diff options
| author | Ingo Molnar <mingo@kernel.org> | 2013-12-17 09:27:08 -0500 |
|---|---|---|
| committer | Ingo Molnar <mingo@kernel.org> | 2013-12-17 09:27:08 -0500 |
| commit | bb799d3b980eb803ca2da4a4eefbd9308f8d988a (patch) | |
| tree | 69fbe0cd6d47b23a50f5e1d87bf7489532fae149 /security/capability.c | |
| parent | 919fc6e34831d1c2b58bfb5ae261dc3facc9b269 (diff) | |
| parent | 319e2e3f63c348a9b66db4667efa73178e18b17d (diff) | |
Merge tag 'v3.13-rc4' into core/locking
Merge Linux 3.13-rc4, to refresh this rather old tree with the latest fixes.
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'security/capability.c')
| -rw-r--r-- | security/capability.c | 15 |
1 files changed, 11 insertions, 4 deletions
diff --git a/security/capability.c b/security/capability.c index dbeb9bc27b24..8b4f24ae4338 100644 --- a/security/capability.c +++ b/security/capability.c | |||
| @@ -777,9 +777,15 @@ static int cap_xfrm_policy_delete_security(struct xfrm_sec_ctx *ctx) | |||
| 777 | return 0; | 777 | return 0; |
| 778 | } | 778 | } |
| 779 | 779 | ||
| 780 | static int cap_xfrm_state_alloc_security(struct xfrm_state *x, | 780 | static int cap_xfrm_state_alloc(struct xfrm_state *x, |
| 781 | struct xfrm_user_sec_ctx *sec_ctx, | 781 | struct xfrm_user_sec_ctx *sec_ctx) |
| 782 | u32 secid) | 782 | { |
| 783 | return 0; | ||
| 784 | } | ||
| 785 | |||
| 786 | static int cap_xfrm_state_alloc_acquire(struct xfrm_state *x, | ||
| 787 | struct xfrm_sec_ctx *polsec, | ||
| 788 | u32 secid) | ||
| 783 | { | 789 | { |
| 784 | return 0; | 790 | return 0; |
| 785 | } | 791 | } |
| @@ -1101,7 +1107,8 @@ void __init security_fixup_ops(struct security_operations *ops) | |||
| 1101 | set_to_cap_if_null(ops, xfrm_policy_clone_security); | 1107 | set_to_cap_if_null(ops, xfrm_policy_clone_security); |
| 1102 | set_to_cap_if_null(ops, xfrm_policy_free_security); | 1108 | set_to_cap_if_null(ops, xfrm_policy_free_security); |
| 1103 | set_to_cap_if_null(ops, xfrm_policy_delete_security); | 1109 | set_to_cap_if_null(ops, xfrm_policy_delete_security); |
| 1104 | set_to_cap_if_null(ops, xfrm_state_alloc_security); | 1110 | set_to_cap_if_null(ops, xfrm_state_alloc); |
| 1111 | set_to_cap_if_null(ops, xfrm_state_alloc_acquire); | ||
| 1105 | set_to_cap_if_null(ops, xfrm_state_free_security); | 1112 | set_to_cap_if_null(ops, xfrm_state_free_security); |
| 1106 | set_to_cap_if_null(ops, xfrm_state_delete_security); | 1113 | set_to_cap_if_null(ops, xfrm_state_delete_security); |
| 1107 | set_to_cap_if_null(ops, xfrm_policy_lookup); | 1114 | set_to_cap_if_null(ops, xfrm_policy_lookup); |
