ima.h (ed32f8d42cee118b075e4372a55c7739a11094b2) ima.h (9044d627fd18f9fca49b62d4619ee14914b91464)
1/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
4 *
5 * Authors:
6 * Reiner Sailer <sailer@watson.ibm.com>
7 * Mimi Zohar <zohar@us.ibm.com>
8 *

--- 288 unchanged lines hidden (view full) ---

297static inline int ima_read_xattr(struct dentry *dentry,
298 struct evm_ima_xattr_data **xattr_value)
299{
300 return 0;
301}
302
303#endif /* CONFIG_IMA_APPRAISE */
304
1/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
4 *
5 * Authors:
6 * Reiner Sailer <sailer@watson.ibm.com>
7 * Mimi Zohar <zohar@us.ibm.com>
8 *

--- 288 unchanged lines hidden (view full) ---

297static inline int ima_read_xattr(struct dentry *dentry,
298 struct evm_ima_xattr_data **xattr_value)
299{
300 return 0;
301}
302
303#endif /* CONFIG_IMA_APPRAISE */
304
305#ifdef CONFIG_IMA_APPRAISE_MODSIG
306bool ima_hook_supports_modsig(enum ima_hooks func);
307#else
308static inline bool ima_hook_supports_modsig(enum ima_hooks func)
309{
310 return false;
311}
312#endif /* CONFIG_IMA_APPRAISE_MODSIG */
313
305/* LSM based policy rules require audit */
306#ifdef CONFIG_IMA_LSM_RULES
307
308#define security_filter_rule_init security_audit_rule_init
309#define security_filter_rule_match security_audit_rule_match
310
311#else
312

--- 20 unchanged lines hidden ---
314/* LSM based policy rules require audit */
315#ifdef CONFIG_IMA_LSM_RULES
316
317#define security_filter_rule_init security_audit_rule_init
318#define security_filter_rule_match security_audit_rule_match
319
320#else
321

--- 20 unchanged lines hidden ---