Received: by 2002:ab2:b82:0:b0:1f3:401:3cfb with SMTP id 2csp693178lqh; Thu, 28 Mar 2024 13:21:27 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXVjTQBoMmjR1v5bk1ZkERQlEFLnV5GpVaDaBcKbDBKj3yNguME/dtA8hABymHkr+LNN/pY0nDUBI5s7qVB7BVVA6ah44j2h9b7jdJElQ== X-Google-Smtp-Source: AGHT+IEHb4skVrGB8cfHLyDsbk9LSQc8FefrEAVFUFAvsClQPPg3hHWtLp/LQlsexpKEfqED4Lok X-Received: by 2002:a17:906:4102:b0:a4d:f9b1:6e7e with SMTP id j2-20020a170906410200b00a4df9b16e7emr203024ejk.27.1711657287212; Thu, 28 Mar 2024 13:21:27 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711657287; cv=pass; d=google.com; s=arc-20160816; b=rCWxmfjDEI8Cq9yuKlBlMlHYHOB2cgsU7dVAK7nHAI5zDsoz0p0kwQ/lhfbZ9dyqBx AwpzpCRaXj2AfJlxfhI02RhJk05/K/e4DdrMTWWOMkC6HaqJSW5llhiyIo6OfkRQ2sy8 W05ny+zmOGeOZWF5fPayuNVaajYYod1tx28+zJbl1/T69k7nK7Cl2fuE0WFGw1xtfaNO m/KkrhgGb+66Yb2+5durY0abWXF5IrTnvApFqMI09Y7KTOM8iI0FQdUeEm4+Db5Vu80u NB0iu209AoOQ0gaEEnYOyzHqWqs/fNb0UIo7gZga+vvLBOWTlIT+JJkkyGDlhfwEx0j0 jnCQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-unsubscribe:list-subscribe:list-id:precedence:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :dkim-filter; bh=mqeIoUWAsCUV9RSCT5jw51edKq20XKA1L62nWocK0lA=; fh=X3CtLfbVn+7A3/zG3jR92zQ1H4o+5dWSoXRUsYP5TDs=; b=X1ZfvQnszwOwkynsC5OQyx43FIenOBmSam6iTRcdBI760tZXmxij1uTJST57tZ2oNS 7Lk6gddy1EnuFanoWYpsgT2ff8AjrcQMhoyxXt7yqFwmXWLYgqLXz/HD4cFDNPsmG+si GmUkRUEcSsVXfCcd7hebBXFpgZcMDxR1uhtS4jSAUCJXX1wv53PReCWPU7EqPQy0enT8 D4Uq5tj+MNT2Dt93iQvpe8tx99LsGQL6/goA47N7rg4JjEGOBH8JgQEw4rvyoKVjyPzv Bnfa9UtiYFGPC+HlDm4jJq1UR9ECm/j260cbZYjnU+qtcn581RfhbPgDQIAGDN9zO0HD maiQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZVlqckae; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-123559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-123559-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id n11-20020a170906118b00b00a474540f1besi1046824eja.128.2024.03.28.13.21.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Mar 2024 13:21:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-123559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZVlqckae; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-123559-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-123559-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 3A4161F2834A for ; Thu, 28 Mar 2024 20:21:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BD9BC13E6C1; Thu, 28 Mar 2024 20:17:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b="ZVlqckae" Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7433813AA3C; Thu, 28 Mar 2024 20:17:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=13.77.154.182 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711657055; cv=none; b=RXYE/nyvVL/TsUpUfDzHSPowEvppjQ3i5+VM5gVT9lA60oRmRj7umW9p+79GUb8DihHSHjl4voqFtXtT6B/VhZ67x7NatqBDkdfXCIAZxJkaXhOkC8WBssqGpTebd5LluvJIKQYhbZ14p8cATaFC5ARy0bfmeG/vQKbFQJGfOfw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711657055; c=relaxed/simple; bh=6pJ6ok2CI03VASwPEFfYzzvNDfh7wTR7Z3CqUolDgcY=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References; b=Akp6glR46/J9oPIRijsw0bxw6Hb/e/UJkoesJrY7OIBSI4VdkhkEirfoFIDBOuEix1iOCYFokr8SV6lLD65DT17X9Asur0yBp14Hz9J31BhIoX3Ges4KwKjwj0MQfeL3K8L09Ahpo2rC4zImpQd7DGhMJH8MADpf0DkBergJO+E= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com; spf=pass smtp.mailfrom=linux.microsoft.com; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b=ZVlqckae; arc=none smtp.client-ip=13.77.154.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.microsoft.com Received: by linux.microsoft.com (Postfix, from userid 1052) id 23B3D20E6F50; Thu, 28 Mar 2024 13:17:28 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 23B3D20E6F50 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1711657049; bh=mqeIoUWAsCUV9RSCT5jw51edKq20XKA1L62nWocK0lA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZVlqckae5OBUeraZ/9fNiSdqWZ/8a+uwFSIuaiotWrZ4LoFUcEcb5EzYklYzGqMXm 2GlA5NVY3a9uM3Zy1nTG6dLUHlrdOE7mYiGDRKNekAKv/BmvsNtCI9k2p3HQ8SeVUO 20dPJDPhryzr85LcizUkiyf+PeuTcyBW974FFyXY= From: Fan Wu To: corbet@lwn.net, zohar@linux.ibm.com, jmorris@namei.org, serge@hallyn.com, tytso@mit.edu, ebiggers@kernel.org, axboe@kernel.dk, agk@redhat.com, snitzer@kernel.org, eparis@redhat.com, paul@paul-moore.com Cc: linux-doc@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, fsverity@lists.linux.dev, linux-block@vger.kernel.org, dm-devel@lists.linux.dev, audit@vger.kernel.org, linux-kernel@vger.kernel.org, Deven Bowers , Fan Wu Subject: [PATCH v16 13/20] dm verity: consume root hash digest and signature data via LSM hook Date: Thu, 28 Mar 2024 13:17:20 -0700 Message-Id: <1711657047-10526-14-git-send-email-wufan@linux.microsoft.