Skip to content

Commit 43fad28

Browse files
committed
lsm: move the sysv hook comments to security/security.c
This patch relocates the LSM hook function comments to the function definitions, in keeping with the current kernel conventions. This should make the hook descriptions more easily discoverable and easier to maintain. While formatting changes have been done to better fit the kernel-doc style, content changes have been kept to a minimum and limited to text which was obviously incorrect and/or outdated. It is expected the future patches will improve the quality of the function header comments. Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
1 parent ecc419a commit 43fad28

2 files changed

Lines changed: 191 additions & 141 deletions

File tree

include/linux/lsm_hooks.h

Lines changed: 0 additions & 141 deletions
Original file line numberDiff line numberDiff line change
@@ -32,147 +32,6 @@
3232
/**
3333
* union security_list_options - Linux Security Module hook function list
3434
*
35-
* Security hooks affecting all System V IPC operations.
36-
*
37-
* @ipc_permission:
38-
* Check permissions for access to IPC
39-
* @ipcp contains the kernel IPC permission structure.
40-
* @flag contains the desired (requested) permission set.
41-
* Return 0 if permission is granted.
42-
* @ipc_getsecid:
43-
* Get the secid associated with the ipc object.
44-
* @ipcp contains the kernel IPC permission structure.
45-
* @secid contains a pointer to the location where result will be saved.
46-
* In case of failure, @secid will be set to zero.
47-
*
48-
* Security hooks for individual messages held in System V IPC message queues
49-
*
50-
* @msg_msg_alloc_security:
51-
* Allocate and attach a security structure to the msg->security field.
52-
* The security field is initialized to NULL when the structure is first
53-
* created.
54-
* @msg contains the message structure to be modified.
55-
* Return 0 if operation was successful and permission is granted.
56-
* @msg_msg_free_security:
57-
* Deallocate the security structure for this message.
58-
* @msg contains the message structure to be modified.
59-
*
60-
* Security hooks for System V IPC Message Queues
61-
*
62-
* @msg_queue_alloc_security:
63-
* Allocate and attach a security structure to the
64-
* @perm->security field. The security field is initialized to
65-
* NULL when the structure is first created.
66-
* @perm contains the IPC permissions of the message queue.
67-
* Return 0 if operation was successful and permission is granted.
68-
* @msg_queue_free_security:
69-
* Deallocate security field @perm->security for the message queue.
70-
* @perm contains the IPC permissions of the message queue.
71-
* @msg_queue_associate:
72-
* Check permission when a message queue is requested through the
73-
* msgget system call. This hook is only called when returning the
74-
* message queue identifier for an existing message queue, not when a
75-
* new message queue is created.
76-
* @perm contains the IPC permissions of the message queue.
77-
* @msqflg contains the operation control flags.
78-
* Return 0 if permission is granted.
79-
* @msg_queue_msgctl:
80-
* Check permission when a message control operation specified by @cmd
81-
* is to be performed on the message queue with permissions @perm.
82-
* The @perm may be NULL, e.g. for IPC_INFO or MSG_INFO.
83-
* @perm contains the IPC permissions of the msg queue. May be NULL.
84-
* @cmd contains the operation to be performed.
85-
* Return 0 if permission is granted.
86-
* @msg_queue_msgsnd:
87-
* Check permission before a message, @msg, is enqueued on the message
88-
* queue with permissions @perm.
89-
* @perm contains the IPC permissions of the message queue.
90-
* @msg contains the message to be enqueued.
91-
* @msqflg contains operational flags.
92-
* Return 0 if permission is granted.
93-
* @msg_queue_msgrcv:
94-
* Check permission before a message, @msg, is removed from the message
95-
* queue. The @target task structure contains a pointer to the
96-
* process that will be receiving the message (not equal to the current
97-
* process when inline receives are being performed).
98-
* @perm contains the IPC permissions of the message queue.
