diff options
author | Linus Torvalds <torvalds@g5.osdl.org> | 2006-03-25 12:24:53 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-03-25 12:24:53 -0500 |
commit | 1b9a3917366028cc451a98dd22e3bcd537d4e5c1 (patch) | |
tree | d911058720e0a9aeeaf9f407ccdc6fbf4047f47d /security/dummy.c | |
parent | 3661f00e2097676847deb01add1a0918044bd816 (diff) | |
parent | 71e1c784b24a026a490b3de01541fc5ee14ebc09 (diff) |
Merge branch 'audit.b3' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current
* 'audit.b3' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current: (22 commits)
[PATCH] fix audit_init failure path
[PATCH] EXPORT_SYMBOL patch for audit_log, audit_log_start, audit_log_end and audit_format
[PATCH] sem2mutex: audit_netlink_sem
[PATCH] simplify audit_free() locking
[PATCH] Fix audit operators
[PATCH] promiscuous mode
[PATCH] Add tty to syscall audit records
[PATCH] add/remove rule update
[PATCH] audit string fields interface + consumer
[PATCH] SE Linux audit events
[PATCH] Minor cosmetic cleanups to the code moved into auditfilter.c
[PATCH] Fix audit record filtering with !CONFIG_AUDITSYSCALL
[PATCH] Fix IA64 success/failure indication in syscall auditing.
[PATCH] Miscellaneous bug and warning fixes
[PATCH] Capture selinux subject/object context information.
[PATCH] Exclude messages by message type
[PATCH] Collect more inode information during syscall processing.
[PATCH] Pass dentry, not just name, in fsnotify creation hooks.
[PATCH] Define new range of userspace messages.
[PATCH] Filter rule comparators
...
Fixed trivial conflict in security/selinux/hooks.c
Diffstat (limited to 'security/dummy.c')
-rw-r--r-- | security/dummy.c | 14 |
1 files changed, 13 insertions, 1 deletions
diff --git a/security/dummy.c b/security/dummy.c index a678f094b72d..fd99429278e9 100644 --- a/security/dummy.c +++ b/security/dummy.c | |||
@@ -378,7 +378,7 @@ static int dummy_inode_removexattr (struct dentry *dentry, char *name) | |||
378 | return 0; | 378 | return 0; |
379 | } | 379 | } |
380 | 380 | ||
381 | static int dummy_inode_getsecurity(struct inode *inode, const char *name, void *buffer, size_t size, int err) | 381 | static int dummy_inode_getsecurity(const struct inode *inode, const char *name, void *buffer, size_t size, int err) |
382 | { | 382 | { |
383 | return -EOPNOTSUPP; | 383 | return -EOPNOTSUPP; |
384 | } | 384 | } |
@@ -393,6 +393,11 @@ static int dummy_inode_listsecurity(struct inode *inode, char *buffer, size_t bu | |||
393 | return 0; | 393 | return 0; |
394 | } | 394 | } |
395 | 395 | ||
396 | static const char *dummy_inode_xattr_getsuffix(void) | ||
397 | { | ||
398 | return NULL; | ||
399 | } | ||
400 | |||
396 | static int dummy_file_permission (struct file *file, int mask) | 401 | static int dummy_file_permission (struct file *file, int mask) |
397 | { | 402 | { |
398 | return 0; | 403 | return 0; |
@@ -558,6 +563,11 @@ static int dummy_ipc_permission (struct kern_ipc_perm *ipcp, short flag) | |||
558 | return 0; | 563 | return 0; |
559 | } | 564 | } |
560 | 565 | ||
566 | static int dummy_ipc_getsecurity(struct kern_ipc_perm *ipcp, void *buffer, size_t size) | ||
567 | { | ||
568 | return -EOPNOTSUPP; | ||
569 | } | ||
570 | |||
561 | static int dummy_msg_msg_alloc_security (struct msg_msg *msg) | 571 | static int dummy_msg_msg_alloc_security (struct msg_msg *msg) |
562 | { | 572 | { |
563 | return 0; | 573 | return 0; |
@@ -931,6 +941,7 @@ void security_fixup_ops (struct security_operations *ops) | |||
931 | set_to_dummy_if_null(ops, inode_getxattr); | 941 | set_to_dummy_if_null(ops, inode_getxattr); |
932 | set_to_dummy_if_null(ops, inode_listxattr); | 942 | set_to_dummy_if_null(ops, inode_listxattr); |
933 | set_to_dummy_if_null(ops, inode_removexattr); | 943 | set_to_dummy_if_null(ops, inode_removexattr); |
944 | set_to_dummy_if_null(ops, inode_xattr_getsuffix); | ||
934 | set_to_dummy_if_null(ops, inode_getsecurity); | 945 | set_to_dummy_if_null(ops, inode_getsecurity); |
935 | set_to_dummy_if_null(ops, inode_setsecurity); | 946 | set_to_dummy_if_null(ops, inode_setsecurity); |
936 | set_to_dummy_if_null(ops, inode_listsecurity); | 947 | set_to_dummy_if_null(ops, inode_listsecurity); |
@@ -965,6 +976,7 @@ void security_fixup_ops (struct security_operations *ops) | |||
965 | set_to_dummy_if_null(ops, task_reparent_to_init); | 976 | set_to_dummy_if_null(ops, task_reparent_to_init); |
966 | set_to_dummy_if_null(ops, task_to_inode); | 977 | set_to_dummy_if_null(ops, task_to_inode); |
967 | set_to_dummy_if_null(ops, ipc_permission); | 978 | set_to_dummy_if_null(ops, ipc_permission); |
979 | set_to_dummy_if_null(ops, ipc_getsecurity); | ||
968 | set_to_dummy_if_null(ops, msg_msg_alloc_security); | 980 | set_to_dummy_if_null(ops, msg_msg_alloc_security); |
969 | set_to_dummy_if_null(ops, msg_msg_free_security); | 981 | set_to_dummy_if_null(ops, msg_msg_free_security); |
970 | set_to_dummy_if_null(ops, msg_queue_alloc_security); | 982 | set_to_dummy_if_null(ops, msg_queue_alloc_security); |