Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 285026
b: refs/heads/master
c: e8a65a3
h: refs/heads/master
v: v3
  • Loading branch information
James Morris authored and Eric Paris committed Jan 5, 2012
1 parent 329bee6 commit d02331e
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 7 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: 6063c0461b947c26a77674f33a3409eb99e15d2f
refs/heads/master: e8a65a3f67f8a85802c0a0250e48c4c4652d0da0
5 changes: 0 additions & 5 deletions trunk/security/selinux/hooks.c
Original file line number Diff line number Diff line change
Expand Up @@ -2097,9 +2097,6 @@ static int selinux_bprm_secureexec(struct linux_binprm *bprm)
return (atsecure || cap_bprm_secureexec(bprm));
}

extern struct vfsmount *selinuxfs_mount;
extern struct dentry *selinux_null;

/* Derived from fs/exec.c:flush_old_files. */
static inline void flush_unauthorized_files(const struct cred *cred,
struct files_struct *files)
Expand Down Expand Up @@ -5803,8 +5800,6 @@ static int selinux_disabled;

int selinux_disable(void)
{
extern void exit_sel_fs(void);

if (ss_initialized) {
/* Not permitted after initial policy load. */
return -EINVAL;
Expand Down
3 changes: 3 additions & 0 deletions trunk/security/selinux/include/security.h
Original file line number Diff line number Diff line change
Expand Up @@ -218,6 +218,9 @@ extern void selinux_status_update_setenforce(int enforcing);
extern void selinux_status_update_policyload(int seqno);
extern void selinux_complete_init(void);
extern int selinux_disable(void);
extern void exit_sel_fs(void);
extern struct dentry *selinux_null;
extern struct vfsmount *selinuxfs_mount;

#endif /* _SELINUX_SECURITY_H_ */

2 changes: 1 addition & 1 deletion trunk/security/selinux/selinuxfs.c
Original file line number Diff line number Diff line change
Expand Up @@ -477,7 +477,7 @@ static struct vm_operations_struct sel_mmap_policy_ops = {
.page_mkwrite = sel_mmap_policy_fault,
};

int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma)
{
if (vma->vm_flags & VM_SHARED) {
/* do not allow mprotect to make mapping writable */
Expand Down

0 comments on commit d02331e

Please sign in to comment.