mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-26 04:25:27 +08:00
fdd1ffe8a8
SELinux stores the active policy in memory, so the changes to this data at runtime would have an impact on the security guarantees provided by SELinux. Measuring in-memory SELinux policy through IMA subsystem provides a secure way for the attestation service to remotely validate the policy contents at runtime. Measure the hash of the loaded policy by calling the IMA hook ima_measure_critical_data(). Since the size of the loaded policy can be large (several MB), measure the hash of the policy instead of the entire policy to avoid bloating the IMA log entry. To enable SELinux data measurement, the following steps are required: 1, Add "ima_policy=critical_data" to the kernel command line arguments to enable measuring SELinux data at boot time. For example, BOOT_IMAGE=/boot/vmlinuz-5.10.0-rc1+ root=UUID=fd643309-a5d2-4ed3-b10d-3c579a5fab2f ro nomodeset security=selinux ima_policy=critical_data 2, Add the following rule to /etc/ima/ima-policy measure func=CRITICAL_DATA label=selinux Sample measurement of the hash of SELinux policy: To verify the measured data with the current SELinux policy run the following commands and verify the output hash values match. sha256sum /sys/fs/selinux/policy | cut -d' ' -f 1 grep "selinux-policy-hash" /sys/kernel/security/integrity/ima/ascii_runtime_measurements | tail -1 | cut -d' ' -f 6 Note that the actual verification of SELinux policy would require loading the expected policy into an identical kernel on a pristine/known-safe system and run the sha256sum /sys/kernel/selinux/policy there to get the expected hash. Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com> Suggested-by: Stephen Smalley <stephen.smalley.work@gmail.com> Acked-by: Paul Moore <paul@paul-moore.com> Reviewed-by: Tyler Hicks <tyhicks@linux.microsoft.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
31 lines
986 B
Makefile
31 lines
986 B
Makefile
# SPDX-License-Identifier: GPL-2.0
|
|
#
|
|
# Makefile for building the SELinux module as part of the kernel tree.
|
|
#
|
|
|
|
obj-$(CONFIG_SECURITY_SELINUX) := selinux.o
|
|
|
|
selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \
|
|
netnode.o netport.o status.o \
|
|
ss/ebitmap.o ss/hashtab.o ss/symtab.o ss/sidtab.o ss/avtab.o \
|
|
ss/policydb.o ss/services.o ss/conditional.o ss/mls.o ss/context.o
|
|
|
|
selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o
|
|
|
|
selinux-$(CONFIG_NETLABEL) += netlabel.o
|
|
|
|
selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o
|
|
|
|
selinux-$(CONFIG_IMA) += ima.o
|
|
|
|
ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
|
|
|
|
$(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h
|
|
|
|
quiet_cmd_flask = GEN $(obj)/flask.h $(obj)/av_permissions.h
|
|
cmd_flask = scripts/selinux/genheaders/genheaders $(obj)/flask.h $(obj)/av_permissions.h
|
|
|
|
targets += flask.h av_permissions.h
|
|
$(obj)/flask.h: $(src)/include/classmap.h FORCE
|
|
$(call if_changed,flask)
|