Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1030693img; Tue, 26 Feb 2019 12:53:00 -0800 (PST) X-Google-Smtp-Source: AHgI3IbzJWTydCGSZzH0fMgP/lADE+F7rFLYki72lqWh5qLsb/Kh2R9nVkZj7ZX7oIZcYvtkNKGr X-Received: by 2002:a63:fc64:: with SMTP id r36mr14650824pgk.280.1551214380187; Tue, 26 Feb 2019 12:53:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551214380; cv=none; d=google.com; s=arc-20160816; b=oN09jsiwNK7SUkdzGMLu5WXYQuC6kj8mJrKFEGVoS9icMbaG/SK/ebofKh4t7p0PpT Bz/2QYsMFFNQsHFlxL+5LgS9KMKJQUmkgBh+8uDfX9KBZpk02HSnWdL18J4YB6bjaWGj ixN5U3qAhzQA/Qr1Jh+bnZH8+FxuFusFgyAOyS3fAq/V7DBWFLW30yGTVAXr+Txnddy4 0nBTKOhznk6zt5cXgG5OWfE79U1wfM8T4I1x6xe3osuK9dh0TlOlv7oJOLgoccr4e6er /qVfrWDxjXy84CoULUjYGcwmzkQGUl4Zl62bSOxO929LgOhY85mHaWAn+vwQ0bGzkOgV usdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=5/YFs3DNWnKz/peObZ2J9eSwzPzMpVSx/gjDYEpH8Jo=; b=BoQepx9gtDsBWzUSyGPVgITbLbjiyKOGatXqTfeL+IYc5LNTRFedT7C6FFm+MqjGk7 77fnJ+MkUs+iEJkLyUolxcxgQamW5erhzvK5mc+tm3A5jS+hdQDSTUZqrz5viyzE/SWU qpZS3HsOuxaxiTVw/7eAxqM2nnaD708VL0zbW72S3ybkiz1Ba5jG1o0IckwPMoyEO5+O rF4XrTbYR2VQ51fE4BSpWrU9m/4r5u/oJZHRNBsaYZdo6n8eJyY51YR6gyVPrxzw/Fc8 hzXfCvmpj+AIA4FzEJLvV3GXgjaIcKpBbwO863qdiDLvJQyH8ljI095w4pGjySnvApPH orLg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cn17si14070577plb.139.2019.02.26.12.52.44; Tue, 26 Feb 2019 12:53:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729359AbfBZUvS (ORCPT + 99 others); Tue, 26 Feb 2019 15:51:18 -0500 Received: from mail.ispras.ru ([83.149.199.45]:45492 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729331AbfBZUvR (ORCPT ); Tue, 26 Feb 2019 15:51:17 -0500 Received: from green.intra.ispras.ru (pluton2.ispras.ru [83.149.199.44]) by mail.ispras.ru (Postfix) with ESMTPSA id 2D75D5400ED; Tue, 26 Feb 2019 23:51:13 +0300 (MSK) From: Denis Efremov To: Kees Cook Cc: Denis Efremov , Casey Schaufler , "Eric W. Biederman" , Eric Paris , John Johansen , James Morris , "Serge E. Hallyn" , Paul Moore , Kentaro Takeda , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 11/11] LSM: lsm_hooks.h: fix documentation format Date: Tue, 26 Feb 2019 23:49:12 +0300 Message-Id: <3eb6e0f44a9f540922ba9951053218b60367f289.1551213058.git.efremov@ispras.ru> X-Mailer: git-send-email 2.17.2 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix for name mismatch and omitted colons in the security_list_options documentation. Signed-off-by: Denis Efremov --- include/linux/lsm_hooks.h | 23 +++++++++-------------- 1 file changed, 9 insertions(+), 14 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index f4a168c5e85c..bc5a2dc267d8 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -486,7 +486,7 @@ * Return 0 if permission is granted. * @file_lock: * Check permission before performing file locking operations. - * Note: this hook mediates both flock and fcntl style locks. + * Note the hook mediates both flock and fcntl style locks. * @file contains the file structure. * @cmd contains the posix-translated lock operation to perform * (e.g. F_RDLCK, F_WRLCK). @@ -629,12 +629,12 @@ * @p contains the task_struct of process. * @nice contains the new nice value. * Return 0 if permission is granted. - * @task_setioprio + * @task_setioprio: * Check permission before setting the ioprio value of @p to @ioprio. * @p contains the task_struct of process. * @ioprio contains the new ioprio value * Return 0 if permission is granted. - * @task_getioprio + * @task_getioprio: * Check permission before getting the ioprio value of @p. * @p contains the task_struct of process. * Return 0 if permission is granted. @@ -664,7 +664,7 @@ * @p. * @p contains the task_struct for process. * Return 0 if permission is granted. - * @task_movememory + * @task_movememory: * Check permission before moving memory owned by process @p. * @p contains the task_struct for process. * Return 0 if permission is granted. @@ -888,9 +888,9 @@ * @secmark_relabel_packet: * check if the process should be allowed to relabel packets to * the given secid - * @security_secmark_refcount_inc + * @secmark_refcount_inc: * tells the LSM to increment the number of secmark labeling rules loaded - * @security_secmark_refcount_dec + * @secmark_refcount_dec: * tells the LSM to decrement the number of secmark labeling rules loaded * @req_classify_flow: * Sets the flow's sid to the openreq sid. @@ -1278,8 +1278,8 @@ * Return 0 if permission is granted. * @settime: * Check permission to change the system time. - * struct timespec64 is defined in include/linux/time64.h and timezone - * is defined in include/linux/time.h + * struct timespec64 is defined in and timezone + * is defined in * @ts contains new time * @tz contains new timezone * Return 0 if permission is granted. @@ -1321,7 +1321,7 @@ * @audit_rule_init: * Allocate and initialize an LSM audit rule structure. * @field contains the required Audit action. - * Fields flags are defined in include/linux/audit.h + * Fields flags are defined in * @op contains the operator the rule uses. * @rulestr contains the context where the rule will be applied to. * @lsmrule contains a pointer to receive the result. @@ -1360,9 +1360,7 @@ * this hook to initialize the security context in its incore inode to the * value provided by the server for the file when the server returned the * file's attributes to the client. - * * Must be called with inode->i_mutex locked. - * * @inode we wish to set the security context of. * @ctx contains the string which we wish to set in the inode. * @ctxlen contains the length of @ctx. @@ -1375,9 +1373,7 @@ * this hook to change the security context in its incore inode and on the * backing filesystem to a value provided by the client on a SETATTR * operation. - * * Must be called with inode->i_mutex locked. - * * @dentry contains the inode we wish to set the security context of. * @ctx contains the string which we wish to set in the inode. * @ctxlen contains the length of @ctx. @@ -1385,7 +1381,6 @@ * @inode_getsecctx: * On success, returns 0 and fills out @ctx and @ctxlen with the security * context for the given @inode. - * * @inode we wish to get the security context of. * @ctx is a pointer in which to place the allocated security context. * @ctxlen points to the place to put the length of @ctx. -- 2.17.2