From mboxrd@z Thu Jan 1 00:00:00 1970 From: Joel Becker Subject: Re: New reflink(2) syscall Date: Tue, 5 May 2009 12:33:07 -0700 Message-ID: <20090505193307.GK7835@mail.oracle.com> References: <1241443016.3023.51.camel@localhost.localdomain> <1241456379.3023.173.camel@localhost.localdomain> <20090505180024.GI7835@mail.oracle.com> <1241548882.3023.356.camel@localhost.localdomain> <20090505191530.GJ7835@mail.oracle.com> <1241550846.3023.363.camel@localhost.localdomain> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: James Morris , lsm , linux-fsdevel@vger.kernel.org To: Stephen Smalley Return-path: Content-Disposition: inline In-Reply-To: <1241550846.3023.363.camel@localhost.localdomain> Sender: linux-security-module-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Tue, May 05, 2009 at 03:14:06PM -0400, Stephen Smalley wrote: > On Tue, 2009-05-05 at 12:15 -0700, Joel Becker wrote: > > I've added both. I have no idea how to add the actual > > SELinux/TOMOYO bits, so I've just added the operations hook :-) > > That's fine - we can fill in the hook implementations for our respective > modules. You do need to add a stub function to capability.c and add a > line to security_fixup_ops() so that the function pointer is initially > set though. Thanks, I missed that. Joel -- Life's Little Instruction Book #173 "Be kinder than necessary." Joel Becker Principal Software Developer Oracle E-mail: joel.becker@oracle.com Phone: (650) 506-8127