1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Integrity Measurement Architecture 4 * 5 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 6 * 7 * Authors: 8 * Reiner Sailer <sailer@watson.ibm.com> 9 * Serge Hallyn <serue@us.ibm.com> 10 * Kylene Hall <kylene@us.ibm.com> 11 * Mimi Zohar <zohar@us.ibm.com> 12 * 13 * File: ima_main.c 14 * implements the IMA hooks: ima_bprm_check, ima_file_mmap, 15 * and ima_file_check. 16 */ 17 18 #include <linux/module.h> 19 #include <linux/file.h> 20 #include <linux/binfmts.h> 21 #include <linux/kernel_read_file.h> 22 #include <linux/mount.h> 23 #include <linux/mman.h> 24 #include <linux/slab.h> 25 #include <linux/xattr.h> 26 #include <linux/ima.h> 27 #include <linux/iversion.h> 28 #include <linux/fs.h> 29 30 #include "ima.h" 31 32 #ifdef CONFIG_IMA_APPRAISE 33 int ima_appraise = IMA_APPRAISE_ENFORCE; 34 #else 35 int ima_appraise; 36 #endif 37 38 int ima_hash_algo = HASH_ALGO_SHA1; 39 static int hash_setup_done; 40 41 static struct notifier_block ima_lsm_policy_notifier = { 42 .notifier_call = ima_lsm_policy_change, 43 }; 44 45 static int __init hash_setup(char *str) 46 { 47 struct ima_template_desc *template_desc = ima_template_desc_current(); 48 int i; 49 50 if (hash_setup_done) 51 return 1; 52 53 if (strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) == 0) { 54 if (strncmp(str, "sha1", 4) == 0) 55 ima_hash_algo = HASH_ALGO_SHA1; 56 else if (strncmp(str, "md5", 3) == 0) 57 ima_hash_algo = HASH_ALGO_MD5; 58 else 59 return 1; 60 goto out; 61 } 62 63 i = match_string(hash_algo_name, HASH_ALGO__LAST, str); 64 if (i < 0) 65 return 1; 66 67 ima_hash_algo = i; 68 out: 69 hash_setup_done = 1; 70 return 1; 71 } 72 __setup("ima_hash=", hash_setup); 73 74 /* Prevent mmap'ing a file execute that is already mmap'ed write */ 75 static int mmap_violation_check(enum ima_hooks func, struct file *file, 76 char **pathbuf, const char **pathname, 77 char *filename) 78 { 79 struct inode *inode; 80 int rc = 0; 81 82 if ((func == MMAP_CHECK) && mapping_writably_mapped(file->f_mapping)) { 83 rc = -ETXTBSY; 84 inode = file_inode(file); 85 86 if (!*pathbuf) /* ima_rdwr_violation possibly pre-fetched */ 87 *pathname = ima_d_path(&file->f_path, pathbuf, 88 filename); 89 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, *pathname, 90 "mmap_file", "mmapped_writers", rc, 0); 91 } 92 return rc; 93 } 94 95 /* 96 * ima_rdwr_violation_check 97 * 98 * Only invalidate the PCR for measured files: 99 * - Opening a file for write when already open for read, 100 * results in a time of measure, time of use (ToMToU) error. 101 * - Opening a file for read when already open for write, 102 * could result in a file measurement error. 103 * 104 */ 105 static void ima_rdwr_violation_check(struct file *file, 106 struct integrity_iint_cache *iint, 107 int must_measure, 108 char **pathbuf, 109 const char **pathname, 110 char *filename) 111 { 112 struct inode *inode = file_inode(file); 113 fmode_t mode = file->f_mode; 114 bool send_tomtou = false, send_writers = false; 115 116 if (mode & FMODE_WRITE) { 117 if (atomic_read(&inode->i_readcount) && IS_IMA(inode)) { 118 if (!iint) 119 iint = integrity_iint_find(inode); 120 /* IMA_MEASURE is set from reader side */ 121 if (iint && test_bit(IMA_MUST_MEASURE, 122 &iint->atomic_flags)) 123 send_tomtou = true; 124 } 125 } else { 126 if (must_measure) 127 set_bit(IMA_MUST_MEASURE, &iint->atomic_flags); 128 if (inode_is_open_for_write(inode) && must_measure) 129 send_writers = true; 130 } 131 132 if (!send_tomtou && !send_writers) 133 return; 134 135 *pathname = ima_d_path(&file->f_path, pathbuf, filename); 136 137 if (send_tomtou) 138 ima_add_violation(file, *pathname, iint, 139 "invalid_pcr", "ToMToU"); 140 if (send_writers) 141 ima_add_violation(file, *pathname, iint, 142 "invalid_pcr", "open_writers"); 143 } 144 145 static void ima_check_last_writer(struct integrity_iint_cache *iint, 146 struct inode *inode, struct file *file) 147 { 148 fmode_t mode = file->f_mode; 149 bool update; 150 151 if (!