.7.5