1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * Copyright (C) 2013 Politecnico di Torino, Italy
4 * TORSEC group -- http://security.polito.it
5 *
6 * Author: Roberto Sassu <roberto.sassu@polito.it>
7 *
8 * File: ima_template_lib.c
9 * Library of supported template fields.
10 */
11
12 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
14 #include "ima_template_lib.h"
15
ima_template_hash_algo_allowed(u8 algo)16 static bool ima_template_hash_algo_allowed(u8 algo)
17 {
18 if (algo == HASH_ALGO_SHA1 || algo == HASH_ALGO_MD5)
19 return true;
20
21 return false;
22 }
23
24 enum data_formats {
25 DATA_FMT_DIGEST = 0,
26 DATA_FMT_DIGEST_WITH_ALGO,
27 DATA_FMT_STRING,
28 DATA_FMT_HEX
29 };
30
ima_write_template_field_data(const void * data,const u32 datalen,enum data_formats datafmt,struct ima_field_data * field_data)31 static int ima_write_template_field_data(const void *data, const u32 datalen,
32 enum data_formats datafmt,
33 struct ima_field_data *field_data)
34 {
35 u8 *buf, *buf_ptr;
36 u32 buflen = datalen;
37
38 if (datafmt == DATA_FMT_STRING)
39 buflen = datalen + 1;
40
41 buf = kzalloc(buflen, GFP_KERNEL);
42 if (!buf)
43 return -ENOMEM;
44
45 memcpy(buf, data, datalen);
46
47 /*
48 * Replace all space characters with underscore for event names and
49 * strings. This avoid that, during the parsing of a measurements list,
50 * filenames with spaces or that end with the suffix ' (deleted)' are
51 * split into multiple template fields (the space is the delimitator
52 * character for measurements lists in ASCII format).
53 */
54 if (datafmt == DATA_FMT_STRING) {
55 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++)
56 if (*buf_ptr == ' ')
57 *buf_ptr = '_';
58 }
59
60 field_data->data = buf;
61 field_data->len = buflen;
62 return 0;
63 }
64
ima_show_template_data_ascii(struct seq_file * m,enum ima_show_type show,enum data_formats datafmt,struct ima_field_data * field_data)65 static void ima_show_template_data_ascii(struct seq_file *m,
66 enum ima_show_type show,
67 enum data_formats datafmt,
68 struct ima_field_data *field_data)
69 {
70 u8 *buf_ptr = field_data->data;
71 u32 buflen = field_data->len;
72
73 switch (datafmt) {
74 case DATA_FMT_DIGEST_WITH_ALGO:
75 buf_ptr = strnchr(field_data->data, buflen, ':');
76 if (buf_ptr != field_data->data)
77 seq_printf(m, "%s", field_data->data);
78
79 /* skip ':' and '\0' */
80 buf_ptr += 2;
81 buflen -= buf_ptr - field_data->data;
82 /* fall through */
83 case DATA_FMT_DIGEST:
84 case DATA_FMT_HEX:
85 if (!buflen)
86 break;
87 ima_print_digest(m, buf_ptr, buflen);
88 break;
89 case DATA_FMT_STRING:
90 seq_printf(m, "%s", buf_ptr);
91 break;
92 default:
93 break;
94 }
95 }
96
ima_show_template_data_binary(struct seq_file * m,enum ima_show_type show,enum data_formats datafmt,struct ima_field_data * field_data)97 static void ima_show_template_data_binary(struct seq_file *m,
98 enum ima_show_type show,
99 enum data_formats datafmt,
100 struct ima_field_data *field_data)
101 {
102 u32 len = (show == IMA_SHOW_BINARY_OLD_STRING_FMT) ?
103 strlen(field_data->data) : field_data->len;
104
105 if (show != IMA_SHOW_BINARY_NO_FIELD_LEN) {
106 u32 field_len = !ima_canonical_fmt ? len : cpu_to_le32(len);
107
108 ima_putc(m, &field_len, sizeof(field_len));
109 }
110
111 if (!len)
112 return;
113
114 ima_putc(m, field_data->data, len);
115 }
116
ima_show_template_field_data(struct seq_file * m,enum ima_show_type show,enum data_formats datafmt,struct ima_field_data * field_data)117 static void ima_show_template_field_data(struct seq_file *m,
118 enum ima_show_type show,
119 enum data_formats datafmt,
120 struct ima_field_data *field_data)
121 {
122 switch (show) {
123 case IMA_SHOW_ASCII:
124 ima_show_template_data_ascii(m, show, datafmt, field_data);
125 break;
126 case IMA_SHOW_BINARY:
127 case IMA_SHOW_BINARY_NO_FIELD_LEN:
128 case IMA_SHOW_BINARY_OLD_STRING_FMT:
129 ima_show_template_data_binary(m, show, datafmt, field_data);
130 break;
131 default:
132 break;
133 }
134 }
135
ima_show_template_digest(struct seq_file * m,enum ima_show_type show,struct ima_field_data * field_data)136 void ima_show_template_digest(struct seq_file *m, enum ima_show_type show,
137 struct ima_field_data *field_data)
138 {
139 ima_show_template_field_data(m, show, DATA_FMT_DIGEST, field_data);
140 }
141
ima_show_template_digest_ng(struct seq_file * m,enum ima_show_type show,struct ima_field_data * field_data)142 void ima_show_template_digest_ng(struct seq_file *m, enum ima_show_type show,
143 struct ima_field_data *field_data)
144 {
145 ima_show_template_field_data(m, show, DATA_FMT_DIGEST_WITH_ALGO,
146 field_data);
147 }
148
ima_show_template_string(struct seq_file * m,enum ima_show_type show,struct ima_field_data * field_data)149 void ima_show_template_string(struct seq_file *m, enum ima_show_type show,
150 struct ima_field_data *field_data)
151 {
152 ima_show_template_field_data(m, show, DATA_FMT_STRING, field_data);
153 }
154
ima_show_template_sig(struct seq_file * m,enum ima_show_type show,struct ima_field_data * field_data)155 void ima_show_template_sig(struct seq_file *m, enum ima_show_type show,
156 struct ima_field_data *field_data)
157 {
158 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data);
159 }
160
ima_show_template_buf(struct seq_file * m,enum ima_show_type show,struct ima_field_data * field_data)161 void ima_show_template_buf(struct seq_file *m, enum ima_show_type show,
162 struct ima_field_data *field_data)
163 {
164 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data);
165 }
166
167 /**
168 * ima_parse_buf() - Parses lengths and data from an input buffer
169 * @bufstartp: Buffer start address.
170 * @bufendp: Buffer end address.
171 * @bufcurp: Pointer to remaining (non-parsed) data.
172 * @maxfields: Length of fields array.
173 * @fields: Array containing lengths and pointers of parsed data.
174 * @curfields: Number of array items containing parsed data.
175 * @len_mask: Bitmap (if bit is set, data length should not be parsed).
176 * @enforce_mask: Check if curfields == maxfields and/or bufcurp == bufendp.
177 * @bufname: String identifier of the input buffer.
178 *
179 * Return: 0 on success, -EINVAL on error.
180 */
ima_parse_buf(void * bufstartp,void * bufendp,void ** bufcurp,int maxfields,struct ima_field_data * fields,int * curfields,unsigned long * len_mask,int enforce_mask,char * bufname)181 int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp,
182 int maxfields, struct ima_field_data *fields, int *curfields,
183 unsigned long *len_mask, int enforce_mask, char *bufname)
184 {
185 void *bufp = bufstartp;
186 int i;
187
188 for (i = 0; i < maxfields; i++) {
189 if (len_mask == NULL || !test_bit(i, len_mask)) {
190 if (bufp > (bufendp - sizeof(u32)))
191 break;
192
193 fields[i].len = *(u32 *)bufp;
194 if (ima_canonical_fmt)
195 fields[i].len = le32_to_cpu(fields[i].len);
196
197 bufp += sizeof(u32);
198 }
199
200 if (bufp > (bufendp - fields[i].len))
201 break;
202
203 fields[i].data = bufp;
204 bufp += fields[i].len;
205 }
206
207 if ((enforce_mask & ENFORCE_FIELDS) && i != maxfields) {
208 pr_err("%s: nr of fields mismatch: expected: %d, current: %d\n",
209 bufname, maxfields, i);
210 return -EINVAL;
211 }
212
213 if ((enforce_mask & ENFORCE_BUFEND) && bufp != bufendp) {
214 pr_err("%s: buf end mismatch: expected: %p, current: %p\n",
215 bufname, bufendp, bufp);
216 return -EINVAL;
217 }
218
219 if (curfields)
220 *curfields = i;
221
222 if (bufcurp)
223 *bufcurp = bufp;
224
225 return 0;
226 }
227
ima_eventdigest_init_common(const u8 * digest,u32 digestsize,u8 hash_algo,struct ima_field_data * field_data)228 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize,
229 u8 hash_algo,
230 struct ima_field_data *field_data)
231 {
232 /*
233 * digest formats:
234 * - DATA_FMT_DIGEST: digest
235 * - DATA_FMT_DIGEST_WITH_ALGO: [<hash algo>] + ':' + '\0' + digest,
236 * where <hash algo> is provided if the hash algoritm is not
237 * SHA1 or MD5
238 */
239 u8 buffer[CRYPTO_MAX_ALG_NAME + 2 + IMA_MAX_DIGEST_SIZE] = { 0 };
240 enum data_formats fmt = DATA_FMT_DIGEST;
241 u32 offset = 0;
242
243 if (hash_algo < HASH_ALGO__LAST) {
244 fmt = DATA_FMT_DIGEST_WITH_ALGO;
245 offset += snprintf(buffer, CRYPTO_MAX_ALG_NAME + 1, "%s",
246 hash_algo_name[hash_algo]);
247 buffer[offset] = ':';
248 offset += 2;
249 }
250
251 if (digest)
252 memcpy(buffer + offset, digest, digestsize);
253 else
254 /*
255 * If digest is NULL, the event being recorded is a violation.
