diff options
Diffstat (limited to 'sys/security')
-rw-r--r-- | sys/security/audit/audit_arg.c | 4 | ||||
-rw-r--r-- | sys/security/audit/audit_syscalls.c | 4 | ||||
-rw-r--r-- | sys/security/audit/audit_worker.c | 4 | ||||
-rw-r--r-- | sys/security/mac/mac_process.c | 4 | ||||
-rw-r--r-- | sys/security/mac/mac_syscalls.c | 4 | ||||
-rw-r--r-- | sys/security/mac_veriexec/mac_veriexec.c | 2 | ||||
-rw-r--r-- | sys/security/mac_veriexec_parser/mac_veriexec_parser.c | 4 |
7 files changed, 13 insertions, 13 deletions
diff --git a/sys/security/audit/audit_arg.c b/sys/security/audit/audit_arg.c index 13fd16f2ea38..f50d77281095 100644 --- a/sys/security/audit/audit_arg.c +++ b/sys/security/audit/audit_arg.c @@ -690,7 +690,7 @@ audit_arg_file(struct proc *p, struct file *fp) vp = fp->f_vnode; vn_lock(vp, LK_SHARED | LK_RETRY); audit_arg_vnode1(vp); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); break; case DTYPE_SOCKET: @@ -978,6 +978,6 @@ audit_sysclose(struct thread *td, int fd) vp = fp->f_vnode; vn_lock(vp, LK_SHARED | LK_RETRY); audit_arg_vnode1(vp); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); fdrop(fp, td); } diff --git a/sys/security/audit/audit_syscalls.c b/sys/security/audit/audit_syscalls.c index a6680ede392e..8548c4e1f74b 100644 --- a/sys/security/audit/audit_syscalls.c +++ b/sys/security/audit/audit_syscalls.c @@ -811,13 +811,13 @@ sys_auditctl(struct thread *td, struct auditctl_args *uap) vp = nd.ni_vp; #ifdef MAC error = mac_system_check_auditctl(td->td_ucred, vp); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); if (error) { vn_close(vp, AUDIT_CLOSE_FLAGS, td->td_ucred, td); return (error); } #else - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); #endif NDFREE(&nd, NDF_ONLY_PNBUF); if (vp->v_type != VREG) { diff --git a/sys/security/audit/audit_worker.c b/sys/security/audit/audit_worker.c index f169ab8d9dd1..de9bdfc4b5e4 100644 --- a/sys/security/audit/audit_worker.c +++ b/sys/security/audit/audit_worker.c @@ -119,7 +119,7 @@ audit_worker_sync_vp(struct vnode *vp, struct mount *mp, const char *fmt, ...) if (error == 0) { VOP_LOCK(vp, LK_EXCLUSIVE | LK_RETRY); (void)VOP_FSYNC(vp, MNT_WAIT, curthread); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); vn_finished_write(mp1); } vfs_unbusy(mp); @@ -503,7 +503,7 @@ audit_rotate_vnode(struct ucred *cred, struct vnode *vp) vn_lock(vp, LK_SHARED | LK_RETRY); if (VOP_GETATTR(vp, &vattr, cred) != 0) vattr.va_size = 0; - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); } else { vattr.va_size = 0; } diff --git a/sys/security/mac/mac_process.c b/sys/security/mac/mac_process.c index bc119dbbc7f9..45b366ecd22e 100644 --- a/sys/security/mac/mac_process.c +++ b/sys/security/mac/mac_process.c @@ -304,7 +304,7 @@ mac_proc_vm_revoke_recurse(struct thread *td, struct ucred *cred, vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); result = vme->max_protection; mac_vnode_check_mmap_downgrade(cred, vp, &result); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); /* * Find out what maximum protection we may be allowing now * but a policy needs to get removed. @@ -339,7 +339,7 @@ mac_proc_vm_revoke_recurse(struct thread *td, struct ucred *cred, vm_object_page_clean(object, offset, offset + vme->end - vme->start, OBJPC_SYNC); VM_OBJECT_WUNLOCK(object); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); vn_finished_write(mp); vm_object_deallocate(object); /* diff --git a/sys/security/mac/mac_syscalls.c b/sys/security/mac/mac_syscalls.c index 20e6770fef78..c28a5e99c656 100644 --- a/sys/security/mac/mac_syscalls.c +++ b/sys/security/mac/mac_syscalls.c @@ -268,7 +268,7 @@ sys___mac_get_fd(struct thread *td, struct __mac_get_fd_args *uap) intlabel = mac_vnode_label_alloc(); vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); mac_vnode_copy_label(vp->v_label, intlabel); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); error = mac_vnode_externalize_label(intlabel, elements, buffer, mac.m_buflen); mac_vnode_label_free(intlabel); @@ -436,7 +436,7 @@ sys___mac_set_fd(struct thread *td, struct __mac_set_fd_args *uap) } vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); error = vn_setlabel(vp, intlabel, td->td_ucred); - VOP_UNLOCK(vp, 0); + VOP_UNLOCK(vp); vn_finished_write(mp); mac_vnode_label_free(intlabel); break; diff --git a/sys/security/mac_veriexec/mac_veriexec.c b/sys/security/mac_veriexec/mac_veriexec.c index 8bd610192caa..5867320a2018 100644 --- a/sys/security/mac_veriexec/mac_veriexec.c +++ b/sys/security/mac_veriexec/mac_veriexec.c @@ -691,7 +691,7 @@ mac_veriexec_syscall(struct thread *td, int call, void *arg) ((va.va_mode & (S_IXUSR|S_IXGRP|S_IXOTH)) == 0), td); check_done: /* Release the lock we obtained earlier */ - VOP_UNLOCK(img.vp, 0); + VOP_UNLOCK(img.vp); cleanup_file: fdrop(fp, td); break; diff --git a/sys/security/mac_veriexec_parser/mac_veriexec_parser.c b/sys/security/mac_veriexec_parser/mac_veriexec_parser.c index d34cb464dfab..dc3b1301f9ee 100644 --- a/sys/security/mac_veriexec_parser/mac_veriexec_parser.c +++ b/sys/security/mac_veriexec_parser/mac_veriexec_parser.c @@ -291,7 +291,7 @@ read_manifest(char *path, unsigned char *digest) data[bytes_read] = '\0'; - VOP_UNLOCK(nid.ni_vp, 0); + VOP_UNLOCK(nid.ni_vp); (void)vn_close(nid.ni_vp, FREAD, curthread->td_ucred, curthread); /* @@ -370,7 +370,7 @@ parse_entry(char *entry, char *prefix) mtx_unlock(&ve_mutex); out: - VOP_UNLOCK(nid.ni_vp, 0); + VOP_UNLOCK(nid.ni_vp); vn_close(nid.ni_vp, FREAD, curthread->td_ucred, curthread); return (rc); } |