Commit d19a9e25 authored by Paul Moore's avatar Paul Moore

selinux: fix style problems in security/selinux/include/audit.h

Remove the needless indent in the function comment header blocks.
Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
parent 68cfb283
...@@ -16,45 +16,45 @@ ...@@ -16,45 +16,45 @@
#include <linux/types.h> #include <linux/types.h>
/** /**
* selinux_audit_rule_init - alloc/init an selinux audit rule structure. * selinux_audit_rule_init - alloc/init an selinux audit rule structure.
* @field: the field this rule refers to * @field: the field this rule refers to
* @op: the operator the rule uses * @op: the operator the rule uses
* @rulestr: the text "target" of the rule * @rulestr: the text "target" of the rule
* @rule: pointer to the new rule structure returned via this * @rule: pointer to the new rule structure returned via this
* @gfp: GFP flag used for kmalloc * @gfp: GFP flag used for kmalloc
* *
* Returns 0 if successful, -errno if not. On success, the rule structure * Returns 0 if successful, -errno if not. On success, the rule structure
* will be allocated internally. The caller must free this structure with * will be allocated internally. The caller must free this structure with
* selinux_audit_rule_free() after use. * selinux_audit_rule_free() after use.
*/ */
int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule, int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule,
gfp_t gfp); gfp_t gfp);
/** /**
* selinux_audit_rule_free - free an selinux audit rule structure. * selinux_audit_rule_free - free an selinux audit rule structure.
* @rule: pointer to the audit rule to be freed * @rule: pointer to the audit rule to be freed
* *
* This will free all memory associated with the given rule. * This will free all memory associated with the given rule.
* If @rule is NULL, no operation is performed. * If @rule is NULL, no operation is performed.
*/ */
void selinux_audit_rule_free(void *rule); void selinux_audit_rule_free(void *rule);
/** /**
* selinux_audit_rule_match - determine if a context ID matches a rule. * selinux_audit_rule_match - determine if a context ID matches a rule.
* @sid: the context ID to check * @sid: the context ID to check
* @field: the field this rule refers to * @field: the field this rule refers to
* @op: the operator the rule uses * @op: the operator the rule uses
* @rule: pointer to the audit rule to check against * @rule: pointer to the audit rule to check against
* *
* Returns 1 if the context id matches the rule, 0 if it does not, and * Returns 1 if the context id matches the rule, 0 if it does not, and
* -errno on failure. * -errno on failure.
*/ */
int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule); int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
/** /**
* selinux_audit_rule_known - check to see if rule contains selinux fields. * selinux_audit_rule_known - check to see if rule contains selinux fields.
* @rule: rule to be checked * @rule: rule to be checked
* Returns 1 if there are selinux fields specified in the rule, 0 otherwise. * Returns 1 if there are selinux fields specified in the rule, 0 otherwise.
*/ */
int selinux_audit_rule_known(struct audit_krule *rule); int selinux_audit_rule_known(struct audit_krule *rule);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment