Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp308282imj; Thu, 7 Feb 2019 04:47:23 -0800 (PST) X-Google-Smtp-Source: AHgI3IbCg6AYajI0264Hk8vlPgaaiAySvgu6ye6LL+dxvLH2FAqRmVJEAI90qjLLrQSQgYjtISWQ X-Received: by 2002:a63:c303:: with SMTP id c3mr14681535pgd.268.1549543642930; Thu, 07 Feb 2019 04:47:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549543642; cv=none; d=google.com; s=arc-20160816; b=Pj5N/qdrspakCjVuqePjsumk66gNh86cOM905K8mO+tXuTrMnIYbViY+L/fWEFkK10 p35l7vbE25yaBWoJcI/YQkijQkYGDaHTtz+Tmaj1wqyr+QoeHGbMIm5l0xYZPC4KxzVa ryB/ahQmWNQQnqWYkm9koaVtSJUh2c5yBFTpUI4JCowXf5jjtlEuqDJLV32Y4E9faSJJ KdL9M+MzwQ8cHsW0N9xJ91qVFbQcXLGj25G/AkYZ8CL2bwnFRKIroCNgVLGtXJu/vWwD 5JaxuW2DiGStwbcATCs5OoOHNXvrhxyzcr/CJEbiYL/flQyiB5OrsbqBDXWAbTgu6a9V ngig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=bjD97X0qHS/DHpnYg1hBXKPXU4ntdV3YCP36/ieGHGM=; b=uRcQoAS6JkHvdaSsy9XuFUW49kGfKgUvNimkjOyncqYH0fOQo6ZI2HfEwxZ6+5gDUf YYSt2Gc/Qbl9NrkO0b/fmXzIizrBt/lieF8hAun2KzZoVwQpBI5UPMgtvsHjjUrI0Owl D+HXSc1RsFL5emHebH5XxaDMhivWuNpmRETZdwRkITVZ4S0J3NqTYQdcizU73hR+UU9T jvf8Ronv6U7CuZ3cs1o/fCStnzatzdLgXA+Iy9KpyGlQPPirapuiI6HS6XeW5XaayhBN RZdp2KFsxJGZJbHaj0ojZ1pjZttJH5THtYfuvKxFTRf8iPUP7JvAZj2Dp1PYmXUwQWIf AvfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h8si8264668pgc.397.2019.02.07.04.47.07; Thu, 07 Feb 2019 04:47:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727259AbfBGMpd (ORCPT + 99 others); Thu, 7 Feb 2019 07:45:33 -0500 Received: from mail.ispras.ru ([83.149.199.45]:60648 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726769AbfBGMpc (ORCPT ); Thu, 7 Feb 2019 07:45:32 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 6DFBB5400A9; Thu, 7 Feb 2019 15:45:30 +0300 (MSK) From: Denis Efremov To: Stephen Smalley Cc: Denis Efremov , Casey Schaufler , "Eric W. Biederman" , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 05/10] security: fix documentation for the socket_getpeersec_dgram hook Date: Thu, 7 Feb 2019 15:44:53 +0300 Message-Id: <402a6bb32fac3dff3c71eb5400944dae14bfda9e.1549540487.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The socket_getpeersec_dgram hook was changed in the commit "[AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec patch" (dc49c1f94e34). The arguments @secdata and @seclen were changed to @sock and @secid. This patch updates the documentation accordingly. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 09223911876e..cb93972257be 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -861,9 +861,9 @@ * the IP_PASSSEC option via getsockopt. It can then retrieve the * security state returned by this hook for a packet via the SCM_SECURITY * ancillary message type. - * @skb is the skbuff for the packet being queried - * @secdata is a pointer to a buffer in which to copy the security data - * @seclen is the maximum length for @secdata + * @sock contains the socket structure. + * @skb is the skbuff for the packet being queried. + * @secid pointer to store the secid of the packet. * Return 0 on success, error on failure. * @sk_alloc_security: * Allocate and attach a security structure to the sk->sk_security field, -- 2.17.2