Add a tool for the generation of an IPE policy to be compiled into the
kernel. This policy will be enforced until userland deploys and activates
a new policy.

Signed-off-by: Deven Bowers <deven.de...@linux.microsoft.com>
---
 MAINTAINERS                   |   6 ++
 scripts/Makefile              |   1 +
 scripts/ipe/Makefile          |   2 +
 scripts/ipe/polgen/.gitignore |   1 +
 scripts/ipe/polgen/Makefile   |   7 ++
 scripts/ipe/polgen/polgen.c   | 136 ++++++++++++++++++++++++++++++++++
 6 files changed, 153 insertions(+)
 create mode 100644 scripts/ipe/Makefile
 create mode 100644 scripts/ipe/polgen/.gitignore
 create mode 100644 scripts/ipe/polgen/Makefile
 create mode 100644 scripts/ipe/polgen/polgen.c

diff --git a/MAINTAINERS b/MAINTAINERS
index d53db30d1365..86450be5437b 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -8579,6 +8579,12 @@ S:       Supported
 T:     git 
git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git
 F:     security/integrity/ima/
 
+INTEGRITY POLICY ENFORCEMENT (IPE)
+M:     Deven Bowers <deven.de...@linux.microsoft.com>
+L:     linux-integr...@vger.kernel.org
+S:     Supported
+F:     scripts/ipe/
+
 INTEL 810/815 FRAMEBUFFER DRIVER
 M:     Antonino Daplas <adap...@gmail.com>
 L:     linux-fb...@vger.kernel.org
diff --git a/scripts/Makefile b/scripts/Makefile
index 95ecf970c74c..b3c1882fd6dd 100644
--- a/scripts/Makefile
+++ b/scripts/Makefile
@@ -34,6 +34,7 @@ hostprogs += unifdef
 subdir-$(CONFIG_GCC_PLUGINS) += gcc-plugins
 subdir-$(CONFIG_MODVERSIONS) += genksyms
 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
+subdir-$(CONFIG_SECURITY_IPE) += ipe
 
 # Let clean descend into subdirs
 subdir-        += basic dtc gdb kconfig mod
diff --git a/scripts/ipe/Makefile b/scripts/ipe/Makefile
new file mode 100644
index 000000000000..e87553fbb8d6
--- /dev/null
+++ b/scripts/ipe/Makefile
@@ -0,0 +1,2 @@
+# SPDX-License-Identifier: GPL-2.0-only
+subdir-y := polgen
diff --git a/scripts/ipe/polgen/.gitignore b/scripts/ipe/polgen/.gitignore
new file mode 100644
index 000000000000..80f32f25d200
--- /dev/null
+++ b/scripts/ipe/polgen/.gitignore
@@ -0,0 +1 @@
+polgen
diff --git a/scripts/ipe/polgen/Makefile b/scripts/ipe/polgen/Makefile
new file mode 100644
index 000000000000..a519b594e13c
--- /dev/null
+++ b/scripts/ipe/polgen/Makefile
@@ -0,0 +1,7 @@
+# SPDX-License-Identifier: GPL-2.0
+hostprogs-y    := polgen
+HOST_EXTRACFLAGS += \
+       -I$(srctree)/include \
+       -I$(srctree)/include/uapi \
+
+always         := $(hostprogs-y)
diff --git a/scripts/ipe/polgen/polgen.c b/scripts/ipe/polgen/polgen.c
new file mode 100644
index 000000000000..a80fffe1b27c
--- /dev/null
+++ b/scripts/ipe/polgen/polgen.c
@@ -0,0 +1,136 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) Microsoft Corporation. All rights reserved.
+ */
+
+#include <stdlib.h>
+#include <stddef.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+
+static void usage(const char *const name)
+{
+       printf("Usage: %s OutputFile (PolicyFile)\n", name);
+       exit(EINVAL);
+}
+
+static int policy_to_buffer(const char *pathname, char **buffer, size_t *size)
+{
+       int rc = 0;
+       FILE *fd;
+       char *lbuf;
+       size_t fsize;
+       size_t read;
+
+       fd = fopen(pathname, "r");
+       if (!fd) {
+               rc = errno;
+               goto out;
+       }
+
+       fseek(fd, 0, SEEK_END);
+       fsize = ftell(fd);
+       rewind(fd);
+
+       lbuf = malloc(fsize);
+       if (!lbuf) {
+               rc = ENOMEM;
+               goto out_close;
+       }
+
+       read = fread((void *)lbuf, sizeof(*lbuf), fsize, fd);
+       if (read != fsize) {
+               rc = -1;
+               goto out_free;
+       }
+
+       *buffer = lbuf;
+       *size = fsize;
+       fclose(fd);
+
+       return rc;
+
+out_free:
+       free(lbuf);
+out_close:
+       fclose(fd);
+out:
+       return rc;
+}
+
+static int write_boot_policy(const char *pathname, const char *buf, size_t 
size)
+{
+       FILE *fd;
+       size_t i;
+
+       fd = fopen(pathname, "w");
+       if (!fd)
+               goto err;
+
+       fprintf(fd, "/* This file is automatically generated.");
+       fprintf(fd, " Do not edit. */\n");
+       fprintf(fd, "#include <stddef.h>\n");
+       fprintf(fd, "const char *const ipe_boot_policy =\n");
+
+       if (!buf || size == 0) {
+               fprintf(fd, "\tNULL;\n");
+               fclose(fd);
+               return 0;
+       }
+
+       for (i = 0; i < size; ++i) {
+               if (i == 0)
+                       fprintf(fd, "\t\"");
+
+               switch (buf[i]) {
+               case '"':
+                       fprintf(fd, "\\\"");
+                       break;
+               case '\'':
+                       fprintf(fd, "'");
+                       break;
+               case '\n':
+                       fprintf(fd, "\\n\"\n\t\"");
+                       break;
+               case '\\':
+                       fprintf(fd, "\\\\");
+                       break;
+               default:
+                       fprintf(fd, "%c", buf[i]);
+               }
+       }
+       fprintf(fd, "\";\n");
+       fclose(fd);
+
+       return 0;
+
+err:
+       if (fd)
+               fclose(fd);
+       return errno;
+}
+
+int main(int argc, const char *argv[])
+{
+       int rc = 0;
+       size_t len = 0;
+       char *policy = NULL;
+
+       if (argc < 2)
+               usage(argv[0]);
+
+       if (argc > 2) {
+               rc = policy_to_buffer(argv[2], &policy, &len);
+               if (rc != 0)
+                       goto cleanup;
+       }
+
+       rc = write_boot_policy(argv[1], policy, len);
+cleanup:
+       if (policy)
+               free(policy);
+       if (rc != 0)
+               perror("An error occurred during policy conversion: ");
+       return rc;
+}
-- 
2.27.0


--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit

Reply via email to