diff options
author | Grant Likely <grant.likely@secretlab.ca> | 2010-12-30 00:20:30 -0500 |
---|---|---|
committer | Grant Likely <grant.likely@secretlab.ca> | 2010-12-30 00:21:47 -0500 |
commit | d392da5207352f09030e95d9ea335a4225667ec0 (patch) | |
tree | 7d6cd1932afcad0a5619a5c504a6d93ca318187c /security/capability.c | |
parent | e39d5ef678045d61812c1401f04fe8edb14d6359 (diff) | |
parent | 387c31c7e5c9805b0aef8833d1731a5fe7bdea14 (diff) |
Merge v2.6.37-rc8 into powerpc/next
Diffstat (limited to 'security/capability.c')
-rw-r--r-- | security/capability.c | 25 |
1 files changed, 23 insertions, 2 deletions
diff --git a/security/capability.c b/security/capability.c index a0bbf30fb6dc..c773635ca3a0 100644 --- a/security/capability.c +++ b/security/capability.c | |||
@@ -17,6 +17,11 @@ static int cap_sysctl(ctl_table *table, int op) | |||
17 | return 0; | 17 | return 0; |
18 | } | 18 | } |
19 | 19 | ||
20 | static int cap_syslog(int type) | ||
21 | { | ||
22 | return 0; | ||
23 | } | ||
24 | |||
20 | static int cap_quotactl(int cmds, int type, int id, struct super_block *sb) | 25 | static int cap_quotactl(int cmds, int type, int id, struct super_block *sb) |
21 | { | 26 | { |
22 | return 0; | 27 | return 0; |
@@ -411,7 +416,8 @@ static int cap_task_getioprio(struct task_struct *p) | |||
411 | return 0; | 416 | return 0; |
412 | } | 417 | } |
413 | 418 | ||
414 | static int cap_task_setrlimit(unsigned int resource, struct rlimit *new_rlim) | 419 | static int cap_task_setrlimit(struct task_struct *p, unsigned int resource, |
420 | struct rlimit *new_rlim) | ||
415 | { | 421 | { |
416 | return 0; | 422 | return 0; |
417 | } | 423 | } |
@@ -676,7 +682,18 @@ static void cap_inet_conn_established(struct sock *sk, struct sk_buff *skb) | |||
676 | { | 682 | { |
677 | } | 683 | } |
678 | 684 | ||
685 | static int cap_secmark_relabel_packet(u32 secid) | ||
686 | { | ||
687 | return 0; | ||
688 | } | ||
679 | 689 | ||
690 | static void cap_secmark_refcount_inc(void) | ||
691 | { | ||
692 | } | ||
693 | |||
694 | static void cap_secmark_refcount_dec(void) | ||
695 | { | ||
696 | } | ||
680 | 697 | ||
681 | static void cap_req_classify_flow(const struct request_sock *req, | 698 | static void cap_req_classify_flow(const struct request_sock *req, |
682 | struct flowi *fl) | 699 | struct flowi *fl) |
@@ -776,7 +793,8 @@ static int cap_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) | |||
776 | 793 | ||
777 | static int cap_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) | 794 | static int cap_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) |
778 | { | 795 | { |
779 | return -EOPNOTSUPP; | 796 | *secid = 0; |
797 | return 0; | ||
780 | } | 798 | } |
781 | 799 | ||
782 | static void cap_release_secctx(char *secdata, u32 seclen) | 800 | static void cap_release_secctx(char *secdata, u32 seclen) |
@@ -1017,6 +1035,9 @@ void __init security_fixup_ops(struct security_operations *ops) | |||
1017 | set_to_cap_if_null(ops, inet_conn_request); | 1035 | set_to_cap_if_null(ops, inet_conn_request); |
1018 | set_to_cap_if_null(ops, inet_csk_clone); | 1036 | set_to_cap_if_null(ops, inet_csk_clone); |
1019 | set_to_cap_if_null(ops, inet_conn_established); | 1037 | set_to_cap_if_null(ops, inet_conn_established); |
1038 | set_to_cap_if_null(ops, secmark_relabel_packet); | ||
1039 | set_to_cap_if_null(ops, secmark_refcount_inc); | ||
1040 | set_to_cap_if_null(ops, secmark_refcount_dec); | ||
1020 | set_to_cap_if_null(ops, req_classify_flow); | 1041 | set_to_cap_if_null(ops, req_classify_flow); |
1021 | set_to_cap_if_null(ops, tun_dev_create); | 1042 | set_to_cap_if_null(ops, tun_dev_create); |
1022 | set_to_cap_if_null(ops, tun_dev_post_create); | 1043 | set_to_cap_if_null(ops, tun_dev_post_create); |