aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorJames Morris <jmorris@namei.org>2010-03-08 20:46:47 -0500
committerJames Morris <jmorris@namei.org>2010-03-08 20:46:47 -0500
commitc43a7523470dc2d9947fa114a0b54317975d4c04 (patch)
tree30a72ed1e9079f19b814263197761820f57c39ce /security
parenteaa5eec739637f32f8733d528ff0b94fd62b1214 (diff)
parent634a539e16bd7a1ba31c3f832baa725565cc9f96 (diff)
Merge branch 'next-queue' into next
Diffstat (limited to 'security')
-rw-r--r--security/keys/keyring.c6
-rw-r--r--security/security.c2
-rw-r--r--security/selinux/hooks.c2
-rw-r--r--security/selinux/include/initial_sid_to_string.h2
-rw-r--r--security/selinux/netlink.c1
-rw-r--r--security/selinux/nlmsgtab.c1
-rw-r--r--security/selinux/ss/policydb.c2
-rw-r--r--security/selinux/ss/symtab.c1
-rw-r--r--security/tomoyo/common.c10
9 files changed, 9 insertions, 18 deletions
diff --git a/security/keys/keyring.c b/security/keys/keyring.c
index e814d2109f8e..a98fb376f249 100644
--- a/security/keys/keyring.c
+++ b/security/keys/keyring.c
@@ -170,12 +170,10 @@ static void keyring_describe(const struct key *keyring, struct seq_file *m)
170{ 170{
171 struct keyring_list *klist; 171 struct keyring_list *klist;
172 172
173 if (keyring->description) { 173 if (keyring->description)
174 seq_puts(m, keyring->description); 174 seq_puts(m, keyring->description);
175 } 175 else
176 else {
177 seq_puts(m, "[anon]"); 176 seq_puts(m, "[anon]");
178 }
179 177
180 rcu_read_lock(); 178 rcu_read_lock();
181 klist = rcu_dereference(keyring->payload.subscriptions); 179 klist = rcu_dereference(keyring->payload.subscriptions);
diff --git a/security/security.c b/security/security.c
index 687c6fd14bb6..b98334b0a576 100644
--- a/security/security.c
+++ b/security/security.c
@@ -117,7 +117,7 @@ int __init security_module_enable(struct security_operations *ops)
117 * If there is already a security module registered with the kernel, 117 * If there is already a security module registered with the kernel,
118 * an error will be returned. Otherwise %0 is returned on success. 118 * an error will be returned. Otherwise %0 is returned on success.
119 */ 119 */
120int register_security(struct security_operations *ops) 120int __init register_security(struct security_operations *ops)
121{ 121{
122 if (verify(ops)) { 122 if (verify(ops)) {
123 printk(KERN_DEBUG "%s could not verify " 123 printk(KERN_DEBUG "%s could not verify "
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 5feecb41009d..63c2d36d55ab 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -323,7 +323,7 @@ extern int ss_initialized;
323 323
324/* The file system's label must be initialized prior to use. */ 324/* The file system's label must be initialized prior to use. */
325 325
326static char *labeling_behaviors[6] = { 326static const char *labeling_behaviors[6] = {
327 "uses xattr", 327 "uses xattr",
328 "uses transition SIDs", 328 "uses transition SIDs",
329 "uses task SIDs", 329 "uses task SIDs",
diff --git a/security/selinux/include/initial_sid_to_string.h b/security/selinux/include/initial_sid_to_string.h
index d4fac82793ae..a59b64e3fd02 100644
--- a/security/selinux/include/initial_sid_to_string.h
+++ b/security/selinux/include/initial_sid_to_string.h
@@ -1,5 +1,5 @@
1/* This file is automatically generated. Do not edit. */ 1/* This file is automatically generated. Do not edit. */
2static char *initial_sid_to_string[] = 2static const char *initial_sid_to_string[] =
3{ 3{
4 "null", 4 "null",
5 "kernel", 5 "kernel",
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c
index 1ae556446e65..7d7be296d876 100644
--- a/security/selinux/netlink.c
+++ b/security/selinux/netlink.c
@@ -13,7 +13,6 @@
13#include <linux/types.h> 13#include <linux/types.h>
14#include <linux/stddef.h> 14#include <linux/stddef.h>
15#include <linux/kernel.h> 15#include <linux/kernel.h>
16#include <linux/list.h>
17#include <linux/skbuff.h> 16#include <linux/skbuff.h>
18#include <linux/netlink.h> 17#include <linux/netlink.h>
19#include <linux/selinux_netlink.h> 18#include <linux/selinux_netlink.h>
diff --git a/security/selinux/nlmsgtab.c b/security/selinux/nlmsgtab.c
index dd7cc6de77f9..75ec0c6ebacd 100644
--- a/security/selinux/nlmsgtab.c
+++ b/security/selinux/nlmsgtab.c
@@ -11,7 +11,6 @@
11 */ 11 */
12#include <linux/types.h> 12#include <linux/types.h>
13#include <linux/kernel.h> 13#include <linux/kernel.h>
14#include <linux/skbuff.h>
15#include <linux/netlink.h> 14#include <linux/netlink.h>
16#include <linux/rtnetlink.h> 15#include <linux/rtnetlink.h>
17#include <linux/if.h> 16#include <linux/if.h>
diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
index 23c6e53c102c..24ced65ac4ff 100644
--- a/security/selinux/ss/policydb.c
+++ b/security/selinux/ss/policydb.c
@@ -40,7 +40,7 @@
40#define _DEBUG_HASHES 40#define _DEBUG_HASHES
41 41
42#ifdef DEBUG_HASHES 42#ifdef DEBUG_HASHES
43static char *symtab_name[SYM_NUM] = { 43static const char *symtab_name[SYM_NUM] = {
44 "common prefixes", 44 "common prefixes",
45 "classes", 45 "classes",
46 "roles", 46 "roles",
diff --git a/security/selinux/ss/symtab.c b/security/selinux/ss/symtab.c
index 837658a98a54..bcf9f620426e 100644
--- a/security/selinux/ss/symtab.c
+++ b/security/selinux/ss/symtab.c
@@ -4,7 +4,6 @@
4 * Author : Stephen Smalley, <sds@epoch.ncsc.mil> 4 * Author : Stephen Smalley, <sds@epoch.ncsc.mil>
5 */ 5 */
6#include <linux/kernel.h> 6#include <linux/kernel.h>
7#include <linux/slab.h>
8#include <linux/string.h> 7#include <linux/string.h>
9#include <linux/errno.h> 8#include <linux/errno.h>
10#include "symtab.h" 9#include "symtab.h"
diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c
index ff51f1026b57..8ccf12997378 100644
--- a/security/tomoyo/common.c
+++ b/security/tomoyo/common.c
@@ -1367,7 +1367,6 @@ static bool tomoyo_print_path_acl(struct tomoyo_io_buffer *head,
1367{ 1367{
1368 int pos; 1368 int pos;
1369 u8 bit; 1369 u8 bit;
1370 const char *atmark = "";
1371 const char *filename; 1370 const char *filename;
1372 const u32 perm = ptr->perm | (((u32) ptr->perm_high) << 16); 1371 const u32 perm = ptr->perm | (((u32) ptr->perm_high) << 16);
1373 1372
@@ -1382,8 +1381,7 @@ static bool tomoyo_print_path_acl(struct tomoyo_io_buffer *head,
1382 continue; 1381 continue;
1383 msg = tomoyo_path2keyword(bit); 1382 msg = tomoyo_path2keyword(bit);
1384 pos = head->read_avail; 1383 pos = head->read_avail;
1385 if (!tomoyo_io_printf(head, "allow_%s %s%s\n", msg, 1384 if (!tomoyo_io_printf(head, "allow_%s %s\n", msg, filename))
1386 atmark, filename))
1387 goto out; 1385 goto out;
1388 } 1386 }
1389 head->read_bit = 0; 1387 head->read_bit = 0;
@@ -1406,8 +1404,6 @@ static bool tomoyo_print_path2_acl(struct tomoyo_io_buffer *head,
1406 struct tomoyo_path2_acl *ptr) 1404 struct tomoyo_path2_acl *ptr)
1407{ 1405{
1408 int pos; 1406 int pos;
1409 const char *atmark1 = "";
1410 const char *atmark2 = "";
1411 const char *filename1; 1407 const char *filename1;
1412 const char *filename2; 1408 const char *filename2;
1413 const u8 perm = ptr->perm; 1409 const u8 perm = ptr->perm;
@@ -1421,8 +1417,8 @@ static bool tomoyo_print_path2_acl(struct tomoyo_io_buffer *head,
1421 continue; 1417 continue;
1422 msg = tomoyo_path22keyword(bit); 1418 msg = tomoyo_path22keyword(bit);
1423 pos = head->read_avail; 1419 pos = head->read_avail;
1424 if (!tomoyo_io_printf(head, "allow_%s %s%s %s%s\n", msg, 1420 if (!tomoyo_io_printf(head, "allow_%s %s %s\n", msg,
1425 atmark1, filename1, atmark2, filename2)) 1421 filename1, filename2))
1426 goto out; 1422 goto out;
1427 } 1423 }
1428 head->read_bit = 0; 1424 head->read_bit = 0;