|
@@ -98,7 +98,7 @@ static ssize_t sel_read_enforce(struct file *filp, char __user *buf,
|
|
|
ssize_t length;
|
|
|
|
|
|
length = scnprintf(tmpbuf, TMPBUFLEN, "%d",
|
|
|
- is_enforcing(&selinux_state));
|
|
|
+ enforcing_enabled(&selinux_state));
|
|
|
return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
|
|
|
}
|
|
|
|
|
@@ -128,7 +128,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
|
|
|
|
|
|
new_value = !!new_value;
|
|
|
|
|
|
- old_value = is_enforcing(&selinux_state);
|
|
|
+ old_value = enforcing_enabled(&selinux_state);
|
|
|
|
|
|
if (new_value != old_value) {
|
|
|
length = avc_has_perm(current_sid(), SECINITSID_SECURITY,
|
|
@@ -141,7 +141,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
|
|
|
new_value, old_value,
|
|
|
from_kuid(&init_user_ns, audit_get_loginuid(current)),
|
|
|
audit_get_sessionid(current));
|
|
|
- set_enforcing(&selinux_state, new_value);
|
|
|
+ enforcing_set(&selinux_state, new_value);
|
|
|
if (new_value)
|
|
|
avc_ss_reset(0);
|
|
|
selnl_notify_setenforce(new_value);
|