@@ -110,11 +110,13 @@ struct seccomp_knotif {
110
110
* @flags: The flags for the new file descriptor. At the moment, only O_CLOEXEC
111
111
* is allowed.
112
112
* @ioctl_flags: The flags used for the seccomp_addfd ioctl.
113
+ * @setfd: whether or not SECCOMP_ADDFD_FLAG_SETFD was set during notify_addfd
113
114
* @ret: The return value of the installing process. It is set to the fd num
114
115
* upon success (>= 0).
115
116
* @completion: Indicates that the installing process has completed fd
116
117
* installation, or gone away (either due to successful
117
118
* reply, or signal)
119
+ * @list: list_head for chaining seccomp_kaddfd together.
118
120
*
119
121
*/
120
122
struct seccomp_kaddfd {
@@ -138,12 +140,12 @@ struct seccomp_kaddfd {
138
140
* structure is fairly large, we store the notification-specific stuff in a
139
141
* separate structure.
140
142
*
141
- * @request: A semaphore that users of this notification can wait on for
142
- * changes. Actual reads and writes are still controlled with
143
- * filter->notify_lock.
143
+ * @requests: A semaphore that users of this notification can wait on for
144
+ * changes. Actual reads and writes are still controlled with
145
+ * filter->notify_lock.
146
+ * @flags: A set of SECCOMP_USER_NOTIF_FD_* flags.
144
147
* @next_id: The id of the next request.
145
148
* @notifications: A list of struct seccomp_knotif elements.
146
- * @flags: A set of SECCOMP_USER_NOTIF_FD_* flags.
147
149
*/
148
150
149
151
struct notification {
@@ -558,6 +560,8 @@ static void __seccomp_filter_release(struct seccomp_filter *orig)
558
560
* drop its reference count, and notify
559
561
* about unused filters
560
562
*
563
+ * @tsk: task the filter should be released from.
564
+ *
561
565
* This function should only be called when the task is exiting as
562
566
* it detaches it from its filter tree. As such, READ_ONCE() and
563
567
* barriers are not needed here, as would normally be needed.
@@ -577,6 +581,8 @@ void seccomp_filter_release(struct task_struct *tsk)
577
581
/**
578
582
* seccomp_sync_threads: sets all threads to use current's filter
579
583
*
584
+ * @flags: SECCOMP_FILTER_FLAG_* flags to set during sync.
585
+ *
580
586
* Expects sighand and cred_guard_mutex locks to be held, and for
581
587
* seccomp_can_sync_threads() to have returned success already
582
588
* without dropping the locks.
0 commit comments