diff options
author | Lukasz Pawelczyk <l.pawelczyk@samsung.com> | 2014-11-26 15:31:06 +0100 |
---|---|---|
committer | Casey Schaufler <casey@schaufler-ca.com> | 2015-01-19 09:16:55 -0800 |
commit | 1a28979b322bb28d8f95f76f080c53dbb9a8222d (patch) | |
tree | 58b53f306964d91f9e56ce3774b34984daee9402 /security | |
parent | bb31f607a0900552926ebf9ef3d002d96a43f7cc (diff) | |
download | linux-1a28979b322bb28d8f95f76f080c53dbb9a8222d.tar.gz linux-1a28979b322bb28d8f95f76f080c53dbb9a8222d.tar.bz2 linux-1a28979b322bb28d8f95f76f080c53dbb9a8222d.zip |
smack: miscellaneous small fixes in function comments
Signed-off-by: Lukasz Pawelczyk <l.pawelczyk@samsung.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/smack/smack_lsm.c | 14 |
1 files changed, 9 insertions, 5 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index f1b17a476e12..dcfaddd955d1 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -202,6 +202,7 @@ static int smk_bu_credfile(const struct cred *cred, struct file *file, /** * smk_fetch - Fetch the smack label from a file. + * @name: type of the label (attribute) * @ip: a pointer to the inode * @dp: a pointer to the dentry * @@ -254,7 +255,9 @@ struct inode_smack *new_inode_smack(struct smack_known *skp) /** * new_task_smack - allocate a task security blob - * @smack: a pointer to the Smack label to use in the blob + * @task: a pointer to the Smack label for the running task + * @forked: a pointer to the Smack label for the forked task + * @gfp: type of the memory for the allocation * * Returns the new blob or NULL if there's no memory available */ @@ -277,8 +280,9 @@ static struct task_smack *new_task_smack(struct smack_known *task, /** * smk_copy_rules - copy a rule set - * @nhead - new rules header pointer - * @ohead - old rules header pointer + * @nhead: new rules header pointer + * @ohead: old rules header pointer + * @gfp: type of the memory for the allocation * * Returns 0 on success, -ENOMEM on error */ @@ -3834,11 +3838,11 @@ static void smack_key_free(struct key *key) key->security = NULL; } -/* +/** * smack_key_permission - Smack access on a key * @key_ref: gets to the object * @cred: the credentials to use - * @perm: unused + * @perm: requested key permissions * * Return 0 if the task has read and write to the object, * an error code otherwise |