mirror of
https://github.com/torvalds/linux.git
synced 2024-11-21 19:41:42 +00:00
lsm: move the audit hook comments to security/security.c
This patch relocates the LSM hook function comments to the function definitions, in keeping with the current kernel conventions. This should make the hook descriptions more easily discoverable and easier to maintain. While formatting changes have been done to better fit the kernel-doc style, content changes have been kept to a minimum and limited to text which was obviously incorrect and/or outdated. It is expected the future patches will improve the quality of the function header comments. Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
1427ddbe5c
commit
b14faf9c94
@ -135,38 +135,6 @@
|
||||
* @secdata contains the security context.
|
||||
* @seclen contains the length of the security context.
|
||||
*
|
||||
* Security hooks for Audit
|
||||
*
|
||||
* @audit_rule_init:
|
||||
* Allocate and initialize an LSM audit rule structure.
|
||||
* @field contains the required Audit action.
|
||||
* Fields flags are defined in <include/linux/audit.h>
|
||||
* @op contains the operator the rule uses.
|
||||
* @rulestr contains the context where the rule will be applied to.
|
||||
* @lsmrule contains a pointer to receive the result.
|
||||
* Return 0 if @lsmrule has been successfully set,
|
||||
* -EINVAL in case of an invalid rule.
|
||||
*
|
||||
* @audit_rule_known:
|
||||
* Specifies whether given @krule contains any fields related to
|
||||
* current LSM.
|
||||
* @krule contains the audit rule of interest.
|
||||
* Return 1 in case of relation found, 0 otherwise.
|
||||
*
|
||||
* @audit_rule_match:
|
||||
* Determine if given @secid matches a rule previously approved
|
||||
* by @audit_rule_known.
|
||||
* @secid contains the security id in question.
|
||||
* @field contains the field which relates to current LSM.
|
||||
* @op contains the operator that will be used for matching.
|
||||
* @lrule points to the audit rule that will be checked against.
|
||||
* Return 1 if secid matches the rule, 0 if it does not, -ERRNO on failure.
|
||||
*
|
||||
* @audit_rule_free:
|
||||
* Deallocate the LSM audit rule structure previously allocated by
|
||||
* audit_rule_init.
|
||||
* @lsmrule contains the allocated rule.
|
||||
*
|
||||
* @inode_invalidate_secctx:
|
||||
* Notify the security module that it must revalidate the security context
|
||||
* of an inode.
|
||||
|
@ -4762,21 +4762,62 @@ int security_key_getsecurity(struct key *key, char **_buffer)
|
||||
|
||||
#ifdef CONFIG_AUDIT
|
||||
|
||||
/**
|
||||
* security_audit_rule_init() - Allocate and init an LSM audit rule struct
|
||||
* @field: audit action
|
||||
* @op: rule operator
|
||||
* @rulestr: rule context
|
||||
* @lsmrule: receive buffer for audit rule struct
|
||||
*
|
||||
* Allocate and initialize an LSM audit rule structure.
|
||||
*
|
||||
* Return: Return 0 if @lsmrule has been successfully set, -EINVAL in case of
|
||||
* an invalid rule.
|
||||
*/
|
||||
int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule)
|
||||
{
|
||||
return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule);
|
||||
}
|
||||
|
||||
/**
|
||||
* security_audit_rule_known() - Check if an audit rule contains LSM fields
|
||||
* @krule: audit rule
|
||||
*
|
||||
* Specifies whether given @krule contains any fields related to the current
|
||||
* LSM.
|
||||
*
|
||||
* Return: Returns 1 in case of relation found, 0 otherwise.
|
||||
*/
|
||||
int security_audit_rule_known(struct audit_krule *krule)
|
||||
{
|
||||
return call_int_hook(audit_rule_known, 0, krule);
|
||||
}
|
||||
|
||||
/**
|
||||
* security_audit_rule_free() - Free an LSM audit rule struct
|
||||
* @lsmrule: audit rule struct
|
||||
*
|
||||
* Deallocate the LSM audit rule structure previously allocated by
|
||||
* audit_rule_init().
|
||||
*/
|
||||
void security_audit_rule_free(void *lsmrule)
|
||||
{
|
||||
call_void_hook(audit_rule_free, lsmrule);
|
||||
}
|
||||
|
||||
/**
|
||||
* security_audit_rule_match() - Check if a label matches an audit rule
|
||||
* @secid: security label
|
||||
* @field: LSM audit field
|
||||
* @op: matching operator
|
||||
* @lsmrule: audit rule
|
||||
*
|
||||
* Determine if given @secid matches a rule previously approved by
|
||||
* security_audit_rule_known().
|
||||
*
|
||||
* Return: Returns 1 if secid matches the rule, 0 if it does not, -ERRNO on
|
||||
* failure.
|
||||
*/
|
||||
int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule)
|
||||
{
|
||||
return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule);
|
||||
|
Loading…
Reference in New Issue
Block a user