/* * AppArmor security module * * This file contains AppArmor capability mediation definitions. * * Copyright (C) 1998-2008 Novell/SUSE * Copyright 2009-2013 Canonical Ltd. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation, version 2 of the * License. */ #ifndef __AA_CAPABILITY_H #define __AA_CAPABILITY_H #include #include "apparmorfs.h" struct aa_profile; /* aa_caps - confinement data for capabilities * @allowed: capabilities mask * @audit: caps that are to be audited * @quiet: caps that should not be audited * @kill: caps that when requested will result in the task being killed * @extended: caps that are subject finer grained mediation */ struct aa_caps { kernel_cap_t allow; kernel_cap_t audit; kernel_cap_t quiet; kernel_cap_t kill; kernel_cap_t extended; }; extern struct aa_fs_entry aa_fs_entry_caps[]; int aa_capable(struct aa_profile *profile, int cap, int audit); static inline void aa_free_cap_rules(struct aa_caps *caps) { /* NOP */ } #endif /* __AA_CAPBILITY_H */ nds-private-remove net-next plumbingsTobias Klauser
summaryrefslogtreecommitdiff
path: root/net/atm/Kconfig
diff options
context:
space:
mode:
authorDan Carpenter <dan.carpenter@oracle.com>2017-01-30 10:55:04 +0100
committerDavid S. Miller <davem@davemloft.net>2017-01-30 16:37:55 -0500
commitcdaf25dfc058ee6f7a7b2e2353de00fa288c0cd4 (patch)
treea45096fd9e8aaeea2eac1f1999a3d17dfeb0d02b /net/atm/Kconfig
parent1930b60352e7e195f55b27cde15d2a8f43342a8b (diff)
smc: some potential use after free bugs
Say we got really unlucky and these failed on the last iteration, then it could lead to a use after free bug. Fixes: cd6851f30386 ("smc: remote memory buffers (RMBs)") Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Ursula Braun <ubraun@linux.vnet.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/atm/Kconfig')