Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
Kernel
提交
808d4e3c
K
Kernel
项目概览
openeuler
/
Kernel
大约 1 年 前同步成功
通知
5
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
K
Kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
808d4e3c
编写于
10月 11, 2012
作者:
A
Al Viro
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
consitify do_mount() arguments
Signed-off-by:
N
Al Viro
<
viro@zeniv.linux.org.uk
>
上级
4b2c551f
变更
10
隐藏空白更改
内联
并排
Showing
10 changed file
with
27 addition
and
26 deletion
+27
-26
fs/namespace.c
fs/namespace.c
+6
-6
include/linux/fs.h
include/linux/fs.h
+1
-1
include/linux/security.h
include/linux/security.h
+6
-6
security/capability.c
security/capability.c
+2
-2
security/security.c
security/security.c
+2
-2
security/selinux/hooks.c
security/selinux/hooks.c
+2
-2
security/smack/smack_lsm.c
security/smack/smack_lsm.c
+2
-2
security/tomoyo/common.h
security/tomoyo/common.h
+1
-1
security/tomoyo/mount.c
security/tomoyo/mount.c
+3
-2
security/tomoyo/tomoyo.c
security/tomoyo/tomoyo.c
+2
-2
未找到文件。
fs/namespace.c
浏览文件 @
808d4e3c
...
...
@@ -1640,7 +1640,7 @@ static int do_change_type(struct path *path, int flag)
/*
* do loopback mount.
*/
static
int
do_loopback
(
struct
path
*
path
,
char
*
old_name
,
static
int
do_loopback
(
struct
path
*
path
,
c
onst
c
har
*
old_name
,
int
recurse
)
{
LIST_HEAD
(
umount_list
);
...
...
@@ -1764,7 +1764,7 @@ static inline int tree_contains_unbindable(struct mount *mnt)
return
0
;
}
static
int
do_move_mount
(
struct
path
*
path
,
char
*
old_name
)
static
int
do_move_mount
(
struct
path
*
path
,
c
onst
c
har
*
old_name
)
{
struct
path
old_path
,
parent_path
;
struct
mount
*
p
;
...
...
@@ -1917,8 +1917,8 @@ static int do_add_mount(struct mount *newmnt, struct path *path, int mnt_flags)
* create a new mount for userspace and request it to be added into the
* namespace's tree
*/
static
int
do_new_mount
(
struct
path
*
path
,
char
*
type
,
int
flags
,
int
mnt_flags
,
char
*
name
,
void
*
data
)
static
int
do_new_mount
(
struct
path
*
path
,
c
onst
c
har
*
type
,
int
flags
,
int
mnt_flags
,
c
onst
c
har
*
name
,
void
*
data
)
{
struct
vfsmount
*
mnt
;
int
err
;
...
...
@@ -2191,8 +2191,8 @@ int copy_mount_string(const void __user *data, char **where)
* Therefore, if this magic number is present, it carries no information
* and must be discarded.
*/
long
do_mount
(
c
har
*
dev_name
,
char
*
dir_name
,
char
*
type_pag
e
,
unsigned
long
flags
,
void
*
data_page
)
long
do_mount
(
c
onst
char
*
dev_name
,
const
char
*
dir_nam
e
,
const
char
*
type_page
,
unsigned
long
flags
,
void
*
data_page
)
{
struct
path
path
;
int
retval
=
0
;
...
...
include/linux/fs.h
浏览文件 @
808d4e3c
...
...
@@ -2075,7 +2075,7 @@ extern struct vfsmount *kern_mount_data(struct file_system_type *, void *data);
extern
void
kern_unmount
(
struct
vfsmount
*
mnt
);
extern
int
may_umount_tree
(
struct
vfsmount
*
);
extern
int
may_umount
(
struct
vfsmount
*
);
extern
long
do_mount
(
c
har
*
,
char
*
,
char
*
,
unsigned
long
,
void
*
);
extern
long
do_mount
(
c
onst
char
*
,
const
char
*
,
const
char
*
,
unsigned
long
,
void
*
);
extern
struct
vfsmount
*
collect_mounts
(
struct
path
*
);
extern
void
drop_collected_mounts
(
struct
vfsmount
*
);
extern
int
iterate_mounts
(
int
(
*
)(
struct
vfsmount
*
,
void
*
),
void
*
,
...
...
include/linux/security.h
浏览文件 @
808d4e3c
...
...
@@ -1411,8 +1411,8 @@ struct security_operations {
int
(
*
sb_kern_mount
)
(
struct
super_block
*
sb
,
int
flags
,
void
*
data
);
int
(
*
sb_show_options
)
(
struct
seq_file
*
m
,
struct
super_block
*
sb
);
int
(
*
sb_statfs
)
(
struct
dentry
*
dentry
);
int
(
*
sb_mount
)
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
);
int
(
*
sb_mount
)
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
);
int
(
*
sb_umount
)
(
struct
vfsmount
*
mnt
,
int
flags
);
int
(
*
sb_pivotroot
)
(
struct
path
*
old_path
,
struct
path
*
new_path
);
...
...
