at v5.5 3.5 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2008 IBM Corporation 4 * Author: Mimi Zohar <zohar@us.ibm.com> 5 */ 6 7#ifndef _LINUX_IMA_H 8#define _LINUX_IMA_H 9 10#include <linux/fs.h> 11#include <linux/security.h> 12#include <linux/kexec.h> 13struct linux_binprm; 14 15#ifdef CONFIG_IMA 16extern int ima_bprm_check(struct linux_binprm *bprm); 17extern int ima_file_check(struct file *file, int mask); 18extern void ima_post_create_tmpfile(struct inode *inode); 19extern void ima_file_free(struct file *file); 20extern int ima_file_mmap(struct file *file, unsigned long prot); 21extern int ima_load_data(enum kernel_load_data_id id); 22extern int ima_read_file(struct file *file, enum kernel_read_file_id id); 23extern int ima_post_read_file(struct file *file, void *buf, loff_t size, 24 enum kernel_read_file_id id); 25extern void ima_post_path_mknod(struct dentry *dentry); 26extern void ima_kexec_cmdline(const void *buf, int size); 27 28#ifdef CONFIG_IMA_KEXEC 29extern void ima_add_kexec_buffer(struct kimage *image); 30#endif 31 32#if (defined(CONFIG_X86) && defined(CONFIG_EFI)) || defined(CONFIG_S390) \ 33 || defined(CONFIG_PPC_SECURE_BOOT) 34extern bool arch_ima_get_secureboot(void); 35extern const char * const *arch_get_ima_policy(void); 36#else 37static inline bool arch_ima_get_secureboot(void) 38{ 39 return false; 40} 41 42static inline const char * const *arch_get_ima_policy(void) 43{ 44 return NULL; 45} 46#endif 47 48#else 49static inline int ima_bprm_check(struct linux_binprm *bprm) 50{ 51 return 0; 52} 53 54static inline int ima_file_check(struct file *file, int mask) 55{ 56 return 0; 57} 58 59static inline void ima_post_create_tmpfile(struct inode *inode) 60{ 61} 62 63static inline void ima_file_free(struct file *file) 64{ 65 return; 66} 67 68static inline int ima_file_mmap(struct file *file, unsigned long prot) 69{ 70 return 0; 71} 72 73static inline int ima_load_data(enum kernel_load_data_id id) 74{ 75 return 0; 76} 77 78static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) 79{ 80 return 0; 81} 82 83static inline int ima_post_read_file(struct file *file, void *buf, loff_t size, 84 enum kernel_read_file_id id) 85{ 86 return 0; 87} 88 89static inline void ima_post_path_mknod(struct dentry *dentry) 90{ 91 return; 92} 93 94static inline void ima_kexec_cmdline(const void *buf, int size) {} 95#endif /* CONFIG_IMA */ 96 97#ifndef CONFIG_IMA_KEXEC 98struct kimage; 99 100static inline void ima_add_kexec_buffer(struct kimage *image) 101{} 102#endif 103 104#ifdef CONFIG_IMA_APPRAISE 105extern bool is_ima_appraise_enabled(void); 106extern void ima_inode_post_setattr(struct dentry *dentry); 107extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, 108 const void *xattr_value, size_t xattr_value_len); 109extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name); 110#else 111static inline bool is_ima_appraise_enabled(void) 112{ 113 return 0; 114} 115 116static inline void ima_inode_post_setattr(struct dentry *dentry) 117{ 118 return; 119} 120 121static inline int ima_inode_setxattr(struct dentry *dentry, 122 const char *xattr_name, 123 const void *xattr_value, 124 size_t xattr_value_len) 125{ 126 return 0; 127} 128 129static inline int ima_inode_removexattr(struct dentry *dentry, 130 const char *xattr_name) 131{ 132 return 0; 133} 134#endif /* CONFIG_IMA_APPRAISE */ 135 136#if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) 137extern bool ima_appraise_signature(enum kernel_read_file_id func); 138#else 139static inline bool ima_appraise_signature(enum kernel_read_file_id func) 140{ 141 return false; 142} 143#endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ 144#endif /* _LINUX_IMA_H */