1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2020-2024 Microsoft Corporation. All rights reserved.
7 #include <linux/fs_struct.h>
8 #include <linux/types.h>
9 #include <linux/binfmts.h>
10 #include <linux/mman.h>
11 #include <linux/blk_types.h>
19 * ipe_bprm_check_security() - ipe security hook function for bprm check.
20 * @bprm: Supplies a pointer to a linux_binprm structure to source the file
23 * This LSM hook is called when a binary is loaded through the exec
24 * family of system calls.
28 * * %-EACCES - Did not pass IPE policy
30 int ipe_bprm_check_security(struct linux_binprm
*bprm
)
32 struct ipe_eval_ctx ctx
= IPE_EVAL_CTX_INIT
;
34 ipe_build_eval_ctx(&ctx
, bprm
->file
, IPE_OP_EXEC
, IPE_HOOK_BPRM_CHECK
);
35 return ipe_evaluate_event(&ctx
);
39 * ipe_mmap_file() - ipe security hook function for mmap check.
40 * @f: File being mmap'd. Can be NULL in the case of anonymous memory.
41 * @reqprot: The requested protection on the mmap, passed from usermode.
42 * @prot: The effective protection on the mmap, resolved from reqprot and
43 * system configuration.
46 * This hook is called when a file is loaded through the mmap
47 * family of system calls.
51 * * %-EACCES - Did not pass IPE policy
53 int ipe_mmap_file(struct file
*f
, unsigned long reqprot __always_unused
,
54 unsigned long prot
, unsigned long flags
)
56 struct ipe_eval_ctx ctx
= IPE_EVAL_CTX_INIT
;
58 if (prot
& PROT_EXEC
) {
59 ipe_build_eval_ctx(&ctx
, f
, IPE_OP_EXEC
, IPE_HOOK_MMAP
);
60 return ipe_evaluate_event(&ctx
);
67 * ipe_file_mprotect() - ipe security hook function for mprotect check.
68 * @vma: Existing virtual memory area created by mmap or similar.
69 * @reqprot: The requested protection on the mmap, passed from usermode.
70 * @prot: The effective protection on the mmap, resolved from reqprot and
71 * system configuration.
73 * This LSM hook is called when a mmap'd region of memory is changing
74 * its protections via mprotect.
78 * * %-EACCES - Did not pass IPE policy
80 int ipe_file_mprotect(struct vm_area_struct
*vma
,
81 unsigned long reqprot __always_unused
,
84 struct ipe_eval_ctx ctx
= IPE_EVAL_CTX_INIT
;
86 /* Already Executable */
87 if (vma
->vm_flags
& VM_EXEC
)
90 if (prot
& PROT_EXEC
) {
91 ipe_build_eval_ctx(&ctx
, vma
->vm_file
, IPE_OP_EXEC
, IPE_HOOK_MPROTECT
);
92 return ipe_evaluate_event(&ctx
);
99 * ipe_kernel_read_file() - ipe security hook function for kernel read.
100 * @file: Supplies a pointer to the file structure being read in from disk.
101 * @id: Supplies the enumeration identifying the purpose of the read.
104 * This LSM hook is called when a file is read from disk in the kernel.
108 * * %-EACCES - Did not pass IPE policy
110 int ipe_kernel_read_file(struct file
*file
, enum kernel_read_file_id id
,
113 struct ipe_eval_ctx ctx
= IPE_EVAL_CTX_INIT
;
117 case READING_FIRMWARE
:
118 op
= IPE_OP_FIRMWARE
;
121 op
= IPE_OP_KERNEL_MODULE
;
123 case READING_KEXEC_INITRAMFS
:
124 op
= IPE_OP_KEXEC_INITRAMFS
;
126 case READING_KEXEC_IMAGE
:
127 op
= IPE_OP_KEXEC_IMAGE
;
132 case READING_X509_CERTIFICATE
:
137 WARN(1, "no rule setup for kernel_read_file enum %d", id
);
140 ipe_build_eval_ctx(&ctx
, file
, op
, IPE_HOOK_KERNEL_READ
);
141 return ipe_evaluate_event(&ctx
);
145 * ipe_kernel_load_data() - ipe security hook function for kernel load data.
146 * @id: Supplies the enumeration identifying the purpose of the load.
