diff mbox

selinux: rename the {is,set}_enforcing() functions

Message ID 151994832810.32269.8035664161422596677.stgit@chester (mailing list archive)
State Accepted
Headers show

Commit Message

Paul Moore March 1, 2018, 11:52 p.m. UTC
From: Paul Moore <paul@paul-moore.com>

Rename is_enforcing() to enforcing_enabled() and
enforcing_set() to set_enforcing().

Signed-off-by: Paul Moore <paul@paul-moore.com>
---
 security/selinux/avc.c              |    2 +-
 security/selinux/hooks.c            |    4 ++--
 security/selinux/include/security.h |    8 ++++----
 security/selinux/selinuxfs.c        |    6 +++---
 security/selinux/ss/services.c      |    6 +++---
 security/selinux/ss/status.c        |    2 +-
 6 files changed, 14 insertions(+), 14 deletions(-)

Comments

Paul Moore March 2, 2018, 7:20 p.m. UTC | #1
On Thu, Mar 1, 2018 at 6:52 PM, Paul Moore <pmoore@redhat.com> wrote:
> From: Paul Moore <paul@paul-moore.com>
>
> Rename is_enforcing() to enforcing_enabled() and
> enforcing_set() to set_enforcing().
>
> Signed-off-by: Paul Moore <paul@paul-moore.com>
> ---
>  security/selinux/avc.c              |    2 +-
>  security/selinux/hooks.c            |    4 ++--
>  security/selinux/include/security.h |    8 ++++----
>  security/selinux/selinuxfs.c        |    6 +++---
>  security/selinux/ss/services.c      |    6 +++---
>  security/selinux/ss/status.c        |    2 +-
>  6 files changed, 14 insertions(+), 14 deletions(-)

FYI, I just merged this into selinux/next.

