diff options
author | Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> | 2010-02-15 19:46:15 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2010-02-16 01:26:36 -0500 |
commit | 97d6931ead3e89a764cdaa3ad0924037367f0d34 (patch) | |
tree | ad69e76208832699a97e897af73b6aa23a655609 /security/tomoyo/file.c | |
parent | 7ef612331fb219620cc1abfc2446bb027d388aa0 (diff) |
TOMOYO: Remove unneeded parameter.
tomoyo_path_perm() tomoyo_path2_perm() and tomoyo_check_rewrite_permission()
always receive tomoyo_domain(). We can move it from caller to callee.
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/tomoyo/file.c')
-rw-r--r-- | security/tomoyo/file.c | 15 |
1 files changed, 6 insertions, 9 deletions
diff --git a/security/tomoyo/file.c b/security/tomoyo/file.c index 09feaf24864d..db342ef87af7 100644 --- a/security/tomoyo/file.c +++ b/security/tomoyo/file.c | |||
@@ -1135,17 +1135,16 @@ int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, | |||
1135 | /** | 1135 | /** |
1136 | * tomoyo_path_perm - Check permission for "create", "unlink", "mkdir", "rmdir", "mkfifo", "mksock", "mkblock", "mkchar", "truncate", "symlink", "ioctl", "chmod", "chown", "chgrp", "chroot", "mount" and "unmount". | 1136 | * tomoyo_path_perm - Check permission for "create", "unlink", "mkdir", "rmdir", "mkfifo", "mksock", "mkblock", "mkchar", "truncate", "symlink", "ioctl", "chmod", "chown", "chgrp", "chroot", "mount" and "unmount". |
1137 | * | 1137 | * |
1138 | * @domain: Pointer to "struct tomoyo_domain_info". | ||
1139 | * @operation: Type of operation. | 1138 | * @operation: Type of operation. |
1140 | * @path: Pointer to "struct path". | 1139 | * @path: Pointer to "struct path". |
1141 | * | 1140 | * |
1142 | * Returns 0 on success, negative value otherwise. | 1141 | * Returns 0 on success, negative value otherwise. |
1143 | */ | 1142 | */ |
1144 | int tomoyo_path_perm(struct tomoyo_domain_info *domain, | 1143 | int tomoyo_path_perm(const u8 operation, struct path *path) |
1145 | const u8 operation, struct path *path) | ||
1146 | { | 1144 | { |
1147 | int error = -ENOMEM; | 1145 | int error = -ENOMEM; |
1148 | struct tomoyo_path_info *buf; | 1146 | struct tomoyo_path_info *buf; |
1147 | struct tomoyo_domain_info *domain = tomoyo_domain(); | ||
1149 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); | 1148 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); |
1150 | const bool is_enforce = (mode == 3); | 1149 | const bool is_enforce = (mode == 3); |
1151 | int idx; | 1150 | int idx; |
@@ -1180,15 +1179,14 @@ int tomoyo_path_perm(struct tomoyo_domain_info *domain, | |||
1180 | /** | 1179 | /** |
1181 | * tomoyo_check_rewrite_permission - Check permission for "rewrite". | 1180 | * tomoyo_check_rewrite_permission - Check permission for "rewrite". |
1182 | * | 1181 | * |
1183 | * @domain: Pointer to "struct tomoyo_domain_info". | ||
1184 | * @filp: Pointer to "struct file". | 1182 | * @filp: Pointer to "struct file". |
1185 | * | 1183 | * |
1186 | * Returns 0 on success, negative value otherwise. | 1184 | * Returns 0 on success, negative value otherwise. |
1187 | */ | 1185 | */ |
1188 | int tomoyo_check_rewrite_permission(struct tomoyo_domain_info *domain, | 1186 | int tomoyo_check_rewrite_permission(struct file *filp) |
1189 | struct file *filp) | ||
1190 | { | 1187 | { |
1191 | int error = -ENOMEM; | 1188 | int error = -ENOMEM; |
1189 | struct tomoyo_domain_info *domain = tomoyo_domain(); | ||
1192 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); | 1190 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); |
1193 | const bool is_enforce = (mode == 3); | 1191 | const bool is_enforce = (mode == 3); |
1194 | struct tomoyo_path_info *buf; | 1192 | struct tomoyo_path_info *buf; |
@@ -1217,19 +1215,18 @@ int tomoyo_check_rewrite_permission(struct tomoyo_domain_info *domain, | |||
1217 | /** | 1215 | /** |
1218 | * tomoyo_path2_perm - Check permission for "rename", "link" and "pivot_root". | 1216 | * tomoyo_path2_perm - Check permission for "rename", "link" and "pivot_root". |
1219 | * | 1217 | * |
1220 | * @domain: Pointer to "struct tomoyo_domain_info". | ||
1221 | * @operation: Type of operation. | 1218 | * @operation: Type of operation. |
1222 | * @path1: Pointer to "struct path". | 1219 | * @path1: Pointer to "struct path". |
1223 | * @path2: Pointer to "struct path". | 1220 | * @path2: Pointer to "struct path". |
1224 | * | 1221 | * |
1225 | * Returns 0 on success, negative value otherwise. | 1222 | * Returns 0 on success, negative value otherwise. |
1226 | */ | 1223 | */ |
1227 | int tomoyo_path2_perm(struct tomoyo_domain_info * const domain, | 1224 | int tomoyo_path2_perm(const u8 operation, struct path *path1, |
1228 | const u8 operation, struct path *path1, | ||
1229 | struct path *path2) | 1225 | struct path *path2) |
1230 | { | 1226 | { |
1231 | int error = -ENOMEM; | 1227 | int error = -ENOMEM; |
1232 | struct tomoyo_path_info *buf1, *buf2; | 1228 | struct tomoyo_path_info *buf1, *buf2; |
1229 | struct tomoyo_domain_info *domain = tomoyo_domain(); | ||
1233 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); | 1230 | const u8 mode = tomoyo_check_flags(domain, TOMOYO_MAC_FOR_FILE); |
1234 | const bool is_enforce = (mode == 3); | 1231 | const bool is_enforce = (mode == 3); |
1235 | const char *msg; | 1232 | const char *msg; |