mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 04:18:39 +08:00
lsm: move the Infiniband hook comments to security/security.c
This patch relocates the LSM hook function comments to the function definitions, in keeping with the current kernel conventions. This should make the hook descriptions more easily discoverable and easier to maintain. While formatting changes have been done to better fit the kernel-doc style, content changes have been kept to a minimum and limited to text which was obviously incorrect and/or outdated. It is expected the future patches will improve the quality of the function header comments. Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
4a49f592e9
commit
ac318aed54
@ -32,28 +32,6 @@
|
||||
/**
|
||||
* union security_list_options - Linux Security Module hook function list
|
||||
*
|
||||
* Security hooks for Infiniband
|
||||
*
|
||||
* @ib_pkey_access:
|
||||
* Check permission to access a pkey when modifing a QP.
|
||||
* @subnet_prefix the subnet prefix of the port being used.
|
||||
* @pkey the pkey to be accessed.
|
||||
* @sec pointer to a security structure.
|
||||
* Return 0 if permission is granted.
|
||||
* @ib_endport_manage_subnet:
|
||||
* Check permissions to send and receive SMPs on a end port.
|
||||
* @dev_name the IB device name (i.e. mlx4_0).
|
||||
* @port_num the port number.
|
||||
* @sec pointer to a security structure.
|
||||
* Return 0 if permission is granted.
|
||||
* @ib_alloc_security:
|
||||
* Allocate a security structure for Infiniband objects.
|
||||
* @sec pointer to a security structure pointer.
|
||||
* Returns 0 on success, non-zero on failure.
|
||||
* @ib_free_security:
|
||||
* Deallocate an Infiniband security structure.
|
||||
* @sec contains the security structure to be freed.
|
||||
*
|
||||
* Security hooks for XFRM operations.
|
||||
*
|
||||
* @xfrm_policy_alloc_security:
|
||||
|
@ -4208,24 +4208,58 @@ EXPORT_SYMBOL(security_sctp_assoc_established);
|
||||
|
||||
#ifdef CONFIG_SECURITY_INFINIBAND
|
||||
|
||||
/**
|
||||
* security_ib_pkey_access() - Check if access to an IB pkey is allowed
|
||||
* @sec: LSM blob
|
||||
* @subnet_prefix: subnet prefix of the port
|
||||
* @pkey: IB pkey
|
||||
*
|
||||
* Check permission to access a pkey when modifing a QP.
|
||||
*
|
||||
* Return: Returns 0 if permission is granted.
|
||||
*/
|
||||
int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey)
|
||||
{
|
||||
return call_int_hook(ib_pkey_access, 0, sec, subnet_prefix, pkey);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_pkey_access);
|
||||
|
||||
/**
|
||||
* security_ib_endport_manage_subnet() - Check if SMPs traffic is allowed
|
||||
* @sec: LSM blob
|
||||
* @dev_name: IB device name
|
||||
* @port_num: port number
|
||||
*
|
||||
* Check permissions to send and receive SMPs on a end port.
|
||||
*
|
||||
* Return: Returns 0 if permission is granted.
|
||||
*/
|
||||
int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num)
|
||||
{
|
||||
return call_int_hook(ib_endport_manage_subnet, 0, sec, dev_name, port_num);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_endport_manage_subnet);
|
||||
|
||||
/**
|
||||
* security_ib_alloc_security() - Allocate an Infiniband LSM blob
|
||||
* @sec: LSM blob
|
||||
*
|
||||
* Allocate a security structure for Infiniband objects.
|
||||
*
|
||||
* Return: Returns 0 on success, non-zero on failure.
|
||||
*/
|
||||
int security_ib_alloc_security(void **sec)
|
||||
{
|
||||
return call_int_hook(ib_alloc_security, 0, sec);
|
||||
}
|
||||
EXPORT_SYMBOL(security_ib_alloc_security);
|
||||
|
||||
/**
|
||||
* security_ib_free_security() - Free an Infiniband LSM blob
|
||||
* @sec: LSM blob
|
||||
*
|
||||
* Deallocate an Infiniband security structure.
|
||||
*/
|
||||
void security_ib_free_security(void *sec)
|
||||
{
|
||||
call_void_hook(ib_free_security, sec);
|
||||
|
Loading…
Reference in New Issue
Block a user