(mode & FMODE_WRITE)) 152 return; 153 154 mutex_lock(&iint->mutex); 155 if (atomic_read(&inode->i_writecount) == 1) { 156 update = test_and_clear_bit(IMA_UPDATE_XATTR, 157 &iint->atomic_flags); 158 if (!IS_I_VERSION(inode) || 159 !inode_eq_iversion(inode, iint->version) || 160 (iint->flags & IMA_NEW_FILE)) { 161 iint->flags &= ~(IMA_DONE_MASK | IMA_NEW_FILE); 162 iint->measured_pcrs = 0; 163 if (update) 164 ima_update_xattr(iint, file); 165 } 166 } 167 mutex_unlock(&iint->mutex); 168 } 169 170 /** 171 * ima_file_free - called on __fput() 172 * @file: pointer to file structure being freed 173 * 174 * Flag files that changed, based on i_version 175 */ 176 void ima_file_free(struct file *file) 177 { 178 struct inode *inode = file_inode(file); 179 struct integrity_iint_cache *iint; 180 181 if (!ima_policy_flag || !S_ISREG(inode->i_mode)) 182 return; 183 184 iint = integrity_iint_find(inode); 185 if (!iint) 186 return; 187 188 ima_check_last_writer(iint, inode, file); 189 } 190 191 static int process_measurement(struct file *file, const struct cred *cred, 192 u32 secid, char *buf, loff_t size, int mask, 193 enum ima_hooks func) 194 { 195 struct inode *inode = file_inode(file); 196 struct integrity_iint_cache *iint = NULL; 197 struct ima_template_desc *template_desc = NULL; 198 char *pathbuf = NULL; 199 char filename[NAME_MAX]; 200 const char *pathname = NULL; 201 int rc = 0, action, must_appraise = 0; 202 int pcr = CONFIG_IMA_MEASURE_PCR_IDX; 203 struct evm_ima_xattr_data *xattr_value = NULL; 204 struct modsig *modsig = NULL; 205 int xattr_len = 0; 206 bool violation_check; 207 enum hash_algo hash_algo; 208 209 if (!ima_policy_flag || !S_ISREG(inode->i_mode)) 210 return 0; 211 212 /* Return an IMA_MEASURE, IMA_APPRAISE, IMA_AUDIT action 213 * bitmask based on the appraise/audit/measurement policy. 214 * Included is the appraise submask. 215 */ 216 action = ima_get_action(inode, cred, secid, mask, func, &pcr, 217 &template_desc, NULL); 218 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK) && 219 (ima_policy_flag & IMA_MEASURE)); 220 if (!action && !violation_check) 221 return 0; 222 223 must_appraise = action & IMA_APPRAISE; 224 225 /* Is the appraise rule hook specific? */ 226 if (action & IMA_FILE_APPRAISE) 227 func = FILE_CHECK; 228 229 inode_lock(inode); 230 231 if (action) { 232 iint = integrity_inode_get(inode); 233 if (!iint) 234 rc = -ENOMEM; 235 } 236 237 if (!rc && violation_check) 238 ima_rdwr_violation_check(file, iint, action & IMA_MEASURE, 239 &pathbuf, &pathname, filename); 240 241 inode_unlock(inode); 242 243 if (rc) 244 goto out; 245 if (!action) 246 goto out; 247 248 mutex_lock(&iint->mutex); 249 250 if (test_and_clear_bit(IMA_CHANGE_ATTR, &iint->atomic_flags)) 251 /* reset appraisal flags if ima_inode_post_setattr was called */ 252 iint->flags &= ~(IMA_APPRAISE | IMA_APPRAISED | 253 IMA_APPRAISE_SUBMASK | IMA_APPRAISED_SUBMASK | 254 IMA_ACTION_FLAGS); 255 256 /* 257 * Re-evaulate the file if either the xattr has changed or the 258 * kernel has no way of detecting file change on the filesystem. 