diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2013-05-01 20:51:54 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2013-05-01 20:51:54 -0400 |
commit | 20b4fb485227404329e41ad15588afad3df23050 (patch) | |
tree | f3e099f0ab3da8a93b447203e294d2bb22f6dc05 /security | |
parent | b9394d8a657cd3c064fa432aa0905c1b58b38fe9 (diff) | |
parent | ac3e3c5b1164397656df81b9e9ab4991184d3236 (diff) |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
Pull VFS updates from Al Viro,
Misc cleanups all over the place, mainly wrt /proc interfaces (switch
create_proc_entry to proc_create(), get rid of the deprecated
create_proc_read_entry() in favor of using proc_create_data() and
seq_file etc).
7kloc removed.
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs: (204 commits)
don't bother with deferred freeing of fdtables
proc: Move non-public stuff from linux/proc_fs.h to fs/proc/internal.h
proc: Make the PROC_I() and PDE() macros internal to procfs
proc: Supply a function to remove a proc entry by PDE
take cgroup_open() and cpuset_open() to fs/proc/base.c
ppc: Clean up scanlog
ppc: Clean up rtas_flash driver somewhat
hostap: proc: Use remove_proc_subtree()
drm: proc: Use remove_proc_subtree()
drm: proc: Use minor->index to label things, not PDE->name
drm: Constify drm_proc_list[]
zoran: Don't print proc_dir_entry data in debug
reiserfs: Don't access the proc_dir_entry in r_open(), r_start() r_show()
proc: Supply an accessor for getting the data from a PDE's parent
airo: Use remove_proc_subtree()
rtl8192u: Don't need to save device proc dir PDE
rtl8187se: Use a dir under /proc/net/r8180/
proc: Add proc_mkdir_data()
proc: Move some bits from linux/proc_fs.h to linux/{of.h,signal.h,tty.h}
proc: Move PDE_NET() to fs/proc/proc_net.c
...
Diffstat (limited to 'security')
-rw-r--r-- | security/tomoyo/common.c | 5 | ||||
-rw-r--r-- | security/tomoyo/common.h | 2 | ||||
-rw-r--r-- | security/tomoyo/securityfs_if.c | 5 |
3 files changed, 4 insertions, 8 deletions
diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c index f89a0333b813..283862aebdc8 100644 --- a/security/tomoyo/common.c +++ b/security/tomoyo/common.c | |||
@@ -2681,10 +2681,8 @@ out: | |||
2681 | * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface. | 2681 | * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface. |
2682 | * | 2682 | * |
2683 | * @head: Pointer to "struct tomoyo_io_buffer". | 2683 | * @head: Pointer to "struct tomoyo_io_buffer". |
2684 | * | ||
2685 | * Returns 0. | ||
2686 | */ | 2684 | */ |
2687 | int tomoyo_close_control(struct tomoyo_io_buffer *head) | 2685 | void tomoyo_close_control(struct tomoyo_io_buffer *head) |
2688 | { | 2686 | { |
2689 | /* | 2687 | /* |
2690 | * If the file is /sys/kernel/security/tomoyo/query , decrement the | 2688 | * If the file is /sys/kernel/security/tomoyo/query , decrement the |
@@ -2694,7 +2692,6 @@ int tomoyo_close_control(struct tomoyo_io_buffer *head) | |||
2694 | atomic_dec_and_test(&tomoyo_query_observers)) | 2692 | atomic_dec_and_test(&tomoyo_query_observers)) |
2695 | wake_up_all(&tomoyo_answer_wait); | 2693 | wake_up_all(&tomoyo_answer_wait); |
2696 | tomoyo_notify_gc(head, false); | 2694 | tomoyo_notify_gc(head, false); |
2697 | return 0; | ||
2698 | } | 2695 | } |
2699 | 2696 | ||
2700 | /** | 2697 | /** |
diff --git a/security/tomoyo/common.h b/security/tomoyo/common.h index d4f166bc3508..b897d4862016 100644 --- a/security/tomoyo/common.h +++ b/security/tomoyo/common.h | |||
@@ -958,7 +958,7 @@ const struct tomoyo_path_info *tomoyo_path_matches_group | |||
958 | (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group); | 958 | (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group); |
959 | int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, | 959 | int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, |
960 | struct path *path, const int flag); | 960 | struct path *path, const int flag); |
961 | int tomoyo_close_control(struct tomoyo_io_buffer *head); | 961 | void tomoyo_close_control(struct tomoyo_io_buffer *head); |
962 | int tomoyo_env_perm(struct tomoyo_request_info *r, const char *env); | 962 | int tomoyo_env_perm(struct tomoyo_request_info *r, const char *env); |
963 | int tomoyo_execute_permission(struct tomoyo_request_info *r, | 963 | int tomoyo_execute_permission(struct tomoyo_request_info *r, |
964 | const struct tomoyo_path_info *filename); | 964 | const struct tomoyo_path_info *filename); |
diff --git a/security/tomoyo/securityfs_if.c b/security/tomoyo/securityfs_if.c index fcf32783b66b..179a955b319d 100644 --- a/security/tomoyo/securityfs_if.c +++ b/security/tomoyo/securityfs_if.c | |||
@@ -143,14 +143,13 @@ static int tomoyo_open(struct inode *inode, struct file *file) | |||
143 | /** | 143 | /** |
144 | * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. | 144 | * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. |
145 | * | 145 | * |
146 | * @inode: Pointer to "struct inode". | ||
147 | * @file: Pointer to "struct file". | 146 | * @file: Pointer to "struct file". |
148 | * | 147 | * |
149 | * Returns 0 on success, negative value otherwise. | ||
150 | */ | 148 | */ |
151 | static int tomoyo_release(struct inode *inode, struct file *file) | 149 | static int tomoyo_release(struct inode *inode, struct file *file) |
152 | { | 150 | { |
153 | return tomoyo_close_control(file->private_data); | 151 | tomoyo_close_control(file->private_data); |
152 | return 0; | ||
154 | } | 153 | } |
155 | 154 | ||
156 | /** | 155 | /** |