···314314 * the vfsmount must be passed through @idmap. This function will then315315 * take care to map the inode according to @idmap before checking316316 * permissions. On non-idmapped mounts or if permission checking is to be317317- * performed on the raw inode simply passs @nop_mnt_idmap.317317+ * performed on the raw inode simply pass @nop_mnt_idmap.318318 *319319 * Return: 0 if successful, -ve on error.320320 */···522522 * the vfsmount must be passed through @idmap. This function will then523523 * take care to map the inode according to @idmap before checking524524 * permissions. On non-idmapped mounts or if permission checking is to be525525- * performed on the raw inode simply passs @nop_mnt_idmap.525525+ * performed on the raw inode simply pass @nop_mnt_idmap.526526 *527527 * Return: On success, return the new size; on error, return < 0.528528 */···630630 * the vfsmount must be passed through @idmap. This function will then631631 * take care to map the inode according to @idmap before checking632632 * permissions. On non-idmapped mounts or if permission checking is to be633633- * performed on the raw inode simply passs @nop_mnt_idmap.633633+ * performed on the raw inode simply pass @nop_mnt_idmap.634634 */635635int get_vfs_caps_from_disk(struct mnt_idmap *idmap,636636 const struct dentry *dentry,···11331133 break;1134113411351135 case LSM_SETID_FS:11361136- /* juggle the capabilties to follow FSUID changes, unless11361136+ /* juggle the capabilities to follow FSUID changes, unless11371137 * otherwise suppressed11381138 *11391139 * FIXME - is fsuser used for all CAP_FS_MASK capabilities?···11841184}1185118511861186/**11871187- * cap_task_setscheduler - Detemine if scheduler policy change is permitted11871187+ * cap_task_setscheduler - Determine if scheduler policy change is permitted11881188 * @p: The task to affect11891189 *11901190- * Detemine if the requested scheduler policy change is permitted for the11901190+ * Determine if the requested scheduler policy change is permitted for the11911191 * specified task.11921192 *11931193 * Return: 0 if permission is granted, -ve if denied.···11981198}1199119912001200/**12011201- * cap_task_setioprio - Detemine if I/O priority change is permitted12011201+ * cap_task_setioprio - Determine if I/O priority change is permitted12021202 * @p: The task to affect12031203 * @ioprio: The I/O priority to set12041204 *12051205- * Detemine if the requested I/O priority change is permitted for the specified12051205+ * Determine if the requested I/O priority change is permitted for the specified12061206 * task.12071207 *12081208 * Return: 0 if permission is granted, -ve if denied.···12131213}1214121412151215/**12161216- * cap_task_setnice - Detemine if task priority change is permitted12161216+ * cap_task_setnice - Determine if task priority change is permitted12171217 * @p: The task to affect12181218 * @nice: The nice value to set12191219 *12201220- * Detemine if the requested task priority change is permitted for the12201220+ * Determine if the requested task priority change is permitted for the12211221 * specified task.12221222 *12231223 * Return: 0 if permission is granted, -ve if denied.
+1-1
security/device_cgroup.c
···421421 } else {422422 /*423423 * new exception in the child will add more devices424424- * that can be acessed, so it can't match any of424424+ * that can be accessed, so it can't match any of425425 * parent's exceptions, even slightly426426 */ 427427 match = match_exception_partial(&dev_cgroup->exceptions,
+1-1
security/lsm_audit.c
···200200 char comm[sizeof(current->comm)];201201202202 /*203203- * To keep stack sizes in check force programers to notice if they203203+ * To keep stack sizes in check force programmers to notice if they204204 * start making this union too large! See struct lsm_network_audit205205 * as an example of how to deal with large data.206206 */
+2-2
security/security.c
···24912491 /*24922492 * The implementation can return 0 (accept the xattr), 1 (discard the24932493 * xattr), -EOPNOTSUPP if it does not know anything about the xattr or24942494- * any other error code incase of an error.24942494+ * any other error code in case of an error.24952495 */24962496 hlist_for_each_entry(hp,24972497 &security_hook_heads.inode_copy_up_xattr, list) {···46764676 * @subnet_prefix: subnet prefix of the port46774677 * @pkey: IB pkey46784678 *46794679- * Check permission to access a pkey when modifing a QP.46794679+ * Check permission to access a pkey when modifying a QP.46804680 *46814681 * Return: Returns 0 if permission is granted.46824682 */