@@ -1102,7 +1102,7 @@ void security_compute_xperms_decision(struct selinux_state *state,
11021102 * @state: SELinux state
11031103 * @ssid: source security identifier
11041104 * @tsid: target security identifier
1105- * @tclass : target security class
1105+ * @orig_tclass : target security class
11061106 * @avd: access vector decisions
11071107 * @xperms: extended permissions
11081108 *
@@ -1626,6 +1626,7 @@ int security_context_str_to_sid(struct selinux_state *state,
16261626 * @scontext_len: length in bytes
16271627 * @sid: security identifier, SID
16281628 * @def_sid: default SID to assign on error
1629+ * @gfp_flags: the allocator get-free-page (GFP) flags
16291630 *
16301631 * Obtains a SID associated with the security context that
16311632 * has the string representation specified by @scontext.
@@ -1919,6 +1920,7 @@ static int security_compute_sid(struct selinux_state *state,
19191920 * @ssid: source security identifier
19201921 * @tsid: target security identifier
19211922 * @tclass: target security class
1923+ * @qstr: object name
19221924 * @out_sid: security identifier for new subject/object
19231925 *
19241926 * Compute a SID to use for labeling a new subject or object in the
@@ -1947,6 +1949,7 @@ int security_transition_sid_user(struct selinux_state *state,
19471949
19481950/**
19491951 * security_member_sid - Compute the SID for member selection.
1952+ * @state: SELinux state
19501953 * @ssid: source security identifier
19511954 * @tsid: target security identifier
19521955 * @tclass: target security class
@@ -2273,6 +2276,7 @@ void selinux_policy_commit(struct selinux_state *state,
22732276 * @state: SELinux state
22742277 * @data: binary policy data
22752278 * @len: length of data in bytes
2279+ * @load_state: policy load state
22762280 *
22772281 * Load a new set of security policy configuration data,
22782282 * validate it and convert the SID table as necessary.
@@ -2525,7 +2529,7 @@ int security_ib_pkey_sid(struct selinux_state *state,
25252529 * security_ib_endport_sid - Obtain the SID for a subnet management interface.
25262530 * @state: SELinux state
25272531 * @dev_name: device name
2528- * @port : port number
2532+ * @port_num : port number
25292533 * @out_sid: security identifier
25302534 */
25312535int security_ib_endport_sid (struct selinux_state * state ,
@@ -2856,9 +2860,10 @@ int security_get_user_sids(struct selinux_state *state,
28562860
28572861/**
28582862 * __security_genfs_sid - Helper to obtain a SID for a file in a filesystem
2863+ * @policy: policy
28592864 * @fstype: filesystem type
28602865 * @path: path from root of mount
2861- * @sclass : file security class
2866+ * @orig_sclass : file security class
28622867 * @sid: SID for path
28632868 *
28642869 * Obtain a SID to use for a file in a filesystem that
@@ -2915,7 +2920,7 @@ static inline int __security_genfs_sid(struct selinux_policy *policy,
29152920 * @state: SELinux state
29162921 * @fstype: filesystem type
29172922 * @path: path from root of mount
2918- * @sclass : file security class
2923+ * @orig_sclass : file security class
29192924 * @sid: SID for path
29202925 *
29212926 * Acquire policy_rwlock before calling __security_genfs_sid() and release
@@ -3297,6 +3302,7 @@ int security_sid_mls_copy(struct selinux_state *state,
32973302 * @nlbl_sid: NetLabel SID
32983303 * @nlbl_type: NetLabel labeling protocol type
32993304 * @xfrm_sid: XFRM SID
3305+ * @peer_sid: network peer sid
33003306 *
33013307 * Description:
33023308 * Compare the @nlbl_sid and @xfrm_sid values and if the two SIDs can be
0 commit comments