> diff --git a/security/selinux/avc.c b/security/selinux/avc.c
> index 36124f48a5ff..54b09cc03b55 100644
> --- a/security/selinux/avc.c
> +++ b/security/selinux/avc.c
> @@ -985,7 +985,7 @@ static noinline int avc_denied(u32 ssid, u32 tsid,
>         if (flags & AVC_STRICT)
>                 return -EACCES;
>
> -       if (is_enforcing(&selinux_state) &&
> +       if (enforcing_enabled(&selinux_state) &&
>             !(avd->flags & AVD_FLAGS_PERMISSIVE))
>                 return -EACCES;
>
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index d78f9e2f6df0..337fb325e5cc 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -5407,7 +5407,7 @@ static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb)
>                                sk->sk_protocol, nlh->nlmsg_type,
>                                secclass_map[sksec->sclass - 1].name,
>                                task_pid_nr(current), current->comm);
> -                       if (!is_enforcing(&selinux_state) ||
> +                       if (!enforcing_enabled(&selinux_state) ||
>                             security_get_allow_unknown(&selinux_state))
>                                 err = 0;
>                 }
> @@ -6937,7 +6937,7 @@ static __init int selinux_init(void)
>         printk(KERN_INFO "SELinux:  Initializing.\n");
>
>         memset(&selinux_state, 0, sizeof(selinux_state));
> -       set_enforcing(&selinux_state, selinux_enforcing_boot);
> +       enforcing_set(&selinux_state, selinux_enforcing_boot);
>         selinux_state.checkreqprot = selinux_checkreqprot_boot;
>         selinux_ss_init(&selinux_state.ss);
>
> diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h
> index c3a1ef10e710..f1db09a5f521 100644
> --- a/security/selinux/include/security.h
> +++ b/security/selinux/include/security.h
> @@ -111,22 +111,22 @@ void selinux_ss_init(struct selinux_ss **ss);
>  extern struct selinux_state selinux_state;
>
>  #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
> -static inline bool is_enforcing(struct selinux_state *state)
> +static inline bool enforcing_enabled(struct selinux_state *state)
>  {
>         return state->enforcing;
>  }
>
> -static inline void set_enforcing(struct selinux_state *state, bool value)
> +static inline void enforcing_set(struct selinux_state *state, bool value)
>  {
>         state->enforcing = value;
>  }
>  #else
> -static inline bool is_enforcing(struct selinux_state *state)
> +static inline bool enforcing_enabled(struct selinux_state *state)
>  {
>         return true;
>  }
>
> -static inline void set_enforcing(struct selinux_state *state, bool value)
> +static inline void enforcing_set(struct selinux_state *state, bool value)
>  {
>  }
>  #endif
> diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
> index 98492755adbf..0dbd5fd6a396 100644
> --- a/security/selinux/selinuxfs.c
> +++ b/security/selinux/selinuxfs.c
> @@ -98,7 +98,7 @@ static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
>         ssize_t length;
>
>         length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
> -                          is_enforcing(&selinux_state));
> +                          enforcing_enabled(&selinux_state));
>         return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
>  }
>
> @@ -128,7 +128,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
>
>         new_value = !!new_value;
>
> -       old_value = is_enforcing(&selinux_state);
> +       old_value = enforcing_enabled(&selinux_state);
>
>         if (new_value != old_value) {
>                 length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
> @@ -141,7 +141,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
>                         new_value, old_value,
>                         from_kuid(&init_user_ns, audit_get_loginuid(current)),
>                         audit_get_sessionid(current));
> -               set_enforcing(&selinux_state, new_value);
> +               enforcing_set(&selinux_state, new_value);
>                 if (new_value)
>                         avc_ss_reset(0);
>                 selnl_notify_setenforce(new_value);
> diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
> index 3698352213d7..4785ca552d51 100644
> --- a/security/selinux/ss/services.c
> +++ b/security/selinux/ss/services.c
> @@ -752,7 +752,7 @@ static int security_validtrans_handle_fail(struct selinux_state *state,
>         kfree(n);
>         kfree(t);
>
> -       if (!is_enforcing(state))
> +       if (!enforcing_enabled(state))
>                 return 0;
>         return -EPERM;
>  }
> @@ -1596,7 +1596,7 @@ static int compute_sid_handle_invalid_context(
>         kfree(s);
>         kfree(t);
>         kfree(n);
> -       if (!is_enforcing(state))
> +       if (!enforcing_enabled(state))
>                 return 0;
>         return -EACCES;
>  }
> @@ -1907,7 +1907,7 @@ static inline int convert_context_handle_invalid_context(
>         char *s;
>         u32 len;
>
> -       if (is_enforcing(state))
> +       if (enforcing_enabled(state))
>                 return -EINVAL;
>
>         if (!context_struct_to_string(policydb, context, &s, &len)) {
> diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c
> index 043efc59f8e4..a121de45ac0e 100644
> --- a/security/selinux/ss/status.c
> +++ b/security/selinux/ss/status.c
> @@ -56,7 +56,7 @@ struct page *selinux_kernel_status_page(struct selinux_state *state)
>
>                         status->version = SELINUX_KERNEL_STATUS_VERSION;
>                         status->sequence = 0;
> -                       status->enforcing = is_enforcing(state);
> +                       status->enforcing = enforcing_enabled(state);
>                         /*
>                          * NOTE: the next policyload event shall set
>                          * a positive value on the status->policyload,
>
>
diff mbox

Patch

diff --git a/security/selinux/avc.c b/security/selinux/avc.c
index 36124f48a5ff..54b09cc03b55 100644
--- a/security/selinux/avc.c
+++ b/security/selinux/avc.c
@@ -985,7 +985,7 @@  static noinline int avc_denied(u32 ssid, u32 tsid,
 	if (flags & AVC_STRICT)
 		return -EACCES;
 
-	if (is_enforcing(&selinux_state) &&
+	if (enforcing_enabled(&selinux_state) &&
 	    !(avd->flags & AVD_FLAGS_PERMISSIVE))
 		return -EACCES;
 
