Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp3329456ima; Tue, 23 Oct 2018 04:18:58 -0700 (PDT) X-Google-Smtp-Source: AJdET5dy452a34DUbMO1cZ3lOrKRf0sLYpAuLr3HNsiRcx+S7/40GrabvqSAbO7YWEzhC4AIyWkX X-Received: by 2002:a63:7a5b:: with SMTP id j27mr3040847pgn.112.1540293538796; Tue, 23 Oct 2018 04:18:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540293538; cv=none; d=google.com; s=arc-20160816; b=Te62j7N1ucTid5B+uZa6Tu3XJHts636pqVZGwtRGtUDDs0g8iMlIHxz+YtlIReIWi7 2e7siWiOFeLeyUbZVe9TCFVk8Ck+NVQJnzeCwOnyuiVMeqCeg/Sf/dLozNEtYG++mYiO H1aOI2udRr6SuBU8jrp+Ju8d+cWDc6N/0QcGtZBK5fcRmxmiOjADpjHVPtDo+BluU16J 2ZrYb/37ohUDOf5JXCF3LTnH4paU+jlFPYk86pPFMWPxMr9nohq2sFdcEui6d1jBoxSM wzVMYQSwAq0wSt0bxAH9mGHhYuxZdpssuj/yOGKfM0oqUlfy7PnDyuxd3JjSz0YIgcm8 AJNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=pFIid1ttnKbTSJAGSgem9ZOeJp9oXMhJmrteQgVEv28=; b=gM239yR1pp634h8AErkvzZSA133JLttFpUNqHNA7ksTaDdMxp4PBxmKhPS506+K6HH D5KqEbey5FkxoHZKabIl4txE4DRelo78T8I4vLB4odEh37cvYHBR5CcoOBJqQwp0m2bm f3CLo74xYzna3/inrgpiYMbfR3sLWWQ0yKT+M13tOp7aBIahupks4oqs+o77KM1ACpfe b4Ma7DDGi6Pc8ADnOlkCxIPSDZcCJHwtau/UW7ATQe2/N3IqG1pphWPhOjAblbcUE0cZ Cvvslty+geHwmLnEpHPFxNKKJzn8g3xsyDJvG01XTB4y3gzW+ONKS/ixWuneb0FIpPcC kwaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d18-v6si1087374plj.82.2018.10.23.04.18.42; Tue, 23 Oct 2018 04:18:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728137AbeJWTlW (ORCPT + 99 others); Tue, 23 Oct 2018 15:41:22 -0400 Received: from mail-ed1-f65.google.com ([209.85.208.65]:35772 "EHLO mail-ed1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727568AbeJWTlV (ORCPT ); Tue, 23 Oct 2018 15:41:21 -0400 Received: by mail-ed1-f65.google.com with SMTP id e2-v6so1240374edn.2 for ; Tue, 23 Oct 2018 04:18:19 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=pFIid1ttnKbTSJAGSgem9ZOeJp9oXMhJmrteQgVEv28=; b=htRFTUws+CDcHQr1EHCrs1h+MsO5LMI/EwGj4IcOw9pT1SX0RVKReZdLeTURw2EpjP 86+o+XZx61C/BrtHrhRdAQj/5y81lWPreL1M4bFvAshT2aKM9FES4wCXLLsBV6g6C03p yFVESoeyUCSwLxE+BY40PScmSCy7PfF3622v+EHWBx7VZ92OeIWV6TVqbfXH2el6v/T8 QFKPdXbbQ3zeW3eou/UJmio5UmE1D0dXmnUIpY8Hq4Rc/WkB1w8CgBizYhYmTXe8ehyb 40nKcQL6c7cJlVUOLyuKx5to3O4mK6vq26LZca59RXAK5vpjcTLSF9lC+qaqOY5jRYVW qg0g== X-Gm-Message-State: ABuFfohb4pryw5m4NNtbpkXZsadah34Xo5a9XE5cG1Y09J7CTxAHXKX7 K2esqDBHj/MCrZk2Erh3FlU= X-Received: by 2002:a17:906:454b:: with SMTP id s11-v6mr37300926ejq.83.1540293499243; Tue, 23 Oct 2018 04:18:19 -0700 (PDT) Received: from green.intra.ispras.ru (bran.ispras.ru. [83.149.199.196]) by smtp.googlemail.com with ESMTPSA id x21-v6sm480339eds.30.2018.10.23.04.18.17 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 23 Oct 2018 04:18:18 -0700 (PDT) From: efremov@linux.com To: James Morris Cc: Denis Efremov , "Serge E. Hallyn" , Eric Paris , Paul Moore , Kees Cook , John Johansen , linux-kernel@vger.kernel.org Subject: [PATCH] security: fix documentation for the audit_* hooks Date: Tue, 23 Oct 2018 14:17:48 +0300 Message-Id: <20181023111749.1581-1-efremov@linux.com> X-Mailer: git-send-email 2.17.2 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Denis Efremov This patch makes argument names equal in the documentation and declarations of the audit_* hooks. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 596351f7c3d1..9fb67c212298 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1329,7 +1329,7 @@ * @audit_rule_known: * Specifies whether given @rule contains any fields related to * current LSM. - * @rule contains the audit rule of interest. + * @krule contains the audit rule of interest. * Return 1 in case of relation found, 0 otherwise. * * @audit_rule_match: @@ -1338,14 +1338,14 @@ * @secid contains the security id in question. * @field contains the field which relates to current LSM. * @op contains the operator that will be used for matching. - * @rule points to the audit rule that will be checked against. + * @lsmrule points to the audit rule that will be checked against. * @actx points to the audit context associated with the check. * Return 1 if secid matches the rule, 0 if it does not, -ERRNO on failure. * * @audit_rule_free: * Deallocate the LSM audit rule structure previously allocated by * audit_rule_init. - * @rule contains the allocated rule + * @lsmrule contains the allocated rule. * * @inode_invalidate_secctx: * Notify the security module that it must revalidate the security context -- 2.17.2