On Tue, 2015-11-24 at 16:18 -0500, Mehmet Kayaalp wrote:
> Place a system_extra_cert buffer of configurable size, right after the
> system_certificate_list, so that inserted keys can be readily processed by
> the existing mechanism. Added script takes a key file and a kernel image
> and inserts its contents to the reserved area. The
> system_certificate_list_size is also adjusted accordingly.
> 
> Call the script as:
> 
>     scripts/insert-sys-cert -b <vmlinux> -c <certfile>
> 
> If vmlinux has no symbol table, supply System.map file with -s flag.
> Subsequent runs replace the previously inserted key, instead of appending
> the new one.
> 
> Signed-off-by: Mehmet Kayaalp <mkaya...@linux.vnet.ibm.com>

Thanks, Mehmet!

Although the expected usecase scenario for inserting certificates in the
image is for modifying an existing kernel image, not for building a
kernel,  you might want to modify "make" to compare the uncompressed and
compressed image time stamps.  If the compressed image time stamp is
earlier than the uncompressed one, output a message indicating the image
changed and compress the image again.

For now, anyone attempting to insert an additional or different
certificate needs to remove the existing compressed image.

Acked-by:  Mimi Zohar <zo...@linux.vnet.ibm.com>

> ---
>  certs/Kconfig               |  16 ++
>  certs/system_certificates.S |  12 ++
>  scripts/.gitignore          |   1 +
>  scripts/Makefile            |   1 +
>  scripts/insert-sys-cert.c   | 410 
> ++++++++++++++++++++++++++++++++++++++++++++
>  5 files changed, 440 insertions(+)
>  create mode 100644 scripts/insert-sys-cert.c
> 
> diff --git a/certs/Kconfig b/certs/Kconfig
> index b030b9c7ed34..f0f8a4433685 100644
> --- a/certs/Kconfig
> +++ b/certs/Kconfig
> @@ -39,4 +39,20 @@ config SYSTEM_TRUSTED_KEYS
>         form of DER-encoded *.x509 files in the top-level build directory,
>         those are no longer used. You will need to set this option instead.
> 
> +config SYSTEM_EXTRA_CERTIFICATE
> +     bool "Reserve area for inserting a certificate without recompiling"
> +     depends on SYSTEM_TRUSTED_KEYRING
> +     help
> +       If set, space for an extra certificate will be reserved in the kernel
> +       image. This allows introducing a trusted certificate to the default
> +       system keyring without recompiling the kernel.
> +
> +config SYSTEM_EXTRA_CERTIFICATE_SIZE
> +     int "Number of bytes to reserve for the extra certificate"
> +     depends on SYSTEM_EXTRA_CERTIFICATE
> +     default 4096
> +     help
> +       This is the number of bytes reserved in the kernel image for a
> +       certificate to be inserted.
> +
>  endmenu
> diff --git a/certs/system_certificates.S b/certs/system_certificates.S
> index 9216e8c81764..f82e1b22eac4 100644
> --- a/certs/system_certificates.S
> +++ b/certs/system_certificates.S
> @@ -13,6 +13,18 @@ __cert_list_start:
>       .incbin "certs/x509_certificate_list"
>  __cert_list_end:
> 
> +#ifdef CONFIG_SYSTEM_EXTRA_CERTIFICATE
> +     .globl VMLINUX_SYMBOL(system_extra_cert)
> +     .size system_extra_cert, CONFIG_SYSTEM_EXTRA_CERTIFICATE_SIZE
> +VMLINUX_SYMBOL(system_extra_cert):
> +     .fill CONFIG_SYSTEM_EXTRA_CERTIFICATE_SIZE, 1, 0
> +
> +     .globl VMLINUX_SYMBOL(system_extra_cert_used)
> +VMLINUX_SYMBOL(system_extra_cert_used):
> +     .int 0
> +
> +#endif /* CONFIG_SYSTEM_EXTRA_CERTIFICATE */
> +
>       .align 8
>       .globl VMLINUX_SYMBOL(system_certificate_list_size)
>  VMLINUX_SYMBOL(system_certificate_list_size):
> diff --git a/scripts/.gitignore b/scripts/.gitignore
> index 1f78169d4254..e063daa3ec4a 100644
> --- a/scripts/.gitignore
> +++ b/scripts/.gitignore
> @@ -13,3 +13,4 @@ sortextable
>  asn1_compiler
>  extract-cert
>  sign-file
> +insert-sys-cert
> diff --git a/scripts/Makefile b/scripts/Makefile
> index fd0d53d4a234..822ab4a6a4aa 100644
> --- a/scripts/Makefile
> +++ b/scripts/Makefile
> @@ -19,6 +19,7 @@ hostprogs-$(CONFIG_BUILDTIME_EXTABLE_SORT) += sortextable
>  hostprogs-$(CONFIG_ASN1)      += asn1_compiler
>  hostprogs-$(CONFIG_MODULE_SIG)        += sign-file
>  hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert
> +hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
> 
>  HOSTCFLAGS_sortextable.o = -I$(srctree)/tools/include
>  HOSTCFLAGS_asn1_compiler.o = -I$(srctree)/include
> diff --git a/scripts/insert-sys-cert.c b/scripts/insert-sys-cert.c
> new file mode 100644
> index 000000000000..8902836c2342
> --- /dev/null
> +++ b/scripts/insert-sys-cert.c
> @@ -0,0 +1,410 @@
> +/* Write the contents of the <certfile> into kernel symbol system_extra_cert
> + *
> + * Copyright (C) IBM Corporation, 2015
> + *
> + * Author: Mehmet Kayaalp <mkaya...@linux.vnet.ibm.com>
> + *
> + * This software may be used and distributed according to the terms
> + * of the GNU General Public License, incorporated herein by reference.
