|
@@ -293,28 +293,28 @@ static void superblock_free_security(struct super_block *sb)
|
|
|
|
|
|
static int sk_alloc_security(struct sock *sk, int family, gfp_t priority)
|
|
static int sk_alloc_security(struct sock *sk, int family, gfp_t priority)
|
|
{
|
|
{
|
|
- struct sk_security_struct *ssec;
|
|
|
|
|
|
+ struct sk_security_struct *sksec;
|
|
|
|
|
|
- ssec = kzalloc(sizeof(*ssec), priority);
|
|
|
|
- if (!ssec)
|
|
|
|
|
|
+ sksec = kzalloc(sizeof(*sksec), priority);
|
|
|
|
+ if (!sksec)
|
|
return -ENOMEM;
|
|
return -ENOMEM;
|
|
|
|
|
|
- ssec->peer_sid = SECINITSID_UNLABELED;
|
|
|
|
- ssec->sid = SECINITSID_UNLABELED;
|
|
|
|
- sk->sk_security = ssec;
|
|
|
|
|
|
+ sksec->peer_sid = SECINITSID_UNLABELED;
|
|
|
|
+ sksec->sid = SECINITSID_UNLABELED;
|
|
|
|
+ sk->sk_security = sksec;
|
|
|
|
|
|
- selinux_netlbl_sk_security_reset(ssec);
|
|
|
|
|
|
+ selinux_netlbl_sk_security_reset(sksec);
|
|
|
|
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
static void sk_free_security(struct sock *sk)
|
|
static void sk_free_security(struct sock *sk)
|
|
{
|
|
{
|
|
- struct sk_security_struct *ssec = sk->sk_security;
|
|
|
|
|
|
+ struct sk_security_struct *sksec = sk->sk_security;
|
|
|
|
|
|
sk->sk_security = NULL;
|
|
sk->sk_security = NULL;
|
|
- selinux_netlbl_sk_security_free(ssec);
|
|
|
|
- kfree(ssec);
|
|
|
|
|
|
+ selinux_netlbl_sk_security_free(sksec);
|
|
|
|
+ kfree(sksec);
|
|
}
|
|
}
|
|
|
|
|
|
/* The security server must be initialized before
|
|
/* The security server must be initialized before
|
|
@@ -4002,7 +4002,7 @@ static int selinux_socket_unix_stream_connect(struct socket *sock,
|
|
struct socket *other,
|
|
struct socket *other,
|
|
struct sock *newsk)
|
|
struct sock *newsk)
|
|
{
|
|
{
|
|
- struct sk_security_struct *ssec;
|
|
|
|
|
|
+ struct sk_security_struct *sksec;
|
|
struct inode_security_struct *isec;
|
|
struct inode_security_struct *isec;
|
|
struct inode_security_struct *other_isec;
|
|
struct inode_security_struct *other_isec;
|
|
struct common_audit_data ad;
|
|
struct common_audit_data ad;
|
|
@@ -4021,13 +4021,13 @@ static int selinux_socket_unix_stream_connect(struct socket *sock,
|
|
return err;
|
|
return err;
|
|
|
|
|
|
/* connecting socket */
|
|
/* connecting socket */
|
|
- ssec = sock->sk->sk_security;
|
|
|
|
- ssec->peer_sid = other_isec->sid;
|
|
|
|
|
|
+ sksec = sock->sk->sk_security;
|
|
|
|
+ sksec->peer_sid = other_isec->sid;
|
|
|
|
|
|
/* server child socket */
|
|
/* server child socket */
|
|
- ssec = newsk->sk_security;
|
|
|
|
- ssec->peer_sid = isec->sid;
|
|
|
|
- err = security_sid_mls_copy(other_isec->sid, ssec->peer_sid, &ssec->sid);
|
|
|
|
|
|
+ sksec = newsk->sk_security;
|
|
|
|
+ sksec->peer_sid = isec->sid;
|
|
|
|
+ err = security_sid_mls_copy(other_isec->sid, sksec->peer_sid, &sksec->sid);
|
|
|
|
|
|
return err;
|
|
return err;
|
|
}
|
|
}
|
|
@@ -4190,7 +4190,7 @@ static int selinux_socket_getpeersec_stream(struct socket *sock, char __user *op
|
|
int err = 0;
|
|
int err = 0;
|
|
char *scontext;
|
|
char *scontext;
|
|
u32 scontext_len;
|
|
u32 scontext_len;
|
|
- struct sk_security_struct *ssec;
|
|
|
|
|
|
+ struct sk_security_struct *sksec;
|
|
struct inode_security_struct *isec;
|
|
struct inode_security_struct *isec;
|
|
u32 peer_sid = SECSID_NULL;
|
|
u32 peer_sid = SECSID_NULL;
|
|
|
|
|
|
@@ -4198,8 +4198,8 @@ static int selinux_socket_getpeersec_stream(struct socket *sock, char __user *op
|
|
|
|
|
|
if (isec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
|
|
if (isec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
|
|
isec->sclass == SECCLASS_TCP_SOCKET) {
|
|
isec->sclass == SECCLASS_TCP_SOCKET) {
|
|
- ssec = sock->sk->sk_security;
|
|
|
|
- peer_sid = ssec->peer_sid;
|
|
|
|
|
|
+ sksec = sock->sk->sk_security;
|
|
|
|
+ peer_sid = sksec->peer_sid;
|
|
}
|
|
}
|
|
if (peer_sid == SECSID_NULL) {
|
|
if (peer_sid == SECSID_NULL) {
|
|
err = -ENOPROTOOPT;
|
|
err = -ENOPROTOOPT;
|
|
@@ -4266,14 +4266,14 @@ static void selinux_sk_free_security(struct sock *sk)
|
|
|
|
|
|
static void selinux_sk_clone_security(const struct sock *sk, struct sock *newsk)
|
|
static void selinux_sk_clone_security(const struct sock *sk, struct sock *newsk)
|
|
{
|
|
{
|
|
- struct sk_security_struct *ssec = sk->sk_security;
|
|
|
|
- struct sk_security_struct *newssec = newsk->sk_security;
|
|
|
|
|
|
+ struct sk_security_struct *sksec = sk->sk_security;
|
|
|
|
+ struct sk_security_struct *newsksec = newsk->sk_security;
|
|
|
|
|
|
- newssec->sid = ssec->sid;
|
|
|
|
- newssec->peer_sid = ssec->peer_sid;
|
|
|
|
- newssec->sclass = ssec->sclass;
|
|
|
|
|
|
+ newsksec->sid = sksec->sid;
|
|
|
|
+ newsksec->peer_sid = sksec->peer_sid;
|
|
|
|
+ newsksec->sclass = sksec->sclass;
|
|
|
|
|
|
- selinux_netlbl_sk_security_reset(newssec);
|
|
|
|
|
|
+ selinux_netlbl_sk_security_reset(newsksec);
|
|
}
|
|
}
|
|
|
|
|
|
static void selinux_sk_getsecid(struct sock *sk, u32 *secid)
|
|
static void selinux_sk_getsecid(struct sock *sk, u32 *secid)
|