@@ -859,6 +859,7 @@ int security_validate_transition(struct selinux_state *state,
859
859
* It returns 0, if @newsid is bounded by @oldsid.
860
860
* Otherwise, it returns error code.
861
861
*
862
+ * @state: SELinux state
862
863
* @oldsid : current security identifier
863
864
* @newsid : destinated security identifier
864
865
*/
@@ -1098,6 +1099,7 @@ void security_compute_xperms_decision(struct selinux_state *state,
1098
1099
1099
1100
/**
1100
1101
* security_compute_av - Compute access vector decisions.
1102
+ * @state: SELinux state
1101
1103
* @ssid: source security identifier
1102
1104
* @tsid: target security identifier
1103
1105
* @tclass: target security class
@@ -1386,6 +1388,7 @@ static int security_sid_to_context_core(struct selinux_state *state,
1386
1388
1387
1389
/**
1388
1390
* security_sid_to_context - Obtain a context for a given SID.
1391
+ * @state: SELinux state
1389
1392
* @sid: security identifier, SID
1390
1393
* @scontext: security context
1391
1394
* @scontext_len: length in bytes
@@ -1411,6 +1414,7 @@ int security_sid_to_context_force(struct selinux_state *state, u32 sid,
1411
1414
/**
1412
1415
* security_sid_to_context_inval - Obtain a context for a given SID if it
1413
1416
* is invalid.
1417
+ * @state: SELinux state
1414
1418
* @sid: security identifier, SID
1415
1419
* @scontext: security context
1416
1420
* @scontext_len: length in bytes
@@ -1587,6 +1591,7 @@ static int security_context_to_sid_core(struct selinux_state *state,
1587
1591
1588
1592
/**
1589
1593
* security_context_to_sid - Obtain a SID for a given security context.
1594
+ * @state: SELinux state
1590
1595
* @scontext: security context
1591
1596
* @scontext_len: length in bytes
1592
1597
* @sid: security identifier, SID
@@ -1616,6 +1621,7 @@ int security_context_str_to_sid(struct selinux_state *state,
1616
1621
* security_context_to_sid_default - Obtain a SID for a given security context,
1617
1622
* falling back to specified default if needed.
1618
1623
*
1624
+ * @state: SELinux state
1619
1625
* @scontext: security context
1620
1626
* @scontext_len: length in bytes
1621
1627
* @sid: security identifier, SID
@@ -1907,6 +1913,7 @@ static int security_compute_sid(struct selinux_state *state,
1907
1913
1908
1914
/**
1909
1915
* security_transition_sid - Compute the SID for a new subject/object.
1916
+ * @state: SELinux state
1910
1917
* @ssid: source security identifier
1911
1918
* @tsid: target security identifier
1912
1919
* @tclass: target security class
@@ -1962,6 +1969,7 @@ int security_member_sid(struct selinux_state *state,
1962
1969
1963
1970
/**
1964
1971
* security_change_sid - Compute the SID for object relabeling.
1972
+ * @state: SELinux state
1965
1973
* @ssid: source security identifier
1966
1974
* @tsid: target security identifier
1967
1975
* @tclass: target security class
@@ -2260,6 +2268,7 @@ void selinux_policy_commit(struct selinux_state *state,
2260
2268
2261
2269
/**
2262
2270
* security_load_policy - Load a security policy configuration.
2271
+ * @state: SELinux state
2263
2272
* @data: binary policy data
2264
2273
* @len: length of data in bytes
2265
2274
*
@@ -2367,6 +2376,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len,
2367
2376
2368
2377
/**
2369
2378
* security_port_sid - Obtain the SID for a port.
2379
+ * @state: SELinux state
2370
2380
* @protocol: protocol number
2371
2381
* @port: port number
2372
2382
* @out_sid: security identifier
@@ -2423,7 +2433,8 @@ int security_port_sid(struct selinux_state *state,
2423
2433
}
2424
2434
2425
2435
/**
2426
- * security_pkey_sid - Obtain the SID for a pkey.
2436
+ * security_ib_pkey_sid - Obtain the SID for a pkey.
2437
+ * @state: SELinux state
2427
2438
* @subnet_prefix: Subnet Prefix
2428
2439
* @pkey_num: pkey number
2429
2440
* @out_sid: security identifier
@@ -2482,6 +2493,7 @@ int security_ib_pkey_sid(struct selinux_state *state,
2482
2493
2483
2494
/**
2484
2495
* security_ib_endport_sid - Obtain the SID for a subnet management interface.
2496
+ * @state: SELinux state
2485
2497
* @dev_name: device name
2486
2498
* @port: port number
2487
2499
* @out_sid: security identifier
@@ -2540,6 +2552,7 @@ int security_ib_endport_sid(struct selinux_state *state,
2540
2552
2541
2553
/**
2542
2554
* security_netif_sid - Obtain the SID for a network interface.
2555
+ * @state: SELinux state
2543
2556
* @name: interface name
2544
2557
* @if_sid: interface SID
2545
2558
*/
@@ -2614,6 +2627,7 @@ static int match_ipv6_addrmask(u32 *input, u32 *addr, u32 *mask)
2614
2627
2615
2628
/**
2616
2629
* security_node_sid - Obtain the SID for a node (host).
2630
+ * @state: SELinux state
2617
2631
* @domain: communication domain aka address family
2618
2632
* @addrp: address
2619
2633
* @addrlen: address length in bytes
@@ -2707,6 +2721,7 @@ int security_node_sid(struct selinux_state *state,
2707
2721
2708
2722
/**
2709
2723
* security_get_user_sids - Obtain reachable SIDs for a user.
2724
+ * @state: SELinux state
2710
2725
* @fromsid: starting SID
2711
2726
* @username: username
2712
2727
* @sids: array of reachable SIDs for user
@@ -2899,6 +2914,7 @@ static inline int __security_genfs_sid(struct selinux_policy *policy,
2899
2914
2900
2915
/**
2901
2916
* security_genfs_sid - Obtain a SID for a file in a filesystem
2917
+ * @state: SELinux state
2902
2918
* @fstype: filesystem type
2903
2919
* @path: path from root of mount
2904
2920
* @sclass: file security class
@@ -2943,6 +2959,7 @@ int selinux_policy_genfs_sid(struct selinux_policy *policy,
2943
2959
2944
2960
/**
2945
2961
* security_fs_use - Determine how to handle labeling for a filesystem.
2962
+ * @state: SELinux state
2946
2963
* @sb: superblock in question
2947
2964
*/
2948
2965
int security_fs_use (struct selinux_state * state , struct super_block * sb )
@@ -3282,6 +3299,7 @@ int security_sid_mls_copy(struct selinux_state *state,
3282
3299
3283
3300
/**
3284
3301
* security_net_peersid_resolve - Compare and resolve two network peer SIDs
3302
+ * @state: SELinux state
3285
3303
* @nlbl_sid: NetLabel SID
3286
3304
* @nlbl_type: NetLabel labeling protocol type
3287
3305
* @xfrm_sid: XFRM SID
@@ -3506,6 +3524,7 @@ int security_get_allow_unknown(struct selinux_state *state)
3506
3524
3507
3525
/**
3508
3526
* security_policycap_supported - Check for a specific policy capability
3527
+ * @state: SELinux state
3509
3528
* @req_cap: capability
3510
3529
*
3511
3530
* Description:
@@ -3840,6 +3859,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr,
3840
3859
3841
3860
/**
3842
3861
* security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID
3862
+ * @state: SELinux state
3843
3863
* @secattr: the NetLabel packet security attributes
3844
3864
* @sid: the SELinux SID
3845
3865
*
@@ -3922,6 +3942,7 @@ int security_netlbl_secattr_to_sid(struct selinux_state *state,
3922
3942
3923
3943
/**
3924
3944
* security_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr
3945
+ * @state: SELinux state
3925
3946
* @sid: the SELinux SID
3926
3947
* @secattr: the NetLabel packet security attributes
3927
3948
*
0 commit comments