Inter-revision diff: patch 2

Comparing v27 (message) to v28 (message)

--- v27
+++ v28
@@ -117,7 +117,7 @@
  #define LSM_FLAG_LEGACY_MAJOR	BIT(0)
  #define LSM_FLAG_EXCLUSIVE	BIT(1)
 diff --git a/include/linux/security.h b/include/linux/security.h
-index 06f7c50ce77f..62588bc522ba 100644
+index 24eda04221e9..7655bfce4b96 100644
 --- a/include/linux/security.h
 +++ b/include/linux/security.h
 @@ -133,6 +133,65 @@ enum lockdown_reason {
@@ -310,10 +310,10 @@
  				err = res;
  		}
 diff --git a/kernel/auditsc.c b/kernel/auditsc.c
-index 175ef6f3ea4e..392afe3e2fd6 100644
+index 8dd73a64f921..acbd896f54a5 100644
 --- a/kernel/auditsc.c
 +++ b/kernel/auditsc.c
-@@ -665,14 +665,13 @@ static int audit_filter_rules(struct task_struct *tsk,
+@@ -671,14 +671,13 @@ static int audit_filter_rules(struct task_struct *tsk,
  			   match for now to avoid losing information that
  			   may be wanted.   An error message will also be
  			   logged upon error */
@@ -330,7 +330,7 @@
  			}
  			break;
  		case AUDIT_OBJ_USER:
-@@ -682,21 +681,21 @@ static int audit_filter_rules(struct task_struct *tsk,
+@@ -688,21 +687,21 @@ static int audit_filter_rules(struct task_struct *tsk,
  		case AUDIT_OBJ_LEV_HIGH:
  			/* The above note for AUDIT_SUBJ_USER...AUDIT_SUBJ_CLR
  			   also applies here */
@@ -355,7 +355,7 @@
  							++result;
  							break;
  						}
-@@ -707,7 +706,7 @@ static int audit_filter_rules(struct task_struct *tsk,
+@@ -713,7 +712,7 @@ static int audit_filter_rules(struct task_struct *tsk,
  					break;
  				if (security_audit_rule_match(ctx->ipc.osid,
  							      f->type, f->op,
@@ -666,7 +666,7 @@
  }
  
 diff --git a/security/safesetid/lsm.c b/security/safesetid/lsm.c
-index 1079c6d54784..a2a2f462a821 100644
+index 963f4ad9cb66..0c368950dc14 100644
 --- a/security/safesetid/lsm.c
 +++ b/security/safesetid/lsm.c
 @@ -241,6 +241,11 @@ static int safesetid_task_fix_setgid(struct cred *new,
@@ -692,7 +692,7 @@
  	/* Report that SafeSetID successfully initialized */
  	safesetid_initialized = 1;
 diff --git a/security/security.c b/security/security.c
-index e12a7c463468..473b49971aab 100644
+index 335c313a668d..5f1b281511f2 100644
 --- a/security/security.c
 +++ b/security/security.c
 @@ -344,6 +344,7 @@ static void __init ordered_lsm_init(void)
@@ -835,10 +835,10 @@
  #endif /* CONFIG_AUDIT */
  
 diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
-index 84ddcec6322e..0133b142e938 100644
+index e2c4a1fd952f..f84b6c274a10 100644
 --- a/security/selinux/hooks.c
 +++ b/security/selinux/hooks.c
-@@ -7111,6 +7111,11 @@ static int selinux_perf_event_write(struct perf_event *event)
+@@ -7101,6 +7101,11 @@ static int selinux_perf_event_write(struct perf_event *event)
  }
  #endif
  
@@ -850,7 +850,7 @@
  /*
   * IMPORTANT NOTE: When adding new hooks, please be careful to keep this order:
   * 1. any hooks that don't belong to (2.) or (3.) below,
-@@ -7424,7 +7429,8 @@ static __init int selinux_init(void)
+@@ -7414,7 +7419,8 @@ static __init int selinux_init(void)
  
  	hashtab_cache_init();
  
@@ -886,10 +886,10 @@
  
  	pr_info("Smack:  Initializing.\n");
 diff --git a/security/tomoyo/tomoyo.c b/security/tomoyo/tomoyo.c
-index 1f3cd432d830..22f62c67f2ec 100644
+index b6a31901f289..e8f6bb9782c1 100644
 --- a/security/tomoyo/tomoyo.c
 +++ b/security/tomoyo/tomoyo.c
-@@ -523,6 +523,11 @@ static void tomoyo_task_free(struct task_struct *task)
+@@ -521,6 +521,11 @@ static void tomoyo_task_free(struct task_struct *task)
  	}
  }
  
@@ -901,7 +901,7 @@
  /*
   * tomoyo_security_ops is a "struct security_operations" which is used for
   * registering TOMOYO.
-@@ -575,7 +580,8 @@ static int __init tomoyo_init(void)
+@@ -573,7 +578,8 @@ static int __init tomoyo_init(void)
  	struct tomoyo_task *s = tomoyo_task(current);
  
  	/* register ourselves with the security framework */
@@ -937,5 +937,5 @@
  	return 0;
  }
 -- 
-2.29.2
+2.31.1
 
Keyboard shortcuts
hback out one level
jnext message in thread
kprevious message in thread
ldrill in
Escclose help / fold thread tree
?toggle this help