256 * Make room for the digest by increasing the offset of
257 * IMA_DIGEST_SIZE.
258 */
259 offset += IMA_DIGEST_SIZE;
260
261 return ima_write_template_field_data(buffer, offset + digestsize,
262 fmt, field_data);
263 }
264
265 /*
266 * This function writes the digest of an event (with size limit).
267 */
ima_eventdigest_init(struct ima_event_data * event_data,struct ima_field_data * field_data)268 int ima_eventdigest_init(struct ima_event_data *event_data,
269 struct ima_field_data *field_data)
270 {
271 struct {
272 struct ima_digest_data hdr;
273 char digest[IMA_MAX_DIGEST_SIZE];
274 } hash;
275 u8 *cur_digest = NULL;
276 u32 cur_digestsize = 0;
277 struct inode *inode;
278 int result;
279
280 memset(&hash, 0, sizeof(hash));
281
282 if (event_data->violation) /* recording a violation. */
283 goto out;
284
285 if (ima_template_hash_algo_allowed(event_data->iint->ima_hash->algo)) {
286 cur_digest = event_data->iint->ima_hash->digest;
287 cur_digestsize = event_data->iint->ima_hash->length;
288 goto out;
289 }
290
291 if ((const char *)event_data->filename == boot_aggregate_name) {
292 if (ima_tpm_chip) {
293 hash.hdr.algo = HASH_ALGO_SHA1;
294 result = ima_calc_boot_aggregate(&hash.hdr);
295
296 /* algo can change depending on available PCR banks */
297 if (!result && hash.hdr.algo != HASH_ALGO_SHA1)
298 result = -EINVAL;
299
300 if (result < 0)
301 memset(&hash, 0, sizeof(hash));
302 }
303
304 cur_digest = hash.hdr.digest;
305 cur_digestsize = hash_digest_size[HASH_ALGO_SHA1];
306 goto out;
307 }
308
309 if (!event_data->file) /* missing info to re-calculate the digest */
310 return -EINVAL;
311
312 inode = file_inode(event_data->file);
313 hash.hdr.algo = ima_template_hash_algo_allowed(ima_hash_algo) ?
314 ima_hash_algo : HASH_ALGO_SHA1;
315 result = ima_calc_file_hash(event_data->file, &hash.hdr);
316 if (result) {
317 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode,
318 event_data->filename, "collect_data",
319 "failed", result, 0);
320 return result;
321 }
322 cur_digest = hash.hdr.digest;
323 cur_digestsize = hash.hdr.length;
324 out:
325 return ima_eventdigest_init_common(cur_digest, cur_digestsize,
326 HASH_ALGO__LAST, field_data);
327 }
328
329 /*
330 * This function writes the digest of an event (without size limit).
331 */
ima_eventdigest_ng_init(struct ima_event_data * event_data,struct ima_field_data * field_data)332 int ima_eventdigest_ng_init(struct ima_event_data *event_data,
333 struct ima_field_data *field_data)
334 {
335 u8 *cur_digest = NULL, hash_algo = HASH_ALGO_SHA1;
336 u32 cur_digestsize = 0;
337
338 if (event_data->violation) /* recording a violation. */
339 goto out;
340
341 cur_digest = event_data->iint->ima_hash->digest;
342 cur_digestsize = event_data->iint->ima_hash->length;
343
344 hash_algo = event_data->iint->ima_hash->algo;
345 out:
346 return ima_eventdigest_init_common(cur_digest, cur_digestsize,
347 hash_algo, field_data);
348 }
349
350 /*
351 * This function writes the digest of the file which is expected to match the
352 * digest contained in the file's appended signature.
353 */
ima_eventdigest_modsig_init(struct ima_event_data * event_data,struct ima_field_data * field_data)354 int ima_eventdigest_modsig_init(struct ima_event_data *event_data,
355 struct ima_field_data *field_data)
356 {
357 enum hash_algo hash_algo;
358 const u8 *cur_digest;
359 u32 cur_digestsize;
360
361 if (!event_data->modsig)
362 return 0;
363
364 if (event_data->violation) {
365 /* Recording a violation. */
366 hash_algo = HASH_ALGO_SHA1;
367 cur_digest = NULL;
368 cur_digestsize = 0;
369 } else {
370 int rc;
371
372 rc = ima_get_modsig_digest(event_data->modsig, &hash_algo,
373 &cur_digest, &cur_digestsize);
374 if (rc)
375 return rc;
376 else if (hash_algo == HASH_ALGO__LAST || cur_digestsize == 0)
377 /* There was some error collecting the digest. */
378 return -EINVAL;
379 }
380
381 return ima_eventdigest_init_common(cur_digest, cur_digestsize,
382 hash_algo, field_data);
383 }
384
ima_eventname_init_common(struct ima_event_data * event_data,struct ima_field_data * field_data,bool size_limit)385 static int ima_eventname_init_common(struct ima_event_data *event_data,
386 struct ima_field_data *field_data,
387 bool size_limit)
388 {
389 const char *cur_filename = NULL;
390 u32 cur_filename_len = 0;
391
392 BUG_ON(event_data->filename == NULL && event_data->file == NULL);
393
394 if (event_data->filename) {
395 cur_filename = event_data->filename;
396 cur_filename_len = strlen(event_data->filename);
397
398 if (!size_limit || cur_filename_len <= IMA_EVENT_NAME_LEN_MAX)
399 goto out;
400 }
401
402 if (event_data->file) {
403 cur_filename = event_data->file->f_path.dentry->d_name.name;
404 cur_filename_len = strlen(cur_filename);
405 } else
406 /*
407 * Truncate filename if the latter is too long and
408 * the file descriptor is not available.
409 */
410 cur_filename_len = IMA_EVENT_NAME_LEN_MAX;
411 out:
412 return ima_write_template_field_data(cur_filename, cur_filename_len,
413 DATA_FMT_STRING, field_data);
414 }
415
416 /*
417 * This function writes the name of an event (with size limit).
418 */
ima_eventname_init(struct ima_event_data * event_data,struct ima_field_data * field_data)419 int ima_eventname_init(struct ima_event_data *event_data,
420 struct ima_field_data *field_data)
421 {
422 return ima_eventname_init_common(event_data, field_data, true);
423 }
424
425 /*
426 * This function writes the name of an event (without size limit).
427 */
ima_eventname_ng_init(struct ima_event_data * event_data,struct ima_field_data * field_data)428 int ima_eventname_ng_init(struct ima_event_data *event_data,
429 struct ima_field_data *field_data)
430 {
431 return ima_eventname_init_common(event_data, field_data, false);
432 }
433
434 /*
435 * ima_eventsig_init - include the file signature as part of the template data
436 */
ima_eventsig_init(struct ima_event_data * event_data,struct ima_field_data * field_data)437 int ima_eventsig_init(struct ima_event_data *event_data,
438 struct ima_field_data *field_data)
439 {
440 struct evm_ima_xattr_data *xattr_value = event_data->xattr_value;
441
442 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG))
443 return 0;
444
445 return ima_write_template_field_data(xattr_value, event_data->xattr_len,
446 DATA_FMT_HEX, field_data);
447 }
448
449 /*
450 * ima_eventbuf_init - include the buffer(kexec-cmldine) as part of the
451 * template data.
452 */
ima_eventbuf_init(struct ima_event_data * event_data,struct ima_field_data * field_data)453 int ima_eventbuf_init(struct ima_event_data *event_data,
454 struct ima_field_data *field_data)
455 {
456 if ((!event_data->buf) || (event_data->buf_len == 0))
457 return 0;
458
459 return ima_write_template_field_data(event_data->buf,
460 event_data->buf_len, DATA_FMT_HEX,
461 field_data);
462 }
463
464 /*
465 * ima_eventmodsig_init - include the appended file signature as part of the
466 * template data
467 */
ima_eventmodsig_init(struct ima_event_data * event_data,struct ima_field_data * field_data)468 int ima_eventmodsig_init(struct ima_event_data *event_data,
469 struct ima_field_data *field_data)
470 {
471 const void *data;
472 u32 data_len;
473 int rc;
474
475 if (!event_data->modsig)
476 return 0;
477
478 /*
479 * modsig is a runtime structure containing pointers. Get its raw data
480 * instead.
481 */
482 rc = ima_get_raw_modsig(event_data->modsig, &data, &data_len);
483 if (rc)
484 return rc;
485
486 return ima_write_template_field_data(data, data_len, DATA_FMT_HEX,
487 field_data);
488 }
489