Commit 0f2a55d5 authored by Tetsuo Handa's avatar Tetsuo Handa Committed by James Morris

TOMOYO: Update kernel-doc.

Update comments for scripts/kernel-doc and fix some of errors reported by
scripts/checkpatch.pl .
Signed-off-by: default avatarTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent c9206693
/* /*
* security/tomoyo/audit.c * security/tomoyo/audit.c
* *
* Pathname restriction functions. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include "common.h" #include "common.h"
......
/* /*
* security/tomoyo/common.c * security/tomoyo/common.c
* *
* Common functions for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include <linux/uaccess.h> #include <linux/uaccess.h>
...@@ -775,6 +773,14 @@ static void tomoyo_read_profile(struct tomoyo_io_buffer *head) ...@@ -775,6 +773,14 @@ static void tomoyo_read_profile(struct tomoyo_io_buffer *head)
goto next; goto next;
} }
/**
* tomoyo_same_manager - Check for duplicated "struct tomoyo_manager" entry.
*
* @a: Pointer to "struct tomoyo_acl_head".
* @b: Pointer to "struct tomoyo_acl_head".
*
* Returns true if @a == @b, false otherwise.
*/
static bool tomoyo_same_manager(const struct tomoyo_acl_head *a, static bool tomoyo_same_manager(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b) const struct tomoyo_acl_head *b)
{ {
...@@ -1516,6 +1522,7 @@ static void tomoyo_read_pid(struct tomoyo_io_buffer *head) ...@@ -1516,6 +1522,7 @@ static void tomoyo_read_pid(struct tomoyo_io_buffer *head)
tomoyo_set_string(head, domain->domainname->name); tomoyo_set_string(head, domain->domainname->name);
} }
/* String table for domain transition control keywords. */
static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = { static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = {
[TOMOYO_TRANSITION_CONTROL_NO_RESET] = "no_reset_domain ", [TOMOYO_TRANSITION_CONTROL_NO_RESET] = "no_reset_domain ",
[TOMOYO_TRANSITION_CONTROL_RESET] = "reset_domain ", [TOMOYO_TRANSITION_CONTROL_RESET] = "reset_domain ",
...@@ -1525,6 +1532,7 @@ static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = { ...@@ -1525,6 +1532,7 @@ static const char *tomoyo_transition_type[TOMOYO_MAX_TRANSITION_TYPE] = {
[TOMOYO_TRANSITION_CONTROL_KEEP] = "keep_domain ", [TOMOYO_TRANSITION_CONTROL_KEEP] = "keep_domain ",
}; };
/* String table for grouping keywords. */
static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = { static const char *tomoyo_group_name[TOMOYO_MAX_GROUP] = {
[TOMOYO_PATH_GROUP] = "path_group ", [TOMOYO_PATH_GROUP] = "path_group ",
[TOMOYO_NUMBER_GROUP] = "number_group ", [TOMOYO_NUMBER_GROUP] = "number_group ",
......
/* /*
* security/tomoyo/domain.c * security/tomoyo/domain.c
* *
* Domain transition functions for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include "common.h" #include "common.h"
......
/* /*
* security/tomoyo/file.c * security/tomoyo/file.c
* *
* Pathname restriction functions. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include "common.h" #include "common.h"
......
/* /*
* security/tomoyo/gc.c * security/tomoyo/gc.c
* *
* Implementation of the Domain-Based Mandatory Access Control. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*
*/ */
#include "common.h" #include "common.h"
......
/* /*
* security/tomoyo/group.c * security/tomoyo/group.c
* *
* Copyright (C) 2005-2010 NTT DATA CORPORATION * Copyright (C) 2005-2011 NTT DATA CORPORATION
*/ */
#include <linux/slab.h> #include <linux/slab.h>
#include "common.h" #include "common.h"
/**
* tomoyo_same_path_group - Check for duplicated "struct tomoyo_path_group" entry.
*
* @a: Pointer to "struct tomoyo_acl_head".
* @b: Pointer to "struct tomoyo_acl_head".
*
* Returns true if @a == @b, false otherwise.
