[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1472596811-9596-1-git-send-email-zohar@linux.vnet.ibm.com>
Date: Tue, 30 Aug 2016 18:40:02 -0400
From: Mimi Zohar <zohar@...ux.vnet.ibm.com>
To: linux-security-module <linux-security-module@...r.kernel.org>
Cc: Mimi Zohar <zohar@...ux.vnet.ibm.com>,
linux-ima-devel@...ts.sourceforge.net,
Dave Young <dyoung@...hat.com>, kexec@...ts.infradead.org,
linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org,
Thiago Jung Bauermann <bauerman@...ux.vnet.ibm.com>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: [PATHC v2 0/9] ima: carry the measurement list across kexec
The TPM PCRs are only reset on a hard reboot. In order to validate a
TPM's quote after a soft reboot (eg. kexec -e), the IMA measurement list
of the running kernel must be saved and then restored on the subsequent
boot, possibly of a different architecture.
The existing securityfs binary_runtime_measurements file conveniently
provides a serialized format of the IMA measurement list. This patch
set serializes the measurement list in this format and restores it.
Up to now, the binary_runtime_measurements was defined as architecture
native format. The assumption being that userspace could and would
handle any architecture conversions. With the ability of carrying the
measurement list across kexec, possibly from one architecture to a
different one, the per boot architecture information is lost and with it
the ability of recalculating the template digest hash. To resolve this
problem, without breaking the existing ABI, this patch set introduces
the boot command line option "ima_canonical_fmt", which is arbitrarily
defined as little endian.
The need for this boot command line option will be limited to the
existing version 1 format of the binary_runtime_measurements.
Subsequent formats will be defined as canonical format (eg. TPM 2.0
support for larger digests).
This patch set pre-req's Thiago Bauermann's "kexec_file: Add buffer
hand-over for the next kernel" patch set.
These patches can also be found in the next-kexec-restore branch of:
git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git
Mimi
Andreas Steffen (1):
ima: platform-independent hash value
Mimi Zohar (7):
ima: on soft reboot, restore the measurement list
ima: permit duplicate measurement list entries
ima: maintain memory size needed for serializing the measurement list
ima: serialize the binary_runtime_measurements
ima: store the builtin/custom template definitions in a list
ima: support restoring multiple template formats
ima: define a canonical binary_runtime_measurements list format
Thiago Jung Bauermann (1):
ima: on soft reboot, save the measurement list
Documentation/kernel-parameters.txt | 4 +
include/linux/ima.h | 12 ++
kernel/kexec_file.c | 4 +
security/integrity/ima/Kconfig | 12 ++
security/integrity/ima/Makefile | 1 +
security/integrity/ima/ima.h | 28 +++
security/integrity/ima/ima_crypto.c | 6 +-
security/integrity/ima/ima_fs.c | 30 +++-
security/integrity/ima/ima_init.c | 2 +
security/integrity/ima/ima_kexec.c | 201 +++++++++++++++++++++
security/integrity/ima/ima_main.c | 1 +
security/integrity/ima/ima_queue.c | 72 +++++++-
security/integrity/ima/ima_template.c | 289 ++++++++++++++++++++++++++++--
security/integrity/ima/ima_template_lib.c | 6 +-
14 files changed, 637 insertions(+), 31 deletions(-)
create mode 100644 security/integrity/ima/ima_kexec.c
--
2.1.0
Powered by blists - more mailing lists