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1711657047-10526-1-git-send-email-wufan@linux.microsoft.com> References: <1711657047-10526-1-git-send-email-wufan@linux.microsoft.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: From: Deven Bowers dm-verity provides a strong guarantee of a block device's integrity. As a generic way to check the integrity of a block device, it provides those integrity guarantees to its higher layers, including the filesystem level. An LSM that control access to a resource on the system based on the available integrity claims can use this transitive property of dm-verity, by querying the underlying block_device of a particular file. The digest and signature information need to be stored in the block device to fulfill the next requirement of authorization via LSM policy. This will enable the LSM to perform revocation of devices that are still mounted, prohibiting execution of files that are no longer authorized by the LSM in question. This patch adds two security hook calls in dm-verity to save the dm-verity roothash and the roothash signature to the block device's LSM blobs. The hook calls are depended on CONFIG_IPE_PROP_DM_VERITY, which will be introduced in the next commit. Signed-off-by: Deven Bowers Signed-off-by: Fan Wu --- v2: + No Changes v3: + No changes v4: + No changes v5: + No changes v6: + Fix an improper cleanup that can result in a leak v7: + Squash patch 08/12, 10/12 to [11/16] + Use part0 for block_device, to retrieve the block_device, when calling security_bdev_setsecurity v8: + Undo squash of 08/12, 10/12 - separating drivers/md/ from security/ & block/ + Use common-audit function for dmverity_signature. + Change implementation for storing the dm-verity digest to use the newly introduced dm_verity_digest structure introduced in patch 14/20. + Create new structure, dm_verity_digest, containing digest algorithm, size, and digest itself to pass to the LSM layer. V7 was missing the algorithm. + Create an associated public header containing this new structure and the key values for the LSM hook, specific to dm-verity. + Additional information added to commit, discussing the layering of the changes and how the information passed will be used. v9: + No changes v10: + No changes v11: + Add an optional field to save signature + Move the security hook call to the new finalize hook v12: + No changes v13: + No changes v14: + Correct code format + Remove unnecessary header and switch to dm_disk() v15: + Refactor security_bdev_setsecurity() to security_bdev_setintegrity() + Remove unnecessary headers v16: + Use kmemdup to duplicate signature + clean up lsm blob data in error case --- drivers/md/dm-verity-target.c | 83 +++++++++++++++++++++++++++++++++++ drivers/md/dm-verity.h | 6 +++ include/linux/dm-verity.h | 12 +++++ include/linux/security.h | 3 +- 4 files changed, 103 insertions(+), 1 deletion(-) create mode 100644 include/linux/dm-verity.h diff --git a/drivers/md/dm-verity-target.c b/drivers/md/dm-verity-target.c index bb5da66da4c1..e2b0657b09f9 100644 --- a/drivers/md/dm-verity-target.c +++ b/drivers/md/dm-verity-target.c @@ -22,6 +22,8 @@ #include #include #include +#include +#include #define DM_MSG_PREFIX "verity" @@ -1017,6 +1019,38 @@ static void verity_io_hints(struct dm_target *ti, struct queue_limits *limits) blk_limits_io_min(limits, limits->logical_block_size); } +#ifdef CONFIG_IPE_PROP_DM_VERITY + +static int verity_init_sig(struct dm_verity *v, const void *sig, + size_t sig_size) +{ + v->sig_size = sig_size; + v->root_digest_sig = kmemdup(sig, v->sig_size, GFP_KERNEL); + if (!v->root_digest) + return -ENOMEM; + + return 0; +} + +static void verity_free_sig(struct