|
16 | 16 | #include <linux/types.h>
|
17 | 17 |
|
18 | 18 | /**
|
19 |
| - * selinux_audit_rule_init - alloc/init an selinux audit rule structure. |
20 |
| - * @field: the field this rule refers to |
21 |
| - * @op: the operator the rule uses |
22 |
| - * @rulestr: the text "target" of the rule |
23 |
| - * @rule: pointer to the new rule structure returned via this |
24 |
| - * @gfp: GFP flag used for kmalloc |
| 19 | + * selinux_audit_rule_init - alloc/init an selinux audit rule structure. |
| 20 | + * @field: the field this rule refers to |
| 21 | + * @op: the operator the rule uses |
| 22 | + * @rulestr: the text "target" of the rule |
| 23 | + * @rule: pointer to the new rule structure returned via this |
| 24 | + * @gfp: GFP flag used for kmalloc |
25 | 25 | *
|
26 |
| - * Returns 0 if successful, -errno if not. On success, the rule structure |
27 |
| - * will be allocated internally. The caller must free this structure with |
28 |
| - * selinux_audit_rule_free() after use. |
| 26 | + * Returns 0 if successful, -errno if not. On success, the rule structure |
| 27 | + * will be allocated internally. The caller must free this structure with |
| 28 | + * selinux_audit_rule_free() after use. |
29 | 29 | */
|
30 | 30 | int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule,
|
31 | 31 | gfp_t gfp);
|
32 | 32 |
|
33 | 33 | /**
|
34 |
| - * selinux_audit_rule_free - free an selinux audit rule structure. |
35 |
| - * @rule: pointer to the audit rule to be freed |
| 34 | + * selinux_audit_rule_free - free an selinux audit rule structure. |
| 35 | + * @rule: pointer to the audit rule to be freed |
36 | 36 | *
|
37 |
| - * This will free all memory associated with the given rule. |
38 |
| - * If @rule is NULL, no operation is performed. |
| 37 | + * This will free all memory associated with the given rule. |
| 38 | + * If @rule is NULL, no operation is performed. |
39 | 39 | */
|
40 | 40 | void selinux_audit_rule_free(void *rule);
|
41 | 41 |
|
42 | 42 | /**
|
43 |
| - * selinux_audit_rule_match - determine if a context ID matches a rule. |
44 |
| - * @sid: the context ID to check |
45 |
| - * @field: the field this rule refers to |
46 |
| - * @op: the operator the rule uses |
47 |
| - * @rule: pointer to the audit rule to check against |
| 43 | + * selinux_audit_rule_match - determine if a context ID matches a rule. |
| 44 | + * @sid: the context ID to check |
| 45 | + * @field: the field this rule refers to |
| 46 | + * @op: the operator the rule uses |
| 47 | + * @rule: pointer to the audit rule to check against |
48 | 48 | *
|
49 |
| - * Returns 1 if the context id matches the rule, 0 if it does not, and |
50 |
| - * -errno on failure. |
| 49 | + * Returns 1 if the context id matches the rule, 0 if it does not, and |
| 50 | + * -errno on failure. |
51 | 51 | */
|
52 | 52 | int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
53 | 53 |
|
54 | 54 | /**
|
55 |
| - * selinux_audit_rule_known - check to see if rule contains selinux fields. |
56 |
| - * @rule: rule to be checked |
57 |
| - * Returns 1 if there are selinux fields specified in the rule, 0 otherwise. |
| 55 | + * selinux_audit_rule_known - check to see if rule contains selinux fields. |
| 56 | + * @rule: rule to be checked |
| 57 | + * Returns 1 if there are selinux fields specified in the rule, 0 otherwise. |
58 | 58 | */
|
59 | 59 | int selinux_audit_rule_known(struct audit_krule *rule);
|
60 | 60 |
|
|
0 commit comments