xref: /linux/include/linux/ima.h (revision 9a6b55ac)
1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /*
3  * Copyright (C) 2008 IBM Corporation
4  * Author: Mimi Zohar <zohar@us.ibm.com>
5  */
6 
7 #ifndef _LINUX_IMA_H
8 #define _LINUX_IMA_H
9 
10 #include <linux/fs.h>
11 #include <linux/security.h>
12 #include <linux/kexec.h>
13 struct linux_binprm;
14 
15 #ifdef CONFIG_IMA
16 extern int ima_bprm_check(struct linux_binprm *bprm);
17 extern int ima_file_check(struct file *file, int mask);
18 extern void ima_post_create_tmpfile(struct inode *inode);
19 extern void ima_file_free(struct file *file);
20 extern int ima_file_mmap(struct file *file, unsigned long prot);
21 extern int ima_load_data(enum kernel_load_data_id id);
22 extern int ima_read_file(struct file *file, enum kernel_read_file_id id);
23 extern int ima_post_read_file(struct file *file, void *buf, loff_t size,
24 			      enum kernel_read_file_id id);
25 extern void ima_post_path_mknod(struct dentry *dentry);
26 extern void ima_kexec_cmdline(const void *buf, int size);
27 
28 #ifdef CONFIG_IMA_KEXEC
29 extern void ima_add_kexec_buffer(struct kimage *image);
30 #endif
31 
32 #if (defined(CONFIG_X86) && defined(CONFIG_EFI)) || defined(CONFIG_S390) \
33 	|| defined(CONFIG_PPC_SECURE_BOOT)
34 extern bool arch_ima_get_secureboot(void);
35 extern const char * const *arch_get_ima_policy(void);
36 #else
37 static inline bool arch_ima_get_secureboot(void)
38 {
39 	return false;
40 }
41 
42 static inline const char * const *arch_get_ima_policy(void)
43 {
44 	return NULL;
45 }
46 #endif
47 
48 #else
49 static inline int ima_bprm_check(struct linux_binprm *bprm)
50 {
51 	return 0;
52 }
53 
54 static inline int ima_file_check(struct file *file, int mask)
55 {
56 	return 0;
57 }
58 
59 static inline void ima_post_create_tmpfile(struct inode *inode)
60 {
61 }
62 
63 static inline void ima_file_free(struct file *file)
64 {
65 	return;
66 }
67 
68 static inline int ima_file_mmap(struct file *file, unsigned long prot)
69 {
70 	return 0;
71 }
72 
73 static inline int ima_load_data(enum kernel_load_data_id id)
74 {
75 	return 0;
76 }
77 
78 static inline int ima_read_file(struct file *file, enum kernel_read_file_id id)
79 {
80 	return 0;
81 }
82 
83 static inline int ima_post_read_file(struct file *file, void *buf, loff_t size,
84 				     enum kernel_read_file_id id)
85 {
86 	return 0;
87 }
88 
89 static inline void ima_post_path_mknod(struct dentry *dentry)
90 {
91 	return;
92 }
93 
94 static inline void ima_kexec_cmdline(const void *buf, int size) {}
95 #endif /* CONFIG_IMA */
96 
97 #ifndef CONFIG_IMA_KEXEC
98 struct kimage;
99 
100 static inline void ima_add_kexec_buffer(struct kimage *image)
101 {}
102 #endif
103 
104 #ifdef CONFIG_IMA_APPRAISE
105 extern bool is_ima_appraise_enabled(void);
106 extern void ima_inode_post_setattr(struct dentry *dentry);
107 extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name,
108 		       const void *xattr_value, size_t xattr_value_len);
109 extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name);
110 #else
111 static inline bool is_ima_appraise_enabled(void)
112 {
113 	return 0;
114 }
115 
116 static inline void ima_inode_post_setattr(struct dentry *dentry)
117 {
118 	return;
119 }
120 
121 static inline int ima_inode_setxattr(struct dentry *dentry,
122 				     const char *xattr_name,
123 				     const void *xattr_value,
124 				     size_t xattr_value_len)
125 {
126 	return 0;
127 }
128 
129 static inline int ima_inode_removexattr(struct dentry *dentry,
130 					const char *xattr_name)
131 {
132 	return 0;
133 }
134 #endif /* CONFIG_IMA_APPRAISE */
135 
136 #if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING)
137 extern bool ima_appraise_signature(enum kernel_read_file_id func);
138 #else
139 static inline bool ima_appraise_signature(enum kernel_read_file_id func)
140 {
141 	return false;
142 }
143 #endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */
144 #endif /* _LINUX_IMA_H */
145