]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
3e1be52d MZ |
2 | /* |
3 | * evm.h | |
4 | * | |
5 | * Copyright (c) 2009 IBM Corporation | |
6 | * Author: Mimi Zohar <zohar@us.ibm.com> | |
7 | */ | |
8 | ||
9 | #ifndef _LINUX_EVM_H | |
10 | #define _LINUX_EVM_H | |
11 | ||
12 | #include <linux/integrity.h> | |
cb723180 | 13 | #include <linux/xattr.h> |
3e1be52d | 14 | |
2960e6cb DK |
15 | struct integrity_iint_cache; |
16 | ||
3e1be52d | 17 | #ifdef CONFIG_EVM |
76266763 | 18 | extern int evm_set_key(void *key, size_t keylen); |
3e1be52d MZ |
19 | extern enum integrity_status evm_verifyxattr(struct dentry *dentry, |
20 | const char *xattr_name, | |
21 | void *xattr_value, | |
2960e6cb DK |
22 | size_t xattr_value_len, |
23 | struct integrity_iint_cache *iint); | |
817b54aa | 24 | extern int evm_inode_setattr(struct dentry *dentry, struct iattr *attr); |
975d2943 | 25 | extern void evm_inode_post_setattr(struct dentry *dentry, int ia_valid); |
7e135dc7 RS |
26 | extern int evm_inode_setxattr(struct user_namespace *mnt_userns, |
27 | struct dentry *dentry, const char *name, | |
3e1be52d MZ |
28 | const void *value, size_t size); |
29 | extern void evm_inode_post_setxattr(struct dentry *dentry, | |
30 | const char *xattr_name, | |
31 | const void *xattr_value, | |
32 | size_t xattr_value_len); | |
7e135dc7 RS |
33 | extern int evm_inode_removexattr(struct user_namespace *mnt_userns, |
34 | struct dentry *dentry, const char *xattr_name); | |
c7b87de2 MZ |
35 | extern void evm_inode_post_removexattr(struct dentry *dentry, |
36 | const char *xattr_name); | |
cb723180 MZ |
37 | extern int evm_inode_init_security(struct inode *inode, |
38 | const struct xattr *xattr_array, | |
39 | struct xattr *evm); | |
e3ccfe1a | 40 | extern bool evm_revalidate_status(const char *xattr_name); |
8c7a703e | 41 | extern int evm_protected_xattr_if_enabled(const char *req_xattr_name); |
8314b673 RS |
42 | extern int evm_read_protected_xattrs(struct dentry *dentry, u8 *buffer, |
43 | int buffer_size, char type, | |
44 | bool canonical_fmt); | |
bf6d0f5d MZ |
45 | #ifdef CONFIG_FS_POSIX_ACL |
46 | extern int posix_xattr_acl(const char *xattrname); | |
47 | #else | |
48 | static inline int posix_xattr_acl(const char *xattrname) | |
49 | { | |
50 | return 0; | |
51 | } | |
52 | #endif | |
3e1be52d | 53 | #else |
76266763 DK |
54 | |
55 | static inline int evm_set_key(void *key, size_t keylen) | |
56 | { | |
57 | return -EOPNOTSUPP; | |
58 | } | |
59 | ||
3e1be52d MZ |
60 | #ifdef CONFIG_INTEGRITY |
61 | static inline enum integrity_status evm_verifyxattr(struct dentry *dentry, | |
62 | const char *xattr_name, | |
63 | void *xattr_value, | |
2960e6cb DK |
64 | size_t xattr_value_len, |
65 | struct integrity_iint_cache *iint) | |
3e1be52d MZ |
66 | { |
67 | return INTEGRITY_UNKNOWN; | |
68 | } | |
69 | #endif | |
70 | ||
e1c9b23a | 71 | static inline int evm_inode_setattr(struct dentry *dentry, struct iattr *attr) |
817b54aa MZ |
72 | { |
73 | return 0; | |
74 | } | |
75 | ||
975d2943 MZ |
76 | static inline void evm_inode_post_setattr(struct dentry *dentry, int ia_valid) |
77 | { | |
78 | return; | |
79 | } | |
80 | ||
7e135dc7 RS |
81 | static inline int evm_inode_setxattr(struct user_namespace *mnt_userns, |
82 | struct dentry *dentry, const char *name, | |
3e1be52d MZ |
83 | const void *value, size_t size) |
84 | { | |
85 | return 0; | |
86 | } | |
87 | ||
88 | static inline void evm_inode_post_setxattr(struct dentry *dentry, | |
89 | const char *xattr_name, | |
90 | const void *xattr_value, | |
91 | size_t xattr_value_len) | |
92 | { | |
93 | return; | |
94 | } | |
95 | ||
7e135dc7 RS |
96 | static inline int evm_inode_removexattr(struct user_namespace *mnt_userns, |
97 | struct dentry *dentry, | |
3e1be52d MZ |
98 | const char *xattr_name) |
99 | { | |
100 | return 0; | |
101 | } | |
c7b87de2 MZ |
102 | |
103 | static inline void evm_inode_post_removexattr(struct dentry *dentry, | |
104 | const char *xattr_name) | |
105 | { | |
106 | return; | |
107 | } | |
108 | ||
cb723180 MZ |
109 | static inline int evm_inode_init_security(struct inode *inode, |
110 | const struct xattr *xattr_array, | |
111 | struct xattr *evm) | |
112 | { | |
5a4730ba | 113 | return 0; |
cb723180 MZ |
114 | } |
115 | ||
e3ccfe1a RS |
116 | static inline bool evm_revalidate_status(const char *xattr_name) |
117 | { | |
118 | return false; | |
119 | } | |
120 | ||
8c7a703e RS |
121 | static inline int evm_protected_xattr_if_enabled(const char *req_xattr_name) |
122 | { | |
123 | return false; | |
124 | } | |
125 | ||
8314b673 RS |
126 | static inline int evm_read_protected_xattrs(struct dentry *dentry, u8 *buffer, |
127 | int buffer_size, char type, | |
128 | bool canonical_fmt) | |
129 | { | |
130 | return -EOPNOTSUPP; | |
131 | } | |
132 | ||
e05a4f4f | 133 | #endif /* CONFIG_EVM */ |
3e1be52d | 134 | #endif /* LINUX_EVM_H */ |