Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2520656ybt; Fri, 3 Jul 2020 11:01:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJecVmLF0gdQX8KvUmgztUQZmG2Fzlgb9ZbJm5F7kNxWReHuGOAUrOWySUZn7RxhRqzj2l X-Received: by 2002:a50:ee8a:: with SMTP id f10mr22255142edr.383.1593799310546; Fri, 03 Jul 2020 11:01:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593799310; cv=none; d=google.com; s=arc-20160816; b=uzNt1+mADCVdOd5Wb1i+jNGp47IAKosdcfvBL99fWPBgCbK+JIalZeCbrumv4p30sS luYShEeEZH0PJmXRUv3SPjuaa3ZxRson4sG+04+pC7d6h134hMrwVXEuq7w4XFGOUJkt 79VAtFkEiMmF4CfODd+a4NfKzi9aFaVHm335d5xOl9D2Wu/sC9L1if6j+uyuEHc1Stsx 0A9mwxQ15c32x7TB+LsdcSsksd3VOHBVd6EwMj7x3BiCwB1QJmWK2S6WQjv8YDo5oEax a8BaZVnQGR0iRUgvJzCz354522xhyOIpo++8Vqx08f+ktckbMtuGwD8uFztiKD5/o2dp OJ2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=W7hX68Id9MrI9Dp1ohSoP6+dFWqqds4yeexuPF5eVaQ=; b=ZlFokzBsnrHF5FOZDt4bCvqDQNKmZrn9hDV59eZbTkcYBC4wbm2QBs89kJyUc3naFC EkxMpLiojCxaLhpEzIQ4lgFmUZGIpaZXpjFmL9TU4lwVXufuhu9AVNCNJkcrnWaBfO2M ZRXEuWenTF1mtGS+lLISy7oWxxkloqeGF1aS3qfbwhCPEc6TonwE81pCsCTADAJQ2sq6 yv6wZSN2Dd1EMIlbVNXMhFXbN9u41MCeCfFuM/KH0aTrjQsh4l7YJyhkaGQX8QDXk2nJ e2H8o1y0jjJoRBuzYjtA/WN8L9T7/4J33hOx1kg2BwGoaa4Co4gLEWrrAHIUfVHtsB4d ZYXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QH2gaCCo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r8si8166844ejs.462.2020.07.03.11.01.25; Fri, 03 Jul 2020 11:01:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QH2gaCCo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726418AbgGCSA5 (ORCPT + 99 others); Fri, 3 Jul 2020 14:00:57 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:41907 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726035AbgGCSA5 (ORCPT ); Fri, 3 Jul 2020 14:00:57 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1593799256; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=W7hX68Id9MrI9Dp1ohSoP6+dFWqqds4yeexuPF5eVaQ=; b=QH2gaCCo1xaJCNGzM8DQT0kZJyvYuq/KddyB50un/cH8lEPZM/seqzJmq4TGbLQgyEW86Z jYihaT6DjXmOJLRTEtBL0JVOkQa5p8gMZUj+HRnETSAKLWexPAwmd/qD2W7zPqw5VCQGqI VDNCLkZ+Uq6VaEWUsQhvlqOGad3ebFE= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-262-F_NqQgogODmQd7163_VhmA-1; Fri, 03 Jul 2020 14:00:54 -0400 X-MC-Unique: F_NqQgogODmQd7163_VhmA-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id F415B800C64; Fri, 3 Jul 2020 18:00:52 +0000 (UTC) Received: from localhost (ovpn-116-12.gru2.redhat.com [10.97.116.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8C28C19D9E; Fri, 3 Jul 2020 18:00:52 +0000 (UTC) From: Bruno Meneguele To: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org Cc: zohar@linux.ibm.com, erichte@linux.ibm.com, nayna@linux.ibm.com, Bruno Meneguele , stable@vger.kernel.org Subject: [PATCH v4] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime Date: Fri, 3 Jul 2020 15:00:49 -0300 Message-Id: <20200703180049.15608-1-bmeneg@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org APPRAISE_BOOTPARAM has been marked as dependent on !ARCH_POLICY in compile time, enforcing the appraisal whenever the kernel had the arch policy option enabled. However it breaks systems where the option is set but the system wasn't booted in a "secure boot" platform. In this scenario, anytime an appraisal policy (i.e. ima_policy=appraisal_tcb) is used it will be forced, giving no chance to the user set the 'fix' state (ima_appraise=fix) to actually measure system's files. Considering the ARCH_POLICY is only effective when secure boot is actually enabled this patch remove the compile time dependency and move it to a runtime decision, based on the secure boot state of that platform. Cc: stable@vger.kernel.org Fixes: d958083a8f64 ("x86/ima: define arch_get_ima_policy() for x86") Signed-off-by: Bruno Meneguele --- Changelog: v4: - instead of change arch_policy loading code, check secure boot state at "ima_appraise=" parameter handler (Mimi) v3: - extend secure boot arch checker to also consider trusted boot - enforce IMA appraisal when secure boot is effectively enabled (Nayna) - fix ima_appraise flag assignment by or'ing it (Mimi) v2: - pr_info() message prefix correction security/integrity/ima/Kconfig | 2 +- security/integrity/ima/ima_appraise.c | 18 ++++++++++-------- 2 files changed, 11 insertions(+), 9 deletions(-) diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kconfig index edde88dbe576..62dc11a5af01 100644 --- a/security/integrity/ima/Kconfig +++ b/security/integrity/ima/Kconfig @@ -232,7 +232,7 @@ config IMA_APPRAISE_REQUIRE_POLICY_SIGS config IMA_APPRAISE_BOOTPARAM bool "ima_appraise boot parameter" - depends on IMA_APPRAISE && !IMA_ARCH_POLICY + depends on IMA_APPRAISE default y help This option enables the different "ima_appraise=" modes diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c index a9649b04b9f1..4fc83b3fbd5c 100644 --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -18,14 +18,16 @@ static int __init default_appraise_setup(char *str) { -#ifdef CONFIG_IMA_APPRAISE_BOOTPARAM - if (strncmp(str, "off", 3) == 0) - ima_appraise = 0; - else if (strncmp(str, "log", 3) == 0) - ima_appraise = IMA_APPRAISE_LOG; - else if (strncmp(str, "fix", 3) == 0) - ima_appraise = IMA_APPRAISE_FIX; -#endif + if (IS_ENABLED(CONFIG_IMA_APPRAISE_BOOTPARAM) && + !arch_ima_get_secureboot()) { + if (strncmp(str, "off", 3) == 0) + ima_appraise = 0; + else if (strncmp(str, "log", 3) == 0) + ima_appraise = IMA_APPRAISE_LOG; + else if (strncmp(str, "fix", 3) == 0) + ima_appraise = IMA_APPRAISE_FIX; + } + return 1; } -- 2.26.2