diff options
Diffstat (limited to 'security/selinux/selinuxfs.c')
-rw-r--r-- | security/selinux/selinuxfs.c | 112 |
1 files changed, 57 insertions, 55 deletions
diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c index 6c05e30e8b49..893b3db0bad2 100644 --- a/security/selinux/selinuxfs.c +++ b/security/selinux/selinuxfs.c | |||
@@ -1,16 +1,16 @@ | |||
1 | /* Updated: Karl MacMillan <kmacmillan@tresys.com> | 1 | /* Updated: Karl MacMillan <kmacmillan@tresys.com> |
2 | * | 2 | * |
3 | * Added conditional policy language extensions | 3 | * Added conditional policy language extensions |
4 | * | 4 | * |
5 | * Updated: Hewlett-Packard <paul.moore@hp.com> | 5 | * Updated: Hewlett-Packard <paul.moore@hp.com> |
6 | * | 6 | * |
7 | * Added support for the policy capability bitmap | 7 | * Added support for the policy capability bitmap |
8 | * | 8 | * |
9 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. | 9 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. |
10 | * Copyright (C) 2003 - 2004 Tresys Technology, LLC | 10 | * Copyright (C) 2003 - 2004 Tresys Technology, LLC |
11 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> | 11 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> |
12 | * This program is free software; you can redistribute it and/or modify | 12 | * This program is free software; you can redistribute it and/or modify |
13 | * it under the terms of the GNU General Public License as published by | 13 | * it under the terms of the GNU General Public License as published by |
14 | * the Free Software Foundation, version 2. | 14 | * the Free Software Foundation, version 2. |
15 | */ | 15 | */ |
16 | 16 | ||
@@ -58,14 +58,14 @@ int selinux_compat_net = SELINUX_COMPAT_NET_VALUE; | |||
58 | 58 | ||
59 | static int __init checkreqprot_setup(char *str) | 59 | static int __init checkreqprot_setup(char *str) |
60 | { | 60 | { |
61 | selinux_checkreqprot = simple_strtoul(str,NULL,0) ? 1 : 0; | 61 | selinux_checkreqprot = simple_strtoul(str, NULL, 0) ? 1 : 0; |
62 | return 1; | 62 | return 1; |
63 | } | 63 | } |
64 | __setup("checkreqprot=", checkreqprot_setup); | 64 | __setup("checkreqprot=", checkreqprot_setup); |
65 | 65 | ||
66 | static int __init selinux_compat_net_setup(char *str) | 66 | static int __init selinux_compat_net_setup(char *str) |
67 | { | 67 | { |
68 | selinux_compat_net = simple_strtoul(str,NULL,0) ? 1 : 0; | 68 | selinux_compat_net = simple_strtoul(str, NULL, 0) ? 1 : 0; |
69 | return 1; | 69 | return 1; |
70 | } | 70 | } |
71 | __setup("selinux_compat_net=", selinux_compat_net_setup); | 71 | __setup("selinux_compat_net=", selinux_compat_net_setup); |
@@ -74,17 +74,17 @@ __setup("selinux_compat_net=", selinux_compat_net_setup); | |||
74 | static DEFINE_MUTEX(sel_mutex); | 74 | static DEFINE_MUTEX(sel_mutex); |
75 | 75 | ||
76 | /* global data for booleans */ | 76 | /* global data for booleans */ |
77 | static struct dentry *bool_dir = NULL; | 77 | static struct dentry *bool_dir; |
78 | static int bool_num = 0; | 78 | static int bool_num; |
79 | static char **bool_pending_names; | 79 | static char **bool_pending_names; |
80 | static int *bool_pending_values = NULL; | 80 | static int *bool_pending_values; |
