Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp4406426pxa; Mon, 10 Aug 2020 08:22:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYP/TDVPfmURo/Sg02kEQqHR9Tt9Dfs+BV1/lw1zSThyzvUI0GJY3PgKQVNkMQEfpDjzrD X-Received: by 2002:a17:906:7698:: with SMTP id o24mr22909982ejm.182.1597072947715; Mon, 10 Aug 2020 08:22:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597072947; cv=none; d=google.com; s=arc-20160816; b=QrpSD0mBHHzmd2KcnGuvXXPMDgCeVXJ8I1fnhP/sKgQZfauRNY+ac9giYYhXaAV1UX DudF0v8TnKy2vtcO4I+WHjthC56F/yOD05TQqLNJ4rTZuoTltdf/f7/AvsNTsu6hq2q8 HSM0xsnKyNGE8hdAn/T6wwXAWmZleddxOWNlLJElBl7/SJHzkCWQU0cjRiaic/T6pkXl bvYX2Bc94KTb10lYev4gxiHSrp5gRgtcHpUTVYxkTn2dDJ3DYjrs2o5wvMmP2Xhko73P HWKrd0uWm4quKC+NLizNGTqgkb7uT0UMDWU+dx/4BluOdndZvfEWDO3tIuUY5ADM4Ixr /wHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3Erum/tgZe4vcihMkST4vhEz8J560rHa7jS6p5HmC/Q=; b=xSnZDSYPRPrpMYFPcQobfO212DIqujKtmr6nvsOg6uKhcjL17aup/dJJWzIDdeTAGO cqmk+FLNkvRu0cRTfYOy27yn1ztsi/j1weNDSjIIKPWygPrwNLgHQHVzChXSCs/upfCd DFrTPlRqCJpFKvyAXEbpLD8cx2hESPmGP3M0WnWbfn7lt6DQzgSJ9ugwnRHIE+5O5kt1 dzP0xrQb8ba/me6aRkYZXa+iWdcety2VOOUqeBE6cQL5ua4DP+0cnjCZ07ew+wfDy0bV hVAD7MsqTQnbaRuecgnEAe8sTzIZsjY1L54fhANtpYLMPHezsQ9X0qZGJOPXrAW4up6I Ziqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ke0AvMbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id za3si10908297ejb.312.2020.08.10.08.22.04; Mon, 10 Aug 2020 08:22:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ke0AvMbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728005AbgHJPUt (ORCPT + 99 others); Mon, 10 Aug 2020 11:20:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:51152 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728027AbgHJPUh (ORCPT ); Mon, 10 Aug 2020 11:20:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 09DAC20656; Mon, 10 Aug 2020 15:20:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597072836; bh=QWK7XBR5gvkHC3LExaNmD7qFaj0SX1A+sVIAOWe7vgc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ke0AvMbkJ4ePH7ceF08eUXsgfkhrTzTaIujmJgjDyW3I8sKIuqezsBjxONprPzdyG siUojworDmN8eD75BQjS4D9DiFjacPmml0paU8a4inVNC7pZewzjZDUQ5aBhFzloNB gAxI/EdSgKXB1cPX8zILEkvi9Pk0aVydbYWqEpVs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bruno Meneguele , Mimi Zohar Subject: [PATCH 5.8 35/38] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime Date: Mon, 10 Aug 2020 17:19:25 +0200 Message-Id: <20200810151805.648865607@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200810151803.920113428@linuxfoundation.org> References: <20200810151803.920113428@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bruno Meneguele commit 311aa6aafea446c2f954cc19d66425bfed8c4b0b upstream. The IMA_APPRAISE_BOOTPARAM config allows enabling different "ima_appraise=" modes - log, fix, enforce - at run time, but not when IMA architecture specific policies are enabled.  This prevents properly labeling the filesystem on systems where secure boot is supported, but not enabled on the platform.  Only when secure boot is actually enabled should these IMA appraise modes be disabled. This patch removes the compile time dependency and makes it a runtime decision, based on the secure boot state of that platform. Test results as follows: -> x86-64 with secure boot enabled [ 0.015637] Kernel command line: <...> ima_policy=appraise_tcb ima_appraise=fix [ 0.015668] ima: Secure boot enabled: ignoring ima_appraise=fix boot parameter option -> powerpc with secure boot disabled [ 0.000000] Kernel command line: <...> ima_policy=appraise_tcb ima_appraise=fix [ 0.000000] Secure boot mode disabled -> Running the system without secure boot and with both options set: CONFIG_IMA_APPRAISE_BOOTPARAM=y CONFIG_IMA_ARCH_POLICY=y Audit prompts "missing-hash" but still allow execution and, consequently, filesystem labeling: type=INTEGRITY_DATA msg=audit(07/09/2020 12:30:27.778:1691) : pid=4976 uid=root auid=root ses=2 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 op=appraise_data cause=missing-hash comm=bash name=/usr/bin/evmctl dev="dm-0" ino=493150 res=no Cc: stable@vger.kernel.org Fixes: d958083a8f64 ("x86/ima: define arch_get_ima_policy() for x86") Signed-off-by: Bruno Meneguele Cc: stable@vger.kernel.org # 5.0 Signed-off-by: Mimi Zohar Signed-off-by: Greg Kroah-Hartman --- security/integrity/ima/Kconfig | 2 +- security/integrity/ima/ima_appraise.c | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-) --- a/security/integrity/ima/Kconfig +++ b/security/integrity/ima/Kconfig @@ -232,7 +232,7 @@ config IMA_APPRAISE_REQUIRE_POLICY_SIGS config IMA_APPRAISE_BOOTPARAM bool "ima_appraise boot parameter" - depends on IMA_APPRAISE && !IMA_ARCH_POLICY + depends on IMA_APPRAISE default y help This option enables the different "ima_appraise=" modes --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c @@ -19,6 +19,12 @@ static int __init default_appraise_setup(char *str) { #ifdef CONFIG_IMA_APPRAISE_BOOTPARAM + if (arch_ima_get_secureboot()) { + pr_info("Secure boot enabled: ignoring ima_appraise=%s boot parameter option", + str); + return 1; + } + if (strncmp(str, "off", 3) == 0) ima_appraise = 0; else if (strncmp(str, "log", 3) == 0)