diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2012-10-11 11:42:01 -0400 |
---|---|---|
committer | Ziyan <jaraidaniel@gmail.com> | 2016-04-03 14:55:53 +0200 |
commit | 45d83a2e45b4219f45dbf55c889c6514564aa9f0 (patch) | |
tree | 9e5cc21df8d12ada5c7eba6b557bbba67871f7e4 /security | |
parent | 544fa45ee11c022960ad0a23cc78f27b48af891f (diff) | |
download | kernel_samsung_tuna-45d83a2e45b4219f45dbf55c889c6514564aa9f0.zip kernel_samsung_tuna-45d83a2e45b4219f45dbf55c889c6514564aa9f0.tar.gz kernel_samsung_tuna-45d83a2e45b4219f45dbf55c889c6514564aa9f0.tar.bz2 |
consitify do_mount() arguments
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
(cherry picked from commit 808d4e3cfdcc52b19276175464f6dbca4df13b09)
Diffstat (limited to 'security')
-rw-r--r-- | security/capability.c | 4 | ||||
-rw-r--r-- | security/security.c | 4 | ||||
-rw-r--r-- | security/selinux/hooks.c | 4 | ||||
-rw-r--r-- | security/smack/smack_lsm.c | 4 | ||||
-rw-r--r-- | security/tomoyo/common.h | 2 | ||||
-rw-r--r-- | security/tomoyo/mount.c | 5 | ||||
-rw-r--r-- | security/tomoyo/tomoyo.c | 4 |
7 files changed, 14 insertions, 13 deletions
diff --git a/security/capability.c b/security/capability.c index 755aebc..37103c4 100644 --- a/security/capability.c +++ b/security/capability.c @@ -94,8 +94,8 @@ static int cap_sb_statfs(struct dentry *dentry) return 0; } -static int cap_sb_mount(char *dev_name, struct path *path, char *type, - unsigned long flags, void *data) +static int cap_sb_mount(const char *dev_name, struct path *path, + const char *type, unsigned long flags, void *data) { return 0; } diff --git a/security/security.c b/security/security.c index b668e1c..38d79e7 100644 --- a/security/security.c +++ b/security/security.c @@ -309,8 +309,8 @@ int security_sb_statfs(struct dentry *dentry) return security_ops->sb_statfs(dentry); } -int security_sb_mount(char *dev_name, struct path *path, - char *type, unsigned long flags, void *data) +int security_sb_mount(const char *dev_name, struct path *path, + const char *type, unsigned long flags, void *data) { return security_ops->sb_mount(dev_name, path, type, flags, data); } diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 89a4c5e..6e11b24 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -2623,9 +2623,9 @@ static int selinux_sb_statfs(struct dentry *dentry) return superblock_has_perm(cred, dentry->d_sb, FILESYSTEM__GETATTR, &ad); } -static int selinux_mount(char *dev_name, +static int selinux_mount(const char *dev_name, struct path *path, - char *type, + const char *type, unsigned long flags, void *data) { diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 9831a39..3368291 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -401,8 +401,8 @@ static int smack_sb_statfs(struct dentry *dentry) * Returns 0 if current can write the floor of the filesystem * being mounted on, an error code otherwise. */ -static int smack_sb_mount(char *dev_name, struct path *path, - char *type, unsigned long flags, void *data) +static int smack_sb_mount(const char *dev_name, struct path *path, + const char *type, unsigned long flags, void *data) { struct superblock_smack *sbp = path->mnt->mnt_sb->s_security; struct smk_audit_info ad; diff --git a/security/tomoyo/common.h b/security/tomoyo/common.h index 7c66bd8..ec80711 100644 --- a/security/tomoyo/common.h +++ b/security/tomoyo/common.h @@ -757,7 +757,7 @@ int tomoyo_init_request_info(struct tomoyo_request_info *r, struct tomoyo_domain_info *domain, const u8 index); /* Check permission for mount operation. */ -int tomoyo_mount_permission(char *dev_name, struct path *path, char *type, +int tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page); /* Create "aggregator" entry in exception policy. */ int tomoyo_write_aggregator(char *data, const bool is_delete); diff --git a/security/tomoyo/mount.c b/security/tomoyo/mount.c index 892494a..951a245 100644 --- a/security/tomoyo/mount.c +++ b/security/tomoyo/mount.c @@ -85,7 +85,8 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r, * * Caller holds tomoyo_read_lock(). */ -static int tomoyo_mount_acl(struct tomoyo_request_info *r, char *dev_name, +static int tomoyo_mount_acl(struct tomoyo_request_info *r, + const char *dev_name, struct path *dir, char *type, unsigned long flags) { struct path path; @@ -190,7 +191,7 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r, char *dev_name, * * Returns 0 on success, negative value otherwise. */ -int tomoyo_mount_permission(char *dev_name, struct path *path, char *type, +int tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) { struct tomoyo_request_info r; diff --git a/security/tomoyo/tomoyo.c b/security/tomoyo/tomoyo.c index 95d3f95..a04d6aa 100644 --- a/security/tomoyo/tomoyo.c +++ b/security/tomoyo/tomoyo.c @@ -219,8 +219,8 @@ static int tomoyo_path_chroot(struct path *path) return tomoyo_path_perm(TOMOYO_TYPE_CHROOT, path); } -static int tomoyo_sb_mount(char *dev_name, struct path *path, - char *type, unsigned long flags, void *data) +static int tomoyo_sb_mount(const char *dev_name, struct path *path, + const char *type, unsigned long flags, void *data) { return tomoyo_mount_permission(dev_name, path, type, flags, data); } |