81 | 81 | ||
82 | /* global data for classes */ | 82 | /* global data for classes */ |
83 | static struct dentry *class_dir = NULL; | 83 | static struct dentry *class_dir; |
84 | static unsigned long last_class_ino; | 84 | static unsigned long last_class_ino; |
85 | 85 | ||
86 | /* global data for policy capabilities */ | 86 | /* global data for policy capabilities */ |
87 | static struct dentry *policycap_dir = NULL; | 87 | static struct dentry *policycap_dir; |
88 | 88 | ||
89 | extern void selnl_notify_setenforce(int val); | 89 | extern void selnl_notify_setenforce(int val); |
90 | 90 | ||
@@ -143,7 +143,7 @@ static ssize_t sel_read_enforce(struct file *filp, char __user *buf, | |||
143 | } | 143 | } |
144 | 144 | ||
145 | #ifdef CONFIG_SECURITY_SELINUX_DEVELOP | 145 | #ifdef CONFIG_SECURITY_SELINUX_DEVELOP |
146 | static ssize_t sel_write_enforce(struct file * file, const char __user * buf, | 146 | static ssize_t sel_write_enforce(struct file *file, const char __user *buf, |
147 | size_t count, loff_t *ppos) | 147 | size_t count, loff_t *ppos) |
148 | 148 | ||
149 | { | 149 | { |
@@ -157,7 +157,7 @@ static ssize_t sel_write_enforce(struct file * file, const char __user * buf, | |||
157 | /* No partial writes. */ | 157 | /* No partial writes. */ |
158 | return -EINVAL; | 158 | return -EINVAL; |
159 | } | 159 | } |
160 | page = (char*)get_zeroed_page(GFP_KERNEL); | 160 | page = (char *)get_zeroed_page(GFP_KERNEL); |
161 | if (!page) | 161 | if (!page) |
162 | return -ENOMEM; | 162 | return -ENOMEM; |
163 | length = -EFAULT; | 163 | length = -EFAULT; |
@@ -214,7 +214,7 @@ static const struct file_operations sel_handle_unknown_ops = { | |||
214 | }; | 214 | }; |
215 | 215 | ||
216 | #ifdef CONFIG_SECURITY_SELINUX_DISABLE | 216 | #ifdef CONFIG_SECURITY_SELINUX_DISABLE |
217 | static ssize_t sel_write_disable(struct file * file, const char __user * buf, | 217 | static ssize_t sel_write_disable(struct file *file, const char __user *buf, |
218 | size_t count, loff_t *ppos) | 218 | size_t count, loff_t *ppos) |
219 | 219 | ||
220 | { | 220 | { |
@@ -229,7 +229,7 @@ static ssize_t sel_write_disable(struct file * file, const char __user * buf, | |||
229 | /* No partial writes. */ | 229 | /* No partial writes. */ |
230 | return -EINVAL; | 230 | return -EINVAL; |
231 | } | 231 | } |
232 | page = (char*)get_zeroed_page(GFP_KERNEL); | 232 | page = (char *)get_zeroed_page(GFP_KERNEL); |
233 | if (!page) | 233 | if (!page) |
234 | return -ENOMEM; | 234 | return -ENOMEM; |
235 | length = -EFAULT; | 235 | length = -EFAULT; |
@@ -264,7 +264,7 @@ static const struct file_operations sel_disable_ops = { | |||
264 | }; | 264 | }; |
265 | 265 | ||
266 | static ssize_t sel_read_policyvers(struct file *filp, char __user *buf, | 266 | static ssize_t sel_read_policyvers(struct file *filp, char __user *buf, |
267 | size_t count, loff_t *ppos) | 267 | size_t count, loff_t *ppos) |
268 | { | 268 | { |
269 | char tmpbuf[TMPBUFLEN]; | 269 | char tmpbuf[TMPBUFLEN]; |
270 | ssize_t length; | 270 | ssize_t length; |
@@ -300,7 +300,7 @@ static const struct file_operations sel_mls_ops = { | |||
300 | .read = sel_read_mls, | 300 | .read = sel_read_mls, |
301 | }; | 301 | }; |
302 | 302 | ||
303 | static ssize_t sel_write_load(struct file * file, const char __user * buf, | 303 | static ssize_t sel_write_load(struct file *file, const char __user *buf, |
304 | size_t count, loff_t *ppos) | 304 | size_t count, loff_t *ppos) |
305 | 305 | ||
306 | { | 306 | { |
@@ -372,7 +372,7 @@ static const struct file_operations sel_load_ops = { | |||
372 | .write = sel_write_load, | 372 | .write = sel_write_load, |
373 | }; | 373 | }; |
374 | 374 | ||
375 | static ssize_t sel_write_context(struct file * file, char *buf, size_t size) | 375 | static ssize_t sel_write_context(struct file *file, char *buf, size_t size) |
376 | { | 376 | { |
377 | char *canon; | 377 | char *canon; |
378 | u32 sid, len; | 378 | u32 sid, len; |
@@ -414,7 +414,7 @@ static ssize_t sel_read_checkreqprot(struct file *filp, char __user *buf, | |||
414 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); | 414 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); |
415 | } | 415 | } |
416 | 416 | ||
417 | static ssize_t sel_write_checkreqprot(struct file * file, const char __user * buf, | 417 | static ssize_t sel_write_checkreqprot(struct file *file, const char __user *buf, |
418 | size_t count, loff_t *ppos) | 418 | size_t count, loff_t *ppos) |
419 | { | 419 | { |
420 | char *page; | 420 | char *page; |
@@ -431,7 +431,7 @@ static ssize_t sel_write_checkreqprot(struct file * file, const char __user * bu | |||
431 | /* No partial writes. */ | 431 | /* No partial writes. */ |
432 | return -EINVAL; | 432 | return -EINVAL; |
433 | } | 433 | } |
434 | page = (char*)get_zeroed_page(GFP_KERNEL); | 434 | page = (char *)get_zeroed_page(GFP_KERNEL); |
435 | if (!page) | 435 | if (!page) |
436 | return -ENOMEM; | 436 | return -ENOMEM; |
437 | length = -EFAULT; | 437 | length = -EFAULT; |
@@ -463,7 +463,7 @@ static ssize_t sel_read_compat_net(struct file *filp, char __user *buf, | |||
463 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); | 463 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); |
464 | } | 464 | } |
465 | 465 | ||
466 | static ssize_t sel_write_compat_net(struct file * file, const char __user * buf, | 466 | static ssize_t sel_write_compat_net(struct file *file, const char __user *buf, |
467 | size_t count, loff_t *ppos) | 467 | size_t count, loff_t *ppos) |
468 | { | 468 | { |
469 | char *page; | 469 | char *page; |
@@ -480,7 +480,7 @@ static ssize_t sel_write_compat_net(struct file * file, const char __user * buf, | |||
480 | /* No partial writes. */ | 480 | /* No partial writes. */ |
481 | return -EINVAL; | 481 | return -EINVAL; |
482 | } | 482 | } |
483 | page = (char*)get_zeroed_page(GFP_KERNEL); | 483 | page = (char *)get_zeroed_page(GFP_KERNEL); |
484 | if (!page) | 484 | if (!page) |
485 | return -ENOMEM; | 485 | return -ENOMEM; |
486 | length = -EFAULT; | 486 | length = -EFAULT; |
@@ -505,11 +505,11 @@ static const struct file_operations sel_compat_net_ops = { | |||
505 | /* | 505 | /* |
506 | * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c | 506 | * Remaining nodes use transaction based IO methods like nfsd/nfsctl.c |
507 | */ | 507 | */ |
