1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17#ifndef __LINUX_IMA_H
18#define __LINUX_IMA_H
19
20#include <linux/types.h>
21#include <linux/crypto.h>
22#include <linux/security.h>
23#include <linux/hash.h>
24#include <linux/tpm.h>
25#include <linux/audit.h>
26
27#include "../integrity.h"
28
29enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_ASCII };
30enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 };
31
32
33#define IMA_DIGEST_SIZE SHA1_DIGEST_SIZE
34#define IMA_EVENT_NAME_LEN_MAX 255
35
36#define IMA_HASH_BITS 9
37#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
38
39
40extern int ima_initialized;
41extern int ima_used_chip;
42extern char *ima_hash;
43extern int ima_appraise;
44
45
46struct ima_template_data {
47 u8 digest[IMA_DIGEST_SIZE];
48 char file_name[IMA_EVENT_NAME_LEN_MAX + 1];
49};
50
51struct ima_template_entry {
52 u8 digest[IMA_DIGEST_SIZE];
53 const char *template_name;
54 int template_len;
55 struct ima_template_data template;
56};
57
58struct ima_queue_entry {
59 struct hlist_node hnext;
60 struct list_head later;
61 struct ima_template_entry *entry;
62};
63extern struct list_head ima_measurements;
64
65#ifdef CONFIG_IMA_AUDIT
66
67void integrity_audit_msg(int audit_msgno, struct inode *inode,
68 const unsigned char *fname, const char *op,
69 const char *cause, int result, int info);
70#else
71static inline void integrity_audit_msg(int audit_msgno, struct inode *inode,
72 const unsigned char *fname,
73 const char *op, const char *cause,
74 int result, int info)
75{
76}
77#endif
78
79
80int ima_init(void);
81void ima_cleanup(void);
82int ima_fs_init(void);
83void ima_fs_cleanup(void);
84int ima_inode_alloc(struct inode *inode);
85int ima_add_template_entry(struct ima_template_entry *entry, int violation,
86 const char *op, struct inode *inode);
87int ima_calc_file_hash(struct file *file, char *digest);
88int ima_calc_buffer_hash(const void *data, int len, char *digest);
89int ima_calc_boot_aggregate(char *digest);
90void ima_add_violation(struct inode *inode, const unsigned char *filename,
91 const char *op, const char *cause);
92int ima_init_crypto(void);
93
94
95
96
97extern spinlock_t ima_queue_lock;
98
99struct ima_h_table {
100 atomic_long_t len;
101 atomic_long_t violations;
102 struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE];
103};
104extern struct ima_h_table ima_htable;
105
106static inline unsigned long ima_hash_key(u8 *digest)
107{
108 return hash_long(*digest, IMA_HASH_BITS);
109}
110
111
112int ima_get_action(struct inode *inode, int mask, int function);
113int ima_must_measure(struct inode *inode, int mask, int function);
114int ima_collect_measurement(struct integrity_iint_cache *iint,
115 struct file *file);
116void ima_store_measurement(struct integrity_iint_cache *iint, struct file *file,
117 const unsigned char *filename);
118void ima_audit_measurement(struct integrity_iint_cache *iint,
119 const unsigned char *filename);
120int ima_store_template(struct ima_template_entry *entry, int violation,
121 struct inode *inode);
122void ima_template_show(struct seq_file *m, void *e, enum ima_show_type show);
123const char *ima_d_path(struct path *path, char **pathbuf);
124
125
126
127
128struct integrity_iint_cache *integrity_iint_insert(struct inode *inode);
129struct integrity_iint_cache *integrity_iint_find(struct inode *inode);
130
131
132enum ima_hooks { FILE_CHECK = 1, MMAP_CHECK, BPRM_CHECK, MODULE_CHECK, POST_SETATTR };
133
134int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
135 int flags);
136void ima_init_policy(void);
137void ima_update_policy(void);
138ssize_t ima_parse_add_rule(char *);
139void ima_delete_rules(void);
140
141
142#define IMA_APPRAISE_ENFORCE 0x01
143#define IMA_APPRAISE_FIX 0x02
144#define IMA_APPRAISE_MODULES 0x04
145
146#ifdef CONFIG_IMA_APPRAISE
147int ima_appraise_measurement(int func, struct integrity_iint_cache *iint,
148 struct file *file, const unsigned char *filename);
149int ima_must_appraise(struct inode *inode, int mask, enum ima_hooks func);
150void ima_update_xattr(struct integrity_iint_cache *iint, struct file *file);
151enum integrity_status ima_get_cache_status(struct integrity_iint_cache *iint,
152 int func);
153
154#else
155static inline int ima_appraise_measurement(int func,
156 struct integrity_iint_cache *iint,
157 struct file *file,
158 const unsigned char *filename)
159{
160 return INTEGRITY_UNKNOWN;
161}
162
163static inline int ima_must_appraise(struct inode *inode, int mask,
164 enum ima_hooks func)
165{
166 return 0;
167}
168
169static inline void ima_update_xattr(struct integrity_iint_cache *iint,
170 struct file *file)
171{
172}
173
174static inline enum integrity_status ima_get_cache_status(struct integrity_iint_cache
175 *iint, int func)
176{
177 return INTEGRITY_UNKNOWN;
178}
179#endif
180
181
182#ifdef CONFIG_IMA_LSM_RULES
183
184#define security_filter_rule_init security_audit_rule_init
185#define security_filter_rule_match security_audit_rule_match
186
187#else
188
189static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr,
190 void **lsmrule)
191{
192 return -EINVAL;
193}
194
195static inline int security_filter_rule_match(u32 secid, u32 field, u32 op,
196 void *lsmrule,
197 struct audit_context *actx)
198{
199 return -EINVAL;
200}
201#endif
202#endif
203