at v5.4 3.5 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2008 IBM Corporation 4 * Author: Mimi Zohar <zohar@us.ibm.com> 5 */ 6 7#ifndef _LINUX_IMA_H 8#define _LINUX_IMA_H 9 10#include <linux/fs.h> 11#include <linux/security.h> 12#include <linux/kexec.h> 13struct linux_binprm; 14 15#ifdef CONFIG_IMA 16extern int ima_bprm_check(struct linux_binprm *bprm); 17extern int ima_file_check(struct file *file, int mask); 18extern void ima_post_create_tmpfile(struct inode *inode); 19extern void ima_file_free(struct file *file); 20extern int ima_file_mmap(struct file *file, unsigned long prot); 21extern int ima_load_data(enum kernel_load_data_id id); 22extern int ima_read_file(struct file *file, enum kernel_read_file_id id); 23extern int ima_post_read_file(struct file *file, void *buf, loff_t size, 24 enum kernel_read_file_id id); 25extern void ima_post_path_mknod(struct dentry *dentry); 26extern void ima_kexec_cmdline(const void *buf, int size); 27 28#ifdef CONFIG_IMA_KEXEC 29extern void ima_add_kexec_buffer(struct kimage *image); 30#endif 31 32#if (defined(CONFIG_X86) && defined(CONFIG_EFI)) || defined(CONFIG_S390) 33extern bool arch_ima_get_secureboot(void); 34extern const char * const *arch_get_ima_policy(void); 35#else 36static inline bool arch_ima_get_secureboot(void) 37{ 38 return false; 39} 40 41static inline const char * const *arch_get_ima_policy(void) 42{ 43 return NULL; 44} 45#endif 46 47#else 48static inline int ima_bprm_check(struct linux_binprm *bprm) 49{ 50 return 0; 51} 52 53static inline int ima_file_check(struct file *file, int mask) 54{ 55 return 0; 56} 57 58static inline void ima_post_create_tmpfile(struct inode *inode) 59{ 60} 61 62static inline void ima_file_free(struct file *file) 63{ 64 return; 65} 66 67static inline int ima_file_mmap(struct file *file, unsigned long prot) 68{ 69 return 0; 70} 71 72static inline int ima_load_data(enum kernel_load_data_id id) 73{ 74 return 0; 75} 76 77static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) 78{ 79 return 0; 80} 81 82static inline int ima_post_read_file(struct file *file, void *buf, loff_t size, 83 enum kernel_read_file_id id) 84{ 85 return 0; 86} 87 88static inline void ima_post_path_mknod(struct dentry *dentry) 89{ 90 return; 91} 92 93static inline void ima_kexec_cmdline(const void *buf, int size) {} 94#endif /* CONFIG_IMA */ 95 96#ifndef CONFIG_IMA_KEXEC 97struct kimage; 98 99static inline void ima_add_kexec_buffer(struct kimage *image) 100{} 101#endif 102 103#ifdef CONFIG_IMA_APPRAISE 104extern bool is_ima_appraise_enabled(void); 105extern void ima_inode_post_setattr(struct dentry *dentry); 106extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, 107 const void *xattr_value, size_t xattr_value_len); 108extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name); 109#else 110static inline bool is_ima_appraise_enabled(void) 111{ 112 return 0; 113} 114 115static inline void ima_inode_post_setattr(struct dentry *dentry) 116{ 117 return; 118} 119 120static inline int ima_inode_setxattr(struct dentry *dentry, 121 const char *xattr_name, 122 const void *xattr_value, 123 size_t xattr_value_len) 124{ 125 return 0; 126} 127 128static inline int ima_inode_removexattr(struct dentry *dentry, 129 const char *xattr_name) 130{ 131 return 0; 132} 133#endif /* CONFIG_IMA_APPRAISE */ 134 135#if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) 136extern bool ima_appraise_signature(enum kernel_read_file_id func); 137#else 138static inline bool ima_appraise_signature(enum kernel_read_file_id func) 139{ 140 return false; 141} 142#endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ 143#endif /* _LINUX_IMA_H */