diff options
author | Vsevolod Alekseev <vsevolod.alekseev@gmx.com> | 2011-11-05 05:35:28 -0400 |
---|---|---|
committer | Jiri Kosina <jkosina@suse.cz> | 2011-11-05 15:59:16 -0400 |
commit | 11be0b3c18d654a8d5ed441fa9e988193a57c1d2 (patch) | |
tree | 33e5de55186308b3cf6f233c7565e97777b1a0b4 /include/linux/security.h | |
parent | f854b5bc264023b21bbcb4b358cd858d5d45a4cb (diff) |
security.h: fix misc typos/grammar errors in comments
Fix various typos/grammar errors in include/linux/security.h comments (no code changes).
Signed-off-by: Vsevolod Alekseev <vsevolod.alekseev@gmx.com>
Acked-by: Randy Dunlap <rdunlap@xenotime.net>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 19d8e04e1688..94c35336b86b 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -186,7 +186,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
186 | * Security module identifier. | 186 | * Security module identifier. |
187 | * | 187 | * |
188 | * @name: | 188 | * @name: |
189 | * A string that acts as a unique identifeir for the LSM with max number | 189 | * A string that acts as a unique identifier for the LSM with max number |
190 | * of characters = SECURITY_NAME_MAX. | 190 | * of characters = SECURITY_NAME_MAX. |
191 | * | 191 | * |
192 | * Security hooks for program execution operations. | 192 | * Security hooks for program execution operations. |
@@ -275,7 +275,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
275 | * @copy copied data which will be passed to the security module. | 275 | * @copy copied data which will be passed to the security module. |
276 | * Returns 0 if the copy was successful. | 276 | * Returns 0 if the copy was successful. |
277 | * @sb_remount: | 277 | * @sb_remount: |
278 | * Extracts security system specifc mount options and verifys no changes | 278 | * Extracts security system specific mount options and verifies no changes |
279 | * are being made to those options. | 279 | * are being made to those options. |
280 | * @sb superblock being remounted | 280 | * @sb superblock being remounted |
281 | * @data contains the filesystem-specific data. | 281 | * @data contains the filesystem-specific data. |
@@ -380,15 +380,15 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
380 | * Return 0 if permission is granted. | 380 | * Return 0 if permission is granted. |
381 | * @inode_mkdir: | 381 | * @inode_mkdir: |
382 | * Check permissions to create a new directory in the existing directory | 382 | * Check permissions to create a new directory in the existing directory |
383 | * associated with inode strcture @dir. | 383 | * associated with inode structure @dir. |
384 | * @dir containst the inode structure of parent of the directory to be created. | 384 | * @dir contains the inode structure of parent of the directory to be created. |
385 | * @dentry contains the dentry structure of new directory. | 385 | * @dentry contains the dentry structure of new directory. |
386 | * @mode contains the mode of new directory. | 386 | * @mode contains the mode of new directory. |
387 | * Return 0 if permission is granted. | 387 | * Return 0 if permission is granted. |
388 | * @path_mkdir: | 388 | * @path_mkdir: |
389 | * Check permissions to create a new directory in the existing directory | 389 | * Check permissions to create a new directory in the existing directory |
390 | * associated with path strcture @path. | 390 | * associated with path structure @path. |
391 | * @dir containst the path structure of parent of the directory | 391 | * @dir contains the path structure of parent of the directory |
392 | * to be created. | 392 | * to be created. |
393 | * @dentry contains the dentry structure of new directory. | 393 | * @dentry contains the dentry structure of new directory. |
394 | * @mode contains the mode of new directory. | 394 | * @mode contains the mode of new directory. |
@@ -578,7 +578,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
578 | * @file contains the file structure. | 578 | * @file contains the file structure. |
579 | * @cmd contains the operation to perform. | 579 | * @cmd contains the operation to perform. |
580 | * @arg contains the operational arguments. | 580 | * @arg contains the operational arguments. |
581 | * Check permission for an ioctl operation on @file. Note that @arg can | 581 | * Check permission for an ioctl operation on @file. Note that @arg |
582 | * sometimes represents a user space pointer; in other cases, it may be a | 582 | * sometimes represents a user space pointer; in other cases, it may be a |
583 | * simple integer value. When @arg represents a user space pointer, it | 583 | * simple integer value. When @arg represents a user space pointer, it |
584 | * should never be used by the security module. | 584 | * should never be used by the security module. |
@@ -606,7 +606,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
606 | * Return 0 if permission is granted. | 606 | * Return 0 if permission is granted. |
607 | * @file_fcntl: | 607 | * @file_fcntl: |
608 | * Check permission before allowing the file operation specified by @cmd | 608 | * Check permission before allowing the file operation specified by @cmd |
609 | * from being performed on the file @file. Note that @arg can sometimes | 609 | * from being performed on the file @file. Note that @arg sometimes |
610 | * represents a user space pointer; in other cases, it may be a simple | 610 | * represents a user space pointer; in other cases, it may be a simple |
611 | * integer value. When @arg represents a user space pointer, it should | 611 | * integer value. When @arg represents a user space pointer, it should |
612 | * never be used by the security module. | 612 | * never be used by the security module. |
@@ -793,7 +793,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
793 | * information can be saved using the eff_cap field of the | 793 | * information can be saved using the eff_cap field of the |
794 | * netlink_skb_parms structure. Also may be used to provide fine | 794 | * netlink_skb_parms structure. Also may be used to provide fine |
795 | * grained control over message transmission. | 795 | * grained control over message transmission. |
796 | * @sk associated sock of task sending the message., | 796 | * @sk associated sock of task sending the message. |
797 | * @skb contains the sk_buff structure for the netlink message. | 797 | * @skb contains the sk_buff structure for the netlink message. |
798 | * Return 0 if the information was successfully saved and message | 798 | * Return 0 if the information was successfully saved and message |
799 | * is allowed to be transmitted. | 799 | * is allowed to be transmitted. |
@@ -1080,9 +1080,9 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1080 | * should free it. | 1080 | * should free it. |
1081 | * @key points to the key to be queried. | 1081 | * @key points to the key to be queried. |
1082 | * @_buffer points to a pointer that should be set to point to the | 1082 | * @_buffer points to a pointer that should be set to point to the |
1083 | * resulting string (if no label or an error occurs). | 1083 | * resulting string (if no label or an error occurs). |
1084 | * Return the length of the string (including terminating NUL) or -ve if | 1084 | * Return the length of the string (including terminating NUL) or -ve if |
1085 | * an error. | 1085 | * an error. |
1086 | * May also return 0 (and a NULL buffer pointer) if there is no label. | 1086 | * May also return 0 (and a NULL buffer pointer) if there is no label. |
1087 | * | 1087 | * |
1088 | * Security hooks affecting all System V IPC operations. | 1088 | * Security hooks affecting all System V IPC operations. |
@@ -1268,7 +1268,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1268 | * credentials. | 1268 | * credentials. |
1269 | * @tsk contains the task_struct for the process. | 1269 | * @tsk contains the task_struct for the process. |
1270 | * @cred contains the credentials to use. | 1270 | * @cred contains the credentials to use. |
1271 | * @ns contains the user namespace we want the capability in | 1271 | * @ns contains the user namespace we want the capability in |
1272 | * @cap contains the capability <include/linux/capability.h>. | 1272 | * @cap contains the capability <include/linux/capability.h>. |
1273 | * @audit: Whether to write an audit message or not | 1273 | * @audit: Whether to write an audit message or not |
1274 | * Return 0 if the capability is granted for @tsk. | 1274 | * Return 0 if the capability is granted for @tsk. |
@@ -1370,7 +1370,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1370 | * @ctxlen contains the length of @ctx. | 1370 | * @ctxlen contains the length of @ctx. |
1371 | * | 1371 | * |
1372 | * @inode_getsecctx: | 1372 | * @inode_getsecctx: |
1373 | * Returns a string containing all relavent security context information | 1373 | * Returns a string containing all relevant security context information |
1374 | * | 1374 | * |
1375 | * @inode we wish to get the security context of. | 1375 | * @inode we wish to get the security context of. |
1376 | * @ctx is a pointer in which to place the allocated security context. | 1376 | * @ctx is a pointer in which to place the allocated security context. |