Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Tue, 2016-11-08 at 15:47 -0500, Mimi Zohar wrote: > On Tue, 2016-11-08 at 21:46 +0200, Dmitry Kasatkin wrote: > > On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermann > > > +/* Restore the serialized binary measurement list without extending > > > PCRs. */ > > > +int ima_restore_measurement_list(loff_t size, void *buf) > > > +{ > > > + struct binary_hdr_v1 { > > > + u32 pcr; > > > + u8 digest[TPM_DIGEST_SIZE]; > > > + u32 template_name_len; > > > + char template_name[0]; > > > + } __packed; > > > + char template_name[MAX_TEMPLATE_NAME_LEN]; > > > + > > > + struct binary_data_v1 { > > > + u32 template_data_size; > > > + char template_data[0]; > > > + } __packed; > > > + > > > + struct ima_kexec_hdr *khdr = buf; > > > + struct binary_hdr_v1 *hdr_v1; > > > + struct binary_data_v1 *data_v1; > > > + > > > + void *bufp = buf + sizeof(*khdr); > > > + void *bufendp = buf + khdr->buffer_size; > > > + struct ima_template_entry *entry; > > > + struct ima_template_desc *template_desc; > > > + unsigned long count = 0; > > > + int ret = 0; > > > + > > > + if (!buf || size < sizeof(*khdr)) > > > + return 0; > > > + > > > + if (khdr->version != 1) { > > > + pr_err("attempting to restore a incompatible measurement > > > list"); > > > + return 0; > > > + } > > > + > > > + /* > > > +* ima kexec buffer prefix: version, buffer size, count > > > +* v1 format: pcr, digest, template-name-len, template-name, > > > +*template-data-size, template-data > > > +*/ > > > + while ((bufp < bufendp) && (count++ < khdr->count)) { > > > + if (count > ULONG_MAX - 1) { > > > + pr_err("attempting to restore too many > > > measurements"); > > > + ret = -EINVAL; > > > + } > > > + > > > + hdr_v1 = bufp; > > > + if ((hdr_v1->template_name_len >= MAX_TEMPLATE_NAME_LEN) > > > || > > > + ((bufp + hdr_v1->template_name_len) > bufendp)) { > > > > based on following code template_name_len does not include header > > (sizeof(*hdr_v1))? > > If so the check is wrong??? > > Yes, good catch. In addition, before assigning hdr_v1 there should be a > size check as well. > > > > > > + pr_err("attempting to restore a template name \ > > > + that is too long\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + bufp += sizeof(*hdr_v1); This line should have been before the test above. > > > + > > > + /* template name is not null terminated */ > > > + memcpy(template_name, bufp, hdr_v1->template_name_len); > > > + template_name[hdr_v1->template_name_len] = 0; > > > + > > > + if (strcmp(template_name, "ima") == 0) { > > > + pr_err("attempting to restore an unsupported \ > > > + template \"%s\" failed\n", template_name); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + data_v1 = bufp += (u_int8_t)hdr_v1->template_name_len; > > > + > > > + /* get template format */ > > > + template_desc = lookup_template_desc(template_name); > > > + if (!template_desc) { > > > + pr_err("template \"%s\" not found\n", > > > template_name); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + > > > + if (bufp > (bufendp - > > > sizeof(data_v1->template_data_size))) { > > > + pr_err("restoring the template data size > > > failed\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + bufp += (u_int8_t) sizeof(data_v1->template_data_size); > > > + > > > + if (bufp > (bufendp - data_v1->template_data_size)) { > > > + pr_err("restoring the template data failed\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + > > > > It looks like a similar problem... sizeof(struct binary_data_v1) is > > missing in the check... > > Following the template name, is the template data length and the > template data. > > > > + ret = ima_restore_template_data(template_desc, > > > + data_v1->template_data, > > > + > > > data_v1->template_data_size, > > > + ); > > > + if (ret < 0) > >
Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Tue, 2016-11-08 at 15:47 -0500, Mimi Zohar wrote: > On Tue, 2016-11-08 at 21:46 +0200, Dmitry Kasatkin wrote: > > On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermann > > > +/* Restore the serialized binary measurement list without extending > > > PCRs. */ > > > +int ima_restore_measurement_list(loff_t size, void *buf) > > > +{ > > > + struct binary_hdr_v1 { > > > + u32 pcr; > > > + u8 digest[TPM_DIGEST_SIZE]; > > > + u32 template_name_len; > > > + char template_name[0]; > > > + } __packed; > > > + char template_name[MAX_TEMPLATE_NAME_LEN]; > > > + > > > + struct binary_data_v1 { > > > + u32 template_data_size; > > > + char template_data[0]; > > > + } __packed; > > > + > > > + struct ima_kexec_hdr *khdr = buf; > > > + struct binary_hdr_v1 *hdr_v1; > > > + struct binary_data_v1 *data_v1; > > > + > > > + void *bufp = buf + sizeof(*khdr); > > > + void *bufendp = buf + khdr->buffer_size; > > > + struct ima_template_entry *entry; > > > + struct ima_template_desc *template_desc; > > > + unsigned long count = 0; > > > + int ret = 0; > > > + > > > + if (!buf || size < sizeof(*khdr)) > > > + return 0; > > > + > > > + if (khdr->version != 1) { > > > + pr_err("attempting to restore a incompatible measurement > > > list"); > > > + return 0; > > > + } > > > + > > > + /* > > > +* ima kexec buffer prefix: version, buffer size, count > > > +* v1 format: pcr, digest, template-name-len, template-name, > > > +*template-data-size, template-data > > > +*/ > > > + while ((bufp < bufendp) && (count++ < khdr->count)) { > > > + if (count > ULONG_MAX - 1) { > > > + pr_err("attempting to restore too many > > > measurements"); > > > + ret = -EINVAL; > > > + } > > > + > > > + hdr_v1 = bufp; > > > + if ((hdr_v1->template_name_len >= MAX_TEMPLATE_NAME_LEN) > > > || > > > + ((bufp + hdr_v1->template_name_len) > bufendp)) { > > > > based on following code template_name_len does not include header > > (sizeof(*hdr_v1))? > > If so the check is wrong??? > > Yes, good catch. In addition, before assigning hdr_v1 there should be a > size check as well. > > > > > > + pr_err("attempting to restore a template name \ > > > + that is too long\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + bufp += sizeof(*hdr_v1); This line should have been before the test above. > > > + > > > + /* template name is not null terminated */ > > > + memcpy(template_name, bufp, hdr_v1->template_name_len); > > > + template_name[hdr_v1->template_name_len] = 0; > > > + > > > + if (strcmp(template_name, "ima") == 0) { > > > + pr_err("attempting to restore an unsupported \ > > > + template \"%s\" failed\n", template_name); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + data_v1 = bufp += (u_int8_t)hdr_v1->template_name_len; > > > + > > > + /* get template format */ > > > + template_desc = lookup_template_desc(template_name); > > > + if (!template_desc) { > > > + pr_err("template \"%s\" not found\n", > > > template_name); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + > > > + if (bufp > (bufendp - > > > sizeof(data_v1->template_data_size))) { > > > + pr_err("restoring the template data size > > > failed\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + bufp += (u_int8_t) sizeof(data_v1->template_data_size); > > > + > > > + if (bufp > (bufendp - data_v1->template_data_size)) { > > > + pr_err("restoring the template data failed\n"); > > > + ret = -EINVAL; > > > + break; > > > + } > > > + > > > > It looks like a similar problem... sizeof(struct binary_data_v1) is > > missing in the check... > > Following the template name, is the template data length and the > template data. > > > > + ret = ima_restore_template_data(template_desc, > > > + data_v1->template_data, > > > + > > > data_v1->template_data_size, > > > + ); > > > + if (ret < 0) > >
Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Tue, 2016-11-08 at 21:46 +0200, Dmitry Kasatkin wrote: > On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermann >wrote: > > From: Mimi Zohar > > > > The TPM PCRs are only reset on a hard reboot. In order to validate a > > TPM's quote after a soft reboot (eg. kexec -e), the IMA measurement list > > of the running kernel must be saved and restored on boot. This patch > > restores the measurement list. > > > > Changelog v5: > > - replace CONFIG_KEXEC_FILE with architecture CONFIG_HAVE_IMA_KEXEC (Thiago) > > - replace kexec_get_handover_buffer() with ima_get_kexec_buffer() (Thiago) > > - replace kexec_free_handover_buffer() with ima_free_kexec_buffer() (Thiago) > > - remove unnecessary includes from ima_kexec.c (Thiago) > > - fix off-by-one error when checking hdr_v1->template_name_len (Colin King) > > > > Changelog v2: > > - redefined ima_kexec_hdr to use types with well defined sizes (M. Ellerman) > > - defined missing ima_load_kexec_buffer() stub function > > > > Changelog v1: > > - call ima_load_kexec_buffer() (Thiago) > > > > Signed-off-by: Mimi Zohar > > --- > > security/integrity/ima/Makefile | 1 + > > security/integrity/ima/ima.h | 21 + > > security/integrity/ima/ima_init.c | 2 + > > security/integrity/ima/ima_kexec.c| 44 + > > security/integrity/ima/ima_queue.c| 10 ++ > > security/integrity/ima/ima_template.c | 170 > > ++ > > 6 files changed, 248 insertions(+) > > > > diff --git a/security/integrity/ima/Makefile > > b/security/integrity/ima/Makefile > > index 9aeaedad1e2b..29f198bde02b 100644 > > --- a/security/integrity/ima/Makefile > > +++ b/security/integrity/ima/Makefile > > @@ -8,4 +8,5 @@ obj-$(CONFIG_IMA) += ima.o > > ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o > > \ > > ima_policy.o ima_template.o ima_template_lib.o > > ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o > > +ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o > > obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o > > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > > index db25f54a04fe..51dc8d57d64d 100644 > > --- a/security/integrity/ima/ima.h > > +++ b/security/integrity/ima/ima.h > > @@ -28,6 +28,10 @@ > > > > #include "../integrity.h" > > > > +#ifdef CONFIG_HAVE_IMA_KEXEC > > +#include > > +#endif > > + > > enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN, > > IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII }; > > enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; > > @@ -102,6 +106,21 @@ struct ima_queue_entry { > > }; > > extern struct list_head ima_measurements; /* list of all measurements > > */ > > > > +/* Some details preceding the binary serialized measurement list */ > > +struct ima_kexec_hdr { > > + u16 version; > > + u16 _reserved0; > > + u32 _reserved1; > > + u64 buffer_size; > > + u64 count; > > +}; > > + > > +#ifdef CONFIG_HAVE_IMA_KEXEC > > +void ima_load_kexec_buffer(void); > > +#else > > +static inline void ima_load_kexec_buffer(void) {} > > +#endif /* CONFIG_HAVE_IMA_KEXEC */ > > + > > /* Internal IMA function definitions */ > > int ima_init(void); > > int ima_fs_init(void); > > @@ -122,6 +141,8 @@ int ima_init_crypto(void); > > void ima_putc(struct seq_file *m, void *data, int datalen); > > void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); > > struct ima_template_desc *ima_template_desc_current(void); > > +int ima_restore_measurement_entry(struct ima_template_entry *entry); > > +int ima_restore_measurement_list(loff_t bufsize, void *buf); > > int ima_init_template(void); > > > > /* > > diff --git a/security/integrity/ima/ima_init.c > > b/security/integrity/ima/ima_init.c > > index 32912bd54ead..3ba0ca49cba6 100644 > > --- a/security/integrity/ima/ima_init.c > > +++ b/security/integrity/ima/ima_init.c > > @@ -128,6 +128,8 @@ int __init ima_init(void) > > if (rc != 0) > > return rc; > > > > + ima_load_kexec_buffer(); > > + > > rc = ima_add_boot_aggregate(); /* boot aggregate must be first > > entry */ > > if (rc != 0) > > return rc; > > diff --git a/security/integrity/ima/ima_kexec.c > > b/security/integrity/ima/ima_kexec.c > > new file mode 100644 > > index ..36afd0fe9747 > > --- /dev/null > > +++ b/security/integrity/ima/ima_kexec.c > > @@ -0,0 +1,44 @@ > > +/* > > + * Copyright (C) 2016 IBM Corporation > > + * > > + * Authors: > > + * Thiago Jung Bauermann > > + * Mimi Zohar > > + * > > + * This program is free software; you can redistribute it and/or modify > > + * it under the terms of the GNU General Public License as published by > > + * the Free Software Foundation; either version 2 of the License, or > > + * (at your option) any later
Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Tue, 2016-11-08 at 21:46 +0200, Dmitry Kasatkin wrote: > On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermann > wrote: > > From: Mimi Zohar > > > > The TPM PCRs are only reset on a hard reboot. In order to validate a > > TPM's quote after a soft reboot (eg. kexec -e), the IMA measurement list > > of the running kernel must be saved and restored on boot. This patch > > restores the measurement list. > > > > Changelog v5: > > - replace CONFIG_KEXEC_FILE with architecture CONFIG_HAVE_IMA_KEXEC (Thiago) > > - replace kexec_get_handover_buffer() with ima_get_kexec_buffer() (Thiago) > > - replace kexec_free_handover_buffer() with ima_free_kexec_buffer() (Thiago) > > - remove unnecessary includes from ima_kexec.c (Thiago) > > - fix off-by-one error when checking hdr_v1->template_name_len (Colin King) > > > > Changelog v2: > > - redefined ima_kexec_hdr to use types with well defined sizes (M. Ellerman) > > - defined missing ima_load_kexec_buffer() stub function > > > > Changelog v1: > > - call ima_load_kexec_buffer() (Thiago) > > > > Signed-off-by: Mimi Zohar > > --- > > security/integrity/ima/Makefile | 1 + > > security/integrity/ima/ima.h | 21 + > > security/integrity/ima/ima_init.c | 2 + > > security/integrity/ima/ima_kexec.c| 44 + > > security/integrity/ima/ima_queue.c| 10 ++ > > security/integrity/ima/ima_template.c | 170 > > ++ > > 6 files changed, 248 insertions(+) > > > > diff --git a/security/integrity/ima/Makefile > > b/security/integrity/ima/Makefile > > index 9aeaedad1e2b..29f198bde02b 100644 > > --- a/security/integrity/ima/Makefile > > +++ b/security/integrity/ima/Makefile > > @@ -8,4 +8,5 @@ obj-$(CONFIG_IMA) += ima.o > > ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o > > \ > > ima_policy.o ima_template.o ima_template_lib.o > > ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o > > +ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o > > obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o > > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > > index db25f54a04fe..51dc8d57d64d 100644 > > --- a/security/integrity/ima/ima.h > > +++ b/security/integrity/ima/ima.h > > @@ -28,6 +28,10 @@ > > > > #include "../integrity.h" > > > > +#ifdef CONFIG_HAVE_IMA_KEXEC > > +#include > > +#endif > > + > > enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN, > > IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII }; > > enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; > > @@ -102,6 +106,21 @@ struct ima_queue_entry { > > }; > > extern struct list_head ima_measurements; /* list of all measurements > > */ > > > > +/* Some details preceding the binary serialized measurement