@@ -1228,7 +1228,7 @@ void security_sb_free(struct super_block *sb)
12281228
12291229/**
12301230 * security_free_mnt_opts() - Free memory associated with mount options
1231- * @mnt_ops : LSM processed mount options
1231+ * @mnt_opts : LSM processed mount options
12321232 *
12331233 * Free memory associated with @mnt_ops.
12341234 */
@@ -1244,7 +1244,7 @@ EXPORT_SYMBOL(security_free_mnt_opts);
12441244/**
12451245 * security_sb_eat_lsm_opts() - Consume LSM mount options
12461246 * @options: mount options
1247- * @mnt_ops : LSM processed mount options
1247+ * @mnt_opts : LSM processed mount options
12481248 *
12491249 * Eat (scan @options) and save them in @mnt_opts.
12501250 *
@@ -1407,8 +1407,8 @@ EXPORT_SYMBOL(security_sb_set_mnt_opts);
14071407
14081408/**
14091409 * security_sb_clone_mnt_opts() - Duplicate superblock mount options
1410- * @olddb : source superblock
1411- * @newdb : destination superblock
1410+ * @oldsb : source superblock
1411+ * @newsb : destination superblock
14121412 * @kern_flags: kernel flags (in)
14131413 * @set_kern_flags: kernel flags (out)
14141414 *
@@ -1916,7 +1916,7 @@ int security_inode_unlink(struct inode *dir, struct dentry *dentry)
19161916}
19171917
19181918/**
1919- * security_inode_symlink() Check if creating a symbolic link is allowed
1919+ * security_inode_symlink() - Check if creating a symbolic link is allowed
19201920 * @dir: parent directory
19211921 * @dentry: symbolic link
19221922 * @old_name: existing filename
@@ -2125,6 +2125,7 @@ int security_inode_getattr(const struct path *path)
21252125 * @dentry: file
21262126 * @name: xattr name
21272127 * @value: xattr value
2128+ * @size: size of xattr value
21282129 * @flags: flags
21292130 *
21302131 * Check permission before setting the extended attributes.
@@ -2686,7 +2687,7 @@ int security_mmap_addr(unsigned long addr)
26862687 * security_file_mprotect() - Check if changing memory protections is allowed
26872688 * @vma: memory region
26882689 * @reqprot: application requested protection
2689- * @prog : protection applied by the kernel
2690+ * @prot : protection applied by the kernel
26902691 *
26912692 * Check permissions before changing memory access permissions.
26922693 *
@@ -3421,7 +3422,7 @@ int security_create_user_ns(const struct cred *cred)
34213422/**
34223423 * security_ipc_permission() - Check if sysv ipc access is allowed
34233424 * @ipcp: ipc permission structure
3424- * @flags : requested permissions
3425+ * @flag : requested permissions
34253426 *
34263427 * Check permissions for access to IPC.
34273428 *
@@ -3718,7 +3719,7 @@ int security_sem_associate(struct kern_ipc_perm *sma, int semflg)
37183719}
37193720
37203721/**
3721- * security_sem_ctl () - Check if a sysv semaphore operation is allowed
3722+ * security_sem_semctl () - Check if a sysv semaphore operation is allowed
37223723 * @sma: sysv ipc permission structure
37233724 * @cmd: operation
37243725 *
@@ -4088,7 +4089,7 @@ int security_socket_create(int family, int type, int protocol, int kern)
40884089}
40894090
40904091/**
4091- * security_socket_create () - Initialize a newly created socket
4092+ * security_socket_post_create () - Initialize a newly created socket
40924093 * @sock: socket
40934094 * @family: protocol family
40944095 * @type: communications type
@@ -4364,7 +4365,7 @@ EXPORT_SYMBOL(security_socket_getpeersec_dgram);
43644365 * security_sk_alloc() - Allocate and initialize a sock's LSM blob
43654366 * @sk: sock
43664367 * @family: protocol family
4367- * @priotity : gfp flags
4368+ * @priority : gfp flags
43684369 *
43694370 * Allocate and attach a security structure to the sk->sk_security field, which
43704371 * is used to copy security attributes between local stream sockets.
@@ -4423,10 +4424,10 @@ EXPORT_SYMBOL(security_req_classify_flow);
44234424/**
44244425 * security_sock_graft() - Reconcile LSM state when grafting a sock on a socket
44254426 * @sk: sock being grafted
4426- * @sock : target socket
4427+ * @parent : target parent socket
44274428 *
4428- * Sets @sock 's inode secid to @sk's secid and update @sk with any necessary
4429- * LSM state from @sock .
4429+ * Sets @parent 's inode secid to @sk's secid and update @sk with any necessary
4430+ * LSM state from @parent .
44304431 */
44314432void security_sock_graft (struct sock * sk , struct socket * parent )
44324433{
@@ -4877,7 +4878,7 @@ int security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid)
48774878/**
48784879 * security_xfrm_state_pol_flow_match() - Check for a xfrm match
48794880 * @x: xfrm state to match
4880- * @xp xfrm policy to check for a match
4881+ * @xp: xfrm policy to check for a match
48814882 * @flic: flow to check for a match.
48824883 *
48834884 * Check @xp and @flic for a match with @x.
@@ -4980,13 +4981,13 @@ int security_key_permission(key_ref_t key_ref, const struct cred *cred,
49804981/**
49814982 * security_key_getsecurity() - Get the key's security label
49824983 * @key: key
4983- * @buffer : security label buffer
4984+ * @_buffer : security label buffer
49844985 *
49854986 * Get a textual representation of the security context attached to a key for
49864987 * the purposes of honouring KEYCTL_GETSECURITY. This function allocates the
49874988 * storage for the NUL-terminated string and the caller should free it.
49884989 *
4989- * Return: Returns the length of @buffer (including terminating NUL) or -ve if
4990+ * Return: Returns the length of @_buffer (including terminating NUL) or -ve if
49904991 * an error occurs. May also return 0 (and a NULL buffer pointer) if
49914992 * there is no security label assigned to the key.
49924993 */
0 commit comments