diff options
| author | Kees Cook <[email protected]> | 2018-10-11 00:18:24 +0000 |
|---|---|---|
| committer | James Morris <[email protected]> | 2018-10-11 03:40:22 +0000 |
| commit | 07aed2f2af5a5892ced035dbcf3993f630825fc3 (patch) | |
| tree | 2065a155d92f1a170c4b180162346db809b30a82 /security/selinux/hooks.c | |
| parent | LSM: Convert security_initcall() into DEFINE_LSM() (diff) | |
| download | kernel-07aed2f2af5a5892ced035dbcf3993f630825fc3.tar.gz kernel-07aed2f2af5a5892ced035dbcf3993f630825fc3.zip | |
LSM: Record LSM name in struct lsm_info
In preparation for making LSM selections outside of the LSMs, include
the name of LSMs in struct lsm_info.
Signed-off-by: Kees Cook <[email protected]>
Reviewed-by: Casey Schaufler <[email protected]>
Signed-off-by: James Morris <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
| -rw-r--r-- | security/selinux/hooks.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 6ca2e89ddbd6..9651bccae270 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -7203,6 +7203,7 @@ void selinux_complete_init(void) /* SELinux requires early initialization in order to label all processes and objects when they are created. */ DEFINE_LSM(selinux) = { + .name = "selinux", .init = selinux_init, }; |
