Received: by 2002:a05:7412:cfc7:b0:fc:a2b0:25d7 with SMTP id by7csp213365rdb; Sat, 17 Feb 2024 05:36:02 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWjV8Z8h6XZjHscso0On3iQswcs4HyFbjYo2GL4kbVe5o9X75ff9HYX2IqAb38budyBAJgseA2w23D6JU/phZXcoBUWudZsJE0Ud4hhsg== X-Google-Smtp-Source: AGHT+IHrG97VHYU9ymDY2dT8Ce/QKSiMFHvLzT+E/zIlFFaRMLVGGPHNcMtyf2/weYINP6dmdHjV X-Received: by 2002:a81:c252:0:b0:607:9e4b:f0e9 with SMTP id t18-20020a81c252000000b006079e4bf0e9mr8396011ywg.31.1708176962362; Sat, 17 Feb 2024 05:36:02 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708176962; cv=pass; d=google.com; s=arc-20160816; b=TY8MrRysHyKfdSphquE/euTZaB197nnhOiZ7Dm8AZUqAuryPvxhvm1V6H66uxeQmEY fAxgfC0v6GpuIRGjfPJnTjPdTgBijfjQrzPRqLl0qrV4ncF7JZAvASjgFoCbV6pPTmDu Vl5GTsaZgoQI0vSMXBXdkShoncWYJxcj/gnaYqBZugUxNc8SmFUvMK7ssCo0ixcnSqwz KN4cSUJ11wpPjqQORP2HomuRhDjAywxHCLEfn1zRXG3OFFH8lc+ADYGUA//AxdquT7ri e1a7P5Ok1Bb5EArxVtBFSfHvNPuksoTFSKIEa0c42/Htx4fpApcd6xux2+MjTH7wuNLV QdlA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=E/J9bJiu5lsGMJF4n5pm6X5Bisri8OV7G/jXa46CjfA=; fh=9FLXoQFucRHjRgxlCHEJ+edWauMZvvkRikJ0uR/5pPY=; b=ksSrRRQ5/irJu6mZ/8gCG89YxuR/DZBDSFN4OLjiupDw0VowGWgMAdBkSH3ilkRiG9 KhVECRBGdmy4y01GSnviI4jDQJBLcsWbh47/z67zasnOOkfbFhLt1oeZp7HMJbY8ExXQ xl622hIx6Gxj5FmwwOmVy5avtEz1pxV8bn8T5vv3J2B8cPe59lj6aJmPVv1G6/5iUtUB AoAtfpioXtL8opTCr1Tsx398VEL5o8547x9FT0p+EDEik1ZkDtrOhWVTDol7OjXKMlxq xd11Ap1tB/kkV6r+PAnWJF/FnBiz0XcUIqirMO7cIKcEn83H/RYPXXUqXufGG/wzHMdh sHlw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=IzDXgvhj; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-69873-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-69873-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id c24-20020ac853d8000000b0042dafd950f4si2001359qtq.601.2024.02.17.05.36.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 17 Feb 2024 05:36:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-69873-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=IzDXgvhj; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-69873-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-69873-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 1F8A71C21061 for ; Sat, 17 Feb 2024 13:36:02 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DEFA67AE56; Sat, 17 Feb 2024 13:35:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="IzDXgvhj" Received: from mail-il1-f176.google.com (mail-il1-f176.google.com [209.85.166.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AC8AB3DBBB; Sat, 17 Feb 2024 13:35:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.166.176 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708176954; cv=none; b=MlSZrFC9njHlswEQkAFy9msuB/TyBpz+67dio/TEM/uQ+42cs91maW9dDirKPFMNeCKWBYwIGcj4Bnk0WQxgtFSgEClakckfVK2iBPxq70n3JOevu3Pjgw9tJ9ZoKyYzrFo+SHSVtx/2NawR+BRosqao1TNxMsPzT+zalhFAUzo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708176954; c=relaxed/simple; bh=tMZnD9BAREbxBr4MCZ1qYFNYWYWzjxmzqnVxHd8u8/g=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=VTV8bKf/vM3nLIwJZBddwRE0f0VHzjDxcONBJAy6wrixXHGo5hQxyN7O8cO3lvmV7TbRZFTGm1vMogbHkKJc74hDtqKIW3cMTCpnBKVKegRJr0LiDl8J5tO0fLkGZG7dKUTotipCg6DD3j22TDInP6RuN9bEEKWExZfqC7vnFOg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=IzDXgvhj; arc=none smtp.client-ip=209.85.166.176 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-il1-f176.google.com with SMTP id e9e14a558f8ab-364f8246c8cso7294115ab.2; Sat, 17 Feb 2024 05:35:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1708176952; x=1708781752; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=E/J9bJiu5lsGMJF4n5pm6X5Bisri8OV7G/jXa46CjfA=; b=IzDXgvhj7EVlND7HMzpiWdIt8xinzQb9YYoPL4+7NZKdX2x74IN4sHVuwAx5NB2h6s