508 | static ssize_t sel_write_access(struct file * file, char *buf, size_t size); | 508 | static ssize_t sel_write_access(struct file *file, char *buf, size_t size); |
509 | static ssize_t sel_write_create(struct file * file, char *buf, size_t size); | 509 | static ssize_t sel_write_create(struct file *file, char *buf, size_t size); |
510 | static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size); | 510 | static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size); |
511 | static ssize_t sel_write_user(struct file * file, char *buf, size_t size); | 511 | static ssize_t sel_write_user(struct file *file, char *buf, size_t size); |
512 | static ssize_t sel_write_member(struct file * file, char *buf, size_t size); | 512 | static ssize_t sel_write_member(struct file *file, char *buf, size_t size); |
513 | 513 | ||
514 | static ssize_t (*write_op[])(struct file *, char *, size_t) = { | 514 | static ssize_t (*write_op[])(struct file *, char *, size_t) = { |
515 | [SEL_ACCESS] = sel_write_access, | 515 | [SEL_ACCESS] = sel_write_access, |
@@ -522,7 +522,7 @@ static ssize_t (*write_op[])(struct file *, char *, size_t) = { | |||
522 | 522 | ||
523 | static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos) | 523 | static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos) |
524 | { | 524 | { |
525 | ino_t ino = file->f_path.dentry->d_inode->i_ino; | 525 | ino_t ino = file->f_path.dentry->d_inode->i_ino; |
526 | char *data; | 526 | char *data; |
527 | ssize_t rv; | 527 | ssize_t rv; |
528 | 528 | ||
@@ -533,8 +533,8 @@ static ssize_t selinux_transaction_write(struct file *file, const char __user *b | |||
533 | if (IS_ERR(data)) | 533 | if (IS_ERR(data)) |
534 | return PTR_ERR(data); | 534 | return PTR_ERR(data); |
535 | 535 | ||
536 | rv = write_op[ino](file, data, size); | 536 | rv = write_op[ino](file, data, size); |
537 | if (rv>0) { | 537 | if (rv > 0) { |
538 | simple_transaction_set(file, rv); | 538 | simple_transaction_set(file, rv); |
539 | rv = size; | 539 | rv = size; |
540 | } | 540 | } |
@@ -553,7 +553,7 @@ static const struct file_operations transaction_ops = { | |||
553 | * and the length returned. Otherwise return 0 or and -error. | 553 | * and the length returned. Otherwise return 0 or and -error. |
554 | */ | 554 | */ |
555 | 555 | ||
556 | static ssize_t sel_write_access(struct file * file, char *buf, size_t size) | 556 | static ssize_t sel_write_access(struct file *file, char *buf, size_t size) |
557 | { | 557 | { |
558 | char *scon, *tcon; | 558 | char *scon, *tcon; |
559 | u32 ssid, tsid; | 559 | u32 ssid, tsid; |
@@ -602,7 +602,7 @@ out: | |||
602 | return length; | 602 | return length; |
603 | } | 603 | } |
604 | 604 | ||
605 | static ssize_t sel_write_create(struct file * file, char *buf, size_t size) | 605 | static ssize_t sel_write_create(struct file *file, char *buf, size_t size) |
606 | { | 606 | { |
607 | char *scon, *tcon; | 607 | char *scon, *tcon; |
608 | u32 ssid, tsid, newsid; | 608 | u32 ssid, tsid, newsid; |
@@ -661,7 +661,7 @@ out: | |||
661 | return length; | 661 | return length; |
662 | } | 662 | } |
663 | 663 | ||
