[PATCH 0/3] kexec: limit kexec_load syscall

2018-05-10 Thread Mimi Zohar
IMA-appraisal is mostly being used in the embedded or single purpose closed system environments. In these environments, both the Kconfig options and the userspace tools can be modified appropriately to limit syscalls. For stock kernels, userspace applications need to continue to work with older k

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Mimi Zohar
On Thu, 2018-05-03 at 18:03 -0500, Eric W. Biederman wrote: > Mimi Zohar writes: > > > On Thu, 2018-05-03 at 16:38 -0500, Eric W. Biederman wrote: > >> Mimi Zohar writes: > >> > >> > [Cc'ing Kees and kernel-hardening] > >> > > >> > On Thu, 2018-05-03 at 15:13 -0500, Eric W. Biederman wrote: > >

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Eric W. Biederman
Mimi Zohar writes: > On Thu, 2018-05-03 at 16:38 -0500, Eric W. Biederman wrote: >> Mimi Zohar writes: >> >> > [Cc'ing Kees and kernel-hardening] >> > >> > On Thu, 2018-05-03 at 15:13 -0500, Eric W. Biederman wrote: >> >> Mimi Zohar writes: >> >> >> >> > In environments that require the kexec

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Matthew Garrett
On Thu, May 3, 2018 at 2:59 PM Eric W. Biederman wrote: > Matthew Garrett writes: > > kexec_load gives root arbitrary power to modify the running kernel image, > > including the ability to disable enforcement of module signatures. > No. It does absolutely nothing to the running kernel image. >

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Eric W. Biederman
Matthew Garrett writes: > On Thu, May 3, 2018 at 1:13 PM Eric W. Biederman > wrote: > >> Mimi Zohar writes: > >> > In environments that require the kexec kernel image to be signed, > prevent >> > using the kexec_load syscall. In order for LSMs and IMA to > differentiate >> > between kexec_load

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Mimi Zohar
On Thu, 2018-05-03 at 16:38 -0500, Eric W. Biederman wrote: > Mimi Zohar writes: > > > [Cc'ing Kees and kernel-hardening] > > > > On Thu, 2018-05-03 at 15:13 -0500, Eric W. Biederman wrote: > >> Mimi Zohar writes: > >> > >> > In environments that require the kexec kernel image to be signed, pre

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Eric W. Biederman
Mimi Zohar writes: > [Cc'ing Kees and kernel-hardening] > > On Thu, 2018-05-03 at 15:13 -0500, Eric W. Biederman wrote: >> Mimi Zohar writes: >> >> > In environments that require the kexec kernel image to be signed, prevent >> > using the kexec_load syscall. In order for LSMs and IMA to differ

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Mimi Zohar
[Cc'ing Kees and kernel-hardening] On Thu, 2018-05-03 at 15:13 -0500, Eric W. Biederman wrote: > Mimi Zohar writes: > > > In environments that require the kexec kernel image to be signed, prevent > > using the kexec_load syscall. In order for LSMs and IMA to differentiate > > between kexec_load

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Matthew Garrett
On Thu, May 3, 2018 at 1:13 PM Eric W. Biederman wrote: > Mimi Zohar writes: > > In environments that require the kexec kernel image to be signed, prevent > > using the kexec_load syscall. In order for LSMs and IMA to differentiate > > between kexec_load and kexec_file_load syscalls, this patc

Re: [PATCH 0/3] kexec: limit kexec_load syscall

2018-05-03 Thread Eric W. Biederman
Mimi Zohar writes: > In environments that require the kexec kernel image to be signed, prevent > using the kexec_load syscall. In order for LSMs and IMA to differentiate > between kexec_load and kexec_file_load syscalls, this patch set adds a > call to security_kernel_read_file() in kexec_load_c

[PATCH 0/3] kexec: limit kexec_load syscall

2018-04-12 Thread Mimi Zohar
In environments that require the kexec kernel image to be signed, prevent using the kexec_load syscall. In order for LSMs and IMA to differentiate between kexec_load and kexec_file_load syscalls, this patch set adds a call to security_kernel_read_file() in kexec_load_check(). Signed-off-by: Mimi