> + *
> + * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile>
> + */
> +
> +#define _GNU_SOURCE
> +#include <stdio.h>
> +#include <ctype.h>
> +#include <string.h>
> +#include <limits.h>
> +#include <stdbool.h>
> +#include <errno.h>
> +#include <stdlib.h>
> +#include <stdarg.h>
> +#include <sys/types.h>
> +#include <sys/stat.h>
> +#include <sys/mman.h>
> +#include <fcntl.h>
> +#include <unistd.h>
> +#include <elf.h>
> +
> +#define CERT_SYM  "system_extra_cert"
> +#define USED_SYM  "system_extra_cert_used"
> +#define LSIZE_SYM "system_certificate_list_size"
> +
> +#define info(format, args...) fprintf(stderr, "INFO:    " format, ## args)
> +#define warn(format, args...) fprintf(stdout, "WARNING: " format, ## args)
> +#define  err(format, args...) fprintf(stderr, "ERROR:   " format, ## args)
> +
> +#if UINTPTR_MAX == 0xffffffff
> +#define CURRENT_ELFCLASS ELFCLASS32
> +#define Elf_Ehdr     Elf32_Ehdr
> +#define Elf_Shdr     Elf32_Shdr
> +#define Elf_Sym              Elf32_Sym
> +#else
> +#define CURRENT_ELFCLASS ELFCLASS64
> +#define Elf_Ehdr     Elf64_Ehdr
> +#define Elf_Shdr     Elf64_Shdr
> +#define Elf_Sym              Elf64_Sym
> +#endif
> +
> +static unsigned char endianness(void)
> +{
> +     uint16_t two_byte = 0x00FF;
> +     uint8_t low_address = *((uint8_t *)&two_byte);
> +
> +     if (low_address == 0)
> +             return ELFDATA2MSB;
> +     else
> +             return ELFDATA2LSB;
> +}
> +
> +struct sym {
> +     char *name;
> +     unsigned long address;
> +     unsigned long offset;
> +     void *content;
> +     int size;
> +};
> +
> +static unsigned long get_offset_from_address(Elf_Ehdr *hdr, unsigned long 
> addr)
> +{
> +     Elf_Shdr *x;
> +     unsigned int i, num_sections;
> +
> +     x = (void *)hdr + hdr->e_shoff;
> +     if (hdr->e_shnum == SHN_UNDEF)
> +             num_sections = x[0].sh_size;
> +     else
> +             num_sections = hdr->e_shnum;
> +
> +     for (i = 1; i < num_sections; i++) {
> +             unsigned long start = x[i].sh_addr;
> +             unsigned long end = start + x[i].sh_size;
> +             unsigned long offset = x[i].sh_offset;
> +
> +             if (addr >= start && addr <= end)
> +                     return addr - start + offset;
> +     }
> +     return 0;
> +}
> +
> +
> +#define LINE_SIZE 100
> +
> +static void get_symbol_from_map(Elf_Ehdr *hdr, FILE *f, char *name,
> +                             struct sym *s)
> +{
> +     char l[LINE_SIZE];
> +     char *w, *p, *n;
> +
> +     s->size = 0;
> +     s->address = 0;
> +     s->offset = 0;
> +     if (fseek(f, 0, SEEK_SET) != 0) {
> +             perror("File seek failed");
> +             exit(EXIT_FAILURE);
> +     }
> +     while (fgets(l, LINE_SIZE, f)) {
> +             p = strchr(l, '\n');
> +             if (!p) {
> +                     err("Missing line ending.\n");
> +                     return;
> +             }
> +             n = strstr(l, name);
> +             if (n)
> +                     break;
> +     }
> +     if (!n) {
> +             err("Unable to find symbol: %s\n", name);
> +             return;
> +     }
> +     w = strchr(l, ' ');
> +     if (!w)
> +             return;
> +
> +     *w = '\0';
> +     s->address = strtoul(l, NULL, 16);
> +     if (s->address == 0)
> +             return;
> +     s->offset = get_offset_from_address(hdr, s->address);
> +     s->name = name;
> +     s->content = (void *)hdr + s->offset;
> +}
> +
> +static Elf_Sym *find_elf_symbol(Elf_Ehdr *hdr, Elf_Shdr *symtab, char *name)
> +{
> +     Elf_Sym *sym, *symtab_start;
> +     char *strtab, *symname;
> +     unsigned int link;
> +     Elf_Shdr *x;
> +     int i, n;
> +
> +     x = (void *)hdr + hdr->e_shoff;
> +     link = symtab->sh_link;
> +     symtab_start = (void *)hdr + symtab->sh_offset;
> +     n = symtab->sh_size / symtab->sh_entsize;
> +     strtab = (void *)hdr + x[link].sh_offset;
> +
> +     for (i = 0; i < n; i++) {
> +             sym = &symtab_start[i];
> +             symname = strtab + sym->st_name;
> +             if (strcmp(symname, name) == 0)
