aboutsummaryrefslogtreecommitdiffstats
path: root/security/security.c
diff options
context:
space:
mode:
authormchehab@s-opensource.com <mchehab@s-opensource.com>2017-03-30 16:11:36 -0400
committerJonathan Corbet <corbet@lwn.net>2017-04-02 16:31:49 -0400
commit0e056eb5530da802c07f080d6bbd43c50e799efd (patch)
tree52ef7df0208878f5bae8f90f12eedfc3cb6a51e7 /security/security.c
parent40bf19a8d9af96c0fd3a2b94a407d7eada6f2853 (diff)
kernel-api.rst: fix a series of errors when parsing C files
./lib/string.c:134: WARNING: Inline emphasis start-string without end-string. ./mm/filemap.c:522: WARNING: Inline interpreted text or phrase reference start-string without end-string. ./mm/filemap.c:1283: ERROR: Unexpected indentation. ./mm/filemap.c:3003: WARNING: Inline interpreted text or phrase reference start-string without end-string. ./mm/vmalloc.c:1544: WARNING: Inline emphasis start-string without end-string. ./mm/page_alloc.c:4245: ERROR: Unexpected indentation. ./ipc/util.c:676: ERROR: Unexpected indentation. ./drivers/pci/irq.c:35: WARNING: Block quote ends without a blank line; unexpected unindent. ./security/security.c:109: ERROR: Unexpected indentation. ./security/security.c:110: WARNING: Definition list ends without a blank line; unexpected unindent. ./block/genhd.c:275: WARNING: Inline strong start-string without end-string. ./block/genhd.c:283: WARNING: Inline strong start-string without end-string. ./include/linux/clk.h:134: WARNING: Inline emphasis start-string without end-string. ./include/linux/clk.h:134: WARNING: Inline emphasis start-string without end-string. ./ipc/util.c:477: ERROR: Unknown target name: "s". Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com> Acked-by: Bjorn Helgaas <bhelgaas@google.com> Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'security/security.c')
-rw-r--r--security/security.c12
1 files changed, 8 insertions, 4 deletions
diff --git a/security/security.c b/security/security.c
index d0e07f269b2d..23555c5504f6 100644
--- a/security/security.c
+++ b/security/security.c
@@ -103,10 +103,14 @@ static int lsm_append(char *new, char **result)
103 * to avoid security registration races. This method may also be used 103 * to avoid security registration races. This method may also be used
104 * to check if your LSM is currently loaded during kernel initialization. 104 * to check if your LSM is currently loaded during kernel initialization.
105 * 105 *
106 * Return true if: 106 * Returns:
107 * -The passed LSM is the one chosen by user at boot time, 107 *
108 * -or the passed LSM is configured as the default and the user did not 108 * true if:
109 * choose an alternate LSM at boot time. 109 *
110 * - The passed LSM is the one chosen by user at boot time,
111 * - or the passed LSM is configured as the default and the user did not
112 * choose an alternate LSM at boot time.
113 *
110 * Otherwise, return false. 114 * Otherwise, return false.
111 */ 115 */
112int __init security_module_enable(const char *module) 116int __init security_module_enable(const char *module)