162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2005,2006,2007,2008 IBM Corporation 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Authors: 662306a36Sopenharmony_ci * Kylene Hall <kjhall@us.ibm.com> 762306a36Sopenharmony_ci * Reiner Sailer <sailer@us.ibm.com> 862306a36Sopenharmony_ci * Mimi Zohar <zohar@us.ibm.com> 962306a36Sopenharmony_ci * 1062306a36Sopenharmony_ci * File: ima_fs.c 1162306a36Sopenharmony_ci * implemenents security file system for reporting 1262306a36Sopenharmony_ci * current measurement list and IMA statistics 1362306a36Sopenharmony_ci */ 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_ci#include <linux/fcntl.h> 1662306a36Sopenharmony_ci#include <linux/kernel_read_file.h> 1762306a36Sopenharmony_ci#include <linux/slab.h> 1862306a36Sopenharmony_ci#include <linux/init.h> 1962306a36Sopenharmony_ci#include <linux/seq_file.h> 2062306a36Sopenharmony_ci#include <linux/rculist.h> 2162306a36Sopenharmony_ci#include <linux/rcupdate.h> 2262306a36Sopenharmony_ci#include <linux/parser.h> 2362306a36Sopenharmony_ci#include <linux/vmalloc.h> 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci#include "ima.h" 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_cistatic DEFINE_MUTEX(ima_write_mutex); 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cibool ima_canonical_fmt; 3062306a36Sopenharmony_cistatic int __init default_canonical_fmt_setup(char *str) 3162306a36Sopenharmony_ci{ 3262306a36Sopenharmony_ci#ifdef __BIG_ENDIAN 3362306a36Sopenharmony_ci ima_canonical_fmt = true; 3462306a36Sopenharmony_ci#endif 3562306a36Sopenharmony_ci return 1; 3662306a36Sopenharmony_ci} 3762306a36Sopenharmony_ci__setup("ima_canonical_fmt", default_canonical_fmt_setup); 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_cistatic int valid_policy = 1; 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_cistatic ssize_t ima_show_htable_value(char __user *buf, size_t count, 4262306a36Sopenharmony_ci loff_t *ppos, atomic_long_t *val) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci char tmpbuf[32]; /* greater than largest 'long' string value */ 4562306a36Sopenharmony_ci ssize_t len; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci len = scnprintf(tmpbuf, sizeof(tmpbuf), "%li\n", atomic_long_read(val)); 4862306a36Sopenharmony_ci return simple_read_from_buffer(buf, count, ppos, tmpbuf, len); 4962306a36Sopenharmony_ci} 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_cistatic ssize_t ima_show_htable_violations(struct file *filp, 5262306a36Sopenharmony_ci char __user *buf, 5362306a36Sopenharmony_ci size_t count, loff_t *ppos) 5462306a36Sopenharmony_ci{ 5562306a36Sopenharmony_ci return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); 5662306a36Sopenharmony_ci} 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_cistatic const struct file_operations ima_htable_violations_ops = { 5962306a36Sopenharmony_ci .read = ima_show_htable_violations, 6062306a36Sopenharmony_ci .llseek = generic_file_llseek, 6162306a36Sopenharmony_ci}; 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_cistatic ssize_t ima_show_measurements_count(struct file *filp, 6462306a36Sopenharmony_ci char __user *buf, 6562306a36Sopenharmony_ci size_t count, loff_t *ppos) 6662306a36Sopenharmony_ci{ 6762306a36Sopenharmony_ci return ima_show_htable_value(buf, count, ppos, &ima_htable.len); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci} 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_cistatic const struct file_operations ima_measurements_count_ops = { 7262306a36Sopenharmony_ci .read = ima_show_measurements_count, 7362306a36Sopenharmony_ci .llseek = generic_file_llseek, 7462306a36Sopenharmony_ci}; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci/* returns