Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1030512img; Tue, 26 Feb 2019 12:52:44 -0800 (PST) X-Google-Smtp-Source: AHgI3IZh63ud80rZQhsB8OQWHVUe3Phl0PsXLCkpzSxx6Ic2xqJZ7Odc19gyGleZTerKtcdi4ie9 X-Received: by 2002:a17:902:56a:: with SMTP id 97mr15342821plf.15.1551214364584; Tue, 26 Feb 2019 12:52:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214364; cv=none; d=google.com; s=arc-20160816; b=TrRkOgJBrsfazzA911OCuiEgxG8QpTH2jGkpxMDmbj8XWc2lYp16awW2817jVQYU5i WRyDnkG+qjxbbWnNdywjyqE3W6kaZWFjQPG+X4vM4eIqkUWZUgm/74a7i0oVc7F8ySYx pbZM5mmKBcarVuYW9Txqayaj1yQ52cr47gCI228XyIyM0/IyqDQRKCmQHrKBmwK7Qh3w pNDttYkNS63ocyukOmw/5p8SoYykD1ws8XOZmo2ty0kH5HvIGUkI6x+pkrxB9eJETU+h kr1xCqNd49BTGhC0hA9KmceyP1Jv2vql1XMmxtXbwaO8cWG7kX+NesCDlDTqVOUT/SUE 0/rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=lgrXN1rLsZmmtiZ85QTj41FKF4zvsNTKSrz7X16pJ8w=; b=E1oe3JJj8ct6vVMojhcZ3qLGYOk32niGQu0ZYLsP3V4plUQaymJP14tchQ8sG0KLQi tfKSmV08tHPsMXbQnpQzBMtm5wFjb2sRqTaxJF1t/ZIiwWeJPvQebpBhY0bIPz5dck2p L1T5L+283JsIccrTSa+6Cyo4WuksrAXMPmpnnB6MgOxdEi5mwPXm2R3hg9wE2yHQ1a+g 38Smg0lIX/JwtS2jEgO1OcMK+og54YYMHK4u0om9IY6/AGxtXCUXlg267CAUbY+QnC7Y i2xF5BJuhyMQSQ0z/JElKS89uOcmhsC7bKNl0QR8TWJuRrUEGv88gz4OeD2EhAmsQ0Rh ym9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x5si12948533plv.26.2019.02.26.12.52.29; Tue, 26 Feb 2019 12:52:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729331AbfBZUv1 (ORCPT + 99 others); Tue, 26 Feb 2019 15:51:27 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45428 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728989AbfBZUvI (ORCPT ); Tue, 26 Feb 2019 15:51:08 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 44EB25400C3; Tue, 26 Feb 2019 23:51:05 +0300 (MSK) From: Denis Efremov To: "Eric W. Biederman" Cc: Denis Efremov , Casey Schaufler , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 08/11] LSM: fix documentation for the msg_queue_* hooks Date: Tue, 26 Feb 2019 23:49:09 +0300 Message-Id: X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The msg_queue_* hooks were changed in the commit "msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks" (d8c6e8543294). The type of the argument msq was changed from msq_queue to kern_ipc_perm. This patch updates the documentation for the hooks accordingly. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 38 +++++++++++++++++++------------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 1d60b07f30ab..5deea99aec18 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1095,41 +1095,41 @@ * * @msg_queue_alloc_security: * Allocate and attach a security structure to the - * msq->q_perm.security field. The security field is initialized to + * @perm->security field. The security field is initialized to * NULL when the structure is first created. - * @msq contains the message queue structure to be modified. + * @perm contains the IPC permissions of the message queue. * Return 0 if operation was successful and permission is granted. * @msg_queue_free_security: - * Deallocate security structure for this message queue. - * @msq contains the message queue structure to be modified. + * Deallocate security field @perm->security for the message queue. + * @perm contains the IPC permissions of the message queue. * @msg_queue_associate: * Check permission when a message queue is requested through the - * msgget system call. This hook is only called when returning the + * msgget system call. This hook is only called when returning the * message queue identifier for an existing message queue, not when a * new message queue is created. - * @msq contains the message queue to act upon. + * @perm contains the IPC permissions of the message queue. * @msqflg contains the operation control flags. * Return 0 if permission is granted. * @msg_queue_msgctl: * Check permission when a message control operation specified by @cmd - * is to be performed on the message queue @msq. - * The @msq may be NULL, e.g. for IPC_INFO or MSG_INFO. - * @msq contains the message queue to act upon. May be NULL. + * is to be performed on the message queue with permissions @perm. + * The @perm may be NULL, e.g. for IPC_INFO or MSG_INFO. + * @perm contains the IPC permissions of the msg queue. May be NULL. * @cmd contains the operation to be performed. * Return 0 if permission is granted. * @msg_queue_msgsnd: * Check permission before a message, @msg, is enqueued on the message - * queue, @msq. - * @msq contains the message queue to send message to. + * queue with permissions @perm. + * @perm contains the IPC permissions of the message queue. * @msg contains the message to be enqueued. * @msqflg contains operational flags. * Return 0 if permission is granted. * @msg_queue_msgrcv: * Check permission before a message, @msg, is removed from the message - * queue, @msq. The @target task structure contains a pointer to the + * queue. The @target task structure contains a pointer to the * process that will be receiving the message (not equal to the current * process when inline receives are being performed). - * @msq contains the message queue to retrieve message from. + * @perm contains the IPC permissions of the message queue. * @msg contains the message destination. * @target contains the task structure for recipient process. * @type contains the type of message requested. @@ -1619,13 +1619,13 @@ union security_list_options { int (*msg_msg_alloc_security)(struct msg_msg *msg); void (*msg_msg_free_security)(struct msg_msg *msg); - int (*msg_queue_alloc_security)(struct kern_ipc_perm *msq); - void (*msg_queue_free_security)(struct kern_ipc_perm *msq); - int (*msg_queue_associate)(struct kern_ipc_perm *msq, int msqflg); - int (*msg_queue_msgctl)(struct kern_ipc_perm *msq, int cmd); - int (*msg_queue_msgsnd)(struct kern_ipc_perm *msq, struct msg_msg *msg, + int (*msg_queue_alloc_security)(struct kern_ipc_perm *perm); + void (*msg_queue_free_security)(struct kern_ipc_perm *perm); + int (*msg_queue_associate)(struct kern_ipc_perm *perm, int msqflg); + int (*msg_queue_msgctl)(struct kern_ipc_perm *perm, int cmd); + int (*msg_queue_msgsnd)(struct kern_ipc_perm *perm, struct msg_msg *msg, int msqflg); - int (*msg_queue_msgrcv)(struct kern_ipc_perm *msq, struct msg_msg *msg, + int (*msg_queue_msgrcv)(struct kern_ipc_perm *perm, struct msg_msg *msg, struct task_struct *target, long type, int mode); -- 2.17.2