Clean up existing VERIFY*() macros.
[zfs.git] / config / kernel-security-inode-init.m4
blob4e4bfd29b2ff9c318a9e657e5fee14c0ce8946b1
1 dnl #
2 dnl # 3.2 API change
3 dnl # The security_inode_init_security() API has been changed to include
4 dnl # a filesystem specific callback to write security extended attributes.
5 dnl # This was done to support the initialization of multiple LSM xattrs
6 dnl # and the EVM xattr.
7 dnl #
8 AC_DEFUN([ZFS_AC_KERNEL_SRC_SECURITY_INODE_INIT_SECURITY_CALLBACK], [
9         ZFS_LINUX_TEST_SRC([security_inode_init_security], [
10                 #include <linux/security.h>
11         ],[
12                 struct inode *ip __attribute__ ((unused)) = NULL;
13                 struct inode *dip __attribute__ ((unused)) = NULL;
14                 const struct qstr *str __attribute__ ((unused)) = NULL;
15                 initxattrs func __attribute__ ((unused)) = NULL;
17                 security_inode_init_security(ip, dip, str, func, NULL);
18         ])
21 AC_DEFUN([ZFS_AC_KERNEL_SECURITY_INODE_INIT_SECURITY_CALLBACK], [
22         AC_MSG_CHECKING([whether security_inode_init_security wants callback])
23         ZFS_LINUX_TEST_RESULT([security_inode_init_security], [
24                 AC_MSG_RESULT(yes)
25         ],[
26                 ZFS_LINUX_TEST_ERROR([security_inode_init_security callback])
27         ])
30 AC_DEFUN([ZFS_AC_KERNEL_SRC_SECURITY_INODE], [
31         ZFS_AC_KERNEL_SRC_SECURITY_INODE_INIT_SECURITY_CALLBACK
34 AC_DEFUN([ZFS_AC_KERNEL_SECURITY_INODE], [
35         ZFS_AC_KERNEL_SECURITY_INODE_INIT_SECURITY_CALLBACK