Skip to content

Commit d0a8331

Browse files
Yang Lipcmoore
authored andcommitted
selinux: Fix kernel-doc
Fix function name and add comment for parameter state in ss/services.c kernel-doc to remove some warnings found by running make W=1 LLVM=1. Reported-by: Abaci Robot <[email protected]> Signed-off-by: Yang Li <[email protected]> Signed-off-by: Paul Moore <[email protected]>
1 parent 648f2c6 commit d0a8331

File tree

1 file changed

+22
-1
lines changed

1 file changed

+22
-1
lines changed

security/selinux/ss/services.c

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,7 @@ int security_validate_transition(struct selinux_state *state,
859859
* It returns 0, if @newsid is bounded by @oldsid.
860860
* Otherwise, it returns error code.
861861
*
862+
* @state: SELinux state
862863
* @oldsid : current security identifier
863864
* @newsid : destinated security identifier
864865
*/
@@ -1098,6 +1099,7 @@ void security_compute_xperms_decision(struct selinux_state *state,
10981099

10991100
/**
11001101
* security_compute_av - Compute access vector decisions.
1102+
* @state: SELinux state
11011103
* @ssid: source security identifier
11021104
* @tsid: target security identifier
11031105
* @tclass: target security class
@@ -1386,6 +1388,7 @@ static int security_sid_to_context_core(struct selinux_state *state,
13861388

13871389
/**
13881390
* security_sid_to_context - Obtain a context for a given SID.
1391+
* @state: SELinux state
13891392
* @sid: security identifier, SID
13901393
* @scontext: security context
13911394
* @scontext_len: length in bytes
@@ -1411,6 +1414,7 @@ int security_sid_to_context_force(struct selinux_state *state, u32 sid,
14111414
/**
14121415
* security_sid_to_context_inval - Obtain a context for a given SID if it
14131416
* is invalid.
1417+
* @state: SELinux state
14141418
* @sid: security identifier, SID
14151419
* @scontext: security context
14161420
* @scontext_len: length in bytes
@@ -1587,6 +1591,7 @@ static int security_context_to_sid_core(struct selinux_state *state,
15871591

15881592
/**
15891593
* security_context_to_sid - Obtain a SID for a given security context.
1594+
* @state: SELinux state
15901595
* @scontext: security context
15911596
* @scontext_len: length in bytes
15921597
* @sid: security identifier, SID
@@ -1616,6 +1621,7 @@ int security_context_str_to_sid(struct selinux_state *state,
16161621
* security_context_to_sid_default - Obtain a SID for a given security context,
16171622
* falling back to specified default if needed.
16181623
*
1624+
* @state: SELinux state
16191625
* @scontext: security context
16201626
* @scontext_len: length in bytes
16211627
* @sid: security identifier, SID
@@ -1907,6 +1913,7 @@ static int security_compute_sid(struct selinux_state *state,
19071913

19081914
/**
19091915
* security_transition_sid - Compute the SID for a new subject/object.
1916+
* @state: SELinux state
19101917
* @ssid: source security identifier
19111918
* @tsid: target security identifier
19121919
* @tclass: target security class
@@ -1962,6 +1969,7 @@ int security_member_sid(struct selinux_state *state,
19621969

19631970
/**
19641971
* security_change_sid - Compute the SID for object relabeling.
1972+
* @state: SELinux state
19651973
* @ssid: source security identifier
19661974
* @tsid: target security identifier
19671975
* @tclass: target security class
@@ -2260,6 +2268,7 @@ void selinux_policy_commit(struct selinux_state *state,
22602268

22612269
/**
22622270
* security_load_policy - Load a security policy configuration.
2271+
* @state: SELinux state
22632272
* @data: binary policy data
22642273
* @len: length of data in bytes
22652274
*
@@ -2367,6 +2376,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len,
23672376

23682377
/**
23692378
* security_port_sid - Obtain the SID for a port.
2379+
* @state: SELinux state
23702380
* @protocol: protocol number
23712381
* @port: port number
23722382
* @out_sid: security identifier
@@ -2423,7 +2433,8 @@ int security_port_sid(struct selinux_state *state,
24232433
}
24242434

