|
@@ -53,7 +53,7 @@
|
|
|
#include <net/tcp.h> /* struct or_callable used in sock_rcv_skb */
|
|
|
#include <net/net_namespace.h>
|
|
|
#include <net/netlabel.h>
|
|
|
-#include <asm/uaccess.h>
|
|
|
+#include <linux/uaccess.h>
|
|
|
#include <asm/ioctls.h>
|
|
|
#include <asm/atomic.h>
|
|
|
#include <linux/bitops.h>
|
|
@@ -104,7 +104,9 @@ int selinux_enforcing;
|
|
|
|
|
|
static int __init enforcing_setup(char *str)
|
|
|
{
|
|
|
- selinux_enforcing = simple_strtol(str, NULL, 0);
|
|
|
+ unsigned long enforcing;
|
|
|
+ if (!strict_strtoul(str, 0, &enforcing))
|
|
|
+ selinux_enforcing = enforcing ? 1 : 0;
|
|
|
return 1;
|
|
|
}
|
|
|
__setup("enforcing=", enforcing_setup);
|
|
@@ -115,7 +117,9 @@ int selinux_enabled = CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE;
|
|
|
|
|
|
static int __init selinux_enabled_setup(char *str)
|
|
|
{
|
|
|
- selinux_enabled = simple_strtol(str, NULL, 0);
|
|
|
+ unsigned long enabled;
|
|
|
+ if (!strict_strtoul(str, 0, &enabled))
|
|
|
+ selinux_enabled = enabled ? 1 : 0;
|
|
|
return 1;
|
|
|
}
|
|
|
__setup("selinux=", selinux_enabled_setup);
|
|
@@ -594,7 +598,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
|
|
|
*/
|
|
|
if (sbsec->initialized && (sb->s_type->fs_flags & FS_BINARY_MOUNTDATA)
|
|
|
&& (num_opts == 0))
|
|
|
- goto out;
|
|
|
+ goto out;
|
|
|
|
|
|
/*
|
|
|
* parse the mount options, check if they are valid sids.
|
|
@@ -2695,7 +2699,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
|
|
|
}
|
|
|
|
|
|
static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
|
|
|
- const void *value, size_t size,
|
|
|
+ const void *value, size_t size,
|
|
|
int flags)
|
|
|
{
|
|
|
struct inode *inode = dentry->d_inode;
|
|
@@ -5390,7 +5394,7 @@ static struct security_operations selinux_ops = {
|
|
|
.inode_listsecurity = selinux_inode_listsecurity,
|
|
|
.inode_need_killpriv = selinux_inode_need_killpriv,
|
|
|
.inode_killpriv = selinux_inode_killpriv,
|
|
|
- .inode_getsecid = selinux_inode_getsecid,
|
|
|
+ .inode_getsecid = selinux_inode_getsecid,
|
|
|
|
|
|
.file_permission = selinux_file_permission,
|
|
|
.file_alloc_security = selinux_file_alloc_security,
|
|
@@ -5431,7 +5435,7 @@ static struct security_operations selinux_ops = {
|
|
|
.task_to_inode = selinux_task_to_inode,
|
|
|
|
|
|
.ipc_permission = selinux_ipc_permission,
|
|
|
- .ipc_getsecid = selinux_ipc_getsecid,
|
|
|
+ .ipc_getsecid = selinux_ipc_getsecid,
|
|
|
|
|
|
.msg_msg_alloc_security = selinux_msg_msg_alloc_security,
|
|
|
.msg_msg_free_security = selinux_msg_msg_free_security,
|