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index d78f9e2f6df0..337fb325e5cc 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -5407,7 +5407,7 @@  static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb)
 			       sk->sk_protocol, nlh->nlmsg_type,
 			       secclass_map[sksec->sclass - 1].name,
 			       task_pid_nr(current), current->comm);
-			if (!is_enforcing(&selinux_state) ||
+			if (!enforcing_enabled(&selinux_state) ||
 			    security_get_allow_unknown(&selinux_state))
 				err = 0;
 		}
@@ -6937,7 +6937,7 @@  static __init int selinux_init(void)
 	printk(KERN_INFO "SELinux:  Initializing.\n");
 
 	memset(&selinux_state, 0, sizeof(selinux_state));
-	set_enforcing(&selinux_state, selinux_enforcing_boot);
+	enforcing_set(&selinux_state, selinux_enforcing_boot);
 	selinux_state.checkreqprot = selinux_checkreqprot_boot;
 	selinux_ss_init(&selinux_state.ss);
 
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h
index c3a1ef10e710..f1db09a5f521 100644
--- a/security/selinux/include/security.h
+++ b/security/selinux/include/security.h
@@ -111,22 +111,22 @@  void selinux_ss_init(struct selinux_ss **ss);
 extern struct selinux_state selinux_state;
 
 #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
-static inline bool is_enforcing(struct selinux_state *state)
+static inline bool enforcing_enabled(struct selinux_state *state)
 {
 	return state->enforcing;
 }
 
-static inline void set_enforcing(struct selinux_state *state, bool value)
+static inline void enforcing_set(struct selinux_state *state, bool value)
 {
 	state->enforcing = value;
 }
 #else
-static inline bool is_enforcing(struct selinux_state *state)
+static inline bool enforcing_enabled(struct selinux_state *state)
 {
 	return true;
 }
 
-static inline void set_enforcing(struct selinux_state *state, bool value)
+static inline void enforcing_set(struct selinux_state *state, bool value)
 {
 }
 #endif
diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
index 98492755adbf..0dbd5fd6a396 100644
--- a/security/selinux/selinuxfs.c
+++ b/security/selinux/selinuxfs.c
@@ -98,7 +98,7 @@  static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
 	ssize_t length;
 
 	length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
-			   is_enforcing(&selinux_state));
+			   enforcing_enabled(&selinux_state));
 	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
 }
 
@@ -128,7 +128,7 @@  static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
 
 	new_value = !!new_value;
 
-	old_value = is_enforcing(&selinux_state);
+	old_value = enforcing_enabled(&selinux_state);
 
 	if (new_value != old_value) {
 		length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
@@ -141,7 +141,7 @@  static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
 			new_value, old_value,
 			from_kuid(&init_user_ns, audit_get_loginuid(current)),
 			audit_get_sessionid(current));
-		set_enforcing(&selinux_state, new_value);
+		enforcing_set(&selinux_state, new_value);
 		if (new_value)
 			avc_ss_reset(0);
 		selnl_notify_setenforce(new_value);
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
index 3698352213d7..4785ca552d51 100644
--- a/security/selinux/ss/services.c
+++ b/security/selinux/ss/services.c
@@ -752,7 +752,7 @@  static int security_validtrans_handle_fail(struct selinux_state *state,
 	kfree(n);
 	kfree(t);
 
-	if (!is_enforcing(state))
+	if (!enforcing_enabled(state))
 		return 0;
 	return -EPERM;
 }
@@ -1596,7 +1596,7 @@  static int compute_sid_handle_invalid_context(
 	kfree(s);
 	kfree(t);
 	kfree(n);
-	if (!is_enforcing(state))
+	if (!enforcing_enabled(state))
 		return 0;
 	return -EACCES;
 }
@@ -1907,7 +1907,7 @@  static inline int convert_context_handle_invalid_context(
 	char *s;
 	u32 len;
 
-	if (is_enforcing(state))
+	if (enforcing_enabled(state))
 		return -EINVAL;
 
 	if (!context_struct_to_string(policydb, context, &s, &len)) {
diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c
index 043efc59f8e4..a121de45ac0e 100644
--- a/security/selinux/ss/status.c
+++ b/security/selinux/ss/status.c
@@ -56,7 +56,7 @@  struct page *selinux_kernel_status_page(struct selinux_state *state)
 
 			status->version = SELINUX_KERNEL_STATUS_VERSION;
 			status->sequence = 0;
-			status->enforcing = is_enforcing(state);
+			status->enforcing = enforcing_enabled(state);
 			/*
 			 * NOTE: the next policyload event shall set
 			 * a positive value on the status->policyload,