Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp922045imm; Wed, 17 Oct 2018 10:18:20 -0700 (PDT) X-Google-Smtp-Source: ACcGV60Hl9TcK5q/mIsyOWbtonbFq0w0uRNgOGnmPPRFjJ5MYCybHMYUT3w4KOU4KFK7pp26PDkF X-Received: by 2002:aa7:880d:: with SMTP id c13-v6mr27630667pfo.251.1539796700840; Wed, 17 Oct 2018 10:18:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539796700; cv=none; d=google.com; s=arc-20160816; b=F1BrVvs0wj5RMHJK4rL+xB3fFgiHOVJ9fxv88FI3AaNblVlhVkWARsocdJVEV43DT0 WK5WX+iCE16K0HPVdh48f/CTUkZ0H+9h475U2MiTcsWGwaiNu7pf/py6htr2RafveXIw wJj4ucFb3TCwC0YOx2dtjWmECuKDmZ47sqFcEqtZ2utAXy7UyxH3uAtMJmbgKjeaeBpY 2CY0AMUX+0t6Kjlv1xFUTA3+DysHwcs0odDSjiOoB2Vr8KO7HDxcfG2r9R9fMI6J9YCQ 4cToRoIlbPuingYVLhgIfdIYfCcz8fgIpyaEbWDEIcbeDEdDovtuhBEWM3yMwMSsdpgj DScw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=i8AY8FVqEJmJ3E1J0fMUb5/8ybP47X0uglmnhJYOdU8=; b=S0SMvR6PTFycz1PfMDl8CXmuP6DT8qevX29eZWjqvV8pxYn19509mIYVo0e0Mlfa5b 0lVfeH+Qs6w6yIB1T0u0HtCjy35wrs9trnnLvYQMwJrd5tFzBIqB2b5hkNr6cm3oLzyT edKOdRkmoMstcTiH/PaqFINt1O9Rr/K58MDbYNXplhd7DmNi/h9uKHHNYdRcn4oA9Veb adpKP4kI8hTIW7gcyC3KxlQjTjDq+XGSiTjwdkH1+zFNJFXiat+ITavkhvTqI7QlkoOT dmqhgfzew/DJ9J/bwgeldagU4ZKp3cGouglLyD5mTBtOmqjpXGyZyO2j/DuRGEgfYdfO IlIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t192-v6si17543060pgc.485.2018.10.17.10.18.04; Wed, 17 Oct 2018 10:18:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727845AbeJRBOU (ORCPT + 99 others); Wed, 17 Oct 2018 21:14:20 -0400 Received: from mga18.intel.com ([134.134.136.126]:53440 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727013AbeJRBOS (ORCPT ); Wed, 17 Oct 2018 21:14:18 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Oct 2018 10:17:39 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,393,1534834800"; d="scan'208";a="96076007" Received: from twinkler-lnx.jer.intel.com ([10.12.91.48]) by fmsmga002.fm.intel.com with ESMTP; 17 Oct 2018 10:17:36 -0700 From: Tomas Winkler To: Jarkko Sakkinen , Jason Gunthorpe Cc: Nayna Jain , Alexander Usyskin , Tadeusz Struk , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Tomas Winkler Subject: [PATCH] tpm: fix kdoc for tpm2_flush_context_cmd() Date: Wed, 17 Oct 2018 20:13:31 +0300 Message-Id: <20181017171331.13393-1-tomas.winkler@intel.com> X-Mailer: git-send-email 2.14.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kdoc for tpm2_flush_context_cmd() was off. Fixes: commit 9aa36b399a50 ("tpm: export tpm2_flush_context_cmd")' Signed-off-by: Tomas Winkler --- drivers/char/tpm/tpm2-cmd.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c index 3acf4fd4e5a5..26cc31451290 100644 --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -352,10 +352,9 @@ int tpm2_get_random(struct tpm_chip *chip, u8 *dest, size_t max) /** * tpm2_flush_context_cmd() - execute a TPM2_FlushContext command * @chip: TPM chip to use - * @payload: the key data in clear and encrypted form - * @options: authentication values and other options + * @handle: context handle + * @flags: tpm transmit flags - bitmap * - * Return: same as with tpm_transmit_cmd */ void tpm2_flush_context_cmd(struct tpm_chip *chip, u32 handle, unsigned int flags) -- 2.14.4