2024-08-03 14:08:18 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
|
|
* Copyright (C) 2020-2024 Microsoft Corporation. All rights reserved.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/fs.h>
|
2024-08-03 14:08:20 +08:00
|
|
|
#include <linux/fs_struct.h>
|
2024-08-03 14:08:18 +08:00
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/binfmts.h>
|
|
|
|
#include <linux/mman.h>
|
2024-08-03 14:08:27 +08:00
|
|
|
#include <linux/blk_types.h>
|
2024-08-03 14:08:18 +08:00
|
|
|
|
|
|
|
#include "ipe.h"
|
|
|
|
#include "hooks.h"
|
|
|
|
#include "eval.h"
|
2024-08-03 14:08:27 +08:00
|
|
|
#include "digest.h"
|
2024-08-03 14:08:18 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_bprm_check_security() - ipe security hook function for bprm check.
|
|
|
|
* @bprm: Supplies a pointer to a linux_binprm structure to source the file
|
|
|
|
* being evaluated.
|
|
|
|
*
|
|
|
|
* This LSM hook is called when a binary is loaded through the exec
|
|
|
|
* family of system calls.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * %0 - Success
|
|
|
|
* * %-EACCES - Did not pass IPE policy
|
|
|
|
*/
|
|
|
|
int ipe_bprm_check_security(struct linux_binprm *bprm)
|
|
|
|
{
|
|
|
|
struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
|
|
|
|
|
audit,ipe: add IPE auditing support
Users of IPE require a way to identify when and why an operation fails,
allowing them to both respond to violations of policy and be notified
of potentially malicious actions on their systems with respect to IPE
itself.
This patch introduces 3 new audit events.
AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
of a resource.
AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
has been changed to another loaded policy.
AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
into the kernel.
This patch also adds support for success auditing, allowing users to
identify why an allow decision was made for a resource. However, it is
recommended to use this option with caution, as it is quite noisy.
Here are some examples of the new audit record types:
AUDIT_IPE_ACCESS(1420):
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
ino=3897 rule="op=EXECUTE boot_verified=TRUE action=ALLOW"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=299 comm="sh" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=300 path="/tmp/tmpdp2h1lub/deny/bin/hello" dev="tmpfs"
ino=131 rule="DEFAULT action=DENY"
The above three records were generated when the active IPE policy only
allows binaries from the initramfs to run. The three identical `hello`
binary were placed at different locations, only the first hello from
the rootfs(initramfs) was allowed.
Field ipe_op followed by the IPE operation name associated with the log.
Field ipe_hook followed by the name of the LSM hook that triggered the IPE
event.
Field enforcing followed by the enforcement state of IPE. (it will be
introduced in the next commit)
Field pid followed by the pid of the process that triggered the IPE
event.
Field comm followed by the command line program name of the process that
triggered the IPE event.
Field path followed by the file's path name.
Field dev followed by the device name as found in /dev where the file is
from.
Note that for device mappers it will use the name `dm-X` instead of
the name in /dev/mapper.
For a file in a temp file system, which is not from a device, it will use
`tmpfs` for the field.
The implementation of this part is following another existing use case
LSM_AUDIT_DATA_INODE in security/lsm_audit.c
Field ino followed by the file's inode number.
Field rule followed by the IPE rule made the access decision. The whole
rule must be audited because the decision is based on the combination of
all property conditions in the rule.
Along with the syscall audit event, user can know why a blocked
happened. For example:
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=2138 comm="bash" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit[1956]: SYSCALL arch=c000003e syscall=59
success=no exit=-13 a0=556790138df0 a1=556790135390 a2=5567901338b0
a3=ab2a41a67f4f1f4e items=1 ppid=147 pid=1956 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0
ses=4294967295 comm="bash" exe="/usr/bin/bash" key=(null)
The above two records showed bash used execve to run "hello" and got
blocked by IPE. Note that the IPE records are always prior to a SYSCALL
record.
AUDIT_IPE_CONFIG_CHANGE(1421):
audit: AUDIT1421
old_active_pol_name="Allow_All" old_active_pol_version=0.0.0
old_policy_digest=sha256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649
new_active_pol_name="boot_verified" new_active_pol_version=0.0.0
new_policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed the current IPE active policy switch from
`Allow_All` to `boot_verified` along with the version and the hash
digest of the two policies. Note IPE can only have one policy active
at a time, all access decision evaluation is based on the current active
policy.
The normal procedure to deploy a policy is loading the policy to deploy
into the kernel first, then switch the active policy to it.
AUDIT_IPE_POLICY_LOAD(1422):
audit: AUDIT1422 policy_name="boot_verified" policy_version=0.0.0
policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F2676
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed a new policy has been loaded into the kernel
with the policy name, policy version and policy hash.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:23 +08:00
|
|
|
ipe_build_eval_ctx(&ctx, bprm->file, IPE_OP_EXEC, IPE_HOOK_BPRM_CHECK);
|
2024-08-03 14:08:18 +08:00
|
|
|
return ipe_evaluate_event(&ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_mmap_file() - ipe security hook function for mmap check.
|
|
|
|
* @f: File being mmap'd. Can be NULL in the case of anonymous memory.
|
|
|
|
* @reqprot: The requested protection on the mmap, passed from usermode.
|
|
|
|
* @prot: The effective protection on the mmap, resolved from reqprot and
|
|
|
|
* system configuration.
|
|
|
|
* @flags: Unused.
|
|
|
|
*
|
|
|
|
* This hook is called when a file is loaded through the mmap
|
|
|
|
* family of system calls.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * %0 - Success
|
|
|
|
* * %-EACCES - Did not pass IPE policy
|
|
|
|
*/
|
|
|
|
int ipe_mmap_file(struct file *f, unsigned long reqprot __always_unused,
|
|
|
|
unsigned long prot, unsigned long flags)
|
|
|
|
{
|
|
|
|
struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
|
|
|
|
|
|
|
|
if (prot & PROT_EXEC) {
|
audit,ipe: add IPE auditing support
Users of IPE require a way to identify when and why an operation fails,
allowing them to both respond to violations of policy and be notified
of potentially malicious actions on their systems with respect to IPE
itself.
This patch introduces 3 new audit events.
AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
of a resource.
AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
has been changed to another loaded policy.
AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
into the kernel.
This patch also adds support for success auditing, allowing users to
identify why an allow decision was made for a resource. However, it is
recommended to use this option with caution, as it is quite noisy.
Here are some examples of the new audit record types:
AUDIT_IPE_ACCESS(1420):
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
ino=3897 rule="op=EXECUTE boot_verified=TRUE action=ALLOW"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=299 comm="sh" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=300 path="/tmp/tmpdp2h1lub/deny/bin/hello" dev="tmpfs"
ino=131 rule="DEFAULT action=DENY"
The above three records were generated when the active IPE policy only
allows binaries from the initramfs to run. The three identical `hello`
binary were placed at different locations, only the first hello from
the rootfs(initramfs) was allowed.
Field ipe_op followed by the IPE operation name associated with the log.
Field ipe_hook followed by the name of the LSM hook that triggered the IPE
event.
Field enforcing followed by the enforcement state of IPE. (it will be
introduced in the next commit)
Field pid followed by the pid of the process that triggered the IPE
event.
Field comm followed by the command line program name of the process that
triggered the IPE event.
Field path followed by the file's path name.
Field dev followed by the device name as found in /dev where the file is
from.
Note that for device mappers it will use the name `dm-X` instead of
the name in /dev/mapper.
For a file in a temp file system, which is not from a device, it will use
`tmpfs` for the field.
The implementation of this part is following another existing use case
LSM_AUDIT_DATA_INODE in security/lsm_audit.c
Field ino followed by the file's inode number.
Field rule followed by the IPE rule made the access decision. The whole
rule must be audited because the decision is based on the combination of
all property conditions in the rule.
Along with the syscall audit event, user can know why a blocked
happened. For example:
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=2138 comm="bash" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit[1956]: SYSCALL arch=c000003e syscall=59
success=no exit=-13 a0=556790138df0 a1=556790135390 a2=5567901338b0
a3=ab2a41a67f4f1f4e items=1 ppid=147 pid=1956 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0
ses=4294967295 comm="bash" exe="/usr/bin/bash" key=(null)
The above two records showed bash used execve to run "hello" and got
blocked by IPE. Note that the IPE records are always prior to a SYSCALL
record.
AUDIT_IPE_CONFIG_CHANGE(1421):
audit: AUDIT1421
old_active_pol_name="Allow_All" old_active_pol_version=0.0.0
old_policy_digest=sha256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649
new_active_pol_name="boot_verified" new_active_pol_version=0.0.0
new_policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed the current IPE active policy switch from
`Allow_All` to `boot_verified` along with the version and the hash
digest of the two policies. Note IPE can only have one policy active
at a time, all access decision evaluation is based on the current active
policy.
The normal procedure to deploy a policy is loading the policy to deploy
into the kernel first, then switch the active policy to it.
AUDIT_IPE_POLICY_LOAD(1422):
audit: AUDIT1422 policy_name="boot_verified" policy_version=0.0.0
policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F2676
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed a new policy has been loaded into the kernel
with the policy name, policy version and policy hash.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:23 +08:00
|
|
|
ipe_build_eval_ctx(&ctx, f, IPE_OP_EXEC, IPE_HOOK_MMAP);
|
2024-08-03 14:08:18 +08:00
|
|
|
return ipe_evaluate_event(&ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_file_mprotect() - ipe security hook function for mprotect check.
|
|
|
|
* @vma: Existing virtual memory area created by mmap or similar.
|
|
|
|
* @reqprot: The requested protection on the mmap, passed from usermode.
|
|
|
|
* @prot: The effective protection on the mmap, resolved from reqprot and
|
|
|
|
* system configuration.
|
|
|
|
*
|
|
|
|
* This LSM hook is called when a mmap'd region of memory is changing
|
|
|
|
* its protections via mprotect.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * %0 - Success
|
|
|
|
* * %-EACCES - Did not pass IPE policy
|
|
|
|
*/
|
|
|
|
int ipe_file_mprotect(struct vm_area_struct *vma,
|
|
|
|
unsigned long reqprot __always_unused,
|
|
|
|
unsigned long prot)
|
|
|
|
{
|
|
|
|
struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
|
|
|
|
|
|
|
|
/* Already Executable */
|
|
|
|
if (vma->vm_flags & VM_EXEC)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (prot & PROT_EXEC) {
|
audit,ipe: add IPE auditing support
Users of IPE require a way to identify when and why an operation fails,
allowing them to both respond to violations of policy and be notified
of potentially malicious actions on their systems with respect to IPE
itself.
This patch introduces 3 new audit events.
AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
of a resource.
AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
has been changed to another loaded policy.
AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
into the kernel.
This patch also adds support for success auditing, allowing users to
identify why an allow decision was made for a resource. However, it is
recommended to use this option with caution, as it is quite noisy.
Here are some examples of the new audit record types:
AUDIT_IPE_ACCESS(1420):
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
ino=3897 rule="op=EXECUTE boot_verified=TRUE action=ALLOW"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=299 comm="sh" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=300 path="/tmp/tmpdp2h1lub/deny/bin/hello" dev="tmpfs"
ino=131 rule="DEFAULT action=DENY"
The above three records were generated when the active IPE policy only
allows binaries from the initramfs to run. The three identical `hello`
binary were placed at different locations, only the first hello from
the rootfs(initramfs) was allowed.
Field ipe_op followed by the IPE operation name associated with the log.
Field ipe_hook followed by the name of the LSM hook that triggered the IPE
event.
Field enforcing followed by the enforcement state of IPE. (it will be
introduced in the next commit)
Field pid followed by the pid of the process that triggered the IPE
event.
Field comm followed by the command line program name of the process that
triggered the IPE event.
Field path followed by the file's path name.
Field dev followed by the device name as found in /dev where the file is
from.
Note that for device mappers it will use the name `dm-X` instead of
the name in /dev/mapper.
For a file in a temp file system, which is not from a device, it will use
`tmpfs` for the field.
The implementation of this part is following another existing use case
LSM_AUDIT_DATA_INODE in security/lsm_audit.c
Field ino followed by the file's inode number.
Field rule followed by the IPE rule made the access decision. The whole
rule must be audited because the decision is based on the combination of
all property conditions in the rule.
