xref: /openbmc/linux/security/integrity/ima/ima.h (revision 80eae209)
13323eec9SMimi Zohar /*
23323eec9SMimi Zohar  * Copyright (C) 2005,2006,2007,2008 IBM Corporation
33323eec9SMimi Zohar  *
43323eec9SMimi Zohar  * Authors:
53323eec9SMimi Zohar  * Reiner Sailer <sailer@watson.ibm.com>
63323eec9SMimi Zohar  * Mimi Zohar <zohar@us.ibm.com>
73323eec9SMimi Zohar  *
83323eec9SMimi Zohar  * This program is free software; you can redistribute it and/or
93323eec9SMimi Zohar  * modify it under the terms of the GNU General Public License as
103323eec9SMimi Zohar  * published by the Free Software Foundation, version 2 of the
113323eec9SMimi Zohar  * License.
123323eec9SMimi Zohar  *
133323eec9SMimi Zohar  * File: ima.h
143323eec9SMimi Zohar  *	internal Integrity Measurement Architecture (IMA) definitions
153323eec9SMimi Zohar  */
163323eec9SMimi Zohar 
173323eec9SMimi Zohar #ifndef __LINUX_IMA_H
183323eec9SMimi Zohar #define __LINUX_IMA_H
193323eec9SMimi Zohar 
203323eec9SMimi Zohar #include <linux/types.h>
213323eec9SMimi Zohar #include <linux/crypto.h>
223323eec9SMimi Zohar #include <linux/security.h>
233323eec9SMimi Zohar #include <linux/hash.h>
243323eec9SMimi Zohar #include <linux/tpm.h>
253323eec9SMimi Zohar #include <linux/audit.h>
263323eec9SMimi Zohar 
27f381c272SMimi Zohar #include "../integrity.h"
28f381c272SMimi Zohar 
293e8e5503SRoberto Sassu enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN,
30c019e307SRoberto Sassu 		     IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII };
313323eec9SMimi Zohar enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 };
323323eec9SMimi Zohar 
333323eec9SMimi Zohar /* digest size for IMA, fits SHA1 or MD5 */
34f381c272SMimi Zohar #define IMA_DIGEST_SIZE		SHA1_DIGEST_SIZE
353323eec9SMimi Zohar #define IMA_EVENT_NAME_LEN_MAX	255
363323eec9SMimi Zohar 
373323eec9SMimi Zohar #define IMA_HASH_BITS 9
383323eec9SMimi Zohar #define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
393323eec9SMimi Zohar 
40adf53a77SRoberto Sassu #define IMA_TEMPLATE_FIELD_ID_MAX_LEN	16
41adf53a77SRoberto Sassu #define IMA_TEMPLATE_NUM_FIELDS_MAX	15
42adf53a77SRoberto Sassu 
433ce1217dSRoberto Sassu #define IMA_TEMPLATE_IMA_NAME "ima"
443ce1217dSRoberto Sassu #define IMA_TEMPLATE_IMA_FMT "d|n"
453ce1217dSRoberto Sassu 
46a756024eSRoberto Sassu /* current content of the policy */
47a756024eSRoberto Sassu extern int ima_policy_flag;
48a756024eSRoberto Sassu 
493323eec9SMimi Zohar /* set during initialization */
503323eec9SMimi Zohar extern int ima_initialized;
513323eec9SMimi Zohar extern int ima_used_chip;
52c7c8bb23SDmitry Kasatkin extern int ima_hash_algo;
532fe5d6deSMimi Zohar extern int ima_appraise;
543323eec9SMimi Zohar 
5523b57419SRoberto Sassu /* IMA event related data */
5623b57419SRoberto Sassu struct ima_event_data {
5723b57419SRoberto Sassu 	struct integrity_iint_cache *iint;
5823b57419SRoberto Sassu 	struct file *file;
5923b57419SRoberto Sassu 	const unsigned char *filename;
6023b57419SRoberto Sassu 	struct evm_ima_xattr_data *xattr_value;
6123b57419SRoberto Sassu 	int xattr_len;
628d94eb9bSRoberto Sassu 	const char *violation;
6323b57419SRoberto Sassu };
6423b57419SRoberto Sassu 
65adf53a77SRoberto Sassu /* IMA template field data definition */
66adf53a77SRoberto Sassu struct ima_field_data {
67adf53a77SRoberto Sassu 	u8 *data;
68adf53a77SRoberto Sassu 	u32 len;
69adf53a77SRoberto Sassu };
70adf53a77SRoberto Sassu 
71adf53a77SRoberto Sassu /* IMA template field definition */
72adf53a77SRoberto Sassu struct ima_template_field {
73adf53a77SRoberto Sassu 	const char field_id[IMA_TEMPLATE_FIELD_ID_MAX_LEN];
7423b57419SRoberto Sassu 	int (*field_init)(struct ima_event_data *event_data,
