13323eec9SMimi Zohar /* 23323eec9SMimi Zohar * Copyright (C) 2005,2006,2007,2008 IBM Corporation 33323eec9SMimi Zohar * 43323eec9SMimi Zohar * Authors: 53323eec9SMimi Zohar * Reiner Sailer <sailer@watson.ibm.com> 63323eec9SMimi Zohar * Mimi Zohar <zohar@us.ibm.com> 73323eec9SMimi Zohar * 83323eec9SMimi Zohar * This program is free software; you can redistribute it and/or 93323eec9SMimi Zohar * modify it under the terms of the GNU General Public License as 103323eec9SMimi Zohar * published by the Free Software Foundation, version 2 of the 113323eec9SMimi Zohar * License. 123323eec9SMimi Zohar * 133323eec9SMimi Zohar * File: ima.h 143323eec9SMimi Zohar * internal Integrity Measurement Architecture (IMA) definitions 153323eec9SMimi Zohar */ 163323eec9SMimi Zohar 173323eec9SMimi Zohar #ifndef __LINUX_IMA_H 183323eec9SMimi Zohar #define __LINUX_IMA_H 193323eec9SMimi Zohar 203323eec9SMimi Zohar #include <linux/types.h> 213323eec9SMimi Zohar #include <linux/crypto.h> 223323eec9SMimi Zohar #include <linux/security.h> 233323eec9SMimi Zohar #include <linux/hash.h> 243323eec9SMimi Zohar #include <linux/tpm.h> 253323eec9SMimi Zohar #include <linux/audit.h> 263323eec9SMimi Zohar 27f381c272SMimi Zohar #include "../integrity.h" 28f381c272SMimi Zohar 293e8e5503SRoberto Sassu enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN, 30c019e307SRoberto Sassu IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII }; 313323eec9SMimi Zohar enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; 323323eec9SMimi Zohar 333323eec9SMimi Zohar /* digest size for IMA, fits SHA1 or MD5 */ 34f381c272SMimi Zohar #define IMA_DIGEST_SIZE SHA1_DIGEST_SIZE 353323eec9SMimi Zohar #define IMA_EVENT_NAME_LEN_MAX 255 363323eec9SMimi Zohar 373323eec9SMimi Zohar #define IMA_HASH_BITS 9 383323eec9SMimi Zohar #define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS) 393323eec9SMimi Zohar 40adf53a77SRoberto Sassu #define IMA_TEMPLATE_FIELD_ID_MAX_LEN 16 41adf53a77SRoberto Sassu #define IMA_TEMPLATE_NUM_FIELDS_MAX 15 42adf53a77SRoberto Sassu 433ce1217dSRoberto Sassu #define IMA_TEMPLATE_IMA_NAME "ima" 443ce1217dSRoberto Sassu #define IMA_TEMPLATE_IMA_FMT "d|n" 453ce1217dSRoberto Sassu 46a756024eSRoberto Sassu /* current content of the policy */ 47a756024eSRoberto Sassu extern int ima_policy_flag; 48a756024eSRoberto Sassu 493323eec9SMimi Zohar /* set during initialization */ 503323eec9SMimi Zohar extern int ima_initialized; 513323eec9SMimi Zohar extern int ima_used_chip; 52c7c8bb23SDmitry Kasatkin extern int ima_hash_algo; 532fe5d6deSMimi Zohar extern int ima_appraise; 543323eec9SMimi Zohar 5523b57419SRoberto Sassu /* IMA event related data */ 5623b57419SRoberto Sassu struct ima_event_data { 5723b57419SRoberto Sassu struct integrity_iint_cache *iint; 5823b57419SRoberto Sassu struct file *file; 5923b57419SRoberto Sassu const unsigned char *filename; 6023b57419SRoberto Sassu struct evm_ima_xattr_data *xattr_value; 6123b57419SRoberto Sassu int xattr_len; 628d94eb9bSRoberto Sassu const char *violation; 6323b57419SRoberto Sassu }; 6423b57419SRoberto Sassu 65adf53a77SRoberto Sassu /* IMA template field data definition */ 66adf53a77SRoberto Sassu struct ima_field_data { 67adf53a77SRoberto Sassu u8 *data; 68adf53a77SRoberto Sassu u32 len; 69adf53a77SRoberto Sassu }; 70adf53a77SRoberto Sassu 71adf53a77SRoberto Sassu /* IMA template field definition */ 72adf53a77SRoberto Sassu struct ima_template_field { 73adf53a77SRoberto Sassu const char field_id[IMA_TEMPLATE_FIELD_ID_MAX_LEN]; 7423b57419SRoberto Sassu int (*field_init)(struct ima_event_data *event_data, 7523b57419SRoberto Sassu struct ima_field_data *field_data); 76adf53a77SRoberto Sassu void (*field_show)(struct seq_file *m, enum ima_show_type show, 77adf53a77SRoberto Sassu struct ima_field_data *field_data); 78adf53a77SRoberto Sassu }; 79adf53a77SRoberto Sassu 80adf53a77SRoberto Sassu /* IMA template descriptor definition */ 81adf53a77SRoberto Sassu struct ima_template_desc { 82adf53a77SRoberto Sassu char *name; 83adf53a77SRoberto Sassu char *fmt; 84adf53a77SRoberto Sassu int num_fields; 85adf53a77SRoberto Sassu struct ima_template_field **fields; 86adf53a77SRoberto Sassu }; 87adf53a77SRoberto Sassu 883323eec9SMimi Zohar struct ima_template_entry { 89140d8022SMimi Zohar u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ 90a71dc65dSRoberto Sassu struct ima_template_desc *template_desc; /* template descriptor */ 91a71dc65dSRoberto Sassu u32 template_data_len; 92a71dc65dSRoberto Sassu struct ima_field_data template_data[0]; /* template related data */ 933323eec9SMimi Zohar }; 943323eec9SMimi Zohar 953323eec9SMimi Zohar struct ima_queue_entry { 963323eec9SMimi Zohar struct hlist_node hnext; /* place in hash collision list */ 973323eec9SMimi Zohar struct list_head later; /* place in ima_measurements list */ 983323eec9SMimi Zohar struct ima_template_entry *entry; 993323eec9SMimi Zohar }; 1003323eec9SMimi Zohar extern struct list_head ima_measurements; /* list of all measurements */ 1013323eec9SMimi Zohar 1023323eec9SMimi Zohar /* Internal IMA function definitions */ 1033323eec9SMimi Zohar int ima_init(void); 104bab73937SMimi Zohar int ima_fs_init(void); 1053323eec9SMimi Zohar int ima_add_template_entry(struct ima_template_entry *entry, int violation, 1069803d413SRoberto Sassu const char *op, struct inode *inode, 1079803d413SRoberto Sassu const unsigned char *filename); 108c7c8bb23SDmitry Kasatkin int ima_calc_file_hash(struct file *file, struct ima_digest_data *hash); 109b6f8f16fSRoberto Sassu int ima_calc_field_array_hash(struct ima_field_data *field_data, 110b6f8f16fSRoberto Sassu struct ima_template_desc *desc, int num_fields, 111c7c8bb23SDmitry Kasatkin struct ima_digest_data *hash); 11209ef5435SDmitry Kasatkin int __init ima_calc_boot_aggregate(struct ima_digest_data *hash); 1137d802a22SRoberto Sassu void ima_add_violation(struct file *file, const unsigned char *filename, 1148d94eb9bSRoberto Sassu struct integrity_iint_cache *iint, 1153323eec9SMimi Zohar const char *op, const char *cause); 11676bb28f6SDmitry Kasatkin int ima_init_crypto(void); 1173ce1217dSRoberto Sassu void ima_putc(struct seq_file *m, void *data, int datalen); 11845b26133SMimi Zohar void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 119a71dc65dSRoberto Sassu struct ima_template_desc *ima_template_desc_current(void); 120a71dc65dSRoberto Sassu int ima_init_template(void); 1213323eec9SMimi Zohar 1223323eec9SMimi Zohar /* 1233323eec9SMimi Zohar * used to protect h_table and sha_table 1243323eec9SMimi Zohar */ 1253323eec9SMimi Zohar extern spinlock_t ima_queue_lock; 1263323eec9SMimi Zohar 1273323eec9SMimi Zohar struct ima_h_table { 1283323eec9SMimi Zohar atomic_long_t len; /* number of stored measurements in the list */ 1293323eec9SMimi Zohar atomic_long_t violations; 1303323eec9SMimi Zohar struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE]; 1313323eec9SMimi Zohar }; 1323323eec9SMimi Zohar extern struct ima_h_table ima_htable; 1333323eec9SMimi Zohar 1343323eec9SMimi Zohar static inline unsigned long ima_hash_key(u8 *digest) 1353323eec9SMimi Zohar { 1363323eec9SMimi