diff options
| author | Al Viro <viro@zeniv.linux.org.uk> | 2018-12-12 20:13:29 -0500 |
|---|---|---|
| committer | Al Viro <viro@zeniv.linux.org.uk> | 2018-12-21 11:47:41 -0500 |
| commit | 5b4002391153acebce2557af318bbdc17e235134 (patch) | |
| tree | b5c6afc5fbffd01ca682332e2893bad477e59b9d /security/security.c | |
| parent | 6a0440e5b7562512c021aa1b5a706fcc545773db (diff) | |
LSM: turn sb_eat_lsm_opts() into a method
Kill ->sb_copy_data() - it's used only in combination with immediately
following ->sb_parse_opts_str(). Turn that combination into a new
method.
This is just a mechanical move - cleanups will be the next step.
Reviewed-by: David Howells <dhowells@redhat.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'security/security.c')
| -rw-r--r-- | security/security.c | 11 |
1 files changed, 1 insertions, 10 deletions
diff --git a/security/security.c b/security/security.c index 3d8b72904e00..feb18c925349 100644 --- a/security/security.c +++ b/security/security.c | |||
| @@ -386,16 +386,7 @@ void security_sb_free(struct super_block *sb) | |||
| 386 | 386 | ||
| 387 | int security_sb_eat_lsm_opts(char *options, struct security_mnt_opts *opts) | 387 | int security_sb_eat_lsm_opts(char *options, struct security_mnt_opts *opts) |
| 388 | { | 388 | { |
| 389 | char *s = (char *)get_zeroed_page(GFP_KERNEL); | 389 | return call_int_hook(sb_eat_lsm_opts, 0, options, opts); |
| 390 | int err; | ||
| 391 | |||
| 392 | if (!s) | ||
| 393 | return -ENOMEM; | ||
| 394 | err = call_int_hook(sb_copy_data, 0, options, s); | ||
| 395 | if (!err) | ||
| 396 | err = call_int_hook(sb_parse_opts_str, 0, s, opts); | ||
| 397 | free_page((unsigned long)s); | ||
| 398 | return err; | ||
| 399 | } | 390 | } |
| 400 | EXPORT_SYMBOL(security_sb_eat_lsm_opts); | 391 | EXPORT_SYMBOL(security_sb_eat_lsm_opts); |
| 401 | 392 | ||
