Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
1e2523d7
Commit
1e2523d7
authored
Mar 08, 2023
by
Paul Moore
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
lsm: fix doc warnings in the LSM hook comments
Signed-off-by:
Paul Moore
<
paul@paul-moore.com
>
parent
63c1845b
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
17 additions
and
16 deletions
+17
-16
security/security.c
security/security.c
+17
-16
No files found.
security/security.c
View file @
1e2523d7
...
@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb)
...
@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb)
/**
/**
* security_free_mnt_opts() - Free memory associated with mount options
* security_free_mnt_opts() - Free memory associated with mount options
* @mnt_ops: LSM processed mount options
* @mnt_op
t
s: LSM processed mount options
*
*
* Free memory associated with @mnt_ops.
* Free memory associated with @mnt_ops.
*/
*/
...
@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts);
...
@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts);
/**
/**
* security_sb_eat_lsm_opts() - Consume LSM mount options
* security_sb_eat_lsm_opts() - Consume LSM mount options
* @options: mount options
* @options: mount options
* @mnt_ops: LSM processed mount options
* @mnt_op
t
s: LSM processed mount options
*
*
* Eat (scan @options) and save them in @mnt_opts.
* Eat (scan @options) and save them in @mnt_opts.
*
*
...
@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts);
...
@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts);
/**
/**
* security_sb_clone_mnt_opts() - Duplicate superblock mount options
* security_sb_clone_mnt_opts() - Duplicate superblock mount options
* @old
d
b: source superblock
* @old
s
b: source superblock
* @new
d
b: destination superblock
* @new
s
b: destination superblock
* @kern_flags: kernel flags (in)
* @kern_flags: kernel flags (in)
* @set_kern_flags: kernel flags (out)
* @set_kern_flags: kernel flags (out)
*
*
...
@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry)
...
@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry)
}
}
/**
/**
* security_inode_symlink() Check if creating a symbolic link is allowed
* security_inode_symlink()
-
Check if creating a symbolic link is allowed
* @dir: parent directory
* @dir: parent directory
* @dentry: symbolic link
* @dentry: symbolic link
* @old_name: existing filename
* @old_name: existing filename
...
@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path)
...
@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path)
* @dentry: file
* @dentry: file
* @name: xattr name
* @name: xattr name
* @value: xattr value
* @value: xattr value
* @size: size of xattr value
* @flags: flags
* @flags: flags
*
*
* Check permission before setting the extended attributes.
* Check permission before setting the extended attributes.
...
@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr)
...
@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr)
* security_file_mprotect() - Check if changing memory protections is allowed
* security_file_mprotect() - Check if changing memory protections is allowed
* @vma: memory region
* @vma: memory region
* @reqprot: application requested protection
* @reqprot: application requested protection
* @pro
g
: protection applied by the kernel
* @pro
t
: protection applied by the kernel
*
*
* Check permissions before changing memory access permissions.
* Check permissions before changing memory access permissions.
*
*
...
@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred)
...
@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred)
/**
/**
* security_ipc_permission() - Check if sysv ipc access is allowed
* security_ipc_permission() - Check if sysv ipc access is allowed
* @ipcp: ipc permission structure
* @ipcp: ipc permission structure
* @flag
s
: requested permissions
* @flag: requested permissions
*
*
* Check permissions for access to IPC.
* Check permissions for access to IPC.
*
*
...
@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg)
...
@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg)
}
}
/**
/**
* security_sem_ctl() - Check if a sysv semaphore operation is allowed
* security_sem_
sem
ctl() - Check if a sysv semaphore operation is allowed
* @sma: sysv ipc permission structure
* @sma: sysv ipc permission structure
* @cmd: operation
* @cmd: operation
*
*
...
@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern)
...
@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern)
}
}
/**
/**
* security_socket_create() - Initialize a newly created socket
* security_socket_
post_
create() - Initialize a newly created socket
* @sock: socket
* @sock: socket
* @family: protocol family
* @family: protocol family
* @type: communications type
* @type: communications type
...
@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram);
...
@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram);
* security_sk_alloc() - Allocate and initialize a sock's LSM blob
* security_sk_alloc() - Allocate and initialize a sock's LSM blob
* @sk: sock
* @sk: sock
* @family: protocol family
* @family: protocol family
* @prio
t
ity: gfp flags
* @prio
r
ity: gfp flags
*
*
* Allocate and attach a security structure to the sk->sk_security field, which
* Allocate and attach a security structure to the sk->sk_security field, which
* is used to copy security attributes between local stream sockets.
* is used to copy security attributes between local stream sockets.
...
@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow);
...
@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow);
/**
/**
* security_sock_graft() - Reconcile LSM state when grafting a sock on a socket
* security_sock_graft() - Reconcile LSM state when grafting a sock on a socket
* @sk: sock being grafted
* @sk: sock being grafted
* @
sock: targe
t socket
* @
parent: target paren
t socket
*
*
* Sets @
sock
's inode secid to @sk's secid and update @sk with any necessary
* Sets @
parent
's inode secid to @sk's secid and update @sk with any necessary
* LSM state from @
sock
.
* LSM state from @
parent
.
*/
*/
void
security_sock_graft
(
struct
sock
*
sk
,
struct
socket
*
parent
)
void
security_sock_graft
(
struct
sock
*
sk
,
struct
socket
*
parent
)
{
{
...
@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid)
...
@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid)
/**
/**
* security_xfrm_state_pol_flow_match() - Check for a xfrm match
* security_xfrm_state_pol_flow_match() - Check for a xfrm match
* @x: xfrm state to match
* @x: xfrm state to match
* @xp xfrm policy to check for a match
* @xp
:
xfrm policy to check for a match
* @flic: flow to check for a match.
* @flic: flow to check for a match.
*
*
* Check @xp and @flic for a match with @x.
* Check @xp and @flic for a match with @x.
...
@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred,
...
@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred,
/**
/**
* security_key_getsecurity() - Get the key's security label
* security_key_getsecurity() - Get the key's security label
* @key: key
* @key: key
* @buffer: security label buffer
* @
_
buffer: security label buffer
*
*
* Get a textual representation of the security context attached to a key for
* Get a textual representation of the security context attached to a key for
* the purposes of honouring KEYCTL_GETSECURITY. This function allocates the
* the purposes of honouring KEYCTL_GETSECURITY. This function allocates the
* storage for the NUL-terminated string and the caller should free it.
* storage for the NUL-terminated string and the caller should free it.
*
*
* Return: Returns the length of @buffer (including terminating NUL) or -ve if
* Return: Returns the length of @
_
buffer (including terminating NUL) or -ve if
* an error occurs. May also return 0 (and a NULL buffer pointer) if
* an error occurs. May also return 0 (and a NULL buffer pointer) if
* there is no security label assigned to the key.
* there is no security label assigned to the key.
*/
*/
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment