Skip to content

Commit 1e2523d

Browse files
committed
lsm: fix doc warnings in the LSM hook comments
Signed-off-by: Paul Moore <paul@paul-moore.com>
1 parent 63c1845 commit 1e2523d

1 file changed

Lines changed: 17 additions & 16 deletions

File tree

security/security.c

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb)
12281228

12291229
/**
12301230
* security_free_mnt_opts() - Free memory associated with mount options
1231-
* @mnt_ops: LSM processed mount options
1231+
* @mnt_opts: LSM processed mount options
12321232
*
12331233
* Free memory associated with @mnt_ops.
12341234
*/
@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts);
12441244
/**
12451245
* security_sb_eat_lsm_opts() - Consume LSM mount options
12461246
* @options: mount options
1247-
* @mnt_ops: LSM processed mount options
1247+
* @mnt_opts: LSM processed mount options
12481248
*
12491249
* Eat (scan @options) and save them in @mnt_opts.
12501250
*
@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts);
14071407

14081408
/**
14091409
* security_sb_clone_mnt_opts() - Duplicate superblock mount options
1410-
* @olddb: source superblock
1411-
* @newdb: destination superblock
1410+
* @oldsb: source superblock
1411+
* @newsb: destination superblock
14121412
* @kern_flags: kernel flags (in)
14131413
* @set_kern_flags: kernel flags (out)
14141414
*
@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry)
19161916
}
19171917

19181918
/**
1919-
* security_inode_symlink() Check if creating a symbolic link is allowed
1919+
* security_inode_symlink() - Check if creating a symbolic link is allowed
19201920
* @dir: parent directory
19211921
* @dentry: symbolic link
19221922
* @old_name: existing filename
@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path)
21252125
* @dentry: file
21262126
* @name: xattr name
21272127
* @value: xattr value
2128+
* @size: size of xattr value
21282129
* @flags: flags
21292130
*
21302131
* Check permission before setting the extended attributes.
@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr)
26862687
* security_file_mprotect() - Check if changing memory protections is allowed
26872688
* @vma: memory region
26882689
* @reqprot: application requested protection
2689-
* @prog: protection applied by the kernel
2690+
* @prot: protection applied by the kernel
26902691
*
26912692
* Check permissions before changing memory access permissions.
26922693
*
@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred)
34213422
/**
34223423
* security_ipc_permission() - Check if sysv ipc access is allowed
34233424
* @ipcp: ipc permission structure
3424-
* @flags: requested permissions
3425+
* @flag: requested permissions
34253426
*
34263427
* Check permissions for access to IPC.
34273428
*
@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg)
37183719
}
37193720

37203721
/**
3721-
* security_sem_ctl() - Check if a sysv semaphore operation is allowed
3722+
* security_sem_semctl() - Check if a sysv semaphore operation is allowed
37223723
* @sma: sysv ipc permission structure
37233724
* @cmd: operation
37243725
*
@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern)
40884089
}
40894090

40904091
/**
4091-
* security_socket_create() - Initialize a newly created socket
4092+
* security_socket_post_create() - Initialize a newly created socket
40924093
* @sock: socket
40934094
* @family: protocol family
40944095
* @type: communications type
@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram);
43644365
* security_sk_alloc() - Allocate and initialize a sock's LSM blob
43654366
* @sk: sock
43664367
* @family: protocol family
4367-
* @priotity: gfp flags
4368+
* @priority: gfp flags
43684369
*
43694370
* Allocate and attach a security structure to the sk->sk_security field, which
43704371
* is used to copy security attributes between local stream sockets.
@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow);
44234424
/**
44244425
* security_sock_graft() - Reconcile LSM state when grafting a sock on a socket
44254426
* @sk: sock being grafted
4426-
* @sock: target socket
4427+
* @parent: target parent socket
44274428
*
4428-
* Sets @sock's inode secid to @sk's secid and update @sk with any necessary
4429-
* LSM state from @sock.
4429+
* Sets @parent's inode secid to @sk's secid and update @sk with any necessary
4430+
* LSM state from @parent.
44304431
*/
44314432
void security_sock_graft(struct sock *sk, struct socket *parent)
44324433
{
@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid)
48774878
/**
48784879
* security_xfrm_state_pol_flow_match() - Check for a xfrm match
48794880
* @x: xfrm state to match
4880-
* @xp xfrm policy to check for a match
4881+
* @xp: xfrm policy to check for a match
48814882
* @flic: flow to check for a match.
48824883
*
48834884
* Check @xp and @flic for a match with @x.
@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred,
49804981
/**
49814982
* security_key_getsecurity() - Get the key's security label
49824983
* @key: key
4983-
* @buffer: security label buffer
4984+
* @_buffer: security label buffer
49844985
*
49854986
* Get a textual representation of the security context attached to a key for
49864987
* the purposes of honouring KEYCTL_GETSECURITY. This function allocates the
49874988
* storage for the NUL-terminated string and the caller should free it.
49884989
*
4989-
* Return: Returns the length of @buffer (including terminating NUL) or -ve if
4990+
* Return: Returns the length of @_buffer (including terminating NUL) or -ve if
49904991
* an error occurs. May also return 0 (and a NULL buffer pointer) if
49914992
* there is no security label assigned to the key.
49924993
*/

0 commit comments

Comments
 (0)