lsm: fix a number of misspellings

A random collection of spelling fixes for source files in the LSM
layer.

Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
Paul Moore 2023-05-24 23:19:53 -04:00
parent d031f4e8b4
commit 4432b50744
4 changed files with 14 additions and 14 deletions

View File

@ -314,7 +314,7 @@ int cap_inode_need_killpriv(struct dentry *dentry)
* the vfsmount must be passed through @idmap. This function will then * the vfsmount must be passed through @idmap. This function will then
* take care to map the inode according to @idmap before checking * take care to map the inode according to @idmap before checking
* permissions. On non-idmapped mounts or if permission checking is to be * permissions. On non-idmapped mounts or if permission checking is to be
* performed on the raw inode simply passs @nop_mnt_idmap. * performed on the raw inode simply pass @nop_mnt_idmap.
* *
* Return: 0 if successful, -ve on error. * Return: 0 if successful, -ve on error.
*/ */
@ -522,7 +522,7 @@ static bool validheader(size_t size, const struct vfs_cap_data *cap)
* the vfsmount must be passed through @idmap. This function will then * the vfsmount must be passed through @idmap. This function will then
* take care to map the inode according to @idmap before checking * take care to map the inode according to @idmap before checking
* permissions. On non-idmapped mounts or if permission checking is to be * permissions. On non-idmapped mounts or if permission checking is to be
* performed on the raw inode simply passs @nop_mnt_idmap. * performed on the raw inode simply pass @nop_mnt_idmap.
* *
* Return: On success, return the new size; on error, return < 0. * Return: On success, return the new size; on error, return < 0.
*/ */
@ -630,7 +630,7 @@ static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
* the vfsmount must be passed through @idmap. This function will then * the vfsmount must be passed through @idmap. This function will then
* take care to map the inode according to @idmap before checking * take care to map the inode according to @idmap before checking
* permissions. On non-idmapped mounts or if permission checking is to be * permissions. On non-idmapped mounts or if permission checking is to be
* performed on the raw inode simply passs @nop_mnt_idmap. * performed on the raw inode simply pass @nop_mnt_idmap.
*/ */
int get_vfs_caps_from_disk(struct mnt_idmap *idmap, int get_vfs_caps_from_disk(struct mnt_idmap *idmap,
const struct dentry *dentry, const struct dentry *dentry,
@ -1133,7 +1133,7 @@ int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags)
break; break;
case LSM_SETID_FS: case LSM_SETID_FS:
/* juggle the capabilties to follow FSUID changes, unless /* juggle the capabilities to follow FSUID changes, unless
* otherwise suppressed * otherwise suppressed
* *
* FIXME - is fsuser used for all CAP_FS_MASK capabilities? * FIXME - is fsuser used for all CAP_FS_MASK capabilities?
@ -1184,10 +1184,10 @@ static int cap_safe_nice(struct task_struct *p)
} }
/** /**
* cap_task_setscheduler - Detemine if scheduler policy change is permitted * cap_task_setscheduler - Determine if scheduler policy change is permitted
* @p: The task to affect * @p: The task to affect
* *
* Detemine if the requested scheduler policy change is permitted for the * Determine if the requested scheduler policy change is permitted for the
* specified task. * specified task.
* *
* Return: 0 if permission is granted, -ve if denied. * Return: 0 if permission is granted, -ve if denied.
@ -1198,11 +1198,11 @@ int cap_task_setscheduler(struct task_struct *p)
} }
/** /**
* cap_task_setioprio - Detemine if I/O priority change is permitted * cap_task_setioprio - Determine if I/O priority change is permitted
* @p: The task to affect * @p: The task to affect
* @ioprio: The I/O priority to set * @ioprio: The I/O priority to set
* *
* Detemine if the requested I/O priority change is permitted for the specified * Determine if the requested I/O priority change is permitted for the specified
* task. * task.
* *
* Return: 0 if permission is granted, -ve if denied. * Return: 0 if permission is granted, -ve if denied.
@ -1213,11 +1213,11 @@ int cap_task_setioprio(struct task_struct *p, int ioprio)
} }
/** /**
* cap_task_setnice - Detemine if task priority change is permitted * cap_task_setnice - Determine if task priority change is permitted
* @p: The task to affect * @p: The task to affect
* @nice: The nice value to set * @nice: The nice value to set
* *
* Detemine if the requested task priority change is permitted for the * Determine if the requested task priority change is permitted for the
* specified task. * specified task.
* *
* Return: 0 if permission is granted, -ve if denied. * Return: 0 if permission is granted, -ve if denied.

View File

@ -421,7 +421,7 @@ static bool verify_new_ex(struct dev_cgroup *dev_cgroup,
} else { } else {
/* /*
* new exception in the child will add more devices * new exception in the child will add more devices
* that can be acessed, so it can't match any of * that can be accessed, so it can't match any of
* parent's exceptions, even slightly * parent's exceptions, even slightly
*/ */
match = match_exception_partial(&dev_cgroup->exceptions, match = match_exception_partial(&dev_cgroup->exceptions,

View File

@ -200,7 +200,7 @@ static void dump_common_audit_data(struct audit_buffer *ab,
char comm[sizeof(current->comm)]; char comm[sizeof(current->comm)];
/* /*
* To keep stack sizes in check force programers to notice if they * To keep stack sizes in check force programmers to notice if they
* start making this union too large! See struct lsm_network_audit * start making this union too large! See struct lsm_network_audit
* as an example of how to deal with large data. * as an example of how to deal with large data.
*/ */

View File

@ -2491,7 +2491,7 @@ int security_inode_copy_up_xattr(const char *name)
/* /*
* The implementation can return 0 (accept the xattr), 1 (discard the * The implementation can return 0 (accept the xattr), 1 (discard the
* xattr), -EOPNOTSUPP if it does not know anything about the xattr or * xattr), -EOPNOTSUPP if it does not know anything about the xattr or
* any other error code incase of an error. * any other error code in case of an error.
*/ */
hlist_for_each_entry(hp, hlist_for_each_entry(hp,
&security_hook_heads.inode_copy_up_xattr, list) { &security_hook_heads.inode_copy_up_xattr, list) {
@ -4676,7 +4676,7 @@ EXPORT_SYMBOL(security_sctp_assoc_established);
* @subnet_prefix: subnet prefix of the port * @subnet_prefix: subnet prefix of the port
* @pkey: IB pkey * @pkey: IB pkey
* *
* Check permission to access a pkey when modifing a QP. * Check permission to access a pkey when modifying a QP.
* *
* Return: Returns 0 if permission is granted. * Return: Returns 0 if permission is granted.
*/ */