diff options
author | Dmitry Kasatkin <dmitry.kasatkin@intel.com> | 2012-06-25 11:18:21 +0200 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2012-07-05 22:43:59 +0200 |
commit | 417c6c8ee2eb6975f357d8975af94ba5fbeaf82d (patch) | |
tree | 02af1e4363f415bfaa45c50a530cee78ecdf87b8 /security/integrity/ima/ima.h | |
parent | ima: ima_initialized is set only if successful (diff) | |
download | linux-417c6c8ee2eb6975f357d8975af94ba5fbeaf82d.tar.xz linux-417c6c8ee2eb6975f357d8975af94ba5fbeaf82d.zip |
ima: audit is compiled only when enabled
IMA auditing code was compiled even when CONFIG_AUDIT was not enabled.
This patch compiles auditing code only when possible and enabled.
Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima.h')
-rw-r--r-- | security/integrity/ima/ima.h | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h index 3ccf7acac6df..e7c99fd0d223 100644 --- a/security/integrity/ima/ima.h +++ b/security/integrity/ima/ima.h @@ -61,10 +61,19 @@ struct ima_queue_entry { }; extern struct list_head ima_measurements; /* list of all measurements */ +#ifdef CONFIG_IMA_AUDIT /* declarations */ void integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info); +#else +static inline void integrity_audit_msg(int audit_msgno, struct inode *inode, + const unsigned char *fname, + const char *op, const char *cause, + int result, int info) +{ +} +#endif /* Internal IMA function definitions */ int ima_init(void); |