162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0-only */
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Copyright (C) 2005,2006,2007,2008 IBM Corporation
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Authors:
662306a36Sopenharmony_ci * Reiner Sailer <sailer@watson.ibm.com>
762306a36Sopenharmony_ci * Mimi Zohar <zohar@us.ibm.com>
862306a36Sopenharmony_ci *
962306a36Sopenharmony_ci * File: ima.h
1062306a36Sopenharmony_ci *	internal Integrity Measurement Architecture (IMA) definitions
1162306a36Sopenharmony_ci */
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci#ifndef __LINUX_IMA_H
1462306a36Sopenharmony_ci#define __LINUX_IMA_H
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci#include <linux/types.h>
1762306a36Sopenharmony_ci#include <linux/crypto.h>
1862306a36Sopenharmony_ci#include <linux/fs.h>
1962306a36Sopenharmony_ci#include <linux/security.h>
2062306a36Sopenharmony_ci#include <linux/hash.h>
2162306a36Sopenharmony_ci#include <linux/tpm.h>
2262306a36Sopenharmony_ci#include <linux/audit.h>
2362306a36Sopenharmony_ci#include <crypto/hash_info.h>
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_ci#include "../integrity.h"
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_cienum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN,
2862306a36Sopenharmony_ci		     IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII };
2962306a36Sopenharmony_cienum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8, TPM_PCR10 = 10 };
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_ci/* digest size for IMA, fits SHA1 or MD5 */
3262306a36Sopenharmony_ci#define IMA_DIGEST_SIZE		SHA1_DIGEST_SIZE
3362306a36Sopenharmony_ci#define IMA_EVENT_NAME_LEN_MAX	255
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci#define IMA_HASH_BITS 10
3662306a36Sopenharmony_ci#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci#define IMA_TEMPLATE_FIELD_ID_MAX_LEN	16
3962306a36Sopenharmony_ci#define IMA_TEMPLATE_NUM_FIELDS_MAX	15
4062306a36Sopenharmony_ci
4162306a36Sopenharmony_ci#define IMA_TEMPLATE_IMA_NAME "ima"
4262306a36Sopenharmony_ci#define IMA_TEMPLATE_IMA_FMT "d|n"
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci#define NR_BANKS(chip) ((chip != NULL) ? chip->nr_allocated_banks : 0)
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci/* current content of the policy */
4762306a36Sopenharmony_ciextern int ima_policy_flag;
4862306a36Sopenharmony_ci
4962306a36Sopenharmony_ci/* bitset of digests algorithms allowed in the setxattr hook */
5062306a36Sopenharmony_ciextern atomic_t ima_setxattr_allowed_hash_algorithms;
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci/* set during initialization */
5362306a36Sopenharmony_ciextern int ima_hash_algo __ro_after_init;
5462306a36Sopenharmony_ciextern int ima_sha1_idx __ro_after_init;
5562306a36Sopenharmony_ciextern int ima_hash_algo_idx __ro_after_init;
5662306a36Sopenharmony_ciextern int ima_extra_slots __ro_after_init;
5762306a36Sopenharmony_ciextern int ima_appraise;
5862306a36Sopenharmony_ciextern struct tpm_chip *ima_tpm_chip;
5962306a36Sopenharmony_ciextern const char boot_aggregate_name[];
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci/* IMA event related data */
6262306a36Sopenharmony_cistruct ima_event_data {
6362306a36Sopenharmony_ci	struct integrity_iint_cache *iint;
6462306a36Sopenharmony_ci	struct file *file;
6562306a36Sopenharmony_ci	const unsigned char *filename;
