Commit e53cfda5 authored by Al Viro's avatar Al Viro

tomoyo_close_control: don't bother with return value

Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
parent fca660be
...@@ -2681,10 +2681,8 @@ ssize_t tomoyo_write_control(struct tomoyo_io_buffer *head, ...@@ -2681,10 +2681,8 @@ ssize_t tomoyo_write_control(struct tomoyo_io_buffer *head,
* tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface. * tomoyo_close_control - close() for /sys/kernel/security/tomoyo/ interface.
* *
* @head: Pointer to "struct tomoyo_io_buffer". * @head: Pointer to "struct tomoyo_io_buffer".
*
* Returns 0.
*/ */
int tomoyo_close_control(struct tomoyo_io_buffer *head) void tomoyo_close_control(struct tomoyo_io_buffer *head)
{ {
/* /*
* If the file is /sys/kernel/security/tomoyo/query , decrement the * If the file is /sys/kernel/security/tomoyo/query , decrement the
...@@ -2694,7 +2692,6 @@ int tomoyo_close_control(struct tomoyo_io_buffer *head) ...@@ -2694,7 +2692,6 @@ int tomoyo_close_control(struct tomoyo_io_buffer *head)
atomic_dec_and_test(&tomoyo_query_observers)) atomic_dec_and_test(&tomoyo_query_observers))
wake_up_all(&tomoyo_answer_wait); wake_up_all(&tomoyo_answer_wait);
tomoyo_notify_gc(head, false); tomoyo_notify_gc(head, false);
return 0;
} }
/** /**
......
...@@ -958,7 +958,7 @@ const struct tomoyo_path_info *tomoyo_path_matches_group ...@@ -958,7 +958,7 @@ const struct tomoyo_path_info *tomoyo_path_matches_group
(const struct tomoyo_path_info *pathname, const struct tomoyo_group *group); (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group);
int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, int tomoyo_check_open_permission(struct tomoyo_domain_info *domain,
struct path *path, const int flag); struct path *path, const int flag);
int tomoyo_close_control(struct tomoyo_io_buffer *head); void tomoyo_close_control(struct tomoyo_io_buffer *head);
int tomoyo_env_perm(struct tomoyo_request_info *r, const char *env); int tomoyo_env_perm(struct tomoyo_request_info *r, const char *env);
int tomoyo_execute_permission(struct tomoyo_request_info *r, int tomoyo_execute_permission(struct tomoyo_request_info *r,
const struct tomoyo_path_info *filename); const struct tomoyo_path_info *filename);
......
...@@ -143,14 +143,13 @@ static int tomoyo_open(struct inode *inode, struct file *file) ...@@ -143,14 +143,13 @@ static int tomoyo_open(struct inode *inode, struct file *file)
/** /**
* tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface.
* *
* @inode: Pointer to "struct inode".
* @file: Pointer to "struct file". * @file: Pointer to "struct file".
* *
* Returns 0 on success, negative value otherwise.
*/ */
static int tomoyo_release(struct inode *inode, struct file *file) static int tomoyo_release(struct inode *inode, struct file *file)
{ {
return tomoyo_close_control(file->private_data); tomoyo_close_control(file->private_data);
return 0;
} }
/** /**
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment