On Thu, Mar 1, 2018 at 6:52 PM, Paul Moore <[email protected]> wrote:
> From: Paul Moore <[email protected]>
>
> Rename is_enforcing() to enforcing_enabled() and
> enforcing_set() to set_enforcing().
>
> Signed-off-by: Paul Moore <[email protected]>
> ---
> security/selinux/avc.c | 2 +-
> security/selinux/hooks.c | 4 ++--
> security/selinux/include/security.h | 8 ++++----
> security/selinux/selinuxfs.c | 6 +++---
> security/selinux/ss/services.c | 6 +++---
> security/selinux/ss/status.c | 2 +-
> 6 files changed, 14 insertions(+), 14 deletions(-)
FYI, I just merged this into selinux/next.
> diff --git a/security/selinux/avc.c b/security/selinux/avc.c
> index 36124f48a5ff..54b09cc03b55 100644
> --- a/security/selinux/avc.c
> +++ b/security/selinux/avc.c
> @@ -985,7 +985,7 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
> if (flags & AVC_STRICT)
> return -EACCES;
>
> - if (is_enforcing(&selinux_state) &&
> + if (enforcing_enabled(&selinux_state) &&
> !(avd->flags & AVD_FLAGS_PERMISSIVE))
> return -EACCES;
>
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index d78f9e2f6df0..337fb325e5cc 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -5407,7 +5407,7 @@ static int selinux_nlmsg_perm(struct sock *sk, struct
> sk_buff *skb)
> sk->sk_protocol, nlh->nlmsg_type,
> secclass_map[sksec->sclass - 1].name,
> task_pid_nr(current), current->comm);
> - if (!is_enforcing(&selinux_state) ||
> + if (!enforcing_enabled(&selinux_state) ||
> security_get_allow_unknown(&selinux_state))
> err = 0;
> }
> @@ -6937,7 +6937,7 @@ static __init int selinux_init(void)
> printk(KERN_INFO "SELinux: Initializing.\n");
>
> memset(&selinux_state, 0, sizeof(selinux_state));
> - set_enforcing(&selinux_state, selinux_enforcing_boot);
> + enforcing_set(&selinux_state, selinux_enforcing_boot);
> selinux_state.checkreqprot = selinux_checkreqprot_boot;
> selinux_ss_init(&selinux_state.ss);
>
> diff --git a/security/selinux/include/security.h
> b/security/selinux/include/security.h
> index c3a1ef10e710..f1db09a5f521 100644
> --- a/security/selinux/include/security.h
> +++ b/security/selinux/include/security.h
> @@ -111,22 +111,22 @@ void selinux_ss_init(struct selinux_ss **ss);
> extern struct selinux_state selinux_state;
>
> #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
> -static inline bool is_enforcing(struct selinux_state *state)
> +static inline bool enforcing_enabled(struct selinux_state *state)
> {
> return state->enforcing;
> }
>
> -static inline void set_enforcing(struct selinux_state *state, bool value)
> +static inline void enforcing_set(struct selinux_state *state, bool value)
> {
> state->enforcing = value;
> }
> #else
> -static inline bool is_enforcing(struct selinux_state *state)
> +static inline bool enforcing_enabled(struct selinux_state *state)
> {
> return true;
> }
>
> -static inline void set_enforcing(struct selinux_state *state, bool value)
> +static inline void enforcing_set(struct selinux_state *state, bool value)
> {
> }
> #endif
> diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
> index 98492755adbf..0dbd5fd6a396 100644
> --- a/security/selinux/selinuxfs.c
> +++ b/security/selinux/selinuxfs.c
> @@ -98,7 +98,7 @@ static ssize_t sel_read_enforce(struct file *filp, char
> __user *buf,
> ssize_t length;
>
> length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
> - is_enforcing(&selinux_state));
> + enforcing_enabled(&selinux_state));
> return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
> }
>
> @@ -128,7 +128,7 @@ static ssize_t sel_write_enforce(struct file *file, const
> char __user *buf,
>
> new_value = !!new_value;
>
> - old_value = is_enforcing(&selinux_state);
> + old_value = enforcing_enabled(&selinux_state);
>
> if (new_value != old_value) {
> length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
> @@ -141,7 +141,7 @@ static ssize_t sel_write_enforce(struct file *file, const
> char __user *buf,
> new_value, old_value,
> from_kuid(&init_user_ns, audit_get_loginuid(current)),
> audit_get_sessionid(current));
> - set_enforcing(&selinux_state, new_value);
> + enforcing_set(&selinux_state, new_value);
> if (new_value)
> avc_ss_reset(0);
> selnl_notify_setenforce(new_value);
> diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
> index 3698352213d7..4785ca552d51 100644
> --- a/security/selinux/ss/services.c
> +++ b/security/selinux/ss/services.c
> @@ -752,7 +752,7 @@ static int security_validtrans_handle_fail(struct
> selinux_state *state,
> kfree(n);
> kfree(t);
>
> - if (!is_enforcing(state))
> + if (!enforcing_enabled(state))
> return 0;
> return -EPERM;
> }
> @@ -1596,7 +1596,7 @@ static int compute_sid_handle_invalid_context(
> kfree(s);
> kfree(t);
> kfree(n);
> - if (!is_enforcing(state))
> + if (!enforcing_enabled(state))
> return 0;
> return -EACCES;
> }
> @@ -1907,7 +1907,7 @@ static inline int
> convert_context_handle_invalid_context(
> char *s;
> u32 len;
>
> - if (is_enforcing(state))
> + if (enforcing_enabled(state))
> return -EINVAL;
>
> if (!context_struct_to_string(policydb, context, &s, &len)) {
> diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c
> index 043efc59f8e4..a121de45ac0e 100644
> --- a/security/selinux/ss/status.c
> +++ b/security/selinux/ss/status.c
> @@ -56,7 +56,7 @@ struct page *selinux_kernel_status_page(struct
> selinux_state *state)
>
> status->version = SELINUX_KERNEL_STATUS_VERSION;
> status->sequence = 0;
> - status->enforcing = is_enforcing(state);
> + status->enforcing = enforcing_enabled(state);
> /*
> * NOTE: the next policyload event shall set
> * a positive value on the status->policyload,
>
>
--
paul moore
www.paul-moore.com