> +                     return sym;
> +     }
> +     err("Unable to find symbol: %s\n", name);
> +     return NULL;
> +}
> +
> +static void get_symbol_from_table(Elf_Ehdr *hdr, Elf_Shdr *symtab,
> +                               char *name, struct sym *s)
> +{
> +     Elf_Shdr *sec;
> +     int secndx;
> +     Elf_Sym *elf_sym;
> +     Elf_Shdr *x;
> +
> +     x = (void *)hdr + hdr->e_shoff;
> +     s->size = 0;
> +     s->address = 0;
> +     s->offset = 0;
> +     elf_sym = find_elf_symbol(hdr, symtab, name);
> +     if (!elf_sym)
> +             return;
> +     secndx = elf_sym->st_shndx;
> +     if (!secndx)
> +             return;
> +     sec = &x[secndx];
> +     s->size = elf_sym->st_size;
> +     s->address = elf_sym->st_value;
> +     s->offset = s->address - sec->sh_addr
> +                            + sec->sh_offset;
> +     s->name = name;
> +     s->content = (void *)hdr + s->offset;
> +}
> +
> +static Elf_Shdr *get_symbol_table(Elf_Ehdr *hdr)
> +{
> +     Elf_Shdr *x;
> +     unsigned int i, num_sections;
> +
> +     x = (void *)hdr + hdr->e_shoff;
> +     if (hdr->e_shnum == SHN_UNDEF)
> +             num_sections = x[0].sh_size;
> +     else
> +             num_sections = hdr->e_shnum;
> +
> +     for (i = 1; i < num_sections; i++)
> +             if (x[i].sh_type == SHT_SYMTAB)
> +                     return &x[i];
> +     return NULL;
> +}
> +
> +static void *map_file(char *file_name, int *size)
> +{
> +     struct stat st;
> +     void *map;
> +     int fd;
> +
> +     fd = open(file_name, O_RDWR);
> +     if (fd < 0) {
> +             perror(file_name);
> +             return NULL;
> +     }
> +     if (fstat(fd, &st)) {
> +             perror("Could not determine file size");
> +             close(fd);
> +             return NULL;
> +     }
> +     *size = st.st_size;
> +     map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0);
> +     if (map == MAP_FAILED) {
> +             perror("Mapping to memory failed");
> +             close(fd);
> +             return NULL;
> +     }
> +     close(fd);
> +     return map;
> +}
> +
> +static char *read_file(char *file_name, int *size)
> +{
> +     struct stat st;
> +     char *buf;
> +     int fd;
> +
> +     fd = open(file_name, O_RDONLY);
> +     if (fd < 0) {
> +             perror(file_name);
> +             return NULL;
> +     }
> +     if (fstat(fd, &st)) {
> +             perror("Could not determine file size");
> +             close(fd);
> +             return NULL;
> +     }
> +     *size = st.st_size;
> +     buf = malloc(*size);
> +     if (!buf) {
> +             perror("Allocating memory failed");
> +             close(fd);
> +             return NULL;
> +     }
> +     if (read(fd, buf, *size) != *size) {
> +             perror("File read failed");
> +             close(fd);
> +             return NULL;
> +     }
> +     close(fd);
> +     return buf;
> +}
> +
> +static void print_sym(Elf_Ehdr *hdr, struct sym *s)
> +{
> +     info("sym:    %s\n", s->name);
> +     info("addr:   0x%lx\n", s->address);
> +     info("size:   %d\n", s->size);
> +     info("offset: 0x%lx\n", (unsigned long)s->offset);
> +}
> +
> +static void print_usage(char *e)
> +{
> +     printf("Usage %s [-s <System.map>] -b <vmlinux> -c <certfile>\n", e);
> +}
> +
> +int main(int argc, char **argv)
> +{
> +     char *system_map_file = NULL;
> +     char *vmlinux_file = NULL;
> +     char *cert_file = NULL;
> +     int vmlinux_size;
> +     int cert_size;
> +     Elf_Ehdr *hdr;
> +     char *cert;
> +     FILE *system_map;
> +     unsigned long *lsize;
> +     int *used;
> +     int opt;
> +     Elf_Shdr *symtab = NULL;
> +     struct sym cert_sym, lsize_sym, used_sym;
> +
> +     while ((opt = getopt(argc, argv, "b:c:s:")) != -1) {
> +             switch (opt) {
> +             case 's':
> +                     system_map_file = optarg;
> +                     break;
> +             case 'b':
> +                     vmlinux_file = optarg;
> +                     break;
> +             case 'c':
> +                     cert_file = optarg;
> +                     break;
> +             default:
> +                     break;
> +             }
> +     }
> +
> +     if (!vmlinux_file || !cert_file) {
> +             print_usage(argv[0]);
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     cert = read_file(cert_file, &cert_size);
> +     if (!cert)
> +             exit(EXIT_FAILURE);
> +
> +     hdr = map_file(vmlinux_file, &vmlinux_size);
> +     if (!hdr)
> +             exit(EXIT_FAILURE);
> +
> +     if (vmlinux_size < sizeof(*hdr)) {
> +             err("Invalid ELF file.\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
> +         (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
> +         (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
> +         (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
> +             err("Invalid ELF magic.\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     if (hdr->e_ident[EI_CLASS] != CURRENT_ELFCLASS) {
> +             err("ELF class mismatch.\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     if (hdr->e_ident[EI_DATA] != endianness()) {
> +             err("ELF endian mismatch.\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     if (hdr->e_shoff > vmlinux_size) {
> +             err("Could not find section header.\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     symtab = get_symbol_table(hdr);
> +     if (!symtab) {
> +             warn("Could not find the symbol table.\n");
> +             if (!system_map_file) {
> +                     err("Please provide a System.map file.\n");
> +                     print_usage(argv[0]);
> +                     exit(EXIT_FAILURE);
> +             }
> +
> +             system_map = fopen(system_map_file, "r");
> +             if (!system_map) {
> +                     perror(system_map_file);
> +                     exit(EXIT_FAILURE);
> +             }
> +             get_symbol_from_map(hdr, system_map, CERT_SYM, &cert_sym);
> +             get_symbol_from_map(hdr, system_map, USED_SYM, &used_sym);
> +             get_symbol_from_map(hdr, system_map, LSIZE_SYM, &lsize_sym);
> +             cert_sym.size = used_sym.address - cert_sym.address;
> +     } else {
> +             info("Symbol table found.\n");
> +             if (system_map_file)
> +                     warn("System.map is ignored.\n");
> +             get_symbol_from_table(hdr, symtab, CERT_SYM, &cert_sym);
> +             get_symbol_from_table(hdr, symtab, USED_SYM, &used_sym);
> +             get_symbol_from_table(hdr, symtab, LSIZE_SYM, &lsize_sym);
> +     }
> +
> +     if (!cert_sym.offset || !lsize_sym.offset || !used_sym.offset)
> +             exit(EXIT_FAILURE);
> +
> +     print_sym(hdr, &cert_sym);
> +     print_sym(hdr, &used_sym);
> +     print_sym(hdr, &lsize_sym);
> +
> +     lsize = (unsigned long *)lsize_sym.content;
> +     used = (int *)used_sym.content;
> +
> +     if (cert_sym.size < cert_size) {
> +             err("Certificate is larger than the reserved area!\n");
> +             exit(EXIT_FAILURE);
> +     }
> +
> +     /* If the existing cert is the same, don't overwrite */
> +     if (cert_size == *used &&
> +         strncmp(cert_sym.content, cert, cert_size) == 0) {
> +             warn("Certificate was already inserted.\n");
> +             exit(EXIT_SUCCESS);
> +     }
> +
> +     if (*used > 0)
> +             warn("Replacing previously inserted certificate.\n");
> +
> +     memcpy(cert_sym.content, cert, cert_size);
> +     if (cert_size < cert_sym.size)
> +             memset(cert_sym.content + cert_size,
> +                     0, cert_sym.size - cert_size);
> +
> +     *lsize = *lsize + cert_size - *used;
> +     *used = cert_size;
> +     info("Inserted the contents of %s into %lx.\n", cert_file,
> +                                             cert_sym.address);
> +     info("Used %d bytes out of %d bytes reserved.\n", *used,
> +                                              cert_sym.size);
> +     exit(EXIT_SUCCESS);
> +}


--
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to