From nobody Wed May 13 19:29:25 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 39FD0C433F5 for ; Tue, 26 Apr 2022 06:42:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245505AbiDZGpK (ORCPT ); Tue, 26 Apr 2022 02:45:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234973AbiDZGpI (ORCPT ); Tue, 26 Apr 2022 02:45:08 -0400 Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E56C911A07 for ; Mon, 25 Apr 2022 23:42:01 -0700 (PDT) Received: by mail-wr1-x42c.google.com with SMTP id s21so9257159wrb.8 for ; Mon, 25 Apr 2022 23:42:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=baylibre-com.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=1WzZeKjENByENjbHl5ETR6B+MtTKYG2VpY2b2s4rekE=; b=3o3JvKO3CBOkr/VRXV8DwgdmNZqfZhZs+rlCpKHixVD7j38qD0xAdTepiG704mz9y8 v/TT86rai1roca6ewS40D9XVAzP22XtA8HuA/Wblnxa/tQycOmexhKGFk9CDzvUrrNim GkuMebBXW+4/FwDlsNi5o0tGZnPOmfNbHm3Hg4XXZt9vYC4CnOLsH7n8IsFNdIgzq6P4 2pPAX6LbqPfJfXEoIOMDy3cUSPpWqhFHyqqVq4HSYyRtR6Quo32UAgyBPGfohwl9eukd MKAgnIl3juAxokWN5XGWpGsw7HNPulCLdG5vRm42jkvQrKBHLFUtZo+vyylQOh6SHqia G0fQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=1WzZeKjENByENjbHl5ETR6B+MtTKYG2VpY2b2s4rekE=; b=n0He/21Gacv7zLstpEiTdVX/Bc9fgx/pHMlsu4gZpRpilvrRybgnEyQLMFT8erSIZ3 v8hrTW8Z+kfIhNP1e3lRjmOCgQUHOApJ2dupjgZ92QXxJhLXh0sJ0WB1er5xrxZHaEeh uYLP0C8v9YUbtbg8jio97aFmIWZSD0/UlmlVwJNbxBomgf3V0DA2avuAjX8hWlwzknqa rJgiCBwts3lPrDf3mIFIniW9b0gf9VR/7Ia7Al8hLoOrZOK5TpCFHjKdX4JgI4V5aTeY q1ehKht9JvWRz6UO5L42uITvMfERgGyKQLaNaeRvY4MCoee/CuJfLDVuMT54sn0+rPmx +bAw== X-Gm-Message-State: AOAM531af+fCRtw+XKw3+EcDwDyc4LOkLs1/TN1c+YPek2/e0kquMOn8 GTjwIiyZiOrnE2QOsVX0M8eAJQ== X-Google-Smtp-Source: ABdhPJyWgMIjDI/U3F55ScfmL9okND/v4Jw3J30PZR6nFbRMFevT+s/tEuK2hCps4ndGPSOLlVpx/g== X-Received: by 2002:a05:6000:168d:b0:20a:e3ed:7fde with SMTP id y13-20020a056000168d00b0020ae3ed7fdemr2110384wrd.499.1650955320496; Mon, 25 Apr 2022 23:42:00 -0700 (PDT) Received: from localhost.localdomain (laubervilliers-658-1-213-31.w90-63.abo.wanadoo.fr. [90.63.244.31]) by smtp.googlemail.com with ESMTPSA id l14-20020a05600c1d0e00b00393ed37f63bsm4020430wms.26.2022.04.25.23.41.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Apr 2022 23:42:00 -0700 (PDT) From: Corentin Labbe To: dhowells@redhat.com, dwmw2@infradead.org Cc: keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Corentin Labbe Subject: [PATCH] certs: fix a typo on restrict_link_by_builtin_trusted kernel doc comment Date: Tue, 26 Apr 2022 06:41:55 +0000 Message-Id: <20220426064155.3788125-1-clabbe@baylibre.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" The kernel doc comment use the wrong name for restrict_link_by_builtin_trus= ted This fixes the following sparse warnings: certs/system_keyring.c:46: warning: expecting prototype for restrict_link_t= o_builtin_trusted(). Prototype was for restrict_link_by_builtin_trusted() i= nstead Signed-off-by: Corentin Labbe --- certs/system_keyring.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 05b66ce9d1c9..8fb718ef983d 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -34,7 +34,7 @@ extern __initconst const unsigned long system_certificate= _list_size; extern __initconst const unsigned long module_cert_size; =20 /** - * restrict_link_to_builtin_trusted - Restrict keyring addition by built i= n CA + * restrict_link_by_builtin_trusted - Restrict keyring addition by built i= n CA * * Restrict the addition of keys into a keyring based on the key-to-be-add= ed * being vouched for by a key in the built in system keyring. --=20 2.35.1