ima_main.c 7.9 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
/*
 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
 *
 * Authors:
 * Reiner Sailer <sailer@watson.ibm.com>
 * Serge Hallyn <serue@us.ibm.com>
 * Kylene Hall <kylene@us.ibm.com>
 * Mimi Zohar <zohar@us.ibm.com>
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation, version 2 of the
 * License.
 *
 * File: ima_main.c
16
 *	implements the IMA hooks: ima_bprm_check, ima_file_mmap,
17
 *	and ima_file_check.
18 19 20 21 22 23
 */
#include <linux/module.h>
#include <linux/file.h>
#include <linux/binfmts.h>
#include <linux/mount.h>
#include <linux/mman.h>
24
#include <linux/slab.h>
25 26 27 28 29 30 31 32

#include "ima.h"

int ima_initialized;

char *ima_hash = "sha1";
static int __init hash_setup(char *str)
{
33 34
	if (strncmp(str, "md5", 3) == 0)
		ima_hash = "md5";
35 36 37 38
	return 1;
}
__setup("ima_hash=", hash_setup);

M
Mimi Zohar 已提交
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87
struct ima_imbalance {
	struct hlist_node node;
	unsigned long fsmagic;
};

/*
 * ima_limit_imbalance - emit one imbalance message per filesystem type
 *
 * Maintain list of filesystem types that do not measure files properly.
 * Return false if unknown, true if known.
 */
static bool ima_limit_imbalance(struct file *file)
{
	static DEFINE_SPINLOCK(ima_imbalance_lock);
	static HLIST_HEAD(ima_imbalance_list);

	struct super_block *sb = file->f_dentry->d_sb;
	struct ima_imbalance *entry;
	struct hlist_node *node;
	bool found = false;

	rcu_read_lock();
	hlist_for_each_entry_rcu(entry, node, &ima_imbalance_list, node) {
		if (entry->fsmagic == sb->s_magic) {
			found = true;
			break;
		}
	}
	rcu_read_unlock();
	if (found)
		goto out;

	entry = kmalloc(sizeof(*entry), GFP_NOFS);
	if (!entry)
		goto out;
	entry->fsmagic = sb->s_magic;
	spin_lock(&ima_imbalance_lock);
	/*
	 * we could have raced and something else might have added this fs
	 * to the list, but we don't really care
	 */
	hlist_add_head_rcu(&entry->node, &ima_imbalance_list);
	spin_unlock(&ima_imbalance_lock);
	printk(KERN_INFO "IMA: unmeasured files on fsmagic: %lX\n",
	       entry->fsmagic);
out:
	return found;
}

88 89 90 91 92
/*
 * Update the counts given an fmode_t
 */
static void ima_inc_counts(struct ima_iint_cache *iint, fmode_t mode)
{
93
	assert_spin_locked(&iint->inode->i_lock);
94 95 96 97 98 99 100

	if ((mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ)
		iint->readcount++;
	if (mode & FMODE_WRITE)
		iint->writecount++;
}

M
Mimi Zohar 已提交
101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118
/*
 * ima_counts_get - increment file counts
 *
 * Maintain read/write counters for all files, but only
 * invalidate the PCR for measured files:
 * 	- Opening a file for write when already open for read,
 *	  results in a time of measure, time of use (ToMToU) error.
 *	- Opening a file for read when already open for write,
 * 	  could result in a file measurement error.
 *
 */
void ima_counts_get(struct file *file)
{
	struct dentry *dentry = file->f_path.dentry;
	struct inode *inode = dentry->d_inode;
	fmode_t mode = file->f_mode;
	struct ima_iint_cache *iint;
	int rc;
119
	bool send_tomtou = false, send_writers = false;
M
Mimi Zohar 已提交
120

M
Mimi Zohar 已提交
121
	if (!iint_initialized || !S_ISREG(inode->i_mode))
M
Mimi Zohar 已提交
122 123 124 125 126
		return;
	iint = ima_iint_find_get(inode);
	if (!iint)
		return;
	mutex_lock(&iint->mutex);
127 128
	spin_lock(&inode->i_lock);

M
Mimi Zohar 已提交
129 130
	if (!ima_initialized)
		goto out;
131

132
	rc = ima_must_measure(iint, inode, MAY_READ, FILE_CHECK);
M
Mimi Zohar 已提交
133 134 135 136
	if (rc < 0)
		goto out;

	if (mode & FMODE_WRITE) {
137 138
		if (iint->readcount)
			send_tomtou = true;
M
Mimi Zohar 已提交
139 140
		goto out;
	}
141 142 143

	if (atomic_read(&inode->i_writecount) > 0)
		send_writers = true;
M
Mimi Zohar 已提交
144 145
out:
	ima_inc_counts(iint, file->f_mode);
146
	spin_unlock(&inode->i_lock);
M
Mimi Zohar 已提交
147 148
	mutex_unlock(&iint->mutex);
	kref_put(&iint->refcount, iint_free);
149 150 151 152 153 154 155

	if (send_tomtou)
		ima_add_violation(inode, dentry->d_name.name, "invalid_pcr",
				  "ToMToU");
	if (send_writers)
		ima_add_violation(inode, dentry->d_name.name, "invalid_pcr",
				  "open_writers");
M
Mimi Zohar 已提交
156 157
}

158 159 160 161
/*
 * Decrement ima counts
 */
static void ima_dec_counts(struct ima_iint_cache *iint, struct inode *inode,
162
			   struct file *file)
163
{
164
	mode_t mode = file->f_mode;
165 166
	bool dump = false;

167
	BUG_ON(!mutex_is_locked(&iint->mutex));
168
	assert_spin_locked(&inode->i_lock);
169

170 171 172
	if ((mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ) {
		if (unlikely(iint->readcount == 0))
			dump = true;
173
		iint->readcount--;
174
	}
175
	if (mode & FMODE_WRITE) {
176 177
		if (unlikely(iint->writecount == 0))
			dump = true;
178 179 180 181 182 183 184
		iint->writecount--;
		if (iint->writecount == 0) {
			if (iint->version != inode->i_version)
				iint->flags &= ~IMA_MEASURED;
		}
	}

185 186
	if (dump && !ima_limit_imbalance(file)) {
		printk(KERN_INFO "%s: open/free imbalance (r:%u w:%u)\n",
187
		       __func__, iint->readcount, iint->writecount);
188 189 190 191
		dump_stack();
	}
}

192 193 194 195 196 197 198 199 200 201 202 203
/**
 * ima_file_free - called on __fput()
 * @file: pointer to file structure being freed
 *
 * Flag files that changed, based on i_version;
 * and decrement the iint readcount/writecount.
 */
void ima_file_free(struct file *file)
{
	struct inode *inode = file->f_dentry->d_inode;
	struct ima_iint_cache *iint;

M
Mimi Zohar 已提交
204
	if (!iint_initialized || !S_ISREG(inode->i_mode))
205 206 207 208 209 210
		return;
	iint = ima_iint_find_get(inode);
	if (!iint)
		return;

	mutex_lock(&iint->mutex);
211 212
	spin_lock(&inode->i_lock);

213
	ima_dec_counts(iint, inode, file);
214 215

	spin_unlock(&inode->i_lock);
216 217 218 219 220 221 222 223 224
	mutex_unlock(&iint->mutex);
	kref_put(&iint->refcount, iint_free);
}

static int process_measurement(struct file *file, const unsigned char *filename,
			       int mask, int function)
{
	struct inode *inode = file->f_dentry->d_inode;
	struct ima_iint_cache *iint;
M
Mimi Zohar 已提交
225
	int rc = 0;
226 227 228

	if (!ima_initialized || !S_ISREG(inode->i_mode))
		return 0;
229
	iint = ima_iint_find_get(inode);
230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291
	if (!iint)
		return -ENOMEM;

	mutex_lock(&iint->mutex);
	rc = ima_must_measure(iint, inode, mask, function);
	if (rc != 0)
		goto out;

	rc = ima_collect_measurement(iint, file);
	if (!rc)
		ima_store_measurement(iint, file, filename);
out:
	mutex_unlock(&iint->mutex);
	kref_put(&iint->refcount, iint_free);
	return rc;
}

/**
 * ima_file_mmap - based on policy, collect/store measurement.
 * @file: pointer to the file to be measured (May be NULL)
 * @prot: contains the protection that will be applied by the kernel.
 *
 * Measure files being mmapped executable based on the ima_must_measure()
 * policy decision.
 *
 * Return 0 on success, an error code on failure.
 * (Based on the results of appraise_measurement().)
 */
int ima_file_mmap(struct file *file, unsigned long prot)
{
	int rc;

	if (!file)
		return 0;
	if (prot & PROT_EXEC)
		rc = process_measurement(file, file->f_dentry->d_name.name,
					 MAY_EXEC, FILE_MMAP);
	return 0;
}

/**
 * ima_bprm_check - based on policy, collect/store measurement.
 * @bprm: contains the linux_binprm structure
 *
 * The OS protects against an executable file, already open for write,
 * from being executed in deny_write_access() and an executable file,
 * already open for execute, from being modified in get_write_access().
 * So we can be certain that what we verify and measure here is actually
 * what is being executed.
 *
 * Return 0 on success, an error code on failure.
 * (Based on the results of appraise_measurement().)
 */
int ima_bprm_check(struct linux_binprm *bprm)
{
	int rc;

	rc = process_measurement(bprm->file, bprm->filename,
				 MAY_EXEC, BPRM_CHECK);
	return 0;
}

M
Mimi Zohar 已提交
292 293 294 295 296 297 298 299 300 301
/**
 * ima_path_check - based on policy, collect/store measurement.
 * @file: pointer to the file to be measured
 * @mask: contains MAY_READ, MAY_WRITE or MAY_EXECUTE
 *
 * Measure files based on the ima_must_measure() policy decision.
 *
 * Always return 0 and audit dentry_open failures.
 * (Return code will be based upon measurement appraisal.)
 */
302
int ima_file_check(struct file *file, int mask)
M
Mimi Zohar 已提交
303 304 305 306 307
{
	int rc;

	rc = process_measurement(file, file->f_dentry->d_name.name,
				 mask & (MAY_READ | MAY_WRITE | MAY_EXEC),
308
				 FILE_CHECK);
M
Mimi Zohar 已提交
309 310
	return 0;
}
311
EXPORT_SYMBOL_GPL(ima_file_check);
M
Mimi Zohar 已提交
312

313 314 315 316 317 318 319 320 321
static int __init init_ima(void)
{
	int error;

	error = ima_init();
	ima_initialized = 1;
	return error;
}

M
Mimi Zohar 已提交
322 323 324 325 326
static void __exit cleanup_ima(void)
{
	ima_cleanup();
}

327 328 329 330
late_initcall(init_ima);	/* Start IMA after the TPM is available */

MODULE_DESCRIPTION("Integrity Measurement Architecture");
MODULE_LICENSE("GPL");