*/
static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a, static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b) const struct tomoyo_acl_head *b)
{ {
...@@ -14,6 +22,14 @@ static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a, ...@@ -14,6 +22,14 @@ static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a,
container_of(b, struct tomoyo_path_group, head)->member_name; container_of(b, struct tomoyo_path_group, head)->member_name;
} }
/**
* tomoyo_same_number_group - Check for duplicated "struct tomoyo_number_group" entry.
*
* @a: Pointer to "struct tomoyo_acl_head".
* @b: Pointer to "struct tomoyo_acl_head".
*
* Returns true if @a == @b, false otherwise.
*/
static bool tomoyo_same_number_group(const struct tomoyo_acl_head *a, static bool tomoyo_same_number_group(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b) const struct tomoyo_acl_head *b)
{ {
......
/* /*
* security/tomoyo/load_policy.c * security/tomoyo/load_policy.c
* *
* Policy loader launcher for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include "common.h" #include "common.h"
......
/* /*
* security/tomoyo/memory.c * security/tomoyo/memory.c
* *
* Memory management functions for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include <linux/hash.h> #include <linux/hash.h>
......
/* /*
* security/tomoyo/mount.c * security/tomoyo/mount.c
* *
* Copyright (C) 2005-2010 NTT DATA CORPORATION * Copyright (C) 2005-2011 NTT DATA CORPORATION
*/ */
#include <linux/slab.h> #include <linux/slab.h>
...@@ -62,7 +62,7 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r, ...@@ -62,7 +62,7 @@ static bool tomoyo_check_mount_acl(struct tomoyo_request_info *r,
* tomoyo_mount_acl - Check permission for mount() operation. * tomoyo_mount_acl - Check permission for mount() operation.
* *
* @r: Pointer to "struct tomoyo_request_info". * @r: Pointer to "struct tomoyo_request_info".
* @dev_name: Name of device file. * @dev_name: Name of device file. Maybe NULL.
* @dir: Pointer to "struct path". * @dir: Pointer to "struct path".
* @type: Name of filesystem type. * @type: Name of filesystem type.
* @flags: Mount options. * @flags: Mount options.
...@@ -175,11 +175,11 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r, char *dev_name, ...@@ -175,11 +175,11 @@ static int tomoyo_mount_acl(struct tomoyo_request_info *r, char *dev_name,
/** /**
* tomoyo_mount_permission - Check permission for mount() operation. * tomoyo_mount_permission - Check permission for mount() operation.
* *
* @dev_name: Name of device file. * @dev_name: Name of device file. Maybe NULL.
* @path: Pointer to "struct path". * @path: Pointer to "struct path".
* @type: Name of filesystem type. May be NULL. * @type: Name of filesystem type. Maybe NULL.
* @flags: Mount options. * @flags: Mount options.
* @data_page: Optional data. May be NULL. * @data_page: Optional data. Maybe NULL.
* *
* Returns 0 on success, negative value otherwise. * Returns 0 on success, negative value otherwise.
*/ */
......
/* /*
* security/tomoyo/realpath.c * security/tomoyo/realpath.c
* *
* Pathname calculation functions for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include <linux/types.h> #include <linux/types.h>
......
/* /*
* security/tomoyo/common.c * security/tomoyo/securityfs_if.c
* *
* Securityfs interface for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include <linux/security.h> #include <linux/security.h>
......
This diff is collapsed.
/* /*
* security/tomoyo/util.c * security/tomoyo/util.c
* *
* Utility functions for TOMOYO. * Copyright (C) 2005-2011 NTT DATA CORPORATION
*
* Copyright (C) 2005-2010 NTT DATA CORPORATION
*/ */
#include <linux/slab.h> #include <linux/slab.h>
...@@ -378,7 +376,7 @@ void tomoyo_normalize_line(unsigned char *buffer) ...@@ -378,7 +376,7 @@ void tomoyo_normalize_line(unsigned char *buffer)
/** /**
* tomoyo_correct_word2 - Validate a string. * tomoyo_correct_word2 - Validate a string.
* *
* @string: The string to check. May be non-'\0'-terminated. * @string: The string to check. Maybe non-'\0'-terminated.
* @len: Length of @string. * @len: Length of @string.
* *
* Check whether the given string follows the naming rules. * Check whether the given string follows the naming rules.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment