1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2013 Politecnico di Torino, Italy 4 * TORSEC group -- http://security.polito.it 5 * 6 * Author: Roberto Sassu <roberto.sassu@polito.it> 7 * 8 * File: ima_template_lib.c 9 * Library of supported template fields. 10 */ 11 12 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 13 14 #include "ima_template_lib.h" 15 16 static bool ima_template_hash_algo_allowed(u8 algo) 17 { 18 if (algo == HASH_ALGO_SHA1 || algo == HASH_ALGO_MD5) 19 return true; 20 21 return false; 22 } 23 24 enum data_formats { 25 DATA_FMT_DIGEST = 0, 26 DATA_FMT_DIGEST_WITH_ALGO, 27 DATA_FMT_STRING, 28 DATA_FMT_HEX 29 }; 30 31 static int ima_write_template_field_data(const void *data, const u32 datalen, 32 enum data_formats datafmt, 33 struct ima_field_data *field_data) 34 { 35 u8 *buf, *buf_ptr; 36 u32 buflen = datalen; 37 38 if (datafmt == DATA_FMT_STRING) 39 buflen = datalen + 1; 40 41 buf = kzalloc(buflen, GFP_KERNEL); 42 if (!buf) 43 return -ENOMEM; 44 45 memcpy(buf, data, datalen); 46 47 /* 48 * Replace all space characters with underscore for event names and 49 * strings. This avoid that, during the parsing of a measurements list, 50 * filenames with spaces or that end with the suffix ' (deleted)' are 51 * split into multiple template fields (the space is the delimitator 52 * character for measurements lists in ASCII format). 53 */ 54 if (datafmt == DATA_FMT_STRING) { 55 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++) 56 if (*buf_ptr == ' ') 57 *buf_ptr = '_'; 58 } 59 60 field_data->data = buf; 61 field_data->len = buflen; 62 return 0; 63 } 64 65 static void ima_show_template_data_ascii(struct seq_file *m, 66 enum ima_show_type show, 67 enum data_formats datafmt, 68 struct ima_field_data *field_data) 69 { 70 u8 *buf_ptr = field_data->data; 71 u32 buflen = field_data->len; 72 73 switch (datafmt) { 74 case DATA_FMT_DIGEST_WITH_ALGO: 75 buf_ptr = strnchr(field_data->data, buflen, ':'); 76 if (buf_ptr != field_data->data) 77 seq_printf(m, "%s", field_data->data); 78 79 /* skip ':' and '\0' */ 80 buf_ptr += 2; 81 buflen -= buf_ptr - field_data->data; 82 /* fall through */ 83 case DATA_FMT_DIGEST: 84 case DATA_FMT_HEX: 85 if (!buflen) 86 break; 87 ima_print_digest(m, buf_ptr, buflen); 88 break; 89 case DATA_FMT_STRING: 90 seq_printf(m, "%s", buf_ptr); 91 break; 92 default: 93 break; 94 } 95 } 96 97 static void ima_show_template_data_binary(struct seq_file *m, 98 enum ima_show_type show, 99 enum data_formats datafmt, 100 struct ima_field_data *field_data) 101 { 102 u32 len = (show == IMA_SHOW_BINARY_OLD_STRING_FMT) ? 103 strlen(field_data->data) : field_data->len; 104 105 if (show != IMA_SHOW_BINARY_NO_FIELD_LEN) { 106 u32 field_len = !ima_canonical_fmt ? len : cpu_to_le32(len); 107 108 ima_putc(m, &field_len, sizeof(field_len)); 109 } 110 111 if (!len) 112 return; 113 114 ima_putc(m, field_data->data, len); 115 } 116 117 static void ima_show_template_field_data(struct seq_file *m, 118 enum ima_show_type show, 119 enum data_formats datafmt, 120 struct ima_field_data *field_data) 121 { 122 switch (show) { 123 case IMA_SHOW_ASCII: 124 ima_show_template_data_ascii(m, show, datafmt, field_data); 125 break; 126 case IMA_SHOW_BINARY: 127 case IMA_SHOW_BINARY_NO_FIELD_LEN: 128 case IMA_SHOW_BINARY_OLD_STRING_FMT: 129 