Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1029473img; Tue, 26 Feb 2019 12:51:20 -0800 (PST) X-Google-Smtp-Source: AHgI3IbDLvstd0hfVK1nDaCG9r9uI952K29Y3N+zH3YG6pkB/G6LWs1GGO6Z417GwyVLoOC7OsIZ X-Received: by 2002:a65:6546:: with SMTP id a6mr22184015pgw.296.1551214280809; Tue, 26 Feb 2019 12:51:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214280; cv=none; d=google.com; s=arc-20160816; b=vJjkniEXbyTCHiSegfUugR4dPeEsV+UGsLgIanBwbAq68D5RnN5pKMsKpF+BEdDR9D tRo3JM+hQYBowb69vXaMySHgtKTtE1KzLZzLF136H3ifCK15yWRkTXTKm5OVyT2KERFd 8yJt4pmq8I8IMqlDbMp4tnUcfvqXwBY75a9h+Qp5GXyIP27ayVk5j9SAd4rdy57gP5gK Wze7c3kE91TIpYzbpasdggNwLCw5QgM0nyVFTnuxHPCsperC6xQkbGks1N2Eg37Jd31B 07ppBvR4GXQ7AIaYofKVyNrFOEf9Nn8CFbpVdVJhdjsR/ygQhYCjvnh3p3cJqWzsSzmS RgRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=zkj8MdK6gEyzKtlmK80NB60IWm/q+WmghEBuQVSw+ao=; b=kDlnenA/4l6vqTblWxl+Fb1OWZpFFGS+eIpj5sDP1IvnIrKLHSHAqOJvvsrW0heYi5 ybrChYX/zJCBFluY7OQOPu2HaaTAwj1nWy669+E61Zsa99yWWkd71kc4Qzt+ypS+7Stl 1y89ISqUE+UYgWTwCaefNh/9Y0Tg1kMYoGzIJ9n5lBkH13GLx9W6zr6li7ptX+iUFR0/ gFxiRabKf023VM15HkLC+z/X9vuPIFIIrAYYOSlGvHCp3m5aLaZs4HbSjqWwH7Y41a25 bzomlnCY75BXVJ47vGQxqvw+YfRoZHJkZj9+d6ijCEzIp3DuKkOmMUpQCd19KjwUJLWh FkmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 92si722467plw.158.2019.02.26.12.51.05; Tue, 26 Feb 2019 12:51:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729166AbfBZUuD (ORCPT + 99 others); Tue, 26 Feb 2019 15:50:03 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45118 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727823AbfBZUuC (ORCPT ); Tue, 26 Feb 2019 15:50:02 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id C3DFD5400C1; Tue, 26 Feb 2019 23:50:00 +0300 (MSK) From: Denis Efremov To: Eric Paris Cc: Denis Efremov , Casey Schaufler , "Eric W. Biederman" , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 01/11] LSM: fix documentation for sb_copy_data hook Date: Tue, 26 Feb 2019 23:49:02 +0300 Message-Id: <0512d2d3525b8aab60c075ca574311fd25339d02.1551213058.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The @type argument of the sb_copy_data hook was removed in the commit "LSM/SELinux: Interfaces to allow FS to control mount options" (e0007529893c). This commit removes the description of the @type argument from the LSM documentation. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 1 - 1 file changed, 1 deletion(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 22fc786d723a..1a01383403b3 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -111,7 +111,6 @@ * options cleanly (a filesystem may modify the data e.g. with strsep()). * This also allows the original mount data to be stripped of security- * specific options to avoid having to make filesystems aware of them. - * @type the type of filesystem being mounted. * @orig the original mount data copied from userspace. * @copy copied data which will be passed to the security module. * Returns 0 if the copy was successful. -- 2.17.2