mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-03-22 07:27:12 +08:00
lsm: use lsm_prop in security_current_getsecid
Change the security_current_getsecid_subj() and security_task_getsecid_obj() interfaces to fill in a lsm_prop structure instead of a u32 secid. Audit interfaces will need to collect all possible security data for possible reporting. Cc: linux-integrity@vger.kernel.org Cc: audit@vger.kernel.org Cc: selinux@vger.kernel.org Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> [PM: subject line tweak] Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
committed by
Paul Moore
parent
e4f6822044
commit
37f670aacd
@@ -1534,11 +1534,14 @@ int __init netlbl_unlabel_defconf(void)
|
||||
int ret_val;
|
||||
struct netlbl_dom_map *entry;
|
||||
struct netlbl_audit audit_info;
|
||||
struct lsm_prop prop;
|
||||
|
||||
/* Only the kernel is allowed to call this function and the only time
|
||||
* it is called is at bootup before the audit subsystem is reporting
|
||||
* messages so don't worry to much about these values. */
|
||||
security_current_getsecid_subj(&audit_info.secid);
|
||||
security_current_getlsmprop_subj(&prop);
|
||||
/* scaffolding */
|
||||
audit_info.secid = prop.scaffold.secid;
|
||||
audit_info.loginuid = GLOBAL_ROOT_UID;
|
||||
audit_info.sessionid = 0;
|
||||
|
||||
|
||||
@@ -32,7 +32,11 @@
|
||||
*/
|
||||
static inline void netlbl_netlink_auditinfo(struct netlbl_audit *audit_info)
|
||||
{
|
||||
security_current_getsecid_subj(&audit_info->secid);
|
||||
struct lsm_prop prop;
|
||||
|
||||
security_current_getlsmprop_subj(&prop);
|
||||
/* scaffolding */
|
||||
audit_info->secid = prop.scaffold.secid;
|
||||
audit_info->loginuid = audit_get_loginuid(current);
|
||||
audit_info->sessionid = audit_get_sessionid(current);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user