664 | static ssize_t sel_write_relabel(struct file * file, char *buf, size_t size) | 664 | static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size) |
665 | { | 665 | { |
666 | char *scon, *tcon; | 666 | char *scon, *tcon; |
667 | u32 ssid, tsid, newsid; | 667 | u32 ssid, tsid, newsid; |
@@ -718,7 +718,7 @@ out: | |||
718 | return length; | 718 | return length; |
719 | } | 719 | } |
720 | 720 | ||
721 | static ssize_t sel_write_user(struct file * file, char *buf, size_t size) | 721 | static ssize_t sel_write_user(struct file *file, char *buf, size_t size) |
722 | { | 722 | { |
723 | char *con, *user, *ptr; | 723 | char *con, *user, *ptr; |
724 | u32 sid, *sids; | 724 | u32 sid, *sids; |
@@ -779,7 +779,7 @@ out: | |||
779 | return length; | 779 | return length; |
780 | } | 780 | } |
781 | 781 | ||
782 | static ssize_t sel_write_member(struct file * file, char *buf, size_t size) | 782 | static ssize_t sel_write_member(struct file *file, char *buf, size_t size) |
783 | { | 783 | { |
784 | char *scon, *tcon; | 784 | char *scon, *tcon; |
785 | u32 ssid, tsid, newsid; | 785 | u32 ssid, tsid, newsid; |
@@ -873,7 +873,8 @@ static ssize_t sel_read_bool(struct file *filep, char __user *buf, | |||
873 | ret = -EINVAL; | 873 | ret = -EINVAL; |
874 | goto out; | 874 | goto out; |
875 | } | 875 | } |
876 | if (!(page = (char*)get_zeroed_page(GFP_KERNEL))) { | 876 | page = (char *)get_zeroed_page(GFP_KERNEL); |
877 | if (!page) { | ||
877 | ret = -ENOMEM; | 878 | ret = -ENOMEM; |
878 | goto out; | 879 | goto out; |
879 | } | 880 | } |
@@ -924,7 +925,7 @@ static ssize_t sel_write_bool(struct file *filep, const char __user *buf, | |||
924 | length = -EINVAL; | 925 | length = -EINVAL; |
925 | goto out; | 926 | goto out; |
926 | } | 927 | } |
927 | page = (char*)get_zeroed_page(GFP_KERNEL); | 928 | page = (char *)get_zeroed_page(GFP_KERNEL); |
928 | if (!page) { | 929 | if (!page) { |
929 | length = -ENOMEM; | 930 | length = -ENOMEM; |
930 | goto out; | 931 | goto out; |
@@ -952,8 +953,8 @@ out: | |||
952 | } | 953 | } |
953 | 954 | ||
954 | static const struct file_operations sel_bool_ops = { | 955 | static const struct file_operations sel_bool_ops = { |
955 | .read = sel_read_bool, | 956 | .read = sel_read_bool, |
956 | .write = sel_write_bool, | 957 | .write = sel_write_bool, |
957 | }; | 958 | }; |
958 | 959 | ||
959 | static ssize_t sel_commit_bools_write(struct file *filep, | 960 | static ssize_t sel_commit_bools_write(struct file *filep, |
@@ -978,7 +979,7 @@ static ssize_t sel_commit_bools_write(struct file *filep, | |||
978 | /* No partial writes. */ | 979 | /* No partial writes. */ |
979 | goto out; | 980 | goto out; |
980 | } | 981 | } |
981 | page = (char*)get_zeroed_page(GFP_KERNEL); | 982 | page = (char *)get_zeroed_page(GFP_KERNEL); |
982 | if (!page) { | 983 | if (!page) { |
983 | length = -ENOMEM; | 984 | length = -ENOMEM; |
984 | goto out; | 985 | goto out; |
@@ -992,9 +993,8 @@ static ssize_t sel_commit_bools_write(struct file *filep, | |||
992 | if (sscanf(page, "%d", &new_value) != 1) | 993 | if (sscanf(page, "%d", &new_value) != 1) |
993 | goto out; | 994 | goto out; |
994 | 995 | ||
995 | if (new_value && bool_pending_values) { | 996 | if (new_value && bool_pending_values) |
