mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-12-27 11:06:41 -05:00
Smack: fix typos and spelling errors
Fix typos and spelling errors in security/smack module comments that were identified using the codespell tool. No functional changes - documentation only. Signed-off-by: Tanya Agarwal <tanyaagarwal25699@gmail.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
This commit is contained in:
@@ -42,7 +42,7 @@
|
||||
|
||||
/*
|
||||
* This is the repository for labels seen so that it is
|
||||
* not necessary to keep allocating tiny chuncks of memory
|
||||
* not necessary to keep allocating tiny chunks of memory
|
||||
* and so that they can be shared.
|
||||
*
|
||||
* Labels are never modified in place. Anytime a label
|
||||
|
||||
@@ -242,7 +242,7 @@ int smk_tskacc(struct task_smack *tsp, struct smack_known *obj_known,
|
||||
}
|
||||
|
||||
/*
|
||||
* Allow for priviliged to override policy.
|
||||
* Allow for privileged to override policy.
|
||||
*/
|
||||
if (rc != 0 && smack_privileged(CAP_MAC_OVERRIDE))
|
||||
rc = 0;
|
||||
@@ -276,7 +276,7 @@ int smk_curacc(struct smack_known *obj_known,
|
||||
}
|
||||
|
||||
/**
|
||||
* smack_str_from_perm : helper to transalate an int to a
|
||||
* smack_str_from_perm : helper to translate an int to a
|
||||
* readable string
|
||||
* @string : the string to fill
|
||||
* @access : the int
|
||||
|
||||
@@ -1934,7 +1934,7 @@ static int smack_file_send_sigiotask(struct task_struct *tsk,
|
||||
*/
|
||||
file = fown->file;
|
||||
|
||||
/* we don't log here as rc can be overriden */
|
||||
/* we don't log here as rc can be overridden */
|
||||
blob = smack_file(file);
|
||||
skp = *blob;
|
||||
rc = smk_access(skp, tkp, MAY_DELIVER, NULL);
|
||||
@@ -4195,7 +4195,7 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb)
|
||||
/*
|
||||
* Receiving a packet requires that the other end
|
||||
* be able to write here. Read access is not required.
|
||||
* This is the simplist possible security model
|
||||
* This is the simplest possible security model
|
||||
* for networking.
|
||||
*/
|
||||
rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad);
|
||||
@@ -4701,7 +4701,7 @@ static int smack_post_notification(const struct cred *w_cred,
|
||||
* @gfp: type of the memory for the allocation
|
||||
*
|
||||
* Prepare to audit cases where (@field @op @rulestr) is true.
|
||||
* The label to be audited is created if necessay.
|
||||
* The label to be audited is created if necessary.
|
||||
*/
|
||||
static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule,
|
||||
gfp_t gfp)
|
||||
|
||||
@@ -165,7 +165,7 @@ static int smk_cipso_doi_value = SMACK_CIPSO_DOI_DEFAULT;
|
||||
#define SMK_LOADLEN (SMK_LABELLEN + SMK_LABELLEN + SMK_ACCESSLEN)
|
||||
|
||||
/*
|
||||
* Stricly for CIPSO level manipulation.
|
||||
* Strictly for CIPSO level manipulation.
|
||||
* Set the category bit number in a smack label sized buffer.
|
||||
*/
|
||||
static inline void smack_catset_bit(unsigned int cat, char *catsetp)
|
||||
|
||||
Reference in New Issue
Block a user