diff mbox series

[v2,2/3] ima: Return int in the functions to measure a buffer

Message ID 20210701125552.2958008-3-roberto.sassu@huawei.com (mailing list archive)
State Changes Requested
Headers show
Series ima: Provide more info about buffer measurement | expand

Commit Message

Roberto Sassu July 1, 2021, 12:55 p.m. UTC
ima_measure_critical_data() and process_buffer_measurement() currently
don't return a result. A caller wouldn't be able to know whether those
functions were executed successfully.

This patch modifies the return type from void to int, and returns 0 if the
buffer has been successfully measured, a negative value otherwise.

Also, this patch does not modify the behavior of existing callers by
processing the returned value. Instead, the value is stored in a variable
marked as __maybe_unused.

Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
---
 include/linux/ima.h                          | 15 +++---
 security/integrity/ima/ima.h                 | 10 ++--
 security/integrity/ima/ima_appraise.c        |  4 +-
 security/integrity/ima/ima_asymmetric_keys.c |  4 +-
 security/integrity/ima/ima_init.c            |  6 ++-
 security/integrity/ima/ima_main.c            | 48 ++++++++++++--------
 security/integrity/ima/ima_queue_keys.c      | 15 +++---
 security/selinux/ima.c                       | 10 ++--
 8 files changed, 66 insertions(+), 46 deletions(-)

Comments

Lakshmi Ramasubramanian July 1, 2021, 4:15 p.m. UTC | #1
On 7/1/2021 5:55 AM, Roberto Sassu wrote:
> ima_measure_critical_data() and process_buffer_measurement() currently
> don't return a result. A caller wouldn't be able to know whether those
> functions were executed successfully.
> 
> This patch modifies the return type from void to int, and returns 0 if the
> buffer has been successfully measured, a negative value otherwise.
> 
> Also, this patch does not modify the behavior of existing callers by
> processing the returned value. Instead, the value is stored in a variable
> marked as __maybe_unused.
> 
> Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
> ---
>   include/linux/ima.h                          | 15 +++---
>   security/integrity/ima/ima.h                 | 10 ++--
>   security/integrity/ima/ima_appraise.c        |  4 +-
>   security/integrity/ima/ima_asymmetric_keys.c |  4 +-
>   security/integrity/ima/ima_init.c            |  6 ++-
>   security/integrity/ima/ima_main.c            | 48 ++++++++++++--------
>   security/integrity/ima/ima_queue_keys.c      | 15 +++---
>   security/selinux/ima.c                       | 10 ++--
>   8 files changed, 66 insertions(+), 46 deletions(-)
> 
> diff --git a/include/linux/ima.h b/include/linux/ima.h
> index 81e830d01ced..60492263aa64 100644
> --- a/include/linux/ima.h
> +++ b/include/linux/ima.h
> @@ -35,10 +35,10 @@ extern void ima_post_path_mknod(struct user_namespace *mnt_userns,
>   extern int ima_file_hash(struct file *file, char *buf, size_t buf_size);
>   extern int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size);
>   extern void ima_kexec_cmdline(int kernel_fd, const void *buf, int size);
> -extern void ima_measure_critical_data(const char *event_label,
> -				      const char *event_name,
> -				      const void *buf, size_t buf_len,
> -				      bool hash);
> +extern int ima_measure_critical_data(const char *event_label,
> +				     const char *event_name,
> +				     const void *buf, size_t buf_len,
> +				     bool hash);
>   
>   #ifdef CONFIG_IMA_APPRAISE_BOOTPARAM
>   extern void ima_appraise_parse_cmdline(void);
> @@ -144,10 +144,13 @@ static inline int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size
>   
>   static inline void ima_kexec_cmdline(int kernel_fd, const void *buf, int size) {}
>   
> -static inline void ima_measure_critical_data(const char *event_label,
> +static inline int ima_measure_critical_data(const char *event_label,
>   					     const char *event_name,
>   					     const void *buf, size_t buf_len,
> -					     bool hash) {}
> +					     bool hash)
> +{
> +	return -ENOENT;
> +}
>   
>   #endif /* CONFIG_IMA */
>   
> diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
> index f0e448ed1f9f..03db221324c3 100644
> --- a/security/integrity/ima/ima.h
> +++ b/security/integrity/ima/ima.h
> @@ -264,11 +264,11 @@ void ima_store_measurement(struct integrity_iint_cache *iint, struct file *file,
>   			   struct evm_ima_xattr_data *xattr_value,
>   			   int xattr_len, const struct modsig *modsig, int pcr,
>   			   struct ima_template_desc *template_desc);
> -void process_buffer_measurement(struct user_namespace *mnt_userns,
> -				struct inode *inode, const void *buf, int size,
> -				const char *eventname, enum ima_hooks func,
> -				int pcr, const char *func_data,
> -				bool buf_hash);
> +int process_buffer_measurement(struct user_namespace *mnt_userns,
> +			       struct inode *inode, const void *buf, int size,
> +			       const char *eventname, enum ima_hooks func,
> +			       int pcr, const char *func_data,
> +			       bool buf_hash);
>   void ima_audit_measurement(struct integrity_iint_cache *iint,
>   			   const unsigned char *filename);
>   int ima_alloc_init_template(struct ima_event_data *event_data,
> diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c
> index ef9dcfce45d4..275a2377743f 100644
> --- a/security/integrity/ima/ima_appraise.c
> +++ b/security/integrity/ima/ima_appraise.c
> @@ -345,6 +345,7 @@ int ima_check_blacklist(struct integrity_iint_cache *iint,
>   	enum hash_algo hash_algo;
>   	const u8 *digest = NULL;
>   	u32 digestsize = 0;
> +	int process_rc __maybe_unused;
>   	int rc = 0;
>   
>   	if (!(iint->flags & IMA_CHECK_BLACKLIST))
> @@ -355,7 +356,8 @@ int ima_check_blacklist(struct integrity_iint_cache *iint,
>   
>   		rc = is_binary_blacklisted(digest, digestsize);
>   		if ((rc == -EPERM) && (iint->flags & IMA_MEASURE))
> -			process_buffer_measurement(&init_user_ns, NULL, digest, digestsize,
> +			process_rc = process_buffer_measurement(&init_user_ns,
I think there is no need to make this change now. If and when 
ima_check_blacklist() needs to look at the return value of p_b_m(), this 
change can be made.

> +						   NULL, digest, digestsize,
>   						   "blacklisted-hash", NONE,
>   						   pcr, NULL, false);
>   	}
> diff --git a/security/integrity/ima/ima_asymmetric_keys.c b/security/integrity/ima/ima_asymmetric_keys.c
> index c985418698a4..910367cdd920 100644
> --- a/security/integrity/ima/ima_asymmetric_keys.c
> +++ b/security/integrity/ima/ima_asymmetric_keys.c
> @@ -31,6 +31,7 @@ void ima_post_key_create_or_update(struct key *keyring, struct key *key,
>   				   unsigned long flags, bool create)
>   {
>   	bool queued = false;
> +	int ret __maybe_unused;
>   
>   	/* Only asymmetric keys are handled by this hook. */
>   	if (key->type != &key_type_asymmetric)
> @@ -60,7 +61,8 @@ void ima_post_key_create_or_update(struct key *keyring, struct key *key,
>   	 * if the IMA policy is configured to measure a key linked
>   	 * to the given keyring.
>   	 */
> -	process_buffer_measurement(&init_user_ns, NULL, payload, payload_len,
> +	ret = process_buffer_measurement(&init_user_ns, NULL,
> +				   payload, payload_len,
Same comment as in ima_check_blacklist() - this change be made when needed.

>   				   keyring->description, KEY_CHECK, 0,
>   				   keyring->description, false);
>   }
> diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c
> index 5076a7d9d23e..6790eea88db8 100644
> --- a/security/integrity/ima/ima_init.c
> +++ b/security/integrity/ima/ima_init.c
> @@ -118,6 +118,7 @@ void __init ima_load_x509(void)
>   
>   int __init ima_init(void)
>   {
> +	int measure_rc __maybe_unused;
>   	int rc;
>   
>   	ima_tpm_chip = tpm_default_chip();
> @@ -153,8 +154,9 @@ int __init ima_init(void)
>   
>   	ima_init_key_queue();
>   
> -	ima_measure_critical_data("kernel_info", "kernel_version",
> -				  UTS_RELEASE, strlen(UTS_RELEASE), false);
> +	measure_rc = ima_measure_critical_data("kernel_info", "kernel_version",
> +					       UTS_RELEASE, strlen(UTS_RELEASE),
> +					       false);
Same comment as in ima_check_blacklist() - this change be made when needed.

>   
>   	return rc;
>   }
> diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
> index 8ef1fa357e0c..3386e7436440 100644
> --- a/security/integrity/ima/ima_main.c
> +++ b/security/integrity/ima/ima_main.c
> @@ -827,7 +827,7 @@ int ima_post_load_data(char *buf, loff_t size,
>   	return 0;
>   }
>   
> -/*
> +/**
>    * process_buffer_measurement - Measure the buffer or the buffer data hash
>    * @mnt_userns:	user namespace of the mount the inode was found from
>    * @inode: inode associated with the object being measured (NULL for KEY_CHECK)
> @@ -840,12 +840,15 @@ int ima_post_load_data(char *buf, loff_t size,
>    * @buf_hash: measure buffer data hash
>    *
>    * Based on policy, either the buffer data or buffer data hash is measured
> + *
> + * Return: 0 if the buffer has been successfully measured, a negative value
> + * otherwise.
>    */
> -void process_buffer_measurement(struct user_namespace *mnt_userns,
> -				struct inode *inode, const void *buf, int size,
> -				const char *eventname, enum ima_hooks func,
> -				int pcr, const char *func_data,
> -				bool buf_hash)
> +int process_buffer_measurement(struct user_namespace *mnt_userns,
> +			       struct inode *inode, const void *buf, int size,
> +			       const char *eventname, enum ima_hooks func,
> +			       int pcr, const char *func_data,
> +			       bool buf_hash)
>   {
>   	int ret = 0;
>   	const char *audit_cause = "ENOMEM";
> @@ -867,7 +870,7 @@ void process_buffer_measurement(struct user_namespace *mnt_userns,
>   	u32 secid;
>   
>   	if (!ima_policy_flag)
> -		return;
> +		return -ENOENT;
>   
>   	template = ima_template_desc_buf();
>   	if (!template) {
> @@ -889,7 +892,7 @@ void process_buffer_measurement(struct user_namespace *mnt_userns,
>   					secid, 0, func, &pcr, &template,
>   					func_data);
>   		if (!(action & IMA_MEASURE))
> -			return;
> +			return -ENOENT;
>   	}
>   
>   	if (!pcr)
> @@ -937,7 +940,7 @@ void process_buffer_measurement(struct user_namespace *mnt_userns,
>   					func_measure_str(func),
>   					audit_cause, ret, 0, ret);
>   
> -	return;
> +	return ret;
>   }
>   
>   /**
> @@ -951,6 +954,7 @@ void process_buffer_measurement(struct user_namespace *mnt_userns,
>   void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
>   {
>   	struct fd f;
> +	int ret __maybe_unused;
>   
>   	if (!buf || !size)
>   		return;
> @@ -959,9 +963,10 @@ void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
>   	if (!f.file)
>   		return;
>   
> -	process_buffer_measurement(file_mnt_user_ns(f.file), file_inode(f.file),
> -				   buf, size, "kexec-cmdline", KEXEC_CMDLINE, 0,
> -				   NULL, false);
> +	ret = process_buffer_measurement(file_mnt_user_ns(f.file),
> +					 file_inode(f.file), buf, size,
> +					 "kexec-cmdline", KEXEC_CMDLINE, 0,
> +					 NULL, false);
Since the return value of p_b_m() is not used here, this change can be 
made when needed.

>   	fdput(f);
>   }
>   
> @@ -977,18 +982,21 @@ void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
>    * and extend the pcr.  Examples of critical data could be various data
>    * structures, policies, and states stored in kernel memory that can
>    * impact the integrity of the system.
> + *
> + * Return: 0 if the buffer has been successfully measured, a negative value
> + * otherwise.
>    */
> -void ima_measure_critical_data(const char *event_label,
> -			       const char *event_name,
> -			       const void *buf, size_t buf_len,
> -			       bool hash)
> +int ima_measure_critical_data(const char *event_label,
> +			      const char *event_name,
> +			      const void *buf, size_t buf_len,
> +			      bool hash)
>   {
>   	if (!event_name || !event_label || !buf || !buf_len)
> -		return;
> +		return -ENOPARAM;
>   
> -	process_buffer_measurement(&init_user_ns, NULL, buf, buf_len, event_name,
> -				   CRITICAL_DATA, 0, event_label,
> -				   hash);
> +	return process_buffer_measurement(&init_user_ns, NULL, buf, buf_len,
> +					  event_name, CRITICAL_DATA, 0,
> +					  event_label, hash);
>   }
>   
>   static int __init init_ima(void)
> diff --git a/security/integrity/ima/ima_queue_keys.c b/security/integrity/ima/ima_queue_keys.c
> index 979ef6c71f3d..e3047ce64f39 100644
> --- a/security/integrity/ima/ima_queue_keys.c
> +++ b/security/integrity/ima/ima_queue_keys.c
> @@ -134,6 +134,7 @@ void ima_process_queued_keys(void)
>   {
>   	struct ima_key_entry *entry, *tmp;
>   	bool process = false;
> +	int ret __maybe_unused;
>   
>   	if (ima_process_keys)
>   		return;
> @@ -159,13 +160,13 @@ void ima_process_queued_keys(void)
>   
>   	list_for_each_entry_safe(entry, tmp, &ima_keys, list) {
>   		if (!timer_expired)
> -			process_buffer_measurement(&init_user_ns, NULL,
> -						   entry->payload,
> -						   entry->payload_len,
> -						   entry->keyring_name,
> -						   KEY_CHECK, 0,
> -						   entry->keyring_name,
> -						   false);
> +			ret = process_buffer_measurement(&init_user_ns, NULL,
> +							 entry->payload,
> +							 entry->payload_len,
> +							 entry->keyring_name,
> +							 KEY_CHECK, 0,
> +							 entry->keyring_name,
> +							 false);
Same comment as above.

>   		list_del(&entry->list);
>   		ima_free_key_entry(entry);
>   	}
> diff --git a/security/selinux/ima.c b/security/selinux/ima.c
> index 34d421861bfc..4db9fa211638 100644
> --- a/security/selinux/ima.c
> +++ b/security/selinux/ima.c
> @@ -75,6 +75,7 @@ void selinux_ima_measure_state_locked(struct selinux_state *state)
>   	char *state_str = NULL;
>   	void *policy = NULL;
>   	size_t policy_len;
> +	int measure_rc __maybe_unused;
>   	int rc = 0;
>   
>   	WARN_ON(!mutex_is_locked(&state->policy_mutex));
> @@ -85,8 +86,9 @@ void selinux_ima_measure_state_locked(struct selinux_state *state)
>   		return;
>   	}
>   
> -	ima_measure_critical_data("selinux", "selinux-state",
> -				  state_str, strlen(state_str), false);
> +	measure_rc = ima_measure_critical_data("selinux", "selinux-state",
> +					       state_str, strlen(state_str),
> +					       false);
Since the return value of ima_measure_critical_data() is not used here, 
this change can be made when needed.

>   
>   	kfree(state_str);
>   
> @@ -102,8 +104,8 @@ void selinux_ima_measure_state_locked(struct selinux_state *state)
>   		return;
>   	}
>   
> -	ima_measure_critical_data("selinux", "selinux-policy-hash",
> -				  policy, policy_len, true);
> +	measure_rc = ima_measure_critical_data("selinux", "selinux-policy-hash",
> +					       policy, policy_len, true);
Same comment as above.

  -lakshmi

>   
>   	vfree(policy);
>   }
>
Roberto Sassu July 2, 2021, 10:51 a.m. UTC | #2
> From: Lakshmi Ramasubramanian [mailto:nramas@linux.microsoft.com]
> Sent: Thursday, July 1, 2021 6:16 PM
> On 7/1/2021 5:55 AM, Roberto Sassu wrote:
> > ima_measure_critical_data() and process_buffer_measurement() currently
> > don't return a result. A caller wouldn't be able to know whether those
> > functions were executed successfully.
> >
> > This patch modifies the return type from void to int, and returns 0 if the
> > buffer has been successfully measured, a negative value otherwise.
> >
> > Also, this patch does not modify the behavior of existing callers by
> > processing the returned value. Instead, the value is stored in a variable
> > marked as __maybe_unused.
> >
> > Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
> > ---
> >   include/linux/ima.h                          | 15 +++---
> >   security/integrity/ima/ima.h                 | 10 ++--
> >   security/integrity/ima/ima_appraise.c        |  4 +-
> >   security/integrity/ima/ima_asymmetric_keys.c |  4 +-
> >   security/integrity/ima/ima_init.c            |  6 ++-
> >   security/integrity/ima/ima_main.c            | 48 ++++++++++++--------
> >   security/integrity/ima/ima_queue_keys.c      | 15 +++---
> >   security/selinux/ima.c                       | 10 ++--
> >   8 files changed, 66 insertions(+), 46 deletions(-)
> >
> > diff --git a/include/linux/ima.h b/include/linux/ima.h
> > index 81e830d01ced..60492263aa64 100644
> > --- a/include/linux/ima.h
> > +++ b/include/linux/ima.h
> > @@ -35,10 +35,10 @@ extern void ima_post_path_mknod(struct
> user_namespace *mnt_userns,
> >   extern int ima_file_hash(struct file *file, char *buf, size_t buf_size);
> >   extern int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size);
> >   extern void ima_kexec_cmdline(int kernel_fd, const void *buf, int size);
> > -extern void ima_measure_critical_data(const char *event_label,
> > -				      const char *event_name,
> > -				      const void *buf, size_t buf_len,
> > -				      bool hash);
> > +extern int ima_measure_critical_data(const char *event_label,
> > +				     const char *event_name,
> > +				     const void *buf, size_t buf_len,
> > +				     bool hash);
> >
> >   #ifdef CONFIG_IMA_APPRAISE_BOOTPARAM
> >   extern void ima_appraise_parse_cmdline(void);
> > @@ -144,10 +144,13 @@ static inline int ima_inode_hash(struct inode
> *inode, char *buf, size_t buf_size
> >
> >   static inline void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
> {}
> >
> > -static inline void ima_measure_critical_data(const char *event_label,
> > +static inline int ima_measure_critical_data(const char *event_label,
> >   					     const char *event_name,
> >   					     const void *buf, size_t buf_len,
> > -					     bool hash) {}
> > +					     bool hash)
> > +{
> > +	return -ENOENT;
> > +}
> >
> >   #endif /* CONFIG_IMA */
> >
> > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
> > index f0e448ed1f9f..03db221324c3 100644
> > --- a/security/integrity/ima/ima.h
> > +++ b/security/integrity/ima/ima.h
> > @@ -264,11 +264,11 @@ void ima_store_measurement(struct
> integrity_iint_cache *iint, struct file *file,
> >   			   struct evm_ima_xattr_data *xattr_value,
> >   			   int xattr_len, const struct modsig *modsig, int pcr,
> >   			   struct ima_template_desc *template_desc);
> > -void process_buffer_measurement(struct user_namespace *mnt_userns,
> > -				struct inode *inode, const void *buf, int size,
> > -				const char *eventname, enum ima_hooks
> func,
> > -				int pcr, const char *func_data,
> > -				bool buf_hash);
> > +int process_buffer_measurement(struct user_namespace *mnt_userns,
> > +			       struct inode *inode, const void *buf, int size,
> > +			       const char *eventname, enum ima_hooks func,
> > +			       int pcr, const char *func_data,
> > +			       bool buf_hash);
> >   void ima_audit_measurement(struct integrity_iint_cache *iint,
> >   			   const unsigned char *filename);
> >   int ima_alloc_init_template(struct ima_event_data *event_data,
> > diff --git a/security/integrity/ima/ima_appraise.c
> b/security/integrity/ima/ima_appraise.c
> > index ef9dcfce45d4..275a2377743f 100644
> > --- a/security/integrity/ima/ima_appraise.c
> > +++ b/security/integrity/ima/ima_appraise.c
> > @@ -345,6 +345,7 @@ int ima_check_blacklist(struct integrity_iint_cache
> *iint,
> >   	enum hash_algo hash_algo;
> >   	const u8 *digest = NULL;
> >   	u32 digestsize = 0;
> > +	int process_rc __maybe_unused;
> >   	int rc = 0;
> >
> >   	if (!(iint->flags & IMA_CHECK_BLACKLIST))
> > @@ -355,7 +356,8 @@ int ima_check_blacklist(struct integrity_iint_cache
> *iint,
> >
> >   		rc = is_binary_blacklisted(digest, digestsize);
> >   		if ((rc == -EPERM) && (iint->flags & IMA_MEASURE))
> > -			process_buffer_measurement(&init_user_ns, NULL,
> digest, digestsize,
> > +			process_rc =
> process_buffer_measurement(&init_user_ns,
> I think there is no need to make this change now. If and when
> ima_check_blacklist() needs to look at the return value of p_b_m(), this
> change can be made.

Hi Lakshmi

ok. I was worried about possible warnings. If it is not an issue,
I will remove the assignment.