Along with the syscall audit event, user can know why a blocked
happened. For example:
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=2138 comm="bash" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit[1956]: SYSCALL arch=c000003e syscall=59
success=no exit=-13 a0=556790138df0 a1=556790135390 a2=5567901338b0
a3=ab2a41a67f4f1f4e items=1 ppid=147 pid=1956 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0
ses=4294967295 comm="bash" exe="/usr/bin/bash" key=(null)
The above two records showed bash used execve to run "hello" and got
blocked by IPE. Note that the IPE records are always prior to a SYSCALL
record.
AUDIT_IPE_CONFIG_CHANGE(1421):
audit: AUDIT1421
old_active_pol_name="Allow_All" old_active_pol_version=0.0.0
old_policy_digest=sha256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649
new_active_pol_name="boot_verified" new_active_pol_version=0.0.0
new_policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed the current IPE active policy switch from
`Allow_All` to `boot_verified` along with the version and the hash
digest of the two policies. Note IPE can only have one policy active
at a time, all access decision evaluation is based on the current active
policy.
The normal procedure to deploy a policy is loading the policy to deploy
into the kernel first, then switch the active policy to it.
AUDIT_IPE_POLICY_LOAD(1422):
audit: AUDIT1422 policy_name="boot_verified" policy_version=0.0.0
policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F2676
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed a new policy has been loaded into the kernel
with the policy name, policy version and policy hash.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:23 +08:00
|
|
|
ipe_build_eval_ctx(&ctx, vma->vm_file, IPE_OP_EXEC, IPE_HOOK_MPROTECT);
|
2024-08-03 14:08:18 +08:00
|
|
|
return ipe_evaluate_event(&ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_kernel_read_file() - ipe security hook function for kernel read.
|
|
|
|
* @file: Supplies a pointer to the file structure being read in from disk.
|
|
|
|
* @id: Supplies the enumeration identifying the purpose of the read.
|
|
|
|
* @contents: Unused.
|
|
|
|
*
|
|
|
|
* This LSM hook is called when a file is read from disk in the kernel.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * %0 - Success
|
|
|
|
* * %-EACCES - Did not pass IPE policy
|
|
|
|
*/
|
|
|
|
int ipe_kernel_read_file(struct file *file, enum kernel_read_file_id id,
|
|
|
|
bool contents)
|
|
|
|
{
|
|
|
|
struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
|
|
|
|
enum ipe_op_type op;
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
case READING_FIRMWARE:
|
|
|
|
op = IPE_OP_FIRMWARE;
|
|
|
|
break;
|
|
|
|
case READING_MODULE:
|
|
|
|
op = IPE_OP_KERNEL_MODULE;
|
|
|
|
break;
|
|
|
|
case READING_KEXEC_INITRAMFS:
|
|
|
|
op = IPE_OP_KEXEC_INITRAMFS;
|
|
|
|
break;
|
|
|
|
case READING_KEXEC_IMAGE:
|
|
|
|
op = IPE_OP_KEXEC_IMAGE;
|
|
|
|
break;
|
|
|
|
case READING_POLICY:
|
|
|
|
op = IPE_OP_POLICY;
|
|
|
|
break;
|
|
|
|
case READING_X509_CERTIFICATE:
|
|
|
|
op = IPE_OP_X509;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
op = IPE_OP_INVALID;
|
|
|
|
WARN(1, "no rule setup for kernel_read_file enum %d", id);
|
|
|
|
}
|
|
|
|
|
audit,ipe: add IPE auditing support
Users of IPE require a way to identify when and why an operation fails,
allowing them to both respond to violations of policy and be notified
of potentially malicious actions on their systems with respect to IPE
itself.
This patch introduces 3 new audit events.
AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
of a resource.
AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
has been changed to another loaded policy.
AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
into the kernel.
This patch also adds support for success auditing, allowing users to
identify why an allow decision was made for a resource. However, it is
recommended to use this option with caution, as it is quite noisy.
Here are some examples of the new audit record types:
AUDIT_IPE_ACCESS(1420):
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
ino=3897 rule="op=EXECUTE boot_verified=TRUE action=ALLOW"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=299 comm="sh" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=300 path="/tmp/tmpdp2h1lub/deny/bin/hello" dev="tmpfs"
ino=131 rule="DEFAULT action=DENY"
The above three records were generated when the active IPE policy only
allows binaries from the initramfs to run. The three identical `hello`
binary were placed at different locations, only the first hello from
the rootfs(initramfs) was allowed.
