Re: [PATCH] Security: Make secctx_to_secid() take const secdata

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- David Howells <dhowells@xxxxxxxxxx> wrote:

> Make secctx_to_secid() take constant secdata.
> 
> Signed-off-by: David Howells <dhowells@xxxxxxxxxx>

Acked-by: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>

> ---
> 
>  include/linux/security.h            |    6 +++---
>  security/dummy.c                    |    2 +-
>  security/security.c                 |    2 +-
>  security/selinux/hooks.c            |    2 +-
>  security/selinux/include/security.h |    2 +-
>  security/selinux/ss/services.c      |    4 ++--
>  security/smack/smack_lsm.c          |    2 +-
>  7 files changed, 10 insertions(+), 10 deletions(-)
> 
> 
> diff --git a/include/linux/security.h b/include/linux/security.h
> index 594abd8..e7882ef 100644
> --- a/include/linux/security.h
> +++ b/include/linux/security.h
> @@ -1488,7 +1488,7 @@ struct security_operations {
>  	int (*getprocattr) (struct task_struct *p, char *name, char **value);
>  	int (*setprocattr) (struct task_struct *p, char *name, void *value, size_t
> size);
>  	int (*secid_to_secctx) (u32 secid, char **secdata, u32 *seclen);
> -	int (*secctx_to_secid) (char *secdata, u32 seclen, u32 *secid);
> +	int (*secctx_to_secid) (const char *secdata, u32 seclen, u32 *secid);
>  	void (*release_secctx) (char *secdata, u32 seclen);
>  
>  #ifdef CONFIG_SECURITY_NETWORK
> @@ -1739,7 +1739,7 @@ int security_setprocattr(struct task_struct *p, char
> *name, void *value, size_t
>  int security_netlink_send(struct sock *sk, struct sk_buff *skb);
>  int security_netlink_recv(struct sk_buff *skb, int cap);
>  int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
> -int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid);
> +int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
>  void security_release_secctx(char *secdata, u32 seclen);
>  
>  #else /* CONFIG_SECURITY */
> @@ -2463,7 +2463,7 @@ static inline int security_secid_to_secctx(u32 secid,
> char **secdata, u32 *secle
>  	return -EOPNOTSUPP;
>  }
>  
> -static inline int security_secctx_to_secid(char *secdata,
> +static inline int security_secctx_to_secid(const char *secdata,
>  					   u32 seclen,
>  					   u32 *secid)
>  {
> diff --git a/security/dummy.c b/security/dummy.c
> index d254a0c..d3116f2 100644
> --- a/security/dummy.c
> +++ b/security/dummy.c
> @@ -983,7 +983,7 @@ static int dummy_secid_to_secctx(u32 secid, char
> **secdata, u32 *seclen)
>  	return -EOPNOTSUPP;
>  }
>  
> -static int dummy_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
> +static int dummy_secctx_to_secid(const char *secdata, u32 seclen, u32
> *secid)
>  {
>  	return -EOPNOTSUPP;
>  }
> diff --git a/security/security.c b/security/security.c
> index a5daaac..885c776 100644
> --- a/security/security.c
> +++ b/security/security.c
> @@ -891,7 +891,7 @@ int security_secid_to_secctx(u32 secid, char **secdata,
> u32 *seclen)
>  }
>  EXPORT_SYMBOL(security_secid_to_secctx);
>  
> -int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
> +int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
>  {
>  	return security_ops->secctx_to_secid(secdata, seclen, secid);
>  }
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 81ce29f..fb25441 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -5255,7 +5255,7 @@ static int selinux_secid_to_secctx(u32 secid, char
> **secdata, u32 *seclen)
>  	return security_sid_to_context(secid, secdata, seclen);
>  }
>  
> -static int selinux_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
> +static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32
> *secid)
>  {
>  	return security_context_to_sid(secdata, seclen, secid);
>  }
> diff --git a/security/selinux/include/security.h
> b/security/selinux/include/security.h
> index cdb14ad..ad30ac4 100644
> --- a/security/selinux/include/security.h
> +++ b/security/selinux/include/security.h
> @@ -96,7 +96,7 @@ int security_sid_to_context(u32 sid, char **scontext,
>  int security_context_to_sid(const char *scontext, u32 scontext_len,
>  	u32 *out_sid);
>  
> -int security_context_to_sid_default(char *scontext, u32 scontext_len,
> +int security_context_to_sid_default(const char *scontext, u32 scontext_len,
>  				    u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
>  
>  int security_get_user_sids(u32 callsid, char *username,
> diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
> index 25cac5a..dcc2e1c 100644
> --- a/security/selinux/ss/services.c
> +++ b/security/selinux/ss/services.c
> @@ -858,8 +858,8 @@ int security_context_to_sid(const char *scontext, u32
> scontext_len, u32 *sid)
>   * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient
>   * memory is available, or 0 on success.
>   */
> -int security_context_to_sid_default(char *scontext, u32 scontext_len, u32
> *sid,
> -				    u32 def_sid, gfp_t gfp_flags)
> +int security_context_to_sid_default(const char *scontext, u32 scontext_len,
> +				    u32 *sid, u32 def_sid, gfp_t gfp_flags)
>  {
>  	return security_context_to_sid_core(scontext, scontext_len,
>  					    sid, def_sid, gfp_flags);
> diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
> index 45a690e..1e6c5af 100644
> --- a/security/smack/smack_lsm.c
> +++ b/security/smack/smack_lsm.c
> @@ -2421,7 +2421,7 @@ static int smack_secid_to_secctx(u32 secid, char
> **secdata, u32 *seclen)
>   *
>   * Exists for audit and networking code.
>   */
> -static int smack_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
> +static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32
> *secid)
>  {
>  	*secid = smack_to_secid(secdata);
>  	return 0;
> 
> 
> 


Casey Schaufler
casey@xxxxxxxxxxxxxxxx

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux