ping//Re: [PATCH] security: fix some spelling mistakes in the comments by codespell

Xiaoming Ni nixiaoming at huawei.com
Mon Aug 31 01:01:13 UTC 2020


ping

On 2020/8/22 11:05, Xiaoming Ni wrote:
> ecurity/commoncap.c: capabilties ==> capabilities
> security/lsm_audit.c: programers ==> programmers
> security/tomoyo/audit.c: stuct ==> struct
> security/tomoyo/common.c: Poiter ==> Pointer
> security/smack/smack_lsm.c: overriden ==> overridden overridden
> security/smack/smackfs.c: overriden ==> overridden
> security/integrity/ima/ima_template_lib.c: algoritm ==> algorithm
> 
> Signed-off-by: Xiaoming Ni <nixiaoming at huawei.com>
> ---
>   security/commoncap.c                      | 2 +-
>   security/integrity/ima/ima_template_lib.c | 2 +-
>   security/lsm_audit.c                      | 2 +-
>   security/smack/smack_lsm.c                | 2 +-
>   security/smack/smackfs.c                  | 2 +-
>   security/tomoyo/audit.c                   | 2 +-
>   security/tomoyo/common.c                  | 2 +-
>   7 files changed, 7 insertions(+), 7 deletions(-)
> 
> diff --git a/security/commoncap.c b/security/commoncap.c
> index 59bf3c1674c8..2c3a0f1b6876 100644
> --- a/security/commoncap.c
> +++ b/security/commoncap.c
> @@ -1046,7 +1046,7 @@ int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags)
>   		break;
>   
>   	case LSM_SETID_FS:
> -		/* juggle the capabilties to follow FSUID changes, unless
> +		/* juggle the capabilities to follow FSUID changes, unless
>   		 * otherwise suppressed
>   		 *
>   		 * FIXME - is fsuser used for all CAP_FS_MASK capabilities?
> diff --git a/security/integrity/ima/ima_template_lib.c b/security/integrity/ima/ima_template_lib.c
> index c022ee9e2a4e..9513564ee0b2 100644
> --- a/security/integrity/ima/ima_template_lib.c
> +++ b/security/integrity/ima/ima_template_lib.c
> @@ -231,7 +231,7 @@ static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize,
>   	 * digest formats:
>   	 *  - DATA_FMT_DIGEST: digest
>   	 *  - DATA_FMT_DIGEST_WITH_ALGO: [<hash algo>] + ':' + '\0' + digest,
> -	 *    where <hash algo> is provided if the hash algoritm is not
> +	 *    where <hash algo> is provided if the hash algorithm is not
>   	 *    SHA1 or MD5
>   	 */
>   	u8 buffer[CRYPTO_MAX_ALG_NAME + 2 + IMA_MAX_DIGEST_SIZE] = { 0 };
> diff --git a/security/lsm_audit.c b/security/lsm_audit.c
> index 53d0d183db8f..a0ff2e441069 100644
> --- a/security/lsm_audit.c
> +++ b/security/lsm_audit.c
> @@ -212,7 +212,7 @@ static void dump_common_audit_data(struct audit_buffer *ab,
>   	char comm[sizeof(current->comm)];
>   
>   	/*
> -	 * To keep stack sizes in check force programers to notice if they
> +	 * To keep stack sizes in check force programmers to notice if they
>   	 * start making this union too large!  See struct lsm_network_audit
>   	 * as an example of how to deal with large data.
>   	 */
> diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
> index 8c0893eb5aa8..960d4641239c 100644
> --- a/security/smack/smack_lsm.c
> +++ b/security/smack/smack_lsm.c
> @@ -1784,7 +1784,7 @@ static int smack_file_send_sigiotask(struct task_struct *tsk,
>   	 */
>   	file = container_of(fown, struct file, f_owner);
>   
> -	/* we don't log here as rc can be overriden */
> +	/* we don't log here as rc can be overridden */
>   	blob = smack_file(file);
>   	skp = *blob;
>   	rc = smk_access(skp, tkp, MAY_DELIVER, NULL);
> diff --git a/security/smack/smackfs.c b/security/smack/smackfs.c
> index 9c4308077574..5c581ec814ac 100644
> --- a/security/smack/smackfs.c
> +++ b/security/smack/smackfs.c
> @@ -111,7 +111,7 @@ struct smack_known *smack_syslog_label;
>   /*
>    * Ptrace current rule
>    * SMACK_PTRACE_DEFAULT    regular smack ptrace rules (/proc based)
> - * SMACK_PTRACE_EXACT      labels must match, but can be overriden with
> + * SMACK_PTRACE_EXACT      labels must match, but can be overridden with
>    *			   CAP_SYS_PTRACE
>    * SMACK_PTRACE_DRACONIAN  lables must match, CAP_SYS_PTRACE has no effect
>    */
> diff --git a/security/tomoyo/audit.c b/security/tomoyo/audit.c
> index 3c96e8402e94..b51bad121c11 100644
> --- a/security/tomoyo/audit.c
> +++ b/security/tomoyo/audit.c
> @@ -311,7 +311,7 @@ static LIST_HEAD(tomoyo_log);
>   /* Lock for "struct list_head tomoyo_log". */
>   static DEFINE_SPINLOCK(tomoyo_log_lock);
>   
> -/* Length of "stuct list_head tomoyo_log". */
> +/* Length of "struct list_head tomoyo_log". */
>   static unsigned int tomoyo_log_count;
>   
>   /**
> diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c
> index 4bee32bfe16d..38bdc0ffc312 100644
> --- a/security/tomoyo/common.c
> +++ b/security/tomoyo/common.c
> @@ -2608,7 +2608,7 @@ ssize_t tomoyo_read_control(struct tomoyo_io_buffer *head, char __user *buffer,
>   /**
>    * tomoyo_parse_policy - Parse a policy line.
>    *
> - * @head: Poiter to "struct tomoyo_io_buffer".
> + * @head: Pointer to "struct tomoyo_io_buffer".
>    * @line: Line to parse.
>    *
>    * Returns 0 on success, negative value otherwise.
> 




More information about the Linux-security-module-archive mailing list