149 * This LSM hook is called when a data buffer provided by userspace is loading
154 * * %-EACCES - Did not pass IPE policy
156 int ipe_kernel_load_data(enum kernel_load_data_id id
, bool contents
)
158 struct ipe_eval_ctx ctx
= IPE_EVAL_CTX_INIT
;
162 case LOADING_FIRMWARE
:
163 op
= IPE_OP_FIRMWARE
;
166 op
= IPE_OP_KERNEL_MODULE
;
168 case LOADING_KEXEC_INITRAMFS
:
169 op
= IPE_OP_KEXEC_INITRAMFS
;
171 case LOADING_KEXEC_IMAGE
:
172 op
= IPE_OP_KEXEC_IMAGE
;
177 case LOADING_X509_CERTIFICATE
:
182 WARN(1, "no rule setup for kernel_load_data enum %d", id
);
185 ipe_build_eval_ctx(&ctx
, NULL
, op
, IPE_HOOK_KERNEL_LOAD
);
186 return ipe_evaluate_event(&ctx
);
190 * ipe_unpack_initramfs() - Mark the current rootfs as initramfs.
192 void ipe_unpack_initramfs(void)
194 ipe_sb(current
->fs
->root
.mnt
->mnt_sb
)->initramfs
= true;
197 #ifdef CONFIG_IPE_PROP_DM_VERITY
199 * ipe_bdev_free_security() - Free IPE's LSM blob of block_devices.
200 * @bdev: Supplies a pointer to a block_device that contains the structure
203 void ipe_bdev_free_security(struct block_device
*bdev
)
205 struct ipe_bdev
*blob
= ipe_bdev(bdev
);
207 ipe_digest_free(blob
->root_hash
);
210 #ifdef CONFIG_IPE_PROP_DM_VERITY_SIGNATURE
211 static void ipe_set_dmverity_signature(struct ipe_bdev
*blob
,
215 blob
->dm_verity_signed
= size
> 0 && value
;
218 static inline void ipe_set_dmverity_signature(struct ipe_bdev
*blob
,
223 #endif /* CONFIG_IPE_PROP_DM_VERITY_SIGNATURE */
226 * ipe_bdev_setintegrity() - Save integrity data from a bdev to IPE's LSM blob.
227 * @bdev: Supplies a pointer to a block_device that contains the LSM blob.
228 * @type: Supplies the integrity type.
229 * @value: Supplies the value to store.
230 * @size: The size of @value.
232 * This hook is currently used to save dm-verity's root hash or the existence
233 * of a validated signed dm-verity root hash into LSM blob.
235 * Return: %0 on success. If an error occurs, the function will return the
238 int ipe_bdev_setintegrity(struct block_device
*bdev
, enum lsm_integrity_type type
,
239 const void *value
, size_t size
)
241 const struct dm_verity_digest
*digest
= NULL
;
242 struct ipe_bdev
*blob
= ipe_bdev(bdev
);
243 struct digest_info
*info
= NULL
;
245 if (type
== LSM_INT_DMVERITY_SIG_VALID
) {
246 ipe_set_dmverity_signature(blob
, value
, size
);
251 if (type
!= LSM_INT_DMVERITY_ROOTHASH
)
255 ipe_digest_free(blob
->root_hash
);
256 blob
->root_hash
= NULL
;
262 info
= kzalloc(sizeof(*info
), GFP_KERNEL
);
266 info
->digest
= kmemdup(digest
->digest
, digest
->digest_len
, GFP_KERNEL
);
270 info
->alg
= kstrdup(digest
->alg
, GFP_KERNEL
);
274 info
->digest_len
= digest
->digest_len
;
276 ipe_digest_free(blob
->root_hash
);
277 blob
->root_hash
= info
;
281 ipe_digest_free(info
);
285 #endif /* CONFIG_IPE_PROP_DM_VERITY */
287 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
289 * ipe_inode_setintegrity() - save integrity data from a inode to IPE's LSM blob.
290 * @inode: The inode to source the security blob from.
291 * @type: Supplies the integrity type.
292 * @value: The value to be stored.
293 * @size: The size of @value.
295 * This hook is currently used to save the existence of a validated fs-verity
296 * builtin signature into LSM blob.
298 * Return: %0 on success. If an error occurs, the function will return the
301 int ipe_inode_setintegrity(const struct inode
*inode
,
302 enum lsm_integrity_type type
,
303 const void *value
, size_t size
)
305 struct ipe_inode
*inode_sec
= ipe_inode(inode
);
307 if (type
== LSM_INT_FSVERITY_BUILTINSIG_VALID
) {
308 inode_sec
->fs_verity_signed
= size
> 0 && value
;
314 #endif /* CONFIG_CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */