Received: by 10.213.65.68 with SMTP id h4csp950507imn; Wed, 28 Mar 2018 16:34:12 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+Wsx1wK2pyuCQgt9Wea2vm7UcIS6fnRRloUCsCtFFTuc4OHpyH3nEZmnQItlNrKq5perBa X-Received: by 2002:a17:902:9895:: with SMTP id s21-v6mr566286plp.177.1522280052502; Wed, 28 Mar 2018 16:34:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522280052; cv=none; d=google.com; s=arc-20160816; b=eh+bvU/dCyXJEn1IAj9LiOLdsJf1/t0DzbKa7C7CDxxxxMmnNyFGrnYqiegJSZ2NXk vaxgFXwVv6At+vCsU8m9ANPOTVQ85n6ThzzkzD+bVLbBDvdEocSGIR++iUfm0EDEzt+M +gqWNWJxTAfeGqOPDVV+0AqfevCnHkg9j3CgeVgHXSSh3uqOadyItGK3w1p6qTfIU68b 0U9/Ybx+RsGkZsx6/ydj/lPZV1Xxe4H1kINNhsy3GrUMG2DHKprBNt4usYTXYRONnbB8 opyNVadfiWNvriC20PQTNs2tf9W7E5wVtL1W8fO6q3Rklk02iCBIH8jdZLR3xKbSg5Ms qz+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=8N65b845INwcfyQnn9jPECMr+89MoOPL4TakBQ+HNZU=; b=xOByQj0zgs0ttQ6kJiV5kzQJIRjE0SpTRdd1cUiCPfD7SAdcRgrmy6fd0XBxX/cslT ECJTK63x70P1XYEpT4d/7lhouWzECuDBoDklTp+srLPTTg9mq0cdlnDU1AIZLHzb6R7t 3yxYOrLBLF0GBCsjEKpDtq8XdlHLe2iJ2OzAhQGEn3XUf/TULGG8aPZwfoodPTRPdhNS CY8mHRtxHlaco9hp/5Fcvv/a/qn13lzBj1pyMsQcv3WyOeKTrA7ghL3bVuKM9Y2J0vYP 8hw8OK2YcofZs9Yn2Bl4hAlH6vOPJbZmgR7xE6ZlTnPMwWYDlaqAx0194p8Al4evJBX5 Jo/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u13si3170161pgq.232.2018.03.28.16.33.49; Wed, 28 Mar 2018 16:34:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751216AbeC1Xc4 (ORCPT + 99 others); Wed, 28 Mar 2018 19:32:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:34688 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750971AbeC1Xcy (ORCPT ); Wed, 28 Mar 2018 19:32:54 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 0B7A6B099; Wed, 28 Mar 2018 23:32:52 +0000 (UTC) Date: Wed, 28 Mar 2018 16:20:29 -0700 From: Davidlohr Bueso To: Casey Schaufler Cc: "Eric W. Biederman" , Linux Containers , linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, khlebnikov@yandex-team.ru, prakash.sangappa@oracle.com, luto@kernel.org, akpm@linux-foundation.org, oleg@redhat.com, serge.hallyn@ubuntu.com, esyr@redhat.com, jannh@google.com, linux-security-module@vger.kernel.org, Pavel Emelyanov , Nagarathnam Muthusamy Subject: Re: [REVIEW][PATCH 01/11] sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks Message-ID: <20180328232029.k47nocmmahtxqmg2@linux-n805> References: <87vadmobdw.fsf_-_@xmission.com> <20180323191614.32489-1-ebiederm@xmission.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 23 Mar 2018, Casey Schaufler wrote: >A kern_ipc_perm pointer is conventionally named isp in this code. So the ideal name would be ipcp, used in core ipc, but I have no strong preference over isp, ipp or whatever other name is used in LSMs. The important thing is that kern_ipc_perm should not be called sma or any ipc specific name. >How about instead: Agreed. > >-static int smack_sem_alloc_security(struct sem_array *sma) >+static int smack_sem_alloc_security(struct kern_ipc_perm *isp) > { >- struct kern_ipc_perm *isp = &sma->sem_perm; > Thanks, Davidlohr