Thanks

Roberto

HUAWEI TECHNOLOGIES Duesseldorf GmbH, HRB 56063
Managing Director: Li Peng, Li Jian, Shi Yanli

> > +						   NULL, digest, digestsize,
> >   						   "blacklisted-hash", NONE,
> >   						   pcr, NULL, false);
> >   	}
> > diff --git a/security/integrity/ima/ima_asymmetric_keys.c
> b/security/integrity/ima/ima_asymmetric_keys.c
> > index c985418698a4..910367cdd920 100644
> > --- a/security/integrity/ima/ima_asymmetric_keys.c
> > +++ b/security/integrity/ima/ima_asymmetric_keys.c
> > @@ -31,6 +31,7 @@ void ima_post_key_create_or_update(struct key
> *keyring, struct key *key,
> >   				   unsigned long flags, bool create)
> >   {
> >   	bool queued = false;
> > +	int ret __maybe_unused;
> >
> >   	/* Only asymmetric keys are handled by this hook. */
> >   	if (key->type != &key_type_asymmetric)
> > @@ -60,7 +61,8 @@ void ima_post_key_create_or_update(struct key
> *keyring, struct key *key,
> >   	 * if the IMA policy is configured to measure a key linked
> >   	 * to the given keyring.
> >   	 */
> > -	process_buffer_measurement(&init_user_ns, NULL, payload,
> payload_len,
> > +	ret = process_buffer_measurement(&init_user_ns, NULL,
> > +				   payload, payload_len,
> Same comment as in ima_check_blacklist() - this change be made when
> needed.
> 
> >   				   keyring->description, KEY_CHECK, 0,
> >   				   keyring->description, false);
> >   }
> > diff --git a/security/integrity/ima/ima_init.c
> b/security/integrity/ima/ima_init.c
> > index 5076a7d9d23e..6790eea88db8 100644
> > --- a/security/integrity/ima/ima_init.c
> > +++ b/security/integrity/ima/ima_init.c
> > @@ -118,6 +118,7 @@ void __init ima_load_x509(void)
> >
> >   int __init ima_init(void)
> >   {
> > +	int measure_rc __maybe_unused;
> >   	int rc;
> >
> >   	ima_tpm_chip = tpm_default_chip();
> > @@ -153,8 +154,9 @@ int __init ima_init(void)
> >
> >   	ima_init_key_queue();
> >
> > -	ima_measure_critical_data("kernel_info", "kernel_version",
> > -				  UTS_RELEASE, strlen(UTS_RELEASE), false);
> > +	measure_rc = ima_measure_critical_data("kernel_info",
> "kernel_version",
> > +					       UTS_RELEASE,
> strlen(UTS_RELEASE),
> > +					       false);
> Same comment as in ima_check_blacklist() - this change be made when
> needed.
> 
> >
> >   	return rc;
> >   }
> > diff --git a/security/integrity/ima/ima_main.c
> b/security/integrity/ima/ima_main.c
> > index 8ef1fa357e0c..3386e7436440 100644
> > --- a/security/integrity/ima/ima_main.c
> > +++ b/security/integrity/ima/ima_main.c
> > @@ -827,7 +827,7 @@ int ima_post_load_data(char *buf, loff_t size,
> >   	return 0;
> >   }
> >
> > -/*
> > +/**
> >    * process_buffer_measurement - Measure the buffer or the buffer data
> hash
> >    * @mnt_userns:	user namespace of the mount the inode was found
> from
> >    * @inode: inode associated with the object being measured (NULL for
> KEY_CHECK)
> > @@ -840,12 +840,15 @@ int ima_post_load_data(char *buf, loff_t size,
> >    * @buf_hash: measure buffer data hash
> >    *
> >    * Based on policy, either the buffer data or buffer data hash is measured
> > + *
> > + * Return: 0 if the buffer has been successfully measured, a negative value
> > + * otherwise.
> >    */
> > -void process_buffer_measurement(struct user_namespace *mnt_userns,
> > -				struct inode *inode, const void *buf, int size,
> > -				const char *eventname, enum ima_hooks
> func,
> > -				int pcr, const char *func_data,
> > -				bool buf_hash)
> > +int process_buffer_measurement(struct user_namespace *mnt_userns,
> > +			       struct inode *inode, const void *buf, int size,
> > +			       const char *eventname, enum ima_hooks func,
> > +			       int pcr, const char *func_data,
> > +			       bool buf_hash)
> >   {
> >   	int ret = 0;
> >   	const char *audit_cause = "ENOMEM";
> > @@ -867,7 +870,7 @@ void process_buffer_measurement(struct
> user_namespace *mnt_userns,
> >   	u32 secid;
> >
> >   	if (!ima_policy_flag)
> > -		return;
> > +		return -ENOENT;
> >
> >   	template = ima_template_desc_buf();
> >   	if (!template) {
> > @@ -889,7 +892,7 @@ void process_buffer_measurement(struct
> user_namespace *mnt_userns,
> >   					secid, 0, func, &pcr, &template,
> >   					func_data);
> >   		if (!(action & IMA_MEASURE))
> > -			return;
> > +			return -ENOENT;
> >   	}
> >
> >   	if (!pcr)
> > @@ -937,7 +940,7 @@ void process_buffer_measurement(struct
> user_namespace *mnt_userns,
> >   					func_measure_str(func),
> >   					audit_cause, ret, 0, ret);
> >
> > -	return;
> > +	return ret;
> >   }
> >
> >   /**
> > @@ -951,6 +954,7 @@ void process_buffer_measurement(struct
> user_namespace *mnt_userns,
