diff options
author | Pablo Neira Ayuso <pablo@netfilter.org> | 2012-06-29 06:15:21 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2012-06-29 16:46:02 -0700 |
commit | a31f2d17b331db970259e875b7223d3aba7e3821 (patch) | |
tree | 0d10021be81446ab360f4240b0d16729f518387f /security | |
parent | dd7f36ba3ce17d4fe85987d83efd5901b0935816 (diff) | |
download | linux-3.10-a31f2d17b331db970259e875b7223d3aba7e3821.tar.gz linux-3.10-a31f2d17b331db970259e875b7223d3aba7e3821.tar.bz2 linux-3.10-a31f2d17b331db970259e875b7223d3aba7e3821.zip |
netlink: add netlink_kernel_cfg parameter to netlink_kernel_create
This patch adds the following structure:
struct netlink_kernel_cfg {
unsigned int groups;
void (*input)(struct sk_buff *skb);
struct mutex *cb_mutex;
};
That can be passed to netlink_kernel_create to set optional configurations
for netlink kernel sockets.
I've populated this structure by looking for NULL and zero parameters at the
existing code. The remaining parameters that always need to be set are still
left in the original interface.
That includes optional parameters for the netlink socket creation. This allows
easy extensibility of this interface in the future.
This patch also adapts all callers to use this new interface.
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
-rw-r--r-- | security/selinux/netlink.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c index 8a23a35b9c5..8a77725423e 100644 --- a/security/selinux/netlink.c +++ b/security/selinux/netlink.c @@ -111,8 +111,12 @@ void selnl_notify_policyload(u32 seqno) static int __init selnl_init(void) { + struct netlink_kernel_cfg cfg = { + .groups = SELNLGRP_MAX, + }; + selnl = netlink_kernel_create(&init_net, NETLINK_SELINUX, - SELNLGRP_MAX, NULL, NULL, THIS_MODULE); + THIS_MODULE, &cfg); if (selnl == NULL) panic("SELinux: Cannot create netlink socket."); netlink_set_nonroot(NETLINK_SELINUX, NL_NONROOT_RECV); |