On 11/3/2021 9:53 AM, Roberto Sassu wrote:
From: Roberto Sassu [mailto:roberto.sa...@huawei.com]
Sent: Wednesday, November 3, 2021 5:43 PM
From: deven.de...@linux.microsoft.com
[mailto:deven.de...@linux.microsoft.com]
From: Deven Bowers <deven.de...@linux.microsoft.com>

Enables an IPE policy to be enforced from kernel start, enabling access
control based on trust from kernel startup. This is accomplished by
transforming an IPE policy indicated by CONFIG_IPE_BOOT_POLICY into a
c-string literal that is parsed at kernel startup as an unsigned policy.

Signed-off-by: Deven Bowers <deven.de...@linux.microsoft.com>
---

Relevant changes since v6:
   * Move patch 01/12 to [14/16] of the series

---
  MAINTAINERS                   |   1 +
  scripts/Makefile              |   1 +
  scripts/ipe/Makefile          |   2 +
  scripts/ipe/polgen/.gitignore |   1 +
  scripts/ipe/polgen/Makefile   |   6 ++
  scripts/ipe/polgen/polgen.c   | 145 ++++++++++++++++++++++++++++++++++
  security/ipe/.gitignore       |   1 +
  security/ipe/Kconfig          |  10 +++
  security/ipe/Makefile         |  13 +++
  security/ipe/ctx.c            |  18 +++++
  10 files changed, 198 insertions(+)
  create mode 100644 scripts/ipe/Makefile
  create mode 100644 scripts/ipe/polgen/.gitignore
  create mode 100644 scripts/ipe/polgen/Makefile
  create mode 100644 scripts/ipe/polgen/polgen.c
  create mode 100644 security/ipe/.gitignore

diff --git a/MAINTAINERS b/MAINTAINERS
index f1e76f791d47..a84ca781199b 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -9283,6 +9283,7 @@ INTEGRITY POLICY ENFORCEMENT (IPE)
  M:    Deven Bowers <deven.de...@linux.microsoft.com>
  M:    Fan Wu <wu...@linux.microsoft.com>
  S:    Supported
+F:     scripts/ipe/
  F:    security/ipe/

  INTEL 810/815 FRAMEBUFFER DRIVER
diff --git a/scripts/Makefile b/scripts/Makefile
index 9adb6d247818..a31da6d57a36 100644
--- a/scripts/Makefile
+++ b/scripts/Makefile
@@ -41,6 +41,7 @@ targets += module.lds
  subdir-$(CONFIG_GCC_PLUGINS) += gcc-plugins
  subdir-$(CONFIG_MODVERSIONS) += genksyms
  subdir-$(CONFIG_SECURITY_SELINUX) += selinux
+subdir-$(CONFIG_SECURITY_IPE) += ipe

