diff options
author | Andrii Nakryiko <andrii@kernel.org> | 2024-08-07 01:38:12 +0300 |
---|---|---|
committer | Andrii Nakryiko <andrii@kernel.org> | 2024-09-13 04:57:54 +0300 |
commit | 433d7ce2d86d21274838c9e8c796f4232cd13cdb (patch) | |
tree | 0edfccd22377e193ed1897147e3ce531a5c18d1f /security/security.c | |
parent | eceb7b33e5f3bc1e60047d8695cb937b93a08ced (diff) | |
download | linux-433d7ce2d86d21274838c9e8c796f4232cd13cdb.tar.xz |
security,bpf: constify struct path in bpf_token_create() LSM hook
There is no reason why struct path pointer shouldn't be const-qualified
when being passed into bpf_token_create() LSM hook. Add that const.
Acked-by: Paul Moore <paul@paul-moore.com> (LSM/SELinux)
Suggested-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Diffstat (limited to 'security/security.c')
-rw-r--r-- | security/security.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/security.c b/security/security.c index 8cee5b6c6e6d..d8d0b67ced25 100644 --- a/security/security.c +++ b/security/security.c @@ -5510,7 +5510,7 @@ int security_bpf_prog_load(struct bpf_prog *prog, union bpf_attr *attr, * Return: Returns 0 on success, error on failure. */ int security_bpf_token_create(struct bpf_token *token, union bpf_attr *attr, - struct path *path) + const struct path *path) { return call_int_hook(bpf_token_create, token, attr, path); } |