aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2011-03-12 00:29:39 -0500
committerDavid S. Miller <davem@davemloft.net>2011-03-12 18:08:44 -0500
commit1d28f42c1bd4bb2363d88df74d0128b4da135b4a (patch)
treecb2e652fe79a2bc307e871bc2d3fa51cc8051e45 /security
parentca116922afa8cc5ad46b00c0a637b1cde5ca478a (diff)
net: Put flowi_* prefix on AF independent members of struct flowi
I intend to turn struct flowi into a union of AF specific flowi structs. There will be a common structure that each variant includes first, much like struct sock_common. This is the first step to move in that direction. Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
-rw-r--r--security/security.c4
-rw-r--r--security/selinux/hooks.c2
-rw-r--r--security/selinux/xfrm.c4
3 files changed, 5 insertions, 5 deletions
diff --git a/security/security.c b/security/security.c
index 8ef1f7dff277..bae843c8a13e 100644
--- a/security/security.c
+++ b/security/security.c
@@ -1100,7 +1100,7 @@ void security_sk_clone(const struct sock *sk, struct sock *newsk)
1100 1100
1101void security_sk_classify_flow(struct sock *sk, struct flowi *fl) 1101void security_sk_classify_flow(struct sock *sk, struct flowi *fl)
1102{ 1102{
1103 security_ops->sk_getsecid(sk, &fl->secid); 1103 security_ops->sk_getsecid(sk, &fl->flowi_secid);
1104} 1104}
1105EXPORT_SYMBOL(security_sk_classify_flow); 1105EXPORT_SYMBOL(security_sk_classify_flow);
1106 1106
@@ -1246,7 +1246,7 @@ int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
1246 1246
1247void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl) 1247void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl)
1248{ 1248{
1249 int rc = security_ops->xfrm_decode_session(skb, &fl->secid, 0); 1249 int rc = security_ops->xfrm_decode_session(skb, &fl->flowi_secid, 0);
1250 1250
1251 BUG_ON(rc); 1251 BUG_ON(rc);
1252} 1252}
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index cef42f5d69a2..c178494850a9 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -4306,7 +4306,7 @@ static void selinux_secmark_refcount_dec(void)
4306static void selinux_req_classify_flow(const struct request_sock *req, 4306static void selinux_req_classify_flow(const struct request_sock *req,
4307 struct flowi *fl) 4307 struct flowi *fl)
4308{ 4308{
4309 fl->secid = req->secid; 4309 fl->flowi_secid = req->secid;
4310} 4310}
4311 4311
4312static int selinux_tun_dev_create(void) 4312static int selinux_tun_dev_create(void)
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c
index c43ab542246c..510ec2cf6c23 100644
--- a/security/selinux/xfrm.c
+++ b/security/selinux/xfrm.c
@@ -135,10 +135,10 @@ int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x, struct xfrm_policy *
135 135
136 state_sid = x->security->ctx_sid; 136 state_sid = x->security->ctx_sid;
137 137
138 if (fl->secid != state_sid) 138 if (fl->flowi_secid != state_sid)
139 return 0; 139 return 0;
140 140
141 rc = avc_has_perm(fl->secid, state_sid, SECCLASS_ASSOCIATION, 141 rc = avc_has_perm(fl->flowi_secid, state_sid, SECCLASS_ASSOCIATION,
142 ASSOCIATION__SENDTO, 142 ASSOCIATION__SENDTO,
143 NULL)? 0:1; 143 NULL)? 0:1;
144 144