list */ > > +struct ima_kexec_hdr { > > + u16 version; > > + u16 _reserved0; > > + u32 _reserved1; > > + u64 buffer_size; > > + u64 count; > > +}; > > + > > +#ifdef CONFIG_HAVE_IMA_KEXEC > > +void ima_load_kexec_buffer(void); > > +#else > > +static inline void ima_load_kexec_buffer(void) {} > > +#endif /* CONFIG_HAVE_IMA_KEXEC */ > > + > > /* Internal IMA function definitions */ > > int ima_init(void); > > int ima_fs_init(void); > > @@ -122,6 +141,8 @@ int ima_init_crypto(void); > > void ima_putc(struct seq_file *m, void *data, int datalen); > > void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); > > struct ima_template_desc *ima_template_desc_current(void); > > +int ima_restore_measurement_entry(struct ima_template_entry *entry); > > +int ima_restore_measurement_list(loff_t bufsize, void *buf); > > int ima_init_template(void); > > > > /* > > diff --git a/security/integrity/ima/ima_init.c > > b/security/integrity/ima/ima_init.c > > index 32912bd54ead..3ba0ca49cba6 100644 > > --- a/security/integrity/ima/ima_init.c > > +++ b/security/integrity/ima/ima_init.c > > @@ -128,6 +128,8 @@ int __init ima_init(void) > > if (rc != 0) > > return rc; > > > > + ima_load_kexec_buffer(); > > + > > rc = ima_add_boot_aggregate(); /* boot aggregate must be first > > entry */ > > if (rc != 0) > > return rc; > > diff --git a/security/integrity/ima/ima_kexec.c > > b/security/integrity/ima/ima_kexec.c > > new file mode 100644 > > index ..36afd0fe9747 > > --- /dev/null > > +++ b/security/integrity/ima/ima_kexec.c > > @@ -0,0 +1,44 @@ > > +/* > > + * Copyright (C) 2016 IBM Corporation > > + * > > + * Authors: > > + * Thiago Jung Bauermann > > + * Mimi Zohar > > + * > > + * This program is free software; you can redistribute it and/or modify > > + * it under the terms of the GNU General Public License as published by > > + * the Free Software Foundation; either version 2 of the License, or > > + * (at your option) any later version. > > + */ > > +#include "ima.h" > > + > > +/* > > + * Restore the measurement list from the previous kernel. > > + */ > > +void
Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermannwrote: > From: Mimi Zohar > > The TPM PCRs are only reset on a hard reboot. In order to validate a > TPM's quote after a soft reboot (eg. kexec -e), the IMA measurement list > of the running kernel must be saved and restored on boot. This patch > restores the measurement list. > > Changelog v5: > - replace CONFIG_KEXEC_FILE with architecture CONFIG_HAVE_IMA_KEXEC (Thiago) > - replace kexec_get_handover_buffer() with ima_get_kexec_buffer() (Thiago) > - replace kexec_free_handover_buffer() with ima_free_kexec_buffer() (Thiago) > - remove unnecessary includes from ima_kexec.c (Thiago) > - fix off-by-one error when checking hdr_v1->template_name_len (Colin King) > > Changelog v2: > - redefined ima_kexec_hdr to use types with well defined sizes (M. Ellerman) > - defined missing ima_load_kexec_buffer() stub function > > Changelog v1: > - call ima_load_kexec_buffer() (Thiago) > > Signed-off-by: Mimi Zohar > --- > security/integrity/ima/Makefile | 1 + > security/integrity/ima/ima.h | 21 + > security/integrity/ima/ima_init.c | 2 + > security/integrity/ima/ima_kexec.c| 44 + > security/integrity/ima/ima_queue.c| 10 ++ > security/integrity/ima/ima_template.c | 170 > ++ > 6 files changed, 248 insertions(+) > > diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile > index 9aeaedad1e2b..29f198bde02b 100644 > --- a/security/integrity/ima/Makefile > +++ b/security/integrity/ima/Makefile > @@ -8,4 +8,5 @@ obj-$(CONFIG_IMA) += ima.o > ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ > ima_policy.o ima_template.o ima_template_lib.o > ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o > +ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o > obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > index db25f54a04fe..51dc8d57d64d 100644 > --- a/security/integrity/ima/ima.h > +++ b/security/integrity/ima/ima.h > @@ -28,6 +28,10 @@ > > #include "../integrity.h" > > +#ifdef CONFIG_HAVE_IMA_KEXEC > +#include > +#endif > + > enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN, > IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII }; > enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; > @@ -102,6 +106,21 @@ struct ima_queue_entry { > }; > extern struct list_head ima_measurements; /* list of all measurements */ > > +/* Some details preceding the binary serialized measurement list */ > +struct ima_kexec_hdr { > + u16 version; > + u16 _reserved0; > + u32 _reserved1; > + u64 buffer_size; > + u64 count; > +}; > + > +#ifdef CONFIG_HAVE_IMA_KEXEC > +void ima_load_kexec_buffer(void); > +#else > +static inline void ima_load_kexec_buffer(void) {} > +#endif /* CONFIG_HAVE_IMA_KEXEC */ > + > /* Internal IMA function definitions */ > int ima_init(void); > int ima_fs_init(void); > @@ -122,6 +141,8 @@ int ima_init_crypto(void); > void ima_putc(struct seq_file *m, void *data, int datalen); > void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); > struct ima_template_desc *ima_template_desc_current(void); > +int ima_restore_measurement_entry(struct ima_template_entry *entry); > +int ima_restore_measurement_list(loff_t bufsize, void *buf); > int ima_init_template(void); > > /* > diff --git a/security/integrity/ima/ima_init.c > b/security/integrity/ima/ima_init.c > index 32912bd54ead..3ba0ca49cba6 100644 > --- a/security/integrity/ima/ima_init.c > +++ b/security/integrity/ima/ima_init.c > @@ -128,6 +128,8 @@ int __init ima_init(void) > if (rc != 0) > return rc; > > + ima_load_kexec_buffer(); > + > rc = ima_add_boot_aggregate(); /* boot aggregate must be first entry > */ > if (rc != 0) > return rc; > diff --git a/security/integrity/ima/ima_kexec.c > b/security/integrity/ima/ima_kexec.c > new file mode 100644 > index ..36afd0fe9747 > --- /dev/null > +++ b/security/integrity/ima/ima_kexec.c > @@ -0,0 +1,44 @@ > +/* > + * Copyright (C) 2016 IBM Corporation > + * > + * Authors: > + * Thiago Jung Bauermann > + * Mimi Zohar > + * > + * This program is free software; you can redistribute it and/or modify > + * it under the terms of the GNU General Public License as published by > + * the Free Software Foundation; either version 2 of the License, or > + * (at your option) any later version. > + */ > +#include "ima.h" > + > +/* > + * Restore the measurement list from the previous kernel. > + */ > +void ima_load_kexec_buffer(void) > +{ > + void *kexec_buffer = NULL; > + size_t kexec_buffer_size = 0; > + int rc; > + > + rc = ima_get_kexec_buffer(_buffer, _buffer_size); > +
Re: [Linux-ima-devel] [PATCH v6 02/10] ima: on soft reboot, restore the measurement list
On Fri, Oct 21, 2016 at 5:44 AM, Thiago Jung Bauermann wrote: > From: Mimi Zohar > > The TPM PCRs are only reset on a hard reboot. In order to validate a > TPM's quote after a soft reboot (eg. kexec -e), the IMA measurement list > of the running kernel must be saved and restored on boot. This patch > restores the measurement list. > > Changelog v5: > - replace CONFIG_KEXEC_FILE with architecture CONFIG_HAVE_IMA_KEXEC (Thiago) > - replace kexec_get_handover_buffer() with ima_get_kexec_buffer() (Thiago) > - replace kexec_free_handover_buffer() with ima_free_kexec_buffer() (Thiago) > - remove unnecessary includes from ima_kexec.c (Thiago) > - fix off-by-one error when checking hdr_v1->template_name_len (Colin King) > > Changelog v2: > - redefined ima_kexec_hdr to use types with well defined sizes (M. Ellerman) > - defined