Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp307963imj; Thu, 7 Feb 2019 04:47:03 -0800 (PST) X-Google-Smtp-Source: AHgI3IZ4hqaxXetnZnCiQMUOP0l4+FQ5CS8ZZOZ5rnWzva2JaSS9i5gnivqfLTb/VaLlXNXVXUvS X-Received: by 2002:a63:5d20:: with SMTP id r32mr14809814pgb.329.1549543623292; Thu, 07 Feb 2019 04:47:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549543623; cv=none; d=google.com; s=arc-20160816; b=meaprHCxPCVgzWx8fVaDc9bsvc1MopLJK8IKePTEf2Yk/hMzBKq92EgcqEBNbu29xq AjqNikGVT0RUblb1jDWFzkTqLpdCeD3U7yPRB0613XSKJ5vV3hLxKx4TUINVHqmyb6ee TGJxemjHMPZmjJIOaLaR3aTs9eAzPYT0OlWm24o+JgQsVbaELwaa+gGxs+zJNm76N4d4 Ru1yXIrwVD/zpiDRThiSoEEXVQCIjFS+bwRttYjqXUvVmOTOVoVm2KkcQLMnd8jut8I/ onQvbowBwn4ismC2hVlkSCwnXPQNIF+Ea77oz8YOE8Ywq3Y3qGvW9ViQJZLid5cM6wbf W5zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=OUjFYNL4sHGVVPhs5NzUKm+kHKjU4bsbYlezbtASckQ=; b=F1jden+qqTDGEPzRj/foagYAcAJ21jP+f2qB6+mIybdb+rpsuQzLOu5j2Cr4nchAOy +ZIxE47TKLOI7GQTGf5Kj8z1p1YkKq4dx31Xq4gLdzLZIIRw4wuM4okqz6v83l/+Vp4R scNq9S0aqIprvGReXWIZnYRekUvxrLcve7V/gpoutQeivUIxt2IAosniTkGbAn+FlltF Q++aGdjsK459GDiabIY4prGJBLtHvcUw9ZPNFroFY+5Gbe6N9EATJTjcsqS+5fxRsVgJ NtVVtw9A7Dr7Drc1+vrSgjnsTxOk+4eI9eTUxxiG7JgHZUylT29tshYdchf9sqxZlSoD x4kQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a34si8457574pgb.458.2019.02.07.04.46.47; Thu, 07 Feb 2019 04:47:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727331AbfBGMpt (ORCPT + 99 others); Thu, 7 Feb 2019 07:45:49 -0500 Received: from mail.ispras.ru ([83.149.199.45]:60742 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727305AbfBGMpq (ORCPT ); Thu, 7 Feb 2019 07:45:46 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id E51285400AD; Thu, 7 Feb 2019 15:45:43 +0300 (MSK) From: Denis Efremov To: "Eric W. Biederman" Cc: Denis Efremov , Casey Schaufler , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 08/10] security: fix documentation for the msg_queue_* hooks Date: Thu, 7 Feb 2019 15:44:56 +0300 Message-Id: <3fba6c919f2125262b9939cb36d8df912f834433.1549540487.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The msg_queue_* hooks were changed in the commit "msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks" (d8c6e8543294). The type of the argument msq was changed from msq_queue to kern_ipc_perm. This patch updates the documentation for the hooks accordingly. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 36 ++++++++++++++++++------------------ 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 307714b8b072..f61f39c73208 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1093,41 +1093,41 @@ * * @msg_queue_alloc_security: * Allocate and attach a security structure to the - * msq->q_perm.security field. The security field is initialized to + * perm->security field. The security field is initialized to * NULL when the structure is first created. - * @msq contains the message queue structure to be modified. + * @perm contains the IPC permissions of the message queue. * Return 0 if operation was successful and permission is granted. * @msg_queue_free_security: * Deallocate security structure for this message queue. - * @msq contains the message queue structure to be modified. + * @perm contains the IPC permissions of the message queue. * @msg_queue_associate: * Check permission when a message queue is requested through the - * msgget system call. This hook is only called when returning the + * msgget system call. This hook is only called when returning the * message queue identifier for an existing message queue, not when a * new message queue is created. - * @msq contains the message queue to act upon. + * @perm contains the IPC permissions of the message queue. * @msqflg contains the operation control flags. * Return 0 if permission is granted. * @msg_queue_msgctl: * Check permission when a message control operation specified by @cmd - * is to be performed on the message queue @msq. - * The @msq may be NULL, e.g. for IPC_INFO or MSG_INFO. - * @msq contains the message queue to act upon. May be NULL. + * is to be performed on the message queue with permissions @perm. + * The @perm may be NULL, e.g. for IPC_INFO or MSG_INFO. + * @perm contains the IPC permissions of the msg queue. May be NULL. * @cmd contains the operation to be performed. * Return 0 if permission is granted. * @msg_queue_msgsnd: * Check permission before a message, @msg, is enqueued on the message - * queue, @msq. - * @msq contains the message queue to send message to. + * queue with permissions @perm. + * @perm contains the IPC permissions of the message queue. * @msg contains the message to be enqueued. * @msqflg contains operational flags. * Return 0 if permission is granted. * @msg_queue_msgrcv: * Check permission before a message, @msg, is removed from the message - * queue, @msq. The @target task structure contains a pointer to the + * queue. The @target task structure contains a pointer to the * process that will be receiving the message (not equal to the current * process when inline receives are being performed). - * @msq contains the message queue to retrieve message from. + * @perm contains the IPC permissions of the message queue. * @msg contains the message destination. * @target contains the task structure for recipient process. * @type contains the type of message requested. @@ -1615,13 +1615,13 @@ union security_list_options { int (*msg_msg_alloc_security)(struct msg_msg *msg); void (*msg_msg_free_security)(struct msg_msg *msg); - int (*msg_queue_alloc_security)(struct kern_ipc_perm *msq); - void (*msg_queue_free_security)(struct kern_ipc_perm *msq); - int (*msg_queue_associate)(struct kern_ipc_perm *msq, int msqflg); - int (*msg_queue_msgctl)(struct kern_ipc_perm *msq, int cmd); - int (*msg_queue_msgsnd)(struct kern_ipc_perm *msq, struct msg_msg *msg, + int (*msg_queue_alloc_security)(struct kern_ipc_perm *perm); + void (*msg_queue_free_security)(struct kern_ipc_perm *perm); + int (*msg_queue_associate)(struct kern_ipc_perm *perm, int msqflg); + int (*msg_queue_msgctl)(struct kern_ipc_perm *perm, int cmd); + int (*msg_queue_msgsnd)(struct kern_ipc_perm *perm, struct msg_msg *msg, int msqflg); - int (*msg_queue_msgrcv)(struct kern_ipc_perm *msq, struct msg_msg *msg, + int (*msg_queue_msgrcv)(struct kern_ipc_perm *perm, struct msg_msg *msg, struct task_struct *target, long type, int mode); -- 2.17.2