aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorVesa-Matti J Kari <vmkari@cc.helsinki.fi>2008-07-20 16:57:01 -0400
committerJames Morris <jmorris@namei.org>2008-08-04 20:55:30 -0400
commitdf4ea865f09580b1cad621c0426612f598847815 (patch)
tree57c7e7cc2cb1e4144f1a101a8bc93f74d4b64db9 /security
parent3583a71183a02c51ca71cd180e9189cfb0411cc1 (diff)
SELinux: Trivial minor fixes that change C null character style
Trivial minor fixes that change C null character style. Signed-off-by: Vesa-Matti Kari <vmkari@cc.helsinki.fi> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security')
-rw-r--r--security/selinux/ss/conditional.c2
-rw-r--r--security/selinux/ss/mls.c14
-rw-r--r--security/selinux/ss/policydb.c20
3 files changed, 18 insertions, 18 deletions
diff --git a/security/selinux/ss/conditional.c b/security/selinux/ss/conditional.c
index fb4efe4f4bc..f8c850a56ed 100644
--- a/security/selinux/ss/conditional.c
+++ b/security/selinux/ss/conditional.c
@@ -239,7 +239,7 @@ int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp)
239 rc = next_entry(key, fp, len); 239 rc = next_entry(key, fp, len);
240 if (rc < 0) 240 if (rc < 0)
241 goto err; 241 goto err;
242 key[len] = 0; 242 key[len] = '\0';
243 if (hashtab_insert(h, key, booldatum)) 243 if (hashtab_insert(h, key, booldatum))
244 goto err; 244 goto err;
245 245
diff --git a/security/selinux/ss/mls.c b/security/selinux/ss/mls.c
index 77d745da48b..b5407f16c2a 100644
--- a/security/selinux/ss/mls.c
+++ b/security/selinux/ss/mls.c
@@ -283,8 +283,8 @@ int mls_context_to_sid(struct policydb *pol,
283 p++; 283 p++;
284 284
285 delim = *p; 285 delim = *p;
286 if (delim != 0) 286 if (delim != '\0')
287 *p++ = 0; 287 *p++ = '\0';
288 288
289 for (l = 0; l < 2; l++) { 289 for (l = 0; l < 2; l++) {
290 levdatum = hashtab_search(pol->p_levels.table, scontextp); 290 levdatum = hashtab_search(pol->p_levels.table, scontextp);
@@ -302,14 +302,14 @@ int mls_context_to_sid(struct policydb *pol,
302 while (*p && *p != ',' && *p != '-') 302 while (*p && *p != ',' && *p != '-')
303 p++; 303 p++;
304 delim = *p; 304 delim = *p;
305 if (delim != 0) 305 if (delim != '\0')
306 *p++ = 0; 306 *p++ = '\0';
307 307
308 /* Separate into range if exists */ 308 /* Separate into range if exists */
309 rngptr = strchr(scontextp, '.'); 309 rngptr = strchr(scontextp, '.');
310 if (rngptr != NULL) { 310 if (rngptr != NULL) {
311 /* Remove '.' */ 311 /* Remove '.' */
312 *rngptr++ = 0; 312 *rngptr++ = '\0';
313 } 313 }
314 314
315 catdatum = hashtab_search(pol->p_cats.table, 315 catdatum = hashtab_search(pol->p_cats.table,
@@ -357,8 +357,8 @@ int mls_context_to_sid(struct policydb *pol,
357 p++; 357 p++;
358 358
359 delim = *p; 359 delim = *p;
360 if (delim != 0) 360 if (delim != '\0')
361 *p++ = 0; 361 *p++ = '\0';
362 } else 362 } else
363 break; 363 break;
364 } 364 }
diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
index 2391761ae42..26646305dc0 100644
--- a/security/selinux/ss/policydb.c
+++ b/security/selinux/ss/policydb.c
@@ -932,7 +932,7 @@ static int perm_read(struct policydb *p, struct hashtab *h, void *fp)
932 rc = next_entry(key, fp, len); 932 rc = next_entry(key, fp, len);
933 if (rc < 0) 933 if (rc < 0)
934 goto bad; 934 goto bad;
935 key[len] = 0; 935 key[len] = '\0';
936 936
937 rc = hashtab_insert(h, key, perdatum); 937 rc = hashtab_insert(h, key, perdatum);
938 if (rc) 938 if (rc)
@@ -979,7 +979,7 @@ static int common_read(struct policydb *p, struct hashtab *h, void *fp)
979 rc = next_entry(key, fp, len); 979 rc = next_entry(key, fp, len);
980 if (rc < 0) 980 if (rc < 0)
981 goto bad; 981 goto bad;
982 key[len] = 0; 982 key[len] = '\0';
983 983
984 for (i = 0; i < nel; i++) { 984 for (i = 0; i < nel; i++) {