> >   void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
> >   {
> >   	struct fd f;
> > +	int ret __maybe_unused;
> >
> >   	if (!buf || !size)
> >   		return;
> > @@ -959,9 +963,10 @@ void ima_kexec_cmdline(int kernel_fd, const void
> *buf, int size)
> >   	if (!f.file)
> >   		return;
> >
> > -	process_buffer_measurement(file_mnt_user_ns(f.file),
> file_inode(f.file),
> > -				   buf, size, "kexec-cmdline", KEXEC_CMDLINE,
> 0,
> > -				   NULL, false);
> > +	ret = process_buffer_measurement(file_mnt_user_ns(f.file),
> > +					 file_inode(f.file), buf, size,
> > +					 "kexec-cmdline", KEXEC_CMDLINE, 0,
> > +					 NULL, false);
> Since the return value of p_b_m() is not used here, this change can be
> made when needed.
> 
> >   	fdput(f);
> >   }
> >
> > @@ -977,18 +982,21 @@ void ima_kexec_cmdline(int kernel_fd, const void
> *buf, int size)
> >    * and extend the pcr.  Examples of critical data could be various data
> >    * structures, policies, and states stored in kernel memory that can
> >    * impact the integrity of the system.
> > + *
> > + * Return: 0 if the buffer has been successfully measured, a negative value
> > + * otherwise.
> >    */
> > -void ima_measure_critical_data(const char *event_label,
> > -			       const char *event_name,
> > -			       const void *buf, size_t buf_len,
> > -			       bool hash)
> > +int ima_measure_critical_data(const char *event_label,
> > +			      const char *event_name,
> > +			      const void *buf, size_t buf_len,
> > +			      bool hash)
> >   {
> >   	if (!event_name || !event_label || !buf || !buf_len)
> > -		return;
> > +		return -ENOPARAM;
> >
> > -	process_buffer_measurement(&init_user_ns, NULL, buf, buf_len,
> event_name,
> > -				   CRITICAL_DATA, 0, event_label,
> > -				   hash);
> > +	return process_buffer_measurement(&init_user_ns, NULL, buf,
> buf_len,
> > +					  event_name, CRITICAL_DATA, 0,
> > +					  event_label, hash);
> >   }
> >
> >   static int __init init_ima(void)
> > diff --git a/security/integrity/ima/ima_queue_keys.c
> b/security/integrity/ima/ima_queue_keys.c
> > index 979ef6c71f3d..e3047ce64f39 100644
> > --- a/security/integrity/ima/ima_queue_keys.c
> > +++ b/security/integrity/ima/ima_queue_keys.c
> > @@ -134,6 +134,7 @@ void ima_process_queued_keys(void)
> >   {
> >   	struct ima_key_entry *entry, *tmp;
> >   	bool process = false;
> > +	int ret __maybe_unused;
> >
> >   	if (ima_process_keys)
> >   		return;
> > @@ -159,13 +160,13 @@ void ima_process_queued_keys(void)
> >
> >   	list_for_each_entry_safe(entry, tmp, &ima_keys, list) {
> >   		if (!timer_expired)
> > -			process_buffer_measurement(&init_user_ns, NULL,
> > -						   entry->payload,
> > -						   entry->payload_len,
> > -						   entry->keyring_name,
> > -						   KEY_CHECK, 0,
> > -						   entry->keyring_name,
> > -						   false);
> > +			ret = process_buffer_measurement(&init_user_ns,
> NULL,
> > +							 entry->payload,
> > +							 entry->payload_len,
> > +							 entry-
> >keyring_name,
> > +							 KEY_CHECK, 0,
> > +							 entry-
> >keyring_name,
> > +							 false);
> Same comment as above.
> 
> >   		list_del(&entry->list);
> >   		ima_free_key_entry(entry);
> >   	}
> > diff --git a/security/selinux/ima.c b/security/selinux/ima.c
> > index 34d421861bfc..4db9fa211638 100644
> > --- a/security/selinux/ima.c
> > +++ b/security/selinux/ima.c
> > @@ -75,6 +75,7 @@ void selinux_ima_measure_state_locked(struct
> selinux_state *state)
> >   	char *state_str = NULL;
> >   	void *policy = NULL;
> >   	size_t policy_len;
> > +	int measure_rc __maybe_unused;
> >   	int rc = 0;
> >
> >   	WARN_ON(!mutex_is_locked(&state->policy_mutex));
> > @@ -85,8 +86,9 @@ void selinux_ima_measure_state_locked(struct
> selinux_state *state)
> >   		return;
> >   	}
> >
> > -	ima_measure_critical_data("selinux", "selinux-state",
> > -				  state_str, strlen(state_str), false);
> > +	measure_rc = ima_measure_critical_data("selinux", "selinux-state",
> > +					       state_str, strlen(state_str),
> > +					       false);
> Since the return value of ima_measure_critical_data() is not used here,
> this change can be made when needed.
> 
> >
> >   	kfree(state_str);
> >
> > @@ -102,8 +104,8 @@ void selinux_ima_measure_state_locked(struct
> selinux_state *state)
> >   		return;
> >   	}
> >
> > -	ima_measure_critical_data("selinux", "selinux-policy-hash",
> > -				  policy, policy_len, true);
> > +	measure_rc = ima_measure_critical_data("selinux", "selinux-policy-
> hash",
> > +					       policy, policy_len, true);
> Same comment as above.
> 
>   -lakshmi
> 
> >
> >   	vfree(policy);
> >   }
> >
diff mbox series

