@@ -391,7 +391,7 @@ static int smk_copy_relabel(struct list_head *nhead, struct list_head *ohead,
391
391
392
392
/**
393
393
* smk_ptrace_mode - helper function for converting PTRACE_MODE_* into MAY_*
394
- * @mode - input mode in form of PTRACE_MODE_*
394
+ * @mode: input mode in form of PTRACE_MODE_*
395
395
*
396
396
* Returns a converted MAY_* mode usable by smack rules
397
397
*/
@@ -1215,6 +1215,7 @@ static int smack_inode_getattr(const struct path *path)
1215
1215
1216
1216
/**
1217
1217
* smack_inode_setxattr - Smack check for setting xattrs
1218
+ * @mnt_userns: active user namespace
1218
1219
* @dentry: the object
1219
1220
* @name: name of the attribute
1220
1221
* @value: value of the attribute
@@ -1341,6 +1342,7 @@ static int smack_inode_getxattr(struct dentry *dentry, const char *name)
1341
1342
1342
1343
/**
1343
1344
* smack_inode_removexattr - Smack check on removexattr
1345
+ * @mnt_userns: active user namespace
1344
1346
* @dentry: the object
1345
1347
* @name: name of the attribute
1346
1348
*
@@ -1400,6 +1402,7 @@ static int smack_inode_removexattr(struct user_namespace *mnt_userns,
1400
1402
1401
1403
/**
1402
1404
* smack_inode_getsecurity - get smack xattrs
1405
+ * @mnt_userns: active user namespace
1403
1406
* @inode: the object
1404
1407
* @name: attribute name
1405
1408
* @buffer: where to put the result
@@ -1621,13 +1624,14 @@ static int smack_file_fcntl(struct file *file, unsigned int cmd,
1621
1624
}
1622
1625
1623
1626
/**
1624
- * smack_mmap_file :
1625
- * Check permissions for a mmap operation. The @file may be NULL, e.g.
1626
- * if mapping anonymous memory.
1627
- * @file contains the file structure for file to map (may be NULL).
1628
- * @reqprot contains the protection requested by the application.
1629
- * @prot contains the protection that will be applied by the kernel.
1630
- * @flags contains the operational flags.
1627
+ * smack_mmap_file - Check permissions for a mmap operation.
1628
+ * @file: contains the file structure for file to map (may be NULL).
1629
+ * @reqprot: contains the protection requested by the application.
1630
+ * @prot: contains the protection that will be applied by the kernel.
1631
+ * @flags: contains the operational flags.
1632
+ *
1633
+ * The @file may be NULL, e.g. if mapping anonymous memory.
1634
+ *
1631
1635
* Return 0 if permission is granted.
1632
1636
*/
1633
1637
static int smack_mmap_file (struct file * file ,
@@ -3054,7 +3058,7 @@ static int smack_sem_associate(struct kern_ipc_perm *isp, int semflg)
3054
3058
}
3055
3059
3056
3060
/**
3057
- * smack_sem_shmctl - Smack access check for sem
3061
+ * smack_sem_semctl - Smack access check for sem
3058
3062
* @isp: the object
3059
3063
* @cmd: what it wants to do
3060
3064
*
@@ -3200,7 +3204,7 @@ static int smack_msg_queue_msgsnd(struct kern_ipc_perm *isp, struct msg_msg *msg
3200
3204
}
3201
3205
3202
3206
/**
3203
- * smack_msg_queue_msgsnd - Smack access check for msg_queue
3207
+ * smack_msg_queue_msgrcv - Smack access check for msg_queue
3204
3208
* @isp: the object
3205
3209
* @msg: unused
3206
3210
* @target: unused
@@ -3209,8 +3213,10 @@ static int smack_msg_queue_msgsnd(struct kern_ipc_perm *isp, struct msg_msg *msg
3209
3213
*
3210
3214
* Returns 0 if current has read and write access, error code otherwise
3211
3215
*/
3212
- static int smack_msg_queue_msgrcv (struct kern_ipc_perm * isp , struct msg_msg * msg ,
3213
- struct task_struct * target , long type , int mode )
3216
+ static int smack_msg_queue_msgrcv (struct kern_ipc_perm * isp ,
3217
+ struct msg_msg * msg ,
3218
+ struct task_struct * target , long type ,
3219
+ int mode )
3214
3220
{
3215
3221
return smk_curacc_msq (isp , MAY_READWRITE );
3216
3222
}
0 commit comments