diff options
author | David S. Miller <davem@davemloft.net> | 2011-03-12 00:29:39 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-03-12 18:08:44 -0500 |
commit | 1d28f42c1bd4bb2363d88df74d0128b4da135b4a (patch) | |
tree | cb2e652fe79a2bc307e871bc2d3fa51cc8051e45 /security | |
parent | ca116922afa8cc5ad46b00c0a637b1cde5ca478a (diff) |
net: Put flowi_* prefix on AF independent members of struct flowi
I intend to turn struct flowi into a union of AF specific flowi
structs. There will be a common structure that each variant includes
first, much like struct sock_common.
This is the first step to move in that direction.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
-rw-r--r-- | security/security.c | 4 | ||||
-rw-r--r-- | security/selinux/hooks.c | 2 | ||||
-rw-r--r-- | security/selinux/xfrm.c | 4 |
3 files changed, 5 insertions, 5 deletions
diff --git a/security/security.c b/security/security.c index 8ef1f7dff277..bae843c8a13e 100644 --- a/security/security.c +++ b/security/security.c | |||
@@ -1100,7 +1100,7 @@ void security_sk_clone(const struct sock *sk, struct sock *newsk) | |||
1100 | 1100 | ||
1101 | void security_sk_classify_flow(struct sock *sk, struct flowi *fl) | 1101 | void security_sk_classify_flow(struct sock *sk, struct flowi *fl) |
1102 | { | 1102 | { |
1103 | security_ops->sk_getsecid(sk, &fl->secid); | 1103 | security_ops->sk_getsecid(sk, &fl->flowi_secid); |
1104 | } | 1104 | } |
1105 | EXPORT_SYMBOL(security_sk_classify_flow); | 1105 | EXPORT_SYMBOL(security_sk_classify_flow); |
1106 | 1106 | ||
@@ -1246,7 +1246,7 @@ int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) | |||
1246 | 1246 | ||
1247 | void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl) | 1247 | void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl) |
1248 | { | 1248 | { |
1249 | int rc = security_ops->xfrm_decode_session(skb, &fl->secid, 0); | 1249 | int rc = security_ops->xfrm_decode_session(skb, &fl->flowi_secid, 0); |
1250 | 1250 | ||
1251 | BUG_ON(rc); | 1251 | BUG_ON(rc); |
1252 | } | 1252 | } |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index cef42f5d69a2..c178494850a9 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -4306,7 +4306,7 @@ static void selinux_secmark_refcount_dec(void) | |||
4306 | static void selinux_req_classify_flow(const struct request_sock *req, | 4306 | static void selinux_req_classify_flow(const struct request_sock *req, |
4307 | struct flowi *fl) | 4307 | struct flowi *fl) |
4308 | { | 4308 | { |
4309 | fl->secid = req->secid; | 4309 | fl->flowi_secid = req->secid; |
4310 | } | 4310 | } |
4311 | 4311 | ||
4312 | static int selinux_tun_dev_create(void) | 4312 | static int selinux_tun_dev_create(void) |
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c index c43ab542246c..510ec2cf6c23 100644 --- a/security/selinux/xfrm.c +++ b/security/selinux/xfrm.c | |||
@@ -135,10 +135,10 @@ int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x, struct xfrm_policy * | |||
135 | 135 | ||
136 | state_sid = x->security->ctx_sid; | 136 | state_sid = x->security->ctx_sid; |
137 | 137 | ||
138 | if (fl->secid != state_sid) | 138 | if (fl->flowi_secid != state_sid) |
139 | return 0; | 139 | return 0; |
140 | 140 | ||
141 | rc = avc_has_perm(fl->secid, state_sid, SECCLASS_ASSOCIATION, | 141 | rc = avc_has_perm(fl->flowi_secid, state_sid, SECCLASS_ASSOCIATION, |
142 | ASSOCIATION__SENDTO, | 142 | ASSOCIATION__SENDTO, |
143 | NULL)? 0:1; | 143 | NULL)? 0:1; |
144 | 144 | ||