mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git
synced 2026-04-17 22:24:18 -04:00
lsm: use lsm_prop in security_audit_rule_match
Change the secid parameter of security_audit_rule_match to a lsm_prop structure pointer. Pass the entry from the lsm_prop structure for the approprite slot to the LSM hook. Change the users of security_audit_rule_match to use the lsm_prop instead of a u32. The scaffolding function lsmprop_init() fills the structure with the value of the old secid, ensuring that it is available to the appropriate module hook. The sources of the secid, security_task_getsecid() and security_inode_getsecid(), will be converted to use the lsm_prop structure later in the series. At that point the use of lsmprop_init() is dropped. Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> [PM: subject line tweak] Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
committed by
Paul Moore
parent
ed870e35db
commit
870b7fdc66
@@ -5570,7 +5570,7 @@ void security_audit_rule_free(void *lsmrule)
|
||||
|
||||
/**
|
||||
* security_audit_rule_match() - Check if a label matches an audit rule
|
||||
* @secid: security label
|
||||
* @prop: security label
|
||||
* @field: LSM audit field
|
||||
* @op: matching operator
|
||||
* @lsmrule: audit rule
|
||||
@@ -5581,9 +5581,10 @@ void security_audit_rule_free(void *lsmrule)
|
||||
* Return: Returns 1 if secid matches the rule, 0 if it does not, -ERRNO on
|
||||
* failure.
|
||||
*/
|
||||
int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule)
|
||||
int security_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op,
|
||||
void *lsmrule)
|
||||
{
|
||||
return call_int_hook(audit_rule_match, secid, field, op, lsmrule);
|
||||
return call_int_hook(audit_rule_match, prop, field, op, lsmrule);
|
||||
}
|
||||
#endif /* CONFIG_AUDIT */
|
||||
|
||||
|
||||
Reference in New Issue
Block a user