aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
diff options
context:
space:
mode:
authorVsevolod Alekseev <vsevolod.alekseev@gmx.com>2011-11-05 05:35:28 -0400
committerJiri Kosina <jkosina@suse.cz>2011-11-05 15:59:16 -0400
commit11be0b3c18d654a8d5ed441fa9e988193a57c1d2 (patch)
tree33e5de55186308b3cf6f233c7565e97777b1a0b4 /include/linux/security.h
parentf854b5bc264023b21bbcb4b358cd858d5d45a4cb (diff)
security.h: fix misc typos/grammar errors in comments
Fix various typos/grammar errors in include/linux/security.h comments (no code changes). Signed-off-by: Vsevolod Alekseev <vsevolod.alekseev@gmx.com> Acked-by: Randy Dunlap <rdunlap@xenotime.net> Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r--include/linux/security.h26
1 files changed, 13 insertions, 13 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 19d8e04e1688..94c35336b86b 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -186,7 +186,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
186 * Security module identifier. 186 * Security module identifier.
187 * 187 *
188 * @name: 188 * @name:
189 * A string that acts as a unique identifeir for the LSM with max number 189 * A string that acts as a unique identifier for the LSM with max number
190 * of characters = SECURITY_NAME_MAX. 190 * of characters = SECURITY_NAME_MAX.
191 * 191 *
192 * Security hooks for program execution operations. 192 * Security hooks for program execution operations.
@@ -275,7 +275,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
275 * @copy copied data which will be passed to the security module. 275 * @copy copied data which will be passed to the security module.
276 * Returns 0 if the copy was successful. 276 * Returns 0 if the copy was successful.
277 * @sb_remount: 277 * @sb_remount:
278 * Extracts security system specifc mount options and verifys no changes 278 * Extracts security system specific mount options and verifies no changes
279 * are being made to those options. 279 * are being made to those options.
280 * @sb superblock being remounted 280 * @sb superblock being remounted
281 * @data contains the filesystem-specific data. 281 * @data contains the filesystem-specific data.
@@ -380,15 +380,15 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
380 * Return 0 if permission is granted. 380 * Return 0 if permission is granted.
381 * @inode_mkdir: 381 * @inode_mkdir:
382 * Check permissions to create a new directory in the existing directory 382 * Check permissions to create a new directory in the existing directory
383 * associated with inode strcture @dir. 383 * associated with inode structure @dir.
384 * @dir containst the inode structure of parent of the directory to be created. 384 * @dir contains the inode structure of parent of the directory to be created.
385 * @dentry contains the dentry structure of new directory. 385 * @dentry contains the dentry structure of new directory.
386 * @mode contains the mode of new directory. 386 * @mode contains the mode of new directory.
387 * Return 0 if permission is granted. 387 * Return 0 if permission is granted.
388 * @path_mkdir: 388 * @path_mkdir:
389 * Check permissions to create a new directory in the existing directory 389 * Check permissions to create a new directory in the existing directory
390 * associated with path strcture @path. 390 * associated with path structure @path.
391 * @dir containst the path structure of parent of the directory 391 * @dir contains the path structure of parent of the directory
392 * to be created. 392 * to be created.
393 * @dentry contains the dentry structure of new directory. 393 * @dentry contains the dentry structure of new directory.
394 * @mode contains the mode of new directory. 394 * @mode contains the mode of new directory.
@@ -578,7 +578,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
578 * @file contains the file structure. 578 * @file contains the file structure.
579 * @cmd contains the operation to perform. 579 * @cmd contains the operation to perform.
580 * @arg contains the operational arguments. 580 * @arg contains the operational arguments.
581 * Check permission for an ioctl operation on @file. Note that @arg can 581 * Check permission for an ioctl operation on @file. Note that @arg
582 * sometimes represents a user space pointer; in other cases, it may be a 582 * sometimes represents a user space pointer; in other cases, it may be a
583 * simple integer value. When @arg represents a user space pointer, it 583 * simple integer value. When @arg represents a user space pointer, it
584 * should never be used by the security module. 584 * should never be used by the security module.
@@ -606,7 +606,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
606 * Return 0 if permission is granted. 606 * Return 0 if permission is granted.
607 * @file_fcntl: 607 * @file_fcntl:
608 * Check permission before allowing the file operation specified by @cmd 608 * Check permission before allowing the file operation specified by @cmd
609 * from being performed on the file @file. Note that @arg can sometimes 609 * from being performed on the file @file. Note that @arg sometimes
610 * represents a user space pointer; in other cases, it may be a simple 610 * represents a user space pointer; in other cases, it may be a simple
611 * integer value. When @arg represents a user space pointer, it should 611 * integer value. When @arg represents a user space pointer, it should
612 * never be used by the security module. 612 * never be used by the security module.
@@ -793,7 +793,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
793 * information can be saved using the eff_cap field of the 793 * information can be saved using the eff_cap field of the
794 * netlink_skb_parms structure. Also may be used to provide fine 794 * netlink_skb_parms structure. Also may be used to provide fine
795 * grained control over message transmission. 795 * grained control over message transmission.
796 * @sk associated sock of task sending the message., 796 * @sk associated sock of task sending the message.
797 * @skb contains the sk_buff structure for the netlink message. 797 * @skb contains the sk_buff structure for the netlink message.
798 * Return 0 if the information was successfully saved and message 798 * Return 0 if the information was successfully saved and message
799 * is allowed to be transmitted. 799 * is allowed to be transmitted.
@@ -1080,9 +1080,9 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
1080 * should free it. 1080 * should free it.
1081 * @key points to the key to be queried. 1081 * @key points to the key to be queried.
1082 * @_buffer points to a pointer that should be set to point to the 1082 * @_buffer points to a pointer that should be set to point to the
1083 * resulting string (if no label or an error occurs). 1083 * resulting string (if no label or an error occurs).
1084 * Return the length of the string (including terminating NUL) or -ve if 1084 * Return the length of the string (including terminating NUL) or -ve if
1085 * an error. 1085 * an error.
1086 * May also return 0 (and a NULL buffer pointer) if there is no label. 1086 * May also return 0 (and a NULL buffer pointer) if there is no label.
1087 * 1087 *
1088 * Security hooks affecting all System V IPC operations. 1088 * Security hooks affecting all System V IPC operations.
@@ -1268,7 +1268,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
1268 * credentials. 1268 * credentials.
1269 * @tsk contains the task_struct for the process. 1269 * @tsk contains the task_struct for the process.
1270 * @cred contains the credentials to use. 1270 * @cred contains the credentials to use.
1271 * @ns contains the user namespace we want the capability in 1271 * @ns contains the user namespace we want the capability in
1272 * @cap contains the capability <include/linux/capability.h>. 1272 * @cap contains the capability <include/linux/capability.h>.
1273 * @audit: Whether to write an audit message or not 1273 * @audit: Whether to write an audit message or not
1274 * Return 0 if the capability is granted for @tsk. 1274 * Return 0 if the capability is granted for @tsk.
@@ -1370,7 +1370,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
1370 * @ctxlen contains the length of @ctx. 1370 * @ctxlen contains the length of @ctx.
1371 * 1371 *
1372 * @inode_getsecctx: 1372 * @inode_getsecctx:
1373 * Returns a string containing all relavent security context information 1373 * Returns a string containing all relevant security context information
1374 * 1374 *
1375 * @inode we wish to get the security context of. 1375 * @inode we wish to get the security context of.
1376 * @ctx is a pointer in which to place the allocated security context. 1376 * @ctx is a pointer in which to place the allocated security context.