Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

lsm: fix a number of misspellings

A random collection of spelling fixes for source files in the LSM
layer.

Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>

+14 -14
+10 -10
security/commoncap.c
··· 314 314 * the vfsmount must be passed through @idmap. This function will then 315 315 * take care to map the inode according to @idmap before checking 316 316 * permissions. On non-idmapped mounts or if permission checking is to be 317 - * performed on the raw inode simply passs @nop_mnt_idmap. 317 + * performed on the raw inode simply pass @nop_mnt_idmap. 318 318 * 319 319 * Return: 0 if successful, -ve on error. 320 320 */ ··· 522 522 * the vfsmount must be passed through @idmap. This function will then 523 523 * take care to map the inode according to @idmap before checking 524 524 * permissions. On non-idmapped mounts or if permission checking is to be 525 - * performed on the raw inode simply passs @nop_mnt_idmap. 525 + * performed on the raw inode simply pass @nop_mnt_idmap. 526 526 * 527 527 * Return: On success, return the new size; on error, return < 0. 528 528 */ ··· 630 630 * the vfsmount must be passed through @idmap. This function will then 631 631 * take care to map the inode according to @idmap before checking 632 632 * permissions. On non-idmapped mounts or if permission checking is to be 633 - * performed on the raw inode simply passs @nop_mnt_idmap. 633 + * performed on the raw inode simply pass @nop_mnt_idmap. 634 634 */ 635 635 int get_vfs_caps_from_disk(struct mnt_idmap *idmap, 636 636 const struct dentry *dentry, ··· 1133 1133 break; 1134 1134 1135 1135 case LSM_SETID_FS: 1136 - /* juggle the capabilties to follow FSUID changes, unless 1136 + /* juggle the capabilities to follow FSUID changes, unless 1137 1137 * otherwise suppressed 1138 1138 * 1139 1139 * FIXME - is fsuser used for all CAP_FS_MASK capabilities? ··· 1184 1184 } 1185 1185 1186 1186 /** 1187 - * cap_task_setscheduler - Detemine if scheduler policy change is permitted 1187 + * cap_task_setscheduler - Determine if scheduler policy change is permitted 1188 1188 * @p: The task to affect 1189 1189 * 1190 - * Detemine if the requested scheduler policy change is permitted for the 1190 + * Determine if the requested scheduler policy change is permitted for the 1191 1191 * specified task. 1192 1192 * 1193 1193 * Return: 0 if permission is granted, -ve if denied. ··· 1198 1198 } 1199 1199 1200 1200 /** 1201 - * cap_task_setioprio - Detemine if I/O priority change is permitted 1201 + * cap_task_setioprio - Determine if I/O priority change is permitted 1202 1202 * @p: The task to affect 1203 1203 * @ioprio: The I/O priority to set 1204 1204 * 1205 - * Detemine if the requested I/O priority change is permitted for the specified 1205 + * Determine if the requested I/O priority change is permitted for the specified 1206 1206 * task. 1207 1207 * 1208 1208 * Return: 0 if permission is granted, -ve if denied. ··· 1213 1213 } 1214 1214 1215 1215 /** 1216 - * cap_task_setnice - Detemine if task priority change is permitted 1216 + * cap_task_setnice - Determine if task priority change is permitted 1217 1217 * @p: The task to affect 1218 1218 * @nice: The nice value to set 1219 1219 * 1220 - * Detemine if the requested task priority change is permitted for the 1220 + * Determine if the requested task priority change is permitted for the 1221 1221 * specified task. 1222 1222 * 1223 1223 * Return: 0 if permission is granted, -ve if denied.
+1 -1
security/device_cgroup.c
··· 421 421 } else { 422 422 /* 423 423 * new exception in the child will add more devices 424 - * that can be acessed, so it can't match any of 424 + * that can be accessed, so it can't match any of 425 425 * parent's exceptions, even slightly 426 426 */ 427 427 match = match_exception_partial(&dev_cgroup->exceptions,
+1 -1
security/lsm_audit.c
··· 200 200 char comm[sizeof(current->comm)]; 201 201 202 202 /* 203 - * To keep stack sizes in check force programers to notice if they 203 + * To keep stack sizes in check force programmers to notice if they 204 204 * start making this union too large! See struct lsm_network_audit 205 205 * as an example of how to deal with large data. 206 206 */
+2 -2
security/security.c
··· 2491 2491 /* 2492 2492 * The implementation can return 0 (accept the xattr), 1 (discard the 2493 2493 * xattr), -EOPNOTSUPP if it does not know anything about the xattr or 2494 - * any other error code incase of an error. 2494 + * any other error code in case of an error. 2495 2495 */ 2496 2496 hlist_for_each_entry(hp, 2497 2497 &security_hook_heads.inode_copy_up_xattr, list) { ··· 4676 4676 * @subnet_prefix: subnet prefix of the port 4677 4677 * @pkey: IB pkey 4678 4678 * 4679 - * Check permission to access a pkey when modifing a QP. 4679 + * Check permission to access a pkey when modifying a QP. 4680 4680 * 4681 4681 * Return: Returns 0 if permission is granted. 4682 4682 */