Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp6680798rdb; Fri, 15 Dec 2023 05:44:28 -0800 (PST) X-Google-Smtp-Source: AGHT+IELyuAVb9BurinsEoAEvECIFNOmIY10l74cdAPphuEvegXk9uTYvvclLHMLikBAFOl3kLkR X-Received: by 2002:a2e:b60a:0:b0:2cc:4510:b799 with SMTP id r10-20020a2eb60a000000b002cc4510b799mr1188753ljn.88.1702647868668; Fri, 15 Dec 2023 05:44:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702647868; cv=none; d=google.com; s=arc-20160816; b=uITJgDGRfsm0ZpumxeJhcJBE+NLkagZSRTVtvB9TZt3/pAhumkaQB94oiWtjMbIC/o IpOocJyy3vy2LO/cYVtxzBDfAQK0L0uvmMhMCu2OVqkjoDlKrUFhx+Ct3xOu+JvivOmN v0S10ATajaXgBY/wrxsw8YxJI+Ew6iIiQ+Ts1ebBN4hsOUsWCrY7epdHhrmACpsCY6Yn PHAPHAMyzS/Z3tLElnQ0KB9VHZx0jr36Ym0eRa1ninf/uBihZ2AGQrRbPgmw9wAEWAJ/ m/I1aeuWxa05UyDH5BGWWc90fpn/D23G75e1s/sry3oG7a7yfousifJAAuj3yQZrIMKz z8cA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature:dkim-signature:dkim-signature :dkim-signature; bh=S2cgVTUxvRqiURRedKmVqJU+Akymyd8v6asPAEOTZTw=; fh=/ZeCbDEQph2896CIVQwe0VlXa9ZMGehxL4Sh5aMjTgA=; b=G5HoiT/3t52xKTyKUjDGOZxnZEKat50w4JbQNipbZvNAGdIJK+3IbRO1k4WEQBpMef Z0TDn0gvklMmrMPt7EqGxkFIWZn1cqine/fhOQhwcg5xPHScl0tk07M8tiD7Mb0s/8vS 1EvfXZjcVJ561S3Alr3avvyZ3DNZS9CMW+gjaSx5wHjGNvWgH0DJP+0G9hdZ5a72VBuY bSdhOGqCqCezLpsc7fXbnSK34WIuegW3AvoA5Lzw5RlnW4OgIl0UKIAKrSQirANT7jg2 5thN9Dey9UEspS2G2dwXLodM/xxKao1PmGNZ/VErrVKLVfxHAhLwft/6iaKgI+H6fAFX KInQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lw270NG4; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=dqlEYDWh; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lw270NG4; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=dqlEYDWh; spf=pass (google.com: domain of linux-kernel+bounces-1034-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-1034-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id b11-20020a056402084b00b0054c878f57ecsi7370564edz.621.2023.12.15.05.44.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Dec 2023 05:44:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-1034-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lw270NG4; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=dqlEYDWh; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lw270NG4; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=dqlEYDWh; spf=pass (google.com: domain of linux-kernel+bounces-1034-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-1034-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id B39111F2344D for ; Fri, 15 Dec 2023 13:44:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7B02E2E3FB; Fri, 15 Dec 2023 13:44:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b="lw270NG4"; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b="dqlEYDWh"; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b="lw270NG4"; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b="dqlEYDWh" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 947992DB8B; Fri, 15 Dec 2023 13:44:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=suse.cz Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.cz Received: from imap2.dmz-prg2.suse.org (imap2.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id ADAA91FE1A; Fri, 15 Dec 2023 13:44:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1702647852; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=S2cgVTUxvRqiURRedKmVqJU+Akymyd8v6asPAEOTZTw=; b=lw270NG4xpp8rrs8hM5/kPPtzv9f7cFFkqJH6pHJrjg2Sv2eAobVvDBeoyZLfdCRg1btUy xyBTU+9jHM+5N+2B3eHo8Yv2+yavU+oStyp0trvKjIQGk/kvy+kgtJAS7r4FExapGl3nh1 bSGoF+x+8GziY+5kEIr7oYMwZ+4q0NY= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1702647852; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=S2cgVTUxvRqiURRedKmVqJU+Akymyd8v6asPAEOTZTw=; b=dqlEYDWhZa6eEJwC5t40rDVYm2cD/h86P1VSsOtndVrMxQQ5YHSOn1nnkwa84jCWg0ysxL GRmwcLL1dwKHfoAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1702647852; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=S2cgVTUxvRqiURRedKmVqJU+Akymyd8v6asPAEOTZTw=; b=lw270NG4xpp8rrs8hM5/kPPtzv9f7cFFkqJH6pHJrjg2Sv2eAobVvDBeoyZLfdCRg1btUy xyBTU+9jHM+5N+2B3eHo8Yv2+yavU+oStyp0trvKjIQGk/kvy+kgtJAS7r4FExapGl3nh1 bSGoF+x+8GziY+5kEIr7oYMwZ+4q0NY= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1702647852; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=S2cgVTUxvRqiURRedKmVqJU+Akymyd8v6asPAEOTZTw=; b=dqlEYDWhZa6eEJwC5t40rDVYm2cD/h86P1VSsOtndVrMxQQ5YHSOn1nnkwa84jCWg0ysxL GRmwcLL1dwKHfoAA== Received: from imap2.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap2.dmz-prg2.suse.org (Postfix) with ESMTPS id 995FD13A08; Fri, 15 Dec 2023 13:44:12 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap2.dmz-prg2.suse.org with ESMTPSA id hzUuJSxYfGV3XQAAn2gu4w (envelope-from ); Fri, 15 Dec 2023 13:44:12 +0000 Received: by quack3.suse.cz (Postfix, from userid 1000) id 244DEA07E0; Fri, 15 Dec 2023 14:44:12 +0100 (CET) Date: Fri, 15 Dec 2023 14:44:12 +0100 From: Jan Kara To: Alexander Mikhalitsyn Cc: brauner@kernel.org, linux-fsdevel@vger.kernel.org, Jan Kara , Alexander Viro , linux-kernel@vger.kernel.org Subject: Re: [PATCH] fs: fix doc comment typo fs tree wide Message-ID: <20231215134412.eghjpfsfam2bvgnr@quack3> References: <20231215130927.136917-1-aleksandr.mikhalitsyn@canonical.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231215130927.136917-1-aleksandr.mikhalitsyn@canonical.com> X-Spam-Level: ** X-Spam-Level: Authentication-Results: smtp-out2.suse.de; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=lw270NG4; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=dqlEYDWh X-Rspamd-Server: rspamd2.dmz-prg2.suse.org X-Spamd-Result: default: False [-4.01 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:98:from]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; RCPT_COUNT_FIVE(0.00)[6]; NEURAL_HAM_SHORT(-0.20)[-0.999]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; DKIM_TRACE(0.00)[suse.cz:+]; MX_GOOD(-0.01)[]; DBL_BLOCKED_OPENRESOLVER(0.00)[canonical.com:email,suse.cz:dkim,suse.cz:email,linux.org.uk:email,suse.com:email]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Spam-Score: -4.01 X-Rspamd-Queue-Id: ADAA91FE1A X-Spam-Flag: NO On Fri 15-12-23 14:09:27, Alexander Mikhalitsyn wrote: > Do the replacement: > s/simply passs @nop_mnt_idmap/simply passs @nop_mnt_idmap/ > in the fs/ tree. > > Found by chance while working on support for idmapped mounts in fuse. > > Cc: Jan Kara > Cc: Alexander Viro > Cc: Christian Brauner > Cc: linux-fsdevel@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Signed-off-by: Alexander Mikhalitsyn Sure, thanks! Feel free to add: Reviewed-by: Jan Kara Honza > --- > fs/attr.c | 2 +- > fs/inode.c | 2 +- > fs/namei.c | 22 +++++++++++----------- > fs/posix_acl.c | 4 ++-- > fs/stat.c | 2 +- > 5 files changed, 16 insertions(+), 16 deletions(-) > > diff --git a/fs/attr.c b/fs/attr.c > index bdf5deb06ea9..5a13f0c8495f 100644 > --- a/fs/attr.c > +++ b/fs/attr.c > @@ -157,7 +157,7 @@ static bool chgrp_ok(struct mnt_idmap *idmap, > * the vfsmount must be passed through @idmap. This function will then > * take care to map the inode according to @idmap before checking > * permissions. On non-idmapped mounts or if permission checking is to be > - * performed on the raw inode simply passs @nop_mnt_idmap. > + * performed on the raw inode simply pass @nop_mnt_idmap. > * > * Should be called as the first thing in ->setattr implementations, > * possibly after taking additional locks. > diff --git a/fs/inode.c b/fs/inode.c > index edcd8a61975f..60d0667cbd27 100644 > --- a/fs/inode.c > +++ b/fs/inode.c > @@ -2402,7 +2402,7 @@ EXPORT_SYMBOL(inode_init_owner); > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > bool inode_owner_or_capable(struct mnt_idmap *idmap, > const struct inode *inode) > diff --git a/fs/namei.c b/fs/namei.c > index 71c13b2990b4..200eb919cdc0 100644 > --- a/fs/namei.c > +++ b/fs/namei.c > @@ -289,7 +289,7 @@ EXPORT_SYMBOL(putname); > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > static int check_acl(struct mnt_idmap *idmap, > struct inode *inode, int mask) > @@ -334,7 +334,7 @@ static int check_acl(struct mnt_idmap *idmap, > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > static int acl_permission_check(struct