ima.h (ed32f8d42cee118b075e4372a55c7739a11094b2) | ima.h (9044d627fd18f9fca49b62d4619ee14914b91464) |
---|---|
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 4 * 5 * Authors: 6 * Reiner Sailer <sailer@watson.ibm.com> 7 * Mimi Zohar <zohar@us.ibm.com> 8 * --- 288 unchanged lines hidden (view full) --- 297static inline int ima_read_xattr(struct dentry *dentry, 298 struct evm_ima_xattr_data **xattr_value) 299{ 300 return 0; 301} 302 303#endif /* CONFIG_IMA_APPRAISE */ 304 | 1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2005,2006,2007,2008 IBM Corporation 4 * 5 * Authors: 6 * Reiner Sailer <sailer@watson.ibm.com> 7 * Mimi Zohar <zohar@us.ibm.com> 8 * --- 288 unchanged lines hidden (view full) --- 297static inline int ima_read_xattr(struct dentry *dentry, 298 struct evm_ima_xattr_data **xattr_value) 299{ 300 return 0; 301} 302 303#endif /* CONFIG_IMA_APPRAISE */ 304 |
305#ifdef CONFIG_IMA_APPRAISE_MODSIG 306bool ima_hook_supports_modsig(enum ima_hooks func); 307#else 308static inline bool ima_hook_supports_modsig(enum ima_hooks func) 309{ 310 return false; 311} 312#endif /* CONFIG_IMA_APPRAISE_MODSIG */ 313 |
|
305/* LSM based policy rules require audit */ 306#ifdef CONFIG_IMA_LSM_RULES 307 308#define security_filter_rule_init security_audit_rule_init 309#define security_filter_rule_match security_audit_rule_match 310 311#else 312 --- 20 unchanged lines hidden --- | 314/* LSM based policy rules require audit */ 315#ifdef CONFIG_IMA_LSM_RULES 316 317#define security_filter_rule_init security_audit_rule_init 318#define security_filter_rule_match security_audit_rule_match 319 320#else 321 --- 20 unchanged lines hidden --- |