Field ipe_op followed by the IPE operation name associated with the log.
Field ipe_hook followed by the name of the LSM hook that triggered the IPE
event.
Field enforcing followed by the enforcement state of IPE. (it will be
introduced in the next commit)
Field pid followed by the pid of the process that triggered the IPE
event.
Field comm followed by the command line program name of the process that
triggered the IPE event.
Field path followed by the file's path name.
Field dev followed by the device name as found in /dev where the file is
from.
Note that for device mappers it will use the name `dm-X` instead of
the name in /dev/mapper.
For a file in a temp file system, which is not from a device, it will use
`tmpfs` for the field.
The implementation of this part is following another existing use case
LSM_AUDIT_DATA_INODE in security/lsm_audit.c
Field ino followed by the file's inode number.
Field rule followed by the IPE rule made the access decision. The whole
rule must be audited because the decision is based on the combination of
all property conditions in the rule.
Along with the syscall audit event, user can know why a blocked
happened. For example:
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=2138 comm="bash" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit[1956]: SYSCALL arch=c000003e syscall=59
success=no exit=-13 a0=556790138df0 a1=556790135390 a2=5567901338b0
a3=ab2a41a67f4f1f4e items=1 ppid=147 pid=1956 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0
ses=4294967295 comm="bash" exe="/usr/bin/bash" key=(null)
The above two records showed bash used execve to run "hello" and got
blocked by IPE. Note that the IPE records are always prior to a SYSCALL
record.
AUDIT_IPE_CONFIG_CHANGE(1421):
audit: AUDIT1421
old_active_pol_name="Allow_All" old_active_pol_version=0.0.0
old_policy_digest=sha256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649
new_active_pol_name="boot_verified" new_active_pol_version=0.0.0
new_policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed the current IPE active policy switch from
`Allow_All` to `boot_verified` along with the version and the hash
digest of the two policies. Note IPE can only have one policy active
at a time, all access decision evaluation is based on the current active
policy.
The normal procedure to deploy a policy is loading the policy to deploy
into the kernel first, then switch the active policy to it.
AUDIT_IPE_POLICY_LOAD(1422):
audit: AUDIT1422 policy_name="boot_verified" policy_version=0.0.0
policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F2676
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed a new policy has been loaded into the kernel
with the policy name, policy version and policy hash.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:23 +08:00
|
|
|
ipe_build_eval_ctx(&ctx, file, op, IPE_HOOK_KERNEL_READ);
|
2024-08-03 14:08:18 +08:00
|
|
|
return ipe_evaluate_event(&ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_kernel_load_data() - ipe security hook function for kernel load data.
|
|
|
|
* @id: Supplies the enumeration identifying the purpose of the load.
|
|
|
|
* @contents: Unused.
|
|
|
|
*
|
|
|
|
* This LSM hook is called when a data buffer provided by userspace is loading
|
|
|
|
* into the kernel.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * %0 - Success
|
|
|
|
* * %-EACCES - Did not pass IPE policy
|
|
|
|
*/
|
|
|
|
int ipe_kernel_load_data(enum kernel_load_data_id id, bool contents)
|
|
|
|
{
|
|
|
|
struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
|
|
|
|
enum ipe_op_type op;
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
case LOADING_FIRMWARE:
|
|
|
|
op = IPE_OP_FIRMWARE;
|
|
|
|
break;
|
|
|
|
case LOADING_MODULE:
|
|
|
|
op = IPE_OP_KERNEL_MODULE;
|
|
|
|
break;
|
|
|
|
case LOADING_KEXEC_INITRAMFS:
|
|
|
|
op = IPE_OP_KEXEC_INITRAMFS;
|
|
|
|
break;
|
|
|
|
case LOADING_KEXEC_IMAGE:
|
|
|
|
op = IPE_OP_KEXEC_IMAGE;
|
|
|
|
break;
|
|
|
|
case LOADING_POLICY:
|
|
|
|
op = IPE_OP_POLICY;
|
|
|
|
break;
|
|
|
|
case LOADING_X509_CERTIFICATE:
|
|
|
|
op = IPE_OP_X509;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
op = IPE_OP_INVALID;
|
|
|
|
WARN(1, "no rule setup for kernel_load_data enum %d", id);
|
|
|
|
}
|
|
|
|
|
audit,ipe: add IPE auditing support
Users of IPE require a way to identify when and why an operation fails,
allowing them to both respond to violations of policy and be notified
of potentially malicious actions on their systems with respect to IPE
itself.
