aboutsummaryrefslogtreecommitdiffstats
path: root/security/integrity
diff options
context:
space:
mode:
authorDmitry Kasatkin <dmitry.kasatkin@intel.com>2012-06-25 05:18:21 -0400
committerMimi Zohar <zohar@linux.vnet.ibm.com>2012-07-05 16:43:59 -0400
commit417c6c8ee2eb6975f357d8975af94ba5fbeaf82d (patch)
tree02af1e4363f415bfaa45c50a530cee78ecdf87b8 /security/integrity
parent7ff2267af595e642f1009198ab49e86a239148fa (diff)
ima: audit is compiled only when enabled
IMA auditing code was compiled even when CONFIG_AUDIT was not enabled. This patch compiles auditing code only when possible and enabled. Signed-off-by: Dmitry Kasatkin <dmitry.kasatkin@intel.com> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'security/integrity')
-rw-r--r--security/integrity/ima/Kconfig3
-rw-r--r--security/integrity/ima/Makefile3
-rw-r--r--security/integrity/ima/ima.h9
-rw-r--r--security/integrity/ima/ima_audit.c3
4 files changed, 13 insertions, 5 deletions
diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kconfig
index 35664fe6daa..b9c1219924f 100644
--- a/security/integrity/ima/Kconfig
+++ b/security/integrity/ima/Kconfig
@@ -38,8 +38,9 @@ config IMA_MEASURE_PCR_IDX
38 measurement list. If unsure, use the default 10. 38 measurement list. If unsure, use the default 10.
39 39
40config IMA_AUDIT 40config IMA_AUDIT
41 bool 41 bool "Enables auditing support"
42 depends on IMA 42 depends on IMA
43 depends on AUDIT
43 default y 44 default y
44 help 45 help
45 This option adds a kernel parameter 'ima_audit', which 46 This option adds a kernel parameter 'ima_audit', which
diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile
index 5690c021de8..5f740f6971e 100644
--- a/security/integrity/ima/Makefile
+++ b/security/integrity/ima/Makefile
@@ -6,4 +6,5 @@
6obj-$(CONFIG_IMA) += ima.o 6obj-$(CONFIG_IMA) += ima.o
7 7
8ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 8ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
9 ima_policy.o ima_audit.o 9 ima_policy.o
10ima-$(CONFIG_IMA_AUDIT) += ima_audit.o
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
index 3ccf7acac6d..e7c99fd0d22 100644
--- a/security/integrity/ima/ima.h
+++ b/security/integrity/ima/ima.h
@@ -61,10 +61,19 @@ struct ima_queue_entry {
61}; 61};
62extern struct list_head ima_measurements; /* list of all measurements */ 62extern struct list_head ima_measurements; /* list of all measurements */
63 63
64#ifdef CONFIG_IMA_AUDIT
64/* declarations */ 65/* declarations */
65void integrity_audit_msg(int audit_msgno, struct inode *inode, 66void integrity_audit_msg(int audit_msgno, struct inode *inode,
66 const unsigned char *fname, const char *op, 67 const unsigned char *fname, const char *op,
67 const char *cause, int result, int info); 68 const char *cause, int result, int info);
69#else
70static inline void integrity_audit_msg(int audit_msgno, struct inode *inode,
71 const unsigned char *fname,
72 const char *op, const char *cause,
73 int result, int info)
74{
75}
76#endif
68 77
69/* Internal IMA function definitions */ 78/* Internal IMA function definitions */
70int ima_init(void); 79int ima_init(void);
diff --git a/security/integrity/ima/ima_audit.c b/security/integrity/ima/ima_audit.c
index 21e96bf188d..7a57f6769e9 100644
--- a/security/integrity/ima/ima_audit.c
+++ b/security/integrity/ima/ima_audit.c
@@ -17,8 +17,6 @@
17 17
18static int ima_audit; 18static int ima_audit;
19 19
20#ifdef CONFIG_IMA_AUDIT
21
22/* ima_audit_setup - enable informational auditing messages */ 20/* ima_audit_setup - enable informational auditing messages */
23static int __init ima_audit_setup(char *str) 21static int __init ima_audit_setup(char *str)
24{ 22{
@@ -29,7 +27,6 @@ static int __init ima_audit_setup(char *str)
29 return 1; 27 return 1;
30} 28}
31__setup("ima_audit=", ima_audit_setup); 29__setup("ima_audit=", ima_audit_setup);
32#endif
33 30
34void integrity_audit_msg(int audit_msgno, struct inode *inode, 31void integrity_audit_msg(int audit_msgno, struct inode *inode,
35 const unsigned char *fname, const char *op, 32 const unsigned char *fname, const char *op,