1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Integrity Measurement Architecture 4 * 5 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 6 * 7 * Authors: 8 * Reiner Sailer <sailer@watson.ibm.com> 9 * Serge Hallyn <serue@us.ibm.com> 10 * Kylene Hall <kylene@us.ibm.com> 11 * Mimi Zohar <zohar@us.ibm.com> 12 * 13 * File: ima_main.c 14 * implements the IMA hooks: ima_bprm_check, ima_file_mmap, 15 * and ima_file_check. 16 */ 17 18 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 19 20 #include <linux/module.h> 21 #include <linux/file.h> 22 #include <linux/binfmts.h> 23 #include <linux/mount.h> 24 #include <linux/mman.h> 25 #include <linux/slab.h> 26 #include <linux/xattr.h> 27 #include <linux/ima.h> 28 #include <linux/iversion.h> 29 #include <linux/fs.h> 30 31 #include "ima.h" 32 33 #ifdef CONFIG_IMA_APPRAISE 34 int ima_appraise = IMA_APPRAISE_ENFORCE; 35 #else 36 int ima_appraise; 37 #endif 38 39 int ima_hash_algo = HASH_ALGO_SHA1; 40 static int hash_setup_done; 41 42 static struct notifier_block ima_lsm_policy_notifier = { 43 .notifier_call = ima_lsm_policy_change, 44 }; 45 46 static int __init hash_setup(char *str) 47 { 48 struct ima_template_desc *template_desc = ima_template_desc_current(); 49 int i; 50 51 if (hash_setup_done) 52 return 1; 53 54 if (strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) == 0) { 55 if (strncmp(str, "sha1", 4) == 0) 56 ima_hash_algo = HASH_ALGO_SHA1; 57 else if (strncmp(str, "md5", 3) == 0) 58 ima_hash_algo = HASH_ALGO_MD5; 59 else 60 return 1; 61 goto out; 62 } 63 64 i = match_string(hash_algo_name, HASH_ALGO__LAST, str); 65 if (i < 0) 66 return 1; 67 68 ima_hash_algo = i; 69 out: 70 hash_setup_done = 1; 71 return 1; 72 } 73 __setup("ima_hash=", hash_setup); 74 75 /* Prevent mmap'ing a file execute that is already mmap'ed write */ 76 static int mmap_violation_check(enum ima_hooks func, struct file *file, 77 char **pathbuf, const char **pathname, 78 char *filename) 79 { 80 struct inode *inode; 81 int rc = 0; 82 83 if ((func == MMAP_CHECK) && mapping_writably_mapped(file->f_mapping)) { 84 rc = -ETXTBSY; 85 inode = file_inode(file); 86 87 if (!*pathbuf) /* ima_rdwr_violation possibly pre-fetched */ 88 *pathname = ima_d_path(&file->f_path, pathbuf, 89 filename); 90 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, *pathname, 91 "mmap_file", "mmapped_writers", rc, 0); 92 } 93 return rc; 94 } 95 96 /* 97 * ima_rdwr_violation_check 98 * 99 * Only invalidate the PCR for measured files: 100 * - Opening a file for write when already open for read, 101 * results in a time of measure, time of use (ToMToU) error. 102 * - Opening a file for read when already open for write, 103 * could result in a file measurement error. 104 * 105 */ 106 static void ima_rdwr_violation_check(struct file *file, 107 struct integrity_iint_cache *iint, 108 int must_measure, 109 char **pathbuf, 110 const char **pathname, 111 char *filename) 112 { 113 struct inode *inode = file_inode(file); 114 fmode_t mode = file->f_mode; 115 bool send_tomtou = false, send_writers = false; 116 117 if (mode & FMODE_WRITE) { 118 if (atomic_read(&inode->i_readcount) && IS_IMA(inode)) { 119 if (!iint) 120 iint = integrity_iint_find(inode); 121 /* IMA_MEASURE is set from reader side */ 122 if (iint && test_bit(IMA_MUST_MEASURE, 123 &iint->atomic_flags)) 124 send_tomtou = true; 125 } 126 } else { 127 if (must_measure) 128 set_bit(IMA_MUST_MEASURE, &iint->atomic_flags); 129 if (inode_is_open_for_write(inode) && must_measure) 130 send_writers = true; 131 } 132 133 if (!send_tomtou && !send_writers) 134 return; 135 136 *pathname = ima_d_path(&file->f_path, pathbuf, filename); 137 138 if (send_tomtou) 139 ima_add_violation(file, *pathname, iint, 140 "invalid_pcr", "ToMToU"); 141 if (send_writers) 142 ima_add_violation(file, *pathname, iint, 143 "invalid_pcr", "open_writers"); 144 } 145 146 static void ima_check_last_writer(struct integrity_iint_cache *iint, 147 struct inode *inode, struct file *file) 148 { 149 fmode_t mode = file->f_mode; 150 bool update; 151 152 if (!(mode & FMODE_WRITE)) 153 return; 154 155 mutex_lock(&iint->mutex); 156 if (atomic_read(&inode->i_writecount) == 1) { 157 update = test_and_clear_bit(IMA_UPDATE_XATTR, 158 &iint->atomic_flags); 159 if (!IS_I_VERSION(inode) || 160 !inode_eq_iversion(inode, iint->version) || 161 (iint->flags & IMA_NEW_FILE)) { 162 iint->flags &= ~(IMA_DONE_MASK | IMA_NEW_FILE); 163 iint->measured_pcrs = 0; 164 if (update) 165 ima_update_xattr(iint, file); 166 } 167 } 168 mutex_unlock(&iint->mutex); 169 } 170 171 /** 172 * ima_file_free - called on __fput() 173 * @file: pointer to file structure being freed 174 * 175 * Flag files that changed, based on i_version 176 */ 177 void ima_file_free(struct file *file) 178 { 179 struct inode *inode = file_inode(file); 180 struct integrity_iint_cache *iint; 181 182 if (!ima_policy_flag || !S_ISREG(inode->i_mode)) 183 return; 184 185 iint = integrity_iint_find(inode); 186 if (!iint) 187 return; 188 189 ima_check_last_writer(iint, inode, file); 190 } 191 192 static int process_measurement(struct file *file, const struct cred *cred, 193 u32 secid, char *buf, loff_t size, int mask, 194 enum ima_hooks func) 195 { 196 struct inode *inode = file_inode(file); 197 struct integrity_iint_cache *iint = NULL; 198 struct ima_template_desc *template_desc = NULL; 199 char *pathbuf = NULL; 200 char filename[NAME_MAX]; 201 const char *pathname = NULL; 202 int rc = 0, action, must_appraise = 0; 203 int pcr = CONFIG_IMA_MEASURE_PCR_IDX; 204 struct evm_ima_xattr_data *xattr_value = NULL; 205 struct modsig *modsig = NULL; 206 int xattr_len = 0; 207 bool violation_check; 208 enum hash_algo hash_algo; 209 210 if (!ima_policy_flag || !S_ISREG(inode->i_mode)) 211 return 0; 212 213 /* Return an IMA_MEASURE, IMA_APPRAISE, IMA_AUDIT action 214 * bitmask based on the appraise/audit/measurement policy. 215 * Included is the appraise submask. 216 */ 217 action = ima_get_action(inode, cred, secid, mask, func, &pcr, 218 &template_desc, NULL); 219 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK) && 220 (ima_policy_flag & IMA_MEASURE)); 221 if (!action && !violation_check) 222 return 0; 223 224 must_appraise = action & IMA_APPRAISE; 225 226 /* Is the appraise rule hook specific? */ 227 if (action & IMA_FILE_APPRAISE) 228 func = FILE_CHECK; 229 230 inode_lock(inode); 231 232 if (action) { 233 iint = integrity_inode_get(inode); 234 if (!iint) 235 rc = -ENOMEM; 236 } 237 238 if (!rc && violation_check) 239 ima_rdwr_violation_check(file, iint, action & IMA_MEASURE, 240 &pathbuf, &pathname, filename); 241 242 inode_unlock(inode); 243 244 if (rc) 245 goto out; 246 if (!action) 247 goto out; 248 249 mutex_lock(&iint->mutex); 250 251 if (test_and_clear_bit(IMA_CHANGE_ATTR, &iint->atomic_flags)) 252 /* reset appraisal flags if ima_inode_post_setattr was called */ 253 iint->flags &= ~(IMA_APPRAISE | IMA_APPRAISED | 254 IMA_APPRAISE_SUBMASK | IMA_APPRAISED_SUBMASK | 255 IMA_ACTION_FLAGS); 256 257 /* 258 * Re-evaulate the file if either the xattr has changed or the 259 * kernel has no way of detecting file change on the filesystem. 260 * (Limited to privileged mounted filesystems.) 261 */ 262 if (test_and_clear_bit(IMA_CHANGE_XATTR, &iint->atomic_flags) || 263 ((inode->i_sb->s_iflags & SB_I_IMA_UNVERIFIABLE_SIGNATURE) && 264 !(inode->i_sb->s_iflags & SB_I_UNTRUSTED_MOUNTER) && 265 !(action & IMA_FAIL_UNVERIFIABLE_SIGS))) { 266 iint->flags &= ~IMA_DONE_MASK; 267 iint->measured_pcrs = 0; 268 } 269 270 /* Determine if already appraised/measured based on bitmask 271 * (IMA_MEASURE, IMA_MEASURED, IMA_XXXX_APPRAISE, IMA_XXXX_APPRAISED, 272 * IMA_AUDIT, IMA_AUDITED) 273 */ 274 iint->flags |= action; 275 action &= IMA_DO_MASK; 276 action &= ~((iint->flags & (IMA_DONE_MASK ^ IMA_MEASURED)) >> 1); 277 278 /* If target pcr is already measured, unset IMA_MEASURE action */ 279 if ((action & IMA_MEASURE) && (iint->measured_pcrs & (0x1 << pcr))) 280 action ^= IMA_MEASURE; 281 282 /* HASH sets the digital signature and update flags, nothing else */ 283 if ((action & IMA_HASH) && 284 !(test_bit(IMA_DIGSIG, &iint->atomic_flags))) { 285 xattr_len = ima_read_xattr(file_dentry(file), &xattr_value); 286 if ((xattr_value && xattr_len > 2) && 287 (xattr_value->type == EVM_IMA_XATTR_DIGSIG)) 288 set_bit(IMA_DIGSIG, &iint->atomic_flags); 289 iint->flags |= IMA_HASHED; 290 action ^= IMA_HASH; 291 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 292 } 293 294 /* Nothing to do, just return existing appraised status */ 295 if (!action) { 296 if (must_appraise) { 297 rc = mmap_violation_check(func, file, &pathbuf, 298 &pathname, filename); 299 if (!rc) 300 rc = ima_get_cache_status(iint, func); 301 } 302 goto out_locked; 303 } 304 305 if ((action & IMA_APPRAISE_SUBMASK) || 306 strcmp(template_desc->name, IMA_TEMPLATE_IMA_NAME) != 0) { 307 /* read 'security.ima' */ 308 xattr_len = ima_read_xattr(file_dentry(file), &xattr_value); 309 310 /* 311 * Read the appended modsig if allowed by the policy, and allow 312 * an additional measurement list entry, if needed, based on the 313 * template format and whether the file was already measured. 314 */ 315 if (iint->flags & IMA_MODSIG_ALLOWED) { 316 rc = ima_read_modsig(func, buf, size, &modsig); 317 318 if (!rc && ima_template_has_modsig(template_desc) && 319 iint->flags & IMA_MEASURED) 320 action |= IMA_MEASURE; 321 } 322 } 323 324 hash_algo = ima_get_hash_algo(xattr_value, xattr_len); 325 326 rc = ima_collect_measurement(iint, file, buf, size, hash_algo, modsig); 327 if (rc != 0 && rc != -EBADF && rc != -EINVAL) 328 goto out_locked; 329 330 if (!pathbuf) /* ima_rdwr_violation possibly pre-fetched */ 331 pathname = ima_d_path(&file->f_path, &pathbuf, filename); 332 333 if (action & IMA_MEASURE) 334 ima_store_measurement(iint, file, pathname, 335 xattr_value, xattr_len, modsig, pcr, 336 template_desc); 337 if (rc == 0 && (action & IMA_APPRAISE_SUBMASK)) { 338 rc = ima_check_blacklist(iint, modsig, pcr); 339 if (rc != -EPERM) { 340 inode_lock(inode); 341 rc = ima_appraise_measurement(func, iint, file, 342 pathname, xattr_value, 343 xattr_len, modsig); 344 inode_unlock(inode); 345 } 346 if (!rc) 347 rc = mmap_violation_check(func, file, &pathbuf, 348 &pathname, filename); 349 } 350 if (action & IMA_AUDIT) 351 ima_audit_measurement(iint, pathname); 352 353 if ((file->f_flags & O_DIRECT) && (iint->flags & IMA_PERMIT_DIRECTIO)) 354 rc = 0; 355 out_locked: 356 if ((mask & MAY_WRITE) && test_bit(IMA_DIGSIG, &iint->atomic_flags) && 357 !(iint->flags & IMA_NEW_FILE)) 358 rc = -EACCES; 359 mutex_unlock(&iint->mutex); 360 kfree(xattr_value); 361 ima_free_modsig(modsig); 362 out: 363 if (pathbuf) 364 __putname(pathbuf); 365 if (must_appraise) { 366 if (rc && (ima_appraise & IMA_APPRAISE_ENFORCE)) 367 return -EACCES; 368 if (file->f_mode & FMODE_WRITE) 369 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 370 } 371 return 0; 372 } 373 374 /** 375 * ima_file_mmap - based on policy, collect/store measurement. 376 * @file: pointer to the file to be measured (May be NULL) 377 * @prot: contains the protection that will be applied by the kernel. 378 * 379 * Measure files being mmapped executable based on the ima_must_measure() 380 * policy decision. 381 * 382 * On success return 0. On integrity appraisal error, assuming the file 383 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 384 */ 385 int ima_file_mmap(struct file *file, unsigned long prot) 386 { 387 u32 secid; 388 389 if (file && (prot & PROT_EXEC)) { 390 security_task_getsecid(current, &secid); 391 return process_measurement(file, current_cred(), secid, NULL, 392 0, MAY_EXEC, MMAP_CHECK); 393 } 394 395 return 0; 396 } 397 398 /** 399 * ima_bprm_check - based on policy, collect/store measurement. 400 * @bprm: contains the linux_binprm structure 401 * 402 * The OS protects against an executable file, already open for write, 403 * from being executed in deny_write_access() and an executable file, 404 * already open for execute, from being modified in get_write_access(). 405 * So we can be certain that what we verify and measure here is actually 406 * what is being executed. 407 * 408 * On success return 0. On integrity appraisal error, assuming the file 409 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 410 */ 411 int ima_bprm_check(struct linux_binprm *bprm) 412 { 413 int ret; 414 u32 secid; 415 416 security_task_getsecid(current, &secid); 417 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, 418 MAY_EXEC, BPRM_CHECK); 419 if (ret) 420 return ret; 421 422 security_cred_getsecid(bprm->cred, &secid); 423 return process_measurement(bprm->file, bprm->cred, secid, NULL, 0, 424 MAY_EXEC, CREDS_CHECK); 425 } 426 427 /** 428 * ima_path_check - based on policy, collect/store measurement. 429 * @file: pointer to the file to be measured 430 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 431 * 432 * Measure files based on the ima_must_measure() policy decision. 433 * 434 * On success return 0. On integrity appraisal error, assuming the file 435 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 436 */ 437 int ima_file_check(struct file *file, int mask) 438 { 439 u32 secid; 440 441 security_task_getsecid(current, &secid); 442 return process_measurement(file, current_cred(), secid, NULL, 0, 443 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | 444 MAY_APPEND), FILE_CHECK); 445 } 446 EXPORT_SYMBOL_GPL(ima_file_check); 447 448 /** 449 * ima_file_hash - return the stored measurement if a file has been hashed and 450 * is in the iint cache. 451 * @file: pointer to the file 452 * @buf: buffer in which to store the hash 453 * @buf_size: length of the buffer 454 * 455 * On success, return the hash algorithm (as defined in the enum hash_algo). 456 * If buf is not NULL, this function also outputs the hash into buf. 457 * If the hash is larger than buf_size, then only buf_size bytes will be copied. 