mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-12-27 08:45:26 -05:00
apparmor: fix typos and spelling errors
Fix typos and spelling errors in apparmor module comments that were identified using the codespell tool. No functional changes - documentation only. Signed-off-by: Tanya Agarwal <tanyaagarwal25699@gmail.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Ryan Lee <ryan.lee@canonical.com> Signed-off-by: John Johansen <john.johansen@canonical.com>
This commit is contained in:
committed by
John Johansen
parent
04fe43104e
commit
aabbe6f908
@@ -43,7 +43,7 @@
|
||||
* The interface is split into two main components based on their function
|
||||
* a securityfs component:
|
||||
* used for static files that are always available, and which allows
|
||||
* userspace to specificy the location of the security filesystem.
|
||||
* userspace to specify the location of the security filesystem.
|
||||
*
|
||||
* fns and data are prefixed with
|
||||
* aa_sfs_
|
||||
@@ -204,7 +204,7 @@ static struct file_system_type aafs_ops = {
|
||||
/**
|
||||
* __aafs_setup_d_inode - basic inode setup for apparmorfs
|
||||
* @dir: parent directory for the dentry
|
||||
* @dentry: dentry we are seting the inode up for
|
||||
* @dentry: dentry we are setting the inode up for
|
||||
* @mode: permissions the file should have
|
||||
* @data: data to store on inode.i_private, available in open()
|
||||
* @link: if symlink, symlink target string
|
||||
@@ -2253,7 +2253,7 @@ static void *p_next(struct seq_file *f, void *p, loff_t *pos)
|
||||
/**
|
||||
* p_stop - stop depth first traversal
|
||||
* @f: seq_file we are filling
|
||||
* @p: the last profile writen
|
||||
* @p: the last profile written
|
||||
*
|
||||
* Release all locking done by p_start/p_next on namespace tree
|
||||
*/
|
||||
|
||||
@@ -762,7 +762,7 @@ static int profile_onexec(const struct cred *subj_cred,
|
||||
/* change_profile on exec already granted */
|
||||
/*
|
||||
* NOTE: Domain transitions from unconfined are allowed
|
||||
* even when no_new_privs is set because this aways results
|
||||
* even when no_new_privs is set because this always results
|
||||
* in a further reduction of permissions.
|
||||
*/
|
||||
return 0;
|
||||
@@ -933,7 +933,7 @@ int apparmor_bprm_creds_for_exec(struct linux_binprm *bprm)
|
||||
*
|
||||
* NOTE: Domain transitions from unconfined and to stacked
|
||||
* subsets are allowed even when no_new_privs is set because this
|
||||
* aways results in a further reduction of permissions.
|
||||
* always results in a further reduction of permissions.
|
||||
*/
|
||||
if ((bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) &&
|
||||
!unconfined(label) &&
|
||||
|
||||
@@ -1461,7 +1461,7 @@ bool aa_update_label_name(struct aa_ns *ns, struct aa_label *label, gfp_t gfp)
|
||||
|
||||
/*
|
||||
* cached label name is present and visible
|
||||
* @label->hname only exists if label is namespace hierachical
|
||||
* @label->hname only exists if label is namespace hierarchical
|
||||
*/
|
||||
static inline bool use_label_hname(struct aa_ns *ns, struct aa_label *label,
|
||||
int flags)
|
||||
|
||||
@@ -2173,7 +2173,7 @@ static int __init alloc_buffers(void)
|
||||
* two should be enough, with more CPUs it is possible that more
|
||||
* buffers will be used simultaneously. The preallocated pool may grow.
|
||||
* This preallocation has also the side-effect that AppArmor will be
|
||||
* disabled early at boot if aa_g_path_max is extremly high.
|
||||
* disabled early at boot if aa_g_path_max is extremely high.
|
||||
*/
|
||||
if (num_online_cpus() > 1)
|
||||
num = 4 + RESERVE_COUNT;
|
||||
|
||||
@@ -488,7 +488,7 @@ static struct aa_policy *__lookup_parent(struct aa_ns *ns,
|
||||
}
|
||||
|
||||
/**
|
||||
* __create_missing_ancestors - create place holders for missing ancestores
|
||||
* __create_missing_ancestors - create place holders for missing ancestors
|
||||
* @ns: namespace to lookup profile in (NOT NULL)
|
||||
* @hname: hierarchical profile name to find parent of (NOT NULL)
|
||||
* @gfp: type of allocation.
|
||||
@@ -1095,7 +1095,7 @@ ssize_t aa_replace_profiles(struct aa_ns *policy_ns, struct aa_label *label,
|
||||
goto out;
|
||||
|
||||
/* ensure that profiles are all for the same ns
|
||||
* TODO: update locking to remove this constaint. All profiles in
|
||||
* TODO: update locking to remove this constraint. All profiles in
|
||||
* the load set must succeed as a set or the load will
|
||||
* fail. Sort ent list and take ns locks in hierarchy order
|
||||
*/
|
||||
|
||||
Reference in New Issue
Block a user