]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/commitdiff
ima: Free IMA measurement buffer after kexec syscall
authorLakshmi Ramasubramanian <nramas@linux.microsoft.com>
Thu, 4 Feb 2021 17:49:51 +0000 (09:49 -0800)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Wed, 14 Apr 2021 16:31:28 +0000 (18:31 +0200)
BugLink: https://bugs.launchpad.net/bugs/1918974
[ Upstream commit f31e3386a4e92ba6eda7328cb508462956c94c64 ]

IMA allocates kernel virtual memory to carry forward the measurement
list, from the current kernel to the next kernel on kexec system call,
in ima_add_kexec_buffer() function.  This buffer is not freed before
completing the kexec system call resulting in memory leak.

Add ima_buffer field in "struct kimage" to store the virtual address
of the buffer allocated for the IMA measurement list.
Free the memory allocated for the IMA measurement list in
kimage_file_post_load_cleanup() function.

Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com>
Suggested-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Reviewed-by: Thiago Jung Bauermann <bauerman@linux.ibm.com>
Reviewed-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Fixes: 7b8589cc29e7 ("ima: on soft reboot, save the measurement list")
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Kelsey Skunberg <kelsey.skunberg@canonical.com>
include/linux/kexec.h
kernel/kexec_file.c
security/integrity/ima/ima_kexec.c

index 1776eb2e43a444c3b83ffa08806b6361d4444f17..a1cffce3de8cd70a56c463beda9aa31c02f86bab 100644 (file)
@@ -293,6 +293,11 @@ struct kimage {
        /* Information for loading purgatory */
        struct purgatory_info purgatory_info;
 #endif
+
+#ifdef CONFIG_IMA_KEXEC
+       /* Virtual address of IMA measurement buffer for kexec syscall */
+       void *ima_buffer;
+#endif
 };
 
 /* kexec interface functions */
index 79f252af7dee3b98391fcb1058f3e4463973e941..4e74db89bd23ff52078ec24e4de54bbdc5af7779 100644 (file)
@@ -165,6 +165,11 @@ void kimage_file_post_load_cleanup(struct kimage *image)
        vfree(pi->sechdrs);
        pi->sechdrs = NULL;
 
+#ifdef CONFIG_IMA_KEXEC
+       vfree(image->ima_buffer);
+       image->ima_buffer = NULL;
+#endif /* CONFIG_IMA_KEXEC */
+
        /* See if architecture has anything to cleanup post load */
        arch_kimage_file_post_load_cleanup(image);
 
index 37b1244e3a166954e9966dbeac665080e791879a..955e4b4d09e21bb01bc77033c1ee6f48aad7fac1 100644 (file)
@@ -130,6 +130,8 @@ void ima_add_kexec_buffer(struct kimage *image)
                return;
        }
 
+       image->ima_buffer = kexec_buffer;
+
        pr_debug("kexec measurement buffer for the loaded kernel at 0x%lx.\n",
                 kbuf.mem);
 }