diff options
Diffstat (limited to 'security/selinux/ss')
| -rw-r--r-- | security/selinux/ss/conditional.h | 6 | ||||
| -rw-r--r-- | security/selinux/ss/context.h | 4 | ||||
| -rw-r--r-- | security/selinux/ss/hashtab.h | 6 | ||||
| -rw-r--r-- | security/selinux/ss/mls.h | 6 | ||||
| -rw-r--r-- | security/selinux/ss/mls_types.h | 4 | ||||
| -rw-r--r-- | security/selinux/ss/policydb.h | 10 |
6 files changed, 18 insertions, 18 deletions
diff --git a/security/selinux/ss/conditional.h b/security/selinux/ss/conditional.h index f3a1fc6e5d66..65b9f8366e9c 100644 --- a/security/selinux/ss/conditional.h +++ b/security/selinux/ss/conditional.h | |||
| @@ -59,10 +59,10 @@ struct cond_node { | |||
| 59 | struct cond_node *next; | 59 | struct cond_node *next; |
| 60 | }; | 60 | }; |
| 61 | 61 | ||
| 62 | int cond_policydb_init(struct policydb* p); | 62 | int cond_policydb_init(struct policydb *p); |
| 63 | void cond_policydb_destroy(struct policydb* p); | 63 | void cond_policydb_destroy(struct policydb *p); |
| 64 | 64 | ||
| 65 | int cond_init_bool_indexes(struct policydb* p); | 65 | int cond_init_bool_indexes(struct policydb *p); |
| 66 | int cond_destroy_bool(void *key, void *datum, void *p); | 66 | int cond_destroy_bool(void *key, void *datum, void *p); |
| 67 | 67 | ||
| 68 | int cond_index_bool(void *key, void *datum, void *datap); | 68 | int cond_index_bool(void *key, void *datum, void *datap); |
diff --git a/security/selinux/ss/context.h b/security/selinux/ss/context.h index 2eee0dab524d..b9a6f7fc62fc 100644 --- a/security/selinux/ss/context.h +++ b/security/selinux/ss/context.h | |||
| @@ -84,9 +84,9 @@ static inline int mls_context_cmp(struct context *c1, struct context *c2) | |||
| 84 | return 1; | 84 | return 1; |
| 85 | 85 | ||
| 86 | return ((c1->range.level[0].sens == c2->range.level[0].sens) && | 86 | return ((c1->range.level[0].sens == c2->range.level[0].sens) && |
| 87 | ebitmap_cmp(&c1->range.level[0].cat,&c2->range.level[0].cat) && | 87 | ebitmap_cmp(&c1->range.level[0].cat, &c2->range.level[0].cat) && |
| 88 | (c1->range.level[1].sens == c2->range.level[1].sens) && | 88 | (c1->range.level[1].sens == c2->range.level[1].sens) && |
| 89 | ebitmap_cmp(&c1->range.level[1].cat,&c2->range.level[1].cat)); | 89 | ebitmap_cmp(&c1->range.level[1].cat, &c2->range.level[1].cat)); |
| 90 | } | 90 | } |
| 91 | 91 | ||
| 92 | static inline void mls_context_destroy(struct context *c) | 92 | static inline void mls_context_destroy(struct context *c) |
diff --git a/security/selinux/ss/hashtab.h b/security/selinux/ss/hashtab.h index 7e2ff3e3c6d2..953872cd84ab 100644 --- a/security/selinux/ss/hashtab.h +++ b/security/selinux/ss/hashtab.h | |||
| @@ -40,8 +40,8 @@ struct hashtab_info { | |||
| 40 | * the new hash table otherwise. | 40 | * the new hash table otherwise. |
| 41 | */ | 41 | */ |
| 42 | struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void *key), | 42 | struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void *key), |
| 43 | int (*keycmp)(struct hashtab *h, const void *key1, const void *key2), | 43 | int (*keycmp)(struct hashtab *h, const void *key1, const void *key2), |
| 44 | u32 size); | 44 | u32 size); |
| 45 | 45 | ||
| 46 | /* | 46 | /* |
| 47 | * Inserts the specified (key, datum) pair into the specified hash table. | 47 | * Inserts the specified (key, datum) pair into the specified hash table. |
| @@ -49,7 +49,7 @@ struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void * | |||
| 49 | * Returns -ENOMEM on memory allocation error, | 49 | * Returns -ENOMEM on memory allocation error, |
| 50 | * -EEXIST if there is already an entry with the same key, | 50 | * -EEXIST if there is already an entry with the same key, |
| 51 | * -EINVAL for general errors or | 51 | * -EINVAL for general errors or |
| 52 | * 0 otherwise. | 52 | 0 otherwise. |
| 53 | */ | 53 | */ |
| 54 | int hashtab_insert(struct hashtab *h, void *k, void *d); | 54 | int hashtab_insert(struct hashtab *h, void *k, void *d); |
| 55 | 55 | ||
diff --git a/security/selinux/ss/mls.h b/security/selinux/ss/mls.h index ab53663d9f5f..0fdf6257ef64 100644 --- a/security/selinux/ss/mls.h +++ b/security/selinux/ss/mls.h | |||
| @@ -13,7 +13,7 @@ | |||
| 13 | /* | 13 | /* |
| 14 | * Updated: Hewlett-Packard <paul.moore@hp.com> | 14 | * Updated: Hewlett-Packard <paul.moore@hp.com> |
| 15 | * | 15 | * |
| 16 | * Added support to import/export the MLS label from NetLabel | 16 | * Added support to import/export the MLS label from NetLabel |
| 17 | * | 17 | * |
| 18 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 | 18 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 |
| 19 | */ | 19 | */ |
| @@ -31,7 +31,7 @@ int mls_range_isvalid(struct policydb *p, struct mls_range *r); | |||
| 31 | int mls_level_isvalid(struct policydb *p, struct mls_level *l); | 31 | int mls_level_isvalid(struct policydb *p, struct mls_level *l); |
| 32 | 32 | ||
| 33 | int mls_context_to_sid(char oldc, | 33 | int mls_context_to_sid(char oldc, |
| 34 | char **scontext, | 34 | char **scontext, |
| 35 | struct context *context, | 35 | struct context *context, |
| 36 | struct sidtab *s, | 36 | struct sidtab *s, |
| 37 | u32 def_sid); | 37 | u32 def_sid); |
| @@ -49,7 +49,7 @@ int mls_compute_sid(struct context *scontext, | |||
| 49 | struct context *newcontext); | 49 | struct context *newcontext); |
| 50 | 50 | ||
| 51 | int mls_setup_user_range(struct context *fromcon, struct user_datum *user, | 51 | int mls_setup_user_range(struct context *fromcon, struct user_datum *user, |
| 52 | struct context *usercon); | 52 | struct context *usercon); |
| 53 | 53 | ||
| 54 | #ifdef CONFIG_NETLABEL | 54 | #ifdef CONFIG_NETLABEL |
| 55 | void mls_export_netlbl_lvl(struct context *context, | 55 | void mls_export_netlbl_lvl(struct context *context, |
diff --git a/security/selinux/ss/mls_types.h b/security/selinux/ss/mls_types.h index 0c692d58d489..b6e943a21061 100644 --- a/security/selinux/ss/mls_types.h +++ b/security/selinux/ss/mls_types.h | |||
| @@ -31,7 +31,7 @@ static inline int mls_level_eq(struct mls_level *l1, struct mls_level *l2) | |||
| 31 | return 1; | 31 | return 1; |
| 32 | 32 | ||
| 33 | return ((l1->sens == l2->sens) && | 33 | return ((l1->sens == l2->sens) && |
| 34 | ebitmap_cmp(&l1->cat, &l2->cat)); | 34 | ebitmap_cmp(&l1->cat, &l2->cat)); |
| 35 | } | 35 | } |
| 36 | 36 | ||
| 37 | static inline int mls_level_dom(struct mls_level *l1, struct mls_level *l2) | 37 | static inline int mls_level_dom(struct mls_level *l1, struct mls_level *l2) |