@@ -1694,8 +1694,8 @@ int security_sb_remount(struct super_block *sb, void *data);
int
security_sb_kern_mount
(
struct
super_block
*
sb
,
int
flags
,
void
*
data
);
int
security_sb_show_options
(
struct
seq_file
*
m
,
struct
super_block
*
sb
);
int
security_sb_statfs
(
struct
dentry
*
dentry
);
int
security_sb_mount
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
);
int
security_sb_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
);
int
security_sb_umount
(
struct
vfsmount
*
mnt
,
int
flags
);
int
security_sb_pivotroot
(
struct
path
*
old_path
,
struct
path
*
new_path
);
int
security_sb_set_mnt_opts
(
struct
super_block
*
sb
,
struct
security_mnt_opts
*
opts
);
...
...
@@ -1964,8 +1964,8 @@ static inline int security_sb_statfs(struct dentry *dentry)
return
0
;
}
static
inline
int
security_sb_mount
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
static
inline
int
security_sb_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
)
{
return
0
;
...
...
security/capability.c
浏览文件 @
808d4e3c
...
...
@@ -74,8 +74,8 @@ static int cap_sb_statfs(struct dentry *dentry)
return
0
;
}
static
int
cap_sb_mount
(
c
har
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
)
static
int
cap_sb_mount
(
c
onst
char
*
dev_name
,
struct
path
*
path
,
const
char
*
type
,
unsigned
long
flags
,
void
*
data
)
{
return
0
;
}
...
...
security/security.c
浏览文件 @
808d4e3c
...
...
@@ -276,8 +276,8 @@ int security_sb_statfs(struct dentry *dentry)
return
security_ops
->
sb_statfs
(
dentry
);
}
int
security_sb_mount
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
)
int
security_sb_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
)
{
return
security_ops
->
sb_mount
(
dev_name
,
path
,
type
,
flags
,
data
);
}
...
...
security/selinux/hooks.c
浏览文件 @
808d4e3c
...
...
@@ -2452,9 +2452,9 @@ static int selinux_sb_statfs(struct dentry *dentry)
return
superblock_has_perm
(
cred
,
dentry
->
d_sb
,
FILESYSTEM__GETATTR
,
&
ad
);
}
static
int
selinux_mount
(
char
*
dev_name
,
static
int
selinux_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
char
*
type
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
)
{
...
...
security/smack/smack_lsm.c
浏览文件 @
808d4e3c
...
...
@@ -408,8 +408,8 @@ static int smack_sb_statfs(struct dentry *dentry)
* Returns 0 if current can write the floor of the filesystem
* being mounted on, an error code otherwise.
*/
static
int
smack_sb_mount
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
)
static
int
smack_sb_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
)
{
struct
superblock_smack
*
sbp
=
path
->
dentry
->
d_sb
->
s_security
;
struct
smk_audit_info
ad
;
...
...
security/tomoyo/common.h
浏览文件 @
808d4e3c
...
...
@@ -970,7 +970,7 @@ int tomoyo_init_request_info(struct tomoyo_request_info *r,
const
u8
index
);
int
tomoyo_mkdev_perm
(
const
u8
operation
,
struct
path
*
path
,
const
unsigned
int
mode
,
unsigned
int
dev
);
int
tomoyo_mount_permission
(
char
*
dev_name
,
struct
path
*
path
,
int
tomoyo_mount_permission
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
const
char
*
type
,
unsigned
long
flags
,
void
*
data_page
);
int
tomoyo_open_control
(
const
u8
type
,
struct
file
*
file
);
...
...
security/tomoyo/mount.c
浏览文件 @
808d4e3c
...
...
@@ -71,7 +71,8 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r,
*
* Caller holds tomoyo_read_lock().
*/
static
int
tomoyo_mount_acl
(
struct
tomoyo_request_info
*
r
,
char
*
dev_name
,
static
int
tomoyo_mount_acl
(
struct
tomoyo_request_info
*
r
,
const
char
*
dev_name
,
struct
path
*
dir
,
const
char
*
type
,
unsigned
long
flags
)
{
...
...
@@ -183,7 +184,7 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r, char *dev_name,
*
* Returns 0 on success, negative value otherwise.
*/
int
tomoyo_mount_permission
(
char
*
dev_name
,
struct
path
*
path
,
int
tomoyo_mount_permission
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
const
char
*
type
,
unsigned
long
flags
,
void
*
data_page
)
{
...
...
security/tomoyo/tomoyo.c
浏览文件 @
808d4e3c
...
...
@@ -408,8 +408,8 @@ static int tomoyo_path_chroot(struct path *path)
*
* Returns 0 on success, negative value otherwise.
*/
static
int
tomoyo_sb_mount
(
char
*
dev_name
,
struct
path
*
path
,
char
*
type
,
unsigned
long
flags
,
void
*
data
)
static
int
tomoyo_sb_mount
(
c
onst
c
har
*
dev_name
,
struct
path
*
path
,
c
onst
c
har
*
type
,
unsigned
long
flags
,
void
*
data
)
{
return
tomoyo_mount_permission
(
dev_name
,
path
,
type
,
flags
,
data
);
}
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录