259 * (Limited to privileged mounted filesystems.) 260 */ 261 if (test_and_clear_bit(IMA_CHANGE_XATTR, &iint->atomic_flags) || 262 ((inode->i_sb->s_iflags & SB_I_IMA_UNVERIFIABLE_SIGNATURE) && 263 !(inode->i_sb->s_iflags & SB_I_UNTRUSTED_MOUNTER) && 264 !(action & IMA_FAIL_UNVERIFIABLE_SIGS))) { 265 iint->flags &= ~IMA_DONE_MASK; 266 iint->measured_pcrs = 0; 267 } 268 269 /* Determine if already appraised/measured based on bitmask 270 * (IMA_MEASURE, IMA_MEASURED, IMA_XXXX_APPRAISE, IMA_XXXX_APPRAISED, 271 * IMA_AUDIT, IMA_AUDITED) 272 */ 273 iint->flags |= action; 274 action &= IMA_DO_MASK; 275 action &= ~((iint->flags & (IMA_DONE_MASK ^ IMA_MEASURED)) >> 1); 276 277 /* If target pcr is already measured, unset IMA_MEASURE action */ 278 if ((action & IMA_MEASURE) && (iint->measured_pcrs & (0x1 << pcr))) 279 action ^= IMA_MEASURE; 280 281 /* HASH sets the digital signature and update flags, nothing else */ 282 if ((action & IMA_HASH) && 283 !(test_bit(IMA_DIGSIG, &iint->atomic_flags))) { 284 xattr_len = ima_read_xattr(file_dentry(file), &xattr_value); 285 if ((xattr_value && xattr_len > 2) && 286 (xattr_value->type == EVM_IMA_XATTR_DIGSIG)) 287 set_bit(IMA_DIGSIG, &iint->atomic_flags); 288 iint->flags |= IMA_HASHED; 289 action ^= IMA_HASH; 290 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 291 } 292 293 /* Nothing to do, just return existing appraised status */ 294 if (!action) { 295 if (must_appraise) { 296 rc = mmap_violation_check(func, file, &pathbuf, 297 &pathname, filename); 298 if (!rc) 299 rc = ima_get_cache_status(iint, func); 300 } 301 goto out_locked; 302 } 303 304 if ((action & IMA_APPRAISE_SUBMASK) || 305 strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) != 0) { 306 /* read 'security.ima' */ 307 xattr_len = ima_read_xattr(file_dentry(file), &xattr_value); 308 309 /* 310 * Read the appended modsig if allowed by the policy, and allow 311 * an additional measurement list entry, if needed, based on the 312 * template format and whether the file was already measured. 313 */ 314 if (iint->flags & IMA_MODSIG_ALLOWED) { 315 rc = ima_read_modsig(func, buf, size, &modsig); 316 317 if (!rc && ima_template_has_modsig(template_desc) && 318 iint->flags & IMA_MEASURED) 319 action |= IMA_MEASURE; 320 } 321 } 322 323 hash_algo = ima_get_hash_algo(xattr_value, xattr_len); 324 325 rc = ima_collect_measurement(iint, file, buf, size, hash_algo, modsig); 326 if (rc != 0 && rc != -EBADF && rc != -EINVAL) 327 goto out_locked; 328 329 if (!pathbuf) /* ima_rdwr_violation possibly pre-fetched */ 330 pathname = ima_d_path(&file->f_path, &pathbuf, filename); 331 332 if (action & IMA_MEASURE) 333 ima_store_measurement(iint, file, pathname, 334 xattr_value, xattr_len, modsig, pcr, 335 template_desc); 336 if (rc == 0 && (action & IMA_APPRAISE_SUBMASK)) { 337 rc = ima_check_blacklist(iint, modsig, pcr); 338 if (rc != -EPERM) { 339 inode_lock(inode); 340 rc = ima_appraise_measurement(func, iint, file, 341 pathname, xattr_value, 342 xattr_len, modsig); 343 inode_unlock(inode); 344 } 345 if (!rc) 346 rc = mmap_violation_check(func, file, &pathbuf, 347 &pathname, filename); 348 } 349 if (action & IMA_AUDIT) 350 ima_audit_measurement(iint, pathname); 351 352 if ((file->f_flags & O_DIRECT) && (iint->flags & IMA_PERMIT_DIRECTIO)) 353 rc = 0; 354 out_locked: 355 if ((mask & MAY_WRITE) && test_bit(IMA_DIGSIG, &iint->atomic_flags) && 356 !