diff options
author | Denis Efremov <efremov@ispras.ru> | 2019-02-26 23:49:08 +0300 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2019-03-26 16:46:21 -0700 |
commit | 5fdd268f6eb8e84f04ae2458cc640f7c7331dd19 (patch) | |
tree | f0bb95d82c40292fb86f3d5f9c88f1fd7c0f9ee7 /include/linux/lsm_hooks.h | |
parent | 6b6b6476a32f763843c9a3c91dff4d91faa1267e (diff) | |
download | linux-5fdd268f6eb8e84f04ae2458cc640f7c7331dd19.tar.gz linux-5fdd268f6eb8e84f04ae2458cc640f7c7331dd19.tar.bz2 linux-5fdd268f6eb8e84f04ae2458cc640f7c7331dd19.zip |
LSM: fix documentation for the audit_* hooks
This patch updates the documentation for the audit_* hooks
to use the same arguments names as in the hook's declarations.
Signed-off-by: Denis Efremov <efremov@ispras.ru>
Acked-by: Kees Cook <keescook@chromium.org>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'include/linux/lsm_hooks.h')
-rw-r--r-- | include/linux/lsm_hooks.h | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 1a4e4dda5235..2f0990f0ed64 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1345,9 +1345,9 @@ * -EINVAL in case of an invalid rule. * * @audit_rule_known: - * Specifies whether given @rule contains any fields related to + * Specifies whether given @krule contains any fields related to * current LSM. - * @rule contains the audit rule of interest. + * @krule contains the audit rule of interest. * Return 1 in case of relation found, 0 otherwise. * * @audit_rule_match: @@ -1356,13 +1356,13 @@ * @secid contains the security id in question. * @field contains the field which relates to current LSM. * @op contains the operator that will be used for matching. - * @rule points to the audit rule that will be checked against. + * @lrule points to the audit rule that will be checked against. * Return 1 if secid matches the rule, 0 if it does not, -ERRNO on failure. * * @audit_rule_free: * Deallocate the LSM audit rule structure previously allocated by * audit_rule_init. - * @rule contains the allocated rule + * @lsmrule contains the allocated rule * * @inode_invalidate_secctx: * Notify the security module that it must revalidate the security context |