Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at 703ccb63ae9f7444d6ff876d024e17f628103c69 114 lines 3.0 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2008 IBM Corporation 4 * Author: Mimi Zohar <zohar@us.ibm.com> 5 */ 6 7#ifndef _LINUX_IMA_H 8#define _LINUX_IMA_H 9 10#include <linux/kernel_read_file.h> 11#include <linux/fs.h> 12#include <linux/security.h> 13#include <linux/kexec.h> 14#include <crypto/hash_info.h> 15struct linux_binprm; 16 17#ifdef CONFIG_IMA 18extern enum hash_algo ima_get_current_hash_algo(void); 19extern int ima_file_hash(struct file *file, char *buf, size_t buf_size); 20extern int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size); 21extern void ima_kexec_cmdline(int kernel_fd, const void *buf, int size); 22extern int ima_measure_critical_data(const char *event_label, 23 const char *event_name, 24 const void *buf, size_t buf_len, 25 bool hash, u8 *digest, size_t digest_len); 26 27#ifdef CONFIG_IMA_APPRAISE_BOOTPARAM 28extern void ima_appraise_parse_cmdline(void); 29#else 30static inline void ima_appraise_parse_cmdline(void) {} 31#endif 32 33#ifdef CONFIG_IMA_KEXEC 34extern void ima_add_kexec_buffer(struct kimage *image); 35extern void ima_kexec_post_load(struct kimage *image); 36#else 37static inline void ima_kexec_post_load(struct kimage *image) {} 38#endif 39 40#else 41static inline enum hash_algo ima_get_current_hash_algo(void) 42{ 43 return HASH_ALGO__LAST; 44} 45 46static inline int ima_file_hash(struct file *file, char *buf, size_t buf_size) 47{ 48 return -EOPNOTSUPP; 49} 50 51static inline int ima_inode_hash(struct inode *inode, char *buf, size_t buf_size) 52{ 53 return -EOPNOTSUPP; 54} 55 56static inline void ima_kexec_cmdline(int kernel_fd, const void *buf, int size) {} 57 58static inline int ima_measure_critical_data(const char *event_label, 59 const char *event_name, 60 const void *buf, size_t buf_len, 61 bool hash, u8 *digest, 62 size_t digest_len) 63{ 64 return -ENOENT; 65} 66 67#endif /* CONFIG_IMA */ 68 69#ifdef CONFIG_HAVE_IMA_KEXEC 70int __init ima_free_kexec_buffer(void); 71int __init ima_get_kexec_buffer(void **addr, size_t *size); 72int ima_validate_range(phys_addr_t phys, size_t size); 73#endif 74 75#ifdef CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT 76extern bool arch_ima_get_secureboot(void); 77extern const char * const *arch_get_ima_policy(void); 78#else 79static inline bool arch_ima_get_secureboot(void) 80{ 81 return false; 82} 83 84static inline const char * const *arch_get_ima_policy(void) 85{ 86 return NULL; 87} 88#endif 89 90#ifndef CONFIG_IMA_KEXEC 91struct kimage; 92 93static inline void ima_add_kexec_buffer(struct kimage *image) 94{} 95#endif 96 97#ifdef CONFIG_IMA_APPRAISE 98extern bool is_ima_appraise_enabled(void); 99#else 100static inline bool is_ima_appraise_enabled(void) 101{ 102 return 0; 103} 104#endif /* CONFIG_IMA_APPRAISE */ 105 106#if defined(CONFIG_IMA_APPRAISE) && defined(CONFIG_INTEGRITY_TRUSTED_KEYRING) 107extern bool ima_appraise_signature(enum kernel_read_file_id func); 108#else 109static inline bool ima_appraise_signature(enum kernel_read_file_id func) 110{ 111 return false; 112} 113#endif /* CONFIG_IMA_APPRAISE && CONFIG_INTEGRITY_TRUSTED_KEYRING */ 114#endif /* _LINUX_IMA_H */