ima_show_template_data_binary(m, show, datafmt, field_data); 130 break; 131 default: 132 break; 133 } 134 } 135 136 void ima_show_template_digest(struct seq_file *m, enum ima_show_type show, 137 struct ima_field_data *field_data) 138 { 139 ima_show_template_field_data(m, show, DATA_FMT_DIGEST, field_data); 140 } 141 142 void ima_show_template_digest_ng(struct seq_file *m, enum ima_show_type show, 143 struct ima_field_data *field_data) 144 { 145 ima_show_template_field_data(m, show, DATA_FMT_DIGEST_WITH_ALGO, 146 field_data); 147 } 148 149 void ima_show_template_string(struct seq_file *m, enum ima_show_type show, 150 struct ima_field_data *field_data) 151 { 152 ima_show_template_field_data(m, show, DATA_FMT_STRING, field_data); 153 } 154 155 void ima_show_template_sig(struct seq_file *m, enum ima_show_type show, 156 struct ima_field_data *field_data) 157 { 158 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 159 } 160 161 void ima_show_template_buf(struct seq_file *m, enum ima_show_type show, 162 struct ima_field_data *field_data) 163 { 164 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 165 } 166 167 /** 168 * ima_parse_buf() - Parses lengths and data from an input buffer 169 * @bufstartp: Buffer start address. 170 * @bufendp: Buffer end address. 171 * @bufcurp: Pointer to remaining (non-parsed) data. 172 * @maxfields: Length of fields array. 173 * @fields: Array containing lengths and pointers of parsed data. 174 * @curfields: Number of array items containing parsed data. 175 * @len_mask: Bitmap (if bit is set, data length should not be parsed). 176 * @enforce_mask: Check if curfields == maxfields and/or bufcurp == bufendp. 177 * @bufname: String identifier of the input buffer. 178 * 179 * Return: 0 on success, -EINVAL on error. 180 */ 181 int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp, 182 int maxfields, struct ima_field_data *fields, int *curfields, 183 unsigned long *len_mask, int enforce_mask, char *bufname) 184 { 185 void *bufp = bufstartp; 186 int i; 187 188 for (i = 0; i < maxfields; i++) { 189 if (len_mask == NULL || !test_bit(i, len_mask)) { 190 if (bufp > (bufendp - sizeof(u32))) 191 break; 192 193 fields[i].len = *(u32 *)bufp; 194 if (ima_canonical_fmt) 195 fields[i].len = le32_to_cpu(fields[i].len); 196 197 bufp += sizeof(u32); 198 } 199 200 if (bufp > (bufendp - fields[i].len)) 201 break; 202 203 fields[i].data = bufp; 204 bufp += fields[i].len; 205 } 206 207 if ((enforce_mask & ENFORCE_FIELDS) && i != maxfields) { 208 pr_err("%s: nr of fields mismatch: expected: %d, current: %d\n", 209 bufname, maxfields, i); 210 return -EINVAL; 211 } 212 213 if ((enforce_mask & ENFORCE_BUFEND) && bufp != bufendp) { 214 pr_err("%s: buf end mismatch: expected: %p, current: %p\n", 215 bufname, bufendp, bufp); 216 return -EINVAL; 217 } 218 219 if (curfields) 220 *curfields = i; 221 222 if (bufcurp) 223 *bufcurp = bufp; 224 225 return 0; 226 } 227 228 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, 229 u8 hash_algo, 230 struct ima_field_data *field_data) 231 { 232 /* 233 * digest formats: 234 * - DATA_FMT_DIGEST: digest 235 * - DATA_FMT_DIGEST_WITH_ALGO: [<hash algo>] + ':' + '\0' + digest, 236 * where <hash algo> is provided if the hash algoritm is not 237 * SHA1 or MD5 238 */ 239 u8 buffer[CRYPTO_MAX_ALG_NAME + 2 + IMA_MAX_DIGEST_SIZE] = { 0 }; 240 enum data_formats fmt = DATA_FMT_DIGEST; 241 u32 offset = 0; 242 243 if (hash_algo < HASH_ALGO__LAST) { 244 fmt = DATA_FMT_DIGEST_WITH_ALGO; 245 offset += snprintf(buffer, CRYPTO_MAX_ALG_NAME + 1, "%s", 246 hash_algo_name[hash_algo]); 247 buffer[offset] = ':'; 248 offset += 2; 249 } 250 251 if (digest) 252 memcpy(buffer + offset, digest, digestsize); 253 else 254 /* 255 * If digest is NULL, the event being recorded is a violation. 