Zohar return hash_long(*digest, IMA_HASH_BITS); 1373323eec9SMimi Zohar } 1383323eec9SMimi Zohar 1393323eec9SMimi Zohar /* LIM API function definitions */ 140d9d300cdSDmitry Kasatkin int ima_get_action(struct inode *inode, int mask, int function); 1411adace9bSMimi Zohar int ima_must_measure(struct inode *inode, int mask, int function); 142f381c272SMimi Zohar int ima_collect_measurement(struct integrity_iint_cache *iint, 143d3634d0fSDmitry Kasatkin struct file *file, 144d3634d0fSDmitry Kasatkin struct evm_ima_xattr_data **xattr_value, 145d3634d0fSDmitry Kasatkin int *xattr_len); 146f381c272SMimi Zohar void ima_store_measurement(struct integrity_iint_cache *iint, struct file *file, 147bcbc9b0cSMimi Zohar const unsigned char *filename, 148bcbc9b0cSMimi Zohar struct evm_ima_xattr_data *xattr_value, 149bcbc9b0cSMimi Zohar int xattr_len); 150e7c568e0SPeter Moody void ima_audit_measurement(struct integrity_iint_cache *iint, 151e7c568e0SPeter Moody const unsigned char *filename); 15223b57419SRoberto Sassu int ima_alloc_init_template(struct ima_event_data *event_data, 15323b57419SRoberto Sassu struct ima_template_entry **entry); 1543323eec9SMimi Zohar int ima_store_template(struct ima_template_entry *entry, int violation, 1559803d413SRoberto Sassu struct inode *inode, const unsigned char *filename); 156a7ed7c60SRoberto Sassu void ima_free_template_entry(struct ima_template_entry *entry); 157ea1046d4SDmitry Kasatkin const char *ima_d_path(struct path *path, char **pathbuf); 1583323eec9SMimi Zohar 1593323eec9SMimi Zohar /* IMA policy related functions */ 1605a9196d7SMimi Zohar enum ima_hooks { FILE_CHECK = 1, MMAP_CHECK, BPRM_CHECK, MODULE_CHECK, FIRMWARE_CHECK, POST_SETATTR }; 1613323eec9SMimi Zohar 1622fe5d6deSMimi Zohar int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask, 1632fe5d6deSMimi Zohar int flags); 1643323eec9SMimi Zohar void ima_init_policy(void); 1653323eec9SMimi Zohar void ima_update_policy(void); 166a756024eSRoberto Sassu void ima_update_policy_flag(void); 1676ccd0456SEric Paris ssize_t ima_parse_add_rule(char *); 1684af4662fSMimi Zohar void ima_delete_rules(void); 16980eae209SPetko Manolov void *ima_policy_start(struct seq_file *m, loff_t *pos); 17080eae209SPetko Manolov void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos); 17180eae209SPetko Manolov void ima_policy_stop(struct seq_file *m, void *v); 17280eae209SPetko Manolov int ima_policy_show(struct seq_file *m, void *v); 1734af4662fSMimi Zohar 1742fe5d6deSMimi Zohar /* Appraise integrity measurements */ 1752fe5d6deSMimi Zohar #define IMA_APPRAISE_ENFORCE 0x01 1762fe5d6deSMimi Zohar #define IMA_APPRAISE_FIX 0x02 1772faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_LOG 0x04 1782faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_MODULES 0x08 1792faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_FIRMWARE 0x10 1802fe5d6deSMimi Zohar 1812fe5d6deSMimi Zohar #ifdef CONFIG_IMA_APPRAISE 182d79d72e0SMimi Zohar int ima_appraise_measurement(int func, struct integrity_iint_cache *iint, 183d3634d0fSDmitry Kasatkin struct file *file, const unsigned char *filename, 184d3634d0fSDmitry Kasatkin struct evm_ima_xattr_data *xattr_value, 1853034a146SDmitry Kasatkin int xattr_len, int opened); 186d26e1936SDmitry Kasatkin int ima_must_appraise(struct inode *inode, int mask, enum ima_hooks func); 1872fe5d6deSMimi Zohar void ima_update_xattr(struct integrity_iint_cache *iint, struct file *file); 188d79d72e0SMimi Zohar enum integrity_status ima_get_cache_status(struct integrity_iint_cache *iint, 189d79d72e0SMimi