[PATCH v4 07/14] ima: restrict upload of converted digest lists
Roberto Sassu
roberto.sassu at huawei.com
Fri Jun 14 17:55:06 UTC 2019
If digest lists cannot be directly parsed by the kernel, access to the
securityfs file must be exclusively granted to the parser, to avoid that an
arbitrary process makes undesired modifications before uploading converted
lists to IMA. Digest lists are measured before they are converted and no
new measurement is taken after conversion.
This patch introduces ima_check_set_parser(), to verify whether the process
opening the interface to upload digest lists is the user space parser. It
checks whether the digest of the executable is found in a digest list and
if the type of found digest is COMPACT_PARSER.
It also introduces ima_set_parser() and ima_get_parser() to return the
task_struct of the process that opened digest_list_data. This will be used
to determine whether digest lists have been measured/appraised and, if not,
to prevent their usage.
Signed-off-by: Roberto Sassu <roberto.sassu at huawei.com>
---
security/integrity/ima/ima_digest_list.c | 54 ++++++++++++++++++++++++
security/integrity/ima/ima_digest_list.h | 14 ++++++
2 files changed, 68 insertions(+)
diff --git a/security/integrity/ima/ima_digest_list.c b/security/integrity/ima/ima_digest_list.c
index 6c7dd2cfbb68..3c77a6cec29a 100644
--- a/security/integrity/ima/ima_digest_list.c
+++ b/security/integrity/ima/ima_digest_list.c
@@ -17,6 +17,8 @@
#include <linux/vmalloc.h>
#include <linux/module.h>
+#include <linux/file.h>
+#include <linux/sched/mm.h>
#include "ima.h"
#include "ima_digest_list.h"
@@ -150,3 +152,55 @@ int ima_parse_compact_list(loff_t size, void *buf)
return bufp - buf;
}
+
+/****************
+ * Parser check *
+ ****************/
+bool ima_check_current_is_parser(void)
+{
+ struct integrity_iint_cache *parser_iint;
+ struct ima_digest *parser_digest = NULL;
+ struct file *parser_file;
+ struct mm_struct *mm;
+
+ mm = get_task_mm(current);
+ if (!mm)
+ return false;
+
+ parser_file = get_mm_exe_file(mm);
+ mmput(mm);
+
+ if (!parser_file)
+ return false;
+
+ parser_iint = integrity_iint_find(file_inode(parser_file));
+ fput(parser_file);
+
+ if (!parser_iint)
+ return false;
+
+ /* flag cannot be cleared due to write protection of executables */
+ if (!(parser_iint->flags & IMA_COLLECTED))
+ return false;
+
+ parser_digest = ima_lookup_digest(parser_iint->ima_hash->digest,
+ parser_iint->ima_hash->algo);
+
+ return (parser_digest && parser_digest->type == COMPACT_PARSER);
+}
+
+/*
+ * Current parser set and reset respectively during open() and close() of
+ * /sys/kernel/security/ima/digest_list_data.
+ */
+static struct task_struct *current_parser;
+
+void ima_set_parser(struct task_struct *parser)
+{
+ current_parser = parser;
+}
+
+struct task_struct *ima_get_parser(void)
+{
+ return current_parser;
+}
diff --git a/security/integrity/ima/ima_digest_list.h b/security/integrity/ima/ima_digest_list.h
index 13cdc3d954bd..be07a4afd7b6 100644
--- a/security/integrity/ima/ima_digest_list.h
+++ b/security/integrity/ima/ima_digest_list.h
@@ -26,6 +26,9 @@ extern struct ima_h_table ima_digests_htable;
struct ima_digest *ima_lookup_digest(u8 *digest, enum hash_algo algo);
int ima_parse_compact_list(loff_t size, void *buf);
+bool ima_check_current_is_parser(void);
+void ima_set_parser(struct task_struct *parser);
+struct task_struct *ima_get_parser(void);
#else
static inline struct ima_digest *ima_lookup_digest(u8 *digest,
enum hash_algo algo)
@@ -36,5 +39,16 @@ static inline int ima_parse_compact_list(loff_t size, void *buf)
{
return -ENOTSUPP;
}
+static inline bool ima_check_current_is_parser(void)
+{
+ return false;
+}
+static inline void ima_set_parser(struct task_struct *parser)
+{
+}
+static inline struct task_struct *ima_get_parser(void)
+{
+ return NULL;
+}
#endif /*CONFIG_IMA_DIGEST_LIST*/
#endif /*LINUX_IMA_DIGEST_LIST_H*/
--
2.17.1
More information about the Linux-security-module-archive
mailing list