Patch

diff --git a/include/linux/ima.h b/include/linux/ima.h
index 81e830d01ced..60492263aa64 100644
--- a/include/linux/ima.h
+++ b/include/linux/ima.h
@@ -35,10 +35,10 @@  extern void ima_post_path_mknod(struct user_namespace *mnt_userns,
 extern int ima_file_hash(struct file *file, char *buf, size_t buf_size);
 extern int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size);
 extern void ima_kexec_cmdline(int kernel_fd, const void *buf, int size);
-extern void ima_measure_critical_data(const char *event_label,
-				      const char *event_name,
-				      const void *buf, size_t buf_len,
-				      bool hash);
+extern int ima_measure_critical_data(const char *event_label,
+				     const char *event_name,
+				     const void *buf, size_t buf_len,
+				     bool hash);
 
 #ifdef CONFIG_IMA_APPRAISE_BOOTPARAM
 extern void ima_appraise_parse_cmdline(void);
@@ -144,10 +144,13 @@  static inline int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size
 
 static inline void ima_kexec_cmdline(int kernel_fd, const void *buf, int size) {}
 
-static inline void ima_measure_critical_data(const char *event_label,
+static inline int ima_measure_critical_data(const char *event_label,
 					     const char *event_name,
 					     const void *buf, size_t buf_len,
-					     bool hash) {}
+					     bool hash)
+{
+	return -ENOENT;
+}
 
 #endif /* CONFIG_IMA */
 
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
index f0e448ed1f9f..03db221324c3 100644
--- a/security/integrity/ima/ima.h
+++ b/security/integrity/ima/ima.h
@@ -264,11 +264,11 @@  void ima_store_measurement(struct integrity_iint_cache *iint, struct file *file,
 			   struct evm_ima_xattr_data *xattr_value,
 			   int xattr_len, const struct modsig *modsig, int pcr,
 			   struct ima_template_desc *template_desc);
-void process_buffer_measurement(struct user_namespace *mnt_userns,
-				struct inode *inode, const void *buf, int size,
-				const char *eventname, enum ima_hooks func,
-				int pcr, const char *func_data,
-				bool buf_hash);
+int process_buffer_measurement(struct user_namespace *mnt_userns,
+			       struct inode *inode, const void *buf, int size,
+			       const char *eventname, enum ima_hooks func,
+			       int pcr, const char *func_data,
+			       bool buf_hash);
 void ima_audit_measurement(struct integrity_iint_cache *iint,
 			   const unsigned char *filename);
 int ima_alloc_init_template(struct ima_event_data *event_data,
diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c
index ef9dcfce45d4..275a2377743f 100644
--- a/security/integrity/ima/ima_appraise.c
+++ b/security/integrity/ima/ima_appraise.c
@@ -345,6 +345,7 @@  int ima_check_blacklist(struct integrity_iint_cache *iint,
 	enum hash_algo hash_algo;
 	const u8 *digest = NULL;
 	u32 digestsize = 0;
+	int process_rc __maybe_unused;
 	int rc = 0;
 
 	if (!(iint->flags & IMA_CHECK_BLACKLIST))
@@ -355,7 +356,8 @@  int ima_check_blacklist(struct integrity_iint_cache *iint,
 
 		rc = is_binary_blacklisted(digest, digestsize);
 		if ((rc == -EPERM) && (iint->flags & IMA_MEASURE))
-			process_buffer_measurement(&init_user_ns, NULL, digest, digestsize,
+			process_rc = process_buffer_measurement(&init_user_ns,
+						   NULL, digest, digestsize,
 						   "blacklisted-hash", NONE,
 						   pcr, NULL, false);
 	}
diff --git a/security/integrity/ima/ima_asymmetric_keys.c b/security/integrity/ima/ima_asymmetric_keys.c
index c985418698a4..910367cdd920 100644
--- a/security/integrity/ima/ima_asymmetric_keys.c
+++ b/security/integrity/ima/ima_asymmetric_keys.c
@@ -31,6 +31,7 @@  void ima_post_key_create_or_update(struct key *keyring, struct key *key,
 				   unsigned long flags, bool create)
 {
 	bool queued = false;
+	int ret __maybe_unused;
 
 	/* Only asymmetric keys are handled by this hook. */
 	if (key->type != &key_type_asymmetric)
@@ -60,7 +61,8 @@  void ima_post_key_create_or_update(struct key *keyring, struct key *key,
 	 * if the IMA policy is configured to measure a key linked
 	 * to the given keyring.
 	 */
-	process_buffer_measurement(&init_user_ns, NULL, payload, payload_len,
+	ret = process_buffer_measurement(&init_user_ns, NULL,
+				   payload, payload_len,
 				   keyring->description, KEY_CHECK, 0,
 				   keyring->description, false);
 }
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c
index 5076a7d9d23e..6790eea88db8 100644
--- a/security/integrity/ima/ima_init.c
+++ b/security/integrity/ima/ima_init.c
@@ -118,6 +118,7 @@  void __init ima_load_x509(void)
 
 int __init ima_init(void)
 {
+	int measure_rc __maybe_unused;
 	int rc;
 
 	ima_tpm_chip = tpm_default_chip();
@@ -153,8 +154,9 @@  int __init ima_init(void)
 
 	ima_init_key_queue();
 
-	ima_measure_critical_data("kernel_info", "kernel_version",
-				  UTS_RELEASE, strlen(UTS_RELEASE), false);
+	measure_rc = ima_measure_critical_data("kernel_info", "kernel_version",
+					       UTS_RELEASE, strlen(UTS_RELEASE),
+					       false);
 
 	return rc;
 }
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 8ef1fa357e0c..3386e7436440 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -827,7 +827,7 @@  int ima_post_load_data(char *buf, loff_t size,
 	return 0;
 }
 
-/*
+/**
  * process_buffer_measurement - Measure the buffer or the buffer data hash
  * @mnt_userns:	user namespace of the mount the inode was found from
  * @inode: inode associated with the object being measured (NULL for KEY_CHECK)
@@ -840,12 +840,15 @@  int ima_post_load_data(char *buf, loff_t size,
  * @buf_hash: measure buffer data hash
  *
  * Based on policy, either the buffer data or buffer data hash is measured
+ *
+ * Return: 0 if the buffer has been successfully measured, a negative value
+ * otherwise.
  */
-void process_buffer_measurement(struct user_namespace *mnt_userns,
-				struct inode *inode, const void *buf, int size,
-				const char *eventname, enum ima_hooks func,
-				int pcr, const char *func_data,
-				bool buf_hash)
+int process_buffer_measurement(struct user_namespace *mnt_userns,
+			       struct inode *inode, const void *buf, int size,
+			       const char *eventname, enum ima_hooks func,
+			       int pcr, const char *func_data,
+			       bool buf_hash)
 {
 	int ret = 0;
 	const char *audit_cause = "ENOMEM";
@@ -867,7 +870,7 @@  void process_buffer_measurement(struct user_namespace *mnt_userns,
 	u32 secid;
 