pointer to hlist_node */ 7762306a36Sopenharmony_cistatic void *ima_measurements_start(struct seq_file *m, loff_t *pos) 7862306a36Sopenharmony_ci{ 7962306a36Sopenharmony_ci loff_t l = *pos; 8062306a36Sopenharmony_ci struct ima_queue_entry *qe; 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci /* we need a lock since pos could point beyond last element */ 8362306a36Sopenharmony_ci rcu_read_lock(); 8462306a36Sopenharmony_ci list_for_each_entry_rcu(qe, &ima_measurements, later) { 8562306a36Sopenharmony_ci if (!l--) { 8662306a36Sopenharmony_ci rcu_read_unlock(); 8762306a36Sopenharmony_ci return qe; 8862306a36Sopenharmony_ci } 8962306a36Sopenharmony_ci } 9062306a36Sopenharmony_ci rcu_read_unlock(); 9162306a36Sopenharmony_ci return NULL; 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_cistatic void *ima_measurements_next(struct seq_file *m, void *v, loff_t *pos) 9562306a36Sopenharmony_ci{ 9662306a36Sopenharmony_ci struct ima_queue_entry *qe = v; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci /* lock protects when reading beyond last element 9962306a36Sopenharmony_ci * against concurrent list-extension 10062306a36Sopenharmony_ci */ 10162306a36Sopenharmony_ci rcu_read_lock(); 10262306a36Sopenharmony_ci qe = list_entry_rcu(qe->later.next, struct ima_queue_entry, later); 10362306a36Sopenharmony_ci rcu_read_unlock(); 10462306a36Sopenharmony_ci (*pos)++; 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci return (&qe->later == &ima_measurements) ? NULL : qe; 10762306a36Sopenharmony_ci} 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_cistatic void ima_measurements_stop(struct seq_file *m, void *v) 11062306a36Sopenharmony_ci{ 11162306a36Sopenharmony_ci} 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_civoid ima_putc(struct seq_file *m, void *data, int datalen) 11462306a36Sopenharmony_ci{ 11562306a36Sopenharmony_ci while (datalen--) 11662306a36Sopenharmony_ci seq_putc(m, *(char *)data++); 11762306a36Sopenharmony_ci} 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci/* print format: 12062306a36Sopenharmony_ci * 32bit-le=pcr# 12162306a36Sopenharmony_ci * char[20]=template digest 12262306a36Sopenharmony_ci * 32bit-le=template name size 12362306a36Sopenharmony_ci * char[n]=template name 12462306a36Sopenharmony_ci * [eventdata length] 12562306a36Sopenharmony_ci * eventdata[n]=template specific data 12662306a36Sopenharmony_ci */ 12762306a36Sopenharmony_ciint ima_measurements_show(struct seq_file *m, void *v) 12862306a36Sopenharmony_ci{ 12962306a36Sopenharmony_ci /* the list never shrinks, so we don't need a lock here */ 13062306a36Sopenharmony_ci struct ima_queue_entry *qe = v; 13162306a36Sopenharmony_ci struct ima_template_entry *e; 13262306a36Sopenharmony_ci char *template_name; 13362306a36Sopenharmony_ci u32 pcr, namelen, template_data_len; /* temporary fields */ 13462306a36Sopenharmony_ci bool is_ima_template = false; 13562306a36Sopenharmony_ci int i; 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci /* get entry */ 13862306a36Sopenharmony_ci e = qe->entry; 13962306a36Sopenharmony_ci if (e == NULL) 14062306a36Sopenharmony_ci return -1; 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci template_name = (e->template_desc->name[0] != '\0') ? 14362306a36Sopenharmony_ci e->template_desc->name : e->template_desc->fmt; 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_ci /* 14662306a36Sopenharmony_ci * 1st: PCRIndex 14762306a36Sopenharmony_ci * PCR used defaults to the same (config option) in 14862306a36Sopenharmony_ci * little-endian format, unless set in policy 14962306a36Sopenharmony_ci */ 15062306a36Sopenharmony_ci pcr = !ima_canonical_fmt ? e->pcr : (__force u32)cpu_to_le32(e->pcr); 15162306a36Sopenharmony_ci ima_putc(m, &pcr, sizeof(e->pcr)); 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci /* 2nd: template digest */ 15462306a36Sopenharmony_ci ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci /* 3rd: template name size */ 15762306a36Sopenharmony_ci namelen = !ima_canonical_fmt ? strlen(template_name) : 15862306a36Sopenharmony_ci (__force u32)cpu_to_le32(strlen(template_name)); 15962306a36Sopenharmony_ci ima_putc(m, &namelen, sizeof(namelen)); 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci /* 4th: template name */ 16262306a36Sopenharmony_ci ima_putc(m, template_name, strlen(template_name)); 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci /* 5th: template length (except for 'ima' template) */ 16562306a36Sopenharmony_ci if (strcmp(template_name, IMA_TEMPLATE_IMA_NAME) == 0) 16662306a36Sopenharmony_ci is_ima_template = true; 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci if (!is_ima_template) { 16962306a36Sopenharmony_ci template_data_len = !ima_canonical_fmt ? e->template_data_len : 17062306a36Sopenharmony_ci (__force u32)cpu_to_le32(e->template_data_len); 17162306a36Sopenharmony_ci ima_putc(m, &template_data_len, sizeof(e->template_data_len)); 17262306a36Sopenharmony_ci } 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci /* 6th: template specific data */ 17562306a36Sopenharmony_ci for (i = 0; i < e->template_desc->num_fields; i++) { 17662306a36Sopenharmony_ci enum ima_show_type show = IMA_SHOW_BINARY; 17762306a36Sopenharmony_ci const struct ima_template_field *field = 17862306a36Sopenharmony_ci e->template_desc->fields[i]; 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci if (is_ima_template && strcmp(field->field_id, "d") == 0) 18162306a36Sopenharmony_ci show = IMA_SHOW_BINARY_NO_FIELD_LEN; 18262306a36Sopenharmony_ci if (is_ima_template && strcmp(field->field_id, "n") == 0) 18362306a36Sopenharmony_ci show = IMA_SHOW_BINARY_OLD_STRING_FMT; 18462306a36Sopenharmony_ci field->field_show(m, show, &e->template_data[i]); 18562306a36Sopenharmony_ci } 18662306a36Sopenharmony_ci return 0; 18762306a36Sopenharmony_ci} 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_cistatic const struct seq_operations ima_measurments_seqops = { 19062306a36Sopenharmony_ci .start = ima_measurements_start, 19162306a36Sopenharmony_ci .next = ima_measurements_next, 19262306a36Sopenharmony_ci .stop = ima_measurements_stop, 19362306a36Sopenharmony_ci .show = ima_measurements_show 19462306a36Sopenharmony_ci}; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_cistatic int ima_measurements_open(struct inode *inode, struct file *file) 19762306a36Sopenharmony_ci{ 19862306a36Sopenharmony_ci return seq_open(file, &ima_measurments_seqops); 19962306a36Sopenharmony_ci} 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistatic const struct file_operations ima_measurements_ops = { 20262306a36Sopenharmony_ci .open = ima_measurements_open, 20362306a36Sopenharmony_ci .read = seq_read, 20462306a36Sopenharmony_ci .llseek = seq_lseek, 20562306a36Sopenharmony_ci .release = seq_release, 20662306a36Sopenharmony_ci}; 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_civoid ima_print_digest(struct seq_file *m, u8 *digest, u32 size) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci u32 i; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci for (i = 0; i < size; i++) 21362306a36Sopenharmony_ci seq_printf(m, "%02x", *(digest + i)); 21462306a36Sopenharmony_ci} 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_ci/* print in ascii */ 21762306a36Sopenharmony_cistatic int ima_ascii_measurements_show(struct seq_file *m, void *v) 21862306a36Sopenharmony_ci{ 21962306a36Sopenharmony_ci /* the list never shrinks, so we don't need a lock here */ 22062306a36Sopenharmony_ci struct ima_queue_entry *qe = v; 22162306a36Sopenharmony_ci struct ima_template_entry *e; 22262306a36Sopenharmony_ci char *template_name; 22362306a36Sopenharmony_ci int i; 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci /* get entry */ 22662306a36Sopenharmony_ci e = qe->entry; 22762306a36Sopenharmony_ci if (e == NULL) 22862306a36Sopenharmony_ci return -1; 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci template_name = (e->template_desc->name[0] != '\0') ? 23162306a36Sopenharmony_ci e->template_desc->name : e->template_desc->fmt; 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci /* 1st: PCR used (config option) */ 23462306a36Sopenharmony_ci seq_printf(m, "%2d ", e->pcr); 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci /* 2nd: SHA1 template hash */ 23762306a36Sopenharmony_ci ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ci /* 3th: template name */ 24062306a36Sopenharmony_ci seq_printf(m, " %s", template_name); 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci /* 4th: template specific data */ 24362306a36Sopenharmony_ci for (i = 0; i < e->template_desc->num_fields; i++) { 24462306a36Sopenharmony_ci seq_puts(m, " "); 24562306a36Sopenharmony_ci if (e->template_data[i].len == 0) 24662306a36Sopenharmony_ci continue; 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci e->template_desc->fields[i]->field_show(m, IMA_SHOW_ASCII, 24962306a36Sopenharmony_ci &e->template_data[i]); 25062306a36Sopenharmony_ci } 25162306a36Sopenharmony_ci seq_puts(m, "\n"); 25262306a36Sopenharmony_ci return 0; 25362306a36Sopenharmony_ci} 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_cistatic const struct seq_operations ima_ascii_measurements_seqops = { 25662306a36Sopenharmony_ci .start = ima_measurements_start, 25762306a36Sopenharmony_ci .next = ima_measurements_next, 25862306a36Sopenharmony_ci .stop = ima_measurements_stop, 25962306a36Sopenharmony_ci .show = ima_ascii_measurements_show 26062306a36Sopenharmony_ci}; 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_cistatic int ima_ascii_measurements_open(struct inode *inode, struct file *file) 26362306a36Sopenharmony_ci{ 26462306a36Sopenharmony_ci return seq_open(file, &ima_ascii_measurements_seqops); 26562306a36Sopenharmony_ci} 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_cistatic const struct file_operations ima_ascii_measurements_ops = { 26862306a36Sopenharmony_ci .open = ima_ascii_measurements_open, 26962306a36Sopenharmony_ci .read = seq_read, 27062306a36Sopenharmony_ci .llseek = seq_lseek, 27162306a36Sopenharmony_ci .release = seq_release, 27262306a36Sopenharmony_ci}; 27362306a36Sopenharmony_ci 27462306a36Sopenharmony_cistatic ssize_t ima_read_policy(char *path) 27562306a36Sopenharmony_ci{ 27662306a36Sopenharmony_ci void *data = NULL; 27762306a36Sopenharmony_ci char *datap; 27862306a36Sopenharmony_ci size_t size; 27962306a36Sopenharmony_ci int rc, pathlen = strlen(path); 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_ci char *p; 28262306a36Sopenharmony_ci 28362306a36Sopenharmony_ci /* remove \n */ 28462306a36Sopenharmony_ci datap = path; 28562306a36Sopenharmony_ci strsep(&datap, "\n"); 28662306a36Sopenharmony_ci 28762306a36Sopenharmony_ci rc = kernel_read_file_from_path(path, 0, &data, INT_MAX, NULL, 28862306a36Sopenharmony_ci READING_POLICY); 28962306a36Sopenharmony_ci if (rc < 0) { 29062306a36Sopenharmony_ci pr_err("Unable to open file: %s (%d)", path, rc); 29162306a36Sopenharmony_ci return rc; 29262306a36Sopenharmony_ci } 29362306a36Sopenharmony_ci size = rc; 29462306a36Sopenharmony_ci rc = 0; 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci datap = data; 29762306a36Sopenharmony_ci while (size > 0 && (p = strsep(&datap, "\n"))) { 29862306a36Sopenharmony_ci pr_debug("rule: %s\n", p); 29962306a36Sopenharmony_ci rc = ima_parse_add_rule(p); 30062306a36Sopenharmony_ci if (rc < 0) 30162306a36Sopenharmony_ci break; 30262306a36Sopenharmony_ci size -= rc; 30362306a36Sopenharmony_ci } 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_ci vfree(data); 30662306a36Sopenharmony_ci if (rc < 0) 30762306a36Sopenharmony_ci return rc; 30862306a36Sopenharmony_ci else if (size) 30962306a36Sopenharmony_ci return -EINVAL; 31062306a36Sopenharmony_ci else 31162306a36Sopenharmony_ci return pathlen; 31262306a36Sopenharmony_ci} 31362306a36Sopenharmony_ci 31462306a36Sopenharmony_cistatic ssize_t ima_write_policy(struct file *file, const char __user *buf, 31562306a36Sopenharmony_ci size_t datalen, loff_t *ppos) 31662306a36Sopenharmony_ci{ 31762306a36Sopenharmony_ci char *data; 31862306a36Sopenharmony_ci ssize_t result; 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci if (datalen >= PAGE_SIZE) 32162306a36Sopenharmony_ci datalen = PAGE_SIZE - 1; 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_ci /* No partial writes. */ 32462306a36Sopenharmony_ci result = -EINVAL; 32562306a36Sopenharmony_ci if (*ppos != 0) 32662306a36Sopenharmony_ci goto out; 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci data = memdup_user_nul(buf, datalen); 32962306a36Sopenharmony_ci if (IS_ERR(data)) { 33062306a36Sopenharmony_ci result = PTR_ERR(data); 33162306a36Sopenharmony_ci goto out; 33262306a36Sopenharmony_ci } 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci result = mutex_lock_interruptible(&ima_write_mutex); 33562306a36Sopenharmony_ci if (result < 0) 33662306a36Sopenharmony_ci goto out_free; 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci if (data[0] == '/') { 33962306a36Sopenharmony_ci result = ima_read_policy(data); 34062306a36Sopenharmony_ci } else if (ima_appraise & IMA_APPRAISE_POLICY) { 34162306a36Sopenharmony_ci pr_err("signed policy file (specified as an absolute pathname) required\n"); 34262306a36Sopenharmony_ci integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL, 34362306a36Sopenharmony_ci "policy_update", "signed policy required", 34462306a36Sopenharmony_ci 1, 0); 34562306a36Sopenharmony_ci result = -EACCES; 34662306a36Sopenharmony_ci } else { 34762306a36Sopenharmony_ci result = ima_parse_add_rule(data); 34862306a36Sopenharmony_ci } 34962306a36Sopenharmony_ci mutex_unlock(&ima_write_mutex); 35062306a36Sopenharmony_ciout_free: 35162306a36Sopenharmony_ci kfree(data); 35262306a36Sopenharmony_ciout: 35362306a36Sopenharmony_ci if (result < 0) 35462306a36Sopenharmony_ci valid_policy = 0; 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci return result; 35762306a36Sopenharmony_ci} 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_cistatic struct dentry *ima_dir; 36062306a36Sopenharmony_cistatic struct dentry *ima_symlink; 36162306a36Sopenharmony_cistatic struct dentry *binary_runtime_measurements; 36262306a36Sopenharmony_cistatic struct dentry *ascii_runtime_measurements; 36362306a36Sopenharmony_cistatic struct dentry *runtime_measurements_count; 36462306a36Sopenharmony_cistatic struct dentry *violations; 36562306a36Sopenharmony_cistatic struct dentry *ima_policy; 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_cienum ima_fs_flags { 36862306a36Sopenharmony_ci IMA_FS_BUSY, 36962306a36Sopenharmony_ci}; 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_cistatic unsigned long ima_fs_flags; 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ci#ifdef CONFIG_IMA_READ_POLICY 37462306a36Sopenharmony_cistatic const struct seq_operations ima_policy_seqops = { 37562306a36Sopenharmony_ci .start = ima_policy_start, 37662306a36Sopenharmony_ci .next = ima_policy_next, 37762306a36Sopenharmony_ci .stop = ima_policy_stop, 37862306a36Sopenharmony_ci .show = ima_policy_show, 37962306a36Sopenharmony_ci}; 38062306a36Sopenharmony_ci#endif 38162306a36Sopenharmony_ci 38262306a36Sopenharmony_ci/* 38362306a36Sopenharmony_ci * ima_open_policy: sequentialize access to the policy file 38462306a36Sopenharmony_ci */ 38562306a36Sopenharmony_cistatic int ima_open_policy(struct inode *inode, struct file *filp) 38662306a36Sopenharmony_ci{ 38762306a36Sopenharmony_ci if (!