ima.h (bab739378758a1e2b2d7ddcee7bc06cf4c591c3c) ima.h (4af4662fa4a9dc62289c580337ae2506339c4729)
1/*
2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Reiner Sailer <sailer@watson.ibm.com>
6 * Mimi Zohar <zohar@us.ibm.com>
7 *
8 * This program is free software; you can redistribute it and/or

--- 123 unchanged lines hidden (view full) ---

132void iint_rcu_free(struct rcu_head *rcu);
133
134/* IMA policy related functions */
135enum ima_hooks { PATH_CHECK = 1, FILE_MMAP, BPRM_CHECK };
136
137int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask);
138void ima_init_policy(void);
139void ima_update_policy(void);
1/*
2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Reiner Sailer <sailer@watson.ibm.com>
6 * Mimi Zohar <zohar@us.ibm.com>
7 *
8 * This program is free software; you can redistribute it and/or

--- 123 unchanged lines hidden (view full) ---

132void iint_rcu_free(struct rcu_head *rcu);
133
134/* IMA policy related functions */
135enum ima_hooks { PATH_CHECK = 1, FILE_MMAP, BPRM_CHECK };
136
137int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask);
138void ima_init_policy(void);
139void ima_update_policy(void);
140int ima_parse_add_rule(char *);
141void ima_delete_rules(void);
142
143/* LSM based policy rules require audit */
144#ifdef CONFIG_IMA_LSM_RULES
145
146#define security_filter_rule_init security_audit_rule_init
147#define security_filter_rule_match security_audit_rule_match
148
149#else
150
151static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr,
152 void **lsmrule)
153{
154 return -EINVAL;
155}
156
157static inline int security_filter_rule_match(u32 secid, u32 field, u32 op,
158 void *lsmrule,
159 struct audit_context *actx)
160{
161 return -EINVAL;
162}
163#endif /* CONFIG_IMA_LSM_RULES */
140#endif
164#endif