Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

SELinux: security_read_policy should take a size_t not ssize_t

The len should be an size_t but is a ssize_t. Easy enough fix to silence
build warnings. We have no need for signed-ness.

Signed-off-by: Eric Paris <eparis@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>

+2 -2
+1 -1
security/selinux/include/security.h
··· 86 86 int security_mls_enabled(void); 87 87 88 88 int security_load_policy(void *data, size_t len); 89 - int security_read_policy(void **data, ssize_t *len); 89 + int security_read_policy(void **data, size_t *len); 90 90 size_t security_policydb_len(void); 91 91 92 92 int security_policycap_supported(unsigned int req_cap);
+1 -1
security/selinux/ss/services.c
··· 3189 3189 * @len: length of data in bytes 3190 3190 * 3191 3191 */ 3192 - int security_read_policy(void **data, ssize_t *len) 3192 + int security_read_policy(void **data, size_t *len) 3193 3193 { 3194 3194 int rc; 3195 3195 struct policy_file fp;