.. | .. |
---|
378 | 378 | /** |
---|
379 | 379 | * ima_file_mmap - based on policy, collect/store measurement. |
---|
380 | 380 | * @file: pointer to the file to be measured (May be NULL) |
---|
381 | | - * @prot: contains the protection that will be applied by the kernel. |
---|
| 381 | + * @reqprot: protection requested by the application |
---|
| 382 | + * @prot: protection that will be applied by the kernel |
---|
| 383 | + * @flags: operational flags |
---|
382 | 384 | * |
---|
383 | 385 | * Measure files being mmapped executable based on the ima_must_measure() |
---|
384 | 386 | * policy decision. |
---|
.. | .. |
---|
386 | 388 | * On success return 0. On integrity appraisal error, assuming the file |
---|
387 | 389 | * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. |
---|
388 | 390 | */ |
---|
389 | | -int ima_file_mmap(struct file *file, unsigned long prot) |
---|
| 391 | +int ima_file_mmap(struct file *file, unsigned long reqprot, |
---|
| 392 | + unsigned long prot, unsigned long flags) |
---|
390 | 393 | { |
---|
391 | 394 | u32 secid; |
---|
392 | 395 | |
---|
.. | .. |
---|
743 | 746 | pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); |
---|
744 | 747 | return -EACCES; /* INTEGRITY_UNKNOWN */ |
---|
745 | 748 | } |
---|
| 749 | + break; |
---|
746 | 750 | default: |
---|
747 | 751 | break; |
---|
748 | 752 | } |
---|