  # Let clean descend into subdirs
  subdir-       += basic dtc gdb kconfig mod
diff --git a/scripts/ipe/Makefile b/scripts/ipe/Makefile
new file mode 100644
index 000000000000..e87553fbb8d6
--- /dev/null
+++ b/scripts/ipe/Makefile
@@ -0,0 +1,2 @@
+# SPDX-License-Identifier: GPL-2.0-only
+subdir-y := polgen
diff --git a/scripts/ipe/polgen/.gitignore b/scripts/ipe/polgen/.gitignore
new file mode 100644
index 000000000000..80f32f25d200
--- /dev/null
+++ b/scripts/ipe/polgen/.gitignore
@@ -0,0 +1 @@
+polgen
diff --git a/scripts/ipe/polgen/Makefile b/scripts/ipe/polgen/Makefile
new file mode 100644
index 000000000000..066060c22b4a
--- /dev/null
+++ b/scripts/ipe/polgen/Makefile
@@ -0,0 +1,6 @@
+# SPDX-License-Identifier: GPL-2.0
+hostprogs-always-y     := polgen
+HOST_EXTRACFLAGS += \
+       -I$(srctree)/include \
+       -I$(srctree)/include/uapi \
+
diff --git a/scripts/ipe/polgen/polgen.c b/scripts/ipe/polgen/polgen.c
new file mode 100644
index 000000000000..73cf13e743f7
--- /dev/null
+++ b/scripts/ipe/polgen/polgen.c
@@ -0,0 +1,145 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) Microsoft Corporation. All rights reserved.
+ */
+
+#include <stdlib.h>
+#include <stddef.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+
+static void usage(const char *const name)
+{
+       printf("Usage: %s OutputFile (PolicyFile)\n", name);
+       exit(EINVAL);
+}
+
+static int policy_to_buffer(const char *pathname, char **buffer, size_t *size)
+{
+       int rc = 0;
+       FILE *fd;
+       char *lbuf;
+       size_t fsize;
+       size_t read;
+
+       fd = fopen(pathname, "r");
+       if (!fd) {
+               rc = errno;
+               goto out;
+       }
+
+       fseek(fd, 0, SEEK_END);
+       fsize = ftell(fd);
+       rewind(fd);
+
+       lbuf = malloc(fsize);
+       if (!lbuf) {
+               rc = ENOMEM;
+               goto out_close;
+       }
+
+       read = fread((void *)lbuf, sizeof(*lbuf), fsize, fd);
+       if (read != fsize) {
+               rc = -1;
+               goto out_free;
+       }
+
+       *buffer = lbuf;
+       *size = fsize;
+       fclose(fd);
+
+       return rc;
+
+out_free:
+       free(lbuf);
+out_close:
+       fclose(fd);
+out:
+       return rc;
+}
+
+static int write_boot_policy(const char *pathname, const char *buf, size_t
size)
+{
+       int rc = 0;
+       FILE *fd;
+       size_t i;
+
+       fd = fopen(pathname, "w");
+       if (!fd) {
+               rc = errno;
+               goto err;
+       }
+
+       fprintf(fd, "/* This file is automatically generated.");
+       fprintf(fd, " Do not edit. */\n");
+       fprintf(fd, "#include <stddef.h>\n");
+       fprintf(fd, "\nextern const char *const ipe_boot_policy;\n\n");
+       fprintf(fd, "const char *const ipe_boot_policy =\n");
+
+       if (!buf || size == 0) {
+               fprintf(fd, "\tNULL;\n");
+               fclose(fd);
+               return 0;
+       }
+
+       fprintf(fd, "\t\"");
+
+       for (i = 0; i < size; ++i) {
+               switch (buf[i]) {
+               case '"':
+                       fprintf(fd, "\\\"");
+                       break;
+               case '\'':
+                       fprintf(fd, "'");
+                       break;
+               case '\n':
+                       fprintf(fd, "\\n\"\n\t\"");
+                       break;
+               case '\\':
+                       fprintf(fd, "\\\\");
+                       break;
+               case '\t':
+                       fprintf(fd, "\\t");
+                       break;
+               case '\?':
+                       fprintf(fd, "\\?");
+                       break;
+               default:
+                       fprintf(fd, "%c", buf[i]);
+               }
+       }
+       fprintf(fd, "\";\n");
+       fclose(fd);
+
+       return 0;
+
+err:
+       if (fd)
+               fclose(fd);
+       return rc;
+}
+
+int main(int argc, const char *const argv[])
+{
+       int rc = 0;
+       size_t len = 0;
+       char *policy = NULL;
+
+       if (argc < 2)
+               usage(argv[0]);
+
+       if (argc > 2) {
+               rc = policy_to_buffer(argv[2], &policy, &len);
+               if (rc != 0)
+                       goto cleanup;
+       }
+
+       rc = write_boot_policy(argv[1], policy, len);
+cleanup:
+       if (policy)
+               free(policy);
+       if (rc != 0)
+               perror("An error occurred during policy conversion: ");
+       return rc;
+}
diff --git a/security/ipe/.gitignore b/security/ipe/.gitignore
new file mode 100644
index 000000000000..eca22ad5ed22
--- /dev/null
+++ b/security/ipe/.gitignore
@@ -0,0 +1 @@
+boot-policy.c
\ No newline at end of file
diff --git a/security/ipe/Kconfig b/security/ipe/Kconfig
index fcf82a8152ec..39df680b67a2 100644
--- a/security/ipe/Kconfig
+++ b/security/ipe/Kconfig
@@ -20,6 +20,16 @@ menuconfig SECURITY_IPE