missing ima_load_kexec_buffer() stub function > > Changelog v1: > - call ima_load_kexec_buffer() (Thiago) > > Signed-off-by: Mimi Zohar > --- > security/integrity/ima/Makefile | 1 + > security/integrity/ima/ima.h | 21 + > security/integrity/ima/ima_init.c | 2 + > security/integrity/ima/ima_kexec.c| 44 + > security/integrity/ima/ima_queue.c| 10 ++ > security/integrity/ima/ima_template.c | 170 > ++ > 6 files changed, 248 insertions(+) > > diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile > index 9aeaedad1e2b..29f198bde02b 100644 > --- a/security/integrity/ima/Makefile > +++ b/security/integrity/ima/Makefile > @@ -8,4 +8,5 @@ obj-$(CONFIG_IMA) += ima.o > ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ > ima_policy.o ima_template.o ima_template_lib.o > ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o > +ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o > obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > index db25f54a04fe..51dc8d57d64d 100644 > --- a/security/integrity/ima/ima.h > +++ b/security/integrity/ima/ima.h > @@ -28,6 +28,10 @@ > > #include "../integrity.h" > > +#ifdef CONFIG_HAVE_IMA_KEXEC > +#include > +#endif > + > enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN, > IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII }; > enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; > @@ -102,6 +106,21 @@ struct ima_queue_entry { > }; > extern struct list_head ima_measurements; /* list of all measurements */ > > +/* Some details preceding the binary serialized measurement list */ > +struct ima_kexec_hdr { > + u16 version; > + u16 _reserved0; > + u32 _reserved1; > + u64 buffer_size; > + u64 count; > +}; > + > +#ifdef CONFIG_HAVE_IMA_KEXEC > +void ima_load_kexec_buffer(void); > +#else > +static inline void ima_load_kexec_buffer(void) {} > +#endif /* CONFIG_HAVE_IMA_KEXEC */ > + > /* Internal IMA function definitions */ > int ima_init(void); > int ima_fs_init(void); > @@ -122,6 +141,8 @@ int ima_init_crypto(void); > void ima_putc(struct seq_file *m, void *data, int datalen); > void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); > struct ima_template_desc *ima_template_desc_current(void); > +int ima_restore_measurement_entry(struct ima_template_entry *entry); > +int ima_restore_measurement_list(loff_t bufsize, void *buf); > int ima_init_template(void); > > /* > diff --git a/security/integrity/ima/ima_init.c > b/security/integrity/ima/ima_init.c > index 32912bd54ead..3ba0ca49cba6 100644 > --- a/security/integrity/ima/ima_init.c > +++ b/security/integrity/ima/ima_init.c > @@ -128,6 +128,8 @@ int __init ima_init(void) > if (rc != 0) > return rc; > > + ima_load_kexec_buffer(); > + > rc = ima_add_boot_aggregate(); /* boot aggregate must be first entry > */ > if (rc != 0) > return rc; > diff --git a/security/integrity/ima/ima_kexec.c > b/security/integrity/ima/ima_kexec.c > new file mode 100644 > index ..36afd0fe9747 > --- /dev/null > +++ b/security/integrity/ima/ima_kexec.c > @@ -0,0 +1,44 @@ > +/* > + * Copyright (C) 2016 IBM Corporation > + * > + * Authors: > + * Thiago Jung Bauermann > + * Mimi Zohar > + * > + * This program is free software; you can redistribute it and/or modify > + * it under the terms of the GNU General Public License as published by > + * the Free Software Foundation; either version 2 of the License, or > + * (at your option) any later version. > + */ > +#include "ima.h" > + > +/* > + * Restore the measurement list from the previous kernel. > + */ > +void ima_load_kexec_buffer(void) > +{ > + void *kexec_buffer = NULL; > + size_t kexec_buffer_size = 0; > + int rc; > + > + rc = ima_get_kexec_buffer(_buffer, _buffer_size); > + switch (rc) { > + case 0: > + rc = ima_restore_measurement_list(kexec_buffer_size, > +