Zohar int func); 190d3634d0fSDmitry Kasatkin void ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, int xattr_len, 191d3634d0fSDmitry Kasatkin struct ima_digest_data *hash); 192d3634d0fSDmitry Kasatkin int ima_read_xattr(struct dentry *dentry, 193d3634d0fSDmitry Kasatkin struct evm_ima_xattr_data **xattr_value); 1942fe5d6deSMimi Zohar 1952fe5d6deSMimi Zohar #else 196d79d72e0SMimi Zohar static inline int ima_appraise_measurement(int func, 197d79d72e0SMimi Zohar struct integrity_iint_cache *iint, 1982fe5d6deSMimi Zohar struct file *file, 199d3634d0fSDmitry Kasatkin const unsigned char *filename, 200d3634d0fSDmitry Kasatkin struct evm_ima_xattr_data *xattr_value, 2013034a146SDmitry Kasatkin int xattr_len, int opened) 2022fe5d6deSMimi Zohar { 2032fe5d6deSMimi Zohar return INTEGRITY_UNKNOWN; 2042fe5d6deSMimi Zohar } 2052fe5d6deSMimi Zohar 206d26e1936SDmitry Kasatkin static inline int ima_must_appraise(struct inode *inode, int mask, 207d26e1936SDmitry Kasatkin enum ima_hooks func) 2082fe5d6deSMimi Zohar { 2092fe5d6deSMimi Zohar return 0; 2102fe5d6deSMimi Zohar } 2112fe5d6deSMimi Zohar 2122fe5d6deSMimi Zohar static inline void ima_update_xattr(struct integrity_iint_cache *iint, 2132fe5d6deSMimi Zohar struct file *file) 2142fe5d6deSMimi Zohar { 2152fe5d6deSMimi Zohar } 216d79d72e0SMimi Zohar 217d79d72e0SMimi Zohar static inline enum integrity_status ima_get_cache_status(struct integrity_iint_cache 218d79d72e0SMimi Zohar *iint, int func) 219d79d72e0SMimi Zohar { 220d79d72e0SMimi Zohar return INTEGRITY_UNKNOWN; 221d79d72e0SMimi Zohar } 222d3634d0fSDmitry Kasatkin 223d3634d0fSDmitry Kasatkin static inline void ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, 224d3634d0fSDmitry Kasatkin int xattr_len, 225d3634d0fSDmitry Kasatkin struct ima_digest_data *hash) 226d3634d0fSDmitry Kasatkin { 227d3634d0fSDmitry Kasatkin } 228d3634d0fSDmitry Kasatkin 229d3634d0fSDmitry Kasatkin static inline int ima_read_xattr(struct dentry *dentry, 230d3634d0fSDmitry Kasatkin struct evm_ima_xattr_data **xattr_value) 231d3634d0fSDmitry Kasatkin { 232d3634d0fSDmitry Kasatkin return 0; 233d3634d0fSDmitry Kasatkin } 234d3634d0fSDmitry Kasatkin 2352fe5d6deSMimi Zohar #endif 2362fe5d6deSMimi Zohar 2374af4662fSMimi Zohar /* LSM based policy rules require audit */ 2384af4662fSMimi Zohar #ifdef CONFIG_IMA_LSM_RULES 2394af4662fSMimi Zohar 2404af4662fSMimi Zohar #define security_filter_rule_init security_audit_rule_init 2414af4662fSMimi Zohar #define security_filter_rule_match security_audit_rule_match 2424af4662fSMimi Zohar 2434af4662fSMimi Zohar #else 2444af4662fSMimi Zohar 2454af4662fSMimi Zohar static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, 2464af4662fSMimi Zohar void **lsmrule) 2474af4662fSMimi Zohar { 2484af4662fSMimi Zohar return -EINVAL; 2494af4662fSMimi Zohar } 2504af4662fSMimi Zohar 2514af4662fSMimi Zohar static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, 2524af4662fSMimi Zohar void *lsmrule, 2534af4662fSMimi Zohar struct audit_context *actx) 2544af4662fSMimi Zohar { 2554af4662fSMimi Zohar return -EINVAL; 2564af4662fSMimi Zohar } 25780eae209SPetko Manolov #endif /* CONFIG_IMA_TRUSTED_KEYRING */ 25880eae209SPetko Manolov 25980eae209SPetko Manolov #ifdef CONFIG_IMA_READ_POLICY 26080eae209SPetko Manolov #define POLICY_FILE_FLAGS (S_IWUSR | S_IRUSR) 26180eae209SPetko Manolov #else 26280eae209SPetko Manolov #define POLICY_FILE_FLAGS S_IWUSR 26380eae209SPetko Manolov #endif /* CONFIG_IMA_WRITE_POLICY */ 26480eae209SPetko Manolov 26580eae209SPetko Manolov #endif /* __LINUX_IMA_H */ 266