1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2013 Politecnico di Torino, Italy 4 * TORSEC group -- https://security.polito.it 5 * 6 * Author: Roberto Sassu <roberto.sassu@polito.it> 7 * 8 * File: ima_template_lib.c 9 * Library of supported template fields. 10 */ 11 12 #include "ima_template_lib.h" 13 #include <linux/xattr.h> 14 #include <linux/evm.h> 15 16 static bool ima_template_hash_algo_allowed(u8 algo) 17 { 18 if (algo == HASH_ALGO_SHA1 || algo == HASH_ALGO_MD5) 19 return true; 20 21 return false; 22 } 23 24 enum data_formats { 25 DATA_FMT_DIGEST = 0, 26 DATA_FMT_DIGEST_WITH_ALGO, 27 DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO, 28 DATA_FMT_STRING, 29 DATA_FMT_HEX, 30 DATA_FMT_UINT 31 }; 32 33 enum digest_type { 34 DIGEST_TYPE_IMA, 35 DIGEST_TYPE_VERITY, 36 DIGEST_TYPE__LAST 37 }; 38 39 #define DIGEST_TYPE_NAME_LEN_MAX 7 /* including NUL */ 40 static const char * const digest_type_name[DIGEST_TYPE__LAST] = { 41 [DIGEST_TYPE_IMA] = "ima", 42 [DIGEST_TYPE_VERITY] = "verity" 43 }; 44 45 static int ima_write_template_field_data(const void *data, const u32 datalen, 46 enum data_formats datafmt, 47 struct ima_field_data *field_data) 48 { 49 u8 *buf, *buf_ptr; 50 u32 buflen = datalen; 51 52 if (datafmt == DATA_FMT_STRING) 53 buflen = datalen + 1; 54 55 buf = kzalloc(buflen, GFP_KERNEL); 56 if (!buf) 57 return -ENOMEM; 58 59 memcpy(buf, data, datalen); 60 61 /* 62 * Replace all space characters with underscore for event names and 63 * strings. This avoid that, during the parsing of a measurements list, 64 * filenames with spaces or that end with the suffix ' (deleted)' are 65 * split into multiple template fields (the space is the delimitator 66 * character for measurements lists in ASCII format). 67 */ 68 if (datafmt == DATA_FMT_STRING) { 69 for (buf_ptr = buf; buf_ptr - buf < datalen; buf_ptr++) 70 if (*buf_ptr == ' ') 71 *buf_ptr = '_'; 72 } 73 74 field_data->data = buf; 75 field_data->len = buflen; 76 return 0; 77 } 78 79 static void ima_show_template_data_ascii(struct seq_file *m, 80 enum ima_show_type show, 81 enum data_formats datafmt, 82 struct ima_field_data *field_data) 83 { 84 u8 *buf_ptr = field_data->data; 85 u32 buflen = field_data->len; 86 87 switch (datafmt) { 88 case DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO: 89 case DATA_FMT_DIGEST_WITH_ALGO: 90 buf_ptr = strrchr(field_data->data, ':'); 91 if (buf_ptr != field_data->data) 92 seq_printf(m, "%s", field_data->data); 93 94 /* skip ':' and '\0' */ 95 buf_ptr += 2; 96 buflen -= buf_ptr - field_data->data; 97 fallthrough; 98 case DATA_FMT_DIGEST: 99 case DATA_FMT_HEX: 100 if (!buflen) 101 break; 102 ima_print_digest(m, buf_ptr, buflen); 103 break; 104 case DATA_FMT_STRING: 105 seq_printf(m, "%s", buf_ptr); 106 break; 107 case DATA_FMT_UINT: 108 switch (field_data->len) { 109 case sizeof(u8): 110 seq_printf(m, "%u", *(u8 *)buf_ptr); 111 break; 112 case sizeof(u16): 113 if (ima_canonical_fmt) 114 seq_printf(m, "%u", 115 le16_to_cpu(*(__le16 *)buf_ptr)); 116 else 117 seq_printf(m, "%u", *(u16 *)buf_ptr); 118 break; 119 case sizeof(u32): 120 if (ima_canonical_fmt) 121 seq_printf(m, "%u", 122 le32_to_cpu(*(__le32 *)buf_ptr)); 123 else 124 seq_printf(m, "%u", *(u32 *)buf_ptr); 125 break; 126 case sizeof(u64): 127 if (ima_canonical_fmt) 128 seq_printf(m, "%llu", 129 le64_to_cpu(*(__le64 *)buf_ptr)); 130 else 131 seq_printf(m, "%llu", *(u64 *)buf_ptr); 132 break; 133 default: 134 break; 135 } 136 break; 137 default: 138 break; 139 } 140 } 141 142 static void ima_show_template_data_binary(struct seq_file *m, 143 enum ima_show_type show, 144 enum data_formats datafmt, 145 struct ima_field_data *field_data) 146 { 147 u32 len = (show == IMA_SHOW_BINARY_OLD_STRING_FMT) ? 148 strlen(field_data->data) : field_data->len; 149 150 if (show != IMA_SHOW_BINARY_NO_FIELD_LEN) { 151 u32 field_len = !ima_canonical_fmt ? 152 len : (__force u32)cpu_to_le32(len); 153 154 ima_putc(m, &field_len, sizeof(field_len)); 155 } 156 157 if (!len) 158 return; 159 160 ima_putc(m, field_data->data, len); 161 } 162 163 static void ima_show_template_field_data(struct seq_file *m, 164 enum ima_show_type show, 165 enum data_formats datafmt, 166 struct ima_field_data *field_data) 167 { 168 switch (show) { 169 case IMA_SHOW_ASCII: 170 ima_show_template_data_ascii(m, show, datafmt, field_data); 171 break; 172 case IMA_SHOW_BINARY: 173 case IMA_SHOW_BINARY_NO_FIELD_LEN: 174 case IMA_SHOW_BINARY_OLD_STRING_FMT: 175 ima_show_template_data_binary(m, show, datafmt, field_data); 176 break; 177 default: 178 break; 179 } 180 } 181 182 void ima_show_template_digest(struct seq_file *m, enum ima_show_type show, 183 struct ima_field_data *field_data) 184 { 185 ima_show_template_field_data(m, show, DATA_FMT_DIGEST, field_data); 186 } 187 188 void ima_show_template_digest_ng(struct seq_file *m, enum ima_show_type show, 189 struct ima_field_data *field_data) 190 { 191 ima_show_template_field_data(m, show, DATA_FMT_DIGEST_WITH_ALGO, 192 field_data); 193 } 194 195 void ima_show_template_digest_ngv2(struct seq_file *m, enum ima_show_type show, 196 struct ima_field_data *field_data) 197 { 198 ima_show_template_field_data(m, show, 199 DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO, 200 field_data); 201 } 202 203 void ima_show_template_string(struct seq_file *m, enum ima_show_type show, 204 struct ima_field_data *field_data) 205 { 206 ima_show_template_field_data(m, show, DATA_FMT_STRING, field_data); 207 } 208 209 void ima_show_template_sig(struct seq_file *m, enum ima_show_type show, 210 struct ima_field_data *field_data) 211 { 212 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 213 } 214 215 void ima_show_template_buf(struct seq_file *m, enum ima_show_type show, 216 struct ima_field_data *field_data) 217 { 218 ima_show_template_field_data(m, show, DATA_FMT_HEX, field_data); 219 } 220 221 void ima_show_template_uint(struct seq_file *m, enum ima_show_type show, 222 struct ima_field_data *field_data) 223 { 224 ima_show_template_field_data(m, show, DATA_FMT_UINT, field_data); 225 } 226 227 /** 228 * ima_parse_buf() - Parses lengths and data from an input buffer 229 * @bufstartp: Buffer start address. 230 * @bufendp: Buffer end address. 231 * @bufcurp: Pointer to remaining (non-parsed) data. 232 * @maxfields: Length of fields array. 233 * @fields: Array containing lengths and pointers of parsed data. 234 * @curfields: Number of array items containing parsed data. 235 * @len_mask: Bitmap (if bit is set, data length should not be parsed). 236 * @enforce_mask: Check if curfields == maxfields and/or bufcurp == bufendp. 237 * @bufname: String identifier of the input buffer. 238 * 239 * Return: 0 on success, -EINVAL on error. 