1 /* SPDX-License-Identifier: GPL-2.0-only */ 2 /* 3 * Copyright (C) 2008 IBM Corporation 4 * Author: Mimi Zohar <zohar@us.ibm.com> 5 */ 6 7 #ifndef _LINUX_IMA_H 8 #define _LINUX_IMA_H 9 10 #include <linux/fs.h> 11 #include <linux/security.h> 12 #include <linux/kexec.h> 13 struct linux_binprm; 14 15 #ifdef CONFIG_IMA 16 extern int ima_bprm_check(struct linux_binprm *bprm); 17 extern int ima_file_check(struct file *file, int mask); 18 extern void ima_post_create_tmpfile(struct inode *inode); 19 extern void ima_file_free(struct file *file); 20 extern int ima_file_mmap(struct file *file, unsigned long prot); 21 extern int ima_load_data(enum kernel_load_data_id id); 22 extern int ima_read_file(struct file *file, enum kernel_read_file_id id); 23 extern int ima_post_read_file(struct file *file, void *buf, loff_t size, 24 enum kernel_read_file_id id); 25 extern void ima_post_path_mknod(struct dentry *dentry); 26 extern void ima_kexec_cmdline(const void *buf, int size); 27 28 #ifdef CONFIG_IMA_KEXEC 29 extern void ima_add_kexec_buffer(struct kimage *image); 30 #endif 31 32 #if (defined(CONFIG_X86) && defined(CONFIG_EFI)) || defined(CONFIG_S390) \ 33 || defined(CONFIG_PPC_SECURE_BOOT) 34 extern bool arch_ima_get_secureboot(void); 35 extern const char * const *arch_get_ima_policy(void); 36 #else 37 static inline bool arch_ima_get_secureboot(void) 38 { 39 return false; 40 } 41 42 static inline const char * const *arch_get_ima_policy(void) 43 { 44 return NULL; 45 } 46 #endif 47 48 #else 49 static inline int ima_bprm_check(struct linux_binprm *bprm) 50 { 51 return 0; 52 } 53 54 static inline int ima_file_check(struct file *file, int mask) 55 { 56 return 0; 57 } 58 59 static inline void ima_post_create_tmpfile(struct inode *inode) 60 { 61 } 62 63 static inline void ima_file_free(struct file *file) 64 { 65 return; 66 } 67 68 static inline int ima_file_mmap(struct file *file, unsigned long prot) 69 { 70 return 0; 71 } 72 73 static inline int ima_load_data(enum kernel_load_data_id id) 74 { 75 return 0; 76 } 77 78 static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) 79 { 80 return 0; 81 } 82 83 static inline int ima_post_read_file(struct file *file, void *buf, loff_t size, 84 enum kernel_read_file_id id) 85 { 86 return 0; 87 } 88 89 static inline void ima_post_path_mknod(struct dentry *dentry) 90 { 91 return; 92 } 93 94 static inline void ima_kexec_cmdline(const void *buf, int size) {} 95 #endif /* CONFIG_IMA */ 96 97 #ifndef CONFIG_IMA_KEXEC 98 struct kimage; 99 100 static inline void ima_add_kexec_buffer(struct kimage *image) 101 {} 102 #endif 103 104 #ifdef CONFIG_IMA_APPRAISE 105 extern bool is_ima_appraise_enabled(void); 106 extern void ima_inode_post_setattr(struct dentry *dentry); 107 extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, 108 const void *xattr_value, size_t xattr_value_len); 109 extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name); 110 #else 111 static inline bool is_ima_appraise_enabled(void) 112 { 113 return 0; 114 } 115 116 static inline void ima_inode_post_setattr(struct dentry *dentry) 117 { 118 return; 119 } 120 121 static inline int ima_inode_setxattr(struct dentry *dentry, 122 const char *xattr_name, 123 const void *xattr_value, 124 size_t xattr_value_len) 125 { 126 return 0; 127 } 128 129 static inline int ima_inode_removexattr(struct dentry *dentry, 130 const char *xattr_name) 131 { 132 return 0; 133 } 134 #endif /* CONFIG_IMA_APPRAISE */ 135 136 #if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) 137 extern bool ima_appraise_signature(enum kernel_read_file_id func); 138 #else 139 static inline bool ima_appraise_signature(enum kernel_read_file_id func) 140 { 141 return false; 142 } 143 #endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ 144 #endif /* _LINUX_IMA_H */ 145