99-
* @msg contains the message destination.
100-
* @target contains the task structure for recipient process.
101-
* @type contains the type of message requested.
102-
* @mode contains the operational flags.
103-
* Return 0 if permission is granted.
104-
*
105-
* Security hooks for System V Shared Memory Segments
106-
*
107-
* @shm_alloc_security:
108-
* Allocate and attach a security structure to the @perm->security
109-
* field. The security field is initialized to NULL when the structure is
110-
* first created.
111-
* @perm contains the IPC permissions of the shared memory structure.
112-
* Return 0 if operation was successful and permission is granted.
113-
* @shm_free_security:
114-
* Deallocate the security structure @perm->security for the memory segment.
115-
* @perm contains the IPC permissions of the shared memory structure.
116-
* @shm_associate:
117-
* Check permission when a shared memory region is requested through the
118-
* shmget system call. This hook is only called when returning the shared
119-
* memory region identifier for an existing region, not when a new shared
120-
* memory region is created.
121-
* @perm contains the IPC permissions of the shared memory structure.
122-
* @shmflg contains the operation control flags.
123-
* Return 0 if permission is granted.
124-
* @shm_shmctl:
125-
* Check permission when a shared memory control operation specified by
126-
* @cmd is to be performed on the shared memory region with permissions @perm.
127-
* The @perm may be NULL, e.g. for IPC_INFO or SHM_INFO.
128-
* @perm contains the IPC permissions of the shared memory structure.
129-
* @cmd contains the operation to be performed.
130-
* Return 0 if permission is granted.
131-
* @shm_shmat:
132-
* Check permissions prior to allowing the shmat system call to attach the
133-
* shared memory segment with permissions @perm to the data segment of the
134-
* calling process. The attaching address is specified by @shmaddr.
135-
* @perm contains the IPC permissions of the shared memory structure.
136-
* @shmaddr contains the address to attach memory region to.
137-
* @shmflg contains the operational flags.
138-
* Return 0 if permission is granted.
139-
*
140-
* Security hooks for System V Semaphores
141-
*
142-
* @sem_alloc_security:
143-
* Allocate and attach a security structure to the @perm->security
144-
* field. The security field is initialized to NULL when the structure is
145-
* first created.
146-
* @perm contains the IPC permissions of the semaphore.
147-
* Return 0 if operation was successful and permission is granted.
148-
* @sem_free_security:
149-
* Deallocate security structure @perm->security for the semaphore.
150-
* @perm contains the IPC permissions of the semaphore.
151-
* @sem_associate:
152-
* Check permission when a semaphore is requested through the semget
153-
* system call. This hook is only called when returning the semaphore
154-
* identifier for an existing semaphore, not when a new one must be
155-
* created.
156-
* @perm contains the IPC permissions of the semaphore.
157-
* @semflg contains the operation control flags.
158-
* Return 0 if permission is granted.
159-
* @sem_semctl:
160-
* Check permission when a semaphore operation specified by @cmd is to be
161-
* performed on the semaphore. The @perm may be NULL, e.g. for
162-
* IPC_INFO or SEM_INFO.
163-
* @perm contains the IPC permissions of the semaphore. May be NULL.
164-
* @cmd contains the operation to be performed.
165-
* Return 0 if permission is granted.
166-
* @sem_semop:
167-
* Check permissions before performing operations on members of the
168-
* semaphore set. If the @alter flag is nonzero, the semaphore set
169-
* may be modified.
170-
* @perm contains the IPC permissions of the semaphore.
171-
* @sops contains the operations to perform.
172-
* @nsops contains the number of operations to perform.
173-
* @alter contains the flag indicating whether changes are to be made.
174-
* Return 0 if permission is granted.
175-
*
17635
* @binder_set_context_mgr:
17736
* Check whether @mgr is allowed to be the binder context manager.
17837
* @mgr contains the struct cred for the current binder process.

0 commit comments

Comments
 (0)