Commit 1a70cd40 authored by Stephen Smalley's avatar Stephen Smalley Committed by Linus Torvalds

[PATCH] selinux: rename selinux_ctxid_to_string

Rename selinux_ctxid_to_string to selinux_sid_to_string to be
consistent with other interfaces.
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
Acked-by: default avatarJames Morris <jmorris@namei.org>
Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
parent 62bac018
...@@ -70,8 +70,8 @@ int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, ...@@ -70,8 +70,8 @@ int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op,
void selinux_audit_set_callback(int (*callback)(void)); void selinux_audit_set_callback(int (*callback)(void));
/** /**
* selinux_ctxid_to_string - map a security context ID to a string * selinux_sid_to_string - map a security context ID to a string
* @ctxid: security context ID to be converted. * @sid: security context ID to be converted.
* @ctx: address of context string to be returned * @ctx: address of context string to be returned
* @ctxlen: length of returned context string. * @ctxlen: length of returned context string.
* *
...@@ -79,7 +79,7 @@ void selinux_audit_set_callback(int (*callback)(void)); ...@@ -79,7 +79,7 @@ void selinux_audit_set_callback(int (*callback)(void));
* string will be allocated internally, and the caller must call * string will be allocated internally, and the caller must call
* kfree() on it after use. * kfree() on it after use.
*/ */
int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen); int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen);
/** /**
* selinux_get_inode_sid - get the inode's security context ID * selinux_get_inode_sid - get the inode's security context ID
...@@ -156,7 +156,7 @@ static inline void selinux_audit_set_callback(int (*callback)(void)) ...@@ -156,7 +156,7 @@ static inline void selinux_audit_set_callback(int (*callback)(void))
return; return;
} }
static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) static inline int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
{ {
*ctx = NULL; *ctx = NULL;
*ctxlen = 0; *ctxlen = 0;
......
...@@ -244,7 +244,7 @@ static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid) ...@@ -244,7 +244,7 @@ static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid)
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
int rc; int rc;
if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) if ((rc = selinux_sid_to_string(sid, &ctx, &len)))
return rc; return rc;
else else
audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE,
...@@ -267,7 +267,7 @@ static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid) ...@@ -267,7 +267,7 @@ static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid)
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
int rc; int rc;
if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) if ((rc = selinux_sid_to_string(sid, &ctx, &len)))
return rc; return rc;
else else
audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE,
...@@ -293,7 +293,7 @@ static int audit_set_enabled(int state, uid_t loginuid, u32 sid) ...@@ -293,7 +293,7 @@ static int audit_set_enabled(int state, uid_t loginuid, u32 sid)
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
int rc; int rc;
if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) if ((rc = selinux_sid_to_string(sid, &ctx, &len)))
return rc; return rc;
else else
audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE,
...@@ -321,7 +321,7 @@ static int audit_set_failure(int state, uid_t loginuid, u32 sid) ...@@ -321,7 +321,7 @@ static int audit_set_failure(int state, uid_t loginuid, u32 sid)
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
int rc; int rc;
if ((rc = selinux_ctxid_to_string(sid, &ctx, &len))) if ((rc = selinux_sid_to_string(sid, &ctx, &len)))
return rc; return rc;
else else
audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE,
...@@ -538,7 +538,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) ...@@ -538,7 +538,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
if (status_get->mask & AUDIT_STATUS_PID) { if (status_get->mask & AUDIT_STATUS_PID) {
int old = audit_pid; int old = audit_pid;
if (sid) { if (sid) {
if ((err = selinux_ctxid_to_string( if ((err = selinux_sid_to_string(
sid, &ctx, &len))) sid, &ctx, &len)))
return err; return err;
else else
...@@ -576,7 +576,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) ...@@ -576,7 +576,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
"user pid=%d uid=%u auid=%u", "user pid=%d uid=%u auid=%u",
pid, uid, loginuid); pid, uid, loginuid);
if (sid) { if (sid) {
if (selinux_ctxid_to_string( if (selinux_sid_to_string(
sid, &ctx, &len)) { sid, &ctx, &len)) {
audit_log_format(ab, audit_log_format(ab,
" ssid=%u", sid); " ssid=%u", sid);
...@@ -614,7 +614,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) ...@@ -614,7 +614,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
loginuid, sid); loginuid, sid);
break; break;
case AUDIT_SIGNAL_INFO: case AUDIT_SIGNAL_INFO:
err = selinux_ctxid_to_string(audit_sig_sid, &ctx, &len); err = selinux_sid_to_string(audit_sig_sid, &ctx, &len);
if (err) if (err)
return err; return err;
sig_data = kmalloc(sizeof(*sig_data) + len, GFP_KERNEL); sig_data = kmalloc(sizeof(*sig_data) + len, GFP_KERNEL);
......
...@@ -1398,7 +1398,7 @@ static void audit_log_rule_change(uid_t loginuid, u32 sid, char *action, ...@@ -1398,7 +1398,7 @@ static void audit_log_rule_change(uid_t loginuid, u32 sid, char *action,
if (sid) { if (sid) {
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
if (selinux_ctxid_to_string(sid, &ctx, &len)) if (selinux_sid_to_string(sid, &ctx, &len))
audit_log_format(ab, " ssid=%u", sid); audit_log_format(ab, " ssid=%u", sid);
else else
audit_log_format(ab, " subj=%s", ctx); audit_log_format(ab, " subj=%s", ctx);
......
...@@ -898,7 +898,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts ...@@ -898,7 +898,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts
if (axi->osid != 0) { if (axi->osid != 0) {
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
if (selinux_ctxid_to_string( if (selinux_sid_to_string(
axi->osid, &ctx, &len)) { axi->osid, &ctx, &len)) {
audit_log_format(ab, " osid=%u", audit_log_format(ab, " osid=%u",
axi->osid); axi->osid);
...@@ -1005,7 +1005,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts ...@@ -1005,7 +1005,7 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts
if (n->osid != 0) { if (n->osid != 0) {
char *ctx = NULL; char *ctx = NULL;
u32 len; u32 len;
if (selinux_ctxid_to_string( if (selinux_sid_to_string(
n->osid, &ctx, &len)) { n->osid, &ctx, &len)) {
audit_log_format(ab, " osid=%u", n->osid); audit_log_format(ab, " osid=%u", n->osid);
call_panic = 2; call_panic = 2;
......
...@@ -21,10 +21,10 @@ ...@@ -21,10 +21,10 @@
#include "security.h" #include "security.h"
#include "objsec.h" #include "objsec.h"
int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
{ {
if (selinux_enabled) if (selinux_enabled)
return security_sid_to_context(ctxid, ctx, ctxlen); return security_sid_to_context(sid, ctx, ctxlen);
else { else {
*ctx = NULL; *ctx = NULL;
*ctxlen = 0; *ctxlen = 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment