diff options
author | Kees Cook <keescook@chromium.org> | 2018-10-10 17:18:24 -0700 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2018-10-10 20:40:22 -0700 |
commit | 07aed2f2af5a5892ced035dbcf3993f630825fc3 (patch) | |
tree | 2065a155d92f1a170c4b180162346db809b30a82 /security/selinux | |
parent | 3d6e5f6dcf6561e57b6466e43e14029fb196028d (diff) | |
download | linux-07aed2f2af5a5892ced035dbcf3993f630825fc3.tar.bz2 |
LSM: Record LSM name in struct lsm_info
In preparation for making LSM selections outside of the LSMs, include
the name of LSMs in struct lsm_info.
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/hooks.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 6ca2e89ddbd6..9651bccae270 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -7203,6 +7203,7 @@ void selinux_complete_init(void) /* SELinux requires early initialization in order to label all processes and objects when they are created. */ DEFINE_LSM(selinux) = { + .name = "selinux", .init = selinux_init, }; |