Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp491139imd; Fri, 26 Oct 2018 11:45:31 -0700 (PDT) X-Google-Smtp-Source: AJdET5dYu6QcQh37t26aAlJcuuTFkN4yUPdprMy/0++I5D0h2DQKTFR6z2C7biUbhnZWPbIVZecx X-Received: by 2002:a17:902:bd4a:: with SMTP id b10-v6mr4543582plx.171.1540579531562; Fri, 26 Oct 2018 11:45:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540579531; cv=none; d=google.com; s=arc-20160816; b=0q3nhc0WzKZIQ+GAi0vGLoYEq1uJFwzD/YzHXLiX8v4YnNXndJMUpbXyNdjUahCHI/ aV1RYjZzjBEqR1sUCNbTXKkhzgypDADZMGLjl2r4BpIrgdHwj6Ueexk57+c5RWFxlTX3 Ta0gXxFmDuL5dYMDayxk3OQRNaCOHecN+bwnANRMHCBFeKRuVAVDAGLufGZIia29Jawa sr9wLOzseVKv1w7C6c4mwJCbbYYon23BX7BZV1HlMBwMno1YZIlo/iUGKloidn7yTiJa LHaA00/Emmuyv+4V1KUC9FNA6uISngZluwmYSHil2ltIBlAP8//0Jh1hdcq87Kd+QS65 7DPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=gFRtQiyfZl90jXTC0OPytf3vnwTe+kB0MdLFR9p7Jq8=; b=KNlXTdhek9kSjVCnTUdW3fl5up4ntSJJGW5+HQRlGX+SQsPJMerJVn2mkTa2YF0BBy kx48xDrdtchpYu5rSzlUa++MRhlIHau8RNBMTqOHZI9kJzpoaulhVZEFj/+54andIZGu CPJITU3VpQXbQIAK0RHsQIDXd8bACmGgo87QT2UVHQiGrQDxO9MqLlpSbKa2CEcIBQlP 7Jghs8OSvDC9P/eVf7/0u068Y9ZZVJrQvwXBa3MOTDXOmKEz/TnnKv5qD/CmvAfaQJ0F FF6q+a/4qVB/EJRcGcSjbzlf2/SFVOqqa8DamD8MTrciDRfHYMG+o57h0G/RhOHHxG1n Unvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l9-v6si11641118pgi.509.2018.10.26.11.45.15; Fri, 26 Oct 2018 11:45:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728066AbeJ0DW6 (ORCPT + 99 others); Fri, 26 Oct 2018 23:22:58 -0400 Received: from mga11.intel.com ([192.55.52.93]:52476 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728003AbeJ0DW6 (ORCPT ); Fri, 26 Oct 2018 23:22:58 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Oct 2018 11:44:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,428,1534834800"; d="scan'208";a="102977890" Received: from twinkler-lnx.jer.intel.com ([10.12.91.48]) by orsmga001.jf.intel.com with ESMTP; 26 Oct 2018 11:44:47 -0700 From: Tomas Winkler To: Jarkko Sakkinen , Jason Gunthorpe Cc: Nayna Jain , Alexander Usyskin , Tadeusz Struk , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Tomas Winkler Subject: [PATCH v3] tpm: fix kdoc for tpm2_flush_context_cmd() Date: Fri, 26 Oct 2018 21:40:42 +0300 Message-Id: <20181026184043.5524-1-tomas.winkler@intel.com> X-Mailer: git-send-email 2.14.5 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kdoc for tpm2_flush_context_cmd() was off. Fixes: 9aa36b399a50 ("tpm: export tpm2_flush_context_cmd")' Signed-off-by: Tomas Winkler --- V2: drop 'commit' from Fixes: V3: Align arguments with tab. drivers/char/tpm/tpm2-cmd.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c index ae86fb0218ab..a6bec13afa69 100644 --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -342,11 +342,10 @@ int tpm2_get_random(struct tpm_chip *chip, u8 *dest, size_t max) /** * tpm2_flush_context_cmd() - execute a TPM2_FlushContext command - * @chip: TPM chip to use - * @payload: the key data in clear and encrypted form - * @options: authentication values and other options + * @chip: TPM chip to use + * @handle: context handle + * @flags: tpm transmit flags - bitmap * - * Return: same as with tpm_transmit_cmd */ void tpm2_flush_context_cmd(struct tpm_chip *chip, u32 handle, unsigned int flags) -- 2.14.5