diff options
Diffstat (limited to 'security/dummy.c')
-rw-r--r-- | security/dummy.c | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/security/dummy.c b/security/dummy.c index 43874c1e6e23..558795b237d6 100644 --- a/security/dummy.c +++ b/security/dummy.c | |||
@@ -828,6 +828,11 @@ static inline void dummy_inet_csk_clone(struct sock *newsk, | |||
828 | { | 828 | { |
829 | } | 829 | } |
830 | 830 | ||
831 | static inline void dummy_inet_conn_established(struct sock *sk, | ||
832 | struct sk_buff *skb) | ||
833 | { | ||
834 | } | ||
835 | |||
831 | static inline void dummy_req_classify_flow(const struct request_sock *req, | 836 | static inline void dummy_req_classify_flow(const struct request_sock *req, |
832 | struct flowi *fl) | 837 | struct flowi *fl) |
833 | { | 838 | { |
@@ -836,7 +841,7 @@ static inline void dummy_req_classify_flow(const struct request_sock *req, | |||
836 | 841 | ||
837 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 842 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
838 | static int dummy_xfrm_policy_alloc_security(struct xfrm_policy *xp, | 843 | static int dummy_xfrm_policy_alloc_security(struct xfrm_policy *xp, |
839 | struct xfrm_user_sec_ctx *sec_ctx, struct sock *sk) | 844 | struct xfrm_user_sec_ctx *sec_ctx) |
840 | { | 845 | { |
841 | return 0; | 846 | return 0; |
842 | } | 847 | } |
@@ -856,7 +861,7 @@ static int dummy_xfrm_policy_delete_security(struct xfrm_policy *xp) | |||
856 | } | 861 | } |
857 | 862 | ||
858 | static int dummy_xfrm_state_alloc_security(struct xfrm_state *x, | 863 | static int dummy_xfrm_state_alloc_security(struct xfrm_state *x, |
859 | struct xfrm_user_sec_ctx *sec_ctx, struct xfrm_sec_ctx *pol, u32 secid) | 864 | struct xfrm_user_sec_ctx *sec_ctx, u32 secid) |
860 | { | 865 | { |
861 | return 0; | 866 | return 0; |
862 | } | 867 | } |
@@ -881,12 +886,6 @@ static int dummy_xfrm_state_pol_flow_match(struct xfrm_state *x, | |||
881 | return 1; | 886 | return 1; |
882 | } | 887 | } |
883 | 888 | ||
884 | static int dummy_xfrm_flow_state_match(struct flowi *fl, struct xfrm_state *xfrm, | ||
885 | struct xfrm_policy *xp) | ||
886 | { | ||
887 | return 1; | ||
888 | } | ||
889 | |||
890 | static int dummy_xfrm_decode_session(struct sk_buff *skb, u32 *fl, int ckall) | 889 | static int dummy_xfrm_decode_session(struct sk_buff *skb, u32 *fl, int ckall) |
891 | { | 890 | { |
892 | return 0; | 891 | return 0; |
@@ -1108,6 +1107,7 @@ void security_fixup_ops (struct security_operations *ops) | |||
1108 | set_to_dummy_if_null(ops, sock_graft); | 1107 | set_to_dummy_if_null(ops, sock_graft); |
1109 | set_to_dummy_if_null(ops, inet_conn_request); | 1108 | set_to_dummy_if_null(ops, inet_conn_request); |
1110 | set_to_dummy_if_null(ops, inet_csk_clone); | 1109 | set_to_dummy_if_null(ops, inet_csk_clone); |
1110 | set_to_dummy_if_null(ops, inet_conn_established); | ||
1111 | set_to_dummy_if_null(ops, req_classify_flow); | 1111 | set_to_dummy_if_null(ops, req_classify_flow); |
1112 | #endif /* CONFIG_SECURITY_NETWORK */ | 1112 | #endif /* CONFIG_SECURITY_NETWORK */ |
1113 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 1113 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
@@ -1120,7 +1120,6 @@ void security_fixup_ops (struct security_operations *ops) | |||
1120 | set_to_dummy_if_null(ops, xfrm_state_delete_security); | 1120 | set_to_dummy_if_null(ops, xfrm_state_delete_security); |
1121 | set_to_dummy_if_null(ops, xfrm_policy_lookup); | 1121 | set_to_dummy_if_null(ops, xfrm_policy_lookup); |
1122 | set_to_dummy_if_null(ops, xfrm_state_pol_flow_match); | 1122 | set_to_dummy_if_null(ops, xfrm_state_pol_flow_match); |
1123 | set_to_dummy_if_null(ops, xfrm_flow_state_match); | ||
1124 | set_to_dummy_if_null(ops, xfrm_decode_session); | 1123 | set_to_dummy_if_null(ops, xfrm_decode_session); |
1125 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ | 1124 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ |
1126 | #ifdef CONFIG_KEYS | 1125 | #ifdef CONFIG_KEYS |