| @@ -40,7 +40,7 @@ static inline int mls_level_dom(struct mls_level *l1, struct mls_level *l2) | |||
| 40 | return 1; | 40 | return 1; |
| 41 | 41 | ||
| 42 | return ((l1->sens >= l2->sens) && | 42 | return ((l1->sens >= l2->sens) && |
| 43 | ebitmap_contains(&l1->cat, &l2->cat)); | 43 | ebitmap_contains(&l1->cat, &l2->cat)); |
| 44 | } | 44 | } |
| 45 | 45 | ||
| 46 | #define mls_level_incomp(l1, l2) \ | 46 | #define mls_level_incomp(l1, l2) \ |
diff --git a/security/selinux/ss/policydb.h b/security/selinux/ss/policydb.h index ba593a3da877..4253370fda6a 100644 --- a/security/selinux/ss/policydb.h +++ b/security/selinux/ss/policydb.h | |||
| @@ -12,12 +12,12 @@ | |||
| 12 | * | 12 | * |
| 13 | * Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> | 13 | * Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> |
| 14 | * | 14 | * |
| 15 | * Added conditional policy language extensions | 15 | * Added conditional policy language extensions |
| 16 | * | 16 | * |
| 17 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. | 17 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
| 18 | * Copyright (C) 2003 - 2004 Tresys Technology, LLC | 18 | * Copyright (C) 2003 - 2004 Tresys Technology, LLC |
| 19 | * This program is free software; you can redistribute it and/or modify | 19 | * This program is free software; you can redistribute it and/or modify |
| 20 | * it under the terms of the GNU General Public License as published by | 20 | * it under the terms of the GNU General Public License as published by |
| 21 | * the Free Software Foundation, version 2. | 21 | * the Free Software Foundation, version 2. |
| 22 | */ | 22 | */ |
| 23 | 23 | ||
| @@ -221,7 +221,7 @@ struct policydb { | |||
| 221 | /* type enforcement conditional access vectors and transitions */ | 221 | /* type enforcement conditional access vectors and transitions */ |
| 222 | struct avtab te_cond_avtab; | 222 | struct avtab te_cond_avtab; |
| 223 | /* linked list indexing te_cond_avtab by conditional */ | 223 | /* linked list indexing te_cond_avtab by conditional */ |
| 224 | struct cond_node* cond_list; | 224 | struct cond_node *cond_list; |
| 225 | 225 | ||
| 226 | /* role allows */ | 226 | /* role allows */ |
| 227 | struct role_allow *role_allow; | 227 | struct role_allow *role_allow; |
| @@ -230,10 +230,10 @@ struct policydb { | |||
| 230 | TCP or UDP port numbers, network interfaces and nodes */ | 230 | TCP or UDP port numbers, network interfaces and nodes */ |
| 231 | struct ocontext *ocontexts[OCON_NUM]; | 231 | struct ocontext *ocontexts[OCON_NUM]; |
| 232 | 232 | ||
| 233 | /* security contexts for files in filesystems that cannot support | 233 | /* security contexts for files in filesystems that cannot support |
| 234 | a persistent label mapping or use another | 234 | a persistent label mapping or use another |
| 235 | fixed labeling behavior. */ | 235 | fixed labeling behavior. */ |
| 236 | struct genfs *genfs; | 236 | struct genfs *genfs; |
| 237 | 237 | ||
| 238 | /* range transitions */ | 238 | /* range transitions */ |
| 239 | struct range_trans *range_tr; | 239 | struct range_trans *range_tr; |
