diff options
author | luanshi <zhangliguang@linux.alibaba.com> | 2019-07-04 22:35:20 -0400 |
---|---|---|
committer | Casey Schaufler <casey@schaufler-ca.com> | 2019-09-04 12:37:07 -0400 |
commit | a1a07f22346144d1e2108f9faa2a41fe67579e85 (patch) | |
tree | 5f4726bd138b2f2f8fd52ff5cfd9941af470f068 | |
parent | 3675f052b43ba51b99b85b073c7070e083f3e6fb (diff) |
smack: fix some kernel-doc notations
Fix/add kernel-doc notation and fix typos in security/smack/.
Signed-off-by: Liguang Zhang <zhangliguang@linux.alibaba.com>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
-rw-r--r-- | security/smack/smack_lsm.c | 33 |
1 files changed, 15 insertions, 18 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index d8b59480a01c..336e855e7ab2 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
@@ -307,7 +307,7 @@ static struct smack_known *smk_fetch(const char *name, struct inode *ip, | |||
307 | 307 | ||
308 | /** | 308 | /** |
309 | * init_inode_smack - initialize an inode security blob | 309 | * init_inode_smack - initialize an inode security blob |
310 | * @isp: the blob to initialize | 310 | * @inode: inode to extract the info from |
311 | * @skp: a pointer to the Smack label entry to use in the blob | 311 | * @skp: a pointer to the Smack label entry to use in the blob |
312 | * | 312 | * |
313 | */ | 313 | */ |
@@ -509,7 +509,7 @@ static int smack_ptrace_traceme(struct task_struct *ptp) | |||
509 | 509 | ||
510 | /** | 510 | /** |
511 | * smack_syslog - Smack approval on syslog | 511 | * smack_syslog - Smack approval on syslog |
512 | * @type: message type | 512 | * @typefrom_file: unused |
513 | * | 513 | * |
514 | * Returns 0 on success, error code otherwise. | 514 | * Returns 0 on success, error code otherwise. |
515 | */ | 515 | */ |
@@ -765,7 +765,7 @@ static int smack_sb_eat_lsm_opts(char *options, void **mnt_opts) | |||
765 | /** | 765 | /** |
766 | * smack_set_mnt_opts - set Smack specific mount options | 766 | * smack_set_mnt_opts - set Smack specific mount options |
767 | * @sb: the file system superblock | 767 | * @sb: the file system superblock |
768 | * @opts: Smack mount options | 768 | * @mnt_opts: Smack mount options |
769 | * @kern_flags: mount option from kernel space or user space | 769 | * @kern_flags: mount option from kernel space or user space |
770 | * @set_kern_flags: where to store converted mount opts | 770 | * @set_kern_flags: where to store converted mount opts |
771 | * | 771 | * |
@@ -959,7 +959,7 @@ static int smack_bprm_set_creds(struct linux_binprm *bprm) | |||
959 | * smack_inode_alloc_security - allocate an inode blob | 959 | * smack_inode_alloc_security - allocate an inode blob |
960 | * @inode: the inode in need of a blob | 960 | * @inode: the inode in need of a blob |
961 | * | 961 | * |
962 | * Returns 0 if it gets a blob, -ENOMEM otherwise | 962 | * Returns 0 |
963 | */ | 963 | */ |
964 | static int smack_inode_alloc_security(struct inode *inode) | 964 | static int smack_inode_alloc_security(struct inode *inode) |
965 | { | 965 | { |
@@ -1165,7 +1165,7 @@ static int smack_inode_rename(struct inode *old_inode, | |||
1165 | * | 1165 | * |
1166 | * This is the important Smack hook. | 1166 | * This is the important Smack hook. |
1167 | * | 1167 | * |
1168 | * Returns 0 if access is permitted, -EACCES otherwise | 1168 | * Returns 0 if access is permitted, an error code otherwise |
1169 | */ | 1169 | */ |
1170 | static int smack_inode_permission(struct inode *inode, int mask) | 1170 | static int smack_inode_permission(struct inode *inode, int mask) |
1171 | { | 1171 | { |
@@ -1223,8 +1223,7 @@ static int smack_inode_setattr(struct dentry *dentry, struct iattr *iattr) | |||
1223 | 1223 | ||
1224 | /** | 1224 | /** |
1225 | * smack_inode_getattr - Smack check for getting attributes | 1225 | * smack_inode_getattr - Smack check for getting attributes |
1226 | * @mnt: vfsmount of the object | 1226 | * @path: path to extract the info from |
1227 | * @dentry: the object | ||
1228 | * | 1227 | * |
1229 | * Returns 0 if access is permitted, an error code otherwise | 1228 | * Returns 0 if access is permitted, an error code otherwise |
1230 | */ | 1229 | */ |
@@ -1871,14 +1870,13 @@ static int smack_file_receive(struct file *file) | |||
1871 | /** | 1870 | /** |
1872 | * smack_file_open - Smack dentry open processing | 1871 | * smack_file_open - Smack dentry open processing |
1873 | * @file: the object | 1872 | * @file: the object |
1874 | * @cred: task credential | ||
1875 | * | 1873 | * |
1876 | * Set the security blob in the file structure. | 1874 | * Set the security blob in the file structure. |
1877 | * Allow the open only if the task has read access. There are | 1875 | * Allow the open only if the task has read access. There are |