  if SECURITY_IPE

+config IPE_BOOT_POLICY
+       string "Integrity policy to apply on system startup"
+       help
+         This option specifies a filepath to a IPE policy that is compiled
+         into the kernel. This policy will be enforced until a policy update
+         is deployed via the $securityfs/ipe/policies/$policy_name/active
+         interface.
+
+         If unsure, leave blank.
+
  choice
        prompt "Hash algorithm used in auditing policies"
        default IPE_AUDIT_HASH_SHA1
diff --git a/security/ipe/Makefile b/security/ipe/Makefile
index 1e7b2d7fcd9e..89fec670f954 100644
--- a/security/ipe/Makefile
+++ b/security/ipe/Makefile
@@ -7,7 +7,18 @@

  ccflags-y := -I$(srctree)/security/ipe/modules

+quiet_cmd_polgen = IPE_POL $(2)
+      cmd_polgen = scripts/ipe/polgen/polgen security/ipe/boot-policy.c $(2)
+
+$(eval $(call config_filename,IPE_BOOT_POLICY))
+
+targets += boot-policy.c
+
+$(obj)/boot-policy.c: scripts/ipe/polgen/polgen
$(IPE_BOOT_POLICY_FILENAME) FORCE
+       $(call if_changed,polgen,$(IPE_BOOT_POLICY_FILENAME))
+
  obj-$(CONFIG_SECURITY_IPE) += \
+       boot-policy.o \
        ctx.o \
        eval.o \
        fs.o \
@@ -21,3 +32,5 @@ obj-$(CONFIG_SECURITY_IPE) += \
        policyfs.o \

  obj-$(CONFIG_AUDIT) += audit.o
+
+clean-files := boot-policy.c \
diff --git a/security/ipe/ctx.c b/security/ipe/ctx.c
index fc9b8e467bc9..879acf4ceac5 100644
--- a/security/ipe/ctx.c
+++ b/security/ipe/ctx.c
@@ -15,6 +15,7 @@
  #include <linux/spinlock.h>
  #include <linux/moduleparam.h>

+extern const char *const ipe_boot_policy;
  static bool success_audit;
  static bool enforce = true;

@@ -329,6 +330,7 @@ void ipe_put_ctx(struct ipe_context *ctx)
  int __init ipe_init_ctx(void)
  {
        int rc = 0;
+       struct ipe_policy *p = NULL;
        struct ipe_context *lns = NULL;

        lns = create_ctx();
@@ -342,10 +344,26 @@ int __init ipe_init_ctx(void)
        WRITE_ONCE(lns->enforce, enforce);
        spin_unlock(&lns->lock);

+       if (ipe_boot_policy) {
+               p = ipe_new_policy(ipe_boot_policy, strlen(ipe_boot_policy),
+                                  NULL, 0);
+               if (IS_ERR(p)) {
+                       rc = PTR_ERR(lns);
This should be:

        rc = PTR_ERR(p);

+                       goto err;
+               }
+
+               ipe_add_policy(lns, p);
+               rc = ipe_set_active_pol(p);
+               if (!rc)
Here you need to set a non-zero value, so that ipe_init()
does not enable the LSM.
Actually you probably should just check that rc is not zero
and goto err.

Roberto

Yeah, I actually noticed these two mistakes myself fairly recently.

Changes will be applied in v8.

I would set to 1 a new global variable, like ipe_lsm_enabled,
in ipe_init() just before security_add_hooks().

Then, I would add a check of this variable in ipe_init_securityfs()
to avoid the kernel panic.

That's my plan.

-Deven

--
dm-devel mailing list
dm-devel@redhat.com
https://listman.redhat.com/mailman/listinfo/dm-devel

Reply via email to