1 /* SPDX-License-Identifier: GPL-2.0-only */ 2 /* 3 * Copyright (C) 2008 IBM Corporation 4 * Author: Mimi Zohar <zohar@us.ibm.com> 5 */ 6 7 #ifndef _LINUX_IMA_H 8 #define _LINUX_IMA_H 9 10 #include <linux/fs.h> 11 #include <linux/security.h> 12 #include <linux/kexec.h> 13 struct linux_binprm; 14 15 #ifdef CONFIG_IMA 16 extern int ima_bprm_check(struct linux_binprm *bprm); 17 extern int ima_file_check(struct file *file, int mask); 18 extern void ima_post_create_tmpfile(struct inode *inode); 19 extern void ima_file_free(struct file *file); 20 extern int ima_file_mmap(struct file *file, unsigned long prot); 21 extern int ima_load_data(enum kernel_load_data_id id); 22 extern int ima_read_file(struct file *file, enum kernel_read_file_id id); 23 extern int ima_post_read_file(struct file *file, void *buf, loff_t size, 24 enum kernel_read_file_id id); 25 extern void ima_post_path_mknod(struct dentry *dentry); 26 extern void ima_kexec_cmdline(const void *buf, int size); 27 28 #ifdef CONFIG_IMA_KEXEC 29 extern void ima_add_kexec_buffer(struct kimage *image); 30 #endif 31 32 #if (defined(CONFIG_X86) && defined(CONFIG_EFI)) || defined(CONFIG_S390) 33 extern bool arch_ima_get_secureboot(void); 34 extern const char * const *arch_get_ima_policy(void); 35 #else 36 static inline bool arch_ima_get_secureboot(void) 37 { 38 return false; 39 } 40 41 static inline const char * const *arch_get_ima_policy(void) 42 { 43 return NULL; 44 } 45 #endif 46 47 #else 48 static inline int ima_bprm_check(struct linux_binprm *bprm) 49 { 50 return 0; 51 } 52 53 static inline int ima_file_check(struct file *file, int mask) 54 { 55 return 0; 56 } 57 58 static inline void ima_post_create_tmpfile(struct inode *inode) 59 { 60 } 61 62 static inline void ima_file_free(struct file *file) 63 { 64 return; 65 } 66 67 static inline int ima_file_mmap(struct file *file, unsigned long prot) 68 { 69 return 0; 70 } 71 72 static inline int ima_load_data(enum kernel_load_data_id id) 73 { 74 return 0; 75 } 76 77 static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) 78 { 79 return 0; 80 } 81 82 static inline int ima_post_read_file(struct file *file, void *buf, loff_t size, 83 enum kernel_read_file_id id) 84 { 85 return 0; 86 } 87 88 static inline void ima_post_path_mknod(struct dentry *dentry) 89 { 90 return; 91 } 92 93 static inline void ima_kexec_cmdline(const void *buf, int size) {} 94 #endif /* CONFIG_IMA */ 95 96 #ifndef CONFIG_IMA_KEXEC 97 struct kimage; 98 99 static inline void ima_add_kexec_buffer(struct kimage *image) 100 {} 101 #endif 102 103 #ifdef CONFIG_IMA_APPRAISE 104 extern bool is_ima_appraise_enabled(void); 105 extern void ima_inode_post_setattr(struct dentry *dentry); 106 extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, 107 const void *xattr_value, size_t xattr_value_len); 108 extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name); 109 #else 110 static inline bool is_ima_appraise_enabled(void) 111 { 112 return 0; 113 } 114 115 static inline void ima_inode_post_setattr(struct dentry *dentry) 116 { 117 return; 118 } 119 120 static inline int ima_inode_setxattr(struct dentry *dentry, 121 const char *xattr_name, 122 const void *xattr_value, 123 size_t xattr_value_len) 124 { 125 return 0; 126 } 127 128 static inline int ima_inode_removexattr(struct dentry *dentry, 129 const char *xattr_name) 130 { 131 return 0; 132 } 133 #endif /* CONFIG_IMA_APPRAISE */ 134 135 #if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) 136 extern bool ima_appraise_signature(enum kernel_read_file_id func); 137 #else 138 static inline bool ima_appraise_signature(enum kernel_read_file_id func) 139 { 140 return false; 141 } 142 #endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ 143 #endif /* _LINUX_IMA_H */ 144