dm_verity *v) +{ + kfree(v->root_digest_sig); +} + +#else + +static inline int verity_init_sig(struct dm_verity *v, const void *sig, + size_t sig_size) +{ + return 0; +} + +static inline void verity_free_sig(struct dm_verity *v) +{ +} + +#endif /* CONFIG_IPE_PROP_DM_VERITY */ + static void verity_dtr(struct dm_target *ti) { struct dm_verity *v = ti->private; @@ -1035,6 +1069,7 @@ static void verity_dtr(struct dm_target *ti) kfree(v->salt); kfree(v->root_digest); kfree(v->zero_digest); + verity_free_sig(v); if (v->tfm) crypto_free_ahash(v->tfm); @@ -1434,6 +1469,13 @@ static int verity_ctr(struct dm_target *ti, unsigned int argc, char **argv) ti->error = "Root hash verification failed"; goto bad; } + + r = verity_init_sig(v, verify_args.sig, verify_args.sig_size); + if (r < 0) { + ti->error = "Cannot allocate root digest signature"; + goto bad; + } + v->hash_per_block_bits = __fls((1 << v->hash_dev_block_bits) / v->digest_size); @@ -1584,6 +1626,44 @@ int dm_verity_get_root_digest(struct dm_target *ti, u8 **root_digest, unsigned i return 0; } +#ifdef CONFIG_IPE_PROP_DM_VERITY + +static int verity_finalize(struct dm_target *ti) +{ + struct block_device *bdev; + struct dm_verity_digest root_digest; + struct dm_verity *v; + int r; + + v = ti->private; + bdev = dm_disk(dm_table_get_md(ti->table))->part0; + root_digest.digest = v->root_digest; + root_digest.digest_len = v->digest_size; + root_digest.alg = v->alg_name; + + r = security_bdev_setintegrity(bdev, LSM_INT_DMVERITY_ROOTHASH, &root_digest, + sizeof(root_digest)); + if (r) + return r; + + r = security_bdev_setintegrity(bdev, + LSM_INT_DMVERITY_SIG, + v->root_digest_sig, + v->sig_size); + if (r) + goto bad; + + return 0; + +bad: + + security_bdev_setintegrity(bdev, LSM_INT_DMVERITY_ROOTHASH, NULL, 0); + + return r; +} + +#endif /* CONFIG_IPE_PROP_DM_VERITY */ + static struct target_type verity_target = { .name = "verity", .features = DM_TARGET_SINGLETON | DM_TARGET_IMMUTABLE, @@ -1596,6 +1676,9 @@ static struct target_type verity_target = { .prepare_ioctl = verity_prepare_ioctl, .iterate_devices = verity_iterate_devices, .io_hints = verity_io_hints, +#ifdef CONFIG_IPE_PROP_DM_VERITY + .finalize = verity_finalize, +#endif /* CONFIG_IPE_PROP_DM_VERITY */ }; module_dm(verity); diff --git a/drivers/md/dm-verity.h b/drivers/md/dm-verity.h index 20b1bcf03474..6a5b8df5bafd 100644 --- a/drivers/md/dm-verity.h +++ b/drivers/md/dm-verity.h @@ -43,6 +43,9 @@ struct dm_verity { u8 *root_digest; /* digest of the root block */ u8 *salt; /* salt: its size is salt_size */ u8 *zero_digest; /* digest for a zero block */ +#ifdef CONFIG_IPE_PROP_DM_VERITY + u8 *root_digest_sig; /* digest signature of the root block */ +#endif /* CONFIG_IPE_PROP_DM_VERITY */ unsigned int salt_size; sector_t data_start; /* data offset in 512-byte sectors */ sector_t hash_start; /* hash start in blocks */ @@ -56,6 +59,9 @@ struct dm_verity { bool hash_failed:1; /* set if hash of any block failed */ bool use_bh_wq:1; /* try to verify in BH wq before normal work-queue */ unsigned int digest_size; /* digest size for the current hash algorithm */ +#ifdef CONFIG_IPE_PROP_DM_VERITY + unsigned int sig_size; /* digest signature size */ +#endif /* CONFIG_IPE_PROP_DM_VERITY */ unsigned int ahash_reqsize;/* the size of temporary space for crypto */ enum verity_mode mode; /* mode for handling verification errors */ unsigned int corrupted_errs;/* Number of errors for corrupted blocks */ diff --git a/include/linux/dm-verity.h b/include/linux/dm-verity.h new file mode 100644 index 000000000000..a799a8043d85 --- /dev/null +++ b/include/linux/dm-verity.h @@ -0,0 +1,12 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef _LINUX_DM_VERITY_H +#define _LINUX_DM_VERITY_H + +struct dm_verity_digest { + const char *alg; + const u8 *digest; + size_t digest_len; +}; + +#endif /* _LINUX_DM_VERITY_H */ diff --git a/include/linux/security.h b/include/linux/security.h index 8e646189740e..26b422059f54 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -84,7 +84,8 @@ enum lsm_event { }; enum lsm_integrity_type { - __LSM_INT_MAX + LSM_INT_DMVERITY_SIG, + LSM_INT_DMVERITY_ROOTHASH, }; /* -- 2.44.0