diff options
author | Günther Noack <gnoack@google.com> | 2023-12-08 16:51:13 +0100 |
---|---|---|
committer | Mickaël Salaün <mic@digikod.net> | 2024-01-03 12:07:52 +0100 |
commit | 8fd80721ec0791826a9ab56656d26931811702f8 (patch) | |
tree | dde3504e722c91839c01c4c02c1ee15891649909 /security/landlock | |
parent | selftests/landlock: Add tests to check unhandled rule's access rights (diff) | |
download | linux-8fd80721ec0791826a9ab56656d26931811702f8.tar.xz linux-8fd80721ec0791826a9ab56656d26931811702f8.zip |
landlock: Remove remaining "inline" modifiers in .c files [v5.15]
For module-internal static functions, compilers are already in a good
position to decide whether to inline them or not.
Suggested-by: Mickaël Salaün <mic@digikod.net>
Signed-off-by: Günther Noack <gnoack@google.com>
Link: https://lore.kernel.org/r/20231208155121.1943775-2-gnoack@google.com
[mic: Split patch for Linux 5.15]
Signed-off-by: Mickaël Salaün <mic@digikod.net>
Diffstat (limited to 'security/landlock')
-rw-r--r-- | security/landlock/fs.c | 6 | ||||
-rw-r--r-- | security/landlock/ruleset.c | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/security/landlock/fs.c b/security/landlock/fs.c index bc7c126deea2..8eccf170532e 100644 --- a/security/landlock/fs.c +++ b/security/landlock/fs.c @@ -193,7 +193,7 @@ int landlock_append_fs_rule(struct landlock_ruleset *const ruleset, * * Returns NULL if no rule is found or if @dentry is negative. */ -static inline const struct landlock_rule * +static const struct landlock_rule * find_rule(const struct landlock_ruleset *const domain, const struct dentry *const dentry) { @@ -565,8 +565,8 @@ static inline int check_access_path(const struct landlock_ruleset *const domain, return -EACCES; } -static inline int current_check_access_path(const struct path *const path, - const access_mask_t access_request) +static int current_check_access_path(const struct path *const path, + const access_mask_t access_request) { const struct landlock_ruleset *const dom = get_current_fs_domain(); diff --git a/security/landlock/ruleset.c b/security/landlock/ruleset.c index ffedc99f2b68..789c81b26a50 100644 --- a/security/landlock/ruleset.c +++ b/security/landlock/ruleset.c @@ -305,7 +305,7 @@ int landlock_insert_rule(struct landlock_ruleset *const ruleset, return insert_rule(ruleset, id, &layers, ARRAY_SIZE(layers)); } -static inline void get_hierarchy(struct landlock_hierarchy *const hierarchy) +static void get_hierarchy(struct landlock_hierarchy *const hierarchy) { if (hierarchy) refcount_inc(&hierarchy->usage); |