ima: measure kexec boot command line
In addition to files, other things (eg. boot command line) need to be
measured to attest to the integrity of a running system. A new IMA
hook named ima_buffer_check() calculates and includes the buffer hash
in the measurement list. Callers of this hook provide the buffer,
buffer length and a policy identifier.
To measure the boot command line, this patch defines a new policy
identifier named BOOT_CHECK.
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
diff --git a/Documentation/ABI/testing/ima_policy b/Documentation/ABI/testing/ima_policy
index e80f767..227df54 100644
--- a/Documentation/ABI/testing/ima_policy
+++ b/Documentation/ABI/testing/ima_policy
@@ -27,6 +27,7 @@
base: func:= [BPRM_CHECK][MMAP_CHECK][FILE_CHECK][MODULE_CHECK]
[FIRMWARE_CHECK] [KEXEC_CHECK] [INITRAMFS_CHECK]
+ [BOOT_CHECK]
mask:= [[^]MAY_READ] [[^]MAY_WRITE] [[^]MAY_APPEND]
[[^]MAY_EXEC]
fsmagic:= hex value
diff --git a/include/linux/ima.h b/include/linux/ima.h
index 969552b..6c2b80a 100644
--- a/include/linux/ima.h
+++ b/include/linux/ima.h
@@ -22,12 +22,19 @@
IMA_MAX_READ_CHECK
};
+enum ima_buffer_id {
+ BOOT_CHECK = IMA_MAX_READ_CHECK,
+ IMA_MAX_BUFFER_ID
+};
+
#ifdef CONFIG_IMA
extern int ima_bprm_check(struct linux_binprm *bprm);
extern int ima_file_check(struct file *file, int mask, int opened);
extern void ima_file_free(struct file *file);
extern int ima_file_mmap(struct file *file, unsigned long prot);
extern int ima_module_check(struct file *file);
+extern void ima_buffer_check(void *buf, loff_t size,
+ enum ima_buffer_id buffer_id);
extern int ima_hash_and_process_file(struct file *file,
void *buf, loff_t size,
enum ima_policy_id policy_id);
@@ -58,13 +65,18 @@
return 0;
}
+static inline void ima_buffer_check(void *buf, loff_t size,
+ enum ima_buffer_id buffer_id)
+{
+ return;
+}
+
static inline int ima_hash_and_process_file(struct file *file,
void *buf, loff_t size,
enum ima_policy_id policy_id)
{
return 0;
}
-
#endif /* CONFIG_IMA */
#ifdef CONFIG_IMA_APPRAISE
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
index f7c3ce4..c98dfb1 100644
--- a/kernel/kexec_file.c
+++ b/kernel/kexec_file.c
@@ -175,6 +175,9 @@
ret = -EINVAL;
goto out;
}
+
+ ima_buffer_check(image->cmdline_buf, cmdline_len - 1,
+ BOOT_CHECK);
}
/* Call arch image load handlers */
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
index e8f111b..09ccb4e 100644
--- a/security/integrity/ima/ima.h
+++ b/security/integrity/ima/ima.h
@@ -122,6 +122,7 @@
void ima_print_digest(struct seq_file *m, u8 *digest, u32 size);
struct ima_template_desc *ima_template_desc_current(void);
int ima_init_template(void);
+int ima_match_buffer_id(enum ima_buffer_id buffer_id);
/*
* used to protect h_table and sha_table
@@ -161,7 +162,7 @@
/* IMA policy related functions */
enum ima_hooks {
- FILE_CHECK = IMA_MAX_READ_CHECK,
+ FILE_CHECK = IMA_MAX_BUFFER_ID,
MMAP_CHECK,
BPRM_CHECK,
POST_SETATTR
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 2955118..b6e9bf2 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -24,6 +24,7 @@
#include <linux/slab.h>
#include <linux/xattr.h>
#include <linux/ima.h>
+#include <crypto/hash_info.h>
#include "ima.h"
@@ -337,6 +338,72 @@
return 0;
}
+static void process_buffer_measurement(void *buf, loff_t size,
+ enum ima_buffer_id buffer_id)
+{
+ struct ima_template_entry *entry;
+ struct integrity_iint_cache tmp_iint, *iint = &tmp_iint;
+ struct ima_event_data event_data = {iint, NULL, NULL, NULL, 0, NULL};
