Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2636775yba; Fri, 10 May 2019 15:39:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwip3rBCKH3AVpULqlDVRKoZoJzWI49CITxkXJ7TZN4mRZoqIff6ccHPEjh/Lkw0Iji2pgU X-Received: by 2002:a63:b00e:: with SMTP id h14mr12745683pgf.321.1557527943854; Fri, 10 May 2019 15:39:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557527943; cv=none; d=google.com; s=arc-20160816; b=y4P3TsEefAzN+Ge+yB09JoYTVqzv9k88secj+vhE8n+r8xZ/ihz7qkwVV1Zy3lg135 jLVktJVbs0wWyfnPrnZsmwqhAZtzCmmHiNCJNE21zvuzPjrV0RJARwlvZ3mCe3d84UNb td9cLonihSrrbCVh4WkQM77eEJeM5s5cgMkioLviqjCjz7PHuL7JHt8HVpl4flkWGzth IPVg9WOOkJvy6vasCDVPHLG71YPQDbNKIEkofDJvTtYMqASiJWA/v4pvxhX4ok5G6NES m+QG3UVwmjhHTNvf8Xbkz8G8M3+YJ06EPFQALmZNeYi8eYe2t+Do28a3WpriSBg5eZ/y KA1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=e1vSiCdUVKh9pomgrsWeaE92mMm3stHN786AFawSpZE=; b=JMws97/NdwkN71iW2kIQryCvbI+HTUnx2cfFkb/eW7tCS9K71qv1TYgJKwyHS6R35S juZpJ9v8rooDjwab+Qaac8CH3oIbnfSMq7nXNK1GITD76cuTIM6zY9B+F534flIrR1eZ 21sp6KpfjSnrHKplYmiqnrGN8SVBei2erecAmjaJieaaORNzjG0GLU+82rwIbCoytHMr HgS9T1sSWxowo+qRwHqotQXmYStcg06CyHimz95mZd/41tz7xKCYnkIq+Uq89Wmdt/je SQ1sixA5N7T4cEwRoblBt6LSkWL5016xPJg8HbccJT5nsQLLJpzF7JuZS6g5T7LNfriJ +gjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="oGXftfG/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q73si9338486pfi.5.2019.05.10.15.38.48; Fri, 10 May 2019 15:39:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="oGXftfG/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728079AbfEJWiA (ORCPT + 99 others); Fri, 10 May 2019 18:38:00 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:41104 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726875AbfEJWh6 (ORCPT ); Fri, 10 May 2019 18:37:58 -0400 Received: by mail-pg1-f195.google.com with SMTP id z3so3654068pgp.8; Fri, 10 May 2019 15:37:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=e1vSiCdUVKh9pomgrsWeaE92mMm3stHN786AFawSpZE=; b=oGXftfG/vw5kINI2V2f27Fe9gEYqCyXUrP5naMz78VuO6h3eLcmHOBWCAuAApvPDft /nVm8gbs3e3wfIsoPguZXelbHZA8oHNN3wVCeVCAf2mIlOxqkiDKX8958lZrPr30QGAh yRnMcOQZipcE6F5RB3aN8z/Sb9Zkd/WdYQHkQTPb6cdRb7a1hM0bDnksdeuVPY5kwGBA dFSbsur9+B5Hn+JVs3anl/FelwXk871W//XR6ePXBTc0FVTmqZ+Udppo0LR2BF5+aX28 XuANk3wMq5XGs7nqtQDLBi4A55OFArXrsALn4hmovLidMurK+3Lx6KbjLBMDSS537kqj DibA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=e1vSiCdUVKh9pomgrsWeaE92mMm3stHN786AFawSpZE=; b=Ch1HJY5rcnBa3MvNseVR23cQnLys1uFPpUGw6ieJfCzGfUapnt2iojk459//rBJ4N6 C4z6dFi9OR4Aw9YmB2W28BLY6uz7/UuUlCb9ox82cWbb67OGfhsdUtdGdBAxA9le0QQm F3/AKovFuoTHWq7GIQRF6cuo2+urHzUEvOu+oN02nhBiGLmpDz9a9gmvekEnW+8eFzLu 7HwSkay7rAOdJvrauoHrCyTFeCdWEJA9vLNqxM2/9p2JkcK/cKE5TmailEDprx+pm7V8 FZzcix1MFKkmmNcQwUSIXo4sPCoukWev7b1ZMFB9FsJV3btdLzhD5T3+yOE/+SDzrInQ VnIQ== X-Gm-Message-State: APjAAAXtdbIeFH9kGgh/kd2X9Jca4oIPz0s3m22efsNn777uV1cFTKEK yZQ9vnAhPY6LhqdMHPHJ2Cmx67HrqnY= X-Received: by 2002:a63:b48:: with SMTP id a8mr15816474pgl.368.1557527877170; Fri, 10 May 2019 15:37:57 -0700 (PDT) Received: from prsriva-linux.corp.microsoft.com ([2001:4898:80e8:a:1d1b:db59:93e9:eab5]) by smtp.gmail.com with ESMTPSA id r74sm12459430pfa.71.2019.05.10.15.37.