This fixes some typos in the Yama function declaration portion of
security.h, allowing the tree to build without Yama enabled.
BUG=chromium-os:24552
TEST=x86-alex build without CONFIG_SECURITY_YAMA
STATUS=Fixed
Change-Id: I37bd31e1925f41db6fd897126aff2054bcd59227
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/13471
Reviewed-by: Olof Johansson <olofj@chromium.org>
{ }
#endif /* CONFIG_SECURITY */
{ }
#endif /* CONFIG_SECURITY */
-#if CONFIG_SECURITY_YAMA
+#ifdef CONFIG_SECURITY_YAMA
extern int yama_ptrace_access_check(struct task_struct *child,
unsigned int mode);
extern int yama_path_link(struct dentry *old_dentry, struct path *new_dir,
extern int yama_ptrace_access_check(struct task_struct *child,
unsigned int mode);
extern int yama_path_link(struct dentry *old_dentry, struct path *new_dir,
unsigned long arg4, unsigned long arg5);
#else
static inline int yama_ptrace_access_check(struct task_struct *child,
unsigned long arg4, unsigned long arg5);
#else
static inline int yama_ptrace_access_check(struct task_struct *child,
{
return 0;
}
static inline int yama_path_link(struct dentry *old_dentry,
struct path *new_dir,
{
return 0;
}
static inline int yama_path_link(struct dentry *old_dentry,
struct path *new_dir,
- struct dentry *new_dentry);
+ struct dentry *new_dentry)
{
return 0;
}
static inline int yama_inode_follow_link(struct dentry *dentry,
{
return 0;
}
static inline int yama_inode_follow_link(struct dentry *dentry,
- struct nameidata *nameidata);
+ struct nameidata *nameidata)
-static inline void yama_task_free(struct task_struct *task);
+static inline void yama_task_free(struct task_struct *task)