Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1994900pxk; Tue, 1 Sep 2020 12:52:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzgCpf1johBW7ZBq1gkjancuo6XYI3mLdKlcnaPYujyR9ZTAchHYkmBQJcBCarUEX0+LfaF X-Received: by 2002:aa7:cc92:: with SMTP id p18mr3339280edt.253.1598989929381; Tue, 01 Sep 2020 12:52:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598989929; cv=none; d=google.com; s=arc-20160816; b=HUB9kHERKSuXIU+pUiBAUnso9vB2OPNbyCwLTudeoU26zd2pPWflrZzO3gDRxhYWDC RaQhx3SwmLC3Ix7Lw1AGzr2TYyqJYRvYHwt58QgxpWaz5rq4q7NK3VtwjSPnUhq8sI++ qMRAFLuLw+f9yWrXsfKGo+PN3BtT9jOJpNuTDSBPZPxlHC3jFknNKWG1nic81nVI62tF EwGMIEBcQjUQ3SkNaajmuL5zs2/ZqR9SQzsiMT0nCGrF31ic6g+yHcaaN3NKCH+jfC5I K+X/5c6d4NdSg1yApN78VBIfD27RKetPn7TGkGapEpVBME4OISfd6Cz4ErksdsZyufM4 o63A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-filter; bh=uWvHk40fyFUaJlPA0v9Id3b/apBcQSEwDctqxKU39bo=; b=BpYgi3jRgjfOrfCXzT3XVPv7gMcSPVGCKxow2FI8QiF9T6nRcGFO8mLvp5f1819OD2 SwLVS+D63vG8q3Befk6tSDgrlP0xYK3vkeMc5oxTh7QGRZ0nMgoW5j2pvKRc0lveyfVi 7Xi+PqDcohfMiWCPscV/gOy6HidrALKZ7g9/dRxt9fnuK+oHVv1nSnKsrS3Hj3AAjDfg cqfDfYJa0MX5wF61kZe9849AjBikCg9A+SwGMbcvGNqkrBa7j+QwkVrN2dO3KUxBR6vL 7vkdk2osES8v0g7zrm3CMV4X8B2aQPacgqGNUc1kMZoj7UfciI3j/tOafibSFX7rPJk2 xmEg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Ams3OfUP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g2si1286056eji.132.2020.09.01.12.51.23; Tue, 01 Sep 2020 12:52:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Ams3OfUP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728508AbgIATul (ORCPT + 99 others); Tue, 1 Sep 2020 15:50:41 -0400 Received: from linux.microsoft.com ([13.77.154.182]:47328 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728503AbgIATug (ORCPT ); Tue, 1 Sep 2020 15:50:36 -0400 Received: from localhost.localdomain (c-73-42-176-67.hsd1.wa.comcast.net [73.42.176.67]) by linux.microsoft.com (Postfix) with ESMTPSA id 8509D20B7178; Tue, 1 Sep 2020 12:50:34 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 8509D20B7178 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1598989835; bh=uWvHk40fyFUaJlPA0v9Id3b/apBcQSEwDctqxKU39bo=; h=From:To:Cc:Subject:Date:From; b=Ams3OfUP89wKWnb1PcgLR+MgGQWIXF8jROOrxBwSPe4xrYO4ywUAEfwH2ZDdW0UTD 9NBo3xOngJWpzTao0lqgc7u1oEjAsSEBHXha4EPtj6eITpYpjvFSMg/TOze54+J/Q2 0R/iJR0cDEaXWovObVaIA/48aJNue7wKQgkJDMLg= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, bauerman@linux.ibm.com, robh@kernel.org, gregkh@linuxfoundation.org, james.morse@arm.com, catalin.marinas@arm.com, sashal@kernel.org, will@kernel.org, mpe@ellerman.id.au, benh@kernel.crashing.org, paulus@samba.org, robh+dt@kernel.org, frowand.list@gmail.com, vincenzo.frascino@arm.com, mark.rutland@arm.com, dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com, pasha.tatashin@soleen.com, allison@lohutok.net, kstewart@linuxfoundation.org, takahiro.akashi@linaro.org, tglx@linutronix.de, masahiroy@kernel.org, bhsharma@redhat.com, mbrugger@suse.com, hsinyi@chromium.org, tao.li@vivo.com, christophe.leroy@c-s.fr Cc: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, prsriva@linux.microsoft.com, balajib@linux.microsoft.com Subject: [PATCH v5 0/3] Carry forward IMA measurement log on kexec on ARM64 Date: Tue, 1 Sep 2020 12:50:26 -0700 Message-Id: <20200901195029.30039-1-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org n kexec file load Integrgity Measurement Architecture(IMA) subsystem may verify the IMA signature of the kernel and initramfs, and measure it. The command line parameters passed to the kernel in the kexec call may also be measured by IMA. A remote attestation service can verify the measurement through the IMA log and the TPM PCR data. This can be achieved only if the IMA measurement log is carried over from the current