Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

switch ->path_mknod() to umode_t

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>

Al Viro 04fc66e7 4572befe

+8 -8
+3 -3
include/linux/security.h
··· 1426 1426 int (*path_unlink) (struct path *dir, struct dentry *dentry); 1427 1427 int (*path_mkdir) (struct path *dir, struct dentry *dentry, umode_t mode); 1428 1428 int (*path_rmdir) (struct path *dir, struct dentry *dentry); 1429 - int (*path_mknod) (struct path *dir, struct dentry *dentry, int mode, 1429 + int (*path_mknod) (struct path *dir, struct dentry *dentry, umode_t mode, 1430 1430 unsigned int dev); 1431 1431 int (*path_truncate) (struct path *path); 1432 1432 int (*path_symlink) (struct path *dir, struct dentry *dentry, ··· 2857 2857 int security_path_unlink(struct path *dir, struct dentry *dentry); 2858 2858 int security_path_mkdir(struct path *dir, struct dentry *dentry, umode_t mode); 2859 2859 int security_path_rmdir(struct path *dir, struct dentry *dentry); 2860 - int security_path_mknod(struct path *dir, struct dentry *dentry, int mode, 2860 + int security_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, 2861 2861 unsigned int dev); 2862 2862 int security_path_truncate(struct path *path); 2863 2863 int security_path_symlink(struct path *dir, struct dentry *dentry, ··· 2888 2888 } 2889 2889 2890 2890 static inline int security_path_mknod(struct path *dir, struct dentry *dentry, 2891 - int mode, unsigned int dev) 2891 + umode_t mode, unsigned int dev) 2892 2892 { 2893 2893 return 0; 2894 2894 }
+1 -1
net/unix/af_unix.c
··· 847 847 atomic_set(&addr->refcnt, 1); 848 848 849 849 if (sun_path[0]) { 850 - unsigned int mode; 850 + umode_t mode; 851 851 err = 0; 852 852 /* 853 853 * Get the parent directory, calculate the hash for last
+1 -1
security/apparmor/lsm.c
··· 274 274 } 275 275 276 276 static int apparmor_path_mknod(struct path *dir, struct dentry *dentry, 277 - int mode, unsigned int dev) 277 + umode_t mode, unsigned int dev) 278 278 { 279 279 return common_perm_create(OP_MKNOD, dir, dentry, AA_MAY_CREATE, mode); 280 280 }
+1 -1
security/capability.c
··· 235 235 } 236 236 237 237 #ifdef CONFIG_SECURITY_PATH 238 - static int cap_path_mknod(struct path *dir, struct dentry *dentry, int mode, 238 + static int cap_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, 239 239 unsigned int dev) 240 240 { 241 241 return 0;
+1 -1
security/security.c
··· 388 388 EXPORT_SYMBOL(security_old_inode_init_security); 389 389 390 390 #ifdef CONFIG_SECURITY_PATH 391 - int security_path_mknod(struct path *dir, struct dentry *dentry, int mode, 391 + int security_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, 392 392 unsigned int dev) 393 393 { 394 394 if (unlikely(IS_PRIVATE(dir->dentry->d_inode)))
+1 -1
security/tomoyo/tomoyo.c
··· 234 234 * Returns 0 on success, negative value otherwise. 235 235 */ 236 236 static int tomoyo_path_mknod(struct path *parent, struct dentry *dentry, 237 - int mode, unsigned int dev) 237 + umode_t mode, unsigned int dev) 238 238 { 239 239 struct path path = { parent->mnt, dentry }; 240 240 int type = TOMOYO_TYPE_CREATE;