Loading security/selinux/hooks.c +0 −5 Original line number Diff line number Diff line Loading @@ -2097,9 +2097,6 @@ static int selinux_bprm_secureexec(struct linux_binprm *bprm) return (atsecure || cap_bprm_secureexec(bprm)); } extern struct vfsmount *selinuxfs_mount; extern struct dentry *selinux_null; /* Derived from fs/exec.c:flush_old_files. */ static inline void flush_unauthorized_files(const struct cred *cred, struct files_struct *files) Loading Loading @@ -5803,8 +5800,6 @@ static int selinux_disabled; int selinux_disable(void) { extern void exit_sel_fs(void); if (ss_initialized) { /* Not permitted after initial policy load. */ return -EINVAL; Loading security/selinux/include/security.h +3 −0 Original line number Diff line number Diff line Loading @@ -218,6 +218,9 @@ extern void selinux_status_update_setenforce(int enforcing); extern void selinux_status_update_policyload(int seqno); extern void selinux_complete_init(void); extern int selinux_disable(void); extern void exit_sel_fs(void); extern struct dentry *selinux_null; extern struct vfsmount *selinuxfs_mount; #endif /* _SELINUX_SECURITY_H_ */ security/selinux/selinuxfs.c +1 −1 Original line number Diff line number Diff line Loading @@ -477,7 +477,7 @@ static struct vm_operations_struct sel_mmap_policy_ops = { .page_mkwrite = sel_mmap_policy_fault, }; int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma) static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma) { if (vma->vm_flags & VM_SHARED) { /* do not allow mprotect to make mapping writable */ Loading Loading
security/selinux/hooks.c +0 −5 Original line number Diff line number Diff line Loading @@ -2097,9 +2097,6 @@ static int selinux_bprm_secureexec(struct linux_binprm *bprm) return (atsecure || cap_bprm_secureexec(bprm)); } extern struct vfsmount *selinuxfs_mount; extern struct dentry *selinux_null; /* Derived from fs/exec.c:flush_old_files. */ static inline void flush_unauthorized_files(const struct cred *cred, struct files_struct *files) Loading Loading @@ -5803,8 +5800,6 @@ static int selinux_disabled; int selinux_disable(void) { extern void exit_sel_fs(void); if (ss_initialized) { /* Not permitted after initial policy load. */ return -EINVAL; Loading
security/selinux/include/security.h +3 −0 Original line number Diff line number Diff line Loading @@ -218,6 +218,9 @@ extern void selinux_status_update_setenforce(int enforcing); extern void selinux_status_update_policyload(int seqno); extern void selinux_complete_init(void); extern int selinux_disable(void); extern void exit_sel_fs(void); extern struct dentry *selinux_null; extern struct vfsmount *selinuxfs_mount; #endif /* _SELINUX_SECURITY_H_ */
security/selinux/selinuxfs.c +1 −1 Original line number Diff line number Diff line Loading @@ -477,7 +477,7 @@ static struct vm_operations_struct sel_mmap_policy_ops = { .page_mkwrite = sel_mmap_policy_fault, }; int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma) static int sel_mmap_policy(struct file *filp, struct vm_area_struct *vma) { if (vma->vm_flags & VM_SHARED) { /* do not allow mprotect to make mapping writable */ Loading