diff options
Diffstat (limited to 'security/capability.c')
-rw-r--r-- | security/capability.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/security/capability.c b/security/capability.c index a6290b625be9..1728d4e375db 100644 --- a/security/capability.c +++ b/security/capability.c | |||
@@ -738,6 +738,11 @@ static int cap_tun_dev_open(void *security) | |||
738 | { | 738 | { |
739 | return 0; | 739 | return 0; |
740 | } | 740 | } |
741 | |||
742 | static void cap_skb_owned_by(struct sk_buff *skb, struct sock *sk) | ||
743 | { | ||
744 | } | ||
745 | |||
741 | #endif /* CONFIG_SECURITY_NETWORK */ | 746 | #endif /* CONFIG_SECURITY_NETWORK */ |
742 | 747 | ||
743 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 748 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
@@ -1072,6 +1077,7 @@ void __init security_fixup_ops(struct security_operations *ops) | |||
1072 | set_to_cap_if_null(ops, tun_dev_open); | 1077 | set_to_cap_if_null(ops, tun_dev_open); |
1073 | set_to_cap_if_null(ops, tun_dev_attach_queue); | 1078 | set_to_cap_if_null(ops, tun_dev_attach_queue); |
1074 | set_to_cap_if_null(ops, tun_dev_attach); | 1079 | set_to_cap_if_null(ops, tun_dev_attach); |
1080 | set_to_cap_if_null(ops, skb_owned_by); | ||
1075 | #endif /* CONFIG_SECURITY_NETWORK */ | 1081 | #endif /* CONFIG_SECURITY_NETWORK */ |
1076 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 1082 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
1077 | set_to_cap_if_null(ops, xfrm_policy_alloc_security); | 1083 | set_to_cap_if_null(ops, xfrm_policy_alloc_security); |