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 May 2019 15:37:56 -0700 (PDT) From: Prakhar Srivastava X-Google-Original-From: Prakhar Srivastava To: linux-integrity@vger.kernel.org, inux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Cc: zohar@linux.ibm.com, ebiederm@xmission.com, vgoyal@redhat.com, prsriva@microsoft.com, Prakhar Srivastava Subject: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline Date: Fri, 10 May 2019 15:37:42 -0700 Message-Id: <20190510223744.10154-2-prsriva02@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190510223744.10154-1-prsriva02@gmail.com> References: <20190510223744.10154-1-prsriva02@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Prakhar Srivastava For secure boot attestation, it is necessary to measure the kernel command line and the kernel version. For cold boot, the boot loader can be enhanced to measure these parameters. However, for attestation across soft reboot boundary, these values also need to be measured during kexec. For this reason, this patch adds support for measuring these parameters during kexec. To achive this, a new ima policy and hook id, defined KEXEC_CMDLINE and ima_kexec_cmdline respectively, are added. Signed-off-by: Prakhar Srivastava --- Documentation/ABI/testing/ima_policy | 1 + include/linux/ima.h | 2 + security/integrity/ima/ima.h | 1 + security/integrity/ima/ima_api.c | 1 + security/integrity/ima/ima_main.c | 84 ++++++++++++++++++++++++++++ security/integrity/ima/ima_policy.c | 9 +++ 6 files changed, 98 insertions(+) diff --git a/Documentation/ABI/testing/ima_policy b/Documentation/ABI/testing/ima_policy index 74c6702de74e..62e7cd687e9c 100644 --- a/Documentation/ABI/testing/ima_policy +++ b/Documentation/ABI/testing/ima_policy @@ -29,6 +29,7 @@ Description: base: func:= [BPRM_CHECK][MMAP_CHECK][CREDS_CHECK][FILE_CHECK][MODULE_CHECK] [FIRMWARE_CHECK] [KEXEC_KERNEL_CHECK] [KEXEC_INITRAMFS_CHECK] + [KEXEC_CMDLINE] mask:= [[^]MAY_READ] [[^]MAY_WRITE] [[^]MAY_APPEND] [[^]MAY_EXEC] fsmagic:= hex value diff --git a/include/linux/ima.h b/include/linux/ima.h index dc12fbcf484c..2e2c77280be8 100644 --- a/include/linux/ima.h +++ b/include/linux/ima.h @@ -26,6 +26,7 @@ extern int ima_read_file(struct file *file, enum kernel_read_file_id id); extern int ima_post_read_file(struct file *file, void *buf, loff_t size, enum kernel_read_file_id id); extern void ima_post_path_mknod(struct dentry *dentry); +extern void ima_kexec_cmdline(const void *buf, int size); #ifdef CONFIG_IMA_KEXEC extern void ima_add_kexec_buffer(struct kimage *image); @@ -92,6 +93,7 @@ static inline void ima_post_path_mknod(struct dentry *dentry) return; } +static inline void ima_kexec_cmdline(const void *buf, int size) {} #endif /* CONFIG_IMA */ #ifndef CONFIG_IMA_KEXEC diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h index d213e835c498..226a26d8de09 100644 --- a/security/integrity/ima/ima.h +++ b/security/integrity/ima/ima.h @@ -184,6 +184,7 @@ static inline unsigned long ima_hash_key(u8 *digest) hook(KEXEC_KERNEL_CHECK) \ hook(KEXEC_INITRAMFS_CHECK) \ hook(POLICY_CHECK) \ + hook(KEXEC_CMDLINE) \ hook(MAX_CHECK) #define __ima_hook_enumify(ENUM) ENUM, diff --git a/security/integrity/ima/ima_api.c b/security/integrity/ima/ima_api.c index c7505fb122d4..800d965232e5 100644 --- a/security/integrity/ima/ima_api.c +++ b/security/integrity/ima/ima_api.c @@ -169,6 +169,7 @@ void ima_add_violation(struct file *file, const unsigned char *filename, * subj=, obj=, type=, func=, mask=, fsmagic= * subj,obj, and type: are LSM specific. * func: FILE_CHECK | BPRM_CHECK | CREDS_CHECK | MMAP_CHECK | MODULE_CHECK + * | KEXEC_CMDLINE * mask: contains the permission mask * fsmagic: hex value * diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index 357edd140c09..1d186bda25fe 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -576,6 +576,90 @@ int ima_load_data(enum kernel_load_data_id id) return 0; } +/* + * process_buffer_measurement - Measure the buffer passed to ima log. + * (Instead of using the file hash use the buffer hash). + * @buf - The buffer that needs to be added to the log + * @size - size of buffer(in bytes) + * @eventname - event name to be used for buffer. + * + * The buffer passed is added to the ima log. + * + * On success return 0. + * On error cases surface errors from ima calls. + */ +static int process_buffer_measurement(const void *buf, int size, + const char *eventname, const struct cred *cred, + u32 secid) +{ + int ret = 0; + struct ima_template_entry *entry = NULL; + struct integrity_iint_cache tmp_iint, *iint = &tmp_iint; + struct ima_event_data event_data = {iint, NULL, NULL, + NULL, 0, NULL}; + struct { + struct ima_digest_data hdr; + char digest[IMA_MAX_DIGEST_SIZE]; + } hash; + int violation = 0; + int pcr = CONFIG_IMA_MEASURE_PCR_IDX; + int action = 0; + + action = ima_get_action(NULL, cred, secid, 0, KEXEC_CMDLINE, &pcr); + if (!(action & IMA_AUDIT) && !(action & IMA_MEASURE)) + goto out; + + memset(iint, 0, sizeof(*iint)); + memset(&hash, 0, sizeof(hash)); + + event_data.filename = eventname; + + iint->ima_hash = &hash.hdr; + iint->ima_hash->algo = ima_hash_algo; + iint->ima_hash->length = hash_digest_size[ima_hash_algo]; + + ret = ima_calc_buffer_hash(buf, size, iint->ima_hash); + if (ret < 0) + goto out; + + ret = ima_alloc_init_template(&event_data, &entry); + if (ret < 0) + goto out; + + if (action & IMA_MEASURE) + ret = ima_store_template(entry, violation, NULL, buf, pcr); + + if (action & IMA_AUDIT) + ima_audit_measurement(iint, event_data.filename); + + if (ret < 0) { + ima_free_template_entry(entry); + goto out; + } + +out: + return ret; +} + +/** + * ima_kexec_cmdline - based on policy, store kexec cmdline args + * @buf: pointer to buffer + * @size: size of buffer + * + * Buffers can only be measured, not appraised. + */ +void ima_kexec_cmdline(const void *buf, int size) +{ + u32 secid; + + if (buf && size != 0) { + security_task_getsecid(current, &secid); + process_buffer_measurement(buf, size, "kexec-cmdline", + current_cred(), secid); + } +} + + static int __init init_ima(void) { int error; diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index e0cc323f948f..413e5921b248 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c @@ -291,6 +291,13 @@ static bool ima_match_rules(struct ima_rule_entry *rule, struct inode *inode, { int i; + /* only incase of KEXEC_CMDLINE, inode is NULL */ + if (func == KEXEC_CMDLINE) { + if ((rule->flags & IMA_FUNC) && + (rule->func == func) && (!inode)) + return true; + return false; + } if ((rule->flags & IMA_FUNC) && (rule->func != func && func != POST_SETATTR)) return false; @@ -869,6 +876,8 @@ static int ima_parse_rule(char *rule, struct ima_rule_entry *entry) entry->func = KEXEC_INITRAMFS_CHECK; else if (strcmp(args[0].from, "POLICY_CHECK") == 0) entry->func = POLICY_CHECK; + else if (strcmp(args[0].from, "KEXEC_CMDLINE") == 0) + entry->func = KEXEC_CMDLINE; else result = -EINVAL; if (!result) -- 2.20.1