7523b57419SRoberto Sassu 			  struct ima_field_data *field_data);
76adf53a77SRoberto Sassu 	void (*field_show)(struct seq_file *m, enum ima_show_type show,
77adf53a77SRoberto Sassu 			   struct ima_field_data *field_data);
78adf53a77SRoberto Sassu };
79adf53a77SRoberto Sassu 
80adf53a77SRoberto Sassu /* IMA template descriptor definition */
81adf53a77SRoberto Sassu struct ima_template_desc {
82adf53a77SRoberto Sassu 	char *name;
83adf53a77SRoberto Sassu 	char *fmt;
84adf53a77SRoberto Sassu 	int num_fields;
85adf53a77SRoberto Sassu 	struct ima_template_field **fields;
86adf53a77SRoberto Sassu };
87adf53a77SRoberto Sassu 
883323eec9SMimi Zohar struct ima_template_entry {
89140d8022SMimi Zohar 	u8 digest[TPM_DIGEST_SIZE];	/* sha1 or md5 measurement hash */
90a71dc65dSRoberto Sassu 	struct ima_template_desc *template_desc; /* template descriptor */
91a71dc65dSRoberto Sassu 	u32 template_data_len;
92a71dc65dSRoberto Sassu 	struct ima_field_data template_data[0];	/* template related data */
933323eec9SMimi Zohar };
943323eec9SMimi Zohar 
953323eec9SMimi Zohar struct ima_queue_entry {
963323eec9SMimi Zohar 	struct hlist_node hnext;	/* place in hash collision list */
973323eec9SMimi Zohar 	struct list_head later;		/* place in ima_measurements list */
983323eec9SMimi Zohar 	struct ima_template_entry *entry;
993323eec9SMimi Zohar };
1003323eec9SMimi Zohar extern struct list_head ima_measurements;	/* list of all measurements */
1013323eec9SMimi Zohar 
1023323eec9SMimi Zohar /* Internal IMA function definitions */
1033323eec9SMimi Zohar int ima_init(void);
104bab73937SMimi Zohar int ima_fs_init(void);
1053323eec9SMimi Zohar int ima_add_template_entry(struct ima_template_entry *entry, int violation,
1069803d413SRoberto Sassu 			   const char *op, struct inode *inode,
1079803d413SRoberto Sassu 			   const unsigned char *filename);
108c7c8bb23SDmitry Kasatkin int ima_calc_file_hash(struct file *file, struct ima_digest_data *hash);
109b6f8f16fSRoberto Sassu int ima_calc_field_array_hash(struct ima_field_data *field_data,
110b6f8f16fSRoberto Sassu 			      struct ima_template_desc *desc, int num_fields,
111c7c8bb23SDmitry Kasatkin 			      struct ima_digest_data *hash);
11209ef5435SDmitry Kasatkin int __init ima_calc_boot_aggregate(struct ima_digest_data *hash);
1137d802a22SRoberto Sassu void ima_add_violation(struct file *file, const unsigned char *filename,
1148d94eb9bSRoberto Sassu 		       struct integrity_iint_cache *iint,
1153323eec9SMimi Zohar 		       const char *op, const char *cause);
11676bb28f6SDmitry Kasatkin int ima_init_crypto(void);
1173ce1217dSRoberto Sassu void ima_putc(struct seq_file *m, void *data, int datalen);
11845b26133SMimi Zohar void ima_print_digest(struct seq_file *m, u8 *digest, u32 size);
119a71dc65dSRoberto Sassu struct ima_template_desc *ima_template_desc_current(void);
120a71dc65dSRoberto Sassu int ima_init_template(void);
1213323eec9SMimi Zohar 
1223323eec9SMimi Zohar /*
1233323eec9SMimi Zohar  * used to protect h_table and sha_table
1243323eec9SMimi Zohar  */
1253323eec9SMimi Zohar extern spinlock_t ima_queue_lock;
1263323eec9SMimi Zohar 
1273323eec9SMimi Zohar struct ima_h_table {
1283323eec9SMimi Zohar 	atomic_long_t len;	/* number of stored measurements in the list */
1293323eec9SMimi Zohar 	atomic_long_t violations;
1303323eec9SMimi Zohar 	struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE];
1313323eec9SMimi Zohar };
1323323eec9SMimi Zohar extern struct ima_h_table ima_htable;
1333323eec9SMimi Zohar 
1343323eec9SMimi Zohar static inline unsigned long ima_hash_key(u8 *digest)
1353323eec9SMimi Zohar {
1363323eec9SMimi Zohar 	return hash_long(*digest, IMA_HASH_BITS);
1373323eec9SMimi Zohar }
1383323eec9SMimi Zohar 
1393323eec9SMimi Zohar /* LIM API function definitions */
140d9d300cdSDmitry Kasatkin int ima_get_action(struct inode *inode, int mask, int function);
1411adace9bSMimi Zohar int ima_must_measure(struct inode *inode, int mask, int function);
142f381c272SMimi Zohar int ima_collect_measurement(struct integrity_iint_cache *iint,
143d3634d0fSDmitry Kasatkin 			    struct file *file,
144d3634d0fSDmitry Kasatkin 			    struct evm_ima_xattr_data **xattr_value,
145d3634d0fSDmitry Kasatkin 			    int *xattr_len);
146f381c272SMimi Zohar void ima_store_measurement(struct integrity_iint_cache *iint, struct file *file,
147bcbc9b0cSMimi Zohar 			   const unsigned char *filename,
148bcbc9b0cSMimi Zohar 			   struct evm_ima_xattr_data *xattr_value,
149bcbc9b0cSMimi Zohar 			   int xattr_len);
150e7c568e0SPeter Moody void ima_audit_measurement(struct integrity_iint_cache *iint,
151e7c568e0SPeter Moody 			   const unsigned char *filename);
15223b57419SRoberto Sassu int ima_alloc_init_template(struct ima_event_data *event_data,
15323b57419SRoberto Sassu 			    struct ima_template_entry **entry);
1543323eec9SMimi Zohar int ima_store_template(struct ima_template_entry *entry, int violation,
1559803d413SRoberto Sassu 		       struct inode *inode, const unsigned char *filename);
156a7ed7c60SRoberto Sassu void ima_free_template_entry(struct ima_template_entry *entry);
157ea1046d4SDmitry Kasatkin const char *ima_d_path(struct path *path, char **pathbuf);
1583323eec9SMimi Zohar 
1593323eec9SMimi Zohar /* IMA policy related functions */
1605a9196d7SMimi Zohar enum ima_hooks { FILE_CHECK = 1, MMAP_CHECK, BPRM_CHECK, MODULE_CHECK, FIRMWARE_CHECK, POST_SETATTR };
1613323eec9SMimi Zohar 
1622fe5d6deSMimi Zohar int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask,
1632fe5d6deSMimi Zohar 		     int flags);
1643323eec9SMimi Zohar void ima_init_policy(void);
1653323eec9SMimi Zohar void ima_update_policy(void);
166a756024eSRoberto Sassu void ima_update_policy_flag(void);
1676ccd0456SEric Paris ssize_t ima_parse_add_rule(char *);
1684af4662fSMimi Zohar void ima_delete_rules(void);
16980eae209SPetko Manolov void *ima_policy_start(struct seq_file *m, loff_t *pos);
17080eae209SPetko Manolov void *ima_policy_next(struct seq_file *m, void *v, loff_t *pos);
17180eae209SPetko Manolov void ima_policy_stop(struct seq_file *m, void *v);
17280eae209SPetko Manolov int ima_policy_show(struct seq_file *m, void *v);
1734af4662fSMimi Zohar 
1742fe5d6deSMimi Zohar /* Appraise integrity measurements */
1752fe5d6deSMimi Zohar #define IMA_APPRAISE_ENFORCE	0x01
1762fe5d6deSMimi Zohar #define IMA_APPRAISE_FIX	0x02
1772faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_LOG	0x04
1782faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_MODULES	0x08
1792faa6ef3SDmitry Kasatkin #define IMA_APPRAISE_FIRMWARE	0x10
1802fe5d6deSMimi Zohar 
1812fe5d6deSMimi Zohar #ifdef CONFIG_IMA_APPRAISE
182d79d72e0SMimi Zohar int ima_appraise_measurement(int func, struct integrity_iint_cache *iint,
183d3634d0fSDmitry Kasatkin 			     struct file *file, const unsigned char *filename,
184d3634d0fSDmitry Kasatkin 			     struct evm_ima_xattr_data *xattr_value,
1853034a146SDmitry Kasatkin 			     int xattr_len, int opened);
186d26e1936SDmitry Kasatkin int ima_must_appraise(struct inode *inode, int mask, enum ima_hooks func);
1872fe5d6deSMimi Zohar void ima_update_xattr(struct integrity_iint_cache *iint, struct file *file);
188d79d72e0SMimi Zohar enum integrity_status ima_get_cache_status(struct integrity_iint_cache *iint,
189d79d72e0SMimi Zohar 					   int func);
190d3634d0fSDmitry Kasatkin void ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, int xattr_len,
191d3634d0fSDmitry Kasatkin 		       struct ima_digest_data *hash);
192d3634d0fSDmitry Kasatkin int ima_read_xattr(struct dentry *dentry,
193d3634d0fSDmitry Kasatkin 		   struct evm_ima_xattr_data **xattr_value);
1942fe5d6deSMimi Zohar 
1952fe5d6deSMimi Zohar #else
196d79d72e0SMimi Zohar static inline int ima_appraise_measurement(int func,
197d79d72e0SMimi Zohar 					   struct integrity_iint_cache *iint,
1982fe5d6deSMimi Zohar 					   struct file *file,
199d3634d0fSDmitry Kasatkin 					   const unsigned char *filename,
200d3634d0fSDmitry Kasatkin 					   struct evm_ima_xattr_data *xattr_value,
2013034a146SDmitry Kasatkin 					   int xattr_len, int opened)
2022fe5d6deSMimi Zohar {
2032fe5d6deSMimi Zohar 	return INTEGRITY_UNKNOWN;
2042fe5d6deSMimi Zohar }
2052fe5d6deSMimi Zohar 
206d26e1936SDmitry Kasatkin static inline int ima_must_appraise(struct inode *inode, int mask,
207d26e1936SDmitry Kasatkin 				    enum ima_hooks func)
2082fe5d6deSMimi Zohar {
2092fe5d6deSMimi Zohar 	return 0;
2102fe5d6deSMimi Zohar }
2112fe5d6deSMimi Zohar 
2122fe5d6deSMimi Zohar static inline void ima_update_xattr(struct integrity_iint_cache *iint,
2132fe5d6deSMimi Zohar 				    struct file *file)
2142fe5d6deSMimi Zohar {
2152fe5d6deSMimi Zohar }
216d79d72e0SMimi Zohar 
217d79d72e0SMimi Zohar static inline enum integrity_status ima_get_cache_status(struct integrity_iint_cache
218d79d72e0SMimi Zohar 							 *iint, int func)
219d79d72e0SMimi Zohar {
220d79d72e0SMimi Zohar 	return INTEGRITY_UNKNOWN;
221d79d72e0SMimi Zohar }
222d3634d0fSDmitry Kasatkin 
223d3634d0fSDmitry Kasatkin static inline void ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value,
224d3634d0fSDmitry Kasatkin 				     int xattr_len,
225d3634d0fSDmitry Kasatkin 				     struct ima_digest_data *hash)
226d3634d0fSDmitry Kasatkin {
227d3634d0fSDmitry Kasatkin }
228d3634d0fSDmitry Kasatkin 
229d3634d0fSDmitry Kasatkin static inline int ima_read_xattr(struct dentry *dentry,
230d3634d0fSDmitry Kasatkin 				 struct evm_ima_xattr_data **xattr_value)
231d3634d0fSDmitry Kasatkin {
232d3634d0fSDmitry Kasatkin 	return 0;
233d3634d0fSDmitry Kasatkin }
234d3634d0fSDmitry Kasatkin 
2352fe5d6deSMimi Zohar #endif
2362fe5d6deSMimi Zohar 
2374af4662fSMimi Zohar /* LSM based policy rules require audit */
2384af4662fSMimi Zohar #ifdef CONFIG_IMA_LSM_RULES
2394af4662fSMimi Zohar 
2404af4662fSMimi Zohar #define security_filter_rule_init security_audit_rule_init
2414af4662fSMimi Zohar #define security_filter_rule_match security_audit_rule_match
2424af4662fSMimi Zohar 
2434af4662fSMimi Zohar #else
2444af4662fSMimi Zohar 
2454af4662fSMimi Zohar static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr,
2464af4662fSMimi Zohar 					    void **lsmrule)
2474af4662fSMimi Zohar {
2484af4662fSMimi Zohar 	return -EINVAL;
2494af4662fSMimi Zohar }
2504af4662fSMimi Zohar 
2514af4662fSMimi Zohar static inline int security_filter_rule_match(u32 secid, u32 field, u32 op,
2524af4662fSMimi Zohar 					     void *lsmrule,
2534af4662fSMimi Zohar 					     struct audit_context *actx)
2544af4662fSMimi Zohar {
2554af4662fSMimi Zohar 	return -EINVAL;
2564af4662fSMimi Zohar }
25780eae209SPetko Manolov #endif /* CONFIG_IMA_TRUSTED_KEYRING */
25880eae209SPetko Manolov 
25980eae209SPetko Manolov #ifdef	CONFIG_IMA_READ_POLICY
26080eae209SPetko Manolov #define	POLICY_FILE_FLAGS	(S_IWUSR | S_IRUSR)
26180eae209SPetko Manolov #else
26280eae209SPetko Manolov #define	POLICY_FILE_FLAGS	S_IWUSR
26380eae209SPetko Manolov #endif /* CONFIG_IMA_WRITE_POLICY */
26480eae209SPetko Manolov 
26580eae209SPetko Manolov #endif /* __LINUX_IMA_H */
266