summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/progs/ima.c
blob: 9633e5f2453dec74fd3c78871b053456f09a7bba (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
// SPDX-License-Identifier: GPL-2.0

/*
 * Copyright 2020 Google LLC.
 */

#include "vmlinux.h"
#include <errno.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>

u32 monitored_pid = 0;

struct {
	__uint(type, BPF_MAP_TYPE_RINGBUF);
	__uint(max_entries, 1 << 12);
} ringbuf SEC(".maps");

char _license[] SEC("license") = "GPL";

bool use_ima_file_hash;
bool enable_bprm_creds_for_exec;

static void ima_test_common(struct file *file)
{
	u64 ima_hash = 0;
	u64 *sample;
	int ret;
	u32 pid;

	pid = bpf_get_current_pid_tgid() >> 32;
	if (pid == monitored_pid) {
		if (!use_ima_file_hash)
			ret = bpf_ima_inode_hash(file->f_inode, &ima_hash,
						 sizeof(ima_hash));
		else
			ret = bpf_ima_file_hash(file, &ima_hash,
						sizeof(ima_hash));
		if (ret < 0 || ima_hash == 0)
			return;

		sample = bpf_ringbuf_reserve(&ringbuf, sizeof(u64), 0);
		if (!sample)
			return;

		*sample = ima_hash;
		bpf_ringbuf_submit(sample, 0);
	}

	return;
}

SEC("lsm.s/bprm_committed_creds")
void BPF_PROG(bprm_committed_creds, struct linux_binprm *bprm)
{
	ima_test_common(bprm->file);
}

SEC("lsm.s/bprm_creds_for_exec")
int BPF_PROG(bprm_creds_for_exec, struct linux_binprm *bprm)
{
	if (!enable_bprm_creds_for_exec)
		return 0;

	ima_test_common(bprm->file);
	return 0;
}