(iint->flags & IMA_NEW_FILE)) 357 rc = -EACCES; 358 mutex_unlock(&iint->mutex); 359 kfree(xattr_value); 360 ima_free_modsig(modsig); 361 out: 362 if (pathbuf) 363 __putname(pathbuf); 364 if (must_appraise) { 365 if (rc && (ima_appraise & IMA_APPRAISE_ENFORCE)) 366 return -EACCES; 367 if (file->f_mode & FMODE_WRITE) 368 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 369 } 370 return 0; 371 } 372 373 /** 374 * ima_file_mmap - based on policy, collect/store measurement. 375 * @file: pointer to the file to be measured (May be NULL) 376 * @prot: contains the protection that will be applied by the kernel. 377 * 378 * Measure files being mmapped executable based on the ima_must_measure() 379 * policy decision. 380 * 381 * On success return 0. On integrity appraisal error, assuming the file 382 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 383 */ 384 int ima_file_mmap(struct file *file, unsigned long prot) 385 { 386 u32 secid; 387 388 if (file && (prot & PROT_EXEC)) { 389 security_task_getsecid(current, &secid); 390 return process_measurement(file, current_cred(), secid, NULL, 391 0, MAY_EXEC, MMAP_CHECK); 392 } 393 394 return 0; 395 } 396 397 /** 398 * ima_file_mprotect - based on policy, limit mprotect change 399 * @prot: contains the protection that will be applied by the kernel. 400 * 401 * Files can be mmap'ed read/write and later changed to execute to circumvent 402 * IMA's mmap appraisal policy rules. Due to locking issues (mmap semaphore 403 * would be taken before i_mutex), files can not be measured or appraised at 404 * this point. Eliminate this integrity gap by denying the mprotect 405 * PROT_EXECUTE change, if an mmap appraise policy rule exists. 406 * 407 * On mprotect change success, return 0. On failure, return -EACESS. 408 */ 409 int ima_file_mprotect(struct vm_area_struct *vma, unsigned long prot) 410 { 411 struct ima_template_desc *template; 412 struct file *file = vma->vm_file; 413 char filename[NAME_MAX]; 414 char *pathbuf = NULL; 415 const char *pathname = NULL; 416 struct inode *inode; 417 int result = 0; 418 int action; 419 u32 secid; 420 int pcr; 421 422 /* Is mprotect making an mmap'ed file executable? */ 423 if (!(ima_policy_flag & IMA_APPRAISE) || !vma->vm_file || 424 !(prot & PROT_EXEC) || (vma->vm_flags & VM_EXEC)) 425 return 0; 426 427 security_task_getsecid(current, &secid); 428 inode = file_inode(vma->vm_file); 429 action = ima_get_action(inode, current_cred(), secid, MAY_EXEC, 430 MMAP_CHECK, &pcr, &template, 0); 431 432 /* Is the mmap'ed file in policy? */ 433 if (!(action & (IMA_MEASURE | IMA_APPRAISE_SUBMASK))) 434 return 0; 435 436 if (action & IMA_APPRAISE_SUBMASK) 437 result = -EPERM; 438 439 file = vma->vm_file; 440 pathname = ima_d_path(&file->f_path, &pathbuf, filename); 441 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, pathname, 442 "collect_data", "failed-mprotect", result, 0); 443 if (pathbuf) 444 __putname(pathbuf); 445 446 return result; 447 } 448 449 /** 450 * ima_bprm_check - based on policy, collect/store measurement. 451 * @bprm: contains the linux_binprm structure 452 * 453 * The OS protects against an executable file, already open for write, 454 * from being executed in deny_write_access() and an executable file, 455 * already open for execute, from being modified in get_write_access(). 456 * So we can be certain that what we verify and measure here is actually 457 * what is being executed. 458 * 459 * On success return 0. On integrity appraisal error, assuming the file 460 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 461 */ 462 int ima_bprm_check(struct linux_binprm *bprm) 463 { 464 int ret; 465 u32 secid; 466 467 security_task_getsecid(current, &secid); 468 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, 469 MAY_EXEC, BPRM_CHECK); 470 if (ret) 471 return ret; 472 473 security_cred_getsecid(bprm->cred, &secid); 474 return process_measurement(bprm->file, bprm->cred, secid, NULL, 0, 475 MAY_EXEC, CREDS_CHECK); 476 } 477 478 /** 479 * ima_path_check - based on policy, collect/store measurement. 480 * @file: pointer to the file to be measured 481 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 482 * 483 * Measure files based on the ima_must_measure() policy decision. 484 * 485 * On success return 0. On integrity appraisal error, assuming the file 486 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 487 */ 488 int ima_file_check(struct file *file, int mask) 489 { 490 u32 secid; 491 492 security_task_getsecid(current, &secid); 493 return process_measurement(file, current_cred(), secid, NULL, 0, 494 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | 495 MAY_APPEND), FILE_CHECK); 496 } 497 EXPORT_SYMBOL_GPL(ima_file_check); 498 499 /** 500 * ima_file_hash - return the stored measurement if a file has been hashed and 501 * is in the iint cache. 502 * @file: pointer to the file 503 * @buf: buffer in which to store the hash 504 * @buf_size: length of the buffer 505 * 506 * On success, return the hash algorithm (as defined in the enum hash_algo). 507 * If buf is not NULL, this function also outputs the hash into buf. 508 * If the hash is larger than buf_size, then only buf_size bytes will be copied. 509 * It generally just makes sense to pass a buffer capable of holding the largest 510 * possible hash: IMA_MAX_DIGEST_SIZE. 511 * The file hash returned is based on the entire file, including the appended 512 * signature. 513 * 514 * If IMA is disabled or if no measurement is available, return -EOPNOTSUPP. 515 * If the parameters are incorrect, return -EINVAL. 516 */ 517 int ima_file_hash(struct file *file, char *buf, size_t buf_size) 518 { 519 struct inode *inode; 520 struct integrity_iint_cache *iint; 521 int hash_algo; 522 523 if (!file) 524 return -EINVAL; 525 526 if (!ima_policy_flag) 527 return -EOPNOTSUPP; 528 529 inode = file_inode(file); 530 iint = integrity_iint_find(inode); 531 if (!iint) 532 return -EOPNOTSUPP; 533 534 mutex_lock(&iint->mutex); 535 if (buf) { 536 size_t copied_size; 537 538 copied_size = min_t(size_t, iint->ima_hash->length, buf_size); 539 memcpy(buf, iint->ima_hash->digest, copied_size); 540 } 541 hash_algo = iint->ima_hash->algo; 542 mutex_unlock(&iint->mutex); 543 544 return hash_algo; 545 } 546 EXPORT_SYMBOL_GPL(ima_file_hash); 547 548 /** 549 * ima_post_create_tmpfile - mark newly created tmpfile as new 550 * @file : newly created tmpfile 551 * 552 * No measuring, appraising or auditing of newly created tmpfiles is needed. 553 * Skip calling process_measurement(), but indicate which newly, created 554 * tmpfiles are in policy. 555 */ 556 void ima_post_create_tmpfile(struct inode *inode) 557 { 558 struct integrity_iint_cache *iint; 559 int must_appraise; 560 561 must_appraise = ima_must_appraise(inode, MAY_ACCESS, FILE_CHECK); 562 if (!must_appraise) 563 return; 564 565 /* Nothing to do if we can't allocate memory */ 566 iint = integrity_inode_get(inode); 567 if (!iint) 568 return; 569 570 /* needed for writing the security xattrs */ 571 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 572 iint->ima_file_status = INTEGRITY_PASS; 573 } 574 575 /** 576 * ima_post_path_mknod - mark as a new inode 577 * @dentry: newly created dentry 578 * 579 * Mark files created via the mknodat syscall as new, so that the 580 * file data can be written later. 581 */ 582 void ima_post_path_mknod(struct dentry *dentry) 583 { 584 struct integrity_iint_cache *iint; 585 struct inode *inode = dentry->d_inode; 586 int must_appraise; 587 588 must_appraise = ima_must_appraise(inode, MAY_ACCESS, FILE_CHECK); 589 if (!must_appraise) 590 return; 591 592 /* Nothing to do if we can't allocate memory */ 593 iint = integrity_inode_get(inode); 594 if (!iint) 595 return; 596 597 /* needed for re-opening empty files */ 598 iint->flags |= IMA_NEW_FILE; 599 } 600 601 /** 602 * ima_read_file - pre-measure/appraise hook decision based on policy 603 * @file: pointer to the file to be measured/appraised/audit 604 * @read_id: caller identifier 605 * @contents: whether a subsequent call will be made to ima_post_read_file() 606 * 607 * Permit reading a file based on policy. The policy rules are written 608 * in terms of the policy identifier. Appraising the integrity of 609 * a file requires a file descriptor. 610 * 611 * For permission return 0, otherwise return -EACCES. 612 */ 613 int ima_read_file(struct file *file, enum kernel_read_file_id read_id, 614 bool contents) 615 { 616 enum ima_hooks func; 617 u32 secid; 618 619 /* 620 * Do devices using pre-allocated memory run the risk of the 621 * firmware being accessible to the device prior to the completion 622 * of IMA's signature verification any more than when using two 623 * buffers? It may be desirable to include the buffer address 624 * in this API and walk all the dma_map_single() mappings to check. 625 */ 626 627 /* 628 * There will be a call made to ima_post_read_file() with 629 * a filled buffer, so we don't need to perform an extra 630 * read early here. 631 */ 632 if (contents) 633 return 0; 634 635 /* Read entire file for all partial reads. */ 636 func = read_idmap[read_id] ?: FILE_CHECK; 637 security_task_getsecid(current, &secid); 638 return process_measurement(file, current_cred(), secid, NULL, 639 0, MAY_READ, func); 640 } 641 642 const int read_idmap[READING_MAX_ID] = { 643 [READING_FIRMWARE] = FIRMWARE_CHECK, 644 [READING_MODULE] = MODULE_CHECK, 645 [READING_KEXEC_IMAGE] = KEXEC_KERNEL_CHECK, 646 [READING_KEXEC_INITRAMFS] = KEXEC_INITRAMFS_CHECK, 647 [READING_POLICY] = POLICY_CHECK 648 }; 649 650 /** 651 * ima_post_read_file - in memory collect/appraise/audit measurement 652 * @file: pointer to the file to be measured/appraised/audit 653 * @buf: pointer to in memory file contents 654 * @size: size of in memory file contents 655 * @read_id: caller identifier 656 * 657 * Measure/appraise/audit in memory file based on policy. Policy rules 658 * are written in terms of a policy identifier. 659 * 660 * On success return 0. On integrity appraisal error, assuming the file 661 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 662 */ 663 int ima_post_read_file(struct file *file, void *buf, loff_t size, 664 enum kernel_read_file_id read_id) 665 { 666 enum ima_hooks func; 667 u32 secid; 668 669 /* permit signed certs */ 670 if (!file && read_id == READING_X509_CERTIFICATE) 671 return 0; 672 673 if (!file || !buf || size == 0) { /* should never happen */ 674 if (ima_appraise & IMA_APPRAISE_ENFORCE) 675 return -EACCES; 676 return 0; 677 } 678 679 func = read_idmap[read_id] ?: FILE_CHECK; 680 security_task_getsecid(current, &secid); 681 return process_measurement(file, current_cred(), secid, buf, size, 682 MAY_READ, func); 683 } 684 685 /** 686 * ima_load_data - appraise decision based on policy 687 * @id: kernel load data caller identifier 688 * @contents: whether the full contents will be available in a later 689 * call to ima_post_load_data(). 