iint.c 4.86 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
/*
 * Copyright (C) 2008 IBM Corporation
 *
 * Authors:
 * Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation, version 2 of the
 * License.
 *
 * File: integrity_iint.c
 *	- implements the integrity hooks: integrity_inode_alloc,
 *	  integrity_inode_free
 *	- cache integrity information associated with an inode
 *	  using a rbtree tree.
 */
#include <linux/slab.h>
#include <linux/module.h>
#include <linux/spinlock.h>
#include <linux/rbtree.h>
22
23
#include <linux/file.h>
#include <linux/uaccess.h>
24
25
26
#include "integrity.h"

static struct rb_root integrity_iint_tree = RB_ROOT;
27
static DEFINE_RWLOCK(integrity_iint_lock);
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
static struct kmem_cache *iint_cache __read_mostly;

/*
 * __integrity_iint_find - return the iint associated with an inode
 */
static struct integrity_iint_cache *__integrity_iint_find(struct inode *inode)
{
	struct integrity_iint_cache *iint;
	struct rb_node *n = integrity_iint_tree.rb_node;

	while (n) {
		iint = rb_entry(n, struct integrity_iint_cache, rb_node);

		if (inode < iint->inode)
			n = n->rb_left;
		else if (inode > iint->inode)
			n = n->rb_right;
		else
			break;
	}
	if (!n)
		return NULL;

	return iint;
}

/*
 * integrity_iint_find - return the iint associated with an inode
 */
struct integrity_iint_cache *integrity_iint_find(struct inode *inode)
{
	struct integrity_iint_cache *iint;

	if (!IS_IMA(inode))
		return NULL;

64
	read_lock(&integrity_iint_lock);
65
	iint = __integrity_iint_find(inode);
66
	read_unlock(&integrity_iint_lock);
67
68
69
70
71
72

	return iint;
}

static void iint_free(struct integrity_iint_cache *iint)
{
73
74
	kfree(iint->ima_hash);
	iint->ima_hash = NULL;
75
76
	iint->version = 0;
	iint->flags = 0UL;
77
	iint->atomic_flags = 0UL;
78
79
80
	iint->ima_file_status = INTEGRITY_UNKNOWN;
	iint->ima_mmap_status = INTEGRITY_UNKNOWN;
	iint->ima_bprm_status = INTEGRITY_UNKNOWN;
81
	iint->ima_read_status = INTEGRITY_UNKNOWN;
82
	iint->evm_status = INTEGRITY_UNKNOWN;
83
	iint->measured_pcrs = 0;
84
85
86
87
	kmem_cache_free(iint_cache, iint);
}

/**
88
 * integrity_inode_get - find or allocate an iint associated with an inode
89
 * @inode: pointer to the inode
90
91
92
 * @return: allocated iint
 *
 * Caller must lock i_mutex
93
 */
94
struct integrity_iint_cache *integrity_inode_get(struct inode *inode)
95
96
{
	struct rb_node **p;
97
98
	struct rb_node *node, *parent = NULL;
	struct integrity_iint_cache *iint, *test_iint;
99

100
101
102
	iint = integrity_iint_find(inode);
	if (iint)
		return iint;
103

104
105
106
	iint = kmem_cache_alloc(iint_cache, GFP_NOFS);
	if (!iint)
		return NULL;
107

108
	write_lock(&integrity_iint_lock);
109
110
111
112
113
114
115
116
117

	p = &integrity_iint_tree.rb_node;
	while (*p) {
		parent = *p;
		test_iint = rb_entry(parent, struct integrity_iint_cache,
				     rb_node);
		if (inode < test_iint->inode)
			p = &(*p)->rb_left;
		else
118
			p = &(*p)->rb_right;
119
120
	}

121
122
	iint->inode = inode;
	node = &iint->rb_node;
123
	inode->i_flags |= S_IMA;
124
125
	rb_link_node(node, parent, p);
	rb_insert_color(node, &integrity_iint_tree);
126

127
	write_unlock(&integrity_iint_lock);
128
	return iint;
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
}

/**
 * integrity_inode_free - called on security_inode_free
 * @inode: pointer to the inode
 *
 * Free the integrity information(iint) associated with an inode.
 */
void integrity_inode_free(struct inode *inode)
{
	struct integrity_iint_cache *iint;

	if (!IS_IMA(inode))
		return;

144
	write_lock(&integrity_iint_lock);
145
146
	iint = __integrity_iint_find(inode);
	rb_erase(&iint->rb_node, &integrity_iint_tree);
147
	write_unlock(&integrity_iint_lock);
148
149
150
151
152
153
154
155

	iint_free(iint);
}

static void init_once(void *foo)
{
	struct integrity_iint_cache *iint = foo;

156
	memset(iint, 0, sizeof(*iint));
157
158
159
	iint->ima_file_status = INTEGRITY_UNKNOWN;
	iint->ima_mmap_status = INTEGRITY_UNKNOWN;
	iint->ima_bprm_status = INTEGRITY_UNKNOWN;
160
	iint->ima_read_status = INTEGRITY_UNKNOWN;
161
	iint->evm_status = INTEGRITY_UNKNOWN;
162
	mutex_init(&iint->mutex);
163
164
165
166
167
168
169
170
171
172
}

static int __init integrity_iintcache_init(void)
{
	iint_cache =
	    kmem_cache_create("iint_cache", sizeof(struct integrity_iint_cache),
			      0, SLAB_PANIC, init_once);
	return 0;
}
security_initcall(integrity_iintcache_init);
173
174
175
176
177
178
179
180
181
182
183


/*
 * integrity_kernel_read - read data from the file
 *
 * This is a function for reading file content instead of kernel_read().
 * It does not perform locking checks to ensure it cannot be blocked.
 * It does not perform security checks because it is irrelevant for IMA.
 *
 */
int integrity_kernel_read(struct file *file, loff_t offset,
184
			  void *addr, unsigned long count)
185
186
187
{
	mm_segment_t old_fs;
	char __user *buf = (char __user *)addr;
Dmitry Kasatkin's avatar
Dmitry Kasatkin committed
188
	ssize_t ret;
189
190
191
192
193
194

	if (!(file->f_mode & FMODE_READ))
		return -EBADF;

	old_fs = get_fs();
	set_fs(get_ds());
Dmitry Kasatkin's avatar
Dmitry Kasatkin committed
195
	ret = __vfs_read(file, buf, count, &offset);
196
	set_fs(old_fs);
Dmitry Kasatkin's avatar
Dmitry Kasatkin committed
197

198
199
200
	return ret;
}

201
202
203
204
205
206
207
208
209
/*
 * integrity_load_keys - load integrity keys hook
 *
 * Hooks is called from init/main.c:kernel_init_freeable()
 * when rootfs is ready
 */
void __init integrity_load_keys(void)
{
	ima_load_x509();
210
	evm_load_x509();
211
}