diff options
author | Khadija Kamran <kamrankhadijadj@gmail.com> | 2023-08-23 09:47:56 +0200 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2023-09-14 00:13:05 +0200 |
commit | 64fc9526147c7fc14535134d8ea79b9c8dc549a7 (patch) | |
tree | 20aabf4c2f533e7b164f5acab23a9ae40b90b607 /security/apparmor | |
parent | lsm: constify 'file' parameter in security_bprm_creds_from_file() (diff) | |
download | linux-64fc9526147c7fc14535134d8ea79b9c8dc549a7.tar.xz linux-64fc9526147c7fc14535134d8ea79b9c8dc549a7.zip |
lsm: constify 'bprm' parameter in security_bprm_committing_creds()
The 'bprm_committing_creds' hook has implementations registered in
SELinux and Apparmor. Looking at the function implementations we observe
that the 'bprm' parameter is not changing.
Mark the 'bprm' parameter of LSM hook security_bprm_committing_creds()
as 'const' since it will not be changing in the LSM hook.
Signed-off-by: Khadija Kamran <kamrankhadijadj@gmail.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/apparmor')
-rw-r--r-- | security/apparmor/lsm.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index 108eccc5ada5..b03f46e0f6c5 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c @@ -734,7 +734,7 @@ fail: * apparmor_bprm_committing_creds - do task cleanup on committing new creds * @bprm: binprm for the exec (NOT NULL) */ -static void apparmor_bprm_committing_creds(struct linux_binprm *bprm) +static void apparmor_bprm_committing_creds(const struct linux_binprm *bprm) { struct aa_label *label = aa_current_raw_label(); struct aa_label *new_label = cred_label(bprm->cred); |