Received: by 2002:a17:90a:3541:0:0:0:0 with SMTP id q59csp67086pjb; Mon, 8 Jun 2020 14:57:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7Ft+T3ER3RnHaQET2DqECY3KMjVFL7VwmGn3xMn4RwhtXl0BSAMyGNRaVtZHNvHrFeGLO X-Received: by 2002:a05:6402:5:: with SMTP id d5mr24400794edu.247.1591653429416; Mon, 08 Jun 2020 14:57:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591653429; cv=none; d=google.com; s=arc-20160816; b=E5bAY7PiyuGURi14XHQrHPtx4MHWatJ6jGgJqD/CUTb2AYF0XqibUFPecdj5brTWoL 8eUDIF62q0fH5UJzgAmcziRVlsmcBT9kxqSSYmRxPb58Qj+1UPc7xMqDezd7UxPPM2eG /pyD3ZTBpb+QKUwLQ3fUGmw0hT4UGI4faIPzJqB4nOXiqzGptaOlZSjg0TzcgeWe7ad3 aEfH8GZ/Vk4Rpo7IgeUoE0IqyGJagTg+8po8PbnlqCLIpxt2C+QboB2GYoxoXcoflyKK OyZsuk2SMulBFpkPmaYBFpuqrOvAy6yNVQ4tP0JbRfapwsYj9zaAd5TO8mQinkybdDyk ETUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-filter; bh=xc2Cr5Aohy9MgGfLPpnVpGSQbatWni8qwfQ89wE0oIM=; b=oj7Xk3FF4XF91H7ltXunqJYKhX6gwZLwaFoYrnbra1pecTmDjF+P62Tl8lIONCqYmx xF87ePbD33Jxh1sW00zM0XcgX5jUNHe+bLj9jSKTh8IhLmlthR6stsGcCul/fIO9NxHJ jIL10fHPNoymBSE5wxlqLlbJ4PFK1e5xg+bOoLUGKN5QcoZ1D57p3p06KvbnzALlMes2 kASCkcvkDaZh7edpHpmhglIfeMrSOTLKDU2MsvEL1Plv/lZARXYYBN7vKyWUR9HYfXKZ Ttf4DwJzvQH0/EyfwX/H5b/ZPqTkTkx22fXDUL7QrKjgFxv0uAFqEsvF4erB5t3qc2Q7 S9eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=VSpg9qrB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pj20si9384309ejb.158.2020.06.08.14.56.46; Mon, 08 Jun 2020 14:57:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=VSpg9qrB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726841AbgFHVxt (ORCPT + 99 others); Mon, 8 Jun 2020 17:53:49 -0400 Received: from linux.microsoft.com ([13.77.154.182]:41658 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726789AbgFHVxt (ORCPT ); Mon, 8 Jun 2020 17:53:49 -0400 Received: from localhost.localdomain (c-73-42-176-67.hsd1.wa.comcast.net [73.42.176.67]) by linux.microsoft.com (Postfix) with ESMTPSA id 2885D20B717B; Mon, 8 Jun 2020 14:53:48 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 2885D20B717B DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1591653228; bh=xc2Cr5Aohy9MgGfLPpnVpGSQbatWni8qwfQ89wE0oIM=; h=From:To:Cc:Subject:Date:From; b=VSpg9qrBKfCgAMHGahpi4/S7yxgM50HxOkFqUt8A36BBQXm2iuiMrWeiLqr0o0i/J 7a2voa1QrwWey/8Q7acuzusWc/dgJ1hvYbid5bOel0EibtPvnlDJ9xGDi40dZJPdDN 31tHWyOAcGAd4AeoUCwS/5qaR8Gwz0ulb2UdgNH0= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, paul@paul-moore.com Cc: linux-integrity@vger.kernel.org, linux-audit@redhat.com, linux-kernel@vger.kernel.org Subject: [PATCH v3] IMA: Add audit log for failure conditions Date: Mon, 8 Jun 2020 14:53:43 -0700 Message-Id: <20200608215343.4491-1-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The final log statement in process_buffer_measurement() for failure condition is at debug level. This does not log the message unless the system log level is raised which would significantly increase the messages in the system log. Change this log message to an audit message for better triaging failures in the function. ima_alloc_key_entry() does not log a message for failure condition. Add an audit message for failure condition in this function. Sample audit messages: [ 8.051937] audit: type=1804 audit(1591633422.365:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 op=measuring_keys cause=hashing_error(-22) comm="systemd" name=".builtin_trusted_keys" res=0 [ 8.063218] audit: type=1804 audit(1591633422.377:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 op=measuring_kexec_cmdline