 	if (!ima_policy_flag)
-		return;
+		return -ENOENT;
 
 	template = ima_template_desc_buf();
 	if (!template) {
@@ -889,7 +892,7 @@  void process_buffer_measurement(struct user_namespace *mnt_userns,
 					secid, 0, func, &pcr, &template,
 					func_data);
 		if (!(action & IMA_MEASURE))
-			return;
+			return -ENOENT;
 	}
 
 	if (!pcr)
@@ -937,7 +940,7 @@  void process_buffer_measurement(struct user_namespace *mnt_userns,
 					func_measure_str(func),
 					audit_cause, ret, 0, ret);
 
-	return;
+	return ret;
 }
 
 /**
@@ -951,6 +954,7 @@  void process_buffer_measurement(struct user_namespace *mnt_userns,
 void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
 {
 	struct fd f;
+	int ret __maybe_unused;
 
 	if (!buf || !size)
 		return;
@@ -959,9 +963,10 @@  void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
 	if (!f.file)
 		return;
 
-	process_buffer_measurement(file_mnt_user_ns(f.file), file_inode(f.file),
-				   buf, size, "kexec-cmdline", KEXEC_CMDLINE, 0,
-				   NULL, false);
+	ret = process_buffer_measurement(file_mnt_user_ns(f.file),
+					 file_inode(f.file), buf, size,
+					 "kexec-cmdline", KEXEC_CMDLINE, 0,
+					 NULL, false);
 	fdput(f);
 }
 
@@ -977,18 +982,21 @@  void ima_kexec_cmdline(int kernel_fd, const void *buf, int size)
  * and extend the pcr.  Examples of critical data could be various data
  * structures, policies, and states stored in kernel memory that can
  * impact the integrity of the system.
+ *
+ * Return: 0 if the buffer has been successfully measured, a negative value
+ * otherwise.
  */
-void ima_measure_critical_data(const char *event_label,
-			       const char *event_name,
-			       const void *buf, size_t buf_len,
-			       bool hash)
+int ima_measure_critical_data(const char *event_label,
+			      const char *event_name,
+			      const void *buf, size_t buf_len,
+			      bool hash)
 {
 	if (!event_name || !event_label || !buf || !buf_len)
-		return;
+		return -ENOPARAM;
 
-	process_buffer_measurement(&init_user_ns, NULL, buf, buf_len, event_name,
-				   CRITICAL_DATA, 0, event_label,
-				   hash);
+	return process_buffer_measurement(&init_user_ns, NULL, buf, buf_len,
+					  event_name, CRITICAL_DATA, 0,
+					  event_label, hash);
 }
 
 static int __init init_ima(void)
diff --git a/security/integrity/ima/ima_queue_keys.c b/security/integrity/ima/ima_queue_keys.c
index 979ef6c71f3d..e3047ce64f39 100644
--- a/security/integrity/ima/ima_queue_keys.c
+++ b/security/integrity/ima/ima_queue_keys.c
@@ -134,6 +134,7 @@  void ima_process_queued_keys(void)
 {
 	struct ima_key_entry *entry, *tmp;
 	bool process = false;
+	int ret __maybe_unused;
 
 	if (ima_process_keys)
 		return;
@@ -159,13 +160,13 @@  void ima_process_queued_keys(void)
 
 	list_for_each_entry_safe(entry, tmp, &ima_keys, list) {
 		if (!timer_expired)
-			process_buffer_measurement(&init_user_ns, NULL,
-						   entry->payload,
-						   entry->payload_len,
-						   entry->keyring_name,
-						   KEY_CHECK, 0,
-						   entry->keyring_name,
-						   false);
+			ret = process_buffer_measurement(&init_user_ns, NULL,
+							 entry->payload,
+							 entry->payload_len,
+							 entry->keyring_name,
+							 KEY_CHECK, 0,
+							 entry->keyring_name,
+							 false);
 		list_del(&entry->list);
 		ima_free_key_entry(entry);
 	}
diff --git a/security/selinux/ima.c b/security/selinux/ima.c
index 34d421861bfc..4db9fa211638 100644
--- a/security/selinux/ima.c
+++ b/security/selinux/ima.c
@@ -75,6 +75,7 @@  void selinux_ima_measure_state_locked(struct selinux_state *state)
 	char *state_str = NULL;
 	void *policy = NULL;
 	size_t policy_len;
+	int measure_rc __maybe_unused;
 	int rc = 0;
 
 	WARN_ON(!mutex_is_locked(&state->policy_mutex));
@@ -85,8 +86,9 @@  void selinux_ima_measure_state_locked(struct selinux_state *state)
 		return;
 	}
 
-	ima_measure_critical_data("selinux", "selinux-state",
-				  state_str, strlen(state_str), false);
+	measure_rc = ima_measure_critical_data("selinux", "selinux-state",
+					       state_str, strlen(state_str),
+					       false);
 
 	kfree(state_str);
 
@@ -102,8 +104,8 @@  void selinux_ima_measure_state_locked(struct selinux_state *state)
 		return;
 	}
 
-	ima_measure_critical_data("selinux", "selinux-policy-hash",
-				  policy, policy_len, true);
+	measure_rc = ima_measure_critical_data("selinux", "selinux-policy-hash",
+					       policy, policy_len, true);
 
 	vfree(policy);
 }