sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks
All of the implementations of security hooks that take sem_array only access sem_perm the struct kern_ipc_perm member. This means the dependencies of the sem security hooks can be simplified by passing the kern_ipc_perm member of sem_array. Making this change will allow struct sem and struct sem_array to become private to ipc/sem.c. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
This commit is contained in:
@@ -1592,11 +1592,11 @@ union security_list_options {
|
||||
int (*shm_shmat)(struct shmid_kernel *shp, char __user *shmaddr,
|
||||
int shmflg);
|
||||
|
||||
int (*sem_alloc_security)(struct sem_array *sma);
|
||||
void (*sem_free_security)(struct sem_array *sma);
|
||||
int (*sem_associate)(struct sem_array *sma, int semflg);
|
||||
int (*sem_semctl)(struct sem_array *sma, int cmd);
|
||||
int (*sem_semop)(struct sem_array *sma, struct sembuf *sops,
|
||||
int (*sem_alloc_security)(struct kern_ipc_perm *sma);
|
||||
void (*sem_free_security)(struct kern_ipc_perm *sma);
|
||||
int (*sem_associate)(struct kern_ipc_perm *sma, int semflg);
|
||||
int (*sem_semctl)(struct kern_ipc_perm *sma, int cmd);
|
||||
int (*sem_semop)(struct kern_ipc_perm *sma, struct sembuf *sops,
|
||||
unsigned nsops, int alter);
|
||||
|
||||
int (*netlink_send)(struct sock *sk, struct sk_buff *skb);
|
||||
|
Reference in New Issue
Block a user