diff options
| author | Stephen Smalley <sds@tycho.nsa.gov> | 2006-09-26 02:31:57 -0400 |
|---|---|---|
| committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-09-26 11:48:52 -0400 |
| commit | 1a70cd40cb291c25b67ec0da715a49d76719329d (patch) | |
| tree | ffb4c6cd3f7ef1b92822ebbda11bd2b035c2bc86 /kernel | |
| parent | 62bac0185ad3dfef11d9602980445c54d45199c6 (diff) | |
[PATCH] selinux: rename selinux_ctxid_to_string
Rename selinux_ctxid_to_string to selinux_sid_to_string to be
consistent with other interfaces.
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/audit.c | 14 | ||||
| -rw-r--r-- | kernel/auditfilter.c | 2 | ||||
| -rw-r--r-- | kernel/auditsc.c | 4 |
3 files changed, 10 insertions, 10 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index 963fd15c9621..f9889ee77825 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
| @@ -244,7 +244,7 @@ static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid) | |||
| 244 | char *ctx = NULL; | 244 | char *ctx = NULL; |
| 245 | u32 len; | 245 | u32 len; |
| 246 | int rc; | 246 | int rc; |
| 247 | if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) | 247 | if ((rc = selinux_sid_to_string(sid, &ctx, &len))) |
| 248 | return rc; | 248 | return rc; |
| 249 | else | 249 | else |
| 250 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 250 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, |
| @@ -267,7 +267,7 @@ static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid) | |||
| 267 | char *ctx = NULL; | 267 | char *ctx = NULL; |
| 268 | u32 len; | 268 | u32 len; |
| 269 | int rc; | 269 | int rc; |
| 270 | if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) | 270 | if ((rc = selinux_sid_to_string(sid, &ctx, &len))) |
| 271 | return rc; | 271 | return rc; |
| 272 | else | 272 | else |
| 273 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 273 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, |
| @@ -293,7 +293,7 @@ static int audit_set_enabled(int state, uid_t loginuid, u32 sid) | |||
| 293 | char *ctx = NULL; | 293 | char *ctx = NULL; |
| 294 | u32 len; | 294 | u32 len; |
| 295 | int rc; | 295 | int rc; |
| 296 | if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) | 296 | if ((rc = selinux_sid_to_string(sid, &ctx, &len))) |
| 297 | return rc; | 297 | return rc; |
| 298 | else | 298 | else |
| 299 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 299 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, |
| @@ -321,7 +321,7 @@ static int audit_set_failure(int state, uid_t loginuid, u32 sid) | |||
| 321 | char *ctx = NULL; | 321 | char *ctx = NULL; |
| 322 | u32 len; | 322 | u32 len; |
| 323 | int rc; | 323 | int rc; |
| 324 | if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) | 324 | if ((rc = selinux_sid_to_string(sid, &ctx, &len))) |
| 325 | return rc; | 325 | return rc; |
| 326 | else | 326 | else |
| 327 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 327 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, |
| @@ -538,7 +538,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 538 | if (status_get->mask & AUDIT_STATUS_PID) { | 538 | if (status_get->mask & AUDIT_STATUS_PID) { |
| 539 | int old = audit_pid; | 539 | int old = audit_pid; |
| 540 | if (sid) { | 540 | if (sid) { |
| 541 | if ((err = selinux_ctxid_to_string( | 541 | if ((err = selinux_sid_to_string( |
| 542 | sid, &ctx, &len))) | 542 | sid, &ctx, &len))) |
| 543 | return err; | 543 | return err; |
| 544 | else | 544 | else |
| @@ -576,7 +576,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 576 | "user pid=%d uid=%u auid=%u", | 576 | "user pid=%d uid=%u auid=%u", |
| 577 | pid, uid, loginuid); | 577 | pid, uid, loginuid); |
| 578 | if (sid) { | 578 | if (sid) { |
| 579 | if (selinux_ctxid_to_string( | 579 | if (selinux_sid_to_string( |
| 580 | sid, &ctx, &len)) { | 580 | sid, &ctx, &len)) { |
| 581 | audit_log_format(ab, | 581 | audit_log_format(ab, |
| 582 | " ssid=%u", sid); | 582 | " ssid=%u", sid); |
| @@ -614,7 +614,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 614 | loginuid, sid); | 614 | loginuid, sid); |
| 615 | break; | 615 | break; |
| 616 | case AUDIT_SIGNAL_INFO: | 616 | case AUDIT_SIGNAL_INFO: |
| 617 | err = selinux_ctxid_to_string(audit_sig_sid, &ctx, &len); | 617 | err = selinux_sid_to_string(audit_sig_sid, &ctx, &len); |
| 618 | if (err) | 618 | if (err) |
| 619 | return err; | 619 | return err; |
| 620 | sig_data = kmalloc(sizeof(*sig_data) + len, GFP_KERNEL); | 620 | sig_data = kmalloc(sizeof(*sig_data) + len, GFP_KERNEL); |
diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index a44879b0c72f..1a58a81fb09d 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c | |||
| @@ -1398,7 +1398,7 @@ static void audit_log_rule_change(uid_t loginuid, u32 sid, char *action, | |||
| 1398 | if (sid) { | 1398 | if (sid) { |
| 1399 | char *ctx = NULL; | 1399 | char *ctx = NULL; |
| 1400 | u32 len; | 1400 | u32 len; |
| 1401 | if (selinux_ctxid_to_string(sid, &ctx, &len)) | 1401 | if (selinux_sid_to_string(sid, &ctx, &len)) |
| 1402 | audit_log_format(ab, " ssid=%u", sid); | 1402 | audit_log_format(ab, " ssid=%u", sid); |
| 1403 | else | 1403 | else |
| 1404 | audit_log_format(ab, " subj=%s", ctx); | 1404 | audit_log_format(ab, " subj=%s", ctx); |
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 331e17010393..fb83c5cb8c32 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
| @@ -898,7 +898,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts | |||
| 898 | if (axi->osid != 0) { | 898 | if (axi->osid != 0) { |
| 899 | char *ctx = NULL; | 899 | char *ctx = NULL; |
| 900 | u32 len; | 900 | u32 len; |
| 901 | if (selinux_ctxid_to_string( | 901 | if (selinux_sid_to_string( |
| 902 | axi->osid, &ctx, &len)) { | 902 | axi->osid, &ctx, &len)) { |
| 903 | audit_log_format(ab, " osid=%u", | 903 | audit_log_format(ab, " osid=%u", |
| 904 | axi->osid); | 904 | axi->osid); |
| @@ -1005,7 +1005,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts | |||
| 1005 | if (n->osid != 0) { | 1005 | if (n->osid != 0) { |
| 1006 | char *ctx = NULL; | 1006 | char *ctx = NULL; |
| 1007 | u32 len; | 1007 | u32 len; |
| 1008 | if (selinux_ctxid_to_string( | 1008 | if (selinux_sid_to_string( |
| 1009 | n->osid, &ctx, &len)) { | 1009 | n->osid, &ctx, &len)) { |
| 1010 | audit_log_format(ab, " osid=%u", n->osid); | 1010 | audit_log_format(ab, " osid=%u", n->osid); |
| 1011 | call_panic = 2; | 1011 | call_panic = 2; |
