.. | .. |
---|
| 1 | +/* SPDX-License-Identifier: GPL-2.0-only */ |
---|
1 | 2 | /* |
---|
2 | 3 | * Copyright (C) 2008 IBM Corporation |
---|
3 | 4 | * Author: Mimi Zohar <zohar@us.ibm.com> |
---|
4 | | - * |
---|
5 | | - * This program is free software; you can redistribute it and/or modify |
---|
6 | | - * it under the terms of the GNU General Public License as published by |
---|
7 | | - * the Free Software Foundation, version 2 of the License. |
---|
8 | 5 | */ |
---|
9 | 6 | |
---|
10 | 7 | #ifndef _LINUX_IMA_H |
---|
11 | 8 | #define _LINUX_IMA_H |
---|
12 | 9 | |
---|
| 10 | +#include <linux/kernel_read_file.h> |
---|
13 | 11 | #include <linux/fs.h> |
---|
14 | 12 | #include <linux/security.h> |
---|
15 | 13 | #include <linux/kexec.h> |
---|
.. | .. |
---|
18 | 16 | #ifdef CONFIG_IMA |
---|
19 | 17 | extern int ima_bprm_check(struct linux_binprm *bprm); |
---|
20 | 18 | extern int ima_file_check(struct file *file, int mask); |
---|
| 19 | +extern void ima_post_create_tmpfile(struct inode *inode); |
---|
21 | 20 | extern void ima_file_free(struct file *file); |
---|
22 | 21 | extern int ima_file_mmap(struct file *file, unsigned long prot); |
---|
23 | | -extern int ima_load_data(enum kernel_load_data_id id); |
---|
24 | | -extern int ima_read_file(struct file *file, enum kernel_read_file_id id); |
---|
| 22 | +extern int ima_file_mprotect(struct vm_area_struct *vma, unsigned long prot); |
---|
| 23 | +extern int ima_load_data(enum kernel_load_data_id id, bool contents); |
---|
| 24 | +extern int ima_post_load_data(char *buf, loff_t size, |
---|
| 25 | + enum kernel_load_data_id id, char *description); |
---|
| 26 | +extern int ima_read_file(struct file *file, enum kernel_read_file_id id, |
---|
| 27 | + bool contents); |
---|
25 | 28 | extern int ima_post_read_file(struct file *file, void *buf, loff_t size, |
---|
26 | 29 | enum kernel_read_file_id id); |
---|
27 | 30 | extern void ima_post_path_mknod(struct dentry *dentry); |
---|
| 31 | +extern int ima_file_hash(struct file *file, char *buf, size_t buf_size); |
---|
| 32 | +extern void ima_kexec_cmdline(int kernel_fd, const void *buf, int size); |
---|
28 | 33 | |
---|
29 | 34 | #ifdef CONFIG_IMA_KEXEC |
---|
30 | 35 | extern void ima_add_kexec_buffer(struct kimage *image); |
---|
| 36 | +#endif |
---|
| 37 | + |
---|
| 38 | +#ifdef CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT |
---|
| 39 | +extern bool arch_ima_get_secureboot(void); |
---|
| 40 | +extern const char * const *arch_get_ima_policy(void); |
---|
| 41 | +#else |
---|
| 42 | +static inline bool arch_ima_get_secureboot(void) |
---|
| 43 | +{ |
---|
| 44 | + return false; |
---|
| 45 | +} |
---|
| 46 | + |
---|
| 47 | +static inline const char * const *arch_get_ima_policy(void) |
---|
| 48 | +{ |
---|
| 49 | + return NULL; |
---|
| 50 | +} |
---|
31 | 51 | #endif |
---|
32 | 52 | |
---|
33 | 53 | #else |
---|
.. | .. |
---|
41 | 61 | return 0; |
---|
42 | 62 | } |
---|
43 | 63 | |
---|
| 64 | +static inline void ima_post_create_tmpfile(struct inode *inode) |
---|
| 65 | +{ |
---|
| 66 | +} |
---|
| 67 | + |
---|
44 | 68 | static inline void ima_file_free(struct file *file) |
---|
45 | 69 | { |
---|
46 | 70 | return; |
---|
.. | .. |
---|
51 | 75 | return 0; |
---|
52 | 76 | } |
---|
53 | 77 | |
---|
54 | | -static inline int ima_load_data(enum kernel_load_data_id id) |
---|
| 78 | +static inline int ima_file_mprotect(struct vm_area_struct *vma, |
---|
| 79 | + unsigned long prot) |
---|
55 | 80 | { |
---|
56 | 81 | return 0; |
---|
57 | 82 | } |
---|
58 | 83 | |
---|
59 | | -static inline int ima_read_file(struct file *file, enum kernel_read_file_id id) |
---|
| 84 | +static inline int ima_load_data(enum kernel_load_data_id id, bool contents) |
---|
| 85 | +{ |
---|
| 86 | + return 0; |
---|
| 87 | +} |
---|
| 88 | + |
---|
| 89 | +static inline int ima_post_load_data(char *buf, loff_t size, |
---|
| 90 | + enum kernel_load_data_id id, |
---|
| 91 | + char *description) |
---|
| 92 | +{ |
---|
| 93 | + return 0; |
---|
| 94 | +} |
---|
| 95 | + |
---|
| 96 | +static inline int ima_read_file(struct file *file, enum kernel_read_file_id id, |
---|
| 97 | + bool contents) |
---|
60 | 98 | { |
---|
61 | 99 | return 0; |
---|
62 | 100 | } |
---|
.. | .. |
---|
72 | 110 | return; |
---|
73 | 111 | } |
---|
74 | 112 | |
---|
| 113 | +static inline int ima_file_hash(struct file *file, char *buf, size_t buf_size) |
---|
| 114 | +{ |
---|
| 115 | + return -EOPNOTSUPP; |
---|
| 116 | +} |
---|
| 117 | + |
---|
| 118 | +static inline void ima_kexec_cmdline(int kernel_fd, const void *buf, int size) {} |
---|
75 | 119 | #endif /* CONFIG_IMA */ |
---|
76 | 120 | |
---|
77 | 121 | #ifndef CONFIG_IMA_KEXEC |
---|
.. | .. |
---|
80 | 124 | static inline void ima_add_kexec_buffer(struct kimage *image) |
---|
81 | 125 | {} |
---|
82 | 126 | #endif |
---|
| 127 | + |
---|
| 128 | +#ifdef CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS |
---|
| 129 | +extern void ima_post_key_create_or_update(struct key *keyring, |
---|
| 130 | + struct key *key, |
---|
| 131 | + const void *payload, size_t plen, |
---|
| 132 | + unsigned long flags, bool create); |
---|
| 133 | +#else |
---|
| 134 | +static inline void ima_post_key_create_or_update(struct key *keyring, |
---|
| 135 | + struct key *key, |
---|
| 136 | + const void *payload, |
---|
| 137 | + size_t plen, |
---|
| 138 | + unsigned long flags, |
---|
| 139 | + bool create) {} |
---|
| 140 | +#endif /* CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS */ |
---|
83 | 141 | |
---|
84 | 142 | #ifdef CONFIG_IMA_APPRAISE |
---|
85 | 143 | extern bool is_ima_appraise_enabled(void); |
---|
.. | .. |
---|
112 | 170 | return 0; |
---|
113 | 171 | } |
---|
114 | 172 | #endif /* CONFIG_IMA_APPRAISE */ |
---|
| 173 | + |
---|
| 174 | +#if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) |
---|
| 175 | +extern bool ima_appraise_signature(enum kernel_read_file_id func); |
---|
| 176 | +#else |
---|
| 177 | +static inline bool ima_appraise_signature(enum kernel_read_file_id func) |
---|
| 178 | +{ |
---|
| 179 | + return false; |
---|
| 180 | +} |
---|
| 181 | +#endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ |
---|
115 | 182 | #endif /* _LINUX_IMA_H */ |
---|