6662306a36Sopenharmony_ci	struct evm_ima_xattr_data *xattr_value;
6762306a36Sopenharmony_ci	int xattr_len;
6862306a36Sopenharmony_ci	const struct modsig *modsig;
6962306a36Sopenharmony_ci	const char *violation;
7062306a36Sopenharmony_ci	const void *buf;
7162306a36Sopenharmony_ci	int buf_len;
7262306a36Sopenharmony_ci};
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci/* IMA template field data definition */
7562306a36Sopenharmony_cistruct ima_field_data {
7662306a36Sopenharmony_ci	u8 *data;
7762306a36Sopenharmony_ci	u32 len;
7862306a36Sopenharmony_ci};
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci/* IMA template field definition */
8162306a36Sopenharmony_cistruct ima_template_field {
8262306a36Sopenharmony_ci	const char field_id[IMA_TEMPLATE_FIELD_ID_MAX_LEN];
8362306a36Sopenharmony_ci	int (*field_init)(struct ima_event_data *event_data,
8462306a36Sopenharmony_ci			  struct ima_field_data *field_data);
8562306a36Sopenharmony_ci	void (*field_show)(struct seq_file *m, enum ima_show_type show,
8662306a36Sopenharmony_ci			   struct ima_field_data *field_data);
8762306a36Sopenharmony_ci};
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci/* IMA template descriptor definition */
9062306a36Sopenharmony_cistruct ima_template_desc {
9162306a36Sopenharmony_ci	struct list_head list;
9262306a36Sopenharmony_ci	char *name;
9362306a36Sopenharmony_ci	char *fmt;
9462306a36Sopenharmony_ci	int num_fields;
9562306a36Sopenharmony_ci	const struct ima_template_field **fields;
9662306a36Sopenharmony_ci};
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_cistruct ima_template_entry {
9962306a36Sopenharmony_ci	int pcr;
10062306a36Sopenharmony_ci	struct tpm_digest *digests;
10162306a36Sopenharmony_ci	struct ima_template_desc *template_desc; /* template descriptor */
10262306a36Sopenharmony_ci	u32 template_data_len;
10362306a36Sopenharmony_ci	struct ima_field_data template_data[];	/* template related data */
10462306a36Sopenharmony_ci};
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_cistruct ima_queue_entry {
10762306a36Sopenharmony_ci	struct hlist_node hnext;	/* place in hash collision list */
10862306a36Sopenharmony_ci	struct list_head later;		/* place in ima_measurements list */
10962306a36Sopenharmony_ci	struct ima_template_entry *entry;
11062306a36Sopenharmony_ci};
11162306a36Sopenharmony_ciextern struct list_head ima_measurements;	/* list of all measurements */
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci/* Some details preceding the binary serialized measurement list */
11462306a36Sopenharmony_cistruct ima_kexec_hdr {
11562306a36Sopenharmony_ci	u16 version;
11662306a36Sopenharmony_ci	u16 _reserved0;
11762306a36Sopenharmony_ci	u32 _reserved1;
11862306a36Sopenharmony_ci	u64 buffer_size;
11962306a36Sopenharmony_ci	u64 count;
12062306a36Sopenharmony_ci};
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ciextern const int read_idmap[];
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci#ifdef CONFIG_HAVE_IMA_KEXEC
12562306a36Sopenharmony_civoid ima_load_kexec_buffer(void);
12662306a36Sopenharmony_ci#else
12762306a36Sopenharmony_cistatic inline void ima_load_kexec_buffer(void) {}
12862306a36Sopenharmony_ci#endif /* CONFIG_HAVE_IMA_KEXEC */
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_ci/*
13162306a36Sopenharmony_ci * The default binary_runtime_measurements list format is defined as the
13262306a36Sopenharmony_ci * platform native format.  The canonical format is defined as little-endian.