cause=alloc_entry(-12) comm="systemd" name="kexec-cmdline" res=0 Signed-off-by: Lakshmi Ramasubramanian --- security/integrity/ima/ima.h | 2 ++ security/integrity/ima/ima_main.c | 37 +++++++++++++++++++++---- security/integrity/ima/ima_queue.c | 2 -- security/integrity/ima/ima_queue_keys.c | 4 +++ 4 files changed, 37 insertions(+), 8 deletions(-) diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h index df93ac258e01..8a47249c6238 100644 --- a/security/integrity/ima/ima.h +++ b/security/integrity/ima/ima.h @@ -47,6 +47,8 @@ enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; #define NR_BANKS(chip) ((chip != NULL) ? chip->nr_allocated_banks : 0) +#define AUDIT_CAUSE_LEN_MAX 32 + /* current content of the policy */ extern int ima_policy_flag; diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index 800fb3bba418..b10f09bc7eca 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -739,6 +739,9 @@ void process_buffer_measurement(const void *buf, int size, int pcr, const char *keyring) { int ret = 0; + const char *audit_cause = "ENOMEM"; + const char *op = "measuring_keys"; + char measurement_audit_cause[AUDIT_CAUSE_LEN_MAX]; struct ima_template_entry *entry = NULL; struct integrity_iint_cache iint = {}; struct ima_event_data event_data = {.iint = &iint, @@ -793,21 +796,43 @@ void process_buffer_measurement(const void *buf, int size, iint.ima_hash->length = hash_digest_size[ima_hash_algo]; ret = ima_calc_buffer_hash(buf, size, iint.ima_hash); - if (ret < 0) + if (ret < 0) { + audit_cause = "hashing_error"; goto out; + } ret = ima_alloc_init_template(&event_data, &entry, template); - if (ret < 0) + if (ret < 0) { + audit_cause = "alloc_entry"; goto out; + } ret = ima_store_template(entry, violation, NULL, buf, pcr); - - if (ret < 0) + if (ret < 0) { + audit_cause = "store_entry"; ima_free_template_entry(entry); + } out: - if (ret < 0) - pr_devel("%s: failed, result: %d\n", __func__, ret); + if (ret < 0) { + snprintf(measurement_audit_cause, AUDIT_CAUSE_LEN_MAX, + "%s(%d)", audit_cause, ret); + + switch (func) { + case KEXEC_CMDLINE: + op = "measuring_kexec_cmdline"; + break; + case KEY_CHECK: + op = "measuring_keys"; + break; + default: + op = "measuring_blacklisted_hash"; + break; + } + + integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, eventname, + op, measurement_audit_cause, ret, 0); + } return; } diff --git a/security/integrity/ima/ima_queue.c b/security/integrity/ima/ima_queue.c index fb4ec270f620..4a761d765c6c 100644 --- a/security/integrity/ima/ima_queue.c +++ b/security/integrity/ima/ima_queue.c @@ -19,8 +19,6 @@ #include #include "ima.h" -#define AUDIT_CAUSE_LEN_MAX 32 - /* pre-allocated array of tpm_digest structures to extend a PCR */ static struct tpm_digest *digests; diff --git a/security/integrity/ima/ima_queue_keys.c b/security/integrity/ima/ima_queue_keys.c index cb3e3f501593..4de31ff172aa 100644 --- a/security/integrity/ima/ima_queue_keys.c +++ b/security/integrity/ima/ima_queue_keys.c @@ -68,6 +68,7 @@ static struct ima_key_entry *ima_alloc_key_entry(struct key *keyring, size_t payload_len) { int rc = 0; + const char *audit_cause = "ENOMEM"; struct ima_key_entry *entry; entry = kzalloc(sizeof(*entry), GFP_KERNEL); @@ -88,6 +89,9 @@ static struct ima_key_entry *ima_alloc_key_entry(struct key *keyring, out: if (rc) { + integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, + keyring->description, "measuring_keys", + audit_cause, rc, 0); ima_free_key_entry(entry); entry = NULL; } -- 2.27.0