Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

constify security_sb_mount()

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>

Al Viro 8a04c43b 7fd25dac

+6 -6
+1 -1
include/linux/lsm_hooks.h
··· 1343 1343 int (*sb_kern_mount)(struct super_block *sb, int flags, void *data); 1344 1344 int (*sb_show_options)(struct seq_file *m, struct super_block *sb); 1345 1345 int (*sb_statfs)(struct dentry *dentry); 1346 - int (*sb_mount)(const char *dev_name, struct path *path, 1346 + int (*sb_mount)(const char *dev_name, const struct path *path, 1347 1347 const char *type, unsigned long flags, void *data); 1348 1348 int (*sb_umount)(struct vfsmount *mnt, int flags); 1349 1349 int (*sb_pivotroot)(struct path *old_path, struct path *new_path);
+2 -2
include/linux/security.h
··· 222 222 int security_sb_kern_mount(struct super_block *sb, int flags, void *data); 223 223 int security_sb_show_options(struct seq_file *m, struct super_block *sb); 224 224 int security_sb_statfs(struct dentry *dentry); 225 - int security_sb_mount(const char *dev_name, struct path *path, 225 + int security_sb_mount(const char *dev_name, const struct path *path, 226 226 const char *type, unsigned long flags, void *data); 227 227 int security_sb_umount(struct vfsmount *mnt, int flags); 228 228 int security_sb_pivotroot(struct path *old_path, struct path *new_path); ··· 530 530 return 0; 531 531 } 532 532 533 - static inline int security_sb_mount(const char *dev_name, struct path *path, 533 + static inline int security_sb_mount(const char *dev_name, const struct path *path, 534 534 const char *type, unsigned long flags, 535 535 void *data) 536 536 {
+1 -1
security/security.c
··· 302 302 return call_int_hook(sb_statfs, 0, dentry); 303 303 } 304 304 305 - int security_sb_mount(const char *dev_name, struct path *path, 305 + int security_sb_mount(const char *dev_name, const struct path *path, 306 306 const char *type, unsigned long flags, void *data) 307 307 { 308 308 return call_int_hook(sb_mount, 0, dev_name, path, type, flags, data);
+1 -1
security/selinux/hooks.c
··· 2760 2760 } 2761 2761 2762 2762 static int selinux_mount(const char *dev_name, 2763 - struct path *path, 2763 + const struct path *path, 2764 2764 const char *type, 2765 2765 unsigned long flags, 2766 2766 void *data)
+1 -1
security/tomoyo/tomoyo.c
··· 401 401 * 402 402 * Returns 0 on success, negative value otherwise. 403 403 */ 404 - static int tomoyo_sb_mount(const char *dev_name, struct path *path, 404 + static int tomoyo_sb_mount(const char *dev_name, const struct path *path, 405 405 const char *type, unsigned long flags, void *data) 406 406 { 407 407 return tomoyo_mount_permission(dev_name, path, type, flags, data);