From a81da2c586db9afaf4ea02a090559fd7d257b128 Mon Sep 17 00:00:00 2001 From: Ylarod Date: Thu, 6 Nov 2025 10:14:54 +0800 Subject: [PATCH] fix sepolicy patch hint (#2872) --- kernel/selinux/rules.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/kernel/selinux/rules.c b/kernel/selinux/rules.c index 01b3e9b0..1972e374 100644 --- a/kernel/selinux/rules.c +++ b/kernel/selinux/rules.c @@ -210,7 +210,7 @@ static int get_object(char *buf, char __user *user_object, size_t buf_sz, } if (strncpy_from_user(buf, user_object, buf_sz) < 0) { - return -1; + return -EINVAL; } *object = buf; @@ -240,7 +240,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4) struct policydb *db; if (!arg4) { - return -1; + return -EINVAL; } if (!getenforce()) { @@ -287,7 +287,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4) db = get_policydb(); - int ret = -1; + int ret = -EINVAL; if (cmd == CMD_NORMAL_PERM) { char src_buf[MAX_SEPOL_LEN]; char tgt_buf[MAX_SEPOL_LEN]; @@ -328,7 +328,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4) } else { pr_err("sepol: unknown subcmd: %d\n", subcmd); } - ret = success ? 0 : -1; + ret = success ? 0 : -EINVAL; } else if (cmd == CMD_XPERM) { char src_buf[MAX_SEPOL_LEN]; @@ -373,7 +373,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4) } else { pr_err("sepol: unknown subcmd: %d\n", subcmd); } - ret = success ? 0 : -1; + ret = success ? 0 : -EINVAL; } else if (cmd == CMD_TYPE_STATE) { char src[MAX_SEPOL_LEN];