Received: by 10.213.65.68 with SMTP id h4csp961120imn; Wed, 28 Mar 2018 16:53:38 -0700 (PDT) X-Google-Smtp-Source: AIpwx49Z1EuhvQR7zjqryormzUjJiyiOGnpbKEvgUp3HckdOnea94NqY4131QS5WGEgLPLUqIUU5 X-Received: by 2002:a17:902:51ce:: with SMTP id y72-v6mr5691645plh.157.1522281217479; Wed, 28 Mar 2018 16:53:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522281217; cv=none; d=google.com; s=arc-20160816; b=rB/iR9/RyDsvEcgF1FguLlkWOMV7MK5r8SbJCNZaTMiJU9zNLZC3RDRqAZIDz+Pspm 57QJEU2RR/uKJm56/bXpAuxvSUbXwNVCmNYLQSrs2GZ8Yr/63OvscoUSykKvIdR/NRHS DZ7PBwRoGP/sPflN1hD6h5YkU7GNGI1/W48vXCOiLmh8CRMLQIcwuorXhcKDywqLfKIv tc5TDeRW//usS0SVPJJDUKvJgsGNTDxY9noXsl8NmHLiAFaBGXhcA4lObXaKD/iDncGA /2/UMwUGbE4XK7lHeqlGNw1qc/QOWeUmFfqF4YLMhdL5xqUGTsVpUqDziwevNd5YJP41 RKtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=IANgqs2ZecZoakE64whgm2a+PUMHGcxmbAcjDyGA5Fw=; b=n5i/sLZ/cqXTO0l0s/L9kHCmfybVMHLWdxaPjtUeiwKMG500yuz+zlIMuECQNdaeq/ 31gqMi9cBtg7kBTNCeaQxaZAJUSKNvBL16RK+2Pn5/Xep8dzde8DIXcbhvSq8915QVSw kR8f61+tyuhdssWZr8gLZ3kuWhZv26AwGmhsL60Op7UNsLEm72LvStIEN1J1S4YmDqWU TFy+FbN4Hr9GoXyGeyfbQ62gZ5cnlAMY0Eo1VeinoqlZjutDZ0Q9jXFvhiw2BAg2GvMH E1h55Opo1lwwtlkT0zNPvvAoWXvip+OIzhEEp4/cF/RuSFgXjKiuRsawWVsikxHblhQQ W9Fg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e18si3134586pgq.815.2018.03.28.16.53.23; Wed, 28 Mar 2018 16:53:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751868AbeC1XwZ (ORCPT + 99 others); Wed, 28 Mar 2018 19:52:25 -0400 Received: from mx2.suse.de ([195.135.220.15]:35892 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751113AbeC1XwX (ORCPT ); Wed, 28 Mar 2018 19:52:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 00D0BACE5; Wed, 28 Mar 2018 23:52:22 +0000 (UTC) Date: Wed, 28 Mar 2018 16:40:01 -0700 From: Davidlohr Bueso To: "Eric W. Biederman" Cc: Linux Containers , esyr@redhat.com, jannh@google.com, khlebnikov@yandex-team.ru, linux-api@vger.kernel.org, serge.hallyn@ubuntu.com, linux-kernel@vger.kernel.org, prakash.sangappa@oracle.com, linux-security-module@vger.kernel.org, luto@kernel.org, oleg@redhat.com, akpm@linux-foundation.org, Nagarathnam Muthusamy , Pavel Emelyanov Subject: Re: [REVIEW][PATCH 12/11] ipc: Directly call the security hook in ipc_ops.associate Message-ID: <20180328234001.asfvlyjawfmklpms@linux-n805> References: <1520875093-18174-1-git-send-email-nagarathnam.muthusamy@oracle.com> <87vadzqqq6.fsf@xmission.com> <990e88fa-ab50-9645-b031-14e1afbf7ccc@oracle.com> <877eqejowd.fsf@xmission.com> <3a46a03d-e4dd-59b6-e25f-0020be1b1dc9@oracle.com> <87a7v2z2qa.fsf@xmission.com> <87vadmobdw.fsf_-_@xmission.com> <877eq2m3or.fsf_-_@xmission.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <877eq2m3or.fsf_-_@xmission.com> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 24 Mar 2018, Eric W. Biederman wrote: > >After the last round of cleanups the shm, sem, and msg associate >operations just became trivial wrappers around the appropriate security >method. Simplify things further by just calling the security method >directly. > >Signed-off-by: "Eric W. Biederman" >--- > ipc/msg.c | 10 +--------- > ipc/sem.c | 10 +--------- > ipc/shm.c | 10 +--------- > 3 files changed, 3 insertions(+), 27 deletions(-) This is nice to see.