256 * Make room for the digest by increasing the offset of 257 * IMA_DIGEST_SIZE. 258 */ 259 offset += IMA_DIGEST_SIZE; 260 261 return ima_write_template_field_data(buffer, offset + digestsize, 262 fmt, field_data); 263 } 264 265 /* 266 * This function writes the digest of an event (with size limit). 267 */ 268 int ima_eventdigest_init(struct ima_event_data *event_data, 269 struct ima_field_data *field_data) 270 { 271 struct { 272 struct ima_digest_data hdr; 273 char digest[IMA_MAX_DIGEST_SIZE]; 274 } hash; 275 u8 *cur_digest = NULL; 276 u32 cur_digestsize = 0; 277 struct inode *inode; 278 int result; 279 280 memset(&hash, 0, sizeof(hash)); 281 282 if (event_data->violation) /* recording a violation. */ 283 goto out; 284 285 if (ima_template_hash_algo_allowed(event_data->iint->ima_hash->algo)) { 286 cur_digest = event_data->iint->ima_hash->digest; 287 cur_digestsize = event_data->iint->ima_hash->length; 288 goto out; 289 } 290 291 if (!event_data->file) /* missing info to re-calculate the digest */ 292 return -EINVAL; 293 294 inode = file_inode(event_data->file); 295 hash.hdr.algo = ima_template_hash_algo_allowed(ima_hash_algo) ? 296 ima_hash_algo : HASH_ALGO_SHA1; 297 result = ima_calc_file_hash(event_data->file, &hash.hdr); 298 if (result) { 299 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, 300 event_data->filename, "collect_data", 301 "failed", result, 0); 302 return result; 303 } 304 cur_digest = hash.hdr.digest; 305 cur_digestsize = hash.hdr.length; 306 out: 307 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 308 HASH_ALGO__LAST, field_data); 309 } 310 311 /* 312 * This function writes the digest of an event (without size limit). 313 */ 314 int ima_eventdigest_ng_init(struct ima_event_data *event_data, 315 struct ima_field_data *field_data) 316 { 317 u8 *cur_digest = NULL, hash_algo = HASH_ALGO_SHA1; 318 u32 cur_digestsize = 0; 319 320 if (event_data->violation) /* recording a violation. */ 321 goto out; 322 323 cur_digest = event_data->iint->ima_hash->digest; 324 cur_digestsize = event_data->iint->ima_hash->length; 325 326 hash_algo = event_data->iint->ima_hash->algo; 327 out: 328 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 329 hash_algo, field_data); 330 } 331 332 /* 333 * This function writes the digest of the file which is expected to match the 334 * digest contained in the file's appended signature. 