24252435
/**
2426-
* security_pkey_sid - Obtain the SID for a pkey.
2436+
* security_ib_pkey_sid - Obtain the SID for a pkey.
2437+
* @state: SELinux state
24272438
* @subnet_prefix: Subnet Prefix
24282439
* @pkey_num: pkey number
24292440
* @out_sid: security identifier
@@ -2482,6 +2493,7 @@ int security_ib_pkey_sid(struct selinux_state *state,
24822493

24832494
/**
24842495
* security_ib_endport_sid - Obtain the SID for a subnet management interface.
2496+
* @state: SELinux state
24852497
* @dev_name: device name
24862498
* @port: port number
24872499
* @out_sid: security identifier
@@ -2540,6 +2552,7 @@ int security_ib_endport_sid(struct selinux_state *state,
25402552

25412553
/**
25422554
* security_netif_sid - Obtain the SID for a network interface.
2555+
* @state: SELinux state
25432556
* @name: interface name
25442557
* @if_sid: interface SID
25452558
*/
@@ -2614,6 +2627,7 @@ static int match_ipv6_addrmask(u32 *input, u32 *addr, u32 *mask)
26142627

26152628
/**
26162629
* security_node_sid - Obtain the SID for a node (host).
2630+
* @state: SELinux state
26172631
* @domain: communication domain aka address family
26182632
* @addrp: address
26192633
* @addrlen: address length in bytes
@@ -2707,6 +2721,7 @@ int security_node_sid(struct selinux_state *state,
27072721

27082722
/**
27092723
* security_get_user_sids - Obtain reachable SIDs for a user.
2724+
* @state: SELinux state
27102725
* @fromsid: starting SID
27112726
* @username: username
27122727
* @sids: array of reachable SIDs for user
@@ -2899,6 +2914,7 @@ static inline int __security_genfs_sid(struct selinux_policy *policy,
28992914

29002915
/**
29012916
* security_genfs_sid - Obtain a SID for a file in a filesystem
2917+
* @state: SELinux state
29022918
* @fstype: filesystem type
29032919
* @path: path from root of mount
29042920
* @sclass: file security class
@@ -2943,6 +2959,7 @@ int selinux_policy_genfs_sid(struct selinux_policy *policy,
29432959

29442960
/**
29452961
* security_fs_use - Determine how to handle labeling for a filesystem.
2962+
* @state: SELinux state
29462963
* @sb: superblock in question
29472964
*/
29482965
int security_fs_use(struct selinux_state *state, struct super_block *sb)
@@ -3282,6 +3299,7 @@ int security_sid_mls_copy(struct selinux_state *state,
32823299

32833300
/**
32843301
* security_net_peersid_resolve - Compare and resolve two network peer SIDs
3302+
* @state: SELinux state
32853303
* @nlbl_sid: NetLabel SID
32863304
* @nlbl_type: NetLabel labeling protocol type
32873305
* @xfrm_sid: XFRM SID
@@ -3506,6 +3524,7 @@ int security_get_allow_unknown(struct selinux_state *state)
35063524

35073525
/**
35083526
* security_policycap_supported - Check for a specific policy capability
3527+
* @state: SELinux state
35093528
* @req_cap: capability
35103529
*
35113530
* Description:
@@ -3840,6 +3859,7 @@ static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr,
38403859

38413860
/**
38423861
* security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID
3862+
* @state: SELinux state
38433863
* @secattr: the NetLabel packet security attributes
38443864
* @sid: the SELinux SID
38453865
*
@@ -3922,6 +3942,7 @@ int security_netlbl_secattr_to_sid(struct selinux_state *state,
39223942

39233943
/**
39243944
* security_netlbl_sid_to_secattr - Convert a SELinux SID to a NetLabel secattr
3945+
* @state: SELinux state
39253946
* @sid: the SELinux SID
39263947
* @secattr: the NetLabel packet security attributes
39273948
*

0 commit comments

Comments
 (0)