690 * 691 * Callers of this LSM hook can not measure, appraise, or audit the 692 * data provided by userspace. Enforce policy rules requring a file 693 * signature (eg. kexec'ed kernel image). 694 * 695 * For permission return 0, otherwise return -EACCES. 696 */ 697 int ima_load_data(enum kernel_load_data_id id, bool contents) 698 { 699 bool ima_enforce, sig_enforce; 700 701 ima_enforce = 702 (ima_appraise & IMA_APPRAISE_ENFORCE) == IMA_APPRAISE_ENFORCE; 703 704 switch (id) { 705 case LOADING_KEXEC_IMAGE: 706 if (IS_ENABLED(CONFIG_KEXEC_SIG) 707 && arch_ima_get_secureboot()) { 708 pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n"); 709 return -EACCES; 710 } 711 712 if (ima_enforce && (ima_appraise & IMA_APPRAISE_KEXEC)) { 713 pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n"); 714 return -EACCES; /* INTEGRITY_UNKNOWN */ 715 } 716 break; 717 case LOADING_FIRMWARE: 718 if (ima_enforce && (ima_appraise & IMA_APPRAISE_FIRMWARE) && !contents) { 719 pr_err("Prevent firmware sysfs fallback loading.\n"); 720 return -EACCES; /* INTEGRITY_UNKNOWN */ 721 } 722 break; 723 case LOADING_MODULE: 724 sig_enforce = is_module_sig_enforced(); 725 726 if (ima_enforce && (!sig_enforce 727 && (ima_appraise & IMA_APPRAISE_MODULES))) { 728 pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); 729 return -EACCES; /* INTEGRITY_UNKNOWN */ 730 } 731 default: 732 break; 733 } 734 return 0; 735 } 736 737 /** 738 * ima_post_load_data - appraise decision based on policy 739 * @buf: pointer to in memory file contents 740 * @size: size of in memory file contents 741 * @id: kernel load data caller identifier 742 * @description: @id-specific description of contents 743 * 744 * Measure/appraise/audit in memory buffer based on policy. Policy rules 745 * are written in terms of a policy identifier. 746 * 747 * On success return 0. On integrity appraisal error, assuming the file 748 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 749 */ 750 int ima_post_load_data(char *buf, loff_t size, 751 enum kernel_load_data_id load_id, 752 char *description) 753 { 754 if (load_id == LOADING_FIRMWARE) { 755 if ((ima_appraise & IMA_APPRAISE_FIRMWARE) && 756 (ima_appraise & IMA_APPRAISE_ENFORCE)) { 757 pr_err("Prevent firmware loading_store.\n"); 758 return -EACCES; /* INTEGRITY_UNKNOWN */ 759 } 760 return 0; 761 } 762 763 return 0; 764 } 765 766 /* 767 * process_buffer_measurement - Measure the buffer to ima log. 768 * @inode: inode associated with the object being measured (NULL for KEY_CHECK) 769 * @buf: pointer to the buffer that needs to be added to the log. 770 * @size: size of buffer(in bytes). 771 * @eventname: event name to be used for the buffer entry. 