From patchwork Thu Mar 17 02:12:49 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yang Li X-Patchwork-Id: 12783414 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23D01C433EF for ; Thu, 17 Mar 2022 02:12:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345038AbiCQCOK (ORCPT ); Wed, 16 Mar 2022 22:14:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36616 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229966AbiCQCOK (ORCPT ); Wed, 16 Mar 2022 22:14:10 -0400 Received: from out30-131.freemail.mail.aliyun.com (out30-131.freemail.mail.aliyun.com [115.124.30.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4CB68A188; Wed, 16 Mar 2022 19:12:54 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R181e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=yang.lee@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0V7OwIyg_1647483171; Received: from localhost(mailfrom:yang.lee@linux.alibaba.com fp:SMTPD_---0V7OwIyg_1647483171) by smtp.aliyun-inc.com(127.0.0.1); Thu, 17 Mar 2022 10:12:52 +0800 From: Yang Li To: dhowells@redhat.com Cc: dwmw2@infradead.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Yang Li , Abaci Robot Subject: [PATCH -next] certs: Fix some kernel-doc comments Date: Thu, 17 Mar 2022 10:12:49 +0800 Message-Id: <20220317021249.31655-1-yang.lee@linux.alibaba.com> X-Mailer: git-send-email 2.20.1.7.g153144c MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: keyrings@vger.kernel.org Remove some warnings found by running scripts/kernel-doc, which is caused by using 'make W=1'. certs/system_keyring.c:46: warning: expecting prototype for restrict_link_to_builtin_trusted(). Prototype was for restrict_link_by_builtin_trusted() instead certs/system_keyring.c:80: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst Reported-by: Abaci Robot Signed-off-by: Yang Li --- certs/system_keyring.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 05b66ce9d1c9..f0eb8c680cac 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -34,7 +34,7 @@ extern __initconst const unsigned long system_certificate_list_size; extern __initconst const unsigned long module_cert_size; /** - * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA + * restrict_link_by_builtin_trusted - Restrict keyring addition by built in CA * * Restrict the addition of keys into a keyring based on the key-to-be-added * being vouched for by a key in the built in system keyring. @@ -77,8 +77,9 @@ int restrict_link_by_builtin_and_secondary_trusted( } /** - * Allocate a struct key_restriction for the "builtin and secondary trust" - * keyring. Only for use in system_trusted_keyring_init(). + * get_builtin_and_secondary_restriction - Allocate a struct key_restriction + * for the "builtin and secondary trust" keyring. Only for use in + * system_trusted_keyring_init(). */ static __init struct key_restriction *get_builtin_and_secondary_restriction(void) {