240 */ 241 int ima_parse_buf(void *bufstartp, void *bufendp, void **bufcurp, 242 int maxfields, struct ima_field_data *fields, int *curfields, 243 unsigned long *len_mask, int enforce_mask, char *bufname) 244 { 245 void *bufp = bufstartp; 246 int i; 247 248 for (i = 0; i < maxfields; i++) { 249 if (len_mask == NULL || !test_bit(i, len_mask)) { 250 if (bufp > (bufendp - sizeof(u32))) 251 break; 252 253 if (ima_canonical_fmt) 254 fields[i].len = le32_to_cpu(*(__le32 *)bufp); 255 else 256 fields[i].len = *(u32 *)bufp; 257 258 bufp += sizeof(u32); 259 } 260 261 if (bufp > (bufendp - fields[i].len)) 262 break; 263 264 fields[i].data = bufp; 265 bufp += fields[i].len; 266 } 267 268 if ((enforce_mask & ENFORCE_FIELDS) && i != maxfields) { 269 pr_err("%s: nr of fields mismatch: expected: %d, current: %d\n", 270 bufname, maxfields, i); 271 return -EINVAL; 272 } 273 274 if ((enforce_mask & ENFORCE_BUFEND) && bufp != bufendp) { 275 pr_err("%s: buf end mismatch: expected: %p, current: %p\n", 276 bufname, bufendp, bufp); 277 return -EINVAL; 278 } 279 280 if (curfields) 281 *curfields = i; 282 283 if (bufcurp) 284 *bufcurp = bufp; 285 286 return 0; 287 } 288 289 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, 290 u8 digest_type, u8 hash_algo, 291 struct ima_field_data *field_data) 292 { 293 /* 294 * digest formats: 295 * - DATA_FMT_DIGEST: digest 296 * - DATA_FMT_DIGEST_WITH_ALGO: <hash algo> + ':' + '\0' + digest, 297 * - DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO: 298 * <digest type> + ':' + <hash algo> + ':' + '\0' + digest, 299 * 300 * where 'DATA_FMT_DIGEST' is the original digest format ('d') 301 * with a hash size limitation of 20 bytes, 302 * where <digest type> is either "ima" or "verity", 303 * where <hash algo> is the hash_algo_name[] string. 304 */ 305 u8 buffer[DIGEST_TYPE_NAME_LEN_MAX + CRYPTO_MAX_ALG_NAME + 2 + 306 IMA_MAX_DIGEST_SIZE] = { 0 }; 307 enum data_formats fmt = DATA_FMT_DIGEST; 308 u32 offset = 0; 309 310 if (digest_type < DIGEST_TYPE__LAST && hash_algo < HASH_ALGO__LAST) { 311 fmt = DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO; 312 offset += 1 + sprintf(buffer, "%s:%s:", 313 digest_type_name[digest_type], 314 hash_algo_name[hash_algo]); 315 } else if (hash_algo < HASH_ALGO__LAST) { 316 fmt = DATA_FMT_DIGEST_WITH_ALGO; 317 offset += 1 + sprintf(buffer, "%s:", 318 hash_algo_name[hash_algo]); 319 } 320 321 if (digest) 322 memcpy(buffer + offset, digest, digestsize); 323 else 324 /* 325 * If digest is NULL, the event being recorded is a violation. 326 * Make room for the digest by increasing the offset by the 327 * hash algorithm digest size. 328 */ 329 offset += hash_digest_size[hash_algo]; 330 331 return ima_write_template_field_data(buffer, offset + digestsize, 332 fmt, field_data); 333 } 334 335 /* 336 * This function writes the digest of an event (with size limit). 337 */ 338 int ima_eventdigest_init(struct ima_event_data *event_data, 339 struct ima_field_data *field_data) 340 { 341 struct ima_max_digest_data hash; 342 struct ima_digest_data *hash_hdr = container_of(&hash.hdr, 343 struct ima_digest_data, hdr); 344 u8 *cur_digest = NULL; 345 u32 cur_digestsize = 0; 346 struct inode *inode; 347 int result; 348 349 memset(&hash, 0, sizeof(hash)); 350 351 if (event_data->violation) /* recording a violation. */ 352 goto out; 353 354 if (ima_template_hash_algo_allowed(event_data->iint->ima_hash->algo)) { 355 cur_digest = event_data->iint->ima_hash->digest; 356 cur_digestsize = event_data->iint->ima_hash->length; 357 goto out; 358 } 359 360 if ((const char *)event_data->filename == boot_aggregate_name) { 361 if (ima_tpm_chip) { 362 hash.hdr.algo = HASH_ALGO_SHA1; 363 result = ima_calc_boot_aggregate(hash_hdr); 364 365 /* algo can change depending on available PCR banks */ 366 if (!result && hash.hdr.algo != HASH_ALGO_SHA1) 367 result = -EINVAL; 368 369 if (result < 0) 370 memset(&hash, 0, sizeof(hash)); 371 } 372 373 cur_digest = hash_hdr->digest; 374 cur_digestsize = hash_digest_size[HASH_ALGO_SHA1]; 375 goto out; 376 } 377 378 if (!event_data->file) /* missing info to re-calculate the digest */ 379 return -EINVAL; 380 381 inode = file_inode(event_data->file); 382 hash.hdr.algo = ima_template_hash_algo_allowed(ima_hash_algo) ? 383 ima_hash_algo : HASH_ALGO_SHA1; 384 result = ima_calc_file_hash(event_data->file, hash_hdr); 385 if (result) { 386 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, 387 event_data->filename, "collect_data", 388 "failed", result, 0); 389 return result; 390 } 391 cur_digest = hash_hdr->digest; 392 cur_digestsize = hash.hdr.length; 393 out: 394 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 395 DIGEST_TYPE__LAST, HASH_ALGO__LAST, 396 field_data); 397 } 398 399 /* 400 * This function writes the digest of an event (without size limit). 401 */ 402 int ima_eventdigest_ng_init(struct ima_event_data *event_data, 403 struct ima_field_data *field_data) 404 { 405 u8 *cur_digest = NULL, hash_algo = ima_hash_algo; 406 u32 cur_digestsize = 0; 407 408 if (event_data->violation) /* recording a violation. */ 409 goto out; 410 411 cur_digest = event_data->iint->ima_hash->digest; 412 cur_digestsize = event_data->iint->ima_hash->length; 413 414 hash_algo = event_data->iint->ima_hash->algo; 415 out: 416 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 417 DIGEST_TYPE__LAST, hash_algo, 418 field_data); 419 } 420 421 /* 422 * This function writes the digest of an event (without size limit), 423 * prefixed with both the digest type and hash algorithm. 424 */ 425 int ima_eventdigest_ngv2_init(struct ima_event_data *event_data, 426 struct ima_field_data *field_data) 427 { 428 u8 *cur_digest = NULL, hash_algo = ima_hash_algo; 429 u32 cur_digestsize = 0; 430 u8 digest_type = DIGEST_TYPE_IMA; 431 432 if (event_data->violation) /* recording a violation. */ 433 goto out; 434 435 cur_digest = event_data->iint->ima_hash->digest; 436 cur_digestsize = event_data->iint->ima_hash->length; 437 438 hash_algo = event_data->iint->ima_hash->algo; 439 if (event_data->iint->flags & IMA_VERITY_REQUIRED) 440 digest_type = DIGEST_TYPE_VERITY; 441 out: 442 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 443 digest_type, hash_algo, 444 field_data); 445 } 446 447 /* 448 * This function writes the digest of the file which is expected to match the 449 * digest contained in the file's appended signature. 450 */ 451 int ima_eventdigest_modsig_init(struct ima_event_data *event_data, 452 struct ima_field_data *field_data) 453 { 454 enum hash_algo hash_algo; 455 const u8 *cur_digest; 456 u32 cur_digestsize; 457 458 if (!event_data->modsig) 459 return 0; 460 461 if (event_data->violation) { 462 /* Recording a violation. */ 463 hash_algo = HASH_ALGO_SHA1; 464 cur_digest = NULL; 465 cur_digestsize = 0; 466 } else { 467 int rc; 468 469 rc = ima_get_modsig_digest(event_data->modsig, &hash_algo, 470 &cur_digest, &cur_digestsize); 471 if (rc) 472 return rc; 473 else if (hash_algo == HASH_ALGO__LAST || cur_digestsize == 0) 474 /* There was some error collecting the digest. */ 475 return -EINVAL; 476 } 477 478 return ima_eventdigest_init_common(cur_digest, cur_digestsize, 479 DIGEST_TYPE__LAST, hash_algo, 480 field_data); 481 } 482 483 static int ima_eventname_init_common(struct ima_event_data *event_data, 484 struct ima_field_data *field_data, 485 bool size_limit) 486 { 487 const char *cur_filename = NULL; 488 struct name_snapshot filename; 489 u32 cur_filename_len = 0; 490 bool snapshot = false; 491 int ret; 492 493 BUG_ON(event_data->filename == NULL && event_data->file == NULL); 494 495 if (event_data->filename) { 496 cur_filename = event_data->filename; 497 cur_filename_len = strlen(event_data->filename); 498 499 if (!size_limit || cur_filename_len <= IMA_EVENT_NAME_LEN_MAX) 500 goto out; 501 } 502 503 if (event_data->file) { 504 take_dentry_name_snapshot(&filename, 505 event_data->file->f_path.dentry); 506 snapshot = true; 507 cur_filename = filename.name.name; 508 cur_filename_len = strlen(cur_filename); 509 } else 510 /* 511 * Truncate filename if the latter is too long and 512 * the file descriptor is not available. 513 */ 514 cur_filename_len = IMA_EVENT_NAME_LEN_MAX; 515 out: 516 ret = ima_write_template_field_data(cur_filename, cur_filename_len, 517 DATA_FMT_STRING, field_data); 518 519 if (snapshot) 520 release_dentry_name_snapshot(&filename); 521 522 return ret; 523 } 524 525 /* 526 * This function writes the name of an event (with size limit). 527 */ 528 int ima_eventname_init(struct ima_event_data *event_data, 529 struct ima_field_data *field_data) 530 { 531 return ima_eventname_init_common(event_data, field_data, true); 532 } 533 534 /* 535 * This function writes the name of an event (without size limit). 536 */ 537 int ima_eventname_ng_init(struct ima_event_data *event_data, 538 struct ima_field_data *field_data) 539 { 540 return ima_eventname_init_common(event_data, field_data, false); 541 } 542 543 /* 544 * ima_eventsig_init - include the file signature as part of the template data 545 */ 546 int ima_eventsig_init(struct ima_event_data *event_data, 547 struct ima_field_data *field_data) 548 { 549 struct evm_ima_xattr_data *xattr_value = event_data->xattr_value; 550 551 if (!xattr_value || 552 (xattr_value->type != EVM_IMA_XATTR_DIGSIG && 553 xattr_value->type != IMA_VERITY_DIGSIG)) 554 return ima_eventevmsig_init(event_data, field_data); 555 556 return ima_write_template_field_data(xattr_value, event_data->xattr_len, 557 DATA_FMT_HEX, field_data); 558 } 559 560 /* 561 * ima_eventbuf_init - include the buffer(kexec-cmldine) as part of the 562 * template data. 563 */ 564 int ima_eventbuf_init(struct ima_event_data *event_data, 565 struct ima_field_data *field_data) 566 { 567 if ((!event_data->buf) || (event_data->buf_len == 0)) 568 return 0; 569 570 return ima_write_template_field_data(event_data->buf, 571 event_data->buf_len, DATA_FMT_HEX, 572 field_data); 573 } 574 575 /* 576 * ima_eventmodsig_init - include the appended file signature as part of the 577 * template data 578 */ 579 int ima_eventmodsig_init(struct ima_event_data *event_data, 580 struct ima_field_data *field_data) 581 { 582 const void *data; 583 u32 data_len; 584 int rc; 585 586 if (!event_data->modsig) 587 return 0; 588 589 /* 590 * modsig is a runtime structure containing pointers. Get its raw data 591 * instead. 592 */ 593 rc = ima_get_raw_modsig(event_data->modsig, &data, &data_len); 594 if (rc) 595 return rc; 596 597 return ima_write_template_field_data(data, data_len, DATA_FMT_HEX, 598 field_data); 599 } 600 601 /* 602 * ima_eventevmsig_init - include the EVM portable signature as part of the 603 * template data 604 */ 605 int ima_eventevmsig_init(struct ima_event_data *event_data, 606 struct ima_field_data *field_data) 607 { 608 struct evm_ima_xattr_data *xattr_data = NULL; 609 int rc = 0; 610 611 if (!event_data->file) 612 return 0; 613 614 rc = vfs_getxattr_alloc(&nop_mnt_idmap, file_dentry(event_data->file), 615 XATTR_NAME_EVM, (char **)&xattr_data, 0, 616 GFP_NOFS); 617 if (rc <= 0 || xattr_data->type != EVM_XATTR_PORTABLE_DIGSIG) { 618 rc = 0; 619 goto out; 620 } 621 622 rc = ima_write_template_field_data((char *)xattr_data, rc, DATA_FMT_HEX, 623 field_data); 624 625 out: 