diff options
author | Thomas Liu <tliu@redhat.com> | 2009-07-09 10:00:30 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2009-07-09 18:58:39 -0400 |
commit | d4131ded4d4c1a5c1363ddd93ca104ed97dd0458 (patch) | |
tree | 137da0f52d5928eeb461218ac8109d22e65d579b | |
parent | ed5215a21460f63d6bdc118cb55a9e6d1b433f35 (diff) |
security: Make lsm_priv union in lsm_audit.h anonymous
Made the lsm_priv union in include/linux/lsm_audit.h
anonymous.
Signed-off-by: Thomas Liu <tliu@redhat.com>
Acked-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
-rw-r--r-- | include/linux/lsm_audit.h | 2 | ||||
-rw-r--r-- | security/smack/smack.h | 2 | ||||
-rw-r--r-- | security/smack/smack_access.c | 10 |
3 files changed, 7 insertions, 7 deletions
diff --git a/include/linux/lsm_audit.h b/include/linux/lsm_audit.h index 68f7bce572b0..40d1b84f2a3c 100644 --- a/include/linux/lsm_audit.h +++ b/include/linux/lsm_audit.h | |||
@@ -86,7 +86,7 @@ struct common_audit_data { | |||
86 | struct av_decision *avd; | 86 | struct av_decision *avd; |
87 | int result; | 87 | int result; |
88 | } selinux_audit_data; | 88 | } selinux_audit_data; |
89 | } lsm_priv; | 89 | }; |
90 | /* these callback will be implemented by a specific LSM */ | 90 | /* these callback will be implemented by a specific LSM */ |
91 | void (*lsm_pre_audit)(struct audit_buffer *, void *); | 91 | void (*lsm_pre_audit)(struct audit_buffer *, void *); |
92 | void (*lsm_post_audit)(struct audit_buffer *, void *); | 92 | void (*lsm_post_audit)(struct audit_buffer *, void *); |
diff --git a/security/smack/smack.h b/security/smack/smack.h index ff180ede3e47..c6e9acae72e4 100644 --- a/security/smack/smack.h +++ b/security/smack/smack.h | |||
@@ -275,7 +275,7 @@ static inline void smk_ad_init(struct smk_audit_info *a, const char *func, | |||
275 | { | 275 | { |
276 | memset(a, 0, sizeof(*a)); | 276 | memset(a, 0, sizeof(*a)); |
277 | a->a.type = type; | 277 | a->a.type = type; |
278 | a->a.lsm_priv.smack_audit_data.function = func; | 278 | a->a.smack_audit_data.function = func; |
279 | } | 279 | } |
280 | 280 | ||
281 | static inline void smk_ad_setfield_u_tsk(struct smk_audit_info *a, | 281 | static inline void smk_ad_setfield_u_tsk(struct smk_audit_info *a, |
diff --git a/security/smack/smack_access.c b/security/smack/smack_access.c index dd84877dff30..0f9ac8146900 100644 --- a/security/smack/smack_access.c +++ b/security/smack/smack_access.c | |||
@@ -240,9 +240,9 @@ static inline void smack_str_from_perm(char *string, int access) | |||
240 | static void smack_log_callback(struct audit_buffer *ab, void *a) | 240 | static void smack_log_callback(struct audit_buffer *ab, void *a) |
241 | { | 241 | { |
242 | struct common_audit_data *ad = a; | 242 | struct common_audit_data *ad = a; |
243 | struct smack_audit_data *sad = &ad->lsm_priv.smack_audit_data; | 243 | struct smack_audit_data *sad = &ad->smack_audit_data; |
244 | audit_log_format(ab, "lsm=SMACK fn=%s action=%s", | 244 | audit_log_format(ab, "lsm=SMACK fn=%s action=%s", |
245 | ad->lsm_priv.smack_audit_data.function, | 245 | ad->smack_audit_data.function, |
246 | sad->result ? "denied" : "granted"); | 246 | sad->result ? "denied" : "granted"); |
247 | audit_log_format(ab, " subject="); | 247 | audit_log_format(ab, " subject="); |
248 | audit_log_untrustedstring(ab, sad->subject); | 248 | audit_log_untrustedstring(ab, sad->subject); |
@@ -275,11 +275,11 @@ void smack_log(char *subject_label, char *object_label, int request, | |||
275 | if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0) | 275 | if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0) |
276 | return; | 276 | return; |
277 | 277 | ||
278 | if (a->lsm_priv.smack_audit_data.function == NULL) | 278 | if (a->smack_audit_data.function == NULL) |
279 | a->lsm_priv.smack_audit_data.function = "unknown"; | 279 | a->smack_audit_data.function = "unknown"; |
280 | 280 | ||
281 | /* end preparing the audit data */ | 281 | /* end preparing the audit data */ |
282 | sad = &a->lsm_priv.smack_audit_data; | 282 | sad = &a->smack_audit_data; |
283 | smack_str_from_perm(request_buffer, request); | 283 | smack_str_from_perm(request_buffer, request); |
284 | sad->subject = subject_label; | 284 | sad->subject = subject_label; |
285 | sad->object = object_label; | 285 | sad->object = object_label; |