diff options
author | David S. Miller <davem@davemloft.net> | 2011-02-22 21:13:15 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-02-22 21:13:15 -0500 |
commit | e33f770426674a565a188042caf3f974f8b3722d (patch) | |
tree | 6ee309a1cbccec1cef9972fc6c8f8d9b280978f5 /include/linux/security.h | |
parent | e1ad2ab2cf0cabcd81861e2c61870fc27bb27ded (diff) |
xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index b2b7f9749f5e..9b5f184a7f65 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -1623,7 +1623,7 @@ struct security_operations { | |||
1623 | int (*xfrm_policy_lookup) (struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); | 1623 | int (*xfrm_policy_lookup) (struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); |
1624 | int (*xfrm_state_pol_flow_match) (struct xfrm_state *x, | 1624 | int (*xfrm_state_pol_flow_match) (struct xfrm_state *x, |
1625 | struct xfrm_policy *xp, | 1625 | struct xfrm_policy *xp, |
1626 | struct flowi *fl); | 1626 | const struct flowi *fl); |
1627 | int (*xfrm_decode_session) (struct sk_buff *skb, u32 *secid, int ckall); | 1627 | int (*xfrm_decode_session) (struct sk_buff *skb, u32 *secid, int ckall); |
1628 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ | 1628 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ |
1629 | 1629 | ||
@@ -2761,7 +2761,8 @@ int security_xfrm_state_delete(struct xfrm_state *x); | |||
2761 | void security_xfrm_state_free(struct xfrm_state *x); | 2761 | void security_xfrm_state_free(struct xfrm_state *x); |
2762 | int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); | 2762 | int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); |
2763 | int security_xfrm_state_pol_flow_match(struct xfrm_state *x, | 2763 | int security_xfrm_state_pol_flow_match(struct xfrm_state *x, |
2764 | struct xfrm_policy *xp, struct flowi *fl); | 2764 | struct xfrm_policy *xp, |
2765 | const struct flowi *fl); | ||
2765 | int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid); | 2766 | int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid); |
2766 | void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl); | 2767 | void security_skb_classify_flow(struct sk_buff *skb, struct flowi *fl); |
2767 | 2768 | ||
@@ -2813,7 +2814,7 @@ static inline int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_s | |||
2813 | } | 2814 | } |
2814 | 2815 | ||
2815 | static inline int security_xfrm_state_pol_flow_match(struct xfrm_state *x, | 2816 | static inline int security_xfrm_state_pol_flow_match(struct xfrm_state *x, |
2816 | struct xfrm_policy *xp, struct flowi *fl) | 2817 | struct xfrm_policy *xp, const struct flowi *fl) |
2817 | { | 2818 | { |
2818 | return 1; | 2819 | return 1; |
2819 | } | 2820 | } |