| .. | .. |
|---|
| 378 | 378 | /** |
|---|
| 379 | 379 | * ima_file_mmap - based on policy, collect/store measurement. |
|---|
| 380 | 380 | * @file: pointer to the file to be measured (May be NULL) |
|---|
| 381 | | - * @prot: contains the protection that will be applied by the kernel. |
|---|
| 381 | + * @reqprot: protection requested by the application |
|---|
| 382 | + * @prot: protection that will be applied by the kernel |
|---|
| 383 | + * @flags: operational flags |
|---|
| 382 | 384 | * |
|---|
| 383 | 385 | * Measure files being mmapped executable based on the ima_must_measure() |
|---|
| 384 | 386 | * policy decision. |
|---|
| .. | .. |
|---|
| 386 | 388 | * On success return 0. On integrity appraisal error, assuming the file |
|---|
| 387 | 389 | * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. |
|---|
| 388 | 390 | */ |
|---|
| 389 | | -int ima_file_mmap(struct file *file, unsigned long prot) |
|---|
| 391 | +int ima_file_mmap(struct file *file, unsigned long reqprot, |
|---|
| 392 | + unsigned long prot, unsigned long flags) |
|---|
| 390 | 393 | { |
|---|
| 391 | 394 | u32 secid; |
|---|
| 392 | 395 | |
|---|
| .. | .. |
|---|
| 743 | 746 | pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); |
|---|
| 744 | 747 | return -EACCES; /* INTEGRITY_UNKNOWN */ |
|---|
| 745 | 748 | } |
|---|
| 749 | + break; |
|---|
| 746 | 750 | default: |
|---|
| 747 | 751 | break; |
|---|
| 748 | 752 | } |
|---|