kernel to the next kernel across the kexec call. However in the current implementation the IMA measurement logs are not carried over on ARM64 platforms. Therefore a remote attestation service cannot verify the authenticity of the running kernel on ARM64 platforms when the kernel is updated through the kexec system call. This patch series adds support for carrying forward the IMA measurement log on kexec on ARM64. powerpc already supports carrying forward the IMA measurement log on kexec. This series refactors the platform independent code such that it can be reused for ARM64 as well. A chosen node namely "linux,ima-kexec-buffer" is added to the DTB for ARM64 to hold the address and the size of the memory reserved to carry the IMA measurement log. This patch series has been tested for ARM64 platform using QEMU. I would like help from the community for testing this change on powerpc. Thanks. This series is based on commit b51594df17d0 ("Merge tag 'docs-5.9-3' of git://git.lwn.net/linux") in https://github.com/torvalds/linux "master" branch. Changelog: v5: - Merged get_addr_size_cells() and do_get_kexec_buffer() into a single function when moving the arch independent code from powerpc to IMA - Reverted the change to use FDT functions in powerpc code and added back the original code in get_addr_size_cells() and do_get_kexec_buffer() for powerpc. - Added fdt_add_mem_rsv() for ARM64 to reserve the memory for the IMA log buffer during kexec. - Fixed the warning reported by kernel test bot for ARM64 arch_ima_add_kexec_buffer() - moved this function to a new file namely arch/arm64/kernel/ima_kexec.c v4: - Submitting the patch series on behalf of the original author Prakhar Srivastava - Moved FDT_PROP_IMA_KEXEC_BUFFER ("linux,ima-kexec-buffer") to libfdt.h so that it can be shared by multiple platforms. v3: Breakup patches further into separate patches. - Refactoring non architecture specific code out of powerpc - Update powerpc related code to use fdt functions - Update IMA buffer read related code to use of functions - Add support to store the memory information of the IMA measurement logs to be carried forward. - Update the property strings to align with documented nodes https://github.com/devicetree-org/dt-schema/pull/46 v2: Break patches into separate patches. - Powerpc related Refactoring - Updating the docuemntation for chosen node - Updating arm64 to support IMA buffer pass v1: Refactoring carrying over IMA measuremnet logs over Kexec. This patch moves the non-architecture specific code out of powerpc and adds to security/ima.(Suggested by Thiago) Add Documentation regarding the ima-kexec-buffer node in the chosen node documentation v0: Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass. Add support for ima buffer pass using reserved memory for arm64 kexec. Update the arch sepcific code path in kexec file load to store the ima buffer in the reserved memory. The same reserved memory is read on kexec or cold boot. Lakshmi Ramasubramanian (3): powerpc: Refactor kexec functions to move arch independent code to IMA arm64: Store IMA log information in kimage used for kexec arm64: Add IMA kexec buffer to DTB arch/arm64/Kconfig | 1 + arch/arm64/include/asm/ima.h | 18 ++++++ arch/arm64/include/asm/kexec.h | 3 + arch/arm64/kernel/Makefile | 1 + arch/arm64/kernel/ima_kexec.c | 34 +++++++++++ arch/arm64/kernel/machine_kexec_file.c | 15 +++++ arch/powerpc/include/asm/ima.h | 3 - arch/powerpc/kexec/ima.c | 60 +------------------ include/linux/libfdt.h | 3 + security/integrity/ima/ima_kexec.c | 82 ++++++++++++++++++++++++++ 10 files changed, 160 insertions(+), 60 deletions(-) create mode 100644 arch/arm64/include/asm/ima.h create mode 100644 arch/arm64/kernel/ima_kexec.c -- 2.28.0