626 kfree(xattr_data); 627 return rc; 628 } 629 630 static int ima_eventinodedac_init_common(struct ima_event_data *event_data, 631 struct ima_field_data *field_data, 632 bool get_uid) 633 { 634 unsigned int id; 635 636 if (!event_data->file) 637 return 0; 638 639 if (get_uid) 640 id = i_uid_read(file_inode(event_data->file)); 641 else 642 id = i_gid_read(file_inode(event_data->file)); 643 644 if (ima_canonical_fmt) { 645 if (sizeof(id) == sizeof(u16)) 646 id = (__force u16)cpu_to_le16(id); 647 else 648 id = (__force u32)cpu_to_le32(id); 649 } 650 651 return ima_write_template_field_data((void *)&id, sizeof(id), 652 DATA_FMT_UINT, field_data); 653 } 654 655 /* 656 * ima_eventinodeuid_init - include the inode UID as part of the template 657 * data 658 */ 659 int ima_eventinodeuid_init(struct ima_event_data *event_data, 660 struct ima_field_data *field_data) 661 { 662 return ima_eventinodedac_init_common(event_data, field_data, true); 663 } 664 665 /* 666 * ima_eventinodegid_init - include the inode GID as part of the template 667 * data 668 */ 669 int ima_eventinodegid_init(struct ima_event_data *event_data, 670 struct ima_field_data *field_data) 671 { 672 return ima_eventinodedac_init_common(event_data, field_data, false); 673 } 674 675 /* 676 * ima_eventinodemode_init - include the inode mode as part of the template 677 * data 678 */ 679 int ima_eventinodemode_init(struct ima_event_data *event_data, 680 struct ima_field_data *field_data) 681 { 682 struct inode *inode; 683 u16 mode; 684 685 if (!event_data->file) 686 return 0; 687 688 inode = file_inode(event_data->file); 689 mode = inode->i_mode; 690 if (ima_canonical_fmt) 691 mode = (__force u16)cpu_to_le16(mode); 692 693 return ima_write_template_field_data((char *)&mode, sizeof(mode), 694 DATA_FMT_UINT, field_data); 695 } 696 697 static int ima_eventinodexattrs_init_common(struct ima_event_data *event_data, 698 struct ima_field_data *field_data, 699 char type) 700 { 701 u8 *buffer = NULL; 702 int rc; 703 704 if (!event_data->file) 705 return 0; 706 707 rc = evm_read_protected_xattrs(file_dentry(event_data->file), NULL, 0, 708 type, ima_canonical_fmt); 709 if (rc < 0) 710 return 0; 711 712 buffer = kmalloc(rc, GFP_KERNEL); 713 if (!buffer) 714 return 0; 715 716 rc = evm_read_protected_xattrs(file_dentry(event_data->file), buffer, 717 rc, type, ima_canonical_fmt); 718 if (rc < 0) { 719 rc = 0; 720 goto out; 721 } 722 723 rc = ima_write_template_field_data((char *)buffer, rc, DATA_FMT_HEX, 724 field_data); 725 out: 726 kfree(buffer); 727 return rc; 728 } 729 730 /* 731 * ima_eventinodexattrnames_init - include a list of xattr names as part of the 732 * template data 733 */ 734 int ima_eventinodexattrnames_init(struct ima_event_data *event_data, 735 struct ima_field_data *field_data) 736 { 737 return ima_eventinodexattrs_init_common(event_data, field_data, 'n'); 738 } 739 740 /* 741 * ima_eventinodexattrlengths_init - include a list of xattr lengths as part of 742 * the template data 743 */ 744 int ima_eventinodexattrlengths_init(struct ima_event_data *event_data, 745 struct ima_field_data *field_data) 746 { 747 return ima_eventinodexattrs_init_common(event_data, field_data, 'l'); 748 } 749 750 /* 751 * ima_eventinodexattrvalues_init - include a list of xattr values as part of 752 * the template data 753 */ 754 int ima_eventinodexattrvalues_init(struct ima_event_data *event_data, 755 struct ima_field_data *field_data) 756 { 757 return ima_eventinodexattrs_init_common(event_data, field_data, 'v'); 758 } 759
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.