Skip to content

Commit 2554a48

Browse files
nramaspcmoore
authored andcommitted
selinux: measure state and policy capabilities
SELinux stores the configuration state and the policy capabilities in kernel memory. Changes to this data at runtime would have an impact on the security guarantees provided by SELinux. Measuring this data through IMA subsystem provides a tamper-resistant way for an attestation service to remotely validate it at runtime. Measure the configuration state and policy capabilities by calling the IMA hook ima_measure_critical_data(). To enable SELinux data measurement, the following steps are required: 1, Add "ima_policy=critical_data" to the kernel command line arguments to enable measuring SELinux data at boot time. For example, BOOT_IMAGE=/boot/vmlinuz-5.11.0-rc3+ root=UUID=fd643309-a5d2-4ed3-b10d-3c579a5fab2f ro nomodeset security=selinux ima_policy=critical_data 2, Add the following rule to /etc/ima/ima-policy measure func=CRITICAL_DATA label=selinux Sample measurement of SELinux state and policy capabilities: 10 2122...65d8 ima-buf sha256:13c2...1292 selinux-state 696e...303b Execute the following command to extract the measured data from the IMA's runtime measurements list: grep "selinux-state" /sys/kernel/security/integrity/ima/ascii_runtime_measurements | tail -1 | cut -d' ' -f 6 | xxd -r -p The output should be a list of key-value pairs. For example, initialized=1;enforcing=0;checkreqprot=1;network_peer_controls=1;open_perms=1;extended_socket_class=1;always_check_network=0;cgroup_seclabel=1;nnp_nosuid_transition=1;genfs_seclabel_symlinks=0; To verify the measurement is consistent with the current SELinux state reported on the system, compare the integer values in the following files with those set in the IMA measurement (using the following commands): - cat /sys/fs/selinux/enforce - cat /sys/fs/selinux/checkreqprot - cat /sys/fs/selinux/policy_capabilities/[capability_file] Note that the actual verification would be against an expected state and done on a separate system (likely an attestation server) requiring "initialized=1;enforcing=1;checkreqprot=0;" for a secure state and then whatever policy capabilities are actually set in the expected policy (which can be extracted from the policy itself via seinfo, for example). Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com> Suggested-by: Stephen Smalley <stephen.smalley.work@gmail.com> Suggested-by: Paul Moore <paul@paul-moore.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
1 parent 7fa2e79 commit 2554a48

4 files changed

Lines changed: 96 additions & 5 deletions

File tree

security/selinux/ima.c

Lines changed: 83 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,83 @@
1313
#include "ima.h"
1414

1515
/*
16-
* selinux_ima_measure_state - Measure hash of the SELinux policy
16+
* selinux_ima_collect_state - Read selinux configuration settings
1717
*
18-
* @state: selinux state struct
18+
* @state: selinux_state
1919
*
20-
* NOTE: This function must be called with policy_mutex held.
20+
* On success returns the configuration settings string.
21+
* On error, returns NULL.
2122
*/
22-
void selinux_ima_measure_state(struct selinux_state *state)
23+
static char *selinux_ima_collect_state(struct selinux_state *state)
2324
{
25+
const char *on = "=1;", *off = "=0;";
26+
char *buf;
27+
int buf_len, len, i, rc;
28+
29+
buf_len = strlen("initialized=0;enforcing=0;checkreqprot=0;") + 1;
30+
31+
len = strlen(on);
32+
for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++)
33+
buf_len += strlen(selinux_policycap_names[i]) + len;
34+
35+
buf = kzalloc(buf_len, GFP_KERNEL);
36+
if (!buf)
37+
return NULL;
38+
39+
rc = strscpy(buf, "initialized", buf_len);
40+
WARN_ON(rc < 0);
41+
42+
rc = strlcat(buf, selinux_initialized(state) ? on : off, buf_len);
43+
WARN_ON(rc >= buf_len);
44+
45+
rc = strlcat(buf, "enforcing", buf_len);
46+
WARN_ON(rc >= buf_len);
47+
48+
rc = strlcat(buf, enforcing_enabled(state) ? on : off, buf_len);
49+
WARN_ON(rc >= buf_len);
50+
51+
rc = strlcat(buf, "checkreqprot", buf_len);
52+
WARN_ON(rc >= buf_len);
53+
54+
rc = strlcat(buf, checkreqprot_get(state) ? on : off, buf_len);
55+
WARN_ON(rc >= buf_len);
56+
57+
for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++) {
58+
rc = strlcat(buf, selinux_policycap_names[i], buf_len);
59+
WARN_ON(rc >= buf_len);
60+
61+
rc = strlcat(buf, state->policycap[i] ? on : off, buf_len);
62+
WARN_ON(rc >= buf_len);
63+
}
64+
65+
return buf;
66+
}
67+
68+
/*
69+
* selinux_ima_measure_state_locked - Measure SELinux state and hash of policy
70+
*
71+
* @state: selinux state struct
72+
*/
73+
void selinux_ima_measure_state_locked(struct selinux_state *state)
74+
{
75+
char *state_str = NULL;
2476
void *policy = NULL;
2577
size_t policy_len;
2678
int rc = 0;
2779

