ima.h (bab739378758a1e2b2d7ddcee7bc06cf4c591c3c) | ima.h (4af4662fa4a9dc62289c580337ae2506339c4729) |
---|---|
1/* 2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 3 * 4 * Authors: 5 * Reiner Sailer <sailer@watson.ibm.com> 6 * Mimi Zohar <zohar@us.ibm.com> 7 * 8 * This program is free software; you can redistribute it and/or --- 123 unchanged lines hidden (view full) --- 132void iint_rcu_free(struct rcu_head *rcu); 133 134/* IMA policy related functions */ 135enum ima_hooks { PATH_CHECK = 1, FILE_MMAP, BPRM_CHECK }; 136 137int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask); 138void ima_init_policy(void); 139void ima_update_policy(void); | 1/* 2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 3 * 4 * Authors: 5 * Reiner Sailer <sailer@watson.ibm.com> 6 * Mimi Zohar <zohar@us.ibm.com> 7 * 8 * This program is free software; you can redistribute it and/or --- 123 unchanged lines hidden (view full) --- 132void iint_rcu_free(struct rcu_head *rcu); 133 134/* IMA policy related functions */ 135enum ima_hooks { PATH_CHECK = 1, FILE_MMAP, BPRM_CHECK }; 136 137int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask); 138void ima_init_policy(void); 139void ima_update_policy(void); |
140int ima_parse_add_rule(char *); 141void ima_delete_rules(void); 142 143/* LSM based policy rules require audit */ 144#ifdef CONFIG_IMA_LSM_RULES 145 146#define security_filter_rule_init security_audit_rule_init 147#define security_filter_rule_match security_audit_rule_match 148 149#else 150 151static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, 152 void **lsmrule) 153{ 154 return -EINVAL; 155} 156 157static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, 158 void *lsmrule, 159 struct audit_context *actx) 160{ 161 return -EINVAL; 162} 163#endif /* CONFIG_IMA_LSM_RULES */ |
|
140#endif | 164#endif |