selinux: sparse fix: eliminate warnings for selinuxfs
Fixes several sparse warnings for selinuxfs.c Signed-off-by: James Morris <jmorris@namei.org> Signed-off-by: Eric Paris <eparis@redhat.com>
This commit is contained in:
parent
6063c0461b
commit
e8a65a3f67
3 changed files with 4 additions and 6 deletions
|
@ -2097,9 +2097,6 @@ static int selinux_bprm_secureexec(struct linux_binprm *bprm)
|
||||||
return (atsecure || cap_bprm_secureexec(bprm));
|
return (atsecure || cap_bprm_secureexec(bprm));
|
||||||
}
|
}
|
||||||
|
|
||||||
extern struct vfsmount *selinuxfs_mount;
|
|
||||||
extern struct dentry *selinux_null;
|
|
||||||
|
|
||||||
/* Derived from fs/exec.c:flush_old_files. */
|
/* Derived from fs/exec.c:flush_old_files. */
|
||||||
static inline void flush_unauthorized_files(const struct cred *cred,
|
static inline void flush_unauthorized_files(const struct cred *cred,
|
||||||
struct files_struct *files)
|
struct files_struct *files)
|
||||||
|
@ -5803,8 +5800,6 @@ static int selinux_disabled;
|
||||||
|
|
||||||
int selinux_disable(void)
|
int selinux_disable(void)
|
||||||
{
|
{
|
||||||
extern void exit_sel_fs(void);
|
|
||||||
|
|
||||||
if (ss_initialized) {
|
if (ss_initialized) {
|
||||||
/* Not permitted after initial policy load. */
|
/* Not permitted after initial policy load. */
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
|
@ -218,6 +218,9 @@ extern void selinux_status_update_setenforce(int enforcing);
|
||||||
extern void selinux_status_update_policyload(int seqno);
|
extern void selinux_status_update_policyload(int seqno);
|
||||||
extern void selinux_complete_init(void);
|
extern void selinux_complete_init(void);
|
||||||
extern int selinux_disable(void);
|
extern int selinux_disable(void);
|
||||||
|
extern void exit_sel_fs(void);
|
||||||
|
extern struct dentry *selinux_null;
|
||||||
|
extern struct vfsmount *selinuxfs_mount;
|
||||||
|
|
||||||
#endif /* _SELINUX_SECURITY_H_ */
|
#endif /* _SELINUX_SECURITY_H_ */
|
||||||
|
|
||||||
|
|
|
@ -477,7 +477,7 @@ static struct vm_operations_struct sel_mmap_policy_ops = {
|
||||||
.page_mkwrite = sel_mmap_policy_fault,
|
.page_mkwrite = sel_mmap_policy_fault,
|
||||||
};
|
};
|
||||||
|
|
||||||
int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
|
static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
|
||||||
{
|
{
|
||||||
if (vma->vm_flags & VM_SHARED) {
|
if (vma->vm_flags & VM_SHARED) {
|
||||||
/* do not allow mprotect to make mapping writable */
|
/* do not allow mprotect to make mapping writable */
|
||||||
|
|
Loading…
Reference in a new issue