diff options
author | Stephen D. Smalley <sds@epoch.ncsc.mil> | 2003-02-06 12:32:08 +1100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@kernel.bkbits.net> | 2003-02-06 12:32:08 +1100 |
commit | c1b447c2276e3485d77e6afe6447cada4e23d624 (patch) | |
tree | b56610c86d2b10c3fa4567691510d529b0e13e2b /security | |
parent | bee902e3e04465e78c4acefd8c41c6661c4764e8 (diff) | |
download | history-c1b447c2276e3485d77e6afe6447cada4e23d624.tar.gz |
[PATCH] LSM: Add LSM sysctl hook to 2.5.59
This patch adds a LSM sysctl hook for controlling access to
sysctl variables to 2.5.59, split out from the lsm-2.5 BitKeeper tree.
SELinux uses this hook to control such accesses in accordance with the
security policy configuration.
Diffstat (limited to 'security')
-rw-r--r-- | security/dummy.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/security/dummy.c b/security/dummy.c index 8a24e65329d90b..e6dc155a200d19 100644 --- a/security/dummy.c +++ b/security/dummy.c @@ -75,6 +75,11 @@ static int dummy_capable (struct task_struct *tsk, int cap) return -EPERM; } +static int dummy_sysctl (ctl_table * table, int op) +{ + return 0; +} + static int dummy_quotactl (int cmds, int type, int id, struct super_block *sb) { return 0; @@ -634,6 +639,7 @@ void security_fixup_ops (struct security_operations *ops) set_to_dummy_if_null(ops, capable); set_to_dummy_if_null(ops, quotactl); set_to_dummy_if_null(ops, quota_on); + set_to_dummy_if_null(ops, sysctl); set_to_dummy_if_null(ops, bprm_alloc_security); set_to_dummy_if_null(ops, bprm_free_security); set_to_dummy_if_null(ops, bprm_compute_creds); |