+ struct ima_digest_data *hash;
+ char *name;
+ int length = hash_digest_size[ima_hash_algo];
+ int violation = 0;
+ int result;
+
+ hash = kzalloc(sizeof(*hash) + length, GFP_KERNEL);
+ if (!hash)
+ return;
+
+ hash->algo = ima_hash_algo;
+ result = ima_calc_buffer_hash(buf, size, hash);
+ if (result < 0)
+ goto out;
+
+ iint->ima_hash = hash;
+ iint->ima_hash->algo = ima_hash_algo;
+ iint->ima_hash->length = length;
+
+ switch (buffer_id) {
+ case BOOT_CHECK:
+ name = "boot-cmdline";
+ break;
+ default:
+ name = "unknown";
+ }
+
+ event_data.filename = name;
+ result = ima_alloc_init_template(&event_data, &entry);
+ if (result < 0)
+ goto out;
+
+ result = ima_store_template(entry, violation, NULL, name);
+ if (result < 0) {
+ ima_free_template_entry(entry);
+ goto out;
+ }
+ return;
+
+out:
+ kfree(hash);
+}
+
+/**
+ * ima_buffer_check - based on policy, collect & store buffer measurement
+ * @buf: pointer to buffer
+ * @size: size of buffer
+ * @buffer_id: caller identifier
+ *
+ * Buffers can only be measured, not appraised. The buffer identifier
+ * is used as the measurement list entry name (eg. boot_cmdline).
+ */
+void ima_buffer_check(void *buf, loff_t size, enum ima_buffer_id buffer_id)
+{
+ if (!ima_match_buffer_id(buffer_id))
+ return;
+
+ process_buffer_measurement(buf, size, buffer_id);
+}
+
/**
* ima_hash_and_process_file - in memory collect/appraise/audit measurement
* @file: pointer to the file to be measured/appraised/audit
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c
index bf30acf..7645616 100644
--- a/security/integrity/ima/ima_policy.c
+++ b/security/integrity/ima/ima_policy.c
@@ -56,6 +56,7 @@
union {
enum ima_hooks func;
enum ima_policy_id policy_id;
+ enum ima_buffer_id buffer_id;
} hooks;
int mask;
unsigned long fsmagic;
@@ -363,6 +364,29 @@
return action;
}
+/**
+ * ima_match_buffer_id - decision based on policy containing buffer id
+ * @buffer_id: IMA buffer identifier
+ *
+ * Measure decision based the buffer identifier's existence in policy.
+ * (Without an inode, buffers can only be measured, not appraised.)
+ */
+int ima_match_buffer_id(enum ima_buffer_id buffer_id)
+{
+ struct ima_rule_entry *entry;
+ int result = 0;
+
+ rcu_read_lock();
+ list_for_each_entry_rcu(entry, ima_rules, list) {
+ if ((entry->action == MEASURE) && (entry->flags & IMA_FUNC) &&
+ (entry->hooks.buffer_id == buffer_id))
+ result = 1;
+ }
+ rcu_read_unlock();
+
+ return result;
+}
+
/*
* Initialize the ima_policy_flag variable based on the currently
* loaded policy. Based on this flag, the decision to short circuit
@@ -628,6 +652,8 @@
entry->hooks.policy_id = POLICY_CHECK;
else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
entry->hooks.policy_id = MODULE_CHECK;
+ else if (strcmp(args[0].from, "BOOT_CHECK") == 0)
+ entry->hooks.buffer_id = BOOT_CHECK;
else
result = -EINVAL;
if (!result)
@@ -875,7 +901,7 @@
func_file = 0, func_mmap, func_bprm,
func_module, func_post,
func_kexec, func_initramfs, func_firmware,
- func_policy
+ func_policy, func_cmdline
};
static char *func_tokens[] = {
@@ -887,7 +913,8 @@
"KEXEC_CHECK",
"INITRAMFS_CHECK",
"FIRMWARE_CHECK",
- "POLICY_CHECK"
+ "POLICY_CHECK",
+ "BOOT_CHECK"
};
void *ima_policy_start(struct seq_file *m, loff_t *pos)
@@ -978,6 +1005,9 @@
case MODULE_CHECK:
seq_printf(m, pt(Opt_func), ft(func_module));
break;
+ case BOOT_CHECK:
+ seq_printf(m, pt(Opt_func), ft(func_cmdline));
+ break;
default:
snprintf(tbuf, sizeof(tbuf), "%d",
entry->hooks.func);