Skip to content

Commit cdbec3e

Browse files
committed
selinux: shorten the policy capability enum names
The SELinux policy capability enum names are rather long and follow the "POLICYDB_CAPABILITY_XXX format". While the "POLICYDB_" prefix is helpful in tying the enums to other SELinux policy constants, macros, etc. there is no reason why we need to spell out "CAPABILITY" completely. Shorten "CAPABILITY" to "CAP" in order to make things a bit shorter and cleaner. Moving forward, the SELinux policy capability enum names should follow the "POLICYDB_CAP_XXX" format. Signed-off-by: Paul Moore <paul@paul-moore.com>
1 parent 70868c6 commit cdbec3e

5 files changed

Lines changed: 24 additions & 24 deletions

File tree

security/selinux/ima.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ static char *selinux_ima_collect_state(struct selinux_state *state)
2929
buf_len = strlen("initialized=0;enforcing=0;checkreqprot=0;") + 1;
3030

3131
len = strlen(on);
32-
for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++)
32+
for (i = 0; i < __POLICYDB_CAP_MAX; i++)
3333
buf_len += strlen(selinux_policycap_names[i]) + len;
3434

3535
buf = kzalloc(buf_len, GFP_KERNEL);
@@ -54,7 +54,7 @@ static char *selinux_ima_collect_state(struct selinux_state *state)
5454
rc = strlcat(buf, checkreqprot_get(state) ? on : off, buf_len);
5555
WARN_ON(rc >= buf_len);
5656

57-
for (i = 0; i < __POLICYDB_CAPABILITY_MAX; i++) {
57+
for (i = 0; i < __POLICYDB_CAP_MAX; i++) {
5858
rc = strlcat(buf, selinux_policycap_names[i], buf_len);
5959
WARN_ON(rc >= buf_len);
6060

security/selinux/include/policycap.h

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,18 @@
44

55
/* Policy capabilities */
66
enum {
7-
POLICYDB_CAPABILITY_NETPEER,
8-
POLICYDB_CAPABILITY_OPENPERM,
9-
POLICYDB_CAPABILITY_EXTSOCKCLASS,
10-
POLICYDB_CAPABILITY_ALWAYSNETWORK,
11-
POLICYDB_CAPABILITY_CGROUPSECLABEL,
12-
POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION,
13-
POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS,
14-
POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC,
15-
__POLICYDB_CAPABILITY_MAX
7+
POLICYDB_CAP_NETPEER,
8+
POLICYDB_CAP_OPENPERM,
9+
POLICYDB_CAP_EXTSOCKCLASS,
10+
POLICYDB_CAP_ALWAYSNETWORK,
11+
POLICYDB_CAP_CGROUPSECLABEL,
12+
POLICYDB_CAP_NNP_NOSUID_TRANSITION,
13+
POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS,
14+
POLICYDB_CAP_IOCTL_SKIP_CLOEXEC,
15+
__POLICYDB_CAP_MAX
1616
};
17-
#define POLICYDB_CAPABILITY_MAX (__POLICYDB_CAPABILITY_MAX - 1)
17+
#define POLICYDB_CAP_MAX (__POLICYDB_CAP_MAX - 1)
1818

19-
extern const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX];
19+
extern const char *selinux_policycap_names[__POLICYDB_CAP_MAX];
2020

2121
#endif /* _SELINUX_POLICYCAP_H_ */

security/selinux/include/policycap_names.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
#include "policycap.h"
66

77
/* Policy capability names */
8-
const char *selinux_policycap_names[__POLICYDB_CAPABILITY_MAX] = {
8+
const char *selinux_policycap_names[__POLICYDB_CAP_MAX] = {
99
"network_peer_controls",
1010
"open_perms",
1111
"extended_socket_class",

security/selinux/include/security.h

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ struct selinux_state {
9696
#endif
9797
bool checkreqprot;
9898
bool initialized;
99-
bool policycap[__POLICYDB_CAPABILITY_MAX];
99+
bool policycap[__POLICYDB_CAP_MAX];
100100

101101
struct page *status_page;
102102
struct mutex status_lock;
@@ -174,56 +174,56 @@ static inline bool selinux_policycap_netpeer(void)
174174
{
175175
struct selinux_state *state = &selinux_state;
176176

177-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NETPEER]);
177+
return READ_ONCE(state->policycap[POLICYDB_CAP_NETPEER]);
178178
}
179179

180180
static inline bool selinux_policycap_openperm(void)
181181
{
182182
struct selinux_state *state = &selinux_state;
183183

184-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_OPENPERM]);
184+
return READ_ONCE(state->policycap[POLICYDB_CAP_OPENPERM]);
185185
}
186186

187187
static inline bool selinux_policycap_extsockclass(void)
188188
{
189189
struct selinux_state *state = &selinux_state;
190190

191-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS]);
191+
return READ_ONCE(state->policycap[POLICYDB_CAP_EXTSOCKCLASS]);
192192
}
193193

194194
static inline bool selinux_policycap_alwaysnetwork(void)
195195
{
196196
struct selinux_state *state = &selinux_state;
197197

198-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK]);
198+
return READ_ONCE(state->policycap[POLICYDB_CAP_ALWAYSNETWORK]);
199199
}
200200

201201
static inline bool selinux_policycap_cgroupseclabel(void)
202202
{
203203
struct selinux_state *state = &selinux_state;
204204

205-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL]);
205+
return READ_ONCE(state->policycap[POLICYDB_CAP_CGROUPSECLABEL]);
206206
}
207207

208208
static inline bool selinux_policycap_nnp_nosuid_transition(void)
209209
{
210210
struct selinux_state *state = &selinux_state;
211211

212-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION]);
212+
return READ_ONCE(state->policycap[POLICYDB_CAP_NNP_NOSUID_TRANSITION]);
213213
}
214214

215215
static inline bool selinux_policycap_genfs_seclabel_symlinks(void)
216216
{
217217
struct selinux_state *state = &selinux_state;
218218

219-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS]);
219+
return READ_ONCE(state->policycap[POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS]);
220220
}
221221

222222
static inline bool selinux_policycap_ioctl_skip_cloexec(void)
223223
{
224224
struct selinux_state *state = &selinux_state;
225225

226-
return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC]);
226+
return READ_ONCE(state->policycap[POLICYDB_CAP_IOCTL_SKIP_CLOEXEC]);
227227
}
228228

229229
struct selinux_policy_convert_data;

security/selinux/selinuxfs.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1983,7 +1983,7 @@ static int sel_make_policycap(struct selinux_fs_info *fsi)
19831983
struct dentry *dentry = NULL;
19841984
struct inode *inode = NULL;
19851985

1986-
for (iter = 0; iter <= POLICYDB_CAPABILITY_MAX; iter++) {
1986+
for (iter = 0; iter <= POLICYDB_CAP_MAX; iter++) {
19871987
if (iter < ARRAY_SIZE(selinux_policycap_names))
19881988
dentry = d_alloc_name(fsi->policycap_dir,
19891989
selinux_policycap_names[iter]);

0 commit comments

Comments
 (0)