1878 | * many read operations (e.g. fstat) that you can do with an | 1876 | * many read operations (e.g. fstat) that you can do with an |
1879 | * fd even if you have the file open write-only. | 1877 | * fd even if you have the file open write-only. |
1880 | * | 1878 | * |
1881 | * Returns 0 | 1879 | * Returns 0 if current has access, error code otherwise |
1882 | */ | 1880 | */ |
1883 | static int smack_file_open(struct file *file) | 1881 | static int smack_file_open(struct file *file) |
1884 | { | 1882 | { |
@@ -1901,7 +1899,7 @@ static int smack_file_open(struct file *file) | |||
1901 | 1899 | ||
1902 | /** | 1900 | /** |
1903 | * smack_cred_alloc_blank - "allocate" blank task-level security credentials | 1901 | * smack_cred_alloc_blank - "allocate" blank task-level security credentials |
1904 | * @new: the new credentials | 1902 | * @cred: the new credentials |
1905 | * @gfp: the atomicity of any memory allocations | 1903 | * @gfp: the atomicity of any memory allocations |
1906 | * | 1904 | * |
1907 | * Prepare a blank set of credentials for modification. This must allocate all | 1905 | * Prepare a blank set of credentials for modification. This must allocate all |
@@ -1984,7 +1982,7 @@ static void smack_cred_transfer(struct cred *new, const struct cred *old) | |||
1984 | 1982 | ||
1985 | /** | 1983 | /** |
1986 | * smack_cred_getsecid - get the secid corresponding to a creds structure | 1984 | * smack_cred_getsecid - get the secid corresponding to a creds structure |
1987 | * @c: the object creds | 1985 | * @cred: the object creds |
1988 | * @secid: where to put the result | 1986 | * @secid: where to put the result |
1989 | * | 1987 | * |
1990 | * Sets the secid to contain a u32 version of the smack label. | 1988 | * Sets the secid to contain a u32 version of the smack label. |
@@ -2141,8 +2139,6 @@ static int smack_task_getioprio(struct task_struct *p) | |||
2141 | /** | 2139 | /** |
2142 | * smack_task_setscheduler - Smack check on setting scheduler | 2140 | * smack_task_setscheduler - Smack check on setting scheduler |
2143 | * @p: the task object | 2141 | * @p: the task object |
2144 | * @policy: unused | ||
2145 | * @lp: unused | ||
2146 | * | 2142 | * |
2147 | * Return 0 if read access is permitted | 2143 | * Return 0 if read access is permitted |
2148 | */ | 2144 | */ |
@@ -2612,8 +2608,9 @@ static void smk_ipv6_port_label(struct socket *sock, struct sockaddr *address) | |||
2612 | 2608 | ||
2613 | /** | 2609 | /** |
2614 | * smk_ipv6_port_check - check Smack port access | 2610 | * smk_ipv6_port_check - check Smack port access |
2615 | * @sock: socket | 2611 | * @sk: socket |
2616 | * @address: address | 2612 | * @address: address |
2613 | * @act: the action being taken | ||
2617 | * | 2614 | * |
2618 | * Create or update the port list entry | 2615 | * Create or update the port list entry |
2619 | */ | 2616 | */ |
@@ -2783,7 +2780,7 @@ static int smack_socket_post_create(struct socket *sock, int family, | |||
2783 | * | 2780 | * |
2784 | * Cross reference the peer labels for SO_PEERSEC | 2781 | * Cross reference the peer labels for SO_PEERSEC |
2785 | * | 2782 | * |
2786 | * Returns 0 on success, and error code otherwise | 2783 | * Returns 0 |
2787 | */ | 2784 | */ |
2788 | static int smack_socket_socketpair(struct socket *socka, | 2785 | static int smack_socket_socketpair(struct socket *socka, |
2789 | struct socket *sockb) | 2786 | struct socket *sockb) |
@@ -3015,13 +3012,13 @@ static int smack_shm_shmctl(struct kern_ipc_perm *isp, int cmd) | |||
3015 | * | 3012 | * |
3016 | * Returns 0 if current has the requested access, error code otherwise | 3013 | * Returns 0 if current has the requested access, error code otherwise |
3017 | */ | 3014 | */ |
3018 | static int smack_shm_shmat(struct kern_ipc_perm *ipc, char __user *shmaddr, | 3015 | static int smack_shm_shmat(struct kern_ipc_perm *isp, char __user *shmaddr, |
3019 | int shmflg) | 3016 | int shmflg) |
3020 | { | 3017 | { |
3021 | int may; | 3018 | int may; |
3022 | 3019 | ||
3023 | may = smack_flags_to_may(shmflg); | 3020 | may = smack_flags_to_may(shmflg); |
3024 | return smk_curacc_shm(ipc, may); | 3021 | return smk_curacc_shm(isp, may); |
3025 | } | 3022 | } |
3026 | 3023 | ||
3027 | /** | 3024 | /** |
@@ -4763,7 +4760,7 @@ static __init void init_smack_known_list(void) | |||
4763 | /** | 4760 | /** |
4764 | * smack_init - initialize the smack system | 4761 | * smack_init - initialize the smack system |
4765 | * | 4762 | * |
4766 | * Returns 0 | 4763 | * Returns 0 on success, -ENOMEM is there's no memory |
4767 | */ | 4764 | */ |
4768 | static __init int smack_init(void) | 4765 | static __init int smack_init(void) |
4769 | { | 4766 | { |