Merge branch 'master' into next
Conflicts: security/smack/smack_lsm.c Verified and added fix by Stephen Rothwell <sfr@canb.auug.org.au> Ok'd by Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
@@ -457,7 +457,6 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
|
||||
* called when the actual read/write operations are performed.
|
||||
* @inode contains the inode structure to check.
|
||||
* @mask contains the permission mask.
|
||||
* @nd contains the nameidata (may be NULL).
|
||||
* Return 0 if permission is granted.
|
||||
* @inode_setattr:
|
||||
* Check permission before setting file attributes. Note that the kernel
|
||||
@@ -796,8 +795,9 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
|
||||
* @unix_stream_connect:
|
||||
* Check permissions before establishing a Unix domain stream connection
|
||||
* between @sock and @other.
|
||||
* @sock contains the socket structure.
|
||||
* @other contains the peer socket structure.
|
||||
* @sock contains the sock structure.
|
||||
* @other contains the peer sock structure.
|
||||
* @newsk contains the new sock structure.
|
||||
* Return 0 if permission is granted.
|
||||
* @unix_may_send:
|
||||
* Check permissions before connecting or sending datagrams from @sock to
|
||||
@@ -1567,8 +1567,7 @@ struct security_operations {
|
||||
int (*inode_getsecctx)(struct inode *inode, void **ctx, u32 *ctxlen);
|
||||
|
||||
#ifdef CONFIG_SECURITY_NETWORK
|
||||
int (*unix_stream_connect) (struct socket *sock,
|
||||
struct socket *other, struct sock *newsk);
|
||||
int (*unix_stream_connect) (struct sock *sock, struct sock *other, struct sock *newsk);
|
||||
int (*unix_may_send) (struct socket *sock, struct socket *other);
|
||||
|
||||
int (*socket_create) (int family, int type, int protocol, int kern);
|
||||
@@ -1712,6 +1711,7 @@ int security_inode_rename(struct inode *old_dir, struct dentry *old_dentry,
|
||||
int security_inode_readlink(struct dentry *dentry);
|
||||
int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd);
|
||||
int security_inode_permission(struct inode *inode, int mask);
|
||||
int security_inode_exec_permission(struct inode *inode, unsigned int flags);
|
||||
int security_inode_setattr(struct dentry *dentry, struct iattr *attr);
|
||||
int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry);
|
||||
int security_inode_setxattr(struct dentry *dentry, const char *name,
|
||||
@@ -2101,6 +2101,12 @@ static inline int security_inode_permission(struct inode *inode, int mask)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_inode_exec_permission(struct inode *inode,
|
||||
unsigned int flags)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_inode_setattr(struct dentry *dentry,
|
||||
struct iattr *attr)
|
||||
{
|
||||
@@ -2524,8 +2530,7 @@ static inline int security_inode_getsecctx(struct inode *inode, void **ctx, u32
|
||||
|
||||
#ifdef CONFIG_SECURITY_NETWORK
|
||||
|
||||
int security_unix_stream_connect(struct socket *sock, struct socket *other,
|
||||
struct sock *newsk);
|
||||
int security_unix_stream_connect(struct sock *sock, struct sock *other, struct sock *newsk);
|
||||
int security_unix_may_send(struct socket *sock, struct socket *other);
|
||||
int security_socket_create(int family, int type, int protocol, int kern);
|
||||
int security_socket_post_create(struct socket *sock, int family,
|
||||
@@ -2566,8 +2571,8 @@ void security_tun_dev_post_create(struct sock *sk);
|
||||
int security_tun_dev_attach(struct sock *sk);
|
||||
|
||||
#else /* CONFIG_SECURITY_NETWORK */
|
||||
static inline int security_unix_stream_connect(struct socket *sock,
|
||||
struct socket *other,
|
||||
static inline int security_unix_stream_connect(struct sock *sock,
|
||||
struct sock *other,
|
||||
struct sock *newsk)
|
||||
{
|
||||
return 0;
|
||||
|
||||
Reference in New Issue
Block a user