diff options
| -rw-r--r-- | fs/namei.c | 4 | ||||
| -rw-r--r-- | fs/nfsd/vfs.c | 2 | ||||
| -rw-r--r-- | include/linux/ima.h | 4 | ||||
| -rw-r--r-- | security/integrity/ima/ima_main.c | 6 | 
4 files changed, 8 insertions, 8 deletions
diff --git a/fs/namei.c b/fs/namei.c index cd77b6375ef..d62fdc875f2 100644 --- a/fs/namei.c +++ b/fs/namei.c @@ -1736,7 +1736,7 @@ do_last:  		if (nd.root.mnt)  			path_put(&nd.root);  		if (!IS_ERR(filp)) { -			error = ima_path_check(filp, acc_mode); +			error = ima_file_check(filp, acc_mode);  			if (error) {  				fput(filp);  				filp = ERR_PTR(error); @@ -1796,7 +1796,7 @@ ok:  	}  	filp = nameidata_to_filp(&nd);  	if (!IS_ERR(filp)) { -		error = ima_path_check(filp, acc_mode); +		error = ima_file_check(filp, acc_mode);  		if (error) {  			fput(filp);  			filp = ERR_PTR(error); diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c index 32477e3a645..97d79eff6b7 100644 --- a/fs/nfsd/vfs.c +++ b/fs/nfsd/vfs.c @@ -752,7 +752,7 @@ nfsd_open(struct svc_rqst *rqstp, struct svc_fh *fhp, int type,  			    flags, current_cred());  	if (IS_ERR(*filp))  		host_err = PTR_ERR(*filp); -	host_err = ima_path_check(*filp, access); +	host_err = ima_file_check(*filp, access);  out_nfserr:  	err = nfserrno(host_err);  out: diff --git a/include/linux/ima.h b/include/linux/ima.h index aa55a8f1f5b..975837e7d6c 100644 --- a/include/linux/ima.h +++ b/include/linux/ima.h @@ -17,7 +17,7 @@ struct linux_binprm;  extern int ima_bprm_check(struct linux_binprm *bprm);  extern int ima_inode_alloc(struct inode *inode);  extern void ima_inode_free(struct inode *inode); -extern int ima_path_check(struct file *file, int mask); +extern int ima_file_check(struct file *file, int mask);  extern void ima_file_free(struct file *file);  extern int ima_file_mmap(struct file *file, unsigned long prot);  extern void ima_counts_get(struct file *file); @@ -38,7 +38,7 @@ static inline void ima_inode_free(struct inode *inode)  	return;  } -static inline int ima_path_check(struct file *file, int mask) +static inline int ima_file_check(struct file *file, int mask)  {  	return 0;  } diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c index eb1cf6498cc..b76e1f03ea2 100644 --- a/security/integrity/ima/ima_main.c +++ b/security/integrity/ima/ima_main.c @@ -14,7 +14,7 @@   *   * File: ima_main.c   *	implements the IMA hooks: ima_bprm_check, ima_file_mmap, - *	and ima_path_check. + *	and ima_file_check.   */  #include <linux/module.h>  #include <linux/file.h> @@ -306,7 +306,7 @@ int ima_bprm_check(struct linux_binprm *bprm)   * Always return 0 and audit dentry_open failures.   * (Return code will be based upon measurement appraisal.)   */ -int ima_path_check(struct file *file, int mask) +int ima_file_check(struct file *file, int mask)  {  	int rc; @@ -315,7 +315,7 @@ int ima_path_check(struct file *file, int mask)  				 PATH_CHECK);  	return 0;  } -EXPORT_SYMBOL_GPL(ima_path_check); +EXPORT_SYMBOL_GPL(ima_file_check);  static int __init init_ima(void)  {  |