Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2184323pxj; Thu, 20 May 2021 01:58:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwdw0W+rMTajI43d6/STkH800eBBUW7CYxwEl1WhVtKE9HWV6W1i7+pFjH32HjTTaB5lXAR X-Received: by 2002:aa7:c548:: with SMTP id s8mr3913005edr.114.1621501127133; Thu, 20 May 2021 01:58:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621501127; cv=none; d=google.com; s=arc-20160816; b=T0U7ia9/aKIV7rKFaMu16GI8YB/tgL+RyFFHvjwC1948LMo4FUFa+BaEWJyfThlNde LqD0H/kC9Tmnl/xUcsbyC9xFIUJAXmPUYjI6mreTQL92BP+n+mlQ8sP/5pw8vfxSK+sC 8yG0Mnk6MJh+fyLcQuKtZzjfjS02zyeBRcS8hWneSAZrpKYSe6800XAi1PoyZ6a5E2Lh jeLr2mxamdxij7KwgTftlpnuTmXNuATfrYuAklXGOWFUpNJGzawr8ICotHzFG2HzowHD faZJgUQWszU96xEgZMQcsEswAO5wABYTwHYYtK/68Ij2LdV62BWTO1qloSGv4DIQwHJP Ssjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=LwOpDgyqpw7Dh0OZmy7TvUcm1ejTT7RCK52mjzDDFVM=; b=ZTzVVbmdnLsOSb9EdVU2gRICpg7lDoJlzqtJWmtU5R2pLxj0Vb6UplL+e+nucWHjoM IW3nwUBrowu0ypevSTOrg0pqgUzfnf3X/xduuM+srVZnyJppAFOYYrn9QmOsyrdtM5+H wDHSqZOIb38C/UMwZ9VBrSAQ121X9xMnLKLgGmY2kpY61DrVM8AITvrDZ8qxE8PqPxzS gG3hxKY1ikWWRr/YNnoUn5+CPP8nSiAnHN8NWqfjCPc4Q5+XSLeY62tSG2aiXyzNMRkt qY3CJx0dgZ7YocevCsKJ+nWSnXehWFO8gUL1lM6fd+wnDN7repuB+kZBksH9Ugjfp/2W e8dA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y9si1568850edd.548.2021.05.20.01.58.23; Thu, 20 May 2021 01:58:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231398AbhETI6q (ORCPT + 99 others); Thu, 20 May 2021 04:58:46 -0400 Received: from frasgout.his.huawei.com ([185.176.79.56]:3084 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231162AbhETI6p (ORCPT ); Thu, 20 May 2021 04:58:45 -0400 Received: from fraeml714-chm.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Fm3LQ6Yq5z6wjYk; Thu, 20 May 2021 16:48:46 +0800 (CST) Received: from roberto-ThinkStation-P620.huawei.com (10.204.62.217) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Thu, 20 May 2021 10:57:21 +0200 From: Roberto Sassu To: , CC: , , , , Roberto Sassu , Christian Brauner Subject: [PATCH 2/7] ima: Introduce template fields iuid and igid Date: Thu, 20 May 2021 10:56:56 +0200 Message-ID: <20210520085701.465369-3-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210520085701.465369-1-roberto.sassu@huawei.com> References: <20210520085701.465369-1-roberto.sassu@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.204.62.217] X-ClientProxiedBy: lhreml752-chm.china.huawei.com (10.201.108.202) To fraeml714-chm.china.huawei.com (10.206.15.33) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch introduces the new template fields iuid and igid, which include respectively the inode UID and GID. If the inode is part of an idmapped mount, the UID and GID are the mapped ones and need to be translated with the new fields mntuidmap and mntgidmap included in a subsequent patch, in order to get the original UID and GID. These fields can be used to verify the EVM portable signature, if it was included with the template fields sig or evmsig. Cc: Christian Brauner Signed-off-by: Roberto Sassu --- Documentation/security/IMA-templates.rst | 2 + security/integrity/ima/ima_template.c | 4 ++ security/integrity/ima/ima_template_lib.c | 58 +++++++++++++++++++++++ security/integrity/ima/ima_template_lib.h | 4 ++ 4 files changed, 68 insertions(+) diff --git a/Documentation/security/IMA-templates.rst b/Documentation/security/IMA-templates.rst index 9f3e86ab028a..bf8ce4cf5878 100644 --- a/Documentation/security/IMA-templates.rst +++ b/Documentation/security/IMA-templates.rst @@ -75,6 +75,8 @@ descriptors by adding their identifier to the format string - 'modsig' the appended file signature; - 'buf': the buffer data that was used to generate the hash without size limitations; - 'evmsig': the EVM portable signature; + - 'iuid': the inode UID; + - 'igid': the inode GID; Below, there is the list of defined template descriptors: diff --git a/security/integrity/ima/ima_template.c b/security/integrity/ima/ima_template.c index 7a60848c04a5..a5ecd9e2581b 100644 --- a/security/integrity/ima/ima_template.c +++ b/security/integrity/ima/ima_template.c @@ -47,6 +47,10 @@ static const struct ima_template_field supported_fields[] = { .field_show = ima_show_template_sig}, {.field_id = "evmsig", .field_init = ima_eventevmsig_init, .field_show = ima_show_template_sig}, + {.field_id = "iuid", .field_init = ima_eventinodeuid_init, + .field_show = ima_show_template_uint}, + {.field_id = "igid", .field_init = ima_eventinodegid_init, + .field_show = ima_show_template_uint}, }; /* diff --git a/security/integrity/ima/ima_template_lib.c b/security/integrity/ima/ima_template_lib.c index f23296c33da1..a191b861548b 100644 --- a/security/integrity/ima/ima_template_lib.c +++ b/security/integrity/ima/ima_template_lib.c @@ -551,3 +551,61 @@ int ima_eventevmsig_init(struct ima_event_data *event_data, kfree(xattr_data); return rc; } + +static int ima_eventinodedac_init_common(struct ima_event_data *event_data, + struct ima_field_data *field_data, + bool get_uid) +{ + struct user_namespace *mnt_userns; + uid_t uid; + gid_t gid; + char *data_ptr = (char *)&uid; + + if (!event_data->file) + return 0; + + mnt_userns = file_mnt_user_ns(event_data->file); + if (get_uid) { + uid = from_kuid(&init_user_ns, + i_uid_into_mnt(mnt_userns, + file_inode(event_data->file))); + } else { + gid = from_kgid(&init_user_ns, + i_gid_into_mnt(mnt_userns, + file_inode(event_data->file))); + data_ptr = (char *)&gid; + } + + if (ima_canonical_fmt) { + if (sizeof(uid) == sizeof(u16)) { + uid = cpu_to_le16(uid); + gid = cpu_to_le16(gid); + } else { + uid = cpu_to_le32(uid); + gid = cpu_to_le32(gid); + } + } + + return ima_write_template_field_data(data_ptr, sizeof(uid), + DATA_FMT_UINT, field_data); +} + +/* + * ima_eventinodeuid_init - include the inode UID as part of the template + * data + */ +int ima_eventinodeuid_init(struct ima_event_data *event_data, + struct ima_field_data *field_data) +{ + return ima_eventinodedac_init_common(event_data, field_data, true); +} + +/* + * ima_eventinodegid_init - include the inode GID as part of the template + * data + */ +int ima_eventinodegid_init(struct ima_event_data *event_data, + struct ima_field_data *field_data) +{ + return ima_eventinodedac_init_common(event_data, field_data, false); +} diff --git a/security/integrity/ima/ima_template_lib.h b/security/integrity/ima/ima_template_lib.h index 54b67c80b315..b0aaf109f386 100644 --- a/security/integrity/ima/ima_template_lib.h +++ b/security/integrity/ima/ima_template_lib.h @@ -50,4 +50,8 @@ int ima_eventmodsig_init(struct ima_event_data *event_data, struct ima_field_data *field_data); int ima_eventevmsig_init(struct ima_event_data *event_data, struct ima_field_data *field_data); +int ima_eventinodeuid_init(struct ima_event_data *event_data, + struct ima_field_data *field_data); +int ima_eventinodegid_init(struct ima_event_data *event_data, + struct ima_field_data *field_data); #endif /* __LINUX_IMA_TEMPLATE_LIB_H */ -- 2.25.1