diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2018-03-24 07:41:55 +0300 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2018-03-27 23:53:56 +0300 |
commit | 50ab44b1c5d1b13305ce8acb74c8e50e0dcbaedc (patch) | |
tree | a26481edc4510e3a92c7993e1567e56d8d71a1da /ipc/shm.c | |
parent | 51d6f2635b39709ee5e62479be23d423b760292c (diff) | |
download | linux-50ab44b1c5d1b13305ce8acb74c8e50e0dcbaedc.tar.xz |
ipc: Directly call the security hook in ipc_ops.associate
After the last round of cleanups the shm, sem, and msg associate
operations just became trivial wrappers around the appropriate security
method. Simplify things further by just calling the security method
directly.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'ipc/shm.c')
-rw-r--r-- | ipc/shm.c | 10 |
1 files changed, 1 insertions, 9 deletions
diff --git a/ipc/shm.c b/ipc/shm.c index 932b7e411c6c..018db3d0e70e 100644 --- a/ipc/shm.c +++ b/ipc/shm.c @@ -659,14 +659,6 @@ no_file: /* * Called with shm_ids.rwsem and ipcp locked. */ -static inline int shm_security(struct kern_ipc_perm *ipcp, int shmflg) -{ - return security_shm_associate(ipcp, shmflg); -} - -/* - * Called with shm_ids.rwsem and ipcp locked. - */ static inline int shm_more_checks(struct kern_ipc_perm *ipcp, struct ipc_params *params) { @@ -684,7 +676,7 @@ SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) struct ipc_namespace *ns; static const struct ipc_ops shm_ops = { .getnew = newseg, - .associate = shm_security, + .associate = security_shm_associate, .more_checks = shm_more_checks, }; struct ipc_params shm_params; |