diff options
author | Eric Paris <eparis@redhat.com> | 2012-04-04 13:45:40 -0400 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2012-04-09 12:22:50 -0400 |
commit | 83d498569e9a7a4b92c4c5d3566f2d6a604f28c9 (patch) | |
tree | e0d77f21bda5bec5ace52b3fa557f87b1bb57631 /include/linux/security.h | |
parent | 95dbf739313f09c8d859bde1373bc264ef979337 (diff) |
SELinux: rename dentry_open to file_open
dentry_open takes a file, rename it to file_open
Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 13 |
1 files changed, 5 insertions, 8 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 673afbb8238a..de412ea29aac 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -639,10 +639,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
639 | * to receive an open file descriptor via socket IPC. | 639 | * to receive an open file descriptor via socket IPC. |
640 | * @file contains the file structure being received. | 640 | * @file contains the file structure being received. |
641 | * Return 0 if permission is granted. | 641 | * Return 0 if permission is granted. |
642 | * | 642 | * @file_open |
643 | * Security hook for dentry | ||
644 | * | ||
645 | * @dentry_open | ||
646 | * Save open-time permission checking state for later use upon | 643 | * Save open-time permission checking state for later use upon |
647 | * file_permission, and recheck access if anything has changed | 644 | * file_permission, and recheck access if anything has changed |
648 | * since inode_permission. | 645 | * since inode_permission. |
@@ -1497,7 +1494,7 @@ struct security_operations { | |||
1497 | int (*file_send_sigiotask) (struct task_struct *tsk, | 1494 | int (*file_send_sigiotask) (struct task_struct *tsk, |
1498 | struct fown_struct *fown, int sig); | 1495 | struct fown_struct *fown, int sig); |
1499 | int (*file_receive) (struct file *file); | 1496 | int (*file_receive) (struct file *file); |
1500 | int (*dentry_open) (struct file *file, const struct cred *cred); | 1497 | int (*file_open) (struct file *file, const struct cred *cred); |
1501 | 1498 | ||
1502 | int (*task_create) (unsigned long clone_flags); | 1499 | int (*task_create) (unsigned long clone_flags); |
1503 | void (*task_free) (struct task_struct *task); | 1500 | void (*task_free) (struct task_struct *task); |
@@ -1756,7 +1753,7 @@ int security_file_set_fowner(struct file *file); | |||
1756 | int security_file_send_sigiotask(struct task_struct *tsk, | 1753 | int security_file_send_sigiotask(struct task_struct *tsk, |
1757 | struct fown_struct *fown, int sig); | 1754 | struct fown_struct *fown, int sig); |
1758 | int security_file_receive(struct file *file); | 1755 | int security_file_receive(struct file *file); |
1759 | int security_dentry_open(struct file *file, const struct cred *cred); | 1756 | int security_file_open(struct file *file, const struct cred *cred); |
1760 | int security_task_create(unsigned long clone_flags); | 1757 | int security_task_create(unsigned long clone_flags); |
1761 | void security_task_free(struct task_struct *task); | 1758 | void security_task_free(struct task_struct *task); |
1762 | int security_cred_alloc_blank(struct cred *cred, gfp_t gfp); | 1759 | int security_cred_alloc_blank(struct cred *cred, gfp_t gfp); |
@@ -2227,8 +2224,8 @@ static inline int security_file_receive(struct file *file) | |||
2227 | return 0; | 2224 | return 0; |
2228 | } | 2225 | } |
2229 | 2226 | ||
2230 | static inline int security_dentry_open(struct file *file, | 2227 | static inline int security_file_open(struct file *file, |
2231 | const struct cred *cred) | 2228 | const struct cred *cred) |
2232 | { | 2229 | { |
2233 | return 0; | 2230 | return 0; |
2234 | } | 2231 | } |