Hi, Arnaldo,
This looks a bit surprising because that 2 lines should have already been
in the patch (lsm-secpeer) that this patch (lsm-secpeer-unix) depends on.
See below:
thanks,
Catherine
diff -puN security/dummy.c~lsm-secpeer security/dummy.c
--- linux-2.6.16-rc1/security/dummy.c~lsm-secpeer 2006-02-17
16:20:56.000000000 -0500
+++ linux-2.6.16-rc1-cxzhang/security/dummy.c 2006-02-03
14:44:17.000000000 -0500
@@ -763,8 +763,14 @@ static int dummy_socket_sock_rcv_skb (st
return 0;
}
-static int dummy_socket_getpeersec(struct socket *sock, char __user
*optval,
- int __user *optlen, unsigned len)
+static int dummy_socket_getpeersec_stream(struct socket *sock, char
__user *optval,
+ int __user *optlen, unsigned
len)
+{
+ return -ENOPROTOOPT;
+}
+
+static int dummy_socket_getpeersec_dgram(struct sk_buff *skb, char
**secdata,
+ u32 *seclen)
{
return -ENOPROTOOPT;
}
@@ -1002,7 +1008,8 @@ void security_fixup_ops (struct security
set_to_dummy_if_null(ops, socket_getsockopt);
set_to_dummy_if_null(ops, socket_shutdown);
set_to_dummy_if_null(ops, socket_sock_rcv_skb);
- set_to_dummy_if_null(ops, socket_getpeersec);
+ set_to_dummy_if_null(ops, socket_getpeersec_stream);
+ set_to_dummy_if_null(ops, socket_getpeersec_dgram);
set_to_dummy_if_null(ops, sk_alloc_security);
set_to_dummy_if_null(ops, sk_free_security);
set_to_dummy_if_null(ops, sk_getsid);
diff -puN net/core/sock.c~lsm-secpeer net/core/sock.c
--- linux-2.6.16-rc1/net/core/sock.c~lsm-secpeer 2006-02-01
18:31:21.000000000 -0500
+++ linux-2.6.16-rc1-cxzhang/net/core/sock.c 2006-02-01
18:31:33.000000000 -0500
@@ -616,7 +616,7 @@ int sock_getsockopt(struct socket *sock,
break;
case SO_PEERSEC:
- return security_socket_getpeersec(sock, optval,
optlen, len);
+ return security_socket_getpeersec_stream(sock,
optval, optlen, len);
default:
return(-ENOPROTOOPT);
[EMAIL PROTECTED] wrote on 03/10/2006 02:16:44 PM:
> On 3/10/06, Arnaldo Carvalho de Melo <[EMAIL PROTECTED]> wrote:
> > On 3/10/06, Arnaldo Carvalho de Melo <[EMAIL PROTECTED]> wrote:
> > > On 3/10/06, Xiaolan Zhang <[EMAIL PROTECTED]> wrote:
> > > > Hi,
> > > >
> > > > I will work on a fix.
> > >
> > > Thanks.
> >
> > More breakage, this time with "make allmodconfig", please fix.
> >
> > - Arnaldo
> >
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c: In
> > function 'security_fixup_ops':
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c:1011:
> > error: 'struct security_operations' has no member named
> > 'socket_getpeersec'
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c:1011:
> > error: 'struct security_operations' has no member named
> > 'socket_getpeersec'
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c:1011:
> > error: 'dummy_socket_getpeersec' undeclared (first use in this
> > function)
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c:1011:
> > error: (Each undeclared identifier is reported only once
> > /pub/scm/linux/kernel/git/acme/net-2.6.17/security/dummy.c:1011:
> > error: for each function it appears in.)
>
> Is the attached patch enough? If so I can put into my net-2.6.17 tree
and push
> to DaveM in half an hour or so after I check that there is no more
> build breakage
> in netland.
>
> - Arnaldo
> [attachment "c.patch" deleted by Xiaolan Zhang/Watson/IBM]
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html