Skip to content

Commit 4432b50

Browse files
committed
lsm: fix a number of misspellings
A random collection of spelling fixes for source files in the LSM layer. Reviewed-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
1 parent d031f4e commit 4432b50

4 files changed

Lines changed: 14 additions & 14 deletions

File tree

security/commoncap.c

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ int cap_inode_need_killpriv(struct dentry *dentry)
314314
* the vfsmount must be passed through @idmap. This function will then
315315
* take care to map the inode according to @idmap before checking
316316
* permissions. On non-idmapped mounts or if permission checking is to be
317-
* performed on the raw inode simply passs @nop_mnt_idmap.
317+
* performed on the raw inode simply pass @nop_mnt_idmap.
318318
*
319319
* Return: 0 if successful, -ve on error.
320320
*/
@@ -522,7 +522,7 @@ static bool validheader(size_t size, const struct vfs_cap_data *cap)
522522
* the vfsmount must be passed through @idmap. This function will then
523523
* take care to map the inode according to @idmap before checking
524524
* permissions. On non-idmapped mounts or if permission checking is to be
525-
* performed on the raw inode simply passs @nop_mnt_idmap.
525+
* performed on the raw inode simply pass @nop_mnt_idmap.
526526
*
527527
* Return: On success, return the new size; on error, return < 0.
528528
*/
@@ -630,7 +630,7 @@ static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
630630
* the vfsmount must be passed through @idmap. This function will then
631631
* take care to map the inode according to @idmap before checking
632632
* permissions. On non-idmapped mounts or if permission checking is to be
633-
* performed on the raw inode simply passs @nop_mnt_idmap.
633+
* performed on the raw inode simply pass @nop_mnt_idmap.
634634
*/
635635
int get_vfs_caps_from_disk(struct mnt_idmap *idmap,
636636
const struct dentry *dentry,
@@ -1133,7 +1133,7 @@ int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags)
11331133
break;
11341134

11351135
case LSM_SETID_FS:
1136-
/* juggle the capabilties to follow FSUID changes, unless
1136+
/* juggle the capabilities to follow FSUID changes, unless
11371137
* otherwise suppressed
11381138
*
11391139
* FIXME - is fsuser used for all CAP_FS_MASK capabilities?
@@ -1184,10 +1184,10 @@ static int cap_safe_nice(struct task_struct *p)
11841184
}
11851185

11861186
/**
1187-
* cap_task_setscheduler - Detemine if scheduler policy change is permitted
1187+
* cap_task_setscheduler - Determine if scheduler policy change is permitted
11881188
* @p: The task to affect
11891189
*
1190-
* Detemine if the requested scheduler policy change is permitted for the
1190+
* Determine if the requested scheduler policy change is permitted for the
11911191
* specified task.
11921192
*
11931193
* Return: 0 if permission is granted, -ve if denied.
@@ -1198,11 +1198,11 @@ int cap_task_setscheduler(struct task_struct *p)
11981198
}
11991199

12001200
/**
1201-
* cap_task_setioprio - Detemine if I/O priority change is permitted
1201+
* cap_task_setioprio - Determine if I/O priority change is permitted
12021202
* @p: The task to affect
12031203
* @ioprio: The I/O priority to set
12041204
*
1205-
* Detemine if the requested I/O priority change is permitted for the specified
1205+
* Determine if the requested I/O priority change is permitted for the specified
12061206
* task.
12071207
*
12081208
* Return: 0 if permission is granted, -ve if denied.
@@ -1213,11 +1213,11 @@ int cap_task_setioprio(struct task_struct *p, int ioprio)
12131213
}
12141214

12151215
/**
1216-
* cap_task_setnice - Detemine if task priority change is permitted
1216+
* cap_task_setnice - Determine if task priority change is permitted
12171217
* @p: The task to affect
12181218
* @nice: The nice value to set
12191219
*
1220-
* Detemine if the requested task priority change is permitted for the
1220+
* Determine if the requested task priority change is permitted for the
12211221
* specified task.
12221222
*
12231223
* Return: 0 if permission is granted, -ve if denied.

security/device_cgroup.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -421,7 +421,7 @@ static bool verify_new_ex(struct dev_cgroup *dev_cgroup,
421421
} else {
422422
/*
423423
* new exception in the child will add more devices
424-
* that can be acessed, so it can't match any of
424+
* that can be accessed, so it can't match any of
425425
* parent's exceptions, even slightly
426426
*/
427427
match = match_exception_partial(&dev_cgroup->exceptions,

security/lsm_audit.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ static void dump_common_audit_data(struct audit_buffer *ab,
200200
char comm[sizeof(current->comm)];
201201

202202
/*
203-
* To keep stack sizes in check force programers to notice if they
203+
* To keep stack sizes in check force programmers to notice if they
204204
* start making this union too large! See struct lsm_network_audit
205205
* as an example of how to deal with large data.
206206
*/

security/security.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2491,7 +2491,7 @@ int security_inode_copy_up_xattr(const char *name)
24912491
/*
24922492
* The implementation can return 0 (accept the xattr), 1 (discard the
24932493
* xattr), -EOPNOTSUPP if it does not know anything about the xattr or
2494-
* any other error code incase of an error.
2494+
* any other error code in case of an error.
24952495
*/
24962496
hlist_for_each_entry(hp,
24972497
&security_hook_heads.inode_copy_up_xattr, list) {
@@ -4676,7 +4676,7 @@ EXPORT_SYMBOL(security_sctp_assoc_established);
46764676
* @subnet_prefix: subnet prefix of the port
46774677
* @pkey: IB pkey
46784678
*
4679-
* Check permission to access a pkey when modifing a QP.
4679+
* Check permission to access a pkey when modifying a QP.
46804680
*
46814681
* Return: Returns 0 if permission is granted.
46824682
*/

0 commit comments

Comments
 (0)