diff options
Diffstat (limited to 'security/capability.c')
-rw-r--r-- | security/capability.c | 30 |
1 files changed, 6 insertions, 24 deletions
diff --git a/security/capability.c b/security/capability.c index 38296a005465..9e99f36a8b5c 100644 --- a/security/capability.c +++ b/security/capability.c | |||
@@ -8,7 +8,6 @@ | |||
8 | * | 8 | * |
9 | */ | 9 | */ |
10 | 10 | ||
11 | #include <linux/module.h> | ||
12 | #include <linux/init.h> | 11 | #include <linux/init.h> |
13 | #include <linux/kernel.h> | 12 | #include <linux/kernel.h> |
14 | #include <linux/security.h> | 13 | #include <linux/security.h> |
@@ -38,7 +37,13 @@ static struct security_operations capability_ops = { | |||
38 | 37 | ||
39 | .inode_setxattr = cap_inode_setxattr, | 38 | .inode_setxattr = cap_inode_setxattr, |
40 | .inode_removexattr = cap_inode_removexattr, | 39 | .inode_removexattr = cap_inode_removexattr, |
40 | .inode_need_killpriv = cap_inode_need_killpriv, | ||
41 | .inode_killpriv = cap_inode_killpriv, | ||
41 | 42 | ||
43 | .task_kill = cap_task_kill, | ||
44 | .task_setscheduler = cap_task_setscheduler, | ||
45 | .task_setioprio = cap_task_setioprio, | ||
46 | .task_setnice = cap_task_setnice, | ||
42 | .task_post_setuid = cap_task_post_setuid, | 47 | .task_post_setuid = cap_task_post_setuid, |
43 | .task_reparent_to_init = cap_task_reparent_to_init, | 48 | .task_reparent_to_init = cap_task_reparent_to_init, |
44 | 49 | ||
@@ -52,7 +57,6 @@ static int secondary; | |||
52 | 57 | ||
53 | static int capability_disable; | 58 | static int capability_disable; |
54 | module_param_named(disable, capability_disable, int, 0); | 59 | module_param_named(disable, capability_disable, int, 0); |
55 | MODULE_PARM_DESC(disable, "To disable capabilities module set disable = 1"); | ||
56 | 60 | ||
57 | static int __init capability_init (void) | 61 | static int __init capability_init (void) |
58 | { | 62 | { |
@@ -75,26 +79,4 @@ static int __init capability_init (void) | |||
75 | return 0; | 79 | return 0; |
76 | } | 80 | } |
77 | 81 | ||
78 | static void __exit capability_exit (void) | ||
79 | { | ||
80 | if (capability_disable) | ||
81 | return; | ||
82 | /* remove ourselves from the security framework */ | ||
83 | if (secondary) { | ||
84 | if (mod_unreg_security (KBUILD_MODNAME, &capability_ops)) | ||
85 | printk (KERN_INFO "Failure unregistering capabilities " | ||
86 | "with primary module.\n"); | ||
87 | return; | ||
88 | } | ||
89 | |||
90 | if (unregister_security (&capability_ops)) { | ||
91 | printk (KERN_INFO | ||
92 | "Failure unregistering capabilities with the kernel\n"); | ||
93 | } | ||
94 | } | ||
95 | |||
96 | security_initcall (capability_init); | 82 | security_initcall (capability_init); |
97 | module_exit (capability_exit); | ||
98 | |||
99 | MODULE_DESCRIPTION("Standard Linux Capabilities Security Module"); | ||
100 | MODULE_LICENSE("GPL"); | ||