Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1029696img; Tue, 26 Feb 2019 12:51:35 -0800 (PST) X-Google-Smtp-Source: AHgI3IZIGCegWpEcgAsYOLcLtNmdS1yjbYQKlu7TgWwRWqfdSPnmqcpPWGb1RN8DjbGRan7mHZpg X-Received: by 2002:a63:1ce:: with SMTP id 197mr26044826pgb.47.1551214295098; Tue, 26 Feb 2019 12:51:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214295; cv=none; d=google.com; s=arc-20160816; b=wSO33zDp/1+z1oaBe/ovhwcZT8M/eTKmzAKt3je3pdcsuUfqrX5DmE42qTf56ZiMEG cVJuE6ToRCNncm/smBirDJy/OcxJkqpWmXGOxTzixIp4KMlhkj/8B+tZeT4IEZ+dP6Zi 6be/+tYo9Y1z4aABX1zE4FqXN1mADpqNtPYWzK1aJdrY7/litmC5XnBG0X8hgRGDYX8J GXl3t6l7pKTYZyhaiH3J8MTTPbQYgA4Jej2+cRlI4QWLttg77ES7Pl1Qy3BOiBJgyK3S c9gX4UZX166MfpeKOi5MKEP0KCM2JA0KcnbRuYnB6esHN5Bv6Zj92WBUfdNZyLe5Lzdv denw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=9EcSb4p22fQBYAVUqOkbA/dN+DN3qK5y7rtXWLYSW2E=; b=zB9Z6JS5Rwnupn3vxXOBig6sk31ssoryvwijBj8Hj+ZNtAluyqe0qWk+Szny8dJoU0 DRdvawOHr+Iorq2HzSRsGoU3pEkjhzF6nnik4QgSgvX4UfeXmFEpNeUjENzY3xffcQ/6 O8ykDIMMtVpSaufhLK919enSJ/R2hUvcGnAqBm/NGq5p6WkxqxZkr4KAFbdJnNYZojAc 1gexg5mBP+8+6StZOS1ERLPj264L+HE/cT7YcH6PNL7nqw+ec9MGqRCy3hX2r6mRC7Nc H9IkYTm/Xq3sOzAVkaPr4Fgq0mcKAMHFRou/AFH6dhyPYteYGzgkMz9SC+H+PPw+SXkk 6P/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z23si7276636pgu.132.2019.02.26.12.51.20; Tue, 26 Feb 2019 12:51:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729208AbfBZUus (ORCPT + 99 others); Tue, 26 Feb 2019 15:50:48 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45266 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727823AbfBZUus (ORCPT ); Tue, 26 Feb 2019 15:50:48 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id E90575400C2; Tue, 26 Feb 2019 23:50:45 +0300 (MSK) From: Denis Efremov To: Casey Schaufler Cc: Denis Efremov , "Eric W. Biederman" , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 03/11] LSM: fix documentation for the socket_post_create hook Date: Tue, 26 Feb 2019 23:49:04 +0300 Message-Id: X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch slightly fixes the documentation for the socket_post_create hook. The documentation states that i_security field is accessible through inode field of socket structure (i.e., 'sock->inode->i_security'). There is no inode field in the socket structure. The i_security field is accessible through SOCK_INODE macro. The patch updates the documentation to reflect this. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 3f0a0e2c5fba..90bbc11fdc13 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -752,9 +752,9 @@ * socket structure, but rather, the socket security information is stored * in the associated inode. Typically, the inode alloc_security hook will * allocate and and attach security information to - * sock->inode->i_security. This hook may be used to update the - * sock->inode->i_security field with additional information that wasn't - * available when the inode was allocated. + * SOCK_INODE(sock)->i_security. This hook may be used to update the + * SOCK_INODE(sock)->i_security field with additional information that + * wasn't available when the inode was allocated. * @sock contains the newly created socket structure. * @family contains the requested protocol family. * @type contains the requested communications type. -- 2.17.2