985 rc = perm_read(p, comdatum->permissions.table, fp); 985 rc = perm_read(p, comdatum->permissions.table, fp);
@@ -1117,7 +1117,7 @@ static int class_read(struct policydb *p, struct hashtab *h, void *fp)
1117 rc = next_entry(key, fp, len); 1117 rc = next_entry(key, fp, len);
1118 if (rc < 0) 1118 if (rc < 0)
1119 goto bad; 1119 goto bad;
1120 key[len] = 0; 1120 key[len] = '\0';
1121 1121
1122 if (len2) { 1122 if (len2) {
1123 cladatum->comkey = kmalloc(len2 + 1, GFP_KERNEL); 1123 cladatum->comkey = kmalloc(len2 + 1, GFP_KERNEL);
@@ -1128,7 +1128,7 @@ static int class_read(struct policydb *p, struct hashtab *h, void *fp)
1128 rc = next_entry(cladatum->comkey, fp, len2); 1128 rc = next_entry(cladatum->comkey, fp, len2);
1129 if (rc < 0) 1129 if (rc < 0)
1130 goto bad; 1130 goto bad;
1131 cladatum->comkey[len2] = 0; 1131 cladatum->comkey[len2] = '\0';
1132 1132
1133 cladatum->comdatum = hashtab_search(p->p_commons.table, 1133 cladatum->comdatum = hashtab_search(p->p_commons.table,
1134 cladatum->comkey); 1134 cladatum->comkey);
@@ -1201,7 +1201,7 @@ static int role_read(struct policydb *p, struct hashtab *h, void *fp)
1201 rc = next_entry(key, fp, len); 1201 rc = next_entry(key, fp, len);
1202 if (rc < 0) 1202 if (rc < 0)
1203 goto bad; 1203 goto bad;
1204 key[len] = 0; 1204 key[len] = '\0';
1205 1205
1206 rc = ebitmap_read(&role->dominates, fp); 1206 rc = ebitmap_read(&role->dominates, fp);
1207 if (rc) 1207 if (rc)
@@ -1262,7 +1262,7 @@ static int type_read(struct policydb *p, struct hashtab *h, void *fp)
1262 rc = next_entry(key, fp, len); 1262 rc = next_entry(key, fp, len);
1263 if (rc < 0) 1263 if (rc < 0)
1264 goto bad; 1264 goto bad;
1265 key[len] = 0; 1265 key[len] = '\0';
1266 1266
1267 rc = hashtab_insert(h, key, typdatum); 1267 rc = hashtab_insert(h, key, typdatum);
1268 if (rc) 1268 if (rc)
@@ -1334,7 +1334,7 @@ static int user_read(struct policydb *p, struct hashtab *h, void *fp)
1334 rc = next_entry(key, fp, len); 1334 rc = next_entry(key, fp, len);
1335 if (rc < 0) 1335 if (rc < 0)
1336 goto bad; 1336 goto bad;
1337 key[len] = 0; 1337 key[len] = '\0';
1338 1338
1339 rc = ebitmap_read(&usrdatum->roles, fp); 1339 rc = ebitmap_read(&usrdatum->roles, fp);
1340 if (rc) 1340 if (rc)
@@ -1388,7 +1388,7 @@ static int sens_read(struct policydb *p, struct hashtab *h, void *fp)
1388 rc = next_entry(key, fp, len); 1388 rc = next_entry(key, fp, len);
1389 if (rc < 0) 1389 if (rc < 0)
1390 goto bad; 1390 goto bad;
1391 key[len] = 0; 1391 key[len] = '\0';
1392 1392
1393 levdatum->level = kmalloc(sizeof(struct mls_level), GFP_ATOMIC); 1393 levdatum->level = kmalloc(sizeof(struct mls_level), GFP_ATOMIC);
1394 if (!levdatum->level) { 1394 if (!levdatum->level) {
@@ -1440,7 +1440,7 @@ static int cat_read(struct policydb *p, struct hashtab *h, void *fp)
1440 rc = next_entry(key, fp, len); 1440 rc = next_entry(key, fp, len);
1441 if (rc < 0) 1441 if (rc < 0)
1442 goto bad; 1442 goto bad;
1443 key[len] = 0; 1443 key[len] = '\0';
1444 1444
1445 rc = hashtab_insert(h, key, catdatum); 1445 rc = hashtab_insert(h, key, catdatum);
1446 if (rc) 1446 if (rc)
@@ -1523,7 +1523,7 @@ int policydb_read(struct policydb *p, void *fp)
1523 kfree(policydb_str); 1523 kfree(policydb_str);
1524 goto bad; 1524 goto bad;
1525 } 1525 }
1526 policydb_str[len] = 0; 1526 policydb_str[len] = '\0';
1527 if (strcmp(policydb_str, POLICYDB_STRING)) { 1527 if (strcmp(policydb_str, POLICYDB_STRING)) {
1528 printk(KERN_ERR "SELinux: policydb string %s does not match " 1528 printk(KERN_ERR "SELinux: policydb string %s does not match "
1529 "my string %s\n", policydb_str, POLICYDB_STRING); 1529 "my string %s\n", policydb_str, POLICYDB_STRING);