Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1030750img; Tue, 26 Feb 2019 12:53:05 -0800 (PST) X-Google-Smtp-Source: AHgI3Ial5gb6Dif7zId4p5oYvvE/U26oLr/B0VSFprz019H5pQ+WKZNVOWjmz6TIjaQ9Xnqsml7c X-Received: by 2002:a63:3548:: with SMTP id c69mr26723081pga.256.1551214385415; Tue, 26 Feb 2019 12:53:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214385; cv=none; d=google.com; s=arc-20160816; b=L7sJ9bQPaUiBFlySxHyc0/6Of738kQJhF5AGoxqqmKxA6i9pDMIg5sjJTeNBvxg4Yp pD/mX5Fh4yEY1wEObt5dphhO36/wcCRIeiV15+8vUorv8qbxwVXJPTQwVe6Xxmu4Xc+T tc6DRwhdlR2X0bKXGolHaHE9Q/oMDI2Aiw7R8Xtg+Rmduv6sadJ/UAV55wrawyphgzyi etW5vPz6nEUpzAbjsHhQk6S+1IGI0ykZCEVId+wzP1SgXGYBRkkHtddKgGT+xtUa5Cfi ny1S5Z0tkPpi3cCL8OBL71J0oBI2uRNhKZOFYxqgy8eibWIEkTHF5mUCvh4ht1BPPEtT sDtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=4/eK5v9Hw8hvhsu+pdzuXM2uON5oEvLY0ONdoJoGC/k=; b=K3/jv/Oz4tOPNGb+hBb2QbtBzHd2cCCx3zUH/amn9gdiZadVOS8YnlsSx8UMcM9/xf pL+xnfd2mvo+zBTTRpe+ewsE8LspmcoUHtdAaMN6oIf+oSCiep4MfsWAbkMIelf8T6Z6 ltZD/7DLcJ20SJK+eMLxw9jrM1hHM5bpqgC4jfhyZLqt/pOHg6mCTm/QFBZq72bzxAZW xISh4ovwYPSnOB1vHRcZG9kvnYJ8GPcjPyJtdUKA5fL4Pxa6VRCcETzpX3oOS6tZsdn0 gQDQVwXL6zakhR8+aVAJ6DC5F5i3akX1z2KNATG8BY+RtXjlizLqCNyk13K9Ri7k0xLK IEXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i16si12951856pgg.573.2019.02.26.12.52.50; Tue, 26 Feb 2019 12:53:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729252AbfBZUu7 (ORCPT + 99 others); Tue, 26 Feb 2019 15:50:59 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45352 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727823AbfBZUu7 (ORCPT ); Tue, 26 Feb 2019 15:50:59 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 46F825400C4; Tue, 26 Feb 2019 23:50:56 +0300 (MSK) From: Denis Efremov To: Stephen Smalley Cc: Denis Efremov , Casey Schaufler , "Eric W. Biederman" , Eric Paris , Kees Cook , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 05/11] LSM: fix documentation for the socket_getpeersec_dgram hook Date: Tue, 26 Feb 2019 23:49:06 +0300 Message-Id: X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The socket_getpeersec_dgram hook was changed in the commit "[AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec patch" (dc49c1f94e34). The arguments @secdata and @seclen were changed to @sock and @secid. This patch updates the documentation accordingly. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 603659fb795a..79011eff9795 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -857,13 +857,13 @@ * @socket_getpeersec_dgram: * This hook allows the security module to provide peer socket security * state for udp sockets on a per-packet basis to userspace via - * getsockopt SO_GETPEERSEC. The application must first have indicated - * the IP_PASSSEC option via getsockopt. It can then retrieve the + * getsockopt SO_GETPEERSEC. The application must first have indicated + * the IP_PASSSEC option via getsockopt. It can then retrieve the * security state returned by this hook for a packet via the SCM_SECURITY * ancillary message type. - * @skb is the skbuff for the packet being queried - * @secdata is a pointer to a buffer in which to copy the security data - * @seclen is the maximum length for @secdata + * @sock contains the peer socket. May be NULL. + * @skb is the sk_buff for the packet being queried. May be NULL. + * @secid pointer to store the secid of the packet. * Return 0 on success, error on failure. * @sk_alloc_security: * Allocate and attach a security structure to the sk->sk_security field, -- 2.17.2