Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp460337rwb; Wed, 7 Dec 2022 21:26:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf6LZrcJ5w8KXUop52Cfp9Kkuh0r1pnWYITmYxZZuweHxUViLxmkdKqc4uyr/r6LHjs+qtqZ X-Received: by 2002:a17:907:1185:b0:7c0:d543:7bd6 with SMTP id uz5-20020a170907118500b007c0d5437bd6mr17416910ejb.237.1670477196013; Wed, 07 Dec 2022 21:26:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670477196; cv=none; d=google.com; s=arc-20160816; b=qA/TC8yTy09UnWc9iu0mYS0J4q40iPBvOtFK8NCIttEn5cXKJEnxwAq2vJv1bJI1+u GwPC2GkEqQT/YXDfIDrch+UVbPwwrLC+ZjW0InE9vtZgDPtA5xiQjUa99iHWD1+pbnRf E3fddfTWEELZIYi+QSZzR+RRQluN7iR9Sdotj8YNNxv8g+b9Ft/BWs2ZWwJ3a+mdEaKq wXSE3I/GMFWT+TCqCeuOeAIn1WSVDDluIB96hp3nn558XuN6E9ozK4LYzHxk9GIVZmq3 OYhpEEA6wfhv75W1v4q48NWwL0nTUwWvIVoLxXKly/Y7Kku1xGr8Tbgv4gzvP3NXvZJn sUiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=ACV4rT4gBkGjhfs+VCatmrCp7ZnekU2Vc70HRnY/zuM=; b=baY82HCTqXy4Fi6I1BdTKYoyT8GhOf07rxs92fJD3T6ngiEaLhlDRm7rCDVOR/YYlr tRq+wVSuqk+4s+0bhoYQdq2lWYNcYgqI4SJqPm04xWLBJTs716NyW8DOytr+/gTAHBeV VtJ1WJZ1OGAxMbFtdMuCICL/rckzBay4U7Yc+4IOe81jbdHJuEKHS0awuzcMHqCupP0v sRMmp3qZAEZ7q2tpM2Wk+xSGMFf54SBPwkSHFpdAj9Cq9I7X2IcupEPdj3T90lRDYJKY gbXh/Uxno7wUecP5mkcyQ/+VKMZhXmhr4QlcbBjUVfgTRUZIsqTERHbb7uYlshMPBuPf 1edw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b="QPqvb/Dp"; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f20-20020a170906c09400b0079b9f472d85si15927079ejz.698.2022.12.07.21.26.12; Wed, 07 Dec 2022 21:26:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b="QPqvb/Dp"; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229680AbiLHFY1 (ORCPT + 99 others); Thu, 8 Dec 2022 00:24:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56772 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229911AbiLHFYA (ORCPT ); Thu, 8 Dec 2022 00:24:00 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65B19A13EE; Wed, 7 Dec 2022 21:22:10 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id A76A622BB0; Thu, 8 Dec 2022 05:22:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1670476926; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=ACV4rT4gBkGjhfs+VCatmrCp7ZnekU2Vc70HRnY/zuM=; b=QPqvb/DpJi4JdY0ueKrbo4U+osPUnwv923TMjuzc5/SBMKsgYXO6z7hzG6qXl8xNmCCYoe SpcC5xDWfOKsuDjrzMZzhz/nGOMG65eOB6OdNSm25QdE+xnqtDyL79xyjRLJHO4V1xObLP e45h8hBsbKjqKUxshiCCUB1Fo98YfXk= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1670476926; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=ACV4rT4gBkGjhfs+VCatmrCp7ZnekU2Vc70HRnY/zuM=; b=9EUifSzgee1fhYYRgFFhXzVDIy33OVwWogjvHi3jkvinZxR/u5/dXjUaljBdqaI2rKTIT7 /8sp1dCLLlYQFPDQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 05BA013254; Thu, 8 Dec 2022 05:22:06 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id agBPAH50kWOLXwAAMHmgww (envelope-from ); Thu, 08 Dec 2022 05:22:06 +0000 Date: Thu, 8 Dec 2022 06:22:04 +0100 From: Petr Vorel To: Eric Snowberg Cc: jarkko@kernel.org, zohar@linux.ibm.com, dhowells@redhat.com, dwmw2@infradead.org, herbert@gondor.apana.org.au, davem@davemloft.net, dmitry.kasatkin@gmail.com, paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com, noodles@fb.com, tiwai@suse.de, bp@suse.de, kanth.ghatraju@oracle.com, konrad.wilk@oracle.com, erpalmer@linux.vnet.ibm.com, coxu@redhat.com, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v2 02/10] KEYS: Add missing function documentation Message-ID: Reply-To: Petr Vorel References: <20221207171238.2945307-1-eric.snowberg@oracle.com> <20221207171238.2945307-3-eric.snowberg@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221207171238.2945307-3-eric.snowberg@oracle.com> X-Spam-Status: No, score=-3.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_SOFTFAIL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Eric, > Compiling with 'W=1' results in warnings that 'Function parameter or member > not described' > Add the missing parameters for > restrict_link_by_builtin_and_secondary_trusted and > restrict_link_to_builtin_trusted. > Use /* instead of /** for get_builtin_and_secondary_restriction, since > it is a static function. > Signed-off-by: Eric Snowberg > --- > certs/system_keyring.c | 12 ++++++++++-- > 1 file changed, 10 insertions(+), 2 deletions(-) > diff --git a/certs/system_keyring.c b/certs/system_keyring.c > index 5042cc54fa5e..250148298690 100644 > --- a/certs/system_keyring.c > +++ b/certs/system_keyring.c > @@ -33,7 +33,11 @@ extern __initconst const unsigned long system_certificate_list_size; > extern __initconst const unsigned long module_cert_size; > /** > - * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA > + * restrict_link_by_builtin_trusted - Restrict keyring addition by built in CA Hm, wrong function name restrict_link_to_builtin_trusted brought by: d3bfe84129f6 ("certs: Add a secondary system keyring that can be added to dynamically") > + * @dest_keyring: Keyring being linked to. > + * @type: The type of key being added. > + * @payload: The payload of the new key. > + * @restriction_key: A ring of keys that can be used to vouch for the new cert. > * > * Restrict the addition of keys into a keyring based on the key-to-be-added > * being vouched for by a key in the built in system keyring. > @@ -51,6 +55,10 @@ int restrict_link_by_builtin_trusted(struct key *dest_keyring, > /** > * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring > * addition by both builtin and secondary keyrings nit: missing dot at the end of the sentence (maybe can be fixed before merge). Obviously correct. Reviewed-by: Petr Vorel Kind regards, Petr > + * @dest_keyring: Keyring being linked to. > + * @type: The type of key being added. > + * @payload: The payload of the new key. > + * @restrict_key: A ring of keys that can be used to vouch for the new cert. > * > * Restrict the addition of keys into a keyring based on the key-to-be-added > * being vouched for by a key in either the built-in or the secondary system > @@ -75,7 +83,7 @@ int restrict_link_by_builtin_and_secondary_trusted( > secondary_trusted_keys); > } > -/** > +/* > * Allocate a struct key_restriction for the "builtin and secondary trust" > * keyring. Only for use in system_trusted_keyring_init(). > */