Commit 1e2523d7 authored by Paul Moore's avatar Paul Moore

lsm: fix doc warnings in the LSM hook comments

Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
parent 63c1845b
...@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb) ...@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb)
/** /**
* security_free_mnt_opts() - Free memory associated with mount options * security_free_mnt_opts() - Free memory associated with mount options
* @mnt_ops: LSM processed mount options * @mnt_opts: LSM processed mount options
* *
* Free memory associated with @mnt_ops. * Free memory associated with @mnt_ops.
*/ */
...@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts); ...@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts);
/** /**
* security_sb_eat_lsm_opts() - Consume LSM mount options * security_sb_eat_lsm_opts() - Consume LSM mount options
* @options: mount options * @options: mount options
* @mnt_ops: LSM processed mount options * @mnt_opts: LSM processed mount options
* *
* Eat (scan @options) and save them in @mnt_opts. * Eat (scan @options) and save them in @mnt_opts.
* *
...@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts); ...@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts);
/** /**
* security_sb_clone_mnt_opts() - Duplicate superblock mount options * security_sb_clone_mnt_opts() - Duplicate superblock mount options
* @olddb: source superblock * @oldsb: source superblock
* @newdb: destination superblock * @newsb: destination superblock
* @kern_flags: kernel flags (in) * @kern_flags: kernel flags (in)
* @set_kern_flags: kernel flags (out) * @set_kern_flags: kernel flags (out)
* *
...@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry) ...@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry)
} }
/** /**
* security_inode_symlink() Check if creating a symbolic link is allowed * security_inode_symlink() - Check if creating a symbolic link is allowed
* @dir: parent directory * @dir: parent directory
* @dentry: symbolic link * @dentry: symbolic link
* @old_name: existing filename * @old_name: existing filename
...@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path) ...@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path)
* @dentry: file * @dentry: file
* @name: xattr name * @name: xattr name
* @value: xattr value * @value: xattr value
* @size: size of xattr value
* @flags: flags * @flags: flags
* *
* Check permission before setting the extended attributes. * Check permission before setting the extended attributes.
...@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr) ...@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr)
* security_file_mprotect() - Check if changing memory protections is allowed * security_file_mprotect() - Check if changing memory protections is allowed
* @vma: memory region * @vma: memory region
* @reqprot: application requested protection * @reqprot: application requested protection
* @prog: protection applied by the kernel * @prot: protection applied by the kernel
* *
* Check permissions before changing memory access permissions. * Check permissions before changing memory access permissions.
* *
...@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred) ...@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred)
/** /**
* security_ipc_permission() - Check if sysv ipc access is allowed * security_ipc_permission() - Check if sysv ipc access is allowed
* @ipcp: ipc permission structure * @ipcp: ipc permission structure
* @flags: requested permissions * @flag: requested permissions
* *
* Check permissions for access to IPC. * Check permissions for access to IPC.
* *
...@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg) ...@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg)
} }
/** /**
* security_sem_ctl() - Check if a sysv semaphore operation is allowed * security_sem_semctl() - Check if a sysv semaphore operation is allowed
* @sma: sysv ipc permission structure * @sma: sysv ipc permission structure
* @cmd: operation * @cmd: operation
* *
...@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern) ...@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern)
} }
/** /**
* security_socket_create() - Initialize a newly created socket * security_socket_post_create() - Initialize a newly created socket
* @sock: socket * @sock: socket
* @family: protocol family * @family: protocol family
* @type: communications type * @type: communications type
...@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram); ...@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram);
* security_sk_alloc() - Allocate and initialize a sock's LSM blob * security_sk_alloc() - Allocate and initialize a sock's LSM blob
* @sk: sock * @sk: sock
* @family: protocol family * @family: protocol family
* @priotity: gfp flags * @priority: gfp flags
* *
* Allocate and attach a security structure to the sk->sk_security field, which * Allocate and attach a security structure to the sk->sk_security field, which
* is used to copy security attributes between local stream sockets. * is used to copy security attributes between local stream sockets.
...@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow); ...@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow);
/** /**
* security_sock_graft() - Reconcile LSM state when grafting a sock on a socket * security_sock_graft() - Reconcile LSM state when grafting a sock on a socket
* @sk: sock being grafted * @sk: sock being grafted
* @sock: target socket * @parent: target parent socket
* *
* Sets @sock's inode secid to @sk's secid and update @sk with any necessary * Sets @parent's inode secid to @sk's secid and update @sk with any necessary
* LSM state from @sock. * LSM state from @parent.
*/ */
void security_sock_graft(struct sock *sk, struct socket *parent) void security_sock_graft(struct sock *sk, struct socket *parent)
{ {
...@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid) ...@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid)
/** /**
* security_xfrm_state_pol_flow_match() - Check for a xfrm match * security_xfrm_state_pol_flow_match() - Check for a xfrm match
* @x: xfrm state to match * @x: xfrm state to match
* @xp xfrm policy to check for a match * @xp: xfrm policy to check for a match
* @flic: flow to check for a match. * @flic: flow to check for a match.
* *
* Check @xp and @flic for a match with @x. * Check @xp and @flic for a match with @x.
...@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred, ...@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred,
/** /**
* security_key_getsecurity() - Get the key's security label * security_key_getsecurity() - Get the key's security label
* @key: key * @key: key
* @buffer: security label buffer * @_buffer: security label buffer
* *
* Get a textual representation of the security context attached to a key for * Get a textual representation of the security context attached to a key for
* the purposes of honouring KEYCTL_GETSECURITY. This function allocates the * the purposes of honouring KEYCTL_GETSECURITY. This function allocates the
* storage for the NUL-terminated string and the caller should free it. * storage for the NUL-terminated string and the caller should free it.
* *
* Return: Returns the length of @buffer (including terminating NUL) or -ve if * Return: Returns the length of @_buffer (including terminating NUL) or -ve if
* an error occurs. May also return 0 (and a NULL buffer pointer) if * an error occurs. May also return 0 (and a NULL buffer pointer) if
* there is no security label assigned to the key. * there is no security label assigned to the key.
*/ */
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment