1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2013 Politecnico di Torino, Italy 4 * TORSEC group -- http://security.polito.it 5 * 6 * Author: Roberto Sassu <roberto.sassu@polito.it> 7 * 8 * File: ima_template_lib.c 9 * Library of supported template fields. 10 */ 11 12 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 13 14 #include "ima_template_lib.h" 15 16 static bool ima_template_hash_algo_allowed(u8 algo) 17 { 18 if (algo == HASH_ALGO_SHA1 || algo == HASH_ALGO_MD5) 19 return true; 20 21 return false; 22 } 23 24 enum data_formats { 25 DATA_FMT_DIGEST = 0, 26 DATA_FMT_DIGEST_WITH_ALGO, 27 DATA_FMT_STRING, 28 DATA_FMT_HEX 29 }; 30 31 static int ima_write_template_field_data(const void *data, const u32 datalen, 32 enum data_formats datafmt, 33 struct ima_field_data *field_data) 34 { 35 u8 *buf, *buf_ptr; 36 u32 buflen = datalen; 37 38 if (datafmt == DATA_FMT_STRING) 39 buflen = datalen + 1; 40 41 buf = kzalloc(buflen, GFP_KERNEL); 42 if (!buf) 43 return -ENOMEM; 44 45 memcpy(buf, data, datalen); 46 47 /* 48 * Replace all space characters with underscore for event names and 49 * strings. This avoid that, during the parsing of a measurements list, 50 * filenames with spaces or that end with the suffix ' (deleted)' are 51 * split into multiple template fields (the space is the delimitator 52 * character for measurements lists in ASCII format). 53 */ 54 if (datafmt == DATA_FMT_STRING) { 55 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++) 56 if (*buf_ptr == ' ') 57 *buf_ptr = '_'; 58 } 59 60 field_data->data = buf; 61 field_data->len = buflen; 62 return 0; 63 } 64 65 static void ima_show_template_data_ascii(struct seq_file *m, 66 enum ima_show_type show, 67 enum data_formats datafmt, 68 struct ima_field_data *field_data) 69 { 70 u8 *buf_ptr = field_data->data; 71 u32 buflen = field_data->len; 72 73 switch (datafmt) { 74 case DATA_FMT_DIGEST_WITH_ALGO: 75 buf_ptr = strnchr(field_data->data, buflen, ':'); 76 if (buf_ptr != field_data->data) 77 seq_printf(m, "%s", field_data->data); 78 79 /* skip ':' and '\0' */ 80 buf_ptr += 2; 81 buflen -= buf_ptr - field_data->data; 82 /* fall through */ 83 case DATA_FMT_DIGEST: 84 case DATA_FMT_HEX: 85 if (!buflen) 86 break; 87 ima_print_digest(m, buf_ptr, buflen); 88 break; 89 case DATA_FMT_STRING: 90 seq_printf(m, "%s", buf_ptr); 91 break; 92 default: 93 break; 94 } 95 } 96 97 static void ima_show_template_data_binary(struct seq_file *m, 98 enum ima_show_type show, 99 enum data_formats datafmt, 100 struct ima_field_data *field_data) 101 { 102 u32 len = (show == IMA_SHOW_BINARY_OLD_STRING_FMT) ? 103 strlen(field_data->data) : field_data->len; 104 105 if (show != IMA_SHOW_BINARY_NO_FIELD_LEN) { 106 u32 field_len = !ima_canonical_fmt ? len : cpu_to_le32(len); 107 108 ima_putc(m, &field_len, sizeof(field_len)); 109 } 110 111 if (!len) 112 return; 113 114 ima_putc(m, field_data->data, len); 115 } 116 117 static void ima_show_template_field_data(struct seq_file *m, 118 enum ima_show_type show, 119 enum data_formats datafmt, 120 struct ima_field_data *field_data) 121 { 122 switch (show) { 123 case IMA_SHOW_ASCII: 124 ima_show_template_data_ascii(m, show, datafmt, field_data); 125 break; 126 case IMA_SHOW_BINARY: 127 case IMA_SHOW_BINARY_NO_FIELD_LEN: 128 case IMA_SHOW_BINARY_OLD_STRING_FMT: 129 ima_show_template_data_binary(m, show, datafmt, field_data); 130 break; 131 default: 132 break; 133 } 134 } 135 136 void ima_show_template_digest(struct seq_file *m, enum ima_show_type show, 137 struct ima_field_data *field_data) 138 { 139 ima_show_template_field_data(m, show, DATA_FMT_DIGEST, field_data); 140 } 141 142 void ima_show_template_digest_ng(struct seq_file *m, enum ima_show_type show, 143 struct ima_field_data *field_data) 144 { 145 ima_show_template_field_data(m, show, DATA_FMT_DIGEST_WITH_ALGO, 146 field_data); 147 } 148 149 void ima_show_template_string(struct seq_file *m, enum ima_show_type show, 150 struct ima_field_data *field_data) 151 { 152 ima_show_template_field_data(m, show, DATA_FMT_STRING, field_data); 153 } 154 155 void ima_show_template_sig(struct seq_file *m, enum ima_show_type show, 156 struct ima_field_data *field_data) 157 { 158 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 159 } 160 161 void ima_show_template_buf(struct seq_file *m, enum ima_show_type show, 162 struct ima_field_data *field_data) 163 { 164 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 165 } 166 167 /** 168 * ima_parse_buf() - Parses lengths and data from an input buffer 169 * @bufstartp: Buffer start address. 170 * @bufendp: Buffer end address. 171 * @bufcurp: Pointer to remaining (non-parsed) data. 172 * @maxfields: Length of fields array. 173 * @fields: Array containing lengths and pointers of parsed data. 174 * @curfields: Number of array items containing parsed data. 175 * @len_mask: Bitmap (if bit is set, data length should not be parsed). 176 * @enforce_mask: Check if curfields == maxfields and/or bufcurp == bufendp. 177 * @bufname: String identifier of the input buffer. 178 * 179 * Return: 0 on success, -EINVAL on error. 180 */ 181 int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp, 182 int maxfields, struct ima_field_data *fields, int *curfields, 183 unsigned long *len_mask, int enforce_mask, char *bufname) 184 { 185 void *bufp = bufstartp; 186 int i; 187 188 for (i = 0; i < maxfields; i++) { 189 if (len_mask == NULL || !test_bit(i, len_mask)) { 190 if (bufp > (bufendp - sizeof(u32))) 191 break; 192 193 fields[i].len = *(u32 *)bufp; 194 if (ima_canonical_fmt) 195 fields[i].len = le32_to_cpu(fields[i].len); 196 197 bufp += sizeof(u32); 198 } 199 200 if (bufp > (bufendp - fields[i].len)) 201 break; 202 203 fields[i].data = bufp; 204 bufp += fields[i].len; 205 } 206 207 if ((enforce_mask & ENFORCE_FIELDS) && i != maxfields) { 208 pr_err("%s: nr of fields mismatch: expected: %d, current: %d\n", 209 bufname, maxfields, i); 210 return -EINVAL; 211 } 212 213 if ((enforce_mask & ENFORCE_BUFEND) && bufp != bufendp) { 214 pr_err("%s: buf end mismatch: expected: %p, current: %p\n", 215 bufname, bufendp, bufp); 216 return -EINVAL; 217 } 218 219 if (curfields) 220 *curfields = i; 221 222 if (bufcurp) 223 *bufcurp = bufp; 224 225 return 0; 226 } 227 228 static int ima_eventdigest_init_common(u8 *digest, u32 digestsize, u8 hash_algo, 229 struct ima_field_data *field_data) 230 { 231 /* 232 * digest formats: 233 * - DATA_FMT_DIGEST: digest 234 * - DATA_FMT_DIGEST_WITH_ALGO: [<hash algo>] + ':' + '\0' + digest, 235 * where <hash algo> is provided if the hash algoritm is not 236 * SHA1 or MD5 237 */ 238 u8 buffer[CRYPTO_MAX_ALG_NAME + 2 + IMA_MAX_DIGEST_SIZE] = { 0 }; 239 enum data_formats fmt = DATA_FMT_DIGEST; 240 u32 offset = 0; 241 242 if (hash_algo < HASH_ALGO__LAST) { 243 fmt = DATA_FMT_DIGEST_WITH_ALGO; 244 offset += snprintf(buffer, CRYPTO_MAX_ALG_NAME + 1, "%s", 245 hash_algo_name[hash_algo]); 246 buffer[offset] = ':'; 247 offset += 2; 248 } 249 250 if (digest) 251 memcpy(buffer + offset, digest, digestsize); 252 else 253 /* 254 * If digest is NULL, the event being recorded is a violation. 255 * Make room for the digest by increasing the offset of 256 * IMA_DIGEST_SIZE. 257 */ 258 offset += IMA_DIGEST_SIZE; 259 260 return ima_write_template_field_data(buffer, offset + digestsize, 261 fmt, field_data); 262 } 263 264 /* 265 * This function writes the digest of an event (with size limit). 266 */ 267 int ima_eventdigest_init(struct ima_event_data *event_data, 268 struct ima_field_data *field_data) 269 { 270 struct { 271 struct ima_digest_data hdr; 272 char digest[IMA_MAX_DIGEST_SIZE]; 273 } hash; 274 u8 *cur_digest = NULL; 275 u32 cur_digestsize = 0; 276 struct inode *inode; 277 int result; 278 279 memset(&hash, 0, sizeof(hash)); 280 281 if (event_data->violation) /* recording a violation. */ 282 goto out; 283 284 if (ima_template_hash_algo_allowed(event_data->iint->ima_hash->algo)) { 285 cur_digest = event_data->iint->ima_hash->digest; 286 cur_digestsize = event_data->iint->ima_hash->length; 287 goto out; 288 } 289 290 if (!event_data->file) /* missing info to re-calculate the digest */ 291 return -EINVAL; 292 293 inode = file_inode(event_data->file); 294 hash.hdr.algo = ima_template_hash_algo_allowed(ima_hash_algo) ? 295 ima_hash_algo : HASH_ALGO_SHA1; 296 result = ima_calc_file_hash(event_data->file, &hash.hdr); 297 if (result) { 298 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, 299 event_data->filename, "collect_data", 300 "failed", result, 0); 301 return result; 302 } 303 cur_digest = hash.hdr.digest; 304 cur_digestsize = hash.hdr.length; 305 out: 306 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 307 HASH_ALGO__LAST, field_data); 308 } 309 310 /* 311 * This function writes the digest of an event (without size limit). 312 */ 313 int ima_eventdigest_ng_init(struct ima_event_data *event_data, 314 struct ima_field_data *field_data) 315 { 316 u8 *cur_digest = NULL, hash_algo = HASH_ALGO_SHA1; 317 u32 cur_digestsize = 0; 318 319 if (event_data->violation) /* recording a violation. */ 320 goto out; 321 322 cur_digest = event_data->iint->ima_hash->digest; 323 cur_digestsize = event_data->iint->ima_hash->length; 324 325 hash_algo = event_data->iint->ima_hash->algo; 326 out: 327 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 328 hash_algo, field_data); 329 } 330 331 static int ima_eventname_init_common(struct ima_event_data *event_data, 332 struct ima_field_data *field_data, 333 bool size_limit) 334 { 335 const char *cur_filename = NULL; 336 u32 cur_filename_len = 0; 337 338 BUG_ON(event_data->filename == NULL && event_data->file == NULL); 339 340 if (event_data->filename) { 341 cur_filename = event_data->filename; 342 cur_filename_len = strlen(event_data->filename); 343 344 if (!size_limit || cur_filename_len <= IMA_EVENT_NAME_LEN_MAX) 345 goto out; 346 } 347 348 if (event_data->file) { 349 cur_filename = event_data->file->f_path.dentry->d_name.name; 350 cur_filename_len = strlen(cur_filename); 351 } else 352 /* 353 * Truncate filename if the latter is too long and 354 * the file descriptor is not available. 355 */ 356 cur_filename_len = IMA_EVENT_NAME_LEN_MAX; 357 out: 358 return ima_write_template_field_data(cur_filename, cur_filename_len, 359 DATA_FMT_STRING, field_data); 360 } 361 362 /* 363 * This function writes the name of an event (with size limit). 364 */ 365 int ima_eventname_init(struct ima_event_data *event_data, 366 struct ima_field_data *field_data) 367 { 368 return ima_eventname_init_common(event_data, field_data, true); 369 } 370 371 /* 372 * This function writes the name of an event (without size limit). 373 */ 374 int ima_eventname_ng_init(struct ima_event_data *event_data, 375 struct ima_field_data *field_data) 376 { 377 return ima_eventname_init_common(event_data, field_data, false); 378 } 379 380 /* 381 * ima_eventsig_init - include the file signature as part of the template data 382 */ 383 int ima_eventsig_init(struct ima_event_data *event_data, 384 struct ima_field_data *field_data) 385 { 386 struct evm_ima_xattr_data *xattr_value = event_data->xattr_value; 387 388 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG)) 389 return 0; 390 391 return ima_write_template_field_data(xattr_value, event_data->xattr_len, 392 DATA_FMT_HEX, field_data); 393 } 394 395 /* 396 * ima_eventbuf_init - include the buffer(kexec-cmldine) as part of the 397 * template data. 398 */ 399 int ima_eventbuf_init(struct ima_event_data *event_data, 400 struct ima_field_data *field_data) 401 { 402 if ((!event_data->buf) || (event_data->buf_len == 0)) 403 return 0; 404 405 return ima_write_template_field_data(event_data->buf, 406 event_data->buf_len, DATA_FMT_HEX, 407 field_data); 408 } 409