This patch, against the 2.6.13-rc6-mm1 stacker, defines the
inode_init_security() hook.

thanks,
-serge

Signed-off-by: Serge Hallyn <[EMAIL PROTECTED]>
--
 stacker.c |   35 +++++++++++++++++++++++++++++++++++
 1 files changed, 35 insertions(+)

Index: linux-2.6.13-rc6-mm1/security/stacker.c
===================================================================
--- linux-2.6.13-rc6-mm1.orig/security/stacker.c        2005-08-19 
17:00:39.000000000 -0500
+++ linux-2.6.13-rc6-mm1/security/stacker.c     2005-08-19 17:01:54.000000000 
-0500
@@ -443,6 +443,40 @@ static void stacker_inode_free_security 
                security_disown_value(h);
 }
 
+static int stacker_inode_init_security(struct inode *inode, struct inode *dir,
+                                      struct list_head *head)
+{
+       int ret, succ_ret = -EOPNOTSUPP;
+       struct xattr_data *p, *n;
+       struct module_entry *m;
+
+       rcu_read_lock();
+       stack_for_each_entry(m, &stacked_modules, lsm_list) {
+               if (!m->module_operations.inode_init_security)
+                       continue;
+               rcu_read_unlock();
+               ret = m->module_operations.inode_init_security(inode,dir,head);
+               rcu_read_lock();
+               if (ret && ret != -EOPNOTSUPP)
+                       goto out_free_data;
+               if (ret == 0)
+                       succ_ret = 0;
+       }
+       rcu_read_unlock();
+       return succ_ret;
+
+out_free_data:
+       if (!head)
+               return ret;
+       list_for_each_entry_safe(p, n, head, list) {
+               list_del(&p->list);
+               kfree(p->value);
+               kfree(p->name);
+               kfree(p);
+       }
+       return ret;
+}
+
 static int stacker_inode_create (struct inode *inode, struct dentry *dentry,
                               int mask)
 {
@@ -1315,6 +1349,7 @@ static struct security_operations stacke
 
        .inode_alloc_security           = stacker_inode_alloc_security,
        .inode_free_security            = stacker_inode_free_security,
+       .inode_init_security            = stacker_inode_init_security,
        .inode_create                   = stacker_inode_create,
        .inode_link                     = stacker_inode_link,
        .inode_unlink                   = stacker_inode_unlink,
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to