diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2022-01-11 13:03:06 -0800 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2022-01-11 13:03:06 -0800 | 
| commit | a135ce4400bb87f229ab33a663987327d9e0b2a0 (patch) | |
| tree | d3ca45420412ad46ee34f189e7902ec45d62f32c /kernel/audit.c | |
| parent | dabd40ecaf693a18afd4c59c8d7280610d95b66e (diff) | |
| parent | 6cd9d4b97891560b61681cad9cc4307ce0719abc (diff) | |
Merge tag 'selinux-pr-20220110' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux
Pull selinux updates from Paul Moore:
 "Nothing too significant, but five SELinux patches for v5.17 that do
  the following:
   - Harden the code through additional use of the struct_size() macro
   - Plug some memory leaks
   - Clean up the code via removal of the security_add_mnt_opt() LSM
     hook and minor tweaks to selinux_add_opt()
   - Rename security_task_getsecid_subj() to better reflect its actual
     behavior/use - now called security_current_getsecid_subj()"
* tag 'selinux-pr-20220110' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux:
  selinux: minor tweaks to selinux_add_opt()
  selinux: fix potential memleak in selinux_add_opt()
  security,selinux: remove security_add_mnt_opt()
  selinux: Use struct_size() helper in kmalloc()
  lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
Diffstat (limited to 'kernel/audit.c')
| -rw-r--r-- | kernel/audit.c | 4 | 
1 files changed, 2 insertions, 2 deletions
| diff --git a/kernel/audit.c b/kernel/audit.c index 4cebadb5f30d..79c146184729 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -2131,7 +2131,7 @@ int audit_log_task_context(struct audit_buffer *ab)  	int error;  	u32 sid; -	security_task_getsecid_subj(current, &sid); +	security_current_getsecid_subj(&sid);  	if (!sid)  		return 0; @@ -2352,7 +2352,7 @@ int audit_signal_info(int sig, struct task_struct *t)  			audit_sig_uid = auid;  		else  			audit_sig_uid = uid; -		security_task_getsecid_subj(current, &audit_sig_sid); +		security_current_getsecid_subj(&audit_sig_sid);  	}  	return audit_signal_info_syscall(t); | 
