mirror of
https://gitee.com/bianbu-linux/linux-6.6
synced 2025-06-29 23:43:21 -04:00
lsm: move the io_uring hook comments to security/security.c
This patch relocates the LSM hook function comments to the function definitions, in keeping with the current kernel conventions. This should make the hook descriptions more easily discoverable and easier to maintain. While formatting changes have been done to better fit the kernel-doc style, content changes have been kept to a minimum and limited to text which was obviously incorrect and/or outdated. It is expected the future patches will improve the quality of the function header comments. Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
452b670c72
commit
1cd2aca64a
2 changed files with 26 additions and 17 deletions
|
@ -196,23 +196,6 @@
|
|||
* @what: kernel feature being accessed.
|
||||
* Return 0 if permission is granted.
|
||||
*
|
||||
* Security hooks for io_uring
|
||||
*
|
||||
* @uring_override_creds:
|
||||
* Check if the current task, executing an io_uring operation, is allowed
|
||||
* to override it's credentials with @new.
|
||||
* @new: the new creds to use.
|
||||
* Return 0 if permission is granted.
|
||||
*
|
||||
* @uring_sqpoll:
|
||||
* Check whether the current task is allowed to spawn a io_uring polling
|
||||
* thread (IORING_SETUP_SQPOLL).
|
||||
* Return 0 if permission is granted.
|
||||
*
|
||||
* @uring_cmd:
|
||||
* Check whether the file_operations uring_cmd is allowed to run.
|
||||
* Return 0 if permission is granted.
|
||||
*
|
||||
*/
|
||||
union security_list_options {
|
||||
#define LSM_HOOK(RET, DEFAULT, NAME, ...) RET (*NAME)(__VA_ARGS__);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue