/** * ipe_bprm_check_security() - ipe security hook function for bprm check. * @bprm: Supplies a pointer to a linux_binprm structure to source the file * being evaluated. * * This LSM hook is called when a binary is loaded through the exec * family of system calls. * * Return: * * %0 - Success * * %-EACCES - Did not pass IPE policy
*/ int ipe_bprm_check_security(struct linux_binprm *bprm)
{ struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
/** * ipe_mmap_file() - ipe security hook function for mmap check. * @f: File being mmap'd. Can be NULL in the case of anonymous memory. * @reqprot: The requested protection on the mmap, passed from usermode. * @prot: The effective protection on the mmap, resolved from reqprot and * system configuration. * @flags: Unused. * * This hook is called when a file is loaded through the mmap * family of system calls. * * Return: * * %0 - Success * * %-EACCES - Did not pass IPE policy
*/ int ipe_mmap_file(struct file *f, unsignedlong reqprot __always_unused, unsignedlong prot, unsignedlong flags)
{ struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
/** * ipe_file_mprotect() - ipe security hook function for mprotect check. * @vma: Existing virtual memory area created by mmap or similar. * @reqprot: The requested protection on the mmap, passed from usermode. * @prot: The effective protection on the mmap, resolved from reqprot and * system configuration. * * This LSM hook is called when a mmap'd region of memory is changing * its protections via mprotect. * * Return: * * %0 - Success * * %-EACCES - Did not pass IPE policy
*/ int ipe_file_mprotect(struct vm_area_struct *vma, unsignedlong reqprot __always_unused, unsignedlong prot)
{ struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT;
/* Already Executable */ if (vma->vm_flags & VM_EXEC) return 0;
/** * ipe_kernel_read_file() - ipe security hook function for kernel read. * @file: Supplies a pointer to the file structure being read in from disk. * @id: Supplies the enumeration identifying the purpose of the read. * @contents: Unused. * * This LSM hook is called when a file is read from disk in the kernel. * * Return: * * %0 - Success * * %-EACCES - Did not pass IPE policy
*/ int ipe_kernel_read_file(struct file *file, enum kernel_read_file_id id, bool contents)
{ struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT; enum ipe_op_type op;
switch (id) { case READING_FIRMWARE:
op = IPE_OP_FIRMWARE; break; case READING_MODULE:
op = IPE_OP_KERNEL_MODULE; break; case READING_KEXEC_INITRAMFS:
op = IPE_OP_KEXEC_INITRAMFS; break; case READING_KEXEC_IMAGE:
op = IPE_OP_KEXEC_IMAGE; break; case READING_POLICY:
op = IPE_OP_POLICY; break; case READING_X509_CERTIFICATE:
op = IPE_OP_X509; break; default:
op = IPE_OP_INVALID;
WARN(1, "no rule setup for kernel_read_file enum %d", id);
}
/** * ipe_kernel_load_data() - ipe security hook function for kernel load data. * @id: Supplies the enumeration identifying the purpose of the load. * @contents: Unused. * * This LSM hook is called when a data buffer provided by userspace is loading * into the kernel. * * Return: * * %0 - Success * * %-EACCES - Did not pass IPE policy
*/ int ipe_kernel_load_data(enum kernel_load_data_id id, bool contents)
{ struct ipe_eval_ctx ctx = IPE_EVAL_CTX_INIT; enum ipe_op_type op;
switch (id) { case LOADING_FIRMWARE:
op = IPE_OP_FIRMWARE; break; case LOADING_MODULE:
op = IPE_OP_KERNEL_MODULE; break; case LOADING_KEXEC_INITRAMFS:
op = IPE_OP_KEXEC_INITRAMFS; break; case LOADING_KEXEC_IMAGE:
op = IPE_OP_KEXEC_IMAGE; break; case LOADING_POLICY:
op = IPE_OP_POLICY; break; case LOADING_X509_CERTIFICATE:
op = IPE_OP_X509; break; default:
op = IPE_OP_INVALID;
WARN(1, "no rule setup for kernel_load_data enum %d", id);
}
/** * ipe_unpack_initramfs() - Mark the current rootfs as initramfs.
*/ void ipe_unpack_initramfs(void)
{
ipe_sb(current->fs->root.mnt->mnt_sb)->initramfs = true;
}
#ifdef CONFIG_IPE_PROP_DM_VERITY /** * ipe_bdev_free_security() - Free IPE's LSM blob of block_devices. * @bdev: Supplies a pointer to a block_device that contains the structure * to free.
*/ void ipe_bdev_free_security(struct block_device *bdev)
{ struct ipe_bdev *blob = ipe_bdev(bdev);
/** * ipe_bdev_setintegrity() - Save integrity data from a bdev to IPE's LSM blob. * @bdev: Supplies a pointer to a block_device that contains the LSM blob. * @type: Supplies the integrity type. * @value: Supplies the value to store. * @size: The size of @value. * * This hook is currently used to save dm-verity's root hash or the existence * of a validated signed dm-verity root hash into LSM blob. * * Return: %0 on success. If an error occurs, the function will return the * -errno.
*/ int ipe_bdev_setintegrity(struct block_device *bdev, enum lsm_integrity_type type, constvoid *value, size_t size)
{ conststruct dm_verity_digest *digest = NULL; struct ipe_bdev *blob = ipe_bdev(bdev); struct digest_info *info = NULL;
if (type == LSM_INT_DMVERITY_SIG_VALID) {
ipe_set_dmverity_signature(blob, value, size);
return 0;
}
if (type != LSM_INT_DMVERITY_ROOTHASH) return -EINVAL;
if (!value) {
ipe_digest_free(blob->root_hash);
blob->root_hash = NULL;
return 0;
}
digest = value;
info = kzalloc(sizeof(*info), GFP_KERNEL); if (!info) return -ENOMEM;
info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL); if (!info->digest) goto err;
info->alg = kstrdup(digest->alg, GFP_KERNEL); if (!info->alg) goto err;
#ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG /** * ipe_inode_setintegrity() - save integrity data from a inode to IPE's LSM blob. * @inode: The inode to source the security blob from. * @type: Supplies the integrity type. * @value: The value to be stored. * @size: The size of @value. * * This hook is currently used to save the existence of a validated fs-verity * builtin signature into LSM blob. * * Return: %0 on success. If an error occurs, the function will return the * -errno.
*/ int ipe_inode_setintegrity(conststruct inode *inode, enum lsm_integrity_type type, constvoid *value, size_t size)
{ struct ipe_inode *inode_sec = ipe_inode(inode);
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.