80+
WARN_ON(!mutex_is_locked(&state->policy_mutex));
81+
82+
state_str = selinux_ima_collect_state(state);
83+
if (!state_str) {
84+
pr_err("SELinux: %s: failed to read state.\n", __func__);
85+
return;
86+
}
87+
88+
ima_measure_critical_data("selinux", "selinux-state",
89+
state_str, strlen(state_str), false);
90+
91+
kfree(state_str);
92+
2893
/*
2994
* Measure SELinux policy only after initialization is completed.
3095
*/
@@ -42,3 +107,17 @@ void selinux_ima_measure_state(struct selinux_state *state)
42107

43108
vfree(policy);
44109
}
110+
111+
/*
112+
* selinux_ima_measure_state - Measure SELinux state and hash of policy
113+
*
114+
* @state: selinux state struct
115+
*/
116+
void selinux_ima_measure_state(struct selinux_state *state)
117+
{
118+
WARN_ON(mutex_is_locked(&state->policy_mutex));
119+
120+
mutex_lock(&state->policy_mutex);
121+
selinux_ima_measure_state_locked(state);
122+
mutex_unlock(&state->policy_mutex);
123+
}

security/selinux/include/ima.h

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,16 @@
1515

1616
#ifdef CONFIG_IMA
1717
extern void selinux_ima_measure_state(struct selinux_state *selinux_state);
18+
extern void selinux_ima_measure_state_locked(
19+
struct selinux_state *selinux_state);
1820
#else
1921
static inline void selinux_ima_measure_state(struct selinux_state *selinux_state)
2022
{
2123
}
24+
static inline void selinux_ima_measure_state_locked(
25+
struct selinux_state *selinux_state)
26+
{
27+
}
2228
#endif
2329

2430
#endif /* _SELINUX_IMA_H_ */

security/selinux/selinuxfs.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@
4141
#include "security.h"
4242
#include "objsec.h"
4343
#include "conditional.h"
44+
#include "ima.h"
4445

4546
enum sel_inos {
4647
SEL_ROOT_INO = 2,
@@ -182,6 +183,8 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
182183
selinux_status_update_setenforce(state, new_value);
183184
if (!new_value)
184185
call_blocking_lsm_notifier(LSM_POLICY_CHANGE, NULL);
186+
187+
selinux_ima_measure_state(state);
185188
}
186189
length = count;
187190
out:
@@ -762,6 +765,9 @@ static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf,
762765

763766
checkreqprot_set(fsi->state, (new_value ? 1 : 0));
764767
length = count;
768+
769+
selinux_ima_measure_state(fsi->state);
770+
765771
out:
766772
kfree(page);
767773
return length;

security/selinux/ss/services.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2179,7 +2179,7 @@ static void selinux_notify_policy_change(struct selinux_state *state,
21792179
selinux_status_update_policyload(state, seqno);
21802180
selinux_netlbl_cache_invalidate();
21812181
selinux_xfrm_notify_policyload();
2182-
selinux_ima_measure_state(state);
2182+
selinux_ima_measure_state_locked(state);
21832183
}
21842184

21852185
void selinux_policy_commit(struct selinux_state *state,

0 commit comments

Comments
 (0)