[RESEND][RFC][PATCH 1/3] lsm: Clarify documentation of vm_enough_memory hook
KP Singh
kpsingh at kernel.org
Thu Nov 3 15:11:13 UTC 2022
On Fri, Oct 28, 2022 at 6:55 PM Roberto Sassu
<roberto.sassu at huaweicloud.com> wrote:
>
> From: Roberto Sassu <roberto.sassu at huawei.com>
>
> include/linux/lsm_hooks.h reports the result of the LSM infrastructure to
> the callers, not what LSMs should return to the LSM infrastructure.
>
> Clarify that and add that returning 1 from the LSMs means calling
> __vm_enough_memory() with cap_sys_admin set, 0 without.
>
> Signed-off-by: Roberto Sassu <roberto.sassu at huawei.com>
Reviewed-by: KP Singh <kpsingh at kernel.org>
> ---
> include/linux/lsm_hooks.h | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h
> index 4ec80b96c22e..f40b82ca91e7 100644
> --- a/include/linux/lsm_hooks.h
> +++ b/include/linux/lsm_hooks.h
> @@ -1411,7 +1411,9 @@
> * Check permissions for allocating a new virtual mapping.
> * @mm contains the mm struct it is being added to.
> * @pages contains the number of pages.
> - * Return 0 if permission is granted.
> + * Return 0 if permission is granted by LSMs to the caller. LSMs should
> + * return 1 if __vm_enough_memory() should be called with
> + * cap_sys_admin set, 0 if not.
> *
> * @ismaclabel:
> * Check if the extended attribute specified by @name
> --
> 2.25.1
>
More information about the Linux-security-module-archive
mailing list