Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3292734pxj; Mon, 24 May 2021 03:22:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwq3hUncZkavHRdI5O7EqWzYPsQr5nf5kahypjAN6xuDsro5MhDaKv1SFu5Bgyq7t4IGGp7 X-Received: by 2002:a17:907:37b:: with SMTP id rs27mr23372230ejb.287.1621851721041; Mon, 24 May 2021 03:22:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621851721; cv=none; d=google.com; s=arc-20160816; b=OtHZRNGdB4QgCzwTIA/+sh4aVzyFGhbYt2eKFiIvnDdDlEfbOh4a7rPH9N3ISxzTTY N/ldPiPZiklhdj7CqnrgNHusJMtBfxVb+ckNAm5NrNXx/+iTM5iCtO2nraAglFHtii9Q tixFTOen+FHa0PrV5qiAbi9cQsQpaSJxiyHDCeQWTmjmtIiX5jFfPr1WMtuVhrOlx+f7 RoYGA0hY/fJGflHXcz5aGBcCDQlfqkzPRyXFed2V0Khdo+eelu/brySTfCqjQuUXyHI+ es3TBd4H/FApsogSf5VKrbKvpEvg2Ktp3/vRyCnrnjbBgI/2lFenTQLTKYXEqFlILauw NBBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=XCnyT815+GyW8sDrK4Q5jlwMRXUHJtudGFBNla3ynj8=; b=irVxxsB2N9bb5jCmYxfLJ1Y//fTA/y4mXqIGD4SzV5Fz39X7y1QMyjjzxM89qVvas+ USeag1JwRx+DVcr+wBLZ3NBQI79/drtp0cglz8rHEzyD70e/X5mf9/JqrHejnHqUlIYJ ec5dYbB5YEWtU9qmYBv22mFqzfd3kuxGsYwh7CDcCxV31nTqqtCbLjVMYlbcW1jHwPNk v53Yu4L9V/kBRSn+WLnoIzsNawm7SWNqg/Yob7T50LCN/Hnew4/iTVNN/m3I93fN9T3q +1W93PC1wVbhGO0EFC4xmdaxY1MLWPt/wB/iEtm+2DvaGg6Wh+3Xq+1Ft6gjRnioEdQn BjRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kl10si2946393ejc.361.2021.05.24.03.21.38; Mon, 24 May 2021 03:22:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232592AbhEXKU7 (ORCPT + 99 others); Mon, 24 May 2021 06:20:59 -0400 Received: from out30-54.freemail.mail.aliyun.com ([115.124.30.54]:36631 "EHLO out30-54.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232511AbhEXKU4 (ORCPT ); Mon, 24 May 2021 06:20:56 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R111e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04423;MF=yang.lee@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0UZvJBtZ_1621851566; Received: from j63c13417.sqa.eu95.tbsite.net(mailfrom:yang.lee@linux.alibaba.com fp:SMTPD_---0UZvJBtZ_1621851566) by smtp.aliyun-inc.com(127.0.0.1); Mon, 24 May 2021 18:19:27 +0800 From: Yang Li To: dhowells@redhat.com Cc: dwmw2@infradead.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Yang Li Subject: [PATCH] certs: Fix kernel-doc Date: Mon, 24 May 2021 18:19:23 +0800 Message-Id: <1621851563-30425-1-git-send-email-yang.lee@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix function name in system_keyring.c kernel-doc comment to remove a warning. certs/system_keyring.c:41: warning: expecting prototype for restrict_link_to_builtin_trusted(). Prototype was for restrict_link_by_builtin_trusted() instead. Reported-by: Abaci Robot Fixes: 'commit d3bfe84129f6 ("certs: Add a secondary system keyring that can be added to dynamically")' Signed-off-by: Yang Li --- certs/system_keyring.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 692365d..06c0c3d 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -31,7 +31,7 @@ extern __initconst const unsigned long module_cert_size; /** - * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA + * restrict_link_by_builtin_trusted - Restrict keyring addition by built in CA * * Restrict the addition of keys into a keyring based on the key-to-be-added * being vouched for by a key in the built in system keyring. -- 1.8.3.1