diff options
| author | Stephen Smalley <sds@tycho.nsa.gov> | 2006-09-25 23:31:57 -0700 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-09-26 08:48:52 -0700 | 
| commit | 1a70cd40cb291c25b67ec0da715a49d76719329d (patch) | |
| tree | ffb4c6cd3f7ef1b92822ebbda11bd2b035c2bc86 | |
| parent | 62bac0185ad3dfef11d9602980445c54d45199c6 (diff) | |
| download | olio-linux-3.10-1a70cd40cb291c25b67ec0da715a49d76719329d.tar.xz olio-linux-3.10-1a70cd40cb291c25b67ec0da715a49d76719329d.zip  | |
[PATCH] selinux: rename selinux_ctxid_to_string
Rename selinux_ctxid_to_string to selinux_sid_to_string to be
consistent with other interfaces.
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
| -rw-r--r-- | include/linux/selinux.h | 8 | ||||
| -rw-r--r-- | kernel/audit.c | 14 | ||||
| -rw-r--r-- | kernel/auditfilter.c | 2 | ||||
| -rw-r--r-- | kernel/auditsc.c | 4 | ||||
| -rw-r--r-- | security/selinux/exports.c | 4 | 
5 files changed, 16 insertions, 16 deletions
diff --git a/include/linux/selinux.h b/include/linux/selinux.h index 79e4707ca77..df9098de4c9 100644 --- a/include/linux/selinux.h +++ b/include/linux/selinux.h @@ -70,8 +70,8 @@ int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op,  void selinux_audit_set_callback(int (*callback)(void));  /** - *     selinux_ctxid_to_string - map a security context ID to a string - *     @ctxid: security context ID to be converted. + *     selinux_sid_to_string - map a security context ID to a string + *     @sid: security context ID to be converted.   *     @ctx: address of context string to be returned   *     @ctxlen: length of returned context string.   * @@ -79,7 +79,7 @@ void selinux_audit_set_callback(int (*callback)(void));   *     string will be allocated internally, and the caller must call   *     kfree() on it after use.   */ -int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen); +int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen);  /**   *     selinux_get_inode_sid - get the inode's security context ID @@ -156,7 +156,7 @@ static inline void selinux_audit_set_callback(int (*callback)(void))  	return;  } -static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) +static inline int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)  {         *ctx = NULL;         *ctxlen = 0; diff --git a/kernel/audit.c b/kernel/audit.c index 963fd15c962..f9889ee7782 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -244,7 +244,7 @@ static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid)  		char *ctx = NULL;  		u32 len;  		int rc; -		if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) +		if ((rc = selinux_sid_to_string(sid, &ctx, &len)))  			return rc;  		else  			audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, @@ -267,7 +267,7 @@ static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid)  		char *ctx = NULL;  		u32 len;  		int rc; -		if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) +		if ((rc = selinux_sid_to_string(sid, &ctx, &len)))  			return rc;  		else  			audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, @@ -293,7 +293,7 @@ static int audit_set_enabled(int state, uid_t loginuid, u32 sid)  		char *ctx = NULL;  		u32 len;  		int rc; -		if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) +		if ((rc = selinux_sid_to_string(sid, &ctx, &len)))  			return rc;  		else  			audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, @@ -321,7 +321,7 @@ static int audit_set_failure(int state, uid_t loginuid, u32 sid)  		char *ctx = NULL;  		u32 len;  		int rc; -		if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) +		if ((rc = selinux_sid_to_string(sid, &ctx, &len)))  			return rc;  		else  			audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, @@ -538,7 +538,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)  		if (status_get->mask & AUDIT_STATUS_PID) {  			int old   = audit_pid;  			if (sid) { -				if ((err = selinux_ctxid_to_string( +				if ((err = selinux_sid_to_string(  						sid, &ctx, &len)))  					return err;  				else @@ -576,7 +576,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)  						 "user pid=%d uid=%u auid=%u",  						 pid, uid, loginuid);  				if (sid) { -					if (selinux_ctxid_to_string( +					if (selinux_sid_to_string(  							sid, &ctx, &len)) {  						audit_log_format(ab,   							" ssid=%u", sid); @@ -614,7 +614,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)  					   loginuid, sid);  		break;  	case AUDIT_SIGNAL_INFO: -		err = selinux_ctxid_to_string(audit_sig_sid, &ctx, &len); +		err = selinux_sid_to_string(audit_sig_sid, &ctx, &len);  		if (err)  			return err;  		sig_data = kmalloc(sizeof(*sig_data) + len, GFP_KERNEL); diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index a44879b0c72..1a58a81fb09 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c @@ -1398,7 +1398,7 @@ static void audit_log_rule_change(uid_t loginuid, u32 sid, char *action,  	if (sid) {  		char *ctx = NULL;  		u32 len; -		if (selinux_ctxid_to_string(sid, &ctx, &len)) +		if (selinux_sid_to_string(sid, &ctx, &len))  			audit_log_format(ab, " ssid=%u", sid);  		else  			audit_log_format(ab, " subj=%s", ctx); diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 331e1701039..fb83c5cb8c3 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -898,7 +898,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts  			if (axi->osid != 0) {  				char *ctx = NULL;  				u32 len; -				if (selinux_ctxid_to_string( +				if (selinux_sid_to_string(  						axi->osid, &ctx, &len)) {  					audit_log_format(ab, " osid=%u",  							axi->osid); @@ -1005,7 +1005,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts  		if (n->osid != 0) {  			char *ctx = NULL;  			u32 len; -			if (selinux_ctxid_to_string( +			if (selinux_sid_to_string(  				n->osid, &ctx, &len)) {  				audit_log_format(ab, " osid=%u", n->osid);  				call_panic = 2; diff --git a/security/selinux/exports.c b/security/selinux/exports.c index ee0fb47f81a..b6f96943be1 100644 --- a/security/selinux/exports.c +++ b/security/selinux/exports.c @@ -21,10 +21,10 @@  #include "security.h"  #include "objsec.h" -int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) +int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)  {  	if (selinux_enabled) -		return security_sid_to_context(ctxid, ctx, ctxlen); +		return security_sid_to_context(sid, ctx, ctxlen);  	else {  		*ctx = NULL;  		*ctxlen = 0;  |