772 * @func: IMA hook 773 * @pcr: pcr to extend the measurement 774 * @keyring: keyring name to determine the action to be performed 775 * 776 * Based on policy, the buffer is measured into the ima log. 777 */ 778 void process_buffer_measurement(struct inode *inode, const void *buf, int size, 779 const char *eventname, enum ima_hooks func, 780 int pcr, const char *keyring) 781 { 782 int ret = 0; 783 const char *audit_cause = "ENOMEM"; 784 struct ima_template_entry *entry = NULL; 785 struct integrity_iint_cache iint = {}; 786 struct ima_event_data event_data = {.iint = &iint, 787 .filename = eventname, 788 .buf = buf, 789 .buf_len = size}; 790 struct ima_template_desc *template = NULL; 791 struct { 792 struct ima_digest_data hdr; 793 char digest[IMA_MAX_DIGEST_SIZE]; 794 } hash = {}; 795 int violation = 0; 796 int action = 0; 797 u32 secid; 798 799 if (!ima_policy_flag) 800 return; 801 802 /* 803 * Both LSM hooks and auxilary based buffer measurements are 804 * based on policy. To avoid code duplication, differentiate 805 * between the LSM hooks and auxilary buffer measurements, 806 * retrieving the policy rule information only for the LSM hook 807 * buffer measurements. 808 */ 809 if (func) { 810 security_task_getsecid(current, &secid); 811 action = ima_get_action(inode, current_cred(), secid, 0, func, 812 &pcr, &template, keyring); 813 if (!(action & IMA_MEASURE)) 814 return; 815 } 816 817 if (!pcr) 818 pcr = CONFIG_IMA_MEASURE_PCR_IDX; 819 820 if (!template) { 821 template = lookup_template_desc("ima-buf"); 822 ret = template_desc_init_fields(template->fmt, 823 &(template->fields), 824 &(template->num_fields)); 825 if (ret < 0) { 826 pr_err("template %s init failed, result: %d\n", 827 (strlen(template->name) ? 828 template->name : template->fmt), ret); 829 return; 830 } 831 } 832 833 iint.ima_hash = &hash.hdr; 834 iint.ima_hash->algo = ima_hash_algo; 835 iint.ima_hash->length = hash_digest_size[ima_hash_algo]; 836 837 ret = ima_calc_buffer_hash(buf, size, iint.ima_hash); 838 if (ret < 0) { 839 audit_cause = "hashing_error"; 840 goto out; 841 } 842 843 ret = ima_alloc_init_template(&event_data, &entry, template); 844 if (ret < 0) { 845 audit_cause = "alloc_entry"; 846 goto out; 847 } 848 849 ret = ima_store_template(entry, violation, NULL, buf, pcr); 850 if (ret < 0) { 851 audit_cause = "store_entry"; 852 ima_free_template_entry(entry); 853 } 854 855 out: 856 if (ret < 0) 857 integrity_audit_message(AUDIT_INTEGRITY_PCR, NULL, eventname, 858 func_measure_str(func), 859 audit_cause, ret, 0, ret); 860 861 return; 862 } 863 864 /** 865 * ima_kexec_cmdline - measure kexec cmdline boot args 866 * @kernel_fd: file descriptor of the kexec kernel being loaded 867 * @buf: pointer to buffer 868 * @size: size of buffer 869 * 870 * Buffers can only be measured, not appraised. 871 */ 872 void ima_kexec_cmdline(int kernel_fd, const void *buf, int size) 873 { 874 struct fd f; 875 876 if (!buf || !size) 877 return; 878 879 f = fdget(kernel_fd); 880 if (!f.file) 881 return; 882 883 process_buffer_measurement(file_inode(f.file), buf, size, 884 "kexec-cmdline", KEXEC_CMDLINE, 0, NULL); 885 fdput(f); 886 } 887 888 static int __init init_ima(void) 889 { 890 int error; 891 892 ima_init_template_list(); 893 hash_setup(CONFIG_IMA_DEFAULT_HASH); 894 error = ima_init(); 895 896 if (error && strcmp(hash_algo_name[ima_hash_algo], 897 CONFIG_IMA_DEFAULT_HASH) != 0) { 898 pr_info("Allocating %s failed, going to use default hash algorithm %s\n", 899 hash_algo_name[ima_hash_algo], CONFIG_IMA_DEFAULT_HASH); 900 hash_setup_done = 0; 901 hash_setup(CONFIG_IMA_DEFAULT_HASH); 902 error = ima_init(); 903 } 904 905 if (error) 906 return error; 907 908 error = register_blocking_lsm_notifier(&ima_lsm_policy_notifier); 909 if (error) 910 pr_warn("Couldn't register LSM notifier, error %d\n", error); 911 912 if (!error) 913 ima_update_policy_flag(); 914 915 return error; 916 } 917 918 late_initcall(init_ima); /* Start IMA after the TPM is available */ 919