lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20190531133649.GA1251@fieldses.org>
Date:   Fri, 31 May 2019 09:36:49 -0400
From:   "J . Bruce Fields" <bfields@...ldses.org>
To:     Geert Uytterhoeven <geert+renesas@...der.be>
Cc:     Jeff Layton <jlayton@...nel.org>, Jiri Kosina <trivial@...nel.org>,
        linux-nfs@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] [trivial] nfsd: Spelling s/EACCESS/EACCES/

Thanks, applying for 5.3.--b.

On Mon, May 27, 2019 at 02:21:32PM +0200, Geert Uytterhoeven wrote:
> The correct spelling is EACCES:
> 
> include/uapi/asm-generic/errno-base.h:#define EACCES 13 /* Permission denied */
> 
> Signed-off-by: Geert Uytterhoeven <geert+renesas@...der.be>
> ---
>  fs/nfsd/vfs.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c
> index fc24ee47eab51ad4..c85783e536d595de 100644
> --- a/fs/nfsd/vfs.c
> +++ b/fs/nfsd/vfs.c
> @@ -404,7 +404,7 @@ nfsd_setattr(struct svc_rqst *rqstp, struct svc_fh *fhp, struct iattr *iap,
>  	/*
>  	 * If utimes(2) and friends are called with times not NULL, we should
>  	 * not set NFSD_MAY_WRITE bit. Otherwise fh_verify->nfsd_permission
> -	 * will return EACCESS, when the caller's effective UID does not match
> +	 * will return EACCES, when the caller's effective UID does not match
>  	 * the owner of the file, and the caller is not privileged. In this
>  	 * situation, we should return EPERM(notify_change will return this).
>  	 */
> -- 
> 2.17.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