13362306a36Sopenharmony_ci */
13462306a36Sopenharmony_ciextern bool ima_canonical_fmt;
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci/* Internal IMA function definitions */
13762306a36Sopenharmony_ciint ima_init(void);
13862306a36Sopenharmony_ciint ima_fs_init(void);
13962306a36Sopenharmony_ciint ima_add_template_entry(struct ima_template_entry *entry, int violation,
14062306a36Sopenharmony_ci			   const char *op, struct inode *inode,
14162306a36Sopenharmony_ci			   const unsigned char *filename);
14262306a36Sopenharmony_ciint ima_calc_file_hash(struct file *file, struct ima_digest_data *hash);
14362306a36Sopenharmony_ciint ima_calc_buffer_hash(const void *buf, loff_t len,
14462306a36Sopenharmony_ci			 struct ima_digest_data *hash);
14562306a36Sopenharmony_ciint ima_calc_field_array_hash(struct ima_field_data *field_data,
14662306a36Sopenharmony_ci			      struct ima_template_entry *entry);
14762306a36Sopenharmony_ciint ima_calc_boot_aggregate(struct ima_digest_data *hash);
14862306a36Sopenharmony_civoid ima_add_violation(struct file *file, const unsigned char *filename,
14962306a36Sopenharmony_ci		       struct integrity_iint_cache *iint,
15062306a36Sopenharmony_ci		       const char *op, const char *cause);
15162306a36Sopenharmony_ciint ima_init_crypto(void);
15262306a36Sopenharmony_civoid ima_putc(struct seq_file *m, void *data, int datalen);
15362306a36Sopenharmony_civoid ima_print_digest(struct seq_file *m, u8 *digest, u32 size);
15462306a36Sopenharmony_ciint template_desc_init_fields(const char *template_fmt,
15562306a36Sopenharmony_ci			      const struct ima_template_field ***fields,
15662306a36Sopenharmony_ci			      int *num_fields);
15762306a36Sopenharmony_cistruct ima_template_desc *ima_template_desc_current(void);
15862306a36Sopenharmony_cistruct ima_template_desc *ima_template_desc_buf(void);
15962306a36Sopenharmony_cistruct ima_template_desc *lookup_template_desc(const char *name);
16062306a36Sopenharmony_cibool ima_template_has_modsig(const struct ima_template_desc *ima_template);
16162306a36Sopenharmony_ciint ima_restore_measurement_entry(struct ima_template_entry *entry);
16262306a36Sopenharmony_ciint ima_restore_measurement_list(loff_t bufsize, void *buf);
16362306a36Sopenharmony_ciint ima_measurements_show(struct seq_file *m, void *v);
16462306a36Sopenharmony_ciunsigned long ima_get_binary_runtime_size(void);
16562306a36Sopenharmony_ciint ima_init_template(void);
16662306a36Sopenharmony_civoid ima_init_template_list(void);
16762306a36Sopenharmony_ciint __init ima_init_digests(void);
16862306a36Sopenharmony_ciint ima_lsm_policy_change(struct notifier_block *nb, unsigned long event,
16962306a36Sopenharmony_ci			  void *lsm_data);
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_ci/*
17262306a36Sopenharmony_ci * used to protect h_table and sha_table
17362306a36Sopenharmony_ci */
17462306a36Sopenharmony_ciextern spinlock_t ima_queue_lock;
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_cistruct ima_h_table {
17762306a36Sopenharmony_ci	atomic_long_t len;	/* number of stored measurements in the list */
17862306a36Sopenharmony_ci	atomic_long_t violations;
17962306a36Sopenharmony_ci	struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE];
18062306a36Sopenharmony_ci};
18162306a36Sopenharmony_ciextern struct ima_h_table ima_htable;
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_cistatic inline unsigned int ima_hash_key(u8 *digest)
18462306a36Sopenharmony_ci{
18562306a36Sopenharmony_ci	/* there is no point in taking a hash of part of a digest */
18662306a36Sopenharmony_ci	return (digest[0] | digest[1] << 8) % IMA_MEASURE_HTABLE_SIZE;
18762306a36Sopenharmony_ci}
18862306a36Sopenharmony_ci
18962306a36Sopenharmony_ci#define __ima_hooks(hook)				\
19062306a36Sopenharmony_ci	hook(NONE, none)				\
