|
| 1 | +/* |
| 2 | + * Copyright (C) 2005,2006,2007,2008 IBM Corporation |
| 3 | + * |
| 4 | + * Authors: |
| 5 | + * Reiner Sailer <[email protected]> |
| 6 | + |
| 7 | + * |
| 8 | + * This program is free software; you can redistribute it and/or |
| 9 | + * modify it under the terms of the GNU General Public License as |
| 10 | + * published by the Free Software Foundation, version 2 of the |
| 11 | + * License. |
| 12 | + * |
| 13 | + * File: ima.h |
| 14 | + * internal Integrity Measurement Architecture (IMA) definitions |
| 15 | + */ |
| 16 | + |
| 17 | +#ifndef __LINUX_IMA_H |
| 18 | +#define __LINUX_IMA_H |
| 19 | + |
| 20 | +#include <linux/types.h> |
| 21 | +#include <linux/crypto.h> |
| 22 | +#include <linux/security.h> |
| 23 | +#include <linux/hash.h> |
| 24 | +#include <linux/tpm.h> |
| 25 | +#include <linux/audit.h> |
| 26 | + |
| 27 | +enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_ASCII }; |
| 28 | +enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; |
| 29 | + |
| 30 | +/* digest size for IMA, fits SHA1 or MD5 */ |
| 31 | +#define IMA_DIGEST_SIZE 20 |
| 32 | +#define IMA_EVENT_NAME_LEN_MAX 255 |
| 33 | + |
| 34 | +#define IMA_HASH_BITS 9 |
| 35 | +#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS) |
| 36 | + |
| 37 | +/* set during initialization */ |
| 38 | +extern int ima_initialized; |
| 39 | +extern int ima_used_chip; |
| 40 | +extern char *ima_hash; |
| 41 | + |
| 42 | +/* IMA inode template definition */ |
| 43 | +struct ima_template_data { |
| 44 | + u8 digest[IMA_DIGEST_SIZE]; /* sha1/md5 measurement hash */ |
| 45 | + char file_name[IMA_EVENT_NAME_LEN_MAX + 1]; /* name + \0 */ |
| 46 | +}; |
| 47 | + |
| 48 | +struct ima_template_entry { |
| 49 | + u8 digest[IMA_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ |
| 50 | + char *template_name; |
| 51 | + int template_len; |
| 52 | + struct ima_template_data template; |
| 53 | +}; |
| 54 | + |
| 55 | +struct ima_queue_entry { |
| 56 | + struct hlist_node hnext; /* place in hash collision list */ |
| 57 | + struct list_head later; /* place in ima_measurements list */ |
| 58 | + struct ima_template_entry *entry; |
| 59 | +}; |
| 60 | +extern struct list_head ima_measurements; /* list of all measurements */ |
| 61 | + |
| 62 | +/* declarations */ |
| 63 | +void integrity_audit_msg(int audit_msgno, struct inode *inode, |
| 64 | + const unsigned char *fname, const char *op, |
| 65 | + const char *cause, int result, int info); |
| 66 | + |
| 67 | +/* Internal IMA function definitions */ |
| 68 | +void ima_iintcache_init(void); |
| 69 | +int ima_init(void); |
| 70 | +int ima_add_template_entry(struct ima_template_entry *entry, int violation, |
| 71 | + const char *op, struct inode *inode); |
| 72 | +int ima_calc_hash(struct file *file, char *digest); |
| 73 | +int ima_calc_template_hash(int template_len, void *template, char *digest); |
| 74 | +int ima_calc_boot_aggregate(char *digest); |
| 75 | +void ima_add_violation(struct inode *inode, const unsigned char *filename, |
| 76 | + const char *op, const char *cause); |
| 77 | + |
| 78 | +/* |
| 79 | + * used to protect h_table and sha_table |
| 80 | + */ |
| 81 | +extern spinlock_t ima_queue_lock; |
| 82 | + |
| 83 | +struct ima_h_table { |
| 84 | + atomic_long_t len; /* number of stored measurements in the list */ |
| 85 | + atomic_long_t violations; |
| 86 | + struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE]; |
| 87 | +}; |
| 88 | +extern struct ima_h_table ima_htable; |
| 89 | + |
| 90 | +static inline unsigned long ima_hash_key(u8 *digest) |
| 91 | +{ |
| 92 | + return hash_long(*digest, IMA_HASH_BITS); |
| 93 | +} |
| 94 | + |
| 95 | +/* iint cache flags */ |
| 96 | +#define IMA_MEASURED 1 |
| 97 | + |
| 98 | +/* integrity data associated with an inode */ |
| 99 | +struct ima_iint_cache { |
| 100 | + u64 version; /* track inode changes */ |
| 101 | + unsigned long flags; |
| 102 | + u8 digest[IMA_DIGEST_SIZE]; |
| 103 | + struct mutex mutex; /* protects: version, flags, digest */ |
| 104 | + long readcount; /* measured files readcount */ |
| 105 | + long writecount; /* measured files writecount */ |
| 106 | + struct kref refcount; /* ima_iint_cache reference count */ |
| 107 | + struct rcu_head rcu; |
| 108 | +}; |
| 109 | + |
| 110 | +/* LIM API function definitions */ |
| 111 | +int ima_must_measure(struct ima_iint_cache *iint, struct inode *inode, |
| 112 | + int mask, int function); |
| 113 | +int ima_collect_measurement(struct ima_iint_cache *iint, struct file *file); |
| 114 | +void ima_store_measurement(struct ima_iint_cache *iint, struct file *file, |
| 115 | + const unsigned char *filename); |
| 116 | +int ima_store_template(struct ima_template_entry *entry, int violation, |
| 117 | + struct inode *inode); |
| 118 | + |
| 119 | +/* radix tree calls to lookup, insert, delete |
| 120 | + * integrity data associated with an inode. |
| 121 | + */ |
| 122 | +struct ima_iint_cache *ima_iint_insert(struct inode *inode); |
| 123 | +struct ima_iint_cache *ima_iint_find_get(struct inode *inode); |
| 124 | +struct ima_iint_cache *ima_iint_find_insert_get(struct inode *inode); |
| 125 | +void ima_iint_delete(struct inode *inode); |
| 126 | +void iint_free(struct kref *kref); |
| 127 | +void iint_rcu_free(struct rcu_head *rcu); |
| 128 | + |
| 129 | +/* IMA policy related functions */ |
| 130 | +enum ima_hooks { PATH_CHECK = 1, FILE_MMAP, BPRM_CHECK }; |
| 131 | + |
| 132 | +int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask); |
| 133 | +void ima_init_policy(void); |
| 134 | +void ima_update_policy(void); |
| 135 | +#endif |
0 commit comments