mirror of
https://github.com/tbsdtv/linux_media.git
synced 2025-07-23 04:33:26 +02:00
IMA: define a hook to measure kernel integrity critical data
IMA provides capabilities to measure file and buffer data. However, various data structures, policies, and states stored in kernel memory also impact the integrity of the system. Several kernel subsystems contain such integrity critical data. These kernel subsystems help protect the integrity of the system. Currently, IMA does not provide a generic function for measuring kernel integrity critical data. Define ima_measure_critical_data, a new IMA hook, to measure kernel integrity critical data. Signed-off-by: Tushar Sugandhi <tusharsu@linux.microsoft.com> Reviewed-by: Tyler Hicks <tyhicks@linux.microsoft.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
This commit is contained in:
committed by
Mimi Zohar
parent
291af651b3
commit
d6e645012d
@@ -201,6 +201,7 @@ static inline unsigned int ima_hash_key(u8 *digest)
|
||||
hook(POLICY_CHECK, policy) \
|
||||
hook(KEXEC_CMDLINE, kexec_cmdline) \
|
||||
hook(KEY_CHECK, key) \
|
||||
hook(CRITICAL_DATA, critical_data) \
|
||||
hook(MAX_CHECK, none)
|
||||
|
||||
#define __ima_hook_enumify(ENUM, str) ENUM,
|
||||
|
@@ -176,7 +176,7 @@ err_out:
|
||||
* subj=, obj=, type=, func=, mask=, fsmagic=
|
||||
* subj,obj, and type: are LSM specific.
|
||||
* func: FILE_CHECK | BPRM_CHECK | CREDS_CHECK | MMAP_CHECK | MODULE_CHECK
|
||||
* | KEXEC_CMDLINE | KEY_CHECK
|
||||
* | KEXEC_CMDLINE | KEY_CHECK | CRITICAL_DATA
|
||||
* mask: contains the permission mask
|
||||
* fsmagic: hex value
|
||||
*
|
||||
|
@@ -943,6 +943,30 @@ void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
|
||||
fdput(f);
|
||||
}
|
||||
|
||||
/**
|
||||
* ima_measure_critical_data - measure kernel integrity critical data
|
||||
* @event_name: event name for the record in the IMA measurement list
|
||||
* @buf: pointer to buffer data
|
||||
* @buf_len: length of buffer data (in bytes)
|
||||
* @hash: measure buffer data hash
|
||||
*
|
||||
* Measure data critical to the integrity of the kernel into the IMA log
|
||||
* and extend the pcr. Examples of critical data could be various data
|
||||
* structures, policies, and states stored in kernel memory that can
|
||||
* impact the integrity of the system.
|
||||
*/
|
||||
void ima_measure_critical_data(const char *event_name,
|
||||
const void *buf, size_t buf_len,
|
||||
bool hash)
|
||||
{
|
||||
if (!event_name || !buf || !buf_len)
|
||||
return;
|
||||
|
||||
process_buffer_measurement(NULL, buf, buf_len, event_name,
|
||||
CRITICAL_DATA, 0, NULL,
|
||||
hash);
|
||||
}
|
||||
|
||||
static int __init init_ima(void)
|
||||
{
|
||||
int error;
|
||||
|
Reference in New Issue
Block a user