diff options
| author | mchehab@s-opensource.com <mchehab@s-opensource.com> | 2017-03-30 16:11:36 -0400 |
|---|---|---|
| committer | Jonathan Corbet <corbet@lwn.net> | 2017-04-02 16:31:49 -0400 |
| commit | 0e056eb5530da802c07f080d6bbd43c50e799efd (patch) | |
| tree | 52ef7df0208878f5bae8f90f12eedfc3cb6a51e7 /security/security.c | |
| parent | 40bf19a8d9af96c0fd3a2b94a407d7eada6f2853 (diff) | |
kernel-api.rst: fix a series of errors when parsing C files
./lib/string.c:134: WARNING: Inline emphasis start-string without end-string.
./mm/filemap.c:522: WARNING: Inline interpreted text or phrase reference start-string without end-string.
./mm/filemap.c:1283: ERROR: Unexpected indentation.
./mm/filemap.c:3003: WARNING: Inline interpreted text or phrase reference start-string without end-string.
./mm/vmalloc.c:1544: WARNING: Inline emphasis start-string without end-string.
./mm/page_alloc.c:4245: ERROR: Unexpected indentation.
./ipc/util.c:676: ERROR: Unexpected indentation.
./drivers/pci/irq.c:35: WARNING: Block quote ends without a blank line; unexpected unindent.
./security/security.c:109: ERROR: Unexpected indentation.
./security/security.c:110: WARNING: Definition list ends without a blank line; unexpected unindent.
./block/genhd.c:275: WARNING: Inline strong start-string without end-string.
./block/genhd.c:283: WARNING: Inline strong start-string without end-string.
./include/linux/clk.h:134: WARNING: Inline emphasis start-string without end-string.
./include/linux/clk.h:134: WARNING: Inline emphasis start-string without end-string.
./ipc/util.c:477: ERROR: Unknown target name: "s".
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
Acked-by: Bjorn Helgaas <bhelgaas@google.com>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'security/security.c')
| -rw-r--r-- | security/security.c | 12 |
1 files changed, 8 insertions, 4 deletions
diff --git a/security/security.c b/security/security.c index d0e07f269b2d..23555c5504f6 100644 --- a/security/security.c +++ b/security/security.c | |||
| @@ -103,10 +103,14 @@ static int lsm_append(char *new, char **result) | |||
| 103 | * to avoid security registration races. This method may also be used | 103 | * to avoid security registration races. This method may also be used |
| 104 | * to check if your LSM is currently loaded during kernel initialization. | 104 | * to check if your LSM is currently loaded during kernel initialization. |
| 105 | * | 105 | * |
| 106 | * Return true if: | 106 | * Returns: |
| 107 | * -The passed LSM is the one chosen by user at boot time, | 107 | * |
| 108 | * -or the passed LSM is configured as the default and the user did not | 108 | * true if: |
| 109 | * choose an alternate LSM at boot time. | 109 | * |
| 110 | * - The passed LSM is the one chosen by user at boot time, | ||
| 111 | * - or the passed LSM is configured as the default and the user did not | ||
| 112 | * choose an alternate LSM at boot time. | ||
| 113 | * | ||
| 110 | * Otherwise, return false. | 114 | * Otherwise, return false. |
| 111 | */ | 115 | */ |
| 112 | int __init security_module_enable(const char *module) | 116 | int __init security_module_enable(const char *module) |
