Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp307018imj; Thu, 7 Feb 2019 04:45:59 -0800 (PST) X-Google-Smtp-Source: AHgI3IaczqDsbehrAR7arXgLt8b08zyg9IrfY5Rgjufw4x9YmrEydlNoHbaGF/lsLoLemKvlU+vO X-Received: by 2002:a62:29c3:: with SMTP id p186mr16164925pfp.117.1549543559697; Thu, 07 Feb 2019 04:45:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549543559; cv=none; d=google.com; s=arc-20160816; b=dVj4ZJd5JXGEgfE1MFR3mdwerujvHYpvBFZ9ojFRwZBlI+1HzVftOeE9gs5cazwfdP mFNyX2cW7pqGkSwjflG3w4F3fDpuGByAWR9j3xMpuC/VvjGpAqNM/pFVoOozE5nQeSO7 oju7w+1JRFex7PT2jKGjNfE7BIdWEKiQJt5j6UH/Sa1NJbc9tfkBbMvSu+ljA5OorqBE azfU8kIFcAzDDgNfzCh6y7RS9d9h3pAmPKh4h0zDtzR+8mZQdEzaa6O2Ddtblaeh/f+B PWhpBD1v6eXF3jwgxvLurQo/fQb4wC6cKGccHoqUZOm91bcgcE12NlvEQ5S1vjkGXaQk Z3HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=VFwq8xgc9s75sVp/X7zWEj9i2AWud7qYVnNEqf5clZE=; b=vO+RdBPDE4DdhXoKRI2P+Ug1gdi24awtb8CSy65WO6WoYu2Ww6Zv19eC2OmQelckJT WhUJWMpnoFYva5SBNMCYze65TO72eytsE7fyGXNtnUEClO9kjnTmo8Zkc9N7OhbmXqZ0 KWzb5accAJCPNRqvHks24SpTP21TQSS+UIRqBUlycS1r7FcWy7cFFEkn86/0+E5VMw+x AstMAsigux1Ha5rZq7ieT7bG5YOOzzr4kcYqkWiWn/iIV9CRqMAq30Lssgm8BG+efg6e 9id0p3gTexKyYDEU4AABCjapah2EReV+I7OQcXzZx5ZNe3YIVfAmUapGzXPdK3clF/uR Mqqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 82si8578749pga.270.2019.02.07.04.45.42; Thu, 07 Feb 2019 04:45:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727206AbfBGMpY (ORCPT + 99 others); Thu, 7 Feb 2019 07:45:24 -0500 Received: from mail.ispras.ru ([83.149.199.45]:60590 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726769AbfBGMpX (ORCPT ); Thu, 7 Feb 2019 07:45:23 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 58A675400AD; Thu, 7 Feb 2019 15:45:21 +0300 (MSK) From: Denis Efremov To: Casey Schaufler Cc: Denis Efremov , "Eric W. Biederman" , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 03/10] security: fix documentation for the socket_post_create hook Date: Thu, 7 Feb 2019 15:44:51 +0300 Message-Id: <79859c6d228789c3f287ccb46bd0ddeb46aefcdd.1549540487.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch slightly fixes the documentation for the socket_post_create hook. The documentation states that i_security field is accessible through inode field of socket structure (i.e., 'sock->inode->i_security'). There is no inode field in the socket structure. The i_security field is accessible through SOCK_INODE macro. The patch updates the documentation to reflect this. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index a0555683db63..80e5f3421b91 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -752,9 +752,9 @@ * socket structure, but rather, the socket security information is stored * in the associated inode. Typically, the inode alloc_security hook will * allocate and and attach security information to - * sock->inode->i_security. This hook may be used to update the - * sock->inode->i_security field with additional information that wasn't - * available when the inode was allocated. + * SOCK_INODE(sock)->i_security. This hook may be used to update the + * SOCK_INODE(sock)->i_security field with additional information that + * wasn't available when the inode was allocated. * @sock contains the newly created socket structure. * @family contains the requested protocol family. * @type contains the requested communications type. -- 2.17.2