Skip to content

Commit d19a9e2

Browse files
committed
selinux: fix style problems in security/selinux/include/audit.h
Remove the needless indent in the function comment header blocks. Signed-off-by: Paul Moore <[email protected]>
1 parent 68cfb28 commit d19a9e2

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

security/selinux/include/audit.h

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -16,45 +16,45 @@
1616
#include <linux/types.h>
1717

1818
/**
19-
* selinux_audit_rule_init - alloc/init an selinux audit rule structure.
20-
* @field: the field this rule refers to
21-
* @op: the operator the rule uses
22-
* @rulestr: the text "target" of the rule
23-
* @rule: pointer to the new rule structure returned via this
24-
* @gfp: GFP flag used for kmalloc
19+
* selinux_audit_rule_init - alloc/init an selinux audit rule structure.
20+
* @field: the field this rule refers to
21+
* @op: the operator the rule uses
22+
* @rulestr: the text "target" of the rule
23+
* @rule: pointer to the new rule structure returned via this
24+
* @gfp: GFP flag used for kmalloc
2525
*
26-
* Returns 0 if successful, -errno if not. On success, the rule structure
27-
* will be allocated internally. The caller must free this structure with
28-
* selinux_audit_rule_free() after use.
26+
* Returns 0 if successful, -errno if not. On success, the rule structure
27+
* will be allocated internally. The caller must free this structure with
28+
* selinux_audit_rule_free() after use.
2929
*/
3030
int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule,
3131
gfp_t gfp);
3232

3333
/**
34-
* selinux_audit_rule_free - free an selinux audit rule structure.
35-
* @rule: pointer to the audit rule to be freed
34+
* selinux_audit_rule_free - free an selinux audit rule structure.
35+
* @rule: pointer to the audit rule to be freed
3636
*
37-
* This will free all memory associated with the given rule.
38-
* If @rule is NULL, no operation is performed.
37+
* This will free all memory associated with the given rule.
38+
* If @rule is NULL, no operation is performed.
3939
*/
4040
void selinux_audit_rule_free(void *rule);
4141

4242
/**
43-
* selinux_audit_rule_match - determine if a context ID matches a rule.
44-
* @sid: the context ID to check
45-
* @field: the field this rule refers to
46-
* @op: the operator the rule uses
47-
* @rule: pointer to the audit rule to check against
43+
* selinux_audit_rule_match - determine if a context ID matches a rule.
44+
* @sid: the context ID to check
45+
* @field: the field this rule refers to
46+
* @op: the operator the rule uses
47+
* @rule: pointer to the audit rule to check against
4848
*
49-
* Returns 1 if the context id matches the rule, 0 if it does not, and
50-
* -errno on failure.
49+
* Returns 1 if the context id matches the rule, 0 if it does not, and
50+
* -errno on failure.
5151
*/
5252
int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
5353

5454
/**
55-
* selinux_audit_rule_known - check to see if rule contains selinux fields.
56-
* @rule: rule to be checked
57-
* Returns 1 if there are selinux fields specified in the rule, 0 otherwise.
55+
* selinux_audit_rule_known - check to see if rule contains selinux fields.
56+
* @rule: rule to be checked
57+
* Returns 1 if there are selinux fields specified in the rule, 0 otherwise.
5858
*/
5959
int selinux_audit_rule_known(struct audit_krule *rule);
6060

0 commit comments

Comments
 (0)