(filp->f_flags & O_WRONLY)) { 38862306a36Sopenharmony_ci#ifndef CONFIG_IMA_READ_POLICY 38962306a36Sopenharmony_ci return -EACCES; 39062306a36Sopenharmony_ci#else 39162306a36Sopenharmony_ci if ((filp->f_flags & O_ACCMODE) != O_RDONLY) 39262306a36Sopenharmony_ci return -EACCES; 39362306a36Sopenharmony_ci if (!capable(CAP_SYS_ADMIN)) 39462306a36Sopenharmony_ci return -EPERM; 39562306a36Sopenharmony_ci return seq_open(filp, &ima_policy_seqops); 39662306a36Sopenharmony_ci#endif 39762306a36Sopenharmony_ci } 39862306a36Sopenharmony_ci if (test_and_set_bit(IMA_FS_BUSY, &ima_fs_flags)) 39962306a36Sopenharmony_ci return -EBUSY; 40062306a36Sopenharmony_ci return 0; 40162306a36Sopenharmony_ci} 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci/* 40462306a36Sopenharmony_ci * ima_release_policy - start using the new measure policy rules. 40562306a36Sopenharmony_ci * 40662306a36Sopenharmony_ci * Initially, ima_measure points to the default policy rules, now 40762306a36Sopenharmony_ci * point to the new policy rules, and remove the securityfs policy file, 40862306a36Sopenharmony_ci * assuming a valid policy. 40962306a36Sopenharmony_ci */ 41062306a36Sopenharmony_cistatic int ima_release_policy(struct inode *inode, struct file *file) 41162306a36Sopenharmony_ci{ 41262306a36Sopenharmony_ci const char *cause = valid_policy ? "completed" : "failed"; 41362306a36Sopenharmony_ci 41462306a36Sopenharmony_ci if ((file->f_flags & O_ACCMODE) == O_RDONLY) 41562306a36Sopenharmony_ci return seq_release(inode, file); 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci if (valid_policy && ima_check_policy() < 0) { 41862306a36Sopenharmony_ci cause = "failed"; 41962306a36Sopenharmony_ci valid_policy = 0; 42062306a36Sopenharmony_ci } 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_ci pr_info("policy update %s\n", cause); 42362306a36Sopenharmony_ci integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL, 42462306a36Sopenharmony_ci "policy_update", cause, !valid_policy, 0); 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci if (!valid_policy) { 42762306a36Sopenharmony_ci ima_delete_rules(); 42862306a36Sopenharmony_ci valid_policy = 1; 42962306a36Sopenharmony_ci clear_bit(IMA_FS_BUSY, &ima_fs_flags); 43062306a36Sopenharmony_ci return 0; 43162306a36Sopenharmony_ci } 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci ima_update_policy(); 43462306a36Sopenharmony_ci#if !defined(CONFIG_IMA_WRITE_POLICY) && !defined(CONFIG_IMA_READ_POLICY) 43562306a36Sopenharmony_ci securityfs_remove(ima_policy); 43662306a36Sopenharmony_ci ima_policy = NULL; 43762306a36Sopenharmony_ci#elif defined(CONFIG_IMA_WRITE_POLICY) 43862306a36Sopenharmony_ci clear_bit(IMA_FS_BUSY, &ima_fs_flags); 43962306a36Sopenharmony_ci#elif defined(CONFIG_IMA_READ_POLICY) 44062306a36Sopenharmony_ci inode->i_mode &= ~S_IWUSR; 44162306a36Sopenharmony_ci#endif 44262306a36Sopenharmony_ci return 0; 44362306a36Sopenharmony_ci} 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_cistatic const struct file_operations ima_measure_policy_ops = { 44662306a36Sopenharmony_ci .open = ima_open_policy, 44762306a36Sopenharmony_ci .write = ima_write_policy, 44862306a36Sopenharmony_ci .read = seq_read, 