458 * It generally just makes sense to pass a buffer capable of holding the largest 459 * possible hash: IMA_MAX_DIGEST_SIZE. 460 * The file hash returned is based on the entire file, including the appended 461 * signature. 462 * 463 * If IMA is disabled or if no measurement is available, return -EOPNOTSUPP. 464 * If the parameters are incorrect, return -EINVAL. 465 */ 466 int ima_file_hash(struct file *file, char *buf, size_t buf_size) 467 { 468 struct inode *inode; 469 struct integrity_iint_cache *iint; 470 int hash_algo; 471 472 if (!file) 473 return -EINVAL; 474 475 if (!ima_policy_flag) 476 return -EOPNOTSUPP; 477 478 inode = file_inode(file); 479 iint = integrity_iint_find(inode); 480 if (!iint) 481 return -EOPNOTSUPP; 482 483 mutex_lock(&iint->mutex); 484 if (buf) { 485 size_t copied_size; 486 487 copied_size = min_t(size_t, iint->ima_hash->length, buf_size); 488 memcpy(buf, iint->ima_hash->digest, copied_size); 489 } 490 hash_algo = iint->ima_hash->algo; 491 mutex_unlock(&iint->mutex); 492 493 return hash_algo; 494 } 495 EXPORT_SYMBOL_GPL(ima_file_hash); 496 497 /** 498 * ima_post_create_tmpfile - mark newly created tmpfile as new 499 * @file : newly created tmpfile 500 * 501 * No measuring, appraising or auditing of newly created tmpfiles is needed. 502 * Skip calling process_measurement(), but indicate which newly, created 503 * tmpfiles are in policy. 504 */ 505 void ima_post_create_tmpfile(struct inode *inode) 506 { 507 struct integrity_iint_cache *iint; 508 int must_appraise; 509 510 must_appraise = ima_must_appraise(inode, MAY_ACCESS, FILE_CHECK); 511 if (!must_appraise) 512 return; 513 514 /* Nothing to do if we can't allocate memory */ 515 iint = integrity_inode_get(inode); 516 if (!iint) 517 return; 518 519 /* needed for writing the security xattrs */ 520 set_bit(IMA_UPDATE_XATTR, &iint->atomic_flags); 521 iint->ima_file_status = INTEGRITY_PASS; 522 } 523 524 /** 525 * ima_post_path_mknod - mark as a new inode 526 * @dentry: newly created dentry 527 * 528 * Mark files created via the mknodat syscall as new, so that the 529 * file data can be written later. 530 */ 531 void ima_post_path_mknod(struct dentry *dentry) 532 { 533 struct integrity_iint_cache *iint; 534 struct inode *inode = dentry->d_inode; 535 int must_appraise; 536 537 must_appraise = ima_must_appraise(inode, MAY_ACCESS, FILE_CHECK); 538 if (!must_appraise) 539 return; 540 541 /* Nothing to do if we can't allocate memory */ 542 iint = integrity_inode_get(inode); 543 if (!iint) 544 return; 545 546 /* needed for re-opening empty files */ 547 iint->flags |= IMA_NEW_FILE; 548 } 549 550 /** 551 * ima_read_file - pre-measure/appraise hook decision based on policy 552 * @file: pointer to the file to be measured/appraised/audit 553 * @read_id: caller identifier 554 * 555 * Permit reading a file based on policy. The policy rules are written 556 * in terms of the policy identifier. Appraising the integrity of 557 * a file requires a file descriptor. 558 * 559 * For permission return 0, otherwise return -EACCES. 560 */ 561 int ima_read_file(struct file *file, enum kernel_read_file_id read_id) 562 { 563 /* 564 * READING_FIRMWARE_PREALLOC_BUFFER 565 * 566 * Do devices using pre-allocated memory run the risk of the 567 * firmware being accessible to the device prior to the completion 568 * of IMA's signature verification any more than when using two 569 * buffers? 570 */ 571 return 0; 572 } 573 574 const int read_idmap[READING_MAX_ID] = { 575 [READING_FIRMWARE] = FIRMWARE_CHECK, 576 [READING_FIRMWARE_PREALLOC_BUFFER] = FIRMWARE_CHECK, 577 [READING_MODULE] = MODULE_CHECK, 578 [READING_KEXEC_IMAGE] = KEXEC_KERNEL_CHECK, 579 [READING_KEXEC_INITRAMFS] = KEXEC_INITRAMFS_CHECK, 580 [READING_POLICY] = POLICY_CHECK 581 }; 582 583 /** 584 * ima_post_read_file - in memory collect/appraise/audit measurement 585 * @file: pointer to the file to be measured/appraised/audit 586 * @buf: pointer to in memory file contents 587 * @size: size of in memory file contents 588 * @read_id: caller identifier 589 * 590 * Measure/appraise/audit in memory file based on policy. Policy rules 591 * are written in terms of a policy identifier. 592 * 593 * On success return 0. On integrity appraisal error, assuming the file 594 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. 595 */ 596 int ima_post_read_file(struct file *file, void *buf, loff_t size, 597 enum kernel_read_file_id read_id) 598 { 599 enum ima_hooks func; 600 u32 secid; 601 602 if (!file && read_id == READING_FIRMWARE) { 603 if ((ima_appraise & IMA_APPRAISE_FIRMWARE) && 604 (ima_appraise & IMA_APPRAISE_ENFORCE)) { 605 pr_err("Prevent firmware loading_store.\n"); 606 return -EACCES; /* INTEGRITY_UNKNOWN */ 607 } 608 return 0; 609 } 610 611 /* permit signed certs */ 612 if (!file && read_id == READING_X509_CERTIFICATE) 613 return 0; 614 615 if (!file || !buf || size == 0) { /* should never happen */ 616 if (ima_appraise & IMA_APPRAISE_ENFORCE) 617 return -EACCES; 618 return 0; 619 } 620 621 func = read_idmap[read_id] ?: FILE_CHECK; 622 security_task_getsecid(current, &secid); 623 return process_measurement(file, current_cred(), secid, buf, size, 624 MAY_READ, func); 625 } 626 627 /** 628 * ima_load_data - appraise decision based on policy 629 * @id: kernel load data caller identifier 630 * 631 * Callers of this LSM hook can not measure, appraise, or audit the 632 * data provided by userspace. Enforce policy rules requring a file 633 * signature (eg. kexec'ed kernel image). 634 * 635 * For permission return 0, otherwise return -EACCES. 636 */ 637 int ima_load_data(enum kernel_load_data_id id) 638 { 639 bool ima_enforce, sig_enforce; 640 641 ima_enforce = 642 (ima_appraise & IMA_APPRAISE_ENFORCE) == IMA_APPRAISE_ENFORCE; 643 644 switch (id) { 645 case LOADING_KEXEC_IMAGE: 646 if (IS_ENABLED(CONFIG_KEXEC_SIG) 647 && arch_ima_get_secureboot()) { 648 pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n"); 649 return -EACCES; 650 } 651 652 if (ima_enforce && (ima_appraise & IMA_APPRAISE_KEXEC)) { 653 pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n"); 654 return -EACCES; /* INTEGRITY_UNKNOWN */ 655 } 656 break; 657 case LOADING_FIRMWARE: 658 if (ima_enforce && (ima_appraise & IMA_APPRAISE_FIRMWARE)) { 659 pr_err("Prevent firmware sysfs fallback loading.\n"); 660 return -EACCES; /* INTEGRITY_UNKNOWN */ 661 } 662 break; 663 case LOADING_MODULE: 664 sig_enforce = is_module_sig_enforced(); 665 666 if (ima_enforce && (!sig_enforce 667 && (ima_appraise & IMA_APPRAISE_MODULES))) { 668 pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); 669 return -EACCES; /* INTEGRITY_UNKNOWN */ 670 } 671 default: 672 break; 673 } 674 return 0; 675 } 676 677 /* 678 * process_buffer_measurement - Measure the buffer to ima log. 679 * @buf: pointer to the buffer that needs to be added to the log. 680 * @size: size of buffer(in bytes). 681 * @eventname: event name to be used for the buffer entry. 682 * @func: IMA hook 683 * @pcr: pcr to extend the measurement 684 * @keyring: keyring name to determine the action to be performed 685 * 686 * Based on policy, the buffer is measured into the ima log. 687 */ 688 void process_buffer_measurement(const void *buf, int size, 689 const char *eventname, enum ima_hooks func, 690 int pcr, const char *keyring) 691 { 692 int ret = 0; 693 struct ima_template_entry *entry = NULL; 694 struct integrity_iint_cache iint = {}; 695 struct ima_event_data event_data = {.iint = &iint, 696 .filename = eventname, 697 .buf = buf, 698 .buf_len = size}; 699 struct ima_template_desc *template = NULL; 700 struct { 701 struct ima_digest_data hdr; 702 char digest[IMA_MAX_DIGEST_SIZE]; 703 } hash = {}; 704 int violation = 0; 705 int action = 0; 706 u32 secid; 707 708 if (!ima_policy_flag) 709 return; 710 711 /* 712 * Both LSM hooks and auxilary based buffer measurements are 713 * based on policy. To avoid code duplication, differentiate 714 * between the LSM hooks and auxilary buffer measurements, 715 * retrieving the policy rule information only for the LSM hook 716 * buffer measurements. 717 */ 718 if (func) { 719 security_task_getsecid(current, &secid); 720 action = ima_get_action(NULL, current_cred(), secid, 0, func, 721 &pcr, &template, keyring); 722 if (!(action & IMA_MEASURE)) 723 return; 724 } 725 726 if (!pcr) 727 pcr = CONFIG_IMA_MEASURE_PCR_IDX; 728 729 if (!template) { 730 template = lookup_template_desc("ima-buf"); 731 ret = template_desc_init_fields(template->fmt, 732 &(template->fields), 733 &(template->num_fields)); 734 if (ret < 0) { 735 pr_err("template %s init failed, result: %d\n", 736 (strlen(template->name) ? 737 template->name : template->fmt), ret); 738 return; 739 } 740 } 741 742 iint.ima_hash = &hash.hdr; 743 iint.ima_hash->algo = ima_hash_algo; 744 iint.ima_hash->length = hash_digest_size[ima_hash_algo]; 745 746 ret = ima_calc_buffer_hash(buf, size, iint.ima_hash); 747 if (ret < 0) 748 goto out; 749 750 ret = ima_alloc_init_template(&event_data, &entry, template); 751 if (ret < 0) 752 goto out; 753 754 ret = ima_store_template(entry, violation, NULL, buf, pcr); 755 756 if (ret < 0) 757 ima_free_template_entry(entry); 758 759 out: 760 return; 761 } 762 763 /** 764 * ima_kexec_cmdline - measure kexec cmdline boot args 765 * @buf: pointer to buffer 766 * @size: size of buffer 767 * 768 * Buffers can only be measured, not appraised. 769 */ 770 void ima_kexec_cmdline(const void *buf, int size) 771 { 772 if (buf && size != 0) 773 process_buffer_measurement(buf, size, "kexec-cmdline", 774 KEXEC_CMDLINE, 0, NULL); 775 } 776 777 static int __init init_ima(void) 778 { 779 int error; 780 781 ima_init_template_list(); 782 hash_setup(CONFIG_IMA_DEFAULT_HASH); 783 error = ima_init(); 784 785 if (error && strcmp(hash_algo_name[ima_hash_algo], 786 CONFIG_IMA_DEFAULT_HASH) != 0) { 787 pr_info("Allocating %s failed, going to use default hash algorithm %s\n", 788 hash_algo_name[ima_hash_algo], CONFIG_IMA_DEFAULT_HASH); 789 hash_setup_done = 0; 790 hash_setup(CONFIG_IMA_DEFAULT_HASH); 791 error = ima_init(); 792 } 793 794 error = register_blocking_lsm_notifier(&ima_lsm_policy_notifier); 795 if (error) 796 pr_warn("Couldn't register LSM notifier, error %d\n", error); 797 798 if (!error) 799 ima_update_policy_flag(); 800 801 return error; 802 } 803 804 late_initcall(init_ima); /* Start IMA after the TPM is available */ 805