diff options
Diffstat (limited to 'security/capability.c')
| -rw-r--r-- | security/capability.c | 22 | 
1 files changed, 15 insertions, 7 deletions
diff --git a/security/capability.c b/security/capability.c index dbeb9bc27b2..e76373de312 100644 --- a/security/capability.c +++ b/security/capability.c @@ -116,7 +116,7 @@ static int cap_dentry_init_security(struct dentry *dentry, int mode,  					struct qstr *name, void **ctx,  					u32 *ctxlen)  { -	return 0; +	return -EOPNOTSUPP;  }  static int cap_inode_alloc_security(struct inode *inode) @@ -757,7 +757,8 @@ static void cap_skb_owned_by(struct sk_buff *skb, struct sock *sk)  #ifdef CONFIG_SECURITY_NETWORK_XFRM  static int cap_xfrm_policy_alloc_security(struct xfrm_sec_ctx **ctxp, -					  struct xfrm_user_sec_ctx *sec_ctx) +					  struct xfrm_user_sec_ctx *sec_ctx, +					  gfp_t gfp)  {  	return 0;  } @@ -777,9 +778,15 @@ static int cap_xfrm_policy_delete_security(struct xfrm_sec_ctx *ctx)  	return 0;  } -static int cap_xfrm_state_alloc_security(struct xfrm_state *x, -					 struct xfrm_user_sec_ctx *sec_ctx, -					 u32 secid) +static int cap_xfrm_state_alloc(struct xfrm_state *x, +				struct xfrm_user_sec_ctx *sec_ctx) +{ +	return 0; +} + +static int cap_xfrm_state_alloc_acquire(struct xfrm_state *x, +					struct xfrm_sec_ctx *polsec, +					u32 secid)  {  	return 0;  } @@ -872,7 +879,7 @@ static void cap_key_free(struct key *key)  }  static int cap_key_permission(key_ref_t key_ref, const struct cred *cred, -			      key_perm_t perm) +			      unsigned perm)  {  	return 0;  } @@ -1101,7 +1108,8 @@ void __init security_fixup_ops(struct security_operations *ops)  	set_to_cap_if_null(ops, xfrm_policy_clone_security);  	set_to_cap_if_null(ops, xfrm_policy_free_security);  	set_to_cap_if_null(ops, xfrm_policy_delete_security); -	set_to_cap_if_null(ops, xfrm_state_alloc_security); +	set_to_cap_if_null(ops, xfrm_state_alloc); +	set_to_cap_if_null(ops, xfrm_state_alloc_acquire);  	set_to_cap_if_null(ops, xfrm_state_free_security);  	set_to_cap_if_null(ops, xfrm_state_delete_security);  	set_to_cap_if_null(ops, xfrm_policy_lookup);  | 