44962306a36Sopenharmony_ci .release = ima_release_policy, 45062306a36Sopenharmony_ci .llseek = generic_file_llseek, 45162306a36Sopenharmony_ci}; 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ciint __init ima_fs_init(void) 45462306a36Sopenharmony_ci{ 45562306a36Sopenharmony_ci int ret; 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci ima_dir = securityfs_create_dir("ima", integrity_dir); 45862306a36Sopenharmony_ci if (IS_ERR(ima_dir)) 45962306a36Sopenharmony_ci return PTR_ERR(ima_dir); 46062306a36Sopenharmony_ci 46162306a36Sopenharmony_ci ima_symlink = securityfs_create_symlink("ima", NULL, "integrity/ima", 46262306a36Sopenharmony_ci NULL); 46362306a36Sopenharmony_ci if (IS_ERR(ima_symlink)) { 46462306a36Sopenharmony_ci ret = PTR_ERR(ima_symlink); 46562306a36Sopenharmony_ci goto out; 46662306a36Sopenharmony_ci } 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci binary_runtime_measurements = 46962306a36Sopenharmony_ci securityfs_create_file("binary_runtime_measurements", 47062306a36Sopenharmony_ci S_IRUSR | S_IRGRP, ima_dir, NULL, 47162306a36Sopenharmony_ci &ima_measurements_ops); 47262306a36Sopenharmony_ci if (IS_ERR(binary_runtime_measurements)) { 47362306a36Sopenharmony_ci ret = PTR_ERR(binary_runtime_measurements); 47462306a36Sopenharmony_ci goto out; 47562306a36Sopenharmony_ci } 47662306a36Sopenharmony_ci 47762306a36Sopenharmony_ci ascii_runtime_measurements = 47862306a36Sopenharmony_ci securityfs_create_file("ascii_runtime_measurements", 47962306a36Sopenharmony_ci S_IRUSR | S_IRGRP, ima_dir, NULL, 48062306a36Sopenharmony_ci &ima_ascii_measurements_ops); 48162306a36Sopenharmony_ci if (IS_ERR(ascii_runtime_measurements)) { 48262306a36Sopenharmony_ci ret = PTR_ERR(ascii_runtime_measurements); 48362306a36Sopenharmony_ci goto out; 48462306a36Sopenharmony_ci } 48562306a36Sopenharmony_ci 48662306a36Sopenharmony_ci runtime_measurements_count = 48762306a36Sopenharmony_ci securityfs_create_file("runtime_measurements_count", 48862306a36Sopenharmony_ci S_IRUSR | S_IRGRP, ima_dir, NULL, 48962306a36Sopenharmony_ci &ima_measurements_count_ops); 49062306a36Sopenharmony_ci if (IS_ERR(runtime_measurements_count)) { 49162306a36Sopenharmony_ci ret = PTR_ERR(runtime_measurements_count); 49262306a36Sopenharmony_ci goto out; 49362306a36Sopenharmony_ci } 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci violations = 49662306a36Sopenharmony_ci securityfs_create_file("violations", S_IRUSR | S_IRGRP, 49762306a36Sopenharmony_ci ima_dir, NULL, &ima_htable_violations_ops); 49862306a36Sopenharmony_ci if (IS_ERR(violations)) { 49962306a36Sopenharmony_ci ret = PTR_ERR(violations); 50062306a36Sopenharmony_ci goto out; 50162306a36Sopenharmony_ci } 50262306a36Sopenharmony_ci 50362306a36Sopenharmony_ci ima_policy = securityfs_create_file("policy", POLICY_FILE_FLAGS, 50462306a36Sopenharmony_ci ima_dir, NULL, 50562306a36Sopenharmony_ci &ima_measure_policy_ops); 50662306a36Sopenharmony_ci if (IS_ERR(ima_policy)) { 50762306a36Sopenharmony_ci ret = PTR_ERR(ima_policy); 50862306a36Sopenharmony_ci goto out; 50962306a36Sopenharmony_ci } 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci return 0; 51262306a36Sopenharmony_ciout: 51362306a36Sopenharmony_ci securityfs_remove(ima_policy); 51462306a36Sopenharmony_ci securityfs_remove(violations); 51562306a36Sopenharmony_ci securityfs_remove(runtime_measurements_count); 51662306a36Sopenharmony_ci securityfs_remove(ascii_runtime_measurements); 51762306a36Sopenharmony_ci securityfs_remove(binary_runtime_measurements); 51862306a36Sopenharmony_ci securityfs_remove(ima_symlink); 51962306a36Sopenharmony_ci securityfs_remove(ima_dir); 52062306a36Sopenharmony_ci 52162306a36Sopenharmony_ci return ret; 52262306a36Sopenharmony_ci} 523