|
16 | 16 | #include <linux/types.h> |
17 | 17 |
|
18 | 18 | /** |
19 | | - * selinux_audit_rule_init - alloc/init an selinux audit rule structure. |
20 | | - * @field: the field this rule refers to |
21 | | - * @op: the operator the rule uses |
22 | | - * @rulestr: the text "target" of the rule |
23 | | - * @rule: pointer to the new rule structure returned via this |
24 | | - * @gfp: GFP flag used for kmalloc |
| 19 | + * selinux_audit_rule_init - alloc/init an selinux audit rule structure. |
| 20 | + * @field: the field this rule refers to |
| 21 | + * @op: the operator the rule uses |
| 22 | + * @rulestr: the text "target" of the rule |
| 23 | + * @rule: pointer to the new rule structure returned via this |
| 24 | + * @gfp: GFP flag used for kmalloc |
25 | 25 | * |
26 | | - * Returns 0 if successful, -errno if not. On success, the rule structure |
27 | | - * will be allocated internally. The caller must free this structure with |
28 | | - * selinux_audit_rule_free() after use. |
| 26 | + * Returns 0 if successful, -errno if not. On success, the rule structure |
| 27 | + * will be allocated internally. The caller must free this structure with |
| 28 | + * selinux_audit_rule_free() after use. |
29 | 29 | */ |
30 | 30 | int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule, |
31 | 31 | gfp_t gfp); |
32 | 32 |
|
33 | 33 | /** |
34 | | - * selinux_audit_rule_free - free an selinux audit rule structure. |
35 | | - * @rule: pointer to the audit rule to be freed |
| 34 | + * selinux_audit_rule_free - free an selinux audit rule structure. |
| 35 | + * @rule: pointer to the audit rule to be freed |
36 | 36 | * |
37 | | - * This will free all memory associated with the given rule. |
38 | | - * If @rule is NULL, no operation is performed. |
| 37 | + * This will free all memory associated with the given rule. |
| 38 | + * If @rule is NULL, no operation is performed. |
39 | 39 | */ |
40 | 40 | void selinux_audit_rule_free(void *rule); |
41 | 41 |
|
42 | 42 | /** |
43 | | - * selinux_audit_rule_match - determine if a context ID matches a rule. |
44 | | - * @sid: the context ID to check |
45 | | - * @field: the field this rule refers to |
46 | | - * @op: the operator the rule uses |
47 | | - * @rule: pointer to the audit rule to check against |
| 43 | + * selinux_audit_rule_match - determine if a context ID matches a rule. |
| 44 | + * @sid: the context ID to check |
| 45 | + * @field: the field this rule refers to |
| 46 | + * @op: the operator the rule uses |
| 47 | + * @rule: pointer to the audit rule to check against |
48 | 48 | * |
49 | | - * Returns 1 if the context id matches the rule, 0 if it does not, and |
50 | | - * -errno on failure. |
| 49 | + * Returns 1 if the context id matches the rule, 0 if it does not, and |
| 50 | + * -errno on failure. |
51 | 51 | */ |
52 | 52 | int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule); |
53 | 53 |
|
54 | 54 | /** |
55 | | - * selinux_audit_rule_known - check to see if rule contains selinux fields. |
56 | | - * @rule: rule to be checked |
57 | | - * Returns 1 if there are selinux fields specified in the rule, 0 otherwise. |
| 55 | + * selinux_audit_rule_known - check to see if rule contains selinux fields. |
| 56 | + * @rule: rule to be checked |
| 57 | + * Returns 1 if there are selinux fields specified in the rule, 0 otherwise. |
58 | 58 | */ |
59 | 59 | int selinux_audit_rule_known(struct audit_krule *rule); |
60 | 60 |
|
|
0 commit comments