mirror of
git://git.yoctoproject.org/linux-yocto.git
synced 2025-07-06 05:45:29 +02:00
selinux: fix style problems in security/selinux/include/audit.h
Remove the needless indent in the function comment header blocks. Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
68cfb28332
commit
d19a9e25a7
|
@ -16,45 +16,45 @@
|
||||||
#include <linux/types.h>
|
#include <linux/types.h>
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* selinux_audit_rule_init - alloc/init an selinux audit rule structure.
|
* selinux_audit_rule_init - alloc/init an selinux audit rule structure.
|
||||||
* @field: the field this rule refers to
|
* @field: the field this rule refers to
|
||||||
* @op: the operator the rule uses
|
* @op: the operator the rule uses
|
||||||
* @rulestr: the text "target" of the rule
|
* @rulestr: the text "target" of the rule
|
||||||
* @rule: pointer to the new rule structure returned via this
|
* @rule: pointer to the new rule structure returned via this
|
||||||
* @gfp: GFP flag used for kmalloc
|
* @gfp: GFP flag used for kmalloc
|
||||||
*
|
*
|
||||||
* Returns 0 if successful, -errno if not. On success, the rule structure
|
* Returns 0 if successful, -errno if not. On success, the rule structure
|
||||||
* will be allocated internally. The caller must free this structure with
|
* will be allocated internally. The caller must free this structure with
|
||||||
* selinux_audit_rule_free() after use.
|
* selinux_audit_rule_free() after use.
|
||||||
*/
|
*/
|
||||||
int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule,
|
int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule,
|
||||||
gfp_t gfp);
|
gfp_t gfp);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* selinux_audit_rule_free - free an selinux audit rule structure.
|
* selinux_audit_rule_free - free an selinux audit rule structure.
|
||||||
* @rule: pointer to the audit rule to be freed
|
* @rule: pointer to the audit rule to be freed
|
||||||
*
|
*
|
||||||
* This will free all memory associated with the given rule.
|
* This will free all memory associated with the given rule.
|
||||||
* If @rule is NULL, no operation is performed.
|
* If @rule is NULL, no operation is performed.
|
||||||
*/
|
*/
|
||||||
void selinux_audit_rule_free(void *rule);
|
void selinux_audit_rule_free(void *rule);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* selinux_audit_rule_match - determine if a context ID matches a rule.
|
* selinux_audit_rule_match - determine if a context ID matches a rule.
|
||||||
* @sid: the context ID to check
|
* @sid: the context ID to check
|
||||||
* @field: the field this rule refers to
|
* @field: the field this rule refers to
|
||||||
* @op: the operator the rule uses
|
* @op: the operator the rule uses
|
||||||
* @rule: pointer to the audit rule to check against
|
* @rule: pointer to the audit rule to check against
|
||||||
*
|
*
|
||||||
* Returns 1 if the context id matches the rule, 0 if it does not, and
|
* Returns 1 if the context id matches the rule, 0 if it does not, and
|
||||||
* -errno on failure.
|
* -errno on failure.
|
||||||
*/
|
*/
|
||||||
int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* selinux_audit_rule_known - check to see if rule contains selinux fields.
|
* selinux_audit_rule_known - check to see if rule contains selinux fields.
|
||||||
* @rule: rule to be checked
|
* @rule: rule to be checked
|
||||||
* Returns 1 if there are selinux fields specified in the rule, 0 otherwise.
|
* Returns 1 if there are selinux fields specified in the rule, 0 otherwise.
|
||||||
*/
|
*/
|
||||||
int selinux_audit_rule_known(struct audit_krule *rule);
|
int selinux_audit_rule_known(struct audit_krule *rule);
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user