mnt_idmap *idmap, > struct inode *inode, int mask) > @@ -395,7 +395,7 @@ static int acl_permission_check(struct mnt_idmap *idmap, > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int generic_permission(struct mnt_idmap *idmap, struct inode *inode, > int mask) > @@ -3158,7 +3158,7 @@ static inline umode_t vfs_prepare_mode(struct mnt_idmap *idmap, > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_create(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry, umode_t mode, bool want_excl) > @@ -3646,7 +3646,7 @@ static int do_open(struct nameidata *nd, > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > static int vfs_tmpfile(struct mnt_idmap *idmap, > const struct path *parentpath, > @@ -3954,7 +3954,7 @@ EXPORT_SYMBOL(user_path_create); > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_mknod(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry, umode_t mode, dev_t dev) > @@ -4080,7 +4080,7 @@ SYSCALL_DEFINE3(mknod, const char __user *, filename, umode_t, mode, unsigned, d > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_mkdir(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry, umode_t mode) > @@ -4161,7 +4161,7 @@ SYSCALL_DEFINE2(mkdir, const char __user *, pathname, umode_t, mode) > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_rmdir(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry) > @@ -4290,7 +4290,7 @@ SYSCALL_DEFINE1(rmdir, const char __user *, pathname) > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_unlink(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry, struct inode **delegated_inode) > @@ -4443,7 +4443,7 @@ SYSCALL_DEFINE1(unlink, const char __user *, pathname) > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_symlink(struct mnt_idmap *idmap, struct inode *dir, > struct dentry *dentry, const char *oldname) > @@ -4535,7 +4535,7 @@ SYSCALL_DEFINE2(symlink, const char __user *, oldname, const char __user *, newn > * the vfsmount must be passed through @idmap. This function will then take > * care to map the inode according to @idmap before checking permissions. > * On non-idmapped mounts or if permission checking is to be performed on the > - * raw inode simply passs @nop_mnt_idmap. > + * raw inode simply pass @nop_mnt_idmap. > */ > int vfs_link(struct dentry *old_dentry, struct mnt_idmap *idmap, > struct inode *dir, struct dentry *new_dentry, > diff --git a/fs/posix_acl.c b/fs/posix_acl.c > index a05fe94970ce..e1af20893ebe 100644 > --- a/fs/posix_acl.c > +++ b/fs/posix_acl.c > @@ -600,7 +600,7 @@ EXPORT_SYMBOL(__posix_acl_chmod); > * the vfsmount must be passed through @idmap. This function will then > * take care to map the inode according to @idmap before checking > * permissions. On non-idmapped mounts or if permission checking is to be > - * performed on the raw inode simply passs @nop_mnt_idmap. > + * performed on the raw inode simply pass @nop_mnt_idmap. > */ > int > posix_acl_chmod(struct mnt_idmap *idmap, struct dentry *dentry, > @@ -700,7 +700,7 @@ EXPORT_SYMBOL_GPL(posix_acl_create); > * the vfsmount must be passed through @idmap. This function will then > * take care to map the inode according to @idmap before checking > * permissions. On non-idmapped mounts or if permission checking is to be > - * performed on the raw inode simply passs @nop_mnt_idmap. > + * performed on the raw inode simply pass @nop_mnt_idmap. > * > * Called from set_acl inode operations. > */ > diff --git a/fs/stat.c b/fs/stat.c > index 24bb0209e459..0ab525f80a49 100644 > --- a/fs/stat.c > +++ b/fs/stat.c > @@ -41,7 +41,7 @@ > * the vfsmount must be passed through @idmap. This function will then > * take care to map the inode according to @idmap before filling in the > * uid and gid filds. On non-idmapped mounts or if permission checking is to be > - * performed on the raw inode simply passs @nop_mnt_idmap. > + * performed on the raw inode simply pass @nop_mnt_idmap. > */ > void generic_fillattr(struct mnt_idmap *idmap, u32 request_mask, > struct inode *inode, struct kstat *stat) > -- > 2.34.1 > -- Jan Kara SUSE Labs, CR