Loading security/selinux/hooks.c +0 −1 Original line number Diff line number Diff line Loading @@ -92,7 +92,6 @@ #define NUM_SEL_MNT_OPTS 5 extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm); extern struct security_operations *security_ops; /* SECMARK reference count */ Loading security/selinux/include/security.h +3 −0 Original line number Diff line number Diff line Loading @@ -221,6 +221,9 @@ extern int selinux_disable(void); extern void exit_sel_fs(void); extern struct dentry *selinux_null; extern struct vfsmount *selinuxfs_mount; extern void selnl_notify_setenforce(int val); extern void selnl_notify_policyload(u32 seqno); extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm); #endif /* _SELINUX_SECURITY_H_ */ security/selinux/netlink.c +2 −0 Original line number Diff line number Diff line Loading @@ -19,6 +19,8 @@ #include <linux/selinux_netlink.h> #include <net/net_namespace.h> #include "security.h" static struct sock *selnl; static int selnl_msglen(int msgtype) Loading security/selinux/nlmsgtab.c +1 −0 Original line number Diff line number Diff line Loading @@ -21,6 +21,7 @@ #include "flask.h" #include "av_permissions.h" #include "security.h" struct nlmsg_perm { u16 nlmsg_type; Loading security/selinux/selinuxfs.c +0 −2 Original line number Diff line number Diff line Loading @@ -75,8 +75,6 @@ static char policy_opened; /* global data for policy capabilities */ static struct dentry *policycap_dir; extern void selnl_notify_setenforce(int val); /* Check whether a task is allowed to use a security operation. */ static int task_has_security(struct task_struct *tsk, u32 perms) Loading Loading
security/selinux/hooks.c +0 −1 Original line number Diff line number Diff line Loading @@ -92,7 +92,6 @@ #define NUM_SEL_MNT_OPTS 5 extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm); extern struct security_operations *security_ops; /* SECMARK reference count */ Loading
security/selinux/include/security.h +3 −0 Original line number Diff line number Diff line Loading @@ -221,6 +221,9 @@ extern int selinux_disable(void); extern void exit_sel_fs(void); extern struct dentry *selinux_null; extern struct vfsmount *selinuxfs_mount; extern void selnl_notify_setenforce(int val); extern void selnl_notify_policyload(u32 seqno); extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm); #endif /* _SELINUX_SECURITY_H_ */
security/selinux/netlink.c +2 −0 Original line number Diff line number Diff line Loading @@ -19,6 +19,8 @@ #include <linux/selinux_netlink.h> #include <net/net_namespace.h> #include "security.h" static struct sock *selnl; static int selnl_msglen(int msgtype) Loading
security/selinux/nlmsgtab.c +1 −0 Original line number Diff line number Diff line Loading @@ -21,6 +21,7 @@ #include "flask.h" #include "av_permissions.h" #include "security.h" struct nlmsg_perm { u16 nlmsg_type; Loading
security/selinux/selinuxfs.c +0 −2 Original line number Diff line number Diff line Loading @@ -75,8 +75,6 @@ static char policy_opened; /* global data for policy capabilities */ static struct dentry *policycap_dir; extern void selnl_notify_setenforce(int val); /* Check whether a task is allowed to use a security operation. */ static int task_has_security(struct task_struct *tsk, u32 perms) Loading