diff options
| author | Ingo Molnar <mingo@elte.hu> | 2009-05-07 05:26:19 -0400 |
|---|---|---|
| committer | James Morris <jmorris@namei.org> | 2009-06-24 10:18:05 -0400 |
| commit | 9e48858f7d36a6a3849f1d1b40c3bf5624b4ee7c (patch) | |
| tree | 5d8fe586c5b1bbab36acc3b76b2b4dd1bc538968 /security/smack | |
| parent | 86abcf9cebf7b5ceb33facde297face5ec4d2260 (diff) | |
security: rename ptrace_may_access => ptrace_access_check
The ->ptrace_may_access() methods are named confusingly - the real
ptrace_may_access() returns a bool, while these security checks have
a retval convention.
Rename it to ptrace_access_check, to reduce the confusion factor.
[ Impact: cleanup, no code changed ]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/smack')
| -rw-r--r-- | security/smack/smack_lsm.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 0023182078c7..1c9bdbcbe3d2 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
| @@ -91,7 +91,7 @@ struct inode_smack *new_inode_smack(char *smack) | |||
| 91 | */ | 91 | */ |
| 92 | 92 | ||
| 93 | /** | 93 | /** |
| 94 | * smack_ptrace_may_access - Smack approval on PTRACE_ATTACH | 94 | * smack_ptrace_access_check - Smack approval on PTRACE_ATTACH |
| 95 | * @ctp: child task pointer | 95 | * @ctp: child task pointer |
| 96 | * @mode: ptrace attachment mode | 96 | * @mode: ptrace attachment mode |
| 97 | * | 97 | * |
| @@ -99,13 +99,13 @@ struct inode_smack *new_inode_smack(char *smack) | |||
| 99 | * | 99 | * |
| 100 | * Do the capability checks, and require read and write. | 100 | * Do the capability checks, and require read and write. |
| 101 | */ | 101 | */ |
| 102 | static int smack_ptrace_may_access(struct task_struct *ctp, unsigned int mode) | 102 | static int smack_ptrace_access_check(struct task_struct *ctp, unsigned int mode) |
| 103 | { | 103 | { |
| 104 | int rc; | 104 | int rc; |
| 105 | struct smk_audit_info ad; | 105 | struct smk_audit_info ad; |
| 106 | char *sp, *tsp; | 106 | char *sp, *tsp; |
| 107 | 107 | ||
| 108 | rc = cap_ptrace_may_access(ctp, mode); | 108 | rc = cap_ptrace_access_check(ctp, mode); |
| 109 | if (rc != 0) | 109 | if (rc != 0) |
| 110 | return rc; | 110 | return rc; |
| 111 | 111 | ||
| @@ -3032,7 +3032,7 @@ static void smack_release_secctx(char *secdata, u32 seclen) | |||
| 3032 | struct security_operations smack_ops = { | 3032 | struct security_operations smack_ops = { |
| 3033 | .name = "smack", | 3033 | .name = "smack", |
| 3034 | 3034 | ||
| 3035 | .ptrace_may_access = smack_ptrace_may_access, | 3035 | .ptrace_access_check = smack_ptrace_access_check, |
| 3036 | .ptrace_traceme = smack_ptrace_traceme, | 3036 | .ptrace_traceme = smack_ptrace_traceme, |
| 3037 | .syslog = smack_syslog, | 3037 | .syslog = smack_syslog, |
| 3038 | 3038 | ||