This patch introduces 3 new audit events.
AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
of a resource.
AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
has been changed to another loaded policy.
AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
into the kernel.
This patch also adds support for success auditing, allowing users to
identify why an allow decision was made for a resource. However, it is
recommended to use this option with caution, as it is quite noisy.
Here are some examples of the new audit record types:
AUDIT_IPE_ACCESS(1420):
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
ino=3897 rule="op=EXECUTE boot_verified=TRUE action=ALLOW"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=299 comm="sh" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=300 path="/tmp/tmpdp2h1lub/deny/bin/hello" dev="tmpfs"
ino=131 rule="DEFAULT action=DENY"
The above three records were generated when the active IPE policy only
allows binaries from the initramfs to run. The three identical `hello`
binary were placed at different locations, only the first hello from
the rootfs(initramfs) was allowed.
Field ipe_op followed by the IPE operation name associated with the log.
Field ipe_hook followed by the name of the LSM hook that triggered the IPE
event.
Field enforcing followed by the enforcement state of IPE. (it will be
introduced in the next commit)
Field pid followed by the pid of the process that triggered the IPE
event.
Field comm followed by the command line program name of the process that
triggered the IPE event.
Field path followed by the file's path name.
Field dev followed by the device name as found in /dev where the file is
from.
Note that for device mappers it will use the name `dm-X` instead of
the name in /dev/mapper.
For a file in a temp file system, which is not from a device, it will use
`tmpfs` for the field.
The implementation of this part is following another existing use case
LSM_AUDIT_DATA_INODE in security/lsm_audit.c
Field ino followed by the file's inode number.
Field rule followed by the IPE rule made the access decision. The whole
rule must be audited because the decision is based on the combination of
all property conditions in the rule.
Along with the syscall audit event, user can know why a blocked
happened. For example:
audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
pid=2138 comm="bash" path="/mnt/ipe/bin/hello" dev="dm-0"
ino=2 rule="DEFAULT action=DENY"
audit[1956]: SYSCALL arch=c000003e syscall=59
success=no exit=-13 a0=556790138df0 a1=556790135390 a2=5567901338b0
a3=ab2a41a67f4f1f4e items=1 ppid=147 pid=1956 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0
ses=4294967295 comm="bash" exe="/usr/bin/bash" key=(null)
The above two records showed bash used execve to run "hello" and got
blocked by IPE. Note that the IPE records are always prior to a SYSCALL
record.
AUDIT_IPE_CONFIG_CHANGE(1421):
audit: AUDIT1421
old_active_pol_name="Allow_All" old_active_pol_version=0.0.0
old_policy_digest=sha256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649
new_active_pol_name="boot_verified" new_active_pol_version=0.0.0
new_policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed the current IPE active policy switch from
`Allow_All` to `boot_verified` along with the version and the hash
digest of the two policies. Note IPE can only have one policy active
at a time, all access decision evaluation is based on the current active
policy.
The normal procedure to deploy a policy is loading the policy to deploy
into the kernel first, then switch the active policy to it.
AUDIT_IPE_POLICY_LOAD(1422):
audit: AUDIT1422 policy_name="boot_verified" policy_version=0.0.0
policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F2676
auid=4294967295 ses=4294967295 lsm=ipe res=1
The above record showed a new policy has been loaded into the kernel
with the policy name, policy version and policy hash.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:23 +08:00
|
|
|
ipe_build_eval_ctx(&ctx, NULL, op, IPE_HOOK_KERNEL_LOAD);
|
2024-08-03 14:08:18 +08:00
|
|
|
return ipe_evaluate_event(&ctx);
|
|
|
|
}
|
2024-08-03 14:08:20 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_unpack_initramfs() - Mark the current rootfs as initramfs.
|
|
|
|
*/
|
|
|
|
void ipe_unpack_initramfs(void)
|
|
|
|
{
|
|
|
|
ipe_sb(current->fs->root.mnt->mnt_sb)->initramfs = true;
|
|
|
|
}
|
2024-08-03 14:08:27 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPE_PROP_DM_VERITY
|
|
|
|
/**
|
|
|
|
* ipe_bdev_free_security() - Free IPE's LSM blob of block_devices.
|
|
|
|
* @bdev: Supplies a pointer to a block_device that contains the structure
|
|
|
|
* to free.
|
|
|
|
*/
|
|
|
|
void ipe_bdev_free_security(struct block_device *bdev)
|
|
|
|
{
|
|
|
|
struct ipe_bdev *blob = ipe_bdev(bdev);
|
|
|
|
|
|
|
|
ipe_digest_free(blob->root_hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_IPE_PROP_DM_VERITY_SIGNATURE
|
|
|
|
static void ipe_set_dmverity_signature(struct ipe_bdev *blob,
|
|
|
|
const void *value,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
blob->dm_verity_signed = size > 0 && value;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static inline void ipe_set_dmverity_signature(struct ipe_bdev *blob,
|
|
|
|
const void *value,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_IPE_PROP_DM_VERITY_SIGNATURE */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ipe_bdev_setintegrity() - Save integrity data from a bdev to IPE's LSM blob.
|
|
|
|
* @bdev: Supplies a pointer to a block_device that contains the LSM blob.
|
|
|
|
* @type: Supplies the integrity type.
|
|
|
|
* @value: Supplies the value to store.
|
|
|
|
* @size: The size of @value.
|
|
|
|
*
|
|
|
|
* This hook is currently used to save dm-verity's root hash or the existence
|
|
|
|
* of a validated signed dm-verity root hash into LSM blob.
|
|
|
|
*
|
|
|
|
* Return: %0 on success. If an error occurs, the function will return the
|
|
|
|
* -errno.
|
|
|
|
*/
|
|
|
|
int ipe_bdev_setintegrity(struct block_device *bdev, enum lsm_integrity_type type,
|
|
|
|
const void *value, size_t size)
|
|
|
|
{
|
|
|
|
const struct dm_verity_digest *digest = NULL;
|
|
|
|
struct ipe_bdev *blob = ipe_bdev(bdev);
|
|
|
|
struct digest_info *info = NULL;
|
|
|
|
|
|
|
|
if (type == LSM_INT_DMVERITY_SIG_VALID) {
|
|
|
|
ipe_set_dmverity_signature(blob, value, size);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (type != LSM_INT_DMVERITY_ROOTHASH)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!value) {
|
|
|
|
ipe_digest_free(blob->root_hash);
|
|
|
|
blob->root_hash = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
digest = value;
|
|
|
|
|
|
|
|
info = kzalloc(sizeof(*info), GFP_KERNEL);
|
|
|
|
if (!info)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL);
|
|
|
|
if (!info->digest)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
info->alg = kstrdup(digest->alg, GFP_KERNEL);
|
|
|
|
if (!info->alg)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
info->digest_len = digest->digest_len;
|
|
|
|
|
|
|
|
ipe_digest_free(blob->root_hash);
|
|
|
|
blob->root_hash = info;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
ipe_digest_free(info);
|
|
|
|
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_IPE_PROP_DM_VERITY */
|
2024-08-03 14:08:30 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
|
|
|
|
/**
|
|
|
|
* ipe_inode_setintegrity() - save integrity data from a inode to IPE's LSM blob.
|
|
|
|
* @inode: The inode to source the security blob from.
|
|
|
|
* @type: Supplies the integrity type.
|
|
|
|
* @value: The value to be stored.
|
|
|
|
* @size: The size of @value.
|
|
|
|
*
|
|
|
|
* This hook is currently used to save the existence of a validated fs-verity
|
|
|
|
* builtin signature into LSM blob.
|
|
|
|
*
|
|
|
|
* Return: %0 on success. If an error occurs, the function will return the
|
|
|
|
* -errno.
|
|
|
|
*/
|
|
|
|
int ipe_inode_setintegrity(const struct inode *inode,
|
|
|
|
enum lsm_integrity_type type,
|
|
|
|
const void *value, size_t size)
|
|
|
|
{
|
|
|
|
struct ipe_inode *inode_sec = ipe_inode(inode);
|
|
|
|
|
|
|
|
if (type == LSM_INT_FSVERITY_BUILTINSIG_VALID) {
|
|
|
|
inode_sec->fs_verity_signed = size > 0 && value;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */
|