diff options
author | Eric Paris <eparis@redhat.com> | 2011-04-20 10:21:28 -0400 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2011-04-25 10:19:02 -0400 |
commit | 6b697323a78bed254ee372f71b1a6a2901bb4b7a (patch) | |
tree | ef1282bd99f549074253b33deeb6436809566ad4 /security/selinux | |
parent | a35c6c8368d88deae6890205e73ed330b6df1db7 (diff) |
SELinux: security_read_policy should take a size_t not ssize_t
The len should be an size_t but is a ssize_t. Easy enough fix to silence
build warnings. We have no need for signed-ness.
Signed-off-by: Eric Paris <eparis@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/include/security.h | 2 | ||||
-rw-r--r-- | security/selinux/ss/services.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 2cf67086414..3ba4feba048 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -86,7 +86,7 @@ extern int selinux_policycap_openperm; int security_mls_enabled(void); int security_load_policy(void *data, size_t len); -int security_read_policy(void **data, ssize_t *len); +int security_read_policy(void **data, size_t *len); size_t security_policydb_len(void); int security_policycap_supported(unsigned int req_cap); diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index f3f5dca8100..211c0ada594 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -3189,7 +3189,7 @@ out: * @len: length of data in bytes * */ -int security_read_policy(void **data, ssize_t *len) +int security_read_policy(void **data, size_t *len) { int rc; struct policy_file fp; |