996 | security_set_bools(bool_num, bool_pending_values); | 997 | security_set_bools(bool_num, bool_pending_values); |
997 | } | ||
998 | 998 | ||
999 | length = count; | 999 | length = count; |
1000 | 1000 | ||
@@ -1006,7 +1006,7 @@ out: | |||
1006 | } | 1006 | } |
1007 | 1007 | ||
1008 | static const struct file_operations sel_commit_bools_ops = { | 1008 | static const struct file_operations sel_commit_bools_ops = { |
1009 | .write = sel_commit_bools_write, | 1009 | .write = sel_commit_bools_write, |
1010 | }; | 1010 | }; |
1011 | 1011 | ||
1012 | static void sel_remove_entries(struct dentry *de) | 1012 | static void sel_remove_entries(struct dentry *de) |
@@ -1056,7 +1056,8 @@ static int sel_make_bools(void) | |||
1056 | 1056 | ||
1057 | sel_remove_entries(dir); | 1057 | sel_remove_entries(dir); |
1058 | 1058 | ||
1059 | if (!(page = (char*)get_zeroed_page(GFP_KERNEL))) | 1059 | page = (char *)get_zeroed_page(GFP_KERNEL); |
1060 | if (!page) | ||
1060 | return -ENOMEM; | 1061 | return -ENOMEM; |
1061 | 1062 | ||
1062 | ret = security_get_bools(&num, &names, &values); | 1063 | ret = security_get_bools(&num, &names, &values); |
@@ -1083,8 +1084,9 @@ static int sel_make_bools(void) | |||
1083 | ret = -ENAMETOOLONG; | 1084 | ret = -ENAMETOOLONG; |
1084 | goto err; | 1085 | goto err; |
1085 | } | 1086 | } |
1086 | isec = (struct inode_security_struct*)inode->i_security; | 1087 | isec = (struct inode_security_struct *)inode->i_security; |
1087 | if ((ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid))) | 1088 | ret = security_genfs_sid("selinuxfs", page, SECCLASS_FILE, &sid); |
1089 | if (ret) | ||
1088 | goto err; | 1090 | goto err; |
1089 | isec->sid = sid; | 1091 | isec->sid = sid; |
1090 | isec->initialized = 1; | 1092 | isec->initialized = 1; |
@@ -1112,7 +1114,7 @@ err: | |||
1112 | 1114 | ||
1113 | #define NULL_FILE_NAME "null" | 1115 | #define NULL_FILE_NAME "null" |
1114 | 1116 | ||
1115 | struct dentry *selinux_null = NULL; | 1117 | struct dentry *selinux_null; |
1116 | 1118 | ||
1117 | static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf, | 1119 | static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf, |
1118 | size_t count, loff_t *ppos) | 1120 | size_t count, loff_t *ppos) |
@@ -1124,8 +1126,8 @@ static ssize_t sel_read_avc_cache_threshold(struct file *filp, char __user *buf, | |||
1124 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); | 1126 | return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); |
1125 | } | 1127 | } |
1126 | 1128 | ||
1127 | static ssize_t sel_write_avc_cache_threshold(struct file * file, | 1129 | static ssize_t sel_write_avc_cache_threshold(struct file *file, |
1128 | const char __user * buf, | 1130 | const char __user *buf, |
1129 | size_t count, loff_t *ppos) | 1131 | size_t count, loff_t *ppos) |
1130 | 1132 | ||
1131 | { | 1133 | { |
@@ -1144,7 +1146,7 @@ static ssize_t sel_write_avc_cache_threshold(struct file * file, | |||
1144 | goto out; | 1146 | goto out; |
1145 | } | 1147 | } |
1146 | 1148 | ||
1147 | page = (char*)get_zeroed_page(GFP_KERNEL); | 1149 | page = (char *)get_zeroed_page(GFP_KERNEL); |
1148 | if (!page) { | 1150 | if (!page) { |
1149 | ret = -ENOMEM; | 1151 | ret = -ENOMEM; |
1150 | goto out; | 1152 | goto out; |
@@ -1302,7 +1304,7 @@ out: | |||
1302 | return ret; | 1304 | return ret; |
1303 | } | 1305 | } |
1304 | 1306 | ||
1305 | static ssize_t sel_read_initcon(struct file * file, char __user *buf, | 1307 | static ssize_t sel_read_initcon(struct file *file, char __user *buf, |
1306 | size_t count, loff_t *ppos) | 1308 | size_t count, loff_t *ppos) |
1307 | { | 1309 | { |
1308 | struct inode *inode; | 1310 | struct inode *inode; |
@@ -1376,7 +1378,7 @@ static inline u32 sel_ino_to_perm(unsigned long ino) | |||
1376 | return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1); | 1378 | return (ino & SEL_INO_MASK) % (SEL_VEC_MAX + 1); |
1377 | } | 1379 | } |
1378 | 1380 | ||
1379 | static ssize_t sel_read_class(struct file * file, char __user *buf, | 1381 | static ssize_t sel_read_class(struct file *file, char __user *buf, |
1380 | size_t count, loff_t *ppos) | 1382 | size_t count, loff_t *ppos) |
1381 | { | 1383 | { |
1382 | ssize_t rc, len; | 1384 | ssize_t rc, len; |
@@ -1400,7 +1402,7 @@ static const struct file_operations sel_class_ops = { | |||
1400 | .read = sel_read_class, | 1402 | .read = sel_read_class, |
1401 | }; | 1403 | }; |
1402 | 1404 | ||
1403 | static ssize_t sel_read_perm(struct file * file, char __user *buf, | 1405 | static ssize_t sel_read_perm(struct file *file, char __user *buf, |
1404 | size_t count, loff_t *ppos) | 1406 | size_t count, loff_t *ppos) |
1405 | { | 1407 | { |
1406 | ssize_t rc, len; | 1408 | ssize_t rc, len; |
@@ -1413,7 +1415,7 @@ static ssize_t sel_read_perm(struct file * file, char __user *buf, | |||
1413 | goto out; | 1415 | goto out; |
1414 | } | 1416 | } |
1415 | 1417 | ||
1416 | len = snprintf(page, PAGE_SIZE,"%d", sel_ino_to_perm(ino)); | 1418 | len = snprintf(page, PAGE_SIZE, "%d", sel_ino_to_perm(ino)); |
1417 | rc = simple_read_from_buffer(buf, count, ppos, page, len); | 1419 | rc = simple_read_from_buffer(buf, count, ppos, page, len); |
1418 | free_page((unsigned long)page); | 1420 | free_page((unsigned long)page); |
1419 | out: | 1421 | out: |
@@ -1641,7 +1643,7 @@ out: | |||
1641 | return ret; | 1643 | return ret; |
1642 | } | 1644 | } |
1643 | 1645 | ||
1644 | static int sel_fill_super(struct super_block * sb, void * data, int silent) | 1646 | static int sel_fill_super(struct super_block *sb, void *data, int silent) |
1645 | { | 1647 | { |
1646 | int ret; | 1648 | int ret; |
1647 | struct dentry *dentry; | 1649 | struct dentry *dentry; |
@@ -1697,7 +1699,7 @@ static int sel_fill_super(struct super_block * sb, void * data, int silent) | |||
1697 | goto err; | 1699 | goto err; |
1698 | } | 1700 | } |
1699 | inode->i_ino = ++sel_last_ino; | 1701 | inode->i_ino = ++sel_last_ino; |
1700 | isec = (struct inode_security_struct*)inode->i_security; | 1702 | isec = (struct inode_security_struct *)inode->i_security; |
1701 | isec->sid = SECINITSID_DEVNULL; | 1703 | isec->sid = SECINITSID_DEVNULL; |
1702 | isec->sclass = SECCLASS_CHR_FILE; | 1704 | isec->sclass = SECCLASS_CHR_FILE; |
1703 | isec->initialized = 1; | 1705 | isec->initialized = 1; |