335 */ 336 int ima_eventdigest_modsig_init(struct ima_event_data *event_data, 337 struct ima_field_data *field_data) 338 { 339 enum hash_algo hash_algo; 340 const u8 *cur_digest; 341 u32 cur_digestsize; 342 343 if (!event_data->modsig) 344 return 0; 345 346 if (event_data->violation) { 347 /* Recording a violation. */ 348 hash_algo = HASH_ALGO_SHA1; 349 cur_digest = NULL; 350 cur_digestsize = 0; 351 } else { 352 int rc; 353 354 rc = ima_get_modsig_digest(event_data->modsig, &hash_algo, 355 &cur_digest, &cur_digestsize); 356 if (rc) 357 return rc; 358 else if (hash_algo == HASH_ALGO__LAST || cur_digestsize == 0) 359 /* There was some error collecting the digest. */ 360 return -EINVAL; 361 } 362 363 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 364 hash_algo, field_data); 365 } 366 367 static int ima_eventname_init_common(struct ima_event_data *event_data, 368 struct ima_field_data *field_data, 369 bool size_limit) 370 { 371 const char *cur_filename = NULL; 372 u32 cur_filename_len = 0; 373 374 BUG_ON(event_data->filename == NULL && event_data->file == NULL); 375 376 if (event_data->filename) { 377 cur_filename = event_data->filename; 378 cur_filename_len = strlen(event_data->filename); 379 380 if (!size_limit || cur_filename_len <= IMA_EVENT_NAME_LEN_MAX) 381 goto out; 382 } 383 384 if (event_data->file) { 385 cur_filename = event_data->file->f_path.dentry->d_name.name; 386 cur_filename_len = strlen(cur_filename); 387 } else 388 /* 389 * Truncate filename if the latter is too long and 390 * the file descriptor is not available. 391 */ 392 cur_filename_len = IMA_EVENT_NAME_LEN_MAX; 393 out: 394 return ima_write_template_field_data(cur_filename, cur_filename_len, 395 DATA_FMT_STRING, field_data); 396 } 397 398 /* 399 * This function writes the name of an event (with size limit). 400 */ 401 int ima_eventname_init(struct ima_event_data *event_data, 402 struct ima_field_data *field_data) 403 { 404 return ima_eventname_init_common(event_data, field_data, true); 405 } 406 407 /* 408 * This function writes the name of an event (without size limit). 409 */ 410 int ima_eventname_ng_init(struct ima_event_data *event_data, 411 struct ima_field_data *field_data) 412 { 413 return ima_eventname_init_common(event_data, field_data, false); 414 } 415 416 /* 417 * ima_eventsig_init - include the file signature as part of the template data 418 */ 419 int ima_eventsig_init(struct ima_event_data *event_data, 420 struct ima_field_data *field_data) 421 { 422 struct evm_ima_xattr_data *xattr_value = event_data->xattr_value; 423 424 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG)) 425 return 0; 426 427 return ima_write_template_field_data(xattr_value, event_data->xattr_len, 428 DATA_FMT_HEX, field_data); 429 } 430 431 /* 432 * ima_eventbuf_init - include the buffer(kexec-cmldine) as part of the 433 * template data. 434 */ 435 int ima_eventbuf_init(struct ima_event_data *event_data, 436 struct ima_field_data *field_data) 437 { 438 if ((!event_data->buf) || (event_data->buf_len == 0)) 439 return 0; 440 441 return ima_write_template_field_data(event_data->buf, 442 event_data->buf_len, DATA_FMT_HEX, 443 field_data); 444 } 445 446 /* 447 * ima_eventmodsig_init - include the appended file signature as part of the 448 * template data 449 */ 450 int ima_eventmodsig_init(struct ima_event_data *event_data, 451 struct ima_field_data *field_data) 452 { 453 const void *data; 454 u32 data_len; 455 int rc; 456 457 if (!event_data->modsig) 458 return 0; 459 460 /* 461 * modsig is a runtime structure containing pointers. Get its raw data 462 * instead. 463 */ 464 rc = ima_get_raw_modsig(event_data->modsig, &data, &data_len); 465 if (rc) 466 return rc; 467 468 return ima_write_template_field_data(data, data_len, DATA_FMT_HEX, 469 field_data); 470 } 471