diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2024-02-15 11:30:53 +0100 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2024-02-15 23:43:40 -0500 |
commit | fec5f85e468d6f47851d531ec81f9da821768e00 (patch) | |
tree | e5adc2305a9a8a32604b9bda5a1a9dae666e7e6d /security | |
parent | 526864dd2f60c16bcdc84e9e7bc6d69d08cfee21 (diff) | |
download | linux-stable-fec5f85e468d6f47851d531ec81f9da821768e00.tar.gz linux-stable-fec5f85e468d6f47851d531ec81f9da821768e00.tar.bz2 linux-stable-fec5f85e468d6f47851d531ec81f9da821768e00.zip |
ima: Align ima_post_read_file() definition with LSM infrastructure
Change ima_post_read_file() definition, by making "void *buf" a
"char *buf", so that it can be registered as implementation of the
post_read_file hook.
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/integrity/ima/ima_main.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index b3f5e8401056..02021ee467d3 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -803,7 +803,7 @@ const int read_idmap[READING_MAX_ID] = { * On success return 0. On integrity appraisal error, assuming the file * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. */ -int ima_post_read_file(struct file *file, void *buf, loff_t size, +int ima_post_read_file(struct file *file, char *buf, loff_t size, enum kernel_read_file_id read_id) { enum ima_hooks func; |