yYb0vH9QnODd3Nk/GRnMctoVOFxpbPOjfnH/pMy3wMgY1Qpq8TYwQo8S0pD5JZPafkWy gwQcn6k6AHECaOhZlRoGT1QHrkuy4ZMTMUe2/vesfI56g8vb8bmJXr4JtuEu90K5V4f6 lgvpMjwxn+cwMoK6m9L6DO73ZA9mMHtIhYC6Gwo/P1Jo6IClabhcreyB0OQVvNPCKVKu e5HQWrEMfWPyA0OCws/FxCfr3mBF9wtSLVd5/ArbuJZkgbOthDJZkCOaurEuGl6EKfTP UFAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708176952; x=1708781752; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=E/J9bJiu5lsGMJF4n5pm6X5Bisri8OV7G/jXa46CjfA=; b=CB9VlG3LO+Sz6C0gp/mdIzBi8tPhycFWgZsAKVIulMB76ie1Q+DR6J8XGgwHDqaGbK EvBe7h8y3SWLSkU2oaNHeQNeBHTmcfS+fEQ/5a1LRED0ESI3XOCWGSiU/gVk8C1HOQGa rTwyGXs0Er83VtpQrJQtIjpGPw/32NdWrdbFFgQ55TwmfMdwHwFI6T+sCBMfBOzBgsSH L/+1KwkxJJMzwOiA+W3UxnsoWlW9ZIBWfBTJHWFsKB2XgmnJJLqv7/LN2uVC07rqVcrj J2NqDzQ1GP3rInJ+WS1G4PyTpxGV//TA+eOzm3Bk+v/0qJWS6YXnjkaW5MycirlSAAcm 8YXg== X-Forwarded-Encrypted: i=1; AJvYcCW3LsMSItfY1Aj5PReJUhTc368AMHEYVOSo5KnkdPEOxk5yFcMg7nS6T1ObW8HosmRFsA8tjrOQvpS/6ikaP/61ZLMsR0yNC6f0Q0YpAYQ6T19hPN3XdFkt/aeCJ0oLEq3zaYzIZSnasn6xVje+iEISPrGz X-Gm-Message-State: AOJu0YyOhikqJvNT6k/CEyoZ/dwc7txQnAUYbrIZ07Ko8o3O9+PhJU6y vAbkgF3cSGKFD6aljKBoR6RvKbThR+LedeFnYfykdruG6rgnTkoA X-Received: by 2002:a05:6e02:184e:b0:365:1dc5:9cae with SMTP id b14-20020a056e02184e00b003651dc59caemr1450043ilv.9.1708176951614; Sat, 17 Feb 2024 05:35:51 -0800 (PST) Received: from pairface.. ([111.18.146.226]) by smtp.gmail.com with ESMTPSA id 32-20020a631260000000b005d3bae243bbsm1583617pgs.4.2024.02.17.05.35.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 17 Feb 2024 05:35:51 -0800 (PST) From: Pairman Guo To: paul@paul-moore.com Cc: jmorris@namei.org, serge@hallyn.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Pairman Guo Subject: [PATCH] LSM: Fix typos in security/security.c comment headers Date: Sat, 17 Feb 2024 21:35:04 +0800 Message-ID: <20240217133504.4534-1-pairmanxlr@gmail.com> X-Mailer: git-send-email 2.43.2 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This commit fixes several typos in comment headers in security/security.c where "Check is" should be "Check if". Signed-off-by: Pairman Guo --- security/security.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/security/security.c b/security/security.c index 7035ee35a..0bd3e9df4 100644 --- a/security/security.c +++ b/security/security.c @@ -2904,7 +2904,7 @@ int security_file_send_sigiotask(struct task_struct *tsk, } /** - * security_file_receive() - Check is receiving a file via IPC is allowed + * security_file_receive() - Check if receiving a file via IPC is allowed * @file: file being received * * This hook allows security modules to control the ability of a process to @@ -3114,7 +3114,7 @@ int security_kernel_create_files_as(struct cred *new, struct inode *inode) } /** - * security_kernel_module_request() - Check is loading a module is allowed + * security_kernel_module_request() - Check if loading a module is allowed * @kmod_name: module name * * Ability to trigger the kernel to automatically upcall to userspace for @@ -4114,7 +4114,7 @@ int security_netlink_send(struct sock *sk, struct sk_buff *skb) } /** - * security_ismaclabel() - Check is the named attribute is a MAC label + * security_ismaclabel() - Check if the named attribute is a MAC label * @name: full extended attribute name * * Check if the extended attribute specified by @name represents a MAC label. @@ -4487,7 +4487,7 @@ int security_socket_accept(struct socket *sock, struct socket *newsock) } /** - * security_socket_sendmsg() - Check is sending a message is allowed + * security_socket_sendmsg() - Check if sending a message is allowed * @sock: sending socket * @msg: message to send * @size: size of message -- 2.43.2