verified_exec.h revision 1.23 1 /* $NetBSD: verified_exec.h,v 1.23 2005/12/10 02:10:00 elad Exp $ */
2
3 /*-
4 * Copyright 2005 Elad Efrat <elad (at) bsd.org.il>
5 * Copyright 2005 Brett Lymn <blymn (at) netbsd.org>
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Brett Lymn and Elad Efrat
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Neither the name of The NetBSD Foundation nor the names of its
16 * contributors may be used to endorse or promote products derived
17 * from this software without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 *
34 * Definitions for the Verified Executables kernel function.
35 *
36 */
37 #ifndef _SYS_VERIFIED_EXEC_H_
38 #define _SYS_VERIFIED_EXEC_H_
39
40 #include <sys/cdefs.h>
41 #include <sys/param.h>
42 #include <sys/hash.h>
43 #include <uvm/uvm_extern.h>
44 #include <uvm/uvm_pglist.h>
45 #include <uvm/uvm_page.h>
46
47 /* Max length of the fingerprint type string, including terminating \0 char */
48 #define VERIEXEC_TYPE_MAXLEN 9
49
50 struct veriexec_params {
51 unsigned char type;
52 unsigned char fp_type[VERIEXEC_TYPE_MAXLEN];
53 char file[MAXPATHLEN];
54 unsigned int size; /* number of bytes in the fingerprint */
55 unsigned char *fingerprint;
56 };
57
58 struct veriexec_sizing_params {
59 dev_t dev;
60 size_t hash_size;
61 };
62
63 struct veriexec_delete_params {
64 dev_t dev;
65 ino_t ino;
66 };
67
68 /*
69 * Types of veriexec inodes we can have. Ordered from less strict to
70 * most strict -- this is enforced if a duplicate entry is loaded.
71 */
72 #define VERIEXEC_DIRECT 0x01 /* Direct execution (exec) */
73 #define VERIEXEC_INDIRECT 0x02 /* Indirect execution (#!) */
74 #define VERIEXEC_FILE 0x04 /* Plain file (open) */
75 #define VERIEXEC_UNTRUSTED 0x10 /* Untrusted storage */
76
77 #define VERIEXEC_LOAD _IOW('S', 0x1, struct veriexec_params)
78 #define VERIEXEC_TABLESIZE _IOW('S', 0x2, struct veriexec_sizing_params)
79 #define VERIEXEC_DELETE _IOW('S', 0x3, struct veriexec_delete_params)
80
81 /* Verified exec sysctl objects. */
82 #define VERIEXEC_VERBOSE 1 /* Verbosity level. */
83 #define VERIEXEC_STRICT 2 /* Strict mode level. */
84 #define VERIEXEC_ALGORITHMS 3 /* Supported hashing algorithms. */
85 #define VERIEXEC_COUNT 4 /* # of fingerprinted files on device. */
86
87 #ifdef _KERNEL
88 void veriexecattach(struct device *, struct device *, void *);
89 int veriexecopen(dev_t, int, int, struct proc *);
90 int veriexecclose(dev_t, int, int, struct proc *);
91 int veriexecioctl(dev_t, u_long, caddr_t, int, struct proc *);
92
93 /* defined in kern_verifiedexec.c */
94 extern char *veriexec_fp_names;
95 extern int veriexec_verbose;
96 extern int veriexec_strict;
97 /* this one requires sysctl.h to be included before verified_exec.h */
98 #ifdef VERIEXEC_NEED_NODE
99 extern const struct sysctlnode *veriexec_count_node;
100 #endif /* VERIEXEC_NEED_NODE */
101
102 /*
103 * Operations vector for verified exec, this defines the characteristics
104 * for the fingerprint type.
