aboutsummaryrefslogtreecommitdiff
path: root/kernel/ucount.c
diff options
context:
space:
mode:
authorGravatar Thomas Weißschuh <linux@weissschuh.net> 2024-03-15 19:11:31 +0100
committerGravatar Joel Granados <j.granados@samsung.com> 2024-04-24 09:43:54 +0200
commit795f90c6f13c30484ff10355a6775979f57f78cb (patch)
treece6f6f75381431c15bf0963770ba8c8ae345ee77 /kernel/ucount.c
parentsysctl: treewide: drop unused argument ctl_table_root::set_ownership(table) (diff)
downloadlinux-795f90c6f13c30484ff10355a6775979f57f78cb.tar.gz
linux-795f90c6f13c30484ff10355a6775979f57f78cb.tar.bz2
linux-795f90c6f13c30484ff10355a6775979f57f78cb.zip
sysctl: treewide: constify argument ctl_table_root::permissions(table)
The permissions callback should not modify the ctl_table. Enforce this expectation via the typesystem. This is a step to put "struct ctl_table" into .rodata throughout the kernel. The patch was created with the following coccinelle script: @@ identifier func, head, ctl; @@ int func( struct ctl_table_header *head, - struct ctl_table *ctl) + const struct ctl_table *ctl) { ... } (insert_entry() from fs/proc/proc_sysctl.c is a false-positive) No additional occurrences of '.permissions =' were found after a tree-wide search for places missed by the conccinelle script. Reviewed-by: Joel Granados <j.granados@samsung.com> Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> Signed-off-by: Joel Granados <j.granados@samsung.com>
Diffstat (limited to 'kernel/ucount.c')
-rw-r--r--kernel/ucount.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/ucount.c b/kernel/ucount.c
index e196da0204dc..4d5b9c12c014 100644
--- a/kernel/ucount.c
+++ b/kernel/ucount.c
@@ -38,7 +38,7 @@ static int set_is_seen(struct ctl_table_set *set)
}
static int set_permissions(struct ctl_table_header *head,
- struct ctl_table *table)
+ const struct ctl_table *table)
{
struct user_namespace *user_ns =
container_of(head->set, struct user_namespace, set);