summaryrefslogtreecommitdiffstats
path: root/security/security.c
diff options
context:
space:
mode:
authorWei Yongjun <weiyongjun1@huawei.com>2019-01-16 05:44:32 +0000
committerJames Morris <james.morris@microsoft.com>2019-01-18 11:46:44 -0800
commit3e8c73671244af16f1a6042f1c10d13b75cd1156 (patch)
treee21ca9a80022c6b4938fb1398ff2b90158823a1f /security/security.c
parent1cfb2a512e74e577bb0ed7c8d76df90a41a83f6a (diff)
downloadlinux-3e8c73671244af16f1a6042f1c10d13b75cd1156.tar.gz
linux-3e8c73671244af16f1a6042f1c10d13b75cd1156.tar.bz2
linux-3e8c73671244af16f1a6042f1c10d13b75cd1156.zip
LSM: Make some functions static
Fixes the following sparse warnings: security/security.c:533:5: warning: symbol 'lsm_task_alloc' was not declared. Should it be static? security/security.c:554:5: warning: symbol 'lsm_ipc_alloc' was not declared. Should it be static? security/security.c:575:5: warning: symbol 'lsm_msg_msg_alloc' was not declared. Should it be static? Fixes: f4ad8f2c4076 ("LSM: Infrastructure management of the task security") Signed-off-by: Wei Yongjun <weiyongjun1@huawei.com> Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'security/security.c')
-rw-r--r--security/security.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/security/security.c b/security/security.c
index 992b612c819a..3664fb9d5cf7 100644
--- a/security/security.c
+++ b/security/security.c
@@ -530,7 +530,7 @@ int lsm_inode_alloc(struct inode *inode)
*
* Returns 0, or -ENOMEM if memory can't be allocated.
*/
-int lsm_task_alloc(struct task_struct *task)
+static int lsm_task_alloc(struct task_struct *task)
{
if (blob_sizes.lbs_task == 0) {
task->security = NULL;
@@ -551,7 +551,7 @@ int lsm_task_alloc(struct task_struct *task)
*
* Returns 0, or -ENOMEM if memory can't be allocated.
*/
-int lsm_ipc_alloc(struct kern_ipc_perm *kip)
+static int lsm_ipc_alloc(struct kern_ipc_perm *kip)
{
if (blob_sizes.lbs_ipc == 0) {
kip->security = NULL;
@@ -572,7 +572,7 @@ int lsm_ipc_alloc(struct kern_ipc_perm *kip)
*
* Returns 0, or -ENOMEM if memory can't be allocated.
*/
-int lsm_msg_msg_alloc(struct msg_msg *mp)
+static int lsm_msg_msg_alloc(struct msg_msg *mp)
{
if (blob_sizes.lbs_msg_msg == 0) {
mp->security = NULL;