19162306a36Sopenharmony_ci	hook(FILE_CHECK, file)				\
19262306a36Sopenharmony_ci	hook(MMAP_CHECK, mmap)				\
19362306a36Sopenharmony_ci	hook(MMAP_CHECK_REQPROT, mmap_reqprot)		\
19462306a36Sopenharmony_ci	hook(BPRM_CHECK, bprm)				\
19562306a36Sopenharmony_ci	hook(CREDS_CHECK, creds)			\
19662306a36Sopenharmony_ci	hook(POST_SETATTR, post_setattr)		\
19762306a36Sopenharmony_ci	hook(MODULE_CHECK, module)			\
19862306a36Sopenharmony_ci	hook(FIRMWARE_CHECK, firmware)			\
19962306a36Sopenharmony_ci	hook(KEXEC_KERNEL_CHECK, kexec_kernel)		\
20062306a36Sopenharmony_ci	hook(KEXEC_INITRAMFS_CHECK, kexec_initramfs)	\
20162306a36Sopenharmony_ci	hook(POLICY_CHECK, policy)			\
20262306a36Sopenharmony_ci	hook(KEXEC_CMDLINE, kexec_cmdline)		\
20362306a36Sopenharmony_ci	hook(KEY_CHECK, key)				\
20462306a36Sopenharmony_ci	hook(CRITICAL_DATA, critical_data)		\
20562306a36Sopenharmony_ci	hook(SETXATTR_CHECK, setxattr_check)		\
20662306a36Sopenharmony_ci	hook(MAX_CHECK, none)
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_ci#define __ima_hook_enumify(ENUM, str)	ENUM,
20962306a36Sopenharmony_ci#define __ima_stringify(arg) (#arg)
21062306a36Sopenharmony_ci#define __ima_hook_measuring_stringify(ENUM, str) \
21162306a36Sopenharmony_ci		(__ima_stringify(measuring_ ##str)),
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_cienum ima_hooks {
21462306a36Sopenharmony_ci	__ima_hooks(__ima_hook_enumify)
21562306a36Sopenharmony_ci};
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_cistatic const char * const ima_hooks_measure_str[] = {
21862306a36Sopenharmony_ci	__ima_hooks(__ima_hook_measuring_stringify)
21962306a36Sopenharmony_ci};
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_cistatic inline const char *func_measure_str(enum ima_hooks func)
22262306a36Sopenharmony_ci{
22362306a36Sopenharmony_ci	if (func >= MAX_CHECK)
22462306a36Sopenharmony_ci		return ima_hooks_measure_str[NONE];
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	return ima_hooks_measure_str[func];
22762306a36Sopenharmony_ci}
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ciextern const char *const func_tokens[];
23062306a36Sopenharmony_ci
23162306a36Sopenharmony_cistruct modsig;
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci#ifdef CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS
23462306a36Sopenharmony_ci/*
23562306a36Sopenharmony_ci * To track keys that need to be measured.
23662306a36Sopenharmony_ci */
23762306a36Sopenharmony_cistruct ima_key_entry {
23862306a36Sopenharmony_ci	struct list_head list;
23962306a36Sopenharmony_ci	void *payload;
24062306a36Sopenharmony_ci	size_t payload_len;
24162306a36Sopenharmony_ci	char *keyring_name;
24262306a36Sopenharmony_ci};
24362306a36Sopenharmony_civoid ima_init_key_queue(void);
24462306a36Sopenharmony_cibool ima_should_queue_key(void);
24562306a36Sopenharmony_cibool ima_queue_key(struct key *keyring, const void *payload,
24662306a36Sopenharmony_ci		   size_t payload_len);
24762306a36Sopenharmony_civoid ima_process_queued_keys(void);
24862306a36Sopenharmony_ci#else
24962306a36Sopenharmony_cistatic inline void ima_init_key_queue(void) {}
25062306a36Sopenharmony_cistatic inline bool ima_should_queue_key(void) { return false; }
25162306a36Sopenharmony_cistatic inline bool ima_queue_key(struct key *keyring,
25262306a36Sopenharmony_ci				 const void *payload,
25362306a36Sopenharmony_ci				 size_t payload_len) { return false; }
25462306a36Sopenharmony_cistatic inline void ima_process_queued_keys(void) {}
25562306a36Sopenharmony_ci#endif /* CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS */
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci/* LIM API function definitions */
25862306a36Sopenharmony_ciint ima_get_action(struct mnt_idmap *idmap, struct inode *inode,
25962306a36Sopenharmony_ci		   const struct cred *cred, u32 secid, int mask,
26062306a36Sopenharmony_ci		   enum ima_hooks func, int *pcr,
26162306a36Sopenharmony_ci		   struct ima_template_desc **template_desc,
26262306a36Sopenharmony_ci		   const char *func_data, unsigned int *allowed_algos);
26362306a36Sopenharmony_ciint ima_must_measure(struct inode *inode, int mask, enum ima_hooks func);
26462306a36Sopenharmony_ciint ima_collect_measurement(struct integrity_iint_cache *iint,
26562306a36Sopenharmony_ci			    struct file *file, void *buf, loff_t size,
26662306a36Sopenharmony_ci			    enum hash_algo algo, struct modsig *modsig);
26762306a36Sopenharmony_civoid ima_store_measurement(struct integrity_iint_cache *iint, struct file *file,
26862306a36Sopenharmony_ci			   const unsigned char *filename,
26962306a36Sopenharmony_ci			   struct evm_ima_xattr_data *xattr_value,
27062306a36Sopenharmony_ci			   int xattr_len, const struct modsig *modsig, int pcr,
27162306a36Sopenharmony_ci			   struct ima_template_desc *template_desc);
27262306a36Sopenharmony_ciint process_buffer_measurement(struct mnt_idmap *idmap,
27362306a36Sopenharmony_ci			       struct inode *inode, const void *buf, int size,
27462306a36Sopenharmony_ci			       const char *eventname, enum ima_hooks func,
27562306a36Sopenharmony_ci			       int pcr, const char *func_data,
27662306a36Sopenharmony_ci			       bool buf_hash, u8 *digest, size_t digest_len);
27762306a36Sopenharmony_civoid ima_audit_measurement(struct integrity_iint_cache *iint,
27862306a36Sopenharmony_ci			   const unsigned char *filename);
27962306a36Sopenharmony_ciint ima_alloc_init_template(struct ima_event_data *event_data,
28062306a36Sopenharmony_ci			    struct ima_template_entry **entry,
28162306a36Sopenharmony_ci			    struct ima_template_desc *template_desc);
28262306a36Sopenharmony_ciint ima_store_template(struct ima_template_entry *entry, int violation,
28362306a36Sopenharmony_ci		       struct inode *inode,
28462306a36Sopenharmony_ci		       const unsigned char *filename, int pcr);
28562306a36Sopenharmony_civoid ima_free_template_entry(struct ima_template_entry *entry);
28662306a36Sopenharmony_ciconst char *ima_d_path(const struct path *path, char **pathbuf, char *filename);
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_ci/* IMA policy related functions */
28962306a36Sopenharmony_ciint ima_match_policy(struct mnt_idmap *idmap, struct inode *inode,
29062306a36Sopenharmony_ci		     const struct cred *cred, u32 secid, enum ima_hooks func,
29162306a36Sopenharmony_ci		     int mask, int flags, int *pcr,
29262306a36Sopenharmony_ci		     struct ima_template_desc **template_desc,
29362306a36Sopenharmony_ci		     const char *func_data, unsigned int *allowed_algos);
29462306a36Sopenharmony_civoid ima_init_policy(void);
29562306a36Sopenharmony_civoid ima_update_policy(void);
29662306a36Sopenharmony_civoid ima_update_policy_flags(void);
29762306a36Sopenharmony_cissize_t ima_parse_add_rule(char *);
29862306a36Sopenharmony_civoid ima_delete_rules(void);
29962306a36Sopenharmony_ciint ima_check_policy(void);
30062306a36Sopenharmony_civoid *ima_policy_start(struct seq_file *m, loff_t *pos);
30162306a36Sopenharmony_civoid *ima_policy_next(struct seq_file *m, void *v, loff_t *pos);
30262306a36Sopenharmony_civoid ima_policy_stop(struct seq_file *m, void *v);
30362306a36Sopenharmony_ciint ima_policy_show(struct seq_file *m, void *v);
30462306a36Sopenharmony_ci
30562306a36Sopenharmony_ci/* Appraise integrity measurements */
30662306a36Sopenharmony_ci#define IMA_APPRAISE_ENFORCE	0x01
30762306a36Sopenharmony_ci#define IMA_APPRAISE_FIX	0x02
30862306a36Sopenharmony_ci#define IMA_APPRAISE_LOG	0x04
30962306a36Sopenharmony_ci#define IMA_APPRAISE_MODULES	0x08
31062306a36Sopenharmony_ci#define IMA_APPRAISE_FIRMWARE	0x10
31162306a36Sopenharmony_ci#define IMA_APPRAISE_POLICY	0x20
31262306a36Sopenharmony_ci#define IMA_APPRAISE_KEXEC	0x40
31362306a36Sopenharmony_ci
31462306a36Sopenharmony_ci#ifdef CONFIG_IMA_APPRAISE
31562306a36Sopenharmony_ciint ima_check_blacklist(struct integrity_iint_cache *iint,
31662306a36Sopenharmony_ci			const struct modsig *modsig, int pcr);
31762306a36Sopenharmony_ciint ima_appraise_measurement(enum ima_hooks func,
31862306a36Sopenharmony_ci			     struct integrity_iint_cache *iint,
31962306a36Sopenharmony_ci			     struct file *file, const unsigned char *filename,
32062306a36Sopenharmony_ci			     struct evm_ima_xattr_data *xattr_value,
32162306a36Sopenharmony_ci			     int xattr_len, const struct modsig *modsig);
32262306a36Sopenharmony_ciint ima_must_appraise(struct mnt_idmap *idmap, struct inode *inode,
32362306a36Sopenharmony_ci		      int mask, enum ima_hooks func);
32462306a36Sopenharmony_civoid ima_update_xattr(struct integrity_iint_cache *iint, struct file *file);
32562306a36Sopenharmony_cienum integrity_status ima_get_cache_status(struct integrity_iint_cache *iint,
32662306a36Sopenharmony_ci					   enum ima_hooks func);
32762306a36Sopenharmony_cienum hash_algo ima_get_hash_algo(const struct evm_ima_xattr_data *xattr_value,
32862306a36Sopenharmony_ci				 int xattr_len);
32962306a36Sopenharmony_ciint ima_read_xattr(struct dentry *dentry,
33062306a36Sopenharmony_ci		   struct evm_ima_xattr_data **xattr_value, int xattr_len);
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_ci#else
33362306a36Sopenharmony_cistatic inline int ima_check_blacklist(struct integrity_iint_cache *iint,
33462306a36Sopenharmony_ci				      const struct modsig *modsig, int pcr)
33562306a36Sopenharmony_ci{
33662306a36Sopenharmony_ci	return 0;
33762306a36Sopenharmony_ci}
33862306a36Sopenharmony_ci
33962306a36Sopenharmony_cistatic inline int ima_appraise_measurement(enum ima_hooks func,
34062306a36Sopenharmony_ci					   struct integrity_iint_cache *iint,
34162306a36Sopenharmony_ci					   struct file *file,
34262306a36Sopenharmony_ci					   const unsigned char *filename,
34362306a36Sopenharmony_ci					   struct evm_ima_xattr_data *xattr_value,
34462306a36Sopenharmony_ci					   int xattr_len,
34562306a36Sopenharmony_ci					   const struct modsig *modsig)
34662306a36Sopenharmony_ci{
34762306a36Sopenharmony_ci	return INTEGRITY_UNKNOWN;
34862306a36Sopenharmony_ci}
34962306a36Sopenharmony_ci
35062306a36Sopenharmony_cistatic inline int ima_must_appraise(struct mnt_idmap *idmap,
35162306a36Sopenharmony_ci				    struct inode *inode, int mask,
35262306a36Sopenharmony_ci				    enum ima_hooks func)
35362306a36Sopenharmony_ci{
35462306a36Sopenharmony_ci	return 0;
35562306a36Sopenharmony_ci}
35662306a36Sopenharmony_ci
35762306a36Sopenharmony_cistatic inline void ima_update_xattr(struct integrity_iint_cache *iint,
35862306a36Sopenharmony_ci				    struct file *file)
35962306a36Sopenharmony_ci{
36062306a36Sopenharmony_ci}
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_cistatic inline enum integrity_status ima_get_cache_status(struct integrity_iint_cache
36362306a36Sopenharmony_ci							 *iint,
36462306a36Sopenharmony_ci							 enum ima_hooks func)
36562306a36Sopenharmony_ci{
36662306a36Sopenharmony_ci	return INTEGRITY_UNKNOWN;
36762306a36Sopenharmony_ci}
36862306a36Sopenharmony_ci
36962306a36Sopenharmony_cistatic inline enum hash_algo
37062306a36Sopenharmony_ciima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, int xattr_len)
37162306a36Sopenharmony_ci{
37262306a36Sopenharmony_ci	return ima_hash_algo;
37362306a36Sopenharmony_ci}
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_cistatic inline int ima_read_xattr(struct dentry *dentry,
37662306a36Sopenharmony_ci				 struct evm_ima_xattr_data **xattr_value,
37762306a36Sopenharmony_ci				 int xattr_len)
37862306a36Sopenharmony_ci{
37962306a36Sopenharmony_ci	return 0;
38062306a36Sopenharmony_ci}
38162306a36Sopenharmony_ci
38262306a36Sopenharmony_ci#endif /* CONFIG_IMA_APPRAISE */
38362306a36Sopenharmony_ci
38462306a36Sopenharmony_ci#ifdef CONFIG_IMA_APPRAISE_MODSIG
38562306a36Sopenharmony_ciint ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len,
38662306a36Sopenharmony_ci		    struct modsig **modsig);
38762306a36Sopenharmony_civoid ima_collect_modsig(struct modsig *modsig, const void *buf, loff_t size);
38862306a36Sopenharmony_ciint ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo,
38962306a36Sopenharmony_ci			  const u8 **digest, u32 *digest_size);
39062306a36Sopenharmony_ciint ima_get_raw_modsig(const struct modsig *modsig, const void **data,
39162306a36Sopenharmony_ci		       u32 *data_len);
39262306a36Sopenharmony_civoid ima_free_modsig(struct modsig *modsig);
39362306a36Sopenharmony_ci#else
39462306a36Sopenharmony_cistatic inline int ima_read_modsig(enum ima_hooks func, const void *buf,
39562306a36Sopenharmony_ci				  loff_t buf_len, struct modsig **modsig)
39662306a36Sopenharmony_ci{
39762306a36Sopenharmony_ci	return -EOPNOTSUPP;
39862306a36Sopenharmony_ci}
39962306a36Sopenharmony_ci
40062306a36Sopenharmony_cistatic inline void ima_collect_modsig(struct modsig *modsig, const void *buf,
40162306a36Sopenharmony_ci				      loff_t size)
40262306a36Sopenharmony_ci{
40362306a36Sopenharmony_ci}
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_cistatic inline int ima_get_modsig_digest(const struct modsig *modsig,
40662306a36Sopenharmony_ci					enum hash_algo *algo, const u8 **digest,
40762306a36Sopenharmony_ci					u32 *digest_size)
40862306a36Sopenharmony_ci{
40962306a36Sopenharmony_ci	return -EOPNOTSUPP;
41062306a36Sopenharmony_ci}
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_cistatic inline int ima_get_raw_modsig(const struct modsig *modsig,
41362306a36Sopenharmony_ci				     const void **data, u32 *data_len)
41462306a36Sopenharmony_ci{
41562306a36Sopenharmony_ci	return -EOPNOTSUPP;
41662306a36Sopenharmony_ci}
41762306a36Sopenharmony_ci
41862306a36Sopenharmony_cistatic inline void ima_free_modsig(struct modsig *modsig)
41962306a36Sopenharmony_ci{
42062306a36Sopenharmony_ci}
42162306a36Sopenharmony_ci#endif /* CONFIG_IMA_APPRAISE_MODSIG */
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_ci/* LSM based policy rules require audit */
42462306a36Sopenharmony_ci#ifdef CONFIG_IMA_LSM_RULES
42562306a36Sopenharmony_ci
42662306a36Sopenharmony_ci#define ima_filter_rule_init security_audit_rule_init
42762306a36Sopenharmony_ci#define ima_filter_rule_free security_audit_rule_free
42862306a36Sopenharmony_ci#define ima_filter_rule_match security_audit_rule_match
42962306a36Sopenharmony_ci
43062306a36Sopenharmony_ci#else
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_cistatic inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr,
43362306a36Sopenharmony_ci				       void **lsmrule)
43462306a36Sopenharmony_ci{
43562306a36Sopenharmony_ci	return -EINVAL;
43662306a36Sopenharmony_ci}
43762306a36Sopenharmony_ci
43862306a36Sopenharmony_cistatic inline void ima_filter_rule_free(void *lsmrule)
43962306a36Sopenharmony_ci{
44062306a36Sopenharmony_ci}
44162306a36Sopenharmony_ci
44262306a36Sopenharmony_cistatic inline int ima_filter_rule_match(u32 secid, u32 field, u32 op,
44362306a36Sopenharmony_ci					void *lsmrule)
44462306a36Sopenharmony_ci{
44562306a36Sopenharmony_ci	return -EINVAL;
44662306a36Sopenharmony_ci}
44762306a36Sopenharmony_ci#endif /* CONFIG_IMA_LSM_RULES */
44862306a36Sopenharmony_ci
44962306a36Sopenharmony_ci#ifdef	CONFIG_IMA_READ_POLICY
45062306a36Sopenharmony_ci#define	POLICY_FILE_FLAGS	(S_IWUSR | S_IRUSR)
45162306a36Sopenharmony_ci#else
45262306a36Sopenharmony_ci#define	POLICY_FILE_FLAGS	S_IWUSR
45362306a36Sopenharmony_ci#endif /* CONFIG_IMA_READ_POLICY */
45462306a36Sopenharmony_ci
45562306a36Sopenharmony_ci#endif /* __LINUX_IMA_H */
456