Through the new interface restore_kexec_list, it will be possible to restore a measurements list, previously read from binary_kexec_runtime_measurements.
The patch reuses the policy functions to create a buffer, read the measurements and call ima_restore_measurement_list(). Signed-off-by: Roberto Sassu <[email protected]> --- security/integrity/ima/ima_fs.c | 38 ++++++++++++++++++++++++++++++++++---- 1 file changed, 34 insertions(+), 4 deletions(-) diff --git a/security/integrity/ima/ima_fs.c b/security/integrity/ima/ima_fs.c index a93f941..6e3f93f 100644 --- a/security/integrity/ima/ima_fs.c +++ b/security/integrity/ima/ima_fs.c @@ -77,6 +77,7 @@ static const struct file_operations ima_measurements_count_ops = { }; static struct dentry *binary_kexec_runtime_measurements; +static struct dentry *restore_kexec_list; /* returns pointer to hlist_node */ static void *ima_measurements_start(struct seq_file *m, loff_t *pos) @@ -297,7 +298,7 @@ static const struct file_operations ima_ascii_measurements_ops = { .release = seq_release, }; -static ssize_t ima_read_policy(char *path) +static ssize_t ima_read_policy(char *path, bool khdr) { void *data; char *datap; @@ -317,6 +318,13 @@ static ssize_t ima_read_policy(char *path) } datap = data; + + if (khdr) { + rc = ima_restore_measurement_list(size, data); + size = 0; + goto out; + } + while (size > 0 && (p = strsep(&datap, "\n"))) { pr_debug("rule: %s\n", p); rc = ima_parse_add_rule(p); @@ -325,6 +333,7 @@ static ssize_t ima_read_policy(char *path) size -= rc; } +out: vfree(data); if (rc < 0) return rc; @@ -337,6 +346,7 @@ static ssize_t ima_read_policy(char *path) static ssize_t ima_write_policy(struct file *file, const char __user *buf, size_t datalen, loff_t *ppos) { + bool khdr = file->f_path.dentry == restore_kexec_list; char *data; ssize_t result; @@ -363,8 +373,13 @@ static ssize_t ima_write_policy(struct file *file, const char __user *buf, if (result < 0) goto out_free; + if (khdr && data[0] != '/') { + mutex_unlock(&ima_write_mutex); + goto out_free; + } + if (data[0] == '/') { - result = ima_read_policy(data); + result = ima_read_policy(data, khdr); } else if (ima_appraise & IMA_APPRAISE_POLICY) { pr_err("IMA: signed policy file (specified as an absolute pathname) required\n"); integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL, @@ -393,7 +408,7 @@ static struct dentry *violations; static struct dentry *ima_policy; enum ima_fs_flags { - IMA_FS_BUSY, + IMA_FS_BUSY, IMA_RESTORE_LIST_BUSY, }; static unsigned long ima_fs_flags; @@ -412,6 +427,9 @@ static const struct seq_operations ima_policy_seqops = { */ static int ima_open_policy(struct inode *inode, struct file *filp) { + bool khdr = filp->f_path.dentry == restore_kexec_list; + unsigned long bit = khdr ? IMA_RESTORE_LIST_BUSY : IMA_FS_BUSY; + if (!(filp->f_flags & O_WRONLY)) { #ifndef CONFIG_IMA_READ_POLICY return -EACCES; @@ -423,7 +441,7 @@ static int ima_open_policy(struct inode *inode, struct file *filp) return seq_open(filp, &ima_policy_seqops); #endif } - if (test_and_set_bit(IMA_FS_BUSY, &ima_fs_flags)) + if (test_and_set_bit(bit, &ima_fs_flags)) return -EBUSY; return 0; } @@ -439,6 +457,11 @@ static int ima_release_policy(struct inode *inode, struct file *file) { const char *cause = valid_policy ? "completed" : "failed"; + if (file->f_path.dentry == restore_kexec_list) { + clear_bit(IMA_RESTORE_LIST_BUSY, &ima_fs_flags); + return 0; + } + if ((file->f_flags & O_ACCMODE) == O_RDONLY) return seq_release(inode, file); @@ -522,9 +545,16 @@ int __init ima_fs_init(void) &ima_measurements_ops); if (IS_ERR(binary_kexec_runtime_measurements)) goto out; + + restore_kexec_list = securityfs_create_file("restore_kexec_list", + S_IWUSR, ima_dir, NULL, + &ima_measure_policy_ops); + if (IS_ERR(restore_kexec_list)) + goto out; #endif return 0; out: + securityfs_remove(restore_kexec_list); securityfs_remove(binary_kexec_runtime_measurements); securityfs_remove(violations); securityfs_remove(runtime_measurements_count); -- 2.9.3

