diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2011-03-16 12:15:43 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2011-03-16 12:15:43 -0400 |
commit | 0f6e0e8448a16d8d22119ce91d8dd24b44865b51 (patch) | |
tree | 7c295c02db035fc6a0b867465911a2bc9dc6b1ef /kernel | |
parent | 0d2ecee2bdb2a19d04bc5cefac0f86e790f1aad4 (diff) | |
parent | a002951c97ff8da49938c982a4c236bf2fafdc9f (diff) |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6: (33 commits)
AppArmor: kill unused macros in lsm.c
AppArmor: cleanup generated files correctly
KEYS: Add an iovec version of KEYCTL_INSTANTIATE
KEYS: Add a new keyctl op to reject a key with a specified error code
KEYS: Add a key type op to permit the key description to be vetted
KEYS: Add an RCU payload dereference macro
AppArmor: Cleanup make file to remove cruft and make it easier to read
SELinux: implement the new sb_remount LSM hook
LSM: Pass -o remount options to the LSM
SELinux: Compute SID for the newly created socket
SELinux: Socket retains creator role and MLS attribute
SELinux: Auto-generate security_is_socket_class
TOMOYO: Fix memory leak upon file open.
Revert "selinux: simplify ioctl checking"
selinux: drop unused packet flow permissions
selinux: Fix packet forwarding checks on postrouting
selinux: Fix wrong checks for selinux_policycap_netpeer
selinux: Fix check for xfrm selinux context algorithm
ima: remove unnecessary call to ima_must_measure
IMA: remove IMA imbalance checking
...
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/sysctl.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 51054fea5d99..40245d697602 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c | |||
@@ -1683,13 +1683,8 @@ static int test_perm(int mode, int op) | |||
1683 | 1683 | ||
1684 | int sysctl_perm(struct ctl_table_root *root, struct ctl_table *table, int op) | 1684 | int sysctl_perm(struct ctl_table_root *root, struct ctl_table *table, int op) |
1685 | { | 1685 | { |
1686 | int error; | ||
1687 | int mode; | 1686 | int mode; |
1688 | 1687 | ||
1689 | error = security_sysctl(table, op & (MAY_READ | MAY_WRITE | MAY_EXEC)); | ||
1690 | if (error) | ||
1691 | return error; | ||
1692 | |||
1693 | if (root->permissions) | 1688 | if (root->permissions) |
1694 | mode = root->permissions(root, current->nsproxy, table); | 1689 | mode = root->permissions(root, current->nsproxy, table); |
1695 | else | 1690 | else |