diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2013-12-11 14:44:04 -0500 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2014-03-07 11:30:36 -0500 |
commit | 52a13284844b354c7a37533f5366cb5b653a76b3 (patch) | |
tree | 71e0f9148d8a2bb44a308d79e2883f6e732cd97b /security | |
parent | 31d4b761896101660b3efe01816b63d9814755eb (diff) |
ima: use static const char array definitions
A const char pointer allocates memory for a pointer as well as for
a string, This patch replaces a number of the const char pointers
throughout IMA, with a static const char array.
Suggested-by: David Howells <dhowells@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Acked-by: David Howells <dhowells@redhat.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/integrity/ima/ima_api.c | 8 | ||||
-rw-r--r-- | security/integrity/ima/ima_appraise.c | 4 | ||||
-rw-r--r-- | security/integrity/ima/ima_init.c | 4 | ||||
-rw-r--r-- | security/integrity/ima/ima_policy.c | 4 |
4 files changed, 10 insertions, 10 deletions
diff --git a/security/integrity/ima/ima_api.c b/security/integrity/ima/ima_api.c index 6d76d4a01503..393b9d46c472 100644 --- a/security/integrity/ima/ima_api.c +++ b/security/integrity/ima/ima_api.c | |||
@@ -92,8 +92,8 @@ int ima_store_template(struct ima_template_entry *entry, | |||
92 | int violation, struct inode *inode, | 92 | int violation, struct inode *inode, |
93 | const unsigned char *filename) | 93 | const unsigned char *filename) |
94 | { | 94 | { |
95 | const char *op = "add_template_measure"; | 95 | static const char op[] = "add_template_measure"; |
96 | const char *audit_cause = "hashing_error"; | 96 | static const char audit_cause[] = "hashing_error"; |
97 | char *template_name = entry->template_desc->name; | 97 | char *template_name = entry->template_desc->name; |
98 | int result; | 98 | int result; |
99 | struct { | 99 | struct { |
@@ -260,8 +260,8 @@ void ima_store_measurement(struct integrity_iint_cache *iint, | |||
260 | struct evm_ima_xattr_data *xattr_value, | 260 | struct evm_ima_xattr_data *xattr_value, |
261 | int xattr_len) | 261 | int xattr_len) |
262 | { | 262 | { |
263 | const char *op = "add_template_measure"; | 263 | static const char op[] = "add_template_measure"; |
264 | const char *audit_cause = "ENOMEM"; | 264 | static const char audit_cause[] = "ENOMEM"; |
265 | int result = -ENOMEM; | 265 | int result = -ENOMEM; |
266 | struct inode *inode = file_inode(file); | 266 | struct inode *inode = file_inode(file); |
267 | struct ima_template_entry *entry; | 267 | struct ima_template_entry *entry; |
diff --git a/security/integrity/ima/ima_appraise.c b/security/integrity/ima/ima_appraise.c index 734e9468aca0..291bf0f3a46d 100644 --- a/security/integrity/ima/ima_appraise.c +++ b/security/integrity/ima/ima_appraise.c | |||
@@ -177,11 +177,11 @@ int ima_appraise_measurement(int func, struct integrity_iint_cache *iint, | |||
177 | struct evm_ima_xattr_data *xattr_value, | 177 | struct evm_ima_xattr_data *xattr_value, |
178 | int xattr_len) | 178 | int xattr_len) |
179 | { | 179 | { |
180 | static const char op[] = "appraise_data"; | ||
181 | char *cause = "unknown"; | ||
180 | struct dentry *dentry = file->f_dentry; | 182 | struct dentry *dentry = file->f_dentry; |
181 | struct inode *inode = dentry->d_inode; | 183 | struct inode *inode = dentry->d_inode; |
182 | enum integrity_status status = INTEGRITY_UNKNOWN; | 184 | enum integrity_status status = INTEGRITY_UNKNOWN; |
183 | const char *op = "appraise_data"; | ||
184 | char *cause = "unknown"; | ||
185 | int rc = xattr_len, hash_start = 0; | 185 | int rc = xattr_len, hash_start = 0; |
186 | 186 | ||
187 | if (!ima_appraise) | 187 | if (!ima_appraise) |
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c index 37122768554a..315f2b96496f 100644 --- a/security/integrity/ima/ima_init.c +++ b/security/integrity/ima/ima_init.c | |||
@@ -42,10 +42,10 @@ int ima_used_chip; | |||
42 | */ | 42 | */ |
43 | static void __init ima_add_boot_aggregate(void) | 43 | static void __init ima_add_boot_aggregate(void) |
44 | { | 44 | { |
45 | static const char op[] = "add_boot_aggregate"; | ||
46 | const char *audit_cause = "ENOMEM"; | ||
45 | struct ima_template_entry *entry; | 47 | struct ima_template_entry *entry; |
46 | struct integrity_iint_cache tmp_iint, *iint = &tmp_iint; | 48 | struct integrity_iint_cache tmp_iint, *iint = &tmp_iint; |
47 | const char *op = "add_boot_aggregate"; | ||
48 | const char *audit_cause = "ENOMEM"; | ||
49 | int result = -ENOMEM; | 49 | int result = -ENOMEM; |
50 | int violation = 0; | 50 | int violation = 0; |
51 | struct { | 51 | struct { |
diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index 354b125c6c9f..3f6b8a466368 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c | |||
@@ -329,7 +329,7 @@ void __init ima_init_policy(void) | |||
329 | */ | 329 | */ |
330 | void ima_update_policy(void) | 330 | void ima_update_policy(void) |
331 | { | 331 | { |
332 | const char *op = "policy_update"; | 332 | static const char op[] = "policy_update"; |
333 | const char *cause = "already exists"; | 333 | const char *cause = "already exists"; |
334 | int result = 1; | 334 | int result = 1; |
335 | int audit_info = 0; | 335 | int audit_info = 0; |
@@ -645,7 +645,7 @@ static int ima_parse_rule(char *rule, struct ima_rule_entry *entry) | |||
645 | */ | 645 | */ |
646 | ssize_t ima_parse_add_rule(char *rule) | 646 | ssize_t ima_parse_add_rule(char *rule) |
647 | { | 647 | { |
648 | const char *op = "update_policy"; | 648 | static const char op[] = "update_policy"; |
649 | char *p; | 649 | char *p; |
650 | struct ima_rule_entry *entry; | 650 | struct ima_rule_entry *entry; |
651 | ssize_t result, len; | 651 | ssize_t result, len; |