Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1030100img; Tue, 26 Feb 2019 12:52:06 -0800 (PST) X-Google-Smtp-Source: AHgI3IbzM452z+iFb3Pf+RjFNcS8DV/VBNql/KsjCt9fkJruuX3SwvySbUlW9HNcM6FO5O9JPB8X X-Received: by 2002:a63:c64c:: with SMTP id x12mr16679548pgg.285.1551214326020; Tue, 26 Feb 2019 12:52:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214326; cv=none; d=google.com; s=arc-20160816; b=Da0nIgSguXh8dLD/WZPyASMqkNnDU4OZckLa3LjBCkQsrS1Exqqr02ekuvCd9FQ3QG Y/8EkjGoc5larfi9Ivo7/ZOSjaDzHDREiKL3pQued+Pbt1jvpB47W5NAZiDqoqKNCptq U37onPOeWwW+332Q6kdsaijXcxk91+ELbFVnEGEYku6PjeRZKZ68wzCo7gh1vRhEdlJo bacp4SPh1t9scsawxpAFjLNQfkKzqBq6k9OCJH9dK82D3ydqtGirMjaaTbd314gneJqr kHKiccSZEbtzmgf3Lxob0b42BGxl735JBePkJNXFE5OHy3zoOzxY9RZFnjDPeKoeRgiq w+Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=25MPJpIL2MQcho0tN3P9q+ykjOLHm+6O9KqK6axFzC8=; b=fAQKMeHX+hcBF9wbRVs2cMCQ179NONJU7qevzeU4r1j/yIoNpd9EavpLvY8mb/VcqM ztMNJPhnFnw0LLyMChobjXs/hsQVDv0GKpHvAMJzptrmn31vIGsBP6dvoZH+glEVDs4K 0iKkO1O439TI+oILcj102xEbo32UoOX4/7VTwB67pQHUu8DmLddxj6wvtqQdAB/7OoT6 H6MG99HtgUS0V6Cadn+HuAcHQzf1vr4tXqipoOzpBIW6HlTCWr6cqVxoLIOibFYnuEOx Zg1zlI3N59IVBKnMtSEwHuHwI4lHGVjyJeVDxe2KuCzv9jUl0LvaDNdEzi6y66/uI5mg X64g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 206si3900248pgb.323.2019.02.26.12.51.51; Tue, 26 Feb 2019 12:52:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729308AbfBZUvJ (ORCPT + 99 others); Tue, 26 Feb 2019 15:51:09 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45452 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729275AbfBZUvI (ORCPT ); Tue, 26 Feb 2019 15:51:08 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 661E95400C1; Tue, 26 Feb 2019 23:51:06 +0300 (MSK) From: Denis Efremov To: "Eric W. Biederman" Cc: Denis Efremov , Casey Schaufler , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 09/11] LSM: fix documentation for the sem_* hooks Date: Tue, 26 Feb 2019 23:49:10 +0300 Message-Id: <7860a2c8b4f5976af1ce8a5a7c4fccfa01a191c4.1551213058.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The sem_* hooks were changed in the commit "sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks" (aefad9593ec5). The type of the argument sma was changed from sem_array to kern_ipc_perm. This patch updates the documentation for the hooks accordingly. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 5deea99aec18..06fefe39a397 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1174,34 +1174,34 @@ * Security hooks for System V Semaphores * * @sem_alloc_security: - * Allocate and attach a security structure to the sma->sem_perm.security - * field. The security field is initialized to NULL when the structure is + * Allocate and attach a security structure to the @perm->security + * field. The security field is initialized to NULL when the structure is * first created. - * @sma contains the semaphore structure + * @perm contains the IPC permissions of the semaphore. * Return 0 if operation was successful and permission is granted. * @sem_free_security: - * deallocate security struct for this semaphore - * @sma contains the semaphore structure. + * Deallocate security structure @perm->security for the semaphore. + * @perm contains the IPC permissions of the semaphore. * @sem_associate: * Check permission when a semaphore is requested through the semget - * system call. This hook is only called when returning the semaphore + * system call. This hook is only called when returning the semaphore * identifier for an existing semaphore, not when a new one must be * created. - * @sma contains the semaphore structure. + * @perm contains the IPC permissions of the semaphore. * @semflg contains the operation control flags. * Return 0 if permission is granted. * @sem_semctl: * Check permission when a semaphore operation specified by @cmd is to be - * performed on the semaphore @sma. The @sma may be NULL, e.g. for + * performed on the semaphore. The @perm may be NULL, e.g. for * IPC_INFO or SEM_INFO. - * @sma contains the semaphore structure. May be NULL. + * @perm contains the IPC permissions of the semaphore. May be NULL. * @cmd contains the operation to be performed. * Return 0 if permission is granted. * @sem_semop: * Check permissions before performing operations on members of the - * semaphore set @sma. If the @alter flag is nonzero, the semaphore set + * semaphore set. If the @alter flag is nonzero, the semaphore set * may be modified. - * @sma contains the semaphore structure. + * @perm contains the IPC permissions of the semaphore. * @sops contains the operations to perform. * @nsops contains the number of operations to perform. * @alter contains the flag indicating whether changes are to be made. @@ -1636,11 +1636,11 @@ union security_list_options { int (*shm_shmat)(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); - int (*sem_alloc_security)(struct kern_ipc_perm *sma); - void (*sem_free_security)(struct kern_ipc_perm *sma); - int (*sem_associate)(struct kern_ipc_perm *sma, int semflg); - int (*sem_semctl)(struct kern_ipc_perm *sma, int cmd); - int (*sem_semop)(struct kern_ipc_perm *sma, struct sembuf *sops, + int (*sem_alloc_security)(struct kern_ipc_perm *perm); + void (*sem_free_security)(struct kern_ipc_perm *perm); + int (*sem_associate)(struct kern_ipc_perm *perm, int semflg); + int (*sem_semctl)(struct kern_ipc_perm *perm, int cmd); + int (*sem_semop)(struct kern_ipc_perm *perm, struct sembuf *sops, unsigned nsops, int alter); int (*netlink_send)(struct sock *sk, struct sk_buff *skb); -- 2.17.2