105 */
106
107 /* Function types: init, update, final. */
108 typedef void (*VERIEXEC_INIT_FN)(void *);
109 typedef void (*VERIEXEC_UPDATE_FN)(void *, u_char *, u_int);
110 typedef void (*VERIEXEC_FINAL_FN)(u_char *, void *);
111
112 struct veriexec_fp_ops {
113 char type[VERIEXEC_TYPE_MAXLEN];
114 size_t hash_len;
115 size_t context_size;
116 VERIEXEC_INIT_FN init;
117 VERIEXEC_UPDATE_FN update;
118 VERIEXEC_FINAL_FN final;
119 LIST_ENTRY(veriexec_fp_ops) entries;
120 };
121
122 /*
123 * list structure definitions - needed in kern_exec.c
124 */
125
126 /* An entry in the per-device hash table. */
127 struct veriexec_hash_entry {
128 ino_t inode; /* Inode number. */
129 unsigned char type; /* Entry type. */
130 unsigned char status; /* Evaluation status. */
131 unsigned char page_fp_status; /* Per-page FP status. */
132 unsigned char *fp; /* Fingerprint. */
133 void *page_fp; /* Per-page fingerprints */
134 size_t npages; /* Number of pages. */
135 size_t last_page_size;
136 struct veriexec_fp_ops *ops; /* Fingerprint ops vector*/
137 LIST_ENTRY(veriexec_hash_entry) entries; /* List pointer. */
138 };
139
140 /* Valid status field values. */
141 #define FINGERPRINT_NOTEVAL 0 /* fingerprint has not been evaluated */
142 #define FINGERPRINT_VALID 1 /* fingerprint evaluated and matches list */
143 #define FINGERPRINT_NOMATCH 2 /* fingerprint evaluated but does not match */
144
145 /* Per-page fingerprint status. */
146 #define PAGE_FP_NONE 0 /* no per-page fingerprints. */
147 #define PAGE_FP_READY 1 /* per-page fingerprints ready for use. */
148 #define PAGE_FP_FAIL 2 /* mismatch in per-page fingerprints. */
149
150 LIST_HEAD(veriexec_hashhead, veriexec_hash_entry) *hash_tbl;
151
152 /* Veriexec hash table information. */
153 struct veriexec_hashtbl {
154 struct veriexec_hashhead *hash_tbl;
155 size_t hash_size; /* Number of slots in the table. */
156 dev_t hash_dev; /* Device ID the hash table refers to. */
157 uint64_t hash_count; /* # of fingerprinted files in table. */
158 LIST_ENTRY(veriexec_hashtbl) hash_list;
159 };
160
161 /* Global list of hash tables. */
162 LIST_HEAD(, veriexec_hashtbl) veriexec_tables;
163
164 /* Mask to ensure bounded access to elements in the hash table. */
165 #define VERIEXEC_HASH_MASK(tbl) ((tbl)->hash_size - 1)
166
167 /* Readable values for veriexec_report(). */
168 #define REPORT_NOVERBOSE 0
169 #define REPORT_VERBOSE 1
170 #define REPORT_VERBOSE_HIGH 2
171 #define REPORT_NOPANIC 0
172 #define REPORT_PANIC 1
173 #define REPORT_NOALARM 0
174 #define REPORT_ALARM 1
175
176 /*
177 * Hashing function: Takes an inode number modulus the mask to give back
178 * an index into the hash table.
179 */
180 #define VERIEXEC_HASH(tbl, inode) \
181 (hash32_buf(&(inode), sizeof((inode)), HASH32_BUF_INIT) \
182 & VERIEXEC_HASH_MASK(tbl))
183
184 /* Initialize a fingerprint ops struct. */
185 #define VERIEXEC_OPINIT(ops, fp_type, hashlen, ctx_size, init_fn, \
186 update_fn, final_fn) \
187 do { \
188 (void) strlcpy((ops)->type, fp_type, sizeof((ops)->type)); \
189 (ops)->hash_len = (hashlen); \
190 (ops)->context_size = (ctx_size); \
191 (ops)->init = (VERIEXEC_INIT_FN) (init_fn); \
192 (ops)->update = (VERIEXEC_UPDATE_FN) (update_fn); \
193 (ops)->final = (VERIEXEC_FINAL_FN) (final_fn); \
194 } while (0);
195
196 int veriexec_add_fp_ops(struct veriexec_fp_ops *);
197 void veriexec_init_fp_ops(void);
198 struct veriexec_fp_ops *veriexec_find_ops(u_char *name);
199 int veriexec_fp_calc(struct proc *, struct vnode *,
200 struct veriexec_hash_entry *, uint64_t, u_char *);
201 int veriexec_fp_cmp(struct veriexec_fp_ops *, u_char *, u_char *);
202 struct veriexec_hashtbl *veriexec_tblfind(dev_t);
203 struct veriexec_hash_entry *veriexec_lookup(dev_t, ino_t);
204 int veriexec_hashadd(struct veriexec_hashtbl *, struct veriexec_hash_entry *);
205 int veriexec_verify(struct proc *, struct vnode *, struct vattr *,
206 const u_char *, int, struct veriexec_hash_entry **);
207 int veriexec_page_verify(struct veriexec_hash_entry *, struct vattr *,
208 struct vm_page *, size_t);
209 int veriexec_removechk(struct proc *, struct vnode *, const char *);
210 int veriexec_renamechk(struct vnode *, const char *, const char *);
211 void veriexec_init_fp_ops(void);
212 void veriexec_report(const u_char *, const u_char *, struct vattr *,
213 struct proc *, int, int, int);
214 int veriexec_newtable(struct veriexec_sizing_params *);
215 int veriexec_load(struct veriexec_params *, struct proc *);
216 int veriexec_delete(struct veriexec_delete_params *);
217
